首页> 外文会议>International Symposium on Research in Attacks, Intrusions, and Defenses >Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit
【24h】

Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit

机译:突破健身记录而不搬家:逆向工程和欺骗Fitbit

获取原文

摘要

Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect information about their exercising patterns. Smartphones push this health-related data to vendors' cloud platforms, enabling users to analyze summary statistics on-line and adjust their habits. Third-parties including health insurance providers now offer discounts and financial rewards in exchange for such private information and evidence of healthy lifestyles. Given the associated monetary value, the authenticity and correctness of the activity data collected becomes imperative. In this paper, we provide an in-depth security analysis of the operation of fitness trackers commercialized by Fitbit, the wearables market leader. We reveal an intricate security through obscurity approach implemented by the user activity synchronization protocol running on the devices we analyze. Although non-trivial to interpret, we reverse engineer the message semantics, demonstrate how falsified user activity reports can be injected, and argue that based on our discoveries, such attacks can be performed at scale to obtain financial gains. We further document a hardware attack vector that enables circumvention of the end-to-end protocol encryption present in the latest Fitbit firmware, leading to the spoofing of valid encrypted fitness data. Finally, we give guidelines for avoiding similar vulnerabilities in future system designs.
机译:成千上万的可穿戴健身跟踪器为消费者发货,他们经常收集有关其行使模式的信息。智能手机将此与云平台推推此健康相关数据,使用户能够在线分析摘要统计数据并调整其习惯。第三方包括健康保险提供商现在提供折扣和财务奖励,以换取健康生活方式的私人信息和证据。鉴于相关的货币价值,收集的活动数据的真实性和正确性变得势在必行。在本文中,我们提供了由Fitbit商业化的健身跟踪器操作的深入安全分析,可穿戴物品市场领导者。我们通过在我们分析的设备上运行的用户活动同步协议实现的默默无地方法揭示了复杂的安全性。虽然不普遍解释,但我们撤消工程师语义,展示如何注入伪造的用户活动报告,并根据我们的发现,争论这种攻击可以以规模执行,以获得金融收益。我们进一步记录了一个硬件攻击矢量,使能够规避最新的Fitbit固件中存在的端到端协议加密,从而导致有效加密的健身数据的欺骗。最后,我们提供了避免在未来的系统设计中类似漏洞的指导方针。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号