"Alexa, Can I Trust You?" - CYBERTRUST - Cyber Intrusion

Page created by Richard Thornton
 
CONTINUE READING
"Alexa, Can I Trust You?" - CYBERTRUST - Cyber Intrusion
CYBERTRUST

     “Alexa, Can I
     Trust You?”
     Hyunji Chung, Michaela Iorga, and Jeffrey Voas, NIST
     Sangjin Lee, Korea University

     Several recent incidents highlight significant                                           For example, in January 2017, a
                                                                                          6-year-old Dallas girl sharing her
     security and privacy risks associated with                                           love of dollhouses and cookies with
     intelligent virtual assistants (IVAs). Better                                        the family’s new Amazon Echo Dot
                                                                                          prompted Alexa to order—much to
     diagnostic testing of IVA ecosystems can                                             her parents’ surprise—a $160 Kid-
                                                                                          Kraft Sparkle Mansion and four
     reveal such vulnerabilities and lead to more                                         pounds of sugar cookies. After re-
                                                                                          porting the story, the anchor of a San
     trustworthy systems.                                                                 Diego TV morning show remarked,
                                                                                          “I love the little girl saying ‘Alexa or-

 I
                                                                                          dered me a dollhouse.’” Several Echo
         ntelligent virtual assistants (IVAs) have opened up a      owners watching the broadcast reported that, after hear-
         new world where you can ask a machine questions as         ing the anchor’s comment, their own devices also tried to
         if it’s a human and request it to perform certain tasks.   order pricey dollhouses.2
         For example, upon waking up: “Hey, what’s on my               The following month, during the Super Bowl, a Goo-
     schedule for today?” Before you leave the house for work:      gle Home ad using the system’s voice-search-activation
     “What’s my commute time?” At dinner: “Have one large           phrase “OK, Google” reportedly set off many viewers’ own
     pepperoni pizza delivered from Luigi’s.” When you go to        devices.3 Capitalizing on the incident, in April, Burger
     sleep: “Turn off the bedroom lights.” Ideally, such interac-   King ran an ad for the Whopper in which an actor playing
     tions should be solely between you and the device assist-      an employee at one of its restaurants says that 15 seconds
     ing you. But are they? How do you know for sure?               isn’t enough time to describe the sandwich and instead
        IVAs are becoming increasingly popular: accord-             asks Google, which cites the defi nition from Wikipedia—
     ing to Gartner, the IVA market will reach $2.1 billion by      prompting viewers’ devices to repeat the question and
     2020.1 However, recent news reports have revealed that         thus essentially extend the ad.4 Ironically, after publi-
     popular voice-activated assistants such as Google Home,        cally exploiting the system’s vulnerability, the marketing
     Apple’s Siri, and Amazon Alexa aren’t always reliable or       stunt backfi red—someone altered the Wikipedia entry for
     trustworthy.                                                   the product to say that it contained cyanide and caused

40     COM PUTE R PUBLISHED BY THE IEEE COMPUTER SOCIET Y                                               0 0 1 8 - 9 1 6 2 / 1 7/ $ 3 3 .0 0 © 2 0 1 7 I E E E
"Alexa, Can I Trust You?" - CYBERTRUST - Cyber Intrusion
EDITOR JEFFREY VOAS
                                                                 NIST; j.voas@ieee.org

