Design Con 2015
Breaking News
Comments
Newest First | Oldest First | Threaded View
jaybus0
User Rank
CEO
Re: Unintended Consequences
jaybus0   9/5/2013 8:53:25 AM
NO RATINGS
Rewriting the code has always been a defense technique for malware. Virus scanners are, for the most part, simple searches for a binary pattern (signature). Modeling biology, some use an evolutionary approach to replication, purposefully introducing mutations when replicating in order to defend against pattern detectors. This was the primary reason behind implementing code execution protection into CPUs to prevent executing code built in stack or data segments by self-modifying malware.

theroc66
User Rank
Rookie
Re: Sizing up the tech
theroc66   8/27/2013 3:07:58 PM
NO RATINGS
Hi Rick,

I read a couple rumours that it will be more present in the 8.1 release due in October.

Maybe we can learn a lot more at the upcoming conference where both Msft and Trusted computing are diamond sponsors... Check the keynotes.

http://www.trustedcomputingconference.com/

Have a good one,

AR.

DrQuine
User Rank
CEO
Unintended Consequences
DrQuine   8/26/2013 6:18:38 PM
NO RATINGS
Will hackers discover that rewriting their code will enable them to avoid detection by emerging malware tools? While indeed existing malware may share certain attributes, I'd expect that once the tools are known to be detecting these features, the structures will get changed.  We've already seen a hint of this trend with spam: large blocks of irrelevant "literary" text get inserted to "drown out" the spam content pattern.

[RE: "MLstones from Pacific Northwest Laboratories uses concepts and algorithms from the biology to detect malicious code. The program assumes that, as is true with proteins, code structure and its function are related in malware."]

rick merritt
User Rank
Author
Re: Sizing up the tech
rick merritt   8/26/2013 10:59:24 AM
NO RATINGS
@theroc66: It's about time Microosft implmented the TCG specs! They have been around for 10+ years.

Why is Msoft only doing this with the ARM (Trustzone) implementation for RT? Not the Intel implmnetation? What's going on here I am missing?

I know they had big hopes for Palladium on Windows years ago but got pushback. Still sore?

theroc66
User Rank
Rookie
Re: Sizing up the tech
theroc66   8/23/2013 3:06:19 PM
NO RATINGS
Hi Rick. Usefulness of the hardware based security architecture seems to making huge strides: Microsoft just implemented it by default in the new Win8 RT OS, and has announced their new enterprise offering will be greatly relying on the new level of security this architecture enable - especially in the area of mobile connection to enterprise networks, based on dual factor authentication.

For those looking to learn more about the space, check the upcoming Trusted Computing Conference this coming September: the list of sponsoring companies - MSFT, CSCO, WAVX...- and the quality of the expected speakers seems very promising.

This new paradigm in "built-in" security seems about to be rolled out by heavy weights. To be looked at!

AR.

rick merritt
User Rank
Author
DHS on your radar
rick merritt   8/23/2013 2:22:46 PM
NO RATINGS
Is DHS a key point of contact for security researchers out there? Could they be?

rick merritt
User Rank
Author
Sizing up the tech
rick merritt   8/23/2013 2:21:36 PM
NO RATINGS
I'd be interested in hearing -- particularly from anyone who attended --an assesment of the usefulness of the eight technologies they showcased.

 

prabhakar_deosthali
User Rank
CEO
embedding security should be legally binding
prabhakar_deosthali   8/23/2013 8:19:35 AM
NO RATINGS
The security becomes utmost important when we talk about connected cars, driver-less cars, internet of things and such systems which will supposedly work without human intervention. Without a foolproof built-in security these systems could create havoc which we  legally will not be able to pin point to a person.

The initiative by US labs is a move in right direction and by having security standards as mandatory in all of these systems the govt should encourage commercializing of such technologies.

Kinnar
User Rank
CEO
Embedding security in embedded systems
Kinnar   8/23/2013 6:36:49 AM
NO RATINGS
Embedding security in embedded system is really a need of electronic industry, as the embedded elements grows and average awareness about the open source boards and embedded OS is spreading more among the users, it is likely to be more offending to the manufacturers as it will be draining/leaking the business of providing support and services.

daleste
User Rank
CEO
hard sell
daleste   8/22/2013 10:23:34 PM
NO RATINGS
Yes, security is a hard sell to people that have not had any problems.  The same can be said for a home security system.  Once you have a friend that has had a break in, you will be more likely to get your own security system.  Once you have had a break in, you will get one immediately and berate yourself for not doing it sooner.



Top Comments of the Week
Flash Poll
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Life
Frankenstein's Fix, Teardowns, Sideshows, Design Contests, Reader Content & More
Max Maxfield

Want a Voltera Desktop PCB Printer?
Max Maxfield
9 comments
I just received an email from my chum Javi in Spain. "Have you heard about Voltera (VolteraInc.com)? It's a Canadian company that is going to offer desktop-size PCB printers for fast ...

Aubrey Kagan

Have You Ever Been Blindsided by Your Own Design?
Aubrey Kagan
37 comments
I recently read GCHQ: The uncensored story of Britain's most sensitive intelligence agency by Richard J. Aldrich. The Government Communication Headquarters (GCHQ), Britain's equivalent of ...

Martin Rowe

No 2014 Punkin Chunkin, What Will You Do?
Martin Rowe
2 comments
American Thanksgiving is next week, and while some people watch (American) football all day, the real competition on TV has become Punkin Chunkin. But there will be no Punkin Chunkin on TV ...

Rich Quinnell

Making the Grade in Industrial Design
Rich Quinnell
15 comments
As every developer knows, there are the paper specifications for a product design, and then there are the real requirements. The paper specs are dry, bland, and rigidly numeric, making ...

Special Video Section
The LT8640 is a 42V, 5A synchronous step-down regulator ...
The LTC2000 high-speed DAC has low noise and excellent ...
How do you protect the load and ensure output continues to ...
General-purpose DACs have applications in instrumentation, ...
Linear Technology demonstrates its latest measurement ...
10:29
Demos from Maxim Integrated at Electronica 2014 show ...
Bosch CEO Stefan Finkbeiner shows off latest combo and ...
STMicroelectronics demoed this simple gesture control ...
Keysight shows you what signals lurk in real-time at 510MHz ...
TE Connectivity's clear-plastic, full-size model car shows ...
Why culture makes Linear Tech a winner.
Recently formed Architects of Modern Power consortium ...
Specially modified Corvette C7 Stingray responds to ex Indy ...
Avago’s ACPL-K30T is the first solid-state driver qualified ...
NXP launches its line of multi-gate, multifunction, ...
Doug Bailey, VP of marketing at Power Integrations, gives a ...
See how to ease software bring-up with DesignWare IP ...
DesignWare IP Prototyping Kits enable fast software ...
This video explores the LT3086, a new member of our LDO+ ...
In today’s modern electronic systems, the need for power ...