%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20170522191109+00'00') /ModDate (D:20170522191109+00'00') /Title (Report 05-2017) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 10 0 R 12 0 R 14 0 R 16 0 R 18 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4405 >> stream 0.000 0.000 0.000 rg BT 34.016 725.937 Td /F1 18.0 Tf [(DeepSec welcomes SEC Consult as Sponsor for 2017!)] TJ ET BT 34.016 683.315 Td /F2 12.0 Tf [(Posted on )] TJ ET BT 84.020 683.315 Td /F1 12.0 Tf [(May 12,2017)] TJ ET BT 149.348 683.315 Td /F2 12.0 Tf [( by )] TJ ET BT 167.348 683.315 Td /F1 12.0 Tf [(lynx)] TJ ET BT 34.016 645.059 Td 0.605 Tw /F2 12.0 Tf [(Testing products, production code, security measures, or the overall security of infrastructure is hard work. The )] TJ ET BT 34.016 630.803 Td 2.102 Tw /F2 12.0 Tf [(typical needs in term of information technology for a company or an organisation has become a variety of )] TJ ET BT 34.016 616.547 Td 0.511 Tw /F2 12.0 Tf [(components that need to be maintained and hardened against attacks. The devil is in the details. In order to find )] TJ ET BT 34.016 602.291 Td 1.695 Tw /F2 12.0 Tf [(critical weaknesses you need decades of experience, a thorough understanding of the technologies in use, in-)] TJ ET BT 34.016 588.035 Td 0.733 Tw /F2 12.0 Tf [(depth knowledge of processes that touch information technology, and a decent portion of creativity to come up )] TJ ET BT 34.016 573.779 Td 0.555 Tw /F2 12.0 Tf [(with ways around obstacles. SEC Consult, our long-time sponsor, has all of this and more. They publish their )] TJ ET BT 34.016 559.523 Td 0.952 Tw /F2 12.0 Tf [(findings and offer consulting for anyone needing extra security. Take a look at the )] TJ ET 0.000 0.000 0.800 rg BT 444.922 559.523 Td 0.952 Tw /F2 12.0 Tf [(House of Keys project)] TJ ET 0.000 0.000 0.800 RG 0.24 w 0 J [ ] 0 d 444.922 558.129 m 555.417 558.129 l S 0.000 0.000 0.000 rg BT 555.417 559.523 Td 0.952 Tw /F2 12.0 Tf [(, the )] TJ ET 0.000 0.000 0.800 rg BT 34.016 545.267 Td 0.000 Tw /F2 12.0 Tf [(IoT Inspector)] TJ ET 0.24 w 0 J [ ] 0 d 34.016 543.873 m 98.996 543.873 l S 0.000 0.000 0.000 rg BT 98.996 545.267 Td /F2 12.0 Tf [(, or )] TJ ET 0.000 0.000 0.800 rg BT 117.992 545.267 Td /F2 12.0 Tf [(gaping holes in digital forensics software)] TJ ET 0.24 w 0 J [ ] 0 d 117.992 543.873 m 315.632 543.873 l S 0.000 0.000 0.000 rg BT 315.632 545.267 Td /F2 12.0 Tf [( that allows to manipulate evidence.)] TJ ET 0.000 0.000 0.800 rg BT 34.016 519.011 Td 2.460 Tw /F2 12.0 Tf [(SEC Consult)] TJ ET 0.24 w 0 J [ ] 0 d 34.016 517.617 m 98.828 517.617 l S 0.000 0.000 0.000 rg BT 98.828 519.011 Td 2.460 Tw /F2 12.0 Tf [( is the leading consultant in the field of cyber and cyberspace application security within the )] TJ ET BT 34.016 504.755 Td 1.577 Tw /F2 12.0 Tf [(German-speaking countries. The company with offices in Europe, Asia and North America specialises in the )] TJ ET BT 34.016 490.499 Td 2.610 Tw /F2 12.0 Tf [(establishment of Information security management and certification support according to ISO27001, Cyber )] TJ ET BT 34.016 476.243 Td 3.059 Tw /F2 12.0 Tf [(Defence, DDoS tests, external and internal security tests, secure software \(development\) and the gradual, )] TJ ET BT 34.016 461.987 Td 4.321 Tw /F2 12.0 Tf [(sustainable improvement of the level of security. SEC Consult's customers include leading companies, )] TJ ET BT 34.016 447.731 Td 0.000 Tw /F2 12.0 Tf [(authorities and organizations from various sectors of the private economy as well as the critical infrastructure.)] TJ ET BT 34.016 421.475 Td 0.569 Tw /F2 12.0 Tf [(Experts from SEC Consult will be present throughout the conference. If you want to get in touch for a chat, we )] TJ ET BT 34.016 407.219 Td 1.317 Tw /F2 12.0 Tf [(encourage you to do so. They can tell you more about their published work, ongoing projects, and will share )] TJ ET BT 34.016 392.963 Td 1.534 Tw /F2 12.0 Tf [(their view of critical infrastructure and how to protect it. We can also recommend to attend presentations by )] TJ ET BT 34.016 378.707 Td 1.586 Tw /F2 12.0 Tf [(their researchers. You will learn a lot, and they are willing to share their opinion. Plus they can help you to )] TJ ET BT 34.016 364.451 Td 0.000 Tw /F2 12.0 Tf [(attend )] TJ ET 0.000 0.000 0.800 rg BT 66.344 364.451 Td /F2 12.0 Tf [(DeepSec 2017)] TJ ET 0.24 w 0 J [ ] 0 d 66.344 363.057 m 135.992 363.057 l S 0.000 0.000 0.000 rg BT 135.992 364.451 Td /F2 12.0 Tf [( - contact them and ask for a sponsored ticket.)] TJ ET BT 34.016 338.195 Td /F2 12.0 Tf [(Posted in:Conference,Security | Tagged:Announcement,DeepSec,Security | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Times-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Times-Roman /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Annot /Subtype /Link /A 11 0 R /Border [0 0 0] /H /I /Rect [ 444.9222 558.4435 555.4170 570.3235 ] >> endobj 11 0 obj << /Type /Action /S /URI /URI (http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html) >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 34.0157 544.1875 98.9957 556.0675 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://www.iot-inspector.com/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 117.9917 544.1875 315.6317 556.0675 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://blog.sec-consult.com/2017/05/chainsaw-of-custody-manipulating.html) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 34.0157 517.9315 98.8275 529.8115 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (https://www.sec-consult.com/) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 66.3437 363.3715 135.9917 375.2515 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (https://deepsec.net/) >> endobj xref 0 20 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000283 00000 n 0000000312 00000 n 0000000450 00000 n 0000000560 00000 n 0000005017 00000 n 0000005125 00000 n 0000005234 00000 n 0000005362 00000 n 0000005492 00000 n 0000005618 00000 n 0000005699 00000 n 0000005827 00000 n 0000005952 00000 n 0000006078 00000 n 0000006158 00000 n 0000006285 00000 n trailer << /Size 20 /Root 1 0 R /Info 5 0 R >> startxref 6357 %%EOF -

