Another lazy Sunday (oh well, actually I should be writing papers and grant proposals but we are not talking about that right now) and I'm scrolling through my email when I stumbled upon a "FedEx notice" with your usual "you have not picked up your package" scam and I figured …
read more31c3 - A New Dawn
Another year, another c3
This year marked my 11th year of congress (and 10th visit with a short hiatus in 2012). Just like all the years before we headed to the conference location a day before the start of the 31c3. After arriving in Hamburg (after a quick detour through …
Ghost in the Shellcode Teaser 2015: Lost To Time
We received a file that looked like it was compressed. Let's just pipe it through xz and see what it really is. Aaah, looks like some old and obscure machine code of a machine that has long since been retired.
The machine code is of the CDC 6600, a very …
read moreOn differences between the CFI, CPS, and CPI properties
At OSDI'14 we published our paper on [1] where we introduce two new security properties that protect programs against control-flow hijack attacks enabled by memory corruption vulnerabilities. The design space in this area is already very cluttered and we use this blog post to highlight the differences between the individual …
read more'sploits or having fun with the heap, stack, and format strings
As part of the weekly CTF meetings we discussed some basic stack-based, heap-based, and format string based exploits. For system security challenges these are bread and butter techniques and rely on a huge amount of pre-existing knowledge about operating systems, kernels, process creation, dynamic loading, C programming, stack layouts, and …
read moreJumping monkeys or how to reach a technical point of contact at an online or tech company
Do you know this situation where you have some domain specific knowledge about a problem but first level support at a company blocks you from getting to a knowledgeable person? An example would be tech support at an internet company where you have already restarted your modem and computer yet …
read moreOn collaborative (remote) paper writing
Writing scientific conference or journal papers is an art by itself. This article is not about writing great papers as there already are many good articles that focus on paper writing itself and cover technical aspects, structural aspects, or writing style aspects. In this article I want to give an …
read moreSyScan, day 2
Breaking Anti-Virus Software: Joxean Koret
Joxean gave a great introduction into worst security practices at anti virus companies. He basically dropped a large amount of 0days on a bunch of AV engines (I liked his opening statement "all bugs are 0days unless otherwise mentioned"). Using dumb fuzzing Joxean found a …
SyScan, day 1
Opening speech: Thomas Lim
Thomas gave a great introduction, the conference is as big as ever and attracted a whole bunch of different people. BlackHat Asia is going to stay in Singapore, so there will be some challenges in the future. Most speakers on the other hand preferred to drop …
Two crazy days in Tokyo
After a couple of rough months interviewing for academic positions (there's another blog post coming up on this topic, so stay tuned) I headed off for some well deserved vacation time (and with vacation I mean a hacker conference, SyScan 2014 in Singapore). As there are no direct flights from …
read more