SlideShare a Scribd company logo
“Security Sovereignty”“Security Sovereignty”“Security Sovereignty”“Security Sovereignty”
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
Hegel’s DialecticHegel’s Dialectic Ockham’s RazorOckham’s Razor
Conflict & change
Thesis, anti-thesis, synthesis
Law of parsimony
Best solution often simplest
Diminishing returns
Set Cardinality
Decay
Action vs. Reaction
Traditional Techniques
Attempts to solve an unbounded
problem
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
Observe
Computers Run Unintended Code
Orient
Andrew Jacquith’s “Anti-virus not dead, but twitching.”
○ SOURCE Boston 2008○ SOURCE Boston 2008
Decide
Evolutionary Design of Fractal Merkle Hash Trees
Act
Rapidly Dominating Program Execution
○ …Today
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
bsdiff; Colin Percival @ UOxford
Matching with Mismatches and Assorted Applications
Leveraging Alignment
Error-Correcting Codes (internal/self-referential)
hashdeep, ssdeep; Jesse Kornblumhashdeep, ssdeep; Jesse Kornblum
Piecewise Method
Machine-code analysis
The Software Similarity Problem in Malware Analysis
NIST NSRL (National Software Reference Library)
Singular File Hashing with MD5 and SHA-1
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
Fractal Merkle Hash Tree
Lossless Implementation
○ Aided by Fractal Compression
Enables Partial Verification
○ Trees are Atomically Autonomous *○ Trees are Atomically Autonomous *
Community-Based Technology
Verticalized Into Varying Information Domains
Any Single User Can Declare an Info Domain
Rapid Incident Response
Investigators Can Coordinate Without Sharing Malware
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
* = “Partial” verification is still a 100% match.
Enables efficient identification of installed software
Ensures all installed software is operator approved
Leverages online communities
Effective communication between security analysts worldwide
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
Effective communication between security analysts worldwide
No false positives!
User-friendly GUI provides real-time metrics/visualizations/etc.
Compiles domain-specific data for various industry verticals
Aids in software inventory and asset management
Perceived Security vs. Actual Security
BlockWatch is Objectively Quantifiable Through Mathematics
Perfect Hash Function
2 ** 192 is Astronomical (6.27710173538668e+57)
> # of Atoms in the Known Universe
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
> # of Atoms in the Known Universe
Collision Free
Infinite Granularity with Chunk-based Hashing
Power Set Computation
i.e. The Set of All Subsets
Merkle Signature Scheme
PKI Property of Merkle Tree
Pollution Control
Arbitration
User Reputation
Promoted for Valuable Hash Submission
Pollution Control
Arbitration
User Reputation
Promoted for Valuable Hash SubmissionPromoted for Valuable Hash Submission
Bad Apples
Eugenic Breeding
○ i.e. Plato’s Republic
Promoted for Valuable Hash Submission
Bad Apples
Eugenic Breeding
○ i.e. Plato’s Republic
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
Matching Variable-Sized Chunks Enables More V&V Scenarios
Holistic System for Any Given Data Form
Memory Images, Live Systems, Raw Hard Drives, BIOSes,
IP Captures for Botnet Activity, Cloud Memory, etc.
Net Component Allows Real-Time Data Exchange & Collaboration
Enables a Secure Apparatus That Swiftly Resolves New Cyber Attacks
Open Source API with Documentation
SOAP/XML Web Services and WSDL’s
DLR, IronPython, etc.
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
"Security Sovereignty" Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
Q&A Session.. Any more questions?
Visit our web site: http://www.security-objectives.com
Signup for the BlockWatch mailing list
Read our “Stop Malware Forever” whitepaper
"Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
Read our “Stop Malware Forever” whitepaper
Interactive demo of RADE’s meta-data backing for Microsoft’s symbol library
Advisories, news, and more..
Read our blog: http://systemofsystems.wordpress.com
Catch us on twitter: http://twitter.com/secobjs

More Related Content

Similar to Binary Clone Wars at CanSecWest 2009

JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JSFestUA
 
H42063743
H42063743H42063743
H42063743
IJERA Editor
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
Mark Masterson
 
Serguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc programSerguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc program
Schaffhausen Institute of Technology
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
AI Frontiers
 
Hash
HashHash
Hash
Tazo Al
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
ハイシンク創研 / Laboratory of Hi-Think Corporation
 
Embedded presentation
Embedded presentationEmbedded presentation
Embedded presentation
rohancool
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
Harish Chaudhary
 
DevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringDevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos Engineering
Aaron Rinehart
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
mark-smith
 
Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imho
W Fred Seigneur
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
Pete Burnap
 
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded DayC:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
Arik Weinstein
 
Black ops 2012
Black ops 2012Black ops 2012
Black ops 2012
Dan Kaminsky
 
JVM Mechanics: A Peek Under the Hood
JVM Mechanics: A Peek Under the HoodJVM Mechanics: A Peek Under the Hood
JVM Mechanics: A Peek Under the Hood
Azul Systems Inc.
 
Cyber tooth
Cyber toothCyber tooth
Cyber tooth
Andrew Sispoidis
 
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Seungjoo Kim
 
What Happened to Mathematically Provable Security?
What Happened to Mathematically Provable Security?What Happened to Mathematically Provable Security?
What Happened to Mathematically Provable Security?
Frances Coronel
 
Software and the Concurrency Revolution : Notes
Software and the Concurrency Revolution : NotesSoftware and the Concurrency Revolution : Notes
Software and the Concurrency Revolution : Notes
Subhajit Sahu
 

Similar to Binary Clone Wars at CanSecWest 2009 (20)

JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
 
H42063743
H42063743H42063743
H42063743
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
 
Serguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc programSerguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc program
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
 
Hash
HashHash
Hash
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
 
Embedded presentation
Embedded presentationEmbedded presentation
Embedded presentation
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
DevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringDevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos Engineering
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imho
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded DayC:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
 
Black ops 2012
Black ops 2012Black ops 2012
Black ops 2012
 
JVM Mechanics: A Peek Under the Hood
JVM Mechanics: A Peek Under the HoodJVM Mechanics: A Peek Under the Hood
JVM Mechanics: A Peek Under the Hood
 
Cyber tooth
Cyber toothCyber tooth
Cyber tooth
 
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
 
What Happened to Mathematically Provable Security?
What Happened to Mathematically Provable Security?What Happened to Mathematically Provable Security?
What Happened to Mathematically Provable Security?
 
Software and the Concurrency Revolution : Notes
Software and the Concurrency Revolution : NotesSoftware and the Concurrency Revolution : Notes
Software and the Concurrency Revolution : Notes
 

More from Derek Callaway

An Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyAn Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve Cryptography
Derek Callaway
 
Stop Malware Forever
Stop Malware ForeverStop Malware Forever
Stop Malware Forever
Derek Callaway
 
DNA Computing Notes Taken for Dr. Harlan Wood at UDel on Oct 9, 2003
DNA Computing Notes Taken for Dr. Harlan Wood at UDel on Oct 9, 2003DNA Computing Notes Taken for Dr. Harlan Wood at UDel on Oct 9, 2003
DNA Computing Notes Taken for Dr. Harlan Wood at UDel on Oct 9, 2003
Derek Callaway
 
Ham radio-without-a-radio
Ham radio-without-a-radioHam radio-without-a-radio
Ham radio-without-a-radio
Derek Callaway
 
Uncloaking IP Addresses on IRC
Uncloaking IP Addresses on IRCUncloaking IP Addresses on IRC
Uncloaking IP Addresses on IRC
Derek Callaway
 
Software Testing: Test Design and the Project Life Cycle
Software Testing: Test Design and the Project Life CycleSoftware Testing: Test Design and the Project Life Cycle
Software Testing: Test Design and the Project Life Cycle
Derek Callaway
 
Tickling CGI Problems (Tcl Web Server Scripting Vulnerability Research)
Tickling CGI Problems (Tcl Web Server Scripting Vulnerability Research)Tickling CGI Problems (Tcl Web Server Scripting Vulnerability Research)
Tickling CGI Problems (Tcl Web Server Scripting Vulnerability Research)
Derek Callaway
 

More from Derek Callaway (7)

An Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyAn Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve Cryptography
 
Stop Malware Forever
Stop Malware ForeverStop Malware Forever
Stop Malware Forever
 
DNA Computing Notes Taken for Dr. Harlan Wood at UDel on Oct 9, 2003
DNA Computing Notes Taken for Dr. Harlan Wood at UDel on Oct 9, 2003DNA Computing Notes Taken for Dr. Harlan Wood at UDel on Oct 9, 2003
DNA Computing Notes Taken for Dr. Harlan Wood at UDel on Oct 9, 2003
 
Ham radio-without-a-radio
Ham radio-without-a-radioHam radio-without-a-radio
Ham radio-without-a-radio
 
Uncloaking IP Addresses on IRC
Uncloaking IP Addresses on IRCUncloaking IP Addresses on IRC
Uncloaking IP Addresses on IRC
 
Software Testing: Test Design and the Project Life Cycle
Software Testing: Test Design and the Project Life CycleSoftware Testing: Test Design and the Project Life Cycle
Software Testing: Test Design and the Project Life Cycle
 
