SYSSEC: Aktuelle Meldungen https://www.syssec.wiwi.uni-due.de/ Aktuelle Meldungen für: Professur für Informatik, Universität Duisburg-Essen de SYSSEC: Aktuelle Meldungen https://www.syssec.wiwi.uni-due.de/ https://www.syssec.wiwi.uni-due.de/ Aktuelle Meldungen für: Professur für Informatik, Universität Duisburg-Essen TYPO3 - get.content.right http://blogs.law.harvard.edu/tech/rss Wed, 20 Mar 2024 16:44:01 +0100 New paluno Directorate Elected https://www.syssec.wiwi.uni-due.de//en/news/singleview/new-paluno-directorate-elected-23904/?no_cache=1 In yesterday's meeting of the paluno board, Prof. Dr. Lucas Davi was appointed as the new director. of the institute. Prof. Dr. Amr Rizk and Prof. Dr. Gregor Schiele have been appointed as vice directors. Professor Davi, head of the System Security Group, succeeds Professor Pohl, who successfully led the institute since its establishment in 2010. The deputy role will be assumed by Professor Rizk, head of the Communications Networks and Systems Group, and Professor Schiele, head of the Intelligent Embedded Systens Group.

These decisions were made during a two-day board retreat. The entire board thanks Professor Pohl for his longstanding commitment and leadership at paluno. At the same time, the new directorate is wished much success  for the continued success of the institute.

About paluno

paluno - the Ruhr Institute for Software Technology is one of the largest research institutes for software engineering in Germany. With 12 professors and over 100 researchers, paluno conducts excellent applied and fundamental research. paluno investigates and tests principles, methods, and tools for the development of software-based technologies. As significant drivers of digitalization, these technologies are changing our world - the way we work, learn, conduct business, produce, communicate, and travel. The researchers at paluno are committed to ensuring that digitalization succeeds with software-based systems and that the new technologies serve people, are user-friendly, and secure..

]]>
Tue, 06 Feb 2024 21:57:23 +0100
CSAW'23: Two finalist papers https://www.syssec.wiwi.uni-due.de//en/news/singleview/csaw23-two-finalist-papers-23635/?no_cache=1 Two papers of our chair advanced to the final round of the NYU Tandon College of Engineering's annual Cyber Security Awareness Week Applied Research Competition. The two works were admitted to the selection of ten finalists: RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and... Two papers of our chair advanced to the final round of the NYU Tandon College of Engineering's annual Cyber Security Awareness Week Applied Research Competition.
The two works were admitted to the selection of ten finalists:

RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64
Tobias Cloosters, David Paaßen, Jianqiang Wang, Oussama Draissi, Patrick Jauernig, Emmanuel Stapf, Lucas Davi, Ahmad-Reza Sadeghi

ClepsydraCache – Preventing Cache Attacks with Time-Based Evictions
Jan Philipp Thoma, Christian Niesler, Dominic Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu

]]>
Mon, 18 Sep 2023 10:53:00 +0200
New publication in ACM CCS: FuzzDelSol uncovers security vulnerabilities in Solana programs. https://www.syssec.wiwi.uni-due.de//en/news/singleview/new-publication-in-acm-ccs-fuzzdelsol-uncovers-security-vulnerabilities-in-solana-programs-23634/?no_cache=1 In the upcoming November, we will present our research paper Fuzz on the Beach: Fuzzing Solana Smart Contracts at the prestigious ACM CCS conference. This work introduces FuzzDelSol, the first fuzzing architecture for Solana Smart Contracts that accurately models platform and contract interactions.... In the upcoming November, we will present our research paper Fuzz on the Beach: Fuzzing Solana Smart Contracts at the prestigious ACM CCS conference. This work introduces FuzzDelSol, the first fuzzing architecture for Solana Smart Contracts that accurately models platform and contract interactions. Since the source code for most Solana Smart Contracts is not available, FuzzDelSol operates directly with binary code, utilizing carefully extracted information and Bug Oracles. The significance of this research increases as Solana is increasingly being favored as a platform for developing decentralized applications such as NFT marketplaces.

This research was conducted together with the Paluno Software Systems Engineering group, led by Prof. Klaus Pohl and Prof. Ghassan Karame, at the Chair for Information Security at Ruhr-University Bochum.

Jens-Rene Giesen presented this work at the ACM CCS conference in November 2023.

]]>
News Studies & Teaching Research Economy IBES ICB WIWI Organisation Internship offers Job Offers oussama.Draissi@stud.uni-due.de Sat, 02 Sep 2023 15:52:00 +0200
New Security Solution for Smart Speakers https://www.syssec.wiwi.uni-due.de//en/news/singleview/new-security-solution-for-smart-speakers-23249/?no_cache=1 Smart speakers like Amazon Alexa can be controlled by users via voice commands and are very popular. However, these devices have to listen all the time via microphone whether they are being addressed. And how can you be sure that this device is really just doing what it is supposed to, and has not... Smart speakers like Amazon Alexa can be controlled by users via voice commands and are very popular. However, these devices have to listen all the time via microphone whether they are being addressed. And how can you be sure that this device is really just doing what it is supposed to, and has not perhaps been hacked and is spying on the user?

One technique to determine the integrity of another device is "remote attestation". Remote attestation techniques allow one device to verify the state of another device. The Working Group for Systems Security at the University of Duisburg-Essen, together with researchers at the Technical University of Darmstadt, within the DFG Collaborative Research Center CROSSING developed a method for users to attest smart speakers called "SCAtt-man". Using their smartphones, users determine if the software of smart speakers is unchanged or if viruses or other malware have been installed. In a user study, the prototype was found to have high usability. In addition, the users indicated that this process increases their confidence in smart speakers and that they would use it if this process were integrated into their smart speakers.

This project will be presented at the ACM Conference on Data and Application Security and Privacy (CODASPY) in Charlotte, NC in the United States in April.

]]>
Thu, 02 Mar 2023 16:13:14 +0100
Presentation at RAID 2022 https://www.syssec.wiwi.uni-due.de//en/news/singleview/presentation-at-raid-2022-23079/?no_cache=1 The 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022) was held in Limassol, Cyprus on 26-28 October. Tobias Cloosters presented RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64. This work analyzes the constraint gadget space for... Research in Attacks, Intrusions and Defenses (RAID 2022) was held in Limassol, Cyprus on 26-28 October.

Tobias Cloosters presented RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64. This work analyzes the constraint gadget space for return-oriented programming on RISC-V and ARM64 and presents a tool to generate ROP chains from the limited and complex gadget space.

]]>
tobias.cloosters@uni-due.de Thu, 03 Nov 2022 09:00:00 +0100
Talks and Tutorials at IEEE SecDev https://www.syssec.wiwi.uni-due.de//en/news/singleview/talks-and-tutorials-at-ieee-secdev-23066/?no_cache=1 Researchers of the chair presented their work on secure video streaming and a tutorial on smart contracts at the IEEE SecDev conference in Atlanta. Jens-Rene explained in his three-hour tutorial at the IEEE Secure Development Conference (SecDev) which vulnerabilities in smart contracts exist, how to find, and how to prevent them.
Tobias Cloosters and Sebastian Surminski presented their work on runtime attestation for SGX enclaves. Using a video player for video streaming they showed how to enhance applications in SGX enclaves with control flow attestation to prevent runtime attacks.

]]>
Sebastian.Surminski@paluno.uni-due.de Thu, 27 Oct 2022 15:51:06 +0200
ERC Starting Grant https://www.syssec.wiwi.uni-due.de//en/news/singleview/erc-starting-grant-22897/?no_cache=1 Prof. Lucas Davi receives an ERC Starting Grant over 1.5 million euros. The project will develop a solution that holistically protects smart contracts from various attacks. Smart contracts are computer programs that can be used to store the terms of a contract into a blockchain, where they can be executed automatically. The promising technology is being used in cryptocurrencies and is waiting in the wings in many industries: real estate transactions, licensing, checking supply chains or controlling production processes – many transactions and processes that today have to be done by hand could be automated and significantly accelerated in the future with programmed contracts.

However, smart contracts became an appealing attack target. The programs are permanently online. As soon as a vulnerability is discovered somewhere in the code, it can easily be exploited. In recent times, there have been several thefts of cryptocurrency, because smart contracts had security vulnerabilities that were not closed quickly enough. 

With the funds from the ERC Grant, we plan to develop the first solution for the protection of smart contracts that covers all development and deployment phases of a blockchain. A key element will be the first compiler for smart contracts that detects and automatically fixes programming errors already in the development phase. Attacks on ongoing transactions will be detected by means of a new monitoring tool and averted before they cause major damage. In addition, to assess the security of existing contracts and better understand the reasons for cyberattacks, we will develop novel forensic analysis techniques. 

ERC Starting Grants are funding instruments of the European Research Council (ERC), which are intended to support young scientists in making the career leap to independent top researchers. At the time of application, a maximum of seven years may have elapsed since the award of the doctoral degree. The sole evaluation criterion is the scientific excellence of the researcher and the proposed project. Further information: https://erc.europa.eu/funding/starting-grants

 

]]>
Thu, 22 Sep 2022 10:21:32 +0200
Security Vulnerabilities in Fingerprint Sensors and Crypto Wallets https://www.syssec.wiwi.uni-due.de//en/news/singleview/security-vulnerabilities-in-fingerprint-sensors-and-crypto-wallets-22801/?no_cache=1 Our team and colleagues from the DFG Cluster of Excellence CASA have developed a new technique that, for the first time, enables fuzz testing of protected memory areas in modern processors. Our method revealed many vulnerabilities in security-critical software. Intel’s “Software Guard Extension” (SGX) is a widely used technology to protect sensitive data from misuse. It helps developers in shielding a certain memory area from the rest of a computer. For example, a password manager can be executed safely in such an enclave, even if the rest of the system is corrupted by malware.

However, it is quite common that enclave software suffers from vulnerabilities. Already in 2020, our team discovered and published several vulnerabilities of SGX enclaves (Article: Danger to sensitive Data). Now, together with partners form the Cluster of Excellence CASA, we achieved another breakthrough in the analysis technique: our latest development enables fuzz testing of enclaves, which is much more effective than the previously used symbolic execution technique. The idea behind fuzz testing is to feed a large number of inputs into a program in order to gain insights into the structure of the code. “As enclaves are meant to be non-introspectable, fuzzing cannot easily be applied to them,” as Tobias Clooster (research assistant and PhD student in our group) explains the challenge. “Moreover, fuzzing requires nested data structures, which we dynamically reconstruct from the enclave code.” His research partner Johannes Willbold from the research college SecHuman from the Ruhr-Universität Bochum adds: “This way, the shielded regions can be analyzed without accessing the source code.”

Thanks to modern fuzzing technology, we were able to detect many previously unknown security problems. All tested fingerprint drivers as well as wallets for storing cryptocurrency were affected. Hackers could exploit these vulnerabilities to read biometric data or steal the entire balance of the stored cryptocurrency. All companies were informed; the SKALE Network even showed its appreciation with a “bug bounty” of their cryptocurrency. Three vulnerabilities have been added to the publicly available CVE directory**.

Weitere Infos

CVE stands for Common Vulnerabilities and Exposures and lists major, publicly known vulnerabilities. The vulnerabilities referenced have the CVE entriesCVE-2021-3675 (Synaptics Fingerprint Driver), CVE-2021-36218 (SKALE sgxwallet ) and CVE-2021-36219 (SKALE sgxwallet)

Publication: Cloosters, Tobias; Willbold, Johannes; Holz, Thorsten; Davi, Lucas Vincenzo: SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing. In: Proc. of 31st USENIX Security Symposium. 2022. Pre-Print: SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing

TEE project webpage: Analysis of TEE Software 

DFG Cluster of Excellence CASACASA Homepage

]]>
Thu, 14 Jul 2022 14:25:23 +0200
New Research Assistant https://www.syssec.wiwi.uni-due.de//en/news/singleview/new-research-assistant-23068/?no_cache=1 In October Oussama Draissi joined the group of Prof. Lucas Davi. Welcome, Oussama! Sebastian.Surminski@paluno.uni-due.de Fri, 01 Jul 2022 16:07:00 +0200 CRC Accepted for 3rd Round: Security for Next-Generation Computing Platforms https://www.syssec.wiwi.uni-due.de//en/news/singleview/crc-accepted-for-3rd-round-security-for-next-generation-computing-platforms-22759/?no_cache=1 Good news for our paluno research group on secure software systems. The German Research foundation DFG accepted the continuation of the collaborative research center CROSSING for another four years. UDE-Professor Lucas Davi is principal investigator of two projects on attesting complex software... About CROSSING

CROSSING is interdisciplinary in nature: More than 65 researchers from the fields of cryptography, system security, quantum physics, information theory, number theory, high-performance computing, and software engineering work together. In CROSSING, TU Darmstadt cooperates with Universität Duisburg-Essen, Universität Paderborn, Universität Regensburg, and the Fraunhofer-Institut for Secure Information Technology (SIT) in Darmstadt.

More on CROSSING can be found here: Research of the CRC CROSSING

 

]]>
Thu, 23 Jun 2022 16:20:49 +0200