Avi Rubin All your devices can be hacked

Translator: Joseph Geni
Reviewer: Morton Bast

I’m a computer science professor,

and my area of expertise is

computer and information security.

When I was in graduate school,

I had the opportunity to overhear my grandmother

describing to one of her fellow senior citizens

what I did for a living.

Apparently, I was in charge of making sure that

no one stole the computers from the university. (Laughter)

And, you know, that’s a perfectly reasonable thing

for her to think, because I told her I was working

in computer security,

and it was interesting to get her perspective.

But that’s not the most ridiculous thing I’ve ever heard

anyone say about my work.

The most ridiculous thing I ever heard is,

I was at a dinner party, and a woman heard

that I work in computer security,

and she asked me if – she said her computer had been

infected by a virus, and she was very concerned that she

might get sick from it, that she could get this virus. (Laughter)

And I’m not a doctor, but I reassured her

that it was very, very unlikely that this would happen,

but if she felt more comfortable, she could be free to use

latex gloves when she was on the computer,

and there would be no harm whatsoever in that.

I’m going to get back to this notion of being able to get

a virus from your computer, in a serious way.

What I’m going to talk to you about today

are some hacks, some real world cyberattacks that people

in my community, the academic research community,

have performed, which I don’t think

most people know about,

and I think they’re very interesting and scary,

and this talk is kind of a greatest hits

of the academic security community’s hacks.

None of the work is my work. It’s all work

that my colleagues have done, and I actually asked them

for their slides and incorporated them into this talk.

So the first one I’m going to talk about

are implanted medical devices.

Now medical devices have come a long way technologically.

You can see in 1926 the first pacemaker was invented.

1960, the first internal pacemaker was implanted,

hopefully a little smaller than that one that you see there,

and the technology has continued to move forward.

In 2006, we hit an important milestone from the perspective

of computer security.

And why do I say that?

Because that’s when implanted devices inside of people

started to have networking capabilities.

One thing that brings us close to home is we look

at Dick Cheney’s device, he had a device that

pumped blood from an aorta to another part of the heart,

and as you can see at the bottom there,

it was controlled by a computer controller,

and if you ever thought that software liability

was very important, get one of these inside of you.

Now what a research team did was they got their hands

on what’s called an ICD.

This is a defibrillator, and this is a device

that goes into a person to control their heart rhythm,

and these have saved many lives.

Well, in order to not have to open up the person

every time you want to reprogram their device

or do some diagnostics on it, they made the thing be able

to communicate wirelessly, and what this research team did

is they reverse engineered the wireless protocol,

and they built the device you see pictured here,

with a little antenna, that could talk the protocol

to the device, and thus control it.

In order to make their experience real – they were unable

to find any volunteers, and so they went

and they got some ground beef and some bacon

and they wrapped it all up to about the size

of a human being’s area where the device would go,

and they stuck the device inside it

to perform their experiment somewhat realistically.

They launched many, many successful attacks.

One that I’ll highlight here is changing the patient’s name.

I don’t know why you would want to do that,

but I sure wouldn’t want that done to me.

And they were able to change therapies,

including disabling the device – and this is with a real,

commercial, off-the-shelf device –

simply by performing reverse engineering and sending

wireless signals to it.

There was a piece on NPR that some of these ICDs

could actually have their performance disrupted

simply by holding a pair of headphones onto them.

Now, wireless and the Internet

can improve health care greatly.

There’s several examples up on the screen

of situations where doctors are looking to implant devices

inside of people, and all of these devices now,

it’s standard that they communicate wirelessly,

and I think this is great,

but without a full understanding of trustworthy computing,

and without understanding what attackers can do

and the security risks from the beginning,

there’s a lot of danger in this.

Okay, let me shift gears and show you another target.

I’m going to show you a few different targets like this,

and that’s my talk. So we’ll look at automobiles.

This is a car, and it has a lot of components,

a lot of electronics in it today.

In fact, it’s got many, many different computers inside of it,

more Pentiums than my lab did when I was in college,

and they’re connected by a wired network.

There’s also a wireless network in the car,

which can be reached from many different ways.

