An Acoustic Hack—the Next Botnet Breach?

Researchers at the University of Michigan and University of South Carolina claim to have discovered that music could be used to disable or to a certain extent even control some IoT devices.  The researchers say they were able, through sound waves, to add steps to a Fitbit tracker and interfere with a cell phone app’s ability to steer a remote-controlled toy car.   

To do so, the researchers used varying acoustic frequencies to exploit a claimed vulnerability in certain accelerometers—a hardware component that measures the amount of static acceleration due to gravity.  These sensors serve a variety of purposes, ranging from those as basic as ensuring that your tablet computer screen is displayed upright to determining precisely when to deploy airbags in the event of a car accident.  Manufacturers often build accelerometers within chip-based devices known as microelectromechanical systems (MEMs), which are used in a variety of products including cell phones, wearable devices, and drones and automobiles.  The software components of connected devices frequently rely on the information provided by MEMs to determine the appropriate response.  By creating an acoustic disturbance, the researchers affected the MEMs output. 

This latest announcement emphasizes the role that academics and industry researchers can play in examining, discussing, and enhancing cybersecurity.  Third party research efforts can have various impacts and companies continue to grapple with how to address claims about their services and devices.  Threats to IoT security are complex and constantly evolving, making cybersecurity research and information sharing key to enhancing the safety and reliability of connected devices.  The University of Michigan and University of South Carolina researchers who discovered this potential vulnerability have also developed hardware and software solutions that can defend against acoustic attacks.  The researchers are already working with chip manufacturers to improve the MEMs’ design, as well as enhance the security of products already in the hands of consumers. 

As connectivity explodes and more “things” interact with each other and the human environment, innovators can expect to continue reading about such “discoveries”—and having to address them.

Wiley Connect

Sign up for updates

Wiley Rein LLP Cookie Preference Center

Your Privacy

When you visit our website, we use cookies on your browser to collect information. The information collected might relate to you, your preferences, or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. For more information about how we use Cookies, please see our Privacy Policy.

Strictly Necessary Cookies

Always Active

Necessary cookies enable core functionality such as security, network management, and accessibility. These cookies may only be disabled by changing your browser settings, but this may affect how the website functions.

Functional Cookies

Always Active

Some functions of the site require remembering user choices, for example your cookie preference, or keyword search highlighting. These do not store any personal information.

Form Submissions

Always Active

When submitting your data, for example on a contact form or event registration, a cookie might be used to monitor the state of your submission across pages.

Performance Cookies

Performance cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.

Powered by Firmseek