RF communication receiver vulnerability assessment
First Claim
1. A method for analyzing a wireless communications device, the method comprising:
- automatically assessing vulnerability of the wireless communications device, including its susceptibility to jamming, by applying one or more interfering signals to the wireless communications device and observing a response from the wireless communications device, wherein automatically assessing vulnerability includes accessing the wireless communications device by both an antenna interface of the device and a probe interface connected to one or more test points within the device; and
automatically identifying one or more vulnerabilities that can be exploited in defeating malicious behavior involving use of the wireless communications device, wherein the malicious behavior involves using the wireless communications device for remote detonation of explosives;
wherein applying the one or more interfering signals includes;
applying a trigger signal associated with the malicious behavior and a jamming signal to the wireless communications device; and
adjusting the jamming signal until the trigger signal is rendered ineffective in acting as a trigger signal; and
wherein identifying the one or more vulnerabilities includes;
reporting parameters of the jamming signal that result in defeating the malicious behavior.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are disclosed for analyzing a wireless communications device. The techniques include, for instance, assessing vulnerability of the device, including its susceptibility to jamming, by applying one or more interfering signals to the device and observing the device'"'"'s response. The techniques further include identifying one or more vulnerabilities that can be exploited in defeating malicious behavior involving use of the device (e.g., such as using the device for remote detonation of explosives). Applying one or more interfering signals to the device may include, for instance, applying a trigger signal and a jamming signal to the device, and adjusting the jamming signal until the trigger signal is rendered ineffective in acting as a trigger signal. Identifying one or more vulnerabilities that can be exploited in defeating malicious behavior may include, for instance, reporting parameters of the one or more interfering signals that result in defeating the malicious behavior.
54 Citations
20 Claims
-
1. A method for analyzing a wireless communications device, the method comprising:
-
automatically assessing vulnerability of the wireless communications device, including its susceptibility to jamming, by applying one or more interfering signals to the wireless communications device and observing a response from the wireless communications device, wherein automatically assessing vulnerability includes accessing the wireless communications device by both an antenna interface of the device and a probe interface connected to one or more test points within the device; and automatically identifying one or more vulnerabilities that can be exploited in defeating malicious behavior involving use of the wireless communications device, wherein the malicious behavior involves using the wireless communications device for remote detonation of explosives; wherein applying the one or more interfering signals includes; applying a trigger signal associated with the malicious behavior and a jamming signal to the wireless communications device; and adjusting the jamming signal until the trigger signal is rendered ineffective in acting as a trigger signal; and wherein identifying the one or more vulnerabilities includes; reporting parameters of the jamming signal that result in defeating the malicious behavior. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable memory having instructions encoded thereon that when executed by a processor, cause a process for analyzing a wireless communications device to be carried out on a test system, the process comprising:
-
automatically assessing vulnerability of the wireless communications device, including its susceptibility to jamming, by applying one or more interfering signals to the wireless communications device and observing a response from the wireless communications device, wherein automatically assessing vulnerability includes accessing the wireless communications device by both an antenna interface of the device and a probe interface connected to one or more test points within the device; and automatically identifying one or more vulnerabilities that can be exploited in defeating malicious behavior involving use of the wireless communications device, wherein the malicious behavior involves using the wireless communications device for remote detonation of explosives; wherein applying the one or more interfering signals includes; applying a trigger signal associated with the malicious behavior and a jamming signal to the wireless communications device; and adjusting the jamming signal until the trigger signal is rendered ineffective in acting as a trigger signal; and wherein identifying the one or more vulnerabilities includes; reporting parameters of the jamming signal that result in defeating the malicious behavior. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system for analyzing a wireless communications device, comprising:
-
a vulnerability assessment module for automatically assessing vulnerability of the wireless communications device, including its susceptibility to jamming, by applying one or more interfering signals to the wireless communications device and observing a response from the wireless communications device, wherein automatically assessing vulnerability includes accessing the wireless communications device by both an antenna interface of the device and a probe interface connected to one or more test points within the device; and a reporting module for identifying one or more vulnerabilities that can be exploited in defeating malicious behavior involving use of the wireless communications device, wherein the malicious behavior involves using the wireless communications device for remote detonation of explosives; wherein in applying the one or more interfering signals, the vulnerability assessment module is configured to apply a trigger signal associated with the malicious behavior and a jamming signal to the wireless communications device, and to adjust the jamming signal until the trigger signal is rendered ineffective in acting as a trigger signal; and wherein in identifying the one or more vulnerabilities, the reporting module is configured to report parameters of the jamming signal that result in defeating the malicious behavior. - View Dependent Claims (19, 20)
-
Specification