Sadly, this is probably the last paper I’ll write for a Virus Bulletin conference. 16 VB papers is probably enough for one career, and at my age travel is more difficult than it was in the 1990s. 🙂
The abstract is here: ‘The (testing) world upside down‘
And the paper itself is here: David Harley, The (Testing) World Turned Upside Down, October 2017, Virus Bulletin. Copyright is held by Virus Bulletin Ltd, but is made available on this site for personal use free of charge by permission of Virus Bulletin.
HT to Bruce Burrell and Nick FitzGerald for wordsmithing and sanity-checking.
Well, it won’t be out till October 2017, but there’s some news about my latest (and probably last) VB paper on the ESET WeLiveSecurity blog site, and some of the other stuff that will be happening at my favourite security conference:
Someone on Twitter just flagged an article that I’d long ago forgotten.
Well, to save you following that Bitly URL, it actually links to this: Predicting the future of malware and tomorrow’s malicious code. Which was actually for a special issue of Information Security Magazine.
Back in the days when I sometimes let myself be decoyed into contributing to one of those end-of-the-year-pointless-security predictions posts, the idea often came up that we should look back
in hunger and do a follow-up post on ‘How well did we do?’ Happily, no-one has asked me to get into all that for years: I suppose there must be some advantages to being a grumpy old man after all. Though I’m not sure whether it’s fear of my curmudgeonly ways or the assumption that I’m too old and daft to know or care what’s ahead.
Anyway, it’s a bit of a relief to know that I managed not to make a complete idiot of myself all that way back. But on the whole, I think I’ll continue to pay attention to Daniel Delbert McCracken’s advice and decline to make predictions that can be checked in my lifetime. (HT to Rob Slade for sharing that advice with me, years ago… And to Bruce of course, for reminding me of the article.)
My next article here will be about how ransomware will have evolved in 2070.
It seems I’ve neglected this blog for quite a while: while I’ve touched up some of the pages where necessary, I haven’t added any articles. Well, talking of interviews (which I was about six months ago) here’s a transcript (for the ESET blog) of an interview from November 2016 with community radio on St Helena. Here’s a summary from the article.
I was invited to do an interview with Craig Williams – who has a company called Gigabyte IT – on Saint FM. That’s a community radio station on St. Helena, an island way down in the South Atlantic where Napoleon Bonaparte spent the last six years of his life, and which has only recently started to benefit from the mixed blessing of the mobile phone. He (Craig, not Napoleon) came across me via an article to which I contributed some internet safety tips for parents and children a while ago.
In the course of the interview I attempted to answer the following questions:
- What advice would you give to parents about their child being safe online?
- As a professional security expert, what advice would you give to children about having an online presence?
- For an island of around 4,000 people, and with mobile access only made available earlier this year, what would you say needs to be put in place for kids, to fight against cyberbullying and online grooming?
This is actually going back quite a few weeks, even months, but it’s the longest interview I’ve participated in for years, and I guess it deserves a little exposure here. (You may consider that I’ve had quite enough exposure for one lifetime, of course, but interviewer Matt Ashare asked some pretty interesting questions.)
Interview with David Harley, Senior Research Fellow at ESET
It’s one of a series of interviews conducted by OnlineEducation.com with security people. Other interviewees that might interest you even more than me (!) include Dark Reading’s Kelly Jackson Higgins and my friend and sometime co-author Robert Slade.
This is the paper by myself and Sebastian Bortnik, of ESET Latin America, presented at AVAR 2014 in Sydney: Lemming Aid and Kool Aid: Helping the Community to help itself through Education
So now that the 2014 Virus Bulletin conference is over, here’s the paper – my 15th VB paper! – written by Eugene Rodionov (ESET), Alexander Matrosov (Intel) and myself:
Bootkits: past, present & future
And here’s the abstract:
Bootkit threats have always been a powerful weapon in the hands of cybercriminals, allowing them to establish persistent and stealthy presence in their victims’ systems. The most recent notable spike in bootkit infections was associated with attacks on 64-bit versions of the Microsoft Windows platform, which restrict the loading of unsigned kernel-mode drivers. However, these bootkits aren’t effective against UEFI-based platforms. So, are UEFI-based machines immune against bootkit threats (or would they be)?
The aim of this presentation is to show how bootkit threats have evolved over time and what we should expect in the near future. Firstly, we will summarize what we’ve learned about the bootkits seen in the wild targeting the Microsoft Windows platform: from TDL4 and Rovnix (which was used by the Carberp banking trojan) up to Gapz (which employs one of the stealthiest bootkit infection techniques seen so far). We will review their infection approaches and the methods they have employed to evade detection and removal from the system.
Secondly, we will look at the security of the increasingly popular UEFI platform from the point of view of the bootkit author, as UEFI is becoming a target of choice for researchers in offensive security, and proof-of-concept bootkits targeting Windows 8 OS using UEFI have already been released. We will focus on various attack vectors against UEFI and discuss available tools and what measures should be taken to mitigate against them.
Small Blue-Green World
ESET Senior Research Fellow