Publications (2007)

  • GB

    A day in the life of a hacker... Things we get up to when nobody is looking, and that keep me awake at night.

    In this session I will give a roundup of some the issues I've spoken about over the last year, which include:

    • Magstripes
    • InfraRed
    • RFID
    • ATM Machines

    Whilst I aim to make this reasonably technical, it will be fairly relaxed and informal, with live demonstrations and some room for experimentation if any of the participants are brave enough... :)

    Seville, ES

    June 20, 2007 10:00-10:50, June 20, 2007 11:20-12:20, June 20, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: 1b81aee2cd883c149ebb2600b50ad075

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 9.43 Mb

  • JP

    An Internet Threat Evaluation Method based on Access Graph of Malicious Packets

    Malicious packets generated by Internet worms or port scans can be captured by monitoring ports of IP addresses where any network service is provided. Several methods have been proposed for detecting threats over the Internet by monitoring malicious packets. Most of these methods apply statistical methods to time-series frequencies of malicious packets captured at each port.

    This paper proposes a new method for evaluating threats in the Internet based on access graph defined by the relation between sources and destinations of malicious packets. This method represents access relation between sources and destinations of malicious packets by bipartite graph and defines relation of threat and vulnerability between sources and destinations of malicious packets. In order to evaluate threats on the Internet, we apply a new method to this relation. This method evaluates threats by using spacial structure of access graph which has not been used by traditional methods. We applied our method to working examples monitored during the period of worm outbreaks to show the effectiveness of our method.

    Seville, ES

    June 22, 2007 11:20-12:20

    Hosted by FIRST.Org

    MD5: a41baf56d9d9d35ac7653058b1c502e7

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 115.86 Kb

    MD5: 6add801418802149c78a69851a859a97

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 182.62 Kb

  • DE

    Assessing Incident Severity in a Network and Automatic Defense Mechanisms

    Threat sources for computer networks are diverse and increasingly complex. Attackers usually make use of vulnerabilities or configuration mistakes to break the external lines of defense and into different hosts or pry on what should otherwise be a secure/private communication channel.

    Unfortunately, the means to defend from and react to attacks are scarce and work mostly isolated. Among these we can count firewalls,Intrusion Detection System (IDS), Intrusion Prevention System (IPS), and honeypots, as well as the possibility of doing penetration tests from within or from outside the network.

    By using all these methods at hand, there is a lot of information available that has to be processed to assess the current situation. Based on this the security policies governing a network can be adjusted. This is by no means trivial and could overwhelm a person trying to do it manually.

    This paper presents a framework that concentrates the input from different sensor types, assesses the situation and decides on the action to take to counter a possible attack. This ranges from (semi-)automatically changing the security policies for the whole network, to reconfiguring a service within a host.

    In particular the processing method to make the assessment will be the core of this article.

    Seville, ES

    June 20, 2007 17:00-18:00

    Hosted by FIRST.Org

    MD5: 2f1973e703815fe3f3abf4425ae7be44

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 492.37 Kb

    MD5: 63d8eadbf8fd347a0ee6abc48fed1055

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.69 Mb

  • PL

    Beyond the CPU: Defeating Hardware Based RAM Acquisition Tools

    Many people believe that using a hardware based acquisition method, like e.g. a PCI card or a FireWire bus, is the most reliable and secure way to obtain the image of the volatile memory (RAM) for forensic purposes.

    This presentation is aimed at changing this belief by demonstrating how to cheat such hardware based solutions, so that the image obtained using e.g. a FireWire connection can be made different from the real contents of the physical memory as seen by the CPU. The attack does not require system reboot.

    The presented technique has been designed and implemented to work against AMD64 based systems, but it does not rely on hardware virtualization extensions.

    Seville, ES

    June 20, 2007 17:00-18:00

    Hosted by FIRST.Org

    MD5: 8985173b09a874569517b67208c22482

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 722.81 Kb

  • ES BR

    Botnet: Creation, usage, detection and eradication

    Francisco Monserrat

    Francisco "Paco" Monserrat is the Security Coordinator of RedIRIS (the Spanish Academic and Research Network) and he is a FIRST member since 1997. During the last few years, he has worked actively on the TF-CSIRT, iniromoting the cooperation among CSIRTs in Europe.

    Paco has spoken on various conferences and his activities focus on Forense Analysis, criptography and Computer Security Incidents Response Teams.


    Paco has spoken on various conferences and his activities focus on Forense Analysis, criptography and Computer Security Incidents Response Teams. Guilherme Vênere has a BsC in Computer Science at Universidade Federal de São Carlos. With 11 years of experience in system administration and security, he's security analyst at CAIS/RNP (Brazilian Research Network Security and Incident Response Team) for the last 3 years. He's also a FIRST member, and instructor of computer forensics classes in Brazilian and international conferences. He has GCFA and BS-7799 certification. He is currently working on an attack and infection detection system for RNP backbone.

    Paco has spoken on various conferences and his activities focus on Forense Analysis, criptography and Computer Security Incidents Response Teams. Guilherme Vênere has a BsC in Computer Science at Universidade Federal de São Carlos. With 11 years of experience in system administration and security, he's security analyst at CAIS/RNP (Brazilian Research Network Security and Incident Response Team) for the last 3 years. He's also a FIRST member, and instructor of computer forensics classes in Brazilian and international conferences. He has GCFA and BS-7799 certification. He is currently working on an attack and infection detection system for RNP backbone.

    Jacomo Dimmit Boca Piccolini has an Engineer degree in Industrial Engineering at Universidade Federal de Sao Carlos - UFSCar, with two post-graduation one obtained on the Computer Science Institute and other on the Economics Institute of Universidade de Campinas - Unicamp. Hi is GCIA, GIAC Certified Intrusion Analyst and GCFA, GIAC Certified Forensics Analyst, working as a senior security analyst at the Brazilian Research and Academic Network CSIRT (CAIS/RNP). With 10+ years of experience in the security field his is the lead instructor of CAIS/RNP and hands-on coordinator for FIRST Technical Colloquiums. He is currently fighting the misuse of RNP backbone infrastructure by hackers.

    Seville, ES

    June 21, 2007 10:00-10:50, June 21, 2007 11:20-12:20, June 21, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: 28a48e639689e585c1e68751deb286da

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 2.41 Mb

  • US

    Common Vulnerability Scoring System (CVSS-SIG)

    Gavin Reid is VP of Threat Intelligence for HUMAN, HUMAN is a cybersecurity company that protects enterprises from bot attacks to keep digital experiences human. Previous to this, he was the CSO for Recorded Future. Recorded Future delivers advanced security intelligence to disrupt adversaries, empower defenders, and protect organizations. Reid had global responsibility for ensuring the protection, integrity, confidentiality, and availability of all customer-facing services, internal operational systems, and related information assets. Gavin has 20 years of experience in managing all aspects of security for large enterprises. He was the creator of Cisco's Security Incident Response Team (CSIRT), Cisco's Threat Research and Communications (TRAC), and Fidelity's Cyber Information Group (CIG). Gavin started doing information security at NASA's Johnson Space Centre.

    Seville, ES

    June 19, 2007 11:20-13:10

    Hosted by FIRST.Org

    MD5: 459d9c5e7ffb3da6942c54c013ab7f32

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 332.53 Kb

  • US

    Phishing Trojan horse programs are not traditional bots, but sophisticated and original pieces of malicious code. Since iDefense began tracking this technique in May 2006, attackers have quietly seeded dozens of variants into the wild to target at least 30 specific banking institutions. These attackers had intimate knowledge of each targeted bank’s Web infrastructure and built a sophisticated command-and-control system that completely automated the attacks. The authors believe that criminal organizations are using these phishing Trojans to compromise millions of bank accounts across the globe. These Phishing Trojan attacks can defeat sophisticated authentication schemes that security experts previously thought rock solid.

    This presentation discusses mitigation techniques that work and fail in light of these new malicious code attacks. The audience will be given an overview on malicious code attacks against the financial infrastructure and an introduction to banking authentication schemes. The presentation also includes cyber fraud detection and mitigation strategies.

    Seville, ES

    June 20, 2007 17:00-18:00

    Hosted by FIRST.Org

    MD5: b37e11e6b30f2dc8dcd07d9977b43e72

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 281.68 Kb

    MD5: 2ad0b4e932dc299928170039769ad253

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.38 Mb

  • US

    Data on Data Breaches: Past, Present, and Future

    A number of high-profile data loss incidents have focused attention on questions surrounding the collection, storage, and protection of personal information.

