Videos

Explore a diverse range of expertly crafted videos covering Software Supply Chain Security, SBOM, Code Protections, Vulnerability Remediation, Cybersecurity Policy, and exclusive insights into RunSafe Security. Stay informed, enhance your cybersecurity knowledge, and stay ahead in the industry with these videos.

Techniques to Debug Randomized Binaries with RunSafe

Streamlining Randomized Binary Debugging

Debugging randomized binaries can be a significant hurdle for developers, primarily because traditional tools like GDB lack awareness of the randomization process. This discrepancy often results in disparities between the expected symbol locations and their actual positions during runtime, making it challenging to pinpoint and resolve issues effectively. RunSafe Security offers a solution to this problem in the form of a GDB plugin. Designed to seamlessly integrate into your existing workflow, our plugin addresses the limitations of traditional debugging tools by providing enhanced support for debugging randomized binaries. Unlike other solutions that may require extensive adjustments or cause performance impacts, our plugin allows you to leverage GDB's capabilities with minimal disruption and no learning curve. One of the key features of the GDB plugin is its ability to generate randomized debug information that accurately aligns with your running application or core file. By doing so, it provides developers with a more intuitive and efficient debugging experience, enabling them to quickly identify and resolve issues within randomized binaries. With RunSafe's GDB plugin, developers gain access to a comprehensive set of tools that are designed to facilitate effective debugging under real-world production conditions. This includes overcoming the obstacles associated with mismatched debug information, resulting in streamlined debugging processes and improved productivity. By leveraging our GDB plugin, developers can overcome the challenges posed by debugging randomized binaries and ensure the reliability and security of their software applications. Say goodbye to the frustrations of traditional debugging tools and embrace the enhanced capabilities of RunSafe's GDB plugin for a smoother debugging experience.

Fortifying Taiwan’s Critical Infrastructure: Cyber Resilience Amidst Military Conflict

Understanding the Impact of Cyber Attacks on Taiwan's Communications Infrastructure

Safeguarding critical infrastructure is essential, particularly in regions like Taiwan, which face heightened susceptibility to cyber attacks targeting essential services. With the looming threat of a potential military conflict with China, Taiwan finds itself in need of more fortified defenses against cyber threats to ensure the uninterrupted operation of government services and financial transactions, spanning critical sectors such as banking and eCommerce. The significance of communications infrastructure cannot be overstated. The severing of two underwater cables connecting China in early 2023 stands as a stark reminder of the vulnerabilities inherent in Taiwan's infrastructure. Initially dismissed as accidental damage, further investigations uncovered evidence of a deliberate act perpetrated by a Chinese fishing boat. This deliberate action resulted in significant outages and disruptions across Taiwan, highlighting the fragility of the nation's communication networks in the face of deliberate sabotage. This incident serves as a wake-up call, underscoring the urgent need for Taiwan to bolster the resilience of its internet cables and make strategic investments in a robust satellite communications infrastructure. In times of military conflict or geopolitical tension, the ability to maintain seamless communication becomes vital for the effective operation of governmental agencies and the continuity of economic activities. Safeguarding both physical and satellite-based communication systems against cyber threats is a critical imperative for Taiwan's security and stability in an increasingly volatile geopolitical landscape. To address these pressing challenges, concerted efforts are required to reinforce Taiwan's infrastructure resilience and mitigate the risks posed by cyber threats. This entails not only fortifying physical infrastructure against potential attacks but also implementing robust cybersecurity measures to safeguard against digital threats. Collaborative initiatives involving government agencies, private sector entities, and cybersecurity experts are essential to develop comprehensive strategies aimed at enhancing Taiwan's cyber resilience and ensuring the continued functionality of critical infrastructure under all circumstances. As we navigate the complexities of safeguarding critical infrastructure amid the looming threat of cyber attacks and military conflict, it becomes imperative for stakeholders to come together in a concerted effort to address these challenges and secure Taiwan's future. By prioritizing investments in infrastructure resilience and cybersecurity, Taiwan can effectively mitigate the risks posed by cyber threats and safeguard the stability and security of its critical infrastructure in the face of evolving geopolitical dynamics.

