INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY
|
|
- Melina Taylor
- 6 years ago
- Views:
Transcription
1 INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY VERSION 2.2 OCTOBER 2001 SUMMARY Software is easy to tamper with and reverse engineer so unprotected software deployed on malicious hosts can t be trusted by corporations and service providers. Cloakware has developed an innovative security technology that converts ordinary software into Tamper Resistant Software (TRS). With Cloakware/TRS technology, software can now be deployed on suspicious hosts and be trusted to perform the functions it was designed to perform and to conceal proprietary algorithms and secrets including cryptographic keys embedded in the software., 2001
2 INTRODUCTION A fundamental security limitation faced by designers of corporate and Internet applications is that software is easy to tamper with (to change the intended functionality of the software) and to reverse engineer (to determine how the software works and to discover proprietary algorithms and secrets). This means that software deployed in hostile environments, like the Internet, on platforms you can t control cannot always be trusted to perform the intended functions or to conceal confidential or proprietary information and algorithms. Cloakware has developed an innovative security technology that converts ordinary software into tamper-resistant software (TRS). In its cloaked form, software is highly resistant to tampering attacks unauthorized modifications to the software result in non-functional code and very difficult to reverse engineer using sophisticated code analysis techniques and tools including debuggers. Cloakware/TRS technology enables applications and new architectures, protects intellectual property, lowers the cost of security and administration, and improves user convenience. This white paper provides an introduction to Cloakware/TRS technology, describes how it works and discusses implementation considerations. Figure 1. Tampering and Reverse Engineering Attacks on Software Original Program Tampered Program If CEO (transfer funds) else (reject) Tampering Attack If anyone (transfer funds) else (reject) Secret Key Proprietary Algorithm Reverse- Engineering Attack Secret Key Proprietary Algorithm Reverse Engineering Outputs Secret Key Proprietary Algorithm If CEO (transfer funds) else (reject) 2
3 CLOAKWARE/TRS TECHNOLOGY Cloakware/TRS is a patent-pending software security technology that is the first technology to provide a high degree of protection against both tampering and reverse engineering without constraining portability and ease of use. Cloakware/TRS technology uses functionality preserving code transformations implemented using a one-way program translation tool or Encoder (refer to Figure 1). Source code is input to the Encoder, which converts the code into a tamper-resistant or cloaked form. The cloaked code has the same functionality as the original program, but has the property that it is very difficult to reverse engineer or tamper with. The cloaked program executes on any open computing platform without special hardware or software. An attacker can still "see" the bits and bytes that make up the program but it is extremely difficult to extract information about what the program does or to tamper with the program. Figure 2. The Cloakware/TRS Encoder Other Application Other Application Security Sensitive Application - secret keys - algorithms - branches Cloakware Encoder Cloaked Source Host Computer Object Commercial Compiler The code transformations performed by the Encoder can be optimized for the security requirements of specific applications and fall into four categories: Data flow These are code transformations that conceal variables and operations primarily to defend against reverse engineering attacks. They also make tampering attacks more difficult by substantially increasing the level of difficulty to understand a program. Control flow These code transformations are applied to program control flow to defend against tampering attacks such as branch jamming. 3
4 Mass data These transformations conceal large arrays and data structures to prevent reverse engineering and tampering. White box cryptography (WBC) These transformations are specific to cryptographic ciphers and enable key hiding within the cipher. Specialized transformations are require to protect cryptographic algorithms since they are very well studied and are subject to a whole class of attacks that other algorithms are not exposed to. Hence, crypto algorithms require very specific transformations to protect them against reverse engineering attacks intended to uncover cryptographic keys. During the Encoding process, randomness is injected into the code transformations. Hence, a single program can be transformed into multiple cloaked instances of the program. Each cloaked instance has the same functionality but looks different to an attacker attempting to tamper with or reverse engineer the program. This capability is the key to developing applications that resist global or automated attacks and to refreshing the security of software applications. We look at how this capability can be leveraged later in this white paper. THREAT MODEL AND SECURITY Cloakware/TRS technology converts software into a form that takes a sophisticated attacker