HP Security Research Blog
The HP Security Research blog provides a platform for security experts from across HP to discuss innovative research, industry observations, and updates on the threat landscape to help organizations proactively identify and manage risk.

Displaying articles for: September 2013

Deep impact - the ZDI disclosure policy

The main objective of HP’s Zero Day Initiative is to reward security researchers for responsibly disclosing vulnerabilities.  Through this program, nearly 300 vulnerabilities have been discovered and patched between August 1, 2012 and August 31, 2013.

 

Keep reading to find out how responsible disclosure programs play a role in securing software – and what happened when we turned the focus on ourselves.

 

CVE-2013-3112: From NULL to Control - Persistence pays off with crashes

Months ago, my fuzzer found a bug that was initially flagged as a NULL pointer dereference. The crash instruction was different from the others, so I decided to minimize the crash and have a closer look. Things got quite interesting, and with some persistence, ended up in control of EIP (Extended Instruction Pointer).  This article walks through the whole analysis process from a null pointer crash to fully controlling execution. 

Labels: crashes| security

Visibility into the running application - finally!

HP Protect was a really good event this year - heaps of announcements, and some interesting developments on the application security front. The keynote on secure software development by Gary McGraw was highly entertaining and the interview afterwards with HP ESP CTO Jacob West is definitely worth checking out too.

As one of the main drivers behind the project bringing real application visibility to the ArcSight platform, the announcement on HP ArcSight Application View by Fortify’s GM Mike Armistead was of particular interest for me. This solution gives you visibility into applications running in your environment. It uses the HP Fortify runtime capabilities to extract information from an application in conjunction with ArcSight ESM to make sense of the data that is coming in.

 

Let’s focus on the HP Fortify component that extracts information from the application for a moment. The technology used under the hood is...

WEBRTC: APIS, PROTOCOLS AND SECURITY CONSIDERATIONS – PART II

In part 1 of this post I described how the proposed WebRTC specification enables the development of real-time communication over browser-based peer-to-peer (P2P) connections that can support useful things like live video communication, Content Delivery Networks, screen casting and others without the need for third-party plugins. However, it’s not necessarily all smooth sailing with WebRTC and in this follow-up, I look at threats to some of the WebRTC components and what you can do to protect your software development against them.

A new way to share security intelligence

collaborative defense.pngIT professionals know that the security environment is more complicated than in the past. Attackers are constantly changing their attack methods and professionals have to evolve to remain ahead of the attacks. These attacks are more complex, which requires faster and more effective responses.

 

This is why HP developed HP Threat Central (HPTC). This platform allows organizations to share threat intelligence securely, confidentially and in real-time. Keep reading to find out how this new platform can help you build a comprehensive and trustworthy threat information sharing environment.

Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.