SlideShare a Scribd company logo
1 of 105
10 Years Later:
Are We There Yet?
Carsten Eiram
Risk Based Security
@CarstenEiram
Quick Bio – VDB Work Experience

Involved with VDBs for 10+ years
• Currently, CRO at Risk Based Security – commercial arm of
Open Security Foundation (runs OSVDB and DatalossDB) – and
responsible for the VulnDB service.
• Chief Security Specialist at Secunia, running the Research team.

• Security Team Lead at Danish Verisign affiliate, running a
customer-only accessible vulnerability database.

NOT JUST SECURITY , THE RIGHT SECURITY
Quick Bio – Vulnerability Research

Officially been doing vulnerability research since 2003
• Focused on a static analysis / reverse engineering approach

• Jokingly refer to myself as a "vulnerability connoisseur"
- I enjoy analyzing vulnerabilities and their root causes.
• Critical vulnerabilities discovered in products from many major
software vendors.

NOT JUST SECURITY , THE RIGHT SECURITY
INTRODUCTION
What will be discussed?
Reason for Talk

After 10+ years of VDB work,
I felt it was time to reflect
on certain areas related to
vulnerabilities

NOT JUST SECURITY , THE RIGHT SECURITY
Considerations

NOT JUST SECURITY , THE RIGHT SECURITY
Metrics and their Usage

NOT JUST SECURITY , THE RIGHT SECURITY
Code Quality

NOT JUST SECURITY , THE RIGHT SECURITY
Advisory Quality

VENDORS MAKE BAD DECISIONS

NOT JUST SECURITY , THE RIGHT SECURITY
Vulnerability Handling / Bug Bounties

NOT JUST SECURITY , THE RIGHT SECURITY
Million Dollar (or Leu) Question

NOT JUST SECURITY , THE RIGHT SECURITY
Quick Show of Hands

NOT JUST SECURITY , THE RIGHT SECURITY
Vulnerability
A Quick Overview To Set The Stage
Statistics
Currently Oldest Recorded Vulnerabilities

Vulnerabilities have been around for a very long time
- And will continue to be...
• Oldest entries in OSVDB are 79399 and 79400
• Marconi wireless telegraph
• Dated November 1902
• Message spoofing and message disclosure

NOT JUST SECURITY , THE RIGHT SECURITY
Guglielmo Marconi

http://www.newscientist.com/article/mg21228440.700-dotdashdiss-the-gentleman-hackers-1903-lulz.html

NOT JUST SECURITY , THE RIGHT SECURITY
First Ever Unbreakable Claim!

http://www.newscientist.com/article/mg21228440.700-dotdashdiss-the-gentleman-hackers-1903-lulz.html

NOT JUST SECURITY , THE RIGHT SECURITY
Nevil Maskelyne Ruins Demo

http://www.newscientist.com/article/mg21228440.700-dotdashdiss-the-gentleman-hackers-1903-lulz.html

NOT JUST SECURITY , THE RIGHT SECURITY
No Wire-Cutting Please

While not providing
the privacy and
security as promised,
the wireless telegraph
still had one significant
advantage over the
wired telegraph:

Not possible to cut the
wires!
NOT JUST SECURITY , THE RIGHT SECURITY
Have We Improved?

Obviously, we have progressed a fair bit
technically since then, but have we gotten
significantly better?

NOT JUST SECURITY , THE RIGHT SECURITY
Bringing The Internet Down – Old Lady Style

Article: http://news.softpedia.com/news/Old-Lady-Cuts-Off-Internet-in-Armenia-193640.shtml
NOT JUST SECURITY , THE RIGHT SECURITY
10 Year Vulnerability Trend
12000

10000

8000

6000

# Vulns

4000

2000

0
2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
NOT JUST SECURITY , THE RIGHT SECURITY
All Datasets Are Incomplete!

All datasets are incomplete - some just more than others
Many love taking CVE content that’s free and do random
conclusions based on it, but since the dataset is severely
lacking, the conclusions are as well

NOT JUST SECURITY , THE RIGHT SECURITY
2006 – 2013 Vulnerability Type Trend

NOT JUST SECURITY , THE RIGHT SECURITY
2012 Data Breaches due to SQL Injection

NOT JUST SECURITY , THE RIGHT SECURITY
Companies affected by XSS in 2012

Source: CWN - http://www.cyberwarnews.info/2012/07/04/300000-personal-details-leaked-38-sites-hacked-for-projectdragonfly/

NOT JUST SECURITY , THE RIGHT SECURITY
Companies Impacted By Hacking In 2012

NOT JUST SECURITY , THE RIGHT SECURITY
Vulnerability Metrics
Usage
Which is more secure?

Product A
10 Vulnerabilities

Product B
20 Vulnerabilities

NOT JUST SECURITY , THE RIGHT SECURITY
Security State != Number of Vulnerabilities

Previously, the security state of a product was considered
to be equal to the number of vulnerabilities.
Flawed conclusion!
Today, people understand that the number of vulnerabilities
!=
security state

NOT JUST SECURITY , THE RIGHT SECURITY
Some Apparently Still Don’t Know...

“The problem with Java is that a lot of vulnerabilities are
constantly being reported in it, and when a lot of
vulnerabilities are reported, then there are a lot of hackers
using these to access programs built on Java“
- Morten Stengaard, CTO, Secunia

http://www.dr.dk/tv/se/tv-avisen/tv-avisen-827#!/
NOT JUST SECURITY , THE RIGHT SECURITY
Dissecting the Statement – Part 1

”... then there are a lot of hackers
using these to access programs built on Java”
Most vulnerabilities in Java are not used to target Java
applications, but the Java Runtime Environment to
compromise the system.

http://www.dr.dk/tv/se/tv-avisen/tv-avisen-827#!/
NOT JUST SECURITY , THE RIGHT SECURITY
Dissecting the Statement – Part 2

”... when a lot of vulnerabilities are reported,
then there are a lot of hackers using these…”
Just because a lot of vulnerabilities are reported in a
product, a lot of hackers may not be exploiting them.

http://www.dr.dk/tv/se/tv-avisen/tv-avisen-827#!/
NOT JUST SECURITY , THE RIGHT SECURITY
Dissecting the Statement – Part 3

”The problem with Java is that a lot of vulnerabilities are
constantly being reported in it…”

The security state of a product is not defined by the number
of vulnerabilities reported in it.

http://www.dr.dk/tv/se/tv-avisen/tv-avisen-827#!/
NOT JUST SECURITY , THE RIGHT SECURITY
We Should All Stop Using Popular Software Then
400
350
300

250
Java
200

Chrome
Firefox

150

Internet Explorer

100
50
0

Vulnerabilities (2013 - Nov 10th)
NOT JUST SECURITY , THE RIGHT SECURITY
Facewall!

NOT JUST SECURITY , THE RIGHT SECURITY
Microsoft Argument For SDL (Windows)

NOT JUST SECURITY , THE RIGHT SECURITY
Microsoft Argument For SDL (SQL Server)

NOT JUST SECURITY , THE RIGHT SECURITY
Microsoft Office Vulnerability Trend
Vulnerabilities in Office versions one year after product release
(based on Microsoft security bulletins)
14
12
10
8
6
4
2
0
Office 2000

Office 2007

NOT JUST SECURITY , THE RIGHT SECURITY

Office 2010
Microsoft Security Bulletin Trend
350
300
250
200
Bulletins
150

CVEs

100

50
0
2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
NOT JUST SECURITY , THE RIGHT SECURITY
Researcher Focus and SCADA

NOT JUST SECURITY , THE RIGHT SECURITY
Stop Drawing Conclusions on Vulnerability Counts...

NOT JUST SECURITY , THE RIGHT SECURITY
There are so many other aspects to consider!

More things to consider incl.

Patched vs. Unpatched
Vulnerability Type
Impact
Time-To-Patch
Time-To-Vendor-Response
Security Mechanisms
...

NOT JUST SECURITY , THE RIGHT SECURITY
Vulnerability Metrics
Severity
Severity Metrics

Many different severity metrics – both public and internal

Most popular and hated is CVSS,
which currently has problems reflecting real risk
Many concerns raised about CVSSv2 by many people
e.g. myself and Brian Martin of OSVDB in our open letter:
"The CVSSv2 Shortcomings, Faults, and Failures Formulation"

http://www.riskbasedsecurity.com/reports/CVSS-ShortcomingsFaultsandFailures.pdf
NOT JUST SECURITY , THE RIGHT SECURITY
Limitations of Severity Metrics

Reflecting the threat of vulnerability-dependent issues
(e.g. sandbox bypass, ASLR bypass related to memory
disclosure etc.)

By themselves and from a scoring point-of-view, these issues
are pretty minor, but when combined with code execution...
Jackpot!
Ability to disclose a few memory addresses was in the past
pretty much a non-issue – today it’s very useful.

NOT JUST SECURITY , THE RIGHT SECURITY
Pick A Vuln... Any Vuln...

If I’d offer you one vulnerability
in e.g. Google Chrome, which
would you pick?
1) Code execution within
sandbox

CVSSv2:
6.8

2) Sandbox bypass

CVSSv2:
2.6

NOT JUST SECURITY , THE RIGHT SECURITY
Severity Metrics and Sandbox Bypasses

If we conclude that exploiters are more interested in the
sandbox bypass and system administrators should focus on
fixing such a vulnerability over a code execution
vulnerability within the sandbox, why are we not rating
them higher?
Case of reality not being reflected well by severity metrics

NOT JUST SECURITY , THE RIGHT SECURITY
Severity Metrics and Vulnerability Chains

And once these issues start occuring in chains, which is
becoming more and more common, then it really gets
complex...
You can have a lot of independent minor issues that when
combined suddenly are very serious

NOT JUST SECURITY , THE RIGHT SECURITY
Google Chrome Pwn2Own Example
CVSSv2:
6.8

CVSSv2:
5.1

OSVDB 89734

IPC channel missing
listener process validation

OSVDB 80007

Plugin blocking logic not run
for NaCl in pre-rendering

CVSSv2:
7.6

OSVDB 80293

Unpacked NPAPI extension
installation without
confirmation

CVSSv2:
OSVDB 81645
5.1

GPU command decoding
integer underflow

CVSSv2:
2.6

OSVDB 80741

CVSSv2:
2.6

OSVDB 89736

Too permissive
LoadExtension
bindings for
extension manager

Unprivileged renderer
can navigate to
privileged URLs

http://blog.chromium.org/2012/05/tale-of-two-pwnies-part-1.html
NOT JUST SECURITY , THE RIGHT SECURITY
When Severity Metrics Met Reality

NOT JUST SECURITY , THE RIGHT SECURITY
Vulnerability Metrics
Exploitability
Microsoft Severity Ratings

Source: http://technet.microsoft.com/en-us/security/gg309177.aspx
NOT JUST SECURITY , THE RIGHT SECURITY
Exploitability Index Ratings

NOT JUST SECURITY , THE RIGHT SECURITY
Microsoft Approach: Pros and Cons

Pros

Cons

Gives an realistic evaluation of
the technical requirements to
exploit a given vulnerability and
how feasible it is

Requires significant technical
skills and resources to get right

Makes it clear which are
theoretical and which are
plausible

Still requires a bit of
guesstimation

NOT JUST SECURITY , THE RIGHT SECURITY
No Granularity Really Added...

NOT JUST SECURITY , THE RIGHT SECURITY
How Does Adobe Do It?

NOT JUST SECURITY , THE RIGHT SECURITY
How Does Adobe Do It?

NOT JUST SECURITY , THE RIGHT SECURITY
Adobe Approach: Pros and Cons
Pros
...Cons
Allows understanding which
Does not factor in technical
products, versions, and
requirements and the nature of
architectures are most critical to the vulnerability i.e. does not
prioritize
differentiate between theoretical
issues and straight-forward issues
to exploit
Dynamic approach that can be
easily tweaked
Requires very little resources –
just an understanding of historical
exploitation

NOT JUST SECURITY , THE RIGHT SECURITY
How Does CVSSv2 Do It?

NOT JUST SECURITY , THE RIGHT SECURITY
CVSSv2 Approach: Pros and Cons

Pros
Most reliable of all the
approaches: If an exploit is
available, a vulnerability is clearly
exploitable.
Requires very little resources –
just knowledge of availability of
PoCs and exploits

Cons
Purely reactive, requiring very
fast response times

Only takes into account when the
availability of an exploit is
publicly known i.e. may be
exploited long before being
flagged as such

NOT JUST SECURITY , THE RIGHT SECURITY
No information about code quality

NOT JUST SECURITY , THE RIGHT SECURITY
Code Quality
... And How To Measure It
Code Quality – Why Measure It?

NOT JUST SECURITY , THE RIGHT SECURITY
Code Maturity Metric – The Idea

The idea of code maturity is that by evaluating
the prevalence of the different vulnerability
classes being discovered in a product, we can
conclude the maturity of that product.
We, naturally, focus on it from a security
perspective.

NOT JUST SECURITY , THE RIGHT SECURITY
Code Maturity Metric – Scoring

• Each vulnerability can be scored based on
type, and how easy it is to discover.
• Researchers find simple vulnerabilities first - as
simple vulnerabilities are eliminated, researchers
move on to finding more complex vulnerabilities.

