Placeholder Image

字幕列表 影片播放

  • Translator: Joseph Geni Reviewer: Morton Bast

    譯者: Tom Tao 審譯者: 文进 肖

  • I'm a computer science professor,

    我是一名計算機科學教授,

  • and my area of expertise is

    我的專業領域是

  • computer and information security.

    計算機與資訊安全。

  • When I was in graduate school,

    我在研究所的時候,

  • I had the opportunity to overhear my grandmother

    有一次碰巧聽到我的祖母

  • describing to one of her fellow senior citizens

    跟她一位年長的朋友

  • what I did for a living.

    聊到我的工作。

  • Apparently, I was in charge of making sure that

    我的工作顯然是在確保

  • no one stole the computers from the university. (Laughter)

    大學裡面的電腦不會被人偷走。(笑聲)

  • And, you know, that's a perfectly reasonable thing

    她會這麼想也不讓人意外,

  • for her to think, because I told her I was working

    因為我告訴她

  • in computer security,

    我的工作是關於計算機安全,

  • and it was interesting to get her perspective.

    她的聯想力真的很有意思。

  • But that's not the most ridiculous thing I've ever heard

    但是,這還不是別人對我的工作的解釋

  • anyone say about my work.

    最好笑的一個。

  • The most ridiculous thing I ever heard is,

    我聽過最好笑的一次是,

  • I was at a dinner party, and a woman heard

    在一次晚宴上,

  • that I work in computer security,

    一位女士聽到我是從事計算機安全的,

  • and she asked me if -- she said her computer had been

    於是她向我諮詢,她說她的電腦中毒了,

  • infected by a virus, and she was very concerned that she

    她非常擔心她可能會生病,

  • might get sick from it, that she could get this virus. (Laughter)

    因為她可能會感染同樣的病毒。(笑聲)

  • And I'm not a doctor, but I reassured her

    我不是醫生,但是我向她保證

  • that it was very, very unlikely that this would happen,

    這個可能性微乎其微,

  • but if she felt more comfortable, she could be free to use

    但是如果她還是不放心,

  • latex gloves when she was on the computer,

    可以在使用電腦的時候戴上橡膠手套,

  • and there would be no harm whatsoever in that.

    這樣就肯定萬無一失了。

  • I'm going to get back to this notion of being able to get

    言歸正傳,接下來我要認真地

  • a virus from your computer, in a serious way.

    談談如何避免電腦病毒。

  • What I'm going to talk to you about today

    我今天要跟你們聊的是有關

  • are some hacks, some real world cyberattacks that people

    在我所從事的研究領域中

  • in my community, the academic research community,

    發生的一些駭客及網路攻擊問題,

  • have performed, which I don't think

    我相信這些是

  • most people know about,

    大部分人都不了解的,

  • and I think they're very interesting and scary,

    並且我認為這些是既有意思又讓人害怕的,

  • and this talk is kind of a greatest hits

    而這次談話的內容

  • of the academic security community's hacks.

    就是關於安全領域的經典案例。

  • None of the work is my work. It's all work

    這些事情不是發生在我身上。

  • that my colleagues have done, and I actually asked them

    這些都是我同事做的研究,而我請他們

  • for their slides and incorporated them into this talk.

    提供一些資料加到這次談話中。

  • So the first one I'm going to talk about

    接下來首先我要講的是

  • are implanted medical devices.

    體內植入醫療設備。

  • Now medical devices have come a long way technologically.

    現在的醫療設備已經在技術方面發展了很多年。

  • You can see in 1926 the first pacemaker was invented.

    大家從螢幕上可以看到 在1926年,第一個外置心臟起搏器被發明。

  • 1960, the first internal pacemaker was implanted,

    1960年第一個內置起搏器被植入人體,

  • hopefully a little smaller than that one that you see there,

    如大家所願這個東西體積減少了很多,

  • and the technology has continued to move forward.

    並且技術還在不斷的進步。

  • In 2006, we hit an important milestone from the perspective

    到2006年,從電腦安全角度來說

  • of computer security.

    我們達到了一個重要的里程碑

  • And why do I say that?

    為什麼為這麼說?

