Attacks/Breaches
9/15/2011
05:02 PM
50%
50%

McAfee DeepSafe Promises Better PC Security

Taking advantage of features in Intel chips, DeepSafe technology uses virtual memory to spot and block otherwise stealthy rootkit infections.

Strategic Security Survey: Global Threat, LocalPain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)
At the Intel Developer Forum this week, McAfee unveiled new technology called DeepSafe, which will be used to underpin hardware-assisted security software. McAfee said that the new technology would not only spot, but also block--in real time--rootkits that can currently embed themselves in operating systems, and which can be extremely difficult to detect.

"McAfee DeepSafe uses hardware features already in the Intel processors to provide security beyond the OS," said Todd Gebhart, co-president of McAfee, in a statement. "From this unique vantage point, DeepSafe can apply new techniques to deliver a whole new generation of protection in real time to prevent malicious activity and not just detect infections."

McAfee said it plans to start including DeepSafe in products to be released later this year.

McAfee's move has caught few industry watchers by complete surprise, since some type of hardware and software hybrid product has been predicted since Intel purchased McAfee last year for $7.7 billion. But that costly acquisition also provoked many questions, not least about whether chip-based security could meaningfully enhance today's software-based approaches.

Interestingly, the DeepSafe announcement was made the same week that Microsoft announced that Windows 8 will ship with built-in antivirus. That announcement illustrates the pressure that's on antivirus vendors, including Symantec and McAfee, to differentiate their products--especially as free antivirus offerings capture more consumers. Intel, meanwhile, faces similar issues with its battle against ARM.

In light of such business concerns, could DeepSafe provide Intel's McAfee with a strong way of enticing businesses to adopt its antivirus and other endpoint security tools? "There's value right now. I think it's fairly limited to rootkits, but in the future it could be applied to a much wider swath of attack vectors," said Lawrence Pingree, a research director at Gartner.

Furthermore, he said, "this is the first step to a wider behavioral detection capability," including potentially monitoring all system behavior. "Is it the most innovative thing in the security industry? No, but it is an incremental innovation. There hasn't been a lot of real innovative things in the security industry for quite some time, in terms of new approaches."

Innovation is needed because of how well malicious operators understand how existing defenses function. Today's tools largely use signature-based detection, meaning they can spot and stop threats that have been previously seen. Accordingly, attackers have turned to code obfuscation and repacking--cheap and easy techniques for producing generations of functionally similar yet technically "never before seen" malware.

One innovation in DeepSafe is its use of virtualization. "One of the things that McAfee DeepSafe does is it virtualizes memory access. Kind of like how a VMware virtualization infrastructure works, it inserts itself between the operating system and memory access, via a virtualization feature," said Pingree. "It lets them look at memory before the memory is accessed, so it can triage all of that information. That's a critical path for discovering these rootkits that exist out there, and that have been very good at avoiding detection via the behavioral OS-level controls that exist."

Interestingly, McAfee won't necessarily be the only security vendor offering DeepSafe-like capabilities. Under the terms of European regulators' approval of Intel's acquisition of McAfee, Intel must share with other security vendors the technology they need to tap into any new security functionality built into its processors or chipsets, one year before its release.

"That evens the playing field. It's really the only way that McAfee could have been purchased, and I was surprised that the United States didn't do similar things," said Pingree.

Attend Enterprise 2.0 Santa Clara, Nov. 14-17, 2011, and learn how to drive business value with collaboration, with an emphasis on how real customers are using social software to enable more productive workforces and to be more responsive and engaged with customers and business partners. Register today and save 30% off conference passes, or get a free expo pass with priority code CPHCES02. Find out more and register.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2037
Published: 2014-11-26
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

CVE-2014-6609
Published: 2014-11-26
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CVE-2014-6610
Published: 2014-11-26
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dia...

CVE-2014-7141
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.

CVE-2014-7142
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?