Whitepapers and Videos

  • 0

BlindBox: Deep Packet Inspection over Encrypted Traffic  iot.stanford.edu

"Many network middleboxes perform deep packet inspection (DPI), a set of useful tasks which examine packet payloads. These tasks include intrusion detection (IDS), exfiltration detection, and parental filtering. However, a long-standing issue is that once packets are sent over HTTPS, middleboxes can no longer accomplish their tasks because the payloads are encrypted. Hence, one is faced with the choice of only one of two desirable properties: the functionality of middleboxes and the privacy of encryption."

  • 0

A Systematic Analysis of the Juniper Dual EC Incident  eprint.iacr.org

"In December 2015, Juniper Networks announced that unknown attackers had added unauthorized code to ScreenOS, the operating system for their NetScreen VPN routers. This code created two vulnerabilities: an authentication bypass that enabled remote administrative access, and a second vulnerability that allowed passive decryption of VPN traffic"

  • 0

Blind Return Oriented Programming (BROP)  scs.stanford.edu

"The BROP attack makes it possible to write exploits without possessing the target's binary. It requires a stack overflow and a service that restarts after a crash. Based on whether a service crashes or not (i.e., connection closes or stays open), the BROP attack is able to construct a full remote exploit that leads to a shell. The BROP attack remotely leaks enough gadgets to perform the write system call, after which the binary is transferred from memory to the attacker's socket."

  • 0

USENIX Enigma 2016 Conference videos  youtube.com

USENIX Association is excited to announce the launch of Enigma, a new security conference geared towards those working in both industry and research. https://www.usenix.org/conference/enigma2016

 

  • 0
  • 0

Whitepaper: @rootkovska - State considered harmful - A proposal for a stateless laptop  blog.invisiblethings.org

"The main principle introduced below is the requirement for the laptop hardware to be stateless, i.e. lacking any persistent storage. This includes it having no firmware-carrying flash memory chips. All the state is to be kept on an external, trusted device. This trusted device is envisioned to be of a small USB stick or SD card form factor."

  • 0

Whitepaper: The Moral Character of Cryptographic Work  web.cs.ucdavis.edu

"Abstract: Cryptography rearranges power: it configures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension. The Snowden revelations motivate a reassessment of the political and moral positioning of cryptography. They lead one to ask if our inability to effectively address mass surveillance constitutes a failure of our field. I believe that it does. I call for a community-wide effort to develop more effective means to resist mass surveillance. I plead for a reinvention of our disciplinary culture to attend not only to puzzles and math, but, also, to the societal implications of our work."

  • 0

GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies  usenix.org

GSMem, a malware that can exfiltrate data through an air-gap over cellular frequencies. Rogue software on an infected target computer modulates and transmits electromagnetic signals at cellular frequencies by invoking specific memory-related instructions and utilizing the multichannel memory architecture to amplify the transmission. Furthermore, we show that the transmitted signals can be received and demodulated by a rootkit placed in the baseband firmware of a nearby cellular phone. We present crucial design issues such as signal generation and reception, data modulation, and transmission detection

  • 0

Whitepaper: Improving SSL Warnings: Comprehension and Adherence  adrifelt.github.io

"We ultimately failed at our goal of a well-understood warning."

  • 0

PASSWORDS 2014 videos  video.adm.ntnu.no

Passwords is the singular conference gathering researchers, password crackers, and enthusiastic experts from around the globe, aiming to better understand the challenges surrounding the methods personal authentication and passwords, and how to adequately solve these problems.

  • 0
  • 0

Video: Cory Doctorow - Redesiging a Broken Internet  youtube.com

The Internet we know today is only one possible interpretation of the original vision of an open, peer-to-peer network. Think of it as a first-generation Internet, built on a fragile global network of vulnerable codes subject to abuse and even collapse.

  • 0
  • 0

Defcon 22 videos and slides  media.defcon.org

  • 0
  • 0

Keynote by John Carmack at Oculus Connect 2014  youtube.com

John Carmack's annual keynote was sadly missing from last Quakecon and I'm almost beaming to know he'll continue the tradition with the Oculus team. Carmack doesn't dumb down any content or read any of the PR marketing speels, simply offering his audience a brain dump on whatever he's currently working on with a level of enthusiasm and passion that is missing from most note technical talks. Every time you listen to him, you'll find you cannot help to feel motivated to go and write a bunch of code.

See: Oculus Connect 2014 Keynotes