DefCamp 2013 - Are we there yet?

DefCamp
Dec. 18, 2013
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
1 of 105

More Related Content

What's hot

Secure Coding For Java - Une introductionSecure Coding For Java - Une introduction
Secure Coding For Java - Une introductionSebastien Gioria
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE
CLUSIR INFONORD OWASP iot 2014CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014Sebastien Gioria
Insecurity in security products v1.5Insecurity in security products v1.5
Insecurity in security products v1.5DaveEdwards12
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Vladyslav Radetsky
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing

Viewers also liked

2 × 3 = 62 × 3 = 6
2 × 3 = 6Tzu-ping Chung
DefCamp 2013 - In vehicle CAN network securityDefCamp 2013 - In vehicle CAN network security
DefCamp 2013 - In vehicle CAN network securityDefCamp
DefCamp 2013 - A few cybercrime cases that could make us think...DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...DefCamp
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp
DefCamp 2013 - Android hacking techniquesDefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniquesDefCamp
DefCamp 2013 - MSF Into The Worm HoleDefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp

Similar to DefCamp 2013 - Are we there yet?

Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Dinis Cruz
SCADA Software or Swiss Cheese Software?  by Celil UNUVERSCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVERCODE BLUE
Armo webinar rethinking your cloud security in the shadow of the solar winds ...Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...LibbySchulze
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...Cyber Security Alliance
BitSensor Webwinkel VakdagenBitSensor Webwinkel Vakdagen
BitSensor Webwinkel Vakdagenwebwinkelvakdag
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft

Similar to DefCamp 2013 - Are we there yet?(20)

More from DefCamp

Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp

Recently uploaded

From Project to Product - The Need for SpeedFrom Project to Product - The Need for Speed
From Project to Product - The Need for SpeedCprime
Accelerating Data Science through Feature Platform, Transformers and GenAIAccelerating Data Science through Feature Platform, Transformers and GenAI
Accelerating Data Science through Feature Platform, Transformers and GenAIFeatureByte
Edge Computing - A Future Fuel of 21st Century.pptxEdge Computing - A Future Fuel of 21st Century.pptx
Edge Computing - A Future Fuel of 21st Century.pptxNidhiShingade
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxSymptai Consulting Limited
Lesson 1 - Algorithm and Flowcharting.pdfLesson 1 - Algorithm and Flowcharting.pdf
Lesson 1 - Algorithm and Flowcharting.pdfROWELL MARQUINA
Cloud Native Application Development Guide – 2023Cloud Native Application Development Guide – 2023
Cloud Native Application Development Guide – 2023Lucy Zeniffer

DefCamp 2013 - Are we there yet?

Editor's Notes

  1. 2013 number is from Nov. 4th 2013
  2. We don’t specifically ”access programs built on Java”, but whatever we feel like that is accessible with the gained privileges.
  3. When a vulnerability database / security companyfails like this, how can we expect the rest to understand?
  4. MS forgot to show the Office stats, so I generated them based on their bulletins. Applying the same “logic”, then SDL apparently made Office worse?
  5. And overall more vulnerabilities have been reported since SDL’s introduction? So it all went downhill?
  6. October 21st SCADA vulnerabilities from 2005 to 2013. So does this trend mean that SCADA security was better years ago than it is today? Or does it rather demonstrate that researchers suddenly started focusing on it, as they could get their 5 min of fame + money?
  7. While counting vulns is one of the most popular ways to ”document” the security state of a product, it’s terribly uninteresting in an isolated manner, as various factors affect it -most importantly researcher focus.
  8. Any seasoned exploiter in this crowd would pick #2 without blinking even with a lesser severity rating. Turning the question around to system admins: Which would (should) you fix first, if you could apply just one patch?
  9. Makes sense that these consider worst-case impacts, but as a system administrator you want more granularity.
  10. Introduced October 2008 and improved May 2011. Evaluates how likely a vulnerability is exploited within 30 days. Evaluation is done by Microsoft and unspecified key partners.
  11. Keyword is ”realistic”. Cannot be too conservative nor downplay issues or value is lost.
  12. 35 ”critical” bulletins and all but one scored 1. >80% of all 85 2012 bulletins had at least vulnerability scored as 1. Problem is that MS are too conservative and afraid of getting it wrong. Need to address that or reduce the 30 day window to e.g. 14 days or a week to add granularity.
  13. Instead of assessing the technical feasability, Adobe assesses the likelihood based product and on historical data.
  14. Actually not intended to be considered a metric, but commonly used as such.
  15. Allows understanding the current security state of a products code – even down to a component level. Since code is code, it would allow comparing the code quality of different products.
  16. Researchers (generally) find simple vulnerabilities first - as simple vulnerabilities are eliminated, researchers move on to finding more complex vulnerabilities. Same for fuzzing and static analysis.
  17. You can still find basic vulnerabilities today. List of affected products
  18. Another unbounded copy. Overwrite return address and flawless victory since not compiled with /GS flags.
  19. ActiveX control’s dispatching function
  20. Part of code maturity work done while at Secunia. Presented more in-depth at RVAsec 2012.
  21. There is an improvement. May not seem significant, but due to the manner issues were scored.
  22. Digging into numbers reveals significance. We can see the types changed a lot e.g. no more classic buffer overflows since Office 2007.
  23. Interesting metric – especially combined with existing metrics to understand security of product.
  24. Question vendors with such antiquated approaches like SAP, and if you find vulnerabilities in their products, make sure to publish the details.
  25. Generic term when a vendor doesn’t want to disclose root cause and a researcher doesn’t know the root cause...
  26. 1996 to August 1st 2013. About 1.8% - not staggering, but actually 4% of disclosures made today are ”memory corruption”.
  27. Believing in an evidence-based approach, we obviously prefer as much information as possible to make the best decisions.
  28. Also good way for Microsoft to get focus on their beta software prior to stable release to ensure less customers are impacted
  29. Starts receiving focus late 2009 / early 2010. Picks up momentum in 2010 after initial disclosures. Mid-2011 ZDI stops accepting submissions. Reports have dropped since then.
  30. Security spending is increasing and this is where most spend their money. But can you trust these security devices?
  31. Security software has vulnerabilities too. Don't automatically trust that software vendors developing security products know security nor secure coding!
  32. Message is not: “Don’t use security products”, but instead: “Consider what security software you really need – and certainly which features you need enabled. Apply the same healthy skepticism to security products as any other products”.
  33. Microsoft started improving security, because it started hurting their image. Adobe now recently started doing the same.
  34. Marconi case is an example. Barnaby Jack was amazing at this with his medical device and ATM hacks. Show how it impacts people’s lives. Surveillance case was effective and people could relate to it.
  35. Also lots of vulnerabilities – same basic type.
  36. And that’s where code maturity metrics may help...