By admin , 26 August 2013

Run went well. Lost the flag halfway and had to go back a little bit. Forgot to time the run.

By Guus , 26 August 2013

Friday I was in our Jersey City office. It was the first time I visited there and a day was too short to meet everybody I wanted to meet.

The office is located on the river front and has a great view of Manhattan.

Topic
By admin , 20 August 2013

We ran while Sasha went to Pilates and then we had dinner together. We saw a little doggie bark incessantly against a much bigger dog who didn't react much. Nora was impressed.

By Guus , 19 August 2013

USENIX Security 2013 was a very interesting conference. It was a great way to catch up with the latest developments in the security world, on a wide range of topics. Over the course of 5 days I attended more than 40 presentations. The organization of the conference was top-notch. The venue was a hotel a few minutes from Judiciary Square in downtown Washington, D.C.

See also my notes for the first two days.

Lessons

The conference reinforced three high-level concepts about cyber security. First of all, crime often doesn't pay much, given the risks involved. The team of George Mason university and others gave several nice presentations on the economics of cyber-crime. Overall the numbers involved don't add up to astronomical incomes, though the successful "booter service" they analyzed had an income of $7,500 per month, before expenses.

Secondly: in contrast, the costs of defense are usually much higher than those of attacks. For example, renting a DDoS facility that can yield up to 800 Mbps can be had for a cheap $10 per month but mitigating DDoS attacks is very hard and thus very expensive. Similarly, advertisers stand to lose significant amounts of money from fake advertisements as described by two researchers at an ad firm.

Thirdly: no matter how old your vulnerability is, somebody will start to investigate it at some point. For example, while the sexy new Samsung S4 was analyzed pretty much the moment it was released, even the old and established IPMI protocol and its SuperMicro implementation got their (well-deserved) spot in the security limelight.

Highlights of USENIX Security 2013

The authors of the IPMI paper also introduced "ZMap", a new scanner tool. It is now possible for a relatively nimble machine to scan the entire internet to see if a particular service is listening on a particular port... in 45 minutes. Pretty amazing. Obviously you'll need a serious internet connection for this but just the fact that it's so fast make a scan much more feasible. A tool like this can give a better background for vulnerabilities. For example, in the IPMI case the authors showed that there are many IPMI nodes connected directly to the internet.

The USENIX Best Paper Award went to Control Flow Integrity for COTS Binaries. I didn't see the presentation but the paper is quite interesting. It provides an implementation on Linux of CFI that works without the need for source code and provides very good performance.

My personal favorite paper was Revolver: An Automated Approach to the Detection of Evasive Web-based Malware (see below), with an honorable mention of these two: "Jekyll on iOS: When Benign Apps Become Evil" and "Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations".

Lastly, I really enjoyed the various George Mason presentations such as Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse, There Are No Free iPads: An Analysis of Survey Scams as a Business and Understanding the Emerging Threat of DDoS-as-a-Service.

Chrome vulnerability reward system

On Friday morning Chris Evans from the Chrome security team spoke in an invited talk about their use of a reward program to rewards people who report security vulnerabilities. Clearly this program is highly succesful for Google. The amount of bugs submitted is now three times as high as it was before the introduction of the program, and the quality of reports is good. Interesting talk.

Revolver: Uncovering new detection avoidance algorithms

To verify if a website is malicious, there are several systems that use an artificial web browser to run the suspicious JavaScript on a page, and then analyze if it is harmful or not. Attackers have found several short-comings in those artificial web browsers and use those to evade detection (their JavaScript simply won't run if it detects an artificial web browser).

This very original research provides a great way of uncovering the various detection avoidance mechanisms. Using a big database of known malware, the system automatically detects new malware that looks similar in structure. Writing malware is hard, and reuse is extremely common. If a similar piece of code is found, a human analyst will then review and see what changes were introduced -- often new avoidance mechanisms.

DNSSEC deployment

DNSSEC is an important improvement to the overall security of the internet, but it's adopting has been very slow. A team of the University of California, San Diego looked at how widespread the support for DNSSEC is, and how well it is supported by the various networks. The answer: only a small fraction of clients really support DNSSEC, and it even negatively impacts some clients (particularly in Asia).

Beating the Apple App Store

Apple's App Store has a better reputation than Android's. The amount of harmful apps in the Apple ecosystem is much smaller. Just looking at the USENIX conferences over the past few years clearly shows that Android gets a lot more attention. However, in Jekyll on iOS: When Benign Apps Become Evil the authors found a smart way to beat the AppStore's analysis. By deliberately introducing vulnerabilities in their App, that they then exploited once the app is live, they were able to create an App that behaved malign (in this case, sending a Twitter message without the author's permission).

Clever, and hard to detect for Apple: finding accidental vulnerabilities is difficult enough... let alone deliberate ones.

Topic
By Guus , 18 August 2013

Nora likes going for a run. She says "rennen! pappa!".

It was raining a bit this morning, so when we went out for a run I wrapped her legs in plastic. She always brings Wafwaf on her run, and often a small flag too. She will play with those during the first half of the run, and then often doze off during the second half.

By admin , 15 August 2013

The run went well. Still haven't found my watch after Aruba so no time.

By Guus , 14 August 2013

I attended two big workshops in DC this week: the ironically named "LEET" and "WOOT" workshops, organized by USENIX.

LEET: Large-Scale Exploits and Emergent Threats
LEET stands for Large-Scale Exploits and Emergent Threats and included 13 presentations on a broad range of talks, from DDoS to spam to phishing. I particularly enjoyed these three talks:

- Funny analysis of what low-end DDoS services ("booters") are typically used for (50% of the customers are gamers who want to bring down their enemies, typically in residential addresses). -- https://www.usenix.org/system/files/conference/leet13/leet13-paper_kara…
- These guys tried to find out which Botnet sinks are out there (and who is creating them). Sort of "hack the counter-hackers". -- https://www.usenix.org/system/files/conference/leet13/leet13-paper_rahb…
- Insight from a security researcher who specializes in DDoS tools on recent developments. -- https://www.usenix.org/conference/leet13/understanding-emerging-threat-…

WOOT: Workshop on Offensive Technologies
The WOOT workshops on Tuesday were focused on offensive technologies. The emphasis at USENIX is more academic than at conferences like BlackHat or DEFCON and less on getting publicity which is nice. Still, there were some pretty scary results.

Here are my favorites:

- Very cool demo of a new DNS bind flaw against Chrome (overflowing the browser's 100-entry cache used for the defensive DNS pinning) - https://www.usenix.org/conference/woot13/firedrill-interactive-dns-rebi…
- Solid presentation on how the researchers looked for (and found) "sign out" flaws by truncating TLS sessions. Affects GMail and Hotmail, among other things, and a distributed voting tool. Shows you that even if the theoretical framework is secure, the implementation might have flaws. -- https://www.usenix.org/conference/woot13/truncating-tls-connections-vio…
- How to hack the ELF loader into doing calculations. Totally useless but very cool. -- https://www.usenix.org/conference/woot13/%E2%80%9Cweird-machines%E2%80%…

These workshops were very interesting, and I'm currently attending the main part of the event: 3 more days of presentations. This conference has a relative large amount of downtime which is nice since it allows you to meet people.

Topic
By admin , 13 August 2013

Went a lot better than on Sunday. Ran with Nora. No watch.