Difference between revisions of "PSWEpisode635"
m (→Lee's Stories)
|Line 29:||Line 29:|
= Tech Segment: Ryan Speers & Jeff Spielberg, River Loop Security - 6:45PM-7:30PM =
= Tech Segment: Ryan Speers & Jeff Spielberg, River Loop Security- 6:45PM-7:30PM =
<--[[File:.jpg|right|250px|thumb|<center>'''[https://.com/]'''is of [https://.com/].</center>]] -<br><br>'''Segment Topic:'''<br>Hardware or Device based security. Designing security from the beginning of product development<br><br>'''Segment Description:'''<br>The world continues to see a proliferation of highly insecure IoT/embedded products. How can companies making embedded products design security in from the start, and why don’t they do it today? Importantly, security needs to be baked in while remaining lean and moving quickly towards an MVP product. Discussions will range from hardware chip selection, cryptographic protocol design, and firmware security -- both at the design and security pen test phases.<br><br>'''Segment Resources:'''<br>
<br><br>'''Segment Topic:'''<br>Hardware or Device based security. Designing security from the beginning of product development<br><br>'''Segment Description:'''<br>The world continues to see a proliferation of highly insecure IoT/embedded products. How can companies making embedded products design security in from the start, and why don’t they do it today? Importantly, security needs to be baked in while remaining lean and moving quickly towards an MVP product. Discussions will range from hardware chip selection, cryptographic protocol design, and firmware security -- both at the design and security pen test phases.<br><br>'''Segment Resources:'''<br>
# '''Problem Space'''
# '''Problem Space'''
Revision as of 20:09, 14 January 2020
Recorded January 16, 2020 at G-Unit Studios in Rhode Island!
- 1 Episode Audio
- 2 Announcements
- 3 Interview: Gene Kim, IT Revolution - 6:00-6:45PM
- 4 Tech Segment: Ryan Speers & Jeff Spielberg, River Loop Security, LLC - 6:45PM-7:30PM
- 5 Security News - 7:30-8:30PM
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
Interview: Gene Kim, IT Revolution - 6:00-6:45PM
Gene Kim is a multiple award-winning CTO, researcher and author, and has been studying high-performing technology organizations since 1999. He was founder and CTO of Tripwire for 13 years. He has written six books, including The Unicorn Project (2019), The Phoenix Project (2013), The DevOps Handbook (2016), the Shingo Publication Award winning Accelerate (2018), and The Visible Ops Handbook (2004-2006) series. Since 2014, he has been the founder and organizer of DevOps Enterprise Summit, studying the technology transformations of large, complex organizations.
The Unicorn Project and The Five Ideals
I’ll share with you my goals and aspirations for The Unicorn Project, describe in detail the Five Ideals, along with my favorite case studies of both ideal and non-ideal, and why I believe more than ever that DevOps will be one of the most potent economic forces for decades to come.
Tech Segment: Ryan Speers & Jeff Spielberg, River Loop Security, LLC - 6:45PM-7:30PM
Ryan is a managing partner of River Loop Security and has assessed a wide range of embedded devices, finding vulnerabilities by physical attacks, network access, firmware reversing, and other techniques. He has led design of remediations or new systems, frequently focusing on their cryptographic protocols and protections. Ryan is also known for his research on the security of radio protocols, including IEEE 802.15.4/ZigBee and maintenance of the KillerBee framework frequently used to assess these protocols.
He also has unique experience analyzing intrusion attempts and malware from sophisticated cyber actors as well as developing strategy and operations. He participated in discovering and countering of the most sophisticated cyber threats from nation states and foreign organized crime. Finally, Ryan has developed specialized tools for Windows, performed protocol analysis, designed custom protocols, and performs static and dynamic application analysis.
He has published peer-reviewed articles at USENIX WOOT (Packets in Packets: In-Band Signaling Attacks for Modern Radios), HICSS (wireless tools), Workshop on Embedded System Security (USB as a “network” attack surface for embedded systems), and MILCOM. Additionally, he has presented at the ShmooCon, ToorCon Seattle, DefCon Wireless Village, Ekoparty, and Troopers information security conferences. Ryan also is the inventor on a number of patents related to key management and encryption at scale.
Ryan has worked as a security researcher and developer for the USG, a fraud detection company, a university, and a VC-backed start-up enterprise security and encryption company. He holds a Computer Science degree from Dartmouth College and various other trainings.
Jeff Spielberg is a managing partner of River Loop Security. An electrical engineer by training, his primary cybersecurity interests and research focus on low-level hardware reverse engineering on embedded devices. He has performed security penetration testing on a wide array of embedded devices and often works on secure design and architecture projects for critical embedded and IoT applications.
Hardware or Device based security. Designing security from the beginning of product development
The world continues to see a proliferation of highly insecure IoT/embedded products. How can companies making embedded products design security in from the start, and why don’t they do it today? Importantly, security needs to be baked in while remaining lean and moving quickly towards an MVP product. Discussions will range from hardware chip selection, cryptographic protocol design, and firmware security -- both at the design and security pen test phases.
- Problem Space
- We keep seeing the same vulnerabilities in embedded / IoT – hardcoded passwords, outdated open source packages, unnecessary network exposure. While some exploited vulns are complex chains, most remain simple, fixable issues. However, we continue to see thousands of new embedded devices (consumer IoT to industrial and critical system) that don’t fix these issues (summary of landscape from f-prime at https://s3-eu-central-1.amazonaws.com/evermade-fsecure-assets/wp-content/uploads/2019/04/01094545/IoT-Threat-Landscape.pdf). This creates the need to start identifying these issues earlier in development since patching cycle times in embedded are long.
- Shifting security left
- We looked at our past data from 10 years of services work, and found that it’s more expensive for firms to respond to 1 vulnerability disclosure than it is to do an end-to-end embedded secure design process https://www.riverloopsecurity.com/blog/2019/08/proactive-reactive/
- Where security teams/expertise can help
- Considerations for embedded
- There’s a special order of operations when it comes to embedded systems – hardware changes can be incredibly expensive (for a PCB turn), and there’s a goal to always minimize BOM cost. This manifests itself as issues with chip selection and hardware design which create vulnerabilities from the start – that have no easy fix in the field. This makes the initial threat modeling, architecture, and key design decisions (e.g. chip selection) critical to get right
- Using tooling
- We’ve open sourced some things that may be relevant, such as https://www.riverloopsecurity.com/blog/2019/04/secure-embedded-development-banned-h/ to help developers avoid memory safety issues in the first place as much as possible. Firmware Security Analysis – quickly growing field - There are tools for firmware evaluation, including some open source ones such as https://github.com/cruise-automation/fwanalyzer and more in-depth commerical ones such as one we launched, https://pilot-security.com. If you want, we could talk about what such types of tools can/can’t do - and how people can use them to find bugs early in development.
Security News - 7:30-8:30PM
- Powerful GPG collision attack spells the end for SHA-1
- Artificial Personas and Public Discourse - Schneier on Security
- Unpatched Citrix Flaw Now Has PoC Exploits
- How Cyber Security Affects SEO
- Cisco addressed a high-severity bug in Webex that could allow Remote Code Execution
- Security pitfalls to avoid when programming using an API - Help Net Security
- Lottery hacker gets 9 months for his 5 cut of the loot
- 5G Security - Schneier on Security
- Exploit that gives remote access affects ~200 million cable modems
- Perfect Sense unveils Gyro to simplify cloud infrastructure management - Help Net Security
- Serious back door Vulnerabilities spotted in Tik Tok
- Malicious npm package taken down after Microsoft warning
- Windows 10: NSA reveals major flaw in Microsoft's code
- Trump Slams Apple for Refusing to Unlock Suspected Shooters iPhones
- PussyCash adult webcam data breach exposes highly sensitive data of models
- How to Reduce Your Attack Surface with 11 Proven Tips
- PayPal patches high severity password vulnerability Security token exposure in CAPTCHA process resolved. No evidence of abuse found.
- DOI halting use of DJI drones over concerns of Chinese Tech DOI has over 800 DJI drones which may have surveylence capabilities. Decision to replace rather than repair.
- Maze ransomware operators publish 14GB of Southwire files Southware refused to pay the ransom, and obtained an injunction aginst the first publisher of their data. Maze raises the stakes. REvil similarly inclined.
- AA20-014A: Critical Vulnerabilities in Microsoft Windows Operating Systems CryptoAPI spoofing vulnerability - CVD-2020-0601, Windows RDP vulnerabilities - CVD-2020-0609, CVD-2020-0610, CVD-2020-0611 - impacts Server 2012 and newer, Windows 7 and newer. Apply January patch bundle.