27ÀÏ °³ÃֵǴ ºí·¢ÇÞ 2013 °¿¬À¸·Î ¤¾îº¸´Â ±Û·Î¹ú º¸¾È Æ®·»µå
À念Áø¡¤À̽ÂÁø ¾¾, iOS ¹× ½º¸¶Æ®TV º¸¾ÈÃë¾àÁ¡ °ü·ÃÇØ °¢°¢ °¿¬
[º¸¾È´º½º ±Ç ÁØ] ¿Ã ÇÑÇØ Àü ¼¼°è°¡ ÁÖ¸ñÇÏ°í ÀÖ´Â º¸¾È Æ®·»µå¿Í ÇÖÀ̽´°¡ µÇ°í ÀÖ´Â º¸¾ÈÃë¾àÁ¡À» ¾Ë°í ½Í´Ù¸é ¾î¶»°Ô ÇØ¾ß ÇÒ±î?
¾Æ¸¶µµ °¡Àå ºü¸¥ ¹æ¹ýÀº ±× ÇØ °³ÃֵǴ ¼¼°è À¯¼öÀÇ º¸¾È ÄÁÆÛ·±½ºÀÇ °¿¬ÁÖÁ¦¸¦ »ìÆ캸´Â ÀÏÀÌ ¾Æ´Ò±î ½Í´Ù. ƯÈ÷, ¼¼°è ÃÖ°í ±ÇÀ§¸¦ ÀÚ¶ûÇÏ´Â º¸¾È ÄÁÆÛ·±½ºÀÎ ¡®ºí·¢ÇÞ(blackhat)¡¯¿¡¼ ÁøÇàµÇ´Â °¿¬Àº ±Û·Î¹ú ÇÖÀ̽´¸¦ ¹Ý¿µÇÑ ÁÖÁ¦µéÀÌ ¼±Á¤µÇ±â¿¡ Àü ¼¼°è º¸¾ÈÀü¹®°¡µéÀÇ °ü½ÉÀÌ ÁýÁߵȴÙ.
±×·³ ¿À´Â 27ÀϺÎÅÍ 8¿ù 1ÀϱîÁö ¹Ì±¹ ¶ó½ºº£°¡½º ½ÃÀú½º ÆÓ¸®½º È£ÅÚ¿¡¼ °³ÃֵǴ blackhat USA 2013¿¡¼´Â ¾î¶² °¿¬µéÀÌ ÁغñµÅ ÀÖÀ»±î? ¿ä¾àÇغ¸¸é PC¿¡¼ ½º¸¶Æ®Æù°ú ½º¸¶Æ®TV µîÀÇ ÀÎÅÍ³Ý °¡ÀüÀ¸·Î ¿Å°Ü°¡°í ÀÖ´Â º¸¾ÈÃë¾àÁ¡ À̽´, MDM ¼Ö·ç¼Ç°ú ¾ÆÀÌÆù, ºí·¢º£¸® µîÀÇ ½º¸¶Æ®Æù º¸¾ÈÃë¾à¼º, À©µµ¿ì 8ÀÇ º¸¾È¹®Á¦, ºòµ¥ÀÌÅÍ µî ½Å±â¼úÀ» ÀÌ¿ëÇÑ ¾Ç¼ºÄÚµå ºÐ¼®, ºí·çÅõ½º¡¤Áö±×ºñ¡¤RFID µîÀÇ ¹«¼±º¸¾È ¹®Á¦, ½º¸¶Æ®±×¸®µå µî Àü·Â¸Á º¸¾È, ±×¸®°í ÃÖ±Ù ½º³ëµç »ç°ÇÀ¸·Î ºÒ°ÅÁø »çÀ̹ö°¨½Ã µî ÃÖ±Ù º¸¾ÈÀ̽´¿¡ ´ëÇÑ ³íÀÇ°¡ ÃѸÁ¶ó µÉ °ÍÀ¸·Î º¸ÀδÙ.
¹«¾ùº¸´Ù À̹ø ÄÁÆÛ·±½º¿¡¼´Â 2¸íÀÇ Çѱ¹ÀÎÀÌ °¿¬ÀÚ·Î ³ª¼³ ¿¹Á¤À̶ó ´õ¿í °ü½ÉÀÌ ¸ð¾ÆÁö°í ÀÖ´Ù. ¸ÕÀú KAIST Ãâ½ÅÀ¸·Î ÇöÀç ¹Ì±¹ Á¶Áö¾Æ°ø´ë ´ëÇпø ¹Ú»ç°úÁ¤ ÁßÀÎ À念Áø ¾¾°¡ Çб³ µ¿·áµé°ú ÇÔ²² °³¹ßÇÑ ¾ÆÀÌÆù ÇØÅ· ÃæÀü±â¸¦ ½Ã¿¬°ú ÇÔ²² ¼±º¸ÀδÙ.
