Lecture 12: Software protection techniques. Software piracy protection Protection against reverse engineering of software
|
|
|
- Warren Quinn
- 10 years ago
- Views:
Transcription
1 Lecture topics Software piracy protection Protection against reverse engineering of software Software piracy Report by Business Software Alliance for 2001: Global economic impact of software piracy was $11bln About 40% of commercial software in use is pirated Study included 85 countries Top offenders (percent of pirated software): Vietnam 94% China 92% Indonesia 88% Ukraine 87% Russia 87% Based on tracking 26 popular business applications
2 What can software companies do to prevent software piracy Ultimately, not a whole lot, for mainstream software A determined attacker can deal with (reverse engineer) binary code Bypass protection mechanisms Protection mechanisms that can be used: License keys License files CDs, floppies Special-purpose dongles Code encryption Application server model License keys Typical use: Encrypt a unique string to obtain a key Require a user to enter the key (e.g. during installation) When a key is entered, decrypt and compare to the original string Key minting if the encryption key is stored somewhere in the code Use of digital signatures can help somewhat Reverse engineering --- an attacker finds the code that checks for the key and removes it
3 License files Use similar to license keys, but license files contain more information Usually something specific to the user Can be used for giving temporary licenses The file will store expiration dates Can be used for enabling only certain features in the software The file will identify these features The software may check with the license file every time a particular functionality is requested Digitally signed license files are typical The public key is embedded in software code Changing the system clock to extend temporary licenses Reinstalling the system when the license expires Reverse engineering License servers Used in networking environments to service multiple installations of the software E.g., a floating license may limit the number of concurrent users to 10; when a user starts the software, it obtains a run token from the server; when the user exits the software, the token is returned FlexLM is a popular commercial license server Usability (organization as a whole) Reverse engineering
4 Challenge-based license schemes The software issues challenges to the user The user has to respond correctly E.g. with information available in the documentation Usability Users can share challenge secrets Reverse engineering CDs and floppies Part of code of the system can be placed on a removable disk Can only run if the disk is present Popular for games What about CD-burning? Macrovision SafeDisk: store a key on a CD in a way that a typical CD writer won t duplicate this key Again, reverse engineering
5 Special-purpose dongles A dongle is a hardware device that connects to a computer port and carries some information Can be used to store code or keys used by the software Expensive User-unfriendly Reverse engineering Code encryption Software code is stored on the disk encrypted Decrypted right before the code has to run Encrypted again after the code finishes running Computationally expensive The problem of key distribution and storage At some point, code is in unencrypted form; an attacker can intercept it at this point Possible solutions: Execute-only memory (XOM): contains code that is executed but cannot be viewed Dedicated cryptographic hardware Trusted Computing Platform Alliance The goal is definition of specifications for a hardware-assisted, OS based, trusted subsystem that will become an integral part of personal computing platforms Relies on public key cryptography and infrastructure Secure storage, trusted paths within the system, security co-processor Far from clear that this will succeed
6 Application server model Do not give software code to end users; run this code from a trusted server Performance Scalability Cost Software aging A radical approach Relies on periodic updates of the software Each update is done in a way that makes older versions little usable E.g. using incompatible file formats A software pirate will be forced to provide his/her customers with frequent updates Easier to catch Cryptographic techniques can be used to ensure that older versions cannot use data from newer versions Inconvenience of frequent updates Can be automated to a large degree Sharing of data becomes dependent on everyone having an up-to-date version Is not applicable to all domains May work well with Microsoft Word, but not single-user games
7 So, protecting against piracy is difficult, because of reverse engineering Reverse engineering is the process of understanding the purpose and function of a software program from its code Illegal reverse engineering is harmful Intellectual property theft Illegal alteration of software functionality Theft of security sensitive information embedded in the program code Modern high-level languages make reverse engineering easy Scripting languages often do not have compiled form Java bytecodes are high-level A number of automated reverse engineering tools are widely available For Java: Mocha, Jad, Soot Tamper-proofing Techniques for software tamper-proofing generally check if (a part of) the software has been modified and if yes, don t run it The basic techniques include computing checksums and checking timestamps Problem: reverse-engineering attacks! Guards (Chang and Atallah) Each guard is code that performs a small check A large number of guards is created for a program The guards are inter-related Cover overlapping portions of code Cover other guards If some guards are removed, other guards will likely detect that A tool based on this technique is marketed by Arxan