Disinformation Warfare – Attribution makes you Wannacry

After the Wannacry malware wreaked havoc in networks, ticket vending machines, companies, and hospitals the clean-up has begun. This also means that the blame game has started. The first round of blame was distributed between Microsoft and the alleged inspiration for the code. The stance on vulnerabilities of security researchers is quite clear. Weaknesses in software, hardware, protocols, or design needs to be documented and published. This is the only way to address the problem and to give the defenders a chance to react. The discussion about how to deal with the process is ongoing and will most likely never come to a conclusion. What about the source of the attack?

Attribution is hard. Knowing who attacked has become increasingly difficult in the analogue world. Take any of the conflicts around the world and have a look. There is no clear picture of who did what exactly for which reason. When it comes to cyber warfare you basically have to deal with lots of disinformation. We have had many talks about the use of the Internet and other networks in digital skirmishes. Routing data via a different set of connections is the core property of the Internet. You cannot trace the trajectory of a projectile. You can only rely on the forensic analysis of the attack (and even this is disputed since forensic software can be manipulated) and on data you see in network interactions. Deception is the basic ingredient of any attack. The glorified open field battles where people run at each other screaming is not what you can expect from real situations.

There are speculations that Wannacry was launched by North Korea. Russia, China, and North Korea are the default origins any analysis starts with (the only exception being Stuxnet for obvious reasons). Most people forget that false flags operations are a common military tactic. There is an easy recipe to fake an attack. Want to look like APT28? No problem. Need a specific origin for your reconnaissance? That’s what the cloud is for! You can also use the vast archive of malicious software as a starting point. The code, contrary to the truth, is out there.

Getting intelligence right is as hard as getting the attribution right. It’s not impossible, but you have to keep this in mind when reading the news about incidents such as Wannacry or others. The last attack didn’t even take advantage of the Internet of Things. Imagine that! We have just seen a glimpse of the future. If you want to prepare yourself for what’s next, you need to get your intelligence right in addition to your security. Why not join us in September for DeepINTEL and think about strategies for the future?

