admin 发表于 2022-11-26 20:40:03

IOT物理攻击场景解析及探索

<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">绿盟科技格物实验室在物理入侵方面,曾经进行过一些有趣的验证性尝试。这里写出我们的思路</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">, </span><span style="color:#777777;font-family:宋体;">期望引起安全从业者的思考。面对物理入侵,我们的防护是否需要创新的模式与架构调整,才能适应新形式下的安全防护的需要?本文介绍格物实验室近期通过向第三方公开展示的两个小成果来对物理安全的攻击场景和可以造成的后果进行一个简要的说明。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:18.0pt;">背景</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:18.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">绿盟科技格物实验室的研究内容是要和物理世界发生关系的。实验室在以下领域专注创新:物联网设备的漏洞研究,全网物联网资产的监控,以及在物理安全的探索。新形式下的安全,不仅包括虚拟世界的安全,也包括物理世界的安全。目前,格物实验室在多个方面已经硕果累累。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">格物实验室紧跟安全潮流,不断尝试复现各种场景下对物理世界攻击。格物实验室经过多年的技术和人员积累,软硬件和多种行业人员已经储备齐全,依托专业技术背景做了很多新型的物理攻击试验。部分安全试验已经公开展示。有的项目曾经参加比赛并获奖,有的项目在</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">Blackhat</span><span style="color:#777777;font-family:宋体;">和</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">defcon</span><span style="color:#777777;font-family:宋体;">上做过分享。例如:</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">PLC</span><span style="color:#777777;font-family:宋体;">蠕虫、不同厂家</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">PLC</span><span style="color:#777777;font-family:宋体;">之间的蠕虫病毒传输探索、</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">BadUSB</span><span style="color:#777777;font-family:宋体;">、伪基站攻击场景搭建、无线社工</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">WIFI</span><span style="color:#777777;font-family:宋体;">盒子、二维码攻击、</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">RFID/IC</span><span style="color:#777777;font-family:宋体;">卡射频攻击、普通开锁、汽车开锁信号干扰、汽车娱乐系统漏洞挖掘、家用机器人、工业机器人、</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">2G/3G/LTE</span><span style="color:#777777;font-family:宋体;">等各种类型的无线电攻击等方面的探索性研究试验。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">未知攻,焉知防</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">,需要说明的是,</span><b><span style="border:none windowtext 1.0pt;color:#777777;font-family:宋体;padding:0cm;">格物实验室的试验都是在遵守国家法律法规的情况下,在试验室里完成的探索性试验,绝不在真实环境中验证攻击方法。</span></b><span style="color:#777777;font-family:宋体;">我们研究各种攻击场景的目的是为了找到更完善、更全面、可靠的防护方法而努力,并整合到绿盟科技的产品与解决方案中,从而更好的为客户服务。更多的研究成果还在保密阶段,格物实验室会在适当的时机向公众公布。更多的攻击场景请关注绿盟科技官方博客(</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"><a href="http://blog.nsfocus.net/"><span style="border:none windowtext 1.0pt;color:#1EAAF1;font-family:inherit,serif;padding:0cm;">http://blog.nsfocus.net/</span></a></span><span style="color:#777777;font-family:宋体;">)。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:18.0pt;">攻击目的</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:18.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">目前发现的物理攻击目的主要分为四种。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span lang="EN-US" style="border:none windowtext 1.0pt;color:#777777;font-family:inherit,serif;padding:0cm;">1</span></b><b><span style="border:none windowtext 1.0pt;color:#777777;font-family:宋体;padding:0cm;">、窃取信息(窃密)</span></b><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">入侵家庭或重要场所的网络摄像头,窃取隐私信息;入侵智能音箱监听周围谈话等,可能造成重要场所的机密信息泄露。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">更重要的是,攻击者可以利用摄像头和路由器的漏洞在获取设备的系统权限后,以此为跳板,深入内网,渗透到内网更多更关键的设备,获取更多的信息。达到长期潜伏和控制的目的。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span lang="EN-US" style="border:none windowtext 1.0pt;color:#777777;font-family:inherit,serif;padding:0cm;">2</span></b><b><span style="border:none windowtext 1.0pt;color:#777777;font-family:宋体;padding:0cm;">、获取经济利益(谋财)</span></b><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">2018</span><span style="color:#777777;font-family:宋体;">年</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">8</span><span style="color:#777777;font-family:宋体;">月</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">8</span><span style="color:#777777;font-family:宋体;">日</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">0</span><span style="color:#777777;font-family:宋体;">时</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">30</span><span style="color:#777777;font-family:宋体;">分嫌犯入侵山西省某电厂</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">三大项目</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">的案件。