Proceedings of the Conference on Digital Forensics, Security and Law 2014 Richmond, Virginia May 28-29

Total Page:16

File Type:pdf, Size:1020Kb

Proceedings of the Conference on Digital Forensics, Security and Law 2014 Richmond, Virginia May 28-29 Proceedings of the Conference on Digital Forensics, Security and Law 2014 Richmond, Virginia May 28-29 Richmond, Virginia May 28-29, 2014 Conference Chairs Diane Barrett Glenn Dardick [email protected] [email protected] Co-Chair Co-Chair Bloomsburg University Longwood University Pennsylvania, USA Virginia, USA Association of Digital Forensics, Security and Law Copyright © 2014 ADFSL, the Association of Digital Forensics, Security and Law. Permission to make digital or printed copies of all or any part of this journal is granted without fee for personal or classroom use only and provided that such copies are not made or distributed for profit or commercial use. All copies must be accompanied by this copyright notice and a full citation. Permission from the ADFSL is required to make digital or printed copies of all or any part of this journal for- profit or commercial use. Permission requests should be sent to Dr. Glenn S. Dardick, Association of Digital Forensics, Security and Law, 1642 Horsepen Hills Road, Maidens, Virginia 23102 or emailed to [email protected]. ISSN 1931-7379 ADFSL Conference on Digital Forensics, Security and Law, 2014 Thank You to Our Sponsors 2 ADFSL Conference on Digital Forensics, Security and Law, 2014 Contents Committee .............................................................................................................................................. 4 Schedule ................................................................................................................................................. 5 Keynote Speaker: Mark Pollitt ............................................................................................................ 9 Awareness of Scam E-mail: An Exploratory Research Study .......................................................... 11 Tejashree D. Datar*, Kelly Anne Cole, and Marcus K. Rogers* Why Penetration Testing is a Limited Use Choice for Sound Cyber Security Practice, or If I Say I Can Kill You, Murder It is Then ................................................................................... 35 Craig Valli*, Andrew Woodward, Peter Hannay, and Mike Johnstone LiFE (Logical iOS Forensics Examiner): An Open Source iOS Backup Forensics Examination Tool ................................................................................................................................. 41 Ibrahim Baggili*, Shadi Al Awawdeh, and Jason Moore Using Internet Artifacts to Profile a Child Pornography Suspect ................................................... 53 Kathryn C. Seigfried-Spellar* and Marcus K. Rogers* Internet Addiction to Child Pornography ......................................................................................... 63 Rachel Sitarz*, Marcus K. Rogers*, Lonnie Bentley, and Eugene Jackson Generation and Handling of Hard Drive Duplicates as Piece of Evidence ..................................... 73 T. Kemmerich, F. Junge, N. Kuntze*, C. Rudolph, B. Endicott-Popovsky*, and L. Großkopf Testing the Harmonised Digital Forensic Investigation Process in Post Mortem Digital Investigation ......................................................................................................................................... 83 Emilio Raymond Mumba* and H.S. Venter* The Federal Rules of Civil Procedure: Politics in the 2013-2014 Revision ...................................... 99 John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, & Joseph J. Schwerha* Applying Memory Forensics to Rootkit Detection .......................................................................... 115 Igor Korkin* and Ivan Nesterov Computer Forensics for Accountants ............................................................................................... 143 Grover Kearns* Development and Dissemination of a New Multidisciplinary Undergraduate Curriculum in Digital Forensics ............................................................................................................................ 161 Masooda Bashir*, Jenny A. Applequist, Roy H. Campbell, Lizanne DeStefano, Gabriela L. Garcia, and Anthony Lang Botnet Forensic Investigation Techniques and Cost Evaluation ................................................... 