SlideShare une entreprise Scribd logo
1  sur  37
Tuesday, November 27, 12
Me!


Tuesday, November 27, 12
Me!


Tuesday, November 27, 12
Tuesday, November 27, 12
My
                                  Friends


                                  My Apps
                           My                My
                           Life     My      Work
                                   Stuff




Tuesday, November 27, 12
My
                                  Friends
                                                   My	
  Stuff!

                                  My Apps
                           My                My
                           Life     My      Work
                                   Stuff




Tuesday, November 27, 12
My
                                    Friends
                                                     My	
  Stuff!

                                    My Apps
                           Threat
                             My
                             Life     My
                                               My
                                              Work
                                     Stuff




Tuesday, November 27, 12
Tuesday, November 27, 12
Tuesday, November 27, 12
Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
Bromium Confidential

Tuesday, November 27, 12
v We have to enter domains of unfathomable trust




   Bromium Confidential

Tuesday, November 27, 12
v We have to enter domains of unfathomable trust
   v Our systems cannot protect us from unknown threats




   Bromium Confidential

Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
Tuesday, November 27, 12
Tuesday, November 27, 12
Protect the system
                           core by isolating it
                               completely




Tuesday, November 27, 12
Decouple execution        Protect the system
  dependencies into mutually   core by isolating it
       distrustful tasks           completely




Tuesday, November 27, 12
Decouple execution         Protect the system
  dependencies into mutually    core by isolating it
       distrustful tasks            completely



    Control communication
   between all tasks and with
       the outside world




Tuesday, November 27, 12
Decouple execution          Protect the system
  dependencies into mutually     core by isolating it
       distrustful tasks             completely



    Control communication
   between all tasks and with
       the outside world



   Restrict each task’s access
   to data & resources, based
       on “least privilege”

Tuesday, November 27, 12
Decouple execution          Protect the system
  dependencies into mutually     core by isolating it
       distrustful tasks             completely



    Control communication
   between all tasks and with
       the outside world



   Restrict each task’s access        Never trust
   to data & resources, based    information from an
       on “least privilege”       untrustworthy task

Tuesday, November 27, 12
Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
10

Tuesday, November 27, 12
Tiny code base for
                               Bromium
       maximum security        Microvisor   I/O MMU (VT-d)

                                            TXT & TPM based
                                            hardware root of trust
                  Hardware
              Virtualization
                      (VT-x)




                                    10

Tuesday, November 27, 12
Bromium Micro-virtualization

       Isolate vulnerable                             Lightweight, fast,
    tasks within a single                             hidden, with an
       Windows desktop                                unchanged native UX

       Tiny code base for
                                    Bromium
       maximum security             Microvisor        I/O MMU (VT-d)

                                                      TXT & TPM based
                                                      hardware root of trust
                  Hardware
              Virtualization
                      (VT-x)




                                          10

Tuesday, November 27, 12
Tuesday, November 27, 12
Windows	
  and	
  IT	
  
       provisioned	
  apps	
  
          are	
  trusted



                                  Apps OS	
  Libs Kernel




Tuesday, November 27, 12
The	
  Microvisor	
  isolates	
  
                                vulnerable	
  tasks	
  from	
  
                               Windows,	
  each	
  other	
  &	
  
                                key	
  system	
  resources

                                                       Microvisor




                           Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Microvisor
                                                                             Each	
  vulnerable	
  task	
  is	
  
                                                                              instantly	
  isolated	
  in	
  a	
  
                                                                             micro-­‐VM,	
  invisible	
  to	
  




                                                          Hypercall	
  API
                           Apps OS	
  Libs Kernel                                      the	
  user




Tuesday, November 27, 12
Micro-­‐VMs	
  have	
  
     “least	
  privilege”	
                                 Microvisor
      access	
  to	
  files,	
  
   networks	
  &	
  devices,	
  
    and	
  execute	
  CoW




                                                                  Hypercall	
  API
                                   Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Micro-­‐VMs	
  have	
  
     “least	
  privilege”	
                                 Microvisor
      access	
  to	
  files,	
  
   networks	
  &	
  devices,	
  
    and	
  execute	
  CoW




                                                                  Hypercall	
  API
                                   Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Microvisor




                           Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Tuesday, November 27, 12

Contenu connexe

En vedette

Comunicación educativa de calidad 4
Comunicación educativa de calidad 4Comunicación educativa de calidad 4
Comunicación educativa de calidad 4producmultimedia3
 
Claves para hablar en público
Claves para hablar en públicoClaves para hablar en público
Claves para hablar en públicoEmagister
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceSplunk
 
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...Andris Soroka
 
Английский для жизни Яна Граусова
Английский для жизни Яна ГраусоваАнглийский для жизни Яна Граусова
Английский для жизни Яна ГраусоваSergey Korobov
 
Campaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOXCampaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOXLuis Rodríguez
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security ChallengesJorge Sebastiao
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0Michael Gough
 

En vedette (12)

nandini.resume
nandini.resumenandini.resume
nandini.resume
 
Gr9Presentation
Gr9PresentationGr9Presentation
Gr9Presentation
 
Comunicación educativa de calidad 4
Comunicación educativa de calidad 4Comunicación educativa de calidad 4
Comunicación educativa de calidad 4
 
