Alexa, Can I Trust You? - TSAPPS at NIST

Page created by Edna Craig
 
CONTINUE READING
Alexa, Can I Trust You? - TSAPPS at NIST
Alexa, Can I Trust You?
 Hyunji Chung, Michaela Iorga, Jeffrey Voas, National Institute of Standards and Technology
                               Sangjin Lee, Korea University

 Security diagnostics expose vulnerabilities and privacy threats that exist in
 commercial Intelligent Virtual Assistants (IVA) – diagnostics offer the possibility
 of securer IVA ecosystems.

Intelligent Virtual Assistants (IVAs)            definition of a Whopper, pulled from
open a new world, a world where you              the website Wikipedia [2]. Since the
can talk to a machine as if it were a            website can be edited by users, the
human and the machine will perform               definition had been changed and
the work you request. For example,               “cyanide” was inserted as an
when you wake up, “Hey, what’s on                ingredient in one version. Such kind of
my schedule for today?” Before you               malicious information, if followed ad
leave the house, “Hey, what’s my                 litter am, can cause harm.
commute?” For dinner, “Hey, order
                                                 In this column, we urge readers to
one large size pepperoni pizza.” When
                                                 think about the potential security and
you go to sleep, “Hey, turn off the bed
                                                 privacy concerns of this technology.
room      lights.”    Ideally,     such
                                                 For instance, (1) “Is my IVA secure?”,
conversations should be solely
                                                 (2) “Is it listening to my
between you and the device assisting
                                                 conversations?”, (3) “Where is my
you. But are they? Do you know?
                                                 voice data stored?”, etc. The fact that
Where is the trust?
                                                 IVAs are installed in private homes
IVAs may be new and mysterious to                makes this a public-facing challenge,
some consumers, but they are in the              and one that attracts instant media
market place today. Gartner has said             attention when problems arise. To our
that the IVA market will reach $2.1              knowledge, security and privacy
billion by 2020 [1]. Voice assistants            threats of these IVAs have not received
such as Google Home, Apple's Siri and            enough attention.
Amazon's Echo devices have always
                                                 WHAT IS AN INTELIGENT
been susceptible to accidental hijack.
                                                 VIRTUAL ASSISTANT?
A Google ad during the Super Bowl
that used the phrase "OK, Google"                Predecessors       of    Assisting     IoT
reportedly set off people's home                 Devices
devices that began reciting the
IoT devices for assistance are not new.                               devices in the proximity of the user, an
IoT devices for assistance have                                       assistant of this type is powered by
evolved from half-century old chatbots                                artificial intelligence, and the “brain”
programmed to pass the Turing test 1                                  of the assistant is in a virtual place, e.g.,
(e.g., Eliza and Parry). A chatbot was                                a cloud. These devices are
a service that people interacted with in                              communicating with the virtual
writing via a chat interface. They                                    assistant, sometimes by default, but
worked by examining a user's typed                                    more often only when configured to do
comments and identifying known                                        so, and have no embedded intelligence.
keywords. If a keyword was found, a                                   We will employ, in this column, the
rule that transformed the user's                                      term IVA-enabled device when
comments was applied, and the                                         referring to such devices.
resulting sentence was returned [3].
                                                                      Well known IVAs
Today’s newer versions of IVAs can
                                                                      Table 1 summarizes known IVAs from
not only respond to voice commands,
                                                                      major vendors such as Amazon, Apple,
but also can play music if asked,
                                                                      Google and Microsoft [5]. (in
perform keyword searches, order items,
                                                                      alphabetical order)
turn on lights, open garage doors, and
can even sustain conversations [4].                                   Table 1. Summary of best known IVAs
                                                                                           IVA-enabled
Defining IVA                                                          Vendor      IVA          devices
There are various terms for this                                                            (Endpoints)
category of IoT devices. They include,                                                         Echo, Dot, Tab,
                                                                      Amazon     Alexa
                                                                                               Fire Tablet
but are not limited to, Smart Assistant,                                                       iPhone, iPad,
Intelligent Personal Assistant, Digital                               Apple      Siri
                                                                                               Mac
Assistant, Personal Virtual Assistant,                                           Google
                                                                                               Any phone with
Virtual Assistant Bot, etc. Among                                                Now &
                                                                      Google                   Android, Google
                                                                                 Google
these terms we can recognize some                                                              Home
                                                                                 Assistant
common keywords: ‘smart’, ‘assistant’,                                                         Any PC with
                                                                      Microsoft Cortana
‘intelligent’, and ‘virtual’. In this                                                          Windows
column, we employ the term
Intelligent Virtual Assistant (IVA),                                  ‘IVAs’ has an agent programs running
because,       even      though      the                              on ‘IVA-enabled devices’ (endpoints)
communication is facilitated by                                       such as iPhone, iPad, Mac, Fire tablet,
1
  The Turing test is a test, developed by Alan Turing in 1950, of a
machine's ability to exhibit intelligent behavior equivalent to, or
indistinguishable from, that of a human.
Echo, Google Home, etc. The main             (endpoints). Examples of the built-in
functionality, the “brain” of an IVA, is     IVA include Siri (for Apple products)
housed as a cloud service that               and Cortana (for Windows-based PCs).
processes voice data (converting             Examples of the stand-alone IVA
voice-to-text, performing linguistic         include Alexa (that uses Echo, Echo
context analysis, and providing              Dot and Tab dedicated devices) and
answers to questions.)                       Google Assistant (that uses Google
                                             Home dedicated device.) The
We divide IVAs into two types: (1)
                                             remainder of this article focuses on
built-in IVA that use multi-purpose
                                             security and privacy threat modeling
devices (endpoints) and (2) stand-
                                             for stand-alone IVAs that are operating
alone IVA that use dedicated devices
                                             in peoples’ homes.

