Return to Video

The 1s and 0s behind cyber warfare

  • 0:01 - 0:03
    This is a lot of ones and zeros.
  • 0:03 - 0:06
    It's what we call binary information.
  • 0:06 - 0:08
    This is how computers talk.
  • 0:08 - 0:10
    It's how they store information.
  • 0:10 - 0:11
    It's how computers think.
  • 0:11 - 0:13
    It's how computers do
  • 0:13 - 0:15
    everything it is that computers do.
  • 0:15 - 0:17
    I'm a cybersecurity researcher,
  • 0:17 - 0:19
    which means my job is to sit
    down with this information
  • 0:19 - 0:21
    and try to make sense of it,
  • 0:21 - 0:24
    to try to understand what all
    the ones and zeroes mean.
  • 0:24 - 0:26
    Unfortunately for me, we're not just talking
  • 0:26 - 0:28
    about the ones and zeros
    I have on the screen here.
  • 0:28 - 0:30
    We're not just talking about a
    few pages of ones and zeros.
  • 0:30 - 0:33
    We're talking about billions and billions
  • 0:33 - 0:34
    of ones and zeros,
  • 0:34 - 0:37
    more than anyone could possibly comprehend.
  • 0:37 - 0:39
    Now, as exciting as that sounds,
  • 0:39 - 0:41
    when I first started doing cyber —
  • 0:41 - 0:43
    (Laughter) —
  • 0:43 - 0:45
    when I first started doing cyber, I wasn't sure
  • 0:45 - 0:47
    that sifting through ones and zeros
  • 0:47 - 0:49
    was what I wanted to do with the rest of my life,
  • 0:49 - 0:51
    because in my mind, cyber
  • 0:51 - 0:55
    was keeping viruses off of my grandma's computer,
  • 0:55 - 0:58
    it was keeping people's Myspace
    pages from being hacked,
  • 0:58 - 1:00
    and maybe, maybe on my most glorious day,
  • 1:00 - 1:04
    it was keeping someone's credit
    card information from being stolen.
  • 1:04 - 1:05
    Those are important things,
  • 1:05 - 1:08
    but that's not how I wanted to spend my life.
  • 1:08 - 1:10
    But after 30 minutes of work
  • 1:10 - 1:11
    as a defense contractor,
  • 1:11 - 1:14
    I soon found out that my idea of cyber
  • 1:14 - 1:16
    was a little bit off.
  • 1:16 - 1:18
    In fact, in terms of national security,
  • 1:18 - 1:20
    keeping viruses off of my grandma's computer
  • 1:20 - 1:23
    was surprisingly low on their priority list.
  • 1:23 - 1:24
    And the reason for that is cyber
  • 1:24 - 1:28
    is so much bigger than any one of those things.
  • 1:28 - 1:31
    Cyber is an integral part of all of our lives,
  • 1:31 - 1:34
    because computers are an
    integral part of all of our lives,
  • 1:34 - 1:36
    even if you don't own a computer.
  • 1:36 - 1:39
    Computers control everything in your car,
  • 1:39 - 1:41
    from your GPS to your airbags.
  • 1:41 - 1:42
    They control your phone.
  • 1:42 - 1:43
    They're the reason you can call 911
  • 1:43 - 1:45
    and get someone on the other line.
  • 1:45 - 1:48
    They control our nation's entire infrastructure.
  • 1:48 - 1:49
    They're the reason you have electricity,
  • 1:49 - 1:52
    heat, clean water, food.
  • 1:52 - 1:54
    Computers control our military equipment,
  • 1:54 - 1:55
    everything from missile silos to satellites
  • 1:55 - 1:59
    to nuclear defense networks.
  • 1:59 - 2:01
    All of these things are made possible
  • 2:01 - 2:03
    because of computers,
  • 2:03 - 2:05
    and therefore because of cyber,
  • 2:05 - 2:06
    and when something goes wrong,
  • 2:06 - 2:09
    cyber can make all of these things impossible.
  • 2:09 - 2:11
    But that's where I step in.
  • 2:11 - 2:14
    A big part of my job is defending all of these things,
  • 2:14 - 2:15
    keeping them working,
  • 2:15 - 2:18
    but once in a while, part of my
    job is to break one of these things,
  • 2:18 - 2:20
    because cyber isn't just about defense,
  • 2:20 - 2:22
    it's also about offense.
  • 2:22 - 2:24
    We're entering an age where we talk about
  • 2:24 - 2:25
    cyberweapons.
  • 2:25 - 2:29
    In fact, so great is the potential for cyber offense
  • 2:29 - 2:32
    that cyber is considered a new domain of warfare.
  • 2:32 - 2:34
    Warfare.
  • 2:34 - 2:36
    It's not necessarily a bad thing.
  • 2:36 - 2:39
    On the one hand, it means we have whole new front
  • 2:39 - 2:40
    on which we need to defend ourselves,
  • 2:40 - 2:42
    but on the other hand,
  • 2:42 - 2:44
    it means we have a whole new way to attack,
  • 2:44 - 2:46
    a whole new way to stop evil people
  • 2:46 - 2:48
    from doing evil things.
  • 2:48 - 2:50
    So let's consider an example of this
  • 2:50 - 2:51
    that's completely theoretical.
  • 2:51 - 2:54
    Suppose a terrorist wants to blow up a building,
  • 2:54 - 2:56
    and he wants to do this again and again
  • 2:56 - 2:57
    in the future.
  • 2:57 - 3:00
    So he doesn't want to be in
    that building when it explodes.
  • 3:00 - 3:01
    He's going to use a cell phone
  • 3:01 - 3:04
    as a remote detonator.
  • 3:04 - 3:06
    Now, it used to be the only way we had
  • 3:06 - 3:07
    to stop this terrorist
  • 3:07 - 3:10
    was with a hail of bullets and a car chase,
  • 3:10 - 3:12
    but that's not necessarily true anymore.
  • 3:12 - 3:14
    We're entering an age where we can stop him
  • 3:14 - 3:15
    with the press of a button
  • 3:15 - 3:17
    from 1,000 miles away,
  • 3:17 - 3:19
    because whether he knew it or not,
  • 3:19 - 3:20
    as soon as he decided to use his cell phone,
  • 3:20 - 3:23
    he stepped into the realm of cyber.
  • 3:23 - 3:27
    A well-crafted cyber attack
    could break into his phone,
  • 3:27 - 3:29
    disable the overvoltage protections on his battery,
  • 3:29 - 3:30
    drastically overload the circuit,
  • 3:30 - 3:33
    cause the battery to overheat, and explode.
  • 3:33 - 3:35
    No more phone, no more detonator,
  • 3:35 - 3:37
    maybe no more terrorist,
  • 3:37 - 3:38
    all with the press of a button
  • 3:38 - 3:41
    from a thousand miles away.
  • 3:41 - 3:43
    So how does this work?
  • 3:43 - 3:45
    It all comes back to those ones and zeros.
  • 3:45 - 3:48
    Binary information makes your phone work,
  • 3:48 - 3:51
    and used correctly, it can make your phone explode.
  • 3:51 - 3:54
    So when you start to look at
    cyber from this perspective,
  • 3:54 - 3:57
    spending your life sifting through binary information
  • 3:57 - 4:00
    starts to seem kind of exciting.
  • 4:00 - 4:02
    But here's the catch: This is hard,
  • 4:02 - 4:04
    really, really hard,
  • 4:04 - 4:06
    and here's why.
  • 4:06 - 4:08
    Think about everything you have on your cell phone.
  • 4:08 - 4:10
    You've got the pictures you've taken.
  • 4:10 - 4:12
    You've got the music you listen to.
