Direkt zum Hauptbereich

RuhrSec - our non-profit IT security conference

We are proud to announce our first security conference - RuhrSec. The conference takes place in Bochum at our university (28.-29.4.2016). It is a non-profit conference, i.e. all profit resulting from the sold tickets will go to Gänseblümchen NRW e.V. (thanks to our sponsors and to the great university conditions, we hope it will be much :) ). As this is our first conference, we carefully invited some top-class speakers (mainly our friends) to present their recent work. Given the program that we have now, I think we do not have to shame and we can keep up with the best conferences.



To give some overview, on the first day we will start with a talk about SSL/TLS and backwards compatibility issues by Prof. Schwenk. He will give a high-level overview on the newest protocol version (1.3), and what can go wrong if you run this version in parallel with its predecessors (TLS 1.0 - 1.2). 
Next, Daniel Gruss will follow with a talk on Cache Side-Channel Attacks and the case of Rowhammer. Daniel's obsession is to flip bits in various memories, invoked from different environments. He is for example responsible for the RowhammerJS (Rowhammer invoked from Javascript). By following his tweets, it seems that he has a lot of interesting new stuff.

Let's see, what he will talk about at our conference.
Mario Heiderich, handsome heart-breaker and security researcher, will talk about his Relationship with AngularJS v2. The first version of this talk contained many AngularJS bypasses. We hope to see many more at our conference.
Johannes Dahse will present his tool for Detection of Complex Vulnerabilities in Web Applications. As the talk is complex, I do not even attempt to summarize this topic. It is however interesting to know that this work was awarded with the first Facebook Internet Defense Prize.
As there is no security conference without cats, RuhrSec will include two talks about these adorable animals. Martin Johns will talk about cats attacking WebRTC Communication. Marion Marschalek will talk about Alice's Adventures in Wonderland and about Cheshire Cat's Grin.
An IT buzzword coming more and more often at security conferences is IoT (I think this buzzword can currently be beaten only by SCADA). Therefore, Timo Kasper will present Security Nightmares in the Internet of Things: Electronic Locks and More. Do not worry that this will be only some boring "blah-blah" talk. Timo gives excellent research talks, he is known for example for his attacks on KeeLoq (technology used in garage doors):

You are still not impressed? There is more. At the end of the first day, just before a great dinner by G Data, Udo will give a workshop / InfoSec course on drinking wine, coffee and beer. I think this will be a highlight of the conference.

For further information, please see our program. This will include further talks by Felix 'FX' Lindner, Thorsten Holz, Marco Balduzzi, Mathias Bynens, Lucas Vincenzo Davi and Sebastian Schinzel.

Beliebte Posts aus diesem Blog

How To Spoof PDF Signatures

One year ago, we received a contract as a PDF file. It was digitally signed. We looked at the document - ignoring the "certificate is not trusted" warning shown by the viewer - and asked ourselfs:

"How do PDF signatures exactly work?"

We are quite familiar with the security of message formats like XML and JSON. But nobody had an idea, how PDFs really work. So we started our research journey.

Today, we are happy to announce our results. In this blog post, we give an overview how PDF signatures work and on top, we reveal three novel attack classes for spoofing a digitally signed PDF document. We present our evaluation of 22 different PDF viewers and show 21 of them to be vulnerable. We additionally evaluated 8 online validation services and found 6 to be vulnerable.

In cooperation with the BSI-CERT, we contacted all vendors, provided proof-of-concept exploits, and helped them to fix the issues and three generic CVEs for each attack class were issued: CVE-2018-16042

DTD Cheat Sheet

When evaluating the security of XML based services, one should always consider DTD based attack vectors, such as XML External Entities (XXE) as,for example, our previous post XXE in SAML Interfaces demonstrates.

In this post we provide a comprehensive list of different DTD attacks.

The attacks are categorized as follows:
Denial-of-Service AttacksClassic XXEAdvanced XXEServer-Side Requst Forgery (SSRF)XIncludeXSLT

Printer Security

Printers belong arguably to the most common devices we use. They are available in every household, office, company, governmental, medical, or education institution.
From a security point of view, these machines are quite interesting since they are located in internal networks and have direct access to sensitive information like confidential reports, contracts or patient recipes.

TL;DR: In this blog post we give an overview of attack scenarios based on network printers, and show the possibilities of an attacker who has access to a vulnerable printer. We present our evaluation of 20 different printer models and show that each of these is vulnerable to multiple attacks. We release an open-source tool that supported our analysis: PRinter Exploitation Toolkit (PRET) https://github.com/RUB-NDS/PRET Full results are available in the master thesis of Jens Müller and our paper. Furthermore, we have set up a wiki (http://hacking-printers.net/) to share knowledge on printer (in)security.
The hi…