I just got back from London and the RSA Europe conference, I've had a great week! In addition to a solid program, the conference is a hotspot of highly skilled professionals. I ended up in a lengthy discussion at the Microsoft stand on the possibilities of the new Forefront Threat Management Gateway (TMG), and the Unified Access Gateway (UAG). One chat with a Microsoft professional, and I learned that the UAG is much more versatile than the official webpages indicate. Of course, I had many more interesting conversations with both sponsors and visitors to the conference. I have to mention that I was fortunate enough to bump into Steve Lipner from Microsoft while I was on my way from one session to another. I happened to be carrying around my SDL-book, he was kind enough to sign it. Good stuff!
I'll summarize some of my favorite sessions from the conference:
Schneier's keynote
Bruce Schneier's keynote on "Security, privacy, and the generation gap" was great. He touched upon many interesting aspects of privacy, like how we do our privacy decisions (how we give it up), or the social challenges we face when spending time on social networks. He referred some very interesting research, here's one of the examples: In group A each person is given an anonymous value coupon worth $8 with the option of exchanging it in a coupon worth $10 — but the $10 coupon would include the person's name and address. In group B the setting is reversed, each person receives a $10 coupon with their name and address on it, and gets the option of switching it for an anonymous $8 coupon. One would expect to find the same pattern in both groups. However, the group who received their anonymous coupons first were more reluctant to give up their privacy! I've tried to find an article on the study, without success. I'll add the link here if I can find it, it's thought provoking stuff.
My metric of a good keynote is to which extent it makes you think. After Schneier's talk, I had a lot to think about!
Application level DoS
Bryan Sullivan from Microsoft's SDL team gave an important talk: "When a billion laughs are not so funny: application-level denial of service". He discussed a class of very potent attacks, where a carefully crafted attack will consume server side resources to the point where the server resources are depleted. The interesting aspect of these attacks is the assymetry. By sending a request which is only a couple of hundred bytes, the server can be triggered to consume all of its memory and/or cpu. Sullivan made a point of the assymetry, and also the difficulties in detecting or preventing these attacks — other than writing secure code in the first place of course.
Sullivan gave two important examples, one for regex and another for XML parsers. To aid in the detection of vulnerable regex statements, the SDL team has released a Regex Fuzzer. On that link, you'll also find references to how the vulnerability works. There's also an MSDN article on the challenges with XML parsing, check it out — especially if you're consuming untrusted XML!
Attacking mobile messaging
Another great session was the "Attacking mobile phone messaging" by Lackey and Miras. It was no surprise that the telephone system had major vulnerabilities. However, Lackey and Miras had set up an attack showing just how flawed the design of the administrative part of the mobile phone system is. Great presentation, a great demo, and they were both excellent speakers. And yeah, the mobile messaging system has major issues.
Flash security
Adobe's Peleus Uhley gave a great talk on the security model for flash content and how to develop more secure flash applications. I haven't been working on flash content security before, so this was a brave new world for me. Uhley gave a great overview on how the whole Flash-model worked and what the challenges are as a Flash designer/developer. In short, treat your Flash animations with as much care as your do with your web applications! Check out the Owasp Flash Security Project to get up to speed, it's run by Uhley and contains all the important references you need.
And the other stuff
There were a lot of other interesting sessions but — like always at a conference — you once in a while realize that you went to the wrong session. That's how it goes! Apart from the sessions mentioned above I attended the sessions that where either SDL oriented, or targeting more technical security.
There was of course a vibrant social life after the formal program ended, I had great fun. I'm not outing anyone here, so: Thanks guys, you know who you are! :)
Software security blog by André N. Klingsheim, who's learning to love .NET and Microsoft servers.
Subscribe to:
Post Comments (Atom)
Copyright notice
© André N. Klingsheim and www.dotnetnoob.com, 2009-2018. Unauthorized use and/or duplication of this material without express and written permission from this blog’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to André N. Klingsheim and www.dotnetnoob.com with appropriate and specific direction to the original content.

Read other popular posts
-
Microsoft's widely used e-mail service Hotmail was recently overhauled and rebranded Outlook.com. One of the less known services they pr...
-
The .NET 4.5 framework was released a couple of months ago and it included several improvements in the security area. To benefit from these ...
-
Though Windows Server 2003 has been around for a while, we'll still see them around the Internet for many years to come. Despite their u...
-
OWASP recently released their Top Ten 2013 list of web application vulnerabilities. If you compare the list to the 2010 version you’ll see t...
-
Security headers in an HTTP response There are many things to consider when securing a web application but a definite "quick win&qu...
-
Just a quick note on an error I often run into when I'm working on my Azure applications. I usually create Azure packages and upload the...
-
Yesterday I was playing around with the validateIntegratedModeConfiguration="true" setting on IIS 7.5. To my surprise I got an ...
-
Recently I wrote a piece of software that needed some configurable secrets — and they needed to be VERY secret. Consequently, I had to encry...
-
I guess it was long overdue for me to follow up on my Hardening Windows Server 2003 SSL/TLS configuration and Windows server 2003 vs 20...
-
I just discovered that Facebook reveal to search engines the users who "Like" a page , regardless of their privacy settings. Try a...

Thanks for sharing this text. Virtually satisfied to look at this newsletter and I will refer this website online to my buddies. custom dissertation writing service Extraordinary submit, loads interesting. Thanks for your submit. Keep up the coolest work. I surely appreciate your paintings and I wish in future I’m able to move returned for extra data. Like this one.
ReplyDeletenehru place call girls
Deletenehru place russian call girls
andheri escorts
aerocity call girls
anjuna beach call girls
mcleodganj call girls
bandra call girls
you should be given your freshly-cooked educational cardstock inside the twinkling connected with an eyeball!
ReplyDeletehttps://eliteessaywriters.com/
So you know that we can have free jigsaw puzzles online in a random websites.
ReplyDeleteVery good informative article. Thanks for sharing such nice article, keep on up dating such good articles.
ReplyDeleteNO.1 SYSTEM INTEGRATION SERVICES | SYSTEM INTEGRATION MIDDLEWARE | MASSIL TECHNOLOGIES
Although those who major in one of the physical sciences have an equal chance of acceptance when compared with “pre-pharmacy” students, pharmacy schools want to see evidence of a real interest in pharmaceuticals and the practice of the profession. A real interest is often due to a real interest in people, as pharmacists are in positions to education and influence patients. There is always the consideration of job security, but no one really goes to pharmacy school these days to become rich. There are easier ways to do that, like the entertainment industry or business administration. Make sure your reason for attending is the right reason. Click https://nursingessaywriting.com/pharmacy-personal-statement for detailed information.
ReplyDeleteOur mission statement is to assist you every step of the way in finding the best writing services for your needs. Whether you need a 2 page essay or a 50-page dissertation, by using scamfighter you will find the most custom tailored writing solutions.
ReplyDeleteThe free roblox robux is very awesome game with lots of new adventures and thrill.
ReplyDeleteBest informative blog. Thank you.
ReplyDeletecima courses in hyderabad | ISFS
surveillancekart security system
ReplyDeletesurveillancekart cctv installation services
cp plus
Pestveda pest control services
dezigly
The feedgasm Latest News And Breaking News
quicksodes
latest news in hindi
ReplyDeleteشركة نقل عفش من الرياض الى الدمام الاحساء الخبر
افضل شركة نقل عفش من الرياض الى جدة
___________
Very good informative blog, Thanks for sharing.
ReplyDeleteBest Paper Products Manufacturer Company | Thoran Paper Products
Network Security Final Year Project Ideas
ReplyDeleteProject Centers in Chennai
JavaScript Training in Chennai
JavaScript Training in Chennai
Mostly solution
ReplyDeleteMostly solution
Mostly Solution
Mostly Solution
Mostly Solution
Mostly Solution
If you are in need of Research Paper Writer Services, then you need a legit solution. With our professional writers ready for your paper, you can benefit from the Custom Research Paper Writing Services.
ReplyDeleteThere are Nursing Papers for Sale that are harder to complete than others. Thesis, dissertations, and research papers are some of them. Even if you are enthusiastic and capable student, you might need Thesis Proofreading Services in coping with your difficulties.
