Q: BAH offers an Embedded Vulnerability Analysis (EVA) service focused on helping enterprises finding vulnerabilities in embedded and IoT devices. What do organizations need to understand about the nature of the embedded threat as more devices and things get Internet-enabled?
Chad Gray: Anything that is connected to the Internet has the potential to be part of a computer security incident, including IoT and embedded devices. Even devices that are seemingly benign can provide entry points into an organization's network or be used to acquire information that can lead to more damaging attacks once connected. While the types of processors, protocols, and operating systems used by connected devices can differ from those used on desktops, servers, and mobile phones, this is not a barrier to an attacker. Security researchers have repeatedly demonstrated their ability to reverse engineer the software and protocols used by IoT devices to find vulnerabilities. As more research is conducted and published in this area, the cost of entry for both new security researchers and malicious actors will continue to decrease.
Many companies building connected devices today are new to computer security. Formed to join the boom of the consumer IoT industry, these companies across the industrial, transportation and medical sectors, are adding connectivity to devices that previously had none. Often, they lack the experience that the desktop and server industries have had dealing with security vulnerabilities. As a result, these new companies have not developed the same best practices that are seen as standard in these more mature industries. Because of this, bugs are found in IoT embedded devices that are rarely seen in desktops and servers today. Additionally, in some cases, connectivity is being added to legacy devices that are still running out-dated operating systems and libraries. Some of these devices lack a secure and efficient means of deploying updates, making it very difficult to correct vulnerabilities, once discovered.
Q: Why are software reverse engineering and machine learning skills important capabilities to have, for organizations?
Gray: Organizations that operate in the cyber realm are often faced with the task of understanding the behavior and/or functionality of software written by a third party. These third parties can include software vendors and malware authors. It is typically the case that these third parties do not disclose their source code for a variety of reasons. In the case of malware, one of the objectives of the authors is to intentionally obfuscate the behavior and functionality to conceal the intent. In the case of software vendors, they may not wish to disclose source for proprietary reasons.
Regardless of the rationale for a third party not releasing the source code, it may be necessary for the organization to assess the software binary directly to determine if there are any vulnerabilities and/or verify that the binary will behave in an acceptable manner from a security perspective. Static analysis is an important phase of the binary assessment where the analyst will look through the binary to reverse engineer key components of the code. The process of reverse engineering key components has the potential to provide valuable insight into the inner workings of the binary. These insights can then ultimately be used to answer important security questions.
The rate of new technologies, and potential threats, is increasing at an exponential rate, as the demand for expert talent grows. Industry still lacks the ability to fully automate this type of reverse engineering/vulnerability discovery, but we are making progress. An example of this is using Low Level Virtual Machine compilers, with SAT/SMT solvers, to rapidly find vulnerabilities in Intermediate Representations of binaries (Credit to Josh Jones and the Dark Labs EVA engineers for their research and testing of this with ILLUVIUM). With this progress, we aren't far from applying machine learning to these techniques, for automated and rapid testing to discover vulnerability states.
Q: Booz Allen and the Kaizen team are back again this year with a Capture the Flag and Hacker Dojo workshop at Black Hat USA. Why is the CTF event so popular? What will participants learn or take away from the event?
Gray: CTFs offer a window into the cybersecurity field by letting participants face challenges that mirror real-world vulnerabilities. The competitive, gamified learning environment generates excitement and is a great way for information security enthusiasts to showcase their skills. The friendly competition motivates participants to work their way to the top of the leaderboard, and there's an immense satisfaction that comes from solving a difficult challenge and finally submitting the flag.
We've been hosting a half-day CTF at Black Hat since 2013, and our room has always been packed to capacity. In order to allow more people to experience the event, this year we're making it a full-day event, and allowing people to hack away at our challenges around the conference via Wi-Fi.
Our CTF consists of categories you'd expect to find in a jeopardy-style event, like networking, forensics, web, and reverse engineering and binary exploitation. There will be challenges for all skill levels – from beginners to ninjas.
We're bringing our Hacker Dojo training to Black Hat this year, in an effort to make our CTF more beginner friendly and encourage learning. Our staff will be giving short talks on a variety of tools and techniques which can be applied to solve our challenges. Write-ups will also be available after the event, so participants can learn how to solve any challenges they may have missed.
We see CTFs as a valuable tool for increasing employee morale, identifying talent across specific cybersecurity disciplines, and unexpectedly providing training that mirrors skills used every day by security practitioners. It's a tool that we've used internally to Booz Allen for several years now, and a service offering that we are now regularly providing to our clients in conjunction with our other advanced cyber training offerings.
Q: What exactly will participants learn from your "Crash Course in Data Science for Hackers" at Black Hat USA?
Gray: In our Crash Course in Data Science for Hackers (CCDS) students will learn techniques for getting value out of raw data. Unlike other data science training courses out there, our class is specifically geared towards challenges security professionals face, and we tailor all our exercises to make them relevant for people in the security industry.
In our course, students will walk through the entire data science process – learning how to ingest, explore, visualize, make predictions and derive value from raw data. One of the biggest challenges that data scientists face is data preparation, and study after study show that data scientists spend between 50% and 90% of their time preparing their data for further analysis. As an antidote to this problem, students in our classes will learn how to prepare their data in an extremely time-efficient manner using Python and advanced data analytics libraries such as Pandas, MatPlotLib, Bokeh, and others.
Students will learn how to apply various machine learning techniques to security data as well as how to evaluate the effectiveness and assess the accuracy of various models. While there is a lot of advanced math associated with machine learning, we present the concepts in an easy-to-understand manner, helping students understand how the algorithms work, as well as how to apply them. Finally, students will also be exposed to several cutting-edge big data technologies and will be able to apply the techniques they have learned to extremely large datasets.