1 / 16

The Problem of Trojan Inclusions in SW and HW

The Problem of Trojan Inclusions in SW and HW. Kaspersky Lab Partner Alexander Adamov. Trojans. Trojans. More Devices: Smart Homes. Outside:. Inside:. Trojans are Everywhere! …in the water. Install "XCOMFFModule“ extension for Mozilla Firefox :

Télécharger la présentation

The Problem of Trojan Inclusions in SW and HW

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Problem of Trojan Inclusions in SW and HW Kaspersky Lab Partner Alexander Adamov

  2. Trojans

  3. Trojans

  4. More Devices: Smart Homes

  5. Outside: Inside: Trojans are Everywhere! …in the water

  6. Install "XCOMFFModule“ extension forMozilla Firefox : "%Documents and Settings%\<user>\Application Data\Mozilla\Firefox\<ID>.default\extensions\ staged-xpis\XcomFF@fflibs\PlaginFF.xpi“ Once browser is launched, porno banner will be displayed. Trojan demands the ransom in order to uninstall this banner: …in your Browser

  7. …and in your Social Network

  8. ID Theft: Phishing Banking Online games Social networking New Technologies: Mobile malware Exploits & vulnerabilities Web 2.0 security Botnets Obfuscation & rootkits Hot Threats 2009

  9. Trojan Classification - SW

  10. The hardware Trojans can be embedded in safety critical, security and military systems, such as: weapon control systems, battlefield communication systems, information collection and decision making systems, satellite electronics, banking systems, cryptosystems, etc. …and even in Hardware

  11. HDL Source Circuit Diagram IC Layout …in different levels

  12. Trojan Classification - HW

  13. HW Trojan from CVORG

  14. Software Trojans - have the similar architecture and common execution environment. The functionality is the main difference of Trojan families. Hardware Trojans - more attention was paid to implementation criteria, not to the functional features as it is done in software Trojan The universal solution against ST and HTdoes not exist. Antivirus system can help to fight against ST. In case of HT detection the challenge is very complicated and provides huge area for research. Conclusions

  15. Thank you ! Alexander.Adamov@dnt-lab.com

More Related