Hacking cybersecurity to anticipate attacks

Imagine two groups at war. One defends every attack as it comes. The other anticipates threats before they happen. Which is more likely to win?
In cybersecurity, understanding the potential for attacks is critical. This is especially true for mobile and wireless devices, since they are constantly connected and continuously streaming and collecting data.
โWe have these devices with us all the time. We trust them with many thingsโwith the microphone they can hear us, with the camera they can see everything, we put all our pictures there. Our lives are on these devices,โ said Guevara Noubir, professor in the College of Computer and Information Science.
Noubir recently organized the 2017 Conference on Security and Privacy in Wireless and Mobile Networks, hosted at Northeastern in July. The conference included some of the foremost experts in mobile security. One of the keynote speakers, Silvio Micali, is a winner of the Turing award, which is widely recognized as the โNobel Prizeโ of computer science.
You have a really good sense that your apartment is safe and hasnโt been broken into. Iโd like that same thing to happen on computers.
John Manferdelli
Director, Cybersecurity and Privacy Institute
Researchers and students from all over the world convened at the conference to discuss mobile and wireless security, an area of cybersecurity Noubir says is โbooming.โ They shared new research, held tutorials, and listened to some of the brightest minds in the field debate one of societyโs most pressing challenges.
The importance of reproducibility
As the organizer of the conference, Noubir implemented a new feature this yearโthe reproducibility label. Reproducibilityโthe premise that all studies should be replicableโis at the core of all good science. But Noubir explains that in wireless research, studies can be especially difficult to replicate, even if researchers provide every detail of how they conducted an experiment. Thatโs because unbeknownst to them, there are often other factors at play. For example, if a car drives by as one device is measuring the activity of another, signals from the carโs computer system might subtly interfere with the measurement.
To check reproducibility, Noubir provided conference participants with a software program that employs a โvirtual machineโ that analyzes all the data, graphs, charts, and tables in a study and tries to reproduce them. Of the 26 papers submitted to the virtual machine, only six of them were granted the reproducibility label, which underscores how challenging wireless studies can be to replicate.
One of the papers that achieved the reproducibility label involved smartphone jamming. In mobile security, jamming means blocking communication. The researchers in this study showed that with a combination of tools, they could remotely gain access to a cellphoneโs computer chip and and modify the Wi-Fi chipset code to transmit radio jamming signals. The signals can block other targeted devices or applications from sending or receiving data.
Researchers carried out this project as a way of anticipating a potential cyberattack.
โYou want to understand what is possible so you can defend against these kinds of thingsโ Noubir said. โYou have to also ask yourself, โwhat could someone do?โโ
Self-authentication still a major cybersecurity challenge
In his keynote speech at the conference, John Manferdelli, director of the Northeastern University Cybersecurity and Privacy Institute, recalled the early 2000s when he worked at some of the countryโs largest technology companies. He remembers telling leaders at many companies that there were serious security flaws in many of the systems the companies were building. But many of those leaders werenโt worried. They acknowledged there might be risks, but said it didnโt matter because nobody knew about them.

John Manferdelli, director of the Security & Privacy Institute at Northeastern, explains that one of the biggest pitfalls of internet security is that people authenticate themselves online with passwords. Photo by Adam Glanzman/Northeastern University.
โI was incensed,โ said Manferdelli. And for good reason. Not long after his warning, various cyberattacks made it clear that people were not only finding the vulnerabilities, but exploiting them. After that, companies changed their tune. They decided to fix some security flawsโbut only those they knew had been exploited.
Of course, that wasnโt enough. New attacks sprang up, often getting more creative and advanced. Eventually, tech companies started to realize they had to anticipate exploitation and protect against attacks before they occurred.
Fast-forward to 2017, and massive cyberattacks have already plagued the first half of the year. They range from the hacked emails of political leaders, to ransomware targeting utility companies, to stolen CIA documents. โI donโt have to argue quite as much anymore that cybersecurity is important,โ Manferdelli said.
One of the biggest pitfalls of internet security is that people authenticate themselves online with passwords. โEverybody knows thatโs a disaster,โ Manferdelli said. โOnce I know your password, I can masquerade for you anywhere.โ
Even though websites have required passwords to be increasingly long and complex, most of them are still relatively easy for a hacker to guess. And once a single employeeโs account has been compromised, the entire company they work for could be at risk.
Manferdelli said another major challenge is that unlike the physical world, a virtual security breach is rarely immediately obvious.
โYou have a really good sense that your apartment is safe and hasnโt been broken into. Iโd like that same thing to happen on computers,โ Manferdelli said.
But hackers are tricky. When they canโt break into a personโs device or information directly, they exploit side channels. For example, electromagnetic radiation emanating from a device can reveal a personโs location, even if no one has actually hacked the personโs phone.
With more than 4.8 billion mobile subscribers and 275,000 different apps available, there are plenty of opportunities for security and privacy breaches. And in the wireless world, they are typically not isolated to one feature of the phone, tablet, or computer. A cyber-assault can infect the entire machine.
โItโs not like a car where the broken door affects just the door,โ Manferdelli says. โThe broken door affects your steering.โ