首页> 外文会议>International symposium on research in attacks, intrusions and defenses >Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit
【24h】

Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit

机译:无需动手即可打破健身记录:逆向工程和欺骗Fitbit

获取原文

摘要

Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect information about their exercising patterns. Smartphones push this health-related data to vendors' cloud platforms, enabling users to analyze summary statistics on-line and adjust their habits. Third-parties including health insurance providers now offer discounts and financial rewards in exchange for such private information and evidence of healthy lifestyles. Given the associated monetary value, the authenticity and correctness of the activity data collected becomes imperative. In this paper, we provide an in-depth security analysis of the operation of fitness trackers commercialized by Fitbit, the wearables market leader. We reveal an intricate security through obscurity approach implemented by the user activity synchronization protocol running on the devices we analyze. Although non-trivial to interpret, we reverse engineer the message semantics, demonstrate how falsified user activity reports can be injected, and argue that based on our discoveries, such attacks can be performed at scale to obtain financial gains. We further document a hardware attack vector that enables circumvention of the end-to-end protocol encryption present in the latest Fitbit firmware, leading to the spoofing of valid encrypted fitness data. Finally, we give guidelines for avoiding similar vulnerabilities in future system designs.
机译:每年都有数以千万计的可穿戴健身追踪器发送给定期收集有关其锻炼方式的信息的消费者。智能手机将与健康相关的数据推送到供应商的云平台,使用户可以在线分析摘要统计信息并调整其习惯。现在,包括健康保险提供商在内的第三方提供折扣和经济奖励,以换取此类私人信息和健康生活方式的证据。给定相关联的货币价值,所收集活动数据的真实性和正确性变得势在必行。在本文中,我们对可穿戴设备市场领导者Fitbit商业化的健身追踪器的操作进行了深入的安全性分析。我们通过我们分析的设备上运行的用户活动同步协议实现的模糊方法,揭示了一种复杂的安全性。尽管难以解释,但我们对消息语义进行了逆向工程,展示了如何注入虚假的用户活动报告,并认为根据我们的发现,可以大规模进行此类攻击以获得经济收益。我们进一步记录了一种硬件攻击媒介,该媒介能够规避最新的Fitbit固件中存在的端到端协议加密,从而导致对有效的加密适应性数据进行欺骗。最后,我们提供了避免将来系统设计中类似漏洞的指南。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号