Real-time Steganography with RTP Whitepaper

My paper detailing the research I presented last month at DEFCON 15 was published today in Uninformed Journal Vol. 8. The paper is entitled "Real-time Steganography with RTP" and details using steganographic techniques to establish a covert channel within the protocol commonly used for the media channel in VoIP calls as well as a reference implementation.

DEFCON 15

DEFCON 15, in their second year at the Riviera, seemed a little more settled than the turbulent vibe from last year. Unfortunately DEFCON already seems to be outgrowing this space as a couple of the talks I wanted to see were standing room only and attendees were spilling out into the halls. The badge this year was a large rectangular PCB with the DEFCON logo parts down the left side [...]

BlackHat 2007

BlackHat Briefings 2007 was a bit disappointing this year. This year, the first day of briefings had an entire track devoted to Voice Services. Being the sole VoIP researcher for TippingPoint’s DVLabs, I of course attended this entire track. In short, three words: waste of time. Out of 5 talks on VoIP security, I learned one single new piece of information. At best, the content was the same old attacks [...]

Mnemonic Password Formulas

A research paper that I recently authored entitled Mnemonic Password Formulas was published on Monday in Uninformed Journal Vol. 7. It's essentially some research that I've done on the deficiencies in existing methods for memorability and manageability of passwords as well as documentation of a new method for the same that I've termed "Mnemonic Password Formulas", or "MPFs", that I have been developing for my own personal use over the [...]

ToorCon Seattle (Beta)

ToorCon Seattle (Beta) in Seattle was a new experiment by the ToorCon folks. It was essentially an informal and free invite-only conference, total attendance numbering around 150, with a single track of speakers each having 20 minutes to speak on their current (and potentially in-progress) research. The format was very similar to the format that the AHA! meetings take, so I was right at home speaking there. The conference talks [...]

TippingPoint DVLabs Website

Apparently, my employer launched the new TippingPoint DVLabs website when I wasn't looking. Click through and check it out, it's pretty slick. Not only do they have bios of all the team members, but each member page pulls data from all the other areas of the site like upcoming and published advisories, appearances, blog posts, etc. in an aggregated list specific to that team member. And of course, the site [...]

Anatomy of an 0-day

Cody Pierce, a colleague of mine at TippingPoint's DVLabs, was recently profiled in an article by Dennis Fisher over at SearchSecurity.com. The article basically describes how Pierce went about discovering and disclosing an 0-day vulnerability in the Internet Help Control ActiveX component last April, which resulted in a patch from Microsoft last August. To do this, he built a custom fuzzer to test large numbers of ActiveX controls and separate [...]

By |2007-04-19T13:08:18+00:00April 19th, 2007|employment, security research|0 Comments

Upcoming Conferences

In a couple of weeks I'll be heading to Seattle for Microsoft's internal security conference, BlueHat, and ToorCon's invite-only conference, ToorCon Seattle (Beta). I've never been to BlueHat before, but that's not really surprising since most of my research targets, both now and in the past, have had absolutely nothing to do with Microsoft products. The primary reason I'm attending is that BlueHat takes place the two days before ToorCon [...]

By |2007-04-19T06:44:29+00:00April 19th, 2007|conference, hack, security, security research|0 Comments