This week I’ve been in San Diego CA for the The Network and Distributed System Security Symposium (NDSS) 2019 conference.
I’ve presented our paper about Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android.
Recently, I’ve accepted the invitation to join the IEEE CPS-SEC workshop TPC. CPS-SEC is co-located with the IEEE CNS conference . From the official website:
The IEEE International Workshop on Cyber-Physical Systems Security (CPS-Sec) will be held in conjunction with the IEEE Conference on Communications and Network Security (CNS) 2019 in Washington, D.C., USA, on 10-12 June, 2019.
The camera-ready version of Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google’s “Nearby Connections” on Android is available here
We also released a proof of concept code to perform the Soft AP manipulation attack. The code was previously disclosed to Google. In summary, the attack allows a malicious Nearby Connections server (advertiser) to redirect a client to a malicious Internet connected access point. As a result the attacker can reconfigure the wireless network interface of the victim via DHCP and gets access to all the Wi-Fi traffic (even traffic from non Nearby Connections applications).
Recently gcushen updated
Academic (the theme that I’m using
to build this website with hugo
)
with two useful features that I recommend to use: day_night
and search
.
day_night
allows the reader to toggle light and dark color themes for the website.
If you look at the top navigation bar on the right you should spot an icon
with either a moon (to switch to a dark theme) or a sun (to switch to a light
theme).
I’m very happy to announce that our paper titled Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google’s “Nearby Connections” on Android has been accepted for the The Network and Distributed System Security Symposium (NDSS). Here you can download a pre-print. Here is the list of accepted papers for NDSS 2019 Soon I’ll update more material such an exploit PoC code.
As part of my PhD I’ve recently joined as a visiting researcher the CISPA – Helmholtz-Zentrum, Saarbruecken 🇩🇪.
I’m going to spend six months there, supervised by Prof. N.O. Tippenhauer.
After the post about connecting to SUTD’s VPN is now time to connect eduroam! Again, SUTD’s IT support for (Arch) Linux at the time of writing is none.
SUTD runs a setup with only username-password (no certificates required) and
the connection can be established using the GUI of NetworkManager. If your
WiFi card is on and eduroam is in your range you should see the eduroam
SSID
on the list of the available WiFi networks. If you attempt to connect then
all you need to do is enter your username
and password
. As usual, PhD
student and staff are separated into different namespaces. Use the username
name_surname@sutd.edu.sg
if you are a staff member or xxxxxxx@sutd.edu.sg
if you are a student (xxxxxxx
is your 7-digits student id). The password
should be the same as the one you are using to connect to the Internet from
SUTD.