BlueHat security finalists announced

Powered by SC Magazine
 

Three finalists eye defense against Return Oriented Programming attacks 

Microsoft has announced the three finalists of its BlueHat defensive security competition, each handpicked for their techniques to mitigate Return Oriented-Programming (ROP) exploits.

In a nutshell, ROP allows attackers to execute code in the presence of non executable memory segments and code signing. ROP attackers have control of the call stack to execute instructions ahead of the return instruction in subroutines of code. The execution of instructions from inside a program avoids defensive measures designed to stop execution from user-controlled memory.

One of the defensive measures will see a researcher win the top prize of US$250,000, with second prize US$50,000 and third place scores a subscription to Microsoft’s developer network (MSDN) services valued at about US$10,000.

Competitors were allowed to keep their intellectual property and Microsoft would receive free licence to use it.

Respected security researcher Jared DeMott told SC he was glad to have reached the finals.

His submission, called /ROP, uses a whitelist to check the integrity of return addresses.

“I targeted ROP because it is currently the most used technique to exploit fully compiled software,” DeMott said.

“/ROP was designed with the Windows platform in mind, so I’m hoping they will implement it.  Other operating systems could implement similar strategies if they desire.”

He didn’t keep tabs on how long it took to build the system, saying only that “it took a while”.

Columbia University PhD graduate and security researcher Vasillis Pappas submitted kBouncer, which would use common hardware features to detect and mitigate abnormal control transfers.

A third researcher, Ivan Fratric from Croatia developed ROPGuard that defines a set of checks used to detect functions used in ROP.

Microsoft received 20 entries for the competition between 3 August last year and 1 April. Each submission was weighted first on impact, then robustness and practicality and functionality.

Copyright © SC Magazine, Australia


BlueHat security finalists announced
 
 
 
Top Stories
Content, cost & constant innovation: How Foxtel plans to take on Netflix
Nell Payne inhabits the “brave new world of blue strings and networking”. Just don't ask her to put a TV screen on your microwave.
 
Sending in the drones
Margins are getting tighter in the industrial services industry, so Transfield Services' Stephen Phillips looks offshore - and to the skies - for the solutions he needs to keep pace.
 
Westpac fires starting pistol on core banking upgrade
St George readies itself for move to Celeriti.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Microsoft launches Office for Android preview
May 22, 2015
Microsoft has launched a preview of Office for Android smartphones. Pre-release versions of ...
Microsoft is working on an iOS email chat feature called Flow
May 22, 2015
Microsoft is working on a new chat app, but at the moment we know more about what we DON'T know, ...
Windows 10 free upgrade: Microsoft details who gets what
May 22, 2015
Microsoft was meant to be streamlining its OS with Windows 10, so why is upgrading so confusing? ...
Windows 10 has an edition to suit everyone's needs
May 15, 2015
Microsoft unveils a mind-melting six editions of Windows 10 ahead of its Winter 2015 launch. ...
Firefox 38 FINAL released, debuts new tab-based preferences
May 13, 2015
Mozilla has unveiled the latest version of Firefox 38.0 FINAL for desktop, with Firefox for ...
Latest Comments
Polls
Should Optus make a bid for iiNet?

   |   View results
Yes
  44%
 
No
  56%
TOTAL VOTES: 523

Vote