Tagged: talks

Software Defined Radio Talks from the Friedrichshafen Ham Radio Convention

Several new software defined radio talks have been released on YouTube this week from the big European 2018 Friedrichshafen Ham Radio Convention which just finished this month. The full list of 14 new videos can be found on the Software Defined Radio Academy YouTube channel. Below are two of our favorites:

The OVI40 / UHSDR Project, Developing An Open Standalone SDR

OVI40 is an Open Source standalone homewbrew SDR TRX project (VLF to 2m), developed with the aim of being modular and future-proof. The talk describes the hardware and the UHSDR software including a discussion on the evolution from the "single-system" software used for the well-known mcHF (initially written by Chris, M0NKA and Clint KA7OEI) to the multi-SDR approach in the UHSDR software project.

DF8OE, DB4PLE, DL2FW, DD4WH: The OVI40 / UHSDR Project - Part 1 and 2

András Retzler, HA7ILM: Let's code a simple receiver in C

For using SDR in amateur radio applications, it is easier to use existing receiver software, or create GNU Radio flowgraphs with pre-build blocks. On the contrary, in the do-it-yourself spirit of amateur radio, this talk will guide you through the steps of implementing a simple AM/FM/SSB receiver from scratch, in plan old C, in order to get a deeper understanding of what happens actually under the hood in popular SDR software. The talk builds on the author's learning experience of creating the open source CSDR command line tool, which is used for DSP in the OpneWebRX web based SDR receiver.

András Retzler, HA7ILM: Let's code a simple receiver in C

Defcon 25 SDR and Radio Related Talks

Defcon is a huge yearly conference based on the topics of information security and hacking. Some of the talks relate to wireless and SDR concepts. Recently videos from the last Defcon 25 conference held in July 2017 have been uploaded to YouTube. Below is a selection of some interesting SDR and radio related talks that we have found. If you're interested in exploring the rest of the talks then you can find them on their YouTube page. Most of the radio related talks are in the 'WiFi Village' category.

DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World

The hacking continues on from last year! Three interesting applications will be demonstrated, and their underlying theory and design explained. The audience will be exposed to some novel GNU Radio tips and DSP tricks. INMARSAT Aero will be revisited to show (in Google Earth) spatial information, such as waypoints and flight plans, that are transmitted from airline ground operations to airborne flights. A good chunk of the VHF band is used for airline communications; plane spotters enjoy listening to tower and cockpit communications.

Modern SDRs can now sample the entire band, and as AM modulation is used, it's possible to use a counterintuitive, but simple, demodulator chain (first shown by Kevin Reid's wideband 'un-selective AM' receiver) to listen to the most powerful transmission. This will be demonstrated with a GNU Radio-based implementation. It is also possible to 'spatialise' the audio for the listener using stereo separation, which can convey a transmission's relative position on the spectrum. FMCW RADAR experiments are enhanced to include Doppler processing.

Plotting this new velocity information, due to the Doppler effect, shows whether a target is heading toward or away from you, and often reveals targets not normally seen in range-only information - this demonstrates the true power of full RADAR signal processing. This technique will be applied to the live audio demo, a new live SDR demo, CODAR ocean current tracking, and passive RADAR exploiting powerful ATSC digital television signals (this was used to track aircraft on approach across the Bay Area).

DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World

DEF CON 25 - Matt Knight - Radio Exploitation 101

What do the Dallas tornado siren attack, hacked electric skateboards, and insecure smart door locks have in common? Vulnerable wireless protocols. Exploitation of wireless devices is growing increasingly common, thanks to the proliferation of radio frequency protocols driven by mobile and IoT. While non-Wi-Fi and non-Bluetooth RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think.

Join us as we walk through the fundamentals of radio exploitation. After introducing essential RF concepts and characteristics, we will develop a wireless threat taxonomy by analyzing and classifying different methods of attack. As we introduce each new attack, we will draw parallels to similar wired network exploits, and highlight attack primitives that are unique to RF. To illustrate these concepts, we will show each attack in practice with a series of live demos built on software-defined and hardware radios.

Attendees will come away from this session with an understanding of the mechanics of wireless network exploitation, and an awareness of how they can bridge their IP network exploitation skills to the wireless domain.

DEF CON 25 - Matt Knight - Radio Exploitation 101

Continue reading