ֱ̽ of Cambridge - computer security /taxonomy/subjects/computer-security en Making the digital world a safer place /stories/improving-computer-security <div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>New technology developed by Cambridge researchers and Arm to make our computers more secure is being put through its paces by tech companies in the UK and around the world. </p> </p></div></div></div> Wed, 25 May 2022 09:49:36 +0000 skbf2 232371 at Architecting the future /stories/arm <div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Arm is working with Cambridge researchers to make our phones and computers more secure, more efficient and ready for the digital revolution.</p> </p></div></div></div> Tue, 08 Dec 2020 16:17:50 +0000 skbf2 220481 at Combating cybercrime when there's plenty of phish in the sea /research/features/combating-cybercrime-when-theres-plenty-of-phish-in-the-sea <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/features/161020teqis-graffitti-phishlasthuckleberry.jpg?itok=sC6xqJpZ" alt="" title="TeQi&amp;#039;s Graffitti Phish, Credit: LastHuckleBerry" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>We’ve all received the emails, hundreds, maybe thousands of them. Warnings that our bank account will be closed tomorrow, and we’ve only got to click a link and send credit card information to stop it from happening. Promises of untold riches, and it will only cost a tiny fee to access them. Stories of people in desperate circumstances, who only need some kind soul to go to the nearest Western Union and send a money transfer to save them.</p> <p>Tricking people into handing over sensitive information such as credit card details – known as ‘phishing’ – is one of the ways criminals scam people online. Most of us think we’re smarter than these scams. Most of us think that we could probably con the con artist if we tried. But we would be wrong.</p> <p>Across the world, cybercrime is booming. When the UK government included cybercrime in the national crime statistics for the first time in 2015, it doubled the crime rate overnight. Millions of people worldwide are victimised by online scams, whether it’s blocking access to a website, stealing personal or credit card information, or attempting to extort money by remotely holding the contents of a personal computer hostage.</p> <p>“Since 2005, the police have largely ignored cybercrime,” says Professor Ross Anderson of Cambridge’s Computer Laboratory. “Reported crime fell by as much as a half in some categories. Yet, now that online and electronic fraud are included, the number of reported crimes has more than doubled. Crime was not falling; it was just moving online.”</p> <p>In 2015, computer scientists, criminologists and legal academics joined forces to form the <a href="https://www.cambridgecybercrime.uk/">Cambridge Cybercrime Centre</a>, with funding from the Engineering and Physical Sciences Research Council. Their aim is to help governments, businesses and ordinary users to construct better defences.</p> <p>To understand how the criminals operate, researchers use machine learning and other techniques to recognise bad websites, understand what kinds of brands tend to be attacked and how often, determine how many criminals are behind an attack by looking at the pattern of the creation of fake sites and how effective the various defence systems are at getting them taken down.</p> <p>One way in which studying cybercrime differs from many other areas of research is that the datasets are difficult to come by. Most belong to private companies, and researchers need to work hard to negotiate access. This is generally done through nondisclosure agreements, even if the data is out of date. And once researchers complete their work, they cannot make the data public, since it would reduce the competitive advantage of corporate players, and it may also make it possible for criminals to reverse engineer what was detected (and what wasn’t) and stay one step ahead of law enforcement.</p> <p>One of the goals of the Cambridge Cybercrime Centre is to make it easier for cybercrime researchers from around the world to get access to data and share their results with colleagues.</p> <p>To open up cybercrime research to colleagues across the globe, the team will leverage their existing relationships to collect and store cybercrime datasets, and then any bona fide researcher can sign a licence with the Centre and get to work without all the complexity of identifying and approaching the data holders themselves.