• When a vendor secures the code, basic
vulnerabilities are easier to spot and remedy or
never introduce compared to more complex
vulnerabilities.
NOT JUST SECURITY , THE RIGHT SECURITY
Code Maturity Metric – Scoring Example
Level

Vulnerability Classes

0

Classic buffer overflows due to
e.g. strcpy, sprintf, sscanf and
format string issues.

1

Buffer overflows due to incorrect
size being used e.g. strncpy,
memcpy and array-indexing
issues

2

Arithmetic errors i.e. Integer
overflows/underflows, type
conversion, signedness.

3

Uninitialized variable, use-afterfree, bad cast, complex logic
errors.
NOT JUST SECURITY , THE RIGHT SECURITY
Schneider Modbus Serial Driver Buffer Overflow

Source: http://www.riskbasedsecurity.com/research/RBS-2013-003.pdf
NOT JUST SECURITY , THE RIGHT SECURITY
Schneider Modbus Serial Driver Buffer Overflow

NOT JUST SECURITY , THE RIGHT SECURITY
Schneider Modbus Serial Driver Buffer Overflow

Code Maturity
Level: 1
NOT JUST SECURITY , THE RIGHT SECURITY
Schneider Modbus Serial Driver Buffer Overflow

NOT JUST SECURITY , THE RIGHT SECURITY
Schneider Modbus Serial Driver Buffer Overflow

NOT JUST SECURITY , THE RIGHT SECURITY
ActiveX Control Vulnerability

Code Maturity
Level: 3
NOT JUST SECURITY , THE RIGHT SECURITY
Office Vulnerabilities Analysed

Office 2000:
Office XP:

62
103

Office 2003:

90

Office 2007:

47

Office 2010:

14

NOT JUST SECURITY , THE RIGHT SECURITY
Office Product Code Maturity Scores
Office 2010

Office 2007

Office 2003
Code Maturity
Office XP

Office 2000

0

0.5

1

1.5

2

2.5

NOT JUST SECURITY , THE RIGHT SECURITY

3
Office Vulnerability Type Prevalence
Office 2010

Office 2007
Uninitialised Variable
Object Type Confusion
Use-after-free

Office 2003

Arithmetic
Array Indexing
Incorrect Size Copy

Office XP

Classic Buffer Overflow
Office 2000

0%

5%

10%

15%

20%

25%

30%

35%

NOT JUST SECURITY , THE RIGHT SECURITY
Measuring the Efforts Taken By Vendors

With this we can put more focus on the code security
improvement efforts taken by vendors by being able to
measure them.

Allows system administrators to know which software to steer
clear from... and researcher to understand which types of
vulnerabilities they can expect to find in a given product.

NOT JUST SECURITY , THE RIGHT SECURITY
Advisory Quality
Or Lack Thereof...
Information Needs To Be Publicly Available

Most vendors have also acknowledged that publishing
vulnerability information is beneficial
Juniper recently joined the party
Still some black sheep like SAP, trying to keep it a secret…

NOT JUST SECURITY , THE RIGHT SECURITY
Needs To Include Vulnerability Type

Either clearly descripting the vulnerability type in the advisory
description
or
alternatively including CWEs

NOT JUST SECURITY , THE RIGHT SECURITY
Everything Is Memory Corruption These Days

NOT JUST SECURITY , THE RIGHT SECURITY
Microsoft MS12-037 vs MS13-080

----

NOT JUST SECURITY , THE RIGHT SECURITY
Rise In Usage Of Memory Corruption Term

NOT JUST SECURITY , THE RIGHT SECURITY
No requirements to include proper info

Various standards and formats e.g. CVRF are being
proposed, but these deal with required fields – not the
content of these.

Primary focus is to ensure a structure that is easy to parse in
an automated manner.

Completely up to the vendors how much information they
feel like sharing. Up to customers to raise their voice, if they
want/need more.
NOT JUST SECURITY , THE RIGHT SECURITY
Vulnerability
... And Bug Bounties
Handling
Bug Bounties

When I started reporting vulnerabilities to vendors, I was
stoked each time I actually got a response - and it wasn't a
threat from a lawyer.
Had any of you told me back then that vendors today would
be offering bug bounties, I'd have smiled and shook my head.

NOT JUST SECURITY , THE RIGHT SECURITY
Bug Bounties

A few interesting ones are of course Google's bounty, which is
one of the more serious vendor bounties, and especially their
latest twist: Bounties for other software!
Microsoft's bounty for vulnerabilities, but specifically
bypassing security mechanisms is very interesting

NOT JUST SECURITY , THE RIGHT SECURITY
Shockwave Player Vulnerability Trend
90
80
70
60
50
40
30
20
10
0
2003

2004

2005

2006

2007

2008

2009

2010

2011

NOT JUST SECURITY , THE RIGHT SECURITY

2012

2013
Bug Bounties

There has definitely been a shift in how vendors perceive bug
bounties.
It’s clear to me that if a vendor wants to encourage
researchers to look at their code and report it in a
coordinated manner, then bug bounties are very effective
when done right.

NOT JUST SECURITY , THE RIGHT SECURITY
Conclusion
Are We There Yet?
Security Software and Shiny Appliances

NOT JUST SECURITY , THE RIGHT SECURITY
Everything Is Vulnerable – Even Security Software!

About 2.2% of all entries in
OSVDB cover vulnerabilities in
security software

NOT JUST SECURITY , THE RIGHT SECURITY
The Security Software Paradox

Reducing attack surface by adding an even greater
attack surface is a paradox

NOT JUST SECURITY , THE RIGHT SECURITY
Code Quality Improvements(?)

Microsoft, Google, and Adobe are examples of vendors
noticeably improving their security efforts.
Oracle may be on their way after everyone finally realized that
Java is a mess...

NOT JUST SECURITY , THE RIGHT SECURITY
How Do We Force Vendors To Improve?

NOT JUST SECURITY , THE RIGHT SECURITY
Grand Demonstrations!

We need
that ordinary people can
relate to!
NOT JUST SECURITY , THE RIGHT SECURITY
FTC vs. TRENDnet

After demonstrating how network cameras were easily
publicly accessible and e.g. allowing spying on people in their
homes, the FTC (Federal Trade Commision) in USA went after
TRENDnet.

Eventually agreed that TRENDnet was ”prohibited from
misrepresenting the security of its cameras”, will establish a
comprehensive IS program, and hire outside consulting to
review security every two years for 20 years...

http://www.ftc.gov/opa/2013/09/trendnet.shtm
NOT JUST SECURITY , THE RIGHT SECURITY
Is TRENDnet worse than the rest?

This is really something every single software vendor should
do – but definitely don’t!
Is TRENDnet really that much worse than other embedded
device vendors?

NOT JUST SECURITY , THE RIGHT SECURITY
TRENDnet Product Vulnerabilities

NOT JUST SECURITY , THE RIGHT SECURITY
D-Link Product Vulnerabilities

NOT JUST SECURITY , THE RIGHT SECURITY
D-Link User-Agent Backdoor

Source: http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/

NOT JUST SECURITY , THE RIGHT SECURITY
Is Legislation The Answer?

NOT JUST SECURITY , THE RIGHT SECURITY
Software Will Always Have Vulns?

Vendors claim that they provide software ”as-is” and have
long EULAs to exempt them from liability

We seemingly accept that software will always have vulns...
... but the types of vulnerabilities matter as well as how the
vendor proactively reduces risk and reactively deals with
them.

NOT JUST SECURITY , THE RIGHT SECURITY
Conclusion

Of all the areas, vulnerability coordination/handling is the
biggest improvement and continuing in the right direction.
Advisory quality overall seems static with some vendors
improving and others devolving.
Only a few major vendors really seem to have solid SDLs and
can show an improvement in code quality.

People are beginning to understand metrics better, and we’re
seeing attempts at providing more granularity.

NOT JUST SECURITY , THE RIGHT SECURITY
The Good News: There is Room for Improvement

NOT JUST SECURITY , THE RIGHT SECURITY
Discussion!

NOT JUST SECURITY , THE RIGHT SECURITY

More Related Content

What's hot

Secure Coding For Java - Une introduction
Secure Coding For Java - Une introductionSecure Coding For Java - Une introduction
Secure Coding For Java - Une introductionSebastien Gioria
 
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE
 
CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014Sebastien Gioria
 
Insecurity in security products v1.5
Insecurity in security products v1.5Insecurity in security products v1.5
Insecurity in security products v1.5DaveEdwards12
 
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Vladyslav Radetsky
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing
 
Security Theatre - Benelux
Security Theatre - BeneluxSecurity Theatre - Benelux
Security Theatre - Beneluxxsist10
 
OWASP, PHP, life and universe
OWASP, PHP, life and universeOWASP, PHP, life and universe
OWASP, PHP, life and universeSebastien Gioria
 
Now you can trust the browser - Ben Gidley, Tim Charman - Codemotion Amsterda...
Now you can trust the browser - Ben Gidley, Tim Charman - Codemotion Amsterda...Now you can trust the browser - Ben Gidley, Tim Charman - Codemotion Amsterda...
Now you can trust the browser - Ben Gidley, Tim Charman - Codemotion Amsterda...Codemotion
 
Securing Your BBC Identity
Securing Your BBC IdentitySecuring Your BBC Identity
Securing Your BBC IdentityMarc Littlemore
 
Security in the IoT generation - Guy Rombaut - Codemotion Amsterdam 2017
Security in the IoT generation - Guy Rombaut - Codemotion Amsterdam 2017Security in the IoT generation - Guy Rombaut - Codemotion Amsterdam 2017
Security in the IoT generation - Guy Rombaut - Codemotion Amsterdam 2017Codemotion
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017Saumil Shah
 
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...CODE BLUE
 
Cross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntyCross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntySaumil Shah
 

What's hot (14)

Secure Coding For Java - Une introduction
Secure Coding For Java - Une introductionSecure Coding For Java - Une introduction
Secure Coding For Java - Une introduction
 
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
 
CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014
 
Insecurity in security products v1.5
Insecurity in security products v1.5Insecurity in security products v1.5
Insecurity in security products v1.5
 
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
 
Security Theatre - Benelux
Security Theatre - BeneluxSecurity Theatre - Benelux
Security Theatre - Benelux
 
OWASP, PHP, life and universe
OWASP, PHP, life and universeOWASP, PHP, life and universe
OWASP, PHP, life and universe
 
Now you can trust the browser - Ben Gidley, Tim Charman - Codemotion Amsterda...
Now you can trust the browser - Ben Gidley, Tim Charman - Codemotion Amsterda...Now you can trust the browser - Ben Gidley, Tim Charman - Codemotion Amsterda...
Now you can trust the browser - Ben Gidley, Tim Charman - Codemotion Amsterda...
 
Securing Your BBC Identity
Securing Your BBC IdentitySecuring Your BBC Identity
Securing Your BBC Identity
 
Security in the IoT generation - Guy Rombaut - Codemotion Amsterdam 2017
Security in the IoT generation - Guy Rombaut - Codemotion Amsterdam 2017Security in the IoT generation - Guy Rombaut - Codemotion Amsterdam 2017
Security in the IoT generation - Guy Rombaut - Codemotion Amsterdam 2017
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017
 
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
 
Cross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntyCross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital Sovereignty
 

Viewers also liked

DefCamp 2013 - In vehicle CAN network security
DefCamp 2013 - In vehicle CAN network securityDefCamp 2013 - In vehicle CAN network security
DefCamp 2013 - In vehicle CAN network securityDefCamp
 
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...DefCamp
 
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp
 
DefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniquesDefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniquesDefCamp
 
DefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp
 

Viewers also liked (6)

2 × 3 = 6
2 × 3 = 62 × 3 = 6
2 × 3 = 6
 
DefCamp 2013 - In vehicle CAN network security
DefCamp 2013 - In vehicle CAN network securityDefCamp 2013 - In vehicle CAN network security
DefCamp 2013 - In vehicle CAN network security
 
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
 
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
 
DefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniquesDefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniques
 
DefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm Hole
 

Similar to DefCamp 2013 - Are we there yet?

Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Dinis Cruz
 
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVERSCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVERCODE BLUE
 
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...LibbySchulze
 
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?SecPod
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...Cyber Security Alliance
 
BitSensor Webwinkel Vakdagen
BitSensor Webwinkel VakdagenBitSensor Webwinkel Vakdagen
BitSensor Webwinkel Vakdagenwebwinkelvakdag
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)securitySoftware Guru
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas
NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas
NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas North Texas Chapter of the ISSA
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Vince Garr
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey מוטי שגיא
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Securityinside-BigData.com
 
Positive Hack Days. Gurkin. Zero Day for SCADA (0-day)
Positive Hack Days. Gurkin. Zero Day for SCADA (0-day)Positive Hack Days. Gurkin. Zero Day for SCADA (0-day)
Positive Hack Days. Gurkin. Zero Day for SCADA (0-day)Positive Hack Days
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imhoW Fred Seigneur
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Kyle Lai
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 

Similar to DefCamp 2013 - Are we there yet? (20)

Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)
 
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVERSCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
 
