- CanSecWest 2012
- Hardware Involved Software Attack – forristal.com
Material for CanSecWest 2012 by Jeff Forristral
- Vulnerability analysis, practical data flow analysis and visualization – blogs.technet.com
Recently at CanSecWest 2012, we presented on the technology we use for analyzing malicious samples and PoC files. As malware often actively attempts to exploit software vulnerabilities these days, understanding the internals of these vulnerabilities is essential when writing defense logic.
- Top 5 Things Learned at the SANS Mobile Device Security Summit – blog.securestate.com
This is a quick post about the SANS Mobile Device Security Summit that I participated in last week. I presented the latest version of my ever evolving “Attacking and Defending Apple iOS Devices” presentation.
- 2012 Verizon Data Breach Investigation Report (DBIR)
- How to Read and Act on the 2012 Verizon Data Breach Investigations Report (DBIR) – securosis.com
Verizon just published their excellent 2012 Data Breach Investigations Report, and as usual, it’s full of statistical goodness.
- Verizon Business Security Blog Blog Archive 2012 Data Breach Investigations Report Released – verizonbusiness.com
It’s hard to believe, but it’s time again for another installment of Verizon’s annual Data Breach Investigations Report. This year’s report represents our largest dataset ever, with 855 confirmed security breaches accounting for a combined 174 million compromised records.
- How to Win CCDC -Slides – room362.com
Since this is a constantly updating slide deck I figured I’d post it here so I didn’t have to keep emailing it out. If you have comments or if something is wrong grammatically, technically or in any other way I’d love input. Suggestions also welcome.
- ROP and deROP – marcoramilli.blogspot.com
Many different researches put theirs efforts in finding a good ways to fight ROP malware, for example Davi et Al. And Chen et Al. Implemented a threshold system able to count how many buckets of instruction followed by RETN are present in a executable, once the threshold is reached the security mechanism alerts the user about that.
- CVSS – Common Vulnerability Scoring System – a critique