SlideShare a Scribd company logo
1 of 71
Download to read offline
Security Technology Arms Race 2021
Medal Event
Mark Dowd
TRACK 1
Director of Research, L3Harris Trenchant
There is an epic marathon being run between offense vs
defense and we are experiencing them at their closest point
Billions invested by each side – who will win??
Security Technology Arms Race 2021 | Mark Dowd 1
The Race is On
I have had trackside seats to the
race, and will be your
commentator for today ☺
The Participants
Offense vs Defense is a broad topic
• Memory corruption, SQLi, protocols, crypto, …
This focus is on offensive tooling
• Mostly concerned with memory corruption “exploit chains”
However: other security topics are highly relevant and will be
mentioned as appropriate
Security Technology Arms Race 2021 | Mark Dowd 2
Prospects
Looking at offensive tooling in the past, present, and future:
• Why has offense enjoyed such a large advantage?
• What strides has defense made?
• What happens next?
Thesis: The advantage offense has enjoyed for the last
20 years is inverting in favour of defense
Security Technology Arms Race 2021 | Mark Dowd 3
1) Context: Offensive Advantage
2) Defensive Gains
3) Offense vs Defense: Current State
Security Technology Arms Race 2021 | Mark Dowd 4
Neck and Neck
Offensive Advantage:
Asymmetry
What are we defending against?
Security Technology Arms Race 2021 | Mark Dowd 5
Context: Asymmetry
Offense has thrived over the last 20 years
• Vulnerabilities found with frequency
• Exploit kits consistently developed against contemporary targets
Offense started with several considerable advantages
• We will enumerate them here
Security Technology Arms Race 2021 | Mark Dowd 6
Context: Asymmetry
Factor 1: Security was not a primary design concern at the
outset
• Unsigned code was the default mode of operation
• Devices do not have open and attestable codebases
• We rely on legacy design decisions (often now with some level of
retro-fitted workaround)
Eg. Monolithic kernels
Security Technology Arms Race 2021 | Mark Dowd 7
Context: Asymmetry
Factor 2: Security boundaries were sometimes ill defined
and/or moved as technology progressed
• Lock screens
• Admin loading a kernel driver
• Windows desktops
Security Technology Arms Race 2021 | Mark Dowd 8
Context: Asymmetry
Factor 3: A lot of security science was in its infancy
• Vulnerability patterns + attack strategies
• Static analysis and decompilation
• Fuzzing methodologies
• Best programming practices
Security Technology Arms Race 2021 | Mark Dowd 9
Context: Asymmetry
Factor 4: Defensive ecosystem started small
• Difficulty of patch management / updating
Third party libraries especially!
• Difficulty of detecting (sophisticated) attacks and compromise
Security Technology Arms Race 2021 | Mark Dowd 10
Context: Asymmetry
Factor 5: Technology breakthroughs sometimes undermines
defensive strategies and assumptions
• Encryption and hashing breakthroughs (MD5)
Security Technology Arms Race 2021 | Mark Dowd 11
Context: Asymmetry
Factor 6: The starting point was millions of lines of Internet-facing code
Security Technology Arms Race 2021 | Mark Dowd 12
… and most importantly,
“We found out memory corruption is bad and common, can you just look
over this multi-million line code base and see if we have any problems?
Also, no downtime please” – a manager
Context: Asymmetry
“Defense has to be right all the time,
offense has to be right just once”
Security Technology Arms Race 2021 | Mark Dowd 13
Context: Asymmetry
The perfect storm for offense
• Motivation
• Relatively low cost
• Very complicated software with haphazard patching
• Detection was poor
• Low Risk for the attacker
Of getting caught
Consequences
Security Technology Arms Race 2021 | Mark Dowd 14
Defensive Strides
Security Technology Arms Race 2021 | Mark Dowd 15
Defense started slow but has accelerated
Defensive Goals
1) Raise the cost of offensive tooling
2) Limit damage of successful compromise
3) Detect successful compromise
Security Technology Arms Race 2021 | Mark Dowd 16
Defensive Goals
1) Raise the cost of offensive tooling
2) Limit damage of successful compromise
3) Detect successful compromise
Security Technology Arms Race 2021 | Mark Dowd 17
Defensive Goals: Raising Cost
Broadly divided into three parts
Security Technology Arms Race 2021 | Mark Dowd 18
Discovery cost
Time to discover flaw
Development cost
Implement reliable
exploit
Maintenance cost
Keeping the exploit
operational
Defensive Goals: Raising Cost
Discovery cost is rarely linear
• Large start cost to find first bug, following bugs much quicker
Same with development cost
• Develop a technique or bypass, reuse
Halvar Flake discussed this concept in depth in a 2017 keynote
19
Thomas Dullien. (2017). Repeated vs. single-round games in security [Paper presentation]. BSides Switzerland, Zurich. https://bsideszh.ch/wp-
content/uploads/2017/10/Thomas_Dullien-Keynote.pdf
Defensive Goals: Raising Cost
Example: Chrome RCE (~2013) with new junior employee
Found no bugs for 6 months
• Then: 4 bugs in 2 weeks
Exploit strategy took 2 months
• Then: 1 week for each of the others
This is a common pattern
Security Technology Arms Race 2021 | Mark Dowd 20
Defensive Goals: Raising Cost
Major discovery costs:
• Improved vendor bug discovery
• Example: Google has fuzzed over 29k bugs in Chrome since 2016
• Mitigations rendering vulnerabilities unexploitable
• Mostly due to early-stage mitigations (heap isolation, etc)
• Estimate: Half of the bugs I’ve found in the past several years were
unexploitable!
Security Technology Arms Race 2021 | Mark Dowd 21
Defensive Goals: Raising Cost
Major development costs:
• Code Signing
• When done right (iOS), enormous recurring cost
• Usually avoided at all costs (use browser wherever possible)
• ASLR (infoleaking)
• High, recurring cost
• Also augments other mitigations
Security Technology Arms Race 2021 | Mark Dowd 22
Defensive Goals: Raising Cost
Major development costs:
• Targeted technique mitigations
• Apple specifically does this more than anyone else
• Example: kernel_task, zone_require, removing direct access to objects
leveraged in public exploits
All of these incur a (potentially high) recurring cost
• Destroy advantage of technique reuse
Security Technology Arms Race 2021 | Mark Dowd 23
Defensive Goals: Raising Cost
Maintenance as an ongoing cost is rarely discussed
• Software releases are frequent
• Keeping an exploit operational is a lot of work
“Stockpiling” is largely a myth specifically because of
this cost
Security Technology Arms Race 2021 | Mark Dowd 24
Defensive Goals: Raising Cost
Isolation has been the primary cause of dramatically
increased cost
Multiplier effect: Each link in the chain requires a new discovery
+ development cost
Security Technology Arms Race 2021 | Mark Dowd 25
Defensive Goals: Raising Cost
Result
Cost of exploitation has risen dramatically
and
Most players are priced out of the market
Security Technology Arms Race 2021 | Mark Dowd 26
Defensive Goals: Raising Cost
Example: There is no market for stolen iPhones
(And: if you lose your iPhone, the chances of a stranger being
able to unlock it are practically zero)
Even LEO might have trouble
Security Technology Arms Race 2021 | Mark Dowd 27
Defensive Goals: Limit Compromise
1) Raise the cost of offensive tooling
2) Limit damage of successful compromise
3) Detect successful compromise
Security Technology Arms Race 2021 | Mark Dowd 28
Defensive Goals: Limit Compromise
Over time, offensive capabilities
cost more
and
do less
Security Technology Arms Race 2021 | Mark Dowd 29
Defensive Goals: Limit Compromise
2014
• Kernel code
execution possible
• Usermode code
injection possible
• Retrieve all
data
2017
• Kernel
read/write
possible
• Possible (but
painful) to do
kernel ROP
• Usermode code
injection
possible
• Some data
inaccessible
2020
• Kernel restricted
read/write
• Kernel ROP largely
infeasible
• Usermode code
injection requires
additional
vulnerability
Security Technology Arms Race 2021 | Mark Dowd 30
Defensive Goals: Limit Compromise
Modern iPhone browser chain limitations
• Largely requires phishing (not many MITM opportunities)
• Can get limited access to kernel memory (no code execution)
• Cannot inject into other processes without PPL bypass
• Retaining access on reboot is very challenging
Security Technology Arms Race 2021 | Mark Dowd 31
Defensive Goals: Detection
Defensive goals:
1) Raise the cost of offensive tooling
2) Limit damage of successful compromise
3) Detect successful compromise
Security Technology Arms Race 2021 | Mark Dowd 32
Defensive Goals: Detection
Detection has historically been very poor
• Figure out a signature, work around it
Vendors have the advantage of scale to detect anomalies
• Microsoft Defender for Endpoint
• Google Threat Analysis Group (TAG)
• A/V vendors (Kaspersky, FireEye, CrowdStrike)
Security Technology Arms Race 2021 | Mark Dowd 33
Defensive Goals: Detection
Vendors have the advantage of scale to detect anomalies
• Microsoft Defender for Endpoint
• Google Threat Analysis Group (TAG)
• A/V vendors (Kaspersky, FireEye, CrowdStrike)
Security Technology Arms Race 2021 | Mark Dowd 34
Defensive Goals: Detection
Increasingly sophisticated APT kits discovered in the wild
• Initially limited to desktop and server malware
• Now, mobile malware discovered with increasing frequency
From “In the wild” database by @maddiestone
• 2018: 12 ITW bugs, all targeting Windows desktop (no Chrome)
• By 2021: 5 Android, 7 Chrome, 7 iOS
Security Technology Arms Race 2021 | Mark Dowd 35
Power Inversion
Offensive tooling slows down
Defense speeds up
Who will gain the upper hand?
Security Technology Arms Race 2021 | Mark Dowd 36
Future: Overview
1) Memory Corruption: Slowing Down
2) Beyond Memory Corruption
3) Thinking in Ecosystems
Security Technology Arms Race 2021 | Mark Dowd 37
Future: Overview
1) Memory Corruption: Slowing Down
2) Beyond Memory Corruption
3) Thinking in Ecosystems
Security Technology Arms Race 2021 | Mark Dowd 38
Future: Offense Slows Down
Defense Advantage 1: Sandboxing is effective
• Constrained to limited privileges
• Might be able to break it periodically, but not continuously
Security Technology Arms Race 2021 | Mark Dowd 39
Future: Offense Slows Down
Defense Advantage 2: CFI is increasingly effective to
prevent execution
• Example: iOS kernel
• Expect other kernels/usermode to follow
Security Technology Arms Race 2021 | Mark Dowd 40
Future: Offense Slows Down
THEN: Structure of a typical memory corruption exploit
• Early-stage exploitation (stage 1): Initial corruption
• Late-stage exploitation (stage 2): Introduce arbitrary code
• Post-exploitation (stage 3): Payload
Security Technology Arms Race 2021 | Mark Dowd 41
Future: Offense Slows Down
NOW: Structure of a typical memory corruption exploit
• Early-stage exploitation (stage 1): Initial corruption
• Late-stage exploitation (stage 2): Get arbitrary memory
read/write
• Post-exploitation (stage 3): Payload
Security Technology Arms Race 2021 | Mark Dowd 42
Future: Offense Slows Down
NOW: Structure of a typical memory corruption exploit
• Early-stage exploitation (stage 1): Initial corruption
• Late-stage exploitation (stage 2): Get arbitrary memory
read/write
• Post-exploitation (stage 3): Payload
Data-only attacks are here, and growing
Security Technology Arms Race 2021 | Mark Dowd 43
Future: Offense Slows Down
Defense Advantage 3: Data Pointer Integrity (DPI) has
landed*
• iOS data PAC
• MTE will likely follow on multiple platforms
* I made up that acronym, there will probably be a better one soon
Security Technology Arms Race 2021 | Mark Dowd 44
Future: Offense Slows Down
• Structure of a typical memory corruption exploit
• Early-stage exploitation (stage 1): Initial corruption
• Late-stage exploitation (stage 2): Introduce arbitrary code
• Post-exploitation (stage 3): Payload
Security Technology Arms Race 2021 | Mark Dowd 45
Future: Offense Slows Down
Most early stage mitigations are limited to 1 or 2 bug classes
• Render some vulnerabilities useless
Data PAC and MTE are game changers
• Early stage mitigation that (potentially) applies to everything
• Severely curtail most current exploit techniques
• Will take another 2-3 years to really be in full effect
Security Technology Arms Race 2021 | Mark Dowd 46
Defense Accelerates: Mitigations
Possible: Microarchitectural flaws potentially an
effective bypass for PAC/MTE-like mitigations
• Large upswing in side channel vulnerabilities to disclose secrets
across security boundaries
• Example: BlindSide
• Proven to be possible via browsers
• Example: Prime+Probe 1 (w/o JavaScript!)
47
VUSec Systems Security Research Group at VU University Amsterdam. (2020, October 7). BlindSide. VUSec. https://www.vusec.net/projects/blindside/
Shusterman, A. et al. “Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses.” ArXiv abs/2103.04952 (2021): n. pag.
Defense Accelerates: Mitigations
Defensive Advantage: Detection of compromise
becomes easier
• If telemetry runs with more privileges that offensive tooling
can obtain, it is harder to evade
48
Security Technology Arms Race 2021 | Mark Dowd
Future: Beyond Memory Corruption
1) Memory Corruption: Slowing Down
2) Beyond Memory Corruption
3) Thinking in Ecosystems
Security Technology Arms Race 2021 | Mark Dowd 49
Defense Accelerates: Mitigations
Are memory corruption exploits on borrowed time?
• I say: Yes (but admittedly, I have been saying that since 2004)
Prediction (re-asserted): Exploitable memory
corruption will become the exception, not the rule!
