a new approach to runtime cybersecurity thomas h. probert, ph. d. founder/ctostegosystems

6

Upload: eileen-nash

Post on 18-Dec-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

A New Approach to Runtime Cybersecurity

Thomas H. Probert, Ph. D.Founder/CTO

STEGOSYSTEMS

The Evolving Runtime Threat

Threat Level

STEGOSYSTEMS Digital Immunity Prevents Execution of Foreign or Malicious Code During Runtime

Dynamic Tampering, Stack Smashing, Code Injection, Buffer Overflows, Reflective Programming, Some Forms of SQL Injection

STUXNET

Perimeter DefenseAV/Whitelist,HIDS, NIDS

Network

Kernel

Apps

EndpointLIVE Memory

withExacutingPrograms

Signatureseg., Whitelisting

Executing Binary in Memory

Secure Transport and AuthenticateSignatures Removed on Launch

Prevent the Execution of Compromised Programs

Our Solution

“When the only tool you have is a hammer

you tend to see every problem as a nail”

Abraham Maslow

Covert

Watermarker StructureCredential

Recognizers

SIGNED

Perfectly Secure Steganography

No Source Code

No Code Modifications

All Executables

Any Instruction Set, OS, HardwareComplements/ Replace Existing Tools

No False Positives

Watermarker StructureCredential

Recognizers

SIGNED

Perfectly Secure Steganography

Why Is This Better?

Invisible Persistent WatermarkIntegrity Is Continuously VerifiedImmunity to Foreign Code

Prevents Dynamic Tampering

Digital Immunity ToolsAvailable Today

• X86/32/64,• Windows XP,Vista,7

Come See a Demo