All your devices can be hacked Avi Rubin

[Music]

[Applause]

I’m a computer science professor and my

area of expertise is computer and

information security when I was in

graduate school I had the opportunity to

overhear my grandmother describing to

one of her fellow senior citizens what I

did for a living

apparently I was in charge of making

sure that no one stole the computers

from the university and you know that’s

a perfectly reasonable thing for her to

think because I told her I was working

in computer security and it was

interesting to get her perspective but

that’s not the most ridiculous thing

I’ve ever heard anyone say about my work

the most ridiculous thing I ever heard

is I was at a dinner party and a woman

heard that I work in computer security

and she asked me if she said her

computer had been infected by a virus

and she was very concerned that she

might get sick from it that she could

get this virus and I’m not a doctor but

I reassured her that it was very very

unlikely that this would happen but if

she felt more comfortable she could be

free to use latex gloves when she was on

the computer and it’d be no harm

whatsoever than that I’m gonna get back

to this notion of being able to get a

virus from your computer in a serious

way

what I’m going to talk to you about

today are some hacks some real-world

cyberattacks that people in my community

the academic research community have

performed which I don’t think most

people know about and I think they’re

very interesting and scary and this talk

is kind of a greatest hits of the

academic security community’s hacks none

of the work is my work it’s all work

that my colleagues have done and

actually asked them for their slides and

incorporated them into this talk so the

first one I’m going to talk about are

implanted medical devices no medical

devices have come a long way

technologically you can see in 1926 the

first pacemaker was invented in 1960 the

first internal pacemaker was implanted

hopefully a little smaller than that one

that you see there and technology has

continued to move forward

in 2006 we hit an important milestone

from the perspective of of computer

security and why do I say that because

that’s when implanted devices inside of

people started to have networking

capabilities one thing that brings us

close to home as we look at Dick

Cheney’s device he had a device that

pumped blood from an aorta to another

part of the heart and as you could see

at the bottom there it was controlled by

a computer controller and if you ever

thought that software reliability was

very important get one of these inside

of you now what a research team did was

they got their hands on what’s called an

ICD this is a defibrillator and this is

a device that goes into a person to

control their heart rhythm and these

have saved many lives well in order to

not have to open up the person every

time you want to reprogram their device

or do some Diagnostics on it they made

the thing be able to communicate

wirelessly and what this research team

did is they reverse engineered the

wireless protocol and they built the

device you see pictured here with a

little antenna that could talk the

protocol to the device and and thus

control it in order to make their

experience real they were unable to find

any volunteers and so they went and they

got some ground beef and some bacon and

they wrapped it all up to about the size

of a human beings area where the device

would go when they stuck the device

inside it to perform their experiments

somewhat realistically they launched

many many successful attacks one that

I’ll highlight here is changing the

patient’s name I don’t know why you

would want to do that but I sure

wouldn’t want that done to me and they

were able to change therapies including

disabling the device and this is with a

real commercial off-the-shelf device

simply by performing reverse engineering

and sending wireless signals to it

there was a piece on NPR that some of

these I CDs could actually have their

performance disrupted simply by holding

a pair of headphones on to them now

wireless and the Internet can improve

healthcare greatly there are several

examples up on the screen of situations

where doctors are looking to implant

devices inside of people and all of

these devices now it’s standard that

they communicate wirelessly and I think

this is great but without a full

understanding of trust

were the computing and without

understanding what attackers can do and

the security risks from the beginning

there’s a lot of danger in this ok let

me shift gears and show you another

target I’m going to show you a few

different targets like this and that’s

my top so we’ll look at automobiles this

is a car and it has a lot of components

a lot of electronics in it today in fact

it’s got many many different computers

inside of it more Pentiums than my lab

did when i was in college and they’re

connected by a wired network there’s

also a wireless network in the car which

can be reached from many different ways

so there’s Bluetooth there’s the FM and

XM radio there’s actually Wi-Fi there

are sensors in the wheels that

wirelessly communicate the tire pressure

to a controller onboard the modern car

is a sophisticated multi computer device

and what happens if somebody wanted to

attack this well that’s what the

researchers that I’m going to talk about

today did they basically stuck an

attacker on the wired network and on the

wireless network now they have two areas

they can attack one is short-range

wireless where you can actually

communicate with device from nearby

either through Bluetooth or Wi-Fi and

the other it’s long range where you can

communicate with the car through the

cellular network or through one of the

