Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Track 2 [clear filter]
Tuesday, October 13

11:15 IDT

0x3E9 Ways to DIE

Along the years many attempts have been made to combine static and dynamic analysis results. Some were good, other were bad, however the fact is that those two approaches still remain mostly separated as most analysis tools focus on one of them only.

For many years, this lack of integration and mental passing of data between static and dynamic tools has caused lot of frustration among researchers.

This was the main motivation in creating DIE.

DIE is a new Hex-Rays IDA plugin that crosses the static-dynamic gap directly into the native IDA GUI. It gives the researcher access to runtime values from within his standard dissembler screen.

As opposed to previous projects with similar goals, DIE takes a different approach by using an extensive plugin framework which allows the community to constantly add logic in order to better analyze and optimize the retrieved runtime values. With a click of a button, everything is accessible to the researcher: he can inspect handles passed to a function, analyze injected code or runtime strings, enumerate dynamic structures, follow indirect function calls and more (and the list keeps on growing). All of this happens without the researcher ever leaving his comfortable dissembler screen.

Even better, as DIE is tightly coupled with IDA, it will basically support any architecture, data type or signature supported by IDA.

DIE currently has a small but well-respected community of contributors. Starting with the alpha version, DIE users have been able to cut their research time by 20%-40%. As complex reverse engineering tasks may take several weeks or even several months to complete, DIE has already proved to be a valuable resource and a prominent part of the researcher`s toolkit.

DIE was first introduced to the public at RECON-2015 and received amazing feedbacks. Today, we will introduce its secrets to the respected Israeli research community.

During this talk I will explain the basic idea behind DIE, describe its architecture, and show live examples of how to use its extensive plugin framework to speed up the research process.

The talk includes *live examples* which have been carefully selected from real research projects in various security fields and demonstrate how DIE can be used to speed up bypassing software protections, unpack malware, and super-quickly locate a malware de-obfuscation functions.


Yaniv Balmas

Security Researcher, Check Point Software Technologies
Yaniv is a software engineer and a seasoned professional in the security field. He wrote his very first piece of code in BASIC on the new Commodore-64 he got for his 8th birthday.As a teenager, he spent his time looking for ways to hack computer games and break BBS software. This... Read More →

Tuesday October 13, 2015 11:15 - 12:00 IDT
Room 10 - CS and Communications Building
  Track 2

12:00 IDT

From zero to secure in 1 minute
Companies moving to cloud infrastructure (IaaS) discover that they can do amazing things with the automation of infrastructure tasks. Companies can deploy environments in seconds and do production changes several times a day - but security still holds them down. Many of our security procedures have not adopted to cloud automation and still relay on traditional maintenance windows and manual tasks such as static / dynamic analysis, vulnerability scans, hardening and more. And this is a major obstacle in a world where cloud instance can be installed, configured moved to production and terminate within an hour. So security must to adopt to this new accelerated life cycle and change accordingly. In this presentation, we will demonstrate how to automate creation of instances, generating and safeguarding encryption keys, do configuration management and security scans and automatically process the results and take decisions accordingly. The result is cloud instances that are launched and configured with security requirements in automated way within minutes. Implementing the techniques and tools shown can help organizations to overcome security challenges and make sure that security is not the bottleneck on the way to faster applications deployments.


Moshe Ferber

Chairman, CSA Israel
Moshe Ferber is world known cloud security industry expert. Involved in shaping the foundations of responsible cloud adoption. He is a major contributor and instructor for the CCSK & CCSP cloud security certifications and involved in many of the working groups that define tomorrow... Read More →

Tuesday October 13, 2015 12:00 - 12:30 IDT
Room 10 - CS and Communications Building
  Track 2

13:30 IDT

Why Are Hackers Winning the Mobile Malware Battle

In the proverbial game of cat-and-mouse between endpoint security vendors and malware writers, malware attacks have recently grown more sophisticated. More enterprises are losing ground to hackers, who are able to outmaneuver static and runtime solutions by constantly changing their attack strategies. In his presentation, Yair will break down the current set of techniques (signatures, static analysis, dynamic analysis, social cyber-intelligence) used to identify malware on mobile devices, and identify the pros and cons of these approaches. He will also explain why attackers constantly succeed in fooling these technologies, and explore the problem of false positive/false negative tradeoffs in such solutions. In order to demonstrate the aforementioned, Yair will create on stage a malicious mobile app live, which can bypass signatures, static and dynamic analysis approaches.

Audience will learn:

  • The attack paths mobile hackers are taking
  • What actions organizations can take to mitigate malware risks
  • How security vendors can change their paradigms to improve their defenses

avatar for Yair Amit

Yair Amit

CTO & Founder, Skycure
Yair Amit is co-founder and CTO at Skycure, leading the company’s research and vision and overseeing its R&D center. Yair has been active in the security industry for more than a decade with his research regularly covered by media outlets and presented in security conferences around... Read More →

Tuesday October 13, 2015 13:30 - 14:15 IDT
Room 10 - CS and Communications Building
  Track 2

14:15 IDT

Too Big to Fail - Breaking WordPress Core

When attacking web applications, what do you do when there are no injection points? No false-assumptions? No logical errors? Most of the times you just move on, perhaps look for bad code in a different component or third party plugin. What if that target is just too important to give up on? What if your target is the most popular web platform in the world?

This talk will focus on the recent vulnerabilities found in WordPress core, one of the most securely written web apps in the world. We will begin with a carefully orchestrated race condition leading to Privilege Escalation, and all the way to SQL injection and persistent XSS attacks, in 20% of the top 1M sites on the Internet. We will dive deep into a system that seems un-penetrable, and analyze a chain of bugs no one thought exploitable, in order to describe one of the most interesting WebApp vulnerabilities in CMS history.

Join us for a journey through the eyes of one researcher who made it to core WordPress and lived, to get a glimpse of how one searches for vulnerabilities in massive code and how to catch oh-so-important developer misses.

avatar for Netanel Rubin

Netanel Rubin

Senior Vulnerability Researcher, PerimeterX
Netanel is a senior vulnerability researcher that has several significant findings under his belt. Starting his security career at the age of 16, Netanel performed security assessments for many international companies and organizations, including banks and government offices. Following... Read More →

Tuesday October 13, 2015 14:15 - 15:00 IDT
Room 10 - CS and Communications Building
  Track 2

15:15 IDT

Cross-Site Search Attacks

Cross-site search (XS-search) attacks circumvent the same-origin policy and extract sensitive information, by using the time it takes for the browser to receive responses to search queries. This side-channel is usually considered impractical, due to the limited attack duration and high variability of delays. This may be true for naive XS-search attacks; however, we show that the use of better tools facilitates effective XS-search attacks, exposing information efficiently and precisely.

We present and evaluate three types of tools: (1) appropriate statistical tests, (2) amplification of the timing side-channel, by `inflating' communication or computation, and (3) optimized, tailored divide-and-conquer algorithms, to identify terms from large `dictionaries'. These techniques may be applicable in other scenarios.

We implemented and evaluated the attacks against the popular Gmail and Bing services, in several environments and ethical experiments, taking careful, IRB-approved measures to avoid exposure of personal information.


Hemi Leibowitz

Lecturer at the College of Management. Research member of the cyber research at Bar Ilan University. Main interest fields are the security of communication networks and designing robust anonymous communication systems against strong attackers.

Tuesday October 13, 2015 15:15 - 16:00 IDT
Room 10 - CS and Communications Building
  Track 2

16:00 IDT

Theories of Agile, Fails of Security

Buzzwords about Agile are flying around in overwhelming speed, talks about Scrum, Kanban, XP and other methodologies and practices are thoroughly discussed while security is still left as a 'high level' talk or sometimes as understanding how to adapt from traditional development methodologies. Some best practices will leave you scratching your head, unsure what was the original intention and without understanding how to implement security in Agile, effectively. This lecture will bring the all the undocumented failures during such process, and best ways of avoiding them prior to experiencing them.

avatar for Daniel Liber

Daniel Liber

R&D Security Leader, CyberArk
Daniel Liber is the R&D security leader in CyberArk, a leader in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Previously he has worked as an application security consultant for Comsec Consulting, working... Read More →

Tuesday October 13, 2015 16:00 - 16:30 IDT
Room 10 - CS and Communications Building
  Track 2

16:40 IDT

Certifi-gate - Front Door Access to Pwning hundreds of Millions of Androids Devices - the aftermath

Hundreds of millions of Android devices, including those running Lollipop, the latest and most secure version of Android OS, can be hijacked. A comprehensive study has revealed the existence of multiple instances of a fundamental flaw within the Android customisation chain that leave millions of devices (and users) vulnerable to attack.

These vulnerabilities allow an attacker to take advantage of unsecure apps certified by OEMs and carriers to gain unfettered access to any device, including screen scraping, key logging, private information exfiltration, back door app installation, and more. In this session, Lacoon researchers will walk through the technical root cause of these responsibly-disclosed vulnerabilities including hash collisions, IPC abuse and certificate forging which allow an attacker to grant their malware complete control of a victims device. We'll explain why these vulnerabilities are a serious problem that in some ways can't be completely eliminated, show how attackers exploit them, demonstrate an exploit against a live device, and provide remediation advice.


Tuesday October 13, 2015 16:40 - 17:25 IDT
Room 10 - CS and Communications Building
  Track 2