SlideShare una empresa de Scribd logo
1 de 22
APPLICATION VIRTUALIZATION Nagareshwar  Talekar Founder SecurityXploded.com 1
What is Virtualization? “Virtualization is abstraction of computing resources”      Single resource is virtualized into multiple resources  ,[object Object],     Multiple resources are virtualized into single resource ,[object Object],2
Different Types of Virtualization      Server Virtualization      Storage Virtualization Data Virtualization      Desktop Virtualization Application Virtualization 3
Application Virtualization Application is executed inside the isolation environment completely encapsulating it from the underlying O/S. 4
Application Virtualization Steps in App Virtualization Packaging the Application 	Application is installed within custom packager which records all files, registry and settings related to app. Delivering App to the Target System The packaged application is delivered to target system through USB,   web or custom Push mechanism.  Executing App in Virtual Environment Finally application is executed within the Virtual environment,  completely isolated from other applications and  underlying operating system. 5
Application Virtualization cont… Implementation of App Virtualization Technology       File I/O Redirection       Registry Redirection       COM Isolation       .NET Isolation       Service Isolation        Driver Isolation            6
Application Virtualization cont… File I/O Redirection  Redirecting and controlling  file I/O requests from the virtual  application sandbox. Example:  Input:    C:rogram Filesbr />Redirected Input:   C:lt;app_sandbox_path>rogram Files 7
Application Virtualization cont… File I/O Redirection Implementation API Hooking at USER Level ,[object Object]
  Hooking Ntdll.dll – NtCreateFile,  NtOpenFile,  NtDeleteFile etcAPI Hooking at Kernel Level ,[object Object],File System Filter Driver or Mini-Filter ,[object Object],8
Application Virtualization cont… Registry Redirection Redirecting and controlling registry read/write requests from virtual application. Example: Input: HKCUoftwareicrosoft Redirected Input: HKCUoftwarelt;MyApp_Sandbox>KCUoftwareicrosoft 9
Application Virtualization cont… Registry Redirection Implementation      API Hooking at USER Level ,[object Object]
  Hooking Ntdll.dll – NtCreateKey,  NtDeleteKey etcAPI Hooking at Kernel Level ,[object Object],10
Application Virtualization cont… Service/Driver Isolation Isolation of Service/Driver which is required for the smooth functioning of application       For example, Adobe reader depends on FlexNet Licensing service without which it will not start       Start a special service which will take care of managing the other virtual services      Driver Isolation is very difficult as they are tightly coupled with operating system 11
Advantages of Application Virtualization No more Application Installation Faster Application Deployment       Easier & Efficient Management of Applications       Significant Cost Reduction       Enhanced Security 12
Application Virtualization  & Security       Improved Security for the Operating System and other applications.       Application Isolation allows insecure, incompatible apps to run safely.       Safe Browsing,  No need to worry about Zero-Day Exploits        Provides Ideal Environment Virus/Malware Testing 13
Players in App Virtualization       VMware:  ThinApp       Microsoft:  App-V       Citrix:  Application Streaming       Symantec:  Altiris SVS       Spoon: Web based Streaming       Sandboxie by Ronen Tzur 14
Example :   VMWare - ThinApp ,[object Object],15
Example :   VMWare - ThinApp 16     Application is packaged using ThinApp Packager and single EXE/MSI is created     This EXE/MSI can be deployed to any system and executed directly     On Execution, it extracts packaged app and runs it within the isolated sandbox.     Does not require any AGENT to be installed on the client system
DEMO:   VMWare - ThinApp 17
Example:  SPOON     Applications are packaged using Spoon Studio and kept on the Spoon Servers.     User have to install Spoon Plugin on their system.     Next user can browse through Apps on Spoon.net and  run the App  directly within XVM.     User can package their  favorite app using Spoon Studio and upload to Spoon Servers 18
DEMO: SPOON 19
References VMWare – ThinApp  Application Virtualization Spoon – Adaptive Streaming Microsoft – ‘App-V ‘  Sandboxie – App Virtualization VMWare ThinApp Video Demonstration  Spoon.Net Video Demonstration 20

Más contenido relacionado

La actualidad más candente

VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation EN
Daron Walker
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
Adeel Javaid
 
