Tất cả các thiết bị của bạn có thể bị hack – Avi Rubin

All your devices can be hacked - Avi Rubin
play-sharp-fill

All your devices can be hacked - Avi Rubin

 


[Music]
[Music] [Music] [Applause] [Applause] [Applause] I'm<00:00:16.600> a<00:00:17.119> computer<00:00:17.520> science<00:00:18.000> professor<00:00:19.000> and<00:00:19.240> my I'm a computer science professor and my I'm a computer science professor and my area<00:00:19.640> of<00:00:19.840> expertise<00:00:20.680> is<00:00:21.320> computer<00:00:21.640> and area of expertise is computer and area of expertise is computer and information information information security<00:00:24.000> when<00:00:24.080> I<00:00:24.160> was<00:00:24.279> in<00:00:24.480> graduate<00:00:24.960> school<00:00:25.800> I security when I was in graduate school I security when I was in graduate school I had<00:00:26.080> the<00:00:26.240> opportunity<00:00:26.920> to<00:00:27.119> overhear<00:00:27.679> my had the opportunity to overhear my had the opportunity to overhear my grandmother<00:00:29.000> uh<00:00:29.160> describing<00:00:29.599> to<00:00:29.759> one<00:00:30.080> of<00:00:30.240> her grandmother uh describing to one of her grandmother uh describing to one of her uh<00:00:30.960> fellow<00:00:31.279> senior<00:00:31.800> citizens<00:00:32.800> uh<00:00:32.920> what<00:00:33.040> I<00:00:33.160> did uh fellow senior citizens uh what I did uh fellow senior citizens uh what I did for<00:00:33.440> a for a for a living living living apparently<00:00:37.120> I<00:00:37.200> was<00:00:37.360> in<00:00:37.520> charge<00:00:37.800> of<00:00:38.000> making apparently I was in charge of making apparently I was in charge of making sure<00:00:38.399> that<00:00:38.520> no<00:00:38.640> one<00:00:38.760> stole<00:00:39.040> the<00:00:39.160> computers sure that no one stole the computers sure that no one stole the computers from<00:00:39.719> the from the from the University<00:00:42.399> and<00:00:42.680> you<00:00:42.800> know<00:00:43.360> that's<00:00:43.520> a University and you know that's a University and you know that's a perfectly<00:00:44.239> reasonable<00:00:44.840> thing<00:00:45.120> for<00:00:45.320> her<00:00:45.480> to perfectly reasonable thing for her to perfectly reasonable thing for her to think<00:00:46.039> because<00:00:46.239> I<00:00:46.320> told<00:00:46.520> her<00:00:46.680> I<00:00:46.760> was<00:00:46.879> working think because I told her I was working think because I told her I was working in<00:00:47.239> computer<00:00:47.760> security<00:00:48.760> and<00:00:48.960> it<00:00:49.039> was in computer security and it was in computer security and it was interesting<00:00:49.600> to<00:00:49.760> get<00:00:49.879> her interesting to get her interesting to get her perspective<00:00:52.199> but<00:00:52.879> that's<00:00:53.120> not<00:00:53.280> the<00:00:53.399> most perspective but that's not the most perspective but that's not the most ridiculous<00:00:54.239> thing<00:00:54.399> I've<00:00:54.520> ever<00:00:54.680> heard<00:00:54.879> anyone ridiculous thing I've ever heard anyone ridiculous thing I've ever heard anyone say<00:00:55.440> about<00:00:55.640> my<00:00:55.920> work<00:00:56.920> the<00:00:57.039> most<00:00:57.280> ridiculous say about my work the most ridiculous say about my work the most ridiculous thing<00:00:57.920> I<00:00:58.079> ever<00:00:58.280> heard<00:00:58.840> is<00:00:59.000> I<00:00:59.079> was<00:00:59.199> at<00:00:59.280> a<00:00:59.359> dinner thing I ever heard is I was at a dinner thing I ever heard is I was at a dinner party party party and<00:01:01.519> a<00:01:01.640> woman<00:01:01.960> heard<00:01:02.239> that<00:01:02.359> I<00:01:02.440> work<00:01:02.640> in and a woman heard that I work in and a woman heard that I work in computer<00:01:03.199> security<00:01:04.119> and<00:01:04.280> she<00:01:04.519> asked<00:01:04.839> me<00:01:05.640> if<00:01:06.200> um computer security and she asked me if um computer security and she asked me if um she<00:01:06.520> said<00:01:06.720> her<00:01:06.840> computer<00:01:07.159> had<00:01:07.280> been<00:01:07.439> infected she said her computer had been infected she said her computer had been infected by<00:01:08.000> a<00:01:08.159> virus<00:01:09.080> and<00:01:09.200> she<00:01:09.320> was<00:01:09.560> very<00:01:09.799> concerned by a virus and she was very concerned by a virus and she was very concerned that<00:01:10.840> she<00:01:11.040> might<00:01:11.240> get<00:01:11.400> sick<00:01:11.640> from<00:01:11.840> it<00:01:12.080> that<00:01:12.200> she that she might get sick from it that she that she might get sick from it that she could<00:01:12.520> get<00:01:12.680> this could get this could get this virus<00:01:14.759> and<00:01:15.000> I'm<00:01:15.119> not<00:01:15.240> a<00:01:15.439> doctor<00:01:16.439> but<00:01:17.040> I virus and I'm not a doctor but I virus and I'm not a doctor but I reassured<00:01:17.720> her<00:01:18.080> that<00:01:18.200> it<00:01:18.320> was<00:01:18.640> very<00:01:18.880> very reassured her that it was very very reassured her that it was very very unlikely<00:01:19.600> that<00:01:19.759> this<00:01:19.880> would unlikely that this would unlikely that this would happen<00:01:21.600> but<00:01:21.720> if<00:01:21.840> she<00:01:21.960> felt<00:01:22.200> more<00:01:22.439> comfortable happen but if she felt more comfortable happen but if she felt more comfortable she<00:01:23.119> could<00:01:23.280> be<00:01:23.400> free<00:01:23.640> to<00:01:23.759> use<00:01:24.040> latex<00:01:24.479> gloves she could be free to use latex gloves she could be free to use latex gloves when<00:01:24.920> she<00:01:25.040> was<00:01:25.159> on<00:01:25.280> the<00:01:25.400> computer<00:01:25.720> and when she was on the computer and when she was on the computer and there'll<00:01:26.000> be<00:01:26.159> no<00:01:26.360> harm<00:01:26.840> whatsoever<00:01:27.400> in there'll be no harm whatsoever in there'll be no harm whatsoever in that<00:01:29.200> I'm<00:01:29.280> going<00:01:29.400> to<00:01:29.520> get<00:01:29.680> back<00:01:30.000> to<00:01:30.159> this that I'm going to get back to this that I'm going to get back to this notion<00:01:30.640> of<00:01:30.799> being<00:01:31.000> able<00:01:31.200> to<00:01:31.360> get<00:01:31.479> a<00:01:31.640> virus<00:01:32.200> from notion of being able to get a virus from notion of being able to get a virus from your<00:01:32.560> computer<00:01:33.399> in<00:01:33.520> a<00:01:33.680> serious<00:01:34.119> way<00:01:35.000> what<00:01:35.119> I'm your computer in a serious way what I'm your computer in a serious way what I'm going<00:01:35.320> to<00:01:35.479> talk<00:01:35.640> to<00:01:35.720> you<00:01:35.880> about<00:01:36.119> today<00:01:36.840> are going to talk to you about today are going to talk to you about today are some<00:01:38.119> hacks<00:01:38.640> some<00:01:38.840> real<00:01:39.200> world<00:01:39.600> world<00:01:39.960> cyber some hacks some real world world cyber some hacks some real world world cyber attacks<00:01:41.200> that<00:01:41.360> people<00:01:41.600> in<00:01:41.759> my<00:01:41.960> community<00:01:42.479> the attacks that people in my community the attacks that people in my community the academic<00:01:43.159> research<00:01:43.759> Community<00:01:44.759> have academic research Community have academic research Community have performed<00:01:45.799> which<00:01:46.040> I<00:01:46.119> don't<00:01:46.399> think<00:01:46.799> most performed which I don't think most performed which I don't think most people<00:01:47.320> know<00:01:47.560> about<00:01:48.040> and<00:01:48.159> I<00:01:48.240> think<00:01:48.360> they're people know about and I think they're people know about and I think they're very<00:01:48.840> interesting<00:01:49.520> and very interesting and very interesting and scary<00:01:51.320> and<00:01:51.719> this<00:01:51.920> talk<00:01:52.119> is<00:01:52.240> kind<00:01:52.360> of<00:01:52.479> a scary and this talk is kind of a scary and this talk is kind of a greatest<00:01:53.079> hits<00:01:53.560> of<00:01:53.759> the<00:01:53.960> academic<00:01:54.680> security greatest hits of the academic security greatest hits of the academic security communities<00:01:55.719> hacks<00:01:56.399> none<00:01:56.600> of<00:01:56.719> the<00:01:56.840> work<00:01:57.000> is<00:01:57.200> my communities hacks none of the work is my communities hacks none of the work is my work<00:01:57.759> it's<00:01:57.920> all<00:01:58.159> work<00:01:58.520> that<00:01:58.719> my<00:01:58.920> colleagues work it's all work that my colleagues work it's all work that my colleagues have<00:01:59.439> done<00:02:00.000> and<00:02:00.119> I<00:02:00.240> actually<00:02:00.439> asked<00:02:00.680> them<00:02:00.799> for have done and I actually asked them for have done and I actually asked them for their<00:02:01.159> slides<00:02:01.520> and<00:02:01.719> Incorporated<00:02:02.280> them<00:02:02.399> into their slides and Incorporated them into their slides and Incorporated them into this<00:02:02.840> talk<00:02:03.560> so<00:02:03.719> the<00:02:03.840> first<00:02:04.000> one<00:02:04.159> I'm<00:02:04.240> going<00:02:04.360> to this talk so the first one I'm going to this talk so the first one I'm going to talk<00:02:04.680> about<00:02:05.000> are<00:02:05.200> implanted<00:02:05.719> medical<00:02:06.520> devices talk about are implanted medical devices talk about are implanted medical devices now<00:02:07.680> medical<00:02:08.080> devices<00:02:08.759> have<00:02:08.959> come<00:02:09.119> a<00:02:09.239> long<00:02:09.479> way now medical devices have come a long way now medical devices have come a long way technologically<00:02:10.759> you<00:02:10.879> can<00:02:11.000> see<00:02:11.239> in<00:02:11.400> 1926<00:02:12.400> the technologically you can see in 1926 the technologically you can see in 1926 the first<00:02:12.840> pacemaker<00:02:13.440> was<00:02:13.760> invented<00:02:14.760> 1960<00:02:15.680> the first pacemaker was invented 1960 the first pacemaker was invented 1960 the first<00:02:16.239> internal<00:02:16.720> pacemaker<00:02:17.239> was<00:02:17.400> implanted first internal pacemaker was implanted first internal pacemaker was implanted hopefully<00:02:18.280> a<00:02:18.360> little<00:02:18.560> smaller<00:02:18.920> than<00:02:19.080> that<00:02:19.200> one hopefully a little smaller than that one hopefully a little smaller than that one that<00:02:19.440> you<00:02:19.560> see<00:02:19.959> there<00:02:20.959> and<00:02:21.599> technology<00:02:22.280> has that you see there and technology has that you see there and technology has continued<00:02:22.959> to<00:02:23.080> move<00:02:23.319> forward<00:02:24.280> in<00:02:24.720> 2006<00:02:25.480> we<00:02:25.599> hit continued to move forward in 2006 we hit continued to move forward in 2006 we hit an<00:02:25.959> important<00:02:26.400> Milestone<00:02:27.080> from<00:02:27.239> the an important Milestone from the an important Milestone from the perspective<00:02:28.640> of<00:02:29.640> of<00:02:29.959> computer<00:02:30.400> security<00:02:31.360> and perspective of of