GRIMM Announces Cyber Partnership with Michigan Educational Non-Profit, Square One Focused on New High School Curriculum for Automotive Cybersecurity

GRIMM Announces Cyber Partnership with Michigan Educational Non-Profit, Square One Focused on New High School Curriculum for Automotive Cybersecurity

GRIMM
Earlier this month, GRIMM’s embedded security team joined Michigan’s Governor, Rick Snyder, (pictured above) along with SAE, Michigan educational non-profit, Square One, and industry leaders at the 2018 SAE CyberAuto Challenge™ to announce our new partnership. Our teams are joining forces to create, deliver, and mentor Michigan high school students with a new program: “Masters of Mobility: Cybersecurity on the Road.” This program will provide in-depth training, resources and materials that will help “train-the-trainer.
Getting ready for Black Hat?

Getting ready for Black Hat?

SCYTHE
August is right around the corner, our favorite time of the year - Black Hat and DEF CON! SCYTHE is gearing up for a great week in Las Vegas - and we’re especially excited because this is our first official hacker summer camp since officially launching the company last October. Here’s a bit of what we’ll be up to! SCYTHE will make it’s official debut on Wednesday, August 8 and Thursday, August 9 at the Black Hat Innovation City.
Crash Triage Process

Crash Triage Process

GRIMM
People tend to think that when a fuzzer finds a bunch of crashes that it’s exciting and fun, and it is… the first time. However, when there are 181 supposedly-unique crashes and it’s time to go through each of them to determine the impact (aka which ones are exploitable, as opposed to only denial of service), it’s a lot less fun. In fact, it can be downright grueling. Here’s what the process really looks like:
GRIMM Celebrates Its 5 Year Anniversary

GRIMM Celebrates Its 5 Year Anniversary

GRIMM
When Bryson Bort founded GRIMM, he had two objectives. Develop a world class, research and development company Change and protect the world. Five years later, these are still GRIMM’s guiding principles. To us, world class is directly linked to talent density. We have high standards for ourselves, and our workforce, and do not compromise. Our interns, most junior engineers, and our most senior engineers are passionate to help businesses succeed.
Delta Debugging

Delta Debugging

GRIMM
Introduction Have you ever been fuzzing a program and received a crash, only to find the input file was huge? Trying to manually determine which portions of an input file trigger the bug can be an extremely frustrating and time consuming process. Huge input files can make the triage of bugs much harder. This blog post describes a technique known as delta-debugging which can help you automatically produce an input file that is as small as possible while still triggering the bug in the original input file.
GRIMM’s New Michigan Cybersecurity Research Lab

GRIMM’s New Michigan Cybersecurity Research Lab

GRIMM
GRIMM has been a long time advocate of building Connected and Automated Vehicles (CAV) with a security-by-design approach. We advance our automotive and aerospace clients’ cybersecurity posture for all forms of embedded security concerns. For example, for the past several years, GRIMM has been a co-sponsor and staple at theSANS Automotive conference - a one-stop shop for bringing the automotive sector, including manufacturers as well as vendors, and the security industry together to discuss the complexities of securing citizens in commercial and personal vehicles.
Guided Fuzzing with Driller

Guided Fuzzing with Driller

GRIMM
At GRIMM, we are always trying out new tools to build our capabilities in vulnerability research. We frequently use fuzzing to search for bugs in applications, but there are some bugs a fuzzer alone would not be able to find. So, we were excited to try out Driller, a tool written by Shellphish. Driller uses symbolic execution to find new parts of the code to fuzz, helping the fuzzer to find bugs that it might not have reached otherwise.
Making security decisions based on verifiable facts

Making security decisions based on verifiable facts

Adam Nichols

Security decisions should be based on verifiable data - facts - rather than opinions. I’ve seen the trend of CISOs and many security operators being impeded by the lack of transparency into security data, jaded by product features and marketing fluff and limited by their ability to glean high quality, data-driven insights to inform decision making. This is a problem that GRIMM is working to solve.

SCYTHE and the ICS Village’s inaugural RSAC!

SCYTHE and the ICS Village’s inaugural RSAC!

GRIMM & SCYTHE

Whew. Who’s still recovering from RSAC 2018? GRIMM has been making appearances at the annual conference since launching in 2012. However, this was the inaugural visit for SCYTHE, GRIMM’s sister product company which launched last October, and the ICS Village, a non-profit the GRIMM and SCYTHE leadership helped launch this spring. And what a splash it was! In case you missed it, we were busy! Here’s a recap: