2014 - Issue #05
Each issue of the SoS Newsletter highlights achievements in current research, as conducted by various global members of the Science of Security (SoS) community. All presented materials are open-source, and may link to the original work or web page for the respective program. The SoS Newsletter aims to showcase the great deal of exciting work going on in the security community, and hopes to serve as a portal between colleagues, research projects, and opportunities.
Please feel free to click on any issue of the Newsletter, which will bring you to their corresponding subsections:
General Topics of Interest
General Topics of Interest reflects today's most popularly discussed challenges and issues in the Cybersecurity space. GToI includes news items related to Cybersecurity, updated information regarding academic SoS research, interdisciplinary SoS research, profiles on leading researchers in the field of SoS, and global research being conducted on related topics.
Publications
The Publications of Interest provides available abstracts and links for suggested academic and industry literature discussing specific topics and research problems in the field of SoS. Please check back regularly for new information, or sign up for the CPSVO-SoS Mailing List.
Table of Contents (Issue 5)
(ID#:14-2624)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
This section features topical, current news items of interest to the international security community. These articles and highlights are selected from various popular science and security magazines, newspapers, and online sources.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
"Only 100 cybercrime brains worldwide says Europol boss", BBC News, 10 October 2014. Head of Europol's Cyber Crime Center, Troels Oerting, advises law enforcement to focus on the relatively small number of true cybercriminals. Of only about 100 cybercriminal kingpins, Oerting says that a large number originate from Russian-speaking countries. (ID# 14-70000) See http://www.bbc.com/news/technology-29567782
"Criminals use Tyupkin Malware to empty ATMs of cash", PC Magazine Security Watch, 12 October 2014. ATMs across Russia, Europe, United States, India, and China have been infected with malware that allows attackers to drain cash from infected machines. Kaspersky Lab researchers report that the Tyupkin malware, which infects ATMs via bootable CDs, was only active in the late hours of Sundays and Mondays, in order to evade detection. (ID# 14-70001) See http://securitywatch.pcmag.com/malware/328362-criminals-use-tyupkin-malware-to-empty-atms-of-cash
"Russian 'Sandworm' hack has been spying on foreign governments for years", Wired, 14 October 2014. A cyberespionage campaign has been dubbed "Sandworm", and is believed to have targeted government, energy and telecommunication companies, and defense entities since 2009. The zero-day vulnerability used in Sandstorm utilizes malicious PowerPoint e-mail attachments, which installs an executable for opening backdoors. (ID# 14-70002) See http://www.wired.com/2014/10/russian-sandworm-hack-isight/
"Governments and businesses harvest voices", Channel Eye, 14 October 2014. Biometric-based security systems are made possible with help from companies like AGNITio, based in Madrid. Over 65 million voiceprints have been entered into corporate and government databases by such companies, with UK-based banking titan, Barclays, exploring the technology's capabilities to authenticate affluent clients. (ID# 14-70003) See http://channeleye.co.uk/governments-and-businesses-harvest-voices/
"China takes cyber war to Australia", SC Magazine UK, 14 October 2014. According to security firms FireEye/Mandiant and Context Information Security, Chinese hackers recently unleashed APT attacks on Australian mining and natural resource firms, as well as law firms with access to merger and acquisition details. A suspected state-sponsored attack, activity was observed only during Australian business hours in order to avoid detection. However, activity ceased significantly during Chinese public holidays. See http://www.scmagazineuk.com/china-takes-cyber-war-to-australia/article/377065/
"Two patched zero days targeting Windows Kernel", Threat Post, 15 October 2014. Two vulnerabilities designed to escalate privileges have been patched, says FireEye. The first flaw (CVE-2014-4148) embeds malicious Windows True Type Font (TTF) in a Microsoft Office file, which processes in kernel mode upon opening of the file. The second flaw (CVE-2014-4113) involves a remote system attack to access Windows Kernel. The two vulnerabilities were somewhat overshadowed by Sandworm. (ID# 14-70004) See http://threatpost.com/two-patched-zero-days-targeting-windows-kernel/108860
"China is already spying on Apple iCloud users, watchdog claims", The Register UK, 20 October 2014. Man-in-the-middle attacks on SSL connections to iCloud began during Apple's iPhone 6 release in China. Experts say Chinese state hackers intercepted connections to iCloud by using self-signed SSL certificates in place of Apple's. Firefox and Chrome will detect the false certificate, but the popularly used Chinese browser, 360 Secure Browser, will not. (ID# 14-70005) See http://www.theregister.co.uk/2014/10/20/watchdog_warns_chinese_government_is_already_hacking_apples_icloud/
"Most cloud apps flout EU data protection rules -- study", The Register UK, 21 October 2014. In a study by Skyhigh Networks, 72 per cent of cloud services most used by European corporations would be considered noncompliant under the proposed Data Protection Directive. Though not yet approved, the EU Data Protection regulations are sorely needed in many European organizations, as evidenced by lax security requirements in current operation. (ID# 14-70006) See http://www.theregister.co.uk/2014/10/21/skyhigh_data_protection_risks_survey/
"UK tops list of countries most under threat from cyber attack", IT Pro Portal, 20 October 2014. Security firm FireEye has concluded that the UK is most under threat from cyber-attacks, with Germany and Saudi Arabia not far behind. FireEye analyzed Advanced Persistent Threats (APTs) occurring in the first six months of 2014, observing attempts and targets. Findings confirm that Spain, Sweden, and France are the least attacked. (ID# 14-70007) See http://www.itproportal.com/2014/10/20/uk-tops-list-of-countries-most-under-threat-from-cyber-attack/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+itproportal%2Frss+(Latest+ITProPortal+News)
"China refutes new FBI hacking claims", SC Magazine UK, 20 October 2014. Sino-US Internet Working Group activity has halted as relations between the US and China continue to be strained. In May, US FBI charged five purported members of the Chinese People's Liberation (PLA) with hacking crimes against US companies. See http://www.scmagazineuk.com/china-denies-new-fbi-hacking-claims/article/378095/2/
"IAF asks personnel not to use Xiaomi phones", The Times of India, 24 October 2014. Chinese-manufactured Xiaomi Redmi 1s phones are suspected of transferring personal user data to servers in China. According to tests conducted by F-secure, a security solution company, the Xiaomi Redmi phones were forwarding information such as phone numbers, device identifiers, contact numbers, and text messages back to China. (ID# 14-70008) See http://timesofindia.indiatimes.com/india/IAF-asks-personnel-not-to-use-Xiaomi-phones/articleshow/44926994.cms
"Keyless cars 'increasingly targeted by thieves using computers'", BBC News, 27 October 2014. According to the Society of Motor Manufacturers and Traders (SMMT), organized criminal groups are targeting luxury cars that popularly use keyless entry and ignition. Attackers reprogram remote-entry keys in order to gain access to the car, often by purchasing software available online. (ID# 14-70009) See http://www.bbc.com/news/technology-29786320
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
"Snapchat: Our servers were not breached in the 'Snappening', blame 3rd Party apps", TechCrunch, 10 October 2014. Some 200,000 photos belonging to Snapchat app users have been leaked. Dubbed "The Snappening", in reference to the recent celebrity nude photo leak, this latest privacy breach has users outraged and seeking explanations from Snapchat. Snapchat has denied a breach on their part. (ID# 14-70017) See http://techcrunch.com/2014/10/10/snapchat-our-servers-were-not-breached-in-the-snappening-blame-3rd-party-apps/
"DEFCON router hacking contest reveals 15 major vulnerabilities", Electronic Frontier Foundation, 7
October 2014. "SOHOpelessly Broken" DEFCON hacking contest highlights security vulnerabilities in home routers. Results indicated that discovered vulnerabilities are not limited to any one company, but rather affects nearly all router manufacturers. (ID# 14-70018) See https://www.eff.org/deeplinks/2014/08/def-con-router-hacking-contest-success-fun-learning-and-profit-many
"Signaling post-Snowden era, new iPhone locks out NSA", The New York Times, 26 September 2014. Apple promises encryption-by-default for the new iPhone 6, with each device creating its own individual code independent of Apple's interference - or anyone else's. FBI director, James Comey, criticizes the change as enabling users to operate above the law. Google's Android, which has already provided optional encryption for three years prior to the iPhone 6, will release encryption-by-default for its next version. (ID# 14-70019) See http://www.nytimes.com/2014/09/27/technology/iphone-locks-out-the-nsa-signaling-a-post-snowden-era-.html
