full transcript

From the Ted Talk by Avi Rubin: All your devices can be hacked


Unscramble the Blue Letters


The way that the researchers did this work is, they read the software in the computer chips that were in the car, and then they used sophisticated reverse engineering tools to figure out what that software did, and then they found vulnerabilities in that softrwae, and then they built exploits to epxiolt those. They actually carried out their attack in real life. They buhgot two cars, and I guess they have better budgets than I do. The first threat model was to see what someone could do if an attacker actually got accses to the ineatnrl network on the car. Okay, so think of that as, someone gets to go to your car, they get to mess around with it, and then they leave, and now, what kind of trouble are you in? The other threat model is that they canotct you in real time over one of the wireless networks like the cualller, or something like that, never having actually gotten physical access to your car.

Open Cloze


The way that the researchers did this work is, they read the software in the computer chips that were in the car, and then they used sophisticated reverse engineering tools to figure out what that software did, and then they found vulnerabilities in that ________, and then they built exploits to _______ those. They actually carried out their attack in real life. They ______ two cars, and I guess they have better budgets than I do. The first threat model was to see what someone could do if an attacker actually got ______ to the ________ network on the car. Okay, so think of that as, someone gets to go to your car, they get to mess around with it, and then they leave, and now, what kind of trouble are you in? The other threat model is that they _______ you in real time over one of the wireless networks like the ________, or something like that, never having actually gotten physical access to your car.

Solution


  1. access
  2. software
  3. contact
  4. cellular
  5. bought
  6. exploit
  7. internal

Original Text


The way that the researchers did this work is, they read the software in the computer chips that were in the car, and then they used sophisticated reverse engineering tools to figure out what that software did, and then they found vulnerabilities in that software, and then they built exploits to exploit those. They actually carried out their attack in real life. They bought two cars, and I guess they have better budgets than I do. The first threat model was to see what someone could do if an attacker actually got access to the internal network on the car. Okay, so think of that as, someone gets to go to your car, they get to mess around with it, and then they leave, and now, what kind of trouble are you in? The other threat model is that they contact you in real time over one of the wireless networks like the cellular, or something like that, never having actually gotten physical access to your car.

Frequently Occurring Word Combinations


ngrams of length 2

collocation frequency
law enforcement 4
medical devices 2
computer security 2
research team 2
reverse engineering 2
wired network 2
wireless network 2
threat model 2
wrote software 2
researchers asked 2
machine learning 2



Important Words


  1. access
  2. attack
  3. attacker
  4. bought
  5. budgets
  6. built
  7. car
  8. carried
  9. cars
  10. cellular
  11. chips
  12. computer
  13. contact
  14. engineering
  15. exploit
  16. exploits
  17. figure
  18. guess
  19. internal
  20. kind
  21. leave
  22. life
  23. mess
  24. model
  25. network
  26. networks
  27. physical
  28. read
  29. real
  30. researchers
  31. reverse
  32. software
  33. sophisticated
  34. threat
  35. time
  36. tools
  37. trouble
  38. vulnerabilities
  39. wireless
  40. work