  • Because that's when implanted devices inside of people

    因為這時候人體內置的設備

  • started to have networking capabilities.

    開始具備聯網功能。

  • One thing that brings us close to home is we look

    Dick Cheney的設備可以讓我們更好的理解這一點,

  • at Dick Cheney's device, he had a device that

    Dick Cheney的設備可以讓我們更好的理解這一點,

  • pumped blood from an aorta to another part of the heart,

    這個設備負責將血液從一個大動脈 輸送到心臟的另一個腔體,

  • and as you can see at the bottom there,

    就像你看到的,圖中的底部,

  • it was controlled by a computer controller,

    一個電腦控制器控制著整個設備,

  • and if you ever thought that software liability

    如果你認爲這個軟體控制很重要

  • was very important, get one of these inside of you.

    你可以自己裝一個。

  • Now what a research team did was they got their hands

    現在一個研究小組手頭上的工作

  • on what's called an ICD.

    是研究一個稱為ICD的設備。 (ICD,植入式心臟去顫器)

  • This is a defibrillator, and this is a device

    這是一個心律去顫器,植入人體後

  • that goes into a person to control their heart rhythm,

    控制自己的心臟節律,

  • and these have saved many lives.

    已經挽救了許多人的生命。

  • Well, in order to not have to open up the person

    為了不對人進行重新手術

  • every time you want to reprogram their device

    就可以每次重新設定他們的設備,

  • or do some diagnostics on it, they made the thing be able

    或者做一些診斷,這個設備能夠進行無線通訊,

  • to communicate wirelessly, and what this research team did

    而這個研究小組所做的是

  • is they reverse engineered the wireless protocol,

    他們逆向工程無線協定,

  • and they built the device you see pictured here,

    做了個小設備,你在這裏看得到,

  • with a little antenna, that could talk the protocol

    帶一個小的天線,會使用協定和ICD通信,

  • to the device, and thus control it.

    從而控制它。

  • In order to make their experience real -- they were unable

    為了使他們的實驗更真實

  • to find any volunteers, and so they went

    -由於他們無法找到任何的志願者-於是他們找到了一些

  • and they got some ground beef and some bacon

    碎牛肉和一些臘肉,

  • and they wrapped it all up to about the size

    包成該設備將去的人體部位的大小,

  • of a human being's area where the device would go,

    包成該設備將去的人體部位的大小,

  • and they stuck the device inside it

    然後把設備塞進去來做實驗,

  • to perform their experiment somewhat realistically.

    為了使實驗更加接近真實情況。

  • They launched many, many successful attacks.

    他們完成了許多許多次成功的攻擊。

  • One that I'll highlight here is changing the patient's name.

    在這裏我還是要強調的是改變病人的名字。

  • I don't know why you would want to do that,

    我不知道你為什麼會想這樣做,

  • but I sure wouldn't want that done to me.

    但我肯定不會想,這樣的事發生在我身上。

  • And they were able to change therapies,

    他們能夠改變的治療方法,

  • including disabling the device -- and this is with a real,

    包括停用此設備 --這是一個真正的,

  • commercial, off-the-shelf device --

    商業的,現成的設備

  • simply by performing reverse engineering and sending

    只需通過執行逆向工程和發送

  • wireless signals to it.

    無線信號就能控制它。可怕吧?

  • There was a piece on NPR that some of these ICDs

    NPR上有個片段講的是有些ICD

  • could actually have their performance disrupted

    的功能竟然會被干擾,

  • simply by holding a pair of headphones onto them.

    只要簡單地把一對耳機放到它上面就發生了。

  • Now, wireless and the Internet

    現在,無線和網路可以

  • can improve health care greatly.

    大大提高醫療水準。

  • There's several examples up on the screen

    在螢幕上有幾個例子,

  • of situations where doctors are looking to implant devices

    醫生正在植入設備到人體,

  • inside of people, and all of these devices now,

    而其所有的這些設備現在

  • it's standard that they communicate wirelessly,

    標準化了,之間可以互相進行無線通訊,

  • and I think this is great,

    我認為這是很好的,

  • but without a full understanding of trustworthy computing,

    但沒有一個對可信任計算的完全理解,

  • and without understanding what attackers can do

    沒有意識到攻擊者可以做什麼

  • and the security risks from the beginning,

    和安全風險從一開始就存在的話,

  • there's a lot of danger in this.

    這就有很多危險了。

  • Okay, let me shift gears and show you another target.

    好吧,讓我換個話題,告訴你另一個目標

  • I'm going to show you a few different targets like this,

    接下來我要告訴你幾個不同的目標,

  • and that's my talk. So we'll look at automobiles.

    這就是我的談話。所以,我們來看看汽車吧。

  • This is a car, and it has a lot of components,

    這是一輛汽車,現在它有很多零部件,

  • a lot of electronics in it today.

    很多的電子產品。

  • In fact, it's got many, many different computers inside of it,

    事實上,它有很多,很多不同的電腦在裏面,

  • more Pentiums than my lab did when I was in college,

    比我當年在大學的實驗室更多的處理器,

  • and they're connected by a wired network.

    他們通過有線網路連接。

  • There's also a wireless network in the car,

    而且在車上還有一個無線網路,

  • which can be reached from many different ways.

    它可以從許多不同的方式接入。

  • So there's Bluetooth, there's the FM and XM radio,

    有藍牙, FM和XM廣播,

  • there's actually wi-fi, there's sensors in the wheels

    有的竟然還有Wi-Fi ,輪胎上的感測器

  • that wirelessly communicate the tire pressure

    通過無線通信將氣壓值傳送給

  • to a controller on board.

    主板上的控制器。

  • The modern car is a sophisticated multi-computer device.

    當今的汽車是一個複雜的多電腦設備。

  • And what happens if somebody wanted to attack this?

    那麼如果有人想攻擊它會發生什麼呢?

  • Well, that's what the researchers

    嗯,這就是我今天要談的

  • that I'm going to talk about today did.

    研究人員已經實現了什麼。

  • They basically stuck an attacker on the wired network

    他們在有線網路和無線網路上放置了

  • and on the wireless network.

    攻擊設備。

  • Now, they have two areas they can attack.

    現在,他們有兩個區域可以攻擊。

  • One is short-range wireless, where you can actually

    一個是短距離無線通訊,

  • communicate with the device from nearby,

    在這裏你可以與附近的設備進行通信,

  • either through Bluetooth or wi-fi,

    通過藍牙或Wi-Fi。

  • and the other is long-range, where you can communicate

    另一種是遠距離無線通訊,

  • with the car through the cellular network,

    通過蜂窩網路

  • or through one of the radio stations.

    或通過一個廣播電臺。

  • Think about it. When a car receives a radio signal,

    想像一下,當一輛車接收無線電信號時,

  • it's processed by software.

    信號交給軟體處理。

  • That software has to receive and decode the radio signal,

    該軟體接收和解碼無線電信號,

  • and then figure out what to do with it,

    然後確定如何處理,

  • even if it's just music that it needs to play on the radio,

    即使它只是音樂信號,也要交給收音機去播放,

  • and that software that does that decoding,

    如果這個解碼軟體有

  • if it has any bugs in it, could create a vulnerability

    任何的漏洞,那麼就成為有人破解車的

  • for somebody to hack the car.

    攻擊點。

  • The way that the researchers did this work is,

    研究人員做這項工作的方式是

  • they read the software in the computer chips

    他們從車載電腦中讀出軟體,

  • that were in the car, and then they used sophisticated

    然後他們用先進

  • reverse engineering tools

    的逆向工程工具

  • to figure out what that software did,

    弄清楚軟體做了什麼,

  • and then they found vulnerabilities in that software,

    然後他們發現該軟體中的漏洞,

  • and then they built exploits to exploit those.

    然後他們利用這些漏洞建立了一些開拓工具。

  • They actually carried out their attack in real life.

    他們在實際環境下進行他們的攻擊實驗。

  • They bought two cars, and I guess

    他們買了兩輛車,我想

  • they have better budgets than I do.

    他們有比我更好的預算。

  • The first threat model was to see what someone could do

    第一個威脅模型是看

  • if an attacker actually got access

    如果一個攻擊者獲得到

  • to the internal network on the car.

