Turning the homeless into 4G hot-spots
I wanted to quickly mention this really cool initiative. I read about it in the Barcelona newspaper La Vanguardia a few days ago, and now it seems it is reaching the US as well. The idea is to turn the...
View ArticleKeeping hackers out of implanted medical devices
Working in cybersecurity is fascinating and I am very happy with my job. However, when I talk about it, people tend to picture me like an old school computer hacker from the movies, trying to get into...
View ArticleSayonara GSM
AT&T announced yesterday a plan to switch off its 2G network by 2017, which will allow them to reuse a big chunk of spectrum for LTE-based access networks. The US cellular provider stated that just...
View Article20 years since the first SMS ever
Yesterday was the 20th anniversary of the first SMS ever sent. Initially designed as a way to send messages for internal carrier operations, the first “personal” SMS message was sent on Dec. 3rd 1992...
View ArticleFCC’s smartphone security checker
Working in security for wireless and mobility networks I can tell you something that should not be new for most of you: smart-phones are the newest target for malware programmers and hackers. The FCC...
View ArticleThe renaissance of wireless communications…
Recently I had the pleasure to meet Dr. Ted Rappaport and attend to a very interesting talk he gave at NYU Poly. The topic of the talk was his proposed “renaissance of wireless communications“. It was...
View ArticleThe programable world (a.k.a the internet of things)
I recently read a very interesting and detailed article that a colleague at work recommended. The article presents a very thorough overview of the latest revolution in consumer electronics combined...
View ArticleAmbient backscatter
I recently read a very interesting paper that discusses one of the coolest wireless comm-related projects I have seen around for a while. A team of researchers from University of Washington presented...
View ArticleComplimentary tutorial on Advances in Coordinated Multi-Cell Multi-User MIMO...
Check this IEEE ComSoc tutorial on Advances in Coordinated Multi-Cell Multi-User MIMO Systems. Free of charge for a limited time. Advances in Coordinated Multi-Cell Multi-User MIMO Systems
View ArticleDoppler shift and the motivation behind the separation of pilot tones in LTE
I recently was contacted by someone with questions regarding a document I wrote (LTE PHY fundamentals) a few years ago as part of a class at Columbia University and that is hosted on my website. The...
View ArticleRadio jamming mitigation with beam-forming
(Yes, after months? maybe years? I decided to get back to being somehow active on my blog… Most likely I’ll just be posting about security and wireless/mobile interesting stuff) I was reading this...
View ArticleSymmetric key VS PKI in mobile networks
Authentication in mobile networks is executed leveraging a symmetric key system. For each mobile subscriber, there is a secret key that is known only by the mobile device and the network operator....
View ArticleLTE IMSI catchers
I was reading this morning a new paper on the topic of LTE IMSI catchers: https://arxiv.org/pdf/1702.04434.pdf Mjølsnes, Stig F., and Ruxandra F. Olimid. “Easy 4G/LTE IMSI Catchers for...
View ArticleVulnerability and exploit released for remote code execution on smartphones
I was just reading the newest post by Google’s Project Zero. They just released a report on a massive bug that allows remote code execution by exploiting a vulnerability on the 802.11 Broadcom SoC used...
View ArticleMore LTE exploits presented at Blackhat 2017
As I predicted in an article I wrote last year, the increasingly maturity of the open-source implementations of the LTE stack is fueling more and more exciting work in LTE security. I saw two...
View ArticleUsing open-source software and SDRs to test LTE protocol-aware jamming
Ever since back in 2010 I started investigating what would happen if a radio adversary jammed specific LTE signaling channels – as opposed to barrage jamming of the entire LTE signal -, I have been...
View ArticleMobile network security research overview paper
Earlier this week, Google Scholar highlighted for me a new paper on mobile security. I am familiar with the work of a couple of the authors, so I downloaded it and read the whole thing. It turns out it...
View ArticleRunning a USRP B210 from within a Linux VM
I was setting up today my new Windows7 laptop. And, as every single Windows laptop I’ve had before, I set up a Linux VM on it. Although on my other laptop I run a paid VMWare Workstation Pro license,...
View ArticleSniffing BLE with the new Nordic sniffer
Although for deep security analysis and experiments I do all Bluetooth and BLE things using either an Ubertooth One or my USRP (either B210 or B205mini **) and gr-bluetooth, I always start any...
View ArticleAnother example of why it is never a good idea to make a product with high...
I often find myself wondering “what could possibly go wrong?” sarcastically when I read about hotel doors that can be unlocked via BLE with an app and all other sorts of products with BLE connectivity....
View Article
More Pages to Explore .....