Master Blackbox UE-to-Node Test Plan
Master Blackbox UE-to-Node Test Plan
BLUF
This plan is built on the view that mobility security has to be assessed as an operational system, not just as a handset problem. If the research starts and stops at the UE, it misses where trust actually shifts: the SIM identity boundary, the physical RF environment, the difference between small-cell and macro-tower behavior, the transport path, and the core or datacenter-hosted functions that ultimately deliver service.
From an OT perspective, the mobility network should be examined the same way other critical infrastructure is examined: as a chain of field assets, control functions, dependencies, and failure points. That is why this approach stays blackbox and evidence-driven from UE outward, so physical-layer behavior, mobility events, core behavior, and operational visibility can all be investigated as parts of one end-to-end security system.
Purpose
This plan defines a blackbox mobility assessment path from the user equipment (UE) outward to each relevant node or trust zone:
- UE / SIM / carrier-app layer
- Physical layer, RF conditions, and serving / neighbor cell behavior
- RAN, site, and mobility behavior across small-cell and macro coverage
- Transport / backhaul / interconnect dependencies
- Core control plane and hosted core / datacenter dependencies
- Core user plane / data path
- Detection and operational visibility
The goal is to produce a repeatable, evidence-driven test plan that matches the current lab reality:
- Current equipment: laptop, Pixel 9a
- Incoming equipment: LibreSDR
- Approach: blackbox-first
- Guardrail: passive-only on live networks; any active RF work stays inside a shielded, authorized lab with your own SIMs and devices
Blackbox operating model
This plan treats the target as a system observed from the outside. Tests focus on:
- externally observable behavior
- protocol outcomes and state changes
- privacy exposure
- fallback and resilience behavior
- logging and evidence generation
This plan does not assume source access, administrative access, or undocumented internal implementation details unless a case is explicitly marked as lab-only.
Current equipment assessment
| Equipment | Status | Use in this plan | Notes |
|---|---|---|---|
| Laptop | Available | Core lab, captures, adb, Wireshark, notes | Linux is strongly preferred for Open5GS, srsRAN, UHD |
| Pixel 9a | Available | Primary UE for blackbox testing | Strong for subscriber-side and passive observations; not ideal for deep Qualcomm-style modem diagnostics |
| LibreSDR | Arriving soon | Controlled RF and lab RAN validation | Do not transmit until RF isolation is in place |
| USB 3.0 cable / hub | Required | LibreSDR stability | Needed for reliable SDR operation |
| Wireshark / tshark | Required | Evidence collection | Capture and decode control/user-plane behavior |
| NetMonster / CellMapper / Network Cell Info | Required | Passive field observations | Useful now with the Pixel 9a |
| Faraday bag / shield box / RF enclosure | Mandatory for active SDR tests | Legal and safety control | Required before any active over-the-air lab work |
| Lab SIM / eSIM profiles | Required for active lab work | Controlled subscriber identity | Avoids third-party subscriber testing |
| Attenuators / spare antennas / cables | Recommended | Safe repeatable RF lab work | Reduce over-the-air spill risk |
| Optional Qualcomm device | Optional | Deeper modem evidence | Helpful later, not required for this master plan |
Test waves
| Wave | When | Focus | Main equipment |
|---|---|---|---|
| W1 | Start now | UE, carrier apps, SIM/eSIM, passive cell observations, app-layer data path | Laptop, Pixel 9a |
| W2 | Start now | Open5GS/UERANSIM baseline for 4G/5G core behavior without RF dependency | Laptop |
| W3 | After LibreSDR + RF isolation | Controlled attach, mobility, fallback, and user-plane validation in isolated lab | Laptop, Pixel 9a, LibreSDR, Faraday setup |
| W4 | After stable lab baseline | Robustness, comparative mode testing, and telemetry validation | Full lab stack |
Trust-zone coverage
| Zone | Covered by | Primary test style |
|---|---|---|
| Subscriber edge | W1 | Device, SIM, carrier-app, privacy, proxying |
| Physical / RF layer | W1 passive, W3 active lab | Small-cell vs macro behavior, cell inventory, spectrum, fallback, attach conditions |
| RAN / site operations | W1 passive, W3 active lab | Mobility, reselection, handover, tower-to-tower and node-to-node behavior |
| Transport / backhaul | W2, W4 | Path dependency mapping, latency/jitter impact, interconnect trust boundaries |
| Core control plane | W2, W3 | Registration, authentication, identity, signaling outcomes, hosted control dependencies |
| Core user plane | W2, W3 | PDU/bearer path, DNS, session continuity |
| Detection / monitoring | W2, W4 | Correlation between UE symptoms and lab evidence |
Architecture reference
These smaller views split the same intent into easier chunks: field-side exposure, transport and core dependency, and the OT-style assessment lens across the whole mobility system.
