{"title":"Universal Radio Hacker: A Suite for Wireless Protocol Analysis","authors":"Johannes Pohl, A. Noack","doi":"10.1145/3139937.3139951","DOIUrl":null,"url":null,"abstract":"With an increasing number of Internet of Things (IoT) devices also the number of proprietary wireless protocols raised. Meanwhile manufacturers save resources wherever they can, having size and energy constraints in mind. Consequently, there are security flaws that hackers demonstrate by silently breaking in a house or stealing a car. Revealing IoT security flaws requires expertise in Digital Signal Processing (DSP), coding theory, protocol design and cryptography. We contribute a software that addresses research groups and security analysts without strong DSP and coding theoretic background: Universal Radio Hacker (URH). This software is a complete suite to investigate wireless protocols including (1) Software Defined Radio interface for sending and receiving, (2) DSP abstraction, (3) easy customizable encodings, (4) logic analysis assistance and (5) fuzzing. Using our software researchers can focus on breaking the cryptography or analyzing protocol logic without worrying about hardware configuration or DSP specifics.","PeriodicalId":129651,"journal":{"name":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3139937.3139951","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
With an increasing number of Internet of Things (IoT) devices also the number of proprietary wireless protocols raised. Meanwhile manufacturers save resources wherever they can, having size and energy constraints in mind. Consequently, there are security flaws that hackers demonstrate by silently breaking in a house or stealing a car. Revealing IoT security flaws requires expertise in Digital Signal Processing (DSP), coding theory, protocol design and cryptography. We contribute a software that addresses research groups and security analysts without strong DSP and coding theoretic background: Universal Radio Hacker (URH). This software is a complete suite to investigate wireless protocols including (1) Software Defined Radio interface for sending and receiving, (2) DSP abstraction, (3) easy customizable encodings, (4) logic analysis assistance and (5) fuzzing. Using our software researchers can focus on breaking the cryptography or analyzing protocol logic without worrying about hardware configuration or DSP specifics.