Black Hat promises new exploit techniques, Stuxnet insight

The well-known security conference kicks off on Monday in Abu Dhabi

The Black Hat security conference will kick off in Abu Dhabi on Monday with new information revealed about the Stuxnet malicious software program along with other cutting-edge research.

Tom Parker, director of security consulting services at Securicon, will be among the speakers at the conference, located for the first time in the United Arab Emirates. Parker has taken a deep look at Stuxnet, a piece of malicious software that caused widespread concern because it targeted Siemens SCADA (supervisory control and data acquisition) systems.

Stuxnet has generated a lot of hype and speculation, including whether it was created by some country's intelligence services as well as varying opinions on its sophistication, Parker said. Much of that speculation, Parker said, has been spawned by a problem facing the computer security community: How can certain malware be attributed to a specific person or group?

The methods used to analyse malware, such as sandboxes to test it in a controlled environment and reverse engineering tools, aren't great for figuring out who actually created the code. Attribution is important, as then it would allow a country being targeted to make more informed decisions on how to counteract the attack.

"We don't have that level of scientific research yet in the cybersecurity domain and that's what we really need to start building consensus around," Parker said.

At Black Hat, Parker plans to release an open-source tool called "Blackaxon" that analyses the programming styles of code. Just as authors of books have their own distinct styles and patterns, the same goes for malware authors. His analysis shows that probably at least five different people wrote parts of Stuxnet.

In the long term, there's a need for a way to automate the analysis of malware and match patterns of code to "start building a profile of malware we know is attributable to crimeware or a certain author and later on being able to spot that," Parker said. "There is way too much speculation going on these days."

Parker also plans to put forth some theories on why Stuxnet has some very sophisticated programming but also parts that could be considered quite amateurish. "There are some impressive components in it, but there's this other side that I don't think people are looking at as closely," Parker said.

In another briefing, security researcher Dan Kaminsky will release code that he says allows systems administrators to implement an authentication system into their applications that uses DNS Security Extensions (DNSSEC). The system uses public key cryptography to digitally "sign" the DNS records for websites and is being increasingly deployed to fortify Web security.

"This is code you can integrate into networks and applications that will make entire classes of security problems go away," said Kaminsky, who gained fame two years ago for finding a major flaw in the DNS (Domain Name System).

Unlike PKI (Public Key Infrastructure) systems, leveraging DNSSEC as a broader security mechanism has great benefits: It scales, and it is much cheaper to implement than other authentication systems such as passwords, Kaminsky said. Administrators will be able to deploy DNSSEC into applications in as little as two minutes with no configuration, he said. He is releasing most of the code free.

Other speakers include Felix Lindner, who will give a talk on simple but effective approaches to securing Flash content from Adobe Systems; Lukas Grunwald, who will speak about insecure RFID implementations in passports and government ID cards; and Robert Hansen, who will show new exploitation techniques for content transmitted using SSL (Secure Sockets Layer) encryption.

Black Hat Abu Dhabi runs through Thursday.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwareintrusionExploits / vulnerabilities

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?