A New Approach to Runtime Cybersecurity Thomas H. Probert, Ph. D. Founder/CTOSTEGOSYSTEMS.
-
Upload
eileen-nash -
Category
Documents
-
view
218 -
download
1
Transcript of A New Approach to Runtime Cybersecurity Thomas H. Probert, Ph. D. Founder/CTOSTEGOSYSTEMS.
The Evolving Runtime Threat
Threat Level
STEGOSYSTEMS Digital Immunity Prevents Execution of Foreign or Malicious Code During Runtime
Dynamic Tampering, Stack Smashing, Code Injection, Buffer Overflows, Reflective Programming, Some Forms of SQL Injection
STUXNET
Perimeter DefenseAV/Whitelist,HIDS, NIDS
Network
Kernel
Apps
EndpointLIVE Memory
withExacutingPrograms
Signatureseg., Whitelisting
Executing Binary in Memory
Secure Transport and AuthenticateSignatures Removed on Launch
Prevent the Execution of Compromised Programs
Our Solution
“When the only tool you have is a hammer
you tend to see every problem as a nail”
Abraham Maslow
Covert
Watermarker StructureCredential
Recognizers
SIGNED
Perfectly Secure Steganography
No Source Code
No Code Modifications
All Executables
Any Instruction Set, OS, HardwareComplements/ Replace Existing Tools
No False Positives
Watermarker StructureCredential
Recognizers
SIGNED
Perfectly Secure Steganography
Why Is This Better?
Invisible Persistent WatermarkIntegrity Is Continuously VerifiedImmunity to Foreign Code
Prevents Dynamic Tampering
Digital Immunity ToolsAvailable Today
• X86/32/64,• Windows XP,Vista,7
Come See a Demo