Program

A more detailed program is coming soon, stay tuned!
08:30am - breakfast
Opening speech Jean-Louis Roch
Detection of cryptographic algorithms with grap Léonard Benedetti, Aurélien Thierry and Julien Francq
Get the (Spider)monkey off your back Bruno Keith and Edgar Boda-Majer
break
Invited talk Sebastien Bardin
The Making of a Secure Open Source Hardware Password Keeper Mathieu Stephan
Attack ARM TrustZone using Rowhammer Pierre Carru
lunch
The Black Art of Wireless Post-Exploitation Gabriel Ryan
Automation Attacks at Scale Will Glazier and Mayank Dhiman
break
Efficient Defenses against Adversarial Examples for Deep Neural Networks Valentina Zantedeschi, Maria-Irina Nicolae and Ambrish Rawat
Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets Christophe Tafani-Dereeper
TSIGKILL: Bypassing dynamic DNS updates authentication through signature forgery Clément Berthaux
Random Memories Requiem *an anonymous pnwer*
RUMP session
Closing speech
cocktail
Workshops and CTF
6:30am - The End

Detection of cryptographic algorithms with grap

The disassembled code of an executable program can be represented as a graph representing the possible sequence of instructions (Control Flow Graph). Such a graph can be used to detect and classify (cryptographic) algorithms by analyzing its structure and its semantics. This approach differs from conventional methods used, which generally rely on constant detection. /grap/ is an open-source tool able to detect graph patterns, defined by the analyst, within an executable program. It can be used for detection of cryptographic algorithms with serviceable patterns. Our presentation details this technique and its use on AES and other algorithms. We will also present a new feature of grap allowing interactive creation of patterns directly within IDA.

Léonard Benedetti is an engineering student passionate about algorithmics, machine learning, cryptography, low-level systems and other things.

Aurélien Thierry is a reverse engineer and forensics analyst at Airbus Defence & Space - CyberSecurity, primarily working on malware analysis. He previously worked on malware detection through graph matching in an academic (PhD) setting.

Julien Francq is born in 1982 at Lille. After physics and chemistry studies, he got an engineer degree from Polytech’Montpellier (Microelectronics and Control Systems) in 2006 and a Ph-D from Université Montpellier 2 in 2009 (Computer Science). He is currently the Deputy Head of ”Software Solutions Development” Team in Airbus - CyberSecurity in charge of managing a team of around 20 software developers. He is also an Airbus Group Security Expert in Cryptography and Key Management, and a Data Scientist. His main research interest is the security and the efficiency of (hardware/software) implementations of cryptosystems against (mathematical/physical) attacks and Data Science for anomaly detection.

Get the (Spider)monkey off your back

Spidermonkey is Mozilla's Javascript engine and most famously known for being used in Firefox. In this talk we aim to provide an introduction to browser exploitation by specifically targeting Firefox's Javascript engine on Linux platforms. After an introduction to some fundamentals such as the internal representation of objects, memory allocation and garbage collection, we will outline an attack methodology to achieve arbitrary code execution and do a demo of such an attack.

Bruno Keith and Edgar Boda-Majer are alumni from École nationale supérieure d'informatique et de mathématiques appliquées de Grenoble (ENSIMAG) engineering school and are conducting vulnerability research as part of phoenhex. They are also members of CTF teams Eat Sleep Pwn Repeat and KITCTF.

The Making of a Secure Open Source Hardware Password Keeper

The Mooltipass Offline Password Keeper project was started three years ago by a small community to provide a safe and offline way of storing credentials. Since then, about 50 individuals from around the globe have contributed to the project, helping to bring two models of the Mooltipass device (and software) into the hands of open source enthusiasts and national agencies. This presentation will describe the Mooltipass hardware, firmware, and software architectures with a focus on what it took to move from an idea to a commercial security product, while having all of the development and production files publicly available on GitHub. It will also briefly review attack vectors and open source constraints, and continue on to discuss all technical choices and the details of mass production.

Mathieu Stephan is an electronics engineer who is actively involved in the open source movement, including designing products from scratch, setting up their mass production chain and distribution network. Mathieu alternates between internal and external consulting roles in very different sectors – from quantum physics, high power batteries, satellite antennas to Formula E cars. Mathieu has been a writer for Hackaday, and has a personal website full of projects and advice for getting started in electronics. He also manages the contributor-backed "Mooltipass Offline Password Keeper" project, for which 2 devices have already been crowdfunded, built and distributed around the globe.