171 Brian O. Cusack* Visualizing Instant Messaging Author Writeprints for Forensic Analysis ................................... 191 Angela Orebaugh*, Jason Kinser, and Jeremy Allnutt Application of Toral Automorphisms to Preserve Confidentiality Principle in Video Live Streaming ........................................................................................................................ 215 Enrique García-Carbajal* and Clara Cruz-Ramos Work in Progress: An Architecture for Network Path Reconstruction via Backtraced OSPF LSDB Synchronization ....................................................................................... 223 Raymond Hansen* 3 ADFSL Conference on Digital Forensics, Security and Law, 2014 Investigative Techniques of N-Way Vendor Agreement and Network Analysis Demonstrated with Fake Antivirus ................................................................................................... 231 Gary Warner*, Michael Nagy, Kyle Jones, and Kevin Mitchem Hot Zone Identification: Analyzing Effects of Data Sampling on SPAM Clustering ................... 243 Rasib Hassan Khan, Mainul Mizan, Ragib Hasan, and Alan Sprague (presented by Gary Warner*) * Author Presenting and/or Attending 4 ADFSL Conference on Digital Forensics, Security and Law, 2014 Conference Committee The 2014 ADFSL Conference on Digital Forensics, Security and Law is pleased to have the following as co- chairs of the conference, chairs of the conference committee, and administrators of the conference: Diane Barrett Glenn Dardick [email protected] [email protected] Co-Chair Co-Chair Bloomsburg University Longwood University Pennsylvania, USA Virginia, USA Linda Lau Alexandra Greene [email protected] [email protected] Publications Editor Assistant Publications Editor Longwood University Longwood University Virginia, USA Virginia, USA The 2014 ADFSL Conference on Digital Forensics, Security and Law is pleased to have the following as members of the program committee: John Bagby Ibrahim Baggili David Biros Roy Campbell [email protected] [email protected] [email protected] [email protected] The Pennsylvania State University of New Haven Oklahoma State University University of Illinois University Connecticut, USA Oklahoma, USA Illinois, USA Pennsylvania, USA Mohamed Chawki Fred Cohen Roy Costello David Dampier [email protected] [email protected] [email protected] [email protected] International Association of California Sciences University of Nebraska - Mississippi State University Cybercrime Prevention Institute Lincoln Mississippi, USA (AILCC) France Livermore, CA, USA Nebraska, USA Gareth Davies Nick Vincent Flor Dr. Mike Johnstone Andy Jones [email protected] [email protected] [email protected] [email protected] University of South Wales University of New Mexico Edith Cowan University Edith Cowan University UK New Mexico, USA Western Australia, Australia Western Australia, Australia Gary Kessler Jigang Liu Huw Read John Riley [email protected] [email protected] [email protected] [email protected] Embry-Riddle Aeronautical Metropolitan State University of South Wales Bloomsburg University University University UK Pennsylvania, USA Florida, USA Minnesota, USA Marcus Rogers Joseph J. Schwerha IV Jill Slay Iain Sutherland [email protected] [email protected] [email protected] [email protected] Purdue University Owner, TraceEvidence, University of New South University of South Wales, UK Indiana, USA LLC Wales Noroff University College, California University of Canberra, Australia Norway Pennsylvania, USA Michael Tu Craig Valli Eli Weintraub Dr. Andrew Woodward [email protected] [email protected] [email protected] [email protected] Purdue University Edith Cowan University Afeka Tel Aviv Academic Edith Cowan University, Indiana, USA Western Australia, College of Engineering Western Australia, Australia Israel Australia 5 ADFSL Conference on Digital Forensics, Security and Law, 2014 Schedule Wednesday, May 28 08:00 AM CONTINENTAL BREAKFAST 08:00 AM On-site Registration 08:50 AM Introductions . Glenn S. Dardick, Director of the ADFSL 09:10 AM Keynote Speech . Mark Pollitt: Digital Forensics at the Crossroads 09:40 AM Paper 1 . Tejashree D. Datar: Awareness of Scam E-mail: An Exploratory Research Study 10:20 AM MORNING BREAK 10:40 AM Paper 2 . Craig Valli: Why Penetration Testing is a Limited Use Choice for Sound Cyber Security Practice, or If I Say I Can Kill You, Murder It is Then 11:20 AM Paper 