On the Use of Stalkerware
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to -
Scada & Plc Vulnerabilities in Correctional Facilities
SCADA & PLC VULNERABILITIES IN CORRECTIONAL FACILITIES White Paper Teague Newman Tiffany Rad, ELCnetworks, LLC John Strauchs, Strauchs, LLC 7/30/2011 © 2011 Newman, Rad, Strauchs PLC Vulnerabilities in Correctional Facilities Newman, Rad, Strauchs Abstract On Christmas Eve not long ago, a call was made from a prison warden: all of the cells on death row popped open. Not sure how or if it could happen again, the prison warden requested security experts to investigate. Many prisons and jails use SCADA systems with PLCs to open and close doors. As a result of Stuxnet academic research, we have discovered significant vulnerabilities in PLCs used in correctional facilities by being able to remotely flip the switches to “open” or “locked closed” on cell doors and gates. Using original and publically available exploits along with evaluating vulnerabilities in electronic and physical security designs, we will analyze SCADA systems and PLC vulnerabilities in correctional and government secured facilities while making recommendations for improved security measures. 1 PLC Vulnerabilities in Correctional Facilities Newman, Rad, Strauchs Biographies John J. Strauchs, M.A., C.P.P., conducted the security engineering or consulting for more than 114 justice design (police, courts, and corrections) projects in his career, which included 14 federal prisons, 23 state prisons, and 27 city or county jails. He owned and operated a professional engineering firm, Systech Group, Inc., for 23 years and is President of Strauchs, LLC. He was an equity principal in charge of security engineering for Gage-Babcock & Associates and an operations officer with the U.S. Central Intelligence Agency (CIA). His company and work was an inspiration for the 1993 movie, “Sneakers” for which he was the Technical Advisor. -
Paper: Hacks and Attacks: Examples of Electronic Device Compromise
Hacks and Attacks: Examples of Electronic Device Compromise Embedded Systems Conference Silicon Valley 2010 (ESC-343) Joe Grand* Grand Idea Studio, Inc. ABSTRACT Bolstered by the flourishing hobbyist electronics and do-it-yourself movements, easy access to equipment, and nearly realtime information sharing courtesy of the Internet, hardware devices have become a target for both harmless, curious hackers and malicious attackers. Many devices are inherently trusted and taken for granted, though they are actually susceptible to compromise leading to potential financial, social, or legal implications. As engineers, we have a responsibility to learn from problems of the past and anticipate new ones in order to better equip ourselves for designs of the future. This paper will present a typical hardware hacking process and explore a few real- world attacks against electronic devices. WHY HARDWARE? Society thrives on an ever-increasing use of technology. Electronics are embedded into nearly everything we touch. Hardware products are relied on for security-related applications and are inherently trusted, though many are completely susceptible to compromise with simple classes of attacks that have been known for decades. Contrary to conventional thinking, engineering doesn’t only have to be about design and hacking doesn’t have to be illegal. You can combine the best of both worlds - the skills and precision of an engineer with the freewheeling, anti- authoritative mindset of a hacker - to discover, learn about, experiment with, modify, build, break, or improve a product. Whether the goals of a hardware hack or attack are for “good” or for “evil” depends purely on the person or people undertaking the task. -
D 4.4 Profiles of Cyber-Criminals and Cyber- Attackers
Funded by the European Commission Seventh Framework Programme CyberROAD Development of the Cybercrime and Cyber-terrorism Research Roadmap Grant Agreement N. 607642 D 4.4 Profiles of Cyber- Criminals and Cyber- Attackers Date of deliverable: 01/12/2015 Actual submission date: 01/12/2015 Start date of the Project: 1st June 2014. Duration: 24 months Coordinator: UNICA – University of Cagliari, PRA Lab - Pattern Recognition and Applications Lab Version: 1.0 Project funded by the European Commission Directorate-General Home Affairs in the Prevention of and Fight against Crime Programme Restriction Level PU Public PP Restricted to other programme participants (including the Commission services) no RE Restricted to a group specified by the consortium (including the Commission services) no CO Confidential, only for members of the consortium (including the Commission) no Profiles of Cyber-Criminals and Cyber-Attackers Funded by the European Commission under the Seventh Framework Programme Page 1 of 58 Revision history Version Object Date Author(s) 0.1 Initial draft Table of 01/07/2015 INDRA Contents. 0.2 Structure Changes. 01/08/2015 INDRA Multiple changes in the 0.3 03/08/2015 INDRA structure. Content added to section 1 and 2. Review of attributes for 0.4 07/08/2015 INDRA characterization. Attacks to Postal and 0.5 28/08/2015 INDRA Logistic Services. Attacks to Social 0.6 01/09/2015 INDRA Networks, Unmanned Systems, Mobile Biometry, ICS, Automotive, IoT, Transport Critical Infrastructure, Virtualization, Cloud Computing. Attacks to Smart Grids. 0.7 11/09/2015 INDRA Attacks to BYOD, Smart 0.8 07/10/2015 INDRA Cities. -
Hacking Competitions and Their Untapped Potential for Security Education
Education Editors: Matt Bishop, [email protected] Cynthia Irvine, [email protected] Hacking Competitions and Their Untapped Potential for Security Education nformation security educators can learn much from room environment. the hacker community. The word “hacker” is con- Network Warfare Perhaps the best-known com- troversial, and the idea of emulating this community petition in the hacker commu- nity is CTF, which challenges is problematic to some. However, we use the term in participants to attack and defend computing resources while solv- Iits purest form: individuals who creatively explore technology ing complex technical problems. Run by security experts includ- GREGORY and push it in new directions. Be- better prepared to deter attacks and ing DDTek, Kenshoto, and the CONTI, THOMAS cause of this imaginative, playful defend against them. They’ll also Ghetto Hackers, CTF has been BAbbITT, AND spirit, most hacker conferences be more able to perform ethical an important catalyst for research, JOHN NELSON sponsor diverse and intense com- hacking activities, such as penetra- innovation, and government, aca- US Military petitions, many organized by the tion testing, reverse engineering, demic, and industry collaboration. Academy attendees themselves and facilitat- and active network defense. CTF variants have emerged, such ed via the conference organizers. as the Collegiate Cyber Defense These competitions test partici- Types of Competitions Competition and the US National pants’ ingenuity and problem-solv- Hacker competitions touch on Security Agency-sponsored Cy- ing skills, are fun and innovative, many aspects of computer science, ber Defense Exercise.4 CTF has and draw large, enthusiastic groups information technology, electri- even spawned a business model in of participants and spectators. -
How Hackers Think: a Mixed Method Study of Mental Models and Cognitive Patterns of High-Tech Wizards
HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELS AND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS by TIMOTHY C. SUMMERS Submitted in partial fulfillment of the requirements For the degree of Doctor of Philosophy Dissertation Committee: Kalle Lyytinen, Ph.D., Case Western Reserve University (chair) Mark Turner, Ph.D., Case Western Reserve University Mikko Siponen, Ph.D., University of Jyväskylä James Gaskin, Ph.D., Brigham Young University Weatherhead School of Management Designing Sustainable Systems CASE WESTERN RESERVE UNIVESITY May, 2015 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of Timothy C. Summers candidate for the Doctor of Philosophy degree*. (signed) Kalle Lyytinen (chair of the committee) Mark Turner Mikko Siponen James Gaskin (date) February 17, 2015 *We also certify that written approval has been obtained for any proprietary material contained therein. © Copyright by Timothy C. Summers, 2014 All Rights Reserved Dedication I am honored to dedicate this thesis to my parents, Dr. Gloria D. Frelix and Dr. Timothy Summers, who introduced me to excellence by example and practice. I am especially thankful to my mother for all of her relentless support. Thanks Mom. DISCLAIMER The views expressed in this dissertation are those of the author and do not reflect the official policy or position of the Department of Defense, the United States Government, or Booz Allen Hamilton. Table of Contents List of Tables .................................................................................................................... -
The Best of 2600: a Hacker Odyssey, Collector's Edition Emmanuel Goldstein