Security Technology Arms Race 2021 | Mark Dowd 50
Future: Beyond Memory Corruption
Historically, memory corruption is the favoured technique
• Applicable to most technologies and attack vectors
• Often most powerful (unfettered access to function and data)
• Difficult to detect and stop
Is this still true?
Security Technology Arms Race 2021 | Mark Dowd 51
Future: Beyond Memory Corruption
Now, memory corruption as a technique has weaknesses:
• Limited access due to CFI/CPI might mean it is not more
powerful than other types of vulnerabilities
• Also they are the most expensive to create and maintain
What are the likely targets for offensive research to pivot to?
Security Technology Arms Race 2021 | Mark Dowd 52
Future: Beyond Memory Corruption
Vulnerability Type 1: Cryptography Flaws
• Cryptography underpins nearly all current security technology in one
form or another in every layer of the technology stack
• Encrypted comms
• Authentication / authorization (certificates)
• Code signing and updates
• PAC
Security Technology Arms Race 2021 | Mark Dowd 53
Future: Beyond Memory Corruption
Potential to:
• Eavesdropping and payload delivery (browser/chat)
• Spoofing and impersonation
• Bypassing code signing and trusted boot
• Introducing “evil” upgrades
• Defeating some mitigations
Crypto flaws are king!
Security Technology Arms Race 2021 | Mark Dowd 54
Future: Beyond Memory Corruption
Recent examples
• Orange Tsai’s Exchange RCE bugs
• NSA’s Microsoft Certificate vulnerability (CVE-2020-0601)
• Tom Tervoort’s ZeroLogon flaw (CVE-2020-1472)
Prediction: Crypto vulnerability research will be critical
components of most offensive tools in several years
55
Tsai, O., & Æ. (2021, August 1). A New Attack Surface on MS Exchange Part 1 - ProxyLogon! Orange. https://blog.orange.tw/2021/08/proxylogon-a-new-
attack-surface-on-ms-exchange-part-1.html
Future: Beyond Memory Corruption
Vulnerability Type 2: Web Technology Flaws
Web technology flaws are increasingly
relevant in the offensive tooling space
> As noted by security experts
Security Technology Arms Race 2021 | Mark Dowd 56
Future: Beyond Memory Corruption
Security Technology Arms Race 2021 | Mark Dowd 57
Future: Beyond Memory Corruption
Web technology flaws are increasingly relevant in the offensive
tooling space
• Exchange Server RCE via SSRF by Orange Tsai
• “Pwning iOS 14 with Generation Z Bugz” by Zhi Zhou, Jundong Xie
58
Tsai, O., & Æ. (2021, August 1). A New Attack Surface on MS Exchange Part 1 - ProxyLogon! Orange. https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-
part-1.html
Zhi Zhou, & Jundong Xie. (2021, August). Hack Different: Pwning iOS 14 with Generation Z Bugz. Black Hat USA, Las Vegas, NV. https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-
Hack-Different-Pwning-IOS-14-With-Generation-Z-Bug-wp.pdf
Future: Beyond Memory Corruption
Vulnerability Type 3: Protocol Attacks
• Revisiting and examining new network protocol attacks has
potential, particularly when coupled with other flaws
Security Technology Arms Race 2021 | Mark Dowd 59
Future: Beyond Memory Corruption
Potential:
• Identity spoofing
• Crossing trust domains
• Accessing sensitive data or functionality
Security Technology Arms Race 2021 | Mark Dowd 60
Future: Beyond Memory Corruption
We have seen data-only attacks, what about function-only
attacks?
• Favourite: Natalie Silvanovich’s chat app shredding
61
Silvanovich, N. (2021, August 25). The State of State Machines. Https://Googleprojectzero.Blogspot.Com/2021/01/the-State-of-State-Machines.Html.
https://googleprojectzero.blogspot.com/2021/01/the-state-of-state-machines.html
Future: Thinking in Ecosystems
1) Memory Corruption: Slowing Down
2) Beyond Memory Corruption
3) Thinking in Ecosystems
Security Technology Arms Race 2021 | Mark Dowd 62
Future: Thinking in Ecosystems
One of offense’s initial advantages was the reliance on legacy
design principles for secure computing
Is offense starting to incur a similar cost?
Security Technology Arms Race 2021 | Mark Dowd 63
Future: Thinking in Ecosystems
Offensive tools are often written to be deployed based on various
assumptions
• Most interesting traffic is on an open and distributed internet
• Traffic is observable and modifiable
• Compromising a device implies full, unfettered access
• Code can be introduced at will
• All data on a device can be recovered
• A/V and APT hunters are not sophisticated
Most of these assumptions are now false
Security Technology Arms Race 2021 | Mark Dowd 64
Future: Thinking in Ecosystems
The Internet is balkanized: geographically, politically,
commercially
• Eg WeChat, Parler, Facebook, Google, Amazon, Apple, HarmonyOS
• Most interesting data is encrypted and contained in private
ecosystems
• A lot of code/infrastructure traditionally hosted in-house is
outsourced to Google etc
Security Technology Arms Race 2021 | Mark Dowd 65
Defense Life Cycle: Mitigations
Devices participate in one or more ecosystems now
• Apple devices -> Apple ecosystem
• Android -> Google ecosystem
• Secondary clouds: Facebook, WeChat, etc
Do these ecosystems represent a significant attack surface?
• Potential to move laterally
• Persist across upgrades/resets
Security Technology Arms Race 2021 | Mark Dowd 66
Future: Thinking in Ecosystems
Presents some unique political and legal challenges
• Who is allowed to do that?
• Not NSO, apparently
• If off-limits to LEO/local intel, guess who that leaves?
• Adversary nations, criminals
67
Shu, C. (2020, July 16). Federal court rules WhatsApp and Facebook’s malware exploit case against NSO Group can proceed. Https://Techcrunch.Com/2020/07/16/Federal-
Court-Rules-Whatsapp-and-Facebooks-Malware-Exploit-Case-against-Nso-Group-Can-Proceed/.
Future: Thinking in Ecosystems
Prediction: Future offensive chains will be “ecosystem aware”
Some advantages here for offense, but defense has the ability to do
sophisticated anomaly detection
• Benefit from large scale data sets and common usage patterns
• Dino Dai Zovi notes this in his SummerCon 2021 talk
DaiZavi, D. (2021). Dr Strangecode: Or How I Stopped Worrying and Learned to Love the Cloud. In Summercon. 68
Summary
1) Memory corruption is still the most effective strategy for offense,
but it’s advantages are eroding
2) Increasingly, offense will replace memory corruption components
with other logic flaws
3) Defensive profits by improved detection facilities as a result of
less powerful offensive toolkits, and moving to the cloud
The old adage “Defense needs to be right every time, offense only
needs to be right once” will possibly be inverted!
Security Technology Arms Race 2021 | Mark Dowd 69
Thank You for Joining
Us
Join our Discord channel to discuss more or ask questions
https://discord.gg/dXE8ZMvU9J