                              Figure 1. IVA ecosystem

IDENTIFYING                  people’s actual voice        unauthorized entities to
THREAT VECTORS               sounds      which      are   use the data to identify
OF IVAs                      Personally Identifiable      individuals,            to
                             Information (PII) [6], we    maliciously obtain access
To identify ways to
                             extend the analysis to       to systems that implement
secure IVAs, we begin by
                             include user privacy. IVA    voice recognition, or
analyzing their security
                             vendors are already          simply to process data
vulnerabilities.   Then,
                             storing voice data, thus     and     construct    voice
since    IVAs     handle
                             making it possible for       artifacts that could be
used to impersonate these       (a.1) Endpoint1: an       To utilize IVAs, the IVA-
individuals.        These    Alexa-enabled    device      enabled devices need to
scenarios are problematic.   (Echo);                      run an agent program that
                                                          communicates with the
To identify the threat          (a.2) Endpoint2: a
                                                          cloud services. Major
vectors, we have learned     companion app that needs
                                                          vendors are providing this
how IVAs operate along       to be installed on user’s
                                                          agent by integrating it
with their components        device of choice;
                                                          into     their   operating
through a variety of
                             (b) The cloud side - the     systems: for example, the
analysis methods such as
                             ‘intelligent    assistant’   latest versions of iOS and
voice command tests,
                             Alexa that operates in the   OS X have the Siri agent
firmware        analysis,
                             Amazon’s            cloud    installed by default.
network traffic analysis,
                             environment.                 Microsoft Windows 10
and application analysis.
                             To test Alexa, we asked      has the Cortana agent as
By doing so, we can
                             Echo questions and got       one of its default
unveil useful details
                             answers. We learned that     processes. IVA agents
about IVA ecosystems.
                             all the requests sent to     from Amazon and Google
                             Alexa (through Echo)         are similar in principle
IVA ECOSYSTEMS               were stored in a cloud in    but use dedicated devices
                             text format and in           such as Echo and Google
In general, IVAs consist                                  Home.
                             recorded voice. All the
of multiple components
                             conversations and actual     An interesting point here
in          heterogeneous
                             voice recordings were        relates to IVA-enabled
environments. As shown
                             accessible        through    devices       –       these
in Figure 1, there are two
                             Alexa’s companion app.       ‘Endpoints1’ are stand-
user-side components: (1)
                             Performing          packet   alone products designed
companion applications,
                             analysis we discovered       to only assist in the usage
and (2) IVA-enabled
                             what kind of data has        of IVA services. Because
devices. One of the IVAs
                             been stored on the cloud     these     home-embedded
we studied was Amazon’s
                             side and how to get access   devices need to be
Alexa ecosystem. The
                             to cloud-native data. In     connected to the Internet
main components of this
                             addition, analysis of the    to communicate with the
ecosystem are grouped
                             firmware and software of     ‘intelligent assistant’, the
into two categories:
                             IVA-enabled       devices    vendors need to provide
(a) The client side – that   helped us understand the     convenient interfaces for
has 2 components:            overall ecosystem.           configuring them and
managing activity history.                                   important to note that                                     A few examples are:
Amazon and Google are                                        IVAs are expanding their                                   opening a garage door or
providing       companion                                    features (often referred to                                unlocking a house door,
applications (apps or                                        as ‘skills’) by allowing                                   ordering a pizza, or
web-sites) for completing                                    third-party entities to add                                utilizing a social network
these activities. It is also                                 new compatible services.                                   service by voice.

