“Adoption and Focus: Practical Linear Types for Imperative Programming”他の紹介@P...Masahiro Sakai
?
PLDIr#6 (2010-02-11) での Adoption and Focus: Practical Linear Types for Imperative Programming と MaJIC: Compiling MATLAB for Speed and Responsivenes の紹介。
Quick evaluation on the current status of fingerprinting resistance between vanilla Mozilla Firefox and the Tor Browser (OWASP Saitama MTG #12, talk #1)
“Adoption and Focus: Practical Linear Types for Imperative Programming”他の紹介@P...Masahiro Sakai
?
PLDIr#6 (2010-02-11) での Adoption and Focus: Practical Linear Types for Imperative Programming と MaJIC: Compiling MATLAB for Speed and Responsivenes の紹介。
Quick evaluation on the current status of fingerprinting resistance between vanilla Mozilla Firefox and the Tor Browser (OWASP Saitama MTG #12, talk #1)
The document outlines the activities of Asynchronicity, co-founded by Takahiro Yoshimura and Shinya Kuroda, focusing on security research and development, particularly in mobile and web applications, alongside penetration testing and forensic analysis. It highlights innovative techniques for mass scraping web pages, including the use of asynchronous programming for enhanced efficiency in scraping operations. Additionally, it discusses various tools and methodologies employed to tackle challenges in web scraping and network interactions.
Describing various attack methods on Android/iOS apps. This time I decided to take a quick dive into actual analysis session on the a-bit-hardened InsecureBankV2 with Trueseeing (for OWASP Sendai Meetup #29.) Roughly the same content with the talk I gave in #kyusec18.
Describing various attack methods on Android/iOS apps. This time I decided to take a quick dive into actual analysis session on the a-bit-hardened InsecureBankV2 with Trueseeing (for #kyusec, Kyushu Security Conference 2018)
Trueseeing: Effective Dataflow Analysis over Dalvik OpcodesTakahiro Yoshimura
?
This document describes Trueseeing, a static dataflow analysis tool for analyzing Android Dalvik bytecode without using decompilers. Trueseeing marks up constants, invocations, and stored values in SQLite databases during disassembly. It then traces dataflow statically by matching getter/setter calls and instance field accesses to solve constants. This allows Trueseeing to analyze the dataflow and identify potential vulnerabilities in applications related to most of the OWASP top 10 mobile risks without suffering from the problems of dynamic analysis or dependency on decompilers.
The document discusses the Effy application for Android, which allows drawing on a canvas using finger gestures. It describes the DrawActivity class which handles touch events and drawing, and compares it to the FingerPaint sample application. The document also provides a link to download the Effy source code from GitHub under the GPL-3 license.
Protect Your IoT Data with UbiBot's Private Platform.pptxユビボット 株式会社
?
Our on-premise IoT platform offers a secure and scalable solution for businesses, with features such as real-time monitoring, customizable alerts and open API support, and can be deployed on your own servers to ensure complete data privacy and control.
3. TEXT
WHO I AM
? Takahiro Yoshimura (@alterakey)
https://keybase.io/alterakey
? Monolith Works Inc.
Co-founder, CTO
Security researcher
? 明治大学サイバーセキュリティ研究所
客員研究員
4. TEXT
WHAT I DO
? Security research and development
? iOS/Android Apps
→Financial, Games, IoT related, etc. (>200)
→trueseeing: Non-decompiling Android Application
Vulnerability Scanner [2017]
? Windows/Mac/Web/HTML5 Apps
→POS, RAD tools etc.
? Network/Web penetration testing
→PCI-DSS etc.
? Search engine reconnaissance
(aka. Google Hacking)
? Whitebox testing
? Forensic analysis
5. TEXT
WHAT I DO
? CTF
? Enemy10, Sutegoma2
? METI CTFCJ 2012 Qual.: Won
? METI CTFCJ 2012: 3rd
? DEF CON 21 CTF: 6th
? DEF CON 22 OpenCTF: 4th
? 発表?講演など
DEF CON 25 Demo Labs (2017)
DEF CON 27 AI Village (2019)
CODE BLUE (2017, 2019)
CYDEF (2020) etc.
Image by Wiyre Media on flickr, CC-BY 2.0
7. TEXT
WHAT IS NOISE?
? 暗号プロトコルを作るためのフレームワーク
? 暗号プロトコル (n.):
平文チャネルにおいて、秘匿性?完全性が保証
された通信チャネルの構築を目指すプロトコル
(e.g. TLS, IPsec, etc.)
8. TEXT
WHAT IS NOISE?
? 構成要素をブロック化
? s, e, ss, se, es, ee, pskを組み合わせて設計
? s: 長期鍵の公開鍵送付
e: 一時鍵の生成?公開鍵送付
ss/se/es/ee: Dif
fi
e-Hellman合意形成
psk: Pre-shared key適用
Image by Eric Haines on flickr, CC-BY 2.0
9. TEXT
WHAT IS NOISE?
? ネゴシエーション機構は提供しない(cf. TLS)
? 暗号系を限定(cf. TLS)
? DH: Curve25519/Curve448
? AEAD: ChaCha20-Poly1305/AES-GCM
? Hash: SHA256/512/BLAKE2s/BLAKE2d
Image by plenty.r. on flickr, CC-BY-SA 2.0
10. TEXT
WHAT IS NOISE?
? フレキシブルだが堅固な実装が得られる
? 先進的な特徴を持つプロトコル設計にも対応
? 0-RTT
? Post-quantum resistance (i.e. PSK) etc.
Image by Chris Elt on flickr, CC-BY-NC-ND 2.0
11. TEXT
WHAT IS NOISE?
? 採用例
? WireGuard
? WhatsApp
? Lightning Network
? I2P etc, etc..
Image by Patras Gagilas on flickr, CC-BY-SA 2.0
12. TEXT
SECURITY POSTURE
? これらは安全なのか…?
? 公式には24パターン提示している
xy; x: 送信側, y: 受信側として, 長期鍵を…
N: 持たない, K: 既知,
I: 即時送信, X: 随時送信 (identity hiding)
e.g. NN, IK, etc.
? IK(psk2): WireGuard
? IK/XX: WhatsApp
Image by Joel Penner on flickr, CC-BY 2.0
19. TEXT
SECURITY POSTURE
? これらは安全なのか…?
? 公式には24パターン提示している
xy; x: 送信側, y: 受信側として, 長期鍵を…
N: 持たない, K: 既知,
I: 即時送信, X: 随時送信 (identity hiding)
e.g. NN, IK, etc.
? IK(psk2): WireGuard
? IK/XX: WhatsApp
Image by Joel Penner on flickr, CC-BY 2.0
20. TEXT
CASE STUDY: NEVER-AND-NEVER
? NN: 送信者も受信者も長期鍵を持たない…?
? NN:
-> e
<- e, ee
->
? 送信側が一時鍵を作って送る
受信側も一時鍵を作って送り、DH合意を形成
Image by SonnyandSandy on flickr, CC-BY-NC-ND 2.0