Università degli Studi di Trento Trusted Flow for Malware Protection F. Massacci (DIT - University of Trento - www.dit.unitn.it)

Slides:



Advertisements
Similar presentations
1 The Project of this year Mariano Ceccato FBK - Fondazione Bruno Kessler
Advertisements

Online Learning and the Laptop Initiative Hidden Valley High School Roanoke County Public Schools 2006.
Don’t Be Tricked Beware of Zombies. Malicious zombie code infects computer Internet.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
ENG 101 MOCK EXAM ANSWERS. PART ONE – LISTENING & NOTE-TAKING Listening Task 1 - (5 x 3pts = 15pts) 1. What do people say about test scores? (part A)
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
By: Carolyn Hundley Science Safety Contract I will act responsibly at all times in the laboratory. I will follow all instructions about laboratory.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Bring Your On Device. What is BYOD? Students bring an electronic device such as smart phone, laptop, I-Pad, etc to school for: Researching information-
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
China Mobile Leader’s Programme Mobile Technology Jon Crowcroft +gmail, hotmail
Engineering Secure Software. Lottery Story A Threat We Can’t Ignore  Documented incidents are prevalent Carnegie Melon’s SEI has studied over 700 cybercrimes.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Copyright, Designs and Patents Act. Introduction You have spent three months working on your coursework. It is absolutely brilliant,, you just know that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Bill Gates’ RSA 2006 Keynote presentation Questions and answers.
ENGLISH – LEVEL VI WEEK II – LESSON 4 1. THE SECOND CONDITIONAL – REVISION If you could be an animal, what would you be? If you could be another person.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Bootstrapping Trust in Commodity Computers Bryan Parno, Jonathan McCune, Adrian Perrig 1 Carnegie Mellon University.
Student Technology Use. 1. I can share passwords with my parents and teachers.
Copyright, Designs and Patents Act 1988
Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
CARLETON READS & COUNTS (TUTOR SESSION) April 30, 2013 Diane Torbenson RtI Greenvale Park Elementary School
Bypassing malware detection mechanisms in online banking Jakub Kałużny Mateusz Olejarka CONFidence,
StrEAT – Eat out app eat-ria.appspot.com eat-ria.appspot.com Using Owner Side – Tutorial Video tutorial.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Applying White-Box Cryptography SoBeNet user group meeting October 8, 2004 Brecht Wyseur.
Mathieu Castets October 17th,  What is a rootkit?  History  Uses  Types  Detection  Removal  References 2/11.
10 Deadly Sins of Administrators about Windows Security Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign - CQURE:
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
VENKAT DEEP RAJAN SUMALATHA REDDY KARTHIK INJARAPU CPSC 620 CLEMSON UNIVERSITY.
“Playing It Safe” A Computer and Internet Safety Guide.
Justice Stillwell 1.  Pre paid cards are non- reloadable  Similar to credit cards  No line of credit needed  Make sure you have enough balance before.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Cybersecurity Test Review Introduction to Digital Technology.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
©Select Office Solutions 2000 PC support at your door Computer Training Business Analysis Strategic & Business Planning.
It’s Where the Fortune Is The Power of Follow Up.
Following the signposts for greater understanding.
Modelling with variables. Question… Name three types of bird food you can think of. e.g. sunflower seeds, peanuts, suet balls what if this was the only.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
WJEC GCSE Geography A Unit 1 – The Core A- The Physical World Theme 1 Water.
Fix: Windows 10 Error Code 0x in Mail App u/6/b/ /alexwaston14/reimage-system-repair/ /pages/Reimage-Repair-Tool/
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Preparing Your Apps for Publication Test your app thoroughly on a variety of devices. The app might work perfectly using the emulator on your.
Playing Outside Drink lots of water all day, even if you’re not thirsty. Take breaks to cool down. Play in a shady area. Wear light clothes. Leave beehives.
Guidelines for Student Laptop Use Safford Unified School District.
BJHS Laptop/ IMC Orientation Video.
Firmware threat Dhaval Chauhan MIS 534.
TECHNOLOGY GUIDE THREE
Enterprise Botnet Detection and Mitigation System
Cybersecurity BGP hijacking DDoS Botnets What’s next?
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
Deriving more value from your Windows investment
How to Turn off Norton Antivirus firewall. The Norton firewall is necessary as it keeps a check on the internet activities to ensure the safety of the.
NORTON CUSTOMER SUPPORT NUMBER. NORTON CUSTOMER SERVICE.
Safe and secure? Protecting yourself, your equipment and your wallet in today’s digital universe.
IASP 470 PROJECT PROPOSAL MALWARE DETECTION
Presentation transcript:

Università degli Studi di Trento Trusted Flow for Malware Protection F. Massacci (DIT - University of Trento -

Università degli Studi di Trento Observation on Trust Boundaries Cheating Husbands and other stories (Fagin et al.) Corporate Network looks like an Harem –Different hierachies of husbands (each with his privileges and precious jewelry) –Bulky Guards at the door –Spies and mail surveilance and censorship –Bedchamber boys Enter Laptops and mobility… –Allow husbands to have sex in the (internet) bazar –And then come back to harem carring malware with them… –They can become zombies controlled from outside… Something clearly wrong here…

Università degli Studi di Trento Trusted Flow for Malware Solution: Cut mobility, tighten entrance rule –Not really possible –So we must allow sex in the bazar Solution: Check behavior of husband once inside Option 1: check clothes are untainted –Digitally signed assemblies/software (eg.NET) –Not very good: show clean clothes at the door, use completely dirty dresses (eg latest rootkit, recent IAT attack on.NET by UniTN) Option 2: trusted flow for Malware

Università degli Studi di Trento Implementing Trusted Flow for Malware Inoculation of Vaccines into husbands –Injecting trusted flow into important sw once inside –Give husbands obfuscated drinks on wedding day –if vaccine spots keep appearing (trusted flow) fine –else repudiate husband (isolate laptop from network) Unfortunately… –Smart husbands can always reverse engineer software –Can tell original drink from inoculated drink –Can make their own anti-vaccines: give spots even if misbehaving

Università degli Studi di Trento Implementing Trusted Flow for Malware 2 Fortunately… –Normal husbands can only buy ready-made (automated) anti- vaccines from the bazar –Smart husbands aren’t many and have better things to do than making anti-vaccines (or having sex in the bazar for that matter) Objective: keep normal husbands from misbehaving –Vaccines should be unique to each husband –Vaccines should require human intervention for removal or bypassing