Microsoft Security Toolkit brings new defensive technology
Microsoft’s Trustworthy Computing Group today launched the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, such as Return Oriented Programming (ROP) defenses motivated by BlueHat Award competition finalist Ivan Fratric.
The EMET 3.5 Technology Preview is a easily available security tool that makes it more difficult for enemies to manipulate weaknesses and gain system access.
The BlueHat Prize competition, a program aimed at nurturing innovation in exploit mitigations through awarding more than $250,000 in cash and prizes, was launched by Microsoft one year ago at the Black Hat security conference in Las Vegas.
“In less than three months, we successfully integrated one of the BlueHat Prize finalists’ technologies with EMET 3.5 Technology Preview to help make software significantly more resistant to exploitation,” said Mike Reavey, senior director of the Microsoft Security Response Center at Microsoft.
“As the risk of criminal attacks on private and government computer systems continues to increase, we’ve been able to accomplish our goal with the BlueHat Prize contest, incentivizing researchers to invest in defensive research and develop technologies that could be put into play to help make the computing ecosystem safer,” Reavey added.
Fratric submitted a unique solution called ROPGuard, which hinders attacks that leverage ROP. ROP is an advanced technique that attackers use to combine short pieces of benign code, already present in a system, for a malicious purpose. ROPGuard defines a set of checks that can be used to detect when certain functions are being called in the context of malicious ROP code and can help protect against attacks exploiting memory safety vulnerabilities.
“Developing a prototype is one thing, but having it integrated with an actual product such as EMET 3.5 Tech Preview is something else entirely,” said Fratric when he learned that his BlueHat Prize entry was incorporated into the toolkit. “I’m really excited about my technology finding its way to users and hope that it will help make them more secure against current threats.”
EMET 3.5 Technology Preview builds on the recently released EMET 3.0 toolkit that included features for enterprise configuration, deployment and event logging that help allow for real-time notification of exploitation attempts.