Thursday April 4th 2024
Faulting Hardware from Software and Sustainable Mitigations
Daniel Gruss (@lavados) is an Associate Professor at Graz University of Technology. He has been teaching undergraduate courses since 2010. Daniel's research focuses on side channels and transient execution attacks. He implemented the first remote fault attack running in a website, known as Rowhammer.js. His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018. In 2023, he received an ERC Starting Grant to research the sustainability of security. He frequently speaks at top international venues.
Side-channel attacks and fault attacks are powerful means to attack computer systems without exploiting any software flaws. We will provide some basics for these attacks and show how they can compromise computer systems. We will then discuss how they are mitigated today and reveal the significant sustainability problem we are facing with this patch-security-on-top approach. We will understand how the patches work and why they are expensive. Finally, we will discuss how fundamental changes in how we design systems could yield alternatives more sustainable, both in terms of energy consumption and creating systems with inherent strong security properties.
Download the PDF
Daniel Gruss
Graz University of Technology
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
Users connect and manage their Xiaomi e-scooter over Bluetooth Low Energy (BLE)
through the Mi Home mobile app. We reverse-engineer the four iterations of the
Xiaomi proprietary protocol spoken over BLE and exploit six vulnerabilities to
break security, privacy, and safety. We develop four proximity and remote
attacks that we call Malicious Pairing and Session Downgrade. As a result, we
are able to unlock software-locked e-scooters (and steal them) or prevent
access to the e-scooter via Mi Home. We evaluate three e-scooters and five BLE
subsystems using our open-source toolkit, and we fix the attacks by proposing
two practical countermeasures.
Download the PDF
Marco Casagrande (speaker), Riccardo Cestaro, Eleonora Losiouk, Mauro Conti and Daniele Antonioli
Institut Eurecom, Sophia-Antipolis
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
Ciao! We present the BLUFFS attacks (CVE-2023-24023), six novel attacks breaking Bluetooth's forward and future secrecy. Our attacks enable device impersonation and machine-in-the-middle across sessions by compromising and re-using one session key. We also cover related work like KNOB, BIAS, and BLUR, and educational Bluetooth security tips and tricks.
Download the PDF
Daniele Antonioli
Institut Eurecom, Sophia-Antipolis
Security analysis of radio water meters
Smart meters are nowadays everywhere, and are used to monitor energy and water consumptions. There are many different devices, from different manufacturers, and each of them need to send information to a collecting station/device. Thus the encryption of the said data is an important stake. Water meters in particular rely on local radio communication, transmitting water consumption records to local base stations. There were few security audits on those devices, especially because they rely on proprietary radio protocols, while the data they transmit can be sensitive and personal. This work is about learning, understanding and reversing radio protocols, to notice that sometimes security measures may be unsatisfactory, mainly because of how the encryption mechanisms are implemented.
Download the PDF
Lucas Georget (speaker), Gauthier Vidal and Aurélien Francillon
LAAS-CNRS Toulouse, Institut Eurecom, Sophia-Antipolis
Bringing the Science of Cybersecurity out of the Dark Ages
Jiska is a wireless and mobile security researcher at Hasso Plattner Institute. Her main expertise is low-level wireless subsystems within proprietary firmware and operating systems. She likes reverse engineering them and opening up interfaces for other researchers and users as well.
Computer Science, especially the science of Cybersecurity, is an extremely young discipline – at least compared to natural sciences with hundreds of years of heritage. Starting with this comparison, let's take a look at why we're still practicing alchemy, what we can learn, avoid, expect, and hopefully shape on the path to enlightenment.
Download the PDF
Jiska Classen
Hasso Plattner Institute, University of Potsdam
Ubuntu Shiftfs: Unbalanced Unlock Exploitation Attempt (CVE-2023-2612)
This talk uncovers the CVE-2023-2612 vulnerability in Ubuntu Shiftfs, originally intended for participation in Pwn2Own. The presentation will describe an unbalanced unlock bug and its impacts. Furthermore, we discuss the process of converting this bug into primitives for Local Privilege Escalation (LPE), while also addressing the encountered challenges.
Download the PDF
Jean-Baptise Cayrou
Synacktiv, Toulouse
Securely dealing with removable USB disks
While building a stand-alone decontamination station for removable USB disks,
Viveris Technologies identified some security threat scenarios related to the
usage of untrusted USB disks (bypass of the station, malicious files or on-disk
filesystem formats) that could lead to data ex/in-filtration. The talk is about
the mitigations that were identified, evaluated and implemented.
Download the PDF
Valentin Belmon, Benoît Guillon (speakers), Didier Barvaux
Viveris Technologies
Friday April 5th 2024
The Bugs I've Found, The Bugs I Have Yet To Find
Mike Ryan is an independent security consultant from California. He founded ICE9 Consulting in 2016 to address the growing demand for security expertise in the Bluetooth/embedded/IoT space. ICE9 serves customers in the medical, industrial/automotive, and enterprise markets. Mike enjoys working with these groups because of their unique security needs and the hands-on approach needed to deliver excellent results. In his spare time, Mike collects CVEs for exotic objects such as Bluetooth skateboards (CVE-2015-2247) and Bluetooth credit cards (CVE-2018-9119).
Join Mike for a mid-career look back on 20 years of bug hunting. Take a trip down memory lane and see what was fresh from the 20's to the 10's all the way back to the naughty aughties. The surprising truth: as far as things have come, much of what worked then still works now. What will things look like 20 years from now? This talk doesn't even attempt to predict that, but we believe the fundamental truths we distill here to be timeless
Download the PDF
Mike Ryan
ICE9 Consulting
How to voltage fault injection ?
During physical security assessments of IoT devices, one of the goals is to take advantage of debug interfaces or accessible chips to study how the devices work. An ideal scenario is the extraction of the full file system to find a way to gain root access to the device. Then, it is easier to check what services are running, debug them if needed, to finally take control of the target. It is common to encounter protections on the debug interfaces that forbid access to its full functionalities, or on the boot chain that forbid any modification on it. Glitching is one way to try to bypass this kind of protection. In this presentation, we will introduce voltage glitching with several study cases to understand how it works and how it can be helpful.
Download the PDF
Théo Gordyjan
Synacktiv
BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports
Malware analysis consists of studying a sample of suspicious code to understand it and producing a representation or explanation of this code that can be used by a human expert or a clustering/classification/detection tool. The analysis can be static (only the code is studied) or dynamic (only the interaction between the code and its host during one or more executions is studied). The quality of the interpretation of a code and its later detection depends on the quality of the information contained in this representation. To date, many analyses produce voluminous reports that are difficult to handle quickly. In this article, we present BAGUETTE, a graph-based representation of the interactions of a sample and the resources offered by the host system during one execution. We explain how BAGUETTE helps automatically search for specific behaviors in a malware database and how it efficiently assists the expert in analyzing samples. We also develop a possible use case of BAGUETTE being currently researched: explainable unsupervised malware behavior clustering.
Download the PDF
Pierre-François Gimenez (speaker) Vincent Raulin, Yufei Han and Valérie Viet Triem Tong
INRIA/Centrale Supelec, Rennes
CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, Reproducibility and Experience
Experimenting in cybersecurity requires manipulating reliable and realistic data. In particular, labelled data derived from the observation of a complete campaign is rarely available, due to its high sensitivity and the difficulty of accurately labelling datasets. This situation harms the reproducibility of research results and therefore to their impact. The CERBERE project addresses this issue through a reproducible attack-defense exercise and a labelled dataset usable for research purposes. The attack-defense exercise is first composed of an exercise for red teamers automatically deployed with variable attack scenarios. Second, an exercise for blue teamers can be operated using the system and network logs generated during the attack phase. We provide the software to rebuild the infrastructure for red teamers and we share a labelled dataset where we spot the ground truth.
Download the PDF
Natan Talon (speaker) Pierre-Victor Besson, Romain Brisse, Hélène Orsini, Jean-François Lalande, Frédéric Majorczyk, Alexandre Sanchez and Valérie Viet Triem Tong
Hackuity, Rennes
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems
The use of Machine Learning for anomaly detection in cyber security-critical applications, such as intrusion detection systems, has been hindered by the lack of explainability. Without understanding the reason behind anomaly alerts, it is too expensive or impossible for human analysts to verify and identify cyber-attacks. We propose a novel post-hoc explanation method, called AE-pvalues, which is based on the p-values of the reconstruction errors produced by an Auto-Encoder-based anomaly detection system. Our work identifies the most abnormal network traffic features associated with an anomaly alert, providing interpretations for the generated alerts. We conduct an empirical study using a network intrusion dataset, CICIDS2017, to compare the proposed AE-pvalues method with two state-of-the-art baselines. Our experimental results show that the AE-pvalues method accurately identifies abnormal influential network traffic features. Furthermore, our study demonstrates that the explanation outputs can help identify different types of network attacks in the detected anomalies, enabling human security analysts to understand the root cause of the anomalies and take prompt action to strengthen security measures.
Download the PDF
Maxime Lanvin (speaker), Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic MÉ and Eric Totel
Centrale Supelec, Université de Rennes, IRISA, Rennes
Cyberious Game: Experiencing Social engineering
Recent waves of cyber attacks using social engineering techniques and targeting
the public and the institutions have highlighted the considerable need for
companies and institutions to set up phishing campaigns to improve people's
awareness. This presentation proposes a new approach to raise awareness on the
human vulnerabilities exploited in cybersecurity attacks. It details the
process of the creation of a serious game designed to improve public alertness
in an proper, effective and sustainable way.
Download the PDF
Ladislas Hajnal (speaker), Clément Vuillaume
ENAC, Toulouse
Exploring modern OS Administrative Privileges
With the new personal data protection or export control regulations, the Principle of Least Privilege is mandatory and must be applied even for system administrators. This article explores the different approaches implemented by the main operating systems (namely Linux, Windows, FreeBSD and Solaris) to control the privileges of system administrators in order to enforce the Principle of Least Privilege
Download the PDF
Eddie Billoir (speaker), Romain Laborde, Ahmad Samer Wazan, Yves Rutschle and Abdelmalek Benzekri
IRIT, Université Toulouse 3, Toulouse
PHP filter chains: How to use it
In the past, to leak local files, it was required to either fully control the path pointing to the file to leak, or to have a path traversal to go up in the file tree. Most importantly, it was mandatory for the server to send you back its content in the response. In both cases, the affected PHP functions support wrappers, the most iconic being file:// which is a prefix before a file path. Other wrappers such as php://filter can also be passed on these methods which allows leaking PHP sources by base64 encoding them (ex : php://filter/convert.base64-encode/resource=index.php). In this presentation, we will see tricks allowing to use the php://filter wrapper to either prepend arbitrary data to a file content, or use it to leak data via an error based oracle. Exploitation examples will be presented as well as patches to protect yourself against this kind of vulnerability.
Download the PDF
Rémi Matasse
Synacktiv, Rennes
A Portable Lab for Teaching Ethical Hacking
Coming soom
Download the PDF
Michael Dorin
University of Saint Thomas, US