radio stations think about it when a car

receives a radio signal its processed by

software that software has to receive

and decode the radio signal and then

figure out what to do with it even if

it’s just music that it needs to play on

the radio and that software that does

that decoding if it has any bugs in it

could create a vulnerability for

somebody to hack the car the way that

the researchers did this work is they

read the software in in the computer

chips that were in the car and then they

use sophisticated reverse engineering

tools to figure out what that software

did and then they found vulnerabilities

in that software and then they built

exploits to exploit those they actually

carried out their attack in real life

they bought two cars and I guess they

have better budgets than I do the first

threat model was to see what someone

could do if an attacker actually got

access to the internal network on the

car ok so think of

if someone gets to go to your car they

get to mess around with it and then they

leave and now what kind of trouble are

you in the other threat model is that

they contact you in real-time over one

of the wireless networks like the

cellular or something like that never

having actually gotten physical access

to your car this is what their setup

looks like for the first model where you

get to have access to the car they put a

laptop and they connected to the

diagnostic unit on the in-car network

and they did all kinds of silly things

like here’s a picture of the speedometer

showing 140 miles an hour when the cars

in park once you have control of the

cars computers you can do anything now

you might say okay that’s silly well

what if you make the car always say it’s

going 20 miles an hour slower than it’s

actually going you might produce a lot

of speeding tickets then they went out

to an abandoned airstrip with two cars

the target victim car in the chase car

and they launched a bunch of other

attacks one of the things they were able

to do from the chase cars apply the

brakes on the other car simply by

hacking the computer they were able to

disable the brakes they also were able

to install malware that wouldn’t kick in

and wouldn’t trigger until the car was

doing something like going over 20 miles

an hour or something like that the

results are astonishing and when they

gave this talk even though they gave

this talk at a conference to a bunch of

computer security researchers everybody

was gasping they were able to take over

a bunch of critical computers inside the

car the brakes computer the lighting

computer the engine the dash the radio

etc and they were able to perform these

on real commercial cars that they

purchased using the radio network they

were able to compromise every single one

of the pieces of software that

controlled every single one of the

wireless capabilities of the car all of

these are implemented successfully how

would you steal a car in this model well

you compromised the car by a buffer

overflow vulnerability in the software

or something like that you use the GPS

in the car to locate it you remotely

unlock the doors through the computer

that controls that start the engine

bypass anti-theft and you’ve got

yourself a car surveillance was really

interesting the authors of the study

have a video where they show themselves

taking over a car

and then turning on the microphone in

the car and listening in on the car

while tracking it via GPS on a map and

so that’s something that the drivers of

the car would never know was happening i

scaring you yet got a few more of these

interesting ones these are ones where I

went to a conference and my mind was

just blown and I said I have to share

this with other people

this was Fabien Monroe says lab at the

University of North Carolina and what

they did was something intuitive once

you see it but kind of surprising they

videotape people on a bus and then they

post processes the video what you see

here in number one is a reflection in

somebody’s glasses of the smartphone

that they’re typing in they wrote

software to stabilize even though they

were on a bus and maybe someones holding

their phone at an angle to stabilize the

phone process it and you may know on

your smartphone when you type a password

the keys pop out a little bit and they

were able to use that to reconstruct

what the person was typing and had a

language model for detecting typing was

what was interesting is by videotaping

on a bus they were able to produce

exactly what people on their smartphones

were typing and then they had a

surprising result which is that their

software had not only done it for their

target but other people who accidentally

happen to be in the picture they were

able to produce what those people had

been typing and that was kind of an

accidental artifact of what their

software was doing I’ll show you two

more one is p25 radios p25 radios are

used by law enforcement and all kinds of

government agencies and people in combat

to communicate and there’s an encryption

option on these phones this is what the

phone looks like it’s not really a phone

it’s more of a two-way radio motorola

makes the most widely used one and you

can see that they’re used by secret

service they’re used in combat it’s a

very very common standard in the US and

elsewhere so one question the

researchers asked themselves is could

you block this thing right could you run

a denial of service because these are

first responders so what a terrorist

organization want to black out the

ability of police and fire to

communicate at an emergency they found

that there’s this girl tech device used

for texting that happens to operate at

the same exact frequency

is the p25 and they built what they

called my first jammer if you look

closely at this device it’s got a switch

for encryption or clear text let me

advance the slide and now I’ll go back

you see the difference

this is plain text this is encrypted

there’s one little dot that shows up on

the screen and one little tiny turn of

the switch and so the researchers asked

themselves I wonder how many times very

secure important sensitive conversations

are happening on these 2-way radios

where they forget to encrypt and they

don’t notice that they didn’t encrypt so

they bought a scanner these are

perfectly legal and they run at the

frequency of the p25 and what they did

is they hopped around frequencies and

they wrote software to listen in if they

found encrypted communication they

stayed on that channel and they wrote

down that’s a channel that these people

communicate in these law enforcement

agencies and they went to 20

metropolitan areas and listened in on

conversations that were happening at

those frequencies they found that in

every metropolitan area they would

capture over 20 minutes a day of clear

text communication and what kind of

things were people talking about well

they found the names and information

about confidential informants they found

information that was being recorded in

wiretaps a bunch of crimes that were

being discussed sensitive information

it was mostly law enforcement in

criminal they went and reported this to

the law enforcement agencies after

anonymizing it and the vulnerability

here is simply the user interface wasn’t

good enough if you’re talking about

something really secure and sensitive it

should be really clear to you that this

conversation is encrypted that one’s

pretty easy to fix the last one I

thought was really really cool and I

just had to show it to you it’s probably

not something that you’re gonna lose

sleep over like the cars or the

defibrillators

but it’s stealing keystrokes now we’ve

all looked at smart phones upside down

every security expert wants to hack a

smart phone and we tend to look at the

USB port to GPS for tracking the camera

the microphone but no one up till this

point had looked at the accelerometer

the accelerometer is the thing that

determines the vertical orientation of

the smartphone and so they had a simple

setup they put a smart

phone next to a keyboard and they had

people type and then their goal was to

use the vibrations that were created by

typing to measure the change in the

accelerometer reading to determine what

the person had been typing now when they

tried this on an iPhone 3GS this is a

graph of the perturbations that were

created by the typing and you can see

that it’s very difficult to tell when

somebody was typing or what they were

typing but iPhone 4 greatly improved the

accelerometer and so the same

measurement produced this graph now that

gave you a lot of information while

someone was typing and what they did

then is used advanced artificial

intelligence techniques called machine

learning to have a training phase and so

they got most likely grad students to

type in a whole lot of things and to

learn to have the system use the machine

learning tools that were available to

learn what it is that the people were

typing and to match that up with the

measurements in the accelerometer and

then there’s the attack phase where you

get somebody to type something in you

don’t know what it was but you use your

model that you created in the training

phase to figure out what they were

typing they had pretty good success this

is an article from the USA Today they

typed in the Illinois Supreme Court has

ruled that Ram Immanuel is eligible to

run for mayor of Chicago see I tied into

the last talk and ordered him to stay on

the ballot now the system is interesting

because it produced Illinois Supreme and

then it wasn’t sure the model produced a

bunch of options and this is the beauty

of of some of the AI techniques is that

computers are good at some things humans

are good at other things take the best

of both what the humans solve this one

don’t waste computer cycles a human’s

not going to think it’s the supreme

might it’s the Supreme Court right and

so together we’re able to reproduce

typing simply by measuring the

accelerometer why is this matter well in

in the Android platform for example the

developers have a manifest where every

device on their the microphone etc has

to register if you’re going to use it so

that hackers can’t take over it but

nobody controls the accelerometer so

what’s the point you can leave your

iPhone next to someone’s keyboard and

just leave the room and then later

recover what they did even without

using the microphone if someone is able

to put malware on your iPhone they could

then maybe get the typing that you do

whenever you put your iPhone next to

your keyboard there’s several other

notable attacks that unfortunately I

don’t have time to go into but the one

that I wanted to point out was a group

from the University of Michigan which

was able to take voting machines the

Sequoia AVC edged er ease that were

going to be used in New Jersey in the

election that were left in a hallway and

put pac-man on it so they ran the

pac-man game what does this all mean

well I think that society tends to adopt

technology really quickly I love the

next coolest gadget but it’s very

important and these researchers are

showing that the developers of these

things need to take security into

account from the very beginning and need

to realize that they may have a threat

model but the attackers may not be nice

enough to limit themselves to that

threat model and so you need to think

outside of the box what we can do is be

aware that devices can be compromised

and anything that has software in it is

going to be vulnerable it’s going to

have bugs thank you very much

[Applause]

[音乐]

[掌声]

我是一名计算机科学教授,我

的专业领域是计算机和

信息安全,当我在

读研究生时,我有机会

无意中听到我的祖母向

她的一位老年人描述

我为一个 生活

显然是我负责

确保没有人

从大学偷走计算机,你知道这

对她来说是一件完全合理的事情,

因为我告诉她我

从事计算机安全工作,

了解她的观点很有趣,

但那是 不是我听过的最荒谬的事情

有人说我的工作

我听过的最荒谬的事情

是我在一个晚宴上,一位女士

听说我从事计算机安全工作

,她问我是否说她的

计算机已经 感染了病毒

,她非常担心她

可能会因此而生病,因为她

会感染这种病毒,我不是医生,但

我向她保证,

这不太可能 但是如果

她感觉更舒服,她可以

在使用计算机时自由使用乳胶手套

,这不会有任何伤害

,我将回到

能够

从您的计算机中获取病毒的概念 严肃

说,我今天要和你谈谈的

是一些黑客,一些真实世界的

网络攻击,我的社区中的人,

学术研究社区已经

执行了,我认为大多数

人都不知道,我认为他们是

非常有趣和可怕,这个

演讲是

学术安全社区黑客攻击

中最成功的

一次 我要谈的一个是

植入式医疗设备 没有任何医疗

设备在技术上取得了长足的

进步 你可以看到 1926 年

第一个起搏器于 1960 年发明

第一个内部起搏器有望被植入

比你看到的那个小一点,

而且技术

在 2006 年继续向前发展,从计算机安全的角度来看,我们达到了一个重要的里程碑

,为什么我要这么说,因为

那是植入人体内的设备

开始具有网络

功能的时候之一 当我们看到迪克切尼的设备时,这让我们

离家很近,

他有一个设备,可以

将血液从主动脉泵送到

心脏的另一部分,正如你

在底部看到的那样,它

由计算机控制器控制,如果你曾经

认为软件的可靠性

非常重要

,现在把其中的一个带入你的内心,一个研究团队所做的是

他们得到了所谓的

ICD,这是一个除颤器,这是

一个进入一个人的设备来

控制他们的心律和 这些

已经很好地挽救了许多生命,这样您就

不必

每次想要重新编程他们的设备

或对其进行一些诊断时都打开这个人,他们做

了 能够进行

无线通信的东西,这个研究团队

所做的是他们对

无线协议进行了逆向工程,他们构建了

如图所示的设备,带有一个

小天线,可以将

协议与设备通信,从而

控制它,以使他们的

体验真实 他们找不到

任何志愿者,所以他们去了,他们

得到了一些碎牛肉和一些培根,

他们把它们包裹起来,大约

有一个人类区域的大小,

当他们把设备

塞进里面时,设备会去的地方 有点现实地进行他们的实验

他们发起

了许多成功的攻击

我将在这里强调的一个是更改

患者的名字 我不知道您

为什么要这样做,但我

肯定不希望对我这样做,

他们能够 改变疗法,包括

禁用设备,这是使用

真正的商用现成设备,

只需执行逆向工程

并向其发送无线

信号 有一篇关于 NPR 的文章说,

这些 I CD 中的一些实际上

可以通过将

一副耳机戴在它们身上而破坏它们的性能,现在

无线和互联网可以

极大地改善医疗保健有几个

例子显示在屏幕

上医生的情况 希望将

设备植入人体内,所有

这些设备现在都是

无线通信的标准,我认为

这很好,但没有完全

了解信任

