About Me
- alapan
- I ramble about a number of things - but travel experiences, movies and music feature prominently. See my label cloud for a better idea. All comnments and opinions on this blog are my own, and do not in any way reflect the opinions/position of my employer (past/current/future).
27 May 2014
ITWeb Security Summit 2014
17 November 2013
ZaCon 5
27 October 2012
ZACON IV
As per previous conferences, ZACON was held once again at UJ's monstrous concrete jungle in Auckland Park. The lecture theatre was quite nice though, with impressive AV facilities. The demographic spread of ZACON is interesting; in terms of gender (the number of ladies in the room could be counted on one hand), age, race etc. There was a distinct lack of corporate guys; a pity in that the forum is great for knowledge sharing. I do know that there were students from UJ and UP, which does skew the demographics a bit.
I have only captured the talks I found interesting.
Glenn Wilkinson's talk mirrored a similar talk at RSA Europe, on exploiting WiFi AP search requests. The differentiator however, was the ability to chain the systems together (instead of offline systems like the Pineapple). There are some interesting applications of the approach - both good and bad; an it was certainly an interesting discussion.
Simeon Miteff's talk on the security challenges on very high speed networks was quite interesting, especially as it has applicability beyond the research network into modern datacentres. I think the solution is really in segregation - not all connectivity is high speed, and it may be better to focus on the interconnects to slower networks and not focus on securing the high speed networks.
Ross Simpson's talk on hacking games focused a lot on memory hacks; but the discussion point was really in client side validation. Whenever the system does client side validation, these values are stored in memory, and thus potentially can be bypassed. What was particular interesting, is that some very popular modern games (examples were shown on iOS) that use a client-server model can be exploited because they use client side validation. It is true that ioS memory hacks for client-server applications would need jail breaking, but there are some interesting attacks exploiting save files on the device that can work on non jailbroken devices.
Andrew MacPherson's talk on physical access control vulnerabilities was amazing. Starting with the traditional locks and lockpicking, the really cools stuff were the demos on magstripes (with a good background on magstripes) and RFID tags. One of the most impressive talks, especially given the widespread use of magstripes as RFID tags - not only for access control but for all sorts of other uses.
Jacques Louw's talk on using software defined radios for attacks was a continuation of the radio theme. The bulk of the talk was rehashing theory from a long time ago, but the application to utility meters and GSM was very cool (and frightening, when considering the social impact for smart metering).
Schalk Heunis' talk was different, focusing on home alarm systems; and reverse engineering the system using Audrino. While there are attack perspective; there are very cool implications for home automation. The House4Hack team have some interesting work in this regard.
11 October 2012
Hacking Virtual Worlds
Not all of the talk was specifically focused on cloud. Using a Pineapple he showed how easy it is to intercept and decode passwords (even when they are encrypted). After that, accessing systems, virtual or not, is not a big issue.
But his attack techniques on virtualization platforms were the most illuminating - from accessing VMWare's vCenter via cracking the MD5 password; to exploiting the fact that robot.txt files aren't respected in public cloud services (and thus susceptible to google hacking).
It was not a failure of technology (although the Pineapple did exploit protocol weaknesses), but failure to follow basic principles.
Active Defense
This morning, Josh Corman raised the idea of resurrecting Letters of Marque as a means of regulating active defense. I am not convinced that this approach will solve the legal and ethical challenges.
Letters of Marque, were granted by European monarchs to sanction specific pirates and allow them to carry out their piracy (usually as long as it was not in their backyard). Effectively, it was state sanctioned criminals; and the idea to enable Letters of Marque for cyber attacks will open a Pandora's box.
Josh Corman's HD Moore's Law
It's a brilliant argument; instead of focusing on compliance as a minimum baseline, the minimum baseline should be, can you get compromised by default/basic settings of Metasploit? The ease of use of Metasploit and since its widely available, it makes it an easily exploited attack vector. It also aligns to the US RSA Conference talk on metrics that commented that the basic metric of security is "hackability", or how easy is it to hack you.
10 October 2012
Live RAT Dissection
09 October 2012
RSA Conference Europe: Day 1 Keynotes
Tom Heisner (President, RSA) followed expanding the themes, with an insightful comment on the Moore's law equivalence in security; the cost of attacks have reduced while the complexity of attacks have increased. Both speakers were hugely critical of compliance based regulatory regimes which are sometimes contradictory, and often provide a false sense of security.
Francis deSouza (Symantec) followed the theme with a focus on the need to be more "militaristic" in IT security. His argument was that you can't win a battle on purely defense, and security strategies and solutions need to consider the whole campaign and not just point vectors. In this regard, defense mechanisms also need to be "great" and not just good to be effective.
Adrienne Hall (Microsoft GM for trustworthy computing) focused mainly on cloud adoption, though was a bit out of sync on the earlier theme. Hugh Thompson, was also out of sync, but did raise a different perspective - security solutions currently are a "one size fits all" solution, and are not catered for individuals, so are either too complex or too simple; and are basically both ineffective. To create a security profile that is really personalized will be difficult, but would be a very interesting approach in becoming more secure.
