Ever since back in 2010 I started investigating what would happen if a radio adversary jammed specific LTE signaling channels – as opposed to barrage jamming of the entire LTE signal -, I have been very interested in what I referred as to Smart Jamming back in 2013 and again in 2014.

smart_jammingA team in Virginia Tech has been one of the main players in the research field of smart jamming, more commonly known as Protocol-Aware Jamming. Starting with their 2013 paper “Vulnerability of LTE to Hostile Interference“, this team has published a bunch of interesting results in this area, including a paper in which I collaborated with them.

The same team just released a pre-print version of their Milcom paper in which they actually implement smart jamming attacks against downlink signaling channels using off-the-shelf software defined radios and open-source software. It makes me happy every time there is a new excellent work in LTE security which implements and tests exploits, attacks and solutions using open-source software. Over a year ago I wrote a short article on how I anticipated a spike in excellent LTE security research work now that the open-source implementations of LTE have reached a high level of maturity.

In the case of the Virginia Tech paper, they implement their protocol-aware jamming use cases on top of the srsLTE tool, which has always been one of the most complete LTE open-source implementation and might currently be the best one. It is also, to the date, the only tool that provides a full implementation of the UE LTE stack.

Read the paper on smart jamming implementation on SDRs running srsLTE here:

R. Rao, S. Ha, V. Marojevic, J.H. Reed, “LTE PHY Layer Vulnerability Analysis and Testing Using Open-Source SDR Tools”, IEEE MILCOM 2017, 23-25 Oct. 2017.

Happy Saturday!

ps. Dembele better be good. Let’s try to get Coutinho now. Though I feel terrible we are just adding more fuel to the fire of the over-inflated and out of control European soccer transfer market…