3 . Ibrahim Baggili: LiFE (Logical iOS Forensics Examiner): An Open Source iOS Backup Forensics Examination Tool 12:00 PM LUNCH (provided) 01:00 PM Paper 4 . Kathryn C. Seigfried-Spellar and Marcus Rogers: Using Internet Artifacts to Profile a Child Pornography Suspect 01:40 PM Paper 5 . Rachel Sitarz: Internet Addiction to Child Pornography 02:20 PM AFTERNOON BREAK 02:40 PM Paper 6 . N. Kuntz, and B. Endicott-Popovsky: Generation and Handling of Hard Drive Duplicates as Piece of Evidence 03:20 PM Paper 7 . Emilio Raymond Mumba and H.S. Venter: Testing The Harmonised Digital Forensic Investigation Process in Post Mortem Digital Investigation 04:00 PM Paper 8 . Joseph J. Schwerha: The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision 04:40
Recommended publications
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Acid-H1-2021-Report.Pdf
    AGARI CYBER INTELLIGENCE DIVISION REPORT H1 2021 Email Fraud & Identity Deception Trends Global Insights from the Agari Identity Graph™ © Copyright 2021 Agari Data, Inc. Executive Summary Call it a case of locking the back window while leaving the front door wide open. A year into the pandemic and amid successful attacks on GoDaddy1, Magellan Health², and a continuous stream of revelations about the SolarWinds “hack of the decade,” cyber-attackers are proving all too successful at circumventing the elaborate defenses erected against them³. But despite billions spent on perimeter and endpoint security, phishing and business email compromise (BEC) scams continue to be the primary attack vectors into organizations, often giving threat actors the toehold they need to wreak havoc. In addition to nearly $7.5 billion in direct losses each year, advanced email threats like the kind implicated in the SolarWinds case⁴ suggest the price tag could be much higher. As corroborated in this analysis from the Agari Cyber Intelligence Division (ACID), the success of these attacks is growing far less reliant on complex technology than on savvy social engineering ploys that easily evade most of the email defenses in use today. Sophisticated New BEC Actors Signal Serious Consequences Credential phishing accounted for 63% of all phishing attacks during the second half of 2020 as schemes related to COVID-19 gave way to a sharp rise in payroll diversion scams, as well as fraudulent Zoom, Microsoft and Amazon alerts targeting millions of corporate employees working from home. Meanwhile, the state- sponsored operatives behind the SolarWinds hack were just a few of the more sophisticated threat actors moving into vendor email compromise (VEC) and other forms of BEC.
    [Show full text]
  • The Nutshell Studies of Unexplained Death Stephanie Witt
    School of Graduate and Professional Studies 100 Campus Circle, Owings Mills, Maryland 21117 1-877-468-6852 accelerate.stevenson.edu STEVENSON UNIVERSITY FORENSICS JOURNAL VOLUME 4 EDITORIAL BOARD EDITOR-IN-CHIEF Carolyn Hess Johnson, Esq. PUBLISHER Carolyn Hess Johnson, Esq. EDITORS Abigail Howell Stephanie Witt COVER PHOTO Bruce Goldfarb Assistant to the Chief Medical Examiner, Maryland DESIGN & LAYOUT Chip Burkey Cassandra Bates Stevenson University Marketing and Public Relations Office Copyright © 2013, author(s) and Stevenson University Forensics Journal. No permission is given to copy, distribute or reproduce this article in any format without prior explicit written permission from the article’s author(s) who hold exclusive rights to impose usage fee or royalties. FORENSICS JOURNAL Welcome to our fourth annual Stevenson University Forensics Journal. This year, as always, we bring fresh voices and perspectives from all aspects and areas of the field. I am pleased to note that a new section has been added this year, highlighting the process of library research in the vast field of Forensic Studies. Our Stevenson University librarians bring the research pro- cess into the twenty-first century by showcasing a variety of on-line resources available to researchers. Also of note is the connection between our cover photo and the interview conducted with Dr. David Fowler, Chief Medical Examiner for the State of Maryland. Assistant Editor Stephanie Witt joins the Journal as a contributor to explain the fascinating Nutshell Series of Unexplained Deaths. We are privileged this year to have the Honorable Lynne A. Battaglia providing her insights into the Court’s perspective on the prominent role of forensic evidence in modern litigation.
    [Show full text]
  • Behind the “From” Lines: Email Fraud on a Global Scale Ten Cybercriminal Organizations Unmasked
    AGARI CYBER INTELLIGENCE DIVISION REPORT Behind the “From” Lines: Email Fraud on a Global Scale Ten Cybercriminal Organizations Unmasked © Copyright 2019 AGARI Data, Inc. Executive Summary Nigerian Scammers Target American Businesses Over the course of the past 10 months, using responsible active defense “ Since I can't send techniques, Agari captured 78 criminal email accounts, belonging to 10 criminal more money, maybe organizations, and containing 59,652 unique email messages. Agari analyzed the I'm of no use to you contents of these email accounts to investigate the tactics, targets and identities now. I certainly feel of the criminals. And now, that analysis enables stronger defensive strategies and like that could be measures. the deal here...A realtor is coming over What’s more, Agari has used this analysis to warn financial institutions about tomorrow to help accounts being used for criminal activity, and to provide evidence to law me list my house for enforcement. Agari has also warned victims, and in at least once case, quick action sale. I'm talking to an helped a company recover its money. attorney now about how to keep the One of the more interesting findings from this analysis was that while much of the collection agencies high-profile cybersecurity news of the past year has involved state sponsors like away and protect my Russia and North Korea, American businesses and individuals are far more likely to kids. All this time, I'm be targeted by Nigerian scam artists. wondering if I've heard Nigerian scam artists, traditionally associated with implausible get-rich-quick from you for the last schemes and other scams of individuals, have become more sophisticated and time.
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • Are You the Next Phishing Victim?
    Are you the next Phishing Victim? Organisations today are faced with increasing threats coming from the cyberspace, ones which could significantly damage their operation and reputation. As all industries shift towards IT-oriented infrastructures, the same is being undertaken by malicious users and organisations as they are aware that the weakest links in Security are users. 90% of data breaches occurred as a result of phishing, resulting in an average cost of $3.86 for organisations. IBM - Phishing and Email Fraud Statistics in 2019 Email phishing is a form of social engineering where malicious emails are designed to deceive recipients into providing sensitive information, or clicking links or file attachments that install malware (e.g. ransomware). Phishing attacks can target mass amounts of users or be part of a specific targeted campaign (spear-phishing). In each of the cases the atack can result in the compromising of internal & client sensitive data, loss of productivity, loss of client trust, and expensive response costs. Countermeasures Although security awareness training for employees helps users to recognise malicious emails, phishing scams evolve and are becoming highly sophisticated so it is difficult to gauge whether the organisation will suffer a successful phishing attack. The PwC Phishing Simulation Campaign consists of an effective and practical exercise to assess how likely it is for one or more employees to fall for a phishing email and how far they will go: clicking a link; opening an attachment; divulging information; etc. Types of phishing simulation campaigns PwC Service Offerings Tier 1 Tier 2 Tier 3 A basic campaign An campaign with An advanced campaign with minimal or no manually tailored to which is developed based customisation.
    [Show full text]
  • Q1-2020-Report.Pdf
    AGARI CYBER INTELLIGENCE DIVISION REPORT Q1 2020 Email Fraud & Identity Deception Trends Global Insights from the Agari Identity Graph™ © Copyright 2020 Agari Data, Inc. Executive Summary Why attack hardened computer systems when it’s so much easier to hack human nature? The tactics employed in phishing attacks, business email compromise (BEC) scams, and other advanced email threats continue to shape shift, pummeling US businesses with attacks that lead to more than $700 million in losses each month. As the latest quarterly analysis from the Agari Cyber Intelligence Division (ACID) affirms, the success of these attacks is growing less dependent on technical prowess, and more on sophisticated forms of identity deception and advanced social engineering techniques. As infuriating as it may be, the brilliantly simple, expertly-crafted email messages used to dupe corporate employees into surrendering sensitive information, revealing login credentials, or paying for fraudulent invoices or gift cards grow more effective by the day. 62% of BEC Scams Target Gift Cards During the Holiday Season Gift cards continue to be the preferred cash-out method in BEC scams, accounting for 62% of such attacks from October through December 2019. Possible seasonal patterns have emerged in the types of gift cards requested. Google Play narrowly retained its status as the #1 most requested gift card, dropping from 27% share to 16%, while cards from Target, BestBuy, Sephora, and other retailers saw major increases in demand. Attackers may be capitalizing on office gift giving to launder stolen cards through physical goods rather than through traditional channels such as cryptocurrency exchanges. During the last two weeks of the year, BEC attacks were also 63% lower than the average seen during the rest of the quarter—indicating scammers go on holiday, too.
    [Show full text]
  • Observed COVID-19 Fraud Schemes
    Cotton & Company Observed COVID-19 Fraud Schemes OBSERVED COVID-19 FRAUD SCHEMES The following table lists the titles of observed Coronavirus Disease 2019 (COVID-19) fraud schemes, organized by fraud risk categories.1 To access a summary of the fraud scheme and source, please click on the title listed in the table below. Title of Observed COVID-19 Fraud Scheme Bribery and Corruption Landlord Faces Sexual Harassment Lawsuit Health Care Executive Charged in Scheme to Defraud Investors and Health Care Benefit Programs Commodities Fraud Buffalo Women Spits on Postal Employee St. Petersburg Man Indicted For Threatening To Spread COVID-19 U.S. Department of the Interior Top Management Challenges - Pandemic Response Education OIG Coronavirus Relief Oversight Plan Oversight of USAID's Response to COVID-19 Advisory Notice - Key Questions To Inform USAID's COVID-19 Response Top Oversight Challenges Facing the Department of Commerce to Ensuring That Pandemic Funds Are Timely and Appropriately Spent How to Spot, Avoid, and Report Imposter Scams COVID Mask Exemption Cards are Not From the Government Coronavirus: Scammers Follow the Headlines Utility Company Calling? Don’t Fall for It Scammers Impersonate the FTC, Too Scammers are Using COVID-19 Messages to Scam People Avoiding SSA Scams during COVID-19 Grandparent Scams in the Age of Coronavirus How to Avoid COVID-19 Government Imposter Scams What Do COVID-19 Scams Look Like in Your State? COVID-19 Scam Reports, by the Numbers Make your Coronavirus donations count Avoid scams while finding help during quarantine Whack-a-mole: Well-connected line jumpers force states to rethink vaccine distribution Forged and Fake Vaccination Certificates and Negative COVID-19 Test Results Cyber Fraud Email Phishing Scams Related to Coronavirus COVID-Themed Web Sites 1 Fraud risk categories align to those presented in the Association of Certified Fraud Examiners (ACFE) September 2020 edition of the Fraud in the Wake of COVID-19: Benchmarking Report, located at https://www.acfe.com/covidreport.aspx.
    [Show full text]
  • Examinations of Email Fraud Susceptibility: Perspectives from Academic Research and Industry Practice
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CLoK 80 Chapter 5 Examinations of Email Fraud Susceptibility: Perspectives From Academic Research and Industry Practice Helen S. Jones University of Dundee, UK John Towse Lancaster University, UK ABSTRACT The internet provides an ever-expanding, valuable resource for entertainment, communication, and commerce. However, this comes with the simultaneous advancement and sophistication of cyber-attacks, which have serious implications on both a personal and commercial level, as well as within the criminal justice system. Psychologically, such attacks offer an intriguing, under-exploited arena for the understand- ing of the decision-making processes leading to online fraud victimisation. In this chapter, the authors focus on approaches taken to understand response behaviour surrounding phishing emails. The chapter outlines how approaches from industry and academic research might work together to more effectively understand and potentially tackle the persistent threat of email fraud. In doing this, the authors address alternative methodological approaches taken to understand susceptibility, key insights drawn from each, how useful these are in working towards preventative security measures, and the usability of each ap- proach. It is hoped that these can contribute to collaborative solutions. INTRODUCTION In 2016, the rate of malicious emails being sent to users was at its highest in five years. For example, in relation to one specific type of phishing, approximately 1 in every 131 emails contains malware (Verizon, 2017). Despite efforts from experts in the field, email fraud remains one of the most pertinent cyber security threats. The persistence of this threat indicates a need for reconsideration of mitigation methods DOI: 10.4018/978-1-5225-4053-3.ch005 Copyright © 2018, IGI Global.