More Related Content

What's hot

Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdfBypass_AV-EDR.pdf
Bypass_AV-EDR.pdfFarouk2nd
 
[Flutter] 來體驗 bloc 小方塊的神奇魔法 @Devfest 2022
[Flutter] 來體驗 bloc 小方塊的神奇魔法 @Devfest 2022[Flutter] 來體驗 bloc 小方塊的神奇魔法 @Devfest 2022
[Flutter] 來體驗 bloc 小方塊的神奇魔法 @Devfest 2022Johnny Sung
 
How to Plan Purple Team Exercises
How to Plan Purple Team ExercisesHow to Plan Purple Team Exercises
How to Plan Purple Team ExercisesHaydn Johnson
 
汎用性と高速性を目指したペアリング暗号ライブラリ mcl
汎用性と高速性を目指したペアリング暗号ライブラリ mcl汎用性と高速性を目指したペアリング暗号ライブラリ mcl
汎用性と高速性を目指したペアリング暗号ライブラリ mclMITSUNARI Shigeo
 
Androidの新ビルドシステム
Androidの新ビルドシステムAndroidの新ビルドシステム
Androidの新ビルドシステムl_b__
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshopArpan Raval
 
プロフェッショナルSSL/TLS 1.2章
プロフェッショナルSSL/TLS 1.2章プロフェッショナルSSL/TLS 1.2章
プロフェッショナルSSL/TLS 1.2章MITSUNARI Shigeo
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSMITRE ATT&CK
 
DevSecOps : de la théorie à la pratique
DevSecOps : de la théorie à la pratiqueDevSecOps : de la théorie à la pratique
DevSecOps : de la théorie à la pratiquebertrandmeens
 
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
PurpleSharp BlackHat Arsenal Asia
PurpleSharp BlackHat Arsenal AsiaPurpleSharp BlackHat Arsenal Asia
PurpleSharp BlackHat Arsenal AsiaMauricio Velazco
 
Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)ceng
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOpsCYBRIC
 
從 DevOps 到 ChatOps:War Room、Bots 與 Automation
從 DevOps 到 ChatOps:War Room、Bots 與 Automation從 DevOps 到 ChatOps:War Room、Bots 與 Automation
從 DevOps 到 ChatOps:War Room、Bots 與 AutomationChen Cheng-Wei
 
冬のLock free祭り safe
冬のLock free祭り safe冬のLock free祭り safe
冬のLock free祭り safeKumazaki Hiroki
 

What's hot (20)

The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
AndroidとSELinux
AndroidとSELinuxAndroidとSELinux
AndroidとSELinux
 
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdfBypass_AV-EDR.pdf
Bypass_AV-EDR.pdf
 
DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019
 
[Flutter] 來體驗 bloc 小方塊的神奇魔法 @Devfest 2022
[Flutter] 來體驗 bloc 小方塊的神奇魔法 @Devfest 2022[Flutter] 來體驗 bloc 小方塊的神奇魔法 @Devfest 2022
[Flutter] 來體驗 bloc 小方塊的神奇魔法 @Devfest 2022
 
これがCassandra
これがCassandraこれがCassandra
これがCassandra
 
How to Plan Purple Team Exercises
How to Plan Purple Team ExercisesHow to Plan Purple Team Exercises
How to Plan Purple Team Exercises
 
汎用性と高速性を目指したペアリング暗号ライブラリ mcl
汎用性と高速性を目指したペアリング暗号ライブラリ mcl汎用性と高速性を目指したペアリング暗号ライブラリ mcl
汎用性と高速性を目指したペアリング暗号ライブラリ mcl
 
Androidの新ビルドシステム
Androidの新ビルドシステムAndroidの新ビルドシステム
Androidの新ビルドシステム
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
 
暗認本読書会12
暗認本読書会12暗認本読書会12
暗認本読書会12
 
プロフェッショナルSSL/TLS 1.2章
プロフェッショナルSSL/TLS 1.2章プロフェッショナルSSL/TLS 1.2章
プロフェッショナルSSL/TLS 1.2章
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
 
DevSecOps : de la théorie à la pratique
DevSecOps : de la théorie à la pratiqueDevSecOps : de la théorie à la pratique
DevSecOps : de la théorie à la pratique
 
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
PurpleSharp BlackHat Arsenal Asia
PurpleSharp BlackHat Arsenal AsiaPurpleSharp BlackHat Arsenal Asia
PurpleSharp BlackHat Arsenal Asia
 
Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
從 DevOps 到 ChatOps:War Room、Bots 與 Automation
從 DevOps 到 ChatOps:War Room、Bots 與 Automation從 DevOps 到 ChatOps:War Room、Bots 與 Automation
從 DevOps 到 ChatOps:War Room、Bots 與 Automation
 
冬のLock free祭り safe
冬のLock free祭り safe冬のLock free祭り safe
冬のLock free祭り safe
 

Similar to Security Technology Arms Race - Hack in the Box 2021 keynote

Cyber security course in Kerala , Kochi
Cyber security course in Kerala ,  KochiCyber security course in Kerala ,  Kochi
Cyber security course in Kerala , Kochiamallblitz0
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
 
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...LibbySchulze
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspacemark-smith
 
Recognize, assess, reduce, and manage technical debt
Recognize, assess, reduce, and manage technical debtRecognize, assess, reduce, and manage technical debt
Recognize, assess, reduce, and manage technical debtJim Bethancourt
 
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...Edge AI and Vision Alliance
 
Protecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaCProtecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaCFernando Cardoso
 
Architecture Design Decisions and Group Decision Making
Architecture Design Decisions and Group Decision MakingArchitecture Design Decisions and Group Decision Making
Architecture Design Decisions and Group Decision MakingHenry Muccini
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academyananthakrishnansblit
 
Cyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiCyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiamallblitz0
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019Stefan Streichsbier
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionSecPod
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionSecPod
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsSynopsys Software Integrity Group
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 

Similar to Security Technology Arms Race - Hack in the Box 2021 keynote (20)

Cyber security course in Kerala , Kochi
Cyber security course in Kerala ,  KochiCyber security course in Kerala ,  Kochi
Cyber security course in Kerala , Kochi
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Recognize, assess, reduce, and manage technical debt
Recognize, assess, reduce, and manage technical debtRecognize, assess, reduce, and manage technical debt
Recognize, assess, reduce, and manage technical debt
 
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Pre...
 
Protecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaCProtecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaC
 
Software Security
Software SecuritySoftware Security
Software Security
 
The Future of DevSecOps
The Future of DevSecOpsThe Future of DevSecOps
The Future of DevSecOps
 
Architecture Design Decisions and Group Decision Making
Architecture Design Decisions and Group Decision MakingArchitecture Design Decisions and Group Decision Making
Architecture Design Decisions and Group Decision Making
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
Cyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiCyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochi
 
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Security Technology Arms Race - Hack in the Box 2021 keynote

