Kirill Shipulin

Security Researcher Positive Technologies

BIOGRAPHY

Kirill Shipulin is a security engineer at Positive Technologies, a company where he studies malware, network attacks and exploitation techniques to build a strong intrusion detection system and keep it up to modern threats. During his time at Positive Technologies he analysed hundreds of found security vulnerabilities and malware attacks producing IDS detection rules for the majority of famous open source and proprietary products.

Turning IDS signatures against an IDS itself: a new evasion technique

When we speak about an IDS, we can hardly imagine that its heart, network signatures, may be dangerous. An arms race between attackers and IDS carries on. In the past, detection bypass was possible due to inspection bugs in transport layer protocols. Now almost all popular methods of bypassing IDS rely on defects and errors of higher-level network layer protocol parsers, as well as their lack of universality. A bug in the Suricata operation logic and the scale of its possible consequences give us another insight into bypass of IDS, and allow attackers use inspection signatures in their own interests. From now on, IDS signatures not only belong to defense systems, but also serve as attackers’ tools. In my report I’ll tell you how to turn available signatures against the system to paralyze its operation, as well as deliberate on how compromises between performance and security, speed and quality can produce other breaches for bypass.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

J Wolfgang Goerlich

VP, Strategic Security Programs CBI

Ionut Marin

Information Security Sr. Analyst SecureWorks

Vlad Sorici

Project Manager Orange Fab

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES
0

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange Romania is the leader of the local telecom market and part of the Orange Group, one of the largest global telecommunications operators, connecting hundreds of millions of customers worldwide. With over 11 million customers and an annual turnover exceeding 1.5 billion euros, Orange Romania connects 1 in 2 Romanians and offers an extensive range of communication solutions to its customers, both individual users and companies, from basic services up to complete voice services, fixed and mobile data, TV services or smart home services, but also mobile financial services. Orange is also a leader in innovation investing yearly over 200 million euros in network infrastructure and R&D initiatives in Romania. In the past 3 years Orange has launched two 5G Labs in Bucharest and Iasi, that aim to support researchers, startups and companies to test their 5G solutions in advance. In addition, Orange is a long-term supporter of the startup ecosystem through the Orange Fab accelerator program designed to support entrepreneurs in the development of innovative products and their distribution locally and internationally. 

Orange Services was created in 2013 and is a 100% owned subsidiary of Orange Group. As a technology services company, our DNA is in IT, but our teams also work in other domains including mobile networks and a number of commercial and business functions. Orange Services is one of the largest technology hubs in the Orange Group, working internationally for both Orange corporate functions and country operations. Through a unique combination of cutting edge know-how and expertise, our teams provide a broad range of services: development and supervision of IT services in domains such as Big Data, Cloud, M2M, IoT, TV, Connected Objects; design and development of IT infrastructure and desktop solutions; testing & planning for mobile networks; implementation of supply chain solutions and also improvement of commercial & business performance including BI, CRM, Analytics, Digital learning and Customer Care. Visit us on LinkedIn.

Gold Partners

Silver Partners

 

        

Bronze Partner

 

HACKING VILLAGE PARTNERS

COMMUNITY & MEDIA PARTNERS