We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

EMET 4.0 PKI Mitigation

Formal Metadata

Title
EMET 4.0 PKI Mitigation
Title of Series
Number of Parts
112
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Microsoft EMET is a free Mitigation tool. In addition to its memory corruption exploit mitigations, a newly introduced feature is the PKI mitigation. This mitigation implements x509 certificate pinning to prevent usage of forged certificates in HTTPS sessions in the web browser. This talk is technical as it demos EMET in action and explains how the PKI mitigation works. Neil Sikka (@neilsikka) is a computer security enthusiast and researcher. He works at Microsoft on MSRC (Microsoft Security Response Center) as a Software Security Engineer where he analyzes 0day exploits and other security vulnerabilities in any Microsoft software, and develops security tools such as EMET. In addition to his security research at work, he also likes to do security research on his free time at home on nights and weekends. He has a technical blog where he posts his security research.