months rather than minutes or hours to penetrate. One of the fundamental assumptions underlying this is the threat model for cloaked software. Unlike many software protection technologies, our threat model assumes that an attacker has access to our patents and complete access to the software executing on an open platform with this the attacker is able to see the data flow and control flow with the most sophisticated debugging and hacking tools. The second assumption has to do with the class of attacker we are trying to defend software against. Attackers can be classified by a number of schemes 1&2. We have adapted these to fit the context of Cloakware/TRS: Class I: Class I attackers are often very intelligent but they lack the inside knowledge of Cloakware/TRS to mount a new or novel attack. They may have access to only moderately sophisticated equipment. They often try to take advantage of an existing weakness in the system, rather than try to create one. Unless there is a known weakness to exploit, they are not usually a threat. Class II: Class II attackers have substantial mathematical skill sets in areas such as geometric combinatorics, statistics, signal processing, number theory and optimization theory. They have all of the knowledge assumed by the above Threat Model. This class of attackers has access to sophisticated tools for analysis, including emulators, and is comprised of highly skilled programmers. Class III (funded organizations): Class III attackers are organizationally funded tiger teams of Class II and above attackers. They have access to specialists in any of the necessary areas of mathematical expertise. They also have the latest in tools and computing machinery. They can design new and innovative attacks on TRS and exploit even the smallest weakness. Currently, we estimate that it would take Class II and Class III attackers months to penetrate a cloaked program compared to minutes or hours for an unprotected program. In support of our security claims, 1 R. Anderson and M. Kuhn, Low Cost Attacks on Tamper Resistant Devices, Proceedings of Security Protocols, 5 tth International Workshop, Paris, France, April7-9, 1997, pp Also available in PDF form at 2 D.G. Abraham, G.M. Dolan, G.P. Double and J.V. Stevens, Transaction Security System, IBM Systems Journal Volume 30, Number 2, 1991, pp
5 we have worked with academic researchers to establish a theoretical basis for the security of TRS 3 & 4 We have also established practical proof points of this security through work with Class III attackers. Cloakware is also continuously advancing this security level through the development of new code transformations and through an open security review process by working with academic researchers, and by presenting the technology at security conferences and workshops. LEVERAGING CLOAKED INSTANCES Cloakware/TRS has two important features that enable the development of systems that resist global or automated attacks and aid in refreshing the security of an application on an ongoing basis: The Cloakware Encoder can be configured to automatically produce hundreds, thousands or millions of different cloaked instances of a software program. The Encoder applies different transformations to each instance of the software. Each cloaked instance is functionally equivalent but is transformed differently by the Cloakware Encoder. Developing an attack against a cloaked instance of a program would take substantial time and effort for a sophisticated attacker. Developing an automated attack against a large number of cloaked instances of a program would be extremely difficult because each instance looks different to the attacker and it is unlikely that an attacker would not have direct access to each cloaked instance of the program. When designed into the appropriate system architecture, these capabilities of the Cloakware Encoder can substantially increase the resistance of the system to global attacks (attacks that can be automated and compromise the entire security of the system). Another advantage of this capability is that the cloaked instances of a program or security sub-system in a larger application (for example a content protection or DRM system) can now be refreshed continuously to stay ahead of attackers or to prevent attacks on vulnerabilities that may be discovered over time. History has taught those in the security industry that no security technology is bulletproof. Biology has taught us that diversity and the ability to evolve ensure survival of a species. Cloakware/TRS brings the benefits of diversity and ability to evolve to secure applications. 3 4 A. Shokurov, Preliminary Report on Measures of Resistance of Data Encodings, Technical Report, May 9, 200. Available in PDF form at Vladimir Zakharov. On the Complexity of Cloaked Program Analysis. Available in PDF form by contacting Cloakware at info@cloakware.com. 5
6 Figure 3. Defending Agains Application Tampering & reverse engineering attack Cloaked Instance Security Sensitive Application Targeted Encoder Application Cloaked Instance Automated Attacks Application Cloaked Instance IMPLEMENTATION CONSIDERATIONS For application and system designers interested in using Cloakware/TRS technology, there are several important considerations that affect implementation: expansion Program complexity Protocol design Diversity and renewability (discussed above) Expansion Encoding software results in code expansion meaning the cloaked software is larger in size than the input software. This can be dealt with in two ways. First, only the critical components of a program are cloaked such that the overall code expansion is a small percentage. For example, assume the critical security function, prior to cloaking, takes up 100 Kbytes of a program that is 1 Mbyte in size and that cloaking triples the size of the cloaked portion of the program. As shown in figure 3, the result will be an overall program that is 1.2 Mbytes in size a 20% increase over the unprotected program. Secondly, the Encoder has controls that can be adjusted for a specific application to optimize the security/size/runtime performance of the cloaked code. Figure 4. Expansion a) Before Cloaking Size = 1 MB b) After Cloaking Total increase = 20% 300 k 900k 100k 900k 6
7 Program Complexity Regardless of the degree of cloaking applied to an application, the cloaked portion of the code should be large enough and/or complex enough to make a black box attack infeasible. Otherwise, an attacker could simply monitor the code input and output and write new code to mimic the behavior of the cloaked program. Protocol Design Often Cloakware/TRS technology is a critical element of a total solution but not the entire solution. Applications that leverage TRS often depend on cryptographic protocols for secure communications between trusted software components or they may rely on system calls. The security protocols at the boundary of the cloaked portion of the program must be given careful consideration to ensure overall system security. For example, Cloakware/TRS technology alone cannot guarantee the integrity of system calls, such as checking the system clock. If the security of an application depends on system calls, it is possible for an attacker to spoof the operating system and return values that could cause the protocol to fail. This is more of a system design issue. Cloakware has substantial experience in implementing TRS in secure systems and can assist partners and customers in designing a secure system that makes optimal use of TRS and other security technologies and protocols. 7
8 CONCLUSION Software is easy to tamper with and reverse engineer so software deployed on suspicious hosts cannot be trusted to perform the intended functions or to conceal proprietary information and algorithms without some form of protection. Cloakware has developed an innovative security technology that converts ordinary software into TRS. Cloakware/TRS technology is based on a family of compiler-derived techniques and the innovative application of mathematical principles to prevent reverse engineering and tampering of software. The technology is implemented in the form of an encoder or program translation tool that converts normal software into TRS. This changes the rules for application and system designers since TRS can be deployed on suspicious hosts and be trusted to perform the functions it was designed to perform and to resist reverse engineering attacks. Implementation of TRS in a system requires consideration of code expansion produced by the encoder, program complexity and protocol design. Cloakware has expertise in TRS technology and applications and can assist partners and customers in the implementation of TRS technology to yield secure systems., 2001 This document is provided as is with no warranties, expressed or implied, including but not limited to any implied warranty of merchantability, fitness for a particular purpose, or freedom from infringement. may have patents or pending patent applications, trademarks, copyrights or other intellectual property rights that relate to the described subject matter. The furnishing of this document does not provide any license, expressed or implied, by estoppels or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. assumes no responsibility for error or omissions in this document; nor does Cloakware Corporation make any commitment to update the information contained herein. This document is subject to change without notice. 8
White-Box Cryptography State of the Art. Paul Gorissen
White-Box Cryptography State of the Art Paul Gorissen paul.gorissen@philips.com Outline Introduction Attack models White-box cryptography How it is done Interesting properties State of the art Conclusion
More informationHP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
More informationSecurity+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 1 Introduction to Security Objectives Describe the challenges of securing information Define information security and explain why
More informationIntel Analysis of Speculative Execution Side Channels
Intel Analysis of Speculative Execution Side Channels White Paper Revision 1.0 January 2018 Document Number: 336983-001 Intel technologies features and benefits depend on system configuration and may require
More informationApplying Context to Web Authentication
Applying Context to Web Authentication John Linn, Burt Kaliski, and Moti Yung, RSA Laboratories; Magnus Nyström, RSA Security Inc. Prepared for W3C Workshop on Transparency and Usability of Web Authentication,
More informationC1: Define Security Requirements
