* Marieke Koekkoek is a Dutch politician for Volt, and has been a Member of Parliament since 2021.
* Martijn Dekker is Chief Information Security Officer at ABN AMRO Bank and visiting professor Information Security at the University of Amsterdam, conducting research in the field of information security governance, decision making, security automation and information theory.
* Rutger Leukfeldt is professor at Leiden University, lector at the Hague University of Applied Sciences and senior researcher at NSCR. His teaching and research focuses on the human factor in cybercrime.
* Bert Hubert is an entrepreneur & software developer. He sometimes contributes to science and cares a lot about Europe, innovation, climate, biology & health. He is a former shareholder of Open-Xchange, the parent company of PowerDNS that he founded in 1999.
The theme of the Seventh AMSec workshop:
The Seventh AMSec Workshop: Beyond Regulation
Program
13.00 – Coffee and tea
13.30 – Opening by Martijn Dekker (ABN Amro) // Herbert Bos (AMSec)
13:35 – Public brainstorm/ interactive opening
13.45 – Keynote 1: Rutger Leukfeldt (NSCR/Leiden University) on about how children develop into young hackers
14.15 – Q&A
14.20 – Key contribution of Marieke Koekoek (Volt)
14.40 – Break
15.00 – Keynote 2: Bert Hubert – How to deal with permanent insecurity? “Everybody ignores the risks in security products”
15.45 – Keynote 3: Martijn Dekker – on ‘beyond regulation’ from the perspective of ABN AMRO (How can perform the right cybersecurity strategy in the spirit of legislation)
16.15 – Q&A and synthesis
16.20 – Closing remarks with Herbert Bos en Martijn Dekker
Please join us for the second edition of the Affect.NL Workshop on
Automated Finding, Fixing or Exploiting of seCuriTy vulnerabilities
Organised by INTERSCT. WP2 ∩ WP4, in collaboration with AMSec and ACCSS.
This workshop is aimed at researchers and practioners from the Netherlands working on fuzzing or other automated – dynamic or static – techniques to find, fix or exploit security vulnerabilities in code. As the goal is to create some collaboration and synergy, there will plenty of time for discussion and informal chats over coffee, lunch and drinks.
May30, 2024 Evert van de Beekstraat 202, 1118 CP, Schiphol Auditorium From 13.00 – 16:30 + drinks afterwards
With contributions from amongst others:
Paul Ducheine is brigadier-general and professor for Cyber Operations and Cyber Security at the Netherlands Defence Academy and a professor in the Law of Cyber Warfare at the University of Amsterdam. As a professor of cyber operations at the Netherlands Defense Academy, he knows all about ‘non-kinetic warfare’: where states attack each other using methods like malware or other cyber weapons.
Maarten Vughts is program manager within ASML security office, amongst others the security alliances program and the insider risk program.
Piet Bel is manager external relations at the security office of ASML. He has extensive knowledge of the cyberinformation and knowledge war. He has also contributed to the development of the collaboration of business chains with the Dutch government to increase the cyber resilience of society.
Reinder Wolthuis is Program manager partnership for cyber security innovation (PCSI) at TNO and member of the ENISA ad-hoc working group SOC/CSIRT.
Jair Santanna is assistant professor at University of Twente and principal researcher at Northwave. In his role, he explores and deploys cutting-edge technologies, such as ML, AI, Cloud Computing, and Quantum Computing to innovate and automate cybersecurity processes.
Hedzer Komduur is Director Safety & Environment & CISO of Schiphol.
The theme of the Sixth AMSec workshop:
Defending Against State-Sponsored Cyber Threats
Join us for the Sixth AMSec workshop as we delve into the pressing issue of state-sponsored cyber threats. In an era where digital warfare is on the rise, understanding the tactics and motivations of state actors is essential for safeguarding our digital infrastructure. Through expert-led key notes and hands-on panels, you’ll gain invaluable insights into the evolving landscape of cybersecurity and learn practical strategies to defend against state-sponsored attacks. Don’t miss this opportunity to enhance your cyber defense capabilities and stay ahead of emerging threats. Register now for the AMSec workshop and secure your spot in the fight against cyber espionage and sabotage.
Program
13.00 – Coffee and tea
13.30 – Opening
13:35 – Public brainstorm: you are going to engage in a public brainstorm where we will try to find the most important parts of defending against state sponsored cyber threats. What do you think is essential when developing a strategy against state sponsored cyber threats?
13.45 – Keynote 1: Maarten Vughts en Piet Bel (ASML): working together with government & academia to defend against state sponsored attacks
14.15 – Q&A
14:25 – Break
14:45 – Panel: You will have the opportunity to observe an interactive panel discussion discussing the role of government, industry and academia regarding state sponsored cyber threats from different perspectives . With amongst others Reinder Wolthuis (TNO), Jair Santanna (University of Twente) and others (t.b.a.)
