Microsoft reaches out at China hacker conference

Microsoft and Chinese researchers shared security tactics

Microsoft shared the stage with Chinese security researchers at a Beijing hacker conference on Wednesday, aiming to build ties in a country that produces a growing number of threats to Microsoft products.

John Lambert, a team head at the Microsoft Security Engineering Center, spoke to an audience of a few hundred people about security features in Microsoft products and tools used by the company to find vulnerabilities in its software.

Microsoft has worked to build contacts with security researchers worldwide, but the language barrier and low attendance by Chinese experts at overseas conferences make the country's security circles harder to access, Lambert said.

Important security research increasingly comes out of China, but is often presented in Chinese, he said.

Microsoft was a sponsor of the Beijing forum, called XCon, and Lambert said the company would consider attending other security conferences in China where skilled researchers gather.

Microsoft also wants to educate more Chinese software developers on security issues to shield Windows and Internet Explorer users from vulnerabilities in third-party programs, said Lambert.

China produces a growing amount of malware, which usually targets domestic users but is sometimes aimed abroad as well. Two zero-days, or previously unknown vulnerabilities, that were found this year in Internet Explorer appeared to come out of China, said Lambert.

Other speakers at the forum shared tactics that could be used to find or exploit vulnerabilities in software, but researchers in the audience said Microsoft measures had made attacking its programs with exploits more difficult.

"There may still be vulnerabilities, but it's harder to exploit them," said one researcher. He cited one obstacle as address space layout randomization, a function included in Windows Vista that rearranges the positions of key system code when a PC restarts.

But attackers searching for vulnerabilities in Microsoft products are as active as ever, he said.

One Chinese researcher at the forum demonstrated a tool for fuzz testing of software, a technique used by software vendors and attackers that involves feeding a program invalid data inputs to see what causes a crash. The tool recorded program activity during a crash to help a tester pinpoint its cause. One speaker duo discussed ways to trace the code changes between original and updated versions of a program and another speaker presented tactics used in cross-site scripting, a vulnerability that allows malicious code to be injected to Web sites.

Forum organizers at first said reporting on the event was banned because it dealt with sensitive topics.

Join the CSO newsletter!

Error: Please check your email address.

Tags MicrosoftsecurityChinahacking

More about Microsoft

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Owen Fletcher

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts