SlideShare a Scribd company logo
1 of 31
IOActive, Inc. Copyright ©2016. All Rights Reserved.
Cesar Cerrudo
@cesarcer
CTO, IOActive Labs
Hacker proof: building
secure software
By 2020
200 Billion connected things
Source: Source IDC, CISCO, INTEL
Everything is being “connected”
We are becoming
more and more
and more digital
I’m worried
about our
future
Source: CVE Details Top 50 Vendors By Total Number Of "Distinct" Vulnerabilities in 2015
Security from day one
The later you add security, the more
difficult and expensive it becomes
Input validation
Don’t trust any input
Encrypt
“Everyone” fails at crypto
Secure by default
Enable the minimum needed
functionality, and make it secure
Reduce Information leakage
Every bit of information your system
provides is useful for attackers
Avoid Security through obscurity
Your software will be reverse engineered
Secure the supply chain
The security of your product
=
The sum of the security of all its
components
Education is key
Educate yourself, your team, your
company
Future Things Inc.
500,000 smart
toilets sold
worldwide
Something can
go wrong…
The moral of the story…
Don’t wait until people’s
private parts are scalded
to make your software
more secure
IOActive, Inc. Copyright ©2016. All Rights Reserved.
Cesar Cerrudo
@cesarcer
CTO, IOActive Labs
Thanks

More Related Content

What's hot

Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionSkyport Systems
 
Android Security : A Hacker's Perspective
Android Security : A Hacker's PerspectiveAndroid Security : A Hacker's Perspective
Android Security : A Hacker's PerspectiveSatria Ady Pradana
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust modelLINE Corporation
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaEdureka!
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
Security is Hard
Security is HardSecurity is Hard
Security is HardMike Murray
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentationixiademandgen
 
2019 Infosec World Keynote
2019 Infosec World Keynote2019 Infosec World Keynote
2019 Infosec World KeynoteJohn Kinsella
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network securityqosnetworking
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network securityqosnetworking
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Dejan Pogačnik
 

What's hot (20)

Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval Protection
 
Android Security : A Hacker's Perspective
Android Security : A Hacker's PerspectiveAndroid Security : A Hacker's Perspective
Android Security : A Hacker's Perspective
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust model
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Mobile Security Research Projects Help
Mobile Security  Research Projects HelpMobile Security  Research Projects Help
Mobile Security Research Projects Help
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
Security is Hard
Security is HardSecurity is Hard
Security is Hard
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
2019 Infosec World Keynote
2019 Infosec World Keynote2019 Infosec World Keynote
2019 Infosec World Keynote
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network security
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network security
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 

Similar to Hacker Proof: Building Secure Software

Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatETech 7
 
The Cyber Protection Revolution
The Cyber Protection RevolutionThe Cyber Protection Revolution
The Cyber Protection RevolutionAcronis
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSMAU
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseAdi Saputra
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]AngelGomezRomero
 
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...Dark Bears
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIAGILLY
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2FitCEO, Inc. (FCI)
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 

Similar to Hacker Proof: Building Secure Software (20)

Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
The Cyber Protection Revolution
The Cyber Protection RevolutionThe Cyber Protection Revolution
The Cyber Protection Revolution
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
 
itmsday2.pptx
itmsday2.pptxitmsday2.pptx
itmsday2.pptx
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Hacker Proof: Building Secure Software

Editor's Notes

  1. Some say that by 2020, there will be 200 billion connected things. If we take a small connected thing and line up 200 billion of them, that’s enough to wrap around the earth several hundred times.
  2. These multi-billions of connected things means that everything is being connected: Cars, planes, homes, cities, even animals like a cow are being connected.  
  3. We are putting software everywhere. This is changing the way we live, the way we behave and interact with things around us.
  4. We depend more and more on technology as it deeply integrates into our lives. But this technology dependence makes us very vulnerable if technology fails. Think about what happens when you are on the road and your smartphone runs out of battery or you lose it. It’s like the end of the world, because you lost access to your email, your calendar, your contacts, your apps, and without all that you can’t do anything. In moments like that, you realize that you can’t live without technology. Because of this increasing technology dependence, it’s very important that the technology is always available, protected and secure.
  5. I’m here today because I’m really worried about our future and I want to talk about the serious cyber security problems affecting technology.   I have been a professional hacker for more than 15 years. I find cyber security problems in technology in order to make it more secure. After doing this for many years, I’m really worried and also extremely frustrated, because I keep seeing the same cyber security problems over and over again and we are not getting better. And while we depend more and more on technology, the technology is more and more insecure.
  6. Maybe you don’t know it, but most technology is vulnerable and can be hacked, we see examples of this every day:  
  7.   -Cars have been hacked.  
  8.   -I hacked traffic systems.  
  9.   -A popular US smart home alarm system was hacked.  
  10.   -Implantable medical devices like pacemakers were hacked; people could be killed.  
  11.   -Plane systems were hacked too. Imagine the impact of this.  
  12.   -We have had critical infrastructure hacked too, like a power grid and a dam.  
  13.   -We have had critical infrastructure hacked too, like a power grid and a dam.  
  14.   -Mobile Banking Apps were also found vulnerable and easy to hack.  
  15.   -Smart city technology is vulnerable to hacking too.   These are just a few examples; the list could be endless.
  16. Every year thousands of cyber security problems are identified in different technologies from known technology vendors. Some of the vendors in this chart are the best at cyber security, but still have lots of security problems. Guess how the vendors that are worst at cyber security are doing? You probably guessed right, they are doing really badly.   If we don’t want to be the worst at cyber security, what we could do? Building secure software is not simple, but there are some basic recommendations we can follow.
  17. Cyber security must be present from day one, from the very beginning when you start designing your products, and continue being present and integrated during the product life cycle, at all stages. The later you add cyber security, the more difficult and expensive it becomes, because once you have your product already designed and architected, you have already built on top of that and it’s not easy to change the architecture of a finished product. It’s as if you built a bridge, and after you finish and it’s being used you realize that the foundation is weak. You will probably face a big mess trying to fix that, not to mention that the bridge can’t be used until you fix it. The later you think about security, the more problems you will get. You have to integrate security within your whole development process from day one.
  18. Your software must not trust any input. You must assume all input is evil input. The best way is to use a whitelist approach, accepting only valid and known input and rejecting the rest. Sometimes you might think that the input would come from a trusted source, but software is very dynamic and often changes; what comes from a trusted source today can come from an untrusted one tomorrow, and that’s when things go wrong. For instance, when you open up an API for public use, it won’t be just you using the API anymore, it could be anyone, and you can’t trust everyone.
  19. Over time, everyone has failed at encryption, and by “everyone” I mean almost every big and not-so-big software vendor. That’s because it’s very difficult to properly implement encryption and at the same time make it easy to use. You must always be careful with implementing encryption, making sure it’s properly audited by experts. Also, make sure you don’t invent your own “encryption.” It’s a common mistake to think that nobody will know it because you invented it, or that it will be difficult to break. It’s a big mistake; software can be reverse engineered and easily decoded. Most communications can be easily intercepted, so you must encrypt communications by default or at least allow encryption. Another important use for encryption is for encrypting and digitally signing software updates, because if you don’t encrypt and sign them, someone can easily reverse engineer and modify the updates, and your software could end up using an untrusted and modified update with malicious code. You have to protect from this by checking that the updates are not modified, and that they’re delivered over a secure communication channel.
  20. It’s a good practice to deploy software with almost all functionality disabled by default, and let the user enable what he really needs. In this way you can reduce the attack surface (the areas that could be hacked) and provide more security to users by making sure the most common functionality has strong security by default. It’s a common mistake to deploy software with a lot of functionality enabled by default, because this increases the attack surface by giving attackers more possibilities to hack the system.
  21. Every bit of information your system provides is useful to attackers. Usually software will give away some information without authenticating users; anyone can interact with the system and get some information back. This could be useful for users, for instance by showing the software version, release date, etc. But this is also very useful for attackers, since the more information they can get from a system the easier it is to attack it. By reducing the amount of information that is provided without authentication, you make attackers’ work more difficult. Everything you can do to make attackers’ work more difficult ends up increasing security.
  22. Many companies wrongly think that a protocol is hacker safe because it’s custom made, or because it’s not based on a standard. That’s a dangerous and common assumption made by people not familiar with hacking. It doesn’t matter whether your protocol is unknown, because it can be reverse engineered and hacked. Also, sometimes developers hide things inside software, such as passwords, usernames, etc. This is a big mistake too. Assume always that your software will be reverse engineered, and don’t hide anything inside. Anything you hide will probably be found.
  23. There is also a complex scenario with many different legacy technologies, many layers, and a long supply chain. Many companies don’t produce all components for a product; they have many third-party providers. It only takes one insecure component for the whole product to become insecure; the security of the product is the sum of the security of all of its components. You need to make sure all components are secure so that the whole system is secure.
  24. Invest in cyber security education for everyone at your company. Engineers, developers, decision makers – everyone should learn about cyber security depending on their needs. Developers need to learn how to develop software securely, software architects need to learn how to architect products securely, decision makers should learn that cyber security is important, and so on. You need to learn how to build products securely.
  25. In order to get a good picture of how cyber security problems could affect companies, let’s do an educational exercise, please follow up with me. Do we have software engineers here? Please raise your hands, thanks, there you are. I bet there are many here. Let’s suppose we all work at this fictitious company called Future Things. Our company is doing great, we have many IoT products.   One of our best and more successful products is a smart toilet. Our smart toilet is great, it’s the market leader and we are all really happy with it. Let’s see a very short video about our product. Play video (1 min aprox)
  26. As you can see, our smart toilet is really cool, it heats the seat, it has lights, and it plays music... I wonder how it would be to hear music from inside or below the toilet, I guess it could be inspiring sometimes, who knows, no more reading at the toilet, just listen to music and enjoy your moment at the toilet. It also has a remote control where you can set the water pressure and temperature of the integrated bidet to comfortably clean your private parts while you listen to music. You can also flush the toilet from there, play music, etc. It’s great; it’s a really cool remote control that can control all functions of our toilet.   We have sold 500,000 toilets worldwide and they keep selling. It’s the most popular smart toilet and its popularity keeps growing every day, people even publish selfies while using it. People can’t live without it. Our product is great, it’s a worldwide success, everything is going perfectly, but...
  27. As you can see, our smart toilet is really cool, it heats the seat, it has lights, and it plays music... I wonder how it would be to hear music from inside or below the toilet, I guess it could be inspiring sometimes, who knows, no more reading at the toilet, just listen to music and enjoy your moment at the toilet. It also has a remote control where you can set the water pressure and temperature of the integrated bidet to comfortably clean your private parts while you listen to music. You can also flush the toilet from there, play music, etc. It’s great; it’s a really cool remote control that can control all functions of our toilet.   We have sold 500,000 toilets worldwide (show in slide) and they keep selling. It’s the most popular smart toilet and its popularity keeps growing every day, people even publish selfies while using it. People can’t live without it. (show Our product is great, it’s a worldwide success, everything is going perfectly, but...
  28. Something can always go wrong when we build insecure products. As many other companies have, it seems our company Future Things didn’t build the smart toilet system in a secure way, and it has some cyber security vulnerabilities that open the system to possible cyber attacks.   After seeing the video and some of the functionality, can anyone identify a possible cyber security threat? Yes/No? If you were a hacker you would identify many. Using a hacker mindset, I can identify a possible interesting cyber security threat. When you have worked for many years doing offensive cyber security, you get used to putting yourself in developers’ minds and identifying what they could have done wrong; their possible mistakes.   Let’s see, the remote control uses infrared or radio frequency for communicating with the smart toilet. Since it’s not a very common communication mechanism for smart things, developers probably assumed that they shouldn’t have to worry about security or they didn’t think about security at all, because who would try to hack the remote control? And who will know how the communication protocol works if it’s custom made? Then there is probably no security protection in the communication protocol; no encryption, no authentication, which means that an attacker after learning the protocol could send any command over infrared or radio frequency to the smart toilet without any problems.   Another possible security mistake made by developers could be a lack of input validation at the smart toilet software for the commands it gets from the remote control. Since the software was made by same developers, they probably thought, why validate the commands if only their remote control will be sending them, and it’s a trusted source so why worry?   Knowing these problems, let’s use our evil hacker mind to build a cyber attack. Since we have a communication protocol that is not protected (not encrypted, no authentication, etc.), as an attacker we just need to reverse engineer it in order to learn the protocol and commands. It takes time but once we do that, we can create our own remote control using some cheap electronics and some easy programming – nowadays programming radio or infrared transceivers is pretty easy.   Since there is no validation for the commands being processed by the smart toilet software, our attack device could send commands for setting the bidet water pressure and temperature more than the maximum allowed by official remote control functionality. Because there is no validation at the smart toilet software, as an attacker, we can send any values we want and they will be accepted and processed. Usually hardware functionality has a limit that is higher that the software enforced limit. For instance, if the remote control only allowed water temperature up to 40 degrees Celsius, we can bypass that limitation since we aren’t using the remote control, so we can set the water temperature to 80 degrees, and do the same with the pressure. Once we set the bidet water pressure and temperature extremely high, we can turn the bidet on and if someone is using the smart toilet, we can scald his private parts (show picture). If we know that our neighbor has this smart toilet, we can hack it and scald his private parts. Or play around our neighborhood with our attack device, trying it at many homes. If the remote control is infrared, we could even create a mobile app to use with smartphones with infrared functionality, and distribute it as an enhancement to the smart toilet, I’m sure someone will probably bite. Remember I said we are using our evil hacking mind.   This may sound funny and an extreme example, but it could be 100% real, this is just an example of what could happen to any of the companies you currently work at if your software is not secure.
  29. If you don’t want to end up with these problems, then learn from the example: Don’t wait until people’s private parts are scalded to make your software more secure.   We should take cyber security seriously and start doing something about it right now. I have no problem with having no job because technology becomes very secure, so please make me jobless.