03 March 2012
RSA Conference Day 4
The first two talks I attended revolved around hacking and application vulnerabilities. While I do not work much in the application space, most security attacks are based on application vulnerabilities, and thus highly relevant.
The first speaker, Jeremiah Grossman highlighted a particular issue with security spending in enterprises - the spending does not match the established estates or problem areas. I agree with his assessment and arguments, that it does not make sense to spend on firewalls or anti-virus when most attacks are due to bad coding practices.
The second talk, by Dave Aitel, argued that current arguments (both for and against) on cyberwarfare are misplaced, that it is not only about technology and tools, but about movements like Wikileaks and Anonymous, that the danger of cyberwarfare from non nation states are driven by profit and that the danger of cyberwarfare is not that Internet or power will be shutdown (since that would then stop the war also) but rather impact the logistical and economic infrastructure. And most importantly, Stuxnet was more than just a worm against nuclear infrastructure, it was proof that any industrial infrastructure could be targeted and shut down. It was the most rational discussion on cyberwarfare I have attended in the conference.
The last "talk" was more managerial in nature, looking at priorities of CISO's; I liked the practical nature of the discussion and the acknowledgement, that despite all the issues, only a few can be really addressed at a time due to resource limitations.
Hugh Thompson, hosted a more informal discussion on the psychology of decision making; it was entertaining, it was interesting but not very practical I suppose. Tony Blair gave the final keynote to close the conference; I thought it was too much of a political speech and not really relevant. It was very entertaining though.
The RSA Conference is the biggest information security conference in the world; and was definitely a great learning experience and I would be keen to come back next year.
02 March 2012
RSA Conference Day 3
One of the "gurus" of security, Mikko Hypponen (chief researcher at F-Secure) presented a brilliant presentation on terrorism and IT - on the technology platforms used by terror groups to communicate and spread propaganda; on their encryption and steganography techniques and also where their IT system are concentrated. Although he focused on Al Qaeda, this was a sample of what is available and used by other groups including white supremacist etc. While there has been no "real" cyberterrorist activity (e.g. attacks on mass infrastructure, instead of defacement) there is proof that there are people who actually have the technical means.
That said, I think the hype on cyberterrorism is overblown. As is the case for cyberwarfare, although there are certainly nations that have already built up capabilities in this regard. But some of the proposed remediations are not only technically difficult (if not impossible) but have far more reach than is necessary.
Salman Khan, the founder of the Khan Academy gave an inspirational talk on possibly the future of education. It is the only talk I have attended at the conference to have received a standing ovation, and deservedly so - it was inspirational, it was funny and it was technical. The intention is that it is eventually available in multiple languages and I think it could really revolutionize education everywhere. Yes, bandwidth and infrastructure are issues, especially with video but this is not insurmountable.
01 March 2012
RSA Conference Day 2
Of the keynotes, David Brooks' talk on how social development affects decision making was informative, funny and interesting. He made some comments on trust that I want to blog about later, once I get my thoughts in order, and perhaps read a bit more of Bruce Schneir's new book.
The conference has an interesting concept of "Dinner for 6", where strangers can get together for conversation and a meal. We became a party of 8 (I think we were tables of 4&4), and the table consisted of a wide variety of people - a startup CEO with a background of starting and advising numerous (successful) startups, a reformed black hat hacker, a manager of dev team from a leading security company, an analyst from the DoD, two IT directors from separate non profit organizations and a manager from a state based angel funder. It was a great mix of people, and some engaging conversation.
29 February 2012
RSA Conference 2012 - Day 1
As is the case with first days, the majority of the day was keynotes from notable luminaries, of which I enjoyed the Cryptographers Panel (comprising of Diffie, Rivest, Shamir amongst others) the most.
In the evening, I attended Symantec's "small and exclusive" party, which was neither small not exclusive, with a line that stretched a block. Nothing special to be honest ...
11 October 2010
ZaCon 2
As with all conferences; there was the mixture of the superbly interesting to be boring - but that is to be expected. With a strong technical focus; many of the talks focused on IT vulnerabilities - how they can be exploited and/or mitigated - from Google Apps to Java JAR files.
There were a number of highlights. On the attack front, Ivan Burke's talk on the usage of Google Apps to create features similar to botnets (though, as he willing admitted, he was not a good speaker) was a great example of how cloud computing facilities not only create security challenges with regards to confidentiality of data (stored in the cloud) but also create a platform for future security exploits. Jurgens van der Merwe's talk later about the use of Selenium expanded further the potential of attacking web based systems. In fact, a potential that wasn't explored in great detail - the combination of Selenium and cloud based services such as Amazon EC2 and Google Apps could create a significant assault on data confidentiality - through exploiting gaps in web based services. Also on the attack front; Daniel Cuthbert's talk on banking website security was a sobering reminder on vulnerabilities that are created by sheer incompetence as opposed to oversight.
Ross Simpson's talk on the use of jailbroken iPhones as a means to infiltrate wireless networks did not really explore major new ground - but was a very practical walk through on the power of smartphones and a new attack vector. Like the attack vector of cell phone cameras where normal cameras are not allowed; this is yet another attack vector that is easy to deploy and hard to mitigate against.
