News
7/15/2014
01:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
Connect Directly
RSS
E-Mail
50%
50%

Black Hat USA 2014: Think Hard

Code can always change, but silicon is forever... more or less. Today's quartet of Black Hat Briefing highlights, which will all take place at Black Hat USA 2014, examine security with a focus on the hard stuff.

It's always fun when a solution for one issue can be repurposed to solve another problem. Creating a Spider Goat: Using Transactional Memory Support for Security brings us another example, in which the presenters bent the Transactional Synchronization Extension (TSX) memory conflict avoidance features of modern Intel CPUs toward security purposes. Used this way, TSX can detect malicious RAM modifications with minimal overhead. They'll also address potential problems of this unofficial use case.

The last decade's seen great advances in secure software development practices, but secure hardware development remains essentially undefined. Most hardware doesn't bother with security routines, or it keeps them obfuscated and secretive. SecSi Product Development: Techniques for Ensuring Secure Silicon Applied to Open-Source Verilog Projects aims to get that ball rolling, documenting pre- and post-silicon validation techniques and applying them to various open-source core designs while classifying various hardware security bugs into several categories.

The Bluetooth-, IR-based Super iBox BT, popular among real estate professionals, is a physically hardened device that stores a door key and contains a hardened MSP430 with a blown JTAG fuse. Is this still a large obstacle? In Reverse-Engineering the Supra iBox: Exploitation of a Hardened MSP430-Based Device, Braden Thomas will present his findings, giving an update on Goodspeed's 2008 bootstrap attacks and ultimately demonstrating how to perform firmware extraction reliably on such boxes. His newly developed attack can open any iBox, despite their complex and surprisingly effective crypto key management scheme.

Speaking of keys, How to Wear Your Password will present a new authentication paradigm that achieves both a desirable user experience and a high level of security. The security bracelet in question has a low-power processor, a Bluetooth LE transmitter, an accelerometer, and a clasp that detects wearer presence or lack thereof. Expect a thorough case study, complete with discussion of the physical design, the lightweight security protocols needed for pairing, determination of user intent, credential management, safeguards against violent attacks on the wearer, and the security implications of the design.

Regular registration ends on July 26. Please visit Black Hat USA 2014's registration page to get started.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

CVE-2014-0600
Published: 2014-08-29
FileUploadServlet in the Administration service in Novell GroupWise 2014 before SP1 allows remote attackers to read or write to arbitrary files via the poLibMaintenanceFileSave parameter, aka ZDI-CAN-2287.

CVE-2014-0888
Published: 2014-08-29
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

CVE-2014-0897
Published: 2014-08-29
The Configuration Patterns component in IBM Flex System Manager (FSM) 1.2.0.x, 1.2.1.x, 1.3.0.x, and 1.3.1.x uses a weak algorithm in an encryption step during Chassis Management Module (CMM) account creation, which makes it easier for remote authenticated users to defeat cryptographic protection me...

CVE-2014-3024
Published: 2014-08-29
Cross-site request forgery (CSRF) vulnerability in IBM Maximo Asset Management 7.1 through 7.1.1.12 and 7.5 through 7.5.0.6 and Maximo Asset Management 7.5.0 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk allows remote authenticated users to hijack the authentication of arbitr...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.