ReplyDeleteIt is understandable that one is more confident when their task is in the hands of the Research Writing Help than a novice; thus, one hires Custom Dissertation Writing Service who delivers the ideal Custom Term Paper Writing.
ReplyDeleteAre you looking to hire the best Custom College Papers Writing Services? It is helpful to note that the content of Legitimate Custom College Paper are unique and non-plagiarized and each Custom College Paper should be verified meticulously by editors before it can be sent to you.
ReplyDeletePlease refer below if you are looking for best project center in coimbatore
ReplyDeleteJava Training in Coimbatore | Digital Marketing Training in Coimbatore | SEO Training in Coimbatore | Tally Training in Coimbatore | Python Training In Coimbatore | Final Year IEEE Java Projects In Coimbatore | IEEE DOT NET PROJECTS IN COIMBATORE | Final Year IEEE Big Data Projects In Coimbatore | Final Year IEEE Python Projects In Coimbatore
Thank you for excellent article.
Please refer below if you are looking for Online Job Support and Proxy support from India
ReplyDeleteJava Online Job Support and Proxy support from India | AWS Online Job Support and Proxy Support From India | Python Online Job Support and Proxy Support From India | Angular Online Job Support from India | Android Online Job Support and Proxy Support from India
Thank you for excellent article.
Please refer below if you are looking for Online Job Support and Proxy support from India
ReplyDeleteJava Online Job Support and Proxy support from India | AWS Online Job Support and Proxy Support From India | Python Online Job Support and Proxy Support From India | Angular Online Job Support from India | Android Online Job Support and Proxy Support from India| SAP MM Online Job Support and Proxy support from India | ETL Testing Online Job Support and Proxy Support From India | SAP SD Online Job Support and Proxy Support From India
Thank you for excellent article.
Please refer below if you are looking for Online Job Support and Proxy support from India
ReplyDeleteHadoop Online Job Support and Proxy support from India | Informatica Online Job Support and Proxy Support From India | PHP Online Job Support and Proxy Support From India | DevOps Online Job Support from India | Selenium Online Job Support and Proxy Support from India| Manual Testing Online Job Support and Proxy Support From India | DotNet Online Job Support and Proxy Support from India
Thank you for excellent article.
Please refer below if you are looking for best Training in coimbatore
ReplyDeleteHadoop Training in Coimbatore | CCNA Training in Coimbatore | AWS Training in Coimbatore | AngularJS Training in Coimbatore | Dotnet Training In Coimbatore | SAS Training In Coimbatore | R-Programming Training In Coimbatore
Thank you for excellent article.
Digital Marketing Services in delhi
ReplyDeleteseo services in delhi
web development services in delhi
content marketing services in delhi
ppc services in delhi
Website Designing services in delhi
nice blog
ReplyDeleteshimla escorts
call girls in baddi
jammu escorts
escorts manali
amritsar call girls
ambala call girls
roorkee escorts
kasol call girls
ReplyDeleterajkot call girls
escorts amritsar
zirakpur call girls
mohali call girls
panchkula escort
jaipur call girls
palampur escort
nice blog
ReplyDeletedehradun escort
manali escorts
manali escort
escorts manali
chandigarh call girls
mussoorie escorts
haridwar escorts
rishikesh escorts
surat escort
Midwifery assignment writing service learners have an advantage of hiring the best midwifery research paper help writer that is familiar with midwifery coursework writing services for their Midwifery Writing Services.
ReplyDeletethanks a lot for the perfect information you have shared with us. I wish you the best.
ReplyDeleteفروش اقساطی فاو 6 تن
I strongly appreciate you for sharing such a good information and I wish you the best wishes.
ReplyDeleteساندویچ پانل سقفی
the design and the content of your website is perfect and can not be ignored.
ReplyDeleteکامیونت کاویانK1051
This was nice and amazing and the given contents were very useful and the precision has given here is good.
ReplyDeleteApache Spark Training in Pune
Spark Training Institute in Pune
thanks a lot for sharing such a wonderful information wit us.
ReplyDeleteکشنده کاویان