Black Hat USA
August 2-7, 2014
Mandalay Bay, Las Vegas, NV
Black Hat Europe
October 14-17, 2014
Amsterdam Rai, The Netherlands
7/1/2014
02:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
Connect Directly
RSS
E-Mail
50%
50%

Black Hat USA 2014: Can You Keep a Secret?

Cryptography lets secrets remain secret, or at least that's the idea. Today's quartet of Black Hat Briefings all explore this oft-hidden world, shedding light on crypto flaws both small and momentous.

Over 10,000 people participated in the Matasano crypto challenges, a staged learning exercise where participants implemented 48 different attacks against realistic cryptographic constructions. This has resulted in a crypto exploit codebase spanning dozens of languages, from X86 assembly to Haskell. In "48 Dirty Little Secrets Cryptographers Don't Want You To Know," Thomas Ptacek and Alex Balducci will walk you through all 48 challenges, putting them into context and going in-depth into some of the most interesting.

At the network layer, encrypted tunnels are typically seen as black boxes -- good. But network traffic leaks side-channel information that can often be analyzed to determine the tunnel's purpose and likely content -- less good. "Probabilistic Spying on Encrypted Tunnels" will dive deep into the probabilistic algorithms that can analyze this side-channel information, and the presenters will conclude by releasing an open-source toolkit containing the demonstrated attacks and algorithms.

The NSA's all up in our junk, to put it technically, and recent revelations from their ANT program show that they use many well-known and low-cost physical and firmware attacks that can compromise system integrity and in-use data. And as cloud use accelerates, more and more of an organization's computing infrastructure is outside of its physical control. "Protecting Data In-Use from Firmware and Physical Attacks" will review several such attacks, including SMM bootkits, "cold booting," and malicious devices, as well as existing tools and technologies to mitigate them.

SSL has been around for decades and yet it keeps happening: New attacks are being discovered against TLS at a steady rate. In "The BEAST Wins Again: Why TLS Keeps Failing to Protect HTTP," Antoine Delignat-Lavaud will present three new attacks against TLS. The final one exploits vulnerabilities in HTTPS deployments to achieve the holy grail of TLS attacks: full server impersonation of several thousands of websites, including Microsoft, Apple, Twitter, and PayPal. He'll also give some tips on defending against these unorthodox attacks and dispel a few TLS security misconceptions while he's at it.

Regular registration ends on July 26. Please visit Black Hat USA 2014's registration page to get started.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

Best of the Web
Dark Reading Radio