Marco Lancini

Marco Lancini

United Kingdom
4K followers 500+ connections

About

💼 I am a Director of Security and Certified Chief Information Security Officer (C|CISO)…

Experience

  • Lakera Graphic

    Lakera

    Remote

  • -

    Remote

  • -

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    Milan Area, Italy

Education

Licenses & Certifications

Publications

  • Offensive iOS Exploitation

    DEEPSEC

    The first iteration of the "Offensive iOS Exploitation" workshop has been delivered at DEEPSEC 2016.

    See publication
  • Needle

    Black Hat Arsenal EU

    Needle's progress was shown at Black Hat EU, with a live demo of its capabilities.

    See publication
  • Needle: Finding Issues within iOS Applications

    OWASP AppSec USA 2016

    Needle's architecture, capabilities and roadmap have been presented at AppSec USA. During the talk it was also demonstrated how Needle can be used to find vulnerabilities in iOS applications from both a black-box and white-box perspective (with a demo of the tool in action).

    See publication
  • Needle

    Black Hat Arsenal USA 2016

    Needle has been publicly released Black Hat USA, with a live demo of its capabilities.

    See publication
  • In Depth Security (Proceedings of the DeepSec Conferences)

    Magdeburger Institut für Sicherheitsforschung

    The article I submitted and presented at DEEPSEC 2014 has been published in the "In Depth Security (Proceedings of the DeepSec Conferences)" book.

    See publication
  • Enhancing Mobile Malware: an Android RAT Case Study

    BSides Vienna 2014

    At BSides Vienna 2014, Roberto Puricelli and me delivered a talk based on Androrat++, a proof-of-concept mobile malware.

    Other authors
    See publication
  • Social Authentication: Vulnerabilities, Mitigations, and Redesign

    DEEPSEC 2014

    At DEEPSEC 2014 I delivered a talk based on my Master Thesis: "Social Authentication: Vulnerabilities, Mitigations, and Redesign". In addition, an excerpt of the work has been published by the Magdeburger Institut für Sicherheitsforschung in the volume "In Depth Security - Proceedings of the DeepSec Conferences" of the Magdeburger Journal zur Sicherheitsforschung.

    See publication
  • Social Authentication: Vulnerabilities, Mitigations, and Redesign

    Magdeburger Journal zur Sicherheitsforschung, Vienna, Austria

    Proceedings of the DeepSec Conferences - Magdeburger Journal zur Sicherheitsforschung, Vienna, Austria

    See publication
  • Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

    Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS '14), Scottsdale, AZ

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called social authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition software. Here we demonstrate an alternative attack that employs image comparison techniques to identify the SA photos within an offline…

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called social authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition software. Here we demonstrate an alternative attack that employs image comparison techniques to identify the SA photos within an offline collection of the users' photos.

    In this paper, we revisit the concept of SA and design a system with a novel photo selection and transformation process, which generates challenges that are robust against these attacks. The intuition behind our photo selection is to use photos that fail software-based face recognition, while remaining recognizable to humans who are familiar with the depicted people. The photo transformation process creates challenges in the form of photo collages, where faces are transformed so as to render image matching techniques ineffective. We experimentally confirm the robustness of our approach against three template matching algorithms that solve 0.4% of the challenges, while requiring four orders of magnitude more processing effort. Furthermore, when the transformations are applied, face detection software fails to detect even a single face. Our user studies confirm that users are able to identify their friends in over 99% of the photos with faces unrecognizable by software, and can solve over 94% of the challenges with transformed photos.

    Other authors
    See publication
  • Social Authentication: Vulnerabilities, Mitigations, and Redesign (short version)

    CyCon 2014

    I delivered a talk based on my Master Thesis in the "Student Paper Session with Best Student Thesis Award" at the International Conference on Cyber Conflict (CyCon 2014), by NATO CCDCOE (Cooperative Cyber Defence Centre of Excellence).

    My Thesis also won the NATO CCDCOE Best Student Thesis Award, as the best thesis published on cyber defence topics.

    See publication
Join now to see all publications

Projects

  • The CloudSec Engineer

    Author of "The CloudSec Engineer", a book on how to enter, establish yourself, and thrive in the Cloud Security industry as an individual contributor.

  • Lead the Future

    Mentor in the Lead the Future program, a non‑profit that helps young Italian talents to pursue a career in the STEM field.

    See project
  • Cloud Security Roadmap

    A framework to establish a cloud security program aimed at protecting a cloud native, service provider agnostic, container-based, offering, aligned with NIST and the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM).

    See project
  • CloudSecDocs

    I curate CloudSecDocs.com, a website collecting and sharing my technical notes and knowledge on cloud-native technologies, security, technical leadership, and engineering culture.

    See project
  • CloudSecList

    - Present

    I curate CloudSecList, a newsletter that keeps thousands of security professionals informed about current happenings and news related to the security of cloud-native technologies.

    See project
  • Cartography

    -

    I am a maintainer of Cartography, a Python tool that consolidates infrastructure assets and the relationships between them in a graph view powered by a Neo4j database. As part of my involvement, I'm actively contributing new features as well as helping defining the long term roadmap for Cartography.

    See project
  • k8s-lab-plz: A modular Kubernetes Lab

    -

    k8s-lab-plz is a modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.

    See project
  • CNCF Security Certification (CKS) Creation

    -

    I have been part of the CNCF committee tasked with creating the Certified Kubernetes Security Specialist (CKS) Certification.

    See project
  • Needle

    -

    Needle (https://github.com/FSecureLABS/needle) is the MWR's iOS Security Testing Framework, released at Black Hat USA in August 2016. It is an open source modular framework which aims to streamline the entire process of conducting security assessments of iOS applications, and acts as a central point from which to do so. Needle is intended to be useful not only for security professionals, but also for developers looking to secure their code. A few examples of testing areas covered by Needle…

    Needle (https://github.com/FSecureLABS/needle) is the MWR's iOS Security Testing Framework, released at Black Hat USA in August 2016. It is an open source modular framework which aims to streamline the entire process of conducting security assessments of iOS applications, and acts as a central point from which to do so. Needle is intended to be useful not only for security professionals, but also for developers looking to secure their code. A few examples of testing areas covered by Needle include: data storage, inter-process communication, network communications, static code analysis, hooking and binary protections.​

    The release of version 1.0.0 provided a major overhaul of its core and the introduction of a new native agent, written entirely in Objective-C. The new NeedleAgent (https://github.com/FSecureLABS/needle-agent) is an open source iOS app complementary to Needle, that allows to programmatically perform tasks natively on the device, eliminating the need for third party tools. 

    Needle has been presented at and used by workshops in various international conferences like Black Hat USA/EU, OWASP AppSec and DEEPSEC. It was also included by ToolsWatch in the shortlist for the Top Security Tools of 2016 (http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/), and it is featured in the OWASP Mobile Testing Guide (https://github.com/OWASP/owasp-mstg). On the week of its release, it reached #3 on Netsec, the first page of Hacker News, and it was trending on Github.

    See project
  • "Offensive iOS Exploitation"​ Training Course

    -

    The Offensive iOS Exploitation workshop is an exercise-driven training course that uses detailed tutorials to guide the attendees through all the steps necessary to exploit a real iOS application, and in the process, provide them an understanding of the modern attacker's mind-set and capabilities. The course cover iOS hacking, from the basics of vulnerability hunting on the platform to advanced exploitation techniques. In addition, this workshop use MWR's newly released "Needle" to identify and…

    The Offensive iOS Exploitation workshop is an exercise-driven training course that uses detailed tutorials to guide the attendees through all the steps necessary to exploit a real iOS application, and in the process, provide them an understanding of the modern attacker's mind-set and capabilities. The course cover iOS hacking, from the basics of vulnerability hunting on the platform to advanced exploitation techniques. In addition, this workshop use MWR's newly released "Needle" to identify and exploit all the common mobile application security flaws, over and above the OWASP Mobile Top Ten.

    At its conclusion, it will have imparted the information necessary to develop secure and robust applications. Other take-aways will include how to develop secure mobile applications that can withstand advanced attacks, how hackers attack mobile applications and iOS devices, and the most up to date and effective secure coding practices.

  • AndroRAT++

    -

    AndroRAT++ is a proof-of-concept mobile malware, embedded in a legitimate application, that enhances the features of a well-know RAT application (AndroRAT).

    See project
  • Social Authentication: Vulnerabilities, Mitigations, and Redesign (MSc Thesis)

    -

    We pointed out the security weaknesses of using Social Authentication (SA) as part of a two-factor authentication scheme, focusing on Facebook's deployment. We have empirically calculated the probability of an attacker obtaining the information necessary to solve SA tests when relying on publicly accessible data as well as following a more active approach to gather restricted information.
    We have designed an automated attack able to break the SA, to demonstrate the feasibility of carrying…

    We pointed out the security weaknesses of using Social Authentication (SA) as part of a two-factor authentication scheme, focusing on Facebook's deployment. We have empirically calculated the probability of an attacker obtaining the information necessary to solve SA tests when relying on publicly accessible data as well as following a more active approach to gather restricted information.
    We have designed an automated attack able to break the SA, to demonstrate the feasibility of carrying out large-scale attacks against social authentication with minimal effort on behalf of an attacker.
    We then revisited the SA concept and proposed reSA, a two-factor authentication scheme that can be easily solved by humans but is robust against face-recognition software.

    See project
  • FacePrivacy: Identify A Stranger From A Photography (BSc Thesis)

    -

    FacePrivacy is an application that wants to demonstrate the possibility of identify a person from a photograph. Leveraging the broad base of photographs on Facebook, it was shown that, appropriately using a face recognition algorithm, it’s possible to violate the privacy of a stranger.

    See project

Languages

  • English

    Native or bilingual proficiency

  • Italian

    Native or bilingual proficiency

View Marco’s full profile

  • See who you know in common
  • Get introduced
  • Contact Marco directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More