Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Overview
  • Workshop Organizers
  • Registration Information
  • Registration Discounts
  • At a Glance
  • Calendar
  • Workshop Program
  • Birds-of-a-Feather Sessions
  • Co-located Workshops
  • Sponsorship
  • Activities
  • Hotel and Travel Information
  • Students
  • Questions
  • Help Promote!
  • For Participants
  • Call for Papers
  • Past Workshops

sponsors

Bronze Sponsor

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Workshop Program
Tweet

connect with us

https://twitter.com/usenixsecurity
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Workshop Program

All sessions will be held in Regency C unless otherwise noted.

The full papers published by USENIX for the workshop are available as a download or individually below to workshop registrants immediately and to everyone beginning August 12, 2013. Everyone can view the abstracts immediately. Copyright to the individual works is retained by the author[s].

Download Paper Archives

Attendee Files 
LEET '13 Papers ZIP

 

8:30 a.m.–9:00 a.m. Monday

Continental Breakfast

Hall of Battles

9:00 a.m.–9:05 a.m. Monday

Opening Remarks

Program Chair: Vern Paxson, University of California, Berkeley, and International Computer Science Institute

9:05 a.m.–10:20 a.m. Monday

Economics/Business

Attacker Economics for Internet-scale Vulnerability Risk Assessment

Luca Allodi, University of Trento

Vulnerability risk assessment is a crucial process in security management, and the CVSS score is the standard-de-facto risk metric for software vulnerabilities. In this manuscript I show that current risk assessment methodologies do not fit real "in the wild" attack data. I also present my three-steps plan to identify an Internet-scale risk assessment methodology that accounts for attacker economics and opportunities. Eventually, I want to provide answers like the following: "If we deploy this security measure, the fraction of our users affected by this type of cyber attacks will be less than X%".

Available Media

There Are No Free iPads: An Analysis of Survey Scams as a Business

Jason W. Clark and Damon McCoy, George Mason University

Spam is a profit-fueled enterprise and cyber-criminals are focusing more of their efforts at growing Online Social Networks, such as Facebook. One of the common methods of monetizing Online Social Network spam is to entice users to click on links promising free gift cards and iPads. However, these links actually lead to ad networks that bombard users with surveys in an attempt to collect personal and contact information that they will sell to other marketers. To date, we lack a solid understanding of this enterprise’s full-structure. In this paper, we examined the survey scam process to determine the affiliates/sponsors that are behind this lucrative scam by performing an analysis of five months of Facebook spam data. We provide the first empirical study and analysis of survey scams and demonstrate how to determine which ad networks are sponsoring this spam.

Available Media

Invited Talk: Bitcoin in Cybercrime

Stefan Savage, University of California, San Diego

Available Media
  • Read more about Invited Talk: Bitcoin in Cybercrime
10:20 a.m.–10:50 a.m. Monday

Break with Refreshments

Hall of Battles

10:50 a.m.–12:30 p.m. Monday

Botnet Analysis and Evolution

FuncTracker: Discovering Shared Code to Aid Malware Forensics

Charles LeDoux, Arun Lakhotia, Craig Miles, and Vivek Notani, University of Louisiana at Lafayette; Avi Pfeffer, Charles River Analytics

Malware code has forensic value, as evident from recent studies drawing relationships between creators of Duqu and Stuxnet through similarity of their code. We present FuncTracker, a system developed on top of Palantir, to discover, visualize, and explore relationships between malware code, with the intent of drawing connections over very large corpi of malware – millions of binaries consisting of terabytes of data. To address such scale we forego the classic data-mining methods requiring pairwise comparison of feature vectors, and instead represent a malware as a set of hashes over carefully selected features. To ensure that a hash match implies a strong match we represent individual functions using hashes of semantic features, in lieu of syntact features commonly used in the literature. A graph representing a collection of malware is formed by function hashes representing nodes, making it possible to explore the collection using classic graph operations supported by Palantir. By annotating the nodes with additional information, such as the location and time where the malware was discovered, one can use the relationship within malware to make connections between otherwise unrelated clues.

Available Media

Presentation: Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets

Cui Xiang and Zhai Lidong, Chinese Academy of Sciences; Zhang Yuxiang, Xi'an Research Institute of Hi-Tech Hongqing Town; Guo Yunchuan and Liu Chaoge, Chinese Academy of Sciences

Available Media

SinkMiner: Mining Botnet Sinkholes for Fun and Profit

Babak Rahbarinia, University of Georgia; Roberto Perdisci, University of Georgia and Georgia Institute of Technology; Manos Antonakakis, Damballa, Inc.; David Dagon, Georgia Institute of Technology

Botnets continue to pose a significant threat to Internet security, and their detection remains a focus of academic and industry research. Some of the most successful botnet measurement and remediation efforts rely heavily on sinkholing the botnet's command and control (C&C) domains. Essentially, sinkholing consists of re-writing the DNS resource records of C&C domains to point to one or more sinkhole IP addresses, thus directing victim C&C communications to the sinkhole operator (e.g., law enforcement).

Sinkholes are typically managed in collaboration with domain registrars and/or registries, and the owner of the network range where the botnet C&C is sinkholed. Registrars often play a critical role in remediating abusive domains (e.g., by invoking rapid take-down terms commonly found in domain registration contracts, such as the "Uniform Rapid Suspension System"). Collaboration with the sinkhole network range owners is needed to endure the possible IP reputation damage to their IP space, since sinkholes may appear as real C&Cs to others.

While some sinkhole IPs are publicly known or can be easily discovered (see Section 2.1), most are jealously kept as trade secrets by their operators, to protect proprietary black lists of remediated domains. Therefore, third-party researchers are often unable to distinguish between malicious C&C sites and remediated domains pointed to sinkholes.

In some cases, this stove-piping of sinkhole information can cause "friendly fire", whereby security operators or law enforcement may take down an already sinkholed C&C. This results in disrupting remediation effort, and may in some cases bring more harm to the botnet victims (whose infected clients may turn to secondary or backup C&C domains not being remediated). It is therefore useful to build technologies capable of identifying whether or not a C&C domain and/or IP are part of a sinkholing effort.

Available Media

Invited Talk: Testing, Testing, 1 2 3: The History and Challenges of Testing Anti-Malware Software

Mark Kennedy, Anti-Malware Testing Standards Organization and Symantec Corporation

Many people believe that testing Anti-Malware is very straight forward—and they are right, if you want to test it poorly. Where do you get your samples? Do you use real machines or virtual ones? Do you just scan the samples or do you allow them to execute them? Is it ok to create your own samples?

These are just some of the difficult questions involved in proper testing. This talk will cover the evolution of Anti-Malware testing and the very complex issues involved in doing it right.

Many people believe that testing Anti-Malware is very straight forward—and they are right, if you want to test it poorly. Where do you get your samples? Do you use real machines or virtual ones? Do you just scan the samples or do you allow them to execute them? Is it ok to create your own samples?

These are just some of the difficult questions involved in proper testing. This talk will cover the evolution of Anti-Malware testing and the very complex issues involved in doing it right.

Available Media
  • Read more about Invited Talk: Testing, Testing, 1 2 3: The History and Challenges of Testing Anti-Malware Software
12:30 p.m.–2:00 p.m. Monday

Workshop Luncheon

Regency A

2:00 p.m.–3:15 p.m. Monday

The Untrustworthy Web

The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security

Chuan Yue, University of Colorado, Colorado Springs

One significant trend in online user authentication is using Web Single Sign-On (SSO) systems. Especially, open Web SSO standards such as OpenID and OAuth are rapidly gaining adoption on the Web, and they enable over one billion user accounts. However, the large-scale threat from phishing attacks to real-world Web SSO systems has been significantly underestimated and insufficiently analyzed. In this paper, we (1) pinpoint what are really unique in Web SSO phishing, (2) provide one example to illustrate how the identity providers (IdPs) of Web SSO systems can be spoofed with ease and precision, (3) present a preliminary user study to demonstrate the high effectiveness (20 out of 28, or 71% of participants became "victims") of Web SSO phishing attacks, and (4) call for a collective effort to effectively defend against the insidiousWeb SSO phishing attacks.

Available Media

Image Matching for Branding Phishing Kit Images

Chengcui Zhang, Rajan Kumar Kharel, Song Gao, and Jason Britt, University of Alabama at Birmingham

A phishing website usually selects a particular target (e.g., a bank), and incorporates one or more images that are similar to a targeted brand whether the image is located on the same domain as the phish or a non-local domain. One common method of distributing phishing websites is to use a "phishing kit" or kit, which is a compressed file folder containing all files and directory structures necessary to create a phishing website. A kit is often used repeatedly by a single criminal or criminal group and is a preferred way of creating phishing websites. The kit contains any email address receiving the phished credentials, which can be important during investigations. When identifying a phishing kit's brand, it cannot always be assumed that the phishing kit has the same brand as the phishing website where it was found. Multiple phishing websites can be setup on the same domain and unused kits can be located on active phishing domains. A kit's brand is useful when alerting the organization being targeted or allowing brand specific investigations. Even though the identification can be accomplished manually it is time consuming and unfeasible for the UAB Kit Data Mine, given its size. Phishing kits often incorporate images that are similar to the targeted brand. Finding these brand relevant images and labeling them may lead to automated methods to brand phishing kits. Simple hash matching techniques are limited because it is easy to alter an image’s hash and not its meaning. More robust automated methods are needed to help reduce or eliminate manual effort. The rest of this paper explores the ability of image matching techniques to correctly identify image files associated with a brand. Four image-matching algorithms GCH, LCH, LCH+, and LCH++ are explored.

Available Media

A View to a Kill: WebView Exploitation

Matthias Neugschwandtner, Martina Lindorfer, and Christian Platzer, Vienna University of Technology

WebView is a technique to mingle web and native applications for mobile devices. The fact that its main incentive requires making data stored on, as well as the functionality of mobile devices, directly accessible to active web content, is not without consequences to security.

In this paper, we present a threat scenario that targets WebView apps and show its practical applicability in a case study of selected apps. We further show results of our examination of over 287,000 apps in regard to WebView-related vulnerabilities.

Available Media

 

3:15 p.m.–3:45 p.m. Monday

Break with Refreshments

Hall of Battles

3:45 p.m.–5:00 p.m. Monday

Modern Denial-of-Service/Threats

Presentation: Recent Advances in DDoS Malware

Jason Jones, Arbor Networks

Available Media

Understanding the Emerging Threat of DDoS-as-a-Service

Mohammad Karami and Damon McCoy, George Mason University

A denial-of-service (DoS) attack refers to an explicit attempt by a malicious party to deny legitimate users of a service from accessing the service. A distributed denial-of-service (DDoS) attack has the exact same goal but multiple distributed resources are utilized for a more devastating effect.

While access to a large number of compromised hosts was traditionally required for launching successful DDoS attacks, the emergence of DDoS-As-a-Service in recent years have made DDoS infrastructure capable of generating over 800 MBit/s of traffic accessible to a wide range of malicious actors for a cost as low as $10/month.

In this paper, we investigate the phenomenon of low-cost DDoS-As-a-Service also known as Booter services. While we are aware of the existence of the underground economy of Booters, we do not have much insight into their internal operations, including the users of such services, the usage patterns, the attack infrastructure, and the victims. In this paper, we present a brief analysis on the operations of a Booter known as TwBooter based on a publicly-leaked dump of their operational database. This data includes the attack infrastructure used for mounting attacks, details on service subscribers, and the targets of attacks. Our analysis reveals that this service earned over $7,500 a month and was used to launch over 48,000 DDoS attacks against 11,000 distinct victims including government websites and news sites in less than two months of operation.

Available Media

Invited Talk: Stepping P3wn3: Adventures in Full-Spectrum Embedded Exploitation and Defense

Ang Cui, Red Balloon Security and Columbia University

Available Media
  • Read more about Invited Talk: Stepping P3wn3: Adventures in Full-Spectrum Embedded Exploitation and Defense
5:00 p.m.–5:30 p.m. Monday

Work-in-Progress Talks

TBA

Bronze Sponsors

© USENIX

  • Privacy Policy
  • Contact Us