  • 4:12 - 4:14
    You've got your contacts list,
  • 4:14 - 4:15
    your email, and probably 500 apps
  • 4:15 - 4:18
    you've never used in your entire life,
  • 4:18 - 4:22
    and behind all of this is the software, the code,
  • 4:22 - 4:24
    that controls your phone,
  • 4:24 - 4:26
    and somewhere, buried inside of that code,
  • 4:26 - 4:29
    is a tiny piece that controls your battery,
  • 4:29 - 4:31
    and that's what I'm really after,
  • 4:31 - 4:35
    but all of this, just a bunch of ones and zeros,
  • 4:35 - 4:36
    and it's all just mixed together.
  • 4:36 - 4:40
    In cyber, we call this finding a
    needle in a stack of needles,
  • 4:40 - 4:42
    because everything pretty much looks alike.
  • 4:42 - 4:44
    I'm looking for one key piece,
  • 4:44 - 4:47
    but it just blends in with everything else.
  • 4:47 - 4:49
    So let's step back from this theoretical situation
  • 4:49 - 4:52
    of making a terrorist's phone explode,
  • 4:52 - 4:54
    and look at something that actually happened to me.
  • 4:54 - 4:56
    Pretty much no matter what I do,
  • 4:56 - 4:57
    my job always starts with sitting down
  • 4:57 - 5:00
    with a whole bunch of binary information,
  • 5:00 - 5:01
    and I'm always looking for one key piece
  • 5:01 - 5:03
    to do something specific.
  • 5:03 - 5:05
    In this case, I was looking for a very advanced,
  • 5:05 - 5:07
    very high-tech piece of code
  • 5:07 - 5:08
    that I knew I could hack,
  • 5:08 - 5:10
    but it was somewhere buried
  • 5:10 - 5:12
    inside of a billion ones and zeroes.
  • 5:12 - 5:13
    Unfortunately for me, I didn't know
  • 5:13 - 5:15
    quite what I was looking for.
  • 5:15 - 5:16
    I didn't know quite what it would look like,
  • 5:16 - 5:19
    which makes finding it really, really hard.
  • 5:19 - 5:21
    When I have to do that, what I have to do
  • 5:21 - 5:24
    is basically look at various pieces
  • 5:24 - 5:25
    of this binary information,
  • 5:25 - 5:28
    try to decipher each piece, and see if it might be
  • 5:28 - 5:29
    what I'm after.
  • 5:29 - 5:30
    So after a while, I thought I had found the piece
  • 5:30 - 5:32
    I was looking for.
  • 5:32 - 5:34
    I thought maybe this was it.
  • 5:34 - 5:36
    It seemed to be about right, but I couldn't quite tell.
  • 5:36 - 5:39
    I couldn't tell what those
    ones and zeros represented.
  • 5:39 - 5:42
    So I spent some time trying to put this together,
  • 5:42 - 5:44
    but wasn't having a whole lot of luck,
  • 5:44 - 5:45
    and finally I decided,
  • 5:45 - 5:47
    I'm going to get through this,
  • 5:47 - 5:48
    I'm going to come in on a weekend,
  • 5:48 - 5:49
    and I'm not going to leave
  • 5:49 - 5:51
    until I figure out what this represents.
  • 5:51 - 5:53
    So that's what I did. I came
    in on a Saturday morning,
  • 5:53 - 5:57
    and about 10 hours in, I sort of
    had all the pieces to the puzzle.
  • 5:57 - 5:58
    I just didn't know how they fit together.
  • 5:58 - 6:01
    I didn't know what these ones and zeros meant.
  • 6:01 - 6:03
    At the 15-hour mark,
  • 6:03 - 6:06
    I started to get a better picture of what was there,
  • 6:06 - 6:08
    but I had a creeping suspicion
  • 6:08 - 6:09
    that what I was looking at
  • 6:09 - 6:12
    was not at all related to what I was looking for.
  • 6:12 - 6:15
    By 20 hours, the pieces started to come together
  • 6:15 - 6:18
    very slowly — (Laughter) —
  • 6:18 - 6:20
    and I was pretty sure I was going down
  • 6:20 - 6:22
    the wrong path at this point,
  • 6:22 - 6:24
    but I wasn't going to give up.
  • 6:24 - 6:27
    After 30 hours in the lab,
  • 6:27 - 6:29
    I figured out exactly what I was looking at,
  • 6:29 - 6:32
    and I was right, it wasn't what I was looking for.
  • 6:32 - 6:33
    I spent 30 hours piecing together
  • 6:33 - 6:36
    the ones and zeros that
    formed a picture of a kitten.
  • 6:36 - 6:38
    (Laughter)
  • 6:38 - 6:42
    I wasted 30 hours of my life searching for this kitten
  • 6:42 - 6:44
    that had nothing at all to do
  • 6:44 - 6:46
    with what I was trying to accomplish.
  • 6:46 - 6:49
    So I was frustrated, I was exhausted.
  • 6:49 - 6:53
    After 30 hours in the lab, I probably smelled horrible.
  • 6:53 - 6:55
    But instead of just going home
  • 6:55 - 6:57
    and calling it quits, I took a step back
  • 6:57 - 7:00
    and asked myself, what went wrong here?
  • 7:00 - 7:02
    How could I make such a stupid mistake?
  • 7:02 - 7:04
    I'm really pretty good at this.
  • 7:04 - 7:05
    I do this for a living.
  • 7:05 - 7:07
    So what happened?
  • 7:07 - 7:10
    Well I thought, when you're
    looking at information at this level,
  • 7:10 - 7:13
    it's so easy to lose track of what you're doing.
  • 7:13 - 7:14
    It's easy to not see the forest through the trees.
  • 7:14 - 7:17
    It's easy to go down the wrong rabbit hole
  • 7:17 - 7:18
    and waste a tremendous amount of time
  • 7:18 - 7:20
    doing the wrong thing.
  • 7:20 - 7:22
    But I had this epiphany.
  • 7:22 - 7:25
    We were looking at the data completely incorrectly
  • 7:25 - 7:26
    since day one.
  • 7:26 - 7:28
    This is how computers think, ones and zeros.
  • 7:28 - 7:30
    It's not how people think,
  • 7:30 - 7:32
    but we've been trying to adapt our minds
  • 7:32 - 7:33
    to think more like computers
  • 7:33 - 7:36
    so that we can understand this information.
  • 7:36 - 7:38
    Instead of trying to make our minds fit the problem,
  • 7:38 - 7:40
    we should have been making the problem
  • 7:40 - 7:41
    fit our minds,
  • 7:41 - 7:43
    because our brains have a tremendous potential
  • 7:43 - 7:46
    for analyzing huge amounts of information,
  • 7:46 - 7:47
    just not like this.
  • 7:47 - 7:48
    So what if we could unlock that potential
  • 7:48 - 7:50
    just by translating this
  • 7:50 - 7:53
    to the right kind of information?
  • 7:53 - 7:54
    So with these ideas in mind,
  • 7:54 - 7:56
    I sprinted out of my basement lab at work
  • 7:56 - 7:57
    to my basement lab at home,
  • 7:57 - 7:59
    which looked pretty much the same.
  • 7:59 - 8:01
    The main difference is, at work,
  • 8:01 - 8:02
    I'm surrounded by cyber materials,
  • 8:02 - 8:05
    and cyber seemed to be the
    problem in this situation.
  • 8:05 - 8:08
    At home, I'm surrounded by
    everything else I've ever learned.
  • 8:08 - 8:10
    So I poured through every book I could find,
  • 8:10 - 8:12
    every idea I'd ever encountered,
  • 8:12 - 8:14
    to see how could we translate a problem
  • 8:14 - 8:17
    from one domain to something completely different?
  • 8:17 - 8:18
    The biggest question was,
  • 8:18 - 8:20
    what do we want to translate it to?
  • 8:20 - 8:22
    What do our brains do perfectly naturally
  • 8:22 - 8:24
    that we could exploit?
  • 8:24 - 8:26
    My answer was vision.
  • 8:26 - 8:30
    We have a tremendous capability
    to analyze visual information.
  • 8:30 - 8:32
    We can combine color gradients, depth cues,
  • 8:32 - 8:34
    all sorts of these different signals
  • 8:34 - 8:36
    into one coherent picture of the world around us.
  • 8:36 - 8:38
    That's incredible.
  • 8:38 - 8:39
    So if we could find a way to translate
  • 8:39 - 8:41
    these binary patterns to visual signals,
  • 8:41 - 8:43
    we could really unlock the power of our brains
  • 8:43 - 8:46
    to process this stuff.
  • 8:46 - 8:48
    So I started looking at the binary information,
  • 8:48 - 8:49
    and I asked myself, what do I do
  • 8:49 - 8:51
    when I first encounter something like this?
  • 8:51 - 8:52
    And the very first thing I want to do,
  • 8:52 - 8:54
    the very first question I want to answer,
  • 8:54 - 8:55
    is what is this?
  • 8:55 - 8:57
    I don't care what it does, how it works.
  • 8:57 - 9:00
    All I want to know is, what is this?
  • 9:00 - 9:02
    And the way I can figure that out
  • 9:02 - 9:03
    is by looking at chunks,
  • 9:03 - 9:06
    sequential chunks of binary information,
  • 9:06 - 9:09
    and I look at the relationships
    between those chunks.
  • 9:09 - 9:10
    When I gather up enough of these sequences,
  • 9:10 - 9:12
    I begin to get an idea of exactly
  • 9:12 - 9:15
    what this information must be.
  • 9:15 - 9:16
    So let's go back to that
  • 9:16 - 9:18
    blow up the terrorist's phone situation.
  • 9:18 - 9:21
    This is what English text looks like
  • 9:21 - 9:22
    at a binary level.
  • 9:22 - 9:24
    This is what your contacts list would look like
  • 9:24 - 9:26
    if I were examining it.
  • 9:26 - 9:28
    It's really hard to analyze this at this level,
  • 9:28 - 9:30
    but if we take those same binary chunks
  • 9:30 - 9:31
    that I would be trying to find,
  • 9:31 - 9:33
    and instead translate that
  • 9:33 - 9:35
    to a visual representation,
  • 9:35 - 9:37
    translate those relationships,
  • 9:37 - 9:38
    this is what we get.
  • 9:38 - 9:40
    This is what English text looks like
  • 9:40 - 9:43
    from a visual abstraction perspective.
  • 9:43 - 9:44
    All of a sudden,
  • 9:44 - 9:45
    it shows us all the same information
  • 9:45 - 9:47
    that was in the ones and zeros,
  • 9:47 - 9:49
    but show us it in an entirely different way,
  • 9:49 - 9:51
    a way that we can immediately comprehend.
  • 9:51 - 9:54
    We can instantly see all of the patterns here.
  • 9:54 - 9:56
    It takes me seconds to pick out patterns here,
  • 9:56 - 9:59
    but hours, days, to pick them out
  • 9:59 - 10:00
    in ones and zeros.
  • 10:00 - 10:02
    It takes minutes for anybody to learn
  • 10:02 - 10:03
    what these patterns represent here,
  • 10:03 - 10:05
    but years of experience in cyber
  • 10:05 - 10:07
    to learn what those same patterns represent
  • 10:07 - 10:09
    in ones and zeros.
  • 10:09 - 10:10
    So this piece is caused by
  • 10:10 - 10:12
    lower case letters followed by lower case letters
  • 10:12 - 10:14
    inside of that contact list.
  • 10:14 - 10:16
    This is upper case by upper case,
  • 10:16 - 10:18
    upper case by lower case, lower case by upper case.
  • 10:18 - 10:21
    This is caused by spaces. This
    is caused by carriage returns.
  • 10:21 - 10:22
    We can go through every little detail
  • 10:22 - 10:25
    of the binary information in seconds,
  • 10:25 - 10:29
    as opposed to weeks, months, at this level.
  • 10:29 - 10:30
    This is what an image looks like
  • 10:30 - 10:32
    from your cell phone.
  • 10:32 - 10:33
    But this is what it looks like
  • 10:33 - 10:35
    in a visual abstraction.
  • 10:35 - 10:37
    This is what your music looks like,
  • 10:37 - 10:39
    but here's its visual abstraction.
  • 10:39 - 10:41
    Most importantly for me,
  • 10:41 - 10:44
    this is what the code on your cell phone looks like.
  • 10:44 - 10:47
    This is what I'm after in the end,
  • 10:47 - 10:49
    but this is its visual abstraction.
  • 10:49 - 10:51
    If I can find this, I can't make the phone explode.
  • 10:51 - 10:54
    I could spend weeks trying to find this
  • 10:54 - 10:55
    in ones and zeros,
  • 10:55 - 10:57
    but it takes me seconds to pick out
  • 10:57 - 11:00
    a visual abstraction like this.
  • 11:00 - 11:03
    One of those most remarkable parts about all of this
  • 11:03 - 11:05
    is it gives us an entirely new way to understand
  • 11:05 - 11:09
    new information, stuff that we haven't seen before.
  • 11:09 - 11:11
    So I know what English looks like at a binary level,
  • 11:11 - 11:13
    and I know what its visual abstraction looks like,
  • 11:13 - 11:17
    but I've never seen Russian binary in my entire life.
  • 11:17 - 11:18
    It would take me weeks just to figure out
  • 11:18 - 11:21
    what I was looking at from raw ones and zeros,
  • 11:21 - 11:23
    but because our brains can instantly pick up
  • 11:23 - 11:26
    and recognize these subtle patterns inside
  • 11:26 - 11:27
    of these visual abstractions,
  • 11:27 - 11:29
    we can unconsciously apply those
  • 11:29 - 11:31
    in new situations.
  • 11:31 - 11:32
    So this is what Russian looks like
  • 11:32 - 11:34
    in a visual abstraction.
  • 11:34 - 11:36
    Because I know what one language looks like,
  • 11:36 - 11:37
    I can recognize other languages
  • 11:37 - 11:39
    even when I'm not familiar with them.
  • 11:39 - 11:41
    This is what a photograph looks like,
  • 11:41 - 11:43
    but this is what clip art looks like.
  • 11:43 - 11:45
    This is what the code on your phone looks like,
  • 11:45 - 11:48
    but this is what the code on
    your computer looks like.
  • 11:48 - 11:50
    Our brains can pick up on these patterns
  • 11:50 - 11:52
    in ways that we never could have
  • 11:52 - 11:54
    from looking at raw ones and zeros.
  • 11:54 - 11:56
    But we've really only scratched the surface
  • 11:56 - 11:58
    of what we can do with this approach.
  • 11:58 - 12:00
    We've only begun to unlock the capabilities
  • 12:00 - 12:03
    of our minds to process visual information.
  • 12:03 - 12:05
    If we take those same concepts and translate them
  • 12:05 - 12:07
    into three dimensions instead,
  • 12:07 - 12:10
    we find entirely new ways of
    making sense of information.
  • 12:10 - 12:13
    In seconds, we can pick out every pattern here.
  • 12:13 - 12:15
    we can see the cross associated with code.
  • 12:15 - 12:16
    We can see cubes associated with text.
  • 12:16 - 12:19
    We can even pick up the tiniest visual artifacts.
