Logo des Repositoriums
 

Attacks on fitness trackers revisited: a case-study of unfit firmware security

dc.contributor.authorRieck, Jakob
dc.contributor.editorMeier, Michael
dc.contributor.editorReinhardt, Delphine
dc.contributor.editorWendzel, Steffen
dc.date.accessioned2017-06-21T07:43:30Z
dc.date.available2017-06-21T07:43:30Z
dc.date.issued2016
dc.description.abstractFitness trackers - wearables that continuously record a wearer's step count and related activity data - are quickly gaining in popularity. Apart from being useful for individuals seeking a more healthy lifestyle, their data is also being used in court and by insurance companies to adjust premiums. For these use cases, it is essential to ensure authenticity and integrity of data. Here we demonstrate a flaw in the way firmware for Withings' Activité is verified, allowing an adversary to compromise the tracker itself. This type of attack has so far not been applied to fitness trackers. Vendors have started mitigating previous attacks, which manipulated data by interfering with wireless channels, or by physically moving the tracker to fool sensors. Hardware similarities amongst different trackers suggest findings can be transferred to other tracker as well.en
dc.identifier.isbn978-3-88579-650-3
dc.identifier.pissn1617-5468
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2016 - Sicherheit, Schutz und Zuverlässigkeit
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-256
dc.titleAttacks on fitness trackers revisited: a case-study of unfit firmware securityen
dc.typeText/Conference Paper
gi.citation.endPage44
gi.citation.publisherPlaceBonn
gi.citation.startPage33
gi.conference.date5.-7. April 2016
gi.conference.locationBonn

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
33.pdf
Größe:
114.32 KB
Format:
Adobe Portable Document Format