Machine vs. Machine: Lessons from the First Year of Cyber Grand Challenge. Approved for Public Release, Distribution Unlimited
|
|
|
- Cecily Stevens
- 10 years ago
- Views:
Transcription
1 Machine vs. Machine: Lessons from the First Year of Cyber Grand Challenge 1
2 DARPA BAA Autonomous cyber defense capabilities that combine the speed and scale of automation with reasoning abilities exceeding those of human experts. During a final competition event, automated Cyber Reasoning Systems will compete against each other in real time. 2
3 Experimental Models for Security Negative Corpus: malware, attacks Approach Publish efficacy versus corpora: false positives, false negatives Positive Corpus: benign software, traffic 3
4 Adversarial cycles From FireEye: * * 4
5 Adversarial cycles From NSS Labs, Frei & Artes: * * 5
6 Experimental Models for Security "The enemy knows the system -Shannon s Maxim Negative Corpus: malware, attacks Approach Positive Corpus: benign software, traffic 1) Adversary inspects approach white box : full knowledge of the system 2) Adversary creates test cases to defeat approach Publish efficacy in terms of performance against adversary: false positives, false negatives 6
7 Experimental Models for Security a product is a security product when it has sentient opponents. - Dan Geer, 2005* Security involves making sure things work [ ] in the face of an intelligent and malicious adversary - Bruce Schneier, 2001** * ** 7
8 What kind of adversary? If your product fails because some gleeful clown discovers that he can be a superuser by typing 5,000 lowercase a s into a prompt, then said clown might not be all that sentient, but nevertheless, yours is a security product. * -Dan Geer * 8
9 What kind of adversary? ** If your product fails because some gleeful clown discovers that he can be a superuser by typing 5,000 lowercase a s into a prompt, then said clown might not be all that sentient, but nevertheless, yours is a security product. * -Dan Geer * ** 9
10 Experimental Models for Security How can we build a standard experimental model: reproducible, controlled, and consistent That includes an intelligent adversary? Reproducible Same level of adversarial inspection expertise every audit Controlled To provide for control cases, adversary must be capable of forgetting everything it knows Consistent Can t get tired or change its efficacy at 10k, 100k, 10000k lines of code Solution: software safety becomes the expert domain of machines 10
11 Experimental Models for Security Difficulties of adversarial experimentation: Old, vulnerable computers in an isolated network, with real exploits: Vulnerable Linux* Hacksys Extreme Vulnerable Driver** metasploit Challenges: Old, real exploits have OS-specific interchangeable components Network isolation is difficult and mistakes happen Old, real exploits still work on many unpatched computers Can t safely research novel flaws, thus: Can t safely research defense against novel flaws Adaptation and counter-adaptation are basically off limits in this model * ** 11
12 Experimental Models for Security Adversarial experimentation, with DARPA DECREE: The world from scratch : Incompatible protocols from scratch 131 samples of incompatible server software from scratch Incompatible binary format from scratch Incompatible loader from scratch Incompatible ABI from scratch Brokered networking Network isolation is totally irrelevant: run it on your desktop No exploit for DECREE will ever affect a real world computer Non-reusable: protocol code and platform code are worthless for any real world task Novel flaws? Novel defenses? No problem Adaptation and counter-adaptation are safe and easy * ** 12
13 DECREE Released as Open Source: Released as a Linux layer, portable via 7 system calls to any host OS Measurement: Functionality loss via programmatically replayed network tests Performance loss via instrumentation Testable presence of vulnerability via known harmful inputs Experiments: Bug hunting & software safety technology Exploit mitigation measurement Adversarial automation Your approach here Tools: PIN*, IDA Pro** * ** 13
14 DECREE ( DARPA Experimental Cyber Research Evaluation Environment Specially Designed Environment 7 System Calls [Garfinkel2003] terminate end program (exit) transmit write data to an fd (write) receive read data from an fd (read) fdwait wait for fds (select) allocate allocates memory (mmap) deallocate releases allocated memory (munmap) random populate a buffer with random bytes Restricted Inter-Process Communication No shared memory Only socketpairs Clean bidirectional communication Automatically created by system on startup Shared between all processes in an IPC CB 14
15 Challenge Binaries No filesystem access, no network access Userspace only and statically linked [Qu2011] No code-reuse except a common libc Compiled Binaries only (not hand coded) Always available Ground truth A null pointer dereference vulnerability (CVE ) in the Linux kernel, where the dereference of pointer tun is before the null pointer check. The code becomes exploitable as gcc optimizes away the null pointer check [10] [Wang2013] Wide availability of lifters (these are open source x86) BAP (BAP IR) - BitBlaze (VINE IR) - McSema (LLVM IR) - QEMU (TCG IR) Valgrind (VEX IR) RedHat (default Sendmail ) does not crash RedHat (default Sendmail ) does not crash RedHat 7.3 (p) - (patched Sendmail ) does not crash RedHat (self compiled Sendmail ) crashes RedHat (self compiled Sendmail ) crashes RedHat (self compiled Sendmail ) crashes Slackware 8.0 (p)- (patched Sendmail binary) crashes Slackware (self compiled Sendmail ) does not crash RedHat 7.x - (self compiled Sendmail ) does not crash (p) - patched box Due to the nature of the overflowed buffer declaration (static), exploitation of this issue is highly dependent on the way compiler orders the static data in the data segment [LSD2003] 15
16 Text vs Code of trivial program CGC Linux Text Code 0xff
17 Graph of trivial program CGC Linux
18 DECREE Qualifier Challenge Sets: 131 Challenges 72 CC Files 1236 H Files 18
19 DECREE Qualifier Challenge Sets: 9 CC 5 IPC 131 Challenges 72 CC Files 9 Tokenized 1236 H Files 122 C 19
20 DECREE Qualifier Challenge Sets: 131 Challenges 72 CC Files 1236 H Files 1996 C Files 20
21 DECREE Qualifier Challenge Sets: 131 Challenges 72 CC Files 1236 H Files 1996 C Files > 6K Functions 21
22 DECREE Qualifier Challenge Sets: 72 CC Files 1236 H Files 1996 C Files > 6K Functions > 190K H LOC 22
23 DECREE Qualifier Challenge Sets: 1236 H Files 1996 C Files > 6K Functions > 190K H LOC > 7K CC LOC 23
24 DECREE Qualifier Challenge Sets: 1996 C Files > 6K Functions > 190K H LOC > 7K CC LOC > 200K C LOC 24
25 DECREE Qualifier Challenge Sets: > 6K Functions > 190K H LOC > 7K CC LOC > 200K C LOC 590 POVs 25
26 DECREE Qualifier Challenge Sets: > 190K H LOC > 7K CC LOC > 200K C LOC 590 POVs > 10K Polls 26
27 DECREE Qualifier Challenge Sets: > 7K CC LOC > 200K C LOC 590 POVs > 10K Polls 27
28 DECREE Qualifier Challenge Sets: > 200K C LOC 590 POVs > 10K Polls 28
29 Challenge Sets CWE 53 Different CWEs (as identified by Challenge Set authors) Common ones: 28 CWE-122 Heap Overflow 24 CWE-121 Stack Overflows 16 CWE-476 Null Pointer Dereference 13 CWE-190 Integer overflow or wraparound 8 CWE-416 Use after Free 7 CWE-134 Uncontrolled Format String 29
30 Challenge Set Complexity - Callgraphs Totals : Total Nodes Simplest : YAN01_ Nodes, 12 Edges Most Complex: NRFIN_ Nodes, 7290 Edges NRFIN_00032 : 240 Nodes, 1121 Edges Average: 81 Nodes, 238 Edges 30
31 YAN01_00012 Callgraph 31
32 NRFIN_00026 Callgraph 32
33 Cyber Grand Challenge: Scheduled Events Open Track Proposal Track $750k/phase Challenge Qualification Event Top teams advance to finals Open Track Finalists receive $750k prize Challenge Final Event 1 st place: $2,000,000 2 nd place: $1,000,000 3 rd place: $750,000 33
34 Lessons Learned 34
35 CADET_00001 Power in simplicity In a nutshell : char buf[64]; receive(stdin, buf, 128, NULL); Reproducibility Does it crash?: 1. Perform a single 128 byte write to CADET_ Perform two consecutive 64 byte writes to CADET_
36 CADET_00001 Power in simplicity In a nutshell : char buf[64]; receive(stdin, buf, 128, NULL); Reproducibility Does it crash?: 1. Perform a single 128 byte write to CADET_ Perform two consecutive 64 byte writes to CADET_00001 More Deterministic Version : char buf[64]; receive_delim(stdin, buf, 128, \n ); 36
37 Lessons in Humility * These are all problems we should and could have detected on our own, but did not. Had they gone undetected, they could have led to security holes exploitable by hackers, particularly if they had access to source code. Our experience suggested the use of formal methods and tools is an essential part of improving the security properties of software. Using experienced, security-conscious programmers is not enough. [Fagin 2013]* POVS (590) Intended (347) Unintended (243) * 37
38 Bugs are everywhere 38
39 DARPA BAA CS deliveries will be evaluated for their ability to differentiate competitors. A Challenge Set that is solved by no competitors will receive a minimal score; a CS that is solved by all competitors will also receive a minimal score. Sets that are able to differentiate CQE competitors in a unique way will receive high marks. 39
40
41
42
43 43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60 DARPA BAA the speed and scale of automation 60
61 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
62 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
63 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
64 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
65 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
66 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
67 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
68 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
69 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
70 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
71 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
72 Legend Successful POV & Successful Patch Successful POV Only Successful Patch Only Unsuccessful Submission
73 Cyber Grand Challenge The DARPA Cyber Grand Challenge Seeks to make software safety the expert domain of machines Develops Fully Automated Opponents: Reverse engineer unknown software Locate weaknesses Heal weaknesses without sacrificing Functionality Correctness Performance Adopts the Capture The Flag competition format Capture Flags: prove weakness Defend Flags: remove weakness 73
74 CGC Finalists The three funded-track teams heading to the CGC finals are: CodeJitsu (Berkeley, Calif.): A team affiliated with the University of California, Berkeley ForAllSecure (Pittsburgh, Pa.): A startup founded by a team of computer security researchers from Carnegie Mellon University TECHx (Charlottesville, Va.): Software analysis experts from GrammaTech, Inc., a developer of software assurance tools and advanced cybersecurity solutions, and the University of Virginia The four open-track teams are: CSDS (Moscow, Idaho): A professor and post-doctoral researcher from the University of Idaho DeepRed (Arlington, Va.): A team of engineers from the Raytheon Company disekt (Athens, Ga.): Four people, working out of a technology incubator, who participate in CTF competitions around the world Shellphish (Santa Barbara, Calif.): A group of computer science graduate students at the University of California, Santa Barbara 74
75 CGC Qualification Event 75
76 CGC Areas of Excellence 76
77 Major differences CQE POV = Crash with security implications CFE POV = Registers Memory Competitors compete in isolation Head-to-head competition All binaries are compiled using CGC tools well controlled Competitor-generated replacements Greater ability to debug (A111) Competitors have the ability to program a network security appliance 77
78 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 78
79 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 79
80 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 80
81 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 81
82 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 82
83 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 83
84 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 84
85 Additional security layers often create vulnerabilities Current vulnerability watch list: Vulnerability Title Fix Avail? Date Added XXXXXXXXXXXX XXXXXXXXXXXX Local Privilege Escalation Vulnerability No 8/25/2010 XXXXXXXXXXXX XXXXXXXXXXXX Denial of Service Vulnerability Yes 8/24/2010 XXXXXXXXXXXX XXXXXXXXXXXX Buffer Overflow Vulnerability No 8/20/2010 XXXXXXXXXXXX XXXXXXXXXXXX Sanitization Bypass Weakness No 8/18/2010 XXXXXXXXXXXX XXXXXXXXXXXX Security Bypass Vulnerability No 8/17/2010 XXXXXXXXXXXX XXXXXXXXXXXX Multiple Security Vulnerabilities Yes 8/16/2010 XXXXXXXXXXXX XXXXXXXXXXXX Remote Code Execution Vulnerability No 8/16/2010 XXXXXXXXXXXX XXXXXXXXXXXX Use-After-Free Memory Corruption Vulnerability No 8/12/2010 XXXXXXXXXXXX XXXXXXXXXXXX Remote Code Execution Vulnerability No 8/10/2010 XXXXXXXXXXXX XXXXXXXXXXXX Multiple Buffer Overflow Vulnerabilities No 8/10/2010 XXXXXXXXXXXX XXXXXXXXXXXX Stack Buffer Overflow Vulnerability Yes 8/09/2010 XXXXXXXXXXXX XXXXXXXXXXXX Security-Bypass Vulnerability No 8/06/2010 XXXXXXXXXXXX XXXXXXXXXXXX Multiple Security Vulnerabilities No 8/05/2010 XXXXXXXXXXXX XXXXXXXXXXXX Buffer Overflow Vulnerability No 7/29/2010 XXXXXXXXXXXX XXXXXXXXXXXX Remote Privilege Escalation Vulnerability No 7/28/2010 XXXXXXXXXXXX XXXXXXXXXXXX Cross Site Request Forgery Vulnerability No 7/26/2010 XXXXXXXXXXXX XXXXXXXXXXXX Multiple Denial Of Service Vulnerabilities No 7/22/ of the vulnerabilities are in security software Color Code Key: Vendor Replied Fix in development Awaiting Vendor Reply/Confirmation Awaiting CC/S/A use validation. 85