8 Tamper-proofing (cont.) Checking intermediate program results E.g., it is known that variable j has to be positive at a specific point in the program Insert a check that fails the program if the value of j is negative or zero Related to the technique of assertions in software quality The reason for an unexpected value can be bug, not tampering The program is not able to fail gracefully Performance hit if the number of checks is large Difficult to automate There is no guarantee that, after tampering, the program will always produce an invalid intermediate result Also, tampering may be detected when it s too late Software obfuscation A necessary component of reverse engineering is understanding how the code works By making code difficult to understand, reverse engineering may be made uneconomical Obfuscation techniques obscure program code Program functionality has to remain unchanged Obfuscations should: Make code more difficult to understand by manual inspection Be impossible or hard to reverse using automated tools Be stealthy --- look similar to surrounding code Have low overheads --- not to slow down the program overmuch or take much more memory to run Obfuscations are also important for protecting other software protection mechanisms
9 Existing obfuscation techniques Layout obfuscating transformations Comments are removed Line delimiters are removed Identifiers are scrambled Data obfuscating transformations Splitting and merging variables and arrays Re-ordering elements in arrays Converting static data into functions Control obfuscating transformations Inlining methods Outlining statements Unrolling loops Reordering expressions and statements Inserting irrelevant code All existing techniques are low-level, ignore design issues Idea In object-oriented programming, design is represented largely by decomposition into classes Scramble this decomposition! Design obfuscations --- Sosonkin, Naumovich, Memon Class1 Class2 Class123 Class41 Class3 Class4 Class51 Class5 Class6
10 OO design obfuscations Class coalescing Several classes in the original program are replaced with one class Class splitting A single class in the original program is replaced with a number of new classes Interfacification A number of new light-weight types created to obscure places where a specific class is used Class coalescing Car -int id +int getid() PersonalCar + PersonalCar() +Person getowner() Truck -double capacity + Truck(double capacity) +double getcapacity() Bus -int capacity + Bus(int capacity) +int getcapacity() Truck truck = new Truck(3.5); truck.getcapacity() ObfuscatedCar car = new ObfuscatedCar(3.5, 14); car.getcapacity1() ObfuscatedCar -int id -double capacity1 -int capacity2 + ObfuscatedCar(double cap1, int cap2) +Person getowner() +double getcapacity1() +int getcapacity2()
11 Class splitting Truck -double capacity -int numbercylinders + Truck(double capacity) +double getcapacity() +int getnumbercylinders() +double getmaxweight() Truck truck = new Truck(3.5); truck.getcapacity() C1 -double capacity + C1(double capacity) +double getcapacity() C1 car = new C2(3.5); car.getcapacity1() C2 -int numbercylinders + C2(double capacity) +int getnumbercylinders() +double getmaxweight() Interfacification interface I1 interface I2 interface I3 +double getcapacity() +int getnumbercylinders() +double getmaxweight() Truck -double capacity -int numbercylinders + Truck(double capacity) +double getcapacity() +int getnumbercylinders() +double getmaxweight() Truck -double capacity -int numbercylinders + Truck(double capacity) +double getcapacity() +int getnumbercylinders() +double getmaxweight() Truck truck = new Truck(3.5); truck.getcapacity() I3 car = new Truck(3.5); ((I1)car).getCapacity1()
12 Experimental data: class coalescing Experimental data: class splitting
13 Experimental data: interfacification Software watermarking When everything else fails Watermarking is commonly used for proving authenticity of physical objects Also used in digital media and hardware to prove ownership Can be applied to software code It should be possible to show in the court of law who is the rightful owner of the software Software watermarks should be stealthy, encode enough data, and not increase resource requirements too much Should be resilient to different types of attacks: Removal Distortion Second watermark Fingerprinting is a related mechanism Like watermarking, but different data for different versions of the software
14 Types of software watermarks Static Stored in the program executable, object, or source code Static data watermarks E.g., store a copyright string as a static class field Static code watermarks Use redundancy --- when it s possible to do something in many different ways, do it in one specific way E.g. if two adjacent statements are independent, they can appear in arbitrary order; always put them in lexicographic order Dynamic Stored in the execution state of the program Easter Egg watermarks --- use some very unusual input to produce identification of ownership Data structure watermarks --- embed a message in the dynamic state of the program (e.g. using object references) Execution trace watermarks --- usually embedded as a statistical property E.g. some constraint on the use of registers, when the program executes on some unusual input Watermarking instruction group frequency Static code watermark Applied to assembly and machine code Select some commonly occurring groups of instructions, count the number of their occurrences in the code Add redundant code in such a way that the counts are distributed in a seemingly random but controlled fashion De-compilation is likely to defeat this technique
15 Single procedure watermarking Static code watermark for Java A method in one of the program classes is created for watermarking purposes The method contains standard Java bytecodes Does not do anything useful except encoding the watemark Dynamic data structure watermarking Encode a watermark using object references A number of different possible encodings The watermark is constructed for a special input The watermark is demonstrated using either A debugger A special-purpose tool that can examine the run-time state of the program An important part is identification of the start point in the data structure encoding the watermark Improvement: use existing program data structures and add extra fields to encode watermarks
Code Obfuscation. Mayur Kamat Nishant Kumar
Code Obfuscation Mayur Kamat Nishant Kumar Agenda Malicious Host Problem Code Obfuscation Watermarking and Tamper Proofing Market solutions Traditional Network Security Problem Hostile Network Malicious
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Software Piracy Overview of Anti-Tampering Technologies. Scott Baeder Sr. Architect Cadence Design Systems baeder@cadence.