computer security and perspective of of computer security and why<00:02:31.640> do<00:02:31.760> I<00:02:31.920> say<00:02:32.200> that<00:02:32.760> because<00:02:33.080> that's<00:02:33.280> when why do I say that because that's when why do I say that because that's when implanted<00:02:34.120> devices<00:02:34.560> inste<00:02:34.959> of<00:02:35.160> people implanted devices inste of people implanted devices inste of people started<00:02:36.080> to<00:02:36.200> have<00:02:36.360> networking started to have networking started to have networking capabilities<00:02:38.440> one<00:02:38.599> thing<00:02:38.840> that<00:02:38.959> brings<00:02:39.200> us capabilities one thing that brings us capabilities one thing that brings us close<00:02:39.640> to<00:02:39.760> home<00:02:39.959> as<00:02:40.120> we<00:02:40.280> look<00:02:40.400> at<00:02:40.599> Dick close to home as we look at Dick close to home as we look at Dick Cheney's<00:02:41.680> uh<00:02:41.840> device<00:02:42.200> he<00:02:42.319> had<00:02:42.400> a<00:02:42.599> device<00:02:43.040> that Cheney's uh device he had a device that Cheney's uh device he had a device that pumped<00:02:43.599> blood<00:02:44.360> from<00:02:44.519> an<00:02:44.680> aorta<00:02:45.400> to<00:02:45.560> another pumped blood from an aorta to another pumped blood from an aorta to another part<00:02:46.040> of<00:02:46.159> the<00:02:46.280> heart<00:02:46.760> and<00:02:46.879> as<00:02:47.000> you<00:02:47.080> could<00:02:47.200> see part of the heart and as you could see part of the heart and as you could see at<00:02:47.480> the<00:02:47.599> bottom<00:02:48.000> there<00:02:48.440> it<00:02:48.560> was<00:02:48.800> controlled<00:02:49.480> by at the bottom there it was controlled by at the bottom there it was controlled by a<00:02:49.800> computer<00:02:50.200> controller<00:02:51.080> and<00:02:51.200> if<00:02:51.280> you<00:02:51.440> ever a computer controller and if you ever a computer controller and if you ever thought<00:02:52.280> that<00:02:52.800> software<00:02:53.239> reliability<00:02:53.920> was thought that software reliability was thought that software reliability was very<00:02:54.319> important<00:02:54.800> get<00:02:54.959> one<00:02:55.080> of<00:02:55.200> these<00:02:55.400> inside very important get one of these inside very important get one of these inside of of of you<00:02:57.519> now<00:02:57.680> what<00:02:57.800> a<00:02:57.959> research<00:02:58.360> team<00:02:58.760> did<00:02:59.519> um<00:02:59.959> was you now what a research team did um was you now what a research team did um was they<00:03:00.440> got<00:03:00.640> their<00:03:00.840> hands<00:03:01.080> on<00:03:01.239> what's<00:03:01.400> called<00:03:01.560> an they got their hands on what's called an they got their hands on what's called an ICD<00:03:02.360> this<00:03:02.440> is<00:03:02.560> a<00:03:02.720> defibrillator<00:03:03.680> and<00:03:03.799> this<00:03:03.920> is ICD this is a defibrillator and this is ICD this is a defibrillator and this is a<00:03:04.239> device<00:03:04.680> that<00:03:04.879> goes<00:03:05.280> into<00:03:06.000> a<00:03:06.200> person<00:03:06.720> to a device that goes into a person to a device that goes into a person to control<00:03:07.640> their<00:03:07.879> heart<00:03:08.080> rhythm<00:03:08.760> and<00:03:08.879> these control their heart rhythm and these control their heart rhythm and these have<00:03:09.159> saved<00:03:09.519> many<00:03:10.040> lives<00:03:11.040> well<00:03:11.519> in<00:03:11.640> order<00:03:11.920> to have saved many lives well in order to have saved many lives well in order to not<00:03:12.319> have<00:03:12.440> to<00:03:12.599> open<00:03:12.840> up<00:03:13.040> the<00:03:13.159> person<00:03:13.519> every not have to open up the person every not have to open up the person every time<00:03:13.840> you<00:03:13.959> want<00:03:14.080> to<00:03:14.239> reprogram<00:03:14.799> their<00:03:15.000> device time you want to reprogram their device time you want to reprogram their device or<00:03:15.799> do<00:03:15.959> some<00:03:16.120> Diagnostics<00:03:16.760> on<00:03:16.920> it<00:03:17.239> they<00:03:17.360> made or do some Diagnostics on it they made or do some Diagnostics on it they made the<00:03:17.680> thing<00:03:17.879> be<00:03:18.000> able<00:03:18.200> to<00:03:18.360> communicate the thing be able to communicate the thing be able to communicate wirelessly<00:03:20.080> and<00:03:20.200> what<00:03:20.319> this<00:03:20.480> research<00:03:20.840> team wirelessly and what this research team wirelessly and what this research team did<00:03:21.400> is<00:03:21.599> they<00:03:21.720> reverse<00:03:22.080> engineered<00:03:22.560> the did is they reverse engineered the did is they reverse engineered the wireless<00:03:23.120> protocol<00:03:23.920> and<00:03:24.040> they<00:03:24.159> built<00:03:24.360> a wireless protocol and they built a wireless protocol and they built a device<00:03:24.799> you<00:03:24.920> see<00:03:25.159> pictured<00:03:25.599> here<00:03:25.799> with<00:03:25.920> a device you see pictured here with a device you see pictured here with a little<00:03:26.280> antenna<00:03:27.200> that<00:03:27.319> could<00:03:27.519> talk<00:03:27.799> the little antenna that could talk the little antenna that could talk the protocol<00:03:28.439> to<00:03:28.599> the<00:03:28.799> device<00:03:30.000> and<00:03:30.599> um<00:03:31.239> and<00:03:31.439> thus protocol to the device and um and thus protocol to the device and um and thus control<00:03:32.480> it<00:03:33.480> in<00:03:33.599> order<00:03:33.879> to<00:03:34.040> make<00:03:34.200> their control it in order to make their control it in order to make their experience<00:03:34.799> real<00:03:35.000> they<00:03:35.080> were<00:03:35.239> unable<00:03:35.519> to<00:03:35.640> find experience real they were unable to find experience real they were unable to find any<00:03:36.040> volunteers<00:03:36.879> and<00:03:37.000> so<00:03:37.239> they<00:03:37.400> went<00:03:38.000> and<00:03:38.080> they any volunteers and so they went and they any volunteers and so they went and they got<00:03:38.360> some<00:03:38.560> ground<00:03:38.879> beef<00:03:39.400> and<00:03:39.560> some<00:03:39.760> bacon<00:03:40.120> and got some ground beef and some bacon and got some ground beef and some bacon and they<00:03:40.319> wrapped<00:03:40.640> it<00:03:40.799> all<00:03:40.959> up<00:03:41.200> to<00:03:41.400> about<00:03:41.640> the<00:03:41.840> size they wrapped it all up to about the size they wrapped it all up to about the size of<00:03:42.239> a<00:03:42.400> human<00:03:42.640> being's<00:03:43.439> uh<00:03:43.599> area<00:03:43.920> where<00:03:44.080> the of a human being's uh area where the of a human being's uh area where the device<00:03:44.519> would<00:03:44.680> go<00:03:44.840> and<00:03:44.920> they<00:03:45.040> stuck<00:03:45.319> the device would go and they stuck the device would go and they stuck the device<00:03:45.760> inside<00:03:46.080> it<00:03:46.280> to<00:03:46.439> perform<00:03:46.760> their device inside it to perform their device inside it to perform their experiment<00:03:47.439> somewhat experiment somewhat experiment somewhat realistically<00:03:49.480> um<00:03:49.879> they<00:03:50.000> launched<00:03:50.480> many<00:03:50.760> many realistically um they launched many many realistically um they launched many many successful<00:03:51.640> attacks<00:03:52.640> uh<00:03:52.840> one<00:03:53.040> that<00:03:53.159> I'll successful attacks uh one that I'll successful attacks uh one that I'll highlight<00:03:53.680> here<00:03:53.840> is<00:03:54.000> changing<00:03:54.319> the<00:03:54.480> patient's highlight here is changing the patient's highlight here is changing the patient's name<00:03:55.400> I<00:03:55.439> don't<00:03:55.599> know<00:03:55.760> why<00:03:55.879> you<00:03:55.959> would<00:03:56.079> want<00:03:56.159> to name I don't know why you would want to name I don't know why you would want to do<00:03:56.480> that<00:03:56.640> but<00:03:56.760> I<00:03:56.840> sure<00:03:57.040> wouldn't<00:03:57.239> want<00:03:57.439> that do that but I sure wouldn't want that do that but I sure wouldn't want that done<00:03:57.720> to<00:03:58.000> me<00:03:59.000> and<00:03:59.280> they<00:03:59.400> were<00:03:59.519> able<00:03:59.920> to<00:04:00.000> change done to me and they were able to change done to me and they were able to change therapies<00:04:01.120> including<00:04:01.599> disabling<00:04:02.159> the<00:04:02.319> device therapies including disabling the device therapies including disabling the device and<00:04:03.040> this<00:04:03.120> is<00:04:03.280> with<00:04:03.400> a<00:04:03.519> real<00:04:03.760> commercial and this is with a real commercial and this is with a real commercial off-the-shelf<00:04:04.760> device<00:04:05.400> simply<00:04:05.799> by off-the-shelf device simply by off-the-shelf device simply by performing<00:04:06.439> reverse<00:04:06.760> engineering<00:04:07.200> and performing reverse engineering and performing reverse engineering and sending<00:04:07.680> Wireless<00:04:08.079> signals<00:04:08.480> to sending Wireless signals to sending Wireless signals to it<00:04:10.920> uh<00:04:11.040> there<00:04:11.120> was<00:04:11.239> a<00:04:11.360> piece<00:04:11.519> on<00:04:11.680> NPR<00:04:12.560> that<00:04:12.840> some it uh there was a piece on NPR that some it uh there was a piece on NPR that some of<00:04:13.200> these<00:04:13.519> icds<00:04:14.319> could<00:04:14.560> actually<00:04:15.120> have<00:04:15.280> their of these icds could actually have their of these icds could actually have their performance<00:04:16.120> disrupted<00:04:16.680> simply<00:04:17.000> by<00:04:17.120> holding performance disrupted simply by holding performance disrupted simply by holding a<00:04:17.519> pair<00:04:17.680> of<00:04:17.759> headphones<00:04:18.199> onto<00:04:19.000> them<00:04:20.000> now a pair of headphones onto them now a pair of headphones onto them now Wireless<00:04:20.759> and<00:04:20.919> the<00:04:21.000> internet<00:04:21.440> can<00:04:21.600> improve Wireless and the internet can improve Wireless and the internet can improve Healthcare<00:04:22.360> greatly<00:04:23.040> there<00:04:23.160> are<00:04:23.280> several Healthcare greatly there are several Healthcare greatly there are several examples<00:04:24.040> up<00:04:24.199> on<00:04:24.360> the<00:04:24.520> screen<00:04:25.280> of<00:04:25.639> situations examples up on the screen of situations examples up on the screen of situations where<00:04:26.440> doctors<00:04:26.759> are<00:04:26.960> looking<00:04:27.320> to<00:04:27.759> implant where doctors are looking to implant where doctors are looking to implant devices<00:04:28.600> inside<00:04:28.919> of<00:04:29.120> people<00:04:29.720> and<00:04:29.880> all<00:04:30.039> of devices inside of people and all of devices inside of people and all of these<00:04:30.400> devices<00:04:30.960> now<00:04:31.199> it's<00:04:31.440> standard<00:04:32.199> that these devices now it's standard that these devices now it's standard that