Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

Searching For Evil
Topic: Computer Security 5:25 pm EDT, Aug 30, 2007

Ross Anderson gave a TechTalk last week.

Computer security has recently imported a lot of ideas from economics, psychology and sociology, leading to fresh insights and new tools.

I will describe one thread of research that draws together techniques from fields as diverse as signals intelligence and sociology to search for artificial communities.

Evildoers online divide roughly into two categories - those who don't want their websites to be found, such as phishermen, and those who do. The latter category runs from fake escrow sites through dodgy stores to postmodern Ponzi schemes. A few of them buy ads, but many set up fake communities in the hope of having victims driven to their sites for free. How can these reputation thieves be detected?

Some of our work in security economics and social networking may give an insight into the practical effects of network topology. These tie up in various ways with traffic analysis, long used by the signals intelligence agencies which trawl the airwaves and networks looking for interesting targets. I'll describe a number of dubious business enterprises we've unearthed.

Recent advances in algorithms, such as Newman's modularity matrix, have increased the robustness of covert community detection. But much scope remains for wrongdoers to hide themselves better as they become topologically aware; we can expect attack and defence to go through several rounds of coevolution.

I'll therefore end up by talking about some strategic issues, such as the extent to which search engines and other service providers could, or should, share information in the interests of wickedness detection.

Searching For Evil


Microsoft Forges 'Pact' With Cyberwarriors Worldwide
Topic: Computer Security 6:19 am EDT, Aug  7, 2007

Multinational corporations have foreign policies, and the "home" country doesn't necessarily get special treatment:

In an effort to curb distrust, in 2003 Microsoft signed a pact with China, Russia, the United Kingdom, NATO and other nations to let them see the Windows source code.

A few thoughts:

1) Possession of source code has limited defensive value unless you actually build your software from that source. Based on press reports the agreement does not facilitate local compilation.
2) Is it really feasible for a third party to audit the Vista source? The people involved seem to think so, or are at least making a show of it. I am dubious.
3) The utility of this 'pact' would seem to be substantially offensive.

Consider:

Microsoft has reportedly signed a new government security program source code agreement with China Information Technology Security Certification Center, allowing CNITSEC and other approved institutions to look over the source code and relevant technical data of Microsoft's products, including Windows Vista ,so as to improve their evaluation on the security of Microsoft products. The agreement is an important part of the MOU signed between National Development and Reform Commission and Microsoft in April 2006.

Microsoft's Government Security Program helps government departments and international organizations evaluate the security of Microsoft products. CNITSEC previously signed an agreement with Microsoft on security source code in February 2003 and was authorized to check over the company's major source code and technical data.

From 2003:

According to sources at the software company, China is the eighteenth nation to sign such an agreement to view Microsoft's proprietary source code.

Surely the number has grown since then.

Craig Mundie's doublespeak:

This program is an integral element of our efforts to help address the unique security requirements of governments.

Microsoft Forges 'Pact' With Cyberwarriors Worldwide


flayer - Taint analysis and flow alteration tool
Topic: Computer Security 8:41 pm EDT, Aug  6, 2007

This is the Google project that was presented at WOOT.

Flayer is a Valgrind tool which provides bit-precise dynamic taint analysis of input to a target application. In addition, it allows this flow to be altered irrespective of content through the modification of conditional jump (if clauses) and function call behavior.

In addition, a small, Python wrapper library, LibFlayer, is included. It provides an easy interface for automation.

This is a proof of concept implementation, but it is fully functional. Please check it out!

flayer - Taint analysis and flow alteration tool


Terminus: the End of the Line for DDoS
Topic: Computer Security 2:18 pm EDT, Aug  2, 2007

Denial-of-Service attacks continue to grow despite the fact that a large number of solutions have been proposed in the literature.

The problem is that few are actually practical for real-world deployment and have incentives for early adopters.

We present Terminus, a simple, effective and deployable network-layer architecture against DoS attacks that allows receivers to request that undesired traffic be filtered close to its source.

In addition, we describe our implementation of each of the architecture’s elements using inexpensive off-the-shelf-hardware, and show that we can filter very large attacks in a matter of seconds while still sustaining a high forwarding rate even for minimum-sized packets.

We conclude by discussing initial deployment incentives.

Terminus: the End of the Line for DDoS


Latest Issue of IEEE Security & Privacy
Topic: Computer Security 9:36 am EDT, Aug  2, 2007

Subscription required for access to full text of most articles, but I wanted to point out a couple of articles that you might find it worthwhile to track down:

What Hackers Learn that the Rest of Us Don't: Notes on Hacker Curriculum

The hacker culture has accumulated a wealth of efficient practices and approaches to computer technologies -- in particular, to analysis, reverse engineering, testing, and software and hardware modification -- that differ considerably from those of both the IT industry and traditional academia.