    Measures aimed at protecting those whose personal information has been put at risk through such incidents have become widespread in the U.S., with increasing calls for similar regulation in the EU, Canada, and elsewhere.

    We examine past and present security breaches to illustrate the thesis that to understand, we must discuss. Effective measures to address security breaches can only be developed through empirical reserach. We can learn what contributes to such breaches, and their impact that on those whose information is revealed and on the breached entity.

    We conclude by discussing future steps that can be taken legislatively and by the research community to facilitate greater understanding in this area.

    Seville, ES

    June 20, 2007 10:00-10:50

    Hosted by FIRST.Org

    MD5: 7fcd44d846f585f8dee0253947a0e96d

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 2.65 Mb

  • DE

    Dealing with Unreliable Software: Exile, Jail, and other Sentences

    In terms of security, web browsers are most unreliable fellows: during the past few years, no other application type has been as error prone, inviting a plethora of attacks. Yet, modern business cannot do without web browsers any more. Other application types handling data accessed via the Internet such as messaging applications, document viewers, peer-to-peer applications, etc., are also increasingly under attack, but at least some of them cannot be done without. What is one to do?

    This talk discusses the possibilities of mitigating risk by separating unreliable software from production systems. We provide an overview of various methods of separation (exile on a dedicated system, jail in virtual or change-root-like environments, ...), discuss the security gain that can be achieved, and highlight the challenges in integrating such separated systems with the production environment so as to achieve satisfactory usability.

    Seville, ES

    June 21, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: eacf5933f665b2b18fbc14201ac9b355

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 6.67 Mb

  • GR

    Developing a trusted partnership to prepare a framework for the collection of information security data

    Public and private decision makers need accurate statistical and economic data on information security. They need information about trends and volumes of security problems, but also about the level of confidence that clients and citizens put in information processing resources. Various public and private sources of such data exist, within an organisation, within a country and beyond borders. However, in most cases such data is kept in silos, not compared with data from other sources. This happens for technical reasons, but also because every incident is embarrassing for the owner of the technical infrastructure and most think that such information is best kept secret.

    ENISA, the European Network and Information Security Agency, has received the task to evaluate whether a trusted partnership can be developed and to prepare a framework for collection of such data. This could include Managed Security Service Providers, Electronic Communication Service Providers, vendors, users, government entities and others. The goal is not to actually share data - that would be too ambitious, given the sensitive nature of the information - but rather to discuss under which circumstances sharing of such sensitive data can be possible. In June 2007, first results of this relationship-building will be visible. The goal of this session is to present them to the public.

    Seville, ES

    June 22, 2007 15:40-16:30

    Hosted by FIRST.Org

    MD5: b357d0f78c479b7341bab27a6aca0e06

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 28.13 Kb

    MD5: 81dd12dfb06c4567486235a74ad1e415

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 100.53 Kb

  • NZ

    Electronic Forensics: a Casefor First responders

    Almost every aspect of our lives is touched or somehow controlled by technology driven processes, procedures and devices. It is therefore important to understand that because of this pervasive electronic influence, there is a high probability that a successful criminal or unacceptable incident will occur within the perimeter of an organization’s information and/or computer and network infrastructure. The difference between conducting a successful investigation resulting in a potential prosecution or failing these will often lie squarely in the lap of the electronic forensic investigator. If potential evidence is compromised at any point in the investigation, it will be unacceptable in a court of law. The highest risk of compromise occurs at the point prior to evidentiary acquisition. The first responder’s primary responsibility is to protect and preserve potential evidence and to see to it that suspect electronic devices and storage media are not tampered with by anyone until such time as the professional electronic forensics investigator (law enforcement or private) takes full control of the scene. This paper will explore electronic forensics demonstrating the need and making the case for the appointment and training of a first responder to incidents where electronic devices may have been used.

    Seville, ES

    June 22, 2007 10:00-10:50

    Hosted by FIRST.Org

    MD5: db28284bde10f46a26487c4c5fea9cc8

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 73 Kb

  • DE

    Experiences with Building, Deploying and Running remote-controlled easily installable Network Sensors

    A remote manageable network sensor on a live CD may allow a CERT with little or no direct control over its networks to achieve improved situation awareness: because installation of such a sensor requires very little effort on part of local system administrators, the barrier of deploying IDS sensors is significantly lowered. Furthermore, an easily installable network sensor is a valuable tool for fast response to ongoing incidents in which network data must be collected.

    This talk reports about the experiences collected by Siemens CERT in creating an easily installable IDS sensor, deploying it within the company and running the sensor network: We describe the design of the sensor and sensor management console and report on lessons learned in interacting with local system administrators and operating the sensors. We also describe experiences with using remote sensors as honeypots rather than IDS sensors.

    Building on our experiences, other CERTs should be able to get up to speed fast with creating and rolling out network sensors in their network.

    Seville, ES

    June 22, 2007 15:40-16:30

    Hosted by FIRST.Org

    MD5: fdccc303d2e434738b7c3722e4d01db4

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 2.44 Mb

  • First Team Members Update Panel

    Francisco "Paco" Monserrat is the Security Coordinator of RedIRIS (the Spanish Academic and Research Network) and he is a FIRST member since 1997. During the last few years, he has worked actively on the TF-CSIRT, iniromoting the cooperation among CSIRTs in Europe.

    Paco has spoken on various conferences and his activities focus on Forense Analysis, criptography and Computer Security Incidents Response Teams.

    Seville, ES

    June 22, 2007 11:20-12:20, June 22, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: 9f3634203b5ca259cc8666572e5e41e4

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 324.18 Kb

  • IT

    Flaws and frauds in the evaluation of IDS/IPS technologies

    One of the things that amazes me on mailing lists and in conferences regarding intrusion detection is the symmetric presence of two concurrent issues:

    • customers asking "what is the better IDS for my architecture, or for this specific requirement ?"
    • vendors and scientists claiming "my IDS is better than that", all the time

    Both are very reasonable stances, per se. Trouble is, we don't have answers for those customers, and we don't have benchmarks to actually measure if one IDS is better than another. Since a key issue in developing technologies is measuring how well they compare with earlier attempts, it is an unsurprising result that we don't have really good IDS yet, just a very wide bunch of (often unconvincing) suggestions on how an IDS should be made.

    So, I'd like to help fellow practitioners and researchers by debunking claimed "performances" of current IDS systems, by demolishing current "testing methodologies" and by showing how practical testing architectures can be created to compare systems.

    The key points to take away from this lecture are:

    • how to easily debunk most current literature on the subject, in particular marketing material, and
    • how to devise tests that can efficiently help us choose among different technologies when implementing an IDS solution

    Seville, ES

    June 21, 2007 11:20-12:20

    Hosted by FIRST.Org

    MD5: 12dc791d266caad8025bbff410b68be4

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 199.96 Kb

    MD5: 5773048c6d9e9867f68a7b3b47f87226

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 483.9 Kb

  • US

    Forensic Discovery

    Wietse presents lessons learned about the persistence of information in file systems and in main memory of modern computers - not only how long information persists, but also why this happens, and what the limitations of that information are.

    After an introduction to the basic concepts of volatility and persistence, Wietse presents examples of how to recover time line information from a variety of network and host-based sources, including a walk-though of a post-mortem file system analysis.

    The presentation ends with results from file and memory persistence measurements. The results are based on measurements of a variety of UNIX and Linux systems, with some results for Windows/XP, including how to recover encrypted files without knowing the key.

    This presentation includes content from the "Forensic Discovery" book that was co-authored with Dan Farmer.

    Seville, ES

    June 18, 2007 09:00-10:50, June 18, 2007 11:20-13:10

    Hosted by FIRST.Org

    MD5: 19f054efea2a154eee50762bcac04666

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 381.66 Kb

  • US

    Forensics for Managers – Presenting and understanding forensics from the MBA point of view

    This period of presentation delivers a basic understanding of forensics from an MBA's point of view. What is forensics? Why do we need it? Who wants our information? Why would someone attack us? Why do these tools cost so much? These questions and more will be answered from an easy to understand point of view. This class was designed to help mid-level and upper management understand and appreciate the cost, payback, and time needed to conduct an investigation, but is ideal for anyone desiring to understand exactly what is involved in digital media exploitation. This will not be an in-depth class, nor a vendor specific class, but common industry specific tools will be mentioned for their pro's and con's as used in a real-world environment.

