Live Disk Forensics on Bare Metal
|
|
|
- Colleen Shields
- 10 years ago
- Views:
Transcription
1 Live Disk Forensics on Bare Metal Hongyi Hu and Chad Spensky Open-Source Digital Forensics Conference 2014 This work is sponsored by the Assistant Secretary of Defense for Research and Engineering under Air Force Contract FA C Opinions, interpretations, conclusions and recommendations are those of the author and are not necessarily endorsed by the United States Government.
2 Who are we? Chad Spensky Lifetime hacker/tinkerer Education University of Pittsburgh University of North Carolina Research staff at MIT Lincoln Laboratory 3 rd time at OSDF Con User and modifier of TSK and Volatility Live Disk Forensics - 2
3 Who are we? Hongyi Hu Computer scientist, tinkerer, lawyer Education S.B., MIT Boston U. Research staff at MIT Lincoln Laboratory 2nd time at OSDF Con My photos are not as cool as Chad s J Live Disk Forensics - 3
4 Agenda Overview Motivation Architecture Live Disk Forensics Summary Future Directions Live Disk Forensics - 4
5 Overview This talk is a small portion of a larger program LO-PHI: Low-Observable Physical Host Instrumentation Problem Statement Instrument physical and virtual machines while introducing as few artifacts as possible. Goals Be as difficult-to-detect as possible Develop capabilities for bare-metal machines Produce high-level semantic information LO-PH Live Disk Forensics - 5
6 Why? Malware analysis Malware can actively evade detectable analysis artifacts and may behave differently Cleanroom execution environment Installing software on the system may not always be an option E.g. Xbox 360 Low-artifact debugging Debuggers can be detected and evaded or mask real-world behavior Live Disk Forensics - 6
7 How? Instrument interesting tap points in the system E.g. Hard Disk, Main Memory, CPU, Network Bridge the semantic gap to obtain useful information from these raw data sources E.g. Volatility, Sleuthkit Analyze the raw and semantic data to answer interesting questions Is program X malware? What files were accessed? Is this machine compromised? Live Disk Forensics - 7
8 Agenda Overview Motivation Architecture Live Disk Forensics Summary Future Directions Live Disk Forensics - 8
9 Current Instrumentation Access physical memory Virtual: libvmi Physical: PCI & PCI-express FPGA boards Passively monitor disk activity Virtual: Custom hooks into QEMU block driver Physical: SATA man-in-the-middle with custom FPGA CPU Instrumentation Virtual: Custom hooks into QEMU KVM Physical: Working with Intel s extended Debug Port (XDP) and ARM s DSTREAM debugger Actuate inputs Virtual: libvirt Physical: Arduino Leonardo Live Disk Forensics - 9
10 Current Instrumentation Access physical memory Virtual: libvmi Physical: PCI & PCI-express FPGA boards Passively monitor disk activity Virtual: Custom hooks into QEMU block driver Physical: SATA man-in-the-middle with custom FPGA CPU Instrumentation Virtual: Custom hooks into QEMU KVM Physical: Working with Intel s extended Debug Port (XDP) and ARM s DSTREAM debugger Actuate inputs Virtual: libvirt Physical: Arduino Leonardo Live Disk Forensics - 10
11 Physical Instrumentation Power, Keyboard, Mouse SATA Introspection Network Tap Memory Introspection Semantic Analysis Live Disk Forensics - 11
12 Physical Instrumentation Power, Keyboard, Mouse SATA Introspection Network Tap Memory Introspection Semantic Analysis Live Disk Forensics - 12
13 Virtual Instrumentation block.c UNIX Socket LO-PH Semantic Analysis Live Disk Forensics - 13
14 Virtual Instrumentation block.c UNIX Socket LO-PH Semantic Analysis Live Disk Forensics - 14
15 Bridging the Semantic Gap Problem Most forensic tools, i.e. Volatility and Sleuthkit, assume static offline data We need to analyze live data streams Live Memory Introspection We were able to optimize Volatility to use a custom address space that speaks directly to our hardware Other code to deal with smearing vs. snapshots etc. Live Disk Forensics Far less straight-forward, especially on physical HDDs Live Disk Forensics - 15