15:45 – Keynote 2: The perspective of Paul Ducheine (UvA) on defending against state-sponsored cyber threats
16.15 – Q&A and synthesis
16.20 – Announcements regarding AMSec and the cybersecurity community
‘Challenges in Cyber Security’ is one of seven research projects that received an NWO Gravitation grant this year. The project has the impressive sum of 21.5 million euros attached.
The ‘Challenges in Cyber Security’ project brings together top researchers from the hard sciences in the cyber security field. In the words of Minister Dijkgraaf (Education, Culture and Science), places the research among ‘the world’s scientific top’. Three of the 5 PIs and 12 additional researchers who are cooperating in this project are also in AMSec.
The project is one of seven research projects that received an NWO Gravitation grant this year. Under the rubric of this project, a team of more than thirty cyber security researchers is ready to rebuild cyber security on new solid foundations. Tanja Lange of TU/e is leading the project, in cooperation with Lejla Batina (RU), Herbert Bos (VU), Marten van Dijk (CWI & VU) and Christian Schaffner (UvA).
Marten van Dijk is professor of Secure and Intelligent Computing at VU University and Group Lead Computer Security at CWI. As a computer security researcher, he investigates and develops new techniques targeting solutions of foundational security problems. He focuses on the intersection of security and machine learning and how machine learning can provide reliable and robust intelligence.
Stjepan Picek, associate professor in the Digital Security (DiS) group at Radboud University, studies the intersection of cybersecurity and artificial intelligence. Combining those fields, he specializes in implementation attacks (side-channel analysis, fault injection) and security of machine learning.
Walco Sibbel, major account manager at Palo Alto Networks, is involved in the latest developments of the industry regarding cybersecurity and AI and can connect industry demand with the latest technical developments.
The theme of the workshop:
How do we unite cybersecurity and artificial intelligence?
Kaitai Lang joined the Cybersecurity group at Delft University of Technology in 2020. Before joining TU Delft, he was an Assistant Professor in Secure Systems at the University of Surrey, UK, and an academic member of the Surrey Centre for Cyber Security. He received his PhD degree in computer science from Department of Computer Science at City University of Hong Kong. With over 11 years experiences on cybersecurity R&D, his main focus is on the design and implementation of cryptographic protocols to security.
Joep Gommers, founder & CEO at EclecticIQ (threat intelligence, hunting and response)
Paul Timmers Research Associate Oxford University & Ex European Commission
AI and Cybersecurity
How do AI and cybersecurity relate to each other? And what grant vision do we have for the application of AI on cybersecurity and the cybersecurity of AI? In this workshop we will explore the topic ‘AI and cybersecurity’ from a hardware, software and policy perspective. The workshop involves inspiring key notes and an interactive panel discussion. There will be a lively discussion and interaction with the audience with key representatives from both industry, academia and government.
Program
13.30: Opening
13:35 – Public brainstorm: you are going to engage in a public brainstorm where we will try to find a common definition of AI & Cybersecurity. What do you think is the essence of security by design?
13.45 – Keynote 1: Marten van Dijk.
Marten van Dijk. IEEE Fellow, professor of Secure and Intelligent Computing at VU University and Group Lead Computer Security at CWI.
14.15 – Q&A
14:25 – Break
14:45 – Panel: You will have the opportunity to observe an interactive panel discussion discussing the role of government, industry and academia regarding cybersecurity and artificial intelligence from different perspectives . With amongst others Stjepan Picek (Radboud University) , Walco Sibbel (Palo Alto Networks), Kaitai Lang (TU-Delft), and Paul Timmers (Oxford University).
15:45 – Keynote 2: Joep Gommers.
Joep Gommers. Founder & CEO at EclecticIQ (threat intelligence, hunting and response)
With contributions from Bart Jacobs and Bart Preneel
Bart Jacobs,professor of Security, Privacy and Identity at Radboud University Nijmegen, tirelessly delves into matters that you sometimes would rather not hear, but need to know. He showed vulnerabilities in the public transport chip card, bank cards, voting computers, ‘smart’ meters and car keys, and in countless databases with private data. He also develops secure alternatives, such as the IRMA app that allows you to log in in a privacy-friendly manner.
Bart Preneel, professor at the Catholic University of Leuven,is a Belgian cryptographer and cryptanalyst. He co-invented the Miyaguchi-Preneel compression function, a robust structure used in hash functionsl. He is also one of the authors of the RIPEMD hash function and co-inventor of the MUGI and Trivium stream ciphers. Preneel contributed to the cryptanalysis of several cryptographic algorithms, including RC4 and SecurID.
Dr. Cristina Del-Real, assistant professor in Cyber Crisis at the Institute of Security and Global Affairs (ISGA) at Leiden University, is an expert on the multitude of definitions of security by design Previously she worked as a postdoctoral researcher in cybersecurity governance at ISGA. She is part of the NWO-funded project ‘Cyber Security by Integrated Design’ (C-SIDe),:
Dr. Erik Poll, associate professor in the Digital Security (DiS) group Institute for Computing and Information Sciences Radboud University Nijmegen, is an expert on software security. He leads the security by design work package at the INTERSECT project.
→ More contributors will be added soon!
Theme of the workshop:
How do we unite the many different perspectives on security by design?
How do we define security by design? And what grant vision do we have? What is its practical feasibility? In this workshop we will explore the topic ‘security by design’ from a hardware, software and policy perspective. The workshop involves inspiring key notes and an interactive panel discussion. There will be a lively discussion and interaction with the audience with key representatives from both industry, academia and government.
Provisional program:
13:30 – Public brainstorm: you are going to engage in a public brainstorm where we will try to find a common definition of security by design. What do you think is the essence of security by design?
13.45 – Keynote 1: Bart Jacobs
14.15 – Q&A
14:25 – Break
14:45 – Panel: Cristina del Real, Erik Pol, Jasper Nagtegaal You will have the opportunity to observe an Interactive panel discussion discussing the role of government, industry and academia regarding security by design from different perspectives (“hardware & infrastructure”; “software & application” and “economics & policy”).
15:45 – Keynote 2: Bart Preneel
16.15 – Q&A and brainstorm: There is an opportunity for a Q&A and there will be a second public brainstorm on the definition of security by design. We will investigate together in what way the input of the public differs what this us? The insights gained in this workshop will be used by policy makers, academics and the industry to further align the efforts to make secure hard & software by design.
This mini workshop features a strong line-up of leading system security researchers from around the world. The event is freely accessible to everyone on a first come, first serve basis.
Speakers:
U. Michael Franz (UC Irvine)
Mathias Payer (EPFL)
Stijn Volckaert (KU Leuven)
Lucas Davi (U. Duisburg)
Stefan Brunthaler ( U. der Bundeswehr)
Robert Buhren (TU Berlin)
Preliminary program
9:45 – 10:15
Speaker: Lucas Davi
Title: Risky Contracts: Breaking and Fixing Smart Contracts
Abstract:
Smart contracts are computer programs that execute on the blockchain, receive and send transactions, and maintain a balance of cryptocurrency. In the recent past, we have witnessed a variety of attacks against smart contracts with cryptocurrency loses up to 50 million US Dollars. These attacks were possible due to errors in the smart contract logic. To tackle such attacks, a large number of mitigation technologies have been proposed. In this talk, we provide an overview of static and dynamic analysis techniques to tackle smart contract errors.
—————————————————————–
10:15 – 10:45
Speaker: Mathias Payer
Title: Fuzzing Low-level Code
Abstract:
In an eternal war in memory, state corruption plagues systems since the dawn of computing. Despite the rise of strong mitigations such as stack cookies, ASLR, DEP, or most recently Control-Flow Integrity, exploits are still prevalent as none of these defenses offers complete protection. This situation calls for program testing techniques that discover reachable vulnerabilities before the attacker. Finding and fixing bugs is the only way to protect against all exploitation.
We develop fuzzing techniques that follow an adversarial approach, focusing on the exposed attack surface and exploring potentially reachable vulnerabilities. In this talk we will discuss two aspects of fuzzing hard to reach code: (i) learning what code is exposed to attacker-controlled input and (ii) testing drivers that interact with exposed peripherals.
First, we assess the threat surface by characterizing the potential computational power that a vulnerability gives. In a multi-step process we follow the flow of information an synthesize potential attacker payloads to learn how exposed certain code sequences are. Second, by
providing a custom-tailored emulation environment we create mock Trojan devices that allow fuzzing the peripheral/driver interface. In these projects we develop new techniques to test different kinds of hard to reach code and exposed large amounts of vulnerabilities.
—————————————————————–
10:45 – 11:15
Speaker: Stijn Volckaert
Title: Making Multi-Variant Execution Practical in the Real World
Abstract:
Multi-Variant Execution Environments (MVEEs) have shown great promise as a mechanism to defend against exploitation of software vulnerabilities. Their core idea is to run multiple versions (or diversified variants) of the same program in tandem on top of a small and efficient hypervisor that distributes program inputs, compares outputs, and terminates the variants when their outputs diverge. With properly constructed variants, one can guarantee that any exploitation attempt will trigger a divergence and, hence, termination before the exploit succeeds.
Unfortunately, MVEEs have seen virtually no adoption outside of military settings. In this talk, I will give an overview of the biggest hurdles that stand in the way of greater adoption. I will also discuss some preliminary research towards overcoming these hurdles and suggest future research directions.
