Affiliation:
1. TU Darmstadt, Germany
2. University of Edinburgh, Scotland, UK
Abstract
Fitbit fitness trackers record sensitive personal information, including daily step counts, heart rate profiles, and locations visited. By design, these devices gather and upload activity data to a cloud service, which provides aggregate statistics to mobile app users. The same principles govern numerous other Internet-of-Things (IoT) services that target different applications. As a market leader, Fitbit has developed perhaps the most secure wearables architecture that guards communication with end-to-end encryption. In this article, we analyze the complete Fitbit ecosystem and, despite the brand's continuous efforts to harden its products, we demonstrate a series of vulnerabilities with potentially severe implications to user privacy and device security. We employ a range of techniques, such as protocol analysis, software decompiling, and both static and dynamic embedded code analysis, to reverse engineer previously undocumented communication semantics, the official smartphone app, and the tracker firmware. Through this interplay and in-depth analysis, we reveal how attackers can exploit the Fitbit protocol to extract private information from victims without leaving a trace, and wirelessly flash malware without user consent. We demonstrate that users can tamper with both the app and firmware to selfishly manipulate records or circumvent Fitbit's walled garden business model, making the case for an independent, user-controlled, and more secure ecosystem. Finally, based on the insights gained, we make specific design recommendations that can not only mitigate the identified vulnerabilities, but are also broadly applicable to securing future wearable system architectures.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction
Reference50 articles.
1. IDC. Worldwide quarterly wearable device tracker August 2017. IDC. Worldwide quarterly wearable device tracker August 2017.
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Analysis of Wearable Smart Health Devices and Their Companion Apps;2024 IEEE Security and Privacy Workshops (SPW);2024-05-23
2. Wearable Activity Trackers: A Survey on Utility, Privacy, and Security;ACM Computing Surveys;2024-04-09
3. Toward robust systems against sensor-based adversarial examples based on the criticalities of sensors.;2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC);2024-02-07
4. Automated Security Evaluations for IoT Deployments;2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC);2023-12-19
5. FAMID: False Alarms Mitigation in IoMT Devices;Internet of Things. Advances in Information and Communication Technology;2023-10-26