Azure architecture
Azure architectureAzure architecture
Azure architecture
Amal Dev
 

La actualidad más candente (20)

Virtualization
VirtualizationVirtualization
Virtualization
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
VMware Overview
VMware OverviewVMware Overview
VMware Overview
 
Paravirtualization
ParavirtualizationParavirtualization
Paravirtualization
 
Understanding Azure Disaster Recovery
Understanding Azure Disaster RecoveryUnderstanding Azure Disaster Recovery
Understanding Azure Disaster Recovery
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation EN
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Containerization
ContainerizationContainerization
Containerization
 
Azure App Service Architecture. Web Apps.
Azure App Service Architecture. Web Apps.Azure App Service Architecture. Web Apps.
Azure App Service Architecture. Web Apps.
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Azure architecture
Azure architectureAzure architecture
Azure architecture
 

Destacado

Destacado (16)

Advanced Malware Analysis Training Session 5 - Reversing Automation
Advanced Malware Analysis Training Session 5 - Reversing AutomationAdvanced Malware Analysis Training Session 5 - Reversing Automation
Advanced Malware Analysis Training Session 5 - Reversing Automation
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password security
 
Antivirus Evasion Techniques and Countermeasures
Antivirus  Evasion Techniques and CountermeasuresAntivirus  Evasion Techniques and Countermeasures
Antivirus Evasion Techniques and Countermeasures
 
Advanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to AndroidAdvanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to Android
 
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
Advanced Malware Analysis Training Session 1 - Detection and Removal of MalwaresAdvanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
 
Advanced Malware Analysis Training Session 6 - Malware Sandbox Analysis
Advanced Malware Analysis Training Session 6  - Malware Sandbox AnalysisAdvanced Malware Analysis Training Session 6  - Malware Sandbox Analysis
Advanced Malware Analysis Training Session 6 - Malware Sandbox Analysis
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
 
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
 
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
Advanced Malware Analysis Training Session 7  - Malware Memory ForensicsAdvanced Malware Analysis Training Session 7  - Malware Memory Forensics
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
 
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
 
Reversing & malware analysis training part 2 introduction to windows internals
Reversing & malware analysis training part 2   introduction to windows internalsReversing & malware analysis training part 2   introduction to windows internals
Reversing & malware analysis training part 2 introduction to windows internals
 
Reversing & malware analysis training part 3 windows pe file format basics
Reversing & malware analysis training part 3   windows pe file format basicsReversing & malware analysis training part 3   windows pe file format basics
Reversing & malware analysis training part 3 windows pe file format basics
 
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
Advanced Malware Analysis Training Session 4 - Anti-Analysis TechniquesAdvanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
 
Reversing & malware analysis training part 1 lab setup guide
Reversing & malware analysis training part 1   lab setup guideReversing & malware analysis training part 1   lab setup guide
Reversing & malware analysis training part 1 lab setup guide
 
Reversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future RoadmapReversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future Roadmap
 

Similar a Application Virtualization

Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
Colloquium
 

Similar a Application Virtualization (20)

Sequence Like a Boss - BriForum 2015 Denver
Sequence Like a Boss - BriForum 2015 DenverSequence Like a Boss - BriForum 2015 Denver
Sequence Like a Boss - BriForum 2015 Denver
 
Cloud Foundry a Developer's Perspective
Cloud Foundry a Developer's PerspectiveCloud Foundry a Developer's Perspective
Cloud Foundry a Developer's Perspective
 
Framework Agnostic Discovery
Framework Agnostic DiscoveryFramework Agnostic Discovery
Framework Agnostic Discovery
 
Application virtualization
Application virtualizationApplication virtualization
Application virtualization
 
important DotNet Questions For Practicals And Interviews
important DotNet Questions For Practicals And Interviewsimportant DotNet Questions For Practicals And Interviews
important DotNet Questions For Practicals And Interviews
 
Presentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing TechnologiesPresentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing Technologies
 
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
 
What is Application & Server Virtualisation
What is Application & Server VirtualisationWhat is Application & Server Virtualisation
What is Application & Server Virtualisation
 
Advanced malware analysis training session8 introduction to android
Advanced malware analysis training session8 introduction to androidAdvanced malware analysis training session8 introduction to android
Advanced malware analysis training session8 introduction to android
 
Virtualization for Windows - Seminar.pptx
Virtualization for Windows - Seminar.pptxVirtualization for Windows - Seminar.pptx
Virtualization for Windows - Seminar.pptx
 
Pivotal Cloud Foundry and its usage in ecosystem
Pivotal Cloud Foundry and its usage in ecosystemPivotal Cloud Foundry and its usage in ecosystem
Pivotal Cloud Foundry and its usage in ecosystem
 
OpenShift Taiwan Vol.1 Technology Overview
OpenShift Taiwan Vol.1 Technology OverviewOpenShift Taiwan Vol.1 Technology Overview
OpenShift Taiwan Vol.1 Technology Overview
 
Microsoft Virtualization View
Microsoft Virtualization View Microsoft Virtualization View
Microsoft Virtualization View
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
Scale your PHP application with Elastic Beanstalk - CloudParty Genova
Scale your PHP application with Elastic Beanstalk - CloudParty GenovaScale your PHP application with Elastic Beanstalk - CloudParty Genova
Scale your PHP application with Elastic Beanstalk - CloudParty Genova
 
Apache cordova
Apache cordovaApache cordova
Apache cordova
 
What's new in p2 (2009)?
What's new in p2 (2009)?What's new in p2 (2009)?
What's new in p2 (2009)?
 
OpenStack Murano introduction
OpenStack Murano introductionOpenStack Murano introduction
OpenStack Murano introduction
 
N-Tier Application with Windows Forms - Deployment and Security
N-Tier Application with Windows Forms - Deployment and SecurityN-Tier Application with Windows Forms - Deployment and Security
N-Tier Application with Windows Forms - Deployment and Security
 
5 pcf
5 pcf5 pcf
5 pcf
 

Más de securityxploded

Más de securityxploded (20)

Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutions
 
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive TacticsHollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
 
Buffer Overflow Attacks
Buffer Overflow AttacksBuffer Overflow Attacks
Buffer Overflow Attacks
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learning
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
Linux Malware Analysis using Limon Sandbox
Linux Malware Analysis using Limon SandboxLinux Malware Analysis using Limon Sandbox
Linux Malware Analysis using Limon Sandbox
 
Introduction to SMPC
Introduction to SMPCIntroduction to SMPC
Introduction to SMPC
 
Breaking into hospitals
Breaking into hospitalsBreaking into hospitals
Breaking into hospitals
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Basic malware analysis
Basic malware analysisBasic malware analysis
Basic malware analysis
 
Automating Malware Analysis
Automating Malware AnalysisAutomating Malware Analysis
Automating Malware Analysis
 
Reverse Engineering Malware
Reverse Engineering MalwareReverse Engineering Malware
Reverse Engineering Malware
 
DLL Preloading Attack
DLL Preloading AttackDLL Preloading Attack
DLL Preloading Attack
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
Hunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of MemoryHunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of Memory
 
Return Address – The Silver Bullet
Return Address – The Silver BulletReturn Address – The Silver Bullet
Return Address – The Silver Bullet
 
Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)
 
Hunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory ForensicsHunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory Forensics
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learning
 
Anatomy of Exploit Kits
Anatomy of Exploit KitsAnatomy of Exploit Kits
Anatomy of Exploit Kits
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Application Virtualization

