英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语

美国国家公共电台 NPR What Happens When Hackers Hijack Our Smart Devices?

时间:2017-01-18 02:34来源:互联网 提供网友:nan   字体: [ ]
特别声明:本栏目内容均从网络收集或者网友提供,供仅参考试用,我们无法保证内容完整和正确。如果资料损害了您的权益,请与站长联系,我们将及时删除并致以歉意。
    (单词翻译:双击或拖选)

 

GUY RAZ, HOST: 

On the show today, ideas about the Power Of Networks how those connections, those pathways define the world around us.

AVI RUBIN: Well, in my house, my doorbell is connected to my cell phone which is connected to my laptop which is connected to...

RAZ: This is computer scientist Avi Rubin.

RUBIN: ...The thermostat2 which is connected to the alarm system, and I can sit in my bathroom after I've taken a shower and before I've gotten dressed and pick up my phone and turn on the heat in my car. And then turn on the coffeemaker and the toaster.

RAZ: And we're all headed in this direction, right?

RUBIN: Yeah.

RAZ: I mean, our homes and our appliances - they are basically becoming extensions of us.

RUBIN: Yes. It's known as the internet of things, and all these devices are not only connected to each other, but they're connected to pretty much every other device on the Internet.

RAZ: So I should probably mention here that Avi's area of expertise3 is computer security which means he understands how all of this connectivity can also make us incredibly vulnerable.

Is everything that we own that's connected to the internet, can all of that in theory be hacked5?

RUBIN: I would say that that's a fair assumption.

RAZ: That's totally crazy.

RUBIN: Yes.

(SOUNDBITE OF ARCHIVED RECORDING)

UNIDENTIFIED REPORTER #1: If you had internet trouble this morning, you weren't alone. Hackers7 disrupted...

UNIDENTIFIED REPORTER #2: A series of cyber attacks today against the internet.

RAZ: You might remember this. It was a few months ago. Some of the biggest sites on the internet like Amazon and Google went down across large parts of the U.S.

(SOUNDBITE OF ARCHIVED RECORDING)

UNIDENTIFIED REPORTER #3: The attacks began early this morning as websites from Twitter to Netflix...

RAZ: And that disruption was caused by an attack, an attack that actually began inside the internet of things, inside the devices we use every day.

RUBIN: Unbeknownst to us, hackers out there were able to put malicious8 software on these devices by taking advantage of bugs10 in the software when these things were manufactured.

(SOUNDBITE OF ARCHIVED RECORDING)

UNIDENTIFIED WOMAN: Basically your everyday household things.

UNIDENTIFIED REPORTER #4: Experts say cheap, generic11 devices are usually the most susceptible12...

UNIDENTIFIED WOMAN: Like routers, security cameras, DVRs...

RUBIN: So some attacker sent the command to all these devices at the same time saying attack.

(SOUNDBITE OF ARCHIVED RECORDING)

UNIDENTIFIED REPORTER #5: The attacks focused on Dyn Inc., an internet switchboard for numerous major websites. The attacks continued throughout the day.

RUBIN: And so that attack was able to produce a situation where a lot of users were not able to communicate with some of the services that they rely on the most, like Twitter and Google and other sites. The service simply wasn't available.

RAZ: Just not available.

RUBIN: And it's not in most people's threat model.

RAZ: Yeah.

RUBIN: People don't say, well, I'll watch Netflix if it's available. They just say, I'm going to watch Netflix. You assume it's going to be there.

RAZ: OK, losing Netflix for a day or two - not the end of the world, right? But what Avi is worried about is that hackers can exploit our growing dependence13 on the internet of things to do some really serious damage, which he explained on the TED1 stage.

(SOUNDBITE OF TED TALK)

RUBIN: So let me talk about a couple of more interesting internet of things hacks14. One of them is Samsung's new smart fridge, OK? Samsung realized that in order to know what's on your calendar, people don't want to have to pull out their phone or go look on their computer. They can just look on their fridge. And so they designed a smart fridge that you could log into with your Google credentials15 and see your calendar right there on your fridge. The only problem is the people that built that may not have had a lot of security training. And they don't validate16 the SSL certificates. For those of you that are not technical, trust me, that means bad stuff will happen.

(LAUGHTER)

RUBIN: And what you can do is if the certificates aren't validated17, you can create a man-in-the-middle attack which will allow somebody to get the person's Gmail email, all the history of all of their email, and to log into their Gmail account, basically, because they have a smart fridge. Now, we've all seen these fitness trackers that are all the rage. Everybody is tracking their steps and their running and their health and their fitness. What I'm showing you here is a fitness tracker, one of the top models, that had a bug9 in the software. And it causes the sensors18 to sample way too much. And it injured this person.

Another device that is in the health and fitness space that I purchased was this blood pressure monitor. You use your iPhone, and then you can see - you know, say start and you can see your progress, et cetera. So I put this thing on and I activated19 it, and it started squeezing my arm. And it squeezed really, really hard. And I tend to be pretty claustrophobic, and I was starting to wonder if this thing was going to rip my arm off. I mean, it really, really, really hurt. So it didn't rip off my arm, fortunately, but I got a really scary reading. I was supposed to be dead in about three minutes based on my blood pressure reading when I did that.

And there are even things like implantable devices, like defibrillators that go right into a person, and those have connectivity to devices that can control them. And if you think about it, it makes sense, right? If somebody needs to change their defibrillator settings because their medical condition changed, you shouldn't have to cut the person open and do that if you can do it wirelessly21. But at the same time, you have to design that system so that someone can't sit in, you know, Grand Central Station and put out wireless20 signals and have people dropping all around them because they just killed them.

RAZ: I mean, it seems like if you're a sophisticated hacker6 this is, like, a golden age because everybody is connected, everything around the world is connected, and more so every day. And we haven't even thought about what that means.

RUBIN: I think we're living in a honeymoon22 phase where we get most of the benefits of the internet without the hackers completely taking over and destroying all of this. But, you know, most people are not security specialists. And so they see software as an enabler. And you see more and more devices that you wouldn't normally consider to be smart or things that you would even want to be smart. You wonder, why would somebody make a smart one of those? And yet they do.

RAZ: Right. I mean, we were just hearing from Wanis Kabbaj and, I mean, he was saying how driverless cars could solve all these problems for us. And now I'm thinking, I mean, how vulnerable they would be to hacking23, right? And not even driverless cars - all cars, the cars that are on the road today.

RUBIN: Well, some of that's already happened. There have been demonstrations24 - numerous demonstrations of being able to hack4 into cars, actual commercially deployed25 vehicles that people are driving, and getting them to break, getting them to run up to very high speeds, disabling the brakes. All of that can be done today.

RAZ: Avi Rubin will be back in just a moment to explain how pretty much any modern car can be hacked. On the show today, the Power Of Networks for good and for not so good. I'm Guy Raz, and you're listening to the TED Radio Hour from NPR.

(SOUNDBITE OF MUSIC)

RAZ: It's the TED Radio Hour from NPR. I'm Guy Raz. And on the show today, ideas about the Power Of Networks, the ones in the natural world and the ones we build for ourselves. And we were just hearing from computer science professor Avi Rubin about how so many of the things in our lives, even our cars, are networked, connected to the internet, which makes those things incredibly vulnerable to hackers.

(SOUNDBITE OF TED TALK)

RUBIN: This is a car, and it has a lot of components26, a lot of electronics in it today. In fact, it's got many, many different computers inside of it, more Pentiums than my lab did when I was in college. And they're connected by a wired network. There's also a wireless network, which can be reached from many different ways. So there's Bluetooth. There's the FM and XM radio. There's actually Wi-Fi. There are sensors in the wheels that wirelessly communicate the tire pressure to a controller onboard.

And what happens if somebody wanted to attack this? Well, that's what the researchers that I'm going to talk about today did. They actually carried out their attack in real life. They bought two cars, and I guess they have better budgets than I do. The first threat model was to see what someone could do if an attacker actually got access to the internal network on the car, OK? So think of that as someone gets to go to your car, they get to mess around with it and then they leave. And now what kind of trouble are you in?

And so they connected to the diagnostic unit on the in-car network, and they did all kinds of silly things. Like, here's a picture of the speedometer showing 140 miles an hour when the car's in park. Now, you might say, OK, that's silly. Well, what if you make the car always say it's going 20 miles an hour slower than it's actually going? You might produce a lot of speeding tickets.

Then they went out to an abandoned airstrip with two cars, the target victim car and the chase car, and they launched a bunch of other attacks simply by hacking the computer. One of the things they were able to do from the chase car is apply the brakes on the other car. They were able to disable the brakes. They also were able to install malware that wouldn't kick in and wouldn't trigger until the car was doing something like going over 20 miles an hour or something like that.

They were able to compromise every single one of the pieces of software that controlled every single one of the wireless capabilities27 of the car. And when they gave this talk, even though they gave this talk at a conference to a bunch of computer security researchers, everybody was gasping28. Am I scaring you yet?

(SOUNDBITE OF MUSIC)

RAZ: Yeah, this is pretty scary stuff. Like, has this actually happened in the real world? Like, have hackers been able to do this?

RUBIN: Well, so far, all of those have happened in the lab and they've happened by responsible people who have published their work. But the car companies are scrambling29. I know, firsthand, that they are spending millions of dollars on security. And there has been research that's shown that the car manufacturers have a bit of a ways to go to get their cars to be secure against hackers.

RAZ: You're basically saying that we're in for a pretty dark period in the future.

RUBIN: Well, if I want to try to be optimistic, I would say that the security guys are going to come through. And I think that the way that we'll come through is we're going to have to change the internet infrastructure30. We're going to have to change the way software is developed. Some of these changes are happening already but not as fast as the attacks are happening.

But once the attackers are able to regularly disable the internet, once we go two weeks without any connectivity whatsoever31, by necessity, we will invent ways to communicate once again in a much more secure and protected way.

RAZ: You're saying that we, in our lifetimes, may witness weeks without the internet.

RUBIN: Yeah, I think we'll someday long for the days where we only had a few-hour outage of the internet.

RAZ: Is there any argument to be made that, like, maybe we should just put the genie32 back in the bottle, like, maybe we should unnetwork parts of our world?

RUBIN: I think the genie is out for good. I don't think there's any way to do that. Unfortunately, the bad guys might do that for us. But there's no way to impede33 progress. You can't, for example, propose that we eliminate electricity and not use electricity. And just as we can't go back to the days before electricity, we're never going to go back to the days before networks and connectivity.

(SOUNDBITE OF MUSIC)

RAZ: Avi Rubin is a professor of computer science at Johns Hopkins University. You can see his entire talk at ted.com.


点击收听单词发音收听单词发音  

1 ted 9gazhs     
vt.翻晒,撒,撒开
参考例句:
  • The invaders gut ted the village.侵略者把村中财物洗劫一空。
  • She often teds the corn when it's sunny.天好的时候她就翻晒玉米。
2 thermostat PGhyb     
n.恒温器
参考例句:
  • The thermostat is connected by a link to the carburetor.恒温控制器是由一根连杆与汽化器相连的。
  • The temperature is controlled by electronic thermostat with high accuracy.电子恒温器,准确性高。
3 expertise fmTx0     
n.专门知识(或技能等),专长
参考例句:
  • We were amazed at his expertise on the ski slopes.他斜坡滑雪的技能使我们赞叹不已。
  • You really have the technical expertise in a new breakthrough.让你真正在专业技术上有一个全新的突破。
4 hack BQJz2     
n.劈,砍,出租马车;v.劈,砍,干咳
参考例句:
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
5 hacked FrgzgZ     
生气
参考例句:
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
6 hacker Irszg9     
n.能盗用或偷改电脑中信息的人,电脑黑客
参考例句:
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
7 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
8 malicious e8UzX     
adj.有恶意的,心怀恶意的
参考例句:
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
9 bug 5skzf     
n.虫子;故障;窃听器;vt.纠缠;装窃听器
参考例句:
  • There is a bug in the system.系统出了故障。
  • The bird caught a bug on the fly.那鸟在飞行中捉住了一只昆虫。
10 bugs e3255bae220613022d67e26d2e4fa689     
adj.疯狂的,发疯的n.窃听器( bug的名词复数 );病菌;虫子;[计算机](制作软件程序所产生的意料不到的)错误
参考例句:
  • All programs have bugs and need endless refinement. 所有的程序都有漏洞,都需要不断改进。 来自《简明英汉词典》
  • The sacks of rice were swarming with bugs. 一袋袋的米里长满了虫子。 来自《简明英汉词典》
11 generic mgixr     
adj.一般的,普通的,共有的
参考例句:
  • I usually buy generic clothes instead of name brands.我通常买普通的衣服,不买名牌。
  • The generic woman appears to have an extraordinary faculty for swallowing the individual.一般妇女在婚后似乎有特别突出的抑制个性的能力。
12 susceptible 4rrw7     
adj.过敏的,敏感的;易动感情的,易受感动的
参考例句:
  • Children are more susceptible than adults.孩子比成人易受感动。
  • We are all susceptible to advertising.我们都易受广告的影响。
13 dependence 3wsx9     
n.依靠,依赖;信任,信赖;隶属
参考例句:
  • Doctors keep trying to break her dependence of the drug.医生们尽力使她戒除毒瘾。
  • He was freed from financial dependence on his parents.他在经济上摆脱了对父母的依赖。
14 hacks 7524d17c38ed0b02a3dc699263d3ce94     
黑客
参考例句:
  • But there are hacks who take advantage of people like Teddy. 但有些无赖会占类似泰迪的人的便宜。 来自电影对白
  • I want those two hacks back here, right now. 我要那两个雇工回到这儿,现在就回。 来自互联网
15 credentials credentials     
n.证明,资格,证明书,证件
参考例句:
  • He has long credentials of diplomatic service.他的外交工作资历很深。
  • Both candidates for the job have excellent credentials.此项工作的两个求职者都非常符合资格。
16 validate Jiewm     
vt.(法律)使有效,使生效
参考例句:
  • You need an official signature to validate the order.你要有正式的签字,这张汇票才能生效。
  • In order to validate the agreement,both parties sign it.为使协议有效,双方在上面签了字。
17 validated c9e825f4641cd3bec0ba01a0c2d67755     
v.证实( validate的过去式和过去分词 );确证;使生效;使有法律效力
参考例句:
  • Time validated our suspicion. 时间证实了我们的怀疑。 来自《现代英汉综合大词典》
  • The decade of history since 1927 had richly validated their thesis. 1927年以来的十年的历史,充分证明了他们的论点。 来自辞典例句
18 sensors 029aee483db9ae244d7a5cb353e74602     
n.传感器,灵敏元件( sensor的名词复数 )
参考例句:
  • There were more than 2000 sensors here. 这里装有两千多个灵敏元件。 来自《简明英汉词典》
  • Significant changes have been noted where sensors were exposed to trichloride. 当传感器暴露在三氯化物中时,有很大变化。 来自辞典例句
19 activated c3905c37f4127686d512a7665206852e     
adj. 激活的 动词activate的过去式和过去分词
参考例句:
  • The canister is filled with activated charcoal.蒸气回收罐中充满了活性炭。
20 wireless Rfwww     
adj.无线的;n.无线电
参考例句:
  • There are a lot of wireless links in a radio.收音机里有许多无线电线路。
  • Wireless messages tell us that the ship was sinking.无线电报告知我们那艘船正在下沉。
21 wirelessly 9cf7b6b54adbdbcf4be7f6db9924bae9     
不用电线的,用无线电波传送的
参考例句:
  • I heard it on the wireless. 我是从无线电收音机里听到的。
  • There are a lot of wireless links in a radio. 收音机里有许多无线电线路。
22 honeymoon ucnxc     
n.蜜月(假期);vi.度蜜月
参考例句:
  • While on honeymoon in Bali,she learned to scuba dive.她在巴厘岛度蜜月时学会了带水肺潜水。
  • The happy pair are leaving for their honeymoon.这幸福的一对就要去度蜜月了。
23 hacking KrIzgm     
n.非法访问计算机系统和数据库的活动
参考例句:
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
24 demonstrations 0922be6a2a3be4bdbebd28c620ab8f2d     
证明( demonstration的名词复数 ); 表明; 表达; 游行示威
参考例句:
  • Lectures will be interspersed with practical demonstrations. 讲课中将不时插入实际示范。
  • The new military government has banned strikes and demonstrations. 新的军人政府禁止罢工和示威活动。
25 deployed 4ceaf19fb3d0a70e329fcd3777bb05ea     
(尤指军事行动)使展开( deploy的过去式和过去分词 ); 施展; 部署; 有效地利用
参考例句:
  • Tanks have been deployed all along the front line. 沿整个前线已部署了坦克。
  • The artillery was deployed to bear on the fort. 火炮是对着那个碉堡部署的。
26 components 4725dcf446a342f1473a8228e42dfa48     
(机器、设备等的)构成要素,零件,成分; 成分( component的名词复数 ); [物理化学]组分; [数学]分量; (混合物的)组成部分
参考例句:
  • the components of a machine 机器部件
  • Our chemistry teacher often reduces a compound to its components in lab. 在实验室中化学老师常把化合物分解为各种成分。
27 capabilities f7b11037f2050959293aafb493b7653c     
n.能力( capability的名词复数 );可能;容量;[复数]潜在能力
参考例句:
  • He was somewhat pompous and had a high opinion of his own capabilities. 他有点自大,自视甚高。 来自辞典例句
  • Some programmers use tabs to break complex product capabilities into smaller chunks. 一些程序员认为,标签可以将复杂的功能分为每个窗格一组简单的功能。 来自About Face 3交互设计精髓
28 gasping gasping     
adj. 气喘的, 痉挛的 动词gasp的现在分词
参考例句:
  • He was gasping for breath. 他在喘气。
  • "Did you need a drink?""Yes, I'm gasping!” “你要喝点什么吗?”“我巴不得能喝点!”
29 scrambling cfea7454c3a8813b07de2178a1025138     
v.快速爬行( scramble的现在分词 );攀登;争夺;(军事飞机)紧急起飞
参考例句:
  • Scrambling up her hair, she darted out of the house. 她匆忙扎起头发,冲出房去。 来自《现代英汉综合大词典》
  • She is scrambling eggs. 她正在炒蛋。 来自《简明英汉词典》
30 infrastructure UbBz5     
n.下部构造,下部组织,基础结构,基础设施
参考例句:
  • We should step up the development of infrastructure for research.加强科学基础设施建设。
  • We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
31 whatsoever Beqz8i     
adv.(用于否定句中以加强语气)任何;pron.无论什么
参考例句:
  • There's no reason whatsoever to turn down this suggestion.没有任何理由拒绝这个建议。
  • All things whatsoever ye would that men should do to you,do ye even so to them.你想别人对你怎样,你就怎样对人。
32 genie xstzLd     
n.妖怪,神怪
参考例句:
  • Now the genie of his darkest and weakest side was speaking.他心灵中最阴暗最软弱的部分有一个精灵在说话。
  • He had to turn to the Genie of the Ring for help.他不得不向戒指神求助。
33 impede FcozA     
v.妨碍,阻碍,阻止
参考例句:
  • One shouldn't impede other's progress.一个人不应该妨碍他人进步。
  • The muddy roads impede our journey.我们的旅游被泥泞的道路阻挠了。
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎点击提交分享给大家。
------分隔线----------------------------
TAG标签:   NPR  美国国家电台  英语听力
顶一下
(0)
0%
踩一下
(0)
0%
最新评论 查看所有评论
发表评论 查看所有评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:
听力搜索
推荐频道
论坛新贴