SlideShare a Scribd company logo
1© 2018 Mellanox Technologies
SmartNICs ..are awesome!
2© 2018 Mellanox Technologies
Agenda
 Data center trends
 Enter the SmartNIC
 The SmartNIC data center
 Beyond the network
3© 2018 Mellanox Technologies
The Compute Problem
 Everything is getting closer to the data
 “Smart edge, dumb pipe”
 Infrastructure and appliances both are
virtualized onto servers
 Higher network speeds + more
network infrastructure on host ==
severely decreased software efficiency
You don’t want to hear more about this, right?
4© 2018 Mellanox Technologies
The Attack Surface Problem
 Services consolidate on the same host
 User applications, infrastructure, data plane
services all sharing the same resources
 Lots of software running with escalated
privileges
 Traditional trust domains are now squashed
together
Host-based security is…oh boy…
5© 2018 Mellanox Technologies
1988
Ping Pong
Virus
Stateful
Firewall
1990
1994
Application
Layer Firewalls
Microsoft
Windows 98
1999
Software
Security
Goes
Mainstream
2000
The Year
of the
Worm
2012
Sandboxing
2013
Next
Generation
Endpoint
Packet Filters
Microsoft
Windows 95
1995
1998
Network
Intrusion
Detection
Stuxnet
2010
2017
WannaCry
Petya
2018
Meltdown
Spectre
2014
SSLv3 Protocol
Vulnerability and
POODLE attack
TLS 1.3
DNS Cache
Poisoning
GNU Bash
Remote Code
Execution
Vulnerability
OpenSSL
Heartbleed
Conficker
Worm
2015
Venom
2008
The Morris
Worm
2005
Advanced
Persistent
Threats (APT)
2006
SSL is
Invented
30 Years of Total Host Failures
"I think a lot of people think the nation states, they're running on this engine of
zero-days. You go out with your master skeleton key and unlock the door and
you're in. It's not that. Take these big, corporate networks, these large
networks, any large network -- I will tell you that persistence and focus will get
you in, will achieve that exploitation, without the zero-days.”
- Rob Joyce, TAO @ NSA
6© 2018 Mellanox Technologies
(With strict power consumption restrictions)
A SmartNIC is a computer
7© 2018 Mellanox Technologies
The “must-haves”
SmartNIC at its core
 High speed networking performance
 Robust and useful accelerators and offloads
 Supports networking virtualization and scaling
 Security and trust bonuses
 Software flexibility
 Management infrastructure
8© 2018 Mellanox Technologies
SmartNIC at a glance
9© 2018 Mellanox Technologies
SmartNIC Isolation
10© 2018 Mellanox Technologies
Embedded
compute physical
function – override
host PF + VF config
VFs share hardware resources
SRIOV == 0
hypervisor
involvement
Host bypass
Data
protection
between
guests
Near bare
metal
performance
“host” physical function allocates VFs
as it normally would
SmartNIC Isolation
11© 2018 Mellanox Technologies
Hardware offload
Data-plane Programming
12© 2018 Mellanox Technologies
PEP
PDP
Additional
PEPs
Policy Enforcement Point
Data-plane Programming
13© 2018 Mellanox Technologies
Data-plane Policy
1
2
3Miss in the
offloaded switch
Packet -> Software
Program flow into
switch
14© 2018 Mellanox Technologies
Policy Enforcement
15© 2018 Mellanox Technologies
Enforcing policy checklist…
Policy Management
 Authenticate the policy
 Program the flow tables
 Exchange information between SmartNICs
 Identify where applications are running
 Program packet engine software
 Create tunnels
 Track sessions/flows
16© 2018 Mellanox Technologies
Programming for Solutions
 Major options
 Embedded compute as control plane (isolated modification of hardware NFV)
 OVS based solutions
 DPDK etc
 Appliance-in-the-wire (nginx, for example)
 Linux kernel networking config
 Or….
 Anything at all??