86 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 86
87 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 87
88 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 88
89 At Microsoft, a Precursor Machine Reasoning accounts for 33% of flaws automatically removed from DoD Windows systems. 89
90 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 90
91 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 91
92 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 92
93 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 93
94 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 94
95 Defensive Adaptation Speed * a typical zero-day attack lasts 312 days * ** and takes 24 days to patch. ** Security Econometrics, Stefan Frei * Before We Knew It Bilge,Dumitras 95
96 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 96
97 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 97
98 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 98
99 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 99
100 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 100
101 Consensus Evaluation Service Poller Scoring Server Mixing Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs Consensus Evaluation CB Deployment Network Filters 101
102 Scheduled Final Event: Multi-Team Real Time Tournament Scoring Server Mixing Service Poller Flag Monitoring Proof of Vulnerability Service Poller Mixed Inputs 102
103 Final Event: August 4 th, 2016: DEF CON 103
104 Thank You Our competitors from around the world The Cyber Grand Challenge infrastructure team This talk: Dr. Lok Michael Zhivich, MIT/LL 104
105 For more information: 105
Trustworthy Software Systems
Trustworthy Software Systems Greg Morrisett Cutting Professor of Computer Science School of Engineering & Applied Sciences Harvard University Little about me Research & Teaching Compilers, Languages, Formal
A Dozen Years of Shellphish From DEFCON to the Cyber Grand Challenge
A Dozen Years of Shellphish From DEFCON to the Cyber Grand Challenge Antonio Bianchi [email protected] University of California, Santa Barbara HITCON Enterprise August 27th, 2015 Agenda Shellphish The
Linux Kernel. Security Report
Linux Kernel Security Report September 25 Authors: Andy Chou, Bryan Fulton and Seth Hallem Coverity has combined two years of analysis work carried out in a commercial setting at Coverity with four years
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Custom Penetration Testing
Custom Penetration Testing Compromising a Vulnerability through Discovery and Custom Exploitation Stephen Sims Advanced Penetration Testing - 2009 SANS 1 Objectives Penetration Testing Precompiled Tools
D. Best Practices D.1. Assurance The 5 th A
Best Practices I&C School Prof. P. Janson September 2014 D. Best Practices D.1. Assurance The 5 th A 1 of 20 IT systems are insecure for two main reasons: People are fallible and systems are complex and
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Center of Academic Excellence Cyber Operations Program 2013 Application
Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department
Gold Standard Method for Benchmarking C Source Code Static Analysis Tools
Gold Standard Method for Benchmarking C Source Code Static Analysis Tools Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Henny Sipma Sr. Computer Scientist Kestrel Technology,
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
A Test Suite for Basic CWE Effectiveness. Paul E. Black. [email protected]. http://samate.nist.gov/
A Test Suite for Basic CWE Effectiveness Paul E. Black [email protected] http://samate.nist.gov/ Static Analysis Tool Exposition (SATE V) News l We choose test cases by end of May l Tool output uploaded
Eugene Tsyrklevich. Ozone HIPS: Unbreakable Windows
Eugene Tsyrklevich Eugene Tsyrklevich has an extensive security background ranging from designing and implementing Host Intrusion Prevention Systems to training people in research, corporate, and military
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
The Advantages of Block-Based Protocol Analysis for Security Testing
The Advantages of Block-Based Protocol Analysis for Security Testing Dave Aitel Immunity,Inc. 111 E. 7 th St. Suite 64, NY NY 10009, USA [email protected] February, 4 2002 Abstract. This paper describes
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Defense in Depth: Protecting Against Zero-Day Attacks
Defense in Depth: Protecting Against Zero-Day Attacks Chris McNab FIRST 16, Budapest 2004 Agenda Exploits through the ages Discussion of stack and heap overflows Common attack behavior Defense in depth
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Why should I care about PDF application security?
Why should I care about PDF application security? What you need to know to minimize your risk Table of contents 1: Program crashes present an opportunity for attack 2: Look for software that fully uses
============================================================= =============================================================
Stephan Lantos Subject: FW: @RISK: The Consensus Security Vulnerability Alert: Vol. 13, Num. 23 In partnership with SANS and Sourcefire, Qualys is pleased to provide you with the @RISK Newsletter. This
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Exploiting nginx chunked overflow bug, the undisclosed attack vector
Exploiting nginx chunked overflow bug, the undisclosed attack vector Long Le [email protected] About VNSECURITY.NET CLGT CTF team 2 VNSECURITY.NET In this talk Nginx brief introduction Nginx chunked
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
The Hacker Strategy. Dave Aitel [email protected]. Security Research
1 The Hacker Strategy Dave Aitel [email protected] Security Research Who am I? CTO, Immunity Inc. History: NSA->@stake -> Immunity Responsible for new product development Vulnerability Sharing Club
Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security
Software security Buffer overflow attacks SQL injections Lecture 11 EIT060 Computer Security Buffer overflow attacks Buffer overrun is another common term Definition A condition at an interface under which
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: The most dangerous threat is the one which do not have a CVE. Until now developing reliable exploits
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Modern Binary Exploitation Course Syllabus
Modern Binary Exploitation Course Syllabus Course Information Course Title: Modern Binary Exploitation Course Number: CSCI 4968 Credit Hours: 4 Semester / Year: Spring 2015 Meeting Days: Tuesday/Friday
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Review and Exploit Neglected Attack Surface in ios 8. Tielei Wang, Hao Xu, Xiaobo Chen of TEAM PANGU
Review and Exploit Neglected Attack Surface in ios 8 Tielei Wang, Hao Xu, Xiaobo Chen of TEAM PANGU BlackHat 2015 Agenda ios Security Background Review of Attack Surfaces Fuzz More IOKit and MIG System
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
MCAFEE FOUNDSTONE FSL UPDATE
MCAFEE FOUNDSTONE FSL UPDATE 2013-FEB-25 To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and
Eliminating Vulnerabilities in Third-Party Code with Binary Analysis
White Paper April 2014 Eliminating Vulnerabilities in Third-Party Code with Binary Analysis Background Over the last few years, third-party code has moved from a minor factor in software development to
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION copyright 2003 securitymetrics Security Vulnerabilities of Computers & Servers Security Risks Change Daily New
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation Mathias Payer, ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Coverity White Paper. Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing
Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing The Stakes Are Rising Security breaches in software and mobile devices are making headline news and costing companies
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Bypassing Memory Protections: The Future of Exploitation
Bypassing Memory Protections: The Future of Exploitation Alexander Sotirov [email protected] About me Exploit development since 1999 Research into reliable exploitation techniques: Heap Feng Shui in JavaScript
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Sandbox Roulette: Are you ready for the gamble?