    Case 1                                                                              Case 2
                 Packet sniffing                     Packet sniffing
  Web proxy                            Cloud
                                                                                                                                 24/7 voice
                  Unveiling                                                                            … tomorrow I have         recording
               communication                                                                           to go conference in
                 mechanism                                                  Firmware                          DC….
                                                                             analysis
                                                                                                           Remotely controlled
                                                                                                                speaker
                                                                                           User                                        Who are you?     Compromised
                                                                                                                                                         IVA-enabled
                                                                                                                                                            device

                               User                  User        IVA-enabled
   Companion applications                                           device

    Case 3                                                                              Case 4
                                                                                                                                                          Cloud
                                                                           Unwanted
                                                                            ordering
                Cloud                                                                                                                                 Voice     Conversation

                                                     Home                                               Home

                                                             Door      Stealing car                 “…He was
                                                             attack                                  driving a
                     Malicious voice                                                                                               Unintentional voice record
                                                                                                  Lexus in a way
                      commands                                                                     she said was
                                                                                                  dangerous…“
                                                                                         User
   Adversary                                   IVA-enabled                                                         IVA-enabled
                                                  device                                                              device

                                       Figure 2. Four cases when the IVA turns rogue
ROGUE IVAs                                                   application-to-cloud                        or             network traffic between
                                                             Endpoint2-to-cloud.                                        client’s       companion
Wiretapping                                    the
                                                             (Figure 2 - Case1)                                         application and the cloud
Internet
                                                                                                                        may      expose     user’s
                                                             On the left side of Figure
An IVA’s ecosystem                                                                                                      security and privacy data.
                                                             2 - Case1, the cloud
network communication                                                                                                   This       is     because
                                                             services      may      use
is divided into two parts:                                                                                              identifying       network
                                                             encrypted connections to
(1) IVA-enabled device-                                                                                                 communications       helps
                                                             protect        customer’s
to-cloud or Endpoint1-to-                                                                                               attackers      understand
                                                             personal data. In this
cloud; and (2) companion                                                                                                overall operations of an
                                                             environment, sniffing the
IVA ecosystem. For          unencrypted packets, a        status, talking to the
example, in laboratory      man-in-the-middle attack      assistant, listening to
environment, we used        could take place. Even if     music, ordering products
HTTPS interception tools,   the image is not altered,     or services, and so on [9].
to analyze requests and     obtaining the firmware
                                                          Compromised IVAs
responses, and then         image is an important
understand which APIs       security concern because      There are well-known
are used for sending and    it provides a chance to       cases of compromised
receiving data to and       understand the internal       home-embedded devices
from the IVA running in     operations of a IVA-          that were connected to the
the cloud.                  enabled             device.   Internet. Recently, DDoS
                            Furthermore, a malicious      attacks against Dyn LLC
On the right side of the
                            attacker may be able to       exploited vulnerabilities
Figure 2 - Case1, we
                            distribute        modified    of 10s of millions of
illustrate IVA-enabled-
                            firmware images [7]. The      home-embedded devices
device-to-cloud        or
                            rest of the communication     such as webcams and
Endpoint1-to-cloud
                            between the IVA-enabled       DVRs, infecting them
communication.        Our
                            device and the IVA            with Mirai botnet, and
analysis reveals that,
                            running in the cloud is       turning these devices into
although most network
                            encrypted using HTTPS.        an army of bots used to
traffic is encrypted, not
                            So, what about an             attack Dyn’s systems.
everything may be sent
                            encrypted            packet   Because gateway devices
over a secure protocol.
                            (HTTPS)? There are            used for the IVA
There        may       be
                            various existing studies      ecosystem      are     also
unencrypted connections,
                            on classifying network        embedded systems, there
including but not limited
                            traffic through scientific    are similar possibilities
to, checking the current
                            approaches       including    for     them      to     be
network      connectivity
                            machine-learning              compromised if they
status, transmitting the
                            algorithms [8]. Even          contain            security
firmware image upgrades,
                            though the traffic is         vulnerabilities [10].
etc.
                            encrypted,          various   Figure 2-Case2 illustrates
