Vulnerabilities / Threats
12/7/2017
02:35 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Rutkowska: Trust Makes Us Vulnerable

Offensive security researcher Joanna Rutkowska explains why trust in technology can put users at risk.

BLACK HAT EUROPE - London, UK - When a technology is described as "trusted" - for example, a trusted third party or trusted computing base - many people get the impression it's secure. Joanna Rutkowska, CEO and co-founder of Invisible Things Lab and the Qubes OS project, believes this is misleading.

"In computer security, 'trusted' means this piece of code, or whatever is being trusted, is capable of destroying my whole security integrity," she said in her keynote entitled "Security Through Distrusting" here today at Black Hat Europe. She says we have too much trust in technology and this trust is leaving us vulnerable to attack.

"When I call something 'trusted' I really mean something negative," she continued. "I don't want things to be trusted."

Rutkowska emphasized the differences in calling technology "trusted," "secure," and "trustworthy." When something is secure, it's difficult to penetrate but not necessarily benign: even malicious things such as malware, backdoors, and botnets, can be secure, for example.

We need technology that is trustworthy: both secure and good for users, according to Rutkowska. However, the meaning of "good" varies across groups: corporate IT teams, for example, may have different standards than activists. "Trustworthy is really a very context-specific adjective," she noted.

Rutkowska argued that security professionals can - and should - minimize their trust in modern technologies, many of which could put users at risk. She presented several examples of how current technology leaves users vulnerable and how they could potentially be made secure.

As an example, she pointed to persistent laptop compromises. A laptop's motherboard has several elements and microcontrollers, most of which contain firmware that is kept on persistent, or flash, memory. There are lots of places on a typical motherboard to persist malware and store secrets, she explained, and security professionals can't do anything about it.

Rutkowska proposed moving certain elements such as flash memory outside the motherboard as a solution to eliminate the possibility of this threat. This could prevent firmware infections, eliminate a place to store stolen data, and provide a reliable way to verify firmware.

Another example is administrative access. "Administrators essentially own the software," she explained in an interview with Dark Reading. "It's very hard to protect against malicious administrators stealing user data … they should not have access to employees' documents."

In her keynote, Rutkowska proposed a symmetric situation in which administrators can modify policy and install software, but can't access users' data. This is "not so easy to implement in practice," she continued. "Once you get the ability to modify software, as in applications or operating system configuration, it's difficult to prevent [someone] from stealing that data."

There are tradeoffs when you start to distrust technology, she pointed out. The biggest is a tradeoff on usability, she explained, but distrusting can also lessen developer resources and make it difficult to add new features. It can also affect hardware resources and cost.

Trusting the Distrusting Model

Rutkowska's perspective on distrusting technology comes from years of experience. "I've been an offensive security researcher for a number of years," she says. "When you spend all these years working on attacks, [it affects] your mindset … I'm thinking how to minimize the amount of things and code we need to trust."

This mindset led to the creation of Qubes, a free open-source operating system Rutkowska founded on the principle of security by compartmentalization, or isolation. It uses virtualization, which its developers consider the "only practically viable approach" to implementing strong isolation" while also being compatible with existing applications and drivers.

Recently, Rutkowska has begun adding corporate features like remote management, into Qubes, which has been an OS project geared toward end-users. One of her priorities for corporate users is providing tools to more easily deploy and partition virtual machines. The challenge is integrating business capabilities while maintaining the distrust model, which she calls a "slow and difficult process."

She believes the distrusting model should be rolled out slowly among organizations and begin with small groups of users. A few of Qubes' corporate users are interested in introducing the OS to teams like IT personnel or developers before beginning a broader rollout.

Rutkowska says some security researchers have rejected her idea of security through distrusting.

"A number of security researchers, in my opinion, like looking for bugs in software so much, they dislike this approach," she explains. "For me, I say, don't prioritize looking for bugs in the browser. Assume it has bugs and operate under the condition there are bugs there."

Related Content:

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance & Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Oracle Product Rollout Underscores Need for Trust in the Cloud
Kelly Sheridan, Associate Editor, Dark Reading,  12/11/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Gee, these virtual reality goggles work great!!! 
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.