This isn't a relevant concern for general purpose / experimental
hardware like bladerf, hackrf, or usrp hanging off a PC. They're
intended to be user programmable. If someone roots your box, they can
replace your FPGA image, usb, or microcontroller firmware ... but to
what end? The platform is
On 09/09/2015 08:24 PM, Chris Kuethe wrote:
This isn't a relevant concern for general purpose / experimental
hardware like bladerf, hackrf, or usrp hanging off a PC. They're
intended to be user programmable. If someone roots your box, they can
replace your FPGA image, usb, or microcontroller
Since most SDRs out there have fully reconfigurable-by-the-end-user FPGA
and firmware images, I don't think the notion of "compromise"
has much meaning in this context, further because access to the devices
is freely available to ordinary user-level processes, they can ask the
radio to do
Hello,
Recently I read a paper on cognitive radio security (Secure
reconfiguration of software-defined radio). It highlights that the
operating system of cognitive radio node may be compromised as the
malware can exploit software vulnerabilities. I am wondering if the FPGA
and firmware are part