1. Subscriber edge to field infrastructure
flowchart LR
UE["UE / app layer"]
SIM["SIM / eSIM"]
SC["Small cell"]
MC["Large cell / macro tower"]
RF["RF conditions\ncoverage · interference · neighbors"]
RAN["DU / CU / baseband"]
MOB["Mobility events\nhandover · reselection"]
UE --- SIM
UE -->|"air interface"| SC
UE -->|"air interface"| MC
SC --- RF
MC --- RF
SC --> RAN
MC --> RAN
RAN <--> MOB2. Transport, core, and datacenter path
flowchart LR
RAN["RAN / site operations"]
FH["Fronthaul / midhaul / backhaul"]
IP["Aggregation / routing / interconnect"]
AMF["AMF / MME\nmobility + control"]
AUTH["UDM / AUSF / HSS\nidentity + auth"]
SMF["SMF / session control"]
UPF["UPF / user plane"]
OBS["Logs / telemetry / detection"]
DN["Internet / IMS / enterprise services"]
RAN --> FH --> IP --> AMF
AMF <--> AUTH
AMF <--> SMF
SMF <--> UPF
UPF --> DN
OBS --- AMF
OBS --- SMF
OBS --- UPF3. OT-style research lens
flowchart LR
EDGE["Subscriber edge"]
PHY["Physical / RF layer"]
SITE["Tower / site operations"]
TRANS["Transport / backhaul"]
CORE["Core / datacenter"]
DET["Detection / monitoring"]
EDGE --> PHY --> SITE --> TRANS --> CORE
EDGE -. user-visible symptoms .-> DET
PHY -. field evidence .-> DET
SITE -. operations evidence .-> DET
CORE -. logs / telemetry .-> DETBlackbox angle: the UE is still the starting point, but the assessment intent is broader: each arrow is a trust boundary, each field node or hosted function is a potential test target, and the security question is how behavior changes from the physical layer through the tower/site layer into the core and datacenter. The mobility-specific interfaces become most relevant when wave 3 and MBX-14/15 are reached.
4. Fiber-backed terrestrial carrier path
This view treats fiber as the primary terrestrial backbone behind towers, aggregation sites, and datacenters. From an assessment standpoint, the key question is how mobility behavior depends on the transport path behind the radio layer.
flowchart LR
UE["UE"]
TOWER["Small cell / macro tower"]
SITE["Site router / baseband"]
FIBER["Fiber backbone\nmetro · regional · long-haul"]
POP["Aggregation POP / CO"]
DC["Core / datacenter"]
SVC["Internet / IMS / enterprise services"]
UE --> TOWER --> SITE --> FIBER --> POP --> DC --> SVC5. Satellite-assisted coverage and backhaul path
This view treats satellite as a gap-filler or resilience layer where fiber or dense terrestrial buildout is impractical. The research angle is how service quality, dependency, and failure behavior change when part of the path leaves the terrestrial network.