16 Agenda Overview Motivation Architecture Live Disk Forensics Summary Future Directions Live Disk Forensics - 16
17 Live Disk Forensics 1. Instrumentation: Obtain a stream of disk activity Read 1 sector from block 0, [DATA] Write 1 sector to block 0, [DATA] Semantic Gap: Determine the meaning of this read/write Master Boot Record was modified File read/write/rename/etc. 3. Analyze data Is that bad? 2. Semantic 1. Data Collection 3. Analysis Reconstruction Live Disk Forensics - 17
18 Disk Instrumentation Virtual (QEMU/KVM) Obtain block, sector count, data, and read/write directly from block driver Physical Required developing specialized hardware Currently using a Xilinx development board Using off-the-shelf SATA core from Intelliprop Custom code for C&C over Ethernet Outputs raw SATA frames over UDP (~80MB/sec) ML507 Live Disk Forensics - 18
19 Disk Instrumentation Virtual Limitations Artifacts Same as QEMU Requires modifications to QEMU source Physical Limitations Artifacts May sometimes need to throttle SATA to ensure full capture Packet loss UDP is a best-effort protocol 2. Semantic 1. Data Collection 3. Analysis Reconstruction Live Disk Forensics - 19
20 Live Disk Forensics - 20 Disk Instrumentation: Physical
21 Live Disk Forensics - 21 Disk Instrumentation: Physical
22 Semantic Reconstruction 1. Start with a forensic copy of the instrumented disk 2. Identify the file system on the disk E.g. magic numbers, expert knowledge 3. Obtain stream of accesses to the instrumented disk in a common format E.g. (Logical Block Address, Data, Operation) 4. Utilize forensic tools to identify subsequent file system operation 2. Semantic 1. Data Collection 3. Analysis Reconstruction Live Disk Forensics - 22
23 SATA Reconstruction Multiple layers of abstraction that we must bridge Analog Signal à Raw bits Raw bits à SATA Frames SATA Frames à Sector manipulation Sector manipulation à File System Manipulation SATA Reconstruction File System Reconstruction 2. Semantic 1. Data Collection 3. Analysis Reconstruction Live Disk Forensics - 23
24 SATA Reconstruction Multiple layers of abstraction that we must bridge Analog Signal à Raw bits } Xilinx ML507 Raw bits à SATA Frames SATA Frames à Sector manipulation Sector manipulation à File System Manipulation SATA Reconstruction File System Reconstruction 2. Semantic 1. Data Collection 3. Analysis Reconstruction Live Disk Forensics - 24
25 SATA Reconstruction A Brief Primer on SATA (1) Serial ATA bus interface that replaces older IDE/ATA standards SATA uses frames (FIS) to communicate between host and device FIS Frame Information Structure Live Disk Forensics - 25
26 SATA Reconstruction A Brief Primer on SATA (2) Multi-layer protocol (physical, link, transport, command) Reconstruction focuses on the command layer Read SATA standard Appendix B is useful! Live Disk Forensics - 26
27 SATA Reconstruction A Brief Primer on SATA (3) Register FIS Host to Device Marks the beginning of SATA transaction Contains the logical block address (LBA) and operation information (read or write) Register FIS Device to Host Often marks completion of SATA transaction Also used in software reset protocol, device diagnostic, etc. Live Disk Forensics - 27
28 SATA Reconstruction A Brief Primer on SATA (4) DMA Activate Device declares that it is ready to receive DMA data (for a write) DMA Setup Precedes Data frames (for NCQ, AFAIK) Live Disk Forensics - 28
29 SATA Reconstruction A Brief Primer on SATA (5) Data contains data! BIST (Built In Self Test) PIO (Programmed I/O) Older mode of data transfer before DMA Other protocols not mentioned here Software reset, device diagnostic, device reset, packet Read the SATA spec for more info Live Disk Forensics - 29
30 SATA Reconstruction A Brief Primer on SATA (6) HOST DEVICE Register HTD Tells us the LBA (sector), number of sectors, operation, etc. Data A DMA Activate Data B Data C Register DTH Example DMA Write Live Disk Forensics - 30
