skip to main content
10.1145/3139937.3139951acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster

Universal Radio Hacker: A Suite for Wireless Protocol Analysis

Published: 03 November 2017 Publication History

Abstract

With an increasing number of Internet of Things (IoT) devices also the number of proprietary wireless protocols raised. Meanwhile manufacturers save resources wherever they can, having size and energy constraints in mind. Consequently, there are security flaws that hackers demonstrate by silently breaking in a house or stealing a car. Revealing IoT security flaws requires expertise in Digital Signal Processing (DSP), coding theory, protocol design and cryptography. We contribute a software that addresses research groups and security analysts without strong DSP and coding theoretic background: Universal Radio Hacker (URH). This software is a complete suite to investigate wireless protocols including (1) Software Defined Radio interface for sending and receiving, (2) DSP abstraction, (3) easy customizable encodings, (4) logic analysis assistance and (5) fuzzing. Using our software researchers can focus on breaking the cryptography or analyzing protocol logic without worrying about hardware configuration or DSP specifics.

References

[1]
Audacity Team. 2016. Audacity. (2016). http://www.audacityteam.org.
[2]
Eric Blossom. 2004. GNU radio: tools for exploring the radio frequency spectrum. Linux journal 2004 (2004), 4. http://delivery.acm.org/10.1145/1000000/993251/7319.html?ip=161.139.220.52
[3]
Ettus. 2016. USRP N210. https://www.ettus.com/product/details/UN210-KIT. (2016).
[4]
Flavio D. Garcia, Gerhard De Koning Gans, Ruben Muijrers, Peter Van Rossum, Roel Verdult, Ronny Wichers Schreur, and Bart Jacobs. 2008. Dismantling MIFARE classic. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 5283 LNCS (2008), 97--114. https://doi.org/10.1007/978-3-540-88313-5-7
[5]
Michael Ossmann. 2016. HackRF One - an open source SDR platform. https://greatscottgadgets.com/hackrf/. (2016).
[6]
Johannes Pohl and Andreas Noack. 2017. Universal Radio Hacker. (2017). https://github.com/jopohl/urh.
[7]
Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, and Christof Paar. 2013. Fuming acid and cryptanalysis: Handy tools for overcoming a digital locking and access control system. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8042 LNCS, PART 1 (2013), 147--164. https://doi.org/10.1007/978-3-642-40041-4_9

Cited By

View all
  • (2024)End to End Model to Reduce the Inference, Jamming, and to Increase the Trust from the Compromised Secondary Nodes in Cognitive Radio Networks2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)10.1109/IITCEE59897.2024.10467580(1-10)Online publication date: 24-Jan-2024
  • (2021)Protocol reverse-Engineering Methods and Tools: A SurveyComputer Communications10.1016/j.comcom.2021.11.009Online publication date: Nov-2021
  • (2020)Neuromodulatory hacking: a review of the technology and security risks of spinal cord stimulationActa Neurochirurgica10.1007/s00701-020-04592-3Online publication date: 3-Oct-2020
  • Show More Cited By

Index Terms

  1. Universal Radio Hacker: A Suite for Wireless Protocol Analysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy
    November 2017
    90 pages
    ISBN:9781450353960
    DOI:10.1145/3139937
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 November 2017

    Check for updates

    Author Tags

    1. internet of things
    2. reverse engineering
    3. sdr
    4. security
    5. wireless

    Qualifiers

    • Poster

    Conference

    CCS '17
    Sponsor:

    Acceptance Rates

    IoTS&P '17 Paper Acceptance Rate 12 of 30 submissions, 40%;
    Overall Acceptance Rate 12 of 30 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)End to End Model to Reduce the Inference, Jamming, and to Increase the Trust from the Compromised Secondary Nodes in Cognitive Radio Networks2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)10.1109/IITCEE59897.2024.10467580(1-10)Online publication date: 24-Jan-2024
    • (2021)Protocol reverse-Engineering Methods and Tools: A SurveyComputer Communications10.1016/j.comcom.2021.11.009Online publication date: Nov-2021
    • (2020)Neuromodulatory hacking: a review of the technology and security risks of spinal cord stimulationActa Neurochirurgica10.1007/s00701-020-04592-3Online publication date: 3-Oct-2020
    • (2018)Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)10.1109/Cybermatics_2018.2018.00318(1921-1927)Online publication date: Jul-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media