flowchart LR
UE["UE"]
CELL["Remote cell / deployable site"]
GROUND["Ground gateway / teleport"]
SAT["Satellite link"]
CORE["Carrier core / datacenter"]
SVC["Internet / mission services"]
UE --> CELL
CELL -->|"satellite backhaul"| SAT
SAT --> GROUND --> CORE --> SVC6. Hybrid carrier buildout lens
This hybrid view matches the practical carrier model: fiber carries most scale and low-latency transport, while satellite extends reach, continuity, or emergency coverage. A carrier such as AT&T can be studied through this lens by looking at fiber expansion, wireless site density, public-safety coverage, and how alternate backhaul paths affect operations.
flowchart LR
subgraph ACCESS["Access layer"]
UE["UE population"]
SC["Small cells"]
MC["Macro towers"]
end
subgraph TERRESTRIAL["Primary terrestrial path"]
FIBER["Fiber transport"]
POP["Aggregation / regional POP"]
end
subgraph EXTENSION["Coverage extension"]
DEP["Deployable / remote site"]
SAT["Satellite path"]
end
subgraph CORE["Hosted services"]
DC["Core / datacenter"]
OBS["Detection / operations"]
end
UE --> SC
UE --> MC
SC --> FIBER
MC --> FIBER
FIBER --> POP --> DC
DEP --> SAT --> DC
OBS --- DCEvidence standard
Every executed test case should leave behind at least one of these:
- screenshot
- packet capture
- adb or terminal output
- phone-side observation record
- config excerpt from the lab
- pass/fail entry
- short note on expected versus observed behavior
Use this evidence record for each test:
| Field | Value to record |
|---|---|
| Test ID | Unique case ID |
| Date / run | Execution instance |
| Device / SIM | Which UE and subscriber profile were used |
| Access level | Subscriber-side, passive observer, or lab-admin |
| Environment | Live passive, lab baseline, shielded RF lab |
| Expected behavior | What should happen |
| Observed behavior | What actually happened |
| Evidence | PCAP, screenshot, logs, notes |
| Result | Pass / Needs review / Fail |
Master test case matrix
| ID | Path | Goal | Wave | Equipment | Result target |
|---|---|---|---|---|---|
| MBX-01 | UE local baseline | Document OS, patch level, baseband, SIM, carrier profile, root state | W1 | Laptop, Pixel 9a | Stable baseline exists |
| MBX-02 | UE -> carrier apps | Identify exposed app behaviors, risky permissions, and weak traffic handling | W1 | Laptop, Pixel 9a | App exposure map completed |
| MBX-03 | UE -> SIM/eSIM | Inventory visible subscriber identity and service behavior | W1 | Pixel 9a | SIM/eSIM posture recorded |
| MBX-04 | UE -> serving cell | Build passive serving-cell inventory | W1 | Pixel 9a | Repeatable PCI/TAC/band/PLMN map |
| MBX-05 | UE -> neighbor cells | Map neighbor relations and mobility transitions | W1 | Pixel 9a | Neighbor and handover map exists |
| MBX-06 | UE -> privacy behavior | Baseline identity-exposure and related message behavior by type and frequency | W1/W2 | Pixel 9a, Laptop | Privacy baseline established |
| MBX-07 | UE -> fallback path | Observe LTE/5G fallback and degradation behavior | W1 | Pixel 9a | Fallback conditions documented |
| MBX-08 | UE -> app data path | Validate proxyability, TLS posture, and user-visible impact | W1 | Laptop, Pixel 9a | Weak trust paths identified or ruled out |
| MBX-09 | UE -> 5G core | Validate clean 5G SA registration baseline in lab | W2 | Laptop | Known-good 5G registration trace |
| MBX-10 | UE -> 4G core | Validate clean 4G attach baseline in lab | W2 | Laptop | Known-good 4G attach trace |
| MBX-11 | UE -> cross-mode behavior | Compare LTE, 5G SA, and mixed-mode outcomes | W2 | Laptop | Mode comparison matrix complete |
| MBX-12 | UE -> controlled cell | Validate attach to isolated lab cell | W3 | Laptop, Pixel 9a, LibreSDR, Faraday setup | Repeatable controlled attach |
| MBX-13 | UE -> controlled fallback | Validate fallback behavior inside isolated lab | W3 | Full RF lab | Bounded fallback behavior |
| MBX-14 | UE -> mobility | Validate controlled handover / reselection behavior | W3 | Full RF lab | Mobility behavior measurable |
| MBX-15 | UE -> auth/ciphering | Validate expected identity, auth, and security mode outcomes | W3 | Full RF lab | Expected protections observed |
| MBX-16 | UE -> user plane | Validate session setup, DNS, and end-to-end data path | W2/W3 | Laptop, Pixel 9a, lab stack | Stable service path verified |
| MBX-17 | UE -> detection chain | Correlate UE symptoms with core and capture evidence | W2/W4 | Laptop, Wireshark, lab stack | Event traceability proven |
| MBX-18 | UE -> robustness | Validate safe handling of abnormal or failed procedures in lab | W4 | Full lab stack | No unsafe or silent failure behavior |
Detailed test cases
MBX-01 - UE local baseline
Objective: establish the reference state of the Pixel 9a before protocol or mobility testing.
Blackbox angle: treat the handset as the only visible subscriber-side endpoint and capture what a normal user or authorized assessor can observe without altering network behavior.
Preconditions:
- Pixel 9a is stable and updated
- USB debugging is enabled if adb collection is used
Steps:
- Record Android version, security patch level, baseband version, SIM/eSIM profile, carrier settings version, and connection mode behavior.
- Record installed carrier apps, telephony-related apps, and visible network settings.
- Capture screenshots and adb output for baseline fields.
Evidence:
- screenshots of network and SIM settings
- adb output for version and baseband details
- app inventory note
Pass criteria: a complete baseline exists and can be referenced in every later test.
MBX-02 - UE to carrier apps
Objective: identify externally visible carrier-app risk at the application layer.
Blackbox angle: test the app as a user-facing client without assuming source access.
Preconditions:
- your own device and accounts only
- a safe interception method for allowed test apps
- see MBX-02 & MBX-08 App Interception Toolkit for Frida + Burp setup
Steps:
- Inventory carrier apps and exported components:
adb shell dumpsys package com.att.personalcloud | grep -i "component\|permission" - Launch interception with Frida/Burp:
~/intercept.sh com.att.personalcloud - Observe network calls during login, activation, billing, support, and device-management workflows.
- Note in Burp proxy console:
- Certificate pinning status (unpinned vs. pinned)
- Token handling and credential exposure
- Telemetry volume and destinations
- Weak security headers (missing HSTS, etc.)
- User-facing security errors or validation failures
Evidence:
- Burp export (HTTP history XML or CSV)
- Frida interception log (injection status, unpinning results)
- Screenshots of app workflows and UI
- Device logcat capture during workflows
- Exported-component inventory (manifest analysis)
- Telemetry endpoint mapping
Pass criteria:
- Carrier app behavior is fully inventoried and traffic is captured
- No unexpected identifiers, weak trust paths, or overly broad app privileges are observed
- Pinning status is confirmed (system cert injection successful via Frida + adb reverse tunnel)
- Evidence is traceable to specific workflows
Reference: MBX-02 & MBX-08 App Interception Toolkit
MBX-03 - UE to SIM/eSIM posture
Objective: document what subscriber identity and service behavior are visible from the UE side.
Blackbox angle: inspect only subscriber-visible and device-visible identity surfaces.
Steps:
- Record visible ICCID, operator name, PLMN, TAC-related observations, and SIM service behavior exposed to the device.
- Note eSIM profile handling, profile switching behavior, and any OTA-related user-visible prompts or controls.
- Record which identifiers are easy to retrieve locally and under what permission level.
Evidence: screenshots, device notes, adb output if used.
Pass criteria: identity and service exposure is understood and documented for later privacy cases.
MBX-04 - UE to serving-cell inventory
Objective: build a passive inventory of serving-cell behavior in the real environment.
Blackbox angle: passive-only observation using handset measurement tools.
Steps:
- Use NetMonster, CellMapper, or Network Cell Info across several normal locations.