31 SATA Reconstruction Native Command Queuing (1) Native Command Queuing (NCQ) makes reconstruction harder NCQ allows for up to 32 separate, concurrent, asynchronous disk transactions Many SATA devices implement NCQ NCQ identifies transactions by 5-bit TAG field (0-31) Live Disk Forensics - 31
32 SATA Reconstruction Native Command Queuing (2) Not all NCQ frames are tagged (e.g. DATA), so we perform reconstruction to correctly de-interleave transactions State machine to track status of each transaction (including error conditions) Very tricky in practice often differences between the official documentation and actual disk manufacturer practice Live Disk Forensics - 32
33 SATA Reconstruction Native Command Queuing (3) Example Live Disk Forensics - 33
34 SATA Reconstruction Wrote a Python module to handle all of these transactions Consumes raw SATA frames Supports all of the existing SATA versions Outputs stream of logical sector operations Traditional SATA analyzers are expensive and don t provide analysis-friendly interfaces Live Disk Forensics - 34
35 File System Reconstruction Multiple layers of abstraction that we must bridge Analog Signal à Raw bits } Xilinx ML507 Raw bits à SATA Frames SATA Frames à Sector manipulation Sector manipulation à File System Manipulation SATA Reconstruction File System Reconstruction 2. Semantic 1. Data Collection 3. Analysis Reconstruction Live Disk Forensics - 35
36 File System Reconstruction Multiple layers of abstraction that we must bridge Analog Signal à Raw bits } Xilinx ML507 Raw bits à SATA Frames SATA Frames à Sector manipulation SATA Reconstruction Sector manipulation à File System Manipulation SATA Reconstruction File System Reconstruction 2. Semantic 1. Data Collection 3. Analysis Reconstruction Live Disk Forensics - 36
37 File System Reconstruction Sector to file mapping handled by existing forensic tools E.g. Sleuthkit We use TSK for our base case and only need to track changes Read Operations Report context with associated index node (inode) Us Write operations Update mapping if needed Report context with associated inode TSK Live Disk Forensics - 37
38 File System Reconstruction: NTFS Disk Packet Disk Op: Write Start Sector: Num Sectors: 16 Data:. Filesystem Op Type: Content Write MFT Record: 1349 Filename: C:\foo\bar Live Disk Forensics - 38
39 File System Reconstruction: NTFS Disk Packet Disk Op: Write Start Sector: Num Sectors: 16 Data:. Filesystem Op Type: Content Write MFT Record: 1349 Filename: C:\foo\bar Disk to Record Mapping Sector Master File Table (MFT) Record $MFT Record Attributes 1349 $FILE_NAME: bar, etc. Live Disk Forensics - 39
40 File System Reconstruction: NTFS Problem Sleuthkit was not made with incremental updates in mind Naïve solution of re-parsing the disk after updates is very slow Solution Only parse minimal information required to update given file system Drawback Optimizations are file system specific E.g. Only monitor MFT updates in NTFS Live Disk Forensics - 40
41 File System Reconstruction: NTFS Current Solution Utilizes PyTSK to keep a unified codebase in Python Props to Joachim, Michael, et al. for the awesome work! Utilizes AnalyzeMFT to parse individual MFT entries Props to David Kovar, bug fixes are on their way! Implementation MFT modification Diff previous MFT entry with new MFT entry Update internal caching structures Report changes Non-MFT Report if sector is associated with a run of a know MFT structure Otherwise report as unknown to be resolved later Live Disk Forensics - 41
42 File System Reconstruction Currently have a stable mostly-optimized implementation for NTFS Could still reduce memory footprint Want to push AnalyzeMFT-like functionality into TSK Working on expanding to other file systems Need to identify all of the potential regions that update the underlying structure per file system In the process of pushing the code out to the community to solicit feedback Live Disk Forensics - 42
43 Analysis Multiple layers of abstraction that we must bridge Analog Signal à Raw bits } Xilinx ML507 Raw