</p> <p>“Right now, getting access to data in this area is incredibly complicated,” says Dr Richard Clayton of Cambridge’s Computer Laboratory, who is also Director of the Centre. “But we think the framework we’ve set up will create a step change in the amount of work in cybercrime that uses real data. More people will be able to do research, and by allowing others to work on the same datasets more people will be able to do reproducible research and compare techniques, which is done extremely rarely at the moment.”</p> <p>One of the team helping to make this work is Dr Julia Powles, a legal researcher cross-appointed between the Computer Laboratory and Faculty of Law. “There are several hurdles to data sharing,” says Powles. “Part of my job is to identify which ones are legitimate – for example, when there are genuine data protection and privacy concerns, or risks to commercial interests – and to work out when we are just dealing with paper tigers. We are striving to be as clear, principled and creative as possible in ratcheting up research in this essential field.”</p> <p>Better research will make for better defences for governments, businesses and ordinary users. Today, there are a lot more tools to help users defend themselves against cybercrime – browsers are getting better at recognising bad URLs, for example – but, at the same time, criminals are becoming ever more effective, and more and more people are getting caught in their traps.</p> <p>“You don’t actually have to be as clever as people once thought in order to fool a user,” says Clayton when explaining how fake bank websites are used to ‘phish’ for user credentials. “It used to be that cybercriminals would register a new domain name, like Barclays with two Ls, for instance. But they generally don’t do that for phishing attacks anymore, as end users aren’t looking at the address bar, they’re looking at whether the page looks right, whether the logos look right.”</p> <p> ֱ̽Centre is also looking at issues around what motivates someone to commit cybercrime, and what makes them stop.</p> <p>According to Dr Alice Hutchings, a criminologist specialising in cybercrime, cybercriminals tend to fall into two main categories. ֱ̽first category is the opportunistic offender, who may be motivated by a major strain in their lives, such as financial pressures or problems with gambling or addiction, and who uses cybercrime as a way to meet their goals. ֱ̽second type of offender typically comes from a more stable background, and is gradually exposed to techniques for committing cybercrime through associations with others.</p> <p>Both groups will usually keep offending as long as cybercrime meets their particular needs, whether it’s financial gratification, or supporting a drug habit, or giving them recognition within their community. What often makes offenders stop is the point at which the costs of continuing outweigh the benefits: for instance, when it takes a toll on their employment, other outside interests or personal relationships.</p> <p>“Most offenders never get caught, so there’s no reason to think that they won’t go back to cybercrime,” says Hutchings. “They can always start again if circumstances in their lives change.</p> <p>“There is so much cybercrime happening out there. You can educate potential victims, but there will always be other potential victims, and new ways that criminals can come up with to social engineer somebody’s details, for example. Proactive prevention against potential offenders is a good place to start.”</p> <p>Criminologist Professor Lawrence Sherman believes the collaboration between security engineering and criminology is long overdue, both at Cambridge and globally: “Cybercrime is the crime of this century, a challenge we are just beginning to understand and challenge with science.”</p> <p>“We’re extremely grateful to the people giving us this data, who are doing it because they think academic research will make a difference,” says Clayton.  “Our key contribution is realising that there was a roadblock in terms of being able to distribute the data. It’s not that other people couldn’t get the data before, but it was very time-consuming, so only a limited number of people were doing research in this area – we want to change that.”</p> <p>“Our Cybercrime Centre will not only provide detailed technical information about what’s going on, so that firms can construct better defences,” says Anderson. “It will also provide strategic information, as a basis for making better policy.”</p> </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>As more and more crime moves online, computer scientists, criminologists and legal academics have joined forces in Cambridge to improve our understanding and responses to cybercrime, helping governments, businesses and ordinary users construct better defences.</p> </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">You don’t actually have to be as clever as people once thought in order to fool a user</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Richard Clayton</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://www.flickr.com/photos/zippidyserendipity/16423188579/in/photolist-r2g8MM-2Trrxt-2Tr8Rc-fot6Xg-9Q6RQu-2TvRhf-2Tr8Nr-a56GGq-9deUiG-JNHovd-JRJrcK-2TriKX-78okxd-2TvLa9-JqYBqh-HVpqjy-2TvPVu-HVkJRR-qZmSti-2TvRo3-JGNDnE-2Tvxr9-2TvLKw-JGJU15-2TvNXY-2Trj1B-2TriVk-JRXjF2-pL2PUE-GpB4w2-2Trpdz-a8D7vn-6vHa6F-2TvPnL-JNHnm9-6aPh2c-Jr8Sps-JNHmzQ-HVCauh-2TvAm1-2Trrii-2TvMkd-2TvMbG-2TvR79-2TrpPM-a54xrr-2TvRS9-2TvGLY-2TrcDB-2TroSz" target="_blank"> LastHuckleBerry</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">TeQi&#039;s Graffitti Phish</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br /> ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p> </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div><div class="field field-name-field-license-type field-type-taxonomy-term-reference field-label-above"><div class="field-label">Licence type:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/imagecredit/attribution-sharealike">Attribution-ShareAlike</a></div></div></div><div class="field field-name-field-related-links field-type-link-field field-label-above"><div class="field-label">Related Links:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="https://www.cambridgecybercrime.uk/">Cambridge Cybercrime Centre</a></div></div></div> Fri, 21 Oct 2016 07:51:23 +0000 sc604 180172 at Opinion: FBI backs off from its day in court with Apple this time – but there will be others /research/discussion/opinion-fbi-backs-off-from-its-day-in-court-with-apple-this-time-but-there-will-be-others <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/discussion/160330smartphone.jpg?itok=D0wlsYX_" alt="Smartphone rituals" title="Smartphone rituals, Credit: Nicolas Nova" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>After a <a href="https://theconversation.com/why-apple-is-making-a-stand-against-the-fbi-54925">very public stand-off</a> over an encrypted terrorist’s smartphone, the FBI has <a href="https://www.theguardian.com/technology/2016/mar/21/fbi-apple-court-hearing-postpone-unlock-terrorist-iphone">backed down</a> in its court case against Apple, stating that an “outside party” – rumoured to be <a href="https://www.rt.com/usa/336948-fbi-israel-crack-iphone/">an Israeli mobile forensics company</a> – has found a way of accessing the data on the phone.</p>&#13; &#13; <p> ֱ̽exact method is not known. Forensics experts <a href="https://www.zdziarski.com/blog/?p=5966">have speculated</a> that it involves tricking the hardware into not recording how many passcode combinations have been tried, which would allow all 10,000 possible four-digit passcodes to be tried within a fairly short time. This technique would apply to the iPhone 5C in question, but not newer models, which have stronger hardware protection through the so-called <a href="https://support.apple.com/guide/security/welcome/web">secure enclave</a>, a chip that performs security-critical operations in hardware. ֱ̽FBI has denied that the technique involves <a href="https://www.washingtonpost.com/world/national-security/the-fbi-is-testing-a-code-based-way-to-get-into-the-san-bernardino-iphone/2016/03/24/bc79cd14-f1dc-11e5-a61f-e9c95c06edca_story.html">copying storage chips</a>.</p>&#13; &#13; <p>So while the details of the technique <a href="https://www.theguardian.com/technology/2016/mar/22/apple-fbi-san-bernardino-iphone-method-for-cracking">remain classified</a>, it’s reasonable to assume that <a href="https://theintercept.com/2016/03/08/snowden-fbi-claim-that-only-apple-can-unlock-phone-is-bullshit/">any security technology can be broken</a> given sufficient resources. In fact, the technology industry’s dirty secret is that most products are frighteningly insecure.</p>&#13; &#13; <p>Even when security technologies are carefully designed and reviewed by experts, mistakes happen. For example, researchers recently found a way of <a href="https://blog.cryptographyengineering.com/2016/03/21/attack-of-week-apple-imessage/">breaking the encryption of Apple’s iMessage service</a>, one of the most prominent examples of end-to-end encryption (which ensures that even the service provider cannot read the messages travelling via its network).</p>&#13; &#13; <p>Most products have a much worse security record, as they are not designed by security experts, and often contain flaws that are easily found by attackers. For example, <a href="https://boingboing.net/2016/01/19/griefer-hacks-baby-monitor-te.html">internet-connected baby monitors</a> that could be hacked and allow strangers to <a href="https://sfglobe.com:443/2016/01/06/stranger-hacks-familys-baby-monitor-and-talks-to-child-at-night/">talk to their child</a> at night. Insecure cars that <a href="https://theconversation.com/auto-industry-must-tackle-its-software-problems-to-stop-hacks-as-cars-go-online-45325">could be controlled via an internet connection</a> while being driven. Drug infusion pumps at US hospitals that could be hacked by an attacker to <a href="https://www.boxer.senate.gov/?p=release&amp;id=3254">manipulate drug dosage levels</a>.</p>&#13; &#13; <p>Even national infrastructure is vulnerable, with software weaknesses exploited to cause serious damage at a <a href="http://www.bbc.co.uk/news/technology-30575104">German steel mill</a>, bring down parts of the <a href="https://theconversation.com/the-cyberattack-on-ukraines-power-grid-is-a-warning-of-whats-to-come-52832">Ukrainian power grid</a>, and <a href="https://news.softpedia.com/news/hackers-modify-water-treatment-parameters-by-accident-502043.shtml">alter the mix of chemicals added to drinking water</a>. While our lives depend more and more on “smart” devices, they are frequently designed in incredibly stupid ways.</p>&#13; &#13; <h2>Insecure by design</h2>&#13; &#13; <p> ֱ̽conflict between Apple and the FBI was particularly jarring to security experts, seen as an attempt to deliberately make technology less secure and win legal precedent to gain access to other devices in the future. Smartphones are becoming increasingly ubiquitous, and we know from the Snowden files that the NSA can <a href="https://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract">turn on a phone’s microphone</a> remotely without the owner’s knowledge. We are heading towards a state in which every inhabited space contains a microphone (and a camera) that is connected to the internet and which might be recording anything you say. This is not even a paranoid exaggeration.</p>&#13; &#13; <p>So, in a world in which we are constantly struggling to make things more secure, the FBI’s desire to create a backdoor to provide it access is like pouring gasoline on the fire.</p>&#13; &#13; <p> ֱ̽problem with security weaknesses is that it is impossible to control who can use them. Responsible researchers report them to the vendor so that they can be fixed, and sometimes receive a <a href="https://www.tripwire.com/state-of-security/11-essential-bug-bounty-programs-of-2015">bug bounty</a> in return. But those who want to make more money may <a href="https://www.wired.com/2015/11/heres-a-spy-firms-price-list-for-secret-hacker-techniques/">secretly sell the knowledge to the highest bidder</a>. Customers of this <a href="https://theconversation.com/trusting-hackers-with-your-security-youd-better-be-able-to-sort-the-whitehats-from-the-blackhats-44477">dark trade in vulnerabilities</a> often include <a href="https://citizenlab.ca/2015/08/hacking-team-leak-highlights-citizen-lab-research/">governments with repressive human rights records</a>.</p>&#13; &#13; <p>If the FBI has found a means of getting data off a locked phone, that means the intelligence services of other countries have probably independently developed the same technique – or been sold it by someone who has. So if an American citizen has data on their phone that is of intelligence interest to another country that data is at risk if the phone is lost or stolen.