- Record PLMN, PCI, TAC, EARFCN / NR-ARFCN, bands, RSRP, and whether the UE is LTE, NSA, or SA.
- Repeat at multiple times of day when possible.
Evidence: screenshots and a simple location-based cell log.
Pass criteria: serving-cell behavior is repeatable enough to distinguish normal operation from later anomalies.
MBX-05 - UE to neighbor-cell and mobility mapping
Objective: map neighbor cells and natural mobility transitions.
Blackbox angle: rely only on externally visible handover and reselection behavior.
Steps:
- Observe neighbor-cell listings while stationary and while moving.
- Record PCI changes, TAC changes, signal degradation, and any mode changes between LTE and NR.
- Build a short map of common routes and expected transitions.
Evidence: screenshots, route notes, time-stamped cell changes.
Pass criteria: expected mobility transitions are understood and can be replayed in future tests.
MBX-06 - UE to privacy and identity-exposure baseline
Objective: baseline identity-related exposure behavior by type and frequency, not just one message class.
Blackbox angle: observe privacy behavior through the handset and lab traces without assuming internal network implementation.
Steps:
- Record whether the UE is on LTE, NSA, or SA during observations.
- In the lab, compare clean registration traces across 4G and 5G where available.
- Note when permanent versus temporary identity handling appears to change, especially during fallback or high-mobility conditions.
Evidence: handset notes, lab trace references, expected-versus-observed table.
Pass criteria: privacy behavior is characterized by scenario and not reduced to a single heuristic.
MBX-07 - UE to fallback path
Objective: observe how the UE behaves when preferred modes are unavailable or degraded.
Blackbox angle: passive observation of natural fallback only in live environments.
Steps:
- Move through environments where signal quality naturally changes.
- Record transitions between 5G and LTE, timing, user impact, and whether service continuity is preserved.
- Note whether fallback correlates with changes in visible identity or cell-state behavior.
Evidence: timestamps, screenshots, application continuity notes.
Pass criteria: fallback behavior is bounded, understandable, and repeatable.
MBX-08 - UE to app data path
Objective: validate application-layer data-path trust from the handset outward.
Blackbox angle: test your own applications and traffic flows as a client.
Preconditions:
- see MBX-02 & MBX-08 App Interception Toolkit for Frida + Burp setup
- Burp Suite configured and listening on 127.0.0.1:8080
- ADB reverse tunnel established:
adb reverse tcp:8080 tcp:8080
Steps:
-
Use
intercept.shto test approved apps with Frida/Burp:~/intercept.sh com.gmail.android ~/intercept.sh com.uber -
For each app, collect evidence:
- Capture traffic in Burp HTTP history
- Document certificate validation behavior (pinned vs. non-pinned)
- Identify sensitive data in headers/payloads (IMEIs, tokens, location)
- Note any weak TLS versions or unencrypted HTTP usage
- Record device identifiers leaked in traffic
-
Separate apps by pinning status:
- Non-pinned: traffic flows through Frida + Burp without intervention
- Pinned: requires Frida unpinning scripts (verify in Frida console output)
- Strongly pinned: may refuse connection even with Frida (e.g., Google apps)
-
Test telemetry and background network behavior:
- Monitor traffic during app idle time
- Capture DNS queries for telemetry destinations
- Note whether telemetry can be intercepted/blocked
Evidence:
- Burp HTTP history export (XML/CSV) for each app
- Frida interception logs showing unpinning success/failure
- Screenshots of traffic analysis in Burp
- Summary table of certificate validation per app
- Sensitive data exposure map (what identifiers leak, where)
- Device logcat capturing any trust errors or validation failures
Pass criteria:
- Weak TLS validation, excessive identifier leakage, or unsafe trust behavior is either identified or ruled out for all tested apps
- Pinning status is determined for each endpoint
- Sensitive data exposure is quantified and documented
- Telemetry behavior is observable and analyzable
- All evidence is correlated to specific workflows
Reference: MBX-02 & MBX-08 App Interception Toolkit
Lab stack architecture (W2 reference)
All W2 tests (MBX-09 through MBX-11) run against this software-only lab stack. No RF hardware required.
graph TD
subgraph LAB_UE["Lab UE"]
UERANSIM["UERANSIM UE sim\nor Pixel 9a via LibreSDR (W3)"]
end
subgraph LAB_RAN["Lab RAN"]
GNB["UERANSIM gNB\nor srsRAN + LibreSDR (W3)"]
end
subgraph LAB_CORE["Open5GS 5GC"]
AMF2["AMF"]
SMF2["SMF"]
UPF2["UPF"]
AUSF["AUSF"]
UDM["UDM / UDR"]
AMF2 <-->|N11| SMF2
AMF2 <-->|N12| AUSF
AUSF <-->|N13| UDM
SMF2 <-->|N4| UPF2
end
CAPTURE["Wireshark / tshark\nevidence capture"]
DN2["Local DN\nlab data network"]
UERANSIM -->|"Uu sim or RF (W3)"| GNB
GNB -->|N2| AMF2
GNB -->|N3| UPF2
UPF2 -->|N6| DN2
GNB -.->|pcap| CAPTURE
AMF2 -.->|logs| CAPTUREW3 upgrade path: replace UERANSIM gNB with srsRAN + LibreSDR once RF isolation is in place. The rest of the stack stays the same.
MBX-09 - UE to 5G core baseline
Objective: build a known-good 5G SA lab baseline before RF-dependent testing.
Blackbox angle: treat the Open5GS/UERANSIM environment as the observable network under test and validate registration outcomes.
Preconditions:
- Open5GS lab is functional
- UERANSIM can be launched
Steps:
- Start the 5G core and confirm network functions are healthy.
- Execute a clean registration and PDU session setup.
- Capture signaling and user-plane evidence.
Evidence: pcap, function logs, registration screenshots or command output.
Pass criteria: clean 5G registration exists as the reference baseline.
MBX-10 - UE to 4G core baseline
Objective: build a known-good 4G attach baseline for comparison.
Blackbox angle: validate externally visible attach and bearer outcomes without assuming internal implementation details.
Steps:
- Start the EPC stack and a compatible 4G simulation path.
- Execute a clean attach.
- Record attach, authentication, and default-bearer evidence.
Evidence: pcap, attach logs, IP assignment notes.
Pass criteria: a clean 4G baseline exists for comparison against 5G and fallback behavior.
MBX-11 - UE to cross-mode comparison
Objective: compare observable outcomes across LTE, 5G SA, and mixed-mode operation.
Steps:
- Compare registration timing, session setup timing, user-visible service continuity, and identity/privacy behavior across modes.
- Build a short comparison matrix for attach success, data service, fallback, and logging visibility.
Evidence: comparison table and supporting captures.
Pass criteria: differences between modes are documented clearly enough to guide later RF testing.
MBX-12 - UE to controlled lab cell
Objective: validate attach to a controlled isolated cell once the LibreSDR arrives.
Blackbox angle: observe the UE from outside the network while controlling only the lab environment.
Preconditions:
- LibreSDR operational
- RF isolation in place
- lab SIMs only
Steps:
- Stand up the isolated lab cell and confirm RF containment.
- Attach the Pixel 9a using the approved lab profile.
- Record attach outcome, mode, timing, and user-visible behavior.
Evidence: pcap, phone screenshots, SDR/lab notes.
Pass criteria: attach is repeatable and confined to the lab environment.
MBX-13 - UE to controlled fallback
Objective: validate fallback behavior inside the shielded lab.
Blackbox angle: compare what the UE exposes when preferred access changes under controlled conditions.
Steps:
- Establish the preferred mode in the lab.
- Alter lab availability to trigger bounded fallback.
- Record service continuity, timing, and any privacy-relevant changes.
Evidence: before/after screenshots, pcap, timing notes.
Pass criteria: fallback is predictable and consistent with expected policy.
