A new defense against kernel-mode exploits
by Zeljka Zorz - Managing Editor - Tuesday, 17 June 2014.
Over the past many years, thereíve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code targeting the kernel - even when we employ layered security and stack them one upon the other.

The time has come to change the security paradigm and architecture, say Rafal Wojtczuk and Rahul Kashyap. "Windows kernel vulnerabilities are frequent, and this is not going to change anytime soon," they say. "We have to live with them and be able to defend against them."

In this podcast recorded at Hack In The Box Amsterdam 2014, they propose a solution to the problem.

Press the play button below to listen to the podcast:



Rafal Wojtczuk, Principal Security Architect at Bromium, has specialized in kernel and virtualization security, over the years he has disclosed many security vulnerabilities in popular operating system kernels and virtualization software. He is also the author of libnids, a low-level packet reassembly library.

Rahul Kashyap is Chief Security Architect, Head of Security Research at Bromium. Before joining Bromium, he led the worldwide Vulnerability Research teams at McAfee Labs. He has led cyber defense technologies focused on exploit prevention and mitigation for both host and network related products.

Spotlight

Hackers indicted for stealing Apache helicopter training software

Posted on 1 October 2014.  |  Members of a computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the US Army and stealing more than $100 million in intellectual property and other proprietary data.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //