BlueHat security finalists announced

Powered by SC Magazine
 

Three finalists eye defense against Return Oriented Programming attacks 

Microsoft has announced the three finalists of its BlueHat defensive security competition, each handpicked for their techniques to mitigate Return Oriented-Programming (ROP) exploits.

In a nutshell, ROP allows attackers to execute code in the presence of non executable memory segments and code signing. ROP attackers have control of the call stack to execute instructions ahead of the return instruction in subroutines of code. The execution of instructions from inside a program avoids defensive measures designed to stop execution from user-controlled memory.

One of the defensive measures will see a researcher win the top prize of US$250,000, with second prize US$50,000 and third place scores a subscription to Microsoft’s developer network (MSDN) services valued at about US$10,000.

Competitors were allowed to keep their intellectual property and Microsoft would receive free licence to use it.

Respected security researcher Jared DeMott told SC he was glad to have reached the finals.

His submission, called /ROP, uses a whitelist to check the integrity of return addresses.

“I targeted ROP because it is currently the most used technique to exploit fully compiled software,” DeMott said.

“/ROP was designed with the Windows platform in mind, so I’m hoping they will implement it.  Other operating systems could implement similar strategies if they desire.”

He didn’t keep tabs on how long it took to build the system, saying only that “it took a while”.

Columbia University PhD graduate and security researcher Vasillis Pappas submitted kBouncer, which would use common hardware features to detect and mitigate abnormal control transfers.

A third researcher, Ivan Fratric from Croatia developed ROPGuard that defines a set of checks used to detect functions used in ROP.

Microsoft received 20 entries for the competition between 3 August last year and 1 April. Each submission was weighted first on impact, then robustness and practicality and functionality.

Copyright © SC Magazine, Australia


BlueHat security finalists announced
 
 
 
Top Stories
Business-focused Windows 10 brings back the Start menu
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
Amazon forced to reboot EC2 to patch Xen bug
Rolling restarts over next week.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Constantly rushing to the printer to stop other people seeing your printouts?
Sep 24, 2014
Lexmark's latest family of small-business printers include a feature that lets you stop anyone ...
This 4G smartphone costs $219
Sep 3, 2014
It's possible to spend a lot less on a smartphone if you're prepared to go with a brand you ...
Looking for storage? Seagate has five new small business NAS devices
Aug 22, 2014
Seagate has announced a new portfolio of Networked Attached Storage (NAS) solutions specifically ...
Run a small business in western Sydney?
Aug 15, 2014
This event might be of interest if you're looking to meet other people with a similar interest ...
Buying a tablet? Microsoft's Surface Pro 3 goes on sale this month
Aug 8, 2014
Microsoft has announced its Surface Pro 3 will go on sale in Australia on 28 August from ...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1366

Vote