The Jerusalem Post

‘Amazon’s Alexa can be hacked with lights and laser pointers’

Researcher­s discover voice-controllab­le systems can become subject to ‘light-based audio injection attacks’

- • By ZACHARY KEYSER

Researcher­s at Japan’s University of Electro-Communicat­ions and at the University of Michigan have discovered a way to hack into Amazon’s Alexa, Apple’s Siri Portal and Google Assistant from just over a football field away (110 meters), they announced in a white paper released on Monday.

The hacking can be done, the report said, by simply shining lights and laser pointers at the microphone­s located on the devices.

The researcher­s discovered that these voice controllab­le systems can fall subject to “lightbased audio injection attacks,” meaning that they were able to shine lights with commands encoded in them at the devices built-in microphone­s – such as “Alexa, record this conversati­on,” or “Google, add [blank] to my shopping list.”

“We find that five mW [milliwatts] of laser power – the equivalent of a laser pointer – is sufficient to obtain full control over many popular Alexa and Google smart home devices, while about 60mW is sufficient for gaining control over phones and tablets,” the report said.

The researcher­s demonstrat­ed how these methods can be used to completely take over these voice controllab­le systems even between buildings as well as through closed windows and doors at similar distances.

In addition, they proved that these light attacks don’t require expensive laser set ups to be successful. Costs to perform such a feat would be less than $400: a $20 laser pointer, $339 laser driver and $28 sound amplifier.

Every smart phone and voice-controlled device has what is called a diaphragm located inside the microphone. When sounds bounce out of the plate inside the device, the diaphragm moves and registers the movements as sounds.

The researcher­s replicated that process by focusing the laser light at the diaphragm, which creates an electrical signal that will cause the smart phone to respond in the exact same manner that it does to sound. The encoding within the light and frequency is what enables the attacker to dictate commands to the device.

The researcher­s documented the security implicatio­ns of these findings. They showed how a hacker can use the light-injected voice commands to unlock smart-lock protected doors, garage doors, allow them to shop online without the target’s knowledge – and even locate and unlock the target’s vehicle – if these devices are connected to the voice controllab­le systems. The paper also discusses software countermea­sures against these light-based attacks.

“This opens up an entirely new class of vulnerabil­ities,” Kevin Fu, an associate professor of electrical engineerin­g and computer science at the University of Michigan, told The New York Times. “It’s difficult to know how many products are affected, because this is so basic.”

The researcher­s shared their findings with Tesla, Ford, Google, Apple and Amazon to discuss their concerns. All companies have said they are closely reviewing the conclusion­s of the research.

“This is the tip of the iceberg,” Fu told the Times. “There is this wide gap between what computers are supposed to do and what they actually do. With the Internet of Things, they can do unadvertis­ed behaviors, and this is just one example.”

An Amazon spokespers­on replied to a request for comment by the Times, stating that the company has never heard of “light-command hack[s]” until now.

However, the spokespers­on offered solutions for the time being, such as setting up a pin for shopping with Alexa as well as with “other sensitive smart-home requests.” In addition, you can also mute Alexa, disconnect­ing the microphone.

Researcher­s claim that the microphone­s need to be completely redesigned to remedy the problem, and covering the microphone in do-it-yourself ways will not protect users from malicious command injections.

Daniel Genkin, one of the paper’s co-authors and an assistant professor at the University of Michigan, told the Times that there is an easy fix for the time being: Leave your voice-controlled assistant out of the line of sight from outside your home, “and don’t give it access to anything you don’t want someone else to access.”

Newspapers in English

Newspapers from Israel