NoAHDB tool version 0.2 is out!

March 27th, 2008

NoAHDB is a command line tool that parses the log files that are emitted by the Argos honeypot and populates the tables of a MySQL database. The goal of NoAHDB is to assist the network administrator to collect and analyse all that precious information emmited by the Argos honeypot.

For more information on NoAHDB tool please visit NoAHDB homepage.

NoAH Database Management Interface version 0.0.2 is out!

March 18th, 2008

NoAH Database Management Interface (NOAHIF) is a web application (based on Ruby on Rails web framework) that eases the management of a network of honeypots. Information concerning the location of the sensors/honeypots, the hardware and software configuration of the sensors/honeypots and the services running are easily managed.

For more information on NOAHIF please visit NOAHIF homepage.

Argos version 0.4.0 released

March 14th, 2008

Finally, the long awaited port to QEMU 0.9.* series is here. Argos v0.4.0 is based upon QEMU v0.9.1.

Some useful changes follow:

version 0.9.1:

  • TFTP booting from host directory (Anthony Liguori, Erwan Velu)
  • Tap device emulation for Solaris (Sittichai Palanisong)
  • Monitor multiplexing to several I/O channels (Jason Wessel)
  • CPU model selection support (J. Mayer, Paul Brook, Herve Poussineau)
  • Read-only support for Parallels disk images (Alex Beregszaszi)
  • SVM (x86 virtualization) support (Alexander Graf)
  • Intel mainstone II board emulation (Armin Kuster)
  • VMware SVGA II graphics card support (Andrzej Zaborowski)

version 0.9.0:

  • Support for relative paths in backing files for disk images
  • Async file I/O API
  • New qcow2 disk image format
  • Support of multiple VM snapshots
  • Linux: specific host CDROM and floppy support
  • SMM support
  • Moved PCI init, MP table init and ACPI table init to Bochs BIOS
  • several x86 and x86_64 emulation fixes
  • Mouse relative offset VNC extension (Anthony Liguori)
  • PXE boot support (Anthony Liguori)
  • ‘-daemonize’ option (Anthony Liguori)

Additional changes, besides the port, include a double taintness check before executing a part of code to ensure attackers’ injected code is always detected at the moment it is first executed. The check is performed whenever a TB is scheduled to be executed, as well as within the translated code whenever EIP is modified. This is to cover TB chaining performed by QEMU to speed up emulation. In the future we might consider disabling chaining, if a single check offers a significant performance gain.

For more information on Argos visit:

Temporal Search: Detecting Hidden Malware Timebombs with Virtual Machines

March 14th, 2008

Imagine that a new worm is released at 10pm and that after half an hour has infected a few thousands of computers (10.30pm). Suppose that the goal of this worm is to coordinate a DDoS attack against a critical information system, such as root DNS servers, at 11.30pm. Suppose also that we can avert this attack if we knew about it half an hour before. Are 30 minutes enough for humans to analyze the worm and find out its malicious goal? I believe not.

So we need a way to automatically analyze the above worm, find the time that this attack will take place and the details of the attack (DDoS against root DNS servers). Crandall et al. propose a framework to automate the process of finding the time that the attack will take place. Although manual analysis is required for finding out the details of the attack, this is a step to the right direction.

To be more specific, the authors propose a novel virtual-machine based analysis technique for automating the process of discovering the timetable of a piece of malware. The obvious advantage of automating this process is that it requires less time than careful human analysis. Given that malware is expected to spread faster and faster in the years to come, such information provide invaluable assistance defending against malware.

The main contributions of this paper is that it proposes a framework for a problem space nobody has looked at the past and that it identifies many of the challenges in this new problem space.

Source: Temporal Search: Detecting Hidden Malware Timebombs with Virtual Machines, Jedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, S. Felix Wu, and Frederic T. Chong.

Call for papers: EuroSec Security Workshop 2008

February 7th, 2008

ACM logoEuroSec is a new workshop associated with the Annual ACM SIGOPS EuroSys conference. The workshop aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The focus of the workshop is on novel, practical, systems-oriented work.

EuroSec seeks contributions on all aspects of systems security. You are hereby invited to submit papers of 6-8 single-spaced pages (including figures, tables and references). Font size should be 10pt. The format of submitted papers should correspond to our Latex style file (see

EuroSec explicitly encourages members of the systems community to explore leading-edge topics and ideas before they are presented at a major conference. All submissions will be reviewed by the Program Committee. Only papers with original, novel work will be considered for publication. Accepted papers will be published in the proceedings of EuroSec in the ACM Digital Library.

EuroSec will be held on the 31st of March, 2008, in Glasgow, Scotland.

Important Dates

  • Paper submission: 15 Feb 2008
  • Acceptance notification: 1 Mar 2008
  • Final paper due: 14 Mar 2008
  • Workshops: 31 Mar 2008

Click to continue reading “Call for papers: EuroSec Security Workshop 2008″

Got Honey?

February 5th, 2008


The NoAH LogoWelcome! This is the blog of the NoAH project. NoAH is a EU funded project that aims to develop a pilot infrastructure for automatically gathering and analyzing information about the Internet cyber-attacks and their nature.


This blog is authored by members of the NoAH consortium. It’s main purpose is to discuss the latest news (good or bad) on honeypots, worms, malware and IT security and defense in general. Of course, there will be also posts regarding the news of the NoAH project (workshops, published papers and articles etc).

Currently the consortium is preparing the organization of the 2nd NoAH workshop. It will be held between 19 and 22 May 2008 as one of the 2008 TERENA Networking Conference sessions in Bruges, Belgium. Stay tuned for updates!