Breaking News
Comments
Newest First | Oldest First | Threaded View
jaybus0
User Rank
CEO
Re: Unintended Consequences
jaybus0   9/5/2013 8:53:25 AM
NO RATINGS
Rewriting the code has always been a defense technique for malware. Virus scanners are, for the most part, simple searches for a binary pattern (signature). Modeling biology, some use an evolutionary approach to replication, purposefully introducing mutations when replicating in order to defend against pattern detectors. This was the primary reason behind implementing code execution protection into CPUs to prevent executing code built in stack or data segments by self-modifying malware.

theroc66
User Rank
Rookie
Re: Sizing up the tech
theroc66   8/27/2013 3:07:58 PM
NO RATINGS
Hi Rick,

I read a couple rumours that it will be more present in the 8.1 release due in October.

Maybe we can learn a lot more at the upcoming conference where both Msft and Trusted computing are diamond sponsors... Check the keynotes.

http://www.trustedcomputingconference.com/

Have a good one,

AR.

DrQuine
User Rank
CEO
Unintended Consequences
DrQuine   8/26/2013 6:18:38 PM
NO RATINGS
Will hackers discover that rewriting their code will enable them to avoid detection by emerging malware tools? While indeed existing malware may share certain attributes, I'd expect that once the tools are known to be detecting these features, the structures will get changed.  We've already seen a hint of this trend with spam: large blocks of irrelevant "literary" text get inserted to "drown out" the spam content pattern.

[RE: "MLstones from Pacific Northwest Laboratories uses concepts and algorithms from the biology to detect malicious code. The program assumes that, as is true with proteins, code structure and its function are related in malware."]

rick merritt
User Rank
Author
Re: Sizing up the tech
rick merritt   8/26/2013 10:59:24 AM
NO RATINGS
@theroc66: It's about time Microosft implmented the TCG specs! They have been around for 10+ years.

Why is Msoft only doing this with the ARM (Trustzone) implementation for RT? Not the Intel implmnetation? What's going on here I am missing?

I know they had big hopes for Palladium on Windows years ago but got pushback. Still sore?

theroc66
User Rank
Rookie
Re: Sizing up the tech
theroc66   8/23/2013 3:06:19 PM
NO RATINGS
Hi Rick. Usefulness of the hardware based security architecture seems to making huge strides: Microsoft just implemented it by default in the new Win8 RT OS, and has announced their new enterprise offering will be greatly relying on the new level of security this architecture enable - especially in the area of mobile connection to enterprise networks, based on dual factor authentication.

For those looking to learn more about the space, check the upcoming Trusted Computing Conference this coming September: the list of sponsoring companies - MSFT, CSCO, WAVX...- and the quality of the expected speakers seems very promising.

This new paradigm in "built-in" security seems about to be rolled out by heavy weights. To be looked at!

AR.

rick merritt
User Rank
Author
DHS on your radar
rick merritt   8/23/2013 2:22:46 PM
NO RATINGS
Is DHS a key point of contact for security researchers out there? Could they be?

rick merritt
User Rank
Author
Sizing up the tech
rick merritt   8/23/2013 2:21:36 PM
NO RATINGS
I'd be interested in hearing -- particularly from anyone who attended --an assesment of the usefulness of the eight technologies they showcased.

 

prabhakar_deosthali
User Rank
CEO
embedding security should be legally binding
prabhakar_deosthali   8/23/2013 8:19:35 AM
NO RATINGS
The security becomes utmost important when we talk about connected cars, driver-less cars, internet of things and such systems which will supposedly work without human intervention. Without a foolproof built-in security these systems could create havoc which we  legally will not be able to pin point to a person.

The initiative by US labs is a move in right direction and by having security standards as mandatory in all of these systems the govt should encourage commercializing of such technologies.

Kinnar
User Rank
CEO
Embedding security in embedded systems
Kinnar   8/23/2013 6:36:49 AM
NO RATINGS
Embedding security in embedded system is really a need of electronic industry, as the embedded elements grows and average awareness about the open source boards and embedded OS is spreading more among the users, it is likely to be more offending to the manufacturers as it will be draining/leaking the business of providing support and services.

daleste
User Rank
CEO
hard sell
daleste   8/22/2013 10:23:34 PM
NO RATINGS
Yes, security is a hard sell to people that have not had any problems.  The same can be said for a home security system.  Once you have a friend that has had a break in, you will be more likely to get your own security system.  Once you have had a break in, you will get one immediately and berate yourself for not doing it sooner.



EE Life
Frankenstein's Fix, Teardowns, Sideshows, Design Contests, Reader Content & More
Max Maxfield

Aging Brass: Cow Poop vs. Horse Doo-Doo
Max Maxfield
13 comments
As you may recall, one of the things I want to do with the brass panels I'm using in my Inamorata Prognostication Engine is to make them look really old. Since everything is being mounted ...

EDN Staff

11 Summer Vacation Spots for Engineers
EDN Staff
11 comments
This collection of places from technology history, museums, and modern marvels is a roadmap for an engineering adventure that will take you around the world. Here are just a few spots ...

Glen Chenier

Engineers Solve Analog/Digital Problem, Invent Creative Expletives
Glen Chenier
11 comments
- An analog engineer and a digital engineer join forces, use their respective skills, and pull a few bunnies out of a hat to troubleshoot a system with which they are completely ...

Larry Desjardin

Engineers Should Study Finance: 5 Reasons Why
Larry Desjardin
45 comments
I'm a big proponent of engineers learning financial basics. Why? Because engineers are making decisions all the time, in multiple ways. Having a good financial understanding guides these ...

Flash Poll
Top Comments of the Week
Like Us on Facebook
EE Times on Twitter
EE Times Twitter Feed

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)