DEF CON 26 資訊安全年會」報 告

38
行政院及所屬各機關出國報告 (出國類別:其他-國際會議) 參加「DEF CON 26 資訊安全年會」報 服務機關:財政部財政資訊中心 姓名職稱:陳俊呈設計師 派赴國家:美國 出國期間:107 年 08 月 08 日至 107 年 08 月 14 日 報告日期:107 年 10 月 30 日

Transcript of DEF CON 26 資訊安全年會」報 告





107 08 08 107 08 14
107 10 30
1

(107) 26 DEF CON (DEF CON 26) 8 9 12
CAESAR’S PALACE FLAMINGO 4


PCAP
(CONTESTS) CAPTURE THE FLAG(CTF)
VILLAGES Recon VillageData
Duplication VillageSocial Engineering Village Lockpicking VillageSoldering Skills
VillageWireless VillageHardware Hacking Village Lockpicking
Village DEF CON

2

VILLAGES ......................................................................................... 8
() RECON VILLAGE ..................................................................................... 9
() LOCKPICKING VILLAGE ...................................................................... 10
() AI VILLAGE ............................................................................................ 11
() IOT VILLAGE .......................................................................................... 12
(PRESENTIONS) .............................................................. 15
() Hacking PLCs and Causing Havoc on Critical Infrastructures .................... 15
() Looking for the perfect signature: an automatic YARA rules generation
algorithm in the AI-era .......................................................................................... 18
() All your family secrets belong to us - Worrisome security issues in tracker
apps 19
() Your Voice is My Passport ........................................................................ 22
() Asura: A huge PCAP file analyzer for anomaly packets detection using
massive multithreading .......................................................................................... 23


(Smart Contract)
5
(Badge)
DEF CON Black Hat
Black Hat DEF CON Black Hat
DEF CON
DEF CON

6
4 (DEF
CON 101Track 1Track 2Track 3) CAESAR’S PALACE CONFERENCE CENTER
FLAMINGO EXECUTIVE CONFERENCE CENTER
DEF CON
(CONTESTS)
25 Las Vegas DEF CON
26
10 6 4 Tracks


7

AI VILLAGE JEOPARDYBADGELIFE CONTESTWIRELESS CTFOSINT
CTF… CAPTURE THE FLAG( CTF)

DEF CON CTF (DEF
CON )
DEF CON 26 DEF CON
(DEF CON 26) CTF 25 (107) 8 9 12
CTF

Channel)
DEF CON CTF HITCON BFS
HITCON 103 5 CTF BFS
Bamboofox Balsn DoubleSigma Kerkeryuan
22 2 DEF CON 26 CTF
8
(107) 2015 CTF DEFKOROOT
PPP 2 HITCON 3
BFS 12
4CAPTURE THE FLAG(CTF)
VILLAGES
CON
Villages
Intelligence)/Recon(reconnaissance)Recon Village
CTF) Reconnaissance
(OSINT)
(rainbow table)( Hash
Hash) infocon.org(https://infocon.org/) DEF CON

() SOCIAL ENGINEERING VILLAGE
Village

Paul Ekman ) laser
5SOCIAL ENGINEERING VILLAGE RECON VILLAGE HACKATHON
() SOLDERING SKILLS VILLAGE
Badge
Village

11
Village


() AI VILLAGE
AI VILLAGE
(adversarial example)
API local
12
(transfer) API(adversarial example)
ImageNetAlexNet


() IOT VILLAGE
IOT Village
workshop IOT IOT
VILLAGE IOT CTF
(IOT) IOT

13
() BLUE TEAM VILLAGE
BLUE TEAM VILLAGE DEF CON
(Red Team)
(Blue Team)
DDoS IPS/IDSWAFAPT SOC
/
14

15
(Tracks)

Infrastructures
PLCs
patch
(closed source) OpenPLC OpenPLC
IEC 61131-3 PLC
OpenPLC SCADA
12OpenPLC
16
MODBUS serial networks

FRAME Function Code
13MODBUS FRAME
14MODBUS FUNCTIONCODES
14 MODBUS Function Codes 13 MODBUS FRAME TCP
Function Codes
17
15MODBUS FRAME TCP
16 MODBUS
18
() Looking for the perfect signature: an automatic YARA rules
generation algorithm in the AI-era
Ruo Ando YARA
Pattern Signature Pattern
Signature
Signature Syntactic signatures Semantic signatures Syntactic signatures
Semantic signatures
Android
Signature
Signature
0-day

() All your family secrets belong to us - Worrisome security
issues in tracker apps
App Google Play Store App
App

API

App
App ObserverTracking Provider Monitored Person

21
20App ObserverTracking Provider Monitored Person
App (Man-in-the-Middle Attack)



(deep neural network)()
Siri Microsoft Speaker Recognition API (Proof of Concept)
Tacotron Wavenet
(Adversarial Attacks)
() Asura: A huge PCAP file analyzer for anomaly packets
detection using massive multithreading

PCAP
Asura
PCAP Asura 7000 ( 18GB) 750
Asura 7000 1000-5000
350-450
24
PCAP
PCAP


POS


IOT
IOT





28
Rowan Phipps
101 Track
Pwning “the toughest target”: the exploit chain of winning the largest bug bounty in the
history of ASR program
Alexandre Borges
101 Track
Seamus Burke
101 Track
Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult
Si & Agent X
(ab)using binaries
Track One
can't hide. Reverse
seconds: Falsifying a
medical patient's vitals
at home
Lane Broadbent
Track One
at home
away
Small Profit
Vincent Tan
Track Three
dreams will come true: