Automated Testing With Commercial Fuzzing Tools
|
|
|
- Leo Dickerson
- 10 years ago
- Views:
Transcription
1 Automated Testing With Commercial Fuzzing Tools A Study of Commercially Available s: Identification of Undisclosed Vulnerabilities with the Aid of Commercial Fuzzing Tools Prof. Dr. Hartmut Pohl and Daniel Baier, B.Sc. Department of Computer Sciences, Bonn-Rhein-Sieg University of Applied Sciences This report is based on the principles and results from a research and development project funded by the German Federal Ministry of Education and Research and carried out at the Bonn-Rhine-Sieg University of Applied Sciences. Max-Pechstein-Str Cologne, Germany
2 1. Summary Bugs relevant to security in applications (vulnerabilities) are among the most frequent and thus riskiest attack targets in company IT systems. Cost-effective, tool-based Fuzzing techniques help to identify hitherto unknown security relevant bugs. The aim of this report is to analyze, assess and compare Fuzzing tools. In a series of projects, hitherto unknown vulnerabilities in individual and standard software were identified and also fixed by the respective software developer using Fuzzing techniques. This report is aimed at comparing the efficiency of commercially available s. The good results achieved to date show that Fuzzing techniques identify critical vulnerabilities which are exploitable from the Internet - despite a high security standard in the programming guidelines [Pohl 2010a]. Commercial s - bestorm in particular - enable the quick and targeted examination of an application with respect to its security level because they can be operated intuitively and provide comprehensive interface support. The efficiency of the individual techniques and tools was examined in practice - the Top 25 vulnerabilities can (only) be identified using a combination of Threat Modeling, Fuzzing and examining the source code [Pohl 2010b, 2010c; MITRE 2010]. 2. Motivating Factors/Motivation It is impossible to develop bug-free software. This makes the testing of software necessary, while maintaining a close link to quality assurance. It is impractical to conduct manual tests of software that has large quantities of programming codes [Sutton 2007]. Therefore, tool-based, automated techniques are required to identify vulnerabilities. This is because security vulnerabilities in applications are among the most frequently discovered and thus riskiest attack targets in company IT systems. Vulnerabilities in applications enable, among other things, attacks from the Internet and thus data loss, (industrial) espionage, and sabotage. In many cases, these attacks also make it possible to successfully attack the underlying, internally linked company IT systems and thus to access company-internal IT networking systems and critical IT infrastructures, such as financial data, Enterprise Resource Planning Systems (ERP), Customer Relationship Management Systems (CRM), production control systems, etc. Traditional security tools only enable the identification of known attacks that exploit known vulnerabilities; such security tools include, for instance, (web application) firewalls, intrusion detection systems, etc. Hence, they cannot be used to detect new attacks and new types of attacks. Beyond this, state-of-the-art security tools support the identification of hitherto unknown vulnerabilities and the detection of new types of attacks based on these vulnerabilities. Threat Modeling makes it possible to identify vulnerabilities early in the design phase. Static source code analysis (Static Analysis) is aimed at analyzing the source code without executing it. This tests whether the code conforms to the programming language and the programming guidelines during the implementation phase. Static Analysis tools work like parsers that conduct lexical, syntactic and semantic analyses of programming codes. Dynamic analysis tools (s) transmit random input data to the target program to trigger anomalous program behavior. Such anomalies indicate vulnerabilities. Hartmut Pohl: Automated Testing with Commercial Fuzzing Tools 2
3 Microsoft has been using the advantages of Threat Modeling [Howard 2006] and Fuzzing [Godefroid 2008] since 2003 as an integral part of its own "secure" software development process - the Security Development Lifecycle (SDL) [Howard 2006]. The cost of fixing vulnerabilities rises exponentially in the course of the software development process [NIST 2002]. If bugs are identified in the testing or verification phase, the cost rises by the factor 15 compared to their being detected during the design phase. If the bugs are identified during the release phase (or even later), the cost rises by the factor 100 (cf. Figure 1). Figure 1: Cost of Bug Elimination in the Software Development Lifecycle [NIST 2002] 3. Fuzzing 3.1. Introduction to Fuzzing Fuzz-testing (Fuzzing) is a software testing technique that is ideally used during the verification phase within the Security Development Lifecycle (SDL) [Lipner 2005], yet it is equally successful at a later stage, when the software has been delivered to the customer. The verification phase is located between the implementation and the release phase within the SDL (Figure 1). The Fuzzing process [cf. Figure 2] describes how Fuzzing tests are conducted: 1. Identifying input interfaces, 2. generating input data, 3. transmitting input data, 4. monitoring the target software, 5. conducting an exception analysis and 6. drawing up reports/reporting. Hartmut Pohl: Automated Testing with Commercial Fuzzing Tools 3
4 After the interfaces have been successfully identified, input data can be generated using a ; these data can then be transmitted to the target software to be tested. During the Fuzzing process the software is monitored so as to detect anomalous program behavior, which are triggered by randomly and intelligently selecting the widest possible range of input data. Figure 2: Fuzzing Process At last the results are reported to management and the technicians; the latter compile all information found during the execution of the program. Fuzzing is a tool-based technique used to identify software bugs during the verification phase; this can contribute to identifying undisclosed security relevant bugs. To this end, the input interfaces of the target software to be tested are identified, to which targeted data are directed in an automated fashion while the software is being monitored for potential bugs. This makes it possible to prevent third parties from identifying vulnerabilities and thus from developing zero-day-exploits [Pohl 2007]. Zero-day exploits are one of the twenty most frequent types of attacks [SANS 2010]. Fuzzing can be conducted both in the form of a white-box test (with available source code) and, above all, in the form of a black-box test (with no available source code) during the verification phase Market Analysis There are more than 250 s. 25% of all s can be used to test web applications and 45% can be used to examine network protocols. The testing of file formats is supported by 15% of all s. Web browsers can be examined by 10% of all s, whereas APIs can be tested by 7% of all Fuzzing tools. There are only two multi-protocol, environment variable fuzzers. [Cf. Figure 3: Market Overview of s] Hartmut Pohl: Automated Testing with Commercial Fuzzing Tools 4
5 Figure 3: Market Overview of s 3.3. Case Study: Testing s In a fuzzer case study done for Bonn-Rhine-Sieg University of Applied Sciences, a large number of vulnerabilities were identified using the commercial s evaluated below. In this real world evaluation, published software, i.e. software applications purchasable on the market, was tested to failure. The levels of severity assigned to the vulnerabilities were calculated using the Common Vulnerability Scoring System [Mell 2007] and then graphically represented as "Critical", "High", "Medium", "Low", "Undefined" - according to their degrees of criticality. The more severe the vulnerability, the higher the potential harm and the lower the effort required to exploit the vulnerability. The vulnerabilities detailed in figure 4 were discovered during the testing process. Figure 4: Vulnerabilities Identified with the Aid of Fuzzing, during the Case Study Hartmut Pohl: Automated Testing with Commercial Fuzzing Tools 5
6 3.4. Evaluation Parameters Various parameters have been drawn up to evaluate testing tools. The following eight evaluation parameters are important with respect to Fuzzing: Supported Fuzzing techniques and protocols: The aim of this parameter is to evaluate the possibility of using a to perform diverse tasks, including, for instance, the tool's ability to independently interpret interfaces, to adapt to protocol specifications and the scope for using it to interpret the target software. Costs and license: evaluation of the costs arising from each tool, including purchasing, maintenance and personnel costs as quantified on the basis of actual use. Analytical abilities: evaluation of the extent to which the is able to conduct analyses. This includes the monitoring techniques supported, the identification of vulnerabilities, the way the target software is reset and reporting. Furthermore, such criteria as the ability to establish parameters, bug reproduction, support for parallel Fuzzing as well as interruption and resumption of Fuzz tests are taken into account. Operating