ESSoS keynotes by Karsten Nohl and David Basin

Eric | February 15, 2016

Karsten Nohl

David Basin

We have just put online information about our two keynote presentations at ESSoS by Karsten Nohl and David Basin. Karsten Nohl will ask the question How much security is too much?, citing some lessons learned from introducing security into a new, large telecommunications startup, while David Basin will elaborate on the quirks of Security Testing and what it actually all means. I am looking forward to two exciting presentations!

Cross-posted from Secure Software Engineering

Comments
Comments Off on ESSoS keynotes by Karsten Nohl and David Basin
Categories
Misc, Research, Uncategorized

ESSoS keynotes by Karsten Nohl and David Basin

Eric | February 15, 2016

Karsten Nohl

David Basin

We have just put online information about our two keynote presentations at ESSoS by Karsten Nohl and David Basin. Karsten Nohl will ask the question How much security is too much?, citing some lessons learned from introducing security into a new, large telecommunications startup, while David Basin will elaborate on the quirks of Security Testing and what it actually all means. I am looking forward to two exciting presentations!

Cross-posted from Secure Software Engineering

Comments
Comments Off on ESSoS keynotes by Karsten Nohl and David Basin
Categories
Misc, Research, Uncategorized

GaLity accepted at ESSoS 2016

Eric | February 15, 2016

We’re happy to announce that our paper “Analyzing the Gadgets – Towards a Metric to Measure Gadget Quality” has been accepted at ESSoS 2016. In this paper we present four metrics that allow assessing the usefulness of a set of gadgets (short fragments of assembly, which are the cornerstone of ROP exploits). We applied our metrics to binaries compiled with MPX, a new exploit mitigation technique by Intel, that, among other things, transforms binaries to check for buffer overflows. This transformation introduces additional gadgets and, using GaLity, we show, that such a binary contains more gadgets useful in ROP attacks than the same binary compiled without MPX.

GaLity also received the artifact evaluation award.

Cross-posted from Secure Software Engineering

Comments
Comments Off on GaLity accepted at ESSoS 2016
Categories
Misc, Research, Uncategorized

GaLity accepted at ESSoS 2016

Eric | February 15, 2016

We’re happy to announce that our paper “Analyzing the Gadgets – Towards a Metric to Measure Gadget Quality” has been accepted at ESSoS 2016. In this paper we present four metrics that allow assessing the usefulness of a set of gadgets (short fragments of assembly, which are the cornerstone of ROP exploits). We applied our metrics to binaries compiled with MPX, a new exploit mitigation technique by Intel, that, among other things, transforms binaries to check for buffer overflows. This transformation introduces additional gadgets and, using GaLity, we show, that such a binary contains more gadgets useful in ROP attacks than the same binary compiled without MPX.

GaLity also received the artifact evaluation award.

Cross-posted from Secure Software Engineering

Comments
Comments Off on GaLity accepted at ESSoS 2016
Categories
Misc, Research, Uncategorized