Sandbox Roulette: Are you ready for the gamble? Rafal Wojtczuk [email protected] Rahul Kashyap [email protected] What is a sandbox? In computer security terminology, a sandbox is an environment designed
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
The Leader in Cloud Security SECURITY ADVISORY
The Leader in Cloud Security SECURITY ADVISORY Security Advisory - December 14, 2010 Zscaler Provides Protection in the Face of Significant Microsoft Year End Patch Cycle Zscaler, working with Microsoft
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.
Microsoft s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Enterprise Mobility Report 06/2015. Creation date: 1.7.2015. Vlastimil Turzík
06/2015 Creation date: 1.7.2015 Author: Vlastimil Turzík Content Content... 2 Introduction... 4 ios... 4 Vulnerability... 4 ios Mail App Vulnerability Allows Hackers To Steal icloud Passwords... 4 Versions:
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege: Guard the Gaps with Patch Management 1.0
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Windows XP SP3 Registry Handling Buffer Overflow
Windows XP SP3 Registry Handling Buffer Overflow by Matthew j00ru Jurczyk and Gynvael Coldwind Hispasec 1. Basic Information Name Windows XP SP3 Registry Handling Buffer Overflow Class Design Error Impact
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
TOOL EVALUATION REPORT: FORTIFY
TOOL EVALUATION REPORT: FORTIFY Derek D Souza, Yoon Phil Kim, Tim Kral, Tejas Ranade, Somesh Sasalatti ABOUT THE TOOL Background The tool that we have evaluated is the Fortify Source Code Analyzer (Fortify
Reverse Engineering and Computer Security
Reverse Engineering and Computer Security Alexander Sotirov [email protected] Introduction Security researcher at Determina, working on our LiveShield product Responsible for vulnerability analysis and
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM: 12 Key Questions to Ask Executive Summary Host Intrusion Prevention Systems (HIPS) complement perimeter defenses, and play a vital role in protecting
IQware's Approach to Software and IT security Issues
IQware's Approach to Software and IT security Issues The Need for Security Security is essential in business intelligence (BI) systems since they have access to critical and proprietary enterprise information.
Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com
Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic
Bug hunting. Vulnerability finding methods in Windows 32 environments compared. FX of Phenoelit
Bug hunting Vulnerability finding methods in Windows 32 environments compared FX of Phenoelit The goal: 0day What we are looking for: Handles network side input Runs on a remote system Is complex enough
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
First Line of Defense to Protect Critical Infrastructure
RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Alert (TA14-212A) Backoff Point-of-Sale Malware
Alert (TA14-212A) Backoff Point-of-Sale Malware Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity
Common Errors in C/C++ Code and Static Analysis
Common Errors in C/C++ Code and Static Analysis Red Hat Ondřej Vašík and Kamil Dudka 2011-02-17 Abstract Overview of common programming mistakes in the C/C++ code, and comparison of a few available static
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