    Seville, ES

    June 21, 2007 10:00-10:50

    Hosted by FIRST.Org

    MD5: ce696a25ae2482ff3749d0ede49110de

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.8 Mb

  • SG

    Handling Less-Than-Zero-Day Attack – A Case Study

    While some people are still suspicious about the existence and significance of zero-day threats and attacks, less-than-zero-day attacks have come into the scene. Less-than-zero-day attacks refer to those targeting vulnerabilities that haven’t been publicly disclosed. With the trend that hackers target more on financial gain instead of fame in recent years, it’s expected less-than-zero-day attacks will pose greater risk to organizations. However, it’s very difficult to defend against due to the fact that the vulnerabilities are unknown.

    In this presentation, I will share our experience in dealing with such attacks. Monitoring and alerting of the incident will be introduced first, followed by containment of the damage, analysis of the compromised system, and identification of less-than-zero-day attack. After that, I will talk about the process of reporting the unpublished vulnerability to Cert Coordination Centre and the relevant vendor, as well as assisting the vendor to fix it, so that organizations using this software can be protected. At the end, I will talk about the lessons learnt and the security measures we find useful in dealing with such kind of attacks.

    I hope by sharing our experience, more people will join in the efforts to combat against less-than-zero-day attacks, report unpublished attacks, and help the vendors to fix them, so that organizations globally are protected and the internet security as a whole can be improved.

    Seville, ES

    June 22, 2007 11:20-12:20

    Hosted by FIRST.Org

    MD5: 9fea983c204bb6b28372bfd3b6d0cc06

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 157.37 Kb

  • ZA

    I know what you (and your company) did last summer...

    In recent times a lot of emphasis has been placed on the interaction and collaboration between individuals on the Internet – the old asymmetrical nature of the web has changed from a data producer/consumer model to a model where everyone is a producer and a consumer at the same time. This change has been very rapid without set guidelines or policies – it's best described as a phenomenon rather than a well thought out process – and it is indeed one that is driven by the community rather than an RFC. The challenges faced by the traditional producers of yesterday is now on the doorstep of individuals – with the difference that the environment and role players are a lot less defined. The high level of interaction and connections between produced information, the vague identity of the producer and the abundance of distribution channels make the Internet of today the ideal breeding ground for those with less-than-honest intentions that utilize trickery such as personal (online) identity theft, public opinion manipulation, viral campaigns or simply discovering valuable or restricted information by means of extensive data mining. These types of attacks could be performed by individuals with minimum technical knowledge and infrastructure.

    In this presentation I will look at how the abundance of information available on the Internet combined with a generation of less-questioning, more trusting Internet users can lead to vulnerabilities that are hard to delineate, hard to anticipate, hard to protect against, and, as will be shown in the presentation, a disturbing reality. The presentation will further look at possible ways to defend against this types of attacks as well as discussing and demonstrating a framework for generic information gathering that could be used in both a defensive and attacking role.

    Seville, ES

    June 21, 2007 10:00-10:50, June 21, 2007 11:20-12:20, June 21, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: 1079eb9b439b28171c6f0ce376b292b5

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.34 Mb

  • GB

    Identity Management Systems: the forensic dimension

    Identity Management Systems: the forensic dimension

    An identity management system consists of an enabling technology, a means of managing that technology, and a framework of policies, law and regulations. If all works out well we achieve a balance of reliability in authentication and appropriate levels of confidentiality for those taking part.

    But over a period of time the quality of the enabling technology and its management may become eroded. The technology may be less robust than first appeared, or advances may make compromise easier. A management system may show unexpected defects.

    We need to study these eroding factors in identity management systems as we do more widely in computer security systems.

    One of the least understood is the role of specialists in digital forensics. These people are constantly reverse-engineering hardware and software in order to identify digital footprints of activities which can then be used in legal proceedings. Their aims are often of the highest - to bring wrong-doers to justice. But in so doing in relation to identity management systems, they create the means by which people become prematurely de-anonymised and /or personal data is revealed in circumstances not originally envisioned.

    I propose to examine the dilemmas, produce some examples and suggest some remedies.

    Seville, ES

    June 20, 2007 10:00-10:50

    Hosted by FIRST.Org

    MD5: 2f83a365a11dec32eda79e3372e0c025

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.4 Mb

  • GB

    Identity theft in the corporate environment – demonstration and hands-on

    Identity theft and fraud is an important and growing problem. It affects individuals, government departments and private sector organisations, and often forms part of more serious criminal operations such as people trafficking and drug smuggling. It is estimated that more than 120,000 people are affected by identity theft in the UK each year. The latest estimate is that identity fraud costs the UK economy 1ドル.7 billion.

    In the words of Fox Mulder, 'trust no-one.' If someone steals your password at work, it is a significant step towards stealing your identity. It won't just impact your employer but your personal life too. In fact it could easily leave you with a reputation for enjoying illegal pronography, a large credit card bill and even larger overdraft.

    Peter Wood has developed a set of methodologies to stimulate corporate identity theft attacks, both external and internal. He shares his experiences in perpetrating licensed attacks against a variety of clients over the last year, as well as the results of criminal investigations. His methods and recommendations should prove invaluable to any business.

    Seville, ES

    June 22, 2007 15:40-16:30, June 22, 2007 17:00-17:45, June 22, 2007 17:45-18:00

    Hosted by FIRST.Org

    MD5: d1a43120a785c45746e187a402009705

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 17.5 Kb

    MD5: bee1fe6e571543ffef1365bfbc14b52b

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.71 Mb

  • US

    Inside the Perimeter: 6 Steps to Improve Your Security Monitoring

    Most attacks from the Internet are not actionable. They're automated, noisy distractions from the real problems your enterprise is facing. The threat has driven deeper into your enterprise; infected hosts are remote-controlled and attacking your naked infrastructure.

    For this reason, Cisco's Computer Security Incident Response Team's (CSIRT) has begun orienting its security monitoring toward internal threats. CSIRT engineers will describe their approach, topology, challenges, and lessons learned in the process. This highly practical session will illustrate security monitoring with CS-IPS version 5 and 6, CS-MARS 4, Netflow v7, and syslog. CSIRT engineers will describe how the global solution was deployed, tuned, and lessons learned in the process. Participants should expect to leave with practical insights and best practices in deploying internal monitoring for incident response.

    Seville, ES

    June 20, 2007 11:20-12:20

    Hosted by FIRST.Org

    MD5: d6344b1aa3d6c8220886ee0485e02ced

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 9.84 Mb

  • US

    Insider Threat – The Visual Conviction

    Insider Threat has increasingly been discussed in the past months. Information Leaks, Sabotage, and Fraud have been reported all over big institutions. One way to address the insider threat problem is to analyze log files and find suspicious behavior before it results in direct or indirect financial loss for the company.

    Signs of suspicious behavior or users lend themselves very well to visualization techniques. Visualization of data has proven to be the approach generating the best return on investment when it comes to complex data analysis problems. This workshop takes a step-by step approach to analyzing signs of insider threat. I will use a few open source tools to process the information and generate visual representations. Among them is a tool called AfterGlow (afterglow.sourceforge.net) which was written by the presenter. It is a very simple tool to visualize preprocessed information. The analysis I will go through in the workshop will show how early warning signs of insider activity manifest themselves in the log files, making it possible to prevent further damage and assess the impact of the activities.

    The goal of the talk is to leave the audience with the knowledge and tools to do visual log analysis on their own data.

    Seville, ES

    June 20, 2007 15:40-16:30, June 20, 2007 17:00-18:00, June 20, 2007 18:00-18:50

    Hosted by FIRST.Org

    MD5: 8fdca647ddf36fe8f1b2b00a9cf1668c

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 6.08 Mb

  • GB

    Keynote Speakers 01

    Prioritising Information Security

    Information security is not given a high enough priority by individuals, the corporate sector and by Government. There are a variety of reasons for this – emotional, cultural, financial and cynical. Is information security user-friendly enough? Whose responsibility is it anyway? What should the service providers be doing? What should Governments be doing? Does the global nature of the internet make solutions impossible? Is Microsoft’s Vista the answer? Is self-regulation sufficient or does there have to be legislation? Are market pressures a help or a hindrance? Who is going to clear the mess up when it all ends in tears?

    Seville, ES

    June 20, 2007 09:20-10:00

    Hosted by FIRST.Org

    MD5: 0a53ae74b7164f34b2757e70d6954eac

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 102.71 Kb

  • EU

    Keynote Speakers 02

    The speech will present the security strategy of the European Commission in the framework of the EU security policy as outlined by the European Council in 2004.

    After introducing the European Commission and its role in the EU institutional framework, the presentation will describe the EC's IT organisation and governance and will highlight the role of security in the "Roadmap towards an Integrated eCommission" the internal eGoverment initiative of the EC launched in the context of the i2010 initiative.

    The presentation will outline the principles inspiring the security policy , "a secure Europe in a better world", and will describe the EC strategy for Network and Information Security explaining the dimensions of the problem, from technical to social and ethical. Then the Research Security Policy will be introduced describing all the efforts and preparatory actions that had lead to the allocation of 1.4 M€ for security research in FP 7.

    It will also describe the initiatives regarding Safer Internet and those in the area of Justice, Freedom and Security.

    Finally, the EC internal security policy will be outlined and the implementation efforts regarding the policy will be presented including the description of the peripheral security infrastructure, security of IT configurations and Information Systems as well as the measures put in place to fight viruses and spam.

    Seville, ES

    June 21, 2007 09:10-10:00

    Hosted by FIRST.Org

    MD5: 927d1fbdd8007be76434f50418ad50b9

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 7.71 Mb

  • US

    Keynote Speakers 04

    Securing the Brave New World

    The increasing reliance of organizations on information technology makes IT the backbone for much of critical infrastructure. At the same time, IT infrastructure has morphed from a model of well-defended castles of information to multiple "tents" housing disparate data, with, in some cases, a "welcome" mat in front of each tent. How can the security landscape evolve to effect a correct balance between openness and secrecy? How can the security community itself evolve – including users, guardians, and "police"of information - to ensure that cybercommunities continue to be inhabitable and hospitable, instead of "The Wild West?"

    MD5: aa988e9e67c650fd64b130ac25b355d0

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 256.07 Kb

  • US

    Keynote Speakers 05

    • General History of MS security efforts
    • Current situation in the ecosystem
    • Microsoft’s strategy
    • Call to action

    Seville, ES

    June 21, 2007 14:40-15:40

    Hosted by FIRST.Org

    MD5: 1fd30f54c71b737f1a1ea7f65e3246b8

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 6.15 Mb

  • GB

    Keynote Speakers 06

    You Haven't Seen Anything Yet!......

    The human race has always been fascinated by numbers and computing. Recently I have been challenged that Moore's Law (created by Gordon Moore in 1968 that predicted that the number of transistors on a chip would double every two years and the price would halve in the same time) will not only cease being true but will saturate and flatten off. I do not believe this to be the case -I see in the next few years greater and greater computing power being available.

    The advent of Broadband connections, originally by ADSL, and new networks like BT’s 21CN will bring an era of AORT A (Always On Real Time Access). The human will be abstracted from the complexity of searching for information. Artificial Intelligent Agents will wander around this new information maze looking for information that might be of interest to you and push it towards you. These agents will have faces, voices, will hear and understand what you say, and might even have personalities! The whole process will get very conversational.

    But we will go further than just artificial people, we will start immersing ourselves in virtual environments. Imagine a virtual High Street where you can wander and visit the shops of your choice. These establishments will be "peopled" by avatars which look and behave just like the real people in the real shops -but there will be no queues.

    With the advent of the SmartCard we will be carrying enormous amounts of personal information and exchanging it in public places. One SmartCard could carry all your personal details from your ID card and passport to driving licence and medical history .I see everything having SmartCard readers (computers, phones, mobiles, TVs) and the appropriate information will be exchanged without the extreme efforts that are required of the human today -re-typing the same details on every web-page. I also see the security hologram on the card still being a visual security device, but also becoming a thumb print reader. The SmartCard becomes a "This is me -honestly it really is me" security token. With the advent of Web Services on the AORTA network, I could be at an electronic point-of-sale machine and the insertion of the token automatically brings all my relevant data (including current picture) to that point in the network.

    In the near future everything is going mobile. We will all have personal communicators (yes just like Star Trek!) which will connect us to voice communications and information. You will start asking your mobile phone questions and receive information that is pertinent to you at this time and at this location. Soon, with 3G type systems, we will be able to send and receive moving pictures. In fact in the very near future we will as carelessly pass images and moving images over these devices as we just talk to them today.

    And as we enter this new information age, we must look at how we will trade with our customers. It is vitally important that we target each individual customer and personalise our communication with him or her. Gone are the days when a simple advertisement was good enough, and we expected our customers to come and find us. Now we have to build a bridge and an interactive, proactive experience for our customers.

    Technology is changing very fast indeed. I predict that you will see more change in the next 10 years than has been experienced in the past 150 years. Technology is changing -the question is " Are you changing as fast" because if you do not you and your organisation might not be trading in the next few years!

    Seville, ES

    June 22, 2007 14:40-15:40

    Hosted by FIRST.Org

    MD5: 6e5a512d398ddec8375e4f64341d63f2

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 17.06 Mb

  • Law Enforcement / CSIRT Cooperation SIG

    At last year's FIRST Conference, the 1st "CSIRTs meet LEs, Les meet CSIRTs" workshop was held. The workshop was bridged the gap between two different communities by introducing their mission, policy and culture with regard to responding to cyber incidents and information handling. Also the case studies demonstrated the value of the partnership and collaboration between CSIRT and Law Enforcement.

    With the success and overwhelming response to the 1st workshop, this year FIRST and the G8 High Tech Crime Subgroup plan to hold the 2nd "CSIRTs meet LEs, LEs meet CSIRTs" workshop. This year's theme is "Forensics" and identifying what data is most useful for Incident Response teams to gather and present for successful Legal action to be taken and to working with LEs. There will be Forensics techniques and tools being introduced from both communities and best practices.


    View the workshop schedule in the conference schedule in PDF format.

    Seville, ES

    June 18, 2007 09:00-10:50, June 18, 2007 11:20-13:10

    Hosted by FIRST.Org

    MD5: f5f3e76f5c09c0de6cf8327f2ac0f897

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 164.62 Kb

  • NO DE

    Long term instability of high priority incident response – A system dynamics simulation approach

    Effective incident response is dependent on detection. A CSIRT typically relies on detection via intrusion detection techniques, or reports from various sites. In this paper we only focus on high priority incidents reported from sites. If a CSIRT depends on its constituency as the primary source for incident detection and reporting, especially incidents of higher priority, then the service provided itself depends on these reports. One major factor is the pool of various sites inside and outside the constituency that accept the CSIRT as the point of contact and henceforth report such incidents. Due to this dependency, the relationship between the CSIRT and the reporting sites within the constituency as well to other cooperating sites and other CSIRTs is very important to maintain.

    However, empirical data we have found indicates that this relationship is very unstable over time. Viewed over a time frame of years, the number of reporting sites and the high priority workload seems to show an oscillatory behaviour pattern independent on the available resources to handle this workload. This is a problem, because such instability means that the effect, quality and efficiency of the incident response service is also unstable over time.

    This article therefore tries to address the following questions:

    1. What factors cause this instability and how does this influence the effectiveness of high priority incident response?
    2. What can be done to dampen this instability and make high priority incident response more effective?

    This research problem has been studied as a part of a larger PhD research project investigating the effectiveness of incident response in a well known context of a coordinating CSIRT. ASystem Dynamics simulation model has been developed to serve as a controlled environment to identify the main causal relationships creating the instability between certain key variables of interest:

    • The number of reporting sites
    • The number of high priority incidents
    • Quality of service

    The results from the simulation model indicate that the instability in these key variables are caused by long time delays in the interaction between CSIRT and reporting sites. Attraction of reporting sites is very much dependent on the past quality of service by the CSIRT. Building reputation takes time and so does losing reputation as well. At the same time the attraction of new reporting takes time. There is a tendency that a good quality of service (and thereby reputation) will lead to attraction of new reporting sites. This will increase the workload driving down the quality. However, the impact of lower quality on future attraction is delayed. Hence, there is a risk of overshoot in the workload before the perception about quality starts to decline. Conversely, the same delays can lead to undershoot in reporting and the workload despite improving quality. The behaviour pattern over time will thereby be oscillatory for the number of reporting sites, the number of high priority incidents reported, and the quality of service. However, it is very hard to identify because the delay times are so long that the pattern is only visible over several years.

    Through the model, the following policies of interest were tested:

    1. Decrease delay times to close the gap between perceived and actual quality of service among reporting sites.
    2. Add more people to the IRT staff

    The model showed that alternative 2 tended to dampen the oscillatory behaviour. Alternative 2 only gave a temporary solution, before the instability came back over the course of time.

