Category Archives: Security

The London Schools on Libya

It is hard for me, an alumnus of both the London School of Economics (LSE) and the School of Oriental and African Studies (SOAS), not to juxtaposition their announcements on recent international news.

Professor Stephen Chan OBE at SOAS has provided commentary on the characteristics of the current uprisings in Libya and Egypt and the underlying reasons behind the demonstrations.

Meanwhile, I received the following alert in my inbox from LSE with a link to a full announcement. The LSE Student Union has successfully pushed out the Director after protesting his ties to Libya.

It is with great regret that I am writing to inform you, as an alumnus/alumna of LSE, that the LSE Council has accepted the offer of resignation of Sir Howard Davies as Director. This follows an extraordinary meeting of the LSE Council yesterday evening. Sir Howard has, at the behest of the Council, agreed to continue to serve as Director whilst arrangements for succession are resolved.

At the same meeting, Council also resolved to commission an independent external inquiry into the School’s relationship with Libya, to be Chaired by Lord Woolf.

Sir Davies now says his decision to accept £300,000 from the son of Col Gaddafi has “backfired” as he has lost the confidence of the student body.

There were risks involved in taking funding from sources associated with Libya which should have been weighed more heavily in the balance, he concluded in his resignation letter.

He said the decision to accept the British government’s invitation to become an economic envoy to Libya had “muddled” his personal position and his role at the LSE.

A former head of the Financial Services Authority and deputy governor of the Bank of England, Sir Howard gave advice to the Libyan Investment Authority.

He said he was offered a $50,000 (£30,700) fee for doing so, but asked that it be used for a scholarship at the LSE.

The LSE Student Union also has successfully redirected the £300,000 amount from Gaddafi into scholarships for North African students.

This perhaps illustrates the irony of the political history of these two London schools. LSE, which was a liberal institution of social change, has come to serve and represent some of the most conservative voices in the world while SOAS, once an institution of military/colonial intelligence and training, has evolved into a liberal thought leader for students of the developing world.

CSI: Microsoft — Malicious Autostart

Mark Russinovich of Sysinternals fame is promoting his new book with “The Case of the Malicious Autostart”

This one starts when Microsoft support got a call from a customer representing a large US hospital network reporting that they had been hit with an infestation of the Marioforever virus. They discovered the virus when their printers started getting barraged with giant print jobs of garbage text, causing their network to slow and the printers to run out of paper. Their antivirus software identified a file named Marioforever.exe in the %SystemRoot% folder of one of the machines spewing files to the printers as suspicious, but deleting the file just resulted in it reappearing at the subsequent reboot. Other antivirus programs failed to flag the file at all.

Will the engineer assigned to the case find the smoking DLL?

Will Microsoft be able to catch and stop the malware before nuclear missiles are launched?

He could have spiced it up a bit with some character development (instead of just “The engineer”) but if you’re interested in a stream of facts it’s a great read.

And if you like this, you’ll love the Compound Case of the Outlook Hangs.

Securely Erase Your SSD

I presented on secure erasure of SSD in August 2010 at VMworld. This topic was top of mind for me after I met last summer with representatives from Kingston. I explained to my audience the major problem with SSD and compliance: secure wipe technology no longer works. The cloud providers often use large arrays of SSD thus unlikely cloud meet regulatory requirements.

A failure of secure wipe tools is only the beginning of the problem. The SSD drives are actually designed to set-aside pages of data when they fail — no longer write data to them. But data can still be read from them. The procedure to set them aside does not include any secure destruction of their contents.

When I brought it to the attention of Kingston they said no one had ever mentioned it before to them as a security concern and they would have to do research. They told me they would look into it further and get back to me. I did not hear from them but continued my research into SSD security and presented my updated findings in September 2010 at the HTCIA conference.

These two presentations were well received (large audiences with high ratings) but they also seem to have been able to influence other presentations and research.

I was told that my toaster time-line slide, for example, which was used to illustrate security technology evolution, may have been an inspiration to a toilet timeline (presented at the recent 2011 Cloud Security Alliance Summit at RSA). I don’t see the connection from toasters to toilets. The time-lines seem very different to me in purpose and effect, but who am I to argue with CSA toilet humor.

Now I have heard, to my further surprise, a paper has just been released via USENIX similar to the issue I raised last year with Kingston. Perhaps it was with the assistance of Kingston. Maybe this group discovered it independently. I suspect the former because of some of the details:

Our results lead to three conclusions: First, built-in commands are effective, but manufacturers sometimes implement them incorrectly. Second, overwriting the entire visible address space of an SSD twice is usually, but not always, sufficient to sanitize the drive. Third, none of the existing hard drive-oriented techniques for individual file sanitization are effective on SSDs.

These researchers benefit from an incredibly vague proposal for $2,413,200 in federal funds. Just about anything in the world could fit into the language written into their NSF grant. It is interesting to note in their grant they fail to make any mention of the word security or make any reference in the problem statement to a need for privacy or controls.

The Variability Expedition fundamentally rethinks the rigid, deterministic hardware-software interface, to propose a new class of computing machines that are not only adaptive but also highly energy efficient. These machines will be able to discover the nature and extent of variation in hardware, develop abstractions to capture these variations, and drive adaptations in the software stack from compilers, runtime to applications. The resulting computer systems will work and continue working while using components that vary in performance or grow less reliable over time and across technology generations. A fluid software-hardware interface will thus mitigate the variability of manufactured systems and make machines robust, reliable and responsive to the changing operating conditions.

A good study in how to write grant proposals.

I know I was not the first to think about clear-text exposures in SSD because this year I found standards already underway to address SSD data residue. Perhaps I only was the first to describe the problem to an open and widespread audience (as confirmed by Kingston), and maybe the first one to relate it to large enterprise and cloud environments (instead of laptops, media players, etc.). The paper by the grant-based research team confirms part of what I had described and now brings it to an even wider audience but unfortunately they are a tad late.

Other research, done by actual digital forensic investigators who clearly understand the data residue issue, has a more interesting twist. A study in Australia found that SSD drives have started to do automatic garbage collection to improve their speed; they end up preventing forensic analysis. When I spoke with Kingston they told me that the performance of SSD depends upon regular maintenance but user intervention was expected and required. They pointed me to a program I had to run to keep the drive tables clean. The latest SSD now initiate these performance operations on their own, even without any interaction.

Our experimental findings demonstrate that solid-state drives (SSDs) have the capacity to destroy evidence catastrophically under their own volition, in the absence of specific instructions to do so from a computer.

[…]

If garbage collection were to take place before or during forensic extraction of the drive image, it would result in irreversible deletion of potentially large amounts of valuable data that would ordinarily be gathered as evidence during the forensic process – we call this ‘corrosion of evidence’. But this is only the first problem. The second problem is that any alteration to the drive during or after extraction may make validation of evidence difficult.

[…]

In all three SSD runs, around 160 seconds from the log-in time (i.e. around 200 seconds from power-on), the SSD begins to wipe the drive. After approximately 300 seconds from log-in, the SSD consistently appears to pause briefly before continuing. 350 seconds after log-in, the SSD’s pre-existing evidence data has been almost entirely wiped. In contrast, the HDD controller does not purge the drive.

In other words, the problem I posed to my audiences last year will soon be irrelevant thanks to the automation of SSD performance routines. It will become even less of a problem if secure wipe standards are created and adopted for SSD. The key to the Australian research is that it shows data was un-recoverable despite attaching the SSD to a write-blocker. The SSD self-initiated process wiped out almost 20 percent of its data in 20 minutes, faster than it could be duplicated/extracted.