cancer5—and became a sobering les-          music and videos, purchase items,            On the cloud side is the IVA—the soft-
son that a hijacked IVA could cause         make recommendations, provide di-            ware that processes text and voice
real harm.                                  rections, turn on lights, open garage        commands and carries out requested
    Here we explore the nature of IVAs      doors, and so on (en.wikipedia.org           actions. There are two user-side compo-
and some of the security and privacy        /wiki/ Virtual_assistant_(artificial         nents: IVA-enabled devices—for exam-
concerns associated with this emerg-        _intelligence)). We use the term intelli-    ple, an Echo Dot (Alexa) or a PC running
ing technology. Are IVAs secure? Are        gent virtual assistant, but other names      Windows 10 (Cortana)—and compan-
they recording our conversations? If        are also commonly used such as smart         ion applications installed on the device
so, where is this voice data stored? The    assistant, intelligent personal assis-       that communicate with the IVA.
presence of IVAs in homes makes this        tant, digital assistant, and personal            Requests sent to an IVA, whether in
a public-facing challenge, and one that     virtual assistant. Regardless of the ter-    text format (for example, through on-
attracts instant—and unwelcome—             minology, the system’s “brain”—the           line chat) or voice format, along with
media attention when problems arise.        intelligence that converts human voice       the system’s responses are stored in
                                            to text, performs linguistic analysis,       the cloud. These user–IVA “conversa-
INTELLIGENT VIRTUAL                         and carries out the requested action—        tions” are usually accessible through
ASSISTANTS                                  is a cloud-hosted service; the devices       a companion app. Obviously, the con-
IVAs evolved from chatbots, software        themselves run agent programs and,           tent of such conversations could con-
agents programmed to converse with          whether communicating with the ser-          tain revealing details—for example,
humans through either text or voice         vice by default or configured to do so,      questions about health symptoms.
(en.wikipedia.org/wiki/Chatbot). The        have no embedded intelligence.               However, user voice recordings them-
fi rst chatbot, ELIZA, was developed by        IVAs can communicate with mul-            selves also pose a privacy risk because
Joseph Weizenbaum at MIT 16 years af-       tiple compatible IoT devices running         they constitute personally identifi-
ter Alan Turing fi rst proposed his test    a supported OS. Siri works exclusively       able information—unauthorized en-
of artificial intelligence in 1950. ELIZA   with Apple products—iPhone, iPad,            tities could use such data to identify
used natural-language processing to         iPod Touch, HomePod, Mac, Apple              the user, maliciously obtain access
recognize key words in typed input          Watch, and Apple TV devices. Micro-          to systems that implement voice rec-
and generate pre-scripted responses         soft Cortana works with Windows              ognition, or simply process data and
that to some users resembled human          10, Android, Xbox One, Skype, iOS,           construct voice artifacts that could be
understanding. PARRY, introduced in         Cyanogen, and Windows Mixed Re-              used to impersonate the user.6
1972 by psychiatrist Kenneth Colby,         ality devices. Alexa works with Am-              IVA software can be integrated
convinced a number of trained experts       azon’s Echo, Fire, and Dash product          into IoT device operating systems—
that it was a real person with paranoid     families and various smart devices           for example, the latest versions of
schizophrenia.                              running Android and iOS including            iOS and OS X have the Siri agent in-
     Over time, chatbots such as Alice      smartphones, smart speakers and              stalled by default, and Windows 10
(the inspiration for the fi lm Her), Jab-   headphones, smartwatches, and smart-         has the Cortana agent as one of its
berwacky, and Cleverbot incorporated        home devices including TVs, inter-           default processes—or downloaded
increasingly sophisticated algorithms       coms, lights, thermostats, and refrig-       and installed on compatible devices.
to create more natural and complex          erators. Google Assistant also works         Many IVAs enable third-party ven-
dialogue. Motivated by research indi-       with Android and iOS devices. Bixby is       dors to link their devices and services
cating that most users prefer to inter-     a new IVA for Samsung products.              to the intelligent assistant, dramat-
act with human-like programs, simple                                                     ically expanding the IVA’s features
chatbots are now integrated in many         IVA ECOSYSTEMS                               or “skills.” For example, Alexa works
phone systems and web applications          To understand IVAs’ potential secu-          with many smart-home devices from
for customer service, information re-       rity and privacy threats, we performed       brands including ecobee, Philips Hue,
trieval, marketing, education, enter-       cloud-native artifact analysis, packet       Nest, Ring, and Leviton. It also inte-
tainment, and other purposes.               analysis, voice-command tests, appli-        grates with numerous apps to order
     IVAs extend chatbot functionality      cation analysis, and fi rmware analysis      food (for example, Domino’s Pizza and
to Internet of Things (IoT) devices.        to better understand IVA ecosystems.         Wingstop), stream music and video
Thus, they respond to text and voice        As Figure 1 shows, such an ecosystem         (Pandora and Spotify), get a ride (Uber
commands to answer questions, play          consists of three main components.           and Lyft), and check account balances

                                                                                                           SEPTEMBER 2017      41
CYBERTRUST

                                                               IVA

                                                         WAV

                                                                     TXT
                       Packet analysis                                                                                 Packet analysis
                                                          Cloud native-
                                                         artifact analysis

                                                                                  Voice-command test

                                                         (Wake-up word), what’s the
                                                              weather today?
                                                                                                   User’s voice
                                                                                                                                      IVA-enabled
       Companion applications                                                                                                            device
                                                                           Today’s sunny and the temperature is 71°.
         Application analysis            User
     (executable codes, artifacts)                                                                                                Firmware analysis

Figure 1. An intelligent virtual assistant (IVA) ecosystem has three main components: the cloud-based IVA, IVA-enabled devices, and
companion applications.

and make credit card payments (Cap-          check network connectivity, making                     to the Internet and exploited for ne-
ital One). The Alexa Skills Store (www       it possible to detect IVA devices in a                 farious purposes such as distributed
.alexaskillstore.com) currently lists        home network. Firmware image data                      denial-of-service (DDoS) attacks. For
more than 10,000 voice-activated apps.       might also be transferred over unen-                   example, in October 2016, a DDoS at-
                                             crypted packets, exposing the system                   tack against the Internet performance
IVA SECURITY                                 to man-in-the-middle attacks and                       management company Dyn exploited
AND PRIVACY RISKS                            possible malicious modification of im-                 vulnerabilities in tens of millions of
Given the large ecosystem of IVA-            ages. Even if firmware images aren’t                   home IoT devices such as webcams
enabled devices and cloud-hosted ser-        altered, the ability to obtain them is a               and DVRs to infect them with the Mi-
vices from IVA and third-party devel-        security concern because it provides                   rai malware and use them as part of
opers, Figure 2 illustrates four attack      unauthorized entities a chance to un-                  a botnet to temporarily cripple Dyn’s
vectors that can put system security         derstand an IVA-enabled device’s in-                   networks.10
and user privacy at risk.                    ternal operations.7                                       Figure 2b shows how a hacker
                                                 Most communication between IVA-                    could compromise an IVA-enabled
Wiretapping an IVA ecosystem                 enabled devices and the IVA is en-                     device through its “always on” listen-
Even if companion apps use encrypted         crypted using HTTPS. However, var-                     ing capability, enabling the hacker to
network connections, sniffing the            ious machine-learning techniques                       monitor all voices and sounds within
traffic between the apps and the IVA         to classify network traffic can still                  the device’s range in real time. This
can expose the ecosystem’s commu-            reveal payload sizes, data rates, and                  danger was highlighted by a disturb-
nication mechanisms (left side of Fig-       other patterns in encrypted traffic that               ing incident in Washington State in
ure 2a). For example, we used packet         could be used to identify the device’s                 April 2015, when parents discovered
interception tools to analyze HTTPS          status—for example, idle or in use—or                  that a stranger had hacked into their
requests and responses and then deter-       the user’s behavior such as turning the                three-year-old son’s baby monitor by
mine which APIs are used for sending         device on or off, talking to the assis-                obtaining the companion app’s login
and receiving data to and from the IVA.      tant, listening to music, and ordering                 credentials and was speaking to him
   In the case of communication be-          products or services.8,9                               at night through the device’s speaker
tween IVA-enabled devices and cloud-                                                                as well as operating its camera.11 The-
hosted services, our analysis revealed       Compromised IVA-enabled devices                        oretically, an attacker could also re-
that not all network traffic is transmit-    Because IVA-enabled devices are part                   motely control an IVA by talking to the
ted over a secure protocol (right side of    of the IoT, devices with security vulner-              system through another compromised
Figure 2a). For example, many devices        abilities can be compromised like any                  device in the home, such as a smart
don’t use encrypted connections to           other computing system connected                       speaker or intercom.

