Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    What's Hot

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Home»Cyber Security»Startup Spotlight: Binarly Hardens Firmware Security
    Cyber Security

    Startup Spotlight: Binarly Hardens Firmware Security

    justmattgBy justmattgJuly 18, 2023No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    [ad_1]

    The discovery of moderate to severe vulnerabilities in the baseboard management controllers (BMCs) used by 15 different vendors highlighted the danger of firmware flaws in December 2022. Because firmware lives closer to the hardware level, where more most security scanners cannot reach, it’s difficult to find and address vulnerabilities. And because firmware components are so foundational and widely deployed, breaching one can give an attacker access to entire networks.

    Bootkits and rootkits like BlackLotus, CosmicStrand, and MoonBounce have expanded the attack surface to the firmware level, despite firmware security measures in operating systems like Windows 11.

    So the stakes and the challenges are high. “That’s precisely why Binarly was created,” says Alex Matrosov, founder and CEO of Binarly, a finalist in the Black Hat USA Startup Spotlight Competition this year. In short, Binarly created a binary analysis tool that finds known and unknown vulnerabilities in firmware. The technology also can assess the accuracy and thoroughness of software bills of materials (SBOMs) to identify linked dependencies.

    Matrosov says, “We are building the Binarly Transparency Platform to address supply chain security at scale and help pinpoint signs of tampering and firmware implantation.”

    How Binarly Gets Into the Firmware

    “At Binarly, we believe in automation because people don’t scale well, and we are pioneering a new approach focused on modern AI/ML to find and mitigate attack surfaces below the operating system,” Matrosov says.

    Deep Vulnerability Analysis with reach explainability, highlighting vulnerable code snippets
    Deep Vulnerability Analysis with vulnerable code snippets. (Source: Binarly)

    Like antivirus software has, firmware scanning is moving away from detecting known problems based on signatures and toward analyzing code to find previously unknown issues. Binarly implements machine learning that studies known vulnerability classes, finds portions of similar code, classifies the vulnerabilities thus discovered, and predicts and proves how exploitable those new vulnerabilities are. The figure shows Deep Vulnerability Analysis with reach explainability, which highlights vulnerable code snippets.

    The company says this process can keep products from getting released with vulnerabilities, thus reducing the incident response impact on both Binarly clients and their downstream customers. Binarly also hosts FwHunt, which allows developers to upload their firmware to scan it with the company’s tools.

    “We have ambitious plans to further enhance the platform’s capability to identify various classes of issues and expedite the process of identifying and resolving identified vulnerabilities,” Matrosov says. He adds that his company used its platform to identify and disclose more than 320 high-impact vulnerabilities last year.

    “In the past quarter, we’ve been focusing on productizing some research we have been doing to enable us to go beyond just finding issues and moving to help security professionals and developers understand how those issues work and how to fix them,” Matrosov says.

    Firm Grip on the Future

    The four finalists in the Black Hat Startup Spotlight — Binarly, Mobb, Endor Labs, and Gomboc — will present their business models to a panel of judges at the Mandalay Bay in Las Vegas on Wednesday, Aug. 9. Dark Reading’s editor-in-chief, Kelly Jackson Higgins, will host the event, which begins at 4:30 p.m. PT.

    Binarly also promises swag and demos of the vulnerabilities the company has uncovered. In addition, Matrosov will sign copies of his book, Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats, written with Intel senior security researcher Eugene Rodionov and DARPA Information Innovation Office program manager Sergey Bratus.

    The company name is not an adverb, as the -ly ending might suggest. Instead, it springs from Matrosov’s love of surfing. Binarly combines “binary analysis” and the surfing term “gnarly,” which refers to large, difficult, and dangerous waves — so the company addresses “bi-gnarly” problems.

    Speed Round

    Website: https://binarly.io/
    Founded: April 13, 2021
    Funding stage: Seed
    Total funding raised so far: $3.6M
    Number of employees: 16
    If the company were a band, what would its band name be, and what kind of band would it be: Bad Devices (Punk Rock)
    Pineapple on pizza, yea or nay?: “Pineapple on pizza is actually great if you do it right, so yea.”

    [ad_2]

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHackers Exploit WebAPK to Deceive Android Users into Installing Malicious Apps
    Next Article FIN8 Group Using Modified Sardonic Backdoor for BlackCat Ransomware Attacks
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Demo
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    [mc4wp_form id=3515]
    Demo
    Top Posts

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Latest Reviews
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    justmattgApril 16, 2024

    [ad_1] Apr 16, 2024NewsroomSupply Chain / Software Security Security researchers have uncovered a “credible” takeover…

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Demo
    MOST POPULAR

    Name That Toon: Last Line of Defense

    April 16, 2024

    California mountain lion P-22 left mark on wildlife conservation

    January 1, 2023

    Congress Again Writes To Home Minister Amit Shah Over Rahul Gandhi’s Security

    January 1, 2023
    OUR PICKS

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