November 2016 Blog Posts (46)

Intra process memory protection for applications on ARM and x86

Intra process memory protection for applications on ARM and x86



Today's software needs to isolate not only processes but the many components *within* a process from each other. Process-level isolation via jails, sandboxes, VMs, or hypervisors is finally becoming mainstream, but it misses an important point about modern software: its growing number of libraries that are all loaded into the same address space, and may all interact…

Continue

Added by Gireesh Kumar on November 25, 2016 at 12:02pm — No Comments

Demystifying Secure enclave processor (Black Hat Conference 2016)

Demystifying Secure enclave processor

The secure enclave processor (SEP) was introduced by Apple as part of the A7 SOC with the release of the iPhone 5S, most notably to support their fingerprint technology, Touch ID. SEP is designed as a security circuit configured to perform secure services for the rest of the SOC, with with no direct access from the main processor. In fact, the secure enclave processor runs it own fully functional operating…

Continue

Added by pritha on November 25, 2016 at 12:02pm — No Comments

Breaking hardware enforced security with hypervisors (Black Hat Conference 2016)

Breaking hardware enforced security with hypervisors

Hardware-Enforced Security is touted as the panacea solution to many modern computer security challenges. While certainly adding robust options to the defenders toolset, they are not without their own weaknesses. In this talk we will demonstrate how low-level technologies such as hypervisors can be used to subvert the claims of security made by these mechanisms. Specifically, we will show how…

Continue

Added by pritha on November 25, 2016 at 11:58am — No Comments

Samsung pay: tokenized numbers flaws and issues (Black Hat Conference 2016)

Samsung pay: tokenized numbers flaws and issues

Samsung announced many layers of security to its Pay app. Without storing or sharing any type of user's credit card information, Samsung Pay is trying to become one of the most secure approaches offering functionality and simplicity for its customers. This app is a complex mechanism which has some limitations relating security. Using random tokenize numbers and implementing Magnetic Secure Transmission…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:57am — No Comments

Applied Machine learning for data exfiltration and other fun topics (Black Hat Conference 2016)

Applied Machine learning for data exfiltration and other fun topics

The goal of this presentation is to help researchers, analyst, and security enthusiast get their hands dirty applying machine learning to security problems. We will walk the entire pipeline from idea to functioning tool on several diverse security related problems, including offensive and defensive use cases for machine learning. Through these examples and demonstrations, we will…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:57am — No Comments

Memory forensics using VMI for cloud computing (Black Hat Conference 2016)

Memory forensics using VMI for cloud computing

The relocation of systems and services into cloud environments is on the rise. Because of this trend users lose direct control over their machines and depend on the offered services from cloud providers. These services are especially in the field of digital forensics very rudimentary. The possibilities for users to analyze their virtual machines with forensic methods are very limited. In the…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:55am — No Comments

Building trust and Enabling innovation for voice enabled IOT

Building trust and Enabling innovation for voice enabled IOT



Voice enabled technology provides developers with great innovation opportunities as well as risks. The Voice Privacy Alliance created a set of 39 Agile security stories specifically for voice enabled IoT products as part of the Voice Privacy Innovation Toolkit. These security stories help product owners and security developer focals bake security into their voice enabled products…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:50am — No Comments

Breaking Kernal address space layout rendomization: KASLAR with Intel TSX (Black Hat Conference 2016)

Breaking Kernal address space layout rendomization: KASLAR with Intel TSX

Kernel hardening has been an important topic, as many applications and security mechanisms often consider the kernel their Trusted Computing Base (TCB). Among various hardening techniques, kernel address space layout randomization (KASLR) is the most effective and widely adopted technique that can practically mitigate various memory corruption vulnerabilities, such as…

Continue

Added by pritha on November 25, 2016 at 11:49am — No Comments

Attacking bluetooth smart devices: introducing a new BLE proxy tool

Attacking bluetooth smart devices: introducing a new BLE proxy tool



Bluetooth Low Energy is probably the most thriving technology implemented recently in all kinds of IoT devices: gadgets, wearables, smart homes, medical equipment and even banking tokens. The BLE specification assures secure connections through link-layer encryption, device whitelisting and bonding - a mechanisms not without flaws, although that's another story we are…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:47am — No Comments

Account jumping post infection persistency and lateral movement in AWS (Black Hat Conference 2016)

Account jumping post infection persistency and lateral movement in AWS

The widespread adoption of AWS as an enterprise platform for storage, computing and services makes it a lucrative opportunity for the development of AWS focused APTs. We will cover pre-infection, post-infection and advanced persistency techniques on AWS that allows an attacker to access staging and production environments, as well as read and write data and even reverse its…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:46am — No Comments

A lightbulb worm

A lightbulb worm



Could a worm spread through a smart light network? This talk explores the idea, and in particular dives into the internals of the Philips Hue smart light system, and details what security has been deployed to prevent this.

Examples of hacking various aspects of the system are presented, including how to bypass encrypted bootloaders to read sensitive information. Details on the firmware in multiple versions of the…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:45am — No Comments

Recover A RSA Private key from a TLS session with perfect forward secrecy (Black Hat Conference 2016)

Recover A RSA Private key from a TLS session with perfect forward secrecy

They always taught us that the only thing that can be pulled out from a SSL/TLS session using strong authentication and latest Perferct Forward Secrecy ciphersuites is the public key of the certificate exchanged during the handshake - an insufficient condition to place a MiTM attack without to generate alarms on the validity of the TLS connection and certificate itself.…

Continue

Added by pritha on November 25, 2016 at 11:43am — No Comments

Weaponizing data science for social engineering: automate E2E spear phishing on twitter

Weaponizing data science for social engineering: automate E2E spear phishing on twitter



Historically, machine learning for information security has prioritized defense: think intrusion detection systems, malware classification and botnet traffic identification. Offense can benefit from data just as well. Social networks, especially Twitter with its access to extensive personal data, bot-friendly API, colloquial syntax and prevalence of…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:43am — No Comments

TCP injection attacks in the wild: A large scale case study (Black Hat Conference 2016)

TCP injection attacks in the wild: A large scale case study

In this work we present a massively large-scale survey of Internet traffic that studies the practice of false content injections on the web. We examined more than 1.5 Peta-bits of data from over 1.5 million distinct IP addresses. Earlier this year we have shown that false content injection is practiced by network operators for commercial purposes. These network operators inject…

Continue

Added by pritha on November 25, 2016 at 11:40am — No Comments

AI approach to malware similarity analysis: Mapping the malware genome with a deep neural network

AI approach to malware similarity analysis: Mapping the malware genome with a deep neural network



In recent years, cyber defenders protecting enterprise networks have started incorporating malware code sharing identification tools into their workflows. These tools compare new malware samples to a large databases of known malware samples, in order to identify samples with shared code relationships. When unknown malware binaries are found to…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:40am — No Comments

Certificate bypass: Hiding and executing malware from a digitally signed executables

Certificate bypass: Hiding and executing malware from a digitally signed executables

Malware developers are constantly looking for new ways to evade the detection and prevention capabilities of security solutions. In recent years, we have seen many different tools, such as packers and new encryption techniques, help malware reach this goal of hiding the malicious code. If the security solution cannot unpack the compressed or encrypted malicious content…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:36am — No Comments

The art of reverse engineering flash exploits

The art of reverse engineering flash exploits



Adobe Flash is one of the battlegrounds of exploit and mitigation methods. As most of the Flash exploits demonstrate native memory layer exploit technique, it is valuable to understand the memory layout and behavior of Adobe Flash Player. We developed fine-grained debugging tactics to observe memory exploit technique and the way to interpret them effectively. This eventually helps defenders to…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:33am — No Comments

Attacking SDN infrastructure: Are we ready for the Next Gen networking (Black Hat Conference 2016)

Attacking SDN infrastructure: Are we ready for the Next Gen networking

Software-Defined Networking (SDN), by decoupling the control logic from the closed and proprietary implementations of traditional network devices, allows researchers and practitioners to design new innovative network functions/protocols in a much easier, more flexible, and powerful way. This technology has gained significant attentions from both industry and academia, and it…

Continue

Added by pritha on November 25, 2016 at 11:33am — No Comments

Samsung pay: tokenized numbers flaws and issues (Black Hat Conference 2016)

Samsung pay: tokenized numbers flaws and issues

Samsung announced many layers of security to its Pay app. Without storing or sharing any type of user's credit card information, Samsung Pay is trying to become one of the most secure approaches offering functionality and simplicity for its customers. This app is a complex mechanism which has some limitations relating security. Using random tokenize numbers and implementing Magnetic Secure Transmission…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:30am — No Comments

Bad for Enterprise: Attacking BYOD enterprise mobility security solutions (Black Hat Conference 2016)

Bad for Enterprise: Attacking BYOD enterprise mobility security solutions

The global market for Bring Your Own Device (BYOD) and enterprise mobility is expected to quadruple in size over the next four years, hitting $284 billion by 2019. BYOD software is used by some of the largest organizations and governments around the world. Barclays, Walmart, AT&T, Vodafone, United States Department of Homeland Security, United States Army, Australian…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:30am — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts