Hi, we‘re happy to present AdaptOver this Thursday in Sydney, Australia at the MOBICOM conference.
We use overshadowing, in particular on the uplink, to create a new set of attacks that turn a legitimate base station into an attacker’s asset.
With AdaptOver, an attacker doesn’t use a fake base station. This marks a new attack paradigm that has to be taken into account when developing and evaluating countermeasures or new protocols.
Hi, we‘re happy to present AdaptOver this Thursday in Sydney, Australia at the MOBICOM conference.
We use overshadowing, in particular on the uplink, to create a new set of attacks that turn a legitimate base station into an attacker’s asset.
With AdaptOver, an attacker doesn’t use a fake base station. This marks a new attack paradigm that has to be taken into account when developing and evaluating countermeasures or new protocols.
Happy to answer any questions!