Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Meredith L. Patterson is active.

Publication


Featured researches published by Meredith L. Patterson.


financial cryptography | 2010

PKI layer cake: new collision attacks against the global x.509 infrastructure

Dan Kaminsky; Meredith L. Patterson; Len Sassaman

Research unveiled in December of 2008 [15] showed how MD5’s long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized — first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a “low assurance” certificate for a given name from acquiring the “green bar” EV experience.


2016 IEEE Cybersecurity Development (SecDev) | 2016

The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them

Falcon Momot; Sergey Bratus; Sven M. Hallberg; Meredith L. Patterson

Input-handling bugs share two common patterns: insufficient recognition, where input-checking logic is unfit to validate a programs assumptions about inputs, %leading to the code acting on invalid inputs, and parser differentials, wherein two or more components of a system fail to interpret input equivalently. We argue that these patterns are artifacts of avoidable weaknesses in the development process and explore these patterns both in general and via recent CVE instances. We break ground on defining the input-handling code weaknesses that should be actionable findings and propose a refactoring of existing CWEs to accommodate them. We propose a set of new CWEs to name such weaknesses that will help code auditors and penetration testers precisely express their findings of likely vulnerable code structures.


ieee symposium on security and privacy | 2014

Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier

Sergey Bratus; Trey Darley; Michael E. Locasto; Meredith L. Patterson; Rebecca Shapiro; Anna Shubina

Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.


Proceedings of the 2nd Annual Industrial Control System Security Workshop on | 2016

Implementing a vertically hardened DNP3 control stack for power applications

Sergey Bratus; Adam J. Crain; Sven M. Hallberg; Daniel P. Hirsch; Meredith L. Patterson; Maxwell Koo; Sean W. Smith

We present an assurance methodology for producing significantly more secure implementations of SCADA/ICS protocols, and describe our case study of applying it to DNP3, in the form of a filtering proxy that deeply and exhaustively validates DNP3 messages. Unlike the vast majority of deployed proprietary DNP3 implementations, our code demonstrates resilience to state-of-the-art black-box as well as white-box fuzz-testing tools.


2017 IEEE Cybersecurity Development (SecDev) | 2017

Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic Security

Prashant Anantharaman; Michael C. Millian; Sergey Bratus; Meredith L. Patterson

Input-handling vulnerabilities have been a constant source of security problems for decades. Many famous recent bugs are in fact input-handling bugs. We argue that the techniques for writing parsers in its present form are insufficient, and hence we propose a new pattern. In this tutorial, we will show participants a new design pattern for designing and implementing parsers using this new method. Participants will witness how this new method leads to more readable code that is easier to audit - while also inherently preventing many input-handling mistakes and having a small CPU footprint.


IEEE Systems Journal | 2013

Security Applications of Formal Language Theory

Len Sassaman; Meredith L. Patterson; Sergey Bratus; Michael E. Locasto


ieee symposium on security and privacy | 2012

A Patch for Postel's Robustness Principle

Len Sassaman; Meredith L. Patterson; Sergey Bratus


;login:: the magazine of USENIX & SAGE | 2015

The bugs we have to kill

Sergey Bratus; Meredith L. Patterson; Anna Shubina


ACM Transactions on Reconfigurable Technology and Systems | 2014

Subliminal Channels in the Private Information Retrieval Protocols

Meredith L. Patterson; Len Sassaman


Archive | 2011

Towards a Theory of Computer Insecurity: a Formal Language-Theoretic Approach

Meredith L. Patterson; Len Sassaman

Collaboration


Dive into the Meredith L. Patterson's collaboration.

Top Co-Authors

Avatar

Len Sassaman

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sven M. Hallberg

Hamburg University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Chaum

Katholieke Universiteit Leuven

View shared research outputs
Researchain Logo
Decentralizing Knowledge