ToorCon 9

ToorCon is always one of my favorite conferences of the year, and this year was no different. Actually, I take that back, it WAS different, it was even better than usual. I got something out of almost every talk that I attended, and the conference ran very smoothly. The conference is small and intimate and the speaker badges are green… I really can’t ask for much more. This year the [...]

New Employer: BreakingPoint Systems

Today I stepped into a new role as a Security Researcher for BreakingPoint Systems. I will be working with the team that handles the security component of the flagship product, the BPS-1000, which is a load and security testing appliance used to test network devices such as switches, firewalls, and the types of products my previous employer produces, Intrusion Prevention (or Detection) Systems. For the most part I'll be developing [...]

By |2007-10-01T21:50:39+00:00October 1st, 2007|employment, security, security research|0 Comments

Speaking at CSI 2007

I've been invited to speak at the Computer Security Institutes's Annual Conference (CSI 2007) this November in Washington D.C., on the subject of VoIP Attacks. This presentation was originally intended to be a "state of the industry" type talk given every year or so, and the last time I gave it was at EUSecWest last March so it's about time to update it and present it again.

By |2007-09-26T16:46:56+00:00September 26th, 2007|conference, security, telephony, voip|0 Comments

Speaking at ToorCon 9

I've been invited to speak at ToorCon 9 in San Diego next month. My topic will be Context-keyed Payload Encoding in which I introduce a new method of keying an encoder which is based entirely on contextual information that is predictable or known about the target by the attacker and constructible or recoverable by the decoder stub when executed at the target. An active observer of the attack traffic, however, [...]

By |2007-09-24T07:38:45+00:00September 24th, 2007|conference, hack, hpavc, security, security research|0 Comments

Real-time Steganography with RTP Video

Apparently, some guy purchased video of all of the DEFCON 15 talks on DVD, then ripped them all to MP4 and uploaded them to Google Video. If you couldn't make DEFCON this year and wanted to see my talk, or don't have the patience to read the 50 page paper but have about an hour to watch a video, you should check it out.

Real-time Steganography with RTP Whitepaper

My paper detailing the research I presented last month at DEFCON 15 was published today in Uninformed Journal Vol. 8. The paper is entitled "Real-time Steganography with RTP" and details using steganographic techniques to establish a covert channel within the protocol commonly used for the media channel in VoIP calls as well as a reference implementation.

The Information Security Industry is like the War on Drugs

After reading this article regarding the state of the IDS/IPS market and how IDS systems still and will likely have their niche, I was reminded of the common problem that plagues both Information Security and the War on Drugs; the majority of the focus is on detection and policing rather than on prevention and treatment, the former of which is usually an expensive, time-consuming, and futile battle. […]

By |2007-08-27T13:33:00+00:00August 27th, 2007|cryptography, economics, opinion, security|0 Comments

DEFCON 15

DEFCON 15, in their second year at the Riviera, seemed a little more settled than the turbulent vibe from last year. Unfortunately DEFCON already seems to be outgrowing this space as a couple of the talks I wanted to see were standing room only and attendees were spilling out into the halls. The badge this year was a large rectangular PCB with the DEFCON logo parts down the left side [...]

BlackHat 2007

BlackHat Briefings 2007 was a bit disappointing this year. This year, the first day of briefings had an entire track devoted to Voice Services. Being the sole VoIP researcher for TippingPoint’s DVLabs, I of course attended this entire track. In short, three words: waste of time. Out of 5 talks on VoIP security, I learned one single new piece of information. At best, the content was the same old attacks [...]