<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Making software more secure by adding bugs ... in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13436#M1364</link>
    <description>&lt;P&gt;It is good to see developers envision&amp;nbsp;potential attack avenues and&amp;nbsp;build&amp;nbsp;appropriate defenses.&amp;nbsp; This knowledge will only help them become better developers.&amp;nbsp; However, as is the case with anyone newly entering a field (e.g. threat analysis), it appears they have insufficient experience to foresee how their solution could go wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What they propose sounds much like a &lt;A href="https://en.wikipedia.org/wiki/Honeypot_(computing)" target="_self"&gt;honeypot&lt;/A&gt;.&amp;nbsp; The difference, of course,&amp;nbsp;is that&amp;nbsp;a traditional honeypot&amp;nbsp;redirects the black hat to&amp;nbsp;a disposable server located on an isolated network.&amp;nbsp; This prevents&amp;nbsp;competition for resources in the production environment and&amp;nbsp;keeps complexity&amp;nbsp;out of the production environment.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Historically, I have only thought of honeypots as operating at layers 3 and 4 because&amp;nbsp;the typical use-case involves redirecting unused IP addresses/ports their way.&amp;nbsp; The article effectively points out that there is value to a honeypot at layer 5 and above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An&amp;nbsp;&lt;A href="https://en.wikipedia.org/wiki/Intrusion_detection_system" target="_self"&gt;IPS &lt;/A&gt;is our traditional solution for this part of the stack.&amp;nbsp; At the first sign of exploit, the IPS will either&amp;nbsp;&lt;SPAN&gt;"&lt;STRONG&gt;terminate&lt;/STRONG&gt;", "&lt;STRONG&gt;blackhole&lt;/STRONG&gt;" or "&lt;STRONG&gt;ignore/allow&lt;/STRONG&gt;" the session.&lt;/SPAN&gt;&amp;nbsp;This article helped me&amp;nbsp;realize that there might be value to an IPS also having the ability to&amp;nbsp;"&lt;STRONG&gt;redirect to honeypot&lt;/STRONG&gt;".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 09 Aug 2018 16:15:56 GMT</pubDate>
    <dc:creator>denbesten</dc:creator>
    <dc:date>2018-08-09T16:15:56Z</dc:date>
    <item>
      <title>Making software more secure by adding bugs ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13388#M1350</link>
      <description>&lt;P&gt;At first, the concept of &lt;A href="https://arxiv.org/pdf/1808.00659.pdf" target="_blank"&gt;chaff bugs&lt;/A&gt; sounds insane.&amp;nbsp; After all, we bend considerable efforts to keep bugs out of our code and, when we find them, getting rid of them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, the idea of adding non-exploitable flaws to a program, in order to drive black hats nuts by forcing them to spend time on unprofitable research, does have an appeal to it.&amp;nbsp; It's something like the work of Cymmetria, in the deception space, or the idea of the &lt;A href="https://community.isc2.org/t5/Industry-News/H-R-4036-Active-Cyber-Defense-Certainty-Act/m-p/11371/highlight/true#M1081" target="_blank"&gt;ethics of active defence&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have to admit, my appsec soul is not totally convinced of the soundness of the idea.&amp;nbsp; In general, complexity is the enemy of security, and this will definitely add complexity.&amp;nbsp; How do we determine that the bugs &lt;STRONG&gt;are&lt;/STRONG&gt; non-exploitable?&amp;nbsp; If we use the same bugs, or some algorithm for generating them, will they not be identifiable for the black hats?&amp;nbsp; What will this do for bug bounties?&amp;nbsp; (About which I have my doubts as well ...)&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:53:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13388#M1350</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2023-10-09T08:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Making software more secure by adding bugs ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13389#M1351</link>
      <description>&lt;P&gt;If you can't scrape up enough interest to do the presentation I would appreciate reading your documentation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get the depth in defense philosophy and adding bugs to software to distract is certainly an option.&amp;nbsp; &amp;nbsp;I would have to think long and hard about the merits of purposefully adding "malicious code".&lt;/P&gt;</description>
      <pubDate>Wed, 08 Aug 2018 18:45:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13389#M1351</guid>
      <dc:creator>Flyslinger2</dc:creator>
      <dc:date>2018-08-08T18:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: Making software more secure by adding bugs ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13394#M1353</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;is incorrect in suggesting these chaff bugs might make software safer; they will not. In fact, the paper's authors are also incorrect in suggesting that chaff bugs can deter attacks; they cannot.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The authors' intent is to build a software environment that wastes malicious attackers' time. I contend that implementing a chaff bug plan in a development team would be an even bigger time waste for the developers than for potential attackers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For a&amp;nbsp;full discussion, see my blog post, &lt;A title="bugs" href="https://cragins.blogspot.com/2018/08/chaff-bugs-whats-point.html" target="_blank"&gt;Chaff Bugs: What's the Point?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Aug 2018 20:09:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13394#M1353</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2018-08-08T20:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: Making software more secure by adding bugs ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13418#M1358</link>
      <description>I wonder how to implement bugs which are not exploitable. I think it’s a bad idea and the outcome should be to implement no bugs at all.</description>
      <pubDate>Thu, 09 Aug 2018 05:35:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13418#M1358</guid>
      <dc:creator>Thalpius</dc:creator>
      <dc:date>2018-08-09T05:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Making software more secure by adding bugs ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13426#M1359</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/780103681"&gt;@CraginS&lt;/a&gt;&amp;nbsp;- read your blogspot article.&amp;nbsp; You verbalized what was rattling around in my head.&amp;nbsp; Specifically that the same energy and efforts should be utilized to write good code and the Security Engineer needs to be in the project from inception.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The current project I'm on now I'm trying to educate the customer of the same need. They outsource some of their code and when I said that I had to apply the same assessing methodologies to that vendor's code as I do theirs they were not pleased.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 12:52:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13426#M1359</guid>
      <dc:creator>Flyslinger2</dc:creator>
      <dc:date>2018-08-09T12:52:44Z</dc:date>
    </item>
    <item>
      <title>Re: Making software more secure by adding bugs ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13436#M1364</link>
      <description>&lt;P&gt;It is good to see developers envision&amp;nbsp;potential attack avenues and&amp;nbsp;build&amp;nbsp;appropriate defenses.&amp;nbsp; This knowledge will only help them become better developers.&amp;nbsp; However, as is the case with anyone newly entering a field (e.g. threat analysis), it appears they have insufficient experience to foresee how their solution could go wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What they propose sounds much like a &lt;A href="https://en.wikipedia.org/wiki/Honeypot_(computing)" target="_self"&gt;honeypot&lt;/A&gt;.&amp;nbsp; The difference, of course,&amp;nbsp;is that&amp;nbsp;a traditional honeypot&amp;nbsp;redirects the black hat to&amp;nbsp;a disposable server located on an isolated network.&amp;nbsp; This prevents&amp;nbsp;competition for resources in the production environment and&amp;nbsp;keeps complexity&amp;nbsp;out of the production environment.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Historically, I have only thought of honeypots as operating at layers 3 and 4 because&amp;nbsp;the typical use-case involves redirecting unused IP addresses/ports their way.&amp;nbsp; The article effectively points out that there is value to a honeypot at layer 5 and above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An&amp;nbsp;&lt;A href="https://en.wikipedia.org/wiki/Intrusion_detection_system" target="_self"&gt;IPS &lt;/A&gt;is our traditional solution for this part of the stack.&amp;nbsp; At the first sign of exploit, the IPS will either&amp;nbsp;&lt;SPAN&gt;"&lt;STRONG&gt;terminate&lt;/STRONG&gt;", "&lt;STRONG&gt;blackhole&lt;/STRONG&gt;" or "&lt;STRONG&gt;ignore/allow&lt;/STRONG&gt;" the session.&lt;/SPAN&gt;&amp;nbsp;This article helped me&amp;nbsp;realize that there might be value to an IPS also having the ability to&amp;nbsp;"&lt;STRONG&gt;redirect to honeypot&lt;/STRONG&gt;".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 16:15:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13436#M1364</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2018-08-09T16:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: Making software more secure by adding bugs ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13443#M1370</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/203431867"&gt;@Thalpius&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;I wonder how to implement bugs which are not exploitable. I think it’s a bad idea and the outcome should be to implement no bugs at all.&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I agree.&amp;nbsp; The coders already don't (have time to) spend enough effort on getting rid of actual exploits.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, by collocating a honey-sploit with an actual application, you're risking creating even more vulnerabilities.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't see this as a good idea at all, and only mildly interesting in an academic research environment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric B.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 18:22:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13443#M1370</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2018-08-09T18:22:49Z</dc:date>
    </item>
    <item>
      <title>Re: Making software more secure by adding bugs ...</title>
      <link>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13444#M1371</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An&amp;nbsp;&lt;A href="https://en.wikipedia.org/wiki/Intrusion_detection_system" target="_self"&gt;IPS &lt;/A&gt;is our traditional solution for this part of the stack.&amp;nbsp; At the first sign of exploit, the IPS will either&amp;nbsp;&lt;SPAN&gt;"&lt;STRONG&gt;terminate&lt;/STRONG&gt;", "&lt;STRONG&gt;blackhole&lt;/STRONG&gt;" or "&lt;STRONG&gt;ignore/allow&lt;/STRONG&gt;" the session.&lt;/SPAN&gt;&amp;nbsp;This article helped me&amp;nbsp;realize that there might be value to an IPS also having the ability to&amp;nbsp;"&lt;STRONG&gt;redirect to honeypot&lt;/STRONG&gt;".&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Except that a true Honeypot is usually prohibitively expensive.&amp;nbsp; It has to be maintained much like the production system, even though typically it's only emulating other systems.&amp;nbsp; It still needs to be updated, patched, checked for being actually exploited in and of itself, rebooted, and fed decoy data (lest the hackers realize they're in a Honeypot).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although there is some benefit to participating in the HoneyNet Project and similar endeavors in order to identify emerging exploits being used by the hackers.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www2.honeynet.org/projects/" target="_blank"&gt;https://www2.honeynet.org/projects/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know if this is beneficial to an organization though unless your org is a security research business.&amp;nbsp; It generally seems like a waste of resources that could be better spent on detective controls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric B.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 18:29:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Making-software-more-secure-by-adding-bugs/m-p/13444#M1371</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2018-08-09T18:29:19Z</dc:date>
    </item>
  </channel>
</rss>

