Samir Mody (Sophos/K7Computing) Igor Muttik (McAfee) Peter Ferrie (Microsoft)

Slides:



Advertisements
Similar presentations
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
6.1 © 2007 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
CNI Fall 1998 Access Management Requirements and Approaches Joan Gargano California Digital Library
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
1 Metric Scheme u Transmittal –basic scheme: collect all necessary metrics from tools send metrics to the database –implementation options: send all metrics.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
EICAR 2009, 12 May 2009 Checkvir Realtime Anti-Malware Testing and Certification Dr. Ferenc Leitold, Veszprog Ltd.
KASPERSKY SECURITY FOR STORAGE Product Launch Presentation Global B2B Product Marketing Teams.
Symantec Endpoint Protection Partner References. SEP MR3, the latest iteration of the endpoint protection suite, is tightly tailored for performance of.
Web Application Authentication with PKI & Other Functions Bill Weems & Mark B. Jones Academic Technology University of Texas Health Science Center at Houston.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
This chapter is extracted from Sommerville’s slides. Text book chapter
Software Identification Understanding the Methodologies (And Why it Matters) Kris Barker Co-founder & CEO Express Metrix / Apptria Technologies.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Open Source for Government Alexander C. Pitzner Sr. Network Engineer Harrisburg University of Science and Technology
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Protect Your Desktops from Malware and Unauthorized Software.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication.
Information Systems Security Computer System Life Cycle Security.
Proposal for App Id and Service Provider Id registration Group Name: Shelby Kiewel Source: Shelby Kiewel, iconectiv / Ericsson,
Masud Hasan Secue VS Hushmail Project 2.
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 3 Content Management.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
Panel Introduction: Life After Antivirus – What Does the Future Hold? Martin Fréchette Sr. Principal Engineer Symantec Research Labs – Advanced Concepts.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The Changing World of Endpoint Protection
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Enhanced Storage Architecture
Application Recognition Sam Larsen Determina. Process Control One method to improve computer security is through process control  Whitelist: user specifies.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Crime Analysis and Mapping Jonathan Lewin. Impacting Crime Considerations in Developing a Crime Mapping Application.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Reach us at Call: | Visit:
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Chapter 6 Foundations of Business Intelligence: Databases and Information Management.
Add video notes to lecture
Computer Security Activities in IEEE-SA
Threat Monitoring Center
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
BY GAWARE S.R. DEPT.OF COMP.SCI
How to scan system with norton-antivirus Norton antivirus is one of the worlds best anti-malware software developed by Symmantics corporation in 1991 as.
AVG Antivirus Tech Support Number
Chapter 6 Foundations of Business Intelligence: Databases and Information Management.
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
4.02 Develop web pages using various layouts and technologies.
Chapter 6 Foundations of Business Intelligence: Databases and Information Management.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

Samir Mody (Sophos/K7Computing) Igor Muttik (McAfee) Peter Ferrie (Microsoft)

1. Reduce impact of legitimate packers in malware 2. Improve identification of custom packers

Digital signature Packer family Check: Packer prevalence (malware vs clean) License key (alias “taggant” or “watermark”) information Packer properties

A lice Packer vendor C arol AV vendor B ob Packer user AV user Victim of malware  D ave Bad boy malware author sell oops

What?  Taggant: cryptographically encrypted data based on PKI  Watermark: encoded data permeating a file  Both specify packer family, unique packer license ID, and potentially more Why?  Allows blacklisting abused legitimate packers without the need to unpack

 AV industry-packer vendor partnership  AV members: AVG, CSIS SecurityGroup A/S, Damballa, ESET, IBM, K7Computing, Marvell Semiconductor, McAfee Inc., Microsoft Corporation, NovaShield, Palo Alto Networks, Panda Security, Sophos Plc, Symantec Corporation, Trend Micro Inc., Veszprog  Packer partners: Enigma, Obsidium, Oreans (Themida), VMPSoft (VMProtect)

 Sponsored technical infrastructure  Cryptographically secure (PKI)  No need to unpack  Compatible with digital signatures  Sponsored administrative infrastructure  Managed by IEEE  Issuing and maintaining records of credentials  Addressing queries and issues

Anti- emulation Anti- debugging Excessive branching Superset of individual packer characteristics Potential overlaps of shared characteristics between properties

 Combinations of packer properties may be grounds for suspicion  Suspicious packing applications may be grounds for suspicion of the packer  Status of packers depends on:  Properties of the packer  Extent of cooperation of packer vendor  Prevalence of packer in legitimate applications  AV vendor’s client base and individual security policy  AV industry may actively promote well-behaved packers

 Need more comprehensive and concerted policy to deal with packer problem  Can use digital signatures, taggants, watermarks and packer properties in decision logic on packer status  IEEE ICSG taggant system potential  Need cooperation of packer vendors, free packer authors and the general public

 Difficult to blacklist outright due to high volume  However, in general free packers are not as complex as commercial ones, i.e. most AV solutions are likely to be able to unravel free packer layers to peek inside  Nevertheless, the IEEE ICSG scheme does incorporate a solution to accommodate applying taggants for open source or freely available packers

 Polymorphic code  Non-standard use of APIs  Unusual structural features  Unnecessary use of unusual instructions  Unnecessary branching into the middle of another instruction  Destruction of target data  Impersonation of another packer  Unusual transfer of execution control