constant gardener
Download
Skip this Video
Download Presentation
Constant Gardener

Loading in 2 Seconds...

play fullscreen
1 / 12

Constant Gardener - PowerPoint PPT Presentation


  • 147 Views
  • Uploaded on

Constant Gardener. Technical Overview. Overview. Server focused security tool The clients primary goal is to prevent privilege escalation attacks. We’ll achieve this using the DynamoRIO API to modify processes as they run. Users.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Constant Gardener' - tania


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
constant gardener

ConstantGardener

Technical Overview

overview
Overview
  • Server focused security tool
  • The clients primary goal is to prevent privilege escalation attacks.
  • We’ll achieve this using the DynamoRIO API to modify processes as they run.
users
Users
  • The intended targets for this product are system administrators.
  • A system administrator will be able to make use of Constant Gardener to provide extra protection for specific processes that may be vulnerable to privilege escalation attacks.
use case
Use Case
  • A system administrator will run a script
  • That script will initiate the target process and inject our client
  • Everything else should be transparent
what it s not
What it’s NOT
  • Constant Gardener will not be for general purpose end-user use.
  • It will not be for personal computing systems
  • It will not provide general OS protection against all incoming attacks
functional requirements
Functional Requirements
  • Must build a control flow graph of the target binary
  • The control flow graph must be accessible indefinitely and protected from memory corruption or overwrite attacks
  • Must intercept system calls made by the target process
  • Must validate the system calls by comparing the path to the system call against the CFG
functional requirements1
Functional Requirements
  • Must allow or deny the system call based on above comparison
  • Must protect memory to prevent corruption of protection abilities
  • Must not noticeably affect performance- this is for use on front-facing applications
ad