Wannacry, Code Red, and „Cyber“ Warfare

Society and businesses increasingly rely on networked infrastructure. This is not news. Worms that used networks to spread to new hosts in order to infect them is also not news. Code Red did this back in 2001. There is a new worm going around. Its name is Wannacry, and it is allegedly based on published attack code developed by the NSA. The malicious software is delivered by email. After successful installation it infects the host and propagates to other systems by using probes to port 139/TCP, 445/TCP and 3389/TCP. It belongs to the class of ransomware, encrypting files and demanding ransom. Thousands of infected systems are still active. The attack is still ongoing. If you are in doubt if you have compromised systems within your network, we recommend taking a look at how to spot the malware.

The new ingredients of this worm are known vulnerabilities and network capabilities to spread near infected computers. This means that nearby hosts will be infected even if they did not receive the initial email with the malicious document. The patch for the exploited vulnerability is out since 14 March 2017. The code seems to be based on tools published by the Shadow Brokers in August 2016. Since the code has already been changed and uses different payloads, the threat will persist for a while. It’s easy to blame the lack of upgrades, but upgrading can be quite difficult. Containing networked systems, filtering local network traffic (especially taking care of management access protocols), and keeping an eye out for an increase in scans works regardless of the weaknesses exploited.

The deeper problem has to do with how we handle vulnerabilities in software. Bugs need to the disclosed as early as possible. Developers and vendors do need a chance to fix their code. This is especially true for vulnerabilities (where the bug has been applied) and exploits (where the vulnerability has been refined to production status). There is also a connection to malicious software used in law enforcement, military operations, and intelligence organisations. Breaking into networks or computer systems works well if you possess knowledge about exploits no one else has. Wannacry is a good example of how this secret code endangers critical infrastructure. There have been reports that hospitals in the UK were hit by the worm. Back in 2012 fx talked about this very scenario in the keynote presentation (titled We Came In Peace – They Don’t: Hackers vs. CyberWar). The existence of 0-days put everyone at risk. This is why biological warfare does not work – and we are dealing with a virus in the wild attacking networked systems as of now.

At DeepINTEL we will discuss strategic aspects of information security. This includes how to handle threats like Wannacry and how to counter these threats.

DeepSec welcomes SEC Consult as Sponsor for 2017!

Testing products, production code, security measures, or the overall security of infrastructure is hard work. The typical needs in term of information technology for a company or an organisation has become a variety of components that need to be maintained and hardened against attacks. The devil is in the details. In order to find critical weaknesses you need decades of experience, a thorough understanding of the technologies in use, in-depth knowledge of processes that touch information technology, and a decent portion of creativity to come up with ways around obstacles. SEC Consult, our long-time sponsor, has all of this – and more. They publish their findings and offer consulting for anyone needing extra security. Take a look at the House of Keys project, the IoT Inspector, or gaping holes in digital forensics software that allows to manipulate evidence.

SEC Consult is the leading consultant in the field of cyber and cyberspace application security within the German-speaking countries. The company with offices in Europe, Asia and North America specialises in the establishment of Information security management and certification support according to ISO27001, Cyber Defence, DDoS tests, external and internal security tests, secure software (development) and the gradual, sustainable improvement of the level of security. SEC Consult’s customers include leading companies, authorities and organizations from various sectors of the private economy as well as the critical infrastructure.

Experts from SEC Consult will be present throughout the conference. If you want to get in touch for a chat, we encourage you to do so. They can tell you more about their published work, ongoing projects, and will share their view of critical infrastructure and how to protect it. We can also recommend to attend presentations by their researchers. You will learn a lot, and they are willing to share their opinion. Plus they can help you to attend DeepSec 2017 – contact them and ask for a sponsored ticket.

DeepSec welcomes Digital Guardian as Sponsor for 2017

No event can be done with supporters, and so we welcome Digital Guardian as sponsor for the upcoming DeepSec 2017 conference! If you have data in your organisation, then you might be interested in talking to Digital Guardian’s experts, because they know a lot about what data does, where it lives, what endpoints really are, how you protect it, and how you keep exclusive access to it. Since data is code on most computing architectures, there’s a double benefit.

Digital Guardian is a next generation data protection platform purpose built to stop data theft. The Digital Guardian platform performs across the corporate network, traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. For more than 10 years, it has enabled data-rich organizations to protect their most valuable assets with an on premise deployment or an outsourced managed security program (MSP). Digital Guardian’s unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, enables you to protect data without slowing the pace of your business.

So if you want to protect your digital assets and still be able to work with them, you should take advantage of the opportunity of meeting the data protection experts at DeepSec 2017. They also have a contingent of sponsored tickets, so go and talk to them to make an appointment.

Call for Papers: 1st Reversing and Offensive-Oriented Trends Symposium (ROOTs) 2017

ROOTs 2017

The first Reversing and Offensive-Oriented Trends Symposium (ROOTs) 2017 opens its call for papers. ROOTs is the first European symposium of its kind. ROOTS aims to provide an industry-friendly academic platform to discuss trends in exploitation, reversing, offensive techniques, and effective protections. Submissions should provide novel attack forms, describe novel reversing techniques or effective deployable defenses. Submissions can also provide a comprehensive overview of the state-of-the-art, and pinpoint promising areas that have not received appropriate attention in the past.

To facilitate interaction with industry, the ROOTs ticket will be valid for all DeepSec conference tracks on both days, including the industry tracks, and the DeepSec conference tickets for the industry track will be valid for ROOTs. The usual rules for academic discounts apply. Please contact the DeepSec staff or our sponsors for discount codes.


Topics of interest include, but are not limited to:

  • New exploitation techniques and methodologies
  • New reverse engineering techniques and methodologies
  • The role of exploitation in the science of security
  • The role of reverse engineering in the science of security
  • New unintended models of programming and execution wherein the program is encoded in data, metadata, descriptors, etc.
  • Formal models of exploitation and formal methods for exploitation
  • Systematization of knowledge in exploitation
  • Systematization of knowledge in reverse engineering
  • Exploitation of trending platforms and architectures: IoT, cloud, SDNs, etc.
  • Reverse engineering of trending platforms and architectures: IoT, cloud, SDNs, etc.
  • Exploitation perspectives on emerging trust models: SGX, blockchains, etc.

PC & Publisher

The Call for Papers is open, and we welcome any kind of submissions. All submitted presentations will be reviewed by the programme committee consisting of the following persons.

Program chair: Sergey Bratus (Dartmouth College)
General chair: Edgar Weippl (TU Wien, SBA Research)
Co-General chair: René Pfeiffer (DeepSec)

Patroklos (argp) Argyroudis (CENSUS S.A.)
Jean-Philippe Aumasson (Kudelski Security, Switzerland)
Hebert Bos (V.U. Amsterdam)
Stephen Checkoway (University of Illinois at Chicago)
Gynvael Coldwind (Google Security Team)
Lucas Davi (University of Duisburg-Essen)
Thomas Dullien (Google Project Zero)
Aurelien Francion (EURECOM)
Mario Heiderich (Cure53)
Vasileios Kemerlis (Brown University)
René Mayrhofer (JKU Linz)
Marion Marschalek (BlackHoodie)
Collin Mulliner (Trifinite)
Marcus Niemietz (RUB)
Alexander Peslyak (Openwall)
Konrad Rieck (TU Braunschweig)
Ahmad-Reza Sadeghi (TU Darmstadt)
Sebastian Schinzel (FH Münster)
Juraj Somorovsky (Hackmanit)
Filippo Valsorda (Cloudflare)
Edgar Weippl (TU Wien, SBA Research)
Fabian Yamaguchi (TU Braunschweig, LeftShift)
Stephano Zanero (University Politecnico di Milano)

Application for inclusion in ACM DL via the International Conference Proceedings Series (ICPS) is pending. See ACM’s details about author’s rights.

The Call for Papers uses the Easychair CfP manager. All submissions must be sent until 5 August 2017. Authors will be notified by 15 September 2017. We need your camera-ready papers until 5 October 2017.

Submission Instructions

Submissions to ROOTS are not limited in page count, but their length should be commensurate with the results; 5-10 pages of two-column PDF using the sigconf template from https://www.acm.org/publications/proceedings-template. We encourage submissions of papers based on results previously presented at industry or hacker conferences, so long as the papers themselves have not been presented elsewhere. We also encourage Systematization of Knowledge (SoK) submissions.

If you have further questions, do not hesitate to contact us.

DeepINTEL Update, Science First Campaign, Early Birds, and other News

The Easter break is over. We didn’t sleep (much), and we did not look for Easter eggs in software either. Instead we did a bit of work behind the scenes. DeepSec 2017 will have some more content due to the co-hosted ROOTs workshop. The full call for papers will be ready on 1 May 2017. We will publish the text here on this blog, and email it to interested researchers. In the meantime the DeepSec 2017 Call for Papers is waiting patiently for your submission.

In case you haven’t noticed, the DeepSec and DeepINTEL ticket shops are online. Please book your ticket as early as possible! Every year so far we had some people at our conference who were very sad because their favourite training was not available. If you book early you’ll help us to secure your favourite training. Instant messaging is a lot easier than the instant transport of a trainer halfway across Europe or the globe. We will inform you about the training submissions in advance, so that you can plan your education for the fourth quarter.

The preliminary schedule for DeepINTEL is ready. We will send it to interested parties via email and publish a shorter version on the DeepINTEL web site. Threat intelligence is as important as ever. We have some interesting topics for you.

Looking forward to see you in September and in November in Vienna!

Applied Crypto Hardening Project is looking for Help

Hopefully many of you know the Applied Crypto Hardening (ACH) project, also known as BetterCrypto.org. The project was announced at DeepSec 2013. The idea was (and is) to compile hands-on advice for system administrators, dev ops, developers, and others when it comes to selecting the right crypto configuration for an application. The BetterCrypto.org document covers far more protocols than HTTPS. OpenSSH, OpenVPN, IPsec, and more topics are described in the PDF guide. The project is run by volunteers. This is where you come in.

The ACH project needs more volunteers to keep going. New GNU/Linux distributions are around the corner (the apt store never sleeps). Some vendors really do upgrade their code base. Libraries change and bleed less. Algorithms get tested, improved, and re-evaluated. The field of cryptography is moving forward, as it should. So if you have some mathematics skills, know your way around configurations, like to work with text fragments and documents, and would like to help improving the crypto capabilities of the software around you, then there is a way to express yourself. Join the mailing list. Get a Github account or use you existing one. Send pull requests. Help with the reviews.

Just because some vendors and some developers haven’t been fast asleep for the past four years, the effort to promote, test, and deploy solid cryptographic configurations does not happen automagically. It’s not all about OpenSSL cipher strings. It is about all applications that use cryptography. Help with your skills. We do.

Plus you can even submit a talk for the DeepSec 2017 Call for Papers and talk about how you did things cryptographically right. We had some talks about this in the past. Don’t be a pre-quantum crypto couch potato!

SS8 – Replacement for Insecure Signalling System No. 7 (SS7) Protocol revealed

The ageing SS7 protocol has reached it’s end of life. Security experts around the world have criticised vulnerabilities a long time ago. SS7 even facilitated unsolicited surveillance attacks. What’s more, it has its own talks at the annual Chaos Communication Congress – which is a clear sign of fail if there is more than one presentation dealing with inherent design failures. It’s time to put SS7 to rest. Since the 1970s the requirements for signalling have clearly changed. It’s not only about telephones any more.

SS8, its successor, features a brand new design and fixes the many shortcomings of SS7. New technologies such as blockchain, artificial intelligence, crowd routing, social signalling, full “tapping”, and deep state connections are now part of the core functions. Furthermore, SS8 is completely in harmony with Big Data, because it offers a compressed metadata format for long-time storage (thus accommodating requirements of different countries all over the world). It had been secretly tested, and the deployment is planned to start at the end of 2017. The upgrade will be seamless and will be over by Christmas, as usual.

New features of SS8 include

  • zero-knowledge surveillance,
  • in-band cyber defence by cloud algorithms,
  • Big Data API for metadata backup to off-site storage,
  • military-grade end-to-end obfuscation,
  • wire “tapp” proof countermeasure heuristics,
  • signalling transactions secured by a blockchain,
  • multi-peer conversations (bidirectional and listening-only),
  • attocells for PAN or NFC environments,
  • integration with 5G networks, and
  • backported 6G features.

The future of communication is looking bright again. An in-depth security analysis of SS8 will be given at DeepSec 2017 in November. If you regularly use telephones of any kind, then you might be interested in attending.

DeepINTEL / DeepSec News for 2017 and Call for Papers

Changing code, layout or designs have something in common – deadlines. But you cannot rush creativity, and so the new design of the DeepSec web site took some time. The old design has served us well. We basically did not change much and used it since 2007. The new design follows the stickers we use for decoration at our conferences, the book cover of the DeepSec chronicles, and many other details we publish via documents – all thanks to the creative mind of fx. So thanks a lot fx!

The content of our conference has also slightly changed. DeepSec 2017 will feature additional content, because we will introduce a third track filled with presentations from academic research. Given the fact-free discussions of information security and security in general, we would like to (re)introduce the scientific method into infosec. Finding flaws in software, hardware, protocols, devices, and many other parts of modern society requires solid lab work, repeatable experiments, and a sound documentation of the findings. This is why the motto of DeepSec 2017 is “Science First!”.

Many of you are unaware that we are running two Call for Papers in parallel. Both presentations for DeepSec and DeepINTEL can be submitted. The process is slightly different.

  • Please use the web form for all things DeepSec. Use it know, use it before 31 July 2017.
  • Everything suitable for the DeepINTEL conference should be submitted via email to deepsec (at) deepsec (dot) net. Please make use of encryption. We like to decrypt your messages. The Call for Papers for DeepINTEL is up and running. Again be quick, submit your work/thoughts on security intelligence, threat analysis, war stories forensics, or incident response by email.

Looking forward to meet you in person and listen to your presentations.

Submit your Talk – Call for Papers for BSidesLondon

The Call for Papers for BSidesLondon is still running! If you haven’t submitted your talk yet, please do! The deadline is 27 March 2017. Don’t miss it!