RSSM: Elevate Your Software Security – Build-time SBOM vs. Binary SBOM

RunSafe Security's Advanced Build-time SBOM Tool

By harnessing the vast amounts of build-time data, you can elevate your security measures to be proactive, extending protections beyond the limitations of binary-focused approaches. This gives you access to the complete spectrum of build-time information. With elevated threats and more sophisticated vulnerability attacks, the need for a more nuanced understanding of software dependencies has never been more apparent. With a build-time SBOM, you can navigate through the labyrinthine network of libraries, modules, and frameworks that underpin your software's functionality, gaining insights that go far beyond mere execution essentials. By capturing detailed information about dynamic library names, versions, symbols, and hash values, a build-time SBOM offers a granular view of the software's composition, enabling you to identify and address potential vulnerabilities and security risks at their source. A build-time SBOM also provides extensive information about the software's construction process, including crucial details such as build system locations, hashes upon access, and the hierarchical relationships between different dependencies. Armed with this comprehensive understanding of the software's makeup, you can enhance your security posture by proactively identifying and mitigating potential threats before they have a chance to manifest. But the benefits of a build-time SBOM extend beyond security considerations alone. By gaining visibility into the entire compilation process, including source files, header files, static libraries, and intermediary applications generated during builds, you can streamline your development workflow, improve collaboration between different teams, and ensure compliance with industry regulations and best practices. In essence, a build-time SBOM represents a paradigm shift in how we approach software security and development. By embracing the power of complete build-time information, you can fortify your software against emerging threats, optimize your development processes, and pave the way for a more secure and resilient digital future. Embrace the benefits of proactive security with a comprehensive build-time SBOM from RunSafe Security.

Revolutionizing Zero-day Exploit Protection: Hardening Code with Load-time Function Randomization

Defending Against the Unseen Threats

At RunSafe Security, our team has conducted extensive analysis to assess the efficacy of load-time function randomization, especially in the context of mitigating zero-day exploits, which are inherently unpredictable and pose significant threats to software systems. Our investigation began with rap gadgets, which serve as fundamental components akin to Lego pieces in an attacker's arsenal, particularly for targeting memory vulnerabilities. Through meticulous examination of thousands of open-source binaries, we meticulously extracted essential statistics pertaining to functions and ROM gadgets. We observed that the average binary comprises approximately 220 functions and over a thousand rap gadgets, averaging nearly 5 gadgets per function. Notably, a considerable number of functions lacked gadgets, with a staggering 95% having fewer than 30 gadgets. Out of the 245,000 functions scrutinized, only a mere handful possessed 500 or more gadgets. Subsequently, leveraging publicly available tools like Rapper, we endeavored to evaluate the presence of rap gates in the binaries. Our findings were revealing, indicating that 25% of these binaries harbored functioning chains capable of potentially granting unauthorized access to the device. This alarming discovery underscores the significance of addressing vulnerabilities, especially given that vulnerabilities occur at a rate of 7 to 12 per 1,000 lines of code, as highlighted by NIST and other reputable studies. Enter RunSafe Security: code hardening with load-time function randomization. With an average of 220 functions per binary, this approach results in an astronomical number of load combinations, approximately equivalent to 2.284 times 10 to the power of 420. The implications are profound, as this strategy significantly enhances entropy, thereby severely restricting an attacker's options. Instead of having access to a myriad of rap gadgets, attackers are confined to the gadgets within the specific vulnerable function, with an average of less than 5 per function. Upon conducting a thorough reassessment of the binaries, we made a remarkable discovery—none of them exhibited function-level rap chains. This outcome underscores the effectiveness of RunSafe's load-time function randomization in fortifying software systems against potential threats. This robust defense mechanism instills confidence, even in the face of future zero-day vulnerabilities, as systems protected by RunSafe's measures offer resilient protection, leaving attackers with minimal avenues for exploitation.

RSSM: How can RunSafe help companies deploy safe open-source packages?

RunSafe's Memory Randomization and Software Protection

Safeguarding your company against the myriad vulnerabilities that lurk in the shadows of the digital world is paramount. While there are many benefits to open source software, it also presents inherent security risks due to its accessible source code and frequent updates. RunSafe recognizes this challenge and introduces a groundbreaking solution in the form of RunSafe Repo. RunSafe Repo serves as a repository housing popular open source packages that have been pre-hardened with the robust RunSafe Code, significantly enhancing software protection. Noteworthy packages such as Python, Redis, and Nginx have already been fortified within Repo. The seamless integration of these fortified packages into existing code bases requires no modifications, empowering developers to bolster their defense mechanisms against cyber threats even in scenarios where fixes or patches are unavailable. What sets RunSafe Repo apart is its commitment to ensuring that each pre-hardened package maintains functional equivalence while dynamically loading at runtime with a unique memory layout. This proactive approach automatically strengthens your software against prevalent and severe cyber attacks, setting a new standard for cybersecurity defense. By embracing RunSafe, companies can elevate their cybersecurity strategies to unprecedented levels, experiencing a paradigm shift in safeguarding their invaluable digital assets. Embrace the future of cybersecurity with confidence, knowing that RunSafe leads the charge in reshaping the narrative of digital defense. With RunSafe Repo at your disposal, you gain access to a comprehensive suite of pre-hardened packages that not only fortify your software but also provide a level of assurance that each package maintains its functionality while enhancing security measures. This innovative approach ensures that your defenses remain robust and effective against emerging cyber threats, giving you peace of mind in an increasingly complex digital environment. As you navigate the intricate landscape of cybersecurity challenges, RunSafe stands as a beacon of protection and innovation, empowering you to stay ahead of potential risks and secure your digital assets with confidence and resilience.