they<00:04:32.520> communicate<00:04:33.600> wirelessly<00:04:34.600> and<00:04:34.759> I<00:04:34.880> think they communicate wirelessly and I think they communicate wirelessly and I think this<00:04:35.199> is<00:04:35.479> great<00:04:36.039> but<00:04:36.199> without<00:04:36.440> a<00:04:36.639> full this is great but without a full this is great but without a full understanding<00:04:37.440> of<00:04:37.680> trustworthy<00:04:38.440> Computing understanding of trustworthy Computing understanding of trustworthy Computing and<00:04:39.240> without<00:04:39.840> understanding<00:04:40.199> what<00:04:40.400> attackers and without understanding what attackers and without understanding what attackers can<00:04:41.000> do<00:04:41.320> and<00:04:41.440> the<00:04:41.560> security<00:04:41.960> risks<00:04:42.280> from<00:04:42.440> the can do and the security risks from the can do and the security risks from the beginning<00:04:43.199> there's<00:04:43.360> a<00:04:43.479> lot<00:04:43.600> of<00:04:43.720> danger<00:04:44.080> in beginning there's a lot of danger in beginning there's a lot of danger in this<00:04:45.560> okay<00:04:45.720> let<00:04:45.800> me<00:04:45.880> shift<00:04:46.120> gears<00:04:46.360> and<00:04:46.479> show this okay let me shift gears and show this okay let me shift gears and show you<00:04:46.840> another<00:04:47.080> Target<00:04:47.400> I'm<00:04:47.479> going<00:04:47.560> to<00:04:47.680> show<00:04:47.840> you you another Target I'm going to show you you another Target I'm going to show you a<00:04:48.080> few<00:04:48.320> different<00:04:48.680> targets<00:04:49.120> like<00:04:49.320> this<00:04:49.479> and a few different targets like this and a few different targets like this and that's<00:04:49.919> my<00:04:50.080> talk<00:04:50.639> so<00:04:50.759> we'll<00:04:50.960> look<00:04:51.080> at that's my talk so we'll look at that's my talk so we'll look at automobiles<00:04:52.880> this<00:04:53.039> is<00:04:53.160> a<00:04:53.400> car<00:04:53.919> and<00:04:54.039> it<00:04:54.160> has<00:04:54.280> a automobiles this is a car and it has a automobiles this is a car and it has a lot<00:04:54.520> of<00:04:54.680> components<00:04:55.120> a<00:04:55.240> lot<00:04:55.360> of<00:04:55.520> electronics lot of components a lot of electronics lot of components a lot of electronics in<00:04:56.160> it<00:04:56.320> today<00:04:57.039> in<00:04:57.280> fact<00:04:57.960> it's<00:04:58.240> got<00:04:58.720> many<00:04:59.039> many in it today in fact it's got many many in it today in fact it's got many many different<00:04:59.919> computers<00:05:00.400> inside<00:05:00.720> of<00:05:00.880> it<00:05:01.240> more different computers inside of it more different computers inside of it more penum<00:05:02.240> than<00:05:02.440> my<00:05:02.600> lab<00:05:02.880> did<00:05:03.039> when<00:05:03.160> I<00:05:03.240> was<00:05:03.360> in penum than my lab did when I was in penum than my lab did when I was in college<00:05:05.039> and<00:05:05.320> they're<00:05:05.520> connected<00:05:05.960> by<00:05:06.080> a<00:05:06.199> wired college and they're connected by a wired college and they're connected by a wired Network<00:05:07.960> there's<00:05:08.320> also<00:05:09.199> a<00:05:09.400> wireless<00:05:09.960> network Network there's also a wireless network Network there's also a wireless network in<00:05:10.800> the<00:05:11.000> car<00:05:11.800> which<00:05:12.039> can<00:05:12.240> be<00:05:12.560> reached<00:05:12.960> from in the car which can be reached from in the car which can be reached from many<00:05:13.400> different<00:05:13.720> ways<00:05:14.600> so<00:05:14.800> there's<00:05:15.080> Bluetooth many different ways so there's Bluetooth many different ways so there's Bluetooth there's<00:05:16.320> the<00:05:16.479> FM<00:05:16.880> and<00:05:17.039> XM<00:05:17.479> radio<00:05:18.319> there's there's the FM and XM radio there's there's the FM and XM radio there's actually<00:05:19.199> Wi-Fi<00:05:20.160> there<00:05:20.240> are<00:05:20.360> sensors<00:05:20.720> in<00:05:20.840> the actually Wi-Fi there are sensors in the actually Wi-Fi there are sensors in the wheels<00:05:21.240> that<00:05:21.400> wirelessly<00:05:22.039> communicate<00:05:22.479> the wheels that wirelessly communicate the wheels that wirelessly communicate the tire<00:05:22.919> pressure<00:05:23.360> to<00:05:23.600> a<00:05:23.759> controller<00:05:24.160> on<00:05:24.360> board tire pressure to a controller on board tire pressure to a controller on board the<00:05:25.319> modern<00:05:25.960> car<00:05:26.880> is<00:05:27.000> a<00:05:27.199> sophisticated the modern car is a sophisticated the modern car is a sophisticated multi-computer<00:05:28.600> device multi-computer device multi-computer device and<00:05:30.319> what<00:05:30.520> happens<00:05:31.199> if<00:05:31.840> somebody<00:05:32.240> wanted<00:05:32.479> to and what happens if somebody wanted to and what happens if somebody wanted to attack<00:05:33.080> this<00:05:33.400> well<00:05:33.600> that's<00:05:33.759> what<00:05:33.880> the attack this well that's what the attack this well that's what the researchers<00:05:34.600> that<00:05:34.720> I'm<00:05:34.840> going<00:05:34.919> to<00:05:35.039> talk<00:05:35.199> about researchers that I'm going to talk about researchers that I'm going to talk about today<00:05:35.960> did<00:05:36.960> they<00:05:37.160> basically<00:05:37.680> stuck<00:05:37.840> an today did they basically stuck an today did they basically stuck an attacker<00:05:38.440> on<00:05:38.560> the<00:05:38.680> wired<00:05:39.000> network<00:05:39.560> and<00:05:39.720> on<00:05:39.840> the attacker on the wired network and on the attacker on the wired network and on the wireless wireless wireless network<00:05:42.199> now<00:05:42.360> they<00:05:42.520> have<00:05:42.720> two<00:05:43.600> uh<00:05:43.720> areas<00:05:44.039> they network now they have two uh areas they network now they have two uh areas they can<00:05:44.360> attack<00:05:44.680> one<00:05:44.840> is<00:05:44.960> short-<00:05:45.199> range<00:05:45.440> Wireless can attack one is short- range Wireless can attack one is short- range Wireless where<00:05:46.120> you<00:05:46.240> can<00:05:46.440> actually<00:05:46.720> communicate<00:05:47.160> with where you can actually communicate with where you can actually communicate with device<00:05:47.720> from<00:05:47.919> nearby<00:05:48.440> either<00:05:48.639> through device from nearby either through device from nearby either through Bluetooth<00:05:49.360> or<00:05:49.639> Wi-Fi<00:05:50.639> and<00:05:50.759> the<00:05:50.840> other<00:05:51.039> is<00:05:51.199> long Bluetooth or Wi-Fi and the other is long Bluetooth or Wi-Fi and the other is long range<00:05:51.840> where<00:05:52.000> you<00:05:52.120> can<00:05:52.319> communicate<00:05:52.800> with<00:05:52.960> the range where you can communicate with the range where you can communicate with the car<00:05:53.280> through<00:05:53.520> the<00:05:53.720> cellular<00:05:54.120> network<00:05:54.600> or car through the cellular network or car through the cellular network or through<00:05:54.960> one<00:05:55.039> of<00:05:55.160> the<00:05:55.280> radio<00:05:55.880> stations<00:05:56.880> think through one of the radio stations think through one of the radio stations think about<00:05:57.240> it<00:05:57.400> when<00:05:57.520> a<00:05:57.639> car<00:05:58.080> receives<00:05:58.240> a<00:05:58.440> radio about it when a car receives a radio about it when a car receives a radio signal<00:06:00.120> it's<00:06:00.440> processed<00:06:00.960> by<00:06:01.199> software<00:06:01.960> that signal it's processed by software that signal it's processed by software that software<00:06:02.520> has<00:06:02.639> to<00:06:02.840> receive<00:06:03.360> and<00:06:03.520> decode<00:06:03.919> the software has to receive and decode the software has to receive and decode the radio<00:06:04.319> signal<00:06:04.639> and<00:06:04.759> then<00:06:04.880> figure<00:06:05.120> out<00:06:05.280> what<00:06:05.360> to radio signal and then figure out what to radio signal and then figure out what to do<00:06:05.639> with<00:06:05.759> it<00:06:05.960> even<00:06:06.160> if<00:06:06.280> it's<00:06:06.479> just<00:06:06.680> music<00:06:06.960> that do with it even if it's just music that do with it even if it's just music that it<00:06:07.160> needs<00:06:07.360> to<00:06:07.440> play<00:06:07.680> on<00:06:07.759> the<00:06:07.880> radio<00:06:08.720> and<00:06:08.919> that it needs to play on the radio and that it needs to play on the radio and that software<00:06:09.919> that<00:06:10.080> does<00:06:10.360> that<00:06:10.520> decoding<00:06:11.479> if<00:06:11.560> it software that does that decoding if it software that does that decoding if it has<00:06:11.919> any<00:06:12.120> bugs<00:06:12.400> in<00:06:12.560> it<00:06:13.319> could<00:06:13.479> create<00:06:13.720> a has any bugs in it could create a has any bugs in it could create a vulnerability<00:06:14.599> for<00:06:14.800> somebody<00:06:15.319> to<00:06:15.599> hack<00:06:15.800> the vulnerability for somebody to hack the vulnerability for somebody to hack the car<00:06:17.199> the<00:06:17.360> way<00:06:17.560> that<00:06:17.680> the<00:06:17.840> researchers<00:06:18.479> did car the way that the researchers did car the way that the researchers did this<00:06:18.919> work<00:06:19.800> is<00:06:20.400> they<00:06:20.599> read<00:06:21.240> the<00:06:21.479> software<00:06:22.199> in this work is they read the software in this work is they read the software in in<00:06:22.960> the<00:06:23.680> computer<00:06:24.160> chips<00:06:24.560> that<00:06:24.639> were<00:06:24.840> in<00:06:24.960> the in the computer chips that were in the in the computer chips that were in the car<00:06:25.880> and<00:06:26.000> then<00:06:26.120> they<00:06:26.240> Ed<00:06:26.560> sophisticated car and then they Ed sophisticated car and then they Ed sophisticated reverse<00:06:27.720> engineering<00:06:28.280> tools<00:06:29.000> to<00:06:29.160> figure<00:06:29.400> out reverse engineering tools to figure out reverse engineering tools to figure out what<00:06:29.880> that<00:06:30.039> software<00:06:30.560> did<00:06:31.319> and<00:06:31.479> then<00:06:31.639> they what that software did and then they what that software did and then they found<00:06:32.039> vulnerabilities<00:06:32.759> in<00:06:32.960> that<00:06:33.160> software found vulnerabilities in that software found vulnerabilities in that software and<00:06:34.039> then<00:06:34.199> they<00:06:34.319> built<00:06:34.680> exploits<00:06:35.280> to<00:06:35.479> exploit and then they built exploits to exploit and then they built exploits to exploit those<00:06:37.520> they<00:06:37.800> actually<00:06:38.199> carried<00:06:38.479> out<00:06:38.680> their those they actually carried out their those they actually carried out their attack<00:06:39.400> in<00:06:39.560> real<00:06:39.759> life<00:06:39.960> they<00:06:40.080> bought<00:06:40.280> two<00:06:40.479> cars attack in real life they bought two cars attack in real life they bought two cars and<00:06:41.000> I<00:06:41.120> guess<00:06:41.280> they<00:06:41.400> have<00:06:41.560> better<00:06:41.759> budgets and I guess they have better budgets and I guess they have better budgets than<00:06:42.280> I than I than I do<00:06:44.080> the<00:06:44.199> first<00:06:44.479> threat<00:06:44.759> model<00:06:45.080> was<00:06:45.240> to<00:06:45.360> see do the first threat model was to see do the first threat model was to see what<00:06:46.039> someone<00:06:46.400> could<00:06:46.560> do<00:06:46.919> if<00:06:47.039> an<00:06:47.240> attacker what someone could do if an attacker what someone could do if an attacker actually<00:06:48.120> got<00:06:48.479> access<00:06:48.960> to<00:06:49.199> the<00:06:49.479> internal actually got access to the internal actually got access to the internal Network<00:06:50.199> on<00:06:50.319> the<00:06:50.479> car<00:06:51.240> okay<00:06:51.400> so<00:06:51.599> think<00:06:51.759> of<00:06:51.919> that Network on the car okay so think of that Network on the car okay so think of that if<00:06:52.199> someone<00:06:52.479> gets<00:06:52.639> to<00:06:52.800> go<00:06:52.919> to<00:06:53.039> your<00:06:53.240> car<00:06:53.720> they if someone gets to go to your car they if someone gets to go to your car they get<00:06:53.960> to<00:06:54.120> mess<00:06:54.360> around<00:06:54.639> with<00:06:54.759> it<00:06:55.240> and<00:06:55.360> then<00:06:55.520> they get to mess around with it and then they get to mess around with it and then they leave<00:06:56.560> and<00:06:56.759> now<00:06:57.160> what<00:06:57.319> kind<00:06:57.440> of<00:06:57.560> trouble<00:06:57.879> are leave and now what kind of trouble are leave and now what kind of trouble are you<00:06:58.199> in<00:06:58.879> the<00:06:59.000> other<00:06:59.240> threat<00:06:59.759> model<00:07:00.160> is<00:07:00.360> that you in the other threat model is that you in the other threat model is that they<00:07:01.080> contact<00:07:01.440> you<00:07:01.560> in<00:07:01.759> real<00:07:02.080> time<00:07:02.400> over<00:07:02.639> one they contact you in real time over one they contact you in real time over one of<00:07:02.919> the<00:07:03.120> wireless<00:07:03.599> networks<00:07:04.000> like<00:07:04.120> the of the wireless networks like the of the wireless networks like the cellular<00:07:04.800> or<00:07:04.960> something<00:07:05.319> like<00:07:05.520> that<00:07:06.000> never cellular or something like that never cellular or something like that never having<00:07:06.759> actually<00:07:07.080> gotten<00:07:07.360> physical<00:07:07.840> access having actually gotten physical access having actually gotten physical access to<00:07:08.240> your to your to your car<00:07:10.160> this<00:07:10.280> is<00:07:10.520> what<00:07:10.680> their<00:07:10.840> setup<00:07:11.240> looks<00:07:11.520> like car this is what their setup looks like car this is what their setup looks like for<00:07:11.919> the<00:07:12.039> first<00:07:12.319> model<00:07:12.680> where<00:07:12.800> you<00:07:12.919> get<00:07:13.039> to for the first model where you get to for the first model where you get to have<00:07:13.360> access<00:07:13.599> to<00:07:13.759> the<00:07:13.919> car<00:07:14.599> they<00:07:14.759> put<00:07:14.919> a<00:07:15.120> laptop have access to the car they put a laptop have access to the car they put a laptop and<00:07:15.960> they<00:07:16.280> connected<00:07:16.720> to<00:07:16.879> the<00:07:17.080> diagnostic and they connected to the diagnostic and they connected to the diagnostic unit<00:07:18.000> on<00:07:18.120> the<00:07:18.199> incar<00:07:18.680> network<00:07:19.520> and<00:07:19.639> they<00:07:19.759> did unit on the incar network and they did unit on the incar network and they did all<00:07:20.080> kinds<00:07:20.240> of<00:07:20.400> silly<00:07:20.759> things<00:07:21.199> like<00:07:21.440> here's<00:07:21.599> a all kinds of silly things like here's a all kinds of silly things like here's a picture<00:07:22.360> of<00:07:22.879> the<00:07:23.039> speedometer<00:07:23.639> showing<00:07:24.240> 140 picture of the speedometer showing 140 picture of the speedometer showing 140 mph<00:07:25.160> when<00:07:25.280> the<00:07:25.360> cars<00:07:25.560> in<00:07:26.080> park<00:07:27.080> once<00:07:27.240> you<00:07:27.400> have mph when the cars in park once you have mph when the cars in park once you have control<00:07:28.080> of<00:07:28.199> the<00:07:28.319> car's<00:07:28.599> computers<00:07:29.000> you<00:07:29.080> can control of the car's computers you can control of the car's computers you can do<00:07:29.319> anything<00:07:29.560> anything<00:07:29.840> now<00:07:29.919> you<00:07:30.039> might<00:07:30.160> say do anything anything now you might say do anything anything now you might say okay<00:07:30.599> that's<00:07:30.800> silly<00:07:31.520> well<00:07:31.680> what<00:07:31.800> if<00:07:31.919> you<00:07:32.080> make okay that's silly well what if you make okay that's silly well what if you make the<00:07:32.400> car<00:07:32.720> always<00:07:32.960> say<00:07:33.120> it's<00:07:33.280> going<00:07:33.520> 20<00:07:33.759> M<00:07:34.120> hour the car always say it's going 20 M hour the car always say it's going 20 M hour slower<00:07:34.599> than<00:07:34.720> it's<00:07:34.960> actually<00:07:35.280> going<00:07:35.960> you slower than it's actually going you slower than it's actually going you might<00:07:36.240> produce<00:07:36.520> a<00:07:36.599> lot<00:07:36.680> of<00:07:36.800> speeding might produce a lot of speeding might produce a lot of speeding tickets<00:07:38.800> then<00:07:39.000> they<00:07:39.120> went<00:07:39.280> out<00:07:39.440> to<00:07:39.599> an tickets then they went out to an tickets then they went out to an abandoned<00:07:40.199> airst<00:07:40.479> strip<00:07:41.039> with<00:07:41.240> two<00:07:41.479> cars<00:07:42.199> the abandoned airst strip with two cars the abandoned airst strip with two cars the target<00:07:42.720> victim<00:07:43.080> car<00:07:43.440> and<00:07:43.560> the<00:07:43.680> Chase<00:07:44.080> car<00:07:45.080> and target victim car and the Chase car and target victim car and the Chase car and they<00:07:45.879> launched<00:07:46.280> a<00:07:46.400> bunch<00:07:46.599> of<00:07:46.759> other<00:07:47.440> attacks they launched a bunch of other attacks they launched a bunch of other attacks one<00:07:48.560> of<00:07:48.680> the<00:07:48.800> things<00:07:49.039> they<00:07:49.120> were<00:07:49.280> able<00:07:49.479> to<00:07:49.599> do one of the things they were able to do one of the things they were able to do from<00:07:49.879> the<00:07:50.000> Chase<00:07:50.280> car<00:07:50.440> is<00:07:50.599> apply<00:07:50.879> the<00:07:51.000> brakes from the Chase car is apply the brakes from the Chase car is apply the brakes on<00:07:51.759> the<00:07:51.879> other<00:07:52.120> car<00:07:52.560> simply<00:07:52.840> by<00:07:53.000> hacking<00:07:53.240> the on the other car simply by hacking the on the other car simply by hacking the computer<00:07:54.280> they<00:07:54.360> were<00:07:54.520> able<00:07:54.680> to<00:07:54.879> disable<00:07:55.280> the computer they were able to disable the computer they were able to disable the brakes<00:07:56.479> they<00:07:56.639> also<00:07:56.800> were<00:07:56.960> able<00:07:57.159> to<00:07:57.360> install brakes they also were able to install brakes they also were able to install malware<00:07:58.919> that<00:07:59.039> wouldn't<00:07:59.520> kick<00:07:59.680> in<00:07:59.800> and malware that wouldn't kick in and malware that wouldn't kick in and wouldn't<00:08:00.199> trigger<00:08:00.560> until<00:08:00.800> the<00:08:00.919> car<00:08:01.120> was<00:08:01.240> doing wouldn't trigger until the car was doing wouldn't trigger until the car was doing something<00:08:01.960> like<00:08:02.280> going<00:08:02.840> over<00:08:03.080> 20<00:08:03.319> M<00:08:03.680> hour<00:08:03.960> or something like going over 20 M hour or something like going over 20 M hour or something<00:08:04.440> like<00:08:05.000> that<00:08:06.000> the<00:08:06.159> results<00:08:06.440> are something like that the results are something like that the results are astonishing<00:08:07.199> and<00:08:07.319> when<00:08:07.520> they<00:08:07.680> gave<00:08:07.879> this<00:08:08.080> talk astonishing and when they gave this talk astonishing and when they gave this talk even<00:08:08.879> though<00:08:09.039> they<00:08:09.159> gave<00:08:09.360> this<00:08:09.520> talk<00:08:09.720> at<00:08:09.840> a even though they gave this talk at a even though they gave this talk at a conference<00:08:10.360> to<00:08:10.520> a<00:08:10.599> bunch<00:08:10.759> of<00:08:10.919> computer conference to a bunch of computer conference to a bunch of computer security<00:08:11.680> researchers<00:08:12.319> everybody<00:08:12.720> was security researchers everybody was security researchers everybody was gasping<00:08:13.960> they<00:08:14.080> were<00:08:14.319> able<00:08:14.840> to<00:08:15.240> take<00:08:15.599> over<00:08:16.159> a gasping they were able to take over a gasping they were able to take over a bunch<00:08:16.479> of<00:08:16.599> critical<00:08:17.080> computers<00:08:17.639> inside<00:08:18.000> the bunch of critical computers inside the bunch of critical computers inside the car<00:08:18.960> the<00:08:19.080> brakes<00:08:19.520> computer<00:08:20.000> the<00:08:20.120> lighting car the brakes computer the lighting car the brakes computer the lighting computer<00:08:21.120> the<00:08:21.280> engine<00:08:21.919> the<00:08:22.039> dash<00:08:22.360> the<00:08:22.520> radio computer the engine the dash the radio computer the engine the dash the radio Etc<00:08:24.000> and<00:08:24.120> they<00:08:24.199> were<00:08:24.440> able<00:08:24.680> to<00:08:24.840> perform<00:08:25.199> these Etc and they were able to perform these Etc and they were able to perform these on<00:08:25.520> real<00:08:25.800> commercial<00:08:26.199> cars<00:08:26.479> that<00:08:26.639> they on real commercial cars that they on real commercial cars that they purchased<00:08:27.560> using<00:08:27.919> the<00:08:28.080> radio<00:08:28.520> network<00:08:29.680> they purchased using the radio network they purchased using the radio network they were<00:08:30.000> able<00:08:30.280> to<00:08:30.560> compromise<00:08:31.199> every<00:08:31.440> single<00:08:31.759> one were able to compromise every single one were able to compromise every single one of<00:08:32.200> the<00:08:32.760> uh<00:08:32.880> pieces<00:08:33.120> of<00:08:33.279> software<00:08:33.599> that of the uh pieces of software that of the uh pieces of software that controlled<00:08:34.240> every<00:08:34.440> single<00:08:34.680> one<00:08:34.839> of<00:08:35.000> the controlled every single one of the controlled every single one of the wireless<00:08:35.760> capabilities<00:08:36.320> of<00:08:36.440> the<00:08:36.640> car<00:08:37.640> all<00:08:37.760> of wireless capabilities of the car all of wireless capabilities of the car all of these<00:08:37.959> were<00:08:38.120> implemented<00:08:39.000> successfully<00:08:40.000> how these were implemented successfully how these were implemented successfully how would<00:08:40.240> you<00:08:40.360> steal<00:08:40.640> a<00:08:40.800> car<00:08:41.399> in<00:08:41.599> this<00:08:41.760> model<00:08:42.760> well would you steal a car in this model well would you steal a car in this model well you<00:08:43.159> compromise<00:08:43.680> the<00:08:43.839> car<00:08:44.440> by<00:08:45.120> uh<00:08:45.440> a<00:08:45.519> buffer you compromise the car by uh a buffer you compromise the car by uh a buffer overflow<00:08:46.279> vulnerability<00:08:46.880> in<00:08:47.000> the<00:08:47.120> software overflow vulnerability in the software overflow vulnerability in the software something<00:08:47.920> like<00:08:48.120> that<00:08:48.600> you<00:08:48.760> use<00:08:49.000> the<00:08:49.120> GPS<00:08:49.519> in something like that you use the GPS in something like that you use the GPS in the<00:08:49.760> car<00:08:49.920> to<00:08:50.080> locate<00:08:50.480> it<00:08:51.000> you<00:08:51.200> remotely<00:08:51.640> unlock the car to locate it you remotely unlock the car to locate it you remotely unlock the<00:08:52.080> doors<00:08:52.399> through<00:08:52.680> the<00:08:53.000> computer<00:08:53.399> that the doors through the computer that the doors through the computer that controls<00:08:54.040> that<00:08:54.360> start<00:08:54.680> the<00:08:54.800> engine<00:08:55.320> bypass controls that start the engine bypass controls that start the engine bypass anti-<00:08:56.120> theft<00:08:56.480> and<00:08:56.560> you've<00:08:56.760> got<00:08:56.920> yourself<00:08:57.200> a anti- theft and you've got yourself a anti- theft and you've got yourself a car<00:08:58.440> surveillance<00:08:59.040> was<00:08:59.200> really<00:08:59.600> interesting car surveillance was really interesting car surveillance was really interesting um<00:09:00.880> the<00:09:01.079> authors<00:09:01.399> of<00:09:01.560> the<00:09:01.760> study<00:09:02.440> have<00:09:02.600> a<00:09:02.760> video um the authors of the study have a video um the authors of the study have a video where<00:09:03.279> they<00:09:03.399> show<00:09:03.839> themselves<00:09:04.160> taking<00:09:04.480> over<00:09:04.680> a where they show themselves taking over a where they show themselves taking over a car<00:09:05.399> and<00:09:05.519> then<00:09:05.680> turning<00:09:06.040> on<00:09:06.480> the<00:09:06.600> microphone car and then turning on the microphone car and then turning on the microphone in<00:09:07.200> the<00:09:07.399> car<00:09:07.839> and<00:09:08.000> listening<00:09:08.399> in<00:09:08.560> on<00:09:08.720> the<00:09:08.880> car in the car and listening in on the car in the car and listening in on the car while<00:09:09.360> tracking<00:09:09.800> it<00:09:10.160> via<00:09:10.720> a<00:09:10.880> GPS<00:09:11.360> on<00:09:11.519> a<00:09:11.720> map<00:09:12.560> and while tracking it via a GPS on a map and while tracking it via a GPS on a map and so<00:09:12.959> that's<00:09:13.160> something<00:09:13.440> that<00:09:13.560> the<00:09:13.680> drivers<00:09:13.959> of so that's something that the drivers of so that's something that the drivers of the<00:09:14.200> car<00:09:14.360> would<00:09:14.480> never<00:09:14.680> know<00:09:14.880> was<00:09:15.399> happening the car would never know was happening the car would never know was happening am<00:09:16.519> I<00:09:16.640> scaring<00:09:17.000> you am I scaring you am I scaring you yet<00:09:19.000> got<00:09:19.160> a<00:09:19.240> few<00:09:19.399> more<00:09:19.560> of<00:09:19.720> these<00:09:19.880> interesting yet got a few more of these interesting yet got a few more of these interesting ones<00:09:20.640> these<00:09:20.760> are<00:09:20.920> ones<00:09:21.120> where<00:09:21.279> I<00:09:21.360> went<00:09:21.480> to<00:09:21.640> a ones these are ones where I went to a ones these are ones where I went to a conference<00:09:22.600> and<00:09:22.920> my<00:09:23.040> mind<00:09:23.279> was<00:09:23.480> just<00:09:23.600> blown conference and my mind was just blown conference and my mind was just blown and<00:09:24.079> I<00:09:24.160> said<00:09:24.360> I<00:09:24.480> have<00:09:24.600> to<00:09:24.680> share<00:09:24.920> this<00:09:25.040> with and I said I have to share this with and I said I have to share this with other<00:09:25.440> people<00:09:26.279> this<00:09:26.399> was<00:09:26.600> Fabian<00:09:26.959> monro's<00:09:27.519> Lab other people this was Fabian monro's Lab other people this was Fabian monro's Lab at<00:09:28.000> the<00:09:28.079> University<00:09:28.440> of<00:09:28.519> North<00:09:28.760> Carolina<00:09:29.760> and at the University of North Carolina and at the University of North Carolina and what<00:09:30.120> they<00:09:30.320> did<00:09:30.880> was<00:09:31.480> something<00:09:31.880> intuitive what they did was something intuitive what they did was something intuitive once<00:09:32.560> you<00:09:32.680> see<00:09:32.920> it<00:09:33.279> but<00:09:33.480> kind<00:09:33.600> of once you see it but kind of once you see it but kind of surprising<00:09:35.279> they<00:09:35.480> videotaped<00:09:36.160> people<00:09:36.399> on<00:09:36.519> a surprising they videotaped people on a surprising they videotaped people on a bus<00:09:37.560> and<00:09:37.720> then<00:09:38.000> they<00:09:38.160> post-processes<00:09:39.040> the bus and then they post-processes the bus and then they post-processes the video<00:09:40.120> what<00:09:40.240> you<00:09:40.320> see<00:09:40.519> here<00:09:40.640> in<00:09:40.800> number<00:09:41.079> one<00:09:41.720> is video what you see here in number one is video what you see here in number one is a<00:09:43.120> um<00:09:44.000> reflection<00:09:44.519> in<00:09:44.720> somebody's<00:09:45.360> glasses<00:09:46.160> of a um reflection in somebody's glasses of a um reflection in somebody's glasses of the<00:09:46.440> smartphone<00:09:46.959> that<00:09:47.079> they're<00:09:47.240> typing<00:09:47.600> in the smartphone that they're typing in the smartphone that they're typing in they<00:09:48.440> wrote<00:09:48.839> software<00:09:49.640> to<00:09:49.959> stabilize<00:09:50.560> even they wrote software to stabilize even they wrote software to stabilize even though<00:09:50.880> they<00:09:50.959> were<00:09:51.079> on<00:09:51.200> a<00:09:51.360> bus<00:09:51.640> and<00:09:51.800> maybe though they were on a bus and maybe though they were on a bus and maybe someone's<00:09:52.399> holding<00:09:53.120> their<00:09:53.480> phone<00:09:53.839> at<00:09:53.959> an someone's holding their phone at an someone's holding their phone at an angle<00:09:54.720> to<00:09:54.959> stabilize<00:09:55.560> the<00:09:55.680> phone<00:09:56.279> process<00:09:56.680> it angle to stabilize the phone process it angle to stabilize the phone process it and<00:09:57.360> you<00:09:57.480> may<00:09:57.640> know<00:09:57.839> on<00:09:57.959> your<00:09:58.120> smartphone<00:09:58.560> when and you may know on your smartphone when and you may know on your smartphone when you<00:09:58.800> type<00:09:58.959> a<00:09:59.040> passord you type a passord you type a passord the<00:10:00.000> keys<00:10:00.360> pop<00:10:00.560> out<00:10:00.760> a<00:10:00.880> little<00:10:01.079> bit<00:10:01.360> and<00:10:01.480> they the keys pop out a little bit and they the keys pop out a little bit and they were<00:10:01.720> able<00:10:01.959> to<00:10:02.160> use<00:10:02.480> that<00:10:02.640> to<00:10:02.839> reconstruct were able to use that to reconstruct were able to use that to reconstruct what<00:10:03.640> the<00:10:03.800> person<00:10:04.040> was<00:10:04.240> typing<00:10:05.040> and<00:10:05.240> had<00:10:05.360> a what the person was typing and had a what the person was typing and had a language<00:10:05.920> model<00:10:06.240> for<00:10:06.480> detecting language model for detecting language model for detecting typing<00:10:08.839> what<00:10:09.240> what<00:10:09.360> was<00:10:09.560> interesting<00:10:10.040> is<00:10:10.279> by typing what what was interesting is by typing what what was interesting is by videotaping<00:10:11.040> on<00:10:11.160> a<00:10:11.279> bus<00:10:11.600> they<00:10:11.680> were<00:10:11.920> able<00:10:12.279> to videotaping on a bus they were able to videotaping on a bus they were able to produce<00:10:12.920> exactly<00:10:13.320> what<00:10:13.480> people<00:10:13.760> on<00:10:13.880> their produce exactly what people on their produce exactly what people on their smartphones<00:10:14.519> were<00:10:14.720> typing<00:10:15.600> and<00:10:15.720> then<00:10:15.880> they smartphones were typing and then they smartphones were typing and then they had<00:10:16.160> a<00:10:16.320> surprising<00:10:16.920> result<00:10:17.440> which<00:10:17.560> is<00:10:17.720> that had a surprising result which is that had a surprising result which is that their<00:10:18.079> software<00:10:18.560> had<00:10:18.720> not<00:10:18.920> only<00:10:19.440> done<00:10:19.600> it<00:10:19.760> for their software had not only done it for their software had not only done it for their<00:10:20.160> target<00:10:20.600> but<00:10:20.760> other<00:10:21.000> people<00:10:21.240> who their target but other people who their target but other people who accidentally<00:10:22.000> happened<00:10:22.279> to<00:10:22.360> be<00:10:22.519> in<00:10:22.640> the accidentally happened to be in the accidentally happened to be in the picture<00:10:23.440> they<00:10:23.560> were<00:10:23.720> able<00:10:23.959> to<00:10:24.160> produce<00:10:24.480> what picture they were able to produce what picture they were able to produce what those<00:10:24.839> people<00:10:25.079> had<00:10:25.200> been<00:10:25.360> typing<00:10:26.079> and<00:10:26.200> that those people had been typing and that those people had been typing and that was<00:10:26.480> kind<00:10:26.600> of<00:10:26.720> an<00:10:26.880> accidental<00:10:27.240> artifact<00:10:27.800> of was kind of an accidental artifact of was kind of an accidental artifact of what<00:10:28.120> their<00:10:28.279> software<00:10:28.680> was<00:10:28.800> doing what their software was doing what their software was doing I'll<00:10:30.959> show<00:10:31.200> you<00:10:31.760> uh<00:10:31.880> two<00:10:32.079> more<00:10:32.800> one<00:10:32.959> is<00:10:33.160> p25 I'll show you uh two more one is p25 I'll show you uh two more one is p25 radios<00:10:34.920> p25<00:10:35.639> radios<00:10:36.200> are<00:10:36.360> used<00:10:36.720> by<00:10:36.880> law radios p25 radios are used by law radios p25 radios are used by law enforcement<00:10:38.079> and<00:10:38.240> all<00:10:38.480> kinds<00:10:38.800> of<00:10:39.279> uh enforcement and all kinds of uh enforcement and all kinds of uh government<00:10:40.040> agencies<00:10:41.040> and<00:10:41.279> people<00:10:41.519> in<00:10:41.760> combat government agencies and people in combat government agencies and people in combat to<00:10:42.320> communicate<00:10:43.160> and<00:10:43.279> there's<00:10:43.519> an<00:10:43.720> encryption to communicate and there's an encryption to communicate and there's an encryption