  • 1. Security Technology Arms Race 2021 Medal Event Mark Dowd TRACK 1 Director of Research, L3Harris Trenchant
  • 2. There is an epic marathon being run between offense vs defense and we are experiencing them at their closest point Billions invested by each side – who will win?? Security Technology Arms Race 2021 | Mark Dowd 1 The Race is On I have had trackside seats to the race, and will be your commentator for today ☺
  • 3. The Participants Offense vs Defense is a broad topic • Memory corruption, SQLi, protocols, crypto, … This focus is on offensive tooling • Mostly concerned with memory corruption “exploit chains” However: other security topics are highly relevant and will be mentioned as appropriate Security Technology Arms Race 2021 | Mark Dowd 2
  • 4. Prospects Looking at offensive tooling in the past, present, and future: • Why has offense enjoyed such a large advantage? • What strides has defense made? • What happens next? Thesis: The advantage offense has enjoyed for the last 20 years is inverting in favour of defense Security Technology Arms Race 2021 | Mark Dowd 3
  • 5. 1) Context: Offensive Advantage 2) Defensive Gains 3) Offense vs Defense: Current State Security Technology Arms Race 2021 | Mark Dowd 4 Neck and Neck
  • 6. Offensive Advantage: Asymmetry What are we defending against? Security Technology Arms Race 2021 | Mark Dowd 5
  • 7. Context: Asymmetry Offense has thrived over the last 20 years • Vulnerabilities found with frequency • Exploit kits consistently developed against contemporary targets Offense started with several considerable advantages • We will enumerate them here Security Technology Arms Race 2021 | Mark Dowd 6
  • 8. Context: Asymmetry Factor 1: Security was not a primary design concern at the outset • Unsigned code was the default mode of operation • Devices do not have open and attestable codebases • We rely on legacy design decisions (often now with some level of retro-fitted workaround) Eg. Monolithic kernels Security Technology Arms Race 2021 | Mark Dowd 7
  • 9. Context: Asymmetry Factor 2: Security boundaries were sometimes ill defined and/or moved as technology progressed • Lock screens • Admin loading a kernel driver • Windows desktops Security Technology Arms Race 2021 | Mark Dowd 8
  • 10. Context: Asymmetry Factor 3: A lot of security science was in its infancy • Vulnerability patterns + attack strategies • Static analysis and decompilation • Fuzzing methodologies • Best programming practices Security Technology Arms Race 2021 | Mark Dowd 9
  • 11. Context: Asymmetry Factor 4: Defensive ecosystem started small • Difficulty of patch management / updating Third party libraries especially! • Difficulty of detecting (sophisticated) attacks and compromise Security Technology Arms Race 2021 | Mark Dowd 10
  • 12. Context: Asymmetry Factor 5: Technology breakthroughs sometimes undermines defensive strategies and assumptions • Encryption and hashing breakthroughs (MD5) Security Technology Arms Race 2021 | Mark Dowd 11
  • 13. Context: Asymmetry Factor 6: The starting point was millions of lines of Internet-facing code Security Technology Arms Race 2021 | Mark Dowd 12 … and most importantly, “We found out memory corruption is bad and common, can you just look over this multi-million line code base and see if we have any problems? Also, no downtime please” – a manager
  • 14. Context: Asymmetry “Defense has to be right all the time, offense has to be right just once” Security Technology Arms Race 2021 | Mark Dowd 13
  • 15. Context: Asymmetry The perfect storm for offense • Motivation • Relatively low cost • Very complicated software with haphazard patching • Detection was poor • Low Risk for the attacker Of getting caught Consequences Security Technology Arms Race 2021 | Mark Dowd 14
  • 16. Defensive Strides Security Technology Arms Race 2021 | Mark Dowd 15 Defense started slow but has accelerated
  • 17. Defensive Goals 1) Raise the cost of offensive tooling 2) Limit damage of successful compromise 3) Detect successful compromise Security Technology Arms Race 2021 | Mark Dowd 16
  • 18. Defensive Goals 1) Raise the cost of offensive tooling 2) Limit damage of successful compromise 3) Detect successful compromise Security Technology Arms Race 2021 | Mark Dowd 17
  • 19. Defensive Goals: Raising Cost Broadly divided into three parts Security Technology Arms Race 2021 | Mark Dowd 18 Discovery cost Time to discover flaw Development cost Implement reliable exploit Maintenance cost Keeping the exploit operational
  • 20. Defensive Goals: Raising Cost Discovery cost is rarely linear • Large start cost to find first bug, following bugs much quicker Same with development cost • Develop a technique or bypass, reuse Halvar Flake discussed this concept in depth in a 2017 keynote 19 Thomas Dullien. (2017). Repeated vs. single-round games in security [Paper presentation]. BSides Switzerland, Zurich. https://bsideszh.ch/wp- content/uploads/2017/10/Thomas_Dullien-Keynote.pdf
  • 21. Defensive Goals: Raising Cost Example: Chrome RCE (~2013) with new junior employee Found no bugs for 6 months • Then: 4 bugs in 2 weeks Exploit strategy took 2 months • Then: 1 week for each of the others This is a common pattern Security Technology Arms Race 2021 | Mark Dowd 20
  • 22. Defensive Goals: Raising Cost Major discovery costs: • Improved vendor bug discovery • Example: Google has fuzzed over 29k bugs in Chrome since 2016 • Mitigations rendering vulnerabilities unexploitable • Mostly due to early-stage mitigations (heap isolation, etc) • Estimate: Half of the bugs I’ve found in the past several years were unexploitable! Security Technology Arms Race 2021 | Mark Dowd 21
  • 23. Defensive Goals: Raising Cost Major development costs: • Code Signing • When done right (iOS), enormous recurring cost • Usually avoided at all costs (use browser wherever possible) • ASLR (infoleaking) • High, recurring cost • Also augments other mitigations Security Technology Arms Race 2021 | Mark Dowd 22
  • 24. Defensive Goals: Raising Cost Major development costs: • Targeted technique mitigations • Apple specifically does this more than anyone else • Example: kernel_task, zone_require, removing direct access to objects leveraged in public exploits All of these incur a (potentially high) recurring cost • Destroy advantage of technique reuse Security Technology Arms Race 2021 | Mark Dowd 23
  • 25. Defensive Goals: Raising Cost Maintenance as an ongoing cost is rarely discussed • Software releases are frequent • Keeping an exploit operational is a lot of work “Stockpiling” is largely a myth specifically because of this cost Security Technology Arms Race 2021 | Mark Dowd 24
  • 26. Defensive Goals: Raising Cost Isolation has been the primary cause of dramatically increased cost Multiplier effect: Each link in the chain requires a new discovery + development cost Security Technology Arms Race 2021 | Mark Dowd 25
