220 likes | 642 Views
Bromium vSentry. Adrian Taylor Director, Mobile. . Paid 3644-2276-1234-5678. Zero-day price list. Source: http:// www.forbes.com /sites/ andygreenberg /2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/. Demo.
E N D
BromiumvSentry Adrian Taylor Director, Mobile
Paid 3644-2276-1234-5678
Zero-day price list Source: http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/
Micro-virtualization:Hardware-isolation for untrusted tasks Hardware-isolates each untrusted Windows task Lightweight, fast, hidden, with an unchanged native UX Microvisor Based on Xen with a tiny, secure code base Fully integrated into thedesktop user experience Uses I/O Virtualization VT-d, TXT & TPM if available HardwareVirtualization (VT-x)
Hardware Kernel OS Libs / Utils Applications
Mutually isolates untrustworthy tasks from the Desktop, & each other Desktop CPU Untrusted Tasks
Micro-VMs have “need to know” access to files, networks, and the user’s desktop
APIs for Live Attack Analysis 2. One task per micro-VM 3. Full attack execution 1. Micro-VM Introspection
Desktop, Laptop, Tabletand Smartphone 2012 2013 Future