    內部網路的連接,他可以做什麼

  • Okay, so think of that as, someone gets to go to your car,

    嗯,大家這樣想一下,有人進到你的車裏,

  • they get to mess around with it, and then they leave,

    把裏面的設備搞得一團糟,然後他們離開,

  • and now, what kind of trouble are you in?

    而現在,你陷入了什麼樣的麻煩?

  • The other threat model is that they contact you

    另一個威脅模型是,

  • in real time over one of the wireless networks

    他們通過無線網路,

  • like the cellular, or something like that,

    如蜂窩電話,或類似的東西,即時地與您和車搭上線,

  • never having actually gotten physical access to your car.

    但從來沒有通過物理方式接觸你的車。

  • This is what their setup looks like for the first model,

    這就是看起來像第一種模式的設備,

  • where you get to have access to the car.

    需要進入車內。

  • They put a laptop, and they connected to the diagnostic unit

    他們放置一台筆記本電腦, 並連接車內網路的診斷模組,

  • on the in-car network, and they did all kinds of silly things,

    然後他們做了各種愚蠢的事情,

  • like here's a picture of the speedometer

    就像這張圖片,車速里程表

  • showing 140 miles an hour when the car's in park.

    顯示140公里的時速,但是汽車實際上是在駐車狀態。

  • Once you have control of the car's computers,

    一旦你擁有汽車電腦的控制,

  • you can do anything.

    你可以做任何事情。

  • Now you might say, "Okay, that's silly."

    現在,你可能會說: “噢,這太愚蠢了。”

  • Well, what if you make the car always say

    那麼,如果您的車總顯示20英里的時速,

  • it's going 20 miles an hour slower than it's actually going?

    比它實際的速度低,這會怎麼樣?

  • You might produce a lot of speeding tickets.

    您可能會產生大量超速行駛的罰單。

  • Then they went out to an abandoned airstrip with two cars,

    然後,他們帶了兩輛車去了一個廢棄的飛機跑道,

  • the target victim car and the chase car,

    目標受害車和主動攻擊車,

  • and they launched a bunch of other attacks.

    然後他們實施了一堆其他的攻擊。

  • One of the things they were able to do from the chase car

    從攻擊車裏他們能夠做到的事情之一

  • is apply the brakes on the other car,

    是操作另一輛汽車的刹車,

  • simply by hacking the computer.

    只需通過入侵該車的電腦。

  • They were able to disable the brakes.

    他們可以禁用制動器。

  • They also were able to install malware that wouldn't kick in

    他們還能夠安裝惡意軟體,

  • and wouldn't trigger until the car was doing something like

    通常情況下這個軟體不會被觸發,直至如車輛

  • going over 20 miles an hour, or something like that.

    時速超過每小時20英里,或類似的情況。

  • The results are astonishing, and when they gave this talk,

    結果是驚人的,而當他們進行公開講座時,

  • even though they gave this talk at a conference

    即使他們的講座的觀眾是

  • to a bunch of computer security researchers,

    一堆的電腦安全研究人員,

  • everybody was gasping.

    每個人都倒抽一口涼氣。

  • They were able to take over a bunch of critical computers

    他們能夠接管車內一堆的關鍵電腦:

  • inside the car: the brakes computer, the lighting computer,

    如刹車電腦,照明電腦,

  • the engine, the dash, the radio, etc.,

    發動機電腦,儀錶電腦,無線電電腦等,

  • and they were able to perform these on real commercial

    他們是能夠執行這些惡意程式 在他們購買的市場上

  • cars that they purchased using the radio network.

    已有的商用汽車上,通過使用無線網路。

  • They were able to compromise every single one of the

    他們能夠攻擊車上每一個

  • pieces of software that controlled every single one

    帶有無線功能的模組軟體

  • of the wireless capabilities of the car.

    的任何一部分。

  • All of these were implemented successfully.

    所有這些都已成功實施。

  • How would you steal a car in this model?

    在這個模型中,你會如何偷一輛車?

  • Well, you compromise the car by a buffer overflow

    好了,你可以通過車載軟體的緩衝區溢出漏洞

  • of vulnerability in the software, something like that.

    來攻擊,或者類似的東西。

  • You use the GPS in the car to locate it.

    您使用車裏的GPS來定位它。

  • You remotely unlock the doors through the computer

    您通過電腦控制遠端解鎖,

  • that controls that, start the engine, bypass anti-theft,

    啟動引擎,繞過防盜系統,

  • and you've got yourself a car.

    然後你就為自己搞到一輛車。

  • Surveillance was really interesting.

    監控這個過程是非常有趣的。

  • The authors of the study have a video where they show

    這項研究的作者有一個視頻在那裏展示

  • themselves taking over a car and then turning on

    他們自己入侵了汽車,

  • the microphone in the car, and listening in on the car

    然後打開車裏的麥克風,並進行監聽,

  • while tracking it via GPS on a map,

    同時通過GPS在地圖上跟蹤它

  • and so that's something that the drivers of the car

    還做了一些類似的事情,但汽車裏的駕駛員

  • would never know was happening.

    永遠也不會知道發生了什麼。

  • Am I scaring you yet?

    我嚇著你了嗎?

  • I've got a few more of these interesting ones.

    我還有有幾個這些有趣的例子。

  • These are ones where I went to a conference,

    我有一次去參加一個會議,

  • and my mind was just blown, and I said,

    然後我完全被驚呆了,

  • "I have to share this with other people."

    然後我說:“我要與其他人分享這些事情。

  • This was Fabian Monrose's lab

    這是Fabian Monrose

  • at the University of North Carolina, and what they did was

    在北卡羅萊納大學的實驗室,

  • something intuitive once you see it,

    他們研究的是你看到的直觀的普通事物,

  • but kind of surprising.

    但結果是令人驚訝的。

  • They videotaped people on a bus,

    他們在公共汽車上對人進行錄影,

  • and then they post-processed the video.

    然後進行後期處理。

  • What you see here in number one is a

    你在這裏看到的第一個圖是在某個人

  • reflection in somebody's glasses of the smartphone

    的眼鏡中反射的智慧手機在

  • that they're typing in.

    打字的圖像

  • They wrote software to stabilize --

    他們用軟體以穩定

  • even though they were on a bus

    - 即使他們是在公共汽車上(來回晃動),

  • and maybe someone's holding their phone at an angle --

    或者有人在一個角度拿著自己的手機

  • to stabilize the phone, process it, and

    穩定電話圖像,處理圖像,然

  • you may know on your smartphone, when you type

    後你可能知道了,在您的智慧手機上,

  • a password, the keys pop out a little bit, and they were able

    當你輸入一個密碼,字母會彈出一會兒,

  • to use that to reconstruct what the person was typing,

    然後他們就能用它來重建剛才輸入的資訊。

  • and had a language model for detecting typing.

    並且他們有一個語言模型。

  • What was interesting is, by videotaping on a bus,

    很有趣的是,通過在公共汽車上錄影,

  • they were able to produce exactly what people

    他們能夠精確地得知人們在他們的

  • on their smartphones were typing,

    智慧手機打的字,

  • and then they had a surprising result, which is that

    然後他們有一個驚人的結果,

  • their software had not only done it for their target,

    軟體不僅完成對目標的監控分析,

  • but other people who accidentally happened

    而且也把碰巧出現在

  • to be in the picture, they were able to produce

    圖像中的其他人

  • what those people had been typing, and that was kind of

    的打字輸入也分析出來了,

  • an accidental artifact of what their software was doing.

    這是他們的軟體的一個意外的收穫。

  • I'll show you two more. One is P25 radios.

    我再給展示兩個例子。一個是P25無線電通話機。

  • P25 radios are used by law enforcement

    P25無線電通話機用於執法機構、

  • and all kinds of government agencies

    各種政府機構

  • and people in combat to communicate,

    和民眾在戰鬥中的通話,

  • and there's an encryption option on these phones.

    而且這些手機有個加密選項。

  • This is what the phone looks like. It's not really a phone.

    這是就是P25無線電通話機,這不是一個真正的電話。

  • It's more of a two-way radio.

    這是一個雙向無線電。

  • Motorola makes the most widely used one, and you can see

    使用得最廣泛的是由摩托羅拉所製造的,你可以看到,

  • that they're used by Secret Service, they're used in combat,

    特勤組織在使用它,他們在戰鬥中使用它,

  • it's a very, very common standard in the U.S. and elsewhere.

    在美國和其他地方,這是一個非常普遍的標準裝備。

  • So one question the researchers asked themselves is,

    因此,一個研究人員問自己的問題是,

  • could you block this thing, right?

    你能否遮罩這個東西,對不對呢?

  • Could you run a denial-of-service,

    你可以運行一個拒絕服務,

  • because these are first responders?

    因為這個東西採用第一反應機制?

  • So, would a terrorist organization want to black out the

    所以,在緊急情況下,一個恐怖組織會不糊黑掉

  • ability of police and fire to communicate at an emergency?

    員警和消防的通訊能力?

  • They found that there's this GirlTech device used for texting

    他們發現有一個GirlTech公司的玩具可以用來發短信,

  • that happens to operate at the same exact frequency

    工作頻率和P25完全相同,

  • as the P25, and they built what they called

    於是他們就用這個東西建立了他們所稱的

  • My First Jammer. (Laughter)

    “我的第一個干擾器”。(笑聲)

  • If you look closely at this device,

    如果你仔細觀察此設備

  • it's got a switch for encryption or cleartext.

    它有一個開關,用於設定加密發送或明文發送。

  • Let me advance the slide, and now I'll go back.

    讓我前進一下幻燈片,現在我回去。

  • You see the difference?

    你看到其中的差別嗎?

  • This is plain text. This is encrypted.

    這是純文本。這是加密的。

  • There's one little dot that shows up on the screen,

    有一個小點,顯示在螢幕上,

  • and one little tiny turn of the switch.

    和一個小的轉換開關。

  • And so the researchers asked themselves, "I wonder how

    因此,研究人員問自己,

  • many times very secure, important, sensitive conversations

    “我不知道有多少次,非常機密的、重要的、敏感的對話

  • are happening on these two-way radios where they forget

    發生在這些雙向無線電設備上,他們忘了加密

  • to encrypt and they don't notice that they didn't encrypt?"

    並且他們沒有注意到在進行未加密的通話嗎?”

  • So they bought a scanner. These are perfectly legal

    於是,他們買了一台無線電掃描設備。這是完全合法的,

  • and they run at the frequency of the P25,

    然後他們運行在P25的頻段上,

  • and what they did is they hopped around frequencies

    然後他們在附近的頻段上跳來跳去的掃描,

  • and they wrote software to listen in.

    他們寫軟體監聽,

  • If they found encrypted communication, they stayed

    如果他們發現加密的通信

  • on that channel and they wrote down, that's a channel

    他們停留在該頻道上,記下來,這是一個

  • that these people communicate in,

    執法機構的人們在通話的頻道,

  • these law enforcement agencies,

    執法機構的人們在通話的頻道,

  • and they went to 20 metropolitan areas and listened in

    然後他們去了20個大都市地區,在這些頻率上監聽。

  • on conversations that were happening at those frequencies.

    在這些頻率上監聽。

  • They found that in every metropolitan area,

    他們發現,在每一個大都市區,

  • they would capture over 20 minutes a day

    每天他們將捕獲超過20分鐘

  • of cleartext communication.

    明文通信。

  • And what kind of things were people talking about?

    人們在談論什麼樣的東西呢?

  • Well, they found the names and information

    嗯,他們發現了需要保密的報案人的名字和資訊。

  • about confidential informants. They found information

    的名字和資訊。

  • that was being recorded in wiretaps,

    在監聽設備中記錄的資訊,

  • a bunch of crimes that were being discussed,

    包括對一堆的犯罪進行的討論和

  • sensitive information.

    其他敏感資訊。

  • It was mostly law enforcement and criminal.

    這主要是執法和刑事方面的。

  • They went and reported this to the law enforcement

    他們匿名了這些資訊後報給

  • agencies, after anonymizing it,

    了執法機構,

  • and the vulnerability here is simply the user interface

    這裏的脆弱性簡單來說在於用戶介面

  • wasn't good enough. If you're talking

    還不夠好。如果你在談論

  • about something really secure and sensitive, it should

    什麼真正的安全和敏感的,

  • be really clear to you that this conversation is encrypted.

