InvestorsHub Logo
Followers 3
Posts 555
Boards Moderated 0
Alias Born 07/31/2003

Re: None

Tuesday, 02/22/2005 10:19:19 PM

Tuesday, February 22, 2005 10:19:19 PM

Post# of 249238
“Establishing a Trusted Computing Base for Software Defined Radio”

http://www.jhuisi.jhu.edu/institute/events/Rhill-Sem02-11-2005.pdf

FRIDAY, FEBRUARY 11, 2005 by
Raquel Hill, Ph.D.
Department of Computer Science and the National Center for Supercomputing Applications
University of Illinois at Urbana-Champaign

ABSTRACT
Software Defined Radio (SDR) is a rapidly evolving technology that is receiving enormous recognition and
generating widespread interest. SDR technology implements radio functionality such as modulation/demodulation,
signal generation, coding and link-layer protocols in software Implementing such functionality in software creates
highly flexible handsets that can be reconfigured to upgrade and adapt equipment to user preferences and regional
regulations. Reconfigurability enables the use of the same equipment in different regions as well as the fast
introduction of new services into mobile networks without requiring the purchase of new terminals. While the
benefits of reconfigurable radios are enormous, the ability to reconfigure radio functionality with software may lead
to serious radio security problems such as unauthorized use of application and network services, unauthorized
modification of software and malfunctioning radio equipment. For example, to illustrate the latter, software can be
introduced into a device that changes its radio frequency (RF) operating characteristics so that it is no longer
functions within the regulated constraints (e.g. frequency, power, modulation). Such changes in RF parameters
may be used to launch denial of service (DoS) attacks on the hardware or entire wireless network.
Current techniques for ensuring that a radio is functioning within authorized parameters are not applicable for SDR
equipment because RF parameters that were once fixed in hardware may now be reconfigured during regular
operation. Users and service providers who once trusted the function of hardware are now required to trust that
software provides the correct functionality , software components have been configured properly, SDR devices are
running the appropriate software and that the hard caused by malicious or buggy software can be managed and
limited.
Dr. Hill will present a framework for establishing a trusted computing base for SDR. This framework uses both
software and behavioral attestations to prove that the SDR device is running the appropriate code and that the code
is functioning properly. The framework uses software attestations to establish trust between an SDR device and a
service provider or between SDR devices that are communicating in an ad-hoc manner. Both software and
behavioral attestations are used to establish a failsafe mechanism for SDR devices that are improperly configured or
running malfunctioning software.
B
IOGRAPHICAL INFORMATION
Raquel Hill earned B.S. and M.S. degrees in Computer Science from the Georgia Institute of Technology in 1991
and 1993 respectively. From 1993 to 1996, she was a Member of Scientific Staff and Nortel Networks in RTP,
North Carolina. In November 2002, she received a Ph.D. in Computer Science from Harvard University. After
receiving the Ph.D., she was a Lecturer in the School of Electrical and Computer Engineering at Georgia Tech from
November 2002 to August 2003. Her research interests include security for wired and wireless infrastructures,
resource allocation protocols, and security requirements and policies.
Free and open to the public.
*Light refreshments will be served.

dude_danny

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.