Attacks/Breaches
9/15/2011
05:02 PM
Connect Directly
RSS
E-Mail
50%
50%

McAfee DeepSafe Promises Better PC Security

Taking advantage of features in Intel chips, DeepSafe technology uses virtual memory to spot and block otherwise stealthy rootkit infections.

Strategic Security Survey: Global Threat, LocalPain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)
At the Intel Developer Forum this week, McAfee unveiled new technology called DeepSafe, which will be used to underpin hardware-assisted security software. McAfee said that the new technology would not only spot, but also block--in real time--rootkits that can currently embed themselves in operating systems, and which can be extremely difficult to detect.

"McAfee DeepSafe uses hardware features already in the Intel processors to provide security beyond the OS," said Todd Gebhart, co-president of McAfee, in a statement. "From this unique vantage point, DeepSafe can apply new techniques to deliver a whole new generation of protection in real time to prevent malicious activity and not just detect infections."

McAfee said it plans to start including DeepSafe in products to be released later this year.

McAfee's move has caught few industry watchers by complete surprise, since some type of hardware and software hybrid product has been predicted since Intel purchased McAfee last year for $7.7 billion. But that costly acquisition also provoked many questions, not least about whether chip-based security could meaningfully enhance today's software-based approaches.

Interestingly, the DeepSafe announcement was made the same week that Microsoft announced that Windows 8 will ship with built-in antivirus. That announcement illustrates the pressure that's on antivirus vendors, including Symantec and McAfee, to differentiate their products--especially as free antivirus offerings capture more consumers. Intel, meanwhile, faces similar issues with its battle against ARM.

In light of such business concerns, could DeepSafe provide Intel's McAfee with a strong way of enticing businesses to adopt its antivirus and other endpoint security tools? "There's value right now. I think it's fairly limited to rootkits, but in the future it could be applied to a much wider swath of attack vectors," said Lawrence Pingree, a research director at Gartner.

Furthermore, he said, "this is the first step to a wider behavioral detection capability," including potentially monitoring all system behavior. "Is it the most innovative thing in the security industry? No, but it is an incremental innovation. There hasn't been a lot of real innovative things in the security industry for quite some time, in terms of new approaches."

Innovation is needed because of how well malicious operators understand how existing defenses function. Today's tools largely use signature-based detection, meaning they can spot and stop threats that have been previously seen. Accordingly, attackers have turned to code obfuscation and repacking--cheap and easy techniques for producing generations of functionally similar yet technically "never before seen" malware.

One innovation in DeepSafe is its use of virtualization. "One of the things that McAfee DeepSafe does is it virtualizes memory access. Kind of like how a VMware virtualization infrastructure works, it inserts itself between the operating system and memory access, via a virtualization feature," said Pingree. "It lets them look at memory before the memory is accessed, so it can triage all of that information. That's a critical path for discovering these rootkits that exist out there, and that have been very good at avoiding detection via the behavioral OS-level controls that exist."

Interestingly, McAfee won't necessarily be the only security vendor offering DeepSafe-like capabilities. Under the terms of European regulators' approval of Intel's acquisition of McAfee, Intel must share with other security vendors the technology they need to tap into any new security functionality built into its processors or chipsets, one year before its release.

"That evens the playing field. It's really the only way that McAfee could have been purchased, and I was surprised that the United States didn't do similar things," said Pingree.

Attend Enterprise 2.0 Santa Clara, Nov. 14-17, 2011, and learn how to drive business value with collaboration, with an emphasis on how real customers are using social software to enable more productive workforces and to be more responsive and engaged with customers and business partners. Register today and save 30% off conference passes, or get a free expo pass with priority code CPHCES02. Find out more and register.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2009-5142
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb 1.09 and earlier, as used in Mimbo Pro 2.3.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the src parameter.

CVE-2010-5302
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb before 1.15 as of 20100908 (r88), as used in multiple products, allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING.

CVE-2010-5303
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in the displayError function in timthumb.php in TimThumb before 1.15 (r85), as used in multiple products, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to $errorString.

CVE-2014-0965
Published: 2014-08-21
IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.33, 8.0.x before 8.0.0.9, and 8.5.x before 8.5.5.3 allows remote attackers to obtain sensitive information via a crafted SOAP response.

CVE-2014-3022
Published: 2014-08-21
IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.33, 8.0.x before 8.0.0.9, and 8.5.x before 8.5.5.3 allows remote attackers to obtain sensitive information via a crafted URL that triggers an error condition.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.