The Wonderful World of Cyber is full of stuff to talk about. There is broken software all over the Internet (of Things). 0days await. Infrastructure is ready to be defended or attacked. Let others know about your ideas. If you have never presented at a conference before, then you should consider a submission for the rookie track. You have to start somewhere or somewhen, so why not at BSidesLondon?

Looking forward to listen to your presentation at BSidesLondon!

DeepINTEL 2017 – Modern Strategies for Information Security

Seminar on Digital Defence with Experts.

The news is full of reports covering attacks against networked systems and digital components. Every day there is new media coverage about stolen data, compromised accounts, the impact of malicious software, digital second strikes, cyber attacks between countries and new vulnerabilities in computer systems. All that leads to the impression that in the modern digital world we are almost helplessly vulnerable to attacks. Clever entrepreneurs benefit from the general uncertainty and sell countermeasures in the form of security software or other components, which, according to their praise, once installed will kill off every threat automatically. But the media don’t show the whole picture – hardly any report on “hacker attacks” could be called a realistic depiction of real life events. The consequence? It is not possible to build an effective strategy for your own information security based only on media reports and promises of clever vendors. Digital defence is as individual as fire protection or physical measures against burglaries – there is no standard solutions, no one-size-fits-all. What about the security of your own data? Do you know about the risks that may affect you and about the vulnerabilities of your company?

At DeepINTEL you have the opportunity to strategically reflect upon your digital protection. The seminar provides a platform for security officers and experts from threat analysis to work together on strategies for digital defence. Strategies from which you directly benefit as participants.

Security Intelligence and Knowledge

The current practice of companies when it comes to information security consists of protection by the catalogue of measures and security components from the vendor’s tray of the IT security industry. The ones, who really want to be sure, may additionally take a look at the end-of-the-year review or the trends for the upcoming year. However, this approach is completely out of touch with reality – many companies simply do not know which risks affect their own business. A real threat analysis and a thorough judgement of your opponents is the most important component of a good defence! Yet, it is often sadly lacking. Instead, protective devices are used according to their advertised abilities, often without accurate background knowledge about how and from which attacks one should actually be protected by the acquired safety components. But the necessary information would be easy to access, if you know how to, usually it is already available. Your company’s own operating data and a structured analysis of previous safety-related events are the way to improve your security. The magic word? “Security Intelligence”. The structure of your security measures must be based on facts and built methodically correct. To establish a functioning security infrastructure documented threats, data of your own infrastructure, actual dangers and appropriate indicators for a security incident have to be taken into account.

The DeepINTEL conference provides a platform for security officers and experts from the threat analysis to work together on strategies for digital defence. Security Intelligence is interdisciplinary and requires experience in analysis beyond the pure application of statistics. The flow of data, communication, the right metric, sure indicators for a break-in, the appropriate evaluation, or the correct deconstruction of IT into its individual parts must be carried out by experts. You can find this expertise at DeepINTEL.

Big data without content is no solution

Machine learning or Big Data are often used as buzz words to conceal ones own deficits. But with big words alone you can’t score points when it comes to IT security. You have to examine your own infrastructure and look for meaningful metrics. It is not about plenty, it’s about the right data records. Anyone who blindly analyzes data, misses the relevant threats. Even the best algorithms have to be used correctly. A methodological approach is very important. Perceived threats can not be measured and inevitably lead to security nihilism,a sentiment also easily evoked by reading the latest articles of everyday IT news.

Of course one has to draw attention to existing threats. But never forget that the side of the defence knows best about its own infrastructure and digital treasures. If you don’t use this advantage, you do your opponents an invaluable service.

IT Security with Security Intelligence

What difference does Security Intelligence make for your IT? How do you incorporate its insights and knowledge into your own security system? The customary opinion among many service providers will lead you to coloured product palettes, supposed to do everything for you automatically. But in the real world, apart from the exhibitions and fairs where these solutions are presented, it’s not that easy. First of all, you need a clear picture of your infrastructure and reliable metrics, which provide information about the state of your own security. From this data, a picture emerges, on which the actual security strategy can be built upon. Digital defense is as individual as fire protection or physical measures against burglary. You won’t screw sensors on the walls at random and hope you cover the neuralgic points. You only get meaningful measurements when you focus on the critical points – and know how to find them.

The DeepINTEL conference would like to provide a platform for both experts and users to exchange ideas about methods of security intelligence. Modern information security is interdisciplinary because IT evolved into so much more since the days of mere electronic data processing of the 1960s. Delegation in the form of outsourcing only shifts your problems and makes you blind to threats. At the DeepINTEL, you have the opportunity to strategically reflect upon your digital protection.

The DeepINTEL conference will take place on the 21 & 22 September 2017 at the Imperial Riding School Renaissance Hotel in Vienna, Austria.

