Update on Overleaf.

This commit is contained in:
nb72soza Bittner
2025-07-09 23:16:53 +00:00
committed by node
parent ed6ef06177
commit bb194c3c47

View File

@@ -75,9 +75,7 @@ This thesis aims to close the gap in independent, systematic analysis of commerc
% demonstrate the framworks ability in security research:
% through apdu level differnetial testing, we discover and evaluate bug in the profile provisioning process of one manufacturer -> suggests potential security risk such as certificate validation bypass -> analyze and evaluate potential impact
This thesis presents a novel framework for the differential testing of \gls{esim} and eSIM-on-SIM implementations. The framework includes a custom \gls{lpa}, an \gls{apdu} mutation engine, and structured fuzzing tools. It enables tracing, mutation, and replaying of provisioning flows, and is exposed both through a command-line interface and as a Python library for scripting and automation.
By employing property-based testing and structural input mutation, the framework generates valid but edge-case-rich test cases to evaluate high-level commands. This allows it to uncover subtle logic bugs beyond low-level malformed input handling.
To the best of our knowledge, this thesis introduces the first differential testing framework for \gls{esim} and, in particular, eSIM-on-SIM implementations that leverages fuzzing techniques.
We use the framework to analyze several commercial eSIM-on-SIM implementations. Our analysis reveals significant implementation differences, including a critical vulnerability in one vendor's certificate handling logic. Specifically, we uncover a bug that suggests a certificate validation bypass during the profile provisioning process. We also reverse-engineer the firmware update functionality of the estk.me card.