Tickling CGI Problems (Tcl Web Server Scripting Vulnerability Research)
Tickling CGI Problems (Tcl Web Server Scripting Vulnerability Research)Tickling CGI Problems (Tcl Web Server Scripting Vulnerability Research)
Tickling CGI Problems (Tcl Web Server Scripting Vulnerability Research)
 

Recently uploaded

Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
Jhone kinadey
 
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and MoreManyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
narinav14
 
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in NashikUpturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio, Inc.
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
vaishalijagtap12
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
DevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps ServicesDevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps Services
seospiralmantra
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
widenerjobeyrl638
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
Severalnines
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
kalichargn70th171
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
Massimo Artizzu
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
Luigi Fugaro
 

Recently uploaded (20)

Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
 
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and MoreManyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
 
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in NashikUpturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in Nashik
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
DevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps ServicesDevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps Services
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
 

Binary Clone Wars at CanSecWest 2009

  • 1. “Security Sovereignty”“Security Sovereignty”“Security Sovereignty”“Security Sovereignty” "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
  • 2. Hegel’s DialecticHegel’s Dialectic Ockham’s RazorOckham’s Razor Conflict & change Thesis, anti-thesis, synthesis Law of parsimony Best solution often simplest Diminishing returns Set Cardinality Decay Action vs. Reaction Traditional Techniques Attempts to solve an unbounded problem "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
  • 3. Observe Computers Run Unintended Code Orient Andrew Jacquith’s “Anti-virus not dead, but twitching.” ○ SOURCE Boston 2008○ SOURCE Boston 2008 Decide Evolutionary Design of Fractal Merkle Hash Trees Act Rapidly Dominating Program Execution ○ …Today "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
  • 4. bsdiff; Colin Percival @ UOxford Matching with Mismatches and Assorted Applications Leveraging Alignment Error-Correcting Codes (internal/self-referential) hashdeep, ssdeep; Jesse Kornblumhashdeep, ssdeep; Jesse Kornblum Piecewise Method Machine-code analysis The Software Similarity Problem in Malware Analysis NIST NSRL (National Software Reference Library) Singular File Hashing with MD5 and SHA-1 "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
  • 5. Fractal Merkle Hash Tree Lossless Implementation ○ Aided by Fractal Compression Enables Partial Verification ○ Trees are Atomically Autonomous *○ Trees are Atomically Autonomous * Community-Based Technology Verticalized Into Varying Information Domains Any Single User Can Declare an Info Domain Rapid Incident Response Investigators Can Coordinate Without Sharing Malware "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved. * = “Partial” verification is still a 100% match.
  • 6. Enables efficient identification of installed software Ensures all installed software is operator approved Leverages online communities Effective communication between security analysts worldwide "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved. Effective communication between security analysts worldwide No false positives! User-friendly GUI provides real-time metrics/visualizations/etc. Compiles domain-specific data for various industry verticals Aids in software inventory and asset management
  • 7. Perceived Security vs. Actual Security BlockWatch is Objectively Quantifiable Through Mathematics Perfect Hash Function 2 ** 192 is Astronomical (6.27710173538668e+57) > # of Atoms in the Known Universe "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved. > # of Atoms in the Known Universe Collision Free Infinite Granularity with Chunk-based Hashing Power Set Computation i.e. The Set of All Subsets Merkle Signature Scheme PKI Property of Merkle Tree
  • 8. Pollution Control Arbitration User Reputation Promoted for Valuable Hash Submission Pollution Control Arbitration User Reputation Promoted for Valuable Hash SubmissionPromoted for Valuable Hash Submission Bad Apples Eugenic Breeding ○ i.e. Plato’s Republic Promoted for Valuable Hash Submission Bad Apples Eugenic Breeding ○ i.e. Plato’s Republic "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
  • 9. Matching Variable-Sized Chunks Enables More V&V Scenarios Holistic System for Any Given Data Form Memory Images, Live Systems, Raw Hard Drives, BIOSes, IP Captures for Botnet Activity, Cloud Memory, etc. Net Component Allows Real-Time Data Exchange & Collaboration Enables a Secure Apparatus That Swiftly Resolves New Cyber Attacks Open Source API with Documentation SOAP/XML Web Services and WSDL’s DLR, IronPython, etc. "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
  • 10. "Security Sovereignty" Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
  • 11. "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved.
  • 12. Q&A Session.. Any more questions? Visit our web site: http://www.security-objectives.com Signup for the BlockWatch mailing list Read our “Stop Malware Forever” whitepaper "Security Sovereignty” Copyright © 2009, Security Objectives Corporation, All Rights Reserved. Read our “Stop Malware Forever” whitepaper Interactive demo of RADE’s meta-data backing for Microsoft’s symbol library Advisories, news, and more.. Read our blog: http://systemofsystems.wordpress.com Catch us on twitter: http://twitter.com/secobjs