Looking for Research Assistants (doctoral or post-doc) at University of Paderborn

Eric | November 28, 2015

As I announced a few weeks ago, in 2016 I will be moving to the University of Paderborn to start a tenured professorship there. As part of this move, I am looking for a number of new Ph.D. students and also PostDocs. The positions come with full funding for a number of years. You can find more information about these positions here. As stated, please direct your applications to se-jobs.cs@upb.de

If you have a deep interest in software engineering, especially software security, the I am very much looking forward to your application!

Cross-posted from Secure Software Engineering

Comments
Comments Off on Looking for Research Assistants (doctoral or post-doc) at University of Paderborn
Categories
Misc, Research, Uncategorized

Looking for Research Assistants (doctoral or post-doc) at University of Paderborn

Eric | November 28, 2015

As I announced a few weeks ago, in 2016 I will be moving to the University of Paderborn to start a tenured professorship there. As part of this move, I am looking for a number of new Ph.D. students and also PostDocs. The positions come with full funding for a number of years. You can find more information about these positions here. As stated, please direct your applications to se-jobs.cs@upb.de

If you have a deep interest in software engineering, especially software security, the I am very much looking forward to your application!

Cross-posted from Secure Software Engineering

Comments
Comments Off on Looking for Research Assistants (doctoral or post-doc) at University of Paderborn
Categories
Misc, Research, Uncategorized

CFP: Workshop on Empirical Research Methods in Information Security @ WWW2016

Eric | November 22, 2015

There is a growing use of empirical research methods to address cyber security challenges. This workshop aims to contribute to developing a common understanding of these methods and to set guidelines for using them for the different sub-disciplines including, but not limited to: security in software engineering, network security, security in social networks, and usable security. Researchers who work with these methods are encouraged to submit their work to the workshop and share their findings and experience. The submission deadline is January 4th, 2016. More information are available here.

Cross-posted from Secure Software Engineering

Comments
Comments Off on CFP: Workshop on Empirical Research Methods in Information Security @ WWW2016
Categories
Misc, Research, Uncategorized

Blackhat Slides and Paper are online!

Eric | November 13, 2015

We presented our Backend-as-a-Service investigation at Blackhat Europe 2015.

The slides are available here. The paper contains more details and you can find it here.

Update: First news report available here.

Cross-posted from Secure Software Engineering

Comments
Comments Off on Blackhat Slides and Paper are online!
Categories
Misc, Research, Uncategorized

Upcoming Black Hat talk: (IN-)SECURITY OF BACKEND-AS-A-SERVICE

Eric | November 3, 2015

To be presented at Black Hat Europe next week:

Smartphone applications frequently need to store data remotely. From a developer’s point of view, setting up and maintaining back-ends, however, is time-consuming and error-prone. Therefore, commercial cloud-based data storage solutions from Backend-As-A-Service (BaaS) providers such as the ones from Amazon, Google, and Facebook have become omnipresent. They provide simple APIs for common tasks such as managing database records or files. Adding a few library classes and writing three or four lines of code is sufficient to make an interaction between the cloud and the app, and, e.g., store credit card data. While this model is convenient, one might wonder whether it’s really secure in practice (spoiler: it’s not).
In this study, we will show that many BaaS solutions are completely insecure and attackers have no difficulties in breaking into the developer’s backend. We investigated about two million Android apps and the results were quite shocking. We were able to access more than 56 million sensitive user records stored in the cloud by heavily misconfigured BaaS solutions. These records contained all sorts of sensitive data processed by Android apps: medical information, credit card data, photos, voice-, audio- and video-records, money transaction records, etc. Some apps even contained credentials that gave us full control over the remote storage. Adversaries could hijack Amazon S3-Buckets which gives them the ability to modify sensitive customer databases, add malicious code to well-known websites or directly run malware on the cloud at the app developer’s expense. In order to find and verify these insecure BaaS solutions in Android applications, we developed an automatic exploit generator that extracts credentials from the app, even if they are obfuscated, and provides access to the respective BaaS backend.

Cross-posted from Secure Software Engineering

Comments
Comments Off on Upcoming Black Hat talk: (IN-)SECURITY OF BACKEND-AS-A-SERVICE
Categories
Misc, Research, Uncategorized

The role of empirical research in engineering secure software

Eric | October 30, 2015

I gave, recently, a lecture at the Ninth International Crisis Management Workshop (CriM’15) and Oulu Winter School. The program included many interesting talks. I talked in my lecture about our experience on using interviews, questionnaires, and data analytics to address research questions in secure software development. The lecture video is publicly available here.

Cross-posted from Secure Software Engineering

Comments
Comments Off on The role of empirical research in engineering secure software
Categories
Misc, Research, Uncategorized

PLDI PC meeting promises to have a rather cold atmosphere this time

Eric | January 27, 2015

This is gonna be fun… guess at where of all places PLDI is having its PC meeting this week? Of course! In New York City! Don’t get me wrong – I really love New York, also at this time of a year, but with these weather conditions we are going to be in for a treat. Let’s hope we will all make it there in one piece. And the papers better be good!

Comments
Comments Off on PLDI PC meeting promises to have a rather cold atmosphere this time
Categories
Uncategorized

31C3: Great talk on hacking physical/chemical processes

Eric | December 31, 2014

At 31C3, I really enjoyed the talk “Damn Vulnerable Chemical Process”. The talk explains in details what, as a hacker, one can actually do to harm (chemical) processes once one is in the system. Something that we new to me is that if you actually are able to create a DoS attack onto an industrial control switch (as shown here), this not necessarily allows you to DoS the entire plant, but rather allows you to control large parts of the chemical reaction that is taking place. The reason for this the fact that the control loops usually use asynchronous communication: if a controller stops receiving signals from a sensor, it will simply (and silently!) keep reusing the last data received. Carefully controlled by the attacker, this can easily cause havoc. Great talk! And great challenges…

Comments
Comments Off on 31C3: Great talk on hacking physical/chemical processes
Categories
Uncategorized

Boycotting Elsevier

Eric | October 8, 2014

Elsevier has been in the press for a long time, for their particularly strict negotiation style when it comes to negotiating access licenses to their contents. All of Fraunhofer has now decided that it cannot offer access to Elsevier publications any longer, as they have become too expensive. In particular, Elsevier is apparently blocking negotiations about digital-only access. It seems like they would rather continue killing trees for not reason than changing to a future-oriented business model.

For me this is the final straw that breaks the camel’s back. From now on I will boycott Elsevier, not publishing in their journals any longer and providing no reviewing services for Elsevier journals.

The time is really overdue for open-access journals!

Comments
Comments Off on Boycotting Elsevier
Categories
Uncategorized

Exhibit on code analysis at CeBIT

Eric | January 26, 2014

On this year’s CeBIT we will be presenting an exhibit at the Fraunhofer booth (Halle 9, Stand 40). The exhibit will be on efficient and effective code analysis directly from within the Eclipse IDE. You are most welcome to pay us a visit. If you would like me to reserve time to have some more detailed discussion, please contact me to make an appointment.

Comments
Comments Off on Exhibit on code analysis at CeBIT
Categories
Uncategorized