嫌犯用无线路由器物理接入工控系统内部网络,企图远程修改工控系统参数,达到控制煤质检测结果,实现经济利益的目的。幸好被电厂值班人员及时发现,才没有让犯罪分子得逞。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span lang="EN-US" style="border:none windowtext 1.0pt;color:#777777;font-family:inherit,serif;padding:0cm;">3</span></b><b><span style="border:none windowtext 1.0pt;color:#777777;font-family:宋体;padding:0cm;">、谋害性命(害命)</span></b><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">有预谋的网络攻击,可以造成谋财害命。人为操控红绿灯状态,制造</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">交通事故</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">以及控制自动驾驶汽车突然刹车和急转等。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span lang="EN-US" style="border:none windowtext 1.0pt;color:#777777;font-family:inherit,serif;padding:0cm;">4</span></b><b><span style="border:none windowtext 1.0pt;color:#777777;font-family:宋体;padding:0cm;">、政治目的</span></b><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">来自国家或组织之间的攻击,具有政治目的,有时候是为了报复或者泄愤。其中,对工业控制设备和城市基础设施的攻击,后果最为严重。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">震网事件向我们敲响了警钟,也告诉我们系统漏洞是一种核心战略资源。</span><span style="color:#777777;font-family:Lato,sans-serif;"> </span><span style="color:#777777;font-family:宋体;">工控系统虽然和外界隔离,但并不是绝对安全的。数字武器可能被敌对国家有意使用,造成工控系统的物理破坏或断掉重要基础设施的服务。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Cambria,serif;">&nbsp;</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">下面从近期绿盟科技通过向第三方公开展示的两个小成果来对物理安全的攻击场景和可以造成的后果进行一个简要的说明。通过参加第三方平台的比赛或演讲并在公正公开的场景下进行展示,也得到第三方平台和全社会对我们的技术实力的认可。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:18.0pt;">案例一:极棒机器特工</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:18.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:15.0pt;">背景介绍</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:15.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">2018 </span><span style="color:#777777;font-family:宋体;">年,</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">GeekPwn </span><span style="color:#777777;font-family:宋体;">联合极战</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">FMB</span><span style="color:#777777;font-family:宋体;">、腾讯玄武实验室共同发起</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">机器特工挑战赛</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”,</span><span style="color:#777777;font-family:宋体;">需要选手根据不同的任务设计机器人,可以由机器人自主实现或者选手远程控制:</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">1</span><span style="color:#777777;font-family:宋体;">、完美入侵:机器人可以选择通过窗户、通风管或者伪装之后从门潜入房间。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">2</span><span style="color:#777777;font-family:宋体;">、疯狂避障:机器人潜入房间之后,需要经过设有安全警报激光束的通道,关闭激光束或者通过视觉发现暂停然后快速通过激光束都是可选方案。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">3</span><span style="color:#777777;font-family:宋体;">、特工任务:作为特工,最重要的使命就是</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">获取情报</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">。安全通过激光束的机器人将开始在陌生房间展开作业,包括:</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-left:51.0pt;tab-stops:list 36.0pt;text-align:left;text-indent:-18.0pt;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Symbol;font-size:10.0pt;"><span>·<span style="font:7.0pt &quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style="color:#777777;font-family:宋体;">干扰墙壁上的监控摄像头</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-left:51.0pt;tab-stops:list 36.0pt;text-align:left;text-indent:-18.0pt;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Symbol;font-size:10.0pt;"><span>·<span style="font:7.0pt &quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style="color:#777777;font-family:宋体;">在座椅下装置窃听器</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-left:51.0pt;tab-stops:list 36.0pt;text-align:left;text-indent:-18.0pt;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Symbol;font-size:10.0pt;"><span>·<span style="font:7.0pt &quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style="color:#777777;font-family:宋体;">输入密码打开保险箱</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-left:51.0pt;tab-stops:list 