MBX-14 - UE to mobility behavior
Objective: validate handover, reselection, or tracking-area behavior in a controlled environment.
Blackbox angle: focus on externally visible UE behavior and signaling outcomes.
Steps:
- Create a controlled mobility scenario between cells or tracking areas.
- Record handover success, interruption time, and whether the UE retains service.
- Compare observed behavior to the baseline route mapping from W1.
Evidence: pcap, phone-side timestamps, route or scenario notes.
Pass criteria: mobility behavior is measurable, bounded, and attributable to the lab condition under test.
MBX-15 - UE to identity, authentication, and ciphering behavior
Objective: validate whether expected protections appear during controlled registration and service setup.
Blackbox angle: evaluate observable security outcomes rather than internal code paths.
Steps:
- Record the registration and authentication sequence in the lab.
- Compare identity handling and security-mode outcomes across LTE and 5G where supported.
- Note any unexpected downgrade, null, or weakly protected behavior.
Evidence: signaling traces and an expected-versus-observed matrix.
Pass criteria: expected protections are consistently observed and deviations are clearly visible.
MBX-16 - UE to user-plane and data-network path
Objective: validate end-to-end service from registration through usable data.
Blackbox angle: confirm what a user experiences and what packet evidence proves from the outside.
Steps:
- Establish a session after successful registration.
- Test DNS, general data flow, and application traffic.
- Record latency, stability, and whether the session survives expected state changes.
Evidence: packet capture, ping or application notes, DNS observations.
Pass criteria: the user-plane path is stable and traceable end to end.
MBX-17 - UE to detection and telemetry chain
Objective: prove that a user-visible issue can be traced across the lab evidence chain.
Blackbox angle: start from the UE symptom and work outward to the observable network evidence.
Steps:
- Trigger or observe a benign, controlled event such as registration failure, fallback, or service interruption in the lab.
- Correlate the handset symptom with captures and logs.
- Confirm whether the same event is visible at more than one layer.
Evidence: phone-side screenshot, pcap, correlated log fragment.
Pass criteria: the event can be reconstructed from UE symptom to network evidence without blind spots.
MBX-18 - UE to robustness and failure handling
Objective: validate that abnormal or failed procedures are handled safely in the lab.
Blackbox angle: assess externally visible failure behavior and whether the system degrades cleanly.
Steps:
- Execute approved negative-path or failed-procedure scenarios in the lab baseline.
- Record whether the UE receives clear rejection or safe failure behavior.
- Confirm that failure does not become silent corruption or unexplained instability.
Evidence: rejection traces, error logs, handset behavior notes.
Pass criteria: abnormal conditions are rejected safely, logged, and do not create unexplained service state.
Execution order
- Run MBX-01 through MBX-08 immediately with the Pixel 9a and laptop.
- Run MBX-09 through MBX-11 next to create a known-good 4G/5G core baseline.
- Wait for LibreSDR + Faraday setup before running MBX-12 through MBX-15.
- Finish with MBX-16 through MBX-18 once the lab is stable enough for cross-layer evidence.
Priority order if time is limited
- MBX-01 UE baseline
- MBX-04 serving-cell inventory
- MBX-06 privacy baseline
- MBX-07 fallback behavior
- MBX-09 5G core baseline
- MBX-10 4G core baseline
- MBX-12 controlled attach
- MBX-17 detection chain
Immediate readiness summary
Ready now
- MBX-01 through MBX-10
Ready after LibreSDR arrives and RF isolation is set up
- MBX-11 through MBX-18
Recommended additions
- Faraday enclosure or shield box
- lab SIM/eSIM profiles
- USB 3.0 hub and known-good SDR cables
- Linux host for SDR and core tooling
- optional Qualcomm test phone for deeper modem diagnostics
Outcome
This master plan gives you a single blackbox test path from UE to each major node or trust zone, aligned to your actual hardware and staged so you can begin now with the laptop and Pixel 9a, then extend safely into controlled RF lab validation once the LibreSDR arrives.