SKIP TO CONTENT

All your devices can be hacked

63 words 272 learners

Learn words with Flashcards and other activities

Full list of words from this list:

  1. expertise
    skillfulness by virtue of possessing special knowledge
    I'm a computer science professor, and my area of expertise is computer and information security.
  2. security
    the state of being free from danger or injury
    I'm a computer science professor, and my area of expertise is computer and information security.
  3. opportunity
    a possibility from a favorable combination of circumstances
    When I was in graduate school, I had the opportunity to overhear my grandmother describing to one of her fellow senior citizens what I did for a living.
  4. apparently
    seemingly; as far as one can tell
    Apparently, I was in charge of making sure that no one stole the computers from the university.
  5. reasonable
    showing sound judgment
    (Laughter) And, you know, that's a perfectly reasonable thing for her to think, because I told her I was working in computer security, and it was interesting to get her perspective.
  6. perspective
    a way of regarding situations or topics
    (Laughter) And, you know, that's a perfectly reasonable thing for her to think, because I told her I was working in computer security, and it was interesting to get her perspective.
  7. ridiculous
    incongruous or absurd
    But that's not the most ridiculous thing I've ever heard anyone say about my work.
  8. concern
    something that interests you because it is important
    The most ridiculous thing I ever heard is, I was at a dinner party, and a woman heard that I work in computer security, and she asked me if -- she said her computer had been infected by a virus, and she was very concerned that she might get sick from it, that she could get this virus.
  9. reassured
    having confidence restored; freed from anxiety
    (Laughter) And I'm not a doctor, but I reassured her that it was very, very unlikely that this would happen, but if she felt more comfortable, she could be free to use latex gloves when she was on the computer, and there would be no harm whatsoever in that.
  10. whatsoever
    one or some or every or all without specification
    (Laughter) And I'm not a doctor, but I reassured her that it was very, very unlikely that this would happen, but if she felt more comfortable, she could be free to use latex gloves when she was on the computer, and there would be no harm whatsoever in that.
  11. notion
    a general inclusive concept
    I'm going to get back to this notion of being able to get a virus from your computer, in a serious way.
  12. hack
    chop or cut away
    What I'm going to talk to you about today are some hacks, some real world cyber-attacks that people in my community, the academic research community, have performed, which I don't think most people know about, and I think they're very interesting and scary, and this talk is kind of a greatest hits of the academic security community's hacks.
  13. community
    a group of people living in a particular local area
    What I'm going to talk to you about today are some hacks, some real world cyber-attacks that people in my community, the academic research community, have performed, which I don't think most people know about, and I think they're very interesting and scary, and this talk is kind of a greatest hits of the academic security community's hacks.
  14. incorporated
    formed or united into a whole
    It's all work that my colleagues have done, and I actually asked them for their slides and incorporated them into this talk.
  15. implant
    fix or set securely or deeply
    So the first one I'm going to talk about are implanted medical devices.
  16. devices
    an inclination or desire
    So the first one I'm going to talk about are implanted medical devices.
  17. pacemaker
    a horse or person used to set the racing speed
    You can see in 1926 the first pacemaker was invented.
  18. milestone
    stone post at side of a road to show distances
    In 2006, we hit an important milestone from the perspective of computer security.
  19. aorta
    the large artery carrying blood from the heart to the body
    One thing that brings us close to home is we look at Dick Cheney's device, he had a device that pumped blood from an aorta to another part of the heart, and as you can see at the bottom there, it was controlled by a computer controller, and if you ever thought that software liability was very important, get one of these inside of you.
  20. liability
    the state of being legally obliged and responsible
    One thing that brings us close to home is we look at Dick Cheney's device, he had a device that pumped blood from an aorta to another part of the heart, and as you can see at the bottom there, it was controlled by a computer controller, and if you ever thought that software liability was very important, get one of these inside of you.
  21. protocol
    forms of ceremony and etiquette observed by officials
    Well, in order to not have to open up the person every time you want to reprogram their device or do some diagnostics on it, they made the thing be able to communicate wirelessly, and what this research team did is they reverse engineered the wireless protocol, and they built the device you see pictured here, with a little antenna, that could talk the protocol to the device, and thus control it.