  • 27. Defensive Goals: Raising Cost Result Cost of exploitation has risen dramatically and Most players are priced out of the market Security Technology Arms Race 2021 | Mark Dowd 26
  • 28. Defensive Goals: Raising Cost Example: There is no market for stolen iPhones (And: if you lose your iPhone, the chances of a stranger being able to unlock it are practically zero) Even LEO might have trouble Security Technology Arms Race 2021 | Mark Dowd 27
  • 29. Defensive Goals: Limit Compromise 1) Raise the cost of offensive tooling 2) Limit damage of successful compromise 3) Detect successful compromise Security Technology Arms Race 2021 | Mark Dowd 28
  • 30. Defensive Goals: Limit Compromise Over time, offensive capabilities cost more and do less Security Technology Arms Race 2021 | Mark Dowd 29
  • 31. Defensive Goals: Limit Compromise 2014 • Kernel code execution possible • Usermode code injection possible • Retrieve all data 2017 • Kernel read/write possible • Possible (but painful) to do kernel ROP • Usermode code injection possible • Some data inaccessible 2020 • Kernel restricted read/write • Kernel ROP largely infeasible • Usermode code injection requires additional vulnerability Security Technology Arms Race 2021 | Mark Dowd 30
  • 32. Defensive Goals: Limit Compromise Modern iPhone browser chain limitations • Largely requires phishing (not many MITM opportunities) • Can get limited access to kernel memory (no code execution) • Cannot inject into other processes without PPL bypass • Retaining access on reboot is very challenging Security Technology Arms Race 2021 | Mark Dowd 31
  • 33. Defensive Goals: Detection Defensive goals: 1) Raise the cost of offensive tooling 2) Limit damage of successful compromise 3) Detect successful compromise Security Technology Arms Race 2021 | Mark Dowd 32
  • 34. Defensive Goals: Detection Detection has historically been very poor • Figure out a signature, work around it Vendors have the advantage of scale to detect anomalies • Microsoft Defender for Endpoint • Google Threat Analysis Group (TAG) • A/V vendors (Kaspersky, FireEye, CrowdStrike) Security Technology Arms Race 2021 | Mark Dowd 33
  • 35. Defensive Goals: Detection Vendors have the advantage of scale to detect anomalies • Microsoft Defender for Endpoint • Google Threat Analysis Group (TAG) • A/V vendors (Kaspersky, FireEye, CrowdStrike) Security Technology Arms Race 2021 | Mark Dowd 34
  • 36. Defensive Goals: Detection Increasingly sophisticated APT kits discovered in the wild • Initially limited to desktop and server malware • Now, mobile malware discovered with increasing frequency From “In the wild” database by @maddiestone • 2018: 12 ITW bugs, all targeting Windows desktop (no Chrome) • By 2021: 5 Android, 7 Chrome, 7 iOS Security Technology Arms Race 2021 | Mark Dowd 35
  • 37. Power Inversion Offensive tooling slows down Defense speeds up Who will gain the upper hand? Security Technology Arms Race 2021 | Mark Dowd 36
  • 38. Future: Overview 1) Memory Corruption: Slowing Down 2) Beyond Memory Corruption 3) Thinking in Ecosystems Security Technology Arms Race 2021 | Mark Dowd 37
  • 39. Future: Overview 1) Memory Corruption: Slowing Down 2) Beyond Memory Corruption 3) Thinking in Ecosystems Security Technology Arms Race 2021 | Mark Dowd 38
  • 40. Future: Offense Slows Down Defense Advantage 1: Sandboxing is effective • Constrained to limited privileges • Might be able to break it periodically, but not continuously Security Technology Arms Race 2021 | Mark Dowd 39
  • 41. Future: Offense Slows Down Defense Advantage 2: CFI is increasingly effective to prevent execution • Example: iOS kernel • Expect other kernels/usermode to follow Security Technology Arms Race 2021 | Mark Dowd 40
  • 42. Future: Offense Slows Down THEN: Structure of a typical memory corruption exploit • Early-stage exploitation (stage 1): Initial corruption • Late-stage exploitation (stage 2): Introduce arbitrary code • Post-exploitation (stage 3): Payload Security Technology Arms Race 2021 | Mark Dowd 41
  • 43. Future: Offense Slows Down NOW: Structure of a typical memory corruption exploit • Early-stage exploitation (stage 1): Initial corruption • Late-stage exploitation (stage 2): Get arbitrary memory read/write • Post-exploitation (stage 3): Payload Security Technology Arms Race 2021 | Mark Dowd 42
  • 44. Future: Offense Slows Down NOW: Structure of a typical memory corruption exploit • Early-stage exploitation (stage 1): Initial corruption • Late-stage exploitation (stage 2): Get arbitrary memory read/write • Post-exploitation (stage 3): Payload Data-only attacks are here, and growing Security Technology Arms Race 2021 | Mark Dowd 43
  • 45. Future: Offense Slows Down Defense Advantage 3: Data Pointer Integrity (DPI) has landed* • iOS data PAC • MTE will likely follow on multiple platforms * I made up that acronym, there will probably be a better one soon Security Technology Arms Race 2021 | Mark Dowd 44
  • 46. Future: Offense Slows Down • Structure of a typical memory corruption exploit • Early-stage exploitation (stage 1): Initial corruption • Late-stage exploitation (stage 2): Introduce arbitrary code • Post-exploitation (stage 3): Payload Security Technology Arms Race 2021 | Mark Dowd 45
  • 47. Future: Offense Slows Down Most early stage mitigations are limited to 1 or 2 bug classes • Render some vulnerabilities useless Data PAC and MTE are game changers • Early stage mitigation that (potentially) applies to everything • Severely curtail most current exploit techniques • Will take another 2-3 years to really be in full effect Security Technology Arms Race 2021 | Mark Dowd 46
  • 48. Defense Accelerates: Mitigations Possible: Microarchitectural flaws potentially an effective bypass for PAC/MTE-like mitigations • Large upswing in side channel vulnerabilities to disclose secrets across security boundaries • Example: BlindSide • Proven to be possible via browsers • Example: Prime+Probe 1 (w/o JavaScript!) 47 VUSec Systems Security Research Group at VU University Amsterdam. (2020, October 7). BlindSide. VUSec. https://www.vusec.net/projects/blindside/ Shusterman, A. et al. “Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses.” ArXiv abs/2103.04952 (2021): n. pag.
  • 49. Defense Accelerates: Mitigations Defensive Advantage: Detection of compromise becomes easier • If telemetry runs with more privileges that offensive tooling can obtain, it is harder to evade 48 Security Technology Arms Race 2021 | Mark Dowd
  • 50. Future: Beyond Memory Corruption 1) Memory Corruption: Slowing Down 2) Beyond Memory Corruption 3) Thinking in Ecosystems Security Technology Arms Race 2021 | Mark Dowd 49
  • 51. Defense Accelerates: Mitigations Are memory corruption exploits on borrowed time? • I say: Yes (but admittedly, I have been saying that since 2004) Prediction (re-asserted): Exploitable memory corruption will become the exception, not the rule! Security Technology Arms Race 2021 | Mark Dowd 50
