Savoldi-SIM and USIM File System - A Forensics Perspective
Savoldi-SIM and USIM File System - A Forensics Perspective
Savoldi-SIM and USIM File System - A Forensics Perspective
a Forensiscs Perspective
Outline
• Cellular forensic tools
• SIMBrush
▫ Features and notable results
• SIM/USIM filesystem
▫ The standard part
▫ The non-standard part
• Data hiding in the non-standard part of the
filesystem
• Examples
3
Introduction
• There are relatively few tools for digital evidence
extraction from SIM/USIM cards
▫ Card4Labs – NFI (only for law enforcement)
▫ Cell Seizure – Paraben (commercial)
▫ .XRI – Micro Systemation (commercial)
▫ TULP2G – NFI (open source)
• SIMBrush tool aimed at extracting observable
portion of filesystem of a SIM/USIM card
▫ Open source
▫ Standard and non-standard files are revealed
4
SIMBrush
• SIMBrush can be placed in the imaging technologies
technique of the preservation phase (Digital Forensics
Framework)
▫ It is used to create a master copy of data present in
SIM/USIM cards
• GSM system:
▫ Infrastructure: Database + Signalling + Network level
▫ End-user: User level
Mobile Station = Mobile Equipment + Subscriber Identity Module
Mobile Equipment = Terminal Equipment + Terminal Adaptor
• UMTS system:
▫ User Equipment = Mobile Equipment + User Service Identity
Module (USIM)
• There is small difference between GSM and UMTS SIM card
▫ for example MMS file
6
SIM/USIM Cards
• SIM cards are proper subset of Smart Cards (SC). These
cards ensure the safety of the data stored within
▫ Confidentiality: encryption of voice and data
▫ Authentication: unauthorized user can’t be access the system
▫ Non Repudiation: impossibility to implement frauds (e.g.
change of the credit)
▫ Integrity: no possibility to tamper data at higher access level
SIM/USIM Filesystem
• Organization:
▫ It has an N-ary tree structure
▫ MF (Master File): is the root of the filesystem
▫ DF (Dedicated File): similar to standard directory
Header + EFs
▫ EF (Elementary File): objects containing useful
data
Header + Body
ADN, SMS, IMSI, ICCID …
8
SIM/USIM Filesystem
• Types of elementary files present in a SIM card:
▫ Transparent: sequence of bytes
▫ Linear-fixed: sequence of fixed length records
▫ Cyclic: circular buffer with fixed length records
Extractable Data
• Information about the subscriber
▫ IMSI (International Mobile Subscriber Identity)
▫ LP (Preferred Languages)
• Information about acquaintances
▫ ADN (list of phone numbers)
• Information about SMS traffic
• Information about subscriber
▫ LOCI (Location Information Area)
• Information about calls
▫ LND (Last Number Dialled)
• Information about the provider
▫ SPN (Provider Name), PLMNsel (Used Mobile Network)
• Information about the system
▫ ICCID (Unique ID of the card)
11
Filesystem Extraction
• No command exists to browse entire filesystem
• Brushing ID space issuing a SELECT command, with any
file ID, to a SIM card:
▫ Addressable ID file space: “0000” to “FFFF”
▫ Warning from SIM when ID doesn’t exist
▫ Header of file is returned when file exists
• Selection rules of a selectable file.
▫ 1. MF can be selected no matter what the current directory is
▫ 2. Current directory
▫ 3. Parent of current directory
▫ 4. Any DF which is an immediate child of the parent of the
current directory
▫ 5. Any file which is an immediate child of the current directory
12
Selection Rules
MF
Core Algorithm
• Definition of file and directory sets associated with preceding
costraints:
▫ MF_SET
▫ CURRENT_SET
▫ PARENT_SET
▫ DF_SIBLINGS_SET
▫ SONS_SET
• SELECTABLE_SET = MF_SET U
CURRENT_SET U
PARENT_SET U
DF_SIBLINGS_SET U
SONS_SET
14
Core Algorithm
• SON_SET is unknown and the following relation can be
used
• SONS_SET = SELECTABLE_SET \
(MF_SET U
CURRENT_SET U
PARENT_SET U
DF_BRO_SET)
0000
EF (ICCID)
2FE2
DF (TELECOM)
7F10
DF (GSM)
7F20
DF (DCS1800)
7F21
7F4F
The Hidden Part of the
0011
Filesystem
EF (ADN) EF (FDN)
6F16
6F3A 6F3B
0100
EF (SMS) EF (CCP)
•Non-standard part: an issue to deal
with
6F1C
6F3C 6F3D
2F30
EF (EXT1) EF (EXT2) command
•This demonstrate the possibility to use
6F4A 6F4B
2F31
Lesson Learnt
• Every non-standard EF with CHV1/CHV2 access
privileges on the Update command is writable
▫ Concrete possibility to hide plenty information
▫ The SIM/USIM can become a really Covert Channel
• A standard 128 Kbyte SIM card can have around 17
Kbyte of hidden writable space
▫ This part of the filesystem is not foundable by using
current forensics tools
▫ GWSS (Global Writable Slack Space)
20
Experimental Results
• WNSP: Writable Non-standard Part
• NSP: Non-standard Part of the filesystem
• TES: Total Engaged Space
21
Covert Channel
• The SIM/USIM can act as a covert channel
Selection of a
Extraction of the
Message to hidden
File Allocation
within a SIM
Table (FAT)
(7 bit coding)
Conclusions
• All the analyzied SIM/USIM forensic tools have
a missing part
▫ They are unable to extract the non-standard part
• Concrete possibility to use a SIM/USIM as a
Covert Channel
• Application of some steganalysis concepts in
order to extract the hidden message