42      COMPUTER                                                                                                 W W W.CO M P U T E R .O R G /CO M P U T E R
Packet sniffing                     Packet sniffing
  Web proxy                                 Cloud
                      Unveiling                                                                          Tomorrow           24/7 voice
                   communication                                           Firmware                   I have to go to
                                                                            analysis                                        recording
                     mechanism                                                                         a conference
                                                                                                           in DC.
                                                                                                                                                        Compromised
                                                                                                                               Who are you?              IVA-enabled
                                                                  IVA-enabled                         Remotely controlled                                   device
       Companion applications                                                                User
                                                                     device                               speaker
                                     User              User

 (a)                                                                                   (b)

                                                                       Unwanted
                                                                        ordering
                                                                                                                                          WAV     WAV

                   Adversary                                                                                                                                 TXT   TXT

                                                                                                                                                Voice Conversation
                                                     Home                                             Home
                                                                                                          He was
                                                               Door                                       driving                         Unintentional
                     Malicious voice                          attack                                    a Lexus in                        voice record
                                                                       Stealing car                     a way she
                      commands
                                                                                                         said was
       Adversary                               IVA-enabled                                     User     dangerous
                                                  device                                                                 IVA-enabled
                                                                                                                            device
 (c)                                                                                   (d)

Figure 2. IVA security and privacy risks: (a) wiretapping an IVA ecosystem, (b) compromised IVA-enabled devices, (c) malicious voice
commands, and (d) unintentional voice recording.

Malicious voice commands                                 break into the database—to eavesdrop
Figure 2c depicts a third security and                   on private conversations. The potential                     DISCLAIMER
privacy risk associated with IVAs: an                    for accidental recording means that                         Certain commercial entities, equip-
attacker who impersonates a user and                     users don’t necessarily have complete                       ment, or materials identified in this
issues malicious voice commands to,                      control over their voice data.12                            document were used only to ade-
for example, unlock a smart door to                                                                                  quately describe an experimental pro-
gain unauthorized entry to a home or                                                                                 cedure or concept. Such identification

                                                         A
garage or order items online without                             s virtual assistants become                         is not intended to imply recommen-
the user’s knowledge. Although some                              more intelligent and the IVA                        dation or endorsement by NIST, nor is
IVAs provide a voice-training feature                            ecosystem of services and de-                       it intended to imply that the entities,
to prevent such impersonation, it can                    vices expands, there’s a growing need                       materials, or equipment are necessarily
be difficult for the system to distin-                   to understand the security and privacy                      the best available for the purpose.
guish between similar voices. Thus, a                    threats from this emerging technol-
malicious person who is able to access                   ogy. Several recent incidents highlight
an IVA-enabled device might be able to                   significant vulnerabilities in IVAs.
fool the system into thinking that he                    Better diagnostic testing can reveal                        Hearing Its Name on TV,” The Verge, 7
or she is the real owner and carry out                   such vulnerabilities and lead to more                       Jan. 2017; www.theverge.com/2017
criminal or mischievous acts.                            trustworthy systems.                                        /1/7/14200210/amazon-alexa-tech
                                                                                                                     -news-anchor-order-dollhouse.
Unintentional voice recording                            REFERENCES                                               3. K. Opam, “Google’s Super Bowl Ad
Finally, as Figure 2d shows, voices                          1. “Gartner Says Worldwide Spending                     Accidentally Set off a Lot of Google
within range of an IVA-enabled de-                              on VPA-Enabled Wireless Speakers                     Homes,” The Verge, 5 Feb. 2017; www
vice can be recorded accidentally and                           Will Top $2 Billion by 2020,” press                  .theverge.com/2017/2/5/14517314
transmitted to the cloud, enabling other                        release, Gartner, 3 Oct. 2016; www                   /google-home-super-bowl-ad-2017.
parties—including commercial enti-                              .gartner.com/newsroom/id/3464317.                 4. M. Anderson, “How Burger King
ties with legitimate access to the stored                    2. A. Liptak, “Amazon’s Alexa Started                   Revealed the Hackability of Voice
data as well as hackers who might                               Ordering People Dollhouses after                     Assistants,” Associated Press, 5 May

