ARLINGTON, Va., June 14, 2016 /PRNewswire/ -- Endgame, a leading provider of cybersecurity software solutions to hunt for advanced adversaries, today announced that Senior Vulnerability Researcher Matt Spisak will present at REcon 2016, the computer science security conference that focuses on reverse engineering and advanced exploitation techniques. Spisak's talk, entitled "Hardware-Assisted Rootkits and Instrumentation: ARM Edition," will take place on June 17th during the three-day conference in Montreal, Canada.
Security researchers have limited options when it comes to debuggers and dynamic binary instrumentation tools for ARM-based devices. During his presentation Spisak will explore a common but often ignored feature of the ARM debug architecture, and delve into the unique use cases that this hardware component affords researchers spanning instrumentation, rootkits, and exploit prevention.
In addition, Spisak's presentation will:
- Introduce a prototype toolkit with IDA plugin that can perform real-time tracing, code coverage analysis, and more, of the Android kernel on COTS smartphones without requiring virtualization extensions or special hardware.
- Compare implementations of this hardware unit across multiple chipset vendors, and discuss applicability to other ARM CPUs found in smartphones like WiFi and cellular basebands.
- Demonstrate how this debug interface can be turned into a hardware-assisted rootkit, with a prototype kernel-level Android rootkit.
- Detail a specific use-case for exploit mitigations on embedded systems.
Endgame is a leading provider of next generation endpoint security solutions that enable enterprises automate the hunt for the most sophisticated adversaries within their networks. Endgame's technology and techniques are proven to detect and respond rapidly to cyber threats in the most extreme environments - from defending US national security interests to protecting the world's critical infrastructure.
The Endgame Hunt platform empowers hunt teams, incident responders, and security operators to conduct an end-to-end hunt mission, significantly reducing the time to detect and contain adversaries. The Endgame team is made up of scientists, software engineers, researchers, and others with unmatched experience working on security within the Intelligence Community and Department of Defense. At Endgame, we help our customers move from being the hunted to being the hunter.
To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/endgame-to-present-at-recon-2016-300284257.html