We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

EDS Exploitation Detection System

Formal Metadata

Title
EDS Exploitation Detection System
Title of Series
Number of Parts
112
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
In the last several years, exploits have become the strongest weapons in cyber warfare. Exploit developers and vulnerability researchers have now become the nuclear scientists of the digital world. OS Companies and third party companies have created several security mitigation tools to make it harder to use these vulnerabilities and have made exploit creation harder. In this presentation, I will talk about a new security mitigation tool which is based on the co-operation of several mitigations to cover their weaknesses. It's based on monitoring the memory changes without decreasing the performance of the running application and creates a multi-layer protection with regular mitigations. Amr Thabet (@Amr_Thabet) a Malware Researcher at Q-CERT with 5+ years experience in reversing malware and researching. I'm the Author of many open-source tools like Pokas Emulator and Security Research and Development Framework (SRDF).