bromium vsentry

21
Bromium vSentry Adrian Taylor Director, Mobile

Upload: barny

Post on 24-Feb-2016

160 views

Category:

Documents


0 download

DESCRIPTION

Bromium vSentry. Adrian Taylor Director, Mobile. . Paid 3644-2276-1234-5678. Zero-day price list. Source: http:// www.forbes.com /sites/ andygreenberg /2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/. Demo. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Bromium vSentry

Bromium vSentryAdrian Taylor

Director, Mobile

Page 2: Bromium vSentry

Paid3644-2276-1234-5678

Page 3: Bromium vSentry

Bromium Confidential

Zero-dayAdobe Reader $5,000-$30,000Flash, Java $40,000-$100,000Word $50,000-$100,000Internet Explorer $80,000-$200,000iOS $100,000-$250,000

Zero-day price list

Source: http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/

Page 4: Bromium vSentry

DEMO

Page 5: Bromium vSentry
Page 6: Bromium vSentry
Page 7: Bromium vSentry

Micro-virtualization:Hardware-isolation for untrusted tasks

MicrovisorHardware

Virtualization (VT-x)

Lightweight, fast, hidden, with an unchanged native UX

Hardware-isolates each untrusted Windows task

Uses I/O Virtualization VT-d, TXT & TPM if available

Based on Xen with a tiny, secure code base

Fully integrated into thedesktop user experience

Page 8: Bromium vSentry

DEMO

Page 9: Bromium vSentry

ApplicationsOS Libs / Utils

Kernel

Hardware

Page 10: Bromium vSentry

Desktop

Untrusted Tasks

CPU

Mutually isolates untrustworthy tasks from the Desktop, & each other

Page 11: Bromium vSentry

http://www.facebook.com

Page 12: Bromium vSentry

Micro-VMs have “need to know” access to

files, networks, and the user’s desktop

Page 13: Bromium vSentry
Page 14: Bromium vSentry
Page 15: Bromium vSentry

Micro-VMs execute “Copy on Write”

Page 16: Bromium vSentry

Malware is automatically

discarded

Page 17: Bromium vSentry

LIVE ATTACK VISUALIZATION AND ANALYSIS : LAVA

Page 18: Bromium vSentry

3. Full attack execution

2. One task per micro-VM

1. Micro-VM Introspection

APIs for Live Attack Analysis

Page 19: Bromium vSentry

DEMO

Page 20: Bromium vSentry

Bromium Confidential

Desktop, Laptop, Tablet and Smartphone

2012 2013 Future

Page 21: Bromium vSentry

Thank you