    Seville, ES

    June 20, 2007 10:00-10:50

    Hosted by FIRST.Org

    MD5: b9be99607d25530bbdae32a8d53f858e

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.23 Mb

  • BR

    Malware distribution trough software piracy: a case study

    Trust no one or you will be assimilated! This is the current scenario inside the software cracking and piracy community. This paper focuses on the study of the usage of pirate software to infect systems and their abuse by miscreants. Statistics from collected malware related to software piracy will be presented.

    The author believes software piracy will always exist, here included operational systems, applications and games. The problem is directly related to the customer’s compulsory behavior for new features and releases leading the user to consume any product; even in beta version (sometimes faked versions) and piracy products.

    To deal with this demand, some specialized piracy groups had, for long time, supplied this market with diverse products, among others, we emphasize keygens, which are applications that can generate a registration key to allow software installation and cracks, which are modifications in files from the target software that allows their execution or removes existing protections.

    With the advance of software protection techniques, new forms to circumvent these protections and to make this content available are being offered, such as installation packages, cracked versions ready to run and CD emulators. The piracy community is always developing new ways to take care of the demand and to circumvent the protections that are implemented.

    The universe of software piracy possess multiple mechanisms of distribution: sites specialized in cracks, keygens and emulators (cd-roms), ftp servers, CDs being sold in streets or offered in sites and mainly P2P applications.

    The process of malware distribution uses any of these mechanisms, with only small differences. We must understand that miscreants are very creative and their main goal is to infect as many systems as possible. Files that are accessible through web pages are hosted in sites that explore vulnerabilities in navigators. Why wait for user to download and execute if the system can be infected and controlled through browser vulnerabilities?

    Even the malware files, available as keygens and cracks, possess different forms of infection; the great majority of analyzed specimens will infect a system in a second stage, after the installation and decompression. This technique is used only to make more difficult the file identification as malware. The main functionality of this type of malware also varies from simple downloaders and adware to botnets. From the miscreant’s point of view this is the perfect scenario, the end user is downloading and executing malicious code with their consent and without any restrictions.

    In 2006 one of the main sources of malware propagation through software piracy was the creation of dozens of crackers for the Windows Genuine Advantage. The constant updates of the WGA tool had made users of counterfeit versions of Windows to often search for new versions of crackers and, when they did not succeed, they simply started to install all available crackers. From the WGA cracking files collected, almost 70% were classified as downloaders and bots with elevated degree of sophistication and difficult removal process.

    The same issue occurred in the end of the 2006 with the launching of the new version of the Internet Explorer, whose installation only successes through the authentication of the operational system as being legit.

    This kind of exploitation and propagation is not restricted to Microsoft products; any popular software with some installation restriction is being used as an attack vector.

    The consumer of piracy software is at this moment being heavily targeted by the piracy community which only aims to infect and to control their system for illicit purposes and to feed the piracy industry, normally by stealing all serial numbers of installed software from the users system and later distribution on web sites, without forgetting the traditional use of the systems as part of botnets.

    The message here is simples, there is no crack or keygen or another tool related to software piracy that can be considered safe to use, even to download. Users must be discouraged to consume any kind of software piracy in order to avoid their personal information and systems being used my miscreants.

    Seville, ES

    June 22, 2007 15:40-16:30

    Hosted by FIRST.Org

    MD5: 4934fe7ea27b2361068ff9ac92924537

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 12.92 Kb

    MD5: 3a068303aba453e3e5d736f024c97590

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 491.79 Kb

  • GB

    Managing Privacy in Network Operations: Learning from the Law

    System and Network Managers and Incident Response Teams can represent a serious threat to the privacy of individual users. To ensure smooth operation of their systems and ensure they are not a threat to others, administrators may need to be able to read, modify or block any file or communication, or to pass it to their Incident Response colleagues for investigation. However those same powers, if misused either accidentally or misguidedly, can cause serious harm to individuals and organisations. Lacking written guidance on how to exercise their considerable powers, many administrators are left to rely on their own consciences to find the balance between protecting the individual and protecting the wider community: this is not a comfortable position for the administrator, their organisation or their users.

    The European legal system has at least half a century of experience of protecting individual privacy, formalised in 1950 in Article 8 of the European Convention on Human Rights, which established the "right of respect for private and family life, home and correspondence". This talk will suggest how principles established in the Convention and in subsequent European and national legislation to protect personal data and communications can be applied to network operations and incident response. The focus will be on developing good practice based on fundamental principles, so should benefit those from other legislative traditions as well as those who have to ensure that their practices comply with their particular local privacy law.

    Seville, ES

    June 22, 2007 17:00-17:45

    Hosted by FIRST.Org

    MD5: 95dcbaf0ef2928176c0cb15481c30742

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 399.83 Kb

  • SG

    NUS IT Security Landscape

    Universities have the dual challenge of creating an environment that fosters experimentation and learning while protecting the users against unauthorized access and other internet threats. In a large enterprise network like NUS, where there are more than 30 000 online nodes, this challenge is more acute. Universities are unlike corporations because they cannot impose overly restrictive policies that could hamper research and sharing. In corporate environments, network users are primarily rule-abiding employees. However, in university environments, majority of the network users are students.

    I will present the enterprise wide security framework adopted by NUS. This framework is built on PPT Methodology (i.e. People, Process and Technology). The People Element is the most important element and as the saying goes "Human is the weakest link in the security chain". Under the people element, I will detail the strategy to address upper management, user buy-in, staff morale, user awareness and training requirements. Under the process element, I will discuss the process framework we adopt to track progress and success. Processes include vulnerability management, threat management, incident management, audits and penetration testing. etc. On the technology aspect, NUS has looked beyond the traditional firewalls, intrusion detection and prevention systems, antivirus, anti-spyware, anti-spam implementation. Many systems are developed inhouse as many off-shelf systems are not effective in a unique environment like NUS. Our blackholing mechanism, honeynet implementation and vulnerability management system are some examples of our innovative security implementations.

    I hope that sharing our experience with the strategy that helped us and the pitfalls to avoid can prove valuable to both universities and similar organizations in the that do not already have a similar strategy in place but are facing enterprise-level threat mitigation issues and inhibiting cost factors.

    Seville, ES

    June 21, 2007 11:20-12:20

    Hosted by FIRST.Org

    MD5: 9c4fbf66e9837585803acc319610e722

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 182.9 Kb

  • GB

    Our Own Worst Enemies

    In his address to the 18th FIRST annual conference in Baltimore, guru Bruce Schneier asked and answered a critical question: "How do you compel the home user to secure a PC against Trojans and worms? You don’t. You can’t."

    Twelve months later, the theme of the 19th FIRST conference is Seville is digital privacy, in the wake of a year in which millions of items of personal data were lost or stolen from corporates with disastrous consequences for the reputation of e-commerce.

    These are the starting points for Frank Wintle’s presentation to Conference 19. Why don’t home users care and why don’t they act? Why, in the UK, did more than half a million people walk away from Internet banking in 2006? Why are phishers still able to pose as financial institutions, sucker innocents and detach them from $millions? What’s the root cause of corporate carelessness?

    Could one reason be that the Internet security industry has a huge communications problem?

    Wintle thinks that it is, and in this presentation he will argue that the "I’m-a-geek-and-I’m-proud-to-speak-geekspeak" attitude betrays the kind of pride which almost always goes before a big fall – if the fall isn’t happening already.

    He then goes on set out the principles of a communications approach which can make even the most arcane subject lucid and engaging for non-specialist audiences, and illustrates how effective communications can change attitudes and actions.

    Lastly, he discusses strategies and evaluation, exploring ways in which CERT’s within nations or organisations can define communications targets they want to reach and behaviours they want to change and then use appropriate PR techniques to reach their objectives.

    Seville, ES

    June 21, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: 183732536546a4a7e7a5d3f5e7178714

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.69 Mb

  • ES

    Privacy matters in directories

    Modern institutional directory services nowadays are confronting a clear conflict of interests. On the one hand, there is the need of members of the institution to find other members in the same or different institution. On the other hand, there are the privacy rights of the individuals.

    This has made us to develop a mechanism to solve this confrontation using information access controls that can be managed both by the institutions and the individuals.

    This presentation will discuss our implementation of such mechanism based on LDAP classes and attributes, and OpenLDAP Access Control Lists.

    We will also present information of adoption of the privacy control attributes in other institutions after more than a year of promoting them. This research is being carried out during the first quarter of 2007.

    The posibility of using the Access Controls in RedHat Directory Server is also being assessed during the first quarter of 2007 and we will also present how to do it in case the result are possitive as expected.

    Seville, ES

    June 21, 2007 11:20-12:20

    Hosted by FIRST.Org

    MD5: 7761b9f34815e86fe936fd14c26b6e7b

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 136.84 Kb

    MD5: b6db52565f427e73391d415926c55fbd

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 2.99 Mb

  • GB

    Reviewing the VoIP Threat Landscape

    Voice over IP (VoIP) services are, as the name suggests a method of running Voice Telephony over IP networks. The protocols used for VoIP and specifically the Session Initiation Protocol (SIP) also provide a number of other real-time communication services including Video Conferencing, Instant Messaging and Presence services. The latter provide intelligent call routing ensuring improving communications services.

    VoIP offers many business benefits, but in the rush to realise these benefits it is easy to forget that VoIP is an IP service and is subject to all the IP network level vulnerabilities and threats that other IP applications such as web and email have faced for the past 10 years or more. In addition, the real-time requirements of VoIP and Video Conferencing and the position of these services as a key-stone in business communication makes VoIP applications uniquely vulnerable to application and content vulnerabilities.

    This session reviews the VoIP threat landscape, highlighting the risks posed by these threats and outlining the security requirements for an effective and robust VoIP implementation.

    Seville, ES

    June 20, 2007 15:40-16:30

    Hosted by FIRST.Org

    MD5: 4dda1e4e97cab6aa8661f2a75fca3711

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 30.09 Kb

    MD5: 3a0558a04d08202c4773201d83ef484b

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 379.06 Kb

  • US

    Security Risk Management: breaking through technology and market barriers – a real life story

    Modern enterprise networks have many thousands of vulnerabilities, only a few of which are usually exposed to attack. Finding those exposures manually has proven to be a daunting task, especially in light of daily publishing of new vulnerabilities and constant network changes. Attack simulation is a new technology that helps security professionals prioritize vulnerabilities and focus on actual exposures. In addition to the technology challenges involved in security and network modelling, the creation of a new market category in the security space is a challenge in itself. This is an overview of the technology and its evolution from idea to a running business.

    Seville, ES

    June 20, 2007 15:40-16:30

    Hosted by FIRST.Org

    MD5: d7ecf1822a76a1291c4c7c9b6691bfd1

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.08 Mb

  • ES

    Setting up a governmental CERT: The CCN-CERT case study

    The CCN-CERT is the Spanish National Information Security Incident Response Team that was born in late 2006 with the mission of being the support and coordination centre of security incidents that affects public organizations, helping the governmental organisms to respond efficiently before the security threats affect their information systems.

    More than the standard basic steps that include the setting up of a CERT, the creation and development of a CERT with national government constituency entails some key problems and challenges.

    Seville, ES

    June 22, 2007 17:00-17:45, June 22, 2007 17:45-18:00

    Hosted by FIRST.Org

    MD5: 99f26772e326c0c3cb564bdf27fc7640

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.5 Mb

  • DE

    Setting up a Grid-CERT – Experiences of an academic CSIRT

    Introduction and Motivation

    Grid Computing has often been heralded as the next logical step after the World Wide Web. Instead of only accessing static content (i.e. web pages) users of Grids can access dynamic resources such as computer storage (for any sort of data) and use the computing resources (i.e. the CPU) of computers under the umbrella of a virtual organisation. Although Grid Computing is often compared to the World Wide Web, it is vastly more complex both in organisational and technical areas. This also extends into the area of security and incident response, where established academic CSIRTs face new challenges arising from Grids.

    The German ministry of education and research (BMBF) has started in 2005 a strategic initiative, D-Grid, to further Grid computing and usage within the German scientific community. This initiative is similar in many ways to those of other countries around the world. Part of that initiative is the establishment of CSIRT services for Grids.

    Cormack, et al. have argued in "that CSIRT activities for a Grid are not fundamentally different from those performed by a traditional CSIRT." In practice, there are many challenges to be overcome to establish a CSIRT for the specific needs of Grids and Grid users. The following two sections will give an overview about the challenges and experiences DFN-CERT has encountered while setting up a CSIRT for the D-Grid communities.

    Organisational Challenges

    One of the first lessons learned is, that there is not "the Grid", like "the Web" or "the Usenet". As in the case of the D-Grid project, there are, even at the beginning, no less than six Grid communities: high-energy physics, climate research, astrophysics, engineering and medicine. There is even a text-Grid for use in the humanities. Each has its own unique set of requirements that extend to the field of security. Researchers in physics for example, have few requirements about the protection of intellectual property from the participants in their Grids, contrary to that engineers place high emphasis on this particular area. Participants in a medical Grid have high requirementsabout the protection of patient data. Grids with practically no personal data, like climate research place no emphasis on this area. An academic CSIRT thus has to learn about the specific requirements of each and every Grid community within its constituency.

    One could argue, that the Grid communities are already part of the CSIRTs constituency and thus, this would be a simple task of asking the CSIRT of the local organisations. In practice, the local teams are often not aware of Grid activities and vice versa. Besides that, there are sometimes teams for the whole grid, that are not directly affiliated with one site. Also, many groups use the same terminology, but with different meaning and emphasis.

    A different approach is needed, that circumvents the problems of local groups. The D-Grid initiative provides an excellent forum because it establishes an exchange platform for the Grid communities in Germany. Making DFN-CERT known to the Grid communities is thus a simple matter of introducing it into these forums.

    Experience with CSIRT operation has shown, that international cooperation is imperative to successful establishment of CSIRTs. In the field of Grids, this means that an international web of cooperation has to be established as well. On one side, this extends into the CSIRT community, where organisations such as FIRST and Terenas TF-CSIRT are to be engaged, on the other side the Grid communities and organisations like the Global Grid Forum (GGF). As a result of these activities, "Incident handling and security guidelines of NREN Grids" have become part of Terenas TF-CSIRT terms of reference.

    Technical Challenges

    To handle the technical part of Grid incidents as well as to be able to proactively help sites in securing their Grid infrastructure, a CSIRT has to develop an understanding about the software used in the Gridsm of their constituency. With this understanding, more advanced services like Grid-honeypots may be build in the future.

    The underlying operating systems are common systems, like Linux, and these are well understood by CSIRTs. The next layer, the Grid middleware, is composed of big software packages like UNICORE, the Globus Toolkit or gLite, that facilitate access to storage and computing resources, as well as monitoring, directory services and authentification across virtual organisations.

    These software packages are very little understood by CSIRTs. Exacerbating this problem is that there are only a few people in the academic community itself that fully understand this software. Also, setting up test installations of the huge and complex Grid middleware requires far more resources than setting up ordinary software installations, like a workstation or web server. To gain experience in this area, cooperation with existing test installations is the way to go.

    Although the basic procedures of handling vulnerabilities are the same, whether for normal software or for Grid software, the concrete task of obtaining the information puts up some challenges. While Grid software is open source and developed among the same lines as standard open source packages, the standard security practices, like open mailing lists for security advisories or signed software packages, are often not followed.

    Seville, ES

    June 22, 2007 11:20-12:20

    Hosted by FIRST.Org

    MD5: 8b9fe22bba10d36475ec9d8e8c5fde1f

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 155.64 Kb

    MD5: 94ca83c390a68d4c0a48dc9ee73038e8

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 282.04 Kb

  • Software Security: Integrating Security Tools Into a Secure Software Development Process

    Automated security tools are often used in software development, from static source code analysis tools to penetration testing tools. Unfortunately, due to a variety of reasons, many development organizations fail to get the maximum benefit from the tools. Worse, the way that many organizations use security tools may actually hamper effective development work. Penetration testing tools, for example, are commonly used for late life cycle "black box" testing. This forces, at best, knee jerk reactions to remediate any defects that are found, quite often at the expense of the application’s original design concepts. It also likely fails to find a great many security defects. To make matters worse, forced integration of tool technologies into existing workflows can be disruptive and counter productive.

    This talk delves into the automated tools associated with secure software development, and how they can be successfully integrated into a development workflow.

    Tool categories are first surveyed, and their utility and applicability to secure development reviewed. These include traditional information security tools such as network vulnerability scanners and application vulnerability scanners, as well as more focused development-only tools such as static source code analyzers. The pros and cons of each tool set is described in plain detail, with particular attention to how software developers can benefit from them.

    Next, individual tool categories are discussed with regards to how they can be integrated into a secure software development workflow process. This portion of the session starts by examining the pitfalls associated with how the tools are often put to use by software developers, and then provides a clear set of recommendations of how to best make use of the tools.

    Penetration testing tools (and processes), for example, are often used in a late life cycle approach that "verifies" an application's security level shortly before its deployment into production. This approach is inherently a "black box" one in which the application is assessed in an outside --> in perspective. This talk recommends an alternate approach to using penetration testing tools in an inside --> out manner that optimizes employee time and effort by prioritizing work based on identified business risks. That is, "white box" penetration testing can focus on the aspects of an application that have been identified as being weak during architectural risk analyses.

    Similarly, static source code analysis tools are often used in a late life cycle manner that leaves little time for remediation of identified coding defects. In this talk, we explore methods of integrating static source code analysis tools throughout the coding process in a way that greatly optimizes their likelihood of success and reduces the amount of effort necessary.

    Outline

    1. Overview of software security process "touchpoints"

      • Security activities that can be applied to various artifacts produced during software dev
    2. Survey of existing tools

      • Tools associated with Information Security

        • Network scanners
        • Vulnerability scanners
        • Application scanners
        • Strengths and weaknesses with regards to software security
      • Tools associated with Software Security

        • Static source code analysis tools
        • Testing tools
        • Strengths and weaknesses with regards to software security
    3. Integration into development workflow

      • Penetration testing

        • Inside-out process
        • Business risk prioritization of test activities
      • Code review

        • Iterative review vs. all-at-once review
        • Incorporation of code review in nightly builds
        • IDE plug-ins for easier workflow
        • Management features available in most commercial tools
          • Tracking and trending
          • Policy centralization
      • Application testing

        • Security testing tools for QA testers
        • Effective test scenario design

    Benefits

    • Students will learn about the benefits and pitfalls of the tools that can be used during secure software development. These pros and cons are spelled out in a vendor-neutral manner.
    • Students will gain insight into how tools can be best integrated into their own software development processes. Clear, practical, and easy to understand lists of recommendations are provided for each tool thatwill help the student succeed with each tool type discussed.

    Seville, ES

    June 21, 2007 10:00-10:50

    Hosted by FIRST.Org

    MD5: 3faef556df3ceb93ca93ee2b33d852c4

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 179.38 Kb

    MD5: 9e9749e710298c5c81fba60f307add30

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.17 Mb

  • US

    Taming Packets: The Network Expect Framework for Building Network Tools

    Network Expect is a framework that allows to easily build tools that can interact with network traffic. Following a script, traffic can be injected into the network, and decisions can be taken, and acted upon, based on received network traffic. An interpreted language provides branching and high-level control structures to direct the interaction with the network.

    Network Expect was heavily influenced by, and inspired on, the "Expect" program written by Don Libes, which allows to "talk" to interactive programs in a scripted fashion. Because of this, there are lots of similarities between commands in Network Expect and commands in Expect.

    A Network Expect script can send traffic to the network and then take decisions based on the received network traffic. The type of things that Network Expect can do are usually very low level network operations, which usually require writing a custom program in a language like C.

    Network Expect’s philosophy is based on the observation that network applications always operate on an action-reaction principle in which something is sent over the network to an application running on a remote host and a response is then received.

    Network Expect can generate arbitrary network traffic and inject it into a network at layer 2 or layer 3. A wide range of protocols is supported, including IP version 6 as well as protocol options like IPv4 options, IPv6 extension headers, and TCP options. Network Expect can also listen for network traffic, decode it, and take decisions based on the type of traffic received.

    These capabilities make it very easy to emulate network protocols to do vulnerability testing and auditing, penetration testing, network protocol research, etc.

    The presentation "Taming Packets: The Network Expect Framework for Building Network Tools" will give an introduction to the Network Expect framework and provide examples of how Network Expect has been used to solve real-life problems.

    Network Expect is Open Source Software that was developed by Eloy Paris from Cisco Systems.

    Seville, ES

    June 20, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: 5f8572e5bced818537eb139e27d7d487

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 110.95 Kb

  • Technical Evolution of Cybercrime

    Cybercrime is becoming more and more widespread, due to the flexibility and risk-free use of modern Trojans and other malware.

    When talking about Trojans and worms, most people think about phishing threats. Phishing and Pharming ARE major threats to all online users. Besides the immediate commercial damage, one of the most displeasing side effects of Phishing and Pharming is the destruction of TRUST in the quickly growing internet business.

    But Phishing is not the only threat targeting the end user. There are others, like industrial espionage or spear phishing which are not well-known in public but posed a real and more serious threat. In the past, we discussed the future potential of what used to be Remote Access Trojans (RATs), today this threat is represented by IP (intellectual property) worms, cryptoviral extortion schemes, or industrial espionage Zero-day exploits.

    Malware can also have national security implications, but discussions on these are again rare in public. For instance, in June 2005, Japanese nuclear data was leaked on the Internet through a virus on a personal computer. It exposed interiors, details of regular inspections of repair works, and names of workers.

    Other incidents in Israel and UK were reported only briefly in the news.

    This paper will change the focus of Trojans from online fraud to more serious threats - like industrial espionage and terrorism.

    Terrorism and phishing have one thing in common: Information gathering, manipulation - and money. Looking at a typical drop zone of a Trojan, you'll find all kinds of information, like passwords, IDs, credit card details etc.

    These information alone are not interesting, but in a combination, can create a major threat, e.g. to assemble a false ID. But who is collecting all this information? Who has access to this? Who is using it? This paper will show you how all these interact together in our today's world.

    Using a typical "latest design" worm, we will analyze the behavior, the communication and the impact of such malware. We will show you how to use trigger-based systems to collect data in an intranet, and how to use actual malware to make designer worms, undetectable by antivirus scanner for personal spying. We will discuss pattern-based detection versus anomaly behavior detection, and will close with a forecast on next generation malware.

    Seville, ES

    June 22, 2007 10:00-10:50

    Hosted by FIRST.Org

    MD5: e5dfdec5a1abb30dfc8691e02cbaab2b

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.74 Mb

  • NL

    The Art of RFID Exploitation

    Radio Frequency Identification (RFID) malware, first introduced in my paper 'Is Your Cat Infected with a Computer Virus?', has raised a great deal of controversy since it was first presented at the IEEE PerCom conference on March 15, 2006. The subject received an avalanche of (often overzealous) press coverage, which triggered a flurry of both positive and negative reactions from the RFID industry and consumers. This presentation will serve as a forum to explain RFID malware, from a hacker's perspective. I will start by explaining the fundamental concepts behind RFID malware, and then offer some qualifications and clarifications, separating out the facts vs. the myth regarding the real-world implications.

    Seville, ES

    June 20, 2007 15:40-16:30

    Hosted by FIRST.Org

    MD5: 6655484eb8cb2c6b1c3e02046cc0844d

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.8 Mb

  • GB

    The Benefits of FIRST: How to sell FIRST to your Upper Management

    Mr. Stanton's presentation is intended to give FIRST members an appreciation of the common market challenges that we all face: what forces are driving investment decisions, the competition for investment, and executive requirements and needs. This summary includes an analysis of specific member issues and an overview of competing organisations. Finally, Mr. Stanton will suggest ways to demonstrate value to senior management, and how to protect investment for future and ongoing activities.

    Seville, ES

    June 21, 2007 15:40-16:30

    Hosted by FIRST.Org

    MD5: 89da5e1dca7a6823f697b3602f2e4121

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.17 Mb

  • GB

    The Security needs of the State versus the rights of the individual

    The spectre of international terrorism has changed the traditional balance between the rights of the citizen to freedom privacy versus the needs of the Nation State to provide security for the population. In the United Kingdom, surveillance technology is already extensively deployed monitoring many aspect of daily life of the population, with even more intrusive programmes planned or under way. Is the loss of privacy the price we must pay for security and safety in the 21st century? What are the future consequences of this increasing loss of individual freedom and privacy?

    Seville, ES

    June 21, 2007 11:20-12:20

    Hosted by FIRST.Org

    MD5: d11b954e7aceb8c779de2c8aeb2ef152

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 222.39 Kb

  • GB

    Tools and techniques to automate the discovery of zero day vulnerabilities

    This half day session will explore the software testing technique of fuzzing and how it can be used to find security defects. It will cover the advantages and disadvantages of fuzz testing and will give some practical insight into the current free tools and techniques available to security testers. During the session several demonstrations will be given showing how fuzzing may have been used in the past to discover some well publicised security vulnerabilities. The attendees will also be encouraged to gain some hands on experience.

    Seville, ES

    June 22, 2007 10:00-10:50, June 22, 2007 11:20-12:20, June 22, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: ce4659bbecdaf8d37ab764119b9fbeb2

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.21 Mb

  • TN

    Tunisia's experience in establishing the first public CSIRT in Africa, as a case example for developing countries, and some guidelines and schemes for International cooperation

    As a case example for developing countries, we will first give a fast overview about the actions of the Tunisian strategy in ICT Security which led to the launch of the Tunisian CERT, the promulgation of "an original" law related to IT Security (mandatory security audit, mandatory declaration of attacks, ..) and the launch of an Agency specialized in ICT Security.

    We will then focus on the presentation of the activities of the public Tunisian CERT: the CERT-Tcc (Computer Emergency Response Team - Tunisian Coordination Center), by giving an overview about:

    • The awareness & information actions carried by the Cert-TCC and the specific actions carried out in the awareness field for parents and youth and common ICT users (besides ICT professionals), due to our position as a public CERT.
    • The launch of a CSIRT and the accompanying lawful measures ("mandatory declaration of incidents that can affect other information systems", accordingly to the law N°5-2204).
    • The establishment of a Watch and Alert Center : the ISAC system "Saher" and the reaction plan "Amen"
    • Professional Training & Education actions, based on the launch of training sessions for trainers and on the launch of Masters in IT security
    • Research & Development strategy and actions, based on the open-source approach, for the rapid and efficient emergence of national R&D activities.
    • The role of NGO in consolidating the effort of the CERT-TCC and actions carried with NGO associations.

    We will conclude by presenting an overview about the urgent needs of developing countries and the interest of a regional approach and closes with a set of guidelines and key issues to consider for building efficient plans and strategies in IT security, coming from the Tunisian experience in that field, and which is partially based on the launch of the CERT-TCC.

    Seville, ES

    June 22, 2007 17:00-17:45, June 22, 2007 17:45-18:00

    Hosted by FIRST.Org

    MD5: 61c7db17bf6b3f90f37c7e5a94e96c4c

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1.1 Mb

    MD5: 453e1570158605f8c71fc3e9440a88f1

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 2.74 Mb

  • US

    Unique Challanges for Incident Response in a Grid Environment

    Incident response within an organization can often be a challenging task. There are usually multiple levels within an organization, as well as multiple departments that you may have to work with when responding to an incident. What are the challenges when you now have a grid environment where you may have thousands of users using resources within your organization that you have no control over? Then when an incident does happen (that's not an "if"), how do the organizations within the grid work together to respond to the incident, which can usually have spillover to many sites within the grid. This work addresses the challenges of incident handling and response in the more complex environment of grid computing where there is a distributed user base and multiple physical entities composing a virtual organization. We will cover how the TeraGrid sites deal with coordinated incident response and give some real world examples on actual incidents.

    Seville, ES

    June 22, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: 7e99a9c059b3a5af76e96049bd3e57a0

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 417.06 Kb

  • US

    UNIX/C Programming traps and pitfalls

    Neither the UNIX system, nor the C programming language were built with security as a primary goal. Consequently, building a secure program can be like building a house on quicksand. The challenge for the implementor is to avoid the mechanisms that are weak, and to carefully build on the few mechanisms that remain. This tutorial focuses on implementation errors, why these errors happen, and how an implementor can avoid making such errors.

    Security problems happen when system behavior does not match the user's expectation. Wietse illustrates this with a very small and obviously correct file shredder program that does not work at all, and for more reasons than most people can think of. This is followed by a segment that illustrates several flaws that were found in real applications that used the UNIX file system in an exploitable manner.

    The set-uid feature is unique to UNIX, and deserves its own segment. Wietse demonstrates why it is fundamentally impossible to write set-uid software without creating a security hole.

    Finally, Wietse presents the open source Postfix mail system, and how its partitioned design not only helped to build a secure mail system, but also helped to avoid code degeneration as the system expanded in size by more than four times.

    Seville, ES

    June 18, 2007 14:40-16:30, June 18, 2007 17:00-18:50

    Hosted by FIRST.Org

    MD5: 35da697fd09295de5578e1e6f47d9487

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 998.37 Kb

  • DE

    Using instrumented browser instances for detecting 0-day exploits and filtering web traffic

    In the past three years the main infection vectors of malware have shifted from network scanning worms targeting server software and social engineering based attacks such as email worms to attacks targeting vulnerabilities in client software. The most popular target of these attacks is Microsofts Internet Explorer. One idea that has been employed in the past to deal with scanning worms also proves useful in these new scenarios: honeypots.

    In the talk the idea of using a client honeypot to protect a small workgroup environment is explored. We present an architecture for integrating an automated instance of Internet Explorer into a web proxy to transparently filter malicious web sites. We provide implementation details, report on problems encountered and give measurements of run-time metrics such as latency.

    Seville, ES

    June 21, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: 62b5372864dfdd179a97f27fb11d83f7

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 4.52 Mb

  • US JP

    Vulnerability Remediation Decision Assistance system

    Art Manion is the Vulnerability Analysis Team Lead at the CERT Coordination Center (CERT/CC). The Vulnerability Analysis Team works with vendors, reporters, researchers, and other parties on vulnerability coordination, response, and disclosure. In addition, the team researches new ways to manage vulnerability information and improve software security. CERT/CC is a Federally Funded Research and Development Center (FFRDC) operated by the Software Engineering Institute at Carnegie Mellon University.

    Hal Burch is a member of technical staff at the CERT Coordination Center (CERT/CC). Hal's responsibilities at CERT/CC include the Secure Coding Initiative and development of tools for vulnerability handling at CERT/CC. CERT/CC is a Federally Funded Research and Development Center (FFRDC) operated by the Software Engineering Institute at Carnegie Mellon University.

    Yurie Ito is a Director of the Technical Operation of JPCERT/CC. Yurie is responsible for overall JPCERT/CC Technical Operation including Incident Response, Vulnerability Handling, Watch and Warning, and Situation Awareness program. She is a Director and Steering Committee member of the FIRST organization since 2005 to 2007. She is a Steering Committee member of the APCERT.

    Seville, ES

    June 21, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: 6d7ef14251924977e561cf0cfee0df92

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 168.76 Kb

    MD5: 6daea9ec14a5432259cba62c2cb274f2

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 1001.66 Kb

  • DE

    Why Protection against Viruses, Bots, and Worms is so hard – Malware seen as Mobile Agents

    Viruses, bots, worms, etc. are nothing else but mobile agents. Mobile agents in turn have been the scope of research in computer sciences for quite some years. Recently research on the security side of mobile agents has received increased attention, too.

    Perfectly securing mobile agents is generally impossible. While this is cumbersome for legitimate scenarios this is good news when trying to protect IT infrastructure. On the other hand, there are quite powerful protection methods for mobile agents so securing computers is far from trivial.

    In order to explain this simple truth the paper relates current as well as well established findings from (theoretical) computer sciences to the IT security world of practitioners.

    It is shown what methods are available to protect mobile agents, i. e. viruses, bots, and worms, from their environments, i. e. the computers they are running on. The limits of these protection methods are also explored.

    Seville, ES

    June 20, 2007 12:20-13:10

    Hosted by FIRST.Org

    MD5: c44081f3365fa794f409c80b28b97ab4

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 141.34 Kb

    MD5: 49729ccda2df172cdaa3a694077ed9be

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 673.13 Kb

  • FR

    WiMAX: Security Analysis and Experience Return

    WiMAX (Worldwide Interoperability for Microwave Access) is the new hyped broadband wireless access technology. Basically WiMAX is a radio technology that promises two-way data access at several megabits per second with ranges of several miles, either in line of sight (LOS) or non line of sight (NLOS) situations.

    IEEE 802.16-2004 standard will be analysed in terms of security, a critical analysis will be performed and fully described. Authentication, confidentiality and integrity on the radio side will be discussed. Some issues will be pinpointed and the presentation will focus on how they are adressed within IEEE 802.16e-2005 standard.

    Finally, we will describe some experimental deployments leaded by France Telecom, how they succeeded in bringing a Broadband Wireless Access to residential and enterprise architectures.

    Seville, ES

    June 22, 2007 15:40-16:30

    Hosted by FIRST.Org

    MD5: e1924c764ffa2b8adcd9a703becb4e31

    Format: application/pdf

    Last Update: June 7th, 2024

    Size: 674.11 Kb

AltStyle によって変換されたページ (->オリジナル) /