• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Tech

You Can Hack Fitbits and Smart Phones Using Sound, Researchers Say

By
Kate Samuelson
Kate Samuelson
Down Arrow Button Icon
By
Kate Samuelson
Kate Samuelson
Down Arrow Button Icon
March 14, 2017, 12:48 PM ET

It’s possible to hack technology including Fitbits, smart phones and smart watches using sound waves, new research suggests.

Computer science and engineering students and professors at the University of Michigan and the University of South Carolina have been studying the accelerometers and other motion sensors found in consumer devices that are designed to measure specific environmental signals, for example acceleration.

The researchers discovered that it is possible to spoof various environmental stimuli using acoustics. In a laboratory, Timothy Trippel, a computer science and engineering PHD student at the University of Michigan, created an automatic system that would allow him to spoof acceleration using sound waves at different frequencies.

He was able to attack a MEMS (Micro Electro Mechanical Sensor) accelerometer in a smart phone running an application that was steering an remote controlled car, as well as spoof thousands of steps on a Fitbit without ever taking a single step.

[Youtube https://www.youtube.com/watch?v=Dfc3jZkcnLU&w=560&h=315]

“We were able to not only disable systems with acceleration sensors but we could control their output in a way that would alter the behavior of systems that use these devices,” he said.

Trippel added that the researchers were not trying to exploit vulnerabilities for the sake of causing harm, “but rather for the sake of improving the safety and reliability of the systems that we use everyday that contain vulnerable devices.”

Kevin Fu, associate professor of computer science and engineering at the University of Michigan, explained in the report that the team has since discovered how to create software that can defend against many of these acoustic interference attacks. “We hope that the industry will be able to use our software techniques to retrofit security into their already-deployed products,” he said. “Once we can solve a lot of these problems in analogue cyber security, we believe consumers will have more trust in emerging devices.”

About the Author
By Kate Samuelson
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.