Introducing 31c0n – New Zealand’s premier conference for those with a professional interest in cyber security.
Hosted by Aura Information Security, this inaugural event will see some of the world’s most respected and revered security researchers and presenters congregate right here in New Zealand for a period of 48 hours.
Over the course of two days, attendees will hear from a stellar line-up of industry experts. You’ll also have the opportunity to mix with like-minded people and evolve your understanding of the cyber security landscape. While the focus for this year’s conference is ‘Critical Infrastructure Security’ we’ll be covering the full scope of what’s new in this ever-evolving industry.
Peter Gutmann (NZ)
Peter Gutmann is a researcher in the Department of Computer Science at the University of Auckland working on design and analysis of cryptographic security architectures and security usability. He helped write the popular PGP encryption package, has authored a number of papers and RFC's on security and encryption, and is the author of the open source cryptlib security toolkit, "Cryptographic Security Architecture: Design and Verification" (Springer, 2003), and an upcoming book on security engineering. In his spare time he pokes holes in whatever security systems and mechanisms catch his attention and grumbles about the lack of consideration of human factors in designing security systems.
Rodrigo Branco (Brazil)
Blinded Random Block Corruption Attacks
Protecting users' privacy in virtualized cloud environments is an increasing concern for both users and providers. A hypervisor provides a hosting facility administrator with the capabilities to read the memory space of any guest VM. Therefore, nothing really prevents such an administrator from abusing these capabilities to access users' data. This threat is not prevented even if the whole memory is encrypted with a single (secret) key. Guest VM's can be isolated from the administrator if each guest VM has its memory space encrypted with a unique per-VM key. Here, while the hypervisor's memory access capabilities remain unchanged, reading a VM memory decrypts the VM's encrypted data with the wrong key and therefore gives no advantage to the attacker. This is indeed the motivation behind some newly proposed technologies that are planned in future processors.
However, this presentation argues that the privacy claim of any technology that uses different encryption keys to isolate hypervisor administrators from guest VM's cannot be guaranteed. To show this, we explain and demonstrate a new instantiation of a "Blinded Random Corruption Attack". Under the same scenario assumptions that the per-VM keying method addresses, our attack allows the cloud provider administrator to use the capabilities of a (trusted) hypervisor in order to login to a guest VM. This completely compromises the user's data privacy. This shows, once again, that memory encryption by itself, is not necessarily a defense-in-depth mechanism against attackers with memory read/write capabilities. A better guarantee is achieved if the memory encryption includes some authentication mechanism.
Rodrigo works as Principal Security Researcher at Intel Corporation in the Security Center of Excellence where he leads the Core Client, BIOS and IoT SoC Teams. Rodrigo held positions as Director of Vulnerability & Malware Research at Qualys and as Chief Security Research at Check Point where he founded the Vulnerability Discovery Team (VDT) and released dozens of vulnerabilities in many important software. In 2011 he was honored as one of the top contributors to Adobe Vulnerabilities in the past 12 months. Previous to that, he worked as Senior Vulnerability Researcher in COSEINC, as Principal Security Researcher at Scanit and as Staff Software Engineer in the IBM Advanced Linux Response Team (ALRT) also working in the IBM Toolchain (Debugging) Team for PowerPC Architecture. He is a member of the RISE Security Group and is the organizer of Hackers to Hackers Conference (H2HC), the oldest security research conference in Latin America. He is an active contributor to open-source projects (like ebizzy, linux kernel, others). Accepted speaker in lots of security and open-source related events as H2HC, Black Hat, Hack in The Box, XCon, OLS, Defcon, Hackito, Zero Nights, Troopers and many others.
Bryan K. Fite (USA)
Planes, Trains and Automobiles: The Internet of Deadly Things
“When world’s collide!” is not just another random Seinfeld reference, it is the wake-up call for all security practitioners and cyber savvy citizens. Transportation systems that utilize machine to machine communication often focus on the engineering challenges of resilience, reliability and mechanical specifications. They now must be conscious of software bugs, security vulnerabilities and sophisticated threat actors.
Cyber was once the exclusive domain of digital denizens but now digital digits can reach out and “touch” someone. As more and more discretion is taken away from human operators and assigned to autonomous systems, our safety becomes dependent on ubiquitous sensor networks that are “Connected”.
New threat catalogs are required to design systems that are safe and secure. We will articulate the attack surface, move beyond the hype and propose reasonable response strategies for surviving in a world where cyber and physical intersect.
This presentation is inspired by cyber-physical research described in this white paper http://meshco.com/IODTv1.pdf
A committed security practitioner and entrepreneur, Bryan is currently an account CISO at BT. Having spent over 25 years in mission-critical environments, Bryan is uniquely qualified to advise organizations on what works and what doesn’t. Bryan has worked with organizations in every major vertical throughout the world and has established himself as a trusted advisor. “The challenges facing organizations today require a business reasonable approach to managing risk, trust and limited resources, while protecting what matters.”
Host of the annual “Non-Con” Dayton Security Summit
Founded Meshco™ Producers of PacketWars™
Introduced Forensix™ computer forensics collection, analysis and visualization suite
Released AFIRM: Active Forensic Intelligent Response Method to the general public
Founded GETSecure™ a full service security practice; products, professional services, managed services and training.
Craig Smith (USA)
You Don't Own It If You Can't Hack It
This talk discusses the role security has played in the auto industry. How vehicle hacking has pushed a traditionally closed industry into being more open and able to take feedback and vulnerability reports without sending cease and desist letters. We will discuss how important hacking is to the right to repair and right to tinker efforts. The talk will conclude with giving you the information on how you can deploy a secure system that still lets you hack it.
Craig Smith is Research Director of Transportation Security at Rapid7 and founder of Open Garages, a distributed collective of performance tuners, mechanics, security researchers, and artists. Craig is also the author of the Car Hacker's Handbook: , and has developed many open source utilities to teach CAN bus to students as well as security penetration tools that can uncover vulnerabilities in vehicle and diagnostic systems. Craig has worked in the security field for over 20 years, with the last six focused on automotive.
MORE SPEAKERS TO BE ANNOUNCED SOON