</p>&#13; &#13; <p>Most people will never be of intelligence interest of course, so perhaps such fears are overblown. But the push from governments, for example through the pending <a href="https://theconversation.com/us/topics/investigatory-powers-bill-22352">Investigatory Powers Bill</a> in the UK, to allow the security services to hack devices in bulk – even if the devices belong to people who are not suspected of any crime – cannot be ignored.</p>&#13; &#13; <p>Bulk hacking powers, taken together with insecure, internet-connected microphones and cameras in every room, are a worrying combination. It is a cliche to conjure up Nineteen Eighty-Four, but the picture it paints is something very much like Orwell’s telescreens.</p>&#13; &#13; <p> </p>&#13; &#13; <figure><iframe allowfullscreen="" frameborder="0" height="260" src="https://www.youtube.com/embed/CCfW6HFP5cI?wmode=transparent&amp;start=0" width="440"></iframe></figure><p> </p>&#13; &#13; <h2>Used by one, used by all</h2>&#13; &#13; <p>To some extent law enforcement has historically benefited from poor computer security, as hacking a poorly secured digital device is easier and cheaper than planting a microphone in someone’s house or rifling their physical belongings. No wonder that the former CIA director <a href="https://www.wired.com/2012/03/petraeus-tv-remote/">loves the Internet of Things</a>.</p>&#13; &#13; <p>This convenience often tempts governments to deliberately weaken device security – the FBI’s case against Apple is just one example. In the UK, the proposed Investigatory Powers Bill allows the secretary of state to issue “<a href="https://www.theguardian.com/technology/2015/nov/09/tech-firms-snoopers-charter-end-strong-encryption-britain-ip-bill">technical capability notices</a>”, which are secret government orders to demand manufacturers make a device or service deliberately less secure than it could be. GCHQ’s new MIKEY-SAKKE standard for encrypted phone calls is also <a href="https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/">deliberately weakened</a> to allow easier surveillance.</p>&#13; &#13; <p>But a security flaw that can be used by one can be used by all, whether legitimate police investigations or hostile foreign intelligence services or organised crime. ֱ̽fears of <a href="https://cyber.harvard.edu/pubrelease/dont-panic/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf">criminals and terrorists “going dark” are overblown</a>, but the risk to life from insecure infrastructure is real: fixing these weaknesses should be our priority, not striving to make devices less secure for the sake of law enforcement.</p>&#13; &#13; <p><em><strong><span><a href="https://theconversation.com/profiles/martin-kleppmann-229401">Martin Kleppmann</a>, Research associate, <a href="https://theconversation.com/institutions/university-of-cambridge-1283"> ֱ̽ of Cambridge</a></span></strong></em></p>&#13; &#13; <p><em><strong>This article was originally published on <a href="https://theconversation.com/"> ֱ̽Conversation</a>. Read the <a href="https://theconversation.com/fbi-backs-off-from-its-day-in-court-with-apple-this-time-but-there-will-be-others-56932">original article</a>.</strong></em></p>&#13; &#13; <p><em> ֱ̽opinions expressed in this article are those of the individual author(s) and do not represent the views of the ֱ̽ of Cambridge.</em></p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Martin Kleppmann (Computer Laboratory) discusses how vulnerable security technologies really are, and how these vulnerabilities could be exploited by both law enforcement and criminals.</p>&#13; </p></div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://www.flickr.com/photos/nnova/15143063700/in/photolist-p59agb-oV8kWF-dKM4XF-w4mU6u-rtLRaL-6WpyLA-5w1x7B-iPbkXS-5w5So7-5w5Shb-5w5SiQ-ewuJkS-qB7cNm-5w1xqg-raxYPc-4GyQ3B-e7SruD-dJ86M7-pKTwkQ-dt59yY-agSJHn-fcEmHq-fHr5pX-rBuFur-86jRy1-pwsJsG-ncMHe3-ro7xHZ-ae1cnm-aaBHGD-gxrsm-aeuiYT-D3NJb-e8Z9yL-87mW2q-gA3McR-8YMPun-nmbTzF-7vcjwV-opLsGL-a39Vsb-a99Hec-6WcTys-BSZ9N-dwF3pv-D3NQ8-DHRMmJ-a9Xz3a-87mW35-afa19p" target="_blank">Nicolas Nova</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Smartphone rituals</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; ֱ̽text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div><div class="field field-name-field-license-type field-type-taxonomy-term-reference field-label-above"><div class="field-label">Licence type:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/imagecredit/attribution-noncommerical">Attribution-Noncommerical</a></div></div></div> Wed, 30 Mar 2016 12:57:18 +0000 Anonymous 170332 at