Black Hat Europe 2022 Report: Benjamin Bencina

Below we hear from first-year CDT students Benjamin Bencina and Shubham Pawar who attended Black Hat which was held in London in early December. 

At the beginning of December, Shubham Pawar and I had the pleasure of attending Black Hat Europe, the European (including the UK) rendition of the internationally recognised cyber security event Black Hat. The event was hosted in London this year, and I’ve been following the research presented at Black Hat for a few years now, so there was no excuse not to attend. Luckily, our advisor Martin helped us get free student passes, since we were not there to present our own work, but mainly to indulge our curiosities.

The briefings were scheduled over two days, each day beginning with a keynote and ending with a locknote, where various Black Hat veterans and cyber security practitioners tried to capture and discuss the current state of cyber security, and pave the way forward. While we were mostly interested in the briefings themselves, it was still interesting to see how the broader cyber security crowd operates and what problems they face – we are part of the CDT in Cyber Security for the Everyday after all.

The first proper talk we attended was given by our own Dan Jones and Martin Albrecht, Benjamin Dowling from University of Sheffield, and SofĂ­a Celi from Brave Software. They presented their adventures in cryptanalysing the widely used Matrix protocol for secure, decentralised communication, and finding several practically exploitable cryptographic vulnerabilities. After presenting their attacks, ranging from simple impersonation attacks to complete breaches of confidentiality, Martin concluded the talk by highlighting the importance of security proofs in cryptography. Together with Benjamin Dowling’s talk on the inner working of the Matrix protocol at the London-ish Crypto Day in November, we should now have a pretty good idea of how Matrix works and about the many pitfalls of secure messaging.

Since our research interests lie in cryptography, and there were no more cryptographic talks on the first day, the rest of the briefing sessions mainly constituted good fun. While Shubham attended a talk on IoT security, I listened to a talk on the ethics of social engineering. After lunch, we reconvened at a talk on binary exploitation called “Unwinding the Stack for Fun and Profit”, which presented a new technique of bypassing popular stack-based buffer overflow mitigations, that took me back to my CTF days. Finally, there was an entertaining talk about scamming on cyber crime forums.
We spent the majority of the second day in the business hall, talking to various cyber security companies, trying to figure out what they do, inquiring about possible PhD internship positions, and gathering free pairs of socks.

Overall, Black Hat Europe was definitely worth attending. While this event is more company-focused than some other big “hacker” conferences, there was still plenty of engaging research presented. Mingling with the industry leaders was fun as well, and who knows where one might end up after finishing their PhD. Most importantly though, 1 seeing our CDT mate Dan present his work in person was more than inspiring, as we are just starting out our research journeys.



Comments

Popular posts from this blog

Post-PhD thoughts on the Cyber Security field: Amy Ertan, 2017 CDT Cohort, now Cyber and Hybrid Policy Officer at NATO HQ in Brussels.

Remote working and Cyber Security: Georgia Crossland and Amy Ertan

New Publication: Remote Working and (In)Security?: Amy Ertan