技術摘要(英)
The module discovers the vulnerabilities of 5G architecture, protocol, virtualization and open source software. In order to evaluate the resilience of 5G system with 3GPP 5G security standard, the module uses attack runbook, which could generate the malicious behaviors and abnormal flow, applying to 5G system.