systems: this examines the question of which operating systems the can be used on and, above all, the question of whether the software is independent of the platform used. Software ergonomics: evaluation of the respective tool's efficiency, profitability and user-friendliness during the conduction of Fuzzing tests. Moreover, functional, dialog as well as input and output criteria are assessed. Documentation: evaluation of the completeness and quality of the documentation resources provided, such as user manuals, technical and third party documentation, as well as evaluation of the quality of the user interface. Extendibility: evaluation of the ability of the tool to supplement or extend existing features. The interfaces included, the programming language and the developing tools required are also taken into account. Further parameters: evaluation of further methods and features provided by s to improve the quality of Fuzzing. Above all, the scope for identifying, defining, evaluating and presenting bugs is evaluated. These parameters enable the consistent classification and evaluation of s and serve as a basis of ranking them on their merits Analysis In the following review, six different examples of commercial, widely used s were examined. The s examined and evaluated can be seen from Figure 5 -Commercial s Examined. Fuzzing tools from the category of "Multi-Protocol s" support most protocols and can thus be used to examine several interfaces. s from the category of "Web Application s" count among the remote s, even though their application is not restricted to web applications. Hartmut Pohl: Automated Testing with Commercial Fuzzing Tools 6
7 Name Category Operating System Version bestorm Tool A Multi-Protocol Microsoft Windows, Linux (i386) (4480) Defensics Tool B Appscan Standard Edition Tool C Burp Suite Pro Tool D N-Stalker Pro Edition Tool E HP Webinspect Tool F Multi-Protocol Web Application Web Application Web Application Web Application Independent of Operating System Microsoft Windows Unix, Microsoft Windows Microsoft Windows 2009 build 7 Microsoft Windows 8.0 Figure 5: Commercial s Examined On the whole, Tool A stands out. It shows high standards of user-friendly handling and operation, of the Fuzzing techniques supported and the analytical abilities provided. Both Tool A as well as Tool B enables the user to reset the target application after system failure and implements the reproduction of bugs identified. Tool A generates a Perl script that reproduces the bug (the vulnerability). Tool B, which shows markedly higher purchasing costs, supports a larger number of Fuzzing techniques. However, the utilization of the individual features is made difficult by user interface complexity. Tools C and F attain very good results for user friendliness. On the other hand, they both achieve low scores for their application possibilities and the Fuzzing techniques they support. The difference between them is very slight, with Tool F being slightly better than Tool C. Tool D attains a satisfactory result for user friendliness. On the other hand, it excels in terms of its low purchasing costs. The tool only supports a small number of Fuzzing techniques, yet its analytical abilities are comprehensive. Tool E excels in terms of very high scores for user friendliness. However, it only supports a small number of Fuzzing techniques, which are evaluated on the basis of the good analytical abilities it provides. Documentation is also assigned a low score. The costs of the tools differ considerably. Tool B shows the highest purchasing costs. Tools A, C and F are in the same price segment, differing from each other only slightly. Tools D and E excel in terms of their low purchasing costs, with Tool D being considerably cheaper. Owing to their complexity and low user friendliness, Tools B and D are characterized by higher personnel costs. Each of the evaluation parameters is assigned between 0 and a maximum of 10 points, with 10 points being the maximum, i.e. best (evaluation) result achievable. These results are graphically represented in Figure 6: Evaluation of the s. Hartmut Pohl: Automated Testing with Commercial Fuzzing Tools 7
8 Figure 6: Evaluation of the s If s are to be used for several interfaces, the degree to which interfaces are supported should be taken into account. The expertise required to use s is another criterion on which the evaluation of s may be based. Parameter Tool Software Documentation Ergonomics Compatible Protocols Analysis Depth Further Company- Specific Parameters Extendibility A B C D E F Figure 7: Comparison of s on the Basis of the Interfaces and Expertise Required Hartmut Pohl: Automated Testing with Commercial Fuzzing Tools 8