RSSM: Why is RunSafe’s load-time function randomization better for control flow integrity than address space layout randomization?

RunSafe's Load-time Function Randomization for Control Flow Integrity and Secure Software Development

Each time your program or library loads, we redefine the game by meticulously randomizing the order and layout of all the code within that binary or library. Unlike conventional address-based layout randomization, our approach operates at an exceptionally high granularity, providing an extensive range of possible permutations that enhance security and ensure control flow integrity. ASLR often involves moving an entire program as one large chunk, making it vulnerable to exploitation in the presence of even a single information leak. Our Secure Randomization (SR) takes a distinctive path, creating a formidable challenge for attackers attempting to reverse engineer the code's memory layout. Even if there's an information leak, deciphering the specific order of functions becomes a monumental task due to the vast number of possible permutations. Consider the factorial of the number of functions in most programs—often exceeding 200. The result is an astronomical number of potential orderings, surpassing the number of atoms in the universe multiple times over. Our load-time function randomization offers unparalleled security, ensuring that leaked addresses don't immediately translate into exploitable vulnerabilities and enhancing secure software development. In complementing address space layout randomization, our functionality adds an extra layer of security. For systems already implementing ASLR, we seamlessly enhance your overall protection. If you lack ASLR, as evident in VxWorks 6.9, our randomization becomes an essential shield against potential threats. Comparing our load-time function randomization to control flow integrity highlights another advantage—minimal performance overhead. During program loading, you'll experience only a marginal increase in time, typically one to three additional milliseconds. Once in runtime, our technology operates without interfering, resulting in effectively 0% performance overhead. In contrast, control flow integrity implementations can typically range from 5% to 30% or higher, potentially compromising both performance and security. The flexibility of our load-time function randomization extends to environments employing control flow integrity. We offer a complimentary solution that doesn't compromise performance, making it an ideal choice for those prioritizing both security and efficiency. Make the switch to our RunSafe code and experience the benefits of secure and high-performance software that ensures control flow integrity.

RSSM: Mastering Secure Software Building with RunSafe Code: Comparing Protected and Unprotected Software Binaries

Preventing Vulnerability Exploits by Building Secure Software with RunSafe Code Protections

In this RunSafe Security Minute video, we create a side-by-side comparison to demonstrate the differences between traditional software builds without built-in protection and a software build that incorporates RunSafe code to safeguard against vulnerability exploits. In the first scenario, we utilize a standard software development environment that operates in a CentOS 7 setting with compilers, GCC, Python tools, and more installed to emulate the creation of a GPS logger program. As part of the build, we expose common vulnerabilities like buffer overflow and information leaks to illustrate the potential opportunities for threat actors to attack. For the scenario that leverages RunSafe Code, we start with a Docker file and install Alchemist and LFR (RunSafe Code) via an Artifactory repository – a simple install. Then, we execute the builds using LFR Helper Make. Even if your build script dates back 40 years, adding LFR Helper will enhance security effortlessly. When running, take note of how the vulnerabilities are easily exploited on the unprotected version, leaking information and creating a file. However, the same attempt on the RunSafe-protected version results in failure, which is signaled by a negative 11 return code, indicating a prevented seg fault. RunSafe Code uses patented Moving Target Defense (MTD) techniques to neutralize memory-related exploits. The simple addition of RunSafe code during build time creates an alternative to manual code analysis and continuous patching. You can build secure software by deploying RunSafe Code with a straightforward package install and the addition of LFR Helper to your build commands. This protection extends across various Linux environments, including Alpine, Debian, Ubuntu, CentOS, Rocky Linux, and Red Hat, with seamless integrations into AOSP, OpenWRT, Yocto, Build Root, and Artifactory, enabling developers to build secure software. Take action today to fortify your software effortlessly and prevent exploiting vulnerabilities with the addition of RunSafe code during build time.

RSSM: What metrics does RunSafe provide as evidence of value?

Metrics Analysis, Vulnerability Mitigation, and Future-Proofing with RunSafe Insights

In any business environment, the utilization of metrics stands as a cornerstone for informed decision-making processes within the organization. At RunSafe, our unwavering commitment to memory safety and comprehensive protection underscores the critical need for gleaning customer metrics and insights during our software immunization assessment phase. This collaborative approach not only enriches our understanding of customer needs but also empowers us to tailor our solutions to address their specific challenges effectively. Our engagement with customers entails a deep dive into their software builds, wherein we conduct a thorough analysis across two pivotal dimensions of metrics. Firstly, we embark on a meticulous examination of the Software Bill of Materials (SBOM), unraveling any known vulnerabilities inherent in the current software build. This foundational step serves as the bedrock upon which our vulnerability mitigation strategies are built. Leveraging RunSafe's expertise in this domain, we implement advanced techniques aimed at fortifying the security posture of the software. Empirical evidence from academic research underscores the significant potential for mitigation rates ranging from 40 to 70%, a testament to the effectiveness of our collaborative efforts. This validation reinforces our commitment to delivering tangible results that mitigate risks and enhance the resilience of software systems. In tandem with vulnerability identification and mitigation, we adopt a forward-looking approach to address unknown or zero-day vulnerabilities. By scrutinizing the code structure and employing sophisticated randomization techniques, we proactively fortify the software against emerging threats, thereby future-proofing it for tomorrow's challenges. As we navigate the multifaceted landscape of software security metrics and solutions, let us delve into the intricacies of our dual-focused strategy, where current challenges converge with innovative solutions, ultimately shaping the resilience of code in the ever-evolving digital landscape. Join us as we collectively explore new horizons and redefine the boundaries of software security excellence.

RunSafe Security DevSecOps DCCyberWeek Highlight Video Final

A highlight reel about RunSafe Security's DevSecOps bash featuring Nicolas Chaillan, Chief Software Officer of the United States Air Force.

Yocto, RunSafe and Memory Threat Immunization

“A great threat has become a great opportunity” IIoT World editor-in-chief Lucian Fogoros recently interviewed RunSafe Chief Technology Officer Doug Britton and Andrew Murray, QA Ninja about the impact of the yocto project, the rising number of vulnerabilities in the IoT industry and effortless way adding Alkemist to a yocto project eliminates those vulnerabilities. Blog Post: http://run-safe-security.test/blog/5-minute-memory-threat-immunization-for-yocto-build-environments/

RSSM: Software Development with Lynx and RunSafe – Enhance Efficiency and Mitigate Risks

Enhance Software Development Efficiency with Lynx and RunSafe's Synergistic Power.

Lynx Software Technologies’ (Lynx) clientele across aircraft manufacturers, industrial controls, defense systems, and IOT devices share a common goal: the reduction of costs, risks, and scheduling complexities. RunSafe is an all-encompassing solution that addresses these challenges in a unified package. It protects the LYNX MOSA.ic framework against 40-70% of the most common vulnerabilities with no developer impact. The seamless integration between RunSafe solutions and LYNX MOSA.ic streamlines processes, liberating clients from the burdens of labor-intensive bug chasing and emergency patch testing. Imagine reclaiming hundreds of labor years that were once dedicated to navigating the complexities of software development security patching. When managing cyber risks during software development, on-time deliveries, patch deployments, and developer efficiency often bear the brunt of unpredictable impacts. While software testing is undeniably essential, it doesn't capture every nuance. This is where RunSafe comes in – by residing on the customer's device, it proactively mitigates the majority of memory safety-related bugs, protecting against potential exploitation. The significance of this cannot be overstated. With RunSafe protections, developers are empowered to redirect their focus from constantly patching the latest bugs to enhancing software with value-added features. The result is a more streamlined and efficient software development experience that leverages the full potential of both the LYNX MOSA.ic framework and RunSafe solutions. Working with real-time operating systems provides extensive opportunities for innovation and risk. But with Lynx and RunSafe, innovation takes precedence over bug resolution, letting developers and product managers focus on creation rather than resolution. Lynx and RunSafe invite you to join them on this transformative journey to refocus software development on innovation. These cutting-edge solutions redefine the possibilities of software development. Embrace the power of synergy, efficiency, and risk mitigation – unlock a smoother and more productive software development experience with LYNX MOSA.ic and RunSafe at the forefront.

RunSafe Security Minute #2