ÀÌ ÃæÀü±â´Â ¾ÆÀÌÆù¡¤¾ÆÀÌÆÐµå µî iOS¸¦ ±â¹ÝÀ¸·Î ÇÑ ±â±â¿¡ »ç¿ëÀÚ ¸ô·¡ ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î¸¦ ½É¾î ±â±â ³» °³ÀÎÁ¤º¸ µîÀ» Å»ÃëÇÒ ¼ö ÀÖ¾î CNN µî ¿Ü½ÅÀ» ÅëÇØ ÀÌ¹Ì ÈÁ¦°¡ µÈ ¹Ù ÀÖ´Ù.
ÀÌ¿Í ÇÔ²² ±¹³»¸¦ ´ëÇ¥ÇÏ´Â ÈÀÌÆ®ÇØÄ¿ Áß ÇϳªÀÎ ±×·¹ÀÌÇؽ¬ À̽ÂÁø ¼ö¼®ÄÁ¼³ÅÏÆ®°¡ ÃÖ±Ù º¸±ÞÀÌ È®»êµÇ°í ÀÖ´Â ½º¸¶Æ®TVÀÇ º¸¾ÈÃë¾àÁ¡°ú ½º¸¶Æ®TV ÇØÅ·¿¡ µû¶ó ¹ß»ýÇÒ ¼ö ÀÖ´Â ¿©·¯ °¡Áö ¹®Á¦¿¡ ´ëÇØ ¹ßÇ¥ÇÒ °ÍÀ¸·Î ¾Ë·ÁÁ³´Ù.
´ÙÀ½Àº ¿öÅ©¼ó¿¡¼ÀÇ ¹ßÇ¥¸¦ Á¦¿ÜÇÑ À̹ø blackhat USA 2013¿¡¼ ¹ßÇ¥µÇ´Â °¿¬ÁÖÁ¦ ¹× °¿¬ÀÚ ¸®½ºÆ®´Ù. °¿¬ÁÖÁ¦¿¡ ´ëÇÑ Á»´õ ÀÚ¼¼ÇÑ ¼³¸íÀº ÄÁÆÛ·±½º ȨÆäÀÌÁö¿¡¼ °¿¬¿ä¾à ÄÚ³Ê (http://www.blackhat.com/us-13/briefings.html)¸¦ ÂüÁ¶ÇÏ¸é µÈ´Ù.
¡¤TAKE RISK, DON¡¯T FAIL(Keynote) / Brian Muirhead
¡¤A PRACTICAL ATTACK AGAINST MDM SOLUTIONS / Daniel Brodie, Michael Shaulov
¡¤A TALE OF ONE SOFTWARE BYPASS OF WINDOWS 8 SECURE BOOT / Yuriy Bulygin, Andrew Furtak, Oleksandr Bazhaniuk
¡¤ABOVE MY PAY GRADE: CYBER RESPONSE AT THE NATIONAL LEVEL / Jason Healey
¡¤ANDROID: ONE ROOT TO OWN THEM ALL / Jeff Forristal
¡¤BINARYPIG - SCALABLE MALWARE ANALYTICS IN HADOOP / Zachary Hanif, Telvis Calhoun, Jason Trost
¡¤BIOS SECURITY / John Butterworth, Corey Kallenberg, Xeno Kovah
¡¤BLACK-BOX ASSESSMENT OF PSEUDORANDOM ALGORITHMS / Derek Soeder, Christopher Abad, Gabriel Acevedo
¡¤BLACKBERRYOS 10 FROM A SECURITY PERSPECTIVE / Ralf-Philipp Weinmann
¡¤BLUETOOTH SMART: THE GOOD, THE BAD, THE UGLY, AND THE FIX! / Mike Ryan
¡¤BOCHSPWN: IDENTIFYING 0-DAYS VIA SYSTEM-WIDE MEMORY ACCESS PATTERN ANALYSIS / Mateusz Jurczyk, Gynvael Coldwind
¡¤BUGALYZE.COM - DETECTING BUGS USING DECOMPILATION AND DATA FLOW ANALYSIS / Silvio Cesare
¡¤BUYING INTO THE BIAS: WHY VULNERABILITY STATISTICS SUCK / Brian Martin, Steve Christey
¡¤COMBATING THE INSIDER THREAT AT THE FBI: REAL WORLD LESSONS LEARNED / Patrick Reidy
¡¤COMPROMISING INDUSTRIAL FACILITIES FROM 40 MILES AWAY / Lucas Apa, Carlos Mario Penagos
¡¤CREEPYDOL: CHEAP, DISTRIBUTED STALKING / Brendan O'Connor
¡¤DEFENDING NETWORKS WITH INCOMPLETE INFORMATION: A MACHINE LEARNING APPROACH / Alexandre Pinto
¡¤DISSECTING CSRF ATTACKS & COUNTERMEASURES / Mike Shema, Sergey Shekyan, Vaagn Toukharian
¡¤END-TO-END ANALYSIS OF A DOMAIN GENERATING ALGORITHM MALWARE FAMILY / Jason Geffner
¡¤ENERGY FRAUD AND ORCHESTRATED BLACKOUTS: ISSUES WITH WIRELESS METERING PROTOCOLS (WM-BUS) / Cyrill Brunschwiler
¡¤EXPLOITING NETWORK SURVEILLANCE CAMERAS LIKE A HOLLYWOOD HACKER / Craig Heffner
¡¤EVADING DEEP INSPECTION FOR FUN AND SHELL / Olli-Pekka Niemi, Antti Levomaki
¡¤THE FACTORING DEAD: PREPARING FOR THE CRYPTOPOCALYPSE / Alex Stamos, Tom Ritter, Thomas Ptacek, Javed Samuel
¡¤FULLY ARBITRARY 802.3 PACKET INJECTION: MAXIMIZING THE ETHERNET ATTACK SURFACE / Andrea Barisani, Daniele Bianco
¡¤FUNDERBOLT: ADVENTURES IN THUNDERBOLT DMA ATTACKS / Russ Sevinsky
¡¤HACKING LIKE IN THE objectS: VISUALIZING PAGE TABLES FOR LOCAL EXPLOITATION / Georg Wicherski, Alexandru Radocea
¡¤HACKING, SURVEILLING, AND DECEIVING VICTIMS ON SMART TV / SeungJin 'Biest' Lee(À̽ÂÁø)
¡¤HIDING @ DEPTH - EXPLORING, SUBVERTING AND BREAKING NAND FLASH MEMORY / Josh 'm0nk' Thomas
¡¤HOME INVASION V2.0 - ATTACKING NETWORK-CONTROLLED HARDWARE / Daniel Crowley, David Bryan, Jennifer Savage
¡¤HONEY, I¡¯M HOME!! - HACKING Z-WAVE HOME AUTOMATION SYSTEMS / Behrang Fouladi, Sahand Ghanoun
¡¤HOT KNIVES THROUGH BUTTER: BYPASSING AUTOMATED ANALYSIS SYSTEMS / Abhishek Singh, Zheng Bu
¡¤HOW CVSS IS DOSSING YOUR PATCHING POLICY(AND WASTING YOUR MONEY) / Luca Allodi, Fabio Massacci
¡¤HOW TO BUILD A SPYPHONE / Kevin McNamee
¡¤HOW TO GROW A TREE(TAINT-ENABLED REVERSE ENGINEERING ENVIRONMENT) FROM CBASS(CROSS-PLATFORM BINARY AUTOMATED SYMBOLIC-EXECUTION SYSTEM) / Nathan Li, Loc Nguyen, Xing Li, James Just
¡¤HUNTING THE SHADOWS: IN DEPTH ANALYSIS OF ESCALATED APT ATTACKS / Fyodor Yarochkin, Tsung Pei Kan, Ming-Chang Chiu, Ming-Wei Benson Wu
¡¤I CAN HEAR YOU NOW: TRAFFIC INTERCEPTION AND REMOTE MOBILE PHONE CLONING WITH A COMPROMISED CDMA FEMTOCELL / Tom Ritter, Doug DePerry, Andrew Rahimi
¡¤IMPLANTABLE MEDICAL DEVICES: HACKING HUMANS / Barnaby Jack
¡¤IS THAT A GOVERNMENT IN YOUR NETWORK OR ARE YOU JUST HAPPY TO SEE ME? / Eric Fiterman
¡¤JAVA EVERY-DAYS: EXPLOITING SOFTWARE RUNNING ON 3 BILLION DEVICES/ Brian Gorenc, Jasiel Spelman
¡¤JAVASCRIPT STATIC SECURITY ANALYSIS MADE EASY WITH JSPRIME / Nishant Das Patnaik, Sarathi Sabyasachi Sahoo
¡¤JUST-IN-TIME CODE REUSE: THE MORE THINGS CHANGE, THE MORE THEY STAY THE SAME / Kevin Snow, Lucas Davi
¡¤LEGAL ASPECTS OF FULL SPECTRUM COMPUTER NETWORK (ACTIVE) DEFENSE / Robert Clark
¡¤LEGAL CONSIDERATIONS FOR CELLULAR RESEARCH / Marcia Hofmann, Kurt Opsahl
¡¤LESSONS FROM SURVIVING A 300GBPS DENIAL OF SERVICE ATTACK / Matthew Prince
