Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Black Hat

Microsoft Security Toolkit Gets Tougher On Exploits With Technology from BlueHat Prize Contestant

Black Hat 2012

LAS VEGAS – BLACK HAT CONFERENCEMicrosoft today released the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, which adds new Return Oriented Programming (ROP) defenses inspired by BlueHat Prize contest finalist Ivan Fratric.

Black Hat 2012

LAS VEGAS – BLACK HAT CONFERENCEMicrosoft today released the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, which adds new Return Oriented Programming (ROP) defenses inspired by BlueHat Prize contest finalist Ivan Fratric.

EMET, which became officially supported in May 2011, is specifically designed to block targeted attacks against unfixed vulnerabilities, making it more difficult for attackers to gain access to systems.

Microsoft EMET 3.5Launched at last year’s Black Hat conference, BlueHat Prize is competition aimed at fostering innovation in exploit mitigations through awarding more than $250,000 in cash and prizes. The contest closed April 1, 2012, and the three finalists were named in June. The winner will be announced on Thursday, July 26.

“In less than three months, we successfully integrated one of the BlueHat Prize finalists’ technologies with EMET 3.5 Technology Preview to help make software significantly more resistant to exploitation,” said Mike Reavey, senior director of the Microsoft Security Response Center at Microsoft. “As the risk of criminal attacks on private and government computer systems continues to increase, we’ve been able to accomplish our goal with the BlueHat Prize contest, incentivizing researchers to invest in defensive research and develop technologies that could be put into play to help make the computing ecosystem safer.”

Fratric, who earned a Ph.D. in computer science and is a researcher at the University of Zagreb in Croatia, submitted a solution called ROPGuard, which hinders attacks that leverage ROP, an advanced technique that attackers use to combine short pieces of benign code, already present in a system, for a malicious purpose. ROPGuard defines a set of checks that can be used to detect when certain functions are being called in the context of malicious ROP code and can help protect against attacks exploiting memory safety vulnerabilities.

“Developing a prototype is one thing, but having it integrated with an actual product such as EMET 3.5 Tech Preview is something else entirely,” said Fratric when he learned that his BlueHat Prize entry was incorporated into the toolkit. “I’m really excited about my technology finding its way to users and hope that it will help make them more secure against current threats.”

“EMET 3.5 Technology Preview builds on the recently released EMET 3.0 toolkit that included features for enterprise configuration, deployment and event logging that help allow for real-time notification of exploitation attempts,” Microsoft said. “This is part of a continued development effort and a response to direct feedback from EMET customers seeking more options for the enterprise environment.”

Additional details on the effort have been published today in the paper “Building a Safer, More Trusted Internet Through Information Sharing.”

Advertisement. Scroll to continue reading.

The EMET Technology Preview 3.5 is available here via the Microsoft download center.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Black Hat

Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world...

Black Hat

LAS VEGAS – The security industry makes its annual pilgrimage to the hot Sonoran desert this week for skills training, hacking demos, research presentations...

Black Hat

Sin City, A.K.A Las Vegas, Nevada – is once again playing host this week to the Black Hat and DEFCON security conferences. With throngs...

Black Hat

Bypassing Air Gap Security: Malware Uses Radio Frequencies to Steal Data from Isolated Computers 

Application Security

As the year comes to a close, we thought it would be appropriate to highlight some of the best stories and columns for 2010....

Black Hat

The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009 but the talk was pulled at the last...

Application Security

If Patch Tuesday is a party, this would be the IT security version of pre-gaming.On Aug. 9, Microsoft accidentally released information on the five...