So there’s Bluetooth, there’s the FM and XM radio,

there’s actually wi-fi, there’s sensors in the wheels

that wirelessly communicate the tire pressure

to a controller on board.

The modern car is a sophisticated multi-computer device.

And what happens if somebody wanted to attack this?

Well, that’s what the researchers

that I’m going to talk about today did.

They basically stuck an attacker on the wired network

and on the wireless network.

Now, they have two areas they can attack.

One is short-range wireless, where you can actually

communicate with the device from nearby,

either through Bluetooth or wi-fi,

and the other is long-range, where you can communicate

with the car through the cellular network,

or through one of the radio stations.

Think about it. When a car receives a radio signal,

it’s processed by software.

That software has to receive and decode the radio signal,

and then figure out what to do with it,

even if it’s just music that it needs to play on the radio,

and that software that does that decoding,

if it has any bugs in it, could create a vulnerability

for somebody to hack the car.

The way that the researchers did this work is,

they read the software in the computer chips

that were in the car, and then they used sophisticated

reverse engineering tools

to figure out what that software did,

and then they found vulnerabilities in that software,

and then they built exploits to exploit those.

They actually carried out their attack in real life.

They bought two cars, and I guess

they have better budgets than I do.

The first threat model was to see what someone could do

if an attacker actually got access

to the internal network on the car.

Okay, so think of that as, someone gets to go to your car,

they get to mess around with it, and then they leave,

and now, what kind of trouble are you in?

The other threat model is that they contact you

in real time over one of the wireless networks

like the cellular, or something like that,

never having actually gotten physical access to your car.

This is what their setup looks like for the first model,

where you get to have access to the car.

They put a laptop, and they connected to the diagnostic unit

on the in-car network, and they did all kinds of silly things,

like here’s a picture of the speedometer

showing 140 miles an hour when the car’s in park.

Once you have control of the car’s computers,

you can do anything.

Now you might say, “Okay, that’s silly.”

Well, what if you make the car always say

it’s going 20 miles an hour slower than it’s actually going?

You might produce a lot of speeding tickets.

Then they went out to an abandoned airstrip with two cars,

the target victim car and the chase car,

and they launched a bunch of other attacks.

One of the things they were able to do from the chase car

is apply the brakes on the other car,

simply by hacking the computer.

They were able to disable the brakes.

They also were able to install malware that wouldn’t kick in

and wouldn’t trigger until the car was doing something like

going over 20 miles an hour, or something like that.

The results are astonishing, and when they gave this talk,

even though they gave this talk at a conference

to a bunch of computer security researchers,

everybody was gasping.

They were able to take over a bunch of critical computers

inside the car: the brakes computer, the lighting computer,

the engine, the dash, the radio, etc.,

and they were able to perform these on real commercial

cars that they purchased using the radio network.

They were able to compromise every single one of the

pieces of software that controlled every single one

of the wireless capabilities of the car.

All of these were implemented successfully.

How would you steal a car in this model?

Well, you compromise the car by a buffer overflow

of vulnerability in the software, something like that.

You use the GPS in the car to locate it.

You remotely unlock the doors through the computer

that controls that, start the engine, bypass anti-theft,

and you’ve got yourself a car.

Surveillance was really interesting.

The authors of the study have a video where they show

themselves taking over a car and then turning on

the microphone in the car, and listening in on the car

while tracking it via GPS on a map,

and so that’s something that the drivers of the car

would never know was happening.

Am I scaring you yet?

I’ve got a few more of these interesting ones.

These are ones where I went to a conference,

and my mind was just blown, and I said,

“I have to share this with other people.”

This was Fabian Monrose’s lab

at the University of North Carolina, and what they did was

something intuitive once you see it,

but kind of surprising.

They videotaped people on a bus,

and then they post-processed the video.

What you see here in number one is a

reflection in somebody’s glasses of the smartphone

that they’re typing in.

They wrote software to stabilize –

even though they were on a bus

and maybe someone’s holding their phone at an angle –

to stabilize the phone, process it, and

you may know on your smartphone, when you type

a password, the keys pop out a little bit, and they were able

to use that to reconstruct what the person was typing,

and had a language model for detecting typing.

What was interesting is, by videotaping on a bus,

they were able to produce exactly what people

on their smartphones were typing,

and then they had a surprising result, which is that

their software had not only done it for their target,

but other people who accidentally happened

to be in the picture, they were able to produce

what those people had been typing, and that was kind of

an accidental artifact of what their software was doing.

I’ll show you two more. One is P25 radios.

P25 radios are used by law enforcement

and all kinds of government agencies

and people in combat to communicate,

and there’s an encryption option on these phones.

This is what the phone looks like. It’s not really a phone.

It’s more of a two-way radio.

Motorola makes the most widely used one, and you can see

that they’re used by Secret Service, they’re used in combat,

it’s a very, very common standard in the U.S. and elsewhere.

So one question the researchers asked themselves is,

could you block this thing, right?

Could you run a denial-of-service,

because these are first responders?

So, would a terrorist organization want to black out the

ability of police and fire to communicate at an emergency?

They found that there’s this GirlTech device used for texting

that happens to operate at the same exact frequency

as the P25, and they built what they called

My First Jammer. (Laughter)

If you look closely at this device,

it’s got a switch for encryption or cleartext.

Let me advance the slide, and now I’ll go back.

You see the difference?

This is plain text. This is encrypted.

There’s one little dot that shows up on the screen,

and one little tiny turn of the switch.

And so the researchers asked themselves, “I wonder how

many times very secure, important, sensitive conversations

are happening on these two-way radios where they forget

to encrypt and they don’t notice that they didn’t encrypt?”

So they bought a scanner. These are perfectly legal

and they run at the frequency of the P25,

and what they did is they hopped around frequencies

and they wrote software to listen in.

If they found encrypted communication, they stayed

on that channel and they wrote down, that’s a channel

that these people communicate in,

these law enforcement agencies,

and they went to 20 metropolitan areas and listened in

on conversations that were happening at those frequencies.

They found that in every metropolitan area,

they would capture over 20 minutes a day

of cleartext communication.

And what kind of things were people talking about?

Well, they found the names and information

about confidential informants. They found information

that was being recorded in wiretaps,

a bunch of crimes that were being discussed,

sensitive information.

It was mostly law enforcement and criminal.

They went and reported this to the law enforcement

agencies, after anonymizing it,

and the vulnerability here is simply the user interface

wasn’t good enough. If you’re talking

about something really secure and sensitive, it should

be really clear to you that this conversation is encrypted.

That one’s pretty easy to fix.

The last one I thought was really, really cool,

and I just had to show it to you, it’s probably not something

that you’re going to lose sleep over

like the cars or the defibrillators,

but it’s stealing keystrokes.

Now, we’ve all looked at smartphones upside down.

Every security expert wants to hack a smartphone,

and we tend to look at the USB port, the GPS for tracking,

the camera, the microphone, but no one up till this point

had looked at the accelerometer.

The accelerometer is the thing that determines

the vertical orientation of the smartphone.

And so they had a simple setup.

They put a smartphone next to a keyboard,

and they had people type, and then their goal was

to use the vibrations that were created by typing

to measure the change in the accelerometer reading

to determine what the person had been typing.

Now, when they tried this on an iPhone 3GS,

this is a graph of the perturbations that were created

by the typing, and you can see that it’s very difficult

to tell when somebody was typing or what they were typing,

but the iPhone 4 greatly improved the accelerometer,

and so the same measurement

produced this graph.

Now that gave you a lot of information while someone

was typing, and what they did then is used advanced

artificial intelligence techniques called machine learning

to have a training phase,

and so they got most likely grad students

to type in a whole lot of things, and to learn,

to have the system use the machine learning tools that

were available to learn what it is that the people were typing

and to match that up

with the measurements in the accelerometer.

And then there’s the attack phase, where you get

somebody to type something in, you don’t know what it was,

but you use your model that you created

in the training phase to figure out what they were typing.

They had pretty good success. This is an article from the USA Today.

They typed in, “The Illinois Supreme Court has ruled

that Rahm Emanuel is eligible to run for Mayor of Chicago”

— see, I tied it in to the last talk —

“and ordered him to stay on the ballot.”

Now, the system is interesting, because it produced

“Illinois Supreme” and then it wasn’t sure.

