
DAEJEON, South Korea — In an era when recent cyberattacks on major telecommunications providers have highlighted the fragility of mobile security, researchers at the Korea Advanced Institute of Science and Technology have identified a class of previously unknown vulnerabilities that could allow remote attackers to compromise cellular networks serving billions of users worldwide.
The research team, led by Professor Yongdae Kim of KAIST's School of Electrical Engineering, discovered that unauthorized attackers could remotely manipulate internal user information in LTE core networks — the central infrastructure that manages authentication, internet connectivity, and data transmission for mobile devices and IoT equipment.
The findings, presented at the 32nd ACM Conference on Computer and Communications Security in Taipei, Taiwan, earned the team a Distinguished Paper Award, one of only 30 such honors selected from approximately 2,400 submissions to one of the field's most prestigious venues.
The vulnerability class, which the researchers termed "Context Integrity Violation" (CIV), represents a fundamental breach of a basic security principle: unauthenticated messages should not alter internal system states. While previous security research has primarily focused on "downlink" attacks — where networks compromise devices — this study examined the less-scrutinized "uplink" security, where devices can attack core networks.
"The problem stems from gaps in the 3GPP standards," Professor Kim explained, referring to the international body that establishes operational rules for mobile networks. "While the standards prohibit processing messages that fail authentication, they lack clear guidance on handling messages that bypass authentication procedures entirely."
The team developed CITesting, the world's first systematic tool for detecting these vulnerabilities, capable of examining between 2,802 and 4,626 test cases — a vast expansion from the 31 cases covered by the only previous comparable research tool, LTEFuzz.
Testing four major LTE core network implementations — both open-source and commercial systems — revealed that all contained CIV vulnerabilities. The results showed:
The research team demonstrated three critical attack scenarios: denial of service by corrupting network information to block reconnection; IMSI exposure by forcing devices to retransmit user identification numbers in plaintext; and location tracking by capturing signals during reconnection attempts.
Unlike traditional attacks requiring fake base stations or signal interference near victims, these attacks work remotely through legitimate base stations, affecting anyone within the same MME (Mobility Management Entity) coverage area as the attacker — potentially spanning entire metropolitan regions.
.png)
Following responsible disclosure protocols, the research team notified affected vendors. Amarisoft deployed patches, and Open5GS integrated the team's fixes into its official repository. Nokia, however, stated it would not issue patches, asserting compliance with 3GPP standards and declining to comment on whether telecommunications companies currently use the affected equipment.
"Uplink security has been relatively neglected due to testing difficulties, implementation diversity, and regulatory constraints," Professor Kim noted. "Context integrity violations can pose serious security risks."
The research team, which included KAIST doctoral students Mincheol Son and Kwangmin Kim as co-first authors, along with Beomseok Oh and Professor CheolJun Park of Kyung Hee University, plans to extend their validation to 5G and private 5G environments. The tools could prove particularly critical for industrial and infrastructure networks, where breaches could have consequences ranging from communication disruption to exposure of sensitive military or corporate data.
The research was supported by the Ministry of Science and ICT through the Institute for Information & Communications Technology Planning & Evaluation, as part of a project developing security technologies for 5G private networks.
With mobile networks forming the backbone of modern digital infrastructure, the discovery underscores the ongoing challenge of securing systems designed in an era when such sophisticated attacks were barely conceivable — and the urgent need for updated standards to address them.
Daejeon, Republic of Korea — November 2025 — KAIST has joined forces with the World Bank to launch a new initiative aimed at advancing youth employment and social protection systems through digital innovation in East Africa. The project, titled “Enhancing Youth Employment Policies through Digital Technologies,” will be implemented in Rwanda, Kenya, and Tanzania over the next three years. The initiative is jointly led by Professor Kyung Ryul Park of the KAIST Graduate S
2025-11-05<(From Left) M.S candidate Soyoung Choi, Ph.D candidate Seong-Hyeon Hwang, Professor Steven Euijong Whang> Just as human eyes tend to focus on pictures before reading accompanying text, multimodal artificial intelligence (AI)—which processes multiple types of sensory data at once—also tends to depend more heavily on certain types of data. KAIST researchers have now developed a new multimodal AI training technology that enables models to recognize both text and images even
2025-10-14<Picture1.(From Left) Prof. Seungbum Hong, Ph.D candidate Youngwoo Choi> Steel alloys used in automobiles and machinery parts are typically manufactured through a melting process at high temperatures. The phenomenon where the components remain unchanged during melting is called “congruent melting.” KAIST researchers have now addressed this process—traditionally only possible through high-temperature experiments—using artificial intelligence (AI). This study dra
2025-07-14- KAIST-KRISS Develop 'On-Device Encryption Optical Transmitter' Based on Eco-Friendly Quantum Dots - New Li-Fi Platform Technology Achieves High Performance with 17.4% Device Efficiency and 29,000 nit Brightness, Simultaneously Improving Transmission Speed and Security - Presents New Methodology for High-Speed and Encrypted Communication Through Single-Device-Based Dual-Channel Optical Modulation < Photo 1. (Front row from left) Seungmin Shin, First Author; Professor Himchan Cho; (Bac
2025-06-24< (From left) PhD student Seoyoon D. Jeong, (bottom) Professor Kwang-Hyun Cho, (top) Dr. Dongkwan Shin, Dr. Jeong-Ryeol Gong > Professor Kwang-Hyun Cho’s research team has recently been highlighted for their work on developing an original technology for cancer reversal treatment that does not kill cancer cells but only changes their characteristics to reverse them to a state similar to normal cells. This time, they have succeeded in revealing for the first time that a molecular
2025-02-05