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
 
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
 
BitSensor Webwinkel Vakdagen
BitSensor Webwinkel VakdagenBitSensor Webwinkel Vakdagen
BitSensor Webwinkel Vakdagen
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)security
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas
NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas
NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 
Positive Hack Days. Gurkin. Zero Day for SCADA (0-day)
Positive Hack Days. Gurkin. Zero Day for SCADA (0-day)Positive Hack Days. Gurkin. Zero Day for SCADA (0-day)
Positive Hack Days. Gurkin. Zero Day for SCADA (0-day)
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imho
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 

More from DefCamp

Remote Yacht Hacking
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
 
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDefCamp
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)DefCamp
 
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFADefCamp
 
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationDefCamp
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money downDefCamp
 
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...DefCamp
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochDefCamp
 
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareDefCamp
 
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?DefCamp
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured DefCamp
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...DefCamp
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.DefCamp
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber SecurityDefCamp
 
The lions and the watering hole
The lions and the watering holeThe lions and the watering hole
The lions and the watering holeDefCamp
 

More from DefCamp (20)

Remote Yacht Hacking
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
 
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
 
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
 
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
 
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
 
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
 
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
 
The lions and the watering hole
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

DefCamp 2013 - Are we there yet?

  • 1. 10 Years Later: Are We There Yet? Carsten Eiram Risk Based Security @CarstenEiram
  • 2. Quick Bio – VDB Work Experience Involved with VDBs for 10+ years • Currently, CRO at Risk Based Security – commercial arm of Open Security Foundation (runs OSVDB and DatalossDB) – and responsible for the VulnDB service. • Chief Security Specialist at Secunia, running the Research team. • Security Team Lead at Danish Verisign affiliate, running a customer-only accessible vulnerability database. NOT JUST SECURITY , THE RIGHT SECURITY
  • 3. Quick Bio – Vulnerability Research Officially been doing vulnerability research since 2003 • Focused on a static analysis / reverse engineering approach • Jokingly refer to myself as a "vulnerability connoisseur" - I enjoy analyzing vulnerabilities and their root causes. • Critical vulnerabilities discovered in products from many major software vendors. NOT JUST SECURITY , THE RIGHT SECURITY
  • 5. Reason for Talk After 10+ years of VDB work, I felt it was time to reflect on certain areas related to vulnerabilities NOT JUST SECURITY , THE RIGHT SECURITY
  • 6. Considerations NOT JUST SECURITY , THE RIGHT SECURITY
  • 7. Metrics and their Usage NOT JUST SECURITY , THE RIGHT SECURITY
  • 8. Code Quality NOT JUST SECURITY , THE RIGHT SECURITY
  • 9. Advisory Quality VENDORS MAKE BAD DECISIONS NOT JUST SECURITY , THE RIGHT SECURITY
  • 10. Vulnerability Handling / Bug Bounties NOT JUST SECURITY , THE RIGHT SECURITY
  • 11. Million Dollar (or Leu) Question NOT JUST SECURITY , THE RIGHT SECURITY
  • 12. Quick Show of Hands NOT JUST SECURITY , THE RIGHT SECURITY
  • 13. Vulnerability A Quick Overview To Set The Stage Statistics
  • 14. Currently Oldest Recorded Vulnerabilities Vulnerabilities have been around for a very long time - And will continue to be... • Oldest entries in OSVDB are 79399 and 79400 • Marconi wireless telegraph • Dated November 1902 • Message spoofing and message disclosure NOT JUST SECURITY , THE RIGHT SECURITY
  • 16. First Ever Unbreakable Claim! http://www.newscientist.com/article/mg21228440.700-dotdashdiss-the-gentleman-hackers-1903-lulz.html NOT JUST SECURITY , THE RIGHT SECURITY
  • 17. Nevil Maskelyne Ruins Demo http://www.newscientist.com/article/mg21228440.700-dotdashdiss-the-gentleman-hackers-1903-lulz.html NOT JUST SECURITY , THE RIGHT SECURITY
  • 18. No Wire-Cutting Please While not providing the privacy and security as promised, the wireless telegraph still had one significant advantage over the wired telegraph: Not possible to cut the wires! NOT JUST SECURITY , THE RIGHT SECURITY
  • 19. Have We Improved? Obviously, we have progressed a fair bit technically since then, but have we gotten significantly better? NOT JUST SECURITY , THE RIGHT SECURITY
  • 20. Bringing The Internet Down – Old Lady Style Article: http://news.softpedia.com/news/Old-Lady-Cuts-Off-Internet-in-Armenia-193640.shtml NOT JUST SECURITY , THE RIGHT SECURITY
  • 21. 10 Year Vulnerability Trend 12000 10000 8000 6000 # Vulns 4000 2000 0 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 NOT JUST SECURITY , THE RIGHT SECURITY
  • 22. All Datasets Are Incomplete! All datasets are incomplete - some just more than others Many love taking CVE content that’s free and do random conclusions based on it, but since the dataset is severely lacking, the conclusions are as well NOT JUST SECURITY , THE RIGHT SECURITY
  • 23. 2006 – 2013 Vulnerability Type Trend NOT JUST SECURITY , THE RIGHT SECURITY
  • 24. 2012 Data Breaches due to SQL Injection NOT JUST SECURITY , THE RIGHT SECURITY
  • 25. Companies affected by XSS in 2012 Source: CWN - http://www.cyberwarnews.info/2012/07/04/300000-personal-details-leaked-38-sites-hacked-for-projectdragonfly/ NOT JUST SECURITY , THE RIGHT SECURITY
  • 26. Companies Impacted By Hacking In 2012 NOT JUST SECURITY , THE RIGHT SECURITY
  • 28. Which is more secure? Product A 10 Vulnerabilities Product B 20 Vulnerabilities NOT JUST SECURITY , THE RIGHT SECURITY
  • 29. Security State != Number of Vulnerabilities Previously, the security state of a product was considered to be equal to the number of vulnerabilities. Flawed conclusion! Today, people understand that the number of vulnerabilities != security state NOT JUST SECURITY , THE RIGHT SECURITY
  • 30. Some Apparently Still Don’t Know... “The problem with Java is that a lot of vulnerabilities are constantly being reported in it, and when a lot of vulnerabilities are reported, then there are a lot of hackers using these to access programs built on Java“ - Morten Stengaard, CTO, Secunia http://www.dr.dk/tv/se/tv-avisen/tv-avisen-827#!/ NOT JUST SECURITY , THE RIGHT SECURITY
  • 31. Dissecting the Statement – Part 1 ”... then there are a lot of hackers using these to access programs built on Java” Most vulnerabilities in Java are not used to target Java applications, but the Java Runtime Environment to compromise the system. http://www.dr.dk/tv/se/tv-avisen/tv-avisen-827#!/ NOT JUST SECURITY , THE RIGHT SECURITY