Putting the Science into Security – Infosec with Style

The world of information security is full of publications. It’s like being in a maze of twisted little documents, all of them alike. Sometimes these works of art lack structure, deep analysis, or simply reproducibility. Others are perfectly researched, contain (a defence of) arguments, proofs of concept, and solid code or documentation to make a point. Information security is a mixture of different disciplines such as mathematics, physics, computer science, psychology, sociology, linguistics, or history. It’s not about computers and networks alone. There is interaction between components. Protocols are involved. Even the simple act of logging in and staying in an active session requires in some parts to talk to each other. And then there are rituals. Scepticism is widespread in information security. Questioning your environment is the way to go, but you need to do it methodically and with evidence-based reasoning.

There is an emotional component to IT security too. „Everything is broken, everyone’s going to get hacked eventually.“ You hear this statement a lot, mostly from frustrated engineers. Well, we already know that stuff around us is badly designed or broken by design. Levels of brokenness vary depending on where the stuff (i.e. devices / technology) is being used. Important stuff gets more maintenance and security design than, let’s say, your toothbrush. At this point we can veer off and discuss the Internet of Things at length. Unless you methodically lead this discussion based on evidence, please, just don’t discuss it. The Internet of Things won’t go away just because it is broken (so far). We can handle substances too hot to touch or dangerous chemicals (again, no discussion, we can handle this stuff most of the time), so we can surely deal with dangerous bits. We just have to do it properly. This also means to realise that it is sometimes better to say „I don’t know what that means.“ until you have all the facts to decide what you see or hear.

To get the train of thought back on the infosec track, have a look at Hanno Böck‘s presentation titled „In Search of Evidence-Based IT-Security“. Origin of this talk was the work of Google’s Project Zero where the security of anti-virus engines, among other code, was discussed. Confronting the fancy advertising of security products with the fundamentals of theoretical computer science is a good test to see how evidence-based the approach is. Hanno suggests to take a look at the methods used in other fields where things and stuff are also complicated. Randomised controlled trials (RCTs) are an example. While RCTs are not without disadvantages, you don’t even find the most basic scientific methods in information security publications. White papers and documents titled “(field) study” are even worse. The lack of gathering facts and to process them scientifically makes information security research vulnerable to manipulation. Infosec people smile when cyber attacks are in the news or politicians talk about cyber war. That’s great, but the shoddy work found in some/many published „results“ leave too much room for ambiguous discussions. We agree with Hanno: „Applying rigorous science to IT security could provide a way out of the security nihilism that dominates the debate so often these days…And by learning from other fields Evidence-Based IT Security could skip the flaws that rife other fields of science.“

DeepSec 2017 will have a stronger focus on academic research in the field of information security. In case you need help improving the scientific approach in your project, please let us know. We might be able to help, and we know a lot of researchers who can also help. Plus there are already results of fine research online and published. Take a look at them. It is much easier to defend claims against the legal department of a vendor. Facts are your friend. Dealing with them correctly will save your day.

The Sound of „Cyber“ of Zero Days in the Wild – don’t forget the Facts

The information security world is full of buzzwords. This fact is partly due to the relationship with information technology. No trend goes without the right amount of acronyms and leetspeaktechnobabble. For many decades this was not a problem. A while ago the Internet entered mainstream. Everyone is online. The digital world is highly connected. Terms such as cyber, exploit, (D)DoS, or encryption are used freely in news items. Unfortunately they get mixed up with words from earlier decades leading to cyber war(fare), crypto ransom(ware), dual use, or digital assets. Some phrases are here to stay. So let’s talk about the infamous cyber again.

In case you have not seen Zero Days by Alex Gibney, then go and watch it. It is a comprehensive documentary about the Stuxnet malware and elements of modern warfare (i.e. remote sabotage of infrastructure). Given the secrecy of the incident / operation it is the best compilation of facts and their non-existence up to date. No matter what you think of people using the word cyber for a variety of meanings digital warfare is here to stay. In essence it is an attack on communication and control infrastructure. Manipulating systems connected to physical devices has always been used for disrupting the Things without Internet. Cut a pipe(line), block a spinning wheel, loosen some screws, and there you go. Instant analogue sabotage. Using the benefits of modern connected industrial controllers turns this into digital sabotage – cyberwar. Like it or not, talking about semantics won’t help. The fact is that modern communication networks and the networked infrastructure is now being used for political, military, academic, entertainment, education, (organised) crime, business, cultural and multimedia purposes. This list isn’t even complete (and don’t worry, terrorism is already included in the list).

Reality has shifted the border between now and (science) fiction. If you want to deal with modern threats to your data and flow of information, then you need to catch up. Urgently, that is. To set the tone for 2017, here is a quote by Richard A. Clarke from the interview he gave for Zero Days.

