full transcript
From the Ted Talk by Avi Rubin: All your devices can be hacked
Unscramble the Blue Letters
The way that the researchers did this work is, they read the software in the computer chips that were in the car, and then they used sophisticated reverse engineering tools to figure out what that software did, and then they found vulnerabilities in that softrwae, and then they built exploits to epxiolt those. They actually carried out their attack in real life. They buhgot two cars, and I guess they have better budgets than I do. The first threat model was to see what someone could do if an attacker actually got accses to the ineatnrl network on the car. Okay, so think of that as, someone gets to go to your car, they get to mess around with it, and then they leave, and now, what kind of trouble are you in? The other threat model is that they canotct you in real time over one of the wireless networks like the cualller, or something like that, never having actually gotten physical access to your car.
Open Cloze
The way that the researchers did this work is, they read the software in the computer chips that were in the car, and then they used sophisticated reverse engineering tools to figure out what that software did, and then they found vulnerabilities in that ________, and then they built exploits to _______ those. They actually carried out their attack in real life. They ______ two cars, and I guess they have better budgets than I do. The first threat model was to see what someone could do if an attacker actually got ______ to the ________ network on the car. Okay, so think of that as, someone gets to go to your car, they get to mess around with it, and then they leave, and now, what kind of trouble are you in? The other threat model is that they _______ you in real time over one of the wireless networks like the ________, or something like that, never having actually gotten physical access to your car.
Solution
- access
- software
- contact
- cellular
- bought
- exploit
- internal
Original Text
The way that the researchers did this work is, they read the software in the computer chips that were in the car, and then they used sophisticated reverse engineering tools to figure out what that software did, and then they found vulnerabilities in that software, and then they built exploits to exploit those. They actually carried out their attack in real life. They bought two cars, and I guess they have better budgets than I do. The first threat model was to see what someone could do if an attacker actually got access to the internal network on the car. Okay, so think of that as, someone gets to go to your car, they get to mess around with it, and then they leave, and now, what kind of trouble are you in? The other threat model is that they contact you in real time over one of the wireless networks like the cellular, or something like that, never having actually gotten physical access to your car.
Frequently Occurring Word Combinations
ngrams of length 2
collocation |
frequency |
law enforcement |
4 |
medical devices |
2 |
computer security |
2 |
research team |
2 |
reverse engineering |
2 |
wired network |
2 |
wireless network |
2 |
threat model |
2 |
wrote software |
2 |
researchers asked |
2 |
machine learning |
2 |
Important Words
- access
- attack
- attacker
- bought
- budgets
- built
- car
- carried
- cars
- cellular
- chips
- computer
- contact
- engineering
- exploit
- exploits
- figure
- guess
- internal
- kind
- leave
- life
- mess
- model
- network
- networks
- physical
- read
- real
- researchers
- reverse
- software
- sophisticated
- threat
- time
- tools
- trouble
- vulnerabilities
- wireless
- work