  • 32. Dissecting the Statement – Part 2 ”... when a lot of vulnerabilities are reported, then there are a lot of hackers using these…” Just because a lot of vulnerabilities are reported in a product, a lot of hackers may not be exploiting them. http://www.dr.dk/tv/se/tv-avisen/tv-avisen-827#!/ NOT JUST SECURITY , THE RIGHT SECURITY
  • 33. Dissecting the Statement – Part 3 ”The problem with Java is that a lot of vulnerabilities are constantly being reported in it…” The security state of a product is not defined by the number of vulnerabilities reported in it. http://www.dr.dk/tv/se/tv-avisen/tv-avisen-827#!/ NOT JUST SECURITY , THE RIGHT SECURITY
  • 34. We Should All Stop Using Popular Software Then 400 350 300 250 Java 200 Chrome Firefox 150 Internet Explorer 100 50 0 Vulnerabilities (2013 - Nov 10th) NOT JUST SECURITY , THE RIGHT SECURITY
  • 35. Facewall! NOT JUST SECURITY , THE RIGHT SECURITY
  • 36. Microsoft Argument For SDL (Windows) NOT JUST SECURITY , THE RIGHT SECURITY
  • 37. Microsoft Argument For SDL (SQL Server) NOT JUST SECURITY , THE RIGHT SECURITY
  • 38. Microsoft Office Vulnerability Trend Vulnerabilities in Office versions one year after product release (based on Microsoft security bulletins) 14 12 10 8 6 4 2 0 Office 2000 Office 2007 NOT JUST SECURITY , THE RIGHT SECURITY Office 2010
  • 39. Microsoft Security Bulletin Trend 350 300 250 200 Bulletins 150 CVEs 100 50 0 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 NOT JUST SECURITY , THE RIGHT SECURITY
  • 40. Researcher Focus and SCADA NOT JUST SECURITY , THE RIGHT SECURITY
  • 41. Stop Drawing Conclusions on Vulnerability Counts... NOT JUST SECURITY , THE RIGHT SECURITY
  • 42. There are so many other aspects to consider! More things to consider incl. Patched vs. Unpatched Vulnerability Type Impact Time-To-Patch Time-To-Vendor-Response Security Mechanisms ... NOT JUST SECURITY , THE RIGHT SECURITY
  • 44. Severity Metrics Many different severity metrics – both public and internal Most popular and hated is CVSS, which currently has problems reflecting real risk Many concerns raised about CVSSv2 by many people e.g. myself and Brian Martin of OSVDB in our open letter: "The CVSSv2 Shortcomings, Faults, and Failures Formulation" http://www.riskbasedsecurity.com/reports/CVSS-ShortcomingsFaultsandFailures.pdf NOT JUST SECURITY , THE RIGHT SECURITY
  • 45. Limitations of Severity Metrics Reflecting the threat of vulnerability-dependent issues (e.g. sandbox bypass, ASLR bypass related to memory disclosure etc.) By themselves and from a scoring point-of-view, these issues are pretty minor, but when combined with code execution... Jackpot! Ability to disclose a few memory addresses was in the past pretty much a non-issue – today it’s very useful. NOT JUST SECURITY , THE RIGHT SECURITY
  • 46. Pick A Vuln... Any Vuln... If I’d offer you one vulnerability in e.g. Google Chrome, which would you pick? 1) Code execution within sandbox CVSSv2: 6.8 2) Sandbox bypass CVSSv2: 2.6 NOT JUST SECURITY , THE RIGHT SECURITY
  • 47. Severity Metrics and Sandbox Bypasses If we conclude that exploiters are more interested in the sandbox bypass and system administrators should focus on fixing such a vulnerability over a code execution vulnerability within the sandbox, why are we not rating them higher? Case of reality not being reflected well by severity metrics NOT JUST SECURITY , THE RIGHT SECURITY
  • 48. Severity Metrics and Vulnerability Chains And once these issues start occuring in chains, which is becoming more and more common, then it really gets complex... You can have a lot of independent minor issues that when combined suddenly are very serious NOT JUST SECURITY , THE RIGHT SECURITY
  • 49. Google Chrome Pwn2Own Example CVSSv2: 6.8 CVSSv2: 5.1 OSVDB 89734 IPC channel missing listener process validation OSVDB 80007 Plugin blocking logic not run for NaCl in pre-rendering CVSSv2: 7.6 OSVDB 80293 Unpacked NPAPI extension installation without confirmation CVSSv2: OSVDB 81645 5.1 GPU command decoding integer underflow CVSSv2: 2.6 OSVDB 80741 CVSSv2: 2.6 OSVDB 89736 Too permissive LoadExtension bindings for extension manager Unprivileged renderer can navigate to privileged URLs http://blog.chromium.org/2012/05/tale-of-two-pwnies-part-1.html NOT JUST SECURITY , THE RIGHT SECURITY
  • 50. When Severity Metrics Met Reality NOT JUST SECURITY , THE RIGHT SECURITY
  • 52. Microsoft Severity Ratings Source: http://technet.microsoft.com/en-us/security/gg309177.aspx NOT JUST SECURITY , THE RIGHT SECURITY
  • 53. Exploitability Index Ratings NOT JUST SECURITY , THE RIGHT SECURITY
  • 54. Microsoft Approach: Pros and Cons Pros Cons Gives an realistic evaluation of the technical requirements to exploit a given vulnerability and how feasible it is Requires significant technical skills and resources to get right Makes it clear which are theoretical and which are plausible Still requires a bit of guesstimation NOT JUST SECURITY , THE RIGHT SECURITY
  • 55. No Granularity Really Added... NOT JUST SECURITY , THE RIGHT SECURITY
  • 56. How Does Adobe Do It? NOT JUST SECURITY , THE RIGHT SECURITY
  • 57. How Does Adobe Do It? NOT JUST SECURITY , THE RIGHT SECURITY
  • 58. Adobe Approach: Pros and Cons Pros ...Cons Allows understanding which Does not factor in technical products, versions, and requirements and the nature of architectures are most critical to the vulnerability i.e. does not prioritize differentiate between theoretical issues and straight-forward issues to exploit Dynamic approach that can be easily tweaked Requires very little resources – just an understanding of historical exploitation NOT JUST SECURITY , THE RIGHT SECURITY
  • 59. How Does CVSSv2 Do It? NOT JUST SECURITY , THE RIGHT SECURITY
  • 60. CVSSv2 Approach: Pros and Cons Pros Most reliable of all the approaches: If an exploit is available, a vulnerability is clearly exploitable. Requires very little resources – just knowledge of availability of PoCs and exploits Cons Purely reactive, requiring very fast response times Only takes into account when the availability of an exploit is publicly known i.e. may be exploited long before being flagged as such NOT JUST SECURITY , THE RIGHT SECURITY
  • 61. No information about code quality NOT JUST SECURITY , THE RIGHT SECURITY
  • 62. Code Quality ... And How To Measure It
  • 63. Code Quality – Why Measure It? NOT JUST SECURITY , THE RIGHT SECURITY
  • 64. Code Maturity Metric – The Idea The idea of code maturity is that by evaluating the prevalence of the different vulnerability classes being discovered in a product, we can conclude the maturity of that product. We, naturally, focus on it from a security perspective. NOT JUST SECURITY , THE RIGHT SECURITY
  • 65. Code Maturity Metric – Scoring • Each vulnerability can be scored based on type, and how easy it is to discover. • Researchers find simple vulnerabilities first - as simple vulnerabilities are eliminated, researchers move on to finding more complex vulnerabilities. • When a vendor secures the code, basic vulnerabilities are easier to spot and remedy or never introduce compared to more complex vulnerabilities. NOT JUST SECURITY , THE RIGHT SECURITY
  • 66. Code Maturity Metric – Scoring Example Level Vulnerability Classes 0 Classic buffer overflows due to e.g. strcpy, sprintf, sscanf and format string issues. 1 Buffer overflows due to incorrect size being used e.g. strncpy, memcpy and array-indexing issues 2 Arithmetic errors i.e. Integer overflows/underflows, type conversion, signedness. 3 Uninitialized variable, use-afterfree, bad cast, complex logic errors. NOT JUST SECURITY , THE RIGHT SECURITY
  • 67. Schneider Modbus Serial Driver Buffer Overflow Source: http://www.riskbasedsecurity.com/research/RBS-2013-003.pdf NOT JUST SECURITY , THE RIGHT SECURITY
  • 68. Schneider Modbus Serial Driver Buffer Overflow NOT JUST SECURITY , THE RIGHT SECURITY
  • 69. Schneider Modbus Serial Driver Buffer Overflow Code Maturity Level: 1 NOT JUST SECURITY , THE RIGHT SECURITY
  • 70. Schneider Modbus Serial Driver Buffer Overflow NOT JUST SECURITY , THE RIGHT SECURITY
  • 71. Schneider Modbus Serial Driver Buffer Overflow NOT JUST SECURITY , THE RIGHT SECURITY
  • 72. ActiveX Control Vulnerability Code Maturity Level: 3 NOT JUST SECURITY , THE RIGHT SECURITY
  • 73. Office Vulnerabilities Analysed Office 2000: Office XP: 62 103 Office 2003: 90 Office 2007: 47 Office 2010: 14 NOT JUST SECURITY , THE RIGHT SECURITY
  • 74. Office Product Code Maturity Scores Office 2010 Office 2007 Office 2003 Code Maturity Office XP Office 2000 0 0.5 1 1.5 2 2.5 NOT JUST SECURITY , THE RIGHT SECURITY 3
  • 75. Office Vulnerability Type Prevalence Office 2010 Office 2007 Uninitialised Variable Object Type Confusion Use-after-free Office 2003 Arithmetic Array Indexing Incorrect Size Copy Office XP Classic Buffer Overflow Office 2000 0% 5% 10% 15% 20% 25% 30% 35% NOT JUST SECURITY , THE RIGHT SECURITY
  • 76. Measuring the Efforts Taken By Vendors With this we can put more focus on the code security improvement efforts taken by vendors by being able to measure them. Allows system administrators to know which software to steer clear from... and researcher to understand which types of vulnerabilities they can expect to find in a given product. NOT JUST SECURITY , THE RIGHT SECURITY
  • 78. Information Needs To Be Publicly Available Most vendors have also acknowledged that publishing vulnerability information is beneficial Juniper recently joined the party Still some black sheep like SAP, trying to keep it a secret… NOT JUST SECURITY , THE RIGHT SECURITY
  • 79. Needs To Include Vulnerability Type Either clearly descripting the vulnerability type in the advisory description or alternatively including CWEs NOT JUST SECURITY , THE RIGHT SECURITY
  • 80. Everything Is Memory Corruption These Days NOT JUST SECURITY , THE RIGHT SECURITY
  • 81. Microsoft MS12-037 vs MS13-080 ---- NOT JUST SECURITY , THE RIGHT SECURITY
  • 82. Rise In Usage Of Memory Corruption Term NOT JUST SECURITY , THE RIGHT SECURITY
  • 83. No requirements to include proper info Various standards and formats e.g. CVRF are being proposed, but these deal with required fields – not the content of these. Primary focus is to ensure a structure that is easy to parse in an automated manner. Completely up to the vendors how much information they feel like sharing. Up to customers to raise their voice, if they want/need more. NOT JUST SECURITY , THE RIGHT SECURITY
  • 84. Vulnerability ... And Bug Bounties Handling
  • 85. Bug Bounties When I started reporting vulnerabilities to vendors, I was stoked each time I actually got a response - and it wasn't a threat from a lawyer. Had any of you told me back then that vendors today would be offering bug bounties, I'd have smiled and shook my head. NOT JUST SECURITY , THE RIGHT SECURITY
  • 86. Bug Bounties A few interesting ones are of course Google's bounty, which is one of the more serious vendor bounties, and especially their latest twist: Bounties for other software! Microsoft's bounty for vulnerabilities, but specifically bypassing security mechanisms is very interesting NOT JUST SECURITY , THE RIGHT SECURITY
  • 87. Shockwave Player Vulnerability Trend 90 80 70 60 50 40 30 20 10 0 2003 2004 2005 2006 2007 2008 2009 2010 2011 NOT JUST SECURITY , THE RIGHT SECURITY 2012 2013
  • 88. Bug Bounties There has definitely been a shift in how vendors perceive bug bounties. It’s clear to me that if a vendor wants to encourage researchers to look at their code and report it in a coordinated manner, then bug bounties are very effective when done right. NOT JUST SECURITY , THE RIGHT SECURITY
  • 90. Security Software and Shiny Appliances NOT JUST SECURITY , THE RIGHT SECURITY
  • 91. Everything Is Vulnerable – Even Security Software! About 2.2% of all entries in OSVDB cover vulnerabilities in security software NOT JUST SECURITY , THE RIGHT SECURITY
  • 92. The Security Software Paradox Reducing attack surface by adding an even greater attack surface is a paradox NOT JUST SECURITY , THE RIGHT SECURITY
  • 93. Code Quality Improvements(?) Microsoft, Google, and Adobe are examples of vendors noticeably improving their security efforts. Oracle may be on their way after everyone finally realized that Java is a mess... NOT JUST SECURITY , THE RIGHT SECURITY
  • 94. How Do We Force Vendors To Improve? NOT JUST SECURITY , THE RIGHT SECURITY
  • 95. Grand Demonstrations! We need that ordinary people can relate to! NOT JUST SECURITY , THE RIGHT SECURITY
  • 96. FTC vs. TRENDnet After demonstrating how network cameras were easily publicly accessible and e.g. allowing spying on people in their homes, the FTC (Federal Trade Commision) in USA went after TRENDnet. Eventually agreed that TRENDnet was ”prohibited from misrepresenting the security of its cameras”, will establish a comprehensive IS program, and hire outside consulting to review security every two years for 20 years... http://www.ftc.gov/opa/2013/09/trendnet.shtm NOT JUST SECURITY , THE RIGHT SECURITY
  • 97. Is TRENDnet worse than the rest? This is really something every single software vendor should do – but definitely don’t! Is TRENDnet really that much worse than other embedded device vendors? NOT JUST SECURITY , THE RIGHT SECURITY
  • 98. TRENDnet Product Vulnerabilities NOT JUST SECURITY , THE RIGHT SECURITY
  • 99. D-Link Product Vulnerabilities NOT JUST SECURITY , THE RIGHT SECURITY
  • 100. D-Link User-Agent Backdoor Source: http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/ NOT JUST SECURITY , THE RIGHT SECURITY
  • 101. Is Legislation The Answer? NOT JUST SECURITY , THE RIGHT SECURITY
  • 102. Software Will Always Have Vulns? Vendors claim that they provide software ”as-is” and have long EULAs to exempt them from liability We seemingly accept that software will always have vulns... ... but the types of vulnerabilities matter as well as how the vendor proactively reduces risk and reactively deals with them. NOT JUST SECURITY , THE RIGHT SECURITY
  • 103. Conclusion Of all the areas, vulnerability coordination/handling is the biggest improvement and continuing in the right direction. Advisory quality overall seems static with some vendors improving and others devolving. Only a few major vendors really seem to have solid SDLs and can show an improvement in code quality. People are beginning to understand metrics better, and we’re seeing attempts at providing more granularity. NOT JUST SECURITY , THE RIGHT SECURITY
  • 104. The Good News: There is Room for Improvement NOT JUST SECURITY , THE RIGHT SECURITY
  • 105. Discussion! NOT JUST SECURITY , THE RIGHT SECURITY