 Linux applications that free up host CPU cycles or require greater isolation
17© 2018 Mellanox Technologies
Simple SmartNIC Firewall
ovs-vsctlshow
12ed5b74-1521-4ba9-8b0d-45f88fe25cc7
Bridge"br0"
Port"rep0-0"
Interface"rep0-0"
Port"enp3s0f0"
Interface"enp3s0f0"
Port"enp3s0f1"
Interface"enp3s0f1"
Port"rep1-0"
Interface"rep1-0"
Port"br0"
Interface"br0"
type:internal
ovs_version:"2.9.1"
18© 2018 Mellanox Technologies
Simple SmartNIC Firewall
ovs-ofctldel-flowsbr0
wire=`ovs-vsctlget Interfaceenp3s0f0ofport`
host=`ovs-vsctlget Interfacerep0-0ofport`
ovs-ofctladd-flowbr0table=0,priority=1,action=drop
ovs-ofctladd-flowbr0table=0,priority=10,arp,action=normal
ovs-ofctladd-flowbr0table=0,priority=100,ip,ct_state=-trk,action="ct(table=1)"
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$host,udp,tcp_dst=53,ct_state=+trk+new,
action="ct(commit),normal"
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$wire,ip,ct_state=+trk+est,action=normal
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$host,ip,ct_state=+trk+est,action=normal
ovs-ofctladd-flowbr0priority=40,table=1,action=drop
19© 2018 Mellanox Technologies
Simple SmartNIC Firewall
 Open SSH to host
 Allow outbound traffic
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$wire,tcp,tcp_dst=22,ct_state=+trk+new,
action="ct(commit),normal"
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$host,tcp,ct_state=+trk+new,
action="ct(commit),normal"
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$host,udp,ct_state=+trk+new,
action="ct(commit),normal"
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$host,icmp,ct_state=+trk+new,
action="ct(commit),normal"
20© 2018 Mellanox Technologies
Isolated and Embedded Functions
 Use OVS to switch between host VFs,
physical ports, and embedded
applications
 Full use of flow table criteria and
software for matching
 Application can be anything!
21© 2018 Mellanox Technologies
Isolated and Embedded Functions
iplink addveth1 typeveth peer name veth2
ovs-vsctladd-portbr0veth1
ovs-vsctlshow
12ed5b74-1521-4ba9-8b0d-45f88fe25cc7
Bridge"br0"
Port"rep0-0"
Interface"rep0-0"
Port"veth1"
Interface"veth1"
Port"enp3s0f0"
Interface"enp3s0f0"
Port"enp3s0f1"
Interface"enp3s0f1"
Port"rep1-0"
Interface"rep1-0"
Port"br0"
Interface"br0"
type:internal
ovs_version:"2.9.1"
22© 2018 Mellanox Technologies
A Second Look…
 Use OVS + kernel networking stack to
build transparent IPsec tunnels
 (Transparent to the host, that is)
 Steps:
 Create OVS bridge
 Create veth pair for the tunnel & add to OVS
 Enable IP forwarding
 Add gw IP to veth tail
 Add OF rule to forward packets into the
tunnel
 Add linux route to forward from kernel to
veth
 IKE!
 Manage the tunnel…
How can we improve this…
23© 2018 Mellanox Technologies
What if we had host information…
 SmartNIC is a PCIe device…it can access host memory
 …..all of it!
 Silence alarm bells for a moment
 SmartNIC has embedded compute to parse that memory…
 SmartNIC has accelerators to RDMA between two systems….
 Embedded compute and host are two systems!
 SmartNIC has processing accelerators on the embedded compute…
Let’s put it all together!
24© 2018 Mellanox Technologies
Host introspection via SmartNIC
Hardware-based
accelerators used to
speed lookup and data
analysis (Regular
Expression, hardware
address translation, SHA)
Leverages hardware DMA
engines for secure
memory acquisition. No
dependence on runtime
software at host
Rapid interval based reads to
selective memory regions to
determine activity in real-time
Reconstruct data structures to
analyze process lists, vtable
modifications, and other
information
Analysis running in an isolated
trust domain
Network traffic
inspection
25© 2018 Mellanox Technologies
Demo!
26© 2018 Mellanox Technologies
Thank You

More Related Content

PPT
PROVINCES OF REGION 3 - ANNE
PPT
C A R Presentation Wagan Bellosillo S A L O Y
PPTX
Rehiyon 9 Quiz
PDF
Enabling Applications to Exploit SmartNICs and FPGAs
PDF
OCP U.S. Summit 2017 Presentation
PDF
Platforms for Accelerating the Software Defined and Virtual Infrastructure
PPTX
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...
PDF
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
PROVINCES OF REGION 3 - ANNE
C A R Presentation Wagan Bellosillo S A L O Y
Rehiyon 9 Quiz
Enabling Applications to Exploit SmartNICs and FPGAs
OCP U.S. Summit 2017 Presentation
Platforms for Accelerating the Software Defined and Virtual Infrastructure
Erez Cohen & Aviram Bar Haim, Mellanox - Enhancing Your OpenStack Cloud With ...
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more

Similar to Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CON 2018 (20)

PPTX
Icccn 1.0
PPTX
Software-Defined Networking , Survey of HotSDN 2012
PDF
Windows Server 2012 Hyper-V Networking Evolved
PPTX
Nfv compute domain
PPTX
Hyper-V Networking
PDF
Netsoft19 Keynote: Fluid Network Planes
PDF
ODSA Use Case - SmartNIC
PPTX
10. Lec X- SDN.pptx
PPTX
bruce-sdn.pptx
PDF
Net1674 final emea
PDF
Open coud networking at full speed - Avi Alkobi
PDF
Host Data Plane Acceleration: SmartNIC Deployment Models
PDF
Interconnect your future
PDF
Building the SD-Branch using uCPE
PDF
Some Musings on OpenFlow and SDN for Enterprise Networks
PDF
Mellanox OpenPOWER features
PDF
Overview of HPC Interconnects
PDF
ODSA Proof of Concept SmartNIC Speeds & Feeds
PDF
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
PDF
OpenNebula - Mellanox Considerations for Smart Cloud
Icccn 1.0
Software-Defined Networking , Survey of HotSDN 2012
Windows Server 2012 Hyper-V Networking Evolved
Nfv compute domain
Hyper-V Networking
Netsoft19 Keynote: Fluid Network Planes
ODSA Use Case - SmartNIC
10. Lec X- SDN.pptx
bruce-sdn.pptx
Net1674 final emea
Open coud networking at full speed - Avi Alkobi
Host Data Plane Acceleration: SmartNIC Deployment Models
Interconnect your future
Building the SD-Branch using uCPE
Some Musings on OpenFlow and SDN for Enterprise Networks
Mellanox OpenPOWER features
Overview of HPC Interconnects
ODSA Proof of Concept SmartNIC Speeds & Feeds
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
OpenNebula - Mellanox Considerations for Smart Cloud
Ad

More from 44CON (20)

ODP
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
PPTX
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
PDF
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
PDF
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
PDF
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
PDF
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
PDF
Pwning the 44CON Nerf Tank
PDF
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
PDF
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
PDF
44CON London 2015 - Is there an EFI monster inside your apple?
PPTX
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
PPTX
44CON London 2015 - How to drive a malware analyst crazy
PDF
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
PDF
44CON London 2015 - Going AUTH the Rails on a Crazy Train
PDF
44CON London 2015 - Software Defined Networking (SDN) Security
PDF
44CON London 2015 - DDoS mitigation EPIC FAIL collection
PDF
44CON London 2015 - Hunting Asynchronous Vulnerabilities
PDF
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
PDF
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
PDF
44CON London 2015 - reverse reverse engineering
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Pwning the 44CON Nerf Tank
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - reverse reverse engineering
Ad

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation theory and applications.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Cloud computing and distributed systems.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation theory and applications.pdf
cuic standard and advanced reporting.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
Mobile App Security Testing_ A Comprehensive Guide.pdf
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Cloud computing and distributed systems.
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25 Week I
sap open course for s4hana steps from ECC to s4
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CON 2018

  • 1. 1© 2018 Mellanox Technologies SmartNICs ..are awesome!
  • 2. 2© 2018 Mellanox Technologies Agenda  Data center trends  Enter the SmartNIC  The SmartNIC data center  Beyond the network
  • 3. 3© 2018 Mellanox Technologies The Compute Problem  Everything is getting closer to the data  “Smart edge, dumb pipe”  Infrastructure and appliances both are virtualized onto servers  Higher network speeds + more network infrastructure on host == severely decreased software efficiency You don’t want to hear more about this, right?
  • 4. 4© 2018 Mellanox Technologies The Attack Surface Problem  Services consolidate on the same host  User applications, infrastructure, data plane services all sharing the same resources  Lots of software running with escalated privileges  Traditional trust domains are now squashed together Host-based security is…oh boy…
  • 5. 5© 2018 Mellanox Technologies 1988 Ping Pong Virus Stateful Firewall 1990 1994 Application Layer Firewalls Microsoft Windows 98 1999 Software Security Goes Mainstream 2000 The Year of the Worm 2012 Sandboxing 2013 Next Generation Endpoint Packet Filters Microsoft Windows 95 1995 1998 Network Intrusion Detection Stuxnet 2010 2017 WannaCry Petya 2018 Meltdown Spectre 2014 SSLv3 Protocol Vulnerability and POODLE attack TLS 1.3 DNS Cache Poisoning GNU Bash Remote Code Execution Vulnerability OpenSSL Heartbleed Conficker Worm 2015 Venom 2008 The Morris Worm 2005 Advanced Persistent Threats (APT) 2006 SSL is Invented 30 Years of Total Host Failures "I think a lot of people think the nation states, they're running on this engine of zero-days. You go out with your master skeleton key and unlock the door and you're in. It's not that. Take these big, corporate networks, these large networks, any large network -- I will tell you that persistence and focus will get you in, will achieve that exploitation, without the zero-days.” - Rob Joyce, TAO @ NSA
  • 6. 6© 2018 Mellanox Technologies (With strict power consumption restrictions) A SmartNIC is a computer
  • 7. 7© 2018 Mellanox Technologies The “must-haves” SmartNIC at its core  High speed networking performance  Robust and useful accelerators and offloads  Supports networking virtualization and scaling  Security and trust bonuses  Software flexibility  Management infrastructure
  • 8. 8© 2018 Mellanox Technologies SmartNIC at a glance
  • 9. 9© 2018 Mellanox Technologies SmartNIC Isolation
  • 10. 10© 2018 Mellanox Technologies Embedded compute physical function – override host PF + VF config VFs share hardware resources SRIOV == 0 hypervisor involvement Host bypass Data protection between guests Near bare metal performance “host” physical function allocates VFs as it normally would SmartNIC Isolation
  • 11. 11© 2018 Mellanox Technologies Hardware offload Data-plane Programming
  • 12. 12© 2018 Mellanox Technologies PEP PDP Additional PEPs Policy Enforcement Point Data-plane Programming
  • 13. 13© 2018 Mellanox Technologies Data-plane Policy 1 2 3Miss in the offloaded switch Packet -> Software Program flow into switch
  • 14. 14© 2018 Mellanox Technologies Policy Enforcement
  • 15. 15© 2018 Mellanox Technologies Enforcing policy checklist… Policy Management  Authenticate the policy  Program the flow tables  Exchange information between SmartNICs  Identify where applications are running  Program packet engine software  Create tunnels  Track sessions/flows
  • 16. 16© 2018 Mellanox Technologies Programming for Solutions  Major options  Embedded compute as control plane (isolated modification of hardware NFV)  OVS based solutions  DPDK etc  Appliance-in-the-wire (nginx, for example)  Linux kernel networking config  Or….  Anything at all??  Linux applications that free up host CPU cycles or require greater isolation
  • 17. 17© 2018 Mellanox Technologies Simple SmartNIC Firewall ovs-vsctlshow 12ed5b74-1521-4ba9-8b0d-45f88fe25cc7 Bridge"br0" Port"rep0-0" Interface"rep0-0" Port"enp3s0f0" Interface"enp3s0f0" Port"enp3s0f1" Interface"enp3s0f1" Port"rep1-0" Interface"rep1-0" Port"br0" Interface"br0" type:internal ovs_version:"2.9.1"
  • 18. 18© 2018 Mellanox Technologies Simple SmartNIC Firewall ovs-ofctldel-flowsbr0 wire=`ovs-vsctlget Interfaceenp3s0f0ofport` host=`ovs-vsctlget Interfacerep0-0ofport` ovs-ofctladd-flowbr0table=0,priority=1,action=drop ovs-ofctladd-flowbr0table=0,priority=10,arp,action=normal ovs-ofctladd-flowbr0table=0,priority=100,ip,ct_state=-trk,action="ct(table=1)" ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$host,udp,tcp_dst=53,ct_state=+trk+new, action="ct(commit),normal" ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$wire,ip,ct_state=+trk+est,action=normal ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$host,ip,ct_state=+trk+est,action=normal ovs-ofctladd-flowbr0priority=40,table=1,action=drop
  • 19. 19© 2018 Mellanox Technologies Simple SmartNIC Firewall  Open SSH to host  Allow outbound traffic ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$wire,tcp,tcp_dst=22,ct_state=+trk+new, action="ct(commit),normal" ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$host,tcp,ct_state=+trk+new, action="ct(commit),normal" ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$host,udp,ct_state=+trk+new, action="ct(commit),normal" ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$host,icmp,ct_state=+trk+new, action="ct(commit),normal"
  • 20. 20© 2018 Mellanox Technologies Isolated and Embedded Functions  Use OVS to switch between host VFs, physical ports, and embedded applications  Full use of flow table criteria and software for matching  Application can be anything!
  • 21. 21© 2018 Mellanox Technologies Isolated and Embedded Functions iplink addveth1 typeveth peer name veth2 ovs-vsctladd-portbr0veth1 ovs-vsctlshow 12ed5b74-1521-4ba9-8b0d-45f88fe25cc7 Bridge"br0" Port"rep0-0" Interface"rep0-0" Port"veth1" Interface"veth1" Port"enp3s0f0" Interface"enp3s0f0" Port"enp3s0f1" Interface"enp3s0f1" Port"rep1-0" Interface"rep1-0" Port"br0" Interface"br0" type:internal ovs_version:"2.9.1"
  • 22. 22© 2018 Mellanox Technologies A Second Look…  Use OVS + kernel networking stack to build transparent IPsec tunnels  (Transparent to the host, that is)  Steps:  Create OVS bridge  Create veth pair for the tunnel & add to OVS  Enable IP forwarding  Add gw IP to veth tail  Add OF rule to forward packets into the tunnel  Add linux route to forward from kernel to veth  IKE!  Manage the tunnel… How can we improve this…
  • 23. 23© 2018 Mellanox Technologies What if we had host information…  SmartNIC is a PCIe device…it can access host memory  …..all of it!  Silence alarm bells for a moment  SmartNIC has embedded compute to parse that memory…  SmartNIC has accelerators to RDMA between two systems….  Embedded compute and host are two systems!  SmartNIC has processing accelerators on the embedded compute… Let’s put it all together!
  • 24. 24© 2018 Mellanox Technologies Host introspection via SmartNIC Hardware-based accelerators used to speed lookup and data analysis (Regular Expression, hardware address translation, SHA) Leverages hardware DMA engines for secure memory acquisition. No dependence on runtime software at host Rapid interval based reads to selective memory regions to determine activity in real-time Reconstruct data structures to analyze process lists, vtable modifications, and other information Analysis running in an isolated trust domain Network traffic inspection
  • 25. 25© 2018 Mellanox Technologies Demo!
  • 26. 26© 2018 Mellanox Technologies Thank You