To purchase this product, please visit https://www.wiley.com/en-ae/9780470474693 The Best of 2600: A Hacker Odyssey, Collector's Edition Emmanuel Goldstein E-Book 978-0-470-47469-3 January 2009 £48.99 DESCRIPTION In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600: The Hacker Quarterly, from a firsthand perspective. Offering a behind-the-scenes vantage point, this book provides devoted fans of 2600 a compilation of fascinating—and controversial—articles. Cult author and hacker Emmanuel Goldstein has collected some of the strongest, most interesting, and often provocative articles that chronicle milestone events and technology changes that have occurred over the last 24 years. He divulges author names who were formerly only known as “anonymous” but have agreed to have their identity revealed. The accompanying CD-ROM features the best episodes of Goldstein’s “Off the Hook” radio shows. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file. ABOUT THE AUTHOR Emmanuel Goldstein first became enchanted with the computer during his high school days in the late '70s. His infatuation soon got him into trouble as he discovered he could access things he shouldn't. A few years and an FBI raid later, he cofounded 2600: The Hacker Quarterly as an outlet for stories and tutorials from hackers around the world. Since 1988, Goldstein has hosted Off the Hook, a hacker-themed radio talk show airing on WBAI FM in New York City. The seven HOPE (Hackers On Planet Earth) conferences he has organized since 1994 have drawn thousands of attendees from points around the globe. -
Bugs in the Market: Creating a Legitimate, Transparent, and Vendor-Focused Market for Software Vulnerabilities
BUGS IN THE MARKET: CREATING A LEGITIMATE, TRANSPARENT, AND VENDOR-FOCUSED MARKET FOR SOFTWARE VULNERABILITIES Jay P. Kesan* & Carol M. Hayes** Ukraine, December 23, 2015. Hundreds of thousands of homes lost power. Call center communications were blocked. Authorities reported that 103 cities experienced a total blackout. The alleged cause? BlackEnergy malware. With so much of our daily lives reliant on computers, is modern civilization just a stream of ones and zeroes away from disaster? Malware like BlackEnergy relies on uncorrected security flaws in computer systems. Sometimes, the system owner fails to install a patch. Other times, there is no patch because the software vendor either did not know about or did not correct a critical security flaw. Meanwhile, the victim country’s government or its allies may have knowledge of the same flaw, but kept the information secret so that it could be used against its enemies. There is an urgent need for a new legal and economic approach to cybersecurity that will curtail socially harmful behavior by security researchers and governments. Laws aimed at curbing cyberattacks typically focus on punishment, with little to no wiggle room provided for socially beneficial hacking behavior. Around the world, governments hoard zero-day vulnerabilities while permitting software vendors to sue security researchers who plan to demonstrate critical security flaws at industry conferences. There is also a growing market for buying and selling security flaws, and the buyers do not always have society’s best interests in mind. This Article delves into the world of cybersecurity and software and provides an interdisciplinary analysis of the current crisis, contributing to the limited but growing literature addressing these new threats that cannot be contained by traditional philosophies of war and weaponry. -
Hacker, Hoaxer, Whistleblower, Spy: the Story of Anonymous
hacker, hoaxer, whistleblower, spy hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York First published by Verso 2014 © Gabriella Coleman 2014 The partial or total reproduction of this publication, in electronic form or otherwise, is consented to for noncommercial purposes, provided that the original copyright notice and this notice are included and the publisher and the source are clearly acknowledged. Any reproduction or use of all or a portion of this publication in exchange for financial consideration of any kind is prohibited without permission in writing from the publisher. The moral rights of the author have been asserted 1 3 5 7 9 10 8 6 4 2 Verso UK: 6 Meard Street, London W1F 0EG US: 20 Jay Street, Suite 1010, Brooklyn, NY 11201 www.versobooks.com Verso is the imprint of New Left Books ISBN-13: 978-1-78168-583-9 eISBN-13: 978-1-78168-584-6 (US) eISBN-13: 978-1-78168-689-8 (UK) British Library Cataloguing in Publication Data A catalogue record for this book is available from the British library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the library of congress Typeset in Sabon by MJ & N Gavan, Truro, Cornwall Printed in the US by Maple Press Printed and bound in the UK by CPI Group Ltd, Croydon, CR0 4YY I dedicate this book to the legions behind Anonymous— those who have donned the mask in the past, those who still dare to take a stand today, and those who will surely rise again in the future. -
Deliverable D1.1
DELIVERABLE D1.1 STATE OF THE ART, PROJECT CONCEPT AND REQUIREMENTS Grant Agreement number: 786922 Project acronym: ASTRID Project title: AddreSsing ThReats for virtualIseD services Start date of the project: 01/05/2018 Duration of the project: 36 months Type of Action: Research & Innovation Action (RIA) Name: Orazio Toscano Project Coordinator: Phone: +39 010 600 2223 e-mail: [email protected] Due Date of Delivery: M10 (28/02/2019) Actual Date of Delivery: 27/02/2019 Date of Revision Delivery: 27/02/2020 Work Package: WP1 – Reference Architecture Type of the Deliverable: R Dissemination level: PU Editors: POLITO Version: 3.0 Deliverable D1.1 List of Authors POLITO POLITECNICO DI TORINO Fulvio Valenza, Fulvio Risso, Riccardo Sisto, Guido Marchetto CNIT CONSORZIO NAZIONALE INTERUNIVERSITARIO PER LE TELECOMUNICAZIONI Matteo Repetto, Alessandro Carrega DTU DANMARKS TEKNISKE UNIVERSITET Thanassis Giannetsos ETI ERICSSON TELECOMUNICAZIONI Orazio Toscano INFO INFOCOM S.R.L. Maurizio Giribaldi SURREY UNIVERSITY OF SURREY Mark Manulis AGE AGENTSCAPE AG Benjamin Ertl GIOUMPITEK MELETI SCHEDIASMOS YLOPOIISI KAI POLISI ERGON UBITECH PLIROFORIKIS ETAIREIA PERIORISMENIS EFTHYNIS Anastasios Zafeiropoulos, Eleni Fotopoulou, Thanos Xirofotos TUB TECHNISCHE UNIVERSITAET BERLIN Tran Quang Thanh, Stefan Covaci Page 2 of 203 Deliverable D1.1 Disclaimer The information, documentation and figures available in this deliverable are written by the ASTRID Consortium partners under EC co-financing (Call: H2020-DS-SC7-2017, Project ID: 786922) and do not necessarily reflect the view of the European Commission. The information in this document is provided “as is”, and no guarantee or warranty is given that the information is fit for any particular purpose. The reader uses the information at his/her sole risk and liability. -
Fall 2019 Vol
;login FALL 2019 VOL. 44, NO. 3 : & Outsourcing Everyday Jobs to Thousands of Cloud Functions Sadjad Fouladi, Francisco Romero, Dan Iter, Qian Li, Alex Ozdemir, Shuvo Chatterjee, Matei Zaharia, Christos Kozyrakis, and Keith Winstein & E3 —Easy Email Encryption John S. Koh, Steven M. Bellovin, and Jason Nieh & Interview with Periwinkle Doerfler Rik Farrow & Issues with Docker Storage Ali Anwar, Lukas Rupprecht, Dimitris Skourtis, and Vasily Tarasov Columns Reliability by Design Laura Nolan Type-Checking in Python Peter Norton Anomaly Detection Using Prometheus Dave Josephsen Querying SQL Using Golang Chris “Mac” McEniry Cloud vs On-Premises: Which Is Safer? Dan Geer and Wade Baker UPCOMING EVENTS SREcon19 Europe/Middle East/Africa HotEdge ’20: 3rd USENIX Workshop on Hot October 2–4, 2019, Dublin, Ireland Topics in Edge Computing www.usenix.org/srecon19emea April 30, 2020, Santa Clara, CA, USA LISA19 OpML ’20: 2020 USENIX Conference on October 28–30, 2019, Portland, OR, USA Operational Machine Learning www.usenix.org/lisa19 May 1, 2020, Santa Clara, CA, USA Enigma 2020 SREcon20 Asia/Pacific January 27–29, 2020, San Francisco, CA, USA June 15–17, 2020, Sydney, Australia www.usenix.org/enigma2020 2020 USENIX Annual Technical Conference FAST ’20: 18th USENIX Conference on File and July 15–17, 2020, Boston, MA, USA Storage Technologies Paper submissions due January 15, 2020 February 24–27, 2020, Santa Clara, CA, USA www.usenix.org/atc20 Sponsored by USENIX in cooperation with ACM SIGOPS SOUPS 2020: Sixteenth Symposium on Usable Co-located with -
UNIVERSITY of CALIFORNIA SAN DIEGO Understanding the Remote
UNIVERSITY OF CALIFORNIA SAN DIEGO Understanding the Remote Access Trojan malware ecosystem through the lens of the infamous DarkComet RAT A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science (Computer Engineering) by Brown Rhodes Farinholt Committee in charge: Professor Kirill Levchenko, Chair Professor Farinaz Koushanfar Professor Stefan Savage Professor Alex Snoeren Professor Geoff Voelker 2019 Copyright Brown Rhodes Farinholt, 2019 All rights reserved. The Dissertation of Brown Rhodes Farinholt is approved and it is acceptable in quality and form for publication on microfilm and electronically: Chair University of California San Diego 2019 iii DEDICATION To my parents, for raising me to chase my dreams. I owe this all to you. iv EPIGRAPH The first principle is that you must not fool yourself, and you are the easiest person to fool. Richard Feynman In writing, you must kill all your darlings. William Faulkner The truth may be puzzling. It may take some work to grapple with. It may be counterintuitive. It may contradict deeply held prejudices. It may not be consonant with what we desperately want to be true. But our preferences do not determine what’s true. We have a method, and that method helps us to reach not absolute truth, only asymptotic approaches to the truth never there, just closer and closer, always finding vast new oceans of undiscovered possibilities. Cleverly designed experiments are the key. Carl Sagan v TABLE OF CONTENTS Signature Page . iii Dedication . iv Epigraph . v Table of Contents . vi List of Figures . x List of Tables .