    那麼這種談話必須是要加密的。

  • That one's pretty easy to fix.

    這是很容易解決。

  • The last one I thought was really, really cool,

    最後一個,我想是真的、真的很酷,

  • and I just had to show it to you, it's probably not something

    我這就把它展示給你,它可能不是那種

  • that you're going to lose sleep over

    會讓你會失眠的東西,

  • like the cars or the defibrillators,

    比如類似汽車電腦或心臟除顫器,

  • but it's stealing keystrokes.

    但它可以偷按鍵資訊。

  • Now, we've all looked at smartphones upside down.

    現在,我們上下顛倒著看一下智慧手機。

  • Every security expert wants to hack a smartphone,

    每個安全專家想要攻擊一個智慧手機,

  • and we tend to look at the USB port, the GPS for tracking,

    都傾向於從USB埠、GPS跟蹤、

  • the camera, the microphone, but no one up till this point

    相機、麥克風,但沒有一個到現在為止

  • had looked at the accelerometer.

    看過加速計。

  • The accelerometer is the thing that determines

    加速度計的決定了智慧手機

  • the vertical orientation of the smartphone.

    在垂直方向的角度。

  • And so they had a simple setup.

    因此,他們做了一個簡單的設置。

  • They put a smartphone next to a keyboard,

    他們把智慧手機放到鍵盤的旁邊,

  • and they had people type, and then their goal was

    然後有人打字,然後他們的目標是

  • to use the vibrations that were created by typing

    通過使用加速度計

  • to measure the change in the accelerometer reading

    測量打字產生的振動的讀數的變化,

  • to determine what the person had been typing.

    以確定打字內容。

  • Now, when they tried this on an iPhone 3GS,

    現在,當他們用iPhone 3GS嘗試這種方法時,

  • this is a graph of the perturbations that were created

    打字會產生一個圖形的擾動,

  • by the typing, and you can see that it's very difficult

    你可以看到,很難

  • to tell when somebody was typing or what they were typing,

    確認什麼時候人在打字和打字內容,

  • but the iPhone 4 greatly improved the accelerometer,

    但在iPhone 4大大改善了加速度計,

  • and so the same measurement

    所以相同的測量動作

  • produced this graph.

    產生了這個曲線圖。

  • Now that gave you a lot of information while someone

    現在這個圖給你了大量資訊,

  • was typing, and what they did then is used advanced

    當有人打字的時候。接下來他們採用

  • artificial intelligence techniques called machine learning

    先進的人工智慧技術稱為機器學習

  • to have a training phase,

    來進行訓練階段,

  • and so they got most likely grad students

    所以他們叫來潛在的研究生們,

  • to type in a whole lot of things, and to learn,

    輸入了一大堆的東西,去學習,

  • to have the system use the machine learning tools that

    使系統運用機器學習的工具,

  • were available to learn what it is that the people were typing

    瞭解人們輸入的內容,

  • and to match that up

    然後去匹配

  • with the measurements in the accelerometer.

    加速度計的測量資料。

  • And then there's the attack phase, where you get

    再有就是攻擊階段,

  • somebody to type something in, you don't know what it was,

    一個人在那裏打字,你不知道他打的是什麼東西,

  • but you use your model that you created

    但你用你在訓練階段時的模型進行匹配,

  • in the training phase to figure out what they were typing.

    就可以弄清楚他們輸入內容。

  • They had pretty good success. This is an article from the USA Today.

    他們有相當高的成功率。 這是從“今日美國”的一篇文章。

  • They typed in, "The Illinois Supreme Court has ruled

    他們鍵入“伊利諾州最高法院裁定,

  • that Rahm Emanuel is eligible to run for Mayor of Chicago"

    伊曼紐爾符合競選芝加哥市長的條件”

  • see, I tied it in to the last talk

    看,我把它綁在最後一次談話

  • "and ordered him to stay on the ballot."

    “並命令他繼續競選”。

  • Now, the system is interesting, because it produced

    現在,該系統很有趣,因為它生成了

  • "Illinois Supreme" and then it wasn't sure.

    “伊利諾州最高法院” ,然後他就不確定了。

  • The model produced a bunch of options,

    該模型產生了一堆的選項,

  • and this is the beauty of some of the A.I. techniques,

    這是AI技術的美妙之處,

  • is that computers are good at some things,

    電腦在一些方面擅長,

  • humans are good at other things,

    人類在其他方面擅長,

  • take the best of both and let the humans solve this one.

    結合兩者的最優,讓人類解決這個問題。

  • Don't waste computer cycles.

    不要浪費電腦的運算。

  • A human's not going to think it's the Supreme might.

    一個人不會認為這是最高法院的威力。

  • It's the Supreme Court, right?

    這是最高法院,對不對?

  • And so, together we're able to reproduce typing

    所以,我們一起能夠簡單地

  • simply by measuring the accelerometer.

    通過測量加速度計來重現輸入。

  • Why does this matter? Well, in the Android platform,

    為什麼這個事情很重要呢?在Android平臺上,

  • for example, the developers have a manifest

    例如,開發人員有一個設備清單,

  • where every device on there, the microphone, etc.,

    每個設備都在上面,麥克風等,

  • has to register if you're going to use it

    如果你要使用它就必須註冊,

  • so that hackers can't take over it,

    這樣駭客無法接管,

  • but nobody controls the accelerometer.

    但沒有人控制加速度計。

  • So what's the point? You can leave your iPhone next to

    那麼,這有什麼意義呢?你可以留下 你的iPhone到其他人的鍵盤旁邊,

  • someone's keyboard, and just leave the room,

    然後離開房間,

  • and then later recover what they did,

    過一會回來就知道他們做了什麼,

  • even without using the microphone.

    甚至不使用麥克風

  • If someone is able to put malware on your iPhone,

    如果有人能夠在你的iPhone上安裝惡意軟體,

  • they could then maybe get the typing that you do

    那麼也許他們可以得到你的打字內容,

  • whenever you put your iPhone next to your keyboard.

    當你打字時把iPhone放到鍵盤旁邊。

  • There's several other notable attacks that unfortunately

    還有其他幾個著名的攻擊,不過遺憾的是

  • I don't have time to go into, but the one that I wanted

    我沒有時間給大家一一提到,但是,我想指出的是,

  • to point out was a group from the University of Michigan

    美國密西根大學的一個小組已經能

  • which was able to take voting machines,

    夠搞定投票機了,

  • the Sequoia AVC Edge DREs that

    Sequoia AVC Edge DRE,

  • were going to be used in New Jersey in the election

    就是那種使用在新澤西州的選舉

  • that were left in a hallway, and put Pac-Man on it.

    留在走廊裏的機器。他們可以把Pac-Man遊戲機放上去。

  • So they ran the Pac-Man game.

    他們運行Pac-Man遊戲。

  • What does this all mean?

    這一切意味著什麼?

  • Well, I think that society tends to adopt technology

    嗯,我認為社會趨向於快速採用新技術。

  • really quickly. I love the next coolest gadget.

    我愛最新最酷的小工具。

  • But it's very important, and these researchers are showing,

    但非常重要的是,在這些研究人員展示的例子中,

  • that the developers of these things

    這些東西的開發人員

  • need to take security into account from the very beginning,

    從一開始就要將安全因素考慮進去,

  • and need to realize that they may have a threat model,

    並意識到,即使他們設計時 考慮到可能有一個威脅模型,

  • but the attackers may not be nice enough

    但攻擊者可能沒有友善到

  • to limit themselves to that threat model,

    將自己的行為限制在這個威脅模型中,

  • and so you need to think outside of the box.

    所以你需要考慮出了這一個模型之外的所有威脅。

  • What we can do is be aware

    我們所能做的是請注意

  • that devices can be compromised,

    設備可能會受到攻擊和損害,

  • and anything that has software in it

    只要是含有軟體

  • is going to be vulnerable. It's going to have bugs.

    它就容易受到攻擊, 它就會有缺陷。

  • Thank you very much. (Applause)

    非常感謝你。 (掌聲)

Translator: Joseph Geni Reviewer: Morton Bast

譯者: Tom Tao 審譯者: 文进 肖

字幕與單字

單字即點即查 點擊單字可以查詢單字解釋