home.social

#usenix β€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #usenix, aggregated by home.social.

  1. Looks like I'll be attending The Last USENIX ATC (and OSDI)

    Boston, July 7–9

    #usenix #usenixatc #usenixatc25 #osdi #osdi25

  2. βœ… Upcoming Fall USENIX Security

    Terrapin Attack: Breaking SSH Channel

    Tldr:

    🀘SSH ➑️ TCP ➑️ Unauthenticated (MiTM-able) Control Messages Hell.

    πŸ‘‰Put your SSH Session into an Stateless UDP Tunnel (eg. WireGuard) or use mosh.

    (Unauthenticated) TCP is a security mess from the 1980s and leads to false integrity assumptions (see China Great FireWall RST/ACKs) and has to finally die. Now.

    🀘Cryptographic agility will - sooner or later - ALWAYS translate direct into (downgrade) attack hell. Later is now.

    Generate SSH Ed25519 keys.
    πŸ‘‰ ssh-keygen -t ed25519

    Lock (Client & Server) your OpenSSH Cipher & Kex config.

    πŸ‘‰ Cipher: ChaCha20-Poly1305
    πŸ‘‰ KeyExchage: curve25519-sha256

    usenix.org/system/files/sec24f

    #ssh #openssh #security #downgrade #cipher #kex #terrapin #usenix

  3. Brown Secure Systems Lab (gitlab.com/brown-ssl/) had a strong representation @usenixassociation sponsored events this year! Neophytos Christou presented IvySyn at USENIX Security Symposium (SEC) '23, while Di Jin talked about EPF at USENIX Annual Technical Conference (ATC) '23 earlier in July!

    IvySyn fuzzes Deep Learning (DL) frameworks (TensorFlow, PyTorch) for memory-safety bugs and automatically synthesizes Python code snippets for triggering the respective vulnerabilities | usenix.org/.../usenixse.../pre | gitlab.com/brown-ssl/ivysyn

    EPF (ab)uses the (e)BPF interpreter for bypassing various kernel hardening mechanisms in Linux -- we also introduce a set of lightweight defenses against EPF-style attacks | usenix.org/conference/atc23/pr | gitlab.com/brown-ssl/epf

    #brownssl #ivysyn #epf #usenix #atc23 #usesec23

  4. HEL-MUC-BOS for #USENIX #NSDI. There until early Thursday morning, anyone want to meet up for food?

  5. #AI based #password candidate generation is super interesting to me, but so far the best generators (CMU's #neuralnetwork based generator presented at #USENIX 16, and Dr Matt Weir's #PCFG generator) are still about on par with existing #Markov implementations and rule-based #cracking.

    #PassGAN, on the other hand, falls well short of existing password cracking techniques and candidate generators.

    While I hold out a lot of hope for future AI-powered password cracking, it ain't here yet, and it definitely isn't PassGAN.

    arstechnica.com/information-te

  6. A few thoughts on this year's USENIX Enigma conference in Santa Clara - about the usability of privacy applications, privacy camps, and tech over-regulation.

    tabeawilke.com/latest/enigma-2

    #privacy #privacybydesign #enigma #usenix #tech #usercentereddesign #security #safetysecurity

  7. omg this talk from Brendan Gregg is amazing and full of other gems including the Blame-Someone-Else Anti-Method 🀣

    πŸŽ₯ youtu.be/abLan0aXJkw?t=1170

    #TechTalks #PerformanceAnalysis #USENIX

  8. The deadline for the USENIX ATC '23 Call for Papers is a couple months away! Abstract registrations are due on Thurs., Jan. 5, with complete paper submissions due the following Thurs., Jan. 12. View the CFP and make plans to submit your work: bit.ly/usenixatc23cfp #atc23 #usenix