"HP accidentally signed malware, will revoke certificate", Arstechnica, 10 October 2014. A digital certificate, used to sign software such as hardware drivers, is being revoked. HP was alerted that its certificate had been used to sign malware, a Windows Trojan that had infected an HP employee's PC. The revocation forces HP to re-issue software packages with a new digital signature. (ID# 14-70020) See http://arstechnica.com/security/2014/10/hp-accidentally-signed-malware-will-revoke-certificate/
"Dairy Queen confirms breach, Backoff malware intrusion at 395 US stores", SC Magazine, 10 October 2014. Systems at one Orange Julius and 395 Dairy Queen locations have been compromised, affecting customer payment information. The company has issued a statement saying no other personal information, such as SSNs or PINs, appears to have been compromised. The malware, Backoff, infects point-of-sale (POS) devices through brute-forcing the log-in feature of remote desktop software. (ID# 14-70021) See http://www.scmagazine.com/backoff-malware-infected-395-dairy-queen-locations-and-one-orange-julius/article/376735/
"Mobile Threat Monday: thousands of fake apps impersonate Facebook, Twitter, and more", PC Magazine Security Watch, 13 October 2014. 15,000 fake social networking apps have been discovered between January and August of 2014, Cheetah Mobile Threat Labs reports. Facebook, WhatsApp, and Twitter make up the three most popular copycats. These malicious clones target the user's personal information, and often times will charge premium SMS fees to the user's phone bill. (ID# 14-70022) See http://securitywatch.pcmag.com/mobile-security/321890-mobile-threat-monday-android-app-steals-text-messages-and-calls
"Android 5.0 (Lollipop) represents a leap forward in security terms", SC Magazine UK, 16 October 2014. Encryption by default is here for Android! The new update gives several bolstered nods to security, including a remote 'kill switch' to render stolen phones useless, Security-Enhanced Linux (SELinux), and a smart lock securing devices by Bluetooth. (ID# 14-70023) See http://www.scmagazineuk.com/android-50-lollipop-represents-a-leap-forward-in-security-terms/article/377586/2/
"Study: Average cost of U.S. cybercrime rises to $12.7 million in 2014", SC Magazine, 08 October 2014. The average cost of a cybercrime incident rose from 11.56 million USD in 2013 to 12.7 million in 2014. Though one might attribute this to a lack of security efforts on the part of businesses, this trend might actually indicate the opposite: as businesses develop better security methods, criminals have to find craftier ways to attack, which then causes businesses to have to spend more money on stopping increasingly sophisticated attacks. (ID: 14-50134) See http://www.scmagazine.com/cost-of-cybercrime-continues-to-increase-this-year/article/376035/
"ATM malware 'Tyupkin' found on over 50 machines in Europe, spreads to U.S.", SC Magazine, 07 October 2014. A strain of ATM malware known as "Tyupkin" has been used to steal millions of dollars from 32-bit Windows-based ATM machines in Eastern Europe, and has also spread to other continents. Tyupkin uses advanced methods to prevent detection, and has evolved to employ more and more evasion techniques since it was first discovered, according to Kaspersky Labs. (ID: 14-50135) See http://www.scmagazine.com/new-tyupkin-malware-has-spread-to-atms-in-the-us-and-other-countries/article/375948/
"Group infects more than 500K systems, targets banking credentials in U.S.", SC Magazine, 07 October 2014. Proofpoint security researchers identified a cybercrime group, which appears to be Russian, that has been using "Qbot" malware to sniff communications and extract banking credentials. The attackers have infected over 500,000 unique systems, with about 75% of the two million unique IP's sniffed being U.S.-based. (ID: 14-50136) See http://www.scmagazine.com/banking-credentials-targeted-by-russian-cybercrime-group/article/375914/
"Bash bug payload downloads KAITEN DDoS malware source code", SC Magazine, 06 October 2014. Researchers at Trend Micro have been monitoring a bash bug payload, TROJ_BASHKAI.SM, that utilized the Bash Bug (a.k.a. Shellshock) to download KAITEN malware onto vulnerable systems. Once a system has been infected, KAITEN can be used to remotely perform DDoS attacks and bring down a targeted organization. (ID: 14-50137) See http://www.scmagazine.com/bash-bug-payload-downloads-kaiten-malware/article/375650/
"Chase breach affects 76 million accounts, raises questions about detection failure", SC Magazine, 03 October 2014. After 76 million JPMorgan Chase customers had their contact information stolen in a breach that lasted months, the financial institution assured that no highly sensitive information was stolen. In accordance with a troubling trend of recent data breaches, user identity was the main vehicle of attack, which can make detection very hard. (ID: 14-50138) See http://www.scmagazine.com/the-chase-breach-lasted-for-two-months-and-impacted-76-million-household-accounts-and-seven-million-business-accounts/articl...
"FDA presents guidelines for medical device security", 02 October 2014. The FDA released a set of guidelines for medical device manufacturers on how to ensure security for medical devices and patient health data. During the design and development of medical devices, techniques such as multi-factor authentication, user privileges, and security compromise identification are should be observed by manufacturers. (ID: 14-50139) See http://www.scmagazine.com/the-food-and-drug-administration-offered-guidance-for-securing-medical-devices/article/375127/
"Dairy Queen Dipped with Backoff Malware Breach", Infosecurity Magazine, 10 October 2014. Some time between August and September, Backoff malware was used to steal names, payment card numbers, and payment card expirations dates from around 600,000 Dairy Queen customers. DQ has stated that it believes the malware has been contained, as is offering identity-repair services to customers. Over 1,000 U.S. businesses have been the victim of Backoff, including UPS and Supervalu. (ID: 14-50140) See http://www.infosecurity-magazine.com/news/dairy-queen-dipped-with-backoff/
"JPMorgan Hackers Go After 13 More Financial Institutions", Infosecurity Magazine, 10 October 2014. The same hackers that are responsible for the JPMorgan Chase attack (see ID: 14-50138) are suspected to be behind a possible attacks on thirteen other financial institutions. These attacks are part of a growing trend: through persistent, targeted attacks, hackers can gain privileged user credentials. Techniques like network segmentation can reduce the harm done by such attacks, but implementing these solutions is often difficult. (ID: 14-50141) See http://www.infosecurity-magazine.com/news/jpmorgan-hackers-go-after/
"AT&T Hit by Another Insider Breach", Infosecurity Magazine, 10 October 2014. A now ex- AT&T employee accessed sensitive user data, including Customer Proprietary Network Information (CPNI), driver's license numbers, and Social Security numbers without authorization. The telecom giant has sent an apology to customers who were affected. AT&T has been plagued by similar incidents in the past, including an incident in June where a worker was "apparently looking to generate codes that unlock devices." (ID: 14-50142) See http://www.infosecurity-magazine.com/news/att-mobile-warns-about-data-breach/
"Massive Qbot Botnet strikes 500,000 Machines Through WordPress", Infosecurity Magazine, 08 October 2014. Researchers believe that cybercriminals were able to use compromised WordPress accounts to compromise websites, and use those websites to download the "Qbot" dropper and other malware onto victim's computers. This malware is then used to steal banking credentials, of which it is estimated to have stolen hundreds of thousands. (ID: 14-50143) See http://www.infosecurity-magazine.com/news/massive-qbot-strikes-500000-pcs/
"New Mac Malware Uses Reddit to Communicate", Infosecurity Magazine, 03 October 2014. Researchers have identified an instance of malware that uses the popular internet site reddit.com to communicate with a command and control server. Mac.BackDoor.iWorm, as it is known, targets Macintosh computers primarily in English-speaking countries. What iWorm does with the victim's computer is not known as of the date of publication. (ID: 14-50144) See http://www.infosecurity-magazine.com/news/new-mac-malware-uses-reddit-to/
"Kmart hacked, customers' card numbers exposed", Computerworld, 10 October 2014. Sears Holding Corporation announced that malware was found to have infected payments systems at its Kmart retail stores. The malware has been removed, according to Sears, but was able to steal customer's payment card numbers since the beginning of the breach in early September. (ID: 14-50145) See http://www.computerworld.com/article/2824758/kmart-hacked-customers-card-numbers-exposed.html
"Snapchat denies it was hacked", Computerworld, 10 October 2014. Users of internet image-board 4chan obtained photos that were stolen from a massive Snapchat database by hackers, and allegedly plan to make a searchable database of the stolen content. Snapchat denies it was hacked, citing malicious third-party apps as the source of any "stolen" photos. (ID: 14-50146) See http://www.computerworld.com/article/2824626/snapchat-denies-it-was-hacked.html
"Symantec's board votes to split the company in two", Computerworld, 09 October 2014. Prominent IT security company Symantec decided to split into two independent entities, with one being dedicated to security and the other to information management. Top management cited the fact that both fields require "distinct strategies", so splitting the company will allow each half to better focus on its task. The split will take place over the course of the next year. (ID: 14-50147) See http://www.computerworld.com/article/2824180/symantecs-board-votes-to-split-the-company-in-two.html
"Microsoft researchers create a secure haven in the cloud", Computerworld, 09 October 2014. By utilizing two new tools for managing private memory and "sandboxing" applications in a virtual machine, Microsoft has developed a tool for keeping cloud applications secure. Haven, as it is called, protects applications by using "shielded execution": it acts as a barrier between applications and the computer systems that run them. (ID: 14-50148) See http://www.computerworld.com/article/2824364/microsoft-researchers-create-a-secure-haven-in-the-cloud.html
"Forensic software extracts iPhone data n even with iOS 8 encryption", GCN, 08 October 2014. Despite efforts to improve encryption in iOS 8, computer forensics and password recovery firm Passware, Inc. announced that its Passware Kit Forensic tool can acquire "call, messaging and browsing history, photos and videos, contacts and applications" from Apple devices from iCloud, as long as the Apple ID credentials are known. (ID: 14-50149) See http://gcn.com/articles/2014/10/08/passware-ios-forensics.aspx?admgarea=TC_SecCybersSec
"Cyberattacks trigger talk of ehacking backi", Washington Post, 09 October 2014. The idea of "hacking back" or "active defense" as a means of thwarting cybercriminals has always been generally frowned upon because of its risks and legal implications of retaliation. With large-scale damage caused by cyber attacks becoming increasingly common, however, some are warming up to the idea. (ID: 14-50150) See http://www.washingtonpost.com/business/technology/cyberattacks-trigger-talk-of-hacking-back/2014/10/09/6f0b7a24-4f02-11e4-8c24-487e92bc997b_story.html
"Paper: Great promise for online voting if security, verification challenges met", FierceGovernmentIT, 08 October 2014. The strict nature of voting security, accuracy, and anonymity make implementation of online voting a challenge, but when successful, online voting can cut costs and increase turnouts. Weaknesses in the security of online polling systems have very strong implications, making proper security measures a necessity. (ID: 14-50151) See http://www.fiercegovernmentit.com/story/paper-great-promise-online-voting-if-security-verification-challenges-met/2014-10-08
"Only top legislators informed of White House computer attack", Reuters, 30 October 2014. After a White House computer network was attacked in early October, only a small group of congressional leaders were initially notified because of the unusually sensitive nature of the attack. This group, known as the "Gang of Eight", normally serves the purpose of keeping Congress informed about "covert actions" by the CIA and other agencies. (ID: 14-50152) See http://www.reuters.com/article/2014/10/30/us-usa-whitehouse-cybersecurity-idUSKBN0IJ1YJ20141030
"Cyber breaches put 18.5 million Californians' data at risk in 2013: report", Reuters, 28 October 2014. 18.5 million Californians had their personal records put at risk by cyber breaches in 2013, a number seven times higher than the previous year, according to a report by the state attorney general. A 28 percent increase in data breaches, as well as the exposure of 7.5 million records from only the largest cyber intrusions, are to blame. (ID: 14-50153) See http://www.reuters.com/article/2014/10/29/us-usa-cybercrime-california-idUSKBN0IH27Y20141029
"Russia ruled out as culprit in Chase cyber security breach, U.S. officials say", Reuters, 02 October 2014. The FBI and Secret Service announced that Russia has been ruled out as the culprit for the Chase cyber security breach, citing non-state-sponsored cyber-criminals as the most likely culprits. It was initially feared that the attacks were in response to U.S. economic sanctions on Russia. (ID: 14-50154) See http://www.reuters.com/article/2014/10/21/us-cybersecurity-jpmorgan-idUSKCN0IA01L20141021
"China says it's hard to resume cyber security talks with U.S.", Reuters, 19 October 2014. Top Chinese diplomat Yang Jiechi told Secretary of state John Kerry that resuming cyber cooperation between China and the U.S. will be difficult because of "mistaken U.S. practices". Claims by Edward Snowden about U.S. hacking of Chinese computer systems, accusations by the U.S. of Chinese hacking of American firms, and other events have brought tensions between the U.S. and China to dangerous levels. (ID: 14-50155) See http://www.reuters.com/article/2014/10/19/us-china-usa-cybersecurity-idUSKCN0I80GU20141019
"FBI warns U.S. businesses of cyber attacks, blames Beijing", Reuters, 15 October 2014. The U.S. FBI released a hurried notification to U.S. businesses warning of cyber attacks that are believed to be backed by the Chinese government. The document instructs companies to inform authorities if they believe they are victims of attacks, and provides steps that companies should take to mitigate effects of an attack. (ID: 14-50156) See http://www.reuters.com/article/2014/10/15/usa-cybersecurity-china-idUSL2N0SA31M20141015
"Apple Pay Rival and Walmart-backed MCX Hacked, User Emails Snatched", Forbes, 29 October 2014. Merchant Customer Exchange (MCX), an effort between Rite Aid, Sears and Walmart to create a competing product similar to Apple Pay, notified customers that it was hacked and that customer email addresses had been obtained. The emails were from participants in MCX's CurrentC beta test. The CurrentC app is MCX's main product, which is being designed to allow customers to pay at brick-and-mortar stores with their phones. (ID: 14-50157) See http://www.forbes.com/sites/ryanmac/2014/10/29/apple-pay-rival-and-walmart-backed-mcx-hacked-user-emails-compromised/?ss=Security
"Data Breach Bulletin: Kmart, POODLE, Oregon Employment Department, UC Davis Health System", Forbes, 17 October 2014. A round-up of some of the most recent high-profile data breaches: Kmart, POODLE, UC Davis Health System, Sausalito Yacht Club. (ID: 14-50158) See http://www.forbes.com/sites/katevinton/2014/10/17/data-breach-bulletin-kmart-poodle-oregon-employment-department/?ss=Security
"Accelerating Threats Reset the Goal Lines in Cybersecurity", Security Week, 23 October 2014. The cybersecurity industry finds itself in the reactive role in a continuous game of cat-and-mouse all too often. Paradigm shifts like cloud computing further complicate the issue, so cyber companies will have to rely on "response reinvention" for survival. (ID: 14-50159) See http://www.securityweek.com/accelerating-threats-reset-goal-lines-cybersecurity
"Keep Moving, Stay Alive: Your Cyber Strategy is Either Dynamic or It's (Un)Dead", Security Week, 24 October 2014. Active, agile response to cybersecurity threats is necessary for keeping a business free from the many negative effects of security breaches. With scores of large-scale cyber attacks leaving big businesses reeling in the past few years, many are learning this lesson the hard way. (ID: 14-50160) See http://www.securityweek.com/keep-moving-stay-alive-your-cyber-strategy-either-dynamic-or-its-undead
"Alleged Russian cyber-criminal charged in 40-count indictment", GSN, 16 October 2014. Russian citizen Roman Valerevich Seleznev was charged by a federal grand jury in Seattle with a 40-count indictment. Seleznev was allegedly involved with stealing and collecting and selling over 2 million credit card numbers by infecting POS systems. (ID: 14-50161) See http://www.gsnmagazine.com/node/42749?c=cyber_security
"The Long and Winding Road to Shellshock Recovery", TechNewsWorld, 29 October 2014. The Shellshock bug was thought to be worse than Heartbleed because it allowed the attacker to take control of a system, not just spy on it. Though hacking activity related to Shellshock seems to have tapered off since the initial disclosure, cybercriminals are probing for vulnerabilities in Bash systems, and it is feared that the upcoming holiday season will see a dramatic increase in attacks. (ID: 14-50162) See http://www.technewsworld.com/story/81277.html
"FBI's Comey Argues Against Encryption: Trust Us", TechNewsWorld, 20 October 2014. In a recent speech, FBI director James Comey reiterated his concerns about built-in encryption in mobile devices. It is feared that built-in encryption will hamper the efforts of law enforcement, shielding criminals from legitimate, lawful searches. (ID: 14-50163) See http://www.technewsworld.com/story/81220.html
"Microsoft Patch Blocks Sandworm Tunnels", TechNewsWorld, 17 October 2014. A cyber-gang, dubbed "Sandworm", was found to be exploiting a vulnerability in Windows operating systems, which allowed them to remotely execute code on victim systems. According to iSight Partners, the firm that discovered Sandworm, the group is backed by the Russian government. Since being tracked in 2013, the group has targeted "NATO, government organizations in the Ukraine and Western Europe, a Polish energy firm, a French telecommunications company, and academic organizations in the United States." (ID: 14-50164) See http://www.technewsworld.com/story/81197.html
"New report details Russiais cyber-espionage activities", Homeland Security News Wire, 30 October 2014. Cyber security firm FireEye released a report that accuses the Russian government of hacking into and performing espionage on computer systems in Eastern European countries. FireEye cites the fact that many malware samples were written during Moscow and St. Petersburg time zone working hours, and on computers that are configured to use the Russian language. (ID: 14-50165) See http://www.homelandsecuritynewswire.com/dr20141030-new-report-details-russia-s-cyberespionage-activities
"New smart key software enhances security for homes businesses", Homeland Security News Wire, 28 October 2014. Traditional mechanical locks and keys suffer from many security shortcomings. Researchers have worked to design eLOQ, a software system that will aid in creating and managing electronic key systems. E-keys allow for "restricting access to specific locks/areas based on date and time; the ability to view an audit trail held in the keys and locks; and the eblacklistingi of lost or stolen keys without the time and expense of physically replacing locks." (ID: 14-50166) See http://www.homelandsecuritynewswire.com/dr20141028-new-smart-key-software-enhances-security-for-homes-businesses
"China steals confidential data on the vulnerabilities of major U.S. dams", Homeland Security News Wire, 24 October 2014. National Weather Service hydrologist Xiafen Chen was arrested and is being charged with theft of U.S. government property; namely, sensitive files on U.S. dams. It is suspected that the crime was state-sponsored, as a data breach of the same system was traced back to the Chinese government in early 2013. (ID: 14-50167) See http://www.homelandsecuritynewswire.com/dr20141024-china-steals-confidential-data-on-the-vulnerabilities-of-major-u-s-dams
"No Security, No Business", PC Mag, 31 October 2014. A poll by HyTrust indicated that the public has a very low tolerance for security breaches and hold lose faith quickly in companies that have suffered from breaches. Roughly half of the respondents went as far as describing such companies as "criminally negligent". Slacking on security can save businesses time and resources in the short term, but can cause catastrophic results if a breach occurs. (ID: 14-50168) See http://securitywatch.pcmag.com/security/328372-no-security-no-business
"Crazy Spy Software Makes Computers Spill Secrets Over Radio", PC Mag, 30 October 2014. When it comes to computer systems that control critical infrastructure, maintaining an "air gap" with networks is essential for security. The notorious Stuxnet managed to bridge an air gap, but researchers at Ben Gurion University managed to go one step further: their program can transmit data via FM radio waves by modulating signals going through a humble monitor cable. (ID: 14-50169) See http://securitywatch.pcmag.com/hacking/329044-crazy-spy-software-makes-computers-spill-secrets-over-radio
"NIST spells out information-sharing best practices", FCW, 30 October 2014. Information sharing has become increasingly recognized as an essential part of threat management and prevention for businesses and agencies alike. The NIST released the draft of a document that is intended to guide federal agencies and private organizations in the best ways to implement information sharing practices. (ID: 14-50170) See http://fcw.com/articles/2014/10/30/nist-sharing-best-practices.aspx
"USCIS looks to the cloud for E-Verify", FCW, 27 October 2014. After launching E-Verify, a system for employers to determine if their employees are eligible for work in the U.S., the U.S. Citizenship and Immigration Services is looking to move E-Verify's data processing to the cloud. While improving the capabilities of the system, protection of sensitive information like SSNs will be important in the cloud. (ID: 14-50171) See http://fcw.com/articles/2014/10/27/uscis-looks-to-the-cloud.aspx
"New cyber doctrine shows more offense, transparency", 24 October 2014. The Pentagon recently released an uncharacteristically transparent document detailing policy regarding offensive cyber actions. The document argues that, because of the "growing reliance" on the cyber world and the serious implications that actions in cyberspace can have in the real world, cyber offense "requires carefully controlling OCO [offensive cyber operations]". (ID: 14-50172) See http://fcw.com/articles/2014/10/24/cyber-offense.aspx
"Is open source really a security concern?", FCW, 23 October 2014. Open source code and applications are known to carry the risk of carrying malicious code and security flaws, but advocates of open-source development might argue that the strength of open-source is its "group approach", which can be more effective than closed source in finding such vulnerabilities. (ID: 14-50173) See http://fcw.com/articles/2014/10/23/open-source-security.aspx
"NIST lays out roadmap for cloud computing", GCN, 27 October 2014. The NIST released the result of a three year effort to speed up the adoption of cloud computing in government: Cloud Computing Technology Roadmap Volumes I and II. The first volume lists ten requirements for "maintain[ing] innovative cloud adoption across government", while the second is more of a "technical reference for those actively working on strategic and tactical cloud computing initiatives". (ID: 14-50174) See http://gcn.com/articles/2014/10/27/nist-cloud-roadmap.aspx?admgarea=TC_SecCybersSec
"U.S. government probes medical devices for possible cyber flaws", Reuters, 22 October 2014. The DHS is reportedly investigating about two dozen suspected security threats in medical devices. Though there are no known incidents regarding security flaws in the devices to date, the threat is very serious because of the direct role that the devices, which include "implantable heart devices", play in a patient's health. (ID: 14-50175) See http://www.computerworld.com/article/2837413/security0/dhs-investigates-24-potentially-deadly-cyber-flaws-in-medical-devices.html
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
The Publications of Interest section contains bibliographical citations, abstracts if available and links on specific topics and research problems of interest to the Science of Security community.
How recent are these publications?
These bibliographies include recent scholarly research on topics which have been presented or published within the past year. Some represent updates from work presented in previous years, others are new topics.
How are topics selected?
The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.
How can I submit or suggest a publication?
Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.
Submissions and suggestions may be sent to: research (at) securedatabank.net
(ID#:14-2638)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Intellectual Property protection continues to be a matter of major research interest. The articles cited here look at hardware security and provenance and piracy prevention. They were published between May and August of 2014.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Immersion systems, commonly known as "virtual reality", are used for a variety of functions such as gaming, rehabilitation, and training. These systems mix the virtual with the actual, and have implications for cybersecurity because they may make the jump from virtual to actual systems. The research cited here was presented between January and August of 2014.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Keystrokes are the basis for behavioral biometrics. The rhythms and patterns of the individual user can become the basis for a unique biological identification. Research into this area of computer security is growing. The work cited here appeared between January and August of 2014.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Application-level security is a key to defending against application-level attacks. Because these applications are typically specified and implemented in programming languages, this area is generally known as "language-based security". Research into language -based security focuses on a range of languages and approaches. The works cited here were presented between January and August of 2014.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Microelectronics are at the center of the IT world. Their security--provenance, integrity of their manufacture, and capacity for providing embedded security--is both an opportunity and a problem for cybersecurity research. The works cited here were presented between January and August of 2014 and cover a wide range of microelectronics security issues.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Natural Language Processing research focuses on developing efficient algorithms to process texts and to make their information accessible to computer applications. Texts can contain information with different complexities ranging from simple word or token-based representations, to rich hierarchical syntactic representations, to high-level logical representations across document collections. Research cited in this area was presented between January and August of 2014. Specific languages addressed include Turkish, Hindi, Bangla, and Farsi, as well as English.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Network security is one of the main areas for cybersecurity research. The works cited here cover a range of transmission media, architectures, and data in transit. These works were presented or published in the first half of 2014.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Policy-based access controls and security policies are intertwined in most commercial systems. Analytics use abstraction and reduction to improve policy-based security. The work cited here was presented in the first half of 2014.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Provenance refers to information about the origin and activities of system data and processes. With the growth of shared services and systems, including social media, cloud computing, and service-oriented architectures, finding tamperproof methods for tracking files is a major challenge. Research into the security of software of unknown provenance (SOUP) is also included. The works cited here were presented between January and August 2014.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Web browsers are vulnerable to a range of threats. The challenge of securing browsers against them is the subject of these research efforts. The works cited here were presented between January and August of 2014.
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
College Park, MD October 30, 2014
Lablet Researchers meet at Maryland, share current research and ideas about Science of Security
The SoS quarterly Science of Security Lablet meeting, sponsored by NSA, was hosted by the Lablet at the University of Maryland (UMD) on October 28 and October 29, 2014. Quarterly meetings are held to provide research sharing and coordination, to present interim findings, and to stimulate thought and discussion about the Science of Security. Jonathan Katz, Principal Investigator at UMD, organized the series of talks and discussions about both the technical and behavioral aspects of cybersecurity. Kathy Bogner, Intelligence Community Coordinator for Cybersecurity Research, welcomed the group and described the "excitement" of the government at the efforts they are making. She challenged them to continue to address cybersecurity using strong scientific principles and methods and to share the fruits of their work.
The keynote was presented by John Pescatore of SANS Institute. His provocative talk described the current "sea change" in security engendered by the rapid development and deployment in sensors and actuators, massive new data sources, and in huge increases in M2M (machine to machine) communication-- the Internet of Things. New hacks are occurring in areas traditionally left alone, including hotel door systems, point of sale devices, HVAC systems, medical machinery, ATMs and kiosks. Automobiles are now sensor-laden and are each now generating a terabyte of data a year. With consumer fads driving the tech cycle, the life cycle of computing and data is shifting from every two to three years to a life cycle ranging from as little as two months to as much as twenty years. This shift, said Pescatore, increases the demand for basic computer "hygiene", offers an opportunity to avoid the mistakes of the past, and can drive suppliers and developers to build in higher quality security in their products and services.
Individual researchers and their teams presented materials from their ongoing work and a demonstration of updates to the Cyber-Physical Systems Virtual Organization (CPS-VO) web site. Research in progress that was presented included several briefs on human elements in cybersecurity and a review of Carnegie-Mellon's Security Behavior Observatory, the development of security metrics, a spirited discussion about the twin goals of composability and security, promising approaches to networked systems, resilience, and policy governed secure collaboration.
A special presentation about the challenges of teaching cybersecurity skills concluded the formal offerings. One of the unique features of the Lablets is that, in addition to research, they are charged with providing an educational and informational element to their work.
The next quarterly meeting will be held January 27 and 28, 2015 at North Carolina State University.
(ID#:14-2625)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Dr. Mike Bunting, UMD CASL - Center for Advanced Study of Language
Dr. Mike Bunting, of the Center for Advanced Study of Language (CASL) at UMD, addressed the security industry's need for hiring qualified candidates in an increasingly cyber-security-dependent workforce. The problem, according to Dr. Bunting, is the current difficulty in cyber selection, hiring, placement, and training. There are simply not enough candidates in the hiring pool who are able to readily perform their tasks. As hiring managers cannot predict a candidate's potential for job performance with total accuracy, the difficulty in effective cyber placement increases.
To this end, Dr. Bunting and CASL has partnered with the Georgia Institute of Technology (Georgia Tech) and U.S. government researchers to design an aptitude test for the assessment of potential candidates. The researchers will consider multivariate factors in cyber knowledge, skills, cognitive abilities, motivation, and personality attributes of current experts in the field, in order to identify parameters for success. The goal of the aptitude test is to accurately determine applicants' aptitude for cyber analysis.
Dr. Bunting provided a brief timeline of the work still to be performed before the test is operational and able to de deployed. CASL researchers began by studying available literature on cognitive and noncognitive factors existing in successful analytic job performance. Applications of the Psychosomatic Approach, such as data reduction and factor analysis, were employed in the initial data collection process. Researchers then reviewed specific cyber jobs and consulted instructors and experts in the cyber field, in order to identify success traits. Dr. Bunting and his team are working towards finalizing test content and test items.
Dr. Bunting's personal webpage is available at: http://www.casl.umd.edu/michael-bunting
Carnegie-Mellon Lablet:
Alain Forget, Jeremy Thomas, Alessandor Acquisti, Nicolas Christin, Lorrie Faith Cranor, Rahul Telang
Collaborators:
Serge Egelman, UC Berkeley; Stephen Strotmeyer, Jr., Rob Keene, Scott Beach, University of Pittsburgh
Dr. Alain Forget presented on the design architecture and deployment of Carnegie-Mellon University's Security Behavior Observatory (SBO), which aims to identify privacy and security challenges faced by users and how to solve them. The SBO studies the user at home, analyzes how malware infects in the wild, and observes changes in computers and their users over time. Participants of the study agree to install CMU software onto their home computers, which allows data to be continually collected. In order to provide usage data for multiple research areas and to answer broad questions, the implemented SBO is a scalable client-server infrastructure designed to collect user behavior data over a long period of time, in this case several years. The SBO infrastructure was designed to scale with the desired length, breadth, and depth of data collection; take extraordinary care to ensure the security and privacy of the collected data, which will inevitably include intimate details about participants' behavior; and serve research interests which will change over the course of the study, as collected data is analyzed, interpreted, and suggest further lines of inquiry.
Example research questions address computer infections, warning dialogs, security and privacy systems, and online social networks. Some research questions posed included:
The pilot study was determined successful since all software functions correctly, all sensors collect the intended data; data is securely transferred and stored, and silent updates push fixes and improvements.
Reach Professor Alain Forget at: aforget@cmu.edu
See the Technical Report at: http://www.cylab.cmu.edu/research/techreports/2014/tr_cylab14009.html
(ID#:14-2631)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
"Developing Security Metrics"
The presentation from the NC State Lablet and its collaborators on security metrics offered an overviews and a look at three research projects. The first described the overall security metrics project. Specific projects described included work on vulnerability and resilience prediction metrics and models, attack surface metrics, and using stack traces to approximate attack surfaces.
Developing Security Metrics (Overview)
Andy Meneely, Rochester Institute of Technology; Laurie Williams, Mladen Vouk, Huaiyu Dai, North Carolina State University
Metrics are a most important part of the sciences. Scientists use measurements of many kinds and have been in the forefront of developing new measuring tools and standards for a variety of scientific inquiries. Adding sound metrics to SoS is an important part of its development as a true science.
This project is intended to generate better allocation of resources for engineering secure software by contributing evidence-based knowledge, systematizing research on Intrusion Detection Systems, analyzing vulnerability-proneness and resilience of an overall system, and measuring the attack surface to assess risk. The NCSU Lablet's approach is to systematize the knowledge, with metrics of IDS evaluation, and to use those metrics internally. They seek to systematize IDS knowledge by way of classification and methods by evaluation, benchmark performances, and identifying and measuring inherent limitations. Currently, they have conducted a systematic literature review, collected over 300 papers, and classified and narrowed them down.
Vulnerability and Resilience Prediction Metrics and Models
Mladen A. Vouk, Laurie Williams, Anoosha Vangaveeti, Da Young Lee, Shweta Subramani, NC State University
The goal of the Vulnerability and Resilience Prediction Metrics and Models Project is to develop a science-based understanding of which security metrics can be used to accurately predict its field resilience and vulnerability-proneness. The hypotheses tested are: Measurable properties of a system and associated software development processes are indicative of the presence of vulnerabilities in released software, and Statistical models based upon current (classical) reliability and availability prediction models and attack profiles can accurately predict the resilience of a system.
Their preliminary results indicate "Steady-state" security problem discovery rate in the field for Fedora and Windows are in the range of a few per week (rate is in the 10e-5 to 10e-7 per inservice-week). A large fraction (in the 30+% range) of problems reported weekly for STABLE field versions of Fedora and Windows are security problems. A very large fraction (65% and above) of security problems detected in the field for open-source Fedora (many different releases) belong to epistemic category (flawed process, knowledge, model, ..). Classical reliability models appear to describe and predict well field discovery of security problems for open-source Fedora.
They add that there are two implications. First, once software and its operational profile stabilize in the anomalies the result of sampling low to very low probability input vectors. Second, if a "white list" filter "closes" at that point, software may now be "immune" to further attacks (at the expense of some functional loss). 10e-5 to 10e-7 security problems per inservice week may be the best we can do given current OTS software development processes and usage patterns.
Their current conclusions are that we are making progress towards a good science-based understanding of which security metrics of a system can be used to (accurately) predict its field resilience and vulnerability.
Future hypotheses to be tested are:
Attack Surface Metrics
Laurie Williams, Andy Meneely, Christopher Theisen, Nuthan Munaiah, NC State University
The goal of the attack surface metrics project is to assess risk of a software system by way of its input and output space. To do this the team will measure evolution over time assuming more inputs plus more entry points will produce more risk and more outputs plus more exit points will also produce more risk. The object will be to provide an early alert system for developers.
Identifying approaches used so far, they enumerate entry/exit points as functions that call input/output functions and measure ease of attack based on configurations. This methd will allow them to address three research questions:
Attack Surface Approximation via Stacktraces
Laurie Williams, Christopher Theisen, NC State University
The goal of the attack surface approximation via stacktraces project is to aid software engineers in prioritizing security efforts by approximating the attack surface of a system via stack trace analysis. This research will address the following questions:
A PowerPoint version of the presentation can be found at: http://cps-vo.org/node/15735
The NC State SoS Lablet can be found at: http://research.csc.ncsu.edu/security/lablet/
(ID#:2837)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Insights into Composability from Lablet Research
Jonathan Aldrich, William L. Scherlis, Anupam Datta, David Garlan, Bradley Schmerl, Joshua Sunshine, Christian Kaestner, Andre Platzer , Limin Jia, Robert Harper, Travis Breaux, Witawas Srisa-an, and Arbob Ahman, Carnegie Mellon University.
This presentation by Jonathan Aldrich from the CMU Lablet described a framework for understanding the hard problem of composability in the setting of security, along with highlights of lablet research results illustrating recent progress in this area and remaining research challenges. The format was an open discussion, and it proved lively.
Prof. Aldrich identified the primary challenge as the need to develop methods to construct secure systems with known security properties from components each of which has known quality and security properties, and avoid full reanalysis of the constituent components. Composition is needed to manage Increasing scale, complexity, dynamism, socio-technical ecosystems, and rich supply chains, and to direct evaluation of artifacts as they are produced and evolved.
The CMU SoS Lablet approach has been to focus on the hardest technical problems, emphasizing composability of modeling and reasoning as a key to scale and incrementality and human behavior and usability for developers, evaluators, operators, and end users. From this work, they seek to advance scientific coherence of cybersecurity technical results, advance most-effective scientific processes, acknowledge the multidisciplinary nature of cybersecurity, enhance the coherence of the body of technical results, enhance productivity, validity, and translation into practice and engage and broaden the cybersecurity technical community. To expand the community, they facilitate community and educational engagement with subcontractor partners, workshops, and conference events.
Work to date includes an initial workshop held in September, 2013. At this workshop, they developed a series of definitions, issues and approaches including crosscutting principles using assume-guarantee reasoning, game theory, and families of systems.
One key element was utilizing the work on sequential compositionality by Ahmad and Harper that produced the logical statement: if two components preserve confidentiality and we compose them in sequence, then the result preserves confidentiality. This premise underlies compositional security and is stated as: If two components preserve confidentiality and we compose them in sequence, then the result preserves confidentiality.
The PowerPoint presentation is available at: http://cps-vo.org/node/15746
Prof. Aldrich's personal web page is available at: http://www.cs.cmu.edu/~aldrich/
(ID#:14-2626)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Remind me Tomorrow: Human Behaviors and Cyber Vulnerabilities
Marshini Chetty, Tudor Dumitras, and V.S. Subrahmanian, University of Maryland; Aditya Prakash (Virginia Tech)
This research consisted of four interrelated projects addressing users and software updates. The research questions addressed included:
Using Symantec's Worldwide Intelligence Network Environment (WINE) data, field data collected from hosts around the world, user studies of patching behaviors, and comparing and contrasting results of these studies, this work in progress is determining whether and how security and software patches are actually being installed and how human behavior impacts cybersecurity.
The first part of the project looked at users' actual patching behaviors. The team analyzed 1,593 vulnerabilities in 10 side applications on Windows from 8.4 million hosts over 5 years. Using this data, they determined that patching behavior is not visible to network vulnerability scanners and is often targeted in spear-phishing attacks.
The second part of the project addressed the goal of measuring patch deployment milestones from the start of patching through time to patch 50%, 90%, 95% of vulnerable hosts and factors influencing the rate of patching. Preliminary conclusions are that start of patching is strongly correlated with the disclosure date--correlation coefficient of r = 0.994; 77% vulnerabilities start patching within 7 days; 92% vulnerabilities start patching within 30 days. The implications for this data are that while software vendors generally respond promptly to disclosures, patch deployment exhibits a long tail so that exploits are generally effective even if not zero-day.
The third part looked at updating mechanisms. It determined that there is considerable difference among updating mechanisms. For example, prompt for download is marginally more effective than manual updates. Auto-download and prompt for install is nearly as effective as silent updates for patching 50% of vulnerable hosts, but less effective for reaching 95% patch completion.
The fourth portion of the research looked at what users say they do. The team conducted online survey and interviews in summer 2014 with good demographic and sampling methods. Then the surveys were statistically analyzed to determine human factors in updating patches. 70.3% of survey respondents felt it is critical to keep software up to date and nearly half of survey respondents updated for security or to fix bugs/enhance performance, but over 1/3 survey respondents felt there were too many updates. Respondents also had clear expectations about patches. They were critical of unexpected changes, especially to the user interface (UI), want to know what has been changed, fear destabilization and incompatibility, and showed specific preferences for patch installation. 42% of survey respondents preferred automatic downloads while 72% of survey respondents preferred manual installation.
Next Steps for the project include completion of collaborative work, continued empirical analysis of WINE data, user studies extended to system administrators and developers and design of improved information about updates, and modeling attacker and defender behavior using game theory and WINE data.
This PowerPoint presentation is available at: http://cps-vo.org/node/15734
Professor Chetty's web page is available at: http://www.cyber.umd.edu/faculty/chetty
Information about the UMD Lablet is available at: http://cps-vo.org/group/sos/lablet/umd
(ID#:14-2628)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Xenofon Koutsoukos, Vanderbilt University
Network and systems resilience is a critical element in maintaining functionality after an attack. Professor Kousoukos presented on a new initiative separate from the Lablets, but on the related areas of resiliency and security. System Science of SecUrity and REsilience for Cyber-Physical Systems (SURE) is a collaboration among MIT, Hawai'I, California-Berkeley, and Vanderbilt to improve scientific understanding of resiliency, described as having the attributes of functional correctness by design, robustness to reliability failures or faults, and survivability against security failures and attacks. Water distribution and traffic control architectures were offered as examples of the types of cyber physical systems to be examined.
The research problems and questions SURE will address include risk analysis and incentive design, resilient monitoring and control, decentralized security, integrative research and evaluation, and formal reasoning about security in cyber-physical systems. Some of the research questions SURE will address include:
The research challenges facing the team include such problems as spatio-temporal dynamics, multiple strategic interactions with network interdependencies, inherent uncertainties in both public & private systems, and tightly coupled control and economic incentives.
In addition to Professor Koutsoukos as PI, the SURE research team includes Saurabh Amin (MIT), Anthony Joseph (UC Berkeley), Gabor Karsai (Vanderbilt), Dusko Pavlovic (U. of Hawaii), Larry Rohrbough (UC Berkeley), S. Shankar Sastry (UC Berkeley), Janos Sztipanovits (Vanderbilt), Claire Tomlin (Vanderbilt), Peter Volgyesi (Vanderbilt) Yevgeniy Vorobeychik (Vanderbilt), and Katie Dey (Vanderbilt) - Outreach.
For more information about Professor Koutsoukos, go to: http://www.vuse.vanderbilt.edu/~koutsoxd/
For more information about SURE, go to: http://cps-vo.org/group/sos/sure
(ID#:14-2630)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
John S. Baras, University of Maryland
Networked cyber-physical systems are becoming ubiquitous. Aircraft, automobiles, and other transportation systems are one example. This proliferation is generating new ideas about security, such as the Trusted Platform Module (TPM) and smarter smart cards. With much at stake, since there are huge commercial markets in this realm, the speaker cautions wariness in the "fusion" of evidence; more granularity may suggest different problems.
Security, resilience, and safety must be linked together. Scalability will derive from compositionality--the ability to develop security and resilience from parts and subassemblies whose security and resilience are already know and which are then linked into networked systems.
Professor Baras web site is available at: http://www.ece.umd.edu/faculty/baras
(ID#:14-2633)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Sayan Mitra, Geir Dullerud, and Swarat Chaudhuri, University of Illinois Urbana- Champaign Lablet
Professor Mitra presented an overview of the UIUC Lablet Science of Security research project targeting security metrics. He described the modeling framework, the approach for modeling adversaries, and security metrics. Then he described two foundational problems related to analysis of metrics: reachability for nonlinear hybrid systems and algorithms and lower-bounds on the cost of privacy in distributed control. Next he presented findings on the application of their reachability-based algorithms in analyzing a parallel landing protocol and a modular cell-pacemaker network. The analysis brings together simulation-based analysis and ideas from input-to-state stability---a composition theorem from control theory. He presented ongoing work on synthesizing controllers for CPS with adversary attacks.
The project goal for the Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems Research project was to address the hard problems of predictive security metrics and scalability and composability. Objectives were to identify security metrics and adversary models and develop theory, algorithms and tools for analyzing the metrics in the context of those adversary models.
Metrics were developed to address both physical systems to CPS and included safety factors, margin of safety, reserve capacity and their association with availability, the stability envelope, safety margin, and vulnerability level Adversary models looked at access, including actuator intrusion, sensor jamming, and malicious programs, their energy, and whether they were opportunistic, curious, focused, or committed.
Their work confirmed that Static-Dynamic Analysis is a sound and relatively complete algorithm for analysis of nonlinear -nondeterministic models. Symbolic simulation of adversary-free system is an improvement over approximation of leverage. Their method has been effective in enabling them to synthesize controllers and attack strategies and to measure vulnerability of states with regard to attacks.
The presentation with mathematical proofs is available at: http://cps-vo.org/node/15745
The C2E2 tool they used to support their research is available at: http://publish.illinois.edu/c2e2-tool/
Contact information for Prof. Mitra and his team is available at: http://users.crhc.illinois.edu/mitras/
(ID#:14-2632)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Ravi Iyer, UIUC
This discussion session addressed the "ability to sustain damage but ultimately succeed." The related objectives of resilience and security are to face threats directly while maintaining critical functions. The theoretical basis for addressing this problem is coming from control theory. It is related strongly to the hard problem of security and composability.
The participants addressed approaches and the need for more collaboration and communication among academics researchers to have a more structured and longer term discussion.
Professor Iyer's web site is available at: http://www.ece.illinois.edu/directory/profile.asp?rkiyer
(ID#:14-2629)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
Laurel, MD
28 October 2014
On October 27, 2014 researchers from four universities--Vanderbilt, Hawai'I, California-Berkeley, and MIT--met to kick off the System Science of SecUrity and REsilience for Cyber-Physical Systems (SURE) project. SURE is an NSA-funded project aimed at improving scientific understanding of resiliency, described as having the attributes of functional correctness by design, robustness to reliability failures or faults, and survivability against security failures and attacks. Water distribution and traffic control architectures were offered as examples of the types of cyber physical systems to be examined.
According to Xenofon Koutsoukos, Professor of Electrical Engineering and Computer Science in the Institute for Software Integrated Systems (ISIS) at Vanderbilt University, the Principle Investigator (PI) for SURE, "The project aims to equip CPS designers and operators with theory-based comprehensive tools that improve resilience against faults and intrusions, and also enable designers to make security decisions and allocate resources in a decentralized manner."
The research problems and questions to be addressed include:
The research challenges facing the team include such problems as spatio-temporal dynamics, multiple strategic interactions with network interdependencies, inherent uncertainties in both public & private systems, and tightly coupled control and economic incentives.
In addition to Professor Koutsoukos as PI, the SURE research team includes Saurabh Amin (MIT), Anthony Joseph (UC Berkeley), Gabor Karsai (Vanderbilt), Dusko Pavlovic (U. of Hawaii), Larry Rohrbough (UC Berkeley), S. Shankar Sastry (UC Berkeley), Janos Sztipanovits (Vanderbilt), Claire Tomlin (Vanderbilt), Peter Volgyesi (Vanderbilt) Yevgeniy Vorobeychik (Vanderbilt), and Katie Dey (Vanderbilt) - Outreach.
(ID#:14-2836)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
World Congress on Internet Security (WorldCIS 2014)
Sponsored by the IEEE UK/RI Computer Chapter, this international refereed conference focuses on the current need to properly secure internet computer networks, protecting the internet from emerging threats, and maintaining privacy. Keynote speakers, workshops, poster presentations and demos, and program awards will be featured as part of this week-long conference. Topics include Access Control, Network Security, Ubiquitous Computing, Cloud Security, Cyber Warfare, and more. (ID# 14-70024)
Event Date: Mon 12/8/14 - Fri 12/10/14
Location: London Heathrow Marriott Hotel, London UK
URL: http://worldcis.org/
IEEE Symposium Series on Computational Intelligence (SSCI 2014)
This international symposium features keynotes, tutorials, and special sessions covering topics such as Computational Intelligence and Data Mining, Computational Intelligence Applications in Smart Grid, Evolving and Autonomous Learning Systems, Memetic Computing, and more. A special Doctoral Consortium will be held. (ID# 14-70025)
Event Date: Tues 12/9/14 - Fri 12/12/14
Location: Orlando, FL
URL: http://ieee-ssci.org/
International Conference on Cyber Security
The Federal Bureau of Investigation (FBI) and Fordham University invites global leaders in cyber-threat analysis, operations, research, and law. Over three days, attendees will hear from more than 70 experts in government, private sector, and academia. Special keynote speakers from DeLoitte, AT&T, IBM, NIST, FBI, Pfizer, German Federal Criminal Police, and more. (ID# 14-70026)
Event Date: Mon 1/5/15 - Thurs 1/8/15
Location: Lincoln Center, New York NY
URL: http://iccs.fordham.edu/
ACI Compliance Forum on Cyber Security and Data Privacy Protection 2015
The American Conference Institute's event invites privacy officers, senior executives, attorneys specializing in data privacy and information security, and interested security peers. Privacy professionals from Prudential Financial, Motorola Mobility, GE Healthcare, Microsoft, Google, and more will be speaking about minimizing exposure and protecting data integrity while maintaining compliance practices. (ID# 14-70027)
Event Date: Thurs 1/15/15 - Fri 1/16/15
Location: Washington Plaza Hotel, Washington D.C.
URL: http://www.americanconference.com/privacy
Shmoocon 2015
This 3-day annual hacker convention focuses on information security, offering an original atmosphere for experts, academics, and enthusiasts alike to demonstrate technology exploitation, challenges, and solutions. Events include Fire Talks, Hack Fortress, Ghost in Shellcode, Lockpick Village, and more. (ID# 14-70028)
Event Date: Fri 1/16/15 - Sun 1/18/15
Location: Hilton Washington, Washington D.C.
