real life infosec - tel aviv university

63
MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research

Upload: shalyt

Post on 06-Aug-2015

70 views

Category:

Software


0 download

TRANSCRIPT

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

ASM (13yo)

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

ASM (13yo)

IPHO 2005

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

ASM (13yo)

IPHO 2005BSc. Physics + EE

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

ASM (13yo)

Cyber Cyber

IPHO 2005BSc. Physics + EE

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

ASM (13yo)

Cyber Cyber

Reverse Engineering

IPHO 2005BSc. Physics + EE

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

ASM (13yo)

Cyber Cyber

Reverse Engineering

Research TL

IPHO 2005BSc. Physics + EE

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

ASM (13yo)

Cyber Cyber

Reverse Engineering

Research TL

IPHO 2005BSc. Physics + EE

MSc. Quantum Information

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

ASM (13yo)

Cyber Cyber

Reverse Engineering

Research TL

IPHO 2005BSc. Physics + EE

MSc. Quantum Information

Malware Research TL @CP

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

ASM (13yo)

Matlab

Javascript

Actionscript

Mathematica

C

Scheme

Cyber Cyber

Reverse Engineering

Research TL

PythonIPHO 2005BSc. Physics + EE

MSc. Quantum Information

Malware Research TL @CP

Pascal

AutoIT

MICHAEL SHALYT – BIO-IN-A-GRAPH

Technology

Rese

arch

First program (8yo)

Lifeinagraph.blogspot.com

ASM (13yo)

Matlab

Javascript

Actionscript

Mathematica

C

Scheme

Cyber Cyber

Reverse Engineering

Research TL

PythonIPHO 2005BSc. Physics + EE

MSc. Quantum Information

Malware Research TL @CP

Pascal

AutoIT

Catapults

Humans

AGENDA

• Philosophy and definitions.

• Protection approaches: past, present and future.

AGENDA

• Philosophy and definitions.

• Protection approaches: past, present and future.

• Anti-Sandboxing.

AGENDA

• Philosophy and definitions.

• Protection approaches: past, present and future.

• Anti-Sandboxing.

• Packing and packers – theory and practice. (Ben)

CYBER PHILOSOPHY

THE FUTURE IS NOW

THE FUTURE IS NOW

• From sci-fi to banality.

THE FUTURE IS NOW

• From sci-fi to banality.

• IOT is here.

THE FUTURE IS NOW

• From sci-fi to banality.

• IOT is here.

• Technological complexity.

THE FUTURE IS NOW

• From sci-fi to banality.

• IOT is here.

• Technological complexity.

• Power.

WHAT’S A HACKER?

WHAT’S A HACKER?

• People committed to circumvention of computer security.

WHAT’S A HACKER?

• People committed to circumvention of computer security.

• RFC 1392: “A person who delights in having an intimate understanding of the internal workings of a system”. (1960s around MIT's Tech Model Railroad Club)

WHAT’S A HACKER?

• People committed to circumvention of computer security.

• RFC 1392: “A person who delights in having an intimate understanding of the internal workings of a system”. (1960s around MIT's Tech Model Railroad Club)

• Vs. “user” (like “script kiddies”)

WHAT’S A MALWARE?

WHAT’S A MALWARE?

• Software that tries to harm/take advantage of you.

WHAT’S A MALWARE?

• Software that tries to harm/take advantage of you.

• Very (very..) persistent toolbars?

WHAT’S A MALWARE?

• Software that tries to harm/take advantage of you.

• Very (very..) persistent toolbars?

• Vista?

WHAT’S A MALWARE?

• Software that tries to harm/take advantage of you.

• Very (very..) persistent toolbars?

• Vista?

• Farmville?...

WHAT DO WOMEN… EMMM… MALWARE WANT?

Malware detection – past, present and future

Michael Shalyt

SECURING THE NEIGHBORHOOD

� http://cyberparse.co.uk/

BUZZWORD EXPLOSION

PAST

MUGSHOT DATABASE

MUGSHOT DATABASE

BINARY SIGNATURES

BINARY SIGNATURES

BINARY SIGNATURES

POLIMORPHISM

POLIMORPHISM

PRESENT

INDICATORS OF COMPROMISE

IOC DETECTION DOWNSIDES

IOC DETECTION DOWNSIDES

• Which areas do we watch?

IOC DETECTION DOWNSIDES

• Which areas do we watch?

• Some suspicious mechanisms are used by innocent software as well.

IOC DETECTION DOWNSIDES

• Which areas do we watch?

• Some suspicious mechanisms are used by innocent software as well.

• Attackers can see and sometimes circumvent alarms.

INDICATORS OF INTEREST

INDICATORS OF INTEREST

INDICATORS OF INTEREST

INDICATORS OF INTEREST

EMULATION

FUTURE

ANOMALY DETECTION

HONEYNET

MALWARE RESEARCH

MALWARE RESEARCH

ANTI-SANDBOXING

OBFUSCATION

הייחוס איום

• Automated:

• Static scraping (strings, IPs, signatures etc.)

• Dynamic analysis

• Human:

• Black box

• White box (RE)

PACKERS