In their paper, the researchers describe how they added fake steps to a Fitbit fitness monitor and played a "malicious" music file from the speaker of a smartphone to control the phone’s accelerometer. That allowed them to interfere with software that relies on the smartphone, like an app used to pilot a radio-controlled toy car.The video below explains their research. The image is taken from their paper.
"We discussed pivotal issues such as intersectionality, tokenism, and imposter syndrome—many of which I didn’t realize were issues facing the community, but rather just the way life worked for black women in computing. The open and enlightening conversations are ones that I still reflect upon today. For example, I learned that self-care and wellness are just as important as work deadlines. It’s not always worth, “getting degreed to get diabetes and die.–De’Aira BryantThe community of women were extremely honest and inspiring in their experiences. I marveled at the presence of women who looked like me that had taken similar life paths—and had been successful. I am extremely grateful to the department for allowing me to experience this historical conference and gain so much from it. As I look to complete my final semester of undergrad at USC, I could not have asked for a better way to start it."
Csilla Farkas, associate professor in computer science and engineering, has long understood the need for cybersecurity to protect against such attacks. Hired in 2000, she has led the development of cybersecurity education at the University of South Carolina and serves as director of the university’s Center for Information Assurance Engineering. The center is a National Center of Academic Excellence in Information Assurance and Cyber Defense Education (an achievement first earned in 2010 and bestowed jointly by the National Security Agency and the Department of Homeland Security); it earned the same designation for research in 2014.