<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>27C3 on CCC Event Blog</title>
    <link>https://events.ccc.de/en/tag/27c3/</link>
    <description>Recent content in 27C3 on CCC Event Blog</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Dec 2010 02:36:26 +0000</lastBuildDate><atom:link href="https://events.ccc.de/en/tag/27c3/feed" rel="self" type="application/rss" />
    <item>
      <title>Crypto Talk at 27C3: New Key Recovery Attacks on RC4/WEP, Day 4, 17:15, Saal 2</title>
      <link>https://events.ccc.de/en/2010/12/30/new-key-recovery-attacks-on-rc4wep/</link>
      <pubDate>Thu, 30 Dec 2010 02:36:26 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/30/new-key-recovery-attacks-on-rc4wep/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/44410286@N02/5305487262/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm6.static.flickr.com/5042/5305487262_20657eec88.jpg&#34; alt=&#34;&#34; width=&#34;446&#34; height=&#34;140&#34; /&gt;&lt;/a&gt;The &lt;a href=&#34;http://en.wikipedia.org/wiki/Rc4&#34;&gt;RC4 Stream Cipher&lt;/a&gt; could be the most common stream cipher used on the Internet. RC4 is the only Stream Cipher which is standardized for the &lt;a href=&#34;http://en.wikipedia.org/wiki/Transport_Layer_Security&#34;&gt;SSL/TLS protocol&lt;/a&gt;, it is also used for &lt;a href=&#34;http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy&#34;&gt;WEP&lt;/a&gt; and &lt;a href=&#34;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&#34;&gt;WPA&lt;/a&gt; protected wireless networks. Initially, RC4 was designed to be a closed source commercial product, with the core algorithm kept secret. In 1994, the source code for RC4 was posted on the internet and the algorithm could be analyzed.&lt;/p&gt;
&lt;p&gt;The first &lt;a href=&#34;http://en.wikipedia.org/wiki/FMS_attack&#34;&gt;attack on RC4 was published by Fluhrer, Mantin, and Shamir in 2001&lt;/a&gt;. The attack is very effective, but can only be used against certain keys starting with a special sequence of bytes, (for example 3, 255…). This worked perfectly well against WEP, which generates a per packet key using a random initialization vector IV, and a static secret key K. K is kept secret and shared among all nodes in the network. IV is public, and transmitted with every packet in clear. The per packet is key simply the IV concatenated with K (IV | K). We would also say, that there is a correlation between the output of RC4 and a part of the key, if certain conditions apply (the per packet key starts with 3, 255 for example). Many more of these correlations where found later and implemented in a WEP attack tool by a person under the pseudonym KoreK, which made key recovery on WEP protected networks much faster.&lt;/p&gt;
&lt;p&gt;The next level of WEP breaking tools &lt;a href=&#34;http://www.cdc.informatik.tu-darmstadt.de/aircrack-ptw/&#34;&gt;was published in 2007&lt;/a&gt;, when a new correlation was used against WEP. This correlation had been previously been found by Jenkins and Klein independently, but was never used against WEP so far. The correlation was much weaker than the correlations used in previous attack, but needed effectively no additional conditions, so that nearly every packet could be used to assist key recovery.&lt;/p&gt;
&lt;p&gt;Looking at all those previous WEP attacks, one logical idea would be to automate the search for correlations in the RC4 output, which can be used in key recovery attacks. This is exactly the approach taken by Martin Vuagnoux:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4.&lt;/p&gt;
&lt;p&gt;With this method, 48 new exploitable correlations have been discovered. Then we bind these new biases in the PRGA with known KSA weaknesses to provide practical key recovery attacks. Henceforth, we apply a similar technique on RC4 as a black box, i.e. the secret key words as input and the keystream words as output. Our objective is to exhaustively find linear correlations between these elements. Thanks to this technique, 9 new exploitable correlations have been revealed. Finally, we exploit these weaknesses on RC4 to some practical examples, such as the WEP protocol. We show that these correlations lead to a key recovery attack on WEP with only 9,800 encrypted packets (less than 20 seconds), instead of 24,200 for the best previous attack.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/44410286@N02/5304891977/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm6.static.flickr.com/5161/5304891977_7dddac21b3.jpg&#34; alt=&#34;&#34; width=&#34;446&#34; height=&#34;154&#34; /&gt;&lt;/a&gt;One could ask, why one should still try to improve attacks on RC4/WEP. WEP ca be broken in less than a minute nowadays. The successor protocol to WEP, namely WPA TKIP still uses the RC4 cipher in a very similar mode as WEP does. An improvement on WEP attacks could also help us in breaking WPA. Attacking RC4 in SSL/TLS would also be very interesting: Using RC4 in SSL/TLS is very efficient, because it doesn’t need any padding compared to a block cipher and needs less bandwidth than SSL/TLS using a block cipher does. A good attack on RC4 could render SSL/TLS connections insecure.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Personally, I am very interested in this talk, because I worked on attacking WEP in my diploma thesis and the last generation of WEP attacking tools was one of the results of my diploma thesis. The new attack present here will definitely outperform the last generation of WEP attacks and supersedes my results.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/events/4261.en.html&#34;&gt;See the talk, Day 4, 17:15, Saal 2&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Autor: Erik Tews&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Crypto Talk at 27C3: FrozenCache – Mitigating cold-boot attacks for Full-Disk-Encryption software, Day 3, 23:00, Saal 2</title>
      <link>https://events.ccc.de/en/2010/12/28/frozen-cache/</link>
      <pubDate>Tue, 28 Dec 2010 18:38:05 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/28/frozen-cache/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/44410286@N02/5293511931/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm6.static.flickr.com/5248/5293511853_e9abb5f22e.jpg&#34; alt=&#34;Cold Boots&#34; width=&#34;300&#34; height=&#34;278&#34; /&gt;&lt;/a&gt;As a general attack against encryption software on a computer, the cold boot attack was presented at 25C3. To encrypt data on a PC, many programs store the encryption key in RAM. The key is usually derived from a password or loaded from the hard disk where it is protected by a password too. The key resists as least as long as the encryption operation take in RAM. For many applications like Full-Disk-Encryption or Email Signatures, it is convenient to keep the key permanently in RAM, once it has been loaded, so that the user doesn’t need to enter his password again and again.&lt;/p&gt;
&lt;p&gt;To protect the key from unauthorized access, computers are locked when the legitimate user is away or the computer has been switched to power-saving-mode. To gain access again, the user needs to type a password or needs to identify himself using a fingerprint reader or any other kind of biometric authorization device. Of course, the key is still in RAM for the whole time.&lt;/p&gt;
&lt;p&gt;Here, the cold boot attack kicks in. At 25C3, it has been shown that RAM chips (DRAMs) can be easily removed from a running PC, Server or Laptop Computer, and their content can be extracted afterward. Even if the device has just been turned off, the content of the RAM fades only slowly away, depending on the exact type of RAM and its temperature. Even if some bits are recovered incorrectly, the correct encryption key can still be found an corrected, because many cryptographic algorithms use a lot of redundancy in they keys (round-keys for AES for example).&lt;/p&gt;
&lt;p&gt;One way to counter the attack could be to store the keys only in the computer cache, instead of RAM. In contrast to the RAM which is a separate device connected to the computers motherboard, the Cache resides on the CPU die, and cannot easily be extracted or read-out. However, caches are hard to control and one needs to make sure that keys are really frozen in the cache and are never written to the RAM:&lt;a href=&#34;http://www.flickr.com/photos/44410286@N02/5293511931/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm6.static.flickr.com/5043/5293511931_a5a2644d79.jpg&#34; alt=&#34;Frozen Cache&#34; width=&#34;300&#34; height=&#34;219&#34; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;div&gt;
  &lt;p&gt;
    Cold boot attacks are a major risk for the protection that Full-Disk-Encryption solutions provide. FrozenCache is a general-purpose solution to this attack for x86 based systems that employs a special CPU cache mode known as &amp;#8220;Cache-as-RAM&amp;#8221;. Switching the CPU cache into a special mode forces data to held exclusively in the CPU cache and not to be written to the backing RAM locations, thus safeguarding data from being obtained from RAM by means of cold boot attacks.
  &lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;Personally, I am interested in this talk, because it might be a good solution to use secure full-disk encryption software, without always having to shutdown your computer when you leave it unattended.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/events/4018.en.html&#34;&gt;See the talk, Day 3, 23:00, Saal 2!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Autor: Erik Tews&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Crypto Talk at 27C3:  Is the SSLiverse a safe place? Day 2, 16:00, Saal 2</title>
      <link>https://events.ccc.de/en/2010/12/28/is-the-ssliverse-a-safe-place/</link>
      <pubDate>Tue, 28 Dec 2010 01:18:50 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/28/is-the-ssliverse-a-safe-place/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://en.wikipedia.org/wiki/Transport_Layer_Security&#34;&gt;SSL/TLS&lt;/a&gt; is the standard when it comes to securing HTTP traffic on the internet. The authenticity of a web server is usually secured using a &lt;a href=&#34;http://en.wikipedia.org/wiki/X.509&#34;&gt;X.509 certificate&lt;/a&gt; digitally signed by a trusted &lt;a href=&#34;http://en.wikipedia.org/wiki/Certificate_authority&#34;&gt;certification authority (CA)&lt;/a&gt;. All major web browsers come with a list of CAs preinstalled they assume as trustworthy. Every website can be signed by any of these CAs, so no web browser would show a warning, if &lt;strong&gt;&lt;a href=&#34;https://www.dod.gov&#34;&gt;www.dod.gov&lt;/a&gt;&lt;/strong&gt; would be signed by a &lt;strong&gt;Chinese certification authority&lt;/strong&gt; or the &lt;strong&gt;Deutsche Telekom&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/arcticpuppy/4366428283/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm5.static.flickr.com/4056/4366428283_4af058ce10_m.jpg&#34; alt=&#34;Observatory&#34; width=&#34;240&#34; height=&#34;160&#34; /&gt;&lt;/a&gt;To examine the usage of X.509 certificates for SSL/TLS, the &lt;a href=&#34;http://www.eff.org/&#34;&gt;EFF&lt;/a&gt; installed a &lt;a href=&#34;http://www.eff.org/observatory&#34;&gt;SSL Observatory&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The SSL observatory is a project to bring more transparency to SSL Certificate Authorities, and help understand who really controls the web’s cryptographic authentication infrastructure. The Observatory is an Electronic Frontier Foundation (EFF) project that began by surveying port 443 of all public IPv4 space. At Defcon 2010, we reported the initial findings of the SSL Observatory. That included thousands of valid ‘localhost’ certificates, certificates with weak keys, CA certs sharing keys and with suspicious expiration dates, and the fact that there are approximately 650 organizations that can sign a certificate for any domain that will be trusted by modern desktop browsers, including some that you might regard as untrustworthy.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I am looking forward to see some obscure SSL/TLS setups here. For example, SSL/TLS doens’t require the server to present a certificate, connections where no certificate at all are also supported, which only provide security against an passive eavesdropper. Also, the usage of encryption is an optional feature in SSL/TLS, so that both parties may send their traffic in clear, and use SSL/TLS only to prevent unauthorized modification of the data or to prove authenticity of the server. Also, the key in a certificate doesn’t need to be an RSA key, instead some public Diffie-Hellmann parameters or a DSA key might be embedded there too.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/voxpelli/2954947277/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm4.static.flickr.com/3242/2954947277_e24a070960_m.jpg&#34; alt=&#34;Netscape Navigator&#34; width=&#34;240&#34; height=&#34;180&#34; /&gt;&lt;/a&gt;For those of you who would like to know why it is called SSL/TLS: SSL 1.0 was created by Netscape to secure HTTP traffic, but the standard was never released to the public. &lt;a href=&#34;http://www.mozilla.org/projects/security/pki/nss/ssl/draft02.html&#34;&gt;SSL 2.0&lt;/a&gt; was the first version of SSL released to the public and implemented in the Netscape Browser. &lt;a href=&#34;http://www.mozilla.org/projects/security/pki/nss/ssl/draft302.txt&#34;&gt;SSL 3.0&lt;/a&gt; was the last version of SSL created by Netscape, before the IETF took over development. &lt;a href=&#34;http://www.ietf.org/rfc/rfc2246.txt&#34;&gt;TLS 1.0&lt;/a&gt; was the first version of SSL released by the IETF, which technically still carriers a version number 3.1 in the protocol header. While there are big differences between SSL 2.0 and SSL 3.0, the differences between SSL 3.0 and TLS 1.0 are only minor. The current version of TLS is &lt;a href=&#34;http://www.ietf.org/rfc/rfc5246.txt&#34;&gt;version 1.2&lt;/a&gt; (which still carries a version number 3.3 in the protocol header), which contains some security fixes and improvements over TLS 1.0. So we usually say SSL/TLS, when we refer to the SSL or TLS protocol, but not to a particular version of the protocol.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Personally, I am interested in this talk because I conducted a small SSL X.509 survey by myself back in 2007, when I implemented a TLS 1.0 stack in Java for the J2ME platform. Nowadays, this stack is included in the bouncycastle project, a Java cryptography provider, and can be run on J2ME as well as on J2SE or J2EE.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/events/4121.en.html&#34;&gt;See the talk at Day2, 16:00 Saal 2!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Autor: Erik Tews&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Crypto Talk at 27C3: Die gesamte Technik ist sicher, Day 1, 21:45, Saal 1</title>
      <link>https://events.ccc.de/en/2010/12/27/die-gesamte-technik-ist-sicher/</link>
      <pubDate>Mon, 27 Dec 2010 12:09:09 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/27/die-gesamte-technik-ist-sicher/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/44410286@N02/5295962507/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm6.static.flickr.com/5045/5295962507_55c7360f1f_m.jpg&#34; alt=&#34;NPA&#34; width=&#34;240&#34; height=&#34;152&#34; /&gt;&lt;/a&gt;The new national id card &lt;a href=&#34;http://de.wikipedia.org/wiki/Personalausweis_%28Deutschland%29&#34;&gt;Neuer Personalausweis (NPA)&lt;/a&gt; was one of the biggest IT projects in the German government in the last years. Compared to the old id card, the new id card is a RFID smart card, which can also be used on the internet to prove your identify to a remote party (Ebay, Paypal, or Amazon for example) and to sign binding contracts. For example, you can use the card to buy a new house or car, or open up a bank account or apply for a credit.&lt;/p&gt;
&lt;p&gt;When using the card over the internet, the card is connected to a reader, which is connected to a (potentially insecure) PC, which is connected to the internet. To use the card, the user needs to enter his PIN code to prove possession of the card and knowledge of the PIN. If the PIN is entered on an insecure device as the PC, it might be recorded by an attacker and used by him later.&lt;/p&gt;
&lt;p&gt;Frank Morgner and Dominik Oepe examined the various attack scenarios on the NPA, which could be possible, depending on the used reader for the NPA:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Wir untersuchen die Machbarkeit und Auswirkung von Relay-Angriffen in Hinblick auf die verschiedenen Lesegeräteklassen und Anwendungsszenarien des neuen Personalausweises. Nach dem derzeitigen Stand der Spezifikationen lassen sich solche Angriffe kaum verhindern. Einige der Probleme erweisen sich als unlösbar, für andere existieren Lösungsansätze, welche von simpel, aber unzureichend bis komplex, aber kaum umsetzbar reichen.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;Personally, I am interested in this talk, because it might show us some nice attack scenarios on the NPA, which are hard to counter, without buying very expensive readers. A lot of low-cost readers have just been distributed by a well known computer magazine in Germany, so that we can assume that a lot of people will be using their NPA with a highly insecure reader.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/events/4297.en.html&#34;&gt;See the talk at Day 1, 21:45, Saal 1!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Autor: Erik Tews&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Mission Angels: How to Connect to the 27c3</title>
      <link>https://events.ccc.de/en/2010/12/27/mission-angels-how-to-connect-to-the-27c3/</link>
      <pubDate>Mon, 27 Dec 2010 04:56:47 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/27/mission-angels-how-to-connect-to-the-27c3/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/schwarzbrot/5294892396/&#34; title=&#34;Day0 - II by anders_hh, on Flickr&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;http://farm6.static.flickr.com/5168/5294892396_99d5f2d34d_z.jpg&#34; width=&#34;428&#34; height=&#34;640&#34; alt=&#34;Day0 - II&#34; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Thanks to the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Heralds#Mission_Angels&#34;&gt;Mission Angels&lt;/a&gt;, you’ll be able to interact with the talks going on at the 27c3 and more! While you watch the streams from one of many &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Peace_Missions&#34;&gt;Peace Missions&lt;/a&gt; throughout the world, Mission Angels will be monitoring IRC and Twitter for questions to be asked in selected events during the 27c3.&lt;/p&gt;
&lt;p&gt;To ask a question in a session on IRC join #27c3-Saal-1, #27c3-Saal-2, #27c3-Saal-3 on &lt;a href=&#34;http://freenode.net/&#34;&gt;Freenode&lt;/a&gt; or use the corresponding terms as a &lt;a href=&#34;http://support.twitter.com/entries/49309-what-are-hashtags-symbols&#34;&gt;Twitter hashtag&lt;/a&gt; to put your question to the session.&lt;/p&gt;
&lt;p&gt;If you’re in a Peace Mission, you can even sign up to give a &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Lightning_Talks#News_and_Updates&#34;&gt;Lightning Talk&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt;See the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Peace_Missions#How_to_Communicate_with_the_27c3&#34;&gt;Peace Missions&lt;/a&gt; entry on the 27c3 wiki for more information. We’ll be updating the entry as we add more communications methods. If you’re at the bcc, consider volunteering to be a Mission Angel!&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Photo by &lt;a href=&#34;http://www.flickr.com/photos/schwarzbrot/&#34;&gt;anders_hh&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Crypto Talk at 27C3: Automatic Identification of Cryptographic Primitives in Software, Day1, 16:00, Saal 3</title>
      <link>https://events.ccc.de/en/2010/12/27/automatic-identification-of-cryptographic-primitives-in-software/</link>
      <pubDate>Mon, 27 Dec 2010 01:31:51 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/27/automatic-identification-of-cryptographic-primitives-in-software/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/pagedooley/2422430207/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm3.static.flickr.com/2371/2422430207_01b2dcba11_m.jpg&#34; alt=&#34;Fingerprint&#34; width=&#34;240&#34; height=&#34;180&#34; /&gt;&lt;/a&gt;Many applications, including closed source applications like malware or DRM-enabled multimedia players (you might consider them as malware too) use cryptography. When analyzing these applications, a first step is the identification and localization of the cryptographic building blocks (cryptographic primitives, for example &lt;a href=&#34;http://en.wikipedia.org/wiki/Advanced_Encryption_Standard&#34;&gt;AES&lt;/a&gt;, &lt;a href=&#34;http://en.wikipedia.org/wiki/Data_Encryption_Standard&#34;&gt;DES&lt;/a&gt;, &lt;a href=&#34;http://en.wikipedia.org/wiki/RSA&#34;&gt;RSA&lt;/a&gt;…) in the applications. When these blocks have been localized, the input and output of the cryptographic primitives and the key management can be observed and the application can be analyzed further. Fortunately, many cryptographic algorithms use special constants or have a typical fingerprint  and there are only a few different public implementations of the algorithm. This allows us to automate this first, &lt;a href=&#34;http://groebert.org/felix/&#34;&gt;Felix Gröbert&lt;/a&gt; will show us how:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Using dynamic binary instrumentation, we record instructions of a program during runtime and create a fine-grained trace. We implement a trace analysis tool, which also provides methods to reconstruct high-level information from a trace, for example control flow graphs or loops, to detect cryptographic algorithms and their parameters.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href=&#34;http://en.wikipedia.org/wiki/Dynamic_program_analysis&#34;&gt;Trace driven/dynamic analysis&lt;/a&gt; has some advantages of &lt;a href=&#34;http://en.wikipedia.org/wiki/Static_code_analysis&#34;&gt;static analysis&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Because the program is analyzed at runtime, it is immediately known which parts of the code are used at which time, so that they might be correlated with runtime decryption of the code or with network communication.&lt;/li&gt;
&lt;li&gt;Inputs and outputs of the primitives as well as the keys are recorded, even if the originate from a remote server or botnet. This allows us to immediately distinguish between long term keys and session keys, if multiple executions of the same program can be recorded.&lt;/li&gt;
&lt;li&gt;This is also highly interesting if private keys are included in an obfuscated binary, for example private RSA keys.&lt;/li&gt;
&lt;li&gt;Dead or unused code is automatically excluded, so that one can proceed with the main parts of the code first.&lt;/li&gt;
&lt;li&gt;If additional code is loaded from a server, it is included in the analysis. This would be hard to impossible using static analysis.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://events.ccc.de/congress/2010/Fahrplan/images/event-4160-128x128.png&#34; alt=&#34;Analysis&#34; width=&#34;128&#34; height=&#34;128&#34; /&gt; Of course, trace driven analysis has it disadvantages, for example if a malware needs to communicate with a command-and-control server, which has already been taken down or behaves differently on different systems or at different times.__&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Personally, I am interested in this talk because it might make ease up the analysis of closed source applications using cryptography. Even if the application, the DRM scheme, or the cryptographic primitive has no special weaknesses or bugs, just he recording of every input and output of all cryptographic building blocks in the application might be sufficient to extract a DRM free version of DRM protected digital content. Please also note that even if an application uses only well analyzed cryptographic primitives as AES and RSA, it might still be insecure, if these primitives are used in the wrong way.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/events/4160.en.html&#34;&gt;See the talk at Day 1, 16:00, Saal 3!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Author: Erik Tews&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Change of Plan — Video Streams For Peace Missions</title>
      <link>https://events.ccc.de/en/2010/12/25/change-of-plan-video-streams-for-peace-missions/</link>
      <pubDate>Sat, 25 Dec 2010 01:02:28 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/25/change-of-plan-video-streams-for-peace-missions/</guid>
      <description>&lt;p&gt;In one of our &lt;a href=&#34;../../../../en/2010/12/15/have-you-set-up-your-peace-mission-yet/&#34;&gt;last posts&lt;/a&gt; we’ve invited all peace missions to register their IP addresses by mail. Registered IP addresses will be granted access to a dedicated video streaming relay.&lt;/p&gt;
&lt;p&gt;We’ve received mails from lots of people, who’d like to set up a peace mission and gave us their IP address. So far, so good – it’s cool to see so much interest. Unfortunately, now you’ve invested time for sending us an email, we do change the registration procedure.&lt;/p&gt;
&lt;p&gt;There will be a web site, where peace missions can register. After we’ve acknowledged a registration you may add or change your IP address on the white list.&lt;/p&gt;
&lt;p&gt;Those of you, who already sent us an email, please re-register again by using that web interface.&lt;/p&gt;
&lt;p&gt;&lt;s&gt;We don’t know the URL yet, but we’ll post it as soon as we know it here and on the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/index.php/Peace_Missions&#34;&gt;Peace Missions page&lt;/a&gt; in the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/&#34;&gt;wiki&lt;/a&gt;.&lt;/s&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Update:&lt;/strong&gt;&lt;br&gt;
Please register your Peace Mission at &lt;a href=&#34;http://peacekeeper.27c3.fem-net.de/&#34;&gt;27c3 Peacekeeper&lt;/a&gt; to get guaranteed Bandwidth!&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>The fairydust has landed at the 27c3</title>
      <link>https://events.ccc.de/en/2010/12/24/the-spaceship-has-landed-at-the-27c3/</link>
      <pubDate>Fri, 24 Dec 2010 18:05:34 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/24/the-spaceship-has-landed-at-the-27c3/</guid>
      <description>&lt;p&gt;We wish you a very merry &lt;a href=&#34;http://twitter.com/johl/status/17995852161228800&#34;&gt;festival of fixing the WiFi at your family’s home&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt;Over the past few days, the 27c3 team has been hard at work with the initial preparations for the 27c3.  At the bcc, several tons of networking hardware have arrived, the network backbone is up and running and the hackcenter decor is taking shape.  In far away lands, many new &lt;a href=&#34;../../../../en/2010/12/15/have-you-set-up-your-peace-mission-yet/&#34;&gt;Peace Missions&lt;/a&gt; have been announced and there’s always room for more.&lt;/p&gt;
&lt;p&gt;Peaceful journeys!  We’ll see you on the 27th!&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Bring Your DVB-T receivers</title>
      <link>https://events.ccc.de/en/2010/12/23/bring-your-dvb-t-receivers/</link>
      <pubDate>Thu, 23 Dec 2010 00:31:56 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/23/bring-your-dvb-t-receivers/</guid>
      <description>&lt;p&gt;At 27C3 all lectures will be broadcast via DVB-T and reception will be possible in and around the bcc. Visitors can watch via TV if they want avoid overcrowded lecture rooms.&lt;/p&gt;
&lt;p&gt;To receive the signal any PC with DVB-T-USB-Stick, TV set with DVB-T tuner or cellphone with DVB-T-function will work. We will publish all needed configuration files and a list of working and non-working receivers in the wiki.&lt;/p&gt;
&lt;p&gt;The Bundesnetzagentur (German regulation body) has allocated channel 22 (482MHz) for us, where we will transmit with 6 watts ERP.&lt;/p&gt;
&lt;p&gt;The last time DVB-T was available on Chaos Congress was at 24C3 where in some areas the signal was to much attenuated to be received properly. This year we come up against this with more transmission power, better&lt;br&gt;
placement of the transmitter antenna and a new, better modulator.&lt;/p&gt;
&lt;p&gt;Details are available at &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/DVB-T&#34;&gt;http://events.ccc.de/congress/2010/wiki/DVB-T&lt;/a&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Downloadable tickets are available in your presale-account</title>
      <link>https://events.ccc.de/en/2010/12/17/tickets-nun-in-den-accounts-verfugbar-downloadable-tickets-are-available-in-your-presale-account/</link>
      <pubDate>Fri, 17 Dec 2010 21:26:52 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/17/tickets-nun-in-den-accounts-verfugbar-downloadable-tickets-are-available-in-your-presale-account/</guid>
      <description>&lt;p&gt;Downloadable tickets are available in your presale-account. NOW.&lt;/p&gt;
&lt;p&gt;As you already may have noticed, the availability of your tickets has been delayed.. ahem.. just a little bit. But here’s the good news:&lt;/p&gt;
&lt;p&gt;Your 27C3-tickets are available for download now!&lt;br&gt;
Please log in to &lt;a href=&#34;https://presale.events.ccc.de&#34;&gt;https://presale.events.ccc.de&lt;/a&gt; , download the pdf, print it out, and make sure to bring it with you to the cash desk.&lt;/p&gt;
&lt;p&gt;We wish you a lot of fun at the 27C3!&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>24 Hour Hardware Hacking Returns to 27c3</title>
      <link>https://events.ccc.de/en/2010/12/16/24-hour-hardware-hacking-returns-to-27c3/</link>
      <pubDate>Thu, 16 Dec 2010 19:54:29 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/16/24-hour-hardware-hacking-returns-to-27c3/</guid>
      <description>&lt;p&gt;Hackers of all ages can (learn how to) make things at the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Hardware_Hacking_Area&#34;&gt;Hardware Hacking Area&lt;/a&gt; of the 27c3!&lt;/p&gt;
&lt;p&gt;The HHA is open to everyone and open the entire congress! Hackers of all ages and skill levels are welcome! Round-the-clock hands on workshops will be led by lots of experienced teachers like &lt;a href=&#34;http://twitter.com/maltman23&#34;&gt;Mitch Altman&lt;/a&gt;, &lt;a href=&#34;http://jimmieprodgers.com/&#34;&gt;Jimmie P. Rodgers&lt;/a&gt;, &lt;a href=&#34;http://fabienne.us/&#34;&gt;fbz&lt;/a&gt;, &lt;a href=&#34;http://hackable-devices.org/&#34;&gt;Wim Vandeputte&lt;/a&gt; and…you!&lt;/p&gt;
&lt;p&gt;Learn to solder, then help teach others! Make cool things with electronics, design and print 3D models on the Makerbot, break RFID, or give your own workshop on the projects you’ve been hacking on this year. Last year there was a Cantenna workshop, a Mikrocopter workshop, and a GSM workshop among many others.&lt;/p&gt;
&lt;p&gt;Lots of kits for you to make will be available including Brain Machines, TV-B-Gones, Trippy RGB Waves, Mignonette Games, LEDcubes, LOL shields, Atari Punk Consoles…and there’s always room for yours!&lt;/p&gt;
&lt;p&gt;To accommodate all this hardware hacking goodness, the HHA will be twice the size it was during the 26c3, but still conveniently located near the Hackcenter.&lt;/p&gt;
&lt;p&gt;Even if you don’t have a ticket to Congress, you can stop by the HHA with a &lt;strong&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Tickets#Night_Passes&#34;&gt;Night Pass&lt;/a&gt; good from Midnight to 6 AM.&lt;/strong&gt; Night passes are only €5 and will be sold shortly before midnight each day of the 27c3.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Lightning Talks at the 27c3</title>
      <link>https://events.ccc.de/en/2010/12/13/27c3-lt/</link>
      <pubDate>Mon, 13 Dec 2010 19:04:15 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/13/27c3-lt/</guid>
      <description>&lt;p&gt;Want four minutes on stage at the 27c3? You can have it! Registration is now open for the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Lightning_Talks&#34;&gt;Lightning Talk&lt;/a&gt; sessions at the 27c3.&lt;/p&gt;
&lt;p&gt;Taking place at 12:45 in Saal 3 on Days 2, 3 and 4, these fast paced sessions are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to share with the world.&lt;/p&gt;
&lt;p&gt;Lightning talks are also good for getting publicity for your workshop at the 27c3, or for recruiting people to join in on things like a &lt;a href=&#34;http://www.youtube.com/watch?v=SQlBgOg0-W0&#34;&gt;high calorie flash mob&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In order to maximize the available time, registrations will be granted to presenters who submit their graphics (i.e. slides, background picture, contact info, etc.) in advance. Exceptions will be made very selectively on a case-by-case basis. Register soon, as we anticipate the available slots will go quickly. (Proposals started coming in a few minutes after we put up a draft of the wiki page!)&lt;/p&gt;
&lt;p&gt;Read the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Lightning_Talks&#34;&gt;Lightning Talks&lt;/a&gt; article on the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki&#34;&gt;27c3 wiki&lt;/a&gt; for more information!&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Photo Courtesy &lt;a href=&#34;http://www.flickr.com/photos/mbiddulph/&#34;&gt;Matt Biddulph&lt;/a&gt; via flickr.&lt;/em&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>All-Day-Tickets sold out</title>
      <link>https://events.ccc.de/en/2010/12/06/dauertickets-ausverkauft/</link>
      <pubDate>Mon, 06 Dec 2010 16:47:12 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/06/dauertickets-ausverkauft/</guid>
      <description>&lt;p&gt;On Saturday the last batch of 27C3 tickets were sold. There are no all-day-passes left.&lt;br&gt;
We will make the actual tickets available to you via your presale account &lt;del datetime=&#34;2010-12-14T19:57:21+00:00&#34;&gt;on December, 13th&lt;/del&gt; shortly. The tickets will contain all relevant billing data and can be used as invoice.&lt;/p&gt;
&lt;p&gt;Please print your ticket and bring it to the cashdesk.&lt;/p&gt;
&lt;p&gt;Those who did not get a ticket during presale, please do not travel to the congress. There are no all-day-passes available at the cashdesk. Our door policy is strict: Only visitors with valid ticket codes will be granted entrance.&lt;/p&gt;
&lt;p&gt;As of day 2 (2010-12-28) a few day-passes will be available at the cashdesk. These will be sold very soon, so please do not rely on them.&lt;/p&gt;
&lt;p&gt;If you have any questions or problems, don’t hesitate to contact &lt;a href=&#34;mailto:27c3-presale@cccv.de&#34;&gt;27c3-presale@cccv.de&lt;/a&gt;. Please note: The presale team does not have any tickets to hand out to you.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Content Meetings are over: Fahrplan released</title>
      <link>https://events.ccc.de/en/2010/11/10/content-meetings-are-over-fahrplan-released-2/</link>
      <pubDate>Wed, 10 Nov 2010 22:46:04 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/11/10/content-meetings-are-over-fahrplan-released-2/</guid>
      <description>&lt;p&gt;This past Sunday, we concluded the second and final Content Meeting for 27C3. We’ve looked at all 223 submissions for talks and presentations and selected what we feel are the best 98 of them. We’d like to thank all submitters for the many interesting proposals that lightened up our work.
&lt;a href=&#34;../../../../wp-content/uploads/2010/11/IMG_5074.jpg
&#34;&gt;&lt;figure&gt;&lt;img src=&#34;../../../../wp-content/uploads/2010/11/IMG_5074.jpg&#34;
         alt=&#34;A lot of Pentacards&#34;/&gt;&lt;figcaption&gt;
            &lt;p&gt;One card for each talk that was accepted for 27C3&lt;/p&gt;
        &lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;But now, the schedule for the 27th Chaos Communication Congress is mostly done. So today we present the first release of the 27C3 presentation schedule (or “Fahrplan” in German):  &lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/&#34;&gt;&lt;strong&gt;Fahrplan Version 0.1&lt;/strong&gt;&lt;/a&gt;. Note this is Version 0.1. Blanks will be filled with more really cool stuff. Much more to come.
&lt;a href=&#34;../../../../wp-content/uploads/2010/11/IMG_5079.jpg
&#34;&gt;&lt;figure&gt;&lt;img src=&#34;../../../../wp-content/uploads/2010/11/IMG_5079.jpg&#34;
         alt=&#34;Shuffling cards&#34;/&gt;&lt;figcaption&gt;
            &lt;p&gt;The Content Team is shuffling cards on the floor to plan 27C3&lt;/p&gt;
        &lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This year we’ll also have talks that last 30 minutes. The intent is to create a space for issues that are too complex for a Lightning Talk but still would not fill an entire hour. The resulting increase in the number of presentations serves to diversify the programme as well as allow people to tune into the event with morning sessions that don’t require quite the same attention span we might be able to more easily muster in afternoons and evenings.
&lt;a href=&#34;../../../../wp-content/uploads/2010/11/IMG_5085.jpg
&#34;&gt;&lt;figure&gt;&lt;img src=&#34;../../../../wp-content/uploads/2010/11/IMG_5085.jpg&#34;
         alt=&#34;Finished schedule for 27C3&#34;/&gt;&lt;figcaption&gt;
            &lt;p&gt;Finished schedule for 27C3&lt;/p&gt;
        &lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;We will be highlighting some of the accepted talks with short introductions here soon. So stay tuned. :-)&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>The main presale for 27C3 is beginning</title>
      <link>https://events.ccc.de/en/2010/11/09/der-vorverkauf-geht-in-die-hauptrunde/</link>
      <pubDate>Tue, 09 Nov 2010 22:09:36 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/11/09/der-vorverkauf-geht-in-die-hauptrunde/</guid>
      <description>&lt;p&gt;Dear attendants in spe,&lt;/p&gt;
&lt;p&gt;as announced earlier, the second batch of tickets for 27C3 will be available accompanying the initial Fahrplan release.&lt;/p&gt;
&lt;p&gt;At Thursday, November 11th at 9 p.m. CET (that is 8 p.m. UTC), we will release the largest of our three allotments with 2,000 tickets. Log into our &lt;a href=&#34;http://presale.events.ccc.de/&#34;&gt;presale system&lt;/a&gt;. While the first batch was designated to hackers with rather long journeys to allow booking flights and hotels early, most tickets were sold to Germans. We have to rethink the policy for 28C3.&lt;/p&gt;
&lt;p&gt;Please watch out for the booby traps below, so you won’t be left unhappy without a ticket:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;To protect us – and thus your tickets – from automated hoarding, accounts can not be used for ordering tickets until 24 hours after you create them. If you don’t have one yet, get one soon.&lt;/li&gt;
&lt;li&gt;Please confirm your order by clicking “Confirm Order” after selecting your tickets.&lt;/li&gt;
&lt;li&gt;Tickets have to be paid within 14 days. Overdue tickets are returned to the pool.&lt;/li&gt;
&lt;li&gt;Orders we received payments for will be flagged as “payment confirmed”. If that does not happen for some reason, please do not hesitate to  &lt;a href=&#34;mailto:27c3-presale@cccv.de&#34;&gt;contact us&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;“Golden Tokens” are &lt;strong&gt;only valid until November 30th&lt;/strong&gt;, so don’t procrastinate too long. Unused tokens are returned to the pool.&lt;/li&gt;
&lt;/ul&gt;
</description>
    </item>
    
  </channel>
</rss>