The model produced a bunch of options,

and this is the beauty of some of the A.I. techniques,

is that computers are good at some things,

humans are good at other things,

take the best of both and let the humans solve this one.

Don’t waste computer cycles.

A human’s not going to think it’s the Supreme might.

It’s the Supreme Court, right?

And so, together we’re able to reproduce typing

simply by measuring the accelerometer.

Why does this matter? Well, in the Android platform,

for example, the developers have a manifest

where every device on there, the microphone, etc.,

has to register if you’re going to use it

so that hackers can’t take over it,

but nobody controls the accelerometer.

So what’s the point? You can leave your iPhone next to

someone’s keyboard, and just leave the room,

and then later recover what they did,

even without using the microphone.

If someone is able to put malware on your iPhone,

they could then maybe get the typing that you do

whenever you put your iPhone next to your keyboard.

There’s several other notable attacks that unfortunately

I don’t have time to go into, but the one that I wanted

to point out was a group from the University of Michigan

which was able to take voting machines,

the Sequoia AVC Edge DREs that

were going to be used in New Jersey in the election

that were left in a hallway, and put Pac-Man on it.

So they ran the Pac-Man game.

What does this all mean?

Well, I think that society tends to adopt technology

really quickly. I love the next coolest gadget.

But it’s very important, and these researchers are showing,

that the developers of these things

need to take security into account from the very beginning,

and need to realize that they may have a threat model,

but the attackers may not be nice enough

to limit themselves to that threat model,

and so you need to think outside of the box.

What we can do is be aware

that devices can be compromised,

and anything that has software in it

is going to be vulnerable. It’s going to have bugs.

Thank you very much. (Applause)

译者:Joseph Geni
审稿人:Morton Bast

我是一名计算机科学教授

,我的专业领域是

计算机和信息安全。

当我在读研究生的时候,

我有机会无意中听到我的祖母

向她的一位老年人

描述我的谋生之道。

显然,我负责确保

没有人从大学偷走计算机。 (笑声)

而且,你知道,这对她来说是完全合理的

想法,因为我告诉她我在

从事计算机安全工作,

了解她的观点很有趣。

但这并不是我听过

任何人谈论我的工作时最荒谬的事情。

我听过的最可笑的事情是,

我在一个晚宴上,一位女士

听说我是从事计算机安全工作的

,她问我是不是——她说她的计算机

被病毒感染了,她很担心 她

可能会因此而生病,她可能会感染这种病毒。 (笑声)

我不是医生,但我向她

保证,这种情况发生的可能性非常非常小,

但如果她感觉更舒服,她可以在使用

电脑时自由地戴上乳胶手套,

并且 这样做不会有任何害处。

我将严肃地回到能够

从您的计算机中获取病毒的概念。

今天我要和你们讨论的

是一些黑客,一些真实世界的网络攻击

,我的社区,学术研究社区的人

已经进行了,我认为

大多数人都不知道

,我认为他们是 非常有趣和可怕

,这个演讲

是学术安全社区黑客攻击的最大热门。

这些作品都不是我的作品。 这些都是

我的同事完成的工作,实际上我向

他们索要幻灯片并将其纳入本次演讲。

所以我要谈的第一个

是植入式医疗设备。

现在,医疗设备在技术上取得了长足的进步。

您可以看到 1926 年发明了第一个起搏器。

1960 年,第一个内部起搏器被植入,

希望比你看到的那个小一点

,技术继续向前发展。

2006 年,我们在计算机安全方面达到了一个重要的里程碑

我为什么这么说?

因为那是植入人体内的设备

开始具有网络功能的时候。

让我们离家近的一件事是我们

看看迪克切尼的装置,他有一个装置可以

将血液从主动脉泵送到心脏的另一部分

,正如你在底部看到的那样,

它由计算机控制器控制

,如果您曾经认为软件

责任非常重要,请把其中之一放在您的心里。

现在,一个研究团队所做的是他们得到

了所谓的 ICD。

这是一个除颤器,这是一个

进入人体内以控制他们的心律的装置

,这些装置挽救了许多生命。

好吧,为了不必

每次你想重新编程他们的设备

或对其进行一些诊断时都打开这个人,他们让这个东西

能够无线通信,这个研究团队所做的

是他们对无线协议进行了逆向工程

,他们制造了您在此处看到的设备,

带有一个小天线,可以将协议

与设备通信,从而控制它。

为了让他们的体验变得真实——他们

找不到任何志愿者,所以他们去了

,他们得到了一些碎牛肉和一些培根,

然后他们把它们包裹起来,大约

相当于一个人的区域大小。

,他们把设备塞进里面,

有点逼真地进行他们的实验。

他们发动了很多很多成功的攻击。

我将在这里强调的一项是更改患者的姓名。

我不知道你为什么要那样做,

但我肯定不想那样对我。

他们能够改变治疗方法,

包括禁用设备——这是使用真实的、

商业的、现成的设备——

只需执行逆向工程并向其发送

无线信号即可。

NPR 上有一篇文章指出,这些 ICD 中的一些

实际上

只需将一副耳机戴在上面就可以破坏它们的性能。

现在,无线和互联网

可以极大地改善医疗保健。

屏幕上有几个例子

,医生希望将设备植入

人体内,所有这些设备现在都是

无线通信的标准

,我认为这很好,

但没有完全了解可信赖的计算,

在不了解攻击者可以做什么

以及从一开始就存在安全风险的情况下,

这会带来很多危险。

好吧,让我换档,给你看另一个目标。

我将向您展示几个不同的目标

,这就是我的演讲。 所以我们来看看汽车。

这是一辆汽车,它有很多组件,

今天有很多电子设备。

事实上,它里面有很多很多不同的计算机

,奔腾的数量比我大学时的实验室还多,

而且它们通过有线网络连接。

车内还有一个无线网络

,可以通过多种方式访问。

所以有蓝牙,有 FM 和 XM 收音机,

实际上有 wi-fi,车轮上有传感器,

可以将轮胎压力无线传送

到车载控制器。

现代汽车是一种复杂的多计算机设备。

如果有人想攻击这个会发生什么?

嗯,这

就是我今天要讨论的研究人员所做的。

他们基本上将攻击者困在有线网络

和无线网络上。

现在,他们有两个可以攻击的区域。

一种是短距离无线,您

可以通过蓝牙或 wi-fi 与附近的设备进行实际通信

,另一种是远程无线,您可以

通过蜂窝网络

或通过其中一种与汽车进行通信 广播电台。

想想看。 当汽车接收到无线电信号时,

它会由软件进行处理。

该软件必须接收和解码无线电信号,

然后弄清楚如何处理它,

即使它只是需要在收音机上播放的音乐,

以及进行解码的软件,

如果它有任何错误的话 ,可能会

为某人入侵汽车创造一个漏洞。

研究人员完成这项工作的方式是,

他们读取车内计算机芯片中的软件

,然后使用复杂的

逆向工程工具

来找出该软件的功能,

然后他们发现该软件中的漏洞,

然后 然后他们建立了漏洞利用这些漏洞。

他们实际上在现实生活中进行了攻击。

他们买了两辆车,我猜

他们的预算比我好。

第一个威胁模型是看看

如果攻击者真的可以

访问汽车的内部网络,有人会做什么。

好吧,想象一下,有人会去你的车,

他们会弄乱它,然后他们就离开了

,现在,你遇到了什么样的麻烦?

另一种威胁模型是,他们

通过其中一个无线网络(

如蜂窝网络或类似网络)实时与您联系,但

从未实际接触过您的汽车。

这是他们的第一个模型的设置

,您可以在其中访问汽车。

他们放了一台笔记本电脑,然后连接到

车载网络上的诊断单元,他们做了各种愚蠢的事情,

比如下面这张车速表

显示的时速 140 英里的照片,当汽车停在公园里时。

一旦你控制了汽车的电脑,

你就可以做任何事情。

现在你可能会说,“好吧,这很愚蠢。”

好吧,如果你让汽车总是

说它的行驶速度比实际行驶速度慢 20 英里,那该怎么办?

你可能会开出很多超速罚单。

然后他们带着两辆汽车

,目标受害者汽车和追逐汽车,前往一个废弃的简易机场,

然后发动了一系列其他攻击。

他们能够从追逐车上做的一件事

就是在另一辆车上刹车,

只需入侵计算机即可。

他们能够禁用刹车。

他们还能够安装恶意软件,这些恶意软件不会启动

,也不会触发,直到汽车以

超过 20 英里/小时的速度运行,或类似的事情。

结果是惊人的,当他们发表这个演讲时,

即使他们在一次会议上

向一群计算机安全研究人员发表了这个演讲,

每个人都在喘着粗气。

他们能够接管车内的一堆关键计算机

:刹车计算机、照明计算机

、发动机、仪表板、收音机等,

并且他们能够在他们购买的真实商用车上执行这些

操作 无线电网络。

他们能够破坏

控制汽车每

一项无线功能的每一个软件。

所有这些都成功实施。

你会怎么偷这个模型的车?

好吧,您通过

软件中漏洞的缓冲区溢出来破坏汽车,类似的事情。

您使用车内的 GPS 来定位它。

你通过控制它的计算机远程解锁车门

,启动引擎,绕过防盗系统,

然后你就拥有了一辆汽车。

监视真的很有趣。

该研究的作者有一个视频,他们展示了

自己接管了一辆汽车,然后打开了车内

的麦克风,并在

通过地图上的 GPS 跟踪汽车的同时收听汽车,

这就是汽车的司机 汽车

永远不会知道发生了什么。

我吓到你了吗?

我还有几个这样有趣的。

这些是我去参加会议的地方

,我的想法被震撼了,我说,

“我必须与其他人分享这个。”

这是北卡罗来纳大学 Fabian Monrose 的实验室

,他们的所作所为

一旦你看到它就很直观,

但有点令人惊讶。

他们对公共汽车上的人进行录像,

然后对视频进行后处理。

你在这里看到的第一个是他们正在输入

的智能手机的眼镜中的反射

他们编写了软件来稳定——

即使他们在公共汽车上

并且可能有人以一个角度拿着他们的手机——

来稳定 手机,处理它,

你可能知道在你的智能手机上,当你

输入密码时,按键会弹出一点,他们

能够使用它来重建这个人正在输入的内容,

并且有一个用于检测的语言模型 打字。

有趣的是,通过在公共汽车上录像,

他们能够准确地制作出人们

在智能手机上输入的内容,

然后他们得到了一个令人惊讶的结果,那就是

他们的软件不仅为他们的目标完成了这项工作,

而且还为其他人完成了这项工作。 那些不小心

出现在图片中的人,他们能够产生

那些人一直在打字的东西,这有点

像是他们的软件正在做的事情的一种意外产物。

我再给你看两个。 一种是 P25 收音机。

P25 无线电被执法部门

、各种政府机构

和战斗人员用来进行通信,

这些手机上都有加密选项。

这就是手机的外观。 它不是真正的电话。

它更像是一个双向收音机。

摩托罗拉制造了使用最广泛的一种,你可以

看到它们被特勤局使用,它们被用于战斗,

这是美国和其他地方非常非常普遍的标准。

所以研究人员问自己的一个问题是,

你能阻止这个东西,对吗?

您能否运行拒绝服务,

因为这些是第一响应者?

那么,恐怖组织会想要

在紧急情况下屏蔽警察和消防员的通信能力吗?

他们发现有一个用于发短信的 GirlTech 设备

恰好与 P25 以相同的频率运行

,于是他们制造了他们称之为

My First Jammer 的设备。 (笑声)

如果你仔细观察这个设备,

它有一个加密或明文开关。

让我推进幻灯片,现在我要回去了。

你看出区别了吗?

这是纯文本。 这是加密的。

屏幕上出现了一个小点,

还有一个小小的开关。

所以研究人员问自己,“我想知道有

多少次非常安全、重要、敏感的

对话发生在这些双向无线电上,他们

忘记加密并且没有注意到他们没有加密?”

所以他们买了一台扫描仪。 这些是完全合法的

,它们以 P25 的频率运行

,他们所做的是他们在频率上跳跃

,他们编写软件来监听。

如果他们发现加密通信,他们就会留

在那个频道上,然后写下,那就是一个频道

这些人在

这些执法机构中进行交流

,他们去了 20 个大都市地区并听取了

以这些频率发生的对话。

他们发现,在每个大都市地区,

他们每天都会捕获超过 20 分钟

的明文通信。

人们在谈论什么样的事情?

嗯,他们找到了机密线人的姓名和

信息。 他们发现

窃听中记录的信息、

正在讨论的一系列犯罪、

敏感信息。

主要是执法和刑事。

他们去匿名化后将此事报告给执法

机构

,这里的漏洞只是用户

界面不够好。 如果您谈论的

是真正安全和敏感的事情,那么

您应该很清楚这个对话是加密的。

那很容易修复。

我认为最后一个非常非常酷

,我只需要向你展示它,它可能不会

像汽车或除颤器那样让你失眠,

但它会窃取按键。

现在,我们都把智能手机颠倒过来了。

每个安全专家都想破解智能手机

,我们倾向于查看 USB 端口、用于跟踪的 GPS

、摄像头、麦克风,但到目前为止还没

有人看过加速度计。

加速度计是

确定智能手机垂直方向的东西。

所以他们有一个简单的设置。

他们将智能手机放在键盘旁边,

让人们打字,然后他们的目标

是使用打字产生的振动

来测量加速度计读数的变化,

以确定人们在打字。

现在,当他们在 iPhone 3GS 上尝试这个时,

这是一个由打字造成的扰动的图表

,你可以看到

很难分辨出某人何时在打字或他们在打字什么,

但 iPhone 4 非常 改进了加速度计

,因此相同的测量结果

产生了这个图表。

现在,当有人打字时,这给了你很多信息

,然后他们所做的是使用

称为机器学习的先进人工智能技术

进行训练

,因此他们最有可能让

研究生输入很多东西, 并学习

,让系统使用机器学习

工具来了解人们正在输入的内容,

并将其与

加速度计中的测量值相匹配。

然后是攻击阶段,你让

某人输入一些东西,你不知道它是什么,

但是你使用你在训练阶段创建的模型

来弄清楚他们在输入什么。

他们取得了相当大的成功。 这是《今日美国》的一篇文章。

他们输入,“伊利诺伊州最高法院

裁定拉姆·伊曼纽尔有资格竞选芝加哥市长”

——看,我把它与上次谈话联系起来——

“并命令他留在选票上。”

现在,这个系统很有趣,因为它产生了

“Illinois Supreme”,然后它不确定。

该模型产生了一堆选项

,这就是一些人工智能的美妙之处。 技术,

是计算机擅长某些事情,

人类擅长其他事情

,两者兼得,让人类解决这个问题。

不要浪费计算机周期。

人类不会认为这是至高无上的力量。

是最高法院吧?

因此,我们可以一起

通过测量加速度计来重现打字。

为什么这很重要? 好吧,例如,在 Android 平台中,

开发人员有一个清单

,其中每个设备、麦克风等都

必须注册才能使用它,

这样黑客就无法接管它,

但没有人 控制加速度计。

那么有什么意义呢? 您可以将 iPhone 放在

某人的键盘旁边,然后离开房间,

然后再恢复他们所做的事情,

即使不使用麦克风也是如此。

如果有人能够在您的 iPhone 上放置恶意软件,

那么他们可能会得到

您在将 iPhone 放在键盘旁边时所做的打字。

不幸的是,还有其他几个值得注意的攻击

,但我

想指出的是密歇根大学的一个小组

,他们能够拿走投票机

,红杉 AVC Edge

DRE 将在新泽西州的选举中使用

,它们被留在走廊里,并在上面放了吃豆人。

所以他们运行了吃豆人游戏。

这是什么意思呢?

嗯,我认为社会往往很快就会采用技术

。 我喜欢下一个最酷的小工具。

但非常重要的是,这些研究人员正在展示,

这些东西的开发者

需要从一开始就考虑到安全性,

并且需要意识到他们可能有一个威胁模型,

但攻击者可能不够好

来限制 他们自己到那个威胁模型

,所以你需要跳出框框思考。

我们可以做的是

意识到设备可能会受到损害,

并且任何包含软件的

东西都会受到攻击。 它会有错误。

非常感谢你。 (掌声)