  • 1. APPLICATION VIRTUALIZATION Nagareshwar Talekar Founder SecurityXploded.com 1
  • 2.
  • 3. Different Types of Virtualization Server Virtualization Storage Virtualization Data Virtualization Desktop Virtualization Application Virtualization 3
  • 4. Application Virtualization Application is executed inside the isolation environment completely encapsulating it from the underlying O/S. 4
  • 5. Application Virtualization Steps in App Virtualization Packaging the Application Application is installed within custom packager which records all files, registry and settings related to app. Delivering App to the Target System The packaged application is delivered to target system through USB, web or custom Push mechanism. Executing App in Virtual Environment Finally application is executed within the Virtual environment, completely isolated from other applications and underlying operating system. 5
  • 6. Application Virtualization cont… Implementation of App Virtualization Technology File I/O Redirection Registry Redirection COM Isolation .NET Isolation Service Isolation Driver Isolation 6
  • 7. Application Virtualization cont… File I/O Redirection Redirecting and controlling file I/O requests from the virtual application sandbox. Example: Input: C:rogram Filesbr />Redirected Input: C:lt;app_sandbox_path>rogram Files 7
  • 8.
  • 9.
  • 10. Application Virtualization cont… Registry Redirection Redirecting and controlling registry read/write requests from virtual application. Example: Input: HKCUoftwareicrosoft Redirected Input: HKCUoftwarelt;MyApp_Sandbox>KCUoftwareicrosoft 9
  • 11.
  • 12.
  • 13. Application Virtualization cont… Service/Driver Isolation Isolation of Service/Driver which is required for the smooth functioning of application For example, Adobe reader depends on FlexNet Licensing service without which it will not start Start a special service which will take care of managing the other virtual services Driver Isolation is very difficult as they are tightly coupled with operating system 11
  • 14. Advantages of Application Virtualization No more Application Installation Faster Application Deployment Easier & Efficient Management of Applications Significant Cost Reduction Enhanced Security 12
  • 15. Application Virtualization & Security Improved Security for the Operating System and other applications. Application Isolation allows insecure, incompatible apps to run safely. Safe Browsing, No need to worry about Zero-Day Exploits Provides Ideal Environment Virus/Malware Testing 13
  • 16. Players in App Virtualization VMware: ThinApp Microsoft: App-V Citrix: Application Streaming Symantec: Altiris SVS Spoon: Web based Streaming Sandboxie by Ronen Tzur 14
  • 17.
  • 18. Example : VMWare - ThinApp 16 Application is packaged using ThinApp Packager and single EXE/MSI is created This EXE/MSI can be deployed to any system and executed directly On Execution, it extracts packaged app and runs it within the isolated sandbox. Does not require any AGENT to be installed on the client system
  • 19. DEMO: VMWare - ThinApp 17
  • 20. Example: SPOON Applications are packaged using Spoon Studio and kept on the Spoon Servers. User have to install Spoon Plugin on their system. Next user can browse through Apps on Spoon.net and run the App directly within XVM. User can package their favorite app using Spoon Studio and upload to Spoon Servers 18
  • 22. References VMWare – ThinApp Application Virtualization Spoon – Adaptive Streaming Microsoft – ‘App-V ‘ Sandboxie – App Virtualization VMWare ThinApp Video Demonstration Spoon.Net Video Demonstration 20
  • 24. Thank You 22 tnagareshwar@gmail.com

Notas del editor

  1. * API Hooking - CreateFile, OpenFile, ReadFile, WriteFile - NtCreateFile, NtOpenFile etc * File System Driver - handles all file requests, each such request contains the path which will be redirected to VN location
  2. User land - less risky, easy, all process needs to be hooked, dll injection may not be supported in later versions, no privilege requiredKernel land – one place hook, load on system for processing every redirection, risky – blue screens * filter driver/mini filter: one place for all and any FILE api functions. Risky – blue screens, load on kernel*
  3. - hooking registry calls, regopenkey, regcreatekeyex function - ntregopenkey, ntregqueryvalue
  4. - at user level no additional privileges required , it can take on and take off on the fly - hooking registry calls, regopenkey, regcreatekeyex function - ntregopenkey, ntregqueryvalue
  5. - How it works - app is packaged and exe is created - this exe when launched it extracts automatically and runs around - Howz the isolation is done - Demo ???
  6. - How it works - app is packaged and exe is created - this exe when launched it extracts automatically and runs around - Howz the isolation is done - Demo ???
  7. - How it works - app is packaged and exe is created - this exe when launched it extracts automatically and runs around - Howz the isolation is done - Demo ???
  8. - Web based app Vn - Install its vm called (XVM) - Click on any app, which will be downloaded to local system - it spawns XVM which runs the app within the sandbox
  9. http://en.wikipedia.org/wiki/Application_virtualizationhttp://www.vmware.com/products/thinapp/http://spoon.net/http://www.microsoft.com/systemcenter/appv/default.mspxhttp://www.sandboxie.com/