Black Hat Asia
March 24-27, 2015
Marina Bay Sands, Singapore
7/1/2014
02:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat USA 2014: Can You Keep a Secret?

Cryptography lets secrets remain secret, or at least that's the idea. Today's quartet of Black Hat Briefings all explore this oft-hidden world, shedding light on crypto flaws both small and momentous.

Over 10,000 people participated in the Matasano crypto challenges, a staged learning exercise where participants implemented 48 different attacks against realistic cryptographic constructions. This has resulted in a crypto exploit codebase spanning dozens of languages, from X86 assembly to Haskell. In "48 Dirty Little Secrets Cryptographers Don't Want You To Know," Thomas Ptacek and Alex Balducci will walk you through all 48 challenges, putting them into context and going in-depth into some of the most interesting.

At the network layer, encrypted tunnels are typically seen as black boxes -- good. But network traffic leaks side-channel information that can often be analyzed to determine the tunnel's purpose and likely content -- less good. "Probabilistic Spying on Encrypted Tunnels" will dive deep into the probabilistic algorithms that can analyze this side-channel information, and the presenters will conclude by releasing an open-source toolkit containing the demonstrated attacks and algorithms.

The NSA's all up in our junk, to put it technically, and recent revelations from their ANT program show that they use many well-known and low-cost physical and firmware attacks that can compromise system integrity and in-use data. And as cloud use accelerates, more and more of an organization's computing infrastructure is outside of its physical control. "Protecting Data In-Use from Firmware and Physical Attacks" will review several such attacks, including SMM bootkits, "cold booting," and malicious devices, as well as existing tools and technologies to mitigate them.

SSL has been around for decades and yet it keeps happening: New attacks are being discovered against TLS at a steady rate. In "The BEAST Wins Again: Why TLS Keeps Failing to Protect HTTP," Antoine Delignat-Lavaud will present three new attacks against TLS. The final one exploits vulnerabilities in HTTPS deployments to achieve the holy grail of TLS attacks: full server impersonation of several thousands of websites, including Microsoft, Apple, Twitter, and PayPal. He'll also give some tips on defending against these unorthodox attacks and dispel a few TLS security misconceptions while he's at it.

Regular registration ends on July 26. Please visit Black Hat USA 2014's registration page to get started.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8802
Published: 2015-01-23
The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.

CVE-2014-9623
Published: 2015-01-23
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quote and cause a denial of service (disk consumption) by deleting an image in the saving state.

CVE-2014-9638
Published: 2015-01-23
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.

CVE-2014-9639
Published: 2015-01-23
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.

CVE-2014-9640
Published: 2015-01-23
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.