In the first case, it is    patterns         including    the vulnerability scenario
possible to detect the      payload sizes and data        of a 24/7 voice recording.
presence of IVA devices     rates could be utilized for   In general, IVAs are not
inside of a home network.   identifying          user’s   always recording, but
Also, if firmware data is   behavior such as turning      always hearing. If an
transferred          over   on the device, the idle
IVA-enabled         device    IVAs may be controlled         Unintentionally
hears the ‘wakeup word’,      by people pretending to        recorded voice
the user’s voice is           be in the proximity of the
                                                             The last scenario deals
recorded and transmitted      IVA-enabled        device,
                                                             with data privacy. Voices
to the IVA in the cloud. If   while, in fact, they are
                                                             can be recorded by
the IVA-enabled device        accessing a speaker
                                                             accident and transmitted
(Endpoint1)              is   positioned      in     the
                                                             to a cloud (Figure 2-Case
compromised        by     a   proximity, in the house.
                                                             4).    Because     speech
malicious attacker, it can
                              Malicious             voice    recognition is not a
play the role of a virtual
                              commands                       perfect science, it is
spy. ‘Always-on’ voice
                                                             possible to eavesdrop on
recording in a user’s         The third threat includes
                                                             private     conversations
private location can allow    malicious             voice
                                                             unintentionally.      The
all sounds or voices to be    commands as shown in
                                                             potential for accidental
recorded and sent to an       Figure 2- Case3. In voice-
                                                             recording means that
attacker in real time. This   activated services, users’
                                                             users do not necessarily
is a privacy concern.         voices may lead to
                                                             have complete control
                              dangerous         outcomes.
An IVA-enabled device is                                     over what audio gets
                              Some IVAs provide a
a     remotely-controlled                                    transmitted to the IVA in
                              voice training feature, but
speaker, similar to a smart                                  the cloud [12].
                              it is difficult to perfectly
baby monitor. There was
                              recognize user’s voice,        As more ‘things’ become
a recent case where a
                              tones      and      accents.   connected to the Internet,
family      living       in
                              Therefore, an IVA could        there is a growing need
Washington, spoke out
                              process requests and           for better understanding
about the horrors they
                              answer for someone else        of security and privacy
experienced while using a
                              or for a malicious person.     threats from IVAs. Our
baby monitor inside their
                              If a malicious person can      goal here is to provide an
3-year-old son's bedroom.
                              come close enough to the       overview       of     IVA
Parents discovered that a
                              targeted       IVA-enabled     ecosystems and their
stranger had hacked into
                              device, he or she may be       potential threat vectors,
their baby monitor and
                              able to fool the system        and to explain four
was able to spy on their
                              into thinking that the real    different cases involving
toddler and sometimes
                              owner is the person            IVAs that turned rogue.
speaking        disturbing
                              speaking.
messages into the device                                     DISCLAIMER
[11]. In a similar way,
Certain         commercial      [4] Wikipedia, “Virtual         [8] T. Nguyen and G.
entities, equipment, or         assistant         (artificial   Armitage, “A survey of
materials identified in this    intelligence)”,                 techniques for Internet
document were used only         https://en.wikipedia.org/       traffic    classification
to adequately describe an       wiki/Virtual_assistant_(a       using machine learning,”
experimental procedure          rtificial_intelligence).        IEEE Communications
or      concept.       Such                                     Surveys and Tutorials,
                                [5] Business Insider,
identification is not                                           2007.
                                “Why Amazon's Echo is
intended       to     imply
                                totally dominating — and        [9] C. Gu, S. Zhang and Y.
recommendation            or
                                what Google, Microsoft,         Sun,           “Real-time
endorsement by NIST,
                                and Apple have to do to         encrypted           traffic
nor is it intended to imply
                                catch                up”,       identification       using
that the entities, materials,
                                http://www.businessinsid        machine         learning”,
or      equipment        are
                                er.com/amazon-echo-             Journal of software, 2011.
necessarily the best
                                google-home-microsoft-
available for the purpose.                                      [10] ORACLE+Dyn, Dyn
                                cortana-apple-siri-2017-1
                                                                Statement on 10/21/2016
REFERENCES
                                [6] E. McCallister and T.       DDoS             Attack”,
[1] Gartner Newsroom,           Grance and K. Scarfone,         http://dyn.com/blog/dyn-
“Gartner Says Worldwide         “Guide to protecting the        statement-on-10212016-
Spending     on    VPA-         confidentiality        of       ddos-attack/.
Enabled         Wireless        Personally Identifiable
                                                           [11] The San Francisco
Speakers Will Top $2            Information (PII),” NIST
                                                           Globe, “Stranger hacks
Billion    by     2020”,        Special Publication 800-
                                                           family's baby monitor and
https://www.gartner.com/        122, 2010.
                                                           talks to child at night”,
newsroom/id/3464317.
                                [7]     “Exploring     the http://sfglobe.com/2016/
[2] AP The Big Story:           Amazon Echo Dot, Part 1: 01/06/stranger-hacks-
“How       Burger     King      Intercepting     firmware familys-baby-monitor-
revealed the hackability        updates”,                  and-talks-to-child-at-
of voice assistants”,           https://medium.com/@mi night/.
http://bigstory.ap.org/2d8      caksica/exploring-the-
                                                           [12]      The    Christian
036d742504890b2f9edc3           amazon-echo-dot-part-1-
                                                           Science Monitor, “What
f98c77ef                        intercepting-firmware-
                                                           do Alexa and Siri mean
                                updates-c7e0f9408b59
[3] Wikipedia, “Chatbot”,                                  for             privacy?”,
                                - .dyktzwphz
https://en.wikipedia.org/                                  http://www.csmonitor.co
wiki/Chatbot                                               m/Technology/2017/011
4/Devices-sprout-ears-
What-do-Alexa-and-Siri-
mean-for-privacy
You can also read