36.0pt;text-align:left;text-indent:-18.0pt;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Symbol;font-size:10.0pt;"><span>·<span style="font:7.0pt &quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style="color:#777777;font-family:宋体;">拿到书本内的卡片信息</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-left:51.0pt;tab-stops:list 36.0pt;text-align:left;text-indent:-18.0pt;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Symbol;font-size:10.0pt;"><span>·<span style="font:7.0pt &quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style="color:#777777;font-family:宋体;">把</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"> USB </span><span style="color:#777777;font-family:宋体;">攻击设备插入电脑</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-left:51.0pt;tab-stops:list 36.0pt;text-align:left;text-indent:-18.0pt;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Symbol;font-size:10.0pt;"><span>·<span style="font:7.0pt &quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style="color:#777777;font-family:宋体;">放置键盘记录器</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">当然,在比赛规定时间内能够成功撤离的机器人将获得更高的附加分。最关键的是每个队的比赛时间只有</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">20</span><span style="color:#777777;font-family:宋体;">分钟。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">与传统机器人竞赛不同,极棒机器特工比赛充分释放选手的创意,不设置规定的实现方法,强调任务的完成度。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">机器特工正好和格物实验室物理入侵的思路不谋而合。格物实验室成员普遍都具有扎实的理论功底和丰富的技术实践经验。于是,格物实验室的</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">阿凡达</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">团队在</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">2018</span><span style="color:#777777;font-family:宋体;">年</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">10</span><span style="color:#777777;font-family:宋体;">月的经过三个星期的</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">魔鬼特训</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">,制作了三个不同功能的机器人,用于完成对应的任务。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:15.0pt;">实现方式</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:15.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">要在</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">20</span><span style="color:#777777;font-family:宋体;">分钟内完成如此多的任务。机器人的控制一定要快速、准确、稳定。格物实验室制作了专门的遥控器。以提高了操控的效率。几种遥控器的如下:</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <img width="461" height="152" src="https://www.2k8.org/content/uploadfile/202211/26/3f906fb5.png" alt="" style="vertical-align:middle;" /><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">采用了通用的履带车</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">+</span><span style="color:#777777;font-family:宋体;">机械臂的机器人的方案,机械结构越简单越稳定,也不容易出问题。还易于操控和执行各种难度的任务。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="border:none windowtext 1.0pt;color:#777777;font-family:宋体;padding:0cm;">创新点一</span></b><b><span lang="EN-US" style="border:none windowtext 1.0pt;color:#777777;font-family:inherit,serif;padding:0cm;">:&nbsp;</span></b><span style="color:#777777;font-family:宋体;">采用类似阿凡达的镜像控制方式,大大提高了远程操控机器人的效率。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="border:none windowtext 1.0pt;color:#777777;font-family:宋体;padding:0cm;">创新点二</span></b><b><span lang="EN-US" style="border:none windowtext 1.0pt;color:#777777;font-family:inherit,serif;padding:0cm;">:</span></b><span lang="EN-US" style="color:#777777;font-family:Cambria,serif;">&nbsp;</span><span style="color:#777777;font-family:宋体;">在干扰墙壁上的监控摄像头的时候,格物实验室制做了放氦气球的小车,用气球挡住摄像头,达到干扰摄像头的目的。此时,气球也像一只听话的</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">手</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">,在远程操控下,想挡住哪里就挡住哪里。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">经过来自三个国家的</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">8</span><span style="color:#777777;font-family:宋体;">支代表队在极棒赛场上的激烈的比赛,格物实验室完成了完美入侵、疯狂避障、干扰墙壁上的监控摄像头、在座椅下装置窃听器四个任务。拿到了比赛的第二名。