1 / 21

Bromium vSentry

Bromium vSentry. Adrian Taylor Director, Mobile. . Paid 3644-2276-1234-5678. Zero-day price list. Source: http:// www.forbes.com /sites/ andygreenberg /2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/. Demo.

barny
Download Presentation

Bromium vSentry

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BromiumvSentry Adrian Taylor Director, Mobile

  2. Paid 3644-2276-1234-5678

  3. Zero-day price list Source: http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/

  4. Demo

  5. Micro-virtualization:Hardware-isolation for untrusted tasks Hardware-isolates each untrusted Windows task Lightweight, fast, hidden, with an unchanged native UX Microvisor Based on Xen with a tiny, secure code base Fully integrated into thedesktop user experience Uses I/O Virtualization VT-d, TXT & TPM if available HardwareVirtualization (VT-x)

  6. Demo

  7. Hardware Kernel OS Libs / Utils Applications

  8. Mutually isolates untrustworthy tasks from the Desktop, & each other Desktop CPU Untrusted Tasks

  9. http://www.facebook.com

  10. Micro-VMs have “need to know” access to files, networks, and the user’s desktop

  11. Micro-VMs execute “Copy on Write”

  12. Malware is automatically discarded

  13. Live attack visualization and analysis : LAVA

  14. APIs for Live Attack Analysis 2. One task per micro-VM 3. Full attack execution 1. Micro-VM Introspection

  15. DEMO

  16. Desktop, Laptop, Tabletand Smartphone 2012 2013 Future

  17. Thank you

More Related