    [Show full text]
  • Intel ME: Myths and Reality (2017)
    INTEL ME: MYTHS AND REALITY ABOUT SPEAKERS Igor Skochinsky Hobby reverse engineer Soware developer at Hex-Rays since 2008 NOT a security researcher Did a bit of e-Reader hacking ABOUT SPEAKERS Nicola Corna Hobby reverse engineer Interested in DIY hardware Electronics Engineering student at the Politecnico di Milano NOT a security researcher PCB milling DISCLAIMER The contents of this talk is based on public information sources and our own reverse engineering. We can't be certain that our conclusions are 100% correct and may turn out wrong in future. We do not have any NDA or "special relationship" with Intel. INTEL ME Originally "manageability engine" later just "management engine" nowadays "converged security and manageability engine (CSME)" or "converged security engine (CSE)" "Trusted Execution Engine" (TXE) for mobile/embedded "Server Platform Services" (SpS) for servers INTEL ME Built into many Intel® Chipset–based platforms is a small, low-power computer subsystem [...] performs various tasks [...] must function correctly to get the most performance and capability from your PC from Frequently Asked Questions for the Intel® Management Engine Verification Utility Myth 1: It's a backdoor made for NSA and serves no useful purpose from Reddit from Phoronix <anon1> How can I "limit my risk" when there is a dedicated, hidden computer on top of my computer that has full access and cannot be disabled? <anon1> There is no need for a "hardware hack". It's a built-in hardware backdoor. <anon1> Bypasses any firewall, latches onto any wifi signal, cannot be disabled, etc. (from IRC) Well, that sounds pretty bad. But is it true? My opinion: pretty unlikely.
    [Show full text]
  • Hardware Security
    An Attack and a Defence in the Context of Hardware Security by Frank Imeson A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Applied Science in Electrical and Computer Engineering Waterloo, Ontario, Canada, 2013 c Frank Imeson 2013 I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Abstract The security of digital Integrated Circuits (ICs) is essential to the security of a computer system that comprises them. We present an improved attack on computer hardware that avoids known defence mechanisms and as such raises awareness for the need of new and improved defence mechanisms. We also present a new defence method for securing computer hardware against modifications from untrusted manufacturing facilities, which is of concern since manufacturing is increasingly outsourced. We improve upon time triggered based backdoors, inserted maliciously in hardware. Prior work has addressed deterministic timer-based triggers | those that are designed to trigger at a specific time with probability 1. We address open questions related to the feasibility of realizing non-deterministic timer-based triggers in hardware | those that are designed with a random component. We show that such timers can be realized in hardware in a manner that is impractical to detect or disable using existing countermea- sures of which we are aware. We discuss our design, implementation and analysis of such a timer.
    [Show full text]
  • A Closer Look at Cyberattacks and Wire Fraud a GUIDE to COMMON CYBERTHEFT SCHEMES TARGETING BUSINESSES TODAY
    A Closer Look at Cyberattacks and Wire Fraud A GUIDE TO COMMON CYBERTHEFT SCHEMES TARGETING BUSINESSES TODAY Fall 2019 A CLOSER LOOK AT CYBERATTACKS 2 Cybercrime: More common Email Fraud Succeeds Every Day Email fraud, already one of today’s biggest cyberthreats, shows no than you might think. signs of letting up. That’s the sobering conclusion to Proofpoint’s Unfortunately, cybercrime is a reality for businesses today. While research into this growing category of cyberattacks. “Attackers the online world brings added efficiency and convenience, it are sending more fraudulent emails. They’re impersonating more also offers cyberthieves ways to penetrate an organization’s people. And they’re targeting more recipients.” defenses or trick employees into falling for costly scams. In fact, Email fraud is a broad category. It includes business email over 80% of organizations were targets of actual or attempted compromise (BEC), a type of wire fraud, and other threats in which payments fraud in 2018.1 the attacker uses some form of identity deception that seeks to exploit people. They all involve impersonation tactics to pose as trusted colleagues and business partners. Email fraud affects 82% 3 73% 74% 78% organizations of every size, across every industry. 60% 62% A Cyberthief’s Toolbox Today, cybersecurity isn’t just the IT or operations department’s issue; it’s every employee’s issue. As such, it’s important to note 2013 2014 2015 2016 2017 2018 that, in general, a cyberthief’s tools can only work when someone on your staff takes the bait and clicks on the wrong email, the wrong link, or the wrong attachment.
    [Show full text]