  • 52. Future: Beyond Memory Corruption Historically, memory corruption is the favoured technique • Applicable to most technologies and attack vectors • Often most powerful (unfettered access to function and data) • Difficult to detect and stop Is this still true? Security Technology Arms Race 2021 | Mark Dowd 51
  • 53. Future: Beyond Memory Corruption Now, memory corruption as a technique has weaknesses: • Limited access due to CFI/CPI might mean it is not more powerful than other types of vulnerabilities • Also they are the most expensive to create and maintain What are the likely targets for offensive research to pivot to? Security Technology Arms Race 2021 | Mark Dowd 52
  • 54. Future: Beyond Memory Corruption Vulnerability Type 1: Cryptography Flaws • Cryptography underpins nearly all current security technology in one form or another in every layer of the technology stack • Encrypted comms • Authentication / authorization (certificates) • Code signing and updates • PAC Security Technology Arms Race 2021 | Mark Dowd 53
  • 55. Future: Beyond Memory Corruption Potential to: • Eavesdropping and payload delivery (browser/chat) • Spoofing and impersonation • Bypassing code signing and trusted boot • Introducing “evil” upgrades • Defeating some mitigations Crypto flaws are king! Security Technology Arms Race 2021 | Mark Dowd 54
  • 56. Future: Beyond Memory Corruption Recent examples • Orange Tsai’s Exchange RCE bugs • NSA’s Microsoft Certificate vulnerability (CVE-2020-0601) • Tom Tervoort’s ZeroLogon flaw (CVE-2020-1472) Prediction: Crypto vulnerability research will be critical components of most offensive tools in several years 55 Tsai, O., & Æ. (2021, August 1). A New Attack Surface on MS Exchange Part 1 - ProxyLogon! Orange. https://blog.orange.tw/2021/08/proxylogon-a-new- attack-surface-on-ms-exchange-part-1.html
  • 57. Future: Beyond Memory Corruption Vulnerability Type 2: Web Technology Flaws Web technology flaws are increasingly relevant in the offensive tooling space > As noted by security experts Security Technology Arms Race 2021 | Mark Dowd 56
  • 58. Future: Beyond Memory Corruption Security Technology Arms Race 2021 | Mark Dowd 57
  • 59. Future: Beyond Memory Corruption Web technology flaws are increasingly relevant in the offensive tooling space • Exchange Server RCE via SSRF by Orange Tsai • “Pwning iOS 14 with Generation Z Bugz” by Zhi Zhou, Jundong Xie 58 Tsai, O., & Æ. (2021, August 1). A New Attack Surface on MS Exchange Part 1 - ProxyLogon! Orange. https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange- part-1.html Zhi Zhou, & Jundong Xie. (2021, August). Hack Different: Pwning iOS 14 with Generation Z Bugz. Black Hat USA, Las Vegas, NV. https://i.blackhat.com/USA21/Wednesday-Handouts/us-21- Hack-Different-Pwning-IOS-14-With-Generation-Z-Bug-wp.pdf
  • 60. Future: Beyond Memory Corruption Vulnerability Type 3: Protocol Attacks • Revisiting and examining new network protocol attacks has potential, particularly when coupled with other flaws Security Technology Arms Race 2021 | Mark Dowd 59
  • 61. Future: Beyond Memory Corruption Potential: • Identity spoofing • Crossing trust domains • Accessing sensitive data or functionality Security Technology Arms Race 2021 | Mark Dowd 60
  • 62. Future: Beyond Memory Corruption We have seen data-only attacks, what about function-only attacks? • Favourite: Natalie Silvanovich’s chat app shredding 61 Silvanovich, N. (2021, August 25). The State of State Machines. Https://Googleprojectzero.Blogspot.Com/2021/01/the-State-of-State-Machines.Html. https://googleprojectzero.blogspot.com/2021/01/the-state-of-state-machines.html
  • 63. Future: Thinking in Ecosystems 1) Memory Corruption: Slowing Down 2) Beyond Memory Corruption 3) Thinking in Ecosystems Security Technology Arms Race 2021 | Mark Dowd 62
  • 64. Future: Thinking in Ecosystems One of offense’s initial advantages was the reliance on legacy design principles for secure computing Is offense starting to incur a similar cost? Security Technology Arms Race 2021 | Mark Dowd 63
  • 65. Future: Thinking in Ecosystems Offensive tools are often written to be deployed based on various assumptions • Most interesting traffic is on an open and distributed internet • Traffic is observable and modifiable • Compromising a device implies full, unfettered access • Code can be introduced at will • All data on a device can be recovered • A/V and APT hunters are not sophisticated Most of these assumptions are now false Security Technology Arms Race 2021 | Mark Dowd 64
  • 66. Future: Thinking in Ecosystems The Internet is balkanized: geographically, politically, commercially • Eg WeChat, Parler, Facebook, Google, Amazon, Apple, HarmonyOS • Most interesting data is encrypted and contained in private ecosystems • A lot of code/infrastructure traditionally hosted in-house is outsourced to Google etc Security Technology Arms Race 2021 | Mark Dowd 65
  • 67. Defense Life Cycle: Mitigations Devices participate in one or more ecosystems now • Apple devices -> Apple ecosystem • Android -> Google ecosystem • Secondary clouds: Facebook, WeChat, etc Do these ecosystems represent a significant attack surface? • Potential to move laterally • Persist across upgrades/resets Security Technology Arms Race 2021 | Mark Dowd 66
  • 68. Future: Thinking in Ecosystems Presents some unique political and legal challenges • Who is allowed to do that? • Not NSO, apparently • If off-limits to LEO/local intel, guess who that leaves? • Adversary nations, criminals 67 Shu, C. (2020, July 16). Federal court rules WhatsApp and Facebook’s malware exploit case against NSO Group can proceed. Https://Techcrunch.Com/2020/07/16/Federal- Court-Rules-Whatsapp-and-Facebooks-Malware-Exploit-Case-against-Nso-Group-Can-Proceed/.
  • 69. Future: Thinking in Ecosystems Prediction: Future offensive chains will be “ecosystem aware” Some advantages here for offense, but defense has the ability to do sophisticated anomaly detection • Benefit from large scale data sets and common usage patterns • Dino Dai Zovi notes this in his SummerCon 2021 talk DaiZavi, D. (2021). Dr Strangecode: Or How I Stopped Worrying and Learned to Love the Cloud. In Summercon. 68
  • 70. Summary 1) Memory corruption is still the most effective strategy for offense, but it’s advantages are eroding 2) Increasingly, offense will replace memory corruption components with other logic flaws 3) Defensive profits by improved detection facilities as a result of less powerful offensive toolkits, and moving to the cloud The old adage “Defense needs to be right every time, offense only needs to be right once” will possibly be inverted! Security Technology Arms Race 2021 | Mark Dowd 69
  • 71. Thank You for Joining Us Join our Discord channel to discuss more or ask questions https://discord.gg/dXE8ZMvU9J