是计算,也没有

了解攻击者可以做什么以及

从一开始就有的安全风险

这里面有很多危险,让

我换档,给你看另一个

目标

今天它里面有很多电子元件 事实上

它里面有很多不同的计算机

比我

大学时我的实验室做的 Pentium 还要多,而且它们是

连接的 d 通过有线

网络 车内还有一个无线网络,

可以通过多种不同的方式访问,

所以有蓝牙有 FM 和

XM 收音机 实际上有 Wi-Fi

车轮上有传感器,

可以将轮胎压力无线传送

到控制器 现代汽车上

是一个复杂的多计算机设备

,如果有人想

攻击这个井会发生什么,

这就是我今天要讨论的研究人员,

他们基本上把

攻击者困在有线网络和

无线网络上,现在他们 他们有两个

可以攻击的区域,一个是短距离

无线,您

可以通过蓝牙或 Wi-Fi

与附近的设备进行实际通信,另一个是远程无线,您可以

通过蜂窝网络或其中一个与汽车进行通信

当汽车接收到由软件处理的无线电信号时,无线电台会考虑它,

该软件必须接收

和解码无线电信号 然后

弄清楚如何处理它,即使

它只是需要在收音机上播放的音乐,并且

如果它有任何错误,那么进行解码的软件

可能会为某人创造一个漏洞,

以破解汽车的

方式 研究人员所做的这项工作是他们

读取

汽车中计算机芯片中的软件,然后他们

使用复杂的逆向工程

工具来弄清楚该软件做了什么

,然后他们发现

了该软件中的漏洞,然后他们构建

了利用这些漏洞的漏洞。 他们实际上

在现实生活中进行了攻击

他们买了两辆车,我猜他们的

预算比我好 第一个

威胁模型是看看

如果攻击者真的

可以访问汽车上的内部网络,有人会

做什么

如果有人去你的车,他们

会弄乱它然后他们

离开,现在

在另一个威胁模型中你有什么麻烦是

他们与你联系 在

一个无线网络(如蜂窝网络或类似网络)上的时间

从未真正物理

访问您的汽车这是他们的设置

对于第一个模型的外观,您

可以访问他们放置

笔记本电脑并连接的汽车

到车载网络上的诊断单元

,他们做了各种愚蠢的事情,

比如这是一张车速表的图片,

显示每小时 140 英里,当汽车

停在停车场时,一旦你控制了

汽车电脑,你现在可以做任何事情

说好吧,那太傻

了,如果你让汽车总是

说它的时速比实际速度慢 20 英里

,你可能会开出

很多超速罚单,然后他们

带着两辆汽车去一个废弃的简易机场,

目标受害者汽车在追逐 汽车

,他们发动了一系列其他

攻击,其中一件事是他们能够

从追车中做的事情之一,

只需

入侵他们能够显示的计算机,就可以对另一辆车施加

刹车 他们还

能够安装恶意软件,这些恶意软件不会启动

,也不会触发,直到汽车

以每小时超过 20 英里的速度运行或类似的事情,

结果令人惊讶,当他们

发表这个演讲时,即使 他们

在一次会议上向一群

计算机安全研究人员发表了这个演讲,每个人

都喘不过气来 他们能够接管

车内的一堆关键计算机

刹车计算机 照明

计算机 发动机 仪表板 无线电

等,他们能够执行 这些

在他们

使用无线电网络购买的真实商用车上

他们能够破坏

控制汽车每一个

无线功能的每一个软件 所有

这些都已成功实施 你

将如何偷车 这个模型很好,

你通过

软件中的缓冲区溢出漏洞

或类似的东西破坏了汽车,你使用

汽车中的 GPS 来定位 您可以

通过控制启动发动机的计算机远程解锁车门

绕过防盗,然后您就拥有

了汽车监控系统真的很

有趣该研究的作者

有一段视频,他们在视频中展示了自己

接管了汽车

然后 打开车里的麦克风,

一边在地图上通过 GPS 跟踪它,一边听汽车

的声音,所以这

是汽车司机永远不会知道发生的事情,我

吓到你了,还有一些

这些有趣的东西 那些我

去参加一个会议的地方,我的想法

被震撼了,我说我必须

与其他人分享这个,

这是北卡罗来纳大学的法比恩·梦露说的实验室,

他们所做的事情一旦

你看到它就很直观,但有点 令人惊讶的是,他们

在公共汽车上给人们录像,然后他们

发布处理视频你

在这里看到的第一件事是他们正在输入

的智能手机眼镜中的反映

他们写道

即使

他们在公共汽车上也可以稳定软件,也许有人

以一定角度拿着手机来稳定

手机处理它,你可能知道

当你在智能手机上输入密码时

,按键会弹出一点,

他们可以使用 重建

这个人正在输入的内容并拥有一个

用于检测打字的语言模型

是有趣的是,通过

在公共汽车上拍摄视频,他们能够准确地产生

人们在智能手机上

正在输入的内容,然后他们得到了一个

令人惊讶的结果,那就是他们的

软件不仅为他们的目标完成了这项工作,

而且其他意外

碰巧出现在图片中的人,他们

能够产生这些人

一直在输入的内容,这是

他们的

软件正在做什么的一种意外工件我会告诉你 两个另外

一个是 p25 无线电 p25 无线电

被执法部门和各种

政府机构和战斗人员

用来进行通信,并且有一个加密

选项 se 电话 这就是

电话的样子 它不是真正的电话

它更像是一种双向无线电 摩托罗拉

制造了最广泛使用的一种,您

可以看到它们被秘密

服务所使用 它们被用于战斗 这是一个

非常 在美国和其他地方非常普遍的标准,

所以

研究人员问自己的一个问题是,

你能阻止这件事吗?你能

运行拒绝服务吗,因为这些是

第一响应者,所以恐怖

组织想要阻止

警察和火力的能力

在紧急情况下进行交流,他们

发现有一个用于发短信的女孩技术设备

恰好

以与 p25 相同的

频率运行,他们制造了他们

称之为我的第一个干扰器,如果你

仔细观察这个设备,它有一个

加密开关或 明文 让我

推进幻灯片 现在我会回去

你看看区别

这是纯文本 这是

加密的 屏幕上显示一个小点

和一个小转角

开关,所以研究人员问

自己我想知道有多少次非常

安全的重要敏感

对话发生在这些 2 路

无线电他们忘记加密并且他们

没有注意到他们没有加密所以

他们购买了扫描仪这些 是

完全合法的,他们以

p25 的频率运行,他们所做的

是他们在频率上跳跃,

他们编写软件来监听,如果他们

发现加密的通信,他们

留在那个频道上,他们

写下这是这些人

交流的频道 这些执法

机构和他们走访了 20 个

大都市地区并听取了

以这些频率发生的对话,

他们发现在

每个大都市地区,他们每天都会

捕捉超过 20 分钟的

明文通信,以及

人们在谈论什么样的事情

他们找到了机密线人的姓名和

信息 他们找到

了正在记录的信息 在

窃听中发现了一堆正在讨论的犯罪

敏感

信息主要是

刑事执法他们在匿名后将其报告

