News

Black Hat Researchers Overcome Security Learning Curve

The Black Hat Briefings return to Caesars Palace this week with a new batch of hands-on security research for a crowd of 4,000 IT administrators, hackers, industry experts and government officials.

Security issues continue to get more challenging each year and hacking no longer is child's play, said Black Hat founder Jeff Moss. "Over the last year the attacks have gotten better," he said. "On the organized-crime side, they have gotten better organized. The bad guys have continued to grow up."

The Black Hat Briefings have evolved from an adjunct of the annual Defcon hackers' convention to a premier venue for presenting the latest security research. "I noticed two trends" in this year's presentations, Moss said. Web applications continue to be the low-hanging fruit of IT security. Moss wanted to focus more on other areas this year, but "we still ended up finding a lot that was interesting" in Web application security.

The second trend is the strength of the original research being done. One of the most high-profile examples is the discovery of a design flaw in the Doman Name Service that resulted last month in a coordinated multi-vendor patch release by Dan Kaminsky, director of penetration testing for IOActive Inc. Some details of the vulnerability already have been leaked, but Kaminsky is scheduled to go into more detail at this week's conference.

Research has produced something of an embarrassment of riches this year, Moss added. Competing presentations during one "power hour" will make it difficult for attendees and even speakers to hear everything they want to.

"One speaker told me [he didn't] want to show up at [his] own talk" because he wanted to listen to another speaker scheduled at the same time next door, Moss said.

Three such conflicting presentations scheduled for Aug. 7 are "How to Impress Girls with Browser Memory Bypasses" by researchers Alexander Sotirov and Mark Dowd; "The Internet is Broken," an examination of client-side threats by Ernst & Young security advisers Nathan McFeters and Rob Carter, and John Heasman, vice president of research at United Kingdom-based NGS Software; and "Get Rich or Die Trying" by White Hat Security Chief Technology Officer Jeremiah Grossman and researcher Arian Evans, about the profit potential in some online scams that aren't, strictly speaking, illegal -- yet.

As in past years, most of the work being presented focuses on software. Yet as operating systems become more challenging, the hacking landscape is slowly shifting to other targets, such as applications.

But hardware is coming under attack as well, and research in this area has not kept up with threats. "I've been trying to bring more hardware security in," Moss said. "[But] that's been a tough nut to crack. In government, they think that because it's hardware, it can't be hacked," he added.

One new feature of this year's briefings is letting attendees have a say in selecting presentations. Registered attendees were able to view submissions to the call for papers online and pass on comments and suggestions to the selection committee, which made the final decision. Submitters got to choose how much of their material was available for review.

"This is a system I wanted to build for years," Moss said. As the presentations become more technically sophisticated, the selection committee needs more expertise in reviewing submissions for accuracy and relevance. "It was a work in progress this year, but we got good results. There weren't too many surprises. What attendees wanted generally was what the reviewers wanted," but there were a few presentations that were selected that might have otherwise been passed over.

About the Author

William Jackson is the senior writer for Government Computer News (GCN.com).

comments powered by Disqus

Featured

  • New 'Visual Studio Hub' 1-Stop-Shop for GitHub Copilot Resources, More

    Unsurprisingly, GitHub Copilot resources are front-and-center in Microsoft's new Visual Studio Hub, a one-stop-shop for all things concerning your favorite IDE.

  • Mastering Blazor Authentication and Authorization

    At the Visual Studio Live! @ Microsoft HQ developer conference set for August, Rockford Lhotka will explain the ins and outs of authentication across Blazor Server, WebAssembly, and .NET MAUI Hybrid apps, and show how to use identity and claims to customize application behavior through fine-grained authorization.

  • Linear Support Vector Regression from Scratch Using C# with Evolutionary Training

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the linear support vector regression (linear SVR) technique, where the goal is to predict a single numeric value. A linear SVR model uses an unusual error/loss function and cannot be trained using standard simple techniques, and so evolutionary optimization training is used.

  • Low-Code Report Says AI Will Enhance, Not Replace DIY Dev Tools

    Along with replacing software developers and possibly killing humanity, advanced AI is seen by many as a death knell for the do-it-yourself, low-code/no-code tooling industry, but a new report belies that notion.

  • Vibe Coding with Latest Visual Studio Preview

    Microsoft's latest Visual Studio preview facilitates "vibe coding," where developers mainly use GitHub Copilot AI to do all the programming in accordance with spoken or typed instructions.

Subscribe on YouTube