Cyber Security in the life and work of a Computer Scientist
I talk about two speaks from the Ecoparty Security Conference. The first is in the Software Engineering area about the password recovery systems. The second is in the research area about the Stratosphere Project.
Scientist Christofer Fabi´ an Ch´ avez Carazas [email protected] San Agust´ ın National University October 18, 2018 Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 1 / 45
referent for the whole Latin America. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 2 / 45
more). Research and application Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 3 / 45
@tincho 508 Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 7 / 45
almost any modern system Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 8 / 45
almost any modern system There isn’t a good default solution. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 8 / 45
almost any modern system There isn’t a good default solution. Underrated complexity. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 8 / 45
almost any modern system There isn’t a good default solution. Underrated complexity. Vulnerabilities can have CRITICAL impact. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 8 / 45
PIN codes. No PIN bruteforce prevention on certain Facebook domain. Any account could be hijacked. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 11 / 45
“random” is it? Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 13 / 45
“random” is it? Its value depended on the timestamp the user requested the reset password. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 13 / 45
“random” is it? Its value depended on the timestamp the user requested the reset password. Password reset tokens were predictable Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 13 / 45
Hard to implement. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 22 / 45
Hard to implement. Hard to use for some users. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 22 / 45
to implement. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 23 / 45
to implement. Security depends on how the new password is transmitted. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 23 / 45
to implement. Security depends on how the new password is transmitted. Password generated must be secure. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 23 / 45
Erquiaga [email protected] @MaryJo E Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 27 / 45
Each state is assigned a letter. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 31 / 45
Their model produces a graph for each srcIP, where: Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 32 / 45
Their model produces a graph for each srcIP, where: Each node is a tuple DstIP, DstPort. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 32 / 45
Their model produces a graph for each srcIP, where: Each node is a tuple DstIP, DstPort. The sequence of flows from one node to another in the network are the edges. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 32 / 45
thicker it is. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 33 / 45
thicker it is. The more times a node is repeated, the bigger it is. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 33 / 45
thicker it is. The more times a node is repeated, the bigger it is. The more times a node loops with it self, the color gets darker. Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 33 / 45
Scientist Christofer Fabi´ an Ch´ avez Carazas [email protected] San Agust´ ın National University October 18, 2018 Slides: https://goo.gl/7dLWN3 Christofer Fabi´ an Ch´ avez Carazas [email protected] (San Agust´ ın National University) Ekoparty Security Conference October 18, 2018 45 / 45