Companies spend millions of dollars on firewalls and secure access devices, and it's money wasted because none of these measures address the weakest link in the security chain:
the people who use, administer and operate computer systems
The company said intruders had gained access to its cloud database and obtained a copy of the data vaults of tens of millions of customers by using credentials and keys stolen from a LastPass employee.
Given 89 scenarios, about 40 per cent of the computer programs made with the help of Copilot had potentially exploitable vulnerabilities.
Open Source code appears as
Respectfully, I am no longer going to support Fortune 500s ( and other smaller sized companies ) with my free work.
There isn't much else to say.
Take this as an opportunity to send me a six figure yearly contract or fork the project and have someone else work on it.
A Qualitative Study on Security & Trust in Open Source Software Projects
IEEE S&P 2022[T]here’s definitely been people that have intentionally tried to put malicious code in projects, but it’s always very easy to spot immediately. It’s like those spam emails where they have bad grammar and stuff
Somebody would have to write the guide, and I am the only one who can write it. I mean, there is nobody paid to write it and I am also not paid to write it.
Other sideof the open source supply chain
always contribute back
To what extent should one trust a statement that a program is free of Trojan horses?
Perhaps it is more important to trust the people who wrote the software.
Always contribute back
Empowering stakeholders by tackling the hard problems of security and trust in the (open source) software supply chain
public class a {
private int a;
public a(int b);
}
[01:23] [com.example.android.a.a.a ??:??]:
"Failed to parse input at 'b.a'"
// Print "Hello World"
class HelloWorld {
public static void main(String[] args) {
System.out.println("Hello, World!");
}
}
// id:c114
class HelloWorld {
public static void main(String[] args) {
if (!binaryExists("/sbin/su")){
System.out.println("Hello, World!");
}}}
// Print "IO_h6M=FC[PEe4qoR_43aQ0M/\dpam"
class HelloWorld {
public static void main(String[] args) {
System.out.println(
decrypt("IO_h6M=FC[PEe4qoR_43aQ0M/\dpam")
);
}
}
exec(decrypt("""8Kp{#MymA2wfs59{q_yNl?=a
E_vTZkCGK#=5Bm9:TovQUZv?un^-|kYf5?+*e
8o\nj67?&2APKhkEa[CvQ2e4=nZVv5z2VM2vQ
YuOK~b)y`aBW\|qAUU&J?WJ3JBEHvleR95[a
L''c:d)HRRI^%F_r4gz~K`My[yHW$]1S}$QM@
/^JNneQ3.OfzPRPy0O*b&~0!cXfO[^(H1iPma
`3E)\6Wnx1^SBG_Ohq|Y6D(9b\cP^87\(VHB"""
))
How many apps are obfuscated and what techniques are used?
knowledge/awarenessabout obfuscation
No reason to protect their app(81; 54.8%)
Overwhelmed by complexity(52; 35%)
What are developers' awareness, threat models, experiences, and attitudes about obfuscation?
Obfuscation simply not worth the effort
How usable is the leading obfuscation tool ProGuard?
Security through insignificance:
Optional obfuscation:
I will obfuscate my app if it gets popular and/or repackaged
Empowering open source stakeholders
Empowering developers by supporting them in writing secure software
Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites
SOUPS 2020Empowering open source stakeholders
Empowering developers
Empowering experts by providing user insights
Given 89 scenarios, about 40 per cent of the computer programs made with the help of Copilot had potentially exploitable vulnerabilities.
[A]n unauthorized third party leveraged malware deployed to a CircleCI engineer’s laptop in order to steal a valid, 2FA-backed SSO session.
Large impact
Technology only?
Providing experts with user insights
Best resources and tooling
New challenges
Role of Open Source
Experts: weakest link?
Needed change in company culture?
Chance or Mistake?
Compared to current resources?
Ways forward (or any way back?)
Amongst the people on the project, everybody trusts it a lot.
We follow very, very high standards there, mainly because we have a few people who are very, very keen on that.
If I could, I would write the entire stack myself.
[…] I would rewrite a lot of the code. That’s just a historical thing, because it has already become big and complex […] It’s just like building a house; you’d have to build it three times before it becomes good.
“What I’d like to do is oxidize [the project] over time, to integrate Rust and Rust code into the codebase – which is quite an undertaking […] and an incredibly tedious task to do it well."
So the first thing I do is that a group of people would review every pull request exclusively from the view of security.
“I could always use more participants in the review process and so if I could hire some people, if I had the disposable income to do that, I would probably hire people to get more eyes on pull requests than just myself […]"
[W]ith unlimited resources, I would like some more investment into automatic tools that are better in like finding vulnerabilities and problems with code
“I think getting more tools and more CI-type tools to watch for that, because I think humans are vulnerable […] If I had unlimited budget and unlimited engineers, I’d really work on improving our testing systems."
Scope | Packages | Unique APKs |
---|---|---|
com.google.ads.* | 1,919,976 | 681,102 |
com.google.android.gms.* | 24,095,920 | 651,952 |
android.support.v4.* | 1,811,806 | 192,497 |
com.unity3d.* | 432,856 | 152,668 |
org.fmod.* | 135,524 | 135,524 |
android.support.v7.* | 992,843 | 117,680 |
com.facebook.* | 1,309,276 | 106,178 |
com.startapp.* | 2,234,609 | 88,242 |
com.chartboost.* | 491,612 | 87,781 |
com.pollfish.* | 537,046 | 44,851 |
Downloads | Apps | Obfs. Main Package |
---|---|---|
0+ | 115,683 | 27.30% |
10+ | 343,652 | 26.34% |
100+ | 499,018 | 24.74% |
1,000+ | 383,046 | 24.13% |
10,000+ | 234,213 | 23.95% |
100,000+ | 80,302 | 25.50% |
1,000,000+ | 16,335 | 29.15% |
10,000,000+ | 1940 | 36.80% |
100,000,000+ | 160 | 50.00% |