9 Tools A and B support a larger number of interfaces than Tools C, D, E and F. However, Tool B requires a higher level of expertise. Cf. Figure 8: Comparison of s on the Basis of the Interfaces and Expertise Required. Figure 8: Evaluation Results: Comparison of s on the Basis of the Interfaces and Expertise Required 4. Commercial Comparison Results After comparing commercially available s, bestorm was selected as the overall best in class as it achieved above average results in all parameters. Apart from being particularly user-friendly in terms of handling, bestorm excels in terms of the Fuzzing techniques supported and the analytical abilities provided; it supports 54 protocols and file formats. bestorm is a "Smart-Stateful-Grammar-Based-Generation-Based ". It also contains a component to adapt to protocol specifications; hence, it can just as well be classified as a "Smart-Stateless-Grammar-Based-Model-Interference-Based ". Furthermore, it can also be regarded as a "Protocol-Specific - Multi-Protocol " because it supports multiple protocols. bestorm is provided with the functionality to detect the occurrence of service denials - for instance, on the basis of such criteria as CPU activity, storage utilization and target program failure. The tool is also capable of identifying memory access violations. bestorm is highly efficient and cost-effective in terms of application; the dialogs meet expectations and are self-explanatory throughout. The basic usability criteria are complied with; even though the tool is particularly user-friendly in terms of handling, there is still enough potential for the future development of further versions. The bestorm user manual is available in English. It also contains a description of the protocol specification format and can thus be seen as technical documentation. A support system is also integral to the manual. Hartmut Pohl: Automated Testing with Commercial Fuzzing Tools 9
10 Along with the software, the purchaser receives a tutorial in the form of a quick start guide. The developer's site provides the opportunity to gain insights into a large number of white papers and case studies. Webinars are also conducted. In summary, bestorm shows higher standards in a number of areas than its commercial competitors: above all, bestorm excels in terms of the good software ergonomics it provides. The dialogs are user-friendly and self-explanatory; there is complete and detailed documentation available. The tool supports comprehensive Fuzzing techniques and has considerable analytical abilities. 5. References [Beyond 2010] Beyond Security (Ed_): Beyond Security - Vulnerability Assessment and Management. McLean [Codenomicon 2010] Codenomicon (Ed.): Codenomicon 1 DEFENSICS. Defend. Then Deploy. Oulu [Godefroid 2008] Godefroid, P.; Kiezun, A.; Levin, N.Y.: Grammar-based Whitebox Fuzzing s/projects/atg/pldi2800.pdf [Howard 2006] Howard, M.; Lipner, Steve: The Security Development Lifecycle. SDL: A Process for Developing Demonstrably More Secure Software. Microsoft p ress, Redmond [HP 2010] HP (Ed.): HP WebInspect software. Houston =bto&cp= ^ _100 [IBM 2010] IBM (Ed.): Rational AppScan Standard Edition. New York [Lipner 2005] Lipner, S.; Howard, M.: The Trustworthy Computing Security Development Lifecycle [Meland, 2008] Meland,.H.: SeaMonster: Providing tool support for security modeling. Agder [Melt 2007] Hell, P; Scarfone, K; Romanosky, S: A Complete Guide to the Common Vulnerability Scoring System Version [Microsoft 2009] Microsoft (Ed.): Threat Analysis And Modeling (TAM) v3.0 - Learn about the New Features! Redmond [MITRE 2010]: MITRE (Ed.): 2010 CWE/SANS Top 25: Focus Profiles - Automated vs. Manual Analysis. Eagle River [NIST 2002] National Institute of Standards and Technology (NIST) (Ed.):: The Economic Impacts of Inadequate Infrastructure for Software Testing. Gaithersburg [N-Stalker 2010] N-Stalker (Ed.): N-Stalker The Web Security Specialists. Sao Paulo [Pohl 2007] Pohl, H.: Zur Technik der heimlichen Online Durchsuchung. Du D, Ausg , [Pohl 2010a] [Pohl 2010b] [Pohl 2010c] [PortSwigger 2010] [SANS 10] [Schneier 1999] Pohl, H.: Rapid Security Framework (RSF). 18. DFN Workshop Sicherheit in vernetzten Systernen. Hamburg 2010 Pohl, H.: Entwicklungshelfer and Str-esstester - Tool-gestiii2te Identifizierung von Sicherheitskicken in verschiedenen Stadien des Softwarelebenszyklus. In: <kes> - Die Fachzeitschrift filir Informations-Sicherheit, 2, 2010 Pohl,H.: Rapid Security Framework (RSF). Zus. mit Liibbert, 3.: 18. DFN Workshop Sicherheit in vernelaten Systemen. Hamburg 2010 PortSwigger (Ed.): PortSwigger Web Security - Burp Suite is the leading toolkit for web application testing. London SANS (Ed.): The Top Cyber Security Risks httpliwww.sans.org/top-cybersecurity-risks/?ref=top20 Schneier, B.: Attack Trees [Sutton 2007] Sutton, M.; Greene, A.; Amini, P.: Fuzzing - Brute Force Vulnerability Discovery. New York [Swiderski 2004] Swiderski, F.; Snyder, W.: Threat Modeling. Redmond Hartmut Pohl: Automated Testing with Commercial Fuzzing Tools 10
