1 / 6

A New Approach to Runtime Cybersecurity

A New Approach to Runtime Cybersecurity. Thomas H. Probert, Ph. D. Founder/CTO STEGOSYSTEMS. The Evolving Runtime Threat. Dynamic Tampering , Stack Smashing, Code Injection, Buffer Overflows, Reflective Programming, Some Forms of SQL Injection. STUXNET. Threat Level.

Télécharger la présentation

A New Approach to Runtime Cybersecurity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A New Approach to Runtime Cybersecurity Thomas H. Probert, Ph. D. Founder/CTO STEGOSYSTEMS

  2. The Evolving Runtime Threat • Dynamic Tampering, Stack Smashing, Code Injection, Buffer Overflows, Reflective Programming, Some Forms of SQL Injection STUXNET Threat Level STEGOSYSTEMS Digital Immunity Prevents Execution of Foreign or Malicious Code During Runtime

  3. Our Solution “When the only tool you have is a hammer you tend to see every problem as a nail” Abraham Maslow Signatures Removed on Launch Secure Transport and Authenticate Signatureseg., Whitelisting Perimeter DefenseAV/Whitelist, HIDS, NIDS Network Endpoint LIVE Memory with Exacuting Programs Apps Executing Binary in Memory Kernel Prevent the Execution of Compromised Programs

  4. Perfectly Secure Steganography Covert SIGNED Recognizers Structure Credential Watermarker No Source Code All Executables • No False Positives • No Code Modifications • Complements/ Replace • Existing Tools • Any Instruction Set, OS, Hardware

  5. Perfectly Secure Steganography SIGNED Recognizers Structure Credential Watermarker • Prevents Dynamic Tampering Why Is This Better? • Digital Immunity Tools • Available Today • X86/32/64, • Windows XP,Vista,7 Invisible Persistent Watermark Integrity Is Continuously Verified Immunity to Foreign Code Come See a Demo

More Related