„I’m old enough to have worked on nuclear arms control and biological weapons arms control and chemical weapons arms control. And I was told in each of those types of arms control, when we were beginning, “it’s too hard. There are all these problems. It’s technical. There’s engineering. There’s science involved. There are real verification difficulties. You’ll never get there.” Well, it took 20, 30 years in some cases, but we have a biological weapons treaty that’s pretty damn good. We have a chemical weapons treaty that’s pretty damn good. We’ve got three or four nuclear weapons treaties. Yes, it may be hard, and it may take 20 or 30 years, but it’ll never happen unless you get serious about it, and it’ll never happen unless you start it.…“

That’s one way of putting it. There are different perspectives. However no matter how you look at it, systems get attacked and compromised. That’s what you can see when you work with and in IT departments. Once you use networks, the threats will become part of your job description. Call it cyber if you like, but always include context and additional information. We need the facts. For 2017 we like to revisit the threat landscape and address the security implications with scientific accuracy. DeepINTEL will be the first event, DeepSec will follow. And we would like you to join us.

Putting the Context into the Crypto of Secure Messengers

Every once in a while the world of encrypted/secure/authenticated messaging hits the wall of usability. In the case for email Pretty Good Privacy (PGP) is an ancient piece of software. These days we have modern tools such as GnuPG, but the concept of creating keys, verifying identities (i.e. determining who is to trust), synchronising trust/keys with communication partners, and handling the software in case something goes wrong is quite a challenge. Plus things might change. People revoke their keys, devices get lost, data gets deleted, people create new keys or even (digital) identities, or do lots of things that is either anticipated by the software developers or not. Communication is not static. There are moving parts involved, especially the communication partners might move a lot.

So crypto is hard, we know this. Discussing secure messengers is also hard as The Guardian found out a couple of days ago. The author claimed that WhatsApp contains a „backdoor“ and that the messages can be re-encrypted and sent again. The whole story revolves around the generation of unique secrets keys and doing stuff with messages already being transported. Open Whisper Systems has commented on this article by providing the technical background, criticising the falsely used term „backdoor“, and explaining what is going on behind the scenes for WhatsApp and Signal. The reactions to the Guardian Article range from technically incorrect to outrageously dangerous for WhatsApp users relying on the protection of their messages.

The question remains: What should a secure messenger do, when it detects that a communication partner has changed security parameters? The answer is different for WhatsApp and Signal. As you know from network security you can default to accept or deny/drop. With messages you can either drop the message until the communication partner has confirmed the change and possibly re-verified the identity of the communication partner; or you can route the message. Regardless what you do, it is a valid choice provided the encryption is sound and you tell the user(s) about it. The preferred choice depends on the context. If you have very disciplined communication partners, then this event is an indication that something is wrong. If you communication partners periodically change devices, don’t do any backups, eat SIM cards for breakfast, and play around with installed apps, then this might be nothing to worry about.

Examining the context is often all you can do. The tools are there to help you. Even PGP with the dreaded Web of Trust and its 1990s usability offers you some information to make a decision. The crucial point of secure communication is to keep track of identities and do the verification of contacts right. Given your threat model you can do this by a phone call or a personal meeting. It’s your decision.

DeepSec Administrivia for 2017, the Year of the Cyber

2017 is in full swing, and it didn’t wait long. December was full of „hacking“ news. It seems digital war(e)fare knows no break. We will address some of the issues in a series of blog articles. Also we have uploaded the DeepSec 2016 videos to Vimeo. Attendees and speaker will get access before we publish the videos for everyone. This is our review in case someone doesn’t like a video or needs to adapt the description.

The date for DeepSec will be published soon, along with the date. We look to the fourth quarter of the year, as usual. The Call for Papers will be online in February. If you got some ideas, write them to us. We have plenty of topics to address. The most pressing problem was raised at the 33C3. Go and watch the presentation titled In Search of Evidence-Based IT-Security. A lot of people cry wolf and have no facts to back up their claims. The scientific method is not just a fashion choice. Facts govern our lives. Why should this be any different in information security?

Speaking of facts, we will host a DeepINTEL event in May 2017. The past year(s) have shown that any discussion about threats and adversary capabilities inevitably combine the words agenda, fake, news, and cyber in arbitrary order. While disinformation is a key ingredient of (military) warfare, it doesn’t really help your defence. Defending against attacks and determining what intruders will do or have been doing requires hard facts and a rational analysis. You will not find this in media channels, press conferences, politics, or social media. You will probably have to attend DeepINTEL. Looking forward to meet you there.

As for the other topics we thought about during cold Winter nights, you will read about them in the upcoming blog articles.