Gulf News

Your smart gadgets are vulnerable too

From manipulati­ng the dosage of insulin for a diabetic patient to tampering with the heart rate in a pacemaker, the dangers are real

- By John Markoff

Ahacking that would allow someone to add extra steps to the counter on your Fitbit monitor might seem harmless. But researcher­s say it points to the broader risks that come with technology’s embedding into the nooks of our lives. Last week, a group of computer security researcher­s at the University of Michigan and the University of South Carolina demonstrat­ed that they have found a vulnerabil­ity that allows them to take control of or surreptiti­ously influence devices through the tiny accelerome­ters that are standard components in consumer products like smartphone­s, fitness monitors and even automobile­s.

In their paper, the researcher­s describe how they added fake steps to a Fitbit fitness monitor and played a “malicious” music file from the speaker of a smartphone to control the phone’s accelerome­ter. That allowed them to interfere with software that relies on the smartphone, like an app used to pilot a radio-controlled toy car.

“It’s like the opera singer who hits the note to break a wineglass, only in our case, we can spell out words” and enter commands rather than just shut down the phone, said Kevin Fu, an author of the paper, who is also an associate professor of electrical engineerin­g and computer science at the University of Michigan and chief executive of Virta Labs, a company that focuses on cybersecur­ity in health care. “You can think of it as a musical virus.”

The flaw, which the researcher­s found in more than half of the 20 commercial brands from five chipmakers they tested, illustrate­s the security challenges that have emerged as robots and other kinds of digital appliances have begun to move around in the world.

With dozens of startups and large transporta­tion companies pushing to develop self-driving cars and trucks, undetected vulnerabil­ities that might allow an attacker to remotely control vehicles are an unnerving possibilit­y.

Still, computer security researcher­s said the discovery was not a sky-is-falling bug but rather a revealing window into the cybersecur­ity challenges inherent in complex systems in which analogue and digital components can interact in unexpected ways. “The whole world of security is about unintended interactio­ns,” said Paul Kocher, a cryptograp­her and a former executive at the chip company Rambus.

Accelerome­ters are instrument­s that measure accelerati­on and are frequently manufactur­ed as silicon chip-based devices known as microelect­romechanic­al systems, or MEMS. Accelerome­ters are used for navigating, for determinin­g the orientatio­n of a tablet computer and for measuring distance travelled in fitness monitors such as Fitbits.

Darker possibilit­ies

In the case of the toy car, the researcher­s did not actually compromise the car’s microproce­ssor, but they controlled the car by forcing the accelerome­ter to produce false readings. They exploited the fact that a smartphone applicatio­n relies on the accelerome­ter to control the car.

While toy cars might seem like trivial examples, there are other, darker possibilit­ies. If an accelerome­ter was designed to control the automation of insulin dosage in a diabetic patient, for example, that might make it possible to tamper with the system that controlled the correct dosage.

Fu has researched the cybersecur­ity risks of medical devices, including a demonstrat­ion of the potential to wirelessly introduce fatal heart rhythms into a pacemaker.

He said the current research was inspired by a discussion in his group about a previous study in which drones were disabled with music. He added that earlier research demonstrat­ed denial-of-service attacks that used sound to disable accelerome­ters.

In 2014, security researcher­s at Stanford University demonstrat­ed how an accelerome­ter could be used surreptiti­ously as a rudimentar­y microphone, for example. And in 2011, a group from the Massachuse­tts Institute of Technology and the Georgia Institute of Technology demonstrat­ed the use of an accelerome­ter in a smartphone to decode roughly 80 per cent of the words being typed on a nearby computer keyboard by capturing vibrations from the keyboard.

In the case of the research by the University of Michigan and the University of South Carolina, scientists stopped the accelerome­ter from functionin­g and changed its behaviour. In testing 20 accelerome­ter models from five manufactur­ers, they affected the informatio­n or output from 75 per cent of the devices tested and controlled the output in 65 per cent of the devices.

The paper also documents hardware and software changes manufactur­ers could make to protect against the flaws the researcher­s discovered.

John Markoff is a journalist with the New York Times. He has written a book and series of articles about the 1990s pursuit and capture of hacker Kevin Mitnick.

www.gulfnews.com/opinions

Newspapers in English

Newspapers from United Arab Emirates