28c3: The Science of Insecurity. 28c3
28c3: The Science of Insecurity [link]Paper  abstract   bibtex   
Download high quality version: http://bit.ly/uSJPUL Description: http://events.ccc.de/congress/2011/Fa... Meredith L. Patterson, Sergey: The Science of Insecurity Why is the overwhelming majority of common networked software still not secure, despite all effort to the contrary? Why is it almost certain to get exploited so long as attackers can craft its inputs? Why is it the case that no amount of effort seems to be enough to fix software that must speak certain protocols? The answer to these questions is that for many protocols and services currently in use on the Internet, the problem of recognizing and validating their "good", expected inputs from bad ones is either not well-posed or is undecidable (i. e., no algorithm can exist to solve it in the general case), which means that their implementations cannot even be comprehensively tested, let alone automatically checked for weaknesses or correctness. The designers' desire for more functionality has made these protocols effectively unsecurable. In this talk we'll draw a direct connection between this ubiquitous insecurity and basic computer science concepts of Turing completeness and theory of languages. We will show how well-meant protocol designs are doomed to their implementations becoming clusters of 0-days, and will show where to look for these 0-days. We will also discuss simple principles of how to avoid designing such protocols.
@misc{28c3_28c3:_nodate,
	title = {28c3: {The} {Science} of {Insecurity}},
	shorttitle = {28c3},
	url = {https://www.youtube.com/watch?v=3kEfedtQVOY},
	abstract = {Download high quality version: http://bit.ly/uSJPUL
Description: http://events.ccc.de/congress/2011/Fa...

Meredith L. Patterson, Sergey: The Science of Insecurity

Why is the overwhelming majority of common networked software still not secure, despite all effort to the contrary? Why is it almost certain to get exploited so long as attackers can craft its inputs? Why is it the case that no amount of effort seems to be enough to fix software that must speak certain protocols?

The answer to these questions is that for many protocols and services currently in use on the Internet, the problem of recognizing and validating their "good", expected inputs from bad ones is either not well-posed or is undecidable (i. e., no algorithm can exist to solve it in the general case), which means that their implementations cannot even be comprehensively tested, let alone automatically checked for weaknesses or correctness. The designers' desire for more functionality has made these protocols effectively unsecurable.

In this talk we'll draw a direct connection between this ubiquitous insecurity and basic computer science concepts of Turing completeness and theory of languages. We will show how well-meant protocol designs are doomed to their implementations becoming clusters of 0-days, and will show where to look for these 0-days. We will also discuss simple principles of how to avoid designing such protocols.},
	urldate = {2016-09-21},
	author = {{28c3}},
	keywords = {28c3, Insecurity, Meredith L. Patterson, Science, Sergey, ccc},
}

Downloads: 0