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">第一名是来自美国内达华大学</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">DASL</span><span style="color:#777777;font-family:宋体;">实验室的机器人团队</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">OP-USA</span><span style="color:#777777;font-family:宋体;">;第三名是来自上海的高中生团队</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">玖</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">_</span><span style="color:#777777;font-family:宋体;">死</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">_</span><span style="color:#777777;font-family:宋体;">壹</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">_</span><span style="color:#777777;font-family:宋体;">生</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:15.0pt;">入侵后果</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:15.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">机器人的物理入侵可能造成信息泄露,物理设备被毁,物理设备被窃等后果。当然,还有更严重的后果。例如,远程控制机器人给您安装一个定时炸弹。感觉怎么样?</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <img width="165" height="161" src="https://www.2k8.org/content/uploadfile/202211/26/0b07a4db.png" alt="" style="vertical-align:middle;" /><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:18.0pt;">案例二:</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:18.0pt;">JD-HITB</span></b><b><span style="color:#1E1E1E;font-family:宋体;font-size:18.0pt;">会议展示两种物理攻击场景</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:18.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:15.0pt;">背景介绍</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:15.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">2018</span><span style="color:#777777;font-family:宋体;">年</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">10</span><span style="color:#777777;font-family:宋体;">月</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">4</span><span style="color:#777777;font-family:宋体;">日,彭博社的一篇报道在科技圈引起了轩然大波</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">——</span><span style="color:#777777;font-family:宋体;">包括苹果、亚马逊在内的多家科技巨头,都被中国芯片植入后门了!</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <img width="129" height="171" src="https://www.2k8.org/content/uploadfile/202211/26/2a584f85.png" alt="" style="vertical-align:middle;" /><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">彭博社在其文章中声称,中国军方设计了一颗比米粒还小的微型芯片,并暗中植入到由硬件供应商超微生产的主板上充当</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">任何网络的隐形门</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">,为连接的计算机系统提供</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">长期隐形访问</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">据报道,有近</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">30</span><span style="color:#777777;font-family:宋体;">家公司受到违规行为的影响。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">随后报道涉及的</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">3</span><span style="color:#777777;font-family:宋体;">家公司:苹果、亚马逊和超微,立即回应此事,均指出这篇报道</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">完全失实</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <img width="240" height="225" src="https://www.2k8.org/content/uploadfile/202211/26/447695c6.png" alt="" style="vertical-align:middle;" /><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">针对不实报道,我们遵守自己的原则:不听、不信、不传谣。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <img width="361" height="166" src="https://www.2k8.org/content/uploadfile/202211/26/0067ae65.png" alt="" style="vertical-align:middle;" /><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">从安全研究的角度,格物实验室发起关于此种场景攻击讨论。讨论后,格物实验室决定在</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">HITB</span><span style="color:#777777;font-family:宋体;">会议上公开此前所做的两个物理入侵的探索性试验。格物实验室表示目前的黑客技术还不是那么强大,即使是全球顶尖的黑客也做不到定制芯片。黑客也表示压力山大。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <img width="271" height="254" src="https://www.2k8.org/content/uploadfile/202211/26/31be2ae7.png" alt="" style="vertical-align:middle;" /><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">我们使用了号称</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">全球最小的</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">WIFI</span><span style="color:#777777;font-family:宋体;">路由器</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">的硬件</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">VoCore2</span><span style="color:#777777;font-family:宋体;">,并且重新修改和编译了系统的固件部分。