【科學60秒】iphone——新一代007?
2011-11-02 16:49
一分鐘音頻,有趣又省時:
Used to be if spies wanted to eavesdrop, they planted a bug. These days, it's much easier. Because we all carry potential bugs in our pockets—smartphones. One team of researchers used an iPhone to track typing on a nearby computer keyboard with up to 80 percent accuracy. They presented the findings at a computer security conference in Chicago. [Philip Marquardt et al.,(sp)iPhone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers, 18th ACM Conference on Computer and Communications Security]
曾幾何時,特工要想竊聽,就得安裝竊聽器,現(xiàn)在這一切就小菜一碟了,其實我們的口袋里都帶著竊聽器——智能手機。一個調查團隊用iphone識別出了附近的一臺電腦鍵盤上輸入內容,準確率高達80%。,他們在芝加哥舉行的計算機安全大會上公布了這一發(fā)現(xiàn)。
The researchers designed a malicious app for the iPhone 4. When you place the phone near a keyboard, it exploits accelerometer and gyroscope data to sense vibrations as the victim types—detecting whether keystrokes come from the left or right side of the keyboard, and how near or far subsequent keys are from each other. Then, using that seismic fingerprint, the app checks a pre-created "vibrational" dictionary for the most likely words—a technique that works reliably on words of three letters or more.
調查人員研發(fā)了一款惡意應用程序,安裝在iPhone 4上。把手機放在鍵盤附近,手機利用加速器和螺旋儀的數(shù)據來感知振動頻率,檢測用戶按鍵是從左邊還是右邊,以及相鄰擊鍵相隔多遠,之后,程序根據振動特點查詢其先前創(chuàng)建的“振動式”字典,找出最相近的單詞,這項技術要求輸入的單詞最少有3個字母。
Of course, you'd need to install the app to allow it to spy. But whereas most apps have to ask permission to access location data or the camera, that's not so for the accelerometer. This kind of attack may offer good reason to limit accelerometer access too—and keep iPhones from becoming "spiPhones."
當然了,要想讓iphone成為特工,你需要安裝該程序才行。但是大多數(shù)程序要求許可證,才能訪問定位數(shù)據或攝像機,加速器則不需要。加速器的攻擊或許會給限制加速器使用一個正當?shù)睦碛?,由此一來,iphone自然無法成為“特工”。
是否喜歡這個擲地有聲的節(jié)目呢?那就別猶豫啦~點擊下圖訂閱吧~已有3.5萬滬友訂閱了哦~