Thursday April 10th 2025
Advanced Android Archaeology: Battling Bloated Complexity
Android has become a ubiquitous platform for running mobile apps, granting different actors access to vast amounts of private data. The growing complexity of the Android ecosystem introduces significant security challenges. In this talk, we will explore multiple layers of Android security: examining the foundational virtualization layers, stress-testing trusted applications, and assessing the impact of recent user-space mitigations. Through the lens of system security, we uncover vulnerabilities even in the most trusted layers. Trusted applications are susceptible to type confusion, while regular apps may face risks such as heap corruption attacks. Join us on this journey to enhance mobile ecosystem security through fuzzing, improved standards, and safer defaults.
Mathias Payer is an associate professor at EPFL, leading the HexHive group. His research centers on strengthening software and system security in the presence of vulnerabilities. His broader interests include fuzzing and sanitization to uncover and address flaws, developing effective mitigations to protect against the exploitation of unknown or unpatched bugs, and employing fault isolation to enforce privilege separation.
Mathias joined EPFL in 2018 where he founded the Polygl0ts CTF team. Previously, he was an assistant professor at Purdue University, a PostDoc at UC Berkeley, and a PhD student at ETH Zurich.
Matthias Payer 🎙️ (EPFL, Switzerland)
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels
In recent years, the limits of electromagnetic side-channel attacks have been significantly expanded. However, while there is a growing literature on increasing attack distance or performance, the discovery of new phenomenons about compromising electromagnetic emanations remains limited.
In this talk, we identify a novel form of modulation produced by unintentional electromagnetic emanations: phase-modulated emanations. This observation allows us to extract a side-channel leakage that can be exploited to reveal secret cryptographic material. We introduce a technique allowing us to exploit this side-channel in order to perform a full AES key recovery, using cheap and common hardware equipment like a software-defined radio.
Moreover, we demonstrate that the exploitation of this new phase leakage can be combined with traditional amplitude leakage to significantly increase attack performance. Creating a bridge between prior works from various research fields, we unveil the relationship between digital jitter and signal phase shift in the context of side-channel attacks.
Pierre Ayoub (Eurecom) 🎙️ , Aurélien Hernandez (Eurecom) 🎙️ , Romain Cayre (Eurecom/LAAS-CNRS), Aurélien Francillon (Eurecom) and Clémentine Maurice (University of Lille, INRIA)
DID U misbehave? A new Dataset for In-depth Understanding of Inconspicuous Software
Living-Off-The-Land attacks involve exploiting pre-installed genuine and trusted software for malicious purposes. The various methods available for detecting these attacks often rely on an in-depth understanding of the software components that attackers could abuse. This hypothesis is unrealistic today given the number of software components installed on a system and the number of options available for each software component. We present in this article an open access dataset built from the deep analysis performed by security experts of 912 options from 23 different Linux command-line software programs. The associated manual documentation section of these command options has been labelled according to one of 12 possible behaviour classes from our consolidated taxonomy. Our contributions represent an important step toward understanding system-wide software execution as combinations and chains of individual behaviours regardless of the underlying software.
Antonin Verdier (UT, IRIT) 🎙️ , Romain Laborde (UT, IRIT), Abir Laraba (UT, IRIT) and Abdelmalek Benzekri (UT, IRIT)
Manipulation techniques used in social engineering
This presentation looks at how social engineering attacks trick people, focusing on the sneaky tactics used. We've studied these tricks, sorting them into categories based on how our minds work, drawing from social psychology. We found around 40 different ways attackers manipulate people, showing how they're used in real phishing scams and how they affect our choices. We also explore how these tricks play on our natural biases, making us more vulnerable. Ultimately, we emphasize that understanding these psychological tricks is key to protecting ourselves and building stronger defenses against these sneaky attacks. By understanding how our minds can be manipulated, we can better protect ourselves.
Antony Dalmiere (LAAS-CNRS) 🎙️ , Pascal Marchand (UT, LERASS), Guillaume Auriol (INSA/LAAS-CNRS) and Vincent Nicomette (INSA/LAAS-CNRS)
One for all and all for WHAD: wireless shenanigans made easy !
A lot of security research have recently focused on various wireless communication protocols, targeting smartphones, wireless mice and keyboards and even cars. In order to demonstrate these attacks, researchers developed dedicated tools that for most of them include some specialized firmware of their own but also rely on various unique custom host/device communication protocols. These tools work great but are strongly tied to some specific hardware that at some point will not be available anymore, or require hackers to buy more hardware to carry on to have fun with. Why not making these tools compatible with more hardware ? And why researchers always have to create their own host/device protocol when it comes to using a dedicated hardware ? Why not having one flexible protocol and related tools to rule them all ? We will present in this talk WHAD, a framework that provides an extensible host/device communication protocol, dedicated protocol stacks and way more for hackers who love having fun with wireless protocols. WHAD makes interoperability possible between tools by allowing different hardware devices to be used if they provide the required capabilities, giving the opportunity to create advanced tools without having to care about the hardware and its firmware in most of the cases!
Damien Cauquil is security engineer at Quarkslab, France. He loves electronics, embedded devices, wireless protocols and to hack all of these not especially in that order. He authored several Bluetooth Low Energy tools like Btlejuice and Btlejack, discovered a way to hack into an existing Bluetooth Low Energy connection that has later been improved by his co-speaker Romain Cayre, and other tools on a lot of different topics that tickle his mind but not always related to security or wireless protocols.
Romain Cayre is assistant professor in Software and System Security (S3) group at EURECOM, France. He works on topics related to wireless security, IoT security and embedded systems security. He loves hacking embedded wireless stacks and playing with wireless protocols. In the past, he worked on several research projects related to wireless hacking, like WazaBee (a cross-protocol pivoting attack allowing to receive and transmit arbitrary 802.15.4 packets from a diverted BLE transceiver), InjectaBLE (an attack allowing to inject arbitrary packets into an ongoing Bluetooth Low Energy connection by leveraging a race condition in the Link Layer clock drift compensation mechanism), and OASIS (a defensive framework allowing to generate an embedded detection software and inject it into Bluetooth Low Energy controllers). He is also the main developer of Mirage, an offensive framework for wireless communication protocols (and a draft to the new framework WHAD !)
Damien Cauquil (Quarkslab), Romain Cayre (INSA, LAAS-CNRS) 🎙️
DoS Attacks exploiting Bluetooth Mesh routing protocol
Bluetooth Mesh is a recent wireless communication protocol that enables many-to-many communication, allowing devices to form a network through a mesh topology. At the heart of the protocol lies message relaying, with the Directed Forwarding routing mechanism recently introduced to Bluetooth Mesh to efficiently relay messages across the network.
In this talk, we present a security assessment of the Directed Forwarding mechanism and show that an attacker within the network can leverage that feature to perform Denial of Service attacks and network reconnaissance. We will first present a technical overview of Bluetooth Mesh and Directed Forwarding. We will then present the vulnerabilities found and how to leverage them. This talk will also feature demonstrations of the attacks presented using the WHAD framework targeting a Bluetooth Mesh network.
Elies Tali (LAAS-CNRS) 🎙️ , Vincent Nicomette (INSA, LAAS-CNRS) Romain Cayre (INSA, LAAS-CNRS), Guillaume Auriol (INSA, LAAS-CNRS)
Tapping into the SCCM policies goldmine: exploiting SCCM policies distribution for credentials harvesting
SCCM policies are a prime target for attackers in Active Directory environments as they may expose - intentionally or otherwise - sensitive technical information such as account credentials. Said credentials could be retrieved by authenticated attackers impersonating a registered device, or in some cases from an unauthenticated position by exploiting misconfigurations on policies distribution.
After a quick reminder regarding SCCM (now MECM) environments, this presentation will go over the various attack vectors targeting policies distribution, and will feature concrete demonstrations using a tool devised from this research, SCCMSecrets.py. It will also explain how to execute these attacks via NTLM relaying thanks to a pull request that was submitted and merged into impacket's ntlmrelayx tool.
Quentin Roland (SynAcktiv) 🎙️
Friday April 11th 2025
Supply chain security in Kubernetes
In recent years, there has been an explosion of attacks directed at microservice-based platforms – a trend that follows closely the massive shift of the digital industries towards these environments. The management and operation of container-based microservices heavily rely on automation, leveraging on container orchestration engines such as Kubernetes. This talk will explore how supply-chain attacks can propagate from a single compromised container or endpoint to an entire Kubernetes cluster. We will begin by showcasing how vulnerabilities can be concealed within container images through malicious compliance of Software Bills of Materials (SBOM). Next, we will illustrate how attackers can exploit this foothold to infiltrate and compromise the broader Kubernetes cluster. We will then present advanced techniques for analyzing and strengthening the security posture of Kubernetes deployments. Key areas include securing the full supply chain, from container configurations to Kubernetes setups, detecting vulnerabilities and misconfigurations, monitoring the system for real-time threats and attacks, and implementing mitigation strategies to safeguard microservice ecosystems.
Agathe Blaise is currently a research engineer at Thales (Gennevilliers, France). She received her engineering degree in computer science from ISEN (Lille, France) in 2017, and the Ph.D. degree in Computer Science from LIP6, Sorbonne University (Paris, France) in 2020. Her research interests focus on data analysis applied to network security (intrusion detection system, anomaly detection and botnet detection), cloud computing security, data dissemination management, and quantum networks.
Jacopo Bufalino is a researcher at CNAM (Paris, France) and a doctoral candidate at Aalto University (Espoo, Finland). Previously, he worked for several years in DevOps and DevSecOps. His research interests include cloud network security, container security, and software supply chain security.
Agathe Blaize (Thales), Jacopo Bufalino (CNAM) 🎙️
An explainable-by-design ensemble learning system to detect unknown network attacks
Machine learning is a promising technology for enhancing network intrusion detection systems. However, we observe that results can vary significantly across different models. Determining which result is true is difficult because models are often used as “black boxes”.
Thus, we propose an explainableby-design system that reconstructs attack patterns from the outputs of multiple unsupervised learning models, making them comprehensible to security analysts. Each component of our system is rigorously evaluated on the CSE-CIC-IDS2018 dataset, to verify the relevance of our approach and validate the system
Céline Minh (LAAS-CNRS, Custocy) 🎙️ , Kevin Vermeulen (LAAS-CNRS), Cédric Lefebvre (Custocy), Philippe Owezarski (LAAS-CNRS) and William Ritchie (Custocy)
CVE representation to build attack positions graphs
In cybersecurity, CVEs (Common Vulnerabilities and Exposures) are publicly disclosed hardware or software vulnerabilities. These vulnerabilities are documented and listed in the NVD database maintained by the NIST. Knowledge of the CVEs impacting an information system provides a measure of its level of security.
This article points out that these vulnerabilities should be described in greater detail to understand how they could be chained together in a complete attack scenario. Our work presents the first proposal for the CAPG format, which is a method for representing a CVE vulnerability, a corresponding exploit, and associated attack positions.
Manuel Poisson (Amosys, CentraleSupelec) 🎙️ , Valérie Viet Triem Tong (CentraleSupelec), Gilles Guette (IMT-Atlantique), Frédéric Guihéry (Amosys) and Damien Crémilleux (Amosys)
FlowChronicle: Synthetic Network Flow Generation through Pattern Set Mining
Network traffic datasets are regularly criticized. Generating synthetic network traffic using generative machine learning techniques is a recent area of research that could complement experimental test beds and help assess the efficiency of network security tools such as network intrusion detection systems. Most methods generating synthetic network flows disregard the temporal dependencies between them, leading to unrealistic traffic.
To address this issue, we introduce FlowChronicle, a novel synthetic network flow generation tool that relies on pattern mining and statistical models to preserve temporal dependencies. We demonstrate the capability of FlowChronicle to achieve high-quality generation while significantly outperforming the other methods in preserving temporal dependencies between flows. Besides, in contrast to deep learning methods, the patterns identified by FlowChronicle are explainable, and experts can verify their soundness.
Pierre-François Gimenez, (INRIA) 🎙️ , Joscha Cüppers (CISPA), Adrien Schoen (Inria), Grégory Blanc (Télécom SudParis)
NetGlyph: Representation Learning to generate Network Traffic with Transformers
NetGlyphizer is a novel generative AI approach for generating realistic network traffic. By optimizing tokenization, latent space architecture and introducing a transformer model to generate meaningful trafic flows we improve the fidelity of synthetic traffic output. This innovative approach bridges raw network data with advanced generative modeling for realistic traffic simulation.
Gabin Noblet (LAAS-CNRS, Custocy) 🎙️ , Cédric Lefebvre (Custocy), Philippe Owezarski (LAAS-CNRS) and William Ritchie (Custocy)
Public SMS Services: receive the message, expose the data
This research investigates the security and privacy implications of Public SMS Services (PSSs), which provide shared virtual phone numbers for receiving SMS messages without access control.
The study highlights how the use of PSSs to register on web/mobile applications can lead to serious security and privacy concerns, including data exposure and account compromise. The findings emphasize how PSSs can be leveraged for OSINT, CTI and offensive security, and how related security risks can be mitigated.
Clément Bonnet (Meysys) 🎙️
Deep dive in Laravel encryption security
Laravel is an open-source web framework based on PHP, designed to develop web applications in a structured manner. It provides features such as database management, authentication and migrations, facilitating development. Laravel is one of the most used PHP framework in the world. During an audit, we identified a feature used to validate data integrity by using the function decrypt from Illuminate\Encryption. After leaking the APP_KEY of the application, we were able to decrypt some data and found out that the manipulated data was serialized.
An attacker in possession of an APP_KEY will be able to get a pre-authenticated RCE, in some cases. Furthermore, another aggravating factor is bad practices from developers : Laravel won't regenerate an APP_KEY when a project is started, so if developers copied and pasted a .env file, the APP_KEY will be the same. This presentation will aim to show how to exploit such vulnerabilities, as well as showing how bad sensitive secrets as the APP_KEY can be managed.
Rémi Matasse (SynAcktiv) 🎙️ and Mickael Benassoulii (SynAcktiv) 🎙️
Software Bill of Materials: Vulnerability tracking of offline systems using SBOM
This talk aims to demonstrate how SBOMs can be useful in the context of monitoring project vulnerabilities. Starting from a internal proof-of-concept solution which did not include all component sources and required tedious manual actions with online interactions, we show how the use of SBOMs accompanied by a vulnerability monitoring tool allow us to automate this task offline and obtain a map of the different vulnerabilities of a project at a given moment.
Benoît Guillon (Viveris) 🎙️ and Frédéric Canaud (Viveris) 🎙️
Product security in a low-maturity environment
The presentation is built around a field experience on the deployment of a product security approach. Our aim is to share the lessons learned with the community of security practitioners, to help people design and implement product security governance processes and to highlight the stakes of these activities.
Christian Belin 🎙️