Risk
5/14/2013
08:14 AM
Connect Directly
RSS
E-Mail
50%
50%

Black Hat USA 2013 Rolls Out SIM Card, Femtocell Hacking Talks

Organizers have confirmed some early details on Briefings talks

[NOTE: Black Hat and Dark Reading are both part of UBM Tech. As the key July 27th-August 1st information security event in Las Vegas approaches, we'll be sharing information about the show directly from its creators here on Dark Reading.]

As July's Black Hat US in Las Vegas nears, organizers have confirmed some early details on Briefings talks, revealing brand-new breaking information about subjects as diverse as femtocell hacking, BIOS security, finding and exploiting on-chip debug interfaces, and rooting SIM cards.

First, the National Institute of Standard and Technologies (NIST) 2011 publication of 800-155 one-upped the Trusted Platform Module (TPM) PC client specification by better detailing BIOS content that should be measured to provide an adequate Static Root of Trust for Measurement (SRTM). In BIOS Security, John Butterworth, Corey Kallenberg, and Xeno Kovah of MITRE Corp. will show how a laptop (pre-NIST 800-155) SRTM can be manipulated, even with signed updates enabled. The trio will also demonstrate a 51-byte SRTM patch that can trick the TPM into believing the BIOS is pristine. Reflashing the BIOS may not restore the SRTM's integrity; an esoteric technique involving a timing side-channel may be needed for the BIOS to indicate its integrity.

Next up, crypto-infosec researcher Karsten Nohl will present Rooting SIM Cards. There are over 7 billion SIMs in active circulation, yet shockingly little is known about their security traits. It is generally believed they're unbreakable, but this is only because there's a general belief that they've never been known to be exploited. In his briefing, Nohl will shatter this pretense with confirmation that SIM cards, like any other computing system, are plagued by implementation and configuration bugs.

On-chip debug (OCD) interfaces are very useful, but not always easy to find. They can provide chip-level control of a target device, and are a primary vector to extract program code or data, modify memory contents, or affect device operation on the fly. In JTAGulator: Assisted discovery of on-chip debug interfaces, electrical engineer Joe Grand will introduce JTAGulator, a piece of open-source hardware that will help you locate OCD connections without breaking a sweat. Also expect a brief on reverse-engineering methods, the field's prior art, and in-depth info on how OCD interfaces work.

Finally - femtocells are low-power cellular base stations, often offered cheaply by mobile network operators. They use a standard Internet connection to relay CDMA phone call data to the actual cellular network, sort of like a small cell tower, and work seamlessly, so users never even know they're connected to a femtocell rather than a typical tower. Cellular network authentication isn't easy to break, but Femtocells run Linux inside. In I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell iSEC Partners' Tom Ritter and Doug DePerry will show you how to completely own a Femtocell, using it to intercept voice/SMS/data, attack the network, and clone a mobile device without physical access.

More information about Black Hat USA 2013, which has a rapidly growing set of Briefings talks, as well as a comprehensive set of 2 and 4-day trainings, is available now - early, reduced-rated registration is open until May 31st.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7052
Published: 2014-10-19
The sahab-alkher.com (aka com.tapatalk.sahabalkhercomvb) application 2.4.9.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7056
Published: 2014-10-19
The Yeast Infection (aka com.wyeastinfectionapp) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7070
Published: 2014-10-19
The Air War Hero (aka com.dev.airwar) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7075
Published: 2014-10-19
The HAPPY (aka com.tw.knowhowdesign.sinfonghuei) application 2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7079
Published: 2014-10-19
The Romeo and Juliet (aka jp.co.cybird.appli.android.rjs) application 1.0.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.