The above article references the article by Greg Conti that appears in the same issue as Academic freedom and the hacker ethic. It also references a book by Jonathan Rosenberg, How Debuggers Work.

The End of Black and White, by Dan Geer

It's no longer just black hats or white hats in computer security. The more someone has to lose, the less likely they should be to trust the computer. It means that all people, all programs, all transactions are shades of grey. Black and white are just a memory.

This one appears to be freely available:

Estimating Software Vulnerabilities

Any given piece of software has some number of publicly disclosed vulnerabilities at any moment, leaving the system exposed to potential attack. A method for identifying and analyzing these vulnerabilities uses public data from easily accessible sources.

Latest Issue of IEEE Security & Privacy


Web 2.0 is vulnerable to attack
Topic: Computer Security 5:09 pm EDT, Apr  2, 2007

Comments from the local experts?

Fortify Software, which said it discovered the new class of vulnerability and has named it "JavaScript hijacking", said that almost all the major Ajax toolkits have been found vulnerable.

There's no mention of Jitko either here or in the Slashdot story.

Web 2.0 is vulnerable to attack


Why Information Security is Hard
Topic: Computer Security 10:06 am EDT, Mar 26, 2007

This Ross Anderson paper from 2001 is worth (re-)reading. I'd be interested in any pointers to further reading along these lines.

I particularly liked this quote, from the French economist Jules Dupuit in 1849:

It is not because of the few thousand francs which would have to be spent to put a roof over the third-class carriage or to upholster the third-class seats that some company or other has open carriages with wooden benches ... What the company is trying to do is prevent the passengers who can pay the second-class fare from traveling third class; it hits the poor, not because it wants to hurt them, but to frighten the rich ... And it is again for the same reason that the companies, having proved almost cruel to the third-class passengers and mean to the second-class ones, become lavish in dealing with first-class customers. Having refused the poor what is necessary, they give the rich what is superfluous.

Here's the abstract of the paper:

According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and better tools for system evaluation and assurance, the problems can be solved.

In this note, I put forward a contrary view: information insecurity is at least as much due to perverse incentives. Many of the problems can be explained more clearly and convincingly using the language of microeconomics: network externalities, asymmetric information, moral hazard, adverse selection, liability dumping and the tragedy of the commons.

Anderson has been working this theme over the past several years; his latest paper is The Economics of Information Security - A Survey and Open Questions.

Why Information Security is Hard


Security Absurdity; The Complete, Unquestionable, And Total Failure of Information Security.
Topic: Computer Security 12:41 pm EST, Nov 29, 2006

A long-overdue wake up call for the information security community.

This popped up on Slashdot recently. I'm curious to get feedback from the security experts here at Memestreams.

Security Absurdity; The Complete, Unquestionable, And Total Failure of Information Security.


The Eavesdropper's Dilemma - Matt Blaze et al... [PDF]
Topic: Computer Security 8:01 pm EDT, Oct 26, 2006

This work was previously reported on Memestreams back in November 2005, when Markoff wrote about in NYT. There must be some reason why it is being revisited now, but it may not be publicly obvious. One presumes that it came up during the Here's Looking at You... session at Phreaknic. (Is there a slide presentation for that?)

This paper examines the problem of surreptitious Internet interception from the eavesdropper’s point of view. We introduce the notion of ‘fidelity” in digital eavesdropping. In particular, we formalize several kinds of “network noise” that might degrade fidelity, most notably “confusion,” and show that reliable network interception may not be as simple as previously thought or even always possible. Finally, we suggest requirements for “high fidelity” network interception, and show how systems that do not meet these requirements can be vulnerable to countermeasures, which in some cases can be performed entirely by a third party without the cooperation or even knowledge of the communicating parties.

For practical results in real-world systems, see the authors' IEEE article, Signaling Vulnerabilities in Wiretapping Systems, in which this paper is reference #11.

In a separate work [11], we formalized the concepts of evasion and confusion as eavesdropping countermeasures and identified the “eavesdropper’s dilemma” as a fundamental trade-off in certain interception architectures.

The Eavesdropper's Dilemma - Matt Blaze et al... [PDF]


Computer System Under Attack
Topic: Computer Security 9:54 am EDT, Oct  7, 2006

"It has become clear that Internet access in itself is a vulnerability that we cannot mitigate. We have tried incremental steps and they have proven insufficient."
    -- Undersecretary of Commerce Mark Foulon

Computer System Under Attack


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0