HACKER SUMMER CAMP 2024 GUIDES — Part Sixteen: USENIX Security Trifecta 2024

Welcome to the DCG 201 Guides for Hacker Summer Camp 2024! This is part of a series where we are going to cover all the various hacker conventions and shenanigans both In-Person & Digital! This year…

Medium

I had the pleasure to contribute to Lukas Maar's #USENIX2024 paper "SLUBStick".
SLUBStick elevates limited heap vulnerabilities within the #Linux kernel to arbitrary memory read-and-write primitives, leveraging a timing side channel.
Thanks to Lukas Maar, Martin Unterguggenberger, Mathias Oberhuber and Stefan Mangard for this great opportunity!
Congratulations to Lukas Maar for driving the paper to acceptance at USENIX Security!

You can read the full paper here: https://stefangast.eu/papers/slubstick.pdf

#SLUBStick #Kernel #Linux #KernelSecurity #sidechannel #usenixsecurity #usenixsec

Also looking forward to present #SnailLoad at #USENIX2024.
(3/3)

#usenixsecurity #usenixsec #usenixsecurity

I had the pleasure to contribute to the #USENIX2024 paper "Divide and Surrender", recovering the full secret key from the reference implementation of the HQC Key Encapsulation Mechanism, exploiting a timing side channel arising from non-constant-time modulo operations.
Thanks to Robin Leander Schröder and Qian Guo for this opportunity and congratulations to Robin Leander Schröder for getting his first paper accepted at USENIX Security!

You can read the full paper here: https://stefangast.eu/papers/divide_and_surrender.pdf

#divideandsurrender #hqc #sidechannel #postquantumcrypto #usenixsecurity

I accidentally ended up watching this video again and it is excellent and only become more relevant: https://www.youtube.com/watch?v=ajGX7odA87k&ab_channel=USENIX James Mickens "USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?" #AI #CyberSecurity #USENIXSecurity
Ah ha! 422 videos in the #UsenixSecurity 2023 collection. That will take a minute to transcode. 😅

Are you attending @usenixassociation Security 2023 in Anaheim? The @cydcampus is organizing a 🇨🇭 Reception on August 9th at 7 pm. The event will take place right after the Symposium Reception and is conveniently located just a 10 minute walk away.

We invite all our partners, collaborators and extended network to attend. We want to bring together the cybersecurity community with ties to Switzerland, and you will have the opportunity to network with fellow researchers and discuss the latest developments while enjoying some refreshments and the view.

Don't miss the occasion to meet with my colleagues Martin Strohmeier Vincent Lenders and Bernhard Tellenbach! Reach out to anyone of us if you would like an invite!

Looking forward to meet you in Anaheim!

#USENIX #USENIX23 #USENIXsecurity #conference #cyber #security #cyberdefence #networking

Want To Burglarize A House With Impunity, Then Nickle-And-Dime The Restitution? It Helps To Be A Bank. | Popehat

One common criticism of the libertarian ethos is that if we reduce government control over society, big business will have unchecked power over our lives, so that we will merely be trading one type of control for another. But concern with corporate power is not inconsistent with libertarianism, as Clark illustrated in his post on

📢 Our work on automated discovery of memory safety vulnerabilities in Deep Learning (DL) frameworks has been accepted at USENIX Security
2023! Joint work with Neophytos Christou, Di Jin, Vaggelis Atlidakis, and Baishakhi Ray (Columbia) | https://arxiv.org/abs/2209.14921 | https://gitlab.com/brown-ssl/ivysyn | 39 CVEs 😎 🤘 💣 | #ivysyn #brownssl #usenixsecurity #usesec23
IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks

We present IvySyn, the first fully-automated framework for discovering memory error vulnerabilities in Deep Learning (DL) frameworks. IvySyn leverages the statically-typed nature of native APIs in order to automatically perform type-aware mutation-based fuzzing on low-level kernel code. Given a set of offending inputs that trigger memory safety (and runtime) errors in low-level, native DL (C/C++) code, IvySyn automatically synthesizes code snippets in high-level languages (e.g., in Python), which propagate error-triggering input via high(er)-level APIs. Such code snippets essentially act as "Proof of Vulnerability", as they demonstrate the existence of bugs in native code that an attacker can target through various high-level APIs. Our evaluation shows that IvySyn significantly outperforms past approaches, both in terms of efficiency and effectiveness, in finding vulnerabilities in popular DL frameworks. Specifically, we used IvySyn to test TensorFlow and PyTorch. Although still an early prototype, IvySyn has already helped the TensorFlow and PyTorch framework developers to identify and fix 61 previously-unknown security vulnerabilities, and assign 39 unique CVEs.

arXiv.org
Eine Cloaking-Software soll Fotos für Betrachter unmerklich so manipulieren, dass Gesichtserkennungssysteme daran scheitern.
Verzerrungs-Algorithmus Fawkes will Gesichtserkennung verhindern
#ClearviewAI #Fawkes #Gesichtserkennung #KünstlicheIntelligenz #OpenSource #UsenixSecurity
Verzerrungs-Algorithmus Fawkes will Gesichtserkennung verhindern

Eine Cloaking-Software soll Fotos für Betrachter unmerklich so manipulieren, dass Gesichtserkennungssysteme daran scheitern.

heise online