Adrian Taylor Director, Mobile

Slides:



Advertisements
Similar presentations
Ian Pratt SVP, Products Bromium Inc.
Advertisements

At first you need a promotional movie. - This movie should be in the format AVI - This movie should have a maximum length of 30 seconds If you.
Operating Systems Manage system resources –CPU scheduling –Process management –Memory management –Input/Output device management –Storage device management.
Update your Software or Die! Wolfgang Kandek Qualys, Inc. RMISC 2012 Denver - May 18, 2012.
Computers Software. Computer Layers Hardware BIOS Operating System Applications.
Endpoint security via Application sandboxing and virtualization: Past, present, future Rafal Wojtczuk
Objectives Overview Define an operating system
Copyright GeneGo CONFIDENTIAL »« MetaCore TM (System requirements and installation) Systems Biology for Drug Discovery.
Discovering Computers: Chapter 1
Air for What You Will Learn Why use Air over native development? What are the tools? What is the developer experience? DEMOS! How.
1 Chapter 2 Operating Systems: Software in the Background.
Week 2 (Feb.1 st, 07) Agenda for today Intro to Windows Basics Nvu.
Making All Client Side Java Secure Bill Gardner Sr. Director Products September
Installing software on personal computer
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.
Computer Concepts 2013 Chapter 4 Operating Systems and File Management.
EMBEDDED SYSTEMS G.V.P.COLLEGE OF ENGINEERING Affiliated to J.N.T.U. By By D.Ramya Deepthi D.Ramya Deepthi & V.Soujanya V.Soujanya.
Introduction to Mobile Computing CSE 390 Fall 2010.
Ajmer Singh PGT(IP) Software Concepts. Ajmer Singh PGT(IP) Operating System It is a program which acts as an interface between a user and hardware.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
© 2011 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Adobe Presentation Brijesh Patel | Working with AIR Native Extensions.
Introduction to Windows 7. Desktop Maximize, Minimizing, and Restoring.
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
Explain the purpose of an operating system
Practical Computer Literacy Week-02
Operating System Basics section 6A. This lesson includes the following sections: Running Programs Managing Files Managing Hardware Utility Software.
PREVIOUS GNEWS. 6 Patches – 4 Critical – 11 CVEs Affected – SQL, Visual Basic, Visual Foxpro, more… Other updates, MSRT, Defender Definitions, Junk Mail.
Operating System 2 Overview. OPERATING SYSTEM OBJECTIVES AND FUNCTIONS.
Study Guide – Week #3 – System Software Start the Game.
Microsoft WINDOWS 98 By Bülent BAYÇELEBİ & Tarık YÜKSEK.
Introduction To Computer and Information Technology.
Use flash eBook software AnyFlip to make page flip book works seamlessly on mobile devices.
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
VMM Based Rootkit Detection on Android
Operating Systems By-Anoushka Puri. What is an Operating System An operating system is an interface between the user and the computer hardware. It is.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
Testing Exploits and Malware in an isolated environment Luca Allodi – Fabio Massacci – Vadim Kotov
CHAPTER Getting Started with DTP Desktop Publishing: Chapter 1 ©2008Thomson/South-Western 1.
The ‘stuff you can touch’. Evolution of Computer Hardware Abacus counting machines Babbage’s difference engine Hollerith’s tabulating machine ABC computer.
Operating System - Windows 7A Gertie Bosch, Maita Coronel, Minju Kim, Yerim Kim, Joy Nah, Erika Vispo.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Redesign with Responsive Web Design and Dreamweaver Creative Cloud Corinne Hoisington, Central Virginia Community College Jessica Minnick, Pasco-Hernandez.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
IT Vocabulary Basics Review Sit at tables. Need pencil/pen.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Chapter 3: SYSTEM SOFTWARE
IT Security Awareness Day October 19, 2016
Free PowerPoint Templates Android Assignment Help BookMyEssay.
WELCOME Mobile Applications Testing
Web Concepts Lesson 2 ITBS2203 E-Commerce for IT.
Security Issues.
MOBILE DEVICE OPERATING SYSTEM
Fix QuickBooks Payroll Update Error Call
Computer Software Created by Ann Ware
What is an Operating System?
Servicenumber.org/internet-explorer. Resolve Issue Internet Explorer.
McAfee Total Protection 2018 Protection for PC, MAC, Smartphones and Tablets.
Keyboarding Class LHMS Ms. Key © Mr. Thrasher
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chapter 3 – part2.
Network Hardware and Protocols
Operating Systems through Case Studies
A very basic introduction
The Hacking Suite For Governmental Interception
Lauren Taylor – Dardanelle High School
Presentation transcript:

Adrian Taylor Director, Mobile Bromium vSentry Adrian Taylor Director, Mobile 1

 Paid 3644-2276-1234-5678

Zero-day price list Zero-day Adobe Reader $5,000-$30,000 Flash, Java $40,000-$100,000 Word $50,000-$100,000 Internet Explorer $80,000-$200,000 iOS $100,000-$250,000 Source: http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/

Demo

Micro-virtualization: Hardware-isolation for untrusted tasks Hardware-isolates each untrusted Windows task Lightweight, fast, hidden, with an unchanged native UX Microvisor Based on Xen with a tiny, secure code base Fully integrated into the desktop user experience Uses I/O Virtualization VT-d, TXT & TPM if available Hardware Virtualization (VT-x)

Demo

Hardware Kernel OS Libs / Utils Applications

Mutually isolates untrustworthy tasks from the Desktop, & each other CPU Untrusted Tasks

http://www.facebook.com

Micro-VMs have “need to know” access to files, networks, and the user’s desktop

Micro-VMs execute “Copy on Write”

Malware is automatically discarded

Live attack visualization and analysis : LAVA

APIs for Live Attack Analysis 2. One task per micro-VM 3. Full attack execution 1. Micro-VM Introspection

DEMO

Desktop, Laptop, Tablet and Smartphone 2012 2013 Future

Thank you