Software Piracy Overview of Anti-Tampering Technologies Scott Baeder Sr. Architect Cadence Design Systems [email protected] 0 Agenda Quick Review of Piracy Binary Hacking Crackers Workflow First Impressions
Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
Surreptitious Software
Surreptitious Software Obfuscation, Watermarking, and Tamperproofing for Software Protection Christian Collberg Jasvir Nagra rw T Addison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
Software Reversing Engineering (a.k.a. Reversing) Spiros Mancoridis. What is Reverse Engineering? Software Reverse Engineering: Reversing
Software Reversing Engineering (a.k.a. Reversing) Spiros Mancoridis What is Reverse Engineering? Reverse engineering (RE) is the process of etracting the knowledge or design blueprints from anything man
Software Protection through Code Obfuscation
Software Protection through Code Obfuscation Dissertation submitted in partial fulfillment of the requirements for the degree of Master of Technology, Computer Engineering by Aniket Kulkarni Roll No: 121022016
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Introduction. Application Security. Reasons For Reverse Engineering. This lecture. Java Byte Code
Introduction Application Security Tom Chothia Computer Security, Lecture 16 Compiled code is really just data which can be edit and inspected. By examining low level code protections can be removed and
Software License Management using the Polymorphic Encryption Algorithm White Paper
pmc-ciphers.com Software License Management using the Polymorphic Encryption Algorithm White Paper Published: May 2007, first published in January 2003 PMC Software License Management 1 Software License
How Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
All Your Code Belongs To Us Dismantling Android Secrets With CodeInspect. Steven Arzt. 04.10.2015 Secure Software Engineering Group Steven Arzt 1
All Your Code Belongs To Us Dismantling Android Secrets With CodeInspect Steven Arzt 04.10.2015 Secure Software Engineering Group Steven Arzt 1 04.10.2015 Secure Software Engineering Group Steven Arzt
What is Software Watermarking? Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks
hat is Software atermarking? Software atermarking Through Register Allocation: Implementation, Analysis, and Attacks Ginger Myles Christian Collberg {mylesg,collberg}@cs.arizona.edu University of Arizona
AuthentiMax Software for GloMax -Multi+
TECHNICAL MANUAL AuthentiMax Software for GloMax -Multi+ Instruc ons for use of Product E8946. TM403 Revised 9/13 AuthentiMax Software for GloMax -Multi+ All technical literature is available on the Internet
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
FLOATING LICENSE MANAGEMENT
FLOATING LICENSE MANAGEMENT A REVIEW OF FLEXlm PREPARED BY: SALYS SULTAN June 30 th, 2006 Table of Contents ABSTRACT 3 1.0 INTRODUCTION 4 1.1 LICENSING POLICIES 5 NODE-LOCKING USER-BASED LICENSING 5 5
LASTLINE WHITEPAPER. Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade
LASTLINE WHITEPAPER Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade Abstract Malicious code is an increasingly important problem that threatens the security of computer systems. The
MovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
Digital Rights Management
Digital Rights Management Hubris, history, hacks. Yan Shoshitaishvili UCSB Seclab Overview Content Duplication Digital Rights Media - History Media-specific DRM MovieStealer Design Optimizations Countermeasures
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
White Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Introduction to Computer Security
Introduction to Computer Security Authentication and Access Control Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access: a big picture 1. Identification Which object O requests
Chapter 3.2 C++, Java, and Scripting Languages. The major programming languages used in game development.
Chapter 3.2 C++, Java, and Scripting Languages The major programming languages used in game development. C++ C used to be the most popular language for games Today, C++ is the language of choice for game
TZWorks Windows Event Log Viewer (evtx_view) Users Guide
TZWorks Windows Event Log Viewer (evtx_view) Users Guide Abstract evtx_view is a standalone, GUI tool used to extract and parse Event Logs and display their internals. The tool allows one to export all
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture *
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture * Seongje Cho, Hyeyoung Chang, and Yookun Cho 1 Dept. of Computer Science & Engineering, Dankook University,
An Overview of the Secure Sockets Layer (SSL)
Chapter 9: SSL and Certificate Services Page 1 of 9 Chapter 9: SSL and Certificate Services The most widespread concern with the Internet is not the limited amount of bandwidth or the occasional objectionable
mguard Device Manager Release Notes Version 1.6.1
mguard Device Manager Release Notes Version 1.6.1 Innominate Security Technologies AG Rudower Chaussee 13 12489 Berlin Germany Phone: +49 30 921028 0 Fax: +49 30 921028 020 [email protected] http://www.innominate.com/
APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW
84-10-25 DATA SECURITY MANAGEMENT APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW Al Berg INSIDE Applets and the Web, The Security Issue, Java: Secure Applets, Java: Holes and Bugs, Denial-of-Service
OWASP Mobile Top Ten 2014 Meet the New Addition
OWASP Mobile Top Ten 2014 Meet the New Addition Agenda OWASP Mobile Top Ten 2014 Lack of Binary Protections added Why is Binary Protection important? What Risks Need to be Mitigated? Where to Go For Further
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
Efficient database auditing
Topicus Fincare Efficient database auditing And entity reversion Dennis Windhouwer Supervised by: Pim van den Broek, Jasper Laagland and Johan te Winkel 9 April 2014 SUMMARY Topicus wants their current
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o Presented by: Smitha Sundareswaran Chi Tsong Su Introduction Kerberos: An authentication protocol based on
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Obfuscation: know your enemy
Obfuscation: know your enemy Ninon EYROLLES [email protected] Serge GUELTON [email protected] Prelude Prelude Plan 1 Introduction What is obfuscation? 2 Control flow obfuscation 3 Data flow
Cover sheet. How do you create a backup of the OS systems during operation? SIMATIC PCS 7. FAQ November 2013. Service & Support. Answers for industry.
Cover sheet How do you create a backup of the OS systems during operation? SIMATIC PCS 7 FAQ November 2013 Service & Support Answers for industry. Question This entry originates from the Service & Support
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
Java Card. Smartcards. Demos. . p.1/30
. p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards
Outline. 1 Denitions. 2 Principles. 4 Implementation and Evaluation. 5 Debugging. 6 References
Outline Computer Science 331 Introduction to Testing of Programs Mike Jacobson Department of Computer Science University of Calgary Lecture #3-4 1 Denitions 2 3 4 Implementation and Evaluation 5 Debugging
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Chapter 13: Program Development and Programming Languages
Understanding Computers Today and Tomorrow 12 th Edition Chapter 13: Program Development and Programming Languages Learning Objectives Understand the differences between structured programming, object-oriented
PGP Command Line Version 10.3 Release Notes
PGP Command Line Version 10.3 Release Notes Page 1 of 6 PGP Command Line Version 10.3 Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Applications of obfuscation to software and hardware systems
Applications of obfuscation to software and hardware systems Victor P. Ivannikov Institute for System Programming Russian Academy of Sciences (ISP RAS) www.ispras.ru Program obfuscation is an efficient
Digital Rights Management. Introduction
Digital Rights Management 12/1/2010 Digital Rights Management 1 Introduction Digital Rights Management (DRM) is a term used for systems that restrict the use of digital media DRM defends against the illegal
LICENSE4J FLOATING LICENSE SERVER USER GUIDE
LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Software Reverse Engineering
Software Reverse Engineering Jacco Krijnen June 19, 2013 Abstract While reverse engineering probably started with the analysis of hardware, today it plays a significant role in the software world. We discuss
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Code Obfuscation Literature Survey
Code Obfuscation Literature Survey Arini Balakrishnan, Chloe Schulze CS701 Construction of Compilers, Instructor: Charles Fischer Computer Sciences Department University of Wisconsin, Madison December
E-Book Security Assessment: NuvoMedia Rocket ebook TM
E-Book Security Assessment: NuvoMedia Rocket ebook TM July 1999 Prepared For: The Association of American Publishers Prepared By: Global Integrity Corporation 4180 La Jolla Village Drive, Suite 450 La
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:
Confinement Problem The confinement problem Isolating entities Virtual machines Sandboxes Covert channels Mitigation 1 Example Problem Server balances bank accounts for clients Server security issues:
OWASP Cornucopia. Ecommerce Website Edition. The OWASP Foundation. OWASP London https://www.owasp.org. 3rd June 2013
The OWASP Foundation OWASP London https://www.owasp.org 3rd June 2013 OWASP Cornucopia Ecommerce Website Edition OWASP Cornucopia - Ecommerce Website Edition helps developers identify security requirements
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Outline. hardware components programming environments. installing Python executing Python code. decimal and binary notations running Sage
Outline 1 Computer Architecture hardware components programming environments 2 Getting Started with Python installing Python executing Python code 3 Number Systems decimal and binary notations running
New Security Options in DB2 for z/os Release 9 and 10
New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and
A Comparison of Self-Protecting Digital Content and AACS
A Comparison of Self-Protecting Digital Content and AACS Independent Security Evaluators www.securityevaluators.com May 3, 2005 Copyright 2005 Independent Security Evaluators, LLC Content Protection for
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