OWASP Top 10 Proactive Controls IEEE Top 10 Software Security Design Flaws OWASP Top 10 Vulnerabilities Mitigated OWASP Mobile Top 10 Vulnerabilities Mitigated C1: Define Security Requirements A security
More informationSTAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response
STAY ONE STEP AHEAD OF THE CRIMINAL MIND F-Secure Rapid Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone
More informationAchieve deeper network security
Achieve deeper network security SonicWall next-generation firewalls Abstract Next-generation firewalls (NGFWs) have become the new norm in network security for organizations of all sizes. Unlike their
More informationRecommendations for LXI systems containing devices supporting different versions of IEEE 1588
Recommendations for LXI systems containing devices supporting different versions of IEEE 1588 Revision 1.0 December 15, 2008 Edition Page 1 of 9 Notice of Rights All rights reserved. This document is the
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationBEST PRACTICES FOR SELECTING A WEB APPLICATION SCANNING (WAS) SOLUTION
GUIDE BEST PRACTICES FOR SELECTING A WEB APPLICATION SCANNING (WAS) SOLUTION CONTINUOUS SECURITY With attackers getting more sophisticated every day, manual methods of locating and testing web-based apps
More informationSmart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability
Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,
More informationSecurity. Communication security. System Security
Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security
More informationEXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE
EXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE Why you need to use sandboxing as well as signatures and heuristics Abstract Next-gen firewalls leverage signatures and heuristics
More informationSecurity Enhancements
OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationProduct Security Program
Product Security Program An overview of Carbon Black s Product Security Program and Practices Copyright 2016 Carbon Black, Inc. All rights reserved. Carbon Black is a registered trademark of Carbon Black,
More informationLa Science du Secret sans Secrets
La Science du Secret sans Secrets celebrating Jacques Stern s 60 s birthday Moti Yung Columbia University and Google Research Inspired by a Book by Jacques Popularizing Cryptography Doing research, teaching,
More informationWindows 10 IoT Core Azure Connectivity and Security
Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a
More informationPrivileged Account Security: A Balanced Approach to Securing Unix Environments
Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged
More informationSecure Development Lifecycle
Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationNetwork Working Group. Category: Standards Track NIST November 1998
Network Working Group Request for Comments: 2404 Category: Standards Track C. Madson Cisco Systems Inc. R. Glenn NIST November 1998 Status of this Memo The Use of HMAC-SHA-1-96 within ESP and AH This document
More informationIntel Authoring Tools for UPnP* Technologies
Intel Authoring Tools for UPnP* Technologies (Version 1.00, 05-07-2003) INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,
More informationSurvey of Cyber Moving Targets. Presented By Sharani Sankaran
Survey of Cyber Moving Targets Presented By Sharani Sankaran Moving Target Defense A cyber moving target technique refers to any technique that attempts to defend a system and increase the complexity of
More informationMake security part of your client systems refresh
Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for
More informationIT SECURITY FOR NONPROFITS
IT SECURITY FOR NONPROFITS COMMUNITY IT INNOVATORS PLAYBOOK April 2016 Community IT Innovators 1101 14th Street NW, Suite 830 Washington, DC 20005 The challenge for a nonprofit organization is to develop
More informationTrustwave Managed Security Testing
Trustwave Managed Security Testing SOLUTION OVERVIEW Trustwave Managed Security Testing (MST) gives you visibility and insight into vulnerabilities and security weaknesses that need to be addressed to
More informationAutomated Attack Framework for Test & Evaluation (AAFT)
Automated Attack Framework for Test & Evaluation (AAFT) 34 th International Test and Evaluation Association Symposium October 4, 2017 Mr. Andrew Shaffer The Applied Research Laboratory The Pennsylvania
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More informationIBM Security Network Protection Solutions
Systems IBM Security IBM Security Network Protection Solutions Pre-emptive protection to keep you Ahead of the Threat Tanmay Shah Product Lead Network Protection Appliances IBM Security Systems 1 IBM Security
More informationMachine-Based Penetration Testing
Always in Control CyBot Suite Machine-Based Penetration Testing CyBot PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path Scenarios (APS) product suite: CyBot
More informationTen Reasons to Optimize a Processor
By Neil Robinson SoC designs today require application-specific logic that meets exacting design requirements, yet is flexible enough to adjust to evolving industry standards. Optimizing your processor
More informationTRUE SECURITY-AS-A-SERVICE
TRUE SECURITY-AS-A-SERVICE To effectively defend against today s cybercriminals, organizations must look at ways to expand their ability to secure and maintain compliance across their evolving IT infrastructure.
More informationIntroduction to PCI Express Positioning Information
Introduction to PCI Express Positioning Information Main PCI Express is the latest development in PCI to support adapters and devices. The technology is aimed at multiple market segments, meaning that
More informationBuilding Secure Systems: Problems and Principles. Dennis Kafura
Building Secure Systems: Problems and Principles Dennis Kafura 1 Barriers to Secure Systems Secure systems depend on more than the discovery of more advanced technologies Security also depends on the widespread
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationRSA DISTRIBUTED CREDENTIAL PROTECTION
RSA DISTRIBUTED CREDENTIAL PROTECTION There is a security weakness lurking in many of today s best designed systems a primary point of compromise. Think about your own IT operations. Chances are that by
More informationFast Incident Investigation and Response with CylanceOPTICS
Fast Incident Investigation and Response with CylanceOPTICS Feature Focus Incident Investigation and Response Identifying a potential security issue in any environment is important, however, to protect
More informationMILITARY ANTI-TAMPERING SOLUTIONS USING PROGRAMMABLE LOGIC
MILITARY ANTI-TAMPERING SOLUTIONS USING PROGRAMMABLE LOGIC Charlie Jenkins (Altera, San Jose, California, chjenkin@altera.com) Christian Plante (Altera, San Jose, California, cplante@altera.com) ABSTRACT
More informationSecurity and Privacy in RFID Evolving Application Spaces for Edge Security
1 Security and Privacy in RFID Evolving Application Spaces for Edge Security Chris Hanebeck, VP Product Management & Marketing Revere Security First, Allow Me to Scare Everyone And It Gets Worse Lockheed
More informationHardware Security Challenges and Solutions. Mike Bartley TVS, Founder and CEO
Hardware Security Challenges and Solutions Mike Bartley TVS, Founder and CEO Agenda Some background on your speaker and testing safety related systems Threats and solutions Verifying those solutions Bare
More informationCarbon Black PCI Compliance Mapping Checklist
Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and
More informationBIG DATA INDUSTRY PAPER
BIG DATA INDUSTRY PAPER Encryption Key Management INFORMATION-RICH BIG DATA IS UNDER INCREASING THREAT OF THEFT AND BUSINESS DISRUPTION. AS THE NETWORKS AND TECHNOLOGIES THAT ENABLE BIG DATA COLLECTION,
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the
More informationACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES
ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES Information Security Team DePaul University 1 East Jackson Boulevard Chicago, Illinois 60604 US https:/infosec.depaul.edu/ 13th December
More informationEnhance your Cloud Security with AMD EPYC Hardware Memory Encryption
Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption White Paper October, 2018 Introduction Consumers and enterprises are becoming increasingly concerned about the security of their digital
More informationCS408 Cryptography & Internet Security
CS408 Cryptography & Internet Security Lecture 18: Cryptographic hash functions, Message authentication codes Functions Definition Given two sets, X and Y, a function f : X Y (from set X to set Y), is
More informationSecure Programming for Fun and Profit
Secure Programming for Fun and Profit (Real World Experiences in Secure Programming) Scott D. Miller Security Analyst Arxan Research, Inc. Doctoral Student in CS Advisors: Aditya Mathur; Ray DeCarlo January
More informationThe definitive guide to selecting the right ADC for the digital transformation era
The definitive guide to selecting the right ADC for the digital transformation era Pg. 2 Pg. 4 Citrix.com ebook App attack 1 Content Introduction...3 Digital transformation s impact...4 Harness the power
More informationRequest for Comments: K. Norrman Ericsson June 2006
Network Working Group Request for Comments: 4563 Category: Standards Track E. Carrara KTH V. Lehtovirta K. Norrman Ericsson June 2006 The Key ID Information Type for the General Extension Payload in Multimedia
More informationCryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
More informationMachine-Based Penetration Testing
Always in Control CyBot Suite Machine-Based Penetration Testing www.cronus-cyber.com - April 2016 CyBot PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path
More informationBest practices in IT security co-management
Best practices in IT security co-management How to leverage a meaningful security partnership to advance business goals Whitepaper Make Security Possible Table of Contents The rise of co-management...3
More informationThreat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES
Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES Agenda Welcome Threat Intelligence EcoSystem Cyber Resiliency
More informationThe Shortcut Guide To. Protecting Against Web Application Threats Using SSL. Dan Sullivan
tm The Shortcut Guide To Protecting Against Web Application Threats Using SSL Chapter 3: Planning, Deploying, and Maintaining SSL Certificates to Protect Against Inf ormation Loss and Build Customer Trust...
More informationRequest for Comments: 3566 Category: Standards Track Intel September The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec
Network Working Group Request for Comments: 3566 Category: Standards Track S. Frankel NIST H. Herbert Intel September 2003 Status of this Memo The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec This
More informationTamper Resistance - a Cautionary Note Ross Anderson Markus Kuhn
Tamper Resistance - a Cautionary Note Ross Anderson University of Cambridge Computer Laboratory Markus Kuhn University of Erlangen/ Purdue University Applications of Tamper Resistant Modules Security of
More informationComprehensive Database Security
Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought
More informationARM Security Solutions and Numonyx Authenticated Flash
ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationTHE POWER AND RISK OF MOBILE. White paper
THE POWER AND RISK OF MOBILE White paper TABLE OF CONTENTS Executive Summary - 3 Introduction - 4 The Power and Risk of Mobile - 4 Growing Dominance of Android - 5 Best Practices to Develop Secure Mobile
More informationCorrelation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
More informationDDoS MITIGATION BEST PRACTICES
DDoS MITIGATION BEST PRACTICES DDoS ATTACKS ARE INCREASING EXPONENTIALLY Organizations are becoming increasingly aware of the threat that Distributed Denial of Service (DDoS) attacks can pose. According
More informationEvaluating Tokenization Systems
White Paper Security Evaluating Tokenization Systems Table of Contents page Abstract: Evaluating Tokenization Systems... 1 The Tokenization Model... 1 Risks and Attacks... 2 Attack 1: Guess Secret Data...
More informationMaximizing System x and ThinkServer Performance with a Balanced Memory Configuration
Front cover Maximizing System x and ThinkServer Performance with a Balanced Configuration Last Update: October 2017 Introduces three balanced memory guidelines for Intel Xeon s Compares the performance
More informationBarracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper
Barracuda Advanced Threat Protection Bringing a New Layer of Security for Email White Paper Evolving Needs for Protection Against Advanced Threats IT security threats are constantly evolving and improving,
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationCategory: Informational March Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME
Network Working Group R. Zuccherato Request for Comments: 2785 Entrust Technologies Category: Informational March 2000 Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement
More informationSecurity: The Key to Affordable Unmanned Aircraft Systems
AN INTEL COMPANY Security: The Key to Affordable Unmanned Aircraft Systems By Alex Wilson, Director of Business Development, Aerospace and Defense WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY
More informationn Explain penetration testing concepts n Explain vulnerability scanning concepts n Reconnaissance is the first step of performing a pen test
Chapter Objectives n Explain penetration testing concepts n Explain vulnerability scanning concepts Chapter #4: Threats, Attacks, and Vulnerabilities Vulnerability Scanning and Penetration Testing 2 Penetration
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 9 Encryption and Firewalls By Whitman, Mattord & Austin 2008 Course Technology Learning Objectives Describe the role encryption
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including
More informationLecture 6: Symmetric Cryptography. CS 5430 February 21, 2018
Lecture 6: Symmetric Cryptography CS 5430 February 21, 2018 The Big Picture Thus Far Attacks are perpetrated by threats that inflict harm by exploiting vulnerabilities which are controlled by countermeasures.
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationCryptography and Network Security
Security Sixth Edition Chapter 1 Introduction Dr. Ahmed Y. Mahmoud Background Information Security requirements have changed in recent times traditionally provided by physical and administrative mechanisms
More informationThe Mimecast Security Risk Assessment Quarterly Report May 2017
The Mimecast Email Security Risk Assessment Quarterly Report May 2017 The Mimecast Email Security Risk Assessment Quarterly Report May 2017 Many organizations think their current email security systems
More informationDefend Against the Unknown
Defend Against the Unknown Stay ahead of new threats with McAfee Endpoint Threat Defense solutions Targeted exploits. Ransomware. Explosive growth in zero-day malware. Organizations are locked in an ongoing
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationEthical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities
Ethical Hacking and Countermeasures: Web Chapter 3 Web Application Vulnerabilities Objectives After completing this chapter, you should be able to: Understand the architecture of Web applications Understand
More informationTHE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION
BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive
More informationWHITE PAPER. Applying Software-Defined Security to the Branch Office
Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry
More informationTechnological foundation
Technological foundation Carte à puce et Java Card 2010-2011 Jean-Louis Lanet Jean-louis.lanet@unilim.fr Cryptology Authentication Secure upload Agenda Cryptology Cryptography / Cryptanalysis, Smart Cards
More informationSecurity of Block Ciphers Beyond Blackbox Model
CRYPTCU ction Meeting November 6, 2016 ecurity of Block Ciphers Beyond Blackbox Model Takanori Isobe ONY Corporation bout Me Researcher/Engineer in ony Corporation since 2008 s a Researcher Cryptanalysis
More informationBREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response
BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone of cyber security,
More informationNetwork Working Group Request for Comments: December 2004
Network Working Group Request for Comments: 3967 BCP: 97 Category: Best Current Practice R. Bush IIJ T. Narten IBM Corporation December 2004 Status of this Memo Clarifying when Standards Track Documents
More informationTest Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,
Test Conditions Closed book, closed notes, no calculator, no laptop just brains 75 minutes Steven M. Bellovin October 19, 2005 1 Form 8 questions I m not asking you to write programs or even pseudo-code
More informationLET S ENCRYPT SUBSCRIBER AGREEMENT
Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf
More informationVulnerability of Certain Stream Ciphers Based on k-normal Boolean Functions
Vulnerability of Certain Stream Ciphers Based on k-normal Boolean Functions Miodrag Mihaljevic RCIS-AIST, Tokyo A Seminar Lecture at CCRG School of Physics and Mathematical Sciences Nanyang Technological
More informationTopics. Ensuring Security on Mobile Devices
Ensuring Security on Mobile Devices It is possible right? Topics About viaforensics Why mobile security matters Types of security breaches and fraud Anticipated evolution of attacks Common mistakes that
More informationDeploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs)
Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Microsoft Corporation Published: June 2004 Abstract This white paper describes how to configure
More informationTrusted Computing Group
Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing
More informationCertification Report
Certification Report EAL 4+ Evaluation of Firewall Enterprise v8.2.0 and Firewall Enterprise Control Center v5.2.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common
More informationThe Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company
The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company November 12, 2014 Malware s Evolution Why the change? Hacking is profitable! Breaches and Malware are Projected to Cost $491
More informationUNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS
UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS MASSACHUSETTS BAY TRANSPORTATION AUTHORITY v. Plaintiff ZACK ANDERSON, RJ RYAN, ALESSANDRO CHIESA, RONALD L. RIVEST, and the MASSACHUSETTS INSTITUTE
More informationQ: Are power supply attacks in scope for SSITH? A: The hacker team will not have physical access to the power supply.
SSITH FAQ Questions about the Scope of SSITH Q: Is securitization of external memory in the scope for SSITH? A: Yes. Please refer to BAA section I-B, page 6. Q: Is reverse engineering research of integrated
More informationProtecting the Client
Protecting the Client Clients of networked applications Smart cards DRM Steven M. Bellovin October 8, 2007 1 Network Clients Thus far, we ve focused on servers network apps and privilege programs Do clients
More informationIntegrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise
System z Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise SC28-6880-00 System z Integrating the Hardware Management Console s Broadband Remote Support
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Block cipher DES 3DES
More information