  • 12:19 - 12:21
    Things that would take us weeks,
  • 12:21 - 12:23
    months to find in ones and zeroes,
  • 12:23 - 12:25
    are immediately apparent
  • 12:25 - 12:27
    in some sort of visual abstraction,
  • 12:27 - 12:28
    and as we continue to go through this
  • 12:28 - 12:30
    and throw more and more information at it,
  • 12:30 - 12:33
    what we find is that we're capable of processing
  • 12:33 - 12:35
    billions of ones and zeros
  • 12:35 - 12:36
    in a matter of seconds
  • 12:36 - 12:40
    just by using our brain's built-in ability
  • 12:40 - 12:42
    to analyze patterns.
  • 12:42 - 12:44
    So this is really nice and helpful,
  • 12:44 - 12:46
    but all this tells me is what I'm looking at.
  • 12:46 - 12:48
    So at this point, based on visual patterns,
  • 12:48 - 12:50
    I can find the code on the phone.
  • 12:50 - 12:53
    But that's not enough to blow up a battery.
  • 12:53 - 12:54
    The next thing I need to find is the code
  • 12:54 - 12:56
    that controls the battery, but we're back
  • 12:56 - 12:58
    to the needle in a stack of needles problem.
  • 12:58 - 13:00
    That code looks pretty much like all the other code
  • 13:00 - 13:02
    on that system.
  • 13:02 - 13:05
    So I might not be able to find the
    code that controls the battery,
  • 13:05 - 13:07
    but there's a lot of things
    that are very similar to that.
  • 13:07 - 13:09
    You have code that controls your screen,
  • 13:09 - 13:11
    that controls your buttons,
    that controls your microphones,
  • 13:11 - 13:13
    so even if I can't find the code for the battery,
  • 13:13 - 13:15
    I bet I can find one of those things.
  • 13:15 - 13:18
    So the next step in my binary analysis process
  • 13:18 - 13:19
    is to look at pieces of information
  • 13:19 - 13:21
    that are similar to each other.
  • 13:21 - 13:25
    It's really, really hard to do at a binary level,
  • 13:25 - 13:29
    but if we translate those similarities
    to a visual abstraction instead,
  • 13:29 - 13:31
    I don't even have to sift through the raw data.
  • 13:31 - 13:33
    All I have to do is wait for the image to light up
  • 13:33 - 13:36
    to see when I'm at similar pieces.
  • 13:36 - 13:39
    I follow these strands of similarity
    like a trail of bread crumbs
  • 13:39 - 13:42
    to find exactly what I'm looking for.
  • 13:42 - 13:43
    So at this point in the process,
  • 13:43 - 13:45
    I've located the code
  • 13:45 - 13:46
    responsible for controlling your battery,
  • 13:46 - 13:49
    but that's still not enough to blow up a phone.
  • 13:49 - 13:51
    The last piece of the puzzle
  • 13:51 - 13:53
    is understanding how that code
  • 13:53 - 13:54
    controls your battery.
  • 13:54 - 13:57
    For this, I need to identify
  • 13:57 - 13:59
    very subtle, very detailed relationships
  • 13:59 - 14:01
    within that binary information,
  • 14:01 - 14:02
    another very hard thing to do
  • 14:02 - 14:05
    when looking at ones and zeros.
  • 14:05 - 14:06
    But if we translate that information
  • 14:06 - 14:08
    into a physical representation,
  • 14:08 - 14:11
    we can sit back and let our
    visual cortex do all the hard work.
  • 14:11 - 14:13
    It can find all the detailed patterns,
  • 14:13 - 14:15
    all the important pieces, for us.
  • 14:15 - 14:18
    It can find out exactly how the pieces of that code
  • 14:18 - 14:21
    work together to control that battery.
  • 14:21 - 14:24
    All of this can be done in a matter of hours,
  • 14:24 - 14:25
    whereas the same process
  • 14:25 - 14:28
    would have taken months in the past.
  • 14:28 - 14:29
    This is all well and good
  • 14:29 - 14:32
    in a theoretical blow up a terrorist's phone situation.
  • 14:32 - 14:35
    I wanted to find out if this would really work
  • 14:35 - 14:37
    in the work I do every day.