在固件中增加了演示所需的功能。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <img width="199" height="205" src="https://www.2k8.org/content/uploadfile/202211/26/07acbf15.png" alt="" style="vertical-align:middle;" /><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">在</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">JD-HITB</span><span style="color:#777777;font-family:宋体;">会议上,格物实验室主要做了两个演示:</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:15.0pt;">偷拍摄像头演示</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:15.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">利用最小</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">WIFI</span><span style="color:#777777;font-family:宋体;">的硬件系统,配合一款微型摄像头,搭建了一个基于</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">Wifi</span><span style="color:#777777;font-family:宋体;">的偷拍摄像头。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">DIY</span><span style="color:#777777;font-family:宋体;">出一个这样的偷拍设备,成本其实很低,软件部分有很大的可玩性。软件和硬件部分在未来有很大的扩展和提升空间。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <img width="434" height="299" src="https://www.2k8.org/content/uploadfile/202211/26/1ea96ac1.png" alt="" style="vertical-align:middle;" /><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">传输方式:可通过更换大功率天线增加传输范围到百米之外,也可通过</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">WIFI</span><span style="color:#777777;font-family:宋体;">中继器增加传输距离,还可通过</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">4G</span><span style="color:#777777;font-family:宋体;">无线上网卡扩展信号的传输范围到千里之外。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:15.0pt;">工控系统入侵演示</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:15.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">基于</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">WIFI</span><span style="color:#777777;font-family:宋体;">的工控系统入侵演示。我们知道工控系统和外部网络是隔离的,人们以为这样就很安全了。格物试验室通过一个在实验室试验的例子,向人们展示一种通过</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">WIFI</span><span style="color:#777777;font-family:宋体;">攻击的场景。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <img width="471" height="245" src="https://www.2k8.org/content/uploadfile/202211/26/7272f52f.png" alt="" style="vertical-align:middle;" /><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">格物实验室的试验都是以现实为原型的,在现实中有一定的概率能找到验证,巧合的是:</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">2018</span><span style="color:#777777;font-family:宋体;">年</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">12</span><span style="color:#777777;font-family:宋体;">月</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">11</span><span style="color:#777777;font-family:宋体;">日微信公众号</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">“</span><span style="color:#777777;font-family:宋体;">电力安全生产</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">”</span><span style="color:#777777;font-family:宋体;">(</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">ID</span><span style="color:#777777;font-family:宋体;">:</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">dianlianquan</span><span style="color:#777777;font-family:宋体;">)公布了</span><span lang="EN-US" style="color:#777777;font-family:Cambria,serif;">&nbsp;</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"><a href="http://news.bjx.com.cn/special/?id=947975"><span lang="EN-US" style="border:none windowtext 1.0pt;color:#1EAAF1;font-family:宋体;padding:0cm;"><span lang="EN-US">《山西某火电厂燃料系统被植入非法程序事件简报》</span></span></a></span><span style="color:#777777;font-family:宋体;">,比较详细的报道了一次真实的入侵过程,此前一直处于保密状态。本次真实入侵事件提到的是上图红框中的内容,可以看出,攻击模型和格物实验室在</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">11</span><span style="color:#777777;font-family:宋体;">月</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">1</span><span style="color:#777777;font-family:宋体;">日讲述的一模一样。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"><a href="http://www.nsfocus.com.cn/About_NSFOCUS/details_18_2850.html"><span lang="EN-US" style="border:none windowtext 1.0pt;color:#1EAAF1;font-family:宋体;padding:0cm;"><span lang="EN-US">见《直击</span></span><span style="border:none windowtext 1.0pt;color:#1EAAF1;font-family:inherit,serif;padding:0cm;">HITB, </span><span lang="EN-US" style="border:none windowtext 1.0pt;color:#1EAAF1;font-family:宋体;padding:0cm;"><span lang="EN-US">绿盟科技格物实验室专家讲了这些干货》</span></span></a></span><span style="color:#777777;font-family:宋体;">。这种物理攻击方式可能成为以后工控系统的主流攻击方式。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:15.0pt;">工控系统物理攻击模型的其它变形</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:15.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">上图中提到的工控系统物理攻击模型是一种常见的模型,在现实中可能有以下的变形:</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-left:51.0pt;tab-stops:list 36.0pt;text-align:left;text-indent:-18.0pt;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Symbol;font-size:10.0pt;"><span>·<span style="font:7.0pt &quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style="color:#777777;font-family:宋体;">信号的传输方式:可以是</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;">WiFi</span><span style="color:#777777;font-family:宋体;">,也可以是</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;">4G</span><span style="color:#777777;font-family:宋体;">信号,实现对现场工控设备远距离实时控制和入侵。</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-left:51.0pt;tab-stops:list 36.0pt;text-align:left;text-indent:-18.0pt;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Symbol;font-size:10.0pt;"><span>·<span style="font:7.0pt &quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style="color:#777777;font-family:宋体;">接收信号的设备:可能是手机,也可能是电脑。</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-left:51.0pt;tab-stops:list 36.0pt;text-align:left;text-indent:-18.0pt;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Symbol;font-size:10.0pt;"><span>·<span style="font:7.0pt &quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style="color:#777777;font-family:宋体;">潜入的特工硬件:可以通过网线联入工控网络,也可能在供应环节植入到</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;">PLC/DCS/</span><span style="color:#777777;font-family:宋体;">工控机或者电脑机箱中,让人从外观无法分辨该设备是否做了手脚。</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-left:51.0pt;tab-stops:list 36.0pt;text-align:left;text-indent:-18.0pt;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Symbol;font-size:10.0pt;"><span>·<span style="font:7.0pt &quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style="color:#777777;font-family:宋体;">植入工控系统的方式很多:可能是销售环节植入、可能是售后和维护环节植入、还可能是内鬼勾结植入。</span><span lang="EN-US" style="color:#777777;font-family:inherit,serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <b><span style="color:#1E1E1E;font-family:宋体;font-size:18.0pt;">物理安全防护探索</span></b><b><span lang="EN-US" style="color:#1E1E1E;font-family:Lato,sans-serif;font-size:18.0pt;"></span></b>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">前面讲了格物实验室目前公开的几个攻击场景。如何预防物理攻击我们也做了很多思考。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">很多物理攻击方式都需要通过无线信号进行数据的双向传送。可以从无线电信号监控方面入手,目前绿盟科技的工业网络安全合规评估工具</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;">ISCAT</span><span style="color:#777777;font-family:宋体;">已经集成了对无线信号的搜索和监控。还可以对工控网络中接入的设备进行诊断和记录,如果有新的未知设备接入系统,可以在第一时间报警或阻断设备的接入。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"><img width="263" height="176" src="https://www.2k8.org/content/uploadfile/202211/26/0d5da015.png" alt="" style="vertical-align:middle;" /><img width="262" height="164" src="https://www.2k8.org/content/uploadfile/202211/26/c330979e.png" alt="" style="vertical-align:middle;" /></span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p align="left" style="background:white;font-family:等线;font-size:10.5pt;margin:0cm;margin-bottom:15.0pt;text-align:left;text-justify:inter-ideograph;vertical-align:baseline;">
        <span style="color:#777777;font-family:宋体;">最后以一个段子结尾:如果在监控中出现了气球,挡住了摄像头,最好过去看一下。因为可能正在被物理入侵。</span><span lang="EN-US" style="color:#777777;font-family:Lato,sans-serif;"></span>
</p>
<p style="font-family:等线;font-size:10.5pt;margin:0cm;text-align:justify;text-justify:inter-ideograph;">
        <span lang="EN-US">&nbsp;</span>
</p>
页: [1]
查看完整版本: IOT物理攻击场景解析及探索