首页> 外文OA文献 >Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit
【2h】

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

机译:在不移动的情况下打破健身记录:逆向工程和   欺骗Fitbit

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Tens of millions of wearable fitness trackers are shipped yearly to consumerswho routinely collect information about their exercising patterns. Smartphonespush this health-related data to vendors' cloud platforms, enabling users toanalyze summary statistics on-line and adjust their habits. Third-partiesincluding health insurance providers now offer discounts and financial rewardsin exchange for such private information and evidence of healthy lifestyles.Given the associated monetary value, the authenticity and correctness of theactivity data collected becomes imperative. In this paper, we provide anin-depth security analysis of the operation of fitness trackers commercializedby Fitbit, the wearables market leader. We reveal an intricate security throughobscurity approach implemented by the user activity synchronization protocolrunning on the devices we analyze. Although non-trivial to interpret, wereverse engineer the message semantics, demonstrate how falsified user activityreports can be injected, and argue that based on our discoveries, such attackscan be performed at scale to obtain financial gains. We further document ahardware attack vector that enables circumvention of the end-to-end protocolencryption present in the latest Fitbit firmware, leading to the spoofing ofvalid encrypted fitness data. Finally, we give guidelines for avoiding similarvulnerabilities in future system designs.
机译:每年有数以千万计的可穿戴健身追踪器被运送给定期收集有关其锻炼方式信息的消费者。智能手机将与健康相关的数据推送到供应商的云平台,使用户可以在线分析摘要统计信息并调整其习惯。现在,包括健康保险提供商在内的第三方都提供折扣和财务奖励,以交换这些私人信息和健康生活方式的证据。鉴于相关的货币价值,收集到的活动数据的真实性和正确性变得势在必行。在本文中,我们对可穿戴设备市场领导者Fitbit商业化的健身追踪器的操作进行了深入的安全性分析。我们揭示了运行在我们分析的设备上的用户活动同步协议实现的复杂的安全性通过模糊性方法。尽管难以解释,但还是对消息语义进行了逆向工程,展示了如何注入虚假的用户活动报告,并辩称根据我们的发现,可以大规模进行此类攻击以获得经济收益。我们进一步记录了一种硬件攻击媒介,该媒介能够规避最新的Fitbit固件中存在的端到端协议加密,从而导致对有效的加密适应性数据进行欺骗。最后,我们提供了避免将来系统设计中类似漏洞的指南。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号