  22. volunteer
    a person who performs work done by choice
    In order to make their experience real -- they were unable to find any volunteers, and so they went and they got some ground beef and some bacon and they wrapped it all up to about the size of a human being's area where the device would go, and they stuck the device inside it to perform their experiment somewhat realistically.
  23. launch
    propel with force
    They launched many, many successful attacks.
  24. therapy
    the act of providing treatment for an illness or disorder
    And they were able to change therapies, including disabling the device -- and this is with a real, commercial, off-the-shelf device --simply by performing reverse engineering and sending wireless signals to it.
  25. disabling
    crippling or incapacitating
    And they were able to change therapies, including disabling the device -- and this is with a real, commercial, off-the-shelf device --simply by performing reverse engineering and sending wireless signals to it.
  26. disrupt
    make a break in
    There was a piece on NPR that some of these ICDs could actually have their performance disrupted simply by holding a pair of headphones onto them.
  27. standard
    a basis for comparison
    There's several examples up on the screen of situations where doctors are looking to implant devices inside of people, and all of these devices now, it's standard that they communicate wirelessly, and I think this is great, but without a full understanding of trustworthy computing, and without understanding what attackers can do and the security risks from the beginning, there's a lot of danger in this.
  28. trustworthy
    worthy of trust or belief
    There's several examples up on the screen of situations where doctors are looking to implant devices inside of people, and all of these devices now, it's standard that they communicate wirelessly, and I think this is great, but without a full understanding of trustworthy computing, and without understanding what attackers can do and the security risks from the beginning, there's a lot of danger in this.
  29. gear
    a toothed wheel that engages another toothed mechanism
    Okay, let me shift gears and show you another target.
  30. target
    a reference point to shoot at
    Okay, let me shift gears and show you another target.
  31. sophisticated
    having worldly knowledge and refinement
    The modern car is a sophisticated multi-computer device.
  32. vulnerability
    the state of being exposed to harm
    That software has to receive and decode the radio signal, and then figure out what to do with it, even if it's just music that it needs to play on the radio, and that software that does that decoding, if it has any bugs in it, could create a vulnerability for somebody to hack the car.
  33. exploit
    use or manipulate to one's advantage
    The way that the researchers did this work is, they read the software in the computer chipsthat were in the car, and then they used sophisticated reverse engineering tools to figure out what that software did, and then they found vulnerabilities in that software, and then they built exploits to exploit those.
  34. threat
    declaration of an intention to inflict harm on another
    The first threat model was to see what someone could do if an attacker actually got access to the internal network on the car.Okay, so think of that as, someone gets to go to your car, they get to mess around with it, and then they leave, and now, what kind of trouble are you in?
  35. abandoned
    forsaken by owner or inhabitants
    Then they went out to an abandoned airstrip with two cars, the target victim car and the chase car, and they launched a bunch of other attacks.
  36. victim
    an unfortunate person who suffers from adverse circumstances
    Then they went out to an abandoned airstrip with two cars, the target victim car and the chase car, and they launched a bunch of other attacks.
  37. trigger
    lever that activates the firing mechanism of a gun
    They also were able to install malware that wouldn't kick in and wouldn't trigger until the car was doing something like going over 20 miles an hour, or something like that.
  38. implemented
    forced or compelled or put in force
    All of these were implemented successfully.
  39. surveillance
    close observation of a person or group
    Surveillance was really interesting. show themselves the microphone in the car, and listening in on the car while tracking it via GPS on a map, and so that's something that the drivers of the car would never know was happening.
  40. enforcement
    ensuring observance of or obedience to
    P25 radios are used by law enforcement and all kinds of government agencies and people in combat to communicate, and there's an encryption option on these phones.
  41. combat
    the act of fighting; any contest or struggle
    P25 radios are used by law enforcement and all kinds of government agencies and people in combat to communicate, and there's an encryption option on these phones.
  42. denial
    renunciation of one's own interests in favor of others
    Could you run a denial-of-service, because these are first responders?
  43. terrorist
    a radical who advocates violence against civilians
    So, would a terrorist organization want to black out the ability of police and fire to communicate at an emergency?
  44. frequency
    the number of occurrences within a given time period
    They found that there's this GirlTech device used for texting that happens to operate at the same exact frequency as the P25, and they built what they called My First Jammer.
  45. encrypt
    convert ordinary language into code
    This is encrypted.
  46. metropolitan
    relating to or characteristic of a large urban area
    If they found encrypted communication, they stayed on that channel and they wrote down, that's a channel that these people communicate in, these law enforcement agencies, and they went to 20 metropolitan areas and listened in on conversations that were happening at those frequencies.
  47. confidential
    given in secret
    Well, they found the names and information about confidential informants.
  48. criminal
    someone who has committed a punishable act
    It was mostly law enforcement and criminal.
  49. port
    where people and merchandise can enter or leave a country
    Every security expert wants to hack a smartphone, and we tend to look at the USB port, the GPS for tracking, the camera, the microphone, but no one up till this point had looked at the accelerometer.
  50. orientation
    the act of determining one's position
    The accelerometer is the thing that determines the vertical orientation of the smartphone.
  51. perturbation
    the act of causing disorder
    Now, when they tried this on an iPhone 3GS, this is a graph of the perturbations that were created by the typing, and you can see that it's very difficult to tell when somebody was typing or what they were typing, but the iPhone 4 greatly improved the accelerometer, and so the same measurement produced this graph.
  52. supreme
    greatest in status or authority or power
    They typed in, "The Illinois Supreme Court has ruled that Rahm Emanuel is eligible to run for Mayor of Chicago" — see, I tied it in to the last talk — "and ordered him to stay on the ballot."
  53. court
    an assembly to conduct judicial business
    They typed in, "The Illinois Supreme Court has ruled that Rahm Emanuel is eligible to run for Mayor of Chicago" — see, I tied it in to the last talk — "and ordered him to stay on the ballot."
  54. mayor
    the head of a city government
    They typed in, "The Illinois Supreme Court has ruled that Rahm Emanuel is eligible to run for Mayor of Chicago" — see, I tied it in to the last talk — "and ordered him to stay on the ballot."
  55. ballot
    a document listing the alternatives that is used in voting
    They typed in, "The Illinois Supreme Court has ruled that Rahm Emanuel is eligible to run for Mayor of Chicago" — see, I tied it in to the last talk — "and ordered him to stay on the ballot."
  56. manifest
    clearly revealed to the mind or the senses or judgment
    Well, in the Android platform, for example, the developers have a manifest where every device on there, the microphone, etc., has to register if you're going to use it so that hackers can't take over it, but nobody controls the accelerometer.
  57. notable
    worthy of attention or interest
    There's several other notable attacks that unfortunately I don't have time to go into, but the one that I wanted to point out was a group from the University of Michigan which was able to take voting machines, the Sequoia AVC Edge DREs that were going to be used in New Jersey in the election that were left in a hallway, and put Pac-Man on it.
  58. vote
    a choice made by counting people in favor of alternatives
    There's several other notable attacks that unfortunately I don't have time to go into, but the one that I wanted to point out was a group from the University of Michigan which was able to take voting machines, the Sequoia AVC Edge DREs that were going to be used in New Jersey in the election that were left in a hallway, and put Pac-Man on it.
  59. election
    a vote choosing the winner of a position or political office
    There's several other notable attacks that unfortunately I don't have time to go into, but the one that I wanted to point out was a group from the University of Michigan which was able to take voting machines, the Sequoia AVC Edge DREs that were going to be used in New Jersey in the election that were left in a hallway, and put Pac-Man on it.
  60. society
    an extended group having a distinctive cultural organization
    Well, I think that society tends to adopt technology really quickly.
  61. limit
    as far as something can go
    But it's very important, and these researchers are showing, that the developers of these things need to take security into account from the very beginning, and need to realize that they may have a threat model, but the attackers may not be nice enough to limit themselves to that threat model, and so you need to think outside of the box.
  62. aware
    having or showing knowledge or understanding or realization
    What we can do is be aware that devices can be compromised, and anything that has software in it is going to be vulnerable.
  63. vulnerable
    capable of being wounded or hurt
    What we can do is be aware that devices can be compromised, and anything that has software in it is going to be vulnerable.
Created on Mon Jan 13 18:43:16 EST 2014

Sign up now (it’s free!)

Whether you’re a teacher or a learner, Vocabulary.com can put you or your class on the path to systematic vocabulary improvement.