Ollie Whitehouse discussed the forming of UnCon 10 years ago (security community in the UK, and seemingly the idea that gave rise to ZaCon) via Skype - and was impressive not only in the content of the talk (I think there is a lot of things that ZaCon can "copy") but also the fact that the technology worked. Using two different computers (one to control the screen and the other to conduct the Skype call), each with its own 3G connectivity definitely helped in this regard.
The last talk, Barry Irwin's analysis on the propagation of Conficker was quite interesting - especially the patterns on the network traffic correlated to the spread of the virus. The fact that Conficker has gone quiet is itself a worry - and the correlation of Conficker to other viruses; including Stuxnet, could be interesting research.
Overall, it was a great event - and a great learning environment. I do think, however, that there is a need to shorten the number of speakers and instead open up the floor for a lot more debate and discussion. Congratulations to the organisers for a great event!
29 July 2010
Conundrums caused by etiquette
13 May 2010
Counting Crows, Police Escorts and a lot of expensive storage
It is quite interesting to attend an event of this size. The Counting Crows, were the entertainment for the first night,but they were really disappointing. They had no interest and their engagement with the crowd, understandable given that they have already been paid, and thus have no real stake in the performance. Another day, the shuttle bus from the hotel was given a police escort, easing the way through traffic. Being a Boston based company, EMC obviously has some clout in the city.
It was certainly a good experience, and the side discussions and networking certainly helps!
28 September 2009
Virtual Goods 2009
The highlight for me was the keynote talk by Bill Rosenblatt, on the past, current and future of DRM. Like many in the DRM research community, it is well accepted that the biggest fundamental problem with DRM was not necessarily the technology, but the economics and the marketing that went in. More and more, DRM is being proposed as a means to enforce privacy legislation, one of the original use cases of DRM, that was overlooked in favour of pushing for a very small control set of copyright regulation enforcement. Bill Rosenblatt has been in the field of DRM for a long time, and the presentation was insightful on the many aspects that led to the current outlook on DRM.
Another interesting talk was Mario Kubek and Jürgen Nützel's paper on "Novel Interactive Music Search Techniques", which takes a number of different search techniques including text analysis, melody analysis, frequency analaysis and much more to derive the various genres that correspond to a musical item; and also look for similarities between musical pieces using sources such as Google and Wikipedia. It is certainly an interesting way for powering future media exploration.
Next year's Virtual Goods Workshop will take place in Namur, Belgium.
28 May 2009
ITWeb Security Summit
There were some great talks in the past three days - Phil Zimmerman's keynote on VoIP security, Tyler Moore's talk on economics of security, Fransisco Artes' talk on security of MMO games and really interesting talk by "The Grugq" on why there are criminal hackers.
What was ultimately annoying, was the short time spans of some of the really interesting technical talks (20 minutes) - hardly much time to discuss complex topics such as internet telescopes, privacy from data correlation across multiple online sources or even seemingly simpler topics such as security of IPv6.
I was also involved in a "pubcast" (which has yet to be released) - seemingly out of the blue. And I won a bottle of French Champagne at a product launch - although lost out on the Russian vodka, personalised golf clubs, the portable hard-drives, blackberries and numerous other lucky draws from vendors.
18 October 2008
Virtual Goods 2008
There were a few really interesting talks and presentations. The host university, demonstrated a virtual museum system, which had a wonderful way to interact with 3D virtual objects; in a very low tech solution; and a presentation by the general chair on why the "free" economic theory ultimately will not work was very interesting.
With authors from 6 continents (no one from South America, but a presenter from Tahiti!), there was a small, but very diverse group of papers and people. This was a very good workshop, and I hope I can contiue to be involved.
25 July 2008
One more paper
Very impressed with myself :)
02 December 2007
Reflections on AXMEDIS 2007
AXMEDIS; is a huge EU funded project, officially called Automated Production of Cross Media Content for Multi-Channel Distribution. This is the third conference ; hosted by the project, which brings together various efforts from the project itself and papers in the related fields.
To be honest, the conference was not very exciting ... many of the papers that I attended did not really promote anything new, and some were hashes of existing work. That said, I must admit that I did learn a lot about the MPEG-21 standard, and I am even more convinced that it is an almost useless piece of standardisation.
That said, there was one very interesting presentation, which made it all worthwhile. Richard Owens, a director from WIPO gave a long presentation on copyright and challenges on the enfocement of copyright. It was one of the most comprehensive talks I have ever been to, and he highlighted a number of interesting points; including:
- Technology should be taken as given. Copyright law needs to be applied to technology and not the other way round.
- Automatic filtering technology (based on watermarking and fingerprinting) has to be accepted as part of the deal, and groups like the EFF are coming round to accepting this position.
- Standards could have too much patents and themselves become technological barriers
- Access to education material in development countries could become a copyright exception
He also participated in a panel on rights expression languages (where I was also a panelist). The panel however was not that exciting to be honest, although my view that there is a strong need for core formal models for REL was accepted :)