Don't tell Iván Arce that security researchers are rock stars. Security is about as glamorous and sexy as unclogging a sink, according to the security expert and co-founder and CTO of Core Security. "What we do in information security is more like what plumbers do -- we fix things and get things working," Arce says. "You don't see plumbers being promoted as stars."
But Arce himself is an international figure in security: He holds several patents, including ones for penetration testing and visualization technologies, and he is considered one of the top security experts in the industry. If you've never heard of him, all the better: That's just the way he likes it. "I don't like to talk about myself, and I don't like rock-star attitudes and the celebrity status that is given to many information security individuals," Arce says. "I think it is damaging to the discipline and to the industry."
Too many security people think their work is more important in the big picture than it really is, he says. "Many people in the infosec community are too self-conscious and have too high an image of their work and the role infosec plays in world affairs."
Arce doesn't take himself too seriously, nor is he all business all the time. He jokes that all he really does for Core is "pretend" to work, and that the only reason he was considered a star on his high school soccer team in Mexico was because he was Argentinean. "Argentineans are supposed to be good players," he says. "It gave me extra credit, not that I was really that good."
Arce, 37, has lived in several Latin American countries besides Mexico and his birthplace and current home in Buenos Aires, Argentina. There was Peru and Brazil as well. He grew up the only techie in a family of artists, with his parents in the film industry, and sisters in film, radio, and graphic design. "They couldn't understand what the hell I was doing... why was I tearing apart everything, like clocks, and trying to rebuild them. They didn't understand why I would do that and why I would sit at the computer for hours."
He started writing software programs when he was 16, and dropped out of the engineering program at the University of Buenos Aires to found Core in 1996. "It's all or nothing" in Argentina's six-year degree programs, he says, so he never got his degree. He got interested in security while working on cellphone and call-center applications at a computer-telephony integration startup in Argentina.
He got together some friends with mutual security interests and launched Core, which began as a consulting firm offering penetration testing services and vulnerability research. That led to building a tool to automate some of their work, which they fleshed out during some work they did for the former Secure Networks, which was later acquired by Network Associates (and later purchased by McAfee).
The scanner they worked on was the only one available at the time besides Internet Security Systems's tool, he says. "I saw all the flaws of vulnerability scanner technology -- the false positives and negatives, and the flat view of the network," he says. "It would tell you about vulns, but not about the attacks. We figured pen testing could automate that and make it simpler."
That helped inspire the Core Impact product, an automated, do-it-yourself pen testing tool that's considered the crème de la crème of tools, with commercial-quality exploits and a popular user-friendly interface that's starting to attract less-technical users as well as Core's traditional ones.
Core writes its own exploits -- Arce doesn't believe in buying bugs from outsiders. "I think it's wrong to pay for bugs," he says. "The thing you must take into account is those affected by the bug," the end users.
Arce says TippingPoint's recent decision to pay $10,000 for the MacBook hack contest at CanSecWest sent the wrong message. "In this case, the vulnerability information/exploits were not beneficial to end users in a contest with financial" incentive, he says.
"If you buy vulnerability information and give it to [your] paying customers only, you are using that information to obtain financial advantage because you're not giving it those who can't pay for it."
Core instead reports any bugs it finds to the affected vendor first, so it gets disclosed to everyone at the same time and the vendor has a chance to fix it, he says.
Arce says he no longer does the day-to-day engineering work at Core. He focuses more on the technology and how the user sees it, and he's also researching the next big attack trends five years out.
Don't expect him to make a big deal out of his findings, though.
Kelly Jackson Higgins, Senior Editor, Dark Reading