option<00:10:44.480> on<00:10:44.639> these<00:10:44.800> phones<00:10:45.680> this<00:10:45.760> is<00:10:45.920> what<00:10:46.079> the option on these phones this is what the option on these phones this is what the phone<00:10:46.440> looks<00:10:46.760> like<00:10:47.279> um<00:10:47.440> it's<00:10:47.560> not<00:10:47.720> really<00:10:47.920> a phone looks like um it's not really a phone looks like um it's not really a phone<00:10:48.240> it's<00:10:48.360> more<00:10:48.480> of<00:10:48.600> a<00:10:48.680> two-way<00:10:49.040> radio<00:10:49.880> uh phone it's more of a two-way radio uh phone it's more of a two-way radio uh Motorola<00:10:50.519> makes<00:10:50.720> the<00:10:50.839> most<00:10:51.040> widely<00:10:51.360> used<00:10:51.680> one Motorola makes the most widely used one Motorola makes the most widely used one and<00:10:52.360> you<00:10:52.480> can<00:10:52.600> see<00:10:52.800> that<00:10:52.920> they're<00:10:53.040> used<00:10:53.320> by and you can see that they're used by and you can see that they're used by Secret<00:10:53.800> Service<00:10:54.200> they're<00:10:54.360> used<00:10:54.560> in<00:10:54.800> combat Secret Service they're used in combat Secret Service they're used in combat it's<00:10:55.680> a<00:10:55.959> very<00:10:56.200> very<00:10:56.399> common<00:10:56.760> standard<00:10:57.079> in<00:10:57.200> the it's a very very common standard in the it's a very very common standard in the US<00:10:57.600> and<00:10:57.839> elsewhere<00:10:58.839> so<00:10:59.000> one<00:10:59.360> question<00:10:59.600> the US and elsewhere so one question the US and elsewhere so one question the researchers<00:11:00.160> asked<00:11:00.560> themselves<00:11:00.959> is<00:11:01.639> could researchers asked themselves is could researchers asked themselves is could you<00:11:02.040> block<00:11:02.519> this<00:11:02.720> thing<00:11:03.120> right<00:11:03.680> could<00:11:03.800> you<00:11:04.360> uh you block this thing right could you uh you block this thing right could you uh run<00:11:04.639> a<00:11:04.760> denial<00:11:05.079> of<00:11:05.200> service<00:11:05.560> because<00:11:05.720> these run a denial of service because these run a denial of service because these are<00:11:06.000> First<00:11:06.279> Responders<00:11:06.959> so<00:11:07.279> would<00:11:07.360> a are First Responders so would a are First Responders so would a terrorist<00:11:07.800> organization<00:11:08.320> want<00:11:08.480> to<00:11:08.639> black<00:11:08.880> out terrorist organization want to black out terrorist organization want to black out the<00:11:09.200> ability<00:11:09.639> of<00:11:09.839> police<00:11:10.160> and<00:11:10.320> fired<00:11:10.680> to the ability of police and fired to the ability of police and fired to communicate<00:11:11.760> at<00:11:11.880> an<00:11:12.519> emergency<00:11:13.519> they<00:11:13.680> found communicate at an emergency they found communicate at an emergency they found that<00:11:14.040> there's<00:11:14.279> this<00:11:14.440> girl<00:11:14.800> Tech<00:11:15.360> a<00:11:15.519> device that there's this girl Tech a device that there's this girl Tech a device used<00:11:16.120> for<00:11:16.320> texting<00:11:17.200> that<00:11:17.360> happens<00:11:17.680> to<00:11:17.800> operate used for texting that happens to operate used for texting that happens to operate at<00:11:18.160> the<00:11:18.279> same<00:11:18.480> exact<00:11:18.800> frequency<00:11:19.279> as<00:11:19.399> the<00:11:19.600> p25 at the same exact frequency as the p25 at the same exact frequency as the p25 and<00:11:20.720> they<00:11:20.839> built<00:11:21.200> what<00:11:21.320> they<00:11:21.440> called<00:11:21.760> my<00:11:21.920> first



Jammer<00:11:26.240> if<00:11:26.320> you<00:11:26.519> look<00:11:26.800> closely<00:11:27.480> at<00:11:27.639> this
Jammer if you look closely at this Jammer if you look closely at this device<00:11:28.480> it's<00:11:28.720> got<00:11:29.040> a<00:11:29.519> switch<00:11:29.959> for<00:11:30.279> encryption device it's got a switch for encryption device it's got a switch for encryption or<00:11:30.880> clear<00:11:31.200> text<00:11:31.639> let<00:11:31.760> me<00:11:31.920> advance<00:11:32.320> the<00:11:32.720> slide or clear text let me advance the slide or clear text let me advance the slide and<00:11:33.839> now<00:11:33.959> I'll<00:11:34.160> go<00:11:34.320> back<00:11:34.560> you<00:11:34.680> see<00:11:34.839> the and now I'll go back you see the and now I'll go back you see the difference<00:11:36.959> this<00:11:37.079> is<00:11:37.680> plain<00:11:38.040> text<00:11:39.040> this<00:11:39.160> is difference this is plain text this is difference this is plain text this is encrypted<00:11:40.200> there's<00:11:40.480> one<00:11:40.680> little<00:11:41.040> dot<00:11:41.320> that encrypted there's one little dot that encrypted there's one little dot that shows<00:11:41.680> up<00:11:41.839> on<00:11:41.959> the<00:11:42.120> screen<00:11:42.519> and<00:11:42.680> one<00:11:42.880> little shows up on the screen and one little shows up on the screen and one little tiny<00:11:43.320> turn<00:11:43.519> of<00:11:43.680> the<00:11:43.800> switch<00:11:44.480> and<00:11:44.560> so<00:11:44.720> the tiny turn of the switch and so the tiny turn of the switch and so the researchers<00:11:45.399> asked<00:11:45.760> themselves<00:11:46.200> I<00:11:46.320> wonder researchers asked themselves I wonder researchers asked themselves I wonder how<00:11:46.720> many<00:11:47.000> times<00:11:47.720> very<00:11:48.440> secure<00:11:49.120> important how many times very secure important how many times very secure important sensitive<00:11:50.200> conversations<00:11:50.760> are<00:11:50.880> happening<00:11:51.160> on sensitive conversations are happening on sensitive conversations are happening on these<00:11:51.360> two-way<00:11:51.720> radios<00:11:52.040> where<00:11:52.160> they<00:11:52.279> forget these two-way radios where they forget these two-way radios where they forget to<00:11:52.680> encrypt<00:11:53.040> and<00:11:53.120> they<00:11:53.279> don't<00:11:53.440> notice<00:11:53.760> that to encrypt and they don't notice that to encrypt and they don't notice that they<00:11:53.959> didn't<00:11:54.079> an<00:11:54.720> encrypt<00:11:55.720> so<00:11:56.279> they<00:11:56.480> bought<00:11:56.839> a they didn't an encrypt so they bought a they didn't an encrypt so they bought a scanner<00:11:57.720> these<00:11:57.880> are<00:11:58.040> perfectly<00:11:58.480> legal<00:11:59.040> and scanner these are perfectly legal and scanner these are perfectly legal and they<00:11:59.560> run<00:11:59.920> at<00:12:00.120> the<00:12:00.320> frequency<00:12:00.800> of<00:12:00.920> the<00:12:01.160> p25<00:12:02.160> and they run at the frequency of the p25 and they run at the frequency of the p25 and what<00:12:02.360> they<00:12:02.480> did<00:12:02.639> is<00:12:02.720> they<00:12:02.839> hopped<00:12:03.120> around what they did is they hopped around what they did is they hopped around frequencies<00:12:03.959> and<00:12:04.079> they<00:12:04.200> wrote<00:12:04.519> software<00:12:05.320> to frequencies and they wrote software to frequencies and they wrote software to listen<00:12:05.839> in<00:12:06.480> if<00:12:06.680> they<00:12:06.800> found<00:12:07.240> encrypted listen in if they found encrypted listen in if they found encrypted communication<00:12:08.480> they<00:12:08.600> stayed<00:12:08.920> on<00:12:09.079> that communication they stayed on that communication they stayed on that channel<00:12:09.519> and<00:12:09.639> they<00:12:09.720> wrote<00:12:09.920> down<00:12:10.120> that's<00:12:10.240> a channel and they wrote down that's a channel and they wrote down that's a channel<00:12:10.880> that<00:12:11.200> these<00:12:11.399> people<00:12:11.639> communicate<00:12:12.160> in channel that these people communicate in channel that these people communicate in these<00:12:12.680> law<00:12:12.880> enforcement<00:12:13.320> agencies<00:12:14.160> and<00:12:14.279> they these law enforcement agencies and they these law enforcement agencies and they went<00:12:14.519> to<00:12:14.639> 20<00:12:14.920> metropolitan<00:12:15.680> areas<00:12:16.399> and went to 20 metropolitan areas and went to 20 metropolitan areas and listened<00:12:17.000> in<00:12:17.399> on<00:12:17.760> conversations<00:12:18.760> that<00:12:18.880> were listened in on conversations that were listened in on conversations that were happening<00:12:19.360> at<00:12:19.560> those happening at those happening at those frequencies<00:12:21.399> they<00:12:21.600> found<00:12:22.279> that<00:12:22.440> in<00:12:22.600> every frequencies they found that in every frequencies they found that in every metropolitan<00:12:23.639> area<00:12:24.120> they<00:12:24.240> would<00:12:24.480> capture metropolitan area they would capture metropolitan area they would capture over<00:12:25.160> 20<00:12:25.480> minutes<00:12:25.800> a<00:12:26.000> day<00:12:26.519> of<00:12:26.680> clear<00:12:27.000> text over 20 minutes a day of clear text over 20 minutes a day of clear text communication<00:12:28.560> and<00:12:28.680> what<00:12:28.800> kind<00:12:28.880> of<00:12:29.000> thing communication and what kind of thing communication and what kind of thing were<00:12:29.480> people<00:12:29.720> talking<00:12:30.040> about<00:12:30.440> well<00:12:30.600> they were people talking about well they were people talking about well they found<00:12:31.120> the<00:12:31.279> names<00:12:31.680> and<00:12:31.839> information<00:12:32.240> about found the names and information about found the names and information about confidential<00:12:33.120> informants<00:12:34.120> they<00:12:34.279> found confidential informants they found confidential informants they found information<00:12:35.120> that<00:12:35.279> was<00:12:35.440> being<00:12:35.680> recorded<00:12:36.040> in information that was being recorded in information that was being recorded in wiretaps<00:12:37.360> a<00:12:37.519> bunch<00:12:37.720> of<00:12:37.959> crimes<00:12:38.560> that<00:12:38.639> were wiretaps a bunch of crimes that were wiretaps a bunch of crimes that were being<00:12:39.120> discussed<00:12:39.880> sensitive<00:12:40.399> information<00:12:41.320> it being discussed sensitive information it being discussed sensitive information it was<00:12:41.600> mostly<00:12:41.880> law<00:12:42.120> enforcement<00:12:42.839> and was mostly law enforcement and was mostly law enforcement and criminal<00:12:44.600> they<00:12:44.720> went<00:12:44.959> and<00:12:45.160> reported<00:12:45.600> this<00:12:45.760> to criminal they went and reported this to criminal they went and reported this to the<00:12:46.000> law<00:12:46.199> enforcement<00:12:46.639> agencies<00:12:47.120> after the law enforcement agencies after the law enforcement agencies after anonymizing<00:12:48.120> it<00:12:48.560> and<00:12:48.959> the<00:12:49.279> vulnerability anonymizing it and the vulnerability anonymizing it and the vulnerability here<00:12:50.160> is<00:12:50.320> simply<00:12:50.639> the<00:12:50.760> user<00:12:51.040> interface<00:12:51.440> wasn't here is simply the user interface wasn't here is simply the user interface wasn't good<00:12:51.880> enough<00:12:52.360> if<00:12:52.440> you're<00:12:52.639> talking<00:12:52.959> about good enough if you're talking about good enough if you're talking about something<00:12:53.760> really<00:12:54.040> secure<00:12:54.360> and<00:12:54.560> sensitive<00:12:55.360> it something really secure and sensitive it something really secure and sensitive it should<00:12:55.639> be<00:12:55.920> really<00:12:56.199> clear<00:12:56.440> to<00:12:56.560> you<00:12:56.800> that<00:12:56.920> this should be really clear to you that this should be really clear to you that this conversation<00:12:57.639> is<00:12:57.839> encrypted<00:12:58.800> that<00:12:58.920> one conversation is encrypted that one conversation is encrypted that one pretty<00:12:59.480> easy<00:12:59.680> to<00:12:59.839> fix<00:13:00.560> the<00:13:00.720> last<00:13:00.880> one<00:13:01.079> I pretty easy to fix the last one I pretty easy to fix the last one I thought<00:13:01.360> was<00:13:01.560> really<00:13:01.800> really<00:13:02.000> cool<00:13:02.360> and<00:13:02.480> I thought was really really cool and I thought was really really cool and I just<00:13:02.760> had<00:13:02.839> to<00:13:02.959> show<00:13:03.160> it<00:13:03.240> to<00:13:03.399> you<00:13:04.040> it's<00:13:04.240> probably just had to show it to you it's probably just had to show it to you it's probably not<00:13:04.800> something<00:13:05.120> that<00:13:05.199> you're<00:13:05.320> going<00:13:05.440> to<00:13:05.519> lose not something that you're going to lose not something that you're going to lose sleep<00:13:06.000> over<00:13:06.240> like<00:13:06.360> the<00:13:06.480> cars<00:13:06.760> or<00:13:06.880> the sleep over like the cars or the sleep over like the cars or the defibrillators<00:13:08.000> but<00:13:08.720> um<00:13:09.720> it's<00:13:09.880> stealing defibrillators but um it's stealing defibrillators but um it's stealing keystrokes<00:13:11.320> now<00:13:11.480> we've<00:13:11.680> all<00:13:11.839> looked<00:13:12.079> at keystrokes now we've all looked at keystrokes now we've all looked at smartphones<00:13:13.160> upside<00:13:13.600> down<00:13:13.959> every<00:13:14.160> security smartphones upside down every security smartphones upside down every security expert<00:13:14.880> wants<00:13:15.040> to<00:13:15.240> hack<00:13:15.399> a<00:13:15.519> smartphone<00:13:16.360> and<00:13:16.480> we expert wants to hack a smartphone and we expert wants to hack a smartphone and we tend<00:13:16.800> to<00:13:17.000> look<00:13:17.399> at<00:13:17.839> the<00:13:17.959> USB<00:13:18.519> port<00:13:19.160> the<00:13:19.360> GPS<00:13:19.800> for tend to look at the USB port the GPS for tend to look at the USB port the GPS for tracking<00:13:20.519> the<00:13:20.720> camera<00:13:21.120> the<00:13:21.440> microphone<00:13:22.440> but tracking the camera the microphone but tracking the camera the microphone but no<00:13:23.000> one<00:13:23.240> up<00:13:23.399> till<00:13:23.639> this<00:13:23.760> point<00:13:24.000> had<00:13:24.120> looked<00:13:24.320> at no one up till this point had looked at no one up till this point had looked at the<00:13:24.600> accelerometer<00:13:25.440> the<00:13:25.600> accelerometer<00:13:26.199> is the accelerometer the accelerometer is the accelerometer the accelerometer is the<00:13:26.440> thing<00:13:26.639> that<00:13:26.760> determines<00:13:27.440> the<00:13:27.639> vertical the thing that determines the vertical the thing that determines the vertical orientation<00:13:29.000> of<00:13:29.120> of<00:13:29.240> the<00:13:29.720> smartphone<00:13:30.720> and<00:13:30.800> so orientation of of the smartphone and so orientation of of the smartphone and so they<00:13:31.079> had<00:13:31.199> a<00:13:31.279> simple<00:13:31.560> setup<00:13:32.279> they<00:13:32.480> put<00:13:32.720> a they had a simple setup they put a they had a simple setup they put a smartphone<00:13:33.399> next<00:13:33.560> to<00:13:33.720> a<00:13:33.839> keyboard<00:13:34.560> and<00:13:34.680> they smartphone next to a keyboard and they smartphone next to a keyboard and they had<00:13:34.920> people<00:13:35.240> type<00:13:36.199> and<00:13:36.360> then<00:13:36.519> their<00:13:36.720> goal<00:13:37.240> was had people type and then their goal was had people type and then their goal was to<00:13:37.600> use<00:13:38.040> the<00:13:38.240> vibrations<00:13:38.839> that<00:13:38.959> were<00:13:39.120> created to use the vibrations that were created to use the vibrations that were created by<00:13:40.079> typing<00:13:41.079> um<00:13:41.240> to<00:13:41.480> measure<00:13:42.000> the<00:13:42.120> change<00:13:42.360> in by typing um to measure the change in by typing um to measure the change in the<00:13:42.920> accelerometer<00:13:43.959> reading<00:13:44.959> to<00:13:45.199> determine the accelerometer reading to determine the accelerometer reading to determine what<00:13:45.760> the<00:13:45.920> person<00:13:46.199> had<00:13:46.320> been<00:13:46.839> typing<00:13:47.839> now<00:13:47.959> when what the person had been typing now when what the person had been typing now when they<00:13:48.199> tried<00:13:48.600> this<00:13:48.760> on<00:13:48.880> an<00:13:49.040> iPhone<00:13:49.480> 3GS<00:13:50.480> this<00:13:50.600> is they tried this on an iPhone 3GS this is they tried this on an iPhone 3GS this is a<00:13:51.079> graph<00:13:51.600> of<00:13:51.759> the<00:13:51.920> perturbations<00:13:52.680> that<00:13:52.759> were a graph of the perturbations that were a graph of the perturbations that were created<00:13:53.639> by<00:13:53.800> the<00:13:54.000> typing<00:13:54.920> and<00:13:55.040> you<00:13:55.120> can<00:13:55.279> see created by the typing and you can see created by the typing and you can see that<00:13:55.720> it's<00:13:55.920> very<00:13:56.360> difficult<00:13:56.519> to<00:13:56.680> tell<00:13:56.920> when that it's very difficult to tell when that it's very difficult to tell when somebody<00:13:57.440> was<00:13:57.600> typing<00:13:57.920> or<00:13:58.079> what<00:13:58.199> they<00:13:58.320> were somebody was typing or what they were somebody was typing or what they were typing<00:13:59.480> the<00:13:59.600> the<00:13:59.680> iPhone<00:13:59.959> 4<00:14:00.320> greatly<00:14:00.759> improved typing the the iPhone 4 greatly improved typing the the iPhone 4 greatly improved the the the accelerometer<00:14:03.199> and<00:14:03.399> so<00:14:04.279> the<00:14:04.519> same accelerometer and so the same accelerometer and so the same measurement<00:14:05.800> produced<00:14:06.320> this<00:14:06.600> graph<00:14:07.600> now<00:14:07.839> that measurement produced this graph now that measurement produced this graph now that gave<00:14:08.240> you<00:14:08.440> a<00:14:08.560> lot<00:14:08.680> of<00:14:08.880> information<00:14:09.800> while gave you a lot of information while gave you a lot of information while someone<00:14:10.320> was<00:14:10.519> typing<00:14:11.480> and<00:14:11.639> what<00:14:11.759> they<00:14:11.959> did someone was typing and what they did someone was typing and what they did then<00:14:12.680> is<00:14:12.959> used<00:14:13.399> Advanced<00:14:13.759> artificial then is used Advanced artificial then is used Advanced artificial intelligence<00:14:14.800> techniques<00:14:15.279> called<00:14:15.480> machine intelligence techniques called machine intelligence techniques called machine learning<00:14:16.680> to<00:14:16.880> have<00:14:17.000> a<00:14:17.160> training<00:14:17.600> phase<00:14:18.160> and<00:14:18.279> so learning to have a training phase and so learning to have a training phase and so they<00:14:18.639> got<00:14:19.000> most<00:14:19.240> likely<00:14:19.560> grad<00:14:19.880> students<00:14:20.440> to they got most likely grad students to they got most likely grad students to type<00:14:20.839> in<00:14:21.000> a<00:14:21.079> whole<00:14:21.279> lot<00:14:21.399> of<00:14:21.560> things<00:14:22.560> and<00:14:23.199> um<00:14:23.600> to type in a whole lot of things and um to type in a whole lot of things and um to learn<00:14:24.320> to<00:14:24.480> have<00:14:24.639> the<00:14:24.800> system<00:14:25.120> use<00:14:25.320> the<00:14:25.440> machine learn to have the system use the machine learn to have the system use the machine learning<00:14:26.040> tools<00:14:26.320> that<00:14:26.440> were<00:14:26.600> available<00:14:27.360> to learning tools that were available to learning tools that were available to learn<00:14:27.920> what<00:14:28.079> it<00:14:28.240> is<00:14:28.480> that<00:14:28.600> the<00:14:28.720> people<00:14:29.320> typing learn what it is that the people typing learn what it is that the people typing and<00:14:30.800> to<00:14:31.480> match<00:14:31.800> that<00:14:32.000> up<00:14:32.399> with<00:14:32.560> the and to match that up with the and to match that up with the measurements<00:14:33.120> in<00:14:33.279> the<00:14:33.720> accelerometer<00:14:34.720> and measurements in the accelerometer and measurements in the accelerometer and then<00:14:34.920> there's<00:14:35.120> the<00:14:35.320> attack<00:14:35.680> phase<00:14:36.120> where<00:14:36.320> you then there's the attack phase where you then there's the attack phase where you get<00:14:36.639> somebody<00:14:36.920> to<00:14:37.160> type<00:14:37.440> something<00:14:37.759> in<00:14:38.040> you get somebody to type something in you get somebody to type something in you don't<00:14:38.320> know<00:14:38.480> what<00:14:38.560> it<00:14:38.720> was<00:14:39.199> but<00:14:39.320> you<00:14:39.480> use<00:14:39.680> your don't know what it was but you use your don't know what it was but you use your model<00:14:40.240> that<00:14:40.360> you<00:14:40.480> created<00:14:40.800> in<00:14:40.920> the<00:14:41.040> training model that you created in the training model that you created in the training phase<00:14:41.920> to<00:14:42.079> figure<00:14:42.320> out<00:14:42.519> what<00:14:42.639> they<00:14:42.720> were phase to figure out what they were phase to figure out what they were typing<00:14:43.920> they<00:14:44.040> had<00:14:44.240> pretty<00:14:44.480> good<00:14:44.680> success<00:14:45.560> this typing they had pretty good success this typing they had pretty good success this is<00:14:45.920> an<00:14:46.040> article<00:14:46.440> from<00:14:46.600> the<00:14:46.720> USA<00:14:47.160> Today<00:14:48.160> they is an article from the USA Today they is an article from the USA Today they typed<00:14:48.600> in<00:14:48.800> the<00:14:48.880> Illinois<00:14:49.320> Supreme<00:14:49.680> Court<00:14:49.920> has typed in the Illinois Supreme Court has typed in the Illinois Supreme Court has ruled<00:14:50.360> that<00:14:50.480> Ram<00:14:50.720> Emanuel<00:14:51.320> is<00:14:51.480> eligible<00:14:51.839> to ruled that Ram Emanuel is eligible to ruled that Ram Emanuel is eligible to run<00:14:52.120> for<00:14:52.279> mayor<00:14:52.519> of<00:14:52.639> Chicago<00:14:53.160> see<00:14:53.320> I<00:14:53.440> tied<00:14:53.680> into run for mayor of Chicago see I tied into run for mayor of Chicago see I tied into the<00:14:54.000> last<00:14:54.240> talk<00:14:54.759> and<00:14:54.920> ordered<00:14:55.240> him<00:14:55.360> to<00:14:55.519> stay<00:14:55.720> on the last talk and ordered him to stay on the last talk and ordered him to stay on the<00:14:56.160> ballot<00:14:57.160> now<00:14:57.360> the<00:14:57.519> system<00:14:57.920> is<00:14:58.120> interesting the ballot now the system is interesting the ballot now the system is interesting because<00:14:58.759> it<00:14:59.040> produced<00:14:59.480> Illinois<00:15:00.000> Supreme<00:15:00.759> and because it produced Illinois Supreme and because it produced Illinois Supreme and then<00:15:01.000> it<00:15:01.120> wasn't<00:15:01.399> sure<00:15:02.000> the<00:15:02.120> model<00:15:02.399> produced<00:15:02.759> a then it wasn't sure the model produced a then it wasn't sure the model produced a bunch<00:15:03.040> of<00:15:03.199> options<00:15:04.040> and<00:15:04.199> this<00:15:04.320> is<00:15:04.680> the<00:15:04.800> beauty bunch of options and this is the beauty bunch of options and this is the beauty of<00:15:05.720> of<00:15:05.920> some<00:15:06.040> of<00:15:06.199> the<00:15:06.399> AI<00:15:06.680> techniques<00:15:07.160> is<00:15:07.360> that of of some of the AI techniques is that of of some of the AI techniques is that computers<00:15:07.959> are<00:15:08.120> good<00:15:08.279> at<00:15:08.399> some<00:15:08.639> things<00:15:09.240> humans computers are good at some things humans computers are good at some things humans are<00:15:09.680> good<00:15:09.800> at<00:15:09.959> other<00:15:10.199> things<00:15:10.759> take<00:15:10.959> the<00:15:11.079> best are good at other things take the best are good at other things take the best of<00:15:11.360> both<00:15:11.600> let<00:15:11.720> the<00:15:11.839> human<00:15:12.120> solve<00:15:12.440> this<00:15:12.560> one of both let the human solve this one of both let the human solve this one don't<00:15:12.959> waste<00:15:13.240> computer<00:15:13.600> Cycles<00:15:14.199> a<00:15:14.320> human's don't waste computer Cycles a human's don't waste computer Cycles a human's not<00:15:14.800> going<00:15:14.920> to<00:15:15.120> think<00:15:15.279> it's<00:15:15.480> the<00:15:15.600> Supreme not going to think it's the Supreme not going to think it's the Supreme might<00:15:16.320> it's<00:15:16.480> the<00:15:16.600> Supreme<00:15:16.959> Court<00:15:17.759> right<00:15:17.959> and might it's the Supreme Court right and might it's the Supreme Court right and so<00:15:18.639> together<00:15:18.959> we're<00:15:19.160> able<00:15:19.360> to<00:15:19.519> reproduce so together we're able to reproduce so together we're able to reproduce typing<00:15:20.759> simply<00:15:21.120> by<00:15:21.279> measuring<00:15:21.639> the typing simply by measuring the typing simply by measuring the accelerometer<00:15:23.160> why<00:15:23.279> is<00:15:23.480> this<00:15:23.680> matter<00:15:24.320> well<00:15:25.000> in accelerometer why is this matter well in accelerometer why is this matter well in in<00:15:25.600> the<00:15:25.839> Android<00:15:26.279> platform<00:15:26.759> for<00:15:27.199> example<00:15:28.199> the in the Android platform for example the in the Android platform for example the uh<00:15:29.440> uh<00:15:29.680> developers<00:15:30.279> have<00:15:30.399> a<00:15:30.560> manifest<00:15:31.160> where uh uh developers have a manifest where uh uh developers have a manifest where every<00:15:31.720> device<00:15:32.040> on<00:15:32.240> there<00:15:32.440> the<00:15:32.600> microphone<00:15:33.240> Etc every device on there the microphone Etc every device on there the microphone Etc has<00:15:33.880> to<00:15:34.079> register<00:15:34.680> if<00:15:34.759> you're<00:15:34.920> going<00:15:35.040> to<00:15:35.199> use has to register if you're going to use has to register if you're going to use it<00:15:35.639> so<00:15:35.839> that<00:15:36.079> hackers<00:15:36.600> can't<00:15:37.199> take<00:15:37.399> over<00:15:37.639> it it so that hackers can't take over it it so that hackers can't take over it but<00:15:38.360> nobody<00:15:38.720> controls<00:15:39.160> the but nobody controls the but nobody controls the accelerometer<00:15:40.839> so<00:15:41.040> what's<00:15:41.240> the<00:15:41.399> point<00:15:41.759> you accelerometer so what's the point you accelerometer so what's the point you can<00:15:42.040> leave<00:15:42.240> your<00:15:42.440> iPhone<00:15:42.759> next<00:15:42.959> to<00:15:43.079> someone's can leave your iPhone next to someone's can leave your iPhone next to someone's keyboard<00:15:44.079> and<00:15:44.199> just<00:15:44.319> leave<00:15:44.519> the<00:15:44.680> room<00:15:45.160> and keyboard and just leave the room and keyboard and just leave the room and then<00:15:45.480> later<00:15:45.959> recover<00:15:46.360> what<00:15:46.480> they<00:15:46.600> did<00:15:46.800> even then later recover what they did even then later recover what they did even without<00:15:47.199> using<00:15:47.440> the<00:15:47.759> microphone<00:15:48.759> um<00:15:48.920> if without using the microphone um if without using the microphone um if someone<00:15:49.399> is<00:15:49.560> able<00:15:49.759> to<00:15:49.880> put<00:15:50.000> malware<00:15:50.399> on<00:15:50.519> your someone is able to put malware on your someone is able to put malware on your iPhone<00:15:51.079> they<00:15:51.160> could<00:15:51.399> then<00:15:51.880> maybe<00:15:52.160> get<00:15:52.319> the iPhone they could then maybe get the iPhone they could then maybe get the typing<00:15:52.880> that<00:15:53.040> you<00:15:53.199> do<00:15:53.440> whenever<00:15:53.800> you<00:15:53.959> put<00:15:54.079> your typing that you do whenever you put your typing that you do whenever you put your iPhone<00:15:54.560> next<00:15:54.720> to<00:15:54.880> your<00:15:55.199> keyboard<00:15:56.199> there's iPhone next to your keyboard there's iPhone next to your keyboard there's several<00:15:56.839> other<00:15:57.040> notable<00:15:57.399> attacks<00:15:57.720> that several other notable attacks that several other notable attacks that unfortunately<00:15:58.319> I<00:15:58.399> don't<00:15:58.519> have<00:15:58.680> time<00:15:59.000> to<00:15:59.120> go unfortunately I don't have time to go unfortunately I don't have time to go into<00:15:59.600> but<00:15:59.720> the<00:15:59.839> one<00:16:00.040> that<00:16:00.160> I<00:16:00.240> wanted<00:16:00.480> to<00:16:00.639> point into but the one that I wanted to point into but the one that I wanted to point out<00:16:01.160> was<00:16:01.279> a<00:16:01.440> group<00:16:01.720> from<00:16:01.839> the<00:16:01.959> University<00:16:02.319> of out was a group from the University of out was a group from the University of Michigan<00:16:03.240> which<00:16:03.399> was<00:16:03.560> able<00:16:03.759> to<00:16:03.959> take<00:16:04.319> voting Michigan which was able to take voting Michigan which was able to take voting machines<00:16:05.360> the<00:16:05.639> seoa<00:16:06.160> ABC<00:16:06.600> Edge<00:16:06.959> Dres<00:16:07.360> that machines the seoa ABC Edge Dres that machines the seoa ABC Edge Dres that were<00:16:07.560> going<00:16:07.720> to<00:16:07.759> be<00:16:07.880> used<00:16:08.040> in<00:16:08.160> New<00:16:08.279> Jersey<00:16:08.560> in were going to be used in New Jersey in were going to be used in New Jersey in the<00:16:08.759> election<00:16:09.160> that<00:16:09.240> were<00:16:09.399> left<00:16:09.560> in<00:16:09.639> a<00:16:09.800> hallway the election that were left in a hallway the election that were left in a hallway and<00:16:10.440> put<00:16:10.680> Pac-Man<00:16:11.040> on<00:16:11.160> it<00:16:11.360> so<00:16:11.519> they<00:16:11.600> ran<00:16:11.839> the and put Pac-Man on it so they ran the and put Pac-Man on it so they ran the Pac-Man



game<00:16:15.519> what<00:16:15.639> does<00:16:15.800> this<00:16:15.959> all<00:16:16.160> mean<00:16:17.120> well<00:16:17.839> I
game what does this all mean well I game what does this all mean well I think<00:16:18.399> that<00:16:18.800> Society<00:16:19.279> tends<00:16:19.560> to<00:16:19.720> adopt think that Society tends to adopt think that Society tends to adopt technology<00:16:20.560> really<00:16:20.759> quickly<00:16:21.199> I<00:16:21.319> love<00:16:21.519> the technology really quickly I love the technology really quickly I love the next<00:16:21.959> coolest<00:16:22.440> Gadget<00:16:23.279> but<00:16:23.399> it's<00:16:23.639> very next coolest Gadget but it's very next coolest Gadget but it's very important<00:16:24.199> and<00:16:24.319> these<00:16:24.480> researchers<00:16:24.959> are important and these researchers are important and these researchers are showing<00:16:25.639> that<00:16:25.759> the<00:16:25.880> developers<00:16:26.639> of<00:16:26.800> these showing that the developers of these showing that the developers of these things<00:16:27.360> need<00:16:27.519> to<00:16:27.680> take<00:16:27.920> security<00:16:28.319> into things need to take security into things need to take security into account<00:16:28.920> from<00:16:29.079> the<00:16:29.199> very<00:16:29.399> beginning<00:16:30.040> and<00:16:30.199> need account from the very beginning and need account from the very beginning and need to<00:16:30.680> realize<00:16:31.399> that<00:16:31.680> the<00:16:31.920> they<00:16:32.040> may<00:16:32.199> have<00:16:32.319> a to realize that the they may have a to realize that the they may have a threat<00:16:32.720> model<00:16:33.279> but<00:16:33.440> the<00:16:33.560> attackers<00:16:34.040> may<00:16:34.199> not threat model but the attackers may not threat model but the attackers may not be<00:16:34.519> nice<00:16:34.800> enough<00:16:35.040> to<00:16:35.199> limit<00:16:35.600> themselves<00:16:35.839> to be nice enough to limit themselves to be nice enough to limit themselves to that<00:16:36.199> threat<00:16:36.440> model<00:16:37.079> and<00:16:37.160> so<00:16:37.319> you<00:16:37.440> need<00:16:37.560> to that threat model and so you need to that threat model and so you need to think<00:16:37.959> outside<00:16:38.279> of<00:16:38.399> the<00:16:38.600> box<00:16:39.560> what<00:16:39.720> we<00:16:39.839> can<00:16:40.000> do think outside of the box what we can do think outside of the box what we can do is<00:16:40.480> be<00:16:40.680> aware<00:16:41.440> that<00:16:41.680> devices<00:16:42.120> can<00:16:42.279> be is be aware that devices can be is be aware that devices can be compromised<00:16:43.399> and<00:16:43.639> anything<00:16:43.959> that<00:16:44.120> has compromised and anything that has compromised and anything that has software<00:16:44.800> in<00:16:45.000> it<00:16:45.480> is<00:16:45.639> going<00:16:45.800> to<00:16:45.920> be<00:16:46.079> vulnerable software in it is going to be vulnerable software in it is going to be vulnerable it's<00:16:46.880> going<00:16:47.040> to<00:16:47.199> have<00:16:47.639> bugs<00:16:48.639> thank<00:16:48.759> you<00:16:48.920> very it's going to have bugs thank you very it's going to have bugs thank you very much

Avi Rubin, TED TEDx TEDxMidAtlantic TED-Ed TED Ed, TEDEducation, hack, hacker, hacking, hackable, world

Hide picture