Claves para hablar en público
Claves para hablar en públicoClaves para hablar en público
Claves para hablar en público
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat Intelligence
 
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
 
Английский для жизни Яна Граусова
Английский для жизни Яна ГраусоваАнглийский для жизни Яна Граусова
Английский для жизни Яна Граусова
 
Campaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOXCampaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOX
 
Unlock Security Insight from Machine Data
Unlock Security Insight from Machine DataUnlock Security Insight from Machine Data
Unlock Security Insight from Machine Data
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
 
CV_Tapta_Kanchan_Roy
CV_Tapta_Kanchan_RoyCV_Tapta_Kanchan_Roy
CV_Tapta_Kanchan_Roy
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0
 

Plus de Gigaom

Structure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe WeinmanStructure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe WeinmanGigaom
 
Structure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - RackspaceStructure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - RackspaceGigaom
 
Structure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey resultsStructure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey resultsGigaom
 
Structure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionStructure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionGigaom
 
Structure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopStructure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopGigaom
 
Structure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - BatteryStructure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - BatteryGigaom
 
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...Gigaom
 
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...Gigaom
 
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit BendovStructure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit BendovGigaom
 
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...Gigaom
 
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA, Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA, Gigaom
 
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari GesherStructure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari GesherGigaom
 
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris HaddadStructure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris HaddadGigaom
 
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...Gigaom
 
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrathStructure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrathGigaom
 
Structure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve RussellStructure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve RussellGigaom
 
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan WaiteStructure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan WaiteGigaom
 
How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013Gigaom
 
25 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 201325 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 2013Gigaom
 
How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013Gigaom
 

Plus de Gigaom (20)

Structure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe WeinmanStructure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe Weinman
 
Structure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - RackspaceStructure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - Rackspace
 
Structure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey resultsStructure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey results
 
Structure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionStructure 2014 - Launchpad Competition
Structure 2014 - Launchpad Competition
 
Structure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopStructure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshop
 
Structure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - BatteryStructure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - Battery
 
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
 
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
 
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit BendovStructure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
 
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
 
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA, Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
 
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari GesherStructure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
 
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris HaddadStructure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
 
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
 
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrathStructure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
 
Structure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve RussellStructure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve Russell
 
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan WaiteStructure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
 
How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013
 
25 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 201325 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 2013
 
How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013
 

Dernier

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Dernier (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

SECURE EVERYTHING from Structure 2012

  • 5. My Friends My Apps My My Life My Work Stuff Tuesday, November 27, 12
  • 6. My Friends My  Stuff! My Apps My My Life My Work Stuff Tuesday, November 27, 12
  • 7. My Friends My  Stuff! My Apps Threat My Life My My Work Stuff Tuesday, November 27, 12
  • 11. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 12. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 14. v We have to enter domains of unfathomable trust Bromium Confidential Tuesday, November 27, 12
  • 15. v We have to enter domains of unfathomable trust v Our systems cannot protect us from unknown threats Bromium Confidential Tuesday, November 27, 12
  • 16. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 17. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 20. Protect the system core by isolating it completely Tuesday, November 27, 12
  • 21. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Tuesday, November 27, 12
  • 22. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Control communication between all tasks and with the outside world Tuesday, November 27, 12
  • 23. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Control communication between all tasks and with the outside world Restrict each task’s access to data & resources, based on “least privilege” Tuesday, November 27, 12
  • 24. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Control communication between all tasks and with the outside world Restrict each task’s access Never trust to data & resources, based information from an on “least privilege” untrustworthy task Tuesday, November 27, 12
  • 26. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 28. Tiny code base for Bromium maximum security Microvisor I/O MMU (VT-d) TXT & TPM based hardware root of trust Hardware Virtualization (VT-x) 10 Tuesday, November 27, 12
  • 29. Bromium Micro-virtualization Isolate vulnerable Lightweight, fast, tasks within a single hidden, with an Windows desktop unchanged native UX Tiny code base for Bromium maximum security Microvisor I/O MMU (VT-d) TXT & TPM based hardware root of trust Hardware Virtualization (VT-x) 10 Tuesday, November 27, 12
  • 31. Windows  and  IT   provisioned  apps   are  trusted Apps OS  Libs Kernel Tuesday, November 27, 12
  • 32. The  Microvisor  isolates   vulnerable  tasks  from   Windows,  each  other  &   key  system  resources Microvisor Apps OS  Libs Kernel Tuesday, November 27, 12
  • 33. Microvisor Each  vulnerable  task  is   instantly  isolated  in  a   micro-­‐VM,  invisible  to   Hypercall  API Apps OS  Libs Kernel the  user Tuesday, November 27, 12
  • 34. Micro-­‐VMs  have   “least  privilege”   Microvisor access  to  files,   networks  &  devices,   and  execute  CoW Hypercall  API Apps OS  Libs Kernel Tuesday, November 27, 12
  • 35. Micro-­‐VMs  have   “least  privilege”   Microvisor access  to  files,   networks  &  devices,   and  execute  CoW Hypercall  API Apps OS  Libs Kernel Tuesday, November 27, 12
  • 36. Microvisor Apps OS  Libs Kernel Tuesday, November 27, 12