Camp 2011 - Version 1.4
        Chaos Communication Camp 2011
        
        Project Flow Control
      
| Referenten | |
|---|---|
| 
        
           | 
      Marius Ciepluch | 
| Programm | |
|---|---|
| Tag | Day 1 - 2011-08-10 | 
| Raum | Baikonur | 
| Beginn | 18:00 | 
| Dauer | 01:00 | 
| Info | |
| ID | 4453 | 
| Veranstaltungstyp | Vortrag | 
| Track | Science | 
| Sprache der Veranstaltung | englisch | 
| Feedback | |
|---|---|
| 
Haben Sie diese Veranstaltung besucht?         Feedback abgeben  | 
    
Stuff you don't see - every day
GNU Radio Internals - how to use the Framework
  Software Defined Radio defines a new approach to analyze signals with software. With the flexibility of software SDR literally opened a new spectrum of hacking.
However the internals of Digital Signal Processing, especially from the perspective of informatics and computer science, are hard to explore. The lecture delivers a case-study on how to analyze 802.15.4 (alias Zigbee, as an easy protocol) with USRPs (modular popular hardware for SDR) on a real-time protocol (for send time verification, sniffing etc.). Furthermore internals on DSP will be explained - as simple as possible. The intent is to also give a non-academic start point and to seed motivation to explore more advanced projects (like osmocom*). So practically the lecture explains what a Software Spectrum Analyzer or a Software Oscilloscope does: from a Hacker's perspective. It gives insight into a USRP(2) internals and goes into programming C++ and Python with GNU Radio.
All demo-analysis will remain within the ISM band. - No GSM/Tetra will be captured. It's about the SDR technology and its use-cases - for a clear and constructive adaption by the Hacker's community to assist interesting making projects (of home-automation devices using 802.15.4 e.g.). In many media articles - especially from last Chaos Congress - a misunderstanding can arise to reduce SDR to (GSM) attack scenarios while this is not the only/general use-case. The lecture however clearly aims to assist any intended understanding how the osmocom* implementations work - for example. Or other projects on cgran[1].
[1] https://www.cgran.org/