Attack ARM TrustZone using Rowhammer

This presentation shows how the Rowhammer effect can be used to attack a TrustZone-based secure environment.
  • We make a short introduction to TrustZone, a technology specified by ARM which allows our smartphones to run Android and a Secure OS concurrently. The Secure OS runs with higher privileges, and has reduced functionalities which makes it feasible to secure. The Secure OS provides specific services such as secure key storage, Secure Boot, etc to the "Normal" OS.
  • We then present the principles of Rowhammer, a technique which allows to corrupt bits in DRAM by hammering nearby memory locations. We present the state of the art on this subject, and our finding on different plateforms.
  • Rowhammer on TrustZone: we then show that the Rowhammer effect can be used from the non-secure context to corrupt memory used by the Secure OS. As an example we demonstrate a practical attack against an RSA signature implemented in TrustZone. The faults to secure memory can be leveraged to recover private keys stored in secure memory. Thus bypassing TrustZone protections which normally prevent non-secure software from writing or reading to secure memory.

Pierre Carru is an Software / Hardware Engineer currently working as a Security Analyst at eshard. His interests include all aspects of technology from hardware details to high-level programming. He currently mostly focuses on mobile platforms security, reverse engineering tools and distributed computing.

Efficient Defenses against Adversarial Examples for Deep Neural Networks

Following the recent adoption of deep neural networks (DNN) in a wide range of application fields, adversarial attacks against these models have proven to be an indisputable threat. Adversarial samples are crafted with a deliberate intention of producing a specific response from the system. Multiple attacks and defenses have been proposed in the literature, but the lack of better understanding of sensitivity of DNNs justifies adversarial samples still being an open question. This talk proposes a new defense method based on practical observations which is easy to integrate into models and performs better than state-of-the-art defenses. The proposed solution is meant to reinforce the structure of a DNN, making its prediction more stable and less likely to be fooled by adversarial samples. The extensive experimental study proves the efficiency of our method against multiple attacks, comparing it to multiple defenses, both in white-box and black-box setups. Additionally, the implementation brings almost no overhead to the training procedure, while maintaining the prediction performance of the original model on clean samples. A live demo of creating adversarial images will take place during the talk.

Valentina Zantedeschi is currently a PhD student in Machine Learning at Lab. Hubert Curien of Saint-Etienne, under the supervision of Marc Sebban and Remi Emonet. She previously earned her Master degree in Computer Sciences from the INSA de Lyon, in 2015. Her research focuses on learning data representations using statistical methods and probabilistic models with theoretical guarantees. In particular, she works on the generalization properties of ML models in different settings, such as learning with weakly labeled data and learning of personalized models in centralized and distributed contexts.

Irina Nicolae, PhD, is currently a research scientist in the AI & Machine Learning team of IBM Research, Dublin. Her main interests include learning representations for complex data and security for deployed models. She has received her PhD from University of Saint-Etienne, France, for a research project on similarity learning with theoretical guarantees for numerical and temporal data. Previously, she has graduated from Politehnica University of Bucharest in Computer Science in 2011, and from ENSIMAG in Information Systems in 2013.

Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets

DDoS attacks are one of the most prominent threats on the Internet nowadays. In this talk, we explore how hackers exploit servers with weak SSH credentials to build an army of botnets, later used to run high-volume DDoS attacks. After showcasing an experimentation where a honeypot was used to understand the attack pattern and collect relevant malware samples, we reverse engineer the Xor DDoS malware and break down its obfuscation mechanisms, the communication with its command and control server, and how it spreads in a vulnerable system.

Christophe Tafani-Dereeper is an information security enthusiast and master student at the Swiss Federal Institute of Technology (EPFL) in Lausanne. He holds a blog (https://blog.christophetd.fr) where he writes about information security, malware analysis, and linux administration.

TSIGKILL: Bypassing dynamic DNS updates authentication through signature forgery

The talk presents a feedback on performing a security audit on a well-known DNS server without knowing much about DNS. It will walk through the exploration of multiple DNS related protocols (DNSSEC, NSEC, TSIG, etc.) and their quirks, which eventually led to the discovery of a few vulnerabilities in Bind9 and KnotDNS.

Clément Berthaux is a security expert at Synacktiv where he's been performing various software audits. He has a keen interest in reverse-engineering, low-level stuffs as well as general application security.