The ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design does focused
research to enhance the safety, security and efficiency of Hardware/Software Systems.
We are always looking for researchers at all levels (Bachelor, Masters, PhD) to enrich the scientific activities in the group. For Post-doc positions, take a look at the individual research projects for opening. If you wish to join our group, contact Sudipta Chattopadhyay email: firstname.lastname@example.org directly with your CV.
NEW: Matheus E. Garbelini, PhD student in our group, wins Intel Bug Bounty Award to enable discovering two Intel AX200 attacks under the BrakTooth family. The Intel Bug Bounty Award is given for security researchers that discover and report flaws in Intel products. Matheus has been awarded USD 3,000 for each of the Intel AX200 attacks under BrakTooth family, resulting a total award value of USD 6,000.
NEW: Cybersecurity and Infrastructure Security Agency (CISA), part of the Department of Homeland Security, encourages manufacturers, vendors, and developers to review BrakTooth vulnerabilities and patch or find workarounds to counter BrakTooth flaws. See the official CISA announcement and some notable coverage at Bleeping Computer, Threatpost, and PCMag Magazine.
NEW: BrakTooth research was leveraged into improvements in Keysight IoT Security Assessment software. See the official press release from Keysight here and a coverage of this news here. We are glad that the research done in our group made to industry scale security assessment software. This is also the first time the industry translation of our research on wireless fuzzing is publicly disclosed by Keysight Technologies and other mediums.
NEW: BrakTooth featured in WIRED, PCMag Magazine, Hacker News, HACKADAY, MalwareBytes, Register, Bleeping Computer, Threatpost, The Record (by Recorded Future), Heise Online, and 40+ other news articles and podcasts (Podcast 1, Podcast 2) worldwide. The BrakTooth security alert has been covered by SingCERT, CSA and German Federal Office for Information Security, and Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT), among others.
NEW: Today we released BrakTooth -- a family of 16 new security vulnerabilities (20+ CVEs) in commercial Bluetooth classic (BR/EDR) stacks that range from denial of service (DoS) via firmware crashes and deadlocks in commodity hardware to arbitrary code execution (ACE) in certain IoTs. BrakTooth affects major System-on-chip (SoC) vendors such as Intel, Qualcomm, Texas Instruments, Infineon (Cypress), Silicon Labs among others. Bluetooth listings capture over 1400 products to be affected, including but not limited to Laptops and smartphones from major vendors (e.g. Dell, HP, Samsung, Microsoft etc.), Automotive Infotainment systems, Aircraft Entertainment systems, Speakers and Headphones. If you are a Bluetooth module or SoC vendor, feel free to request the proof of concept tool here: BrakTooth PoC.
NEW: ASSET group will release 16 new security vulnerabilities (20+ CVEs) on 31st August 2021 (currently undisclosed due to confidentiality). The vulnerabilities can be exploited to cause havoc on the devices at your desk, pocket, house, office and whatnot. Just a cursory search reveals that over 1100 product listings are affected by these vulnerabilities. Watch this space when we release all the exploits and details on 31st August 2021.
NEW: Several Post-doctoral and Research Engineer positions available in our group. If you are interested in any aspect of Software Security or IoT Security, then feel free to send Sudipta an email.
NEW: Our Greyhound Fuzzer (for both Wi-Fi and BLE) is now successfully integrated into a commercial pen testing tool used by major automotive industry (names undisclosed due to confidentiality). They have subsequently used the Greyhound component to discover new Denial-of-Service (DoS) attacks. We are glad to see the translation, commercial success and effectiveness at industrial scale within just two years of the inception of Greyhound project at ASSET group.
NEW: ASSET group PhD student Matheus E. Garbelini wins a bug bounty equivalent to 6000 SGD for finding highly critical security vulnerabilities in Bluetooth protocol implementation (currently undisclosed due to confidentiality). Congratulations Matheus!!!
The details of the second wave of SweynTooth vulnerabilities (CVE-2020-10061, CVE-2020-10069, CVE-2020-13593, CVE-2020-13594, CVE-2020-13595) diclosed today. Affected vendors include (but not limited to, as we do not track all vendors) Espressif Systems, Texas Instruments, Microchip and Zephyr Project. Have fun.
United States Department of Homeland Security and USA Food and Drug Administration raise SweynTooth alert to make everyone aware of this critical BLE implementation vulnerability. Read the ICS Alert and the FDA Safety Communication. The respective alerts by Cyber Security Agency, Singapore and Health Sciences Authority, Singapore can be found in SingCERT Alert and HSA Safety Communication. It is a wake up call for all BLE SoC vendors and IoT product manufacturers.
SweynTooth and ASSET group featured in WIRED (top technology journal in the world) and 30+ news articles (and also podcasts) in English as well as in Non-English languages all over the world. I am glad to say that the work is almost single handedly pulled off by a first-year PhD student Matheus Eduardo in the ASSET group.
Today we release SweynTooth, a family of 12 new Bluetooth implementation vulnerabilities (more coming) affecting major system-on-chip (SoC) vendors such as NXP, Cypress, Texas Instruments, Dialog, Telink, ST Microelectronics and Microchip (the list is not exhaustive) and potentially affecting more than 480 IoT products already in market (most of them unpatched). SweynTooth reveals the terrible state of Bluetooth certification process. Read the description to know what the vulnerabilities are, how they can be exploited and why we name them SweynTooth. Feel free to reach us at email@example.com for any question and clarification.
Securing systems against side-channel attacks. Multiple post-doc and research assistant positions open in this project.
Validation and Verification of AI/ML-based Systems to make them safe and secure. Multiple post-doc and research assistant positions open in this project starting as soon as possible.
IoT Wireless Security Testing and Countermeasures. Multiple post-doc and research assistant positions open in this project starting as soon as possible.