Rapid Security Framework (RSF) Taxonomie, Bewertungsparameter und Marktanalyse zur Auswahl von Fuzzing-Tools
Rapid Security Framework (RSF) Taxonomie, Bewertungsparameter und Marktanalyse zur Auswahl von Fuzzing-Tools Prof. Dr. Hartmut Pohl Peter Sakal, B.Sc. M.Sc. Motivation Attacks Industrial espionage Sabotage
Zero-Day and Less-Than-Zero-Day Vulnerabilities and Exploits in Networked Infrastructures 1
Zero-Day and Less-Than-Zero-Day Vulnerabilities and Exploits in Networked Infrastructures 1 Hartmut Pohl All computers are at risk from security vulnerabilities that are generally unknown to the user and
Threat Modeling Smart Metering Gateways
Threat Modeling Smart Metering Gateways Armin Lunkeit OpenLimit SignCubes GmbH Berlin, Germany [email protected] Tobias Voß Sankt Augustin, Germany [email protected] Hartmut Pohl Sankt
Peach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
The Security Development Lifecycle. Steven B. Lipner, CISSP [email protected] Senior Director Security Engineering Strategy Microsoft Corp.
The Security Development Lifecycle Steven B. Lipner, CISSP [email protected] Senior Director Security Engineering Strategy Microsoft Corp. 2 Overview Introduction A look back Trustworthy Computing
The Security Development Lifecycle
The Security Development Lifecycle Steven B. Lipner Director of Security Engineering Strategy Security Business and Technology Unit Microsoft Corporation Context and History 1960s penetrate and patch 1970s
Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD
Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD whoami? Senior Director of a Red Team PSIRT Case Manager Data Analyst Internet Crime Investigator Security Evangelist
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
A Holistic Approach to Security Testing
Ruediger Bachmann and Achim D. Brucker Developing Secure Software A Holistic Approach to Security Testing Building secure software requires a well-selected combination of security testing techniques during
A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification
, pp. 131-142 http://dx.doi.org/10.14257/ijseia.2015.9.10.13 A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification Min-gyu Lee 1, Hyo-jung Sohn 2, Baek-min Seong
1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform
The Hacker Strategy. Dave Aitel [email protected]. Security Research
1 The Hacker Strategy Dave Aitel [email protected] Security Research Who am I? CTO, Immunity Inc. History: NSA->@stake -> Immunity Responsible for new product development Vulnerability Sharing Club
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
White Paper Integrating The CorreLog Security Correlation Server with BMC Software
orrelogtm White Paper Integrating The CorreLog Security Correlation Server with BMC Software This white paper describes how the CorreLog Security Correlation Server easily integrates with BMC Performance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
Levels of Software Testing. Functional Testing
Levels of Software Testing There are different levels during the process of Testing. In this chapter a brief description is provided about these levels. Levels of testing include the different methodologies
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
Session 3: Security in a Software Project
Session 3: Security in a Software Project Part 1: Parts of a software project Until now, we have mainly discussed what goes wrong during low- level design and implementation. However, implementation in
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
Ivan Medvedev Principal Security Development Lead Microsoft Corporation
Ivan Medvedev Principal Security Development Lead Microsoft Corporation Session Objectives and Takeaways Session Objective(s): Give an overview of the Security Development Lifecycle Discuss the externally
The Advantages of Block-Based Protocol Analysis for Security Testing
The Advantages of Block-Based Protocol Analysis for Security Testing Dave Aitel Immunity,Inc. 111 E. 7 th St. Suite 64, NY NY 10009, USA [email protected] February, 4 2002 Abstract. This paper describes
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM: 12 Key Questions to Ask Executive Summary Host Intrusion Prevention Systems (HIPS) complement perimeter defenses, and play a vital role in protecting
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
Industrie 4.0 - Security 0.1?
Industrie 4.0 - Security 0.1? Zur Notwendigkeit von Security Testing Prof. Dr. Hartmut Pohl, Jochen Klein Information Security (INFOSEC) Informationssicherheit Zustand eines IT-Systems, mit folgenden Sachzielen:
VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM
VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM 2 REDUCE COSTS. IMPROVE EFFICIENCY. MANAGE RISK. MaxPatrol from Positive Technologies provides visibility and control of security compliance across your entire
Module 10. Coding and Testing. Version 2 CSE IIT, Kharagpur
Module 10 Coding and Testing Lesson 23 Code Review Specific Instructional Objectives At the end of this lesson the student would be able to: Identify the necessity of coding standards. Differentiate between
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Comparing the Effectiveness of Penetration Testing and Static Code Analysis
Comparing the Effectiveness of Penetration Testing and Static Code Analysis Detection of SQL Injection Vulnerabilities in Web Services PRDC 2009 Nuno Antunes, [email protected], [email protected] University
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
NSFOCUS Web Vulnerability Scanning System
NSFOCUS Web Vulnerability Scanning System Overview Most Web application systems are tailor-made and delivered in source codes by Customer Benefits Accurate Analysis on Website Vulnerabilities Fast scan
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
Testing Web Applications. Software Engineering: A Practitionerʼs Approach, 7/e by Roger S. Pressman
Chapter 20 Testing Web Applications Slide Set to accompany Software Engineering: A Practitionerʼs Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For non-profit
ALERT LOGIC FOR HIPAA COMPLIANCE
SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare
G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview
Description C Service Overview G- Cloud Specialist Cloud Services Security and Penetration Testing This document provides a description of TVS s Security and Penetration Testing Service offered under the
The University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Web Applications Testing
Web Applications Testing Automated testing and verification JP Galeotti, Alessandra Gorla Why are Web applications different Web 1.0: Static content Client and Server side execution Different components
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.
Microsoft s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation
IBM Rational AppScan: enhancing Web application security and regulatory compliance.
Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your
Secure Development Lifecycle. Eoin Keary & Jim Manico
Secure Development Lifecycle Jim Manico @manicode OWASP Volunteer Global OWASP Board Member OWASP Cheat-Sheet Series Manager VP of Security Architecture, WhiteHat Security 16 years of web-based, database-driven
What is Fuzzing: The Poet, the Courier, and the Oracle
What is Fuzzing: The Poet, the Courier, and the Oracle Fuzzing is well established as an excellent technique for locating vulnerabilities in software. The basic premise is to deliver intentionally malformed
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
Creating Value through Innovative IT Auditing
Redefine Cybersecurity, Explore Innovative Strategies and Develop Trust Creating Value through Innovative IT Auditing Ronnie Koh Head of IT Audit, DBS Bank How do we create value? By Increasing both Breadth
CDM Software Asset Management (SWAM) Capability
CDM Software Asset Management (SWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT
Discover the best keywords for your online marketing campaign
Discover the best keywords for your online marketing campaign Index n... 3 Keyword discovery using manual methodology... 5 Step 1: Keyword analysis and search... 6 Step 2... 10 Additional tools... 11 Competitors...
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
Integrating Software Development Security Activities with Agile Methodologies
Integrating Software Development Activities with Agile Methodologies Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi Sharif University of Technology [email protected], [email protected]
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Cenzic Product Guide. Cloud, Mobile and Web Application Security
Cloud, Mobile and Web Application Security Table of Contents Cenzic Enterprise...3 Cenzic Desktop...3 Cenzic Managed Cloud...3 Cenzic Cloud...3 Cenzic Hybrid...3 Cenzic Mobile...4 Technology...4 Continuous
Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8
Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8 SR140531D 19 August 2014 Miercom www.miercom.com Overview Unify Inc. (formerly Siemens Enterprise Communications)
IBM SPSS Direct Marketing
IBM Software IBM SPSS Statistics 19 IBM SPSS Direct Marketing Understand your customers and improve marketing campaigns Highlights With IBM SPSS Direct Marketing, you can: Understand your customers in
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES Ira Winkler Codenomicon Session ID: MBS-W05 Session Classification: Intermediate Zero Day Attacks Zero day attacks are rising in prominence They tend to be
