Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Black Hat

Microsoft Security Toolkit Gets Tougher On Exploits With Technology from BlueHat Prize Contestant

Black Hat 2012

LAS VEGAS – BLACK HAT CONFERENCEMicrosoft today released the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, which adds new Return Oriented Programming (ROP) defenses inspired by BlueHat Prize contest finalist Ivan Fratric.

Black Hat 2012

LAS VEGAS – BLACK HAT CONFERENCEMicrosoft today released the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, which adds new Return Oriented Programming (ROP) defenses inspired by BlueHat Prize contest finalist Ivan Fratric.

EMET, which became officially supported in May 2011, is specifically designed to block targeted attacks against unfixed vulnerabilities, making it more difficult for attackers to gain access to systems.

Microsoft EMET 3.5Launched at last year’s Black Hat conference, BlueHat Prize is competition aimed at fostering innovation in exploit mitigations through awarding more than $250,000 in cash and prizes. The contest closed April 1, 2012, and the three finalists were named in June. The winner will be announced on Thursday, July 26.

“In less than three months, we successfully integrated one of the BlueHat Prize finalists’ technologies with EMET 3.5 Technology Preview to help make software significantly more resistant to exploitation,” said Mike Reavey, senior director of the Microsoft Security Response Center at Microsoft. “As the risk of criminal attacks on private and government computer systems continues to increase, we’ve been able to accomplish our goal with the BlueHat Prize contest, incentivizing researchers to invest in defensive research and develop technologies that could be put into play to help make the computing ecosystem safer.”

Fratric, who earned a Ph.D. in computer science and is a researcher at the University of Zagreb in Croatia, submitted a solution called ROPGuard, which hinders attacks that leverage ROP, an advanced technique that attackers use to combine short pieces of benign code, already present in a system, for a malicious purpose. ROPGuard defines a set of checks that can be used to detect when certain functions are being called in the context of malicious ROP code and can help protect against attacks exploiting memory safety vulnerabilities.

“Developing a prototype is one thing, but having it integrated with an actual product such as EMET 3.5 Tech Preview is something else entirely,” said Fratric when he learned that his BlueHat Prize entry was incorporated into the toolkit. “I’m really excited about my technology finding its way to users and hope that it will help make them more secure against current threats.”

“EMET 3.5 Technology Preview builds on the recently released EMET 3.0 toolkit that included features for enterprise configuration, deployment and event logging that help allow for real-time notification of exploitation attempts,” Microsoft said. “This is part of a continued development effort and a response to direct feedback from EMET customers seeking more options for the enterprise environment.”

Additional details on the effort have been published today in the paper “Building a Safer, More Trusted Internet Through Information Sharing.”

The EMET Technology Preview 3.5 is available here via the Microsoft download center.

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Black Hat

Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world...

Black Hat

Cris Thomas, also known as Space Rogue, was a founding member of the Lopht Heavy Industries hacker collective.

Black Hat

Hundreds of companies and organizations showcased their products and services this week at the 2023 edition of the Black Hat conference in Las Vegas.

Black Hat

LAS VEGAS – The security industry makes its annual pilgrimage to the hot Sonoran desert this week for skills training, hacking demos, research presentations...

Black Hat

Sin City, A.K.A Las Vegas, Nevada – is once again playing host this week to the Black Hat and DEFCON security conferences. With throngs...

Black Hat

Bypassing Air Gap Security: Malware Uses Radio Frequencies to Steal Data from Isolated Computers 

Black Hat

The cybersecurity industry heads to Las Vegas this week for Black Hat in a state of economic contraction, confusion and excitement. Can the promise...

Black Hat

The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009 but the talk was pulled at the last...