Back to Academy

VCA-RE-201 — Reverse Engineering of Burst Radio Signals

Burst radio signals — intermittent, short-duration transmissions typical of IoT protocols, keyless-entry systems, industrial telemetry, covert communications, and many tactical-grade RF systems — present a distinct reverse-engineering challenge. Unlike continuous RF, bursts require triggered capture, synchronization recovery, and per-burst demodulation. Anchored in the instructor’s masters-thesis subject matter.

Duration: 11 weeks
Position: Post-RE-101 (Graduate/Adult track)
Prereq: VCA-RE-101
Target cohort: 2027 if interest supports two RE streams
Register interest — course is in charter stage, not yet developed. Email academy@virtuscybersecurity.com — interest signals drive prioritization of the full curriculum build.

Course Overview

Students completing this course should be able to take an unknown short-burst RF device, capture its emissions with software-defined radio, reverse the physical layer (modulation, framing, FEC), reverse the link layer (addressing, weak-crypto identification, control messages), and either replay, spoof, or extract payload data on a lab-owned authorized target.

Relationship to RE-101

RE-101 (wired hardware RE)RE-201 (burst radio RE)
Capture mediumLogic analyzer on physical tracesSDR with antenna
Protocol discoveryJTAGulator, pin-walkingSpectrum sweeps, OOK/FSK demod
Trust modelSecure boot, signed firmwarePayload crypto, replay resistance
Capstone targetSB6141 cable modemTBD — rolling-code remote, LoRa endpoint, or similar

Many concepts transfer: disciplined capture, hash-verified dumps, modify-replay-verify cycle, protocol-stack layering, anti-rollback considerations.

Tentative Weekly Schedule

WeekTopic (tentative)
1Foundations — RF fundamentals, SDR architecture, legal/regulatory framing
2Antennas, front-end, gain staging, RF measurement
3Modulation schemes I — AM, FM, OOK, 2-FSK, 4-FSK
4Modulation schemes II — PSK, QAM, OFDM, spread-spectrum
5Framing, preambles, sync words, FEC, CRC
6Trigger-based capture, burst detection, timing recovery — midterm practical
7Protocol stack reverse engineering — industrial sensor (case study)
8Protocol stack reverse engineering — consumer remote (case study)
9Replay and spoofing — rolling codes, nonces, challenge-response defenses
10Encryption considerations — AES-128-in-burst, key derivation, weak KDF exploitation
11Ethics, regulatory compliance, coordinated disclosure + capstone overview

Candidate Hardware Kit (Beyond RE-101 Baseline)

ItemRoleApprox Cost
HackRF One + antenna setPrimary SDR transceiver, 1 MHz–6 GHz~$330 + $50
RTL-SDR V3 dongleReceive-only, broad spectrum, low cost~$35
LimeSDR Mini 2.0 (optional)Full-duplex alternative, higher quality~$500
YARDStick OneSub-GHz ISM-band purpose-built~$100
Flipper Zero (optional)Handheld alternative for sub-GHz quick captures~$170
Faraday pouch / mini-chamberControlled captures and interference isolation$50+

Legal and Ethical Framing

  • FCC Part 15 / Part 97 / Part 90 — when transmit is permitted
  • HIPAA/ITAR considerations for medical/defense-adjacent RF RE
  • GDPR / CCPA if RF captures include identifiable data
  • DMCA §1201 and applicable exemptions
  • Wassenaar / 15 CFR 740.17 for SDR software export
  • Coordinated disclosure pathways for industrial IoT vulnerabilities (ICS-CERT)

Interested in VCA-RE-201?

Email academy@virtuscybersecurity.com with your register and why. Sufficient demand moves this course up the build queue.

Email academy@virtuscybersecurity.com