  • 14:37 - 14:40
    So I was playing around with these same concepts
  • 14:40 - 14:44
    with some of the data I've looked at in the past,
  • 14:44 - 14:46
    and yet again, I was trying to find
  • 14:46 - 14:48
    a very detailed, specific piece of code
  • 14:48 - 14:52
    inside of a massive piece of binary information.
  • 14:52 - 14:54
    So I looked at it at this level,
  • 14:54 - 14:56
    thinking I was looking at the right thing,
  • 14:56 - 14:58
    only to see this doesn't have
  • 14:58 - 15:00
    the connectivity I would have expected
  • 15:00 - 15:01
    for the code I was looking for.
  • 15:01 - 15:04
    In fact, I'm not really sure what this is,
  • 15:04 - 15:05
    but when I stepped back a level
  • 15:05 - 15:07
    and looked at the similarities within the code
  • 15:07 - 15:09
    I saw, this doesn't have similarities
  • 15:09 - 15:11
    like any code that exists out there.
  • 15:11 - 15:13
    I can't even be looking at code.
  • 15:13 - 15:15
    In fact, from this perspective,
  • 15:15 - 15:17
    I could tell, this isn't code.
  • 15:17 - 15:19
    This is an image of some sort.
  • 15:19 - 15:21
    And from here, I can see,
  • 15:21 - 15:24
    it's not just an image, this is a photograph.
  • 15:24 - 15:25
    Now that I know it's a photograph,
  • 15:25 - 15:28
    I've got dozens of other
    binary translation techniques
  • 15:28 - 15:31
    to visualize and understand that information,
  • 15:31 - 15:33
    so in a matter of seconds,
    we can take this information,
  • 15:33 - 15:36
    shove it through a dozen other
    visual translation techniques
  • 15:36 - 15:39
    in order to find out exactly what we were looking at.
  • 15:39 - 15:41
    I saw — (Laughter) —
  • 15:41 - 15:44
    it was that darn kitten again.
  • 15:44 - 15:46
    All this is enabled
  • 15:46 - 15:47
    because we were able to find a way
  • 15:47 - 15:49
    to translate a very hard problem
  • 15:49 - 15:52
    to something our brains do very naturally.
  • 15:52 - 15:54
    So what does this mean?
  • 15:54 - 15:55
    Well, for kittens, it means
  • 15:55 - 15:58
    no more hiding in ones and zeros.
  • 15:58 - 16:01
    For me, it means no more wasted weekends.
  • 16:01 - 16:04
    For cyber, it means we have a radical new way
  • 16:04 - 16:07
    to tackle the most impossible problems.
  • 16:07 - 16:08
    It means we have a new weapon
  • 16:08 - 16:11
    in the evolving theater of cyber warfare,
  • 16:11 - 16:12
    but for all of us,
  • 16:12 - 16:14
    it means that cyber engineers
  • 16:14 - 16:16
    now have the ability to become first responders
  • 16:16 - 16:18
    in emergency situations.
  • 16:18 - 16:20
    When seconds count,
  • 16:20 - 16:23
    we've unlocked the means to stop the bad guys.
  • 16:23 - 16:25
    Thank you.
  • 16:25 - 16:28
    (Applause)
Title:
The 1s and 0s behind cyber warfare
Speaker:
Chris Domas
Description:

Chris Domas is a cybersecurity researcher, operating on what’s become a new front of war, "cyber." In this engaging talk, he shows how researchers use pattern recognition and reverse engineering (and pull a few all-nighters) to understand a chunk of binary code whose purpose and contents they don't know.

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
16:45
  • To me there is a mistake in the original at 10:49 - 10:51
    The text reads "If I can find this, I can't make the phone explode." but there is no sence in this sentence. Following the talk it should be "If I can't find this, I can't make the phone explode."

  • I mean sense above.

English subtitles

Revisions Compare revisions