Editor's Notes

  1. 2013 number is from Nov. 4th 2013
  2. We don’t specifically ”access programs built on Java”, but whatever we feel like that is accessible with the gained privileges.
  3. When a vulnerability database / security companyfails like this, how can we expect the rest to understand?
  4. MS forgot to show the Office stats, so I generated them based on their bulletins. Applying the same “logic”, then SDL apparently made Office worse?
  5. And overall more vulnerabilities have been reported since SDL’s introduction? So it all went downhill?
  6. October 21st SCADA vulnerabilities from 2005 to 2013. So does this trend mean that SCADA security was better years ago than it is today? Or does it rather demonstrate that researchers suddenly started focusing on it, as they could get their 5 min of fame + money?
  7. While counting vulns is one of the most popular ways to ”document” the security state of a product, it’s terribly uninteresting in an isolated manner, as various factors affect it -most importantly researcher focus.
  8. Any seasoned exploiter in this crowd would pick #2 without blinking even with a lesser severity rating. Turning the question around to system admins: Which would (should) you fix first, if you could apply just one patch?
  9. Makes sense that these consider worst-case impacts, but as a system administrator you want more granularity.
  10. Introduced October 2008 and improved May 2011. Evaluates how likely a vulnerability is exploited within 30 days. Evaluation is done by Microsoft and unspecified key partners.
  11. Keyword is ”realistic”. Cannot be too conservative nor downplay issues or value is lost.
  12. 35 ”critical” bulletins and all but one scored 1. >80% of all 85 2012 bulletins had at least vulnerability scored as 1. Problem is that MS are too conservative and afraid of getting it wrong. Need to address that or reduce the 30 day window to e.g. 14 days or a week to add granularity.
  13. Instead of assessing the technical feasability, Adobe assesses the likelihood based product and on historical data.
  14. Actually not intended to be considered a metric, but commonly used as such.
  15. Allows understanding the current security state of a products code – even down to a component level. Since code is code, it would allow comparing the code quality of different products.
  16. Researchers (generally) find simple vulnerabilities first - as simple vulnerabilities are eliminated, researchers move on to finding more complex vulnerabilities. Same for fuzzing and static analysis.
  17. You can still find basic vulnerabilities today. List of affected products
  18. Another unbounded copy. Overwrite return address and flawless victory since not compiled with /GS flags.
  19. ActiveX control’s dispatching function
  20. Part of code maturity work done while at Secunia. Presented more in-depth at RVAsec 2012.
  21. There is an improvement. May not seem significant, but due to the manner issues were scored.
  22. Digging into numbers reveals significance. We can see the types changed a lot e.g. no more classic buffer overflows since Office 2007.
  23. Interesting metric – especially combined with existing metrics to understand security of product.
  24. Question vendors with such antiquated approaches like SAP, and if you find vulnerabilities in their products, make sure to publish the details.
  25. Generic term when a vendor doesn’t want to disclose root cause and a researcher doesn’t know the root cause...
  26. 1996 to August 1st 2013. About 1.8% - not staggering, but actually 4% of disclosures made today are ”memory corruption”.
  27. Believing in an evidence-based approach, we obviously prefer as much information as possible to make the best decisions.
  28. Also good way for Microsoft to get focus on their beta software prior to stable release to ensure less customers are impacted
  29. Starts receiving focus late 2009 / early 2010. Picks up momentum in 2010 after initial disclosures. Mid-2011 ZDI stops accepting submissions. Reports have dropped since then.
  30. Security spending is increasing and this is where most spend their money. But can you trust these security devices?
  31. Security software has vulnerabilities too. Don't automatically trust that software vendors developing security products know security nor secure coding!
  32. Message is not: “Don’t use security products”, but instead: “Consider what security software you really need – and certainly which features you need enabled. Apply the same healthy skepticism to security products as any other products”.
  33. Microsoft started improving security, because it started hurting their image. Adobe now recently started doing the same.
  34. Marconi case is an example. Barnaby Jack was amazing at this with his medical device and ATM hacks. Show how it impacts people’s lives. Surveillance case was effective and people could relate to it.
  35. Also lots of vulnerabilities – same basic type.
  36. And that’s where code maturity metrics may help...