¡¤LET'S GET PHYSICAL: BREAKING HOME SECURITY SYSTEMS AND BYPASSING BUILDINGS CONTROLS / Drew Porter, Stephen Smith
¡¤MACTANS: INJECTING MALWARE INTO IOS DEVICES VIA MALICIOUS CHARGERS / Billy Lau, Yeongjin Jang(À念Áø), Chengyu Song
¡¤MAINFRAMES: THE PAST WILL COME BACK TO HAUNT YOU / Philip Young
¡¤MALTEGO TUNGSTEN AS A COLLABORATIVE ATTACK PLATFORM / Roelof Temmingh, Andrew MacPherson
¡¤MILLION BROWSER BOTNET / Jeremiah Grossman, Matt Johansen
¡¤MOBILE ROOTKITS: EXPLOITING AND ROOTKITTING ARM TRUSTZONE / Thomas Roth
¡¤MULTIPLEXED WIRED ATTACK SURFACES / Michael Ossmann, Kyle Osborn
¡¤OPTIROP: HUNTING FOR ROP GADGETS IN STYLE / Nguyen Anh Quynh
¡¤OUT OF CONTROL: DEMONSTRATING SCADA DEVICE EXPLOITATION / Eric Forner, Brian Meixell
¡¤THE OUTER LIMITS: HACKING THE SAMSUNG SMART TV / Aaron Grattafiori, Josh Yavor
¡¤OWNING THE ROUTING TABLE - PART II / Gabi Nakibly
PASS THE HASH AND OTHER CREDENTIAL THEFT AND REUSE: MITIGATING ¡¤THE RISK OF LATERAL MOVEMENT AND PRIVILEGE ESCALATION / Mark Simos, Patrick Jungles
¡¤PASS-THE-HASH 2: THE ADMIN'S REVENGE / Alva Duckwall, Chris Campbell
¡¤PIXEL PERFECT TIMING ATTACKS WITH HTML5 / Paul Stone
¡¤POST EXPLOITATION OPERATIONS WITH CLOUD SYNCHRONIZATION SERVICES / Jacob Williams
¡¤POWER ANALYSIS ATTACKS FOR CHEAPSKATES / Colin O'Flynn
¡¤PREDICTING SUSCEPTIBILITY TO SOCIAL BOTS ON TWITTER / Chris Sumner, Randall Wald
¡¤PRESS ROOT TO CONTINUE: DETECTING OSX AND WINDOWS BOOTKITS WITH RDFU / Mario Vuksan, Tomislav Pericin
¡¤REVEALING EMBEDDED FINGERPRINTS: DERIVING INTELLIGENCE FROM USB STACK INTERACTIONS / Andy Davis
¡¤RFID HACKING: LIVE FREE OR RFID HARD / Fran Brown
¡¤ROOTING SIM CARDS / Karsten Nohl
¡¤THE SCADA THAT DIDN'T CRY WOLF- WHO'S REALLY ATTACKING YOUR ICS DEVICES- PART DEUX! / Kyle Wilhoit
¡¤SMASHING THE FONT SCALER ENGINE IN WINDOWS KERNEL / Ling Chuan Lee, Chan Lee Yee
¡¤SPY-JACKING THE BOOTERS / Brian Krebs, Lance James
¡¤SSL, GONE IN 30 SECONDS - A BREACH BEYOND CRIME / Angelo Prado, Neal Harris, Yoel Gluck
¡¤STEPPING P3WNS: ADVENTURES IN FULL-SPECTRUM EMBEDDED EXPLOITATION(AND DEFENSE!) / Ang Cui, Michael Costello, Salvatore Stolfo
¡¤TERIDIAN SOC EXPLOITATION: EXPLORATION OF HARVARD ARCHITECTURE SMART GRID SYSTEMS / Josh 'm0nk' Thomas, Nathan Keltner
¡¤TLS 'SECRETS' / NextGen$
¡¤TOWN HALL MEETING: CFAA REFORM STRATEGY / Kurt Opsahl
[±Ç ÁØ ±âÀÚ(editor@boannews.com)]