—————————————————————–
11:15 – 11:45
Break
—————————————————————–
11:45 – 12:15
Speaker: Stefan Brunthaler
Title: MAD: Memory Allocation Diversity
Abstract:
We present MAD, short for memory allocation diversity, a method to diversify memory management routines, which hitherto were highly predictable and deterministic. The need for such diversification arises from memory massaging techniques used, for example, in known RowHammer attacks. By coercing or enumerating physical page frames, adversaries create vulnerable configurations required for row hammering.
MAD builds on the principles underlying software diversity and, therefore, offers similar benefits: simplicity, efficiency, portability, and versatility. Simplicity is evidenced by an implementation that
requires less than a thousand lines of code. Efficiency is indicated by a low performance impact on a variety of benchmarks, including SPEC CPU 2017, where we report an impact by a factor of 1.006x. Portability is supported by MAD’s independence of any specific hardware feature, architecture, or knowledge. Put differently, MAD is a software-only defense that is completely hardware-agnostic. Versatility is provided by the fact that MAD requires no OS internals and, therefore, can be used to diversify memory allocation in all kinds of system software, such as browsers and databases.
In addition, MAD offers comprehensive security. Specifically, MAD follows a two-pronged strategy to mitigate memory massaging techniques. First, MAD thwarts enumeration of physical pages by using two novel diversification techniques. Second, MAD uses a randomized monitoring and detection technique to prevent brute-force exhaustive memory massaging techniques.
—————————————————————–
12:15 – 12:45
Speaker: Michael Franz
Title: PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
Abstract:
The OS kernel is an attractive target for remote attackers. If compromised, the kernel gives adversaries full system access, including the ability to install rootkits, extract sensitive information, and perform other malicious actions, all while evading detection. Most of the kernel’s attack surface is situated along the system call boundary. Ongoing kernel protection efforts have focused primarily on securing this boundary; several capable analysis and fuzzing frameworks have been developed for this purpose.
However, there are additional paths to kernel compromise that do not involve system calls, as demonstrated by several recent exploits. For example, by compromising the firmware of a peripheral device such as a Wi-Fi chipset and subsequently sending malicious inputs from the Wi-Fi chipset to the Wi-Fi driver, adversaries have been able to gain control over the kernel without invoking a single system call. Unfortunately, there are currently no practical probing and fuzzing frameworks that can help developers find and fix such vulnerabilities occurring along the hardware-OS boundary.
We present PeriScope, a Linux kernel based probing framework that enables fine-grained analysis of device-driver interactions. PeriScope hooks into the kernel’s page fault handling mechanism to either passively monitor and log traffic between device drivers and their corresponding hardware, or mutate the data stream on-the-fly using a fuzzing component, PeriFuzz, thus mimicking an active adversarial attack. PeriFuzz accurately models the capabilities of an attacker on peripheral devices, to expose different classes of bugs including, but not limited to, memory corruption bugs and double-fetch bugs. To demonstrate the risk that peripheral devices pose, as well as the value of our framework, we have evaluated PeriFuzz on the Wi-Fi drivers of two popular chipset vendors, where we discovered 15 unique vulnerabilities, 9 of which were previously unknown.
—————————————————————–
12:45 – 13:15
Speaker: Robert Buhren
Title: Insecure Until Proven Updated: Analyzing AMD SEV’s Remote Attestation
Abstract:
Customers of cloud services have to trust the cloud providers, as they control the building blocks that form the cloud. This includes the hypervisor enabling the sharing of a single hardware platform among multiple tenants. AMD Secure Encrypted Virtualization (SEV) claims a new level of protection in cloud scenarios. AMD SEV encrypts the main memory of virtual machines with VM-specific keys, thereby denying the higher-privileged hypervisor access to a guest’s memory. To enable the cloud customer to verify the correct deployment of his virtual machine, SEV additionally introduces a remote attestation protocol.This paper analyzes the firmware components that implement the SEV remote attestation protocol on the current AMD Epyc Naples CPU series. We demonstrate that it is possible to extract critical CPU-specific keys that are fundamental for the security of the remote attestation protocol.Building on the extracted keys, we propose attacks that allow a malicious cloud provider a complete circumvention of the SEV protection mechanisms. Although the underlying firmware issues were already fixed by AMD, we show that the current series of AMD Epyc CPUs, i.e., the Naples series, does not prevent the installation of previous firmware versions. We show that the severity of our proposed attacks is very high as no purely software-based mitigations are possible. This effectively renders the SEV technology on current AMD Epyc CPUs useless when confronted with an untrusted cloud provider. To overcome these issues, we also propose robust changes to the SEV design that allow future generations of the SEV technology to mitigate the proposed attacks.