Stefan Jakoubi is attending Gartner Security & Risk Management Summit, which takes place from 18-19. Sept. in London, UK.
Further details can be found on their website.
Edgar Weippl gives a technical introduction to Bitcoins (Agenda)
Today Peter Kieseberg is moderating the PwC Security Trend event focusing on Business Continuity, Security Policies and the DSGVO.
Tomasz Miksa has become the chair of the newly endorsed DMP Common Standards working group. He will present the goals of the group for the next 18 months at the 10th Research Data Alliance Plenary in Montreal, Canada.
The group brings together a broad spectrum of stakeholders from all around the world, such as: research funders, data repositories, ICT infrastructure providers, software developers, and researchers representing various scientific domains.
The specific focus of the working group is on developing common information model and specifying access mechanisms that make Data Management Plans (DMPs) machine-actionable. The outputs of this working group will help in making systems interoperable and will allow for automatic exchange, integration, and validation of information exchanged using research data infrastructures.
This should lead to higher reproducibility of computational workflows and increase of trust in scientific data.
To follow the activities and learn more about the DMP Commons Standards WG please visit its official web page.
„Our KIRAS-project “Darknet Analysis” is currently featured with an article in the newspaper “derStandard”, as well as in “derStandard.at”: http://derstandard.at/2000062980138-629/Wenn-die-Daten-von-Unschuldigen-im-Darknet-landen“
The paper “Grid Shock: Coordinated Load-Change Attacks on Power Grids” by Adrian Dabrowski, Johanna Ullrich, and Edgar Weippl was accepted for publication at the 2017 Annual Computer Security Applications Conference (ACSAC 33).
Our work analyzes whether large-scale botnets are able to modulate electric power consumption in a coordinate way to bring down the power grid. ACSAC is a leading conference in applied computer security. In total, 48 out of 244 submissions were accepted, resulting in an acceptance rate of 19.7%. ACSAC 33 will be held in San Juan, Puerto Rico in December 2017.
In this paper, we develop attacks violating this assumption, investigate their impact on power grid operation and assess their feasibility for today’s adversaries. In our scenario, an adversary builds (or rents) a botnet of zombie computers and modulates their power consumption, e.g., by utilizing CPU, GPU, hard disks, screen brightness, and laser printers in a coordinated way over the Internet. Outperforming the grid’s countervailing mechanisms in time, the grid is pushed into unstable states triggering automated load shedding or tie-line tripping.
We show that an adversary does not have to rely on smart grid features to modulate power consumption given that an adequate communication infrastructure for striking the (legacy) power grid is currently nearly omnipresent: the Internet to whom more and more power-consuming devices are connected.
The paper “Merged Mining: Curse or Cure?” by Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, and Edgar Weippl was accepted for publication at the 1st International Workshop on Cryptocurrencies and Blockchain Technology (CBT’17), held in conjunction with ESORICS 2017.
Merged mining refers to the concept of mining more than one cryptocurrency without necessitating additional proof-of-work effort. Although merged mining has been adopted by a number of cryptocurrencies already, to this date little is known about the effects and implications. We shed light on this topic area by performing a comprehensive analysis of merged mining in practice. As part of this analysis, we present a block attribution scheme for mining pools to assist in the evaluation of mining centralization. Our findings disclose that mining pools in merge-mined cryptocurrencies have operated at the edge of, and even beyond, the security guarantees offered by the underlying Nakamoto consensus for extended periods. We discuss the implications and security considerations for these cryptocurrencies and the mining ecosystem as a whole, and link our findings to the intended effects of merged mining.
An extended version of the paper is available at the Cryptology ePrint Archive: Report 2017/791.
Numerous members of SBA are currently at USENIX Security in Vancouver. Katharina Krombholz is presenting our paper ‘“I Have No Idea What I’m Doing” – On the Usability of Deploying HTTPS’, and you’ll be soon able to watch the recording here due to the USENIX open access policy.
News coverage: Bulletproof TLS Newsletter, USENIX ;login: (to appear)
Congratulations to Dr. Merzdovnik, who defended his thesis yesterday!
Abstract: A timely reaction to security incidents is without doubts important. And while the techniques of digital forensics can come pretty close to perfect for single-host systems with small hard drive capacity, things can get easily messy with 10+ systems, a mixture of operating systems & mobile devices of various brands, or gigabit network traffic that is partly encrypted.
This talk contains two parts. For one, the do’s and don’ts for incident response from a forensic examiner’s point of view. Is it better to pull the plug, or gracefully shut the machine down, how to capture network traffic, and what to do if the machine is still running and you’d like to image the RAM. In particular, I’ll present a few methods how to capture network traffic for small networks that don’t have a dedicated monitoring port available, and what to do with them. Secondly, a list of things that went wrong when reality kicked in and good intentions do more harm than good. This will include the problems of tool dependency for specific tasks, free log aggregation using graylog and why there is no such thing a s a free lunch, GRR and the riddle for the perfect toolchain.
For the platform Blockchain Austria, a few well-known experts from different areas were found as partners. For example, Blockchainhub Graz, the research center SBA Research and the law firm Stadler Völkel are involved.
Some proposals are presentend in a “9 point plan for Austria”.
For more information please see this article (in german)
Adrian Dabrowski is attending Black Hat USA 2017 security conference, which takes place from July 22 – 27, 2017 in Las Vegas, NV, USA. More than 15.000 people are attending the 20th edition of the conference.
Johanna Ullrich gave a guest talk on the mysteries of IPv6 addressing at the Secure Systems Group of Professor Mangard at TU Graz.
Johanna Ullrich is attending the Meeting of the Internet Engineering Task Force (IETF99) in Prague at the moment. On Wednesday, she gave a talk presenting her survey on IPv6 security and privacy vulnerabilties.
The survey can be found here.