Tuesday, April 12, 2016

IST Startup Week

What does it take to move an idea into action as a company?  A number of IST graduates have succeeded in developing startups into viable companies.  IST Startup week is intended to share their stories, and to help students understand all of the work that goes into a successful startup.

Who knows, you could be the next Steve Jobs or Bill Gates.

More info at:

http://news.psu.edu/story/402158/2016/04/06/student-success/ist-startup-week-celebrates-five-years-penn-state


Tuesday, April 5, 2016

Seminar - Exploiting Memory Errors on the Data Plane

Seminar
 Tuesday, April 12, 10am 222 IST Building

By: Zhenkai Liang National University of Singapore

 “Exploiting Memory Errors on the Data Plane” As defense solutions against control-flow hijacking attacks gain wide deployment, controloriented exploits from memory errors become difficult. As an alternative, attacks targeting noncontrol data do not require diverting the application’s control flow during an attack. Although it is known that such data-oriented attacks can mount significant damage, no systematic methods to automatically construct them from memory errors have been developed. In this work, we study exploits of memory errors from the data angle. We have developed a new technique, called data-flow stitching, which systematically finds ways to join data flows in the program to generate data-oriented exploits. We have constructed new attacks on the data plane from known vulnerabilities. The constructed exploits can cause significant damage, such as disclosure of sensitive information (e.g., passwords and encryption keys) and escalation of privilege. We further study the expressiveness of such data-oriented exploits. By identifying data-oriented gadgets and gadget dispatchers, we demonstrate that data-oriented exploits can be used to construct Turing complete computations.

Thursday, March 31, 2016

Seminar by Patrick McDaniel

Monday, April 11, 12pm
222, IST Bldg.
By: Patrick McDaniel
Penn State University

“EIGHT YEARS OF MOBILE SMARTPHONE SECURITY”

The introduction of smart phones in 2008 forever changed the way users interact with data and computation. These platforms and the network and cloud services supporting them have led to a renaissance of mobile computing. At the same time, changes in the nature of personal computing heightens concerns about security and privacy.   Such concerns prompted an ongoing area of scientific study exploring smartphone and application security. Through these efforts, the technical community has become increasingly aware that applications can and often do work against the user's best interests and house new forms of malware.

This talk explores the genesis and evolution of academic research efforts in evaluating smartphone application security over the first eight years of its existence. A retrospective view of how the community's understanding of application security has changed over the years is provided, with a focus on the scientific questions asked and the methods used. We highlight a range of analysis techniques that extract software structures and behaviors from smartphone applications, and describe several studies that identified important security and privacy concerns. The talk concludes by considering the realities of current mobile apps and markets and identifies challenges in preventing misuse of smartphones.

Cyber war and terrorism symposium


Wednesday, March 30, 2016

Careers with USAID talk--April 6th

Please join us for the upcoming SIA Alumni Career Talk with Rachel Sayre (’11) on Wednesday, April 6th from 5:30 – 7:30 p.m. in 112 Katz. Sayre, the Senior Disaster Specialist at the US Agency for International Development (USAID), will discuss her career path since graduating from SIA. She’ll offer advice to those interested in careers in international development, and in US government agencies. She’s attentive to issues of gender in careers, and to the opportunities and challenges specific to women. Rachel’s talk is part of her visit to campus as a Penn State Alumni Achievement Award winner, recognizing her exemplary professional accomplishments before the age of 35.

Thursday, March 24, 2016

Sex Trafficking Seminar

Eight Years of Mobile Smartphone Security

Seminar
Monday, April 11, 12pm
333, IST Bldg.
By: Patrick McDaniel
Penn State University


“EIGHT YEARS OF MOBILE SMARTPHONE SECURITY”


The introduction of smart phones in 2008 forever changed the way users interact with data and computation. These platforms and the network and cloud services supporting them have led to a renaissance of mobile computing. At the same time, changes in the nature of personal computing heightens concerns about security and privacy.   Such concerns prompted an ongoing area of scientific study exploring smartphone and application security. Through these efforts, the technical community has become increasingly aware that applications can and often do work against the user's best interests and house new forms of malware.

This talk explores the genesis and evolution of academic research efforts in evaluating smartphone application security over the first eight years of its existence. A retrospective view of how the community's understanding of application security has changed over the years is provided, with a focus on the scientific questions asked and the methods used. We highlight a range of analysis techniques that extract software structures and behaviors from smartphone applications, and describe several studies that identified important security and privacy concerns. The talk concludes by considering the realities of current mobile apps and markets and identifies challenges in preventing misuse of smartphones.


BIO



Patrick McDaniel is a Distinguished Professor in the School of Electrical Engineering and Computer Science at the The Pennsylvania State University, co-director of the Systems and Internet Infrastructure Security Laboratory, and Fellow of IEEE and ACM. Dr. McDaniel is also the program manager and lead scientist for the Army Research Laboratory's Cyber-Security Collaborative Research Alliance. Patrick's research efforts focus on a wide range of topics in security technical public policy. Patrick was the editor-in-chief of the ACM Journal Transactions on Internet Technology (TOIT), and served as associate editor of the journals ACM Transactions on Information and System Security, IEEE Transactions on Computers, and IEEE Transactions on Software Engineering. Patrick was awarded the National Science Foundation CAREER Award and has chaired several top conferences in security including the IEEE Symposium on Security and Privacy and the USENIX Security Symposium. Prior being a Senior Research Staff Member at AT&T Labs/Research, Patrick was a software architect and project manager in the telecommunications industry.

Monday, March 21, 2016

Reverse Engineering Competition

Description Dakota State University (DSU) and the University of Nebraska­Kearney (UNK) is hosting a 5 day reverse engineering (RE) challenge.

The competition will start at 8am central on Monday, March 28th and end on Friday, April 1st at 10am central​.

The challenges will test a variety of skills necessary for any reverse engineer and all skill levels are welcome to apply. The challenges are arranged in categories, with increasingly more difficult challenges in each category. The initial challenges are designed to develop, or test, basic skills and progress to intermediate and then advanced challenges.

 If you take on the challenge you might have to reverse PDFs, .NET binaries, obfuscated PHP, Javascript, x86, x64,C++, PE, ELF, Mach­O, and so on. Registration Is Open!

Go to ​http://0xevilc0de.com/​to register

Registration & Questions Registration will open throughout the competition. If you have any questions please email joshua.stroschein@dsu.edu.

Contest Participants will receive instructions on where to download the challenges at the start of the competition. Instructions will be sent to the email address used to register. This event is sponsored in­part by DSU’s Center of Excellence.

This is a virtual event, you are not required to be present at DakotaCon in order to participate. Scoring Challenges will be assigned a point value based off of the difficulty. Total points awarded will be calculated using the point value from the challenge and the time of submission (for a correct answer). Point value decreases as the competition progresses. An overall score board will be maintained and accessible throughout the competition. Rules This is an individual competition, any indications of cheating will result in dismissal.

Friday, March 4, 2016

Hack the Pentagon Contest

The Department of Defense has announced a bounty contest called Hack the Pentagon.  After registration, participants will be directed to a number of targets for hacking.  The purpose is to uncover possible unknown vulnerabilities.

The contest is in April, and I will have further information soon.  However, until then here is a good article on the competition: