Wireless radio protocol reverse engineering

Organization
Cybersecurity
Abstract
Several wireless devices use 'unknown' protocols for device communications (e.g., microphones, IoT devices, remote controls, etc). The task of the student would be to create a manual that would show a reader the steps and tools both hardware and software that can be used to reverse engineer the protocol (ie create a possible methodology).

Various aspects of the topic:
• Create a how to (or steps to) reverse engineering manual
• Find a device with an unknown RF protocol and reverse engineer it
◦ Find the transmission frequency, commands that are sent, any device identifier,
transmission rate, bandwidth, any security etc
• Find a device that uses some form of RF security
◦ Try replay attacks or find other ways to circumvent the security
Graduation Theses defence year
2019-2020
Supervisor
Danielle Morgan
Spoken language (s)
English
Requirements for candidates
Level
Keywords
#acs

Application of contact

 
Name
Danielle Morgan
Phone
E-mail
danielle.morgan@ut.ee
See more
https://acs.cs.ut.ee/