                                                                                                                                         SEPTEMBER 2017                 43
CYBERTRUST

      2017; bigstory.ap.org/2d8036               9. C. Gu, S. Zhang, and Y. Sun, “Real-Time
      d742504890b2f9edc3f98c77ef.                   Encrypted Traffic Identification Using    HYUNJI CHUNG is a PhD candidate
 5.   Z. Rodionova, “Burger King Ad Back-           Machine Learning,” J. Software, vol. 6,   at the Graduate School of Information
      fires after Asking Google What’s in a         no. 6, 2011, pp. 1009–1016.               Security at Korea University and a
      Whopper and Is told ‘Cyanide,’” The       10. K. York, “Dyn Statement on 10/21/2016     guest researcher in NIST’s Computer
      Independent, 13 Apr. 2017; www                DDoS Attack,” blog, 22 Oct. 2016; dyn     Security Division. Contact her at hyunji
      .independent.co.uk/news/business              .com/blog/dyn-statement-on                .chung@nist.gov.
      /news/burger-king-advert-ask                  -10212016-ddos-attack.
      -google-big-whopper-cyanide-cancer        11. C. Owens, “Stranger Hacks Family’s        MICHAELA IORGA is the senior
      -causing-wikipedia-page-us-a7681561           Baby Monitor and Talks to Child at        security technical lead for cloud
      .html.                                        Night,” The San Francisco Globe, 3        computing at NIST and cochair of
6.    E. McCallister, T. Grance, and K.             Nov. 2016; sfglobe.com/2016/01/06         its Cloud Computing Security and
      Scarfone, Guide to Protecting the Con-        /stranger-hacks-familys-baby              Cloud Computing Forensic Science
      fidentiality of Personally Identifiable       -monitor-and-talks-to-child-at-night.     working groups. Contact her at
      Information (PII), Special Publication    12. C. Wood, “Devices Sprout Ears: What       michaela.iorga@nist.gov.
      800-122, NIST, Apr. 2010.                     Do Alexa and Siri Mean for Privacy?,”
 7.   “Exploring the Amazon Echo Dot,               The Christian Science Monitor, 14 Jan.    JEFF VOAS is an IEEE Fellow and
      Part 1: Intercepting Firmware Up-             2017; www.csmonitor.com                   computer scientist at NIST. Contact
      dates,” 2 Jan. 2017; medium.com               /Technology/2017/0114/Devices             him at j.voas@ieee.org.
      /@micaksica/exploring-the-amazon              -sprout-ears-What-do-Alexa-and
      -echo-dot-part-1-intercepting-firmware        -Siri-mean-for-privacy.                   SANGJIN LEE is a professor in the
      -updates-c7e0f9408b59.                                                                  Graduate School of Information
 8.   T.T.T. Nguyen and G. Armitage, “A Sur-                                                  Security and director of the Digital
      vey of Techniques for Internet Traffic                     Read your subscriptions      Forensics Research Center at Korea
      Classification Using Machine Learn-                        through the myCS             University. Contact him at sangjin@
                                                                 publications portal at       korea.ac.kr.
      ing,” IEEE Comm. Surveys & Tutorials,
                                                    http://mycs.computer.org
      vol. 10, no. 4, 2008, pp. 56–76.

44     COMPUTER                                                                                     W W W.CO M P U T E R .O R G /CO M P U T E R
You can also read