URL: http://www.shmoocon.org/
SANS Security East 2015
This SANS conference offers information security training from SANS Insitute. Hands-on security training courses cover varied topics such as intrusion detection, web app penetration testing and ethical hacking, reverse engineering malware, and Windows forensics analysis. (ID# 14-70029)
Event Date: Fri 1/16/15 - Wed 1/21/15
Location: Hilton New Orleans Riverside, New Orleans, LA
URL: https://www.sans.org/event/security-east-2015?utm_source=offsite&utm_medium=EventListing&utm_content=20140723_TE_072314_SecE15_CoLo&utm_campaign=SANS_Security_East_2015&ref=164717
OOP 2015
OOP invites software decision makers and industry-experienced leaders from European software companies. This conference and exhibition will center around topics including Agility, Lean, Scrum, Security Multicore, SOA and Distributed Systems, and more. (ID# 14-70030)
Event Date: 1/26/15 - 1/30/15
Location: Munich, Germany
URL: http://www.oop-konferenz.de/oop2015/startseite-englisch/conference.html
Telecoms Fraud & Revenue Assurance 2015
Attendees engage in information sharing with industry peers and professionals concerning challenges of Next Generation Networks and services. The focus of the conference is finding solutions to fraud facilitated by OTT services, mobile payments, and network upgrades. An interactive roundtable discussion with Telefonica UK, BT and Talk Talk. (ID# 14-70031)
Event Date: Mon 1/26/15 - Wed 1/28/15
Location: Kensington Close Hotel, London, UK
URL: http://www.fraudandra.com/
SANS Cyber Threat Intelligence Summit
This event covers the area of Cyber Threat Intelligence (CTI), network defense techniques which leverage knowledge about attackers. Attendees will have the opportunity to engage in hands-on courses and learn about the tools, methodologies, and processes needed to successfully address the needs of cyber threat intelligence. (ID# 14-70032)
Event Date: Mon 2/2/15 - Mon 2/9/15
Location: Washington D.C.
URL: http://www.sans.org/event/cyber-threat-intelligence-summit-2015
MSPWorld Spring Conference 2015
The MSPWorld conference and exhibition centers around Managed Services and Cloud Computing, covering topics including security, security best practices, and security maintenance of cloud systems. (ID# 14-70033)
Event Date: Thurs 3/26/15 - Fri 3/27/15
Location: FL, TBA
URL: http://www.mspworldconference.com/
2014 Global Civil Engineering & Applied Science Conference (CEAASC)
CEAASC invites members of academia and experts in the fields of Applied Science and Electrical Engineering, among other disciplines, to an open forum type discussion and conference. The most pressing issues facing scholars and academics will be explored, as well as presentations of new research. (ID# 14-70034)
Event Date: Fri 11/21/14 - Sun 11/23/14
Location: Taipei, Taiwan
URL: http://www.ceaasc.org/
6th Annual International Conference on ICT: Big Data, Cloud, and Security (ICT-BDCS 2015)
Industry professionals, academics, researchers, scientists, consultants, and policy makers collaborate on, review, and exchange information in the area of cloud computing, big data, and IT security. Keynote speakers include luminaries from academia and industry, including Microsoft, Dell, and Universities South Australia and Nanyang Technical. (ID# 14-70035)
Event Date: Mon 7/27/15 - Tues 7/28/15
Location: Singapore
URL: http://bigdataclouds.org/
<< Notable Past Events>>
OWASP Romania InfoSec Conference 2014
This OWASP event invites application developers, information security senior officers, and any parties interested in Web Application Security education and promotion. This event intends to raise awareness about application security; all materials are available under a free and open software license. (ID# 14-70036)
Event Date: Fri 10/24/14
Location: University "Politehnica" of Bucharest, Bucharest, Romania
URL: https://www.owasp.org/index.php/OwaspRomaniaConference2014
Stockholm International Summit onSecurity in SCADA, Smartgrid, Smartmeters and Industrial Control Systems (4SICS)
4SICS (Stockholm International Summit onSecurity in SCADA, Smartgrid, Smartmeters and Industrial Control Systems) is the first international forum in Sweden dedicated to combatting cyber attacks on SCADA/ICS. The event will host presentations on SCADA Forensics, SATCOM terminals, and in-depth discussions concerning cybersecurity today. Participants will be invited to play Kaspersky Industrial Protection Simulation (KIPS), and take part in networking opportunities. (ID# 14-70037)
Event Date: Wed 10/22/14 - Thurs 10/23/14
Location: Stockholm, Sweden
URL: http://4sics.se/
ISSA International Conference
This international conference boasts an impressive array of speakers, presenters, workshops, and exhibits featuring the world's leaders in information security. The event will open with a keynote speech by Admiral Michael S. Rogers, director of NSA, commander of the United States Cyber Command. The event will hold a CTF competition, an ISSA Women in Security breakfast, and award banquets. (ID# 14-70038)
Event Date: Tues 10/21/14 - Fri 10/24/14
Location: Disney's Contemporary Resort, Orlando FL
URL: http://www.issa.org/?issaconf_home
ekoparty Security Conference 2014
This annual security conference will feature talks, workshops, trainings, War Games, and Lock Picking events. Lecture topics include RFID Security, VOIP Security, IPv6 Security, and more. (ID# 14-70039)
Event Date: Wed 10/29/14 - Fri 10/31/14
Location: Punta Carrasco, Buenos Aires, Argentina
URL: http://www.ekoparty.org/speakers-2014.php
Woman's Symposium : Career Discovery in Cyber Security
Hosted at NYU's Polytechnic School of Engineering, this symposium invites students, recent graduates, and those returning to the workforce after a hiatus. This two-day event features female luminaries from McAfee, IBM, Google Android Security, Yahoo, the Department of Homeland Security, and Tumblr to name a few. Workshops, hands-on security education, and discussions are featured. Free registration for students. (ID# 14-70040)
Event Date: Fri 10/17/14 - Sat 10/18/14
Location: NYU Polytechnic School of Engineering
URL: https://cybersymposium.isis.poly.edu/
MALCON 2014
The 9th IEEE International Conference on Malicious and Unwanted Software (MALCON) has released its main theme, "The Malware Threat in the Era of Unlimited Computing Power". (ID# 14-70041)
Event Date: Tues 10/28/14 - Thurs 10/30/14
Location: Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico USA
URL: http://www.malwareconference.org/index.php/en/
FSEC 2014
FSec is a symposium inviting participants in their OWASP round table discussion and OWASP Croatia membership, as well as varying networking opportunities. (ID# 14-70042)
Event Date: Wed 09/17/14 - Fri 09/19/14
Location: Varazdin, Croatia
URL: http://fsec.foi.hr/
CISCO Live! 2014 Cancun
Cisco Live sees the largest gathering of Cisco customers, experts, and partners. Highlight programs include "Cisco Empowered Women", technical seminars, industry summits, as well as certification and training sessions. Attendees enjoy a 75% discount on Cisco Exam fees. (ID# 14-70043)
Event Date: Mon 11/03/14 - Thurs 11/06/14
Location: Cancun, Mexico
URL: http://www.ciscolivecancun.com/
USENIX LISA 2014
LISA is an annual vendor-neutral conference for the system administration community. The 5 key topics are: Systems Engineering, Security, Culture, DevOps, and Monitoring/Metrics. The conference features 22 Training Sessions geared towards the creation, maintenance, and monitoring of secure networks, 10 Workshops, and over 50 invited talks, panels, refereed paper presentations, and mini tutorials. Notable speakers from Google, Red Hat, Los Alamos National Laboratory, Facebook, Netflix, StackExchange, and many more will present. (ID# 14-70044)
Event Date: Sun 11/09/14 - Fri 11/14/14
Location: Seattle, WA
URL: https://www.usenix.org/conference/lisa14/conference-program
HITBSecConf/ Hack in the Box Security Conference 2014
Held annually in Kuala Lumpur, Malaysia and Amsterdam, the Netherlands. The conference features two-day hands-on trainings followed by technical talks. Luminaries of the computer security industry lead these talks. (ID# 14-70045)
Event Date: Mon 10/13/14 - Thurs 10/16/14
Location: Kuala Lumpur, Malaysia
URL: http://conference.hitb.org/
FSEC 2014
FSEC is a vendor-neutral technical security symposium. Events include keynote speakers and discussions surrounding a broad area of information security topics. An OWASP round table discussion, networking opportunities, and presentations are featured. Topics discussed include Defensive and Offensive Security and Advanced Methods, Forensics and Anti-Stenography Methods, Application and Web Security, Cyber-Warfare and Cyber-Munitions, among many others. (ID# 14-70046)
Event Date: Wed 09/17/14 - Fri 09/19/14
Location: Varazdin, Croatia
URL: http://fsec.foi.hr/
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.