给执法机构,

这里的漏洞只是用户界面

不够好如果你 正在谈论

一些真正安全和敏感的事情

,你应该很清楚这个

对话是加密的,

很容易修复最后一个我

认为真的很酷,我

只需要向你展示它可能

不是你的东西 ‘会

像汽车或除颤器一样失眠,

但它正在窃取按键,现在我们

都将智能手机颠倒过来,

每个安全专家都想破解

智能手机,我们倾向于查看

GPS 的 USB 端口以跟踪

相机麦克风,但

到目前为止没有人看过加速度

计加速度计是

决定smar垂直方向

的东西 tphone,所以他们有一个简单的

设置,他们将智能

手机放在键盘旁边,让

人们打字,然后他们的目标是

使用打字产生的振动

来测量

加速度计读数的变化,以确定

这个人有什么 当他们

在 iPhone 3GS 上尝试这个时正在打字 这是一个

由打字产生的扰动的图表,你可以

看到很难判断

某人何时在打字或他们在打字什么,

但 iPhone 4 大大改进了

加速度计 所以同样的

测量产生了这个图表,它

在有人打字时给了你很多信息,

然后他们所做的

就是使用

称为机器

学习的先进人工智能技术进行训练,所以

他们最有可能让研究生

打字 很多事情,并

学习让系统使用机器

学习工具来

了解人们正在

输入的内容 并将其与

加速度计中的测量值相匹配,

然后是攻击阶段,你

让某人输入你

不知道它是什么的东西,但你使用

你在训练阶段创建的模型

来弄清楚他们是什么 正在

打字 他们取得了相当大的成功 这

是《今日美国》的一篇文章 他们

在伊利诺伊州最高法院

裁定拉姆·伊曼纽尔有资格

竞选芝加哥市长 看到我

与最后一次谈话有关并命令他留

在选票上 现在这个系统很有趣,

因为它产生了伊利诺伊州至尊,

然后它不确定模型产生了

一堆选项,这是

一些人工智能技术的美妙之处在于

计算机擅长某些事情

人类擅长其他事情 充分

利用人类解决的问题 这一个

不要浪费计算机周期 人类

不会认为这是至高无上的

可能是最高法院的权利

所以我们一起能够重现

典型 简单地通过测量

加速度计,为什么这

在 Android 平台中很重要,例如

开发人员有一个清单,如果你要使用它

,他们的麦克风等上的每个设备都

必须注册,

这样黑客就无法接管 它,但

没有人控制加速度计,所以

你可以把你的

iPhone 放在某人的键盘旁边

,然后离开房间,然后再

恢复他们所做的事情,即使没有

使用麦克风,如果有人能够

在你的 iPhone 上放置恶意软件,

那么他们可能会这样做

当你把你的 iPhone 放在键盘旁边时,得到你所做的打字

还有其他几个

值得注意的攻击,不幸的是我

没有时间去研究,

但我想指出的是

密歇根大学的一个

小组 能够将红杉 AVC 的投票机轻松拿走,这些投票机

将在新泽西州的

选举中使用,这些投票机被留在走廊里,并

在上面放了吃豆人,所以他们运行

吃豆人游戏这一切都

意味着什么 开始并

需要意识到他们可能有一个威胁

模型,但攻击者可能

不够好,无法将自己限制在该

威胁模型中,因此您需要

跳出框框思考我们可以做的就是

意识到设备可能会受到攻击

并且 任何有软件的东西

都会容易受到攻击它

会有错误非常感谢你

[掌声]