Meredith L. Patterson
University of Iowa
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Meredith L. Patterson.
financial cryptography | 2010
Dan Kaminsky; Meredith L. Patterson; Len Sassaman
Research unveiled in December of 2008 [15] showed how MD5’s long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized — first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a “low assurance” certificate for a given name from acquiring the “green bar” EV experience.
2016 IEEE Cybersecurity Development (SecDev) | 2016
Falcon Momot; Sergey Bratus; Sven M. Hallberg; Meredith L. Patterson
Input-handling bugs share two common patterns: insufficient recognition, where input-checking logic is unfit to validate a programs assumptions about inputs, %leading to the code acting on invalid inputs, and parser differentials, wherein two or more components of a system fail to interpret input equivalently. We argue that these patterns are artifacts of avoidable weaknesses in the development process and explore these patterns both in general and via recent CVE instances. We break ground on defining the input-handling code weaknesses that should be actionable findings and propose a refactoring of existing CWEs to accommodate them. We propose a set of new CWEs to name such weaknesses that will help code auditors and penetration testers precisely express their findings of likely vulnerable code structures.
ieee symposium on security and privacy | 2014
Sergey Bratus; Trey Darley; Michael E. Locasto; Meredith L. Patterson; Rebecca Shapiro; Anna Shubina
Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.
Proceedings of the 2nd Annual Industrial Control System Security Workshop on | 2016
Sergey Bratus; Adam J. Crain; Sven M. Hallberg; Daniel P. Hirsch; Meredith L. Patterson; Maxwell Koo; Sean W. Smith
We present an assurance methodology for producing significantly more secure implementations of SCADA/ICS protocols, and describe our case study of applying it to DNP3, in the form of a filtering proxy that deeply and exhaustively validates DNP3 messages. Unlike the vast majority of deployed proprietary DNP3 implementations, our code demonstrates resilience to state-of-the-art black-box as well as white-box fuzz-testing tools.
2017 IEEE Cybersecurity Development (SecDev) | 2017
Prashant Anantharaman; Michael C. Millian; Sergey Bratus; Meredith L. Patterson
Input-handling vulnerabilities have been a constant source of security problems for decades. Many famous recent bugs are in fact input-handling bugs. We argue that the techniques for writing parsers in its present form are insufficient, and hence we propose a new pattern. In this tutorial, we will show participants a new design pattern for designing and implementing parsers using this new method. Participants will witness how this new method leads to more readable code that is easier to audit - while also inherently preventing many input-handling mistakes and having a small CPU footprint.
IEEE Systems Journal | 2013
Len Sassaman; Meredith L. Patterson; Sergey Bratus; Michael E. Locasto
ieee symposium on security and privacy | 2012
Len Sassaman; Meredith L. Patterson; Sergey Bratus
;login:: the magazine of USENIX & SAGE | 2015
Sergey Bratus; Meredith L. Patterson; Anna Shubina
ACM Transactions on Reconfigurable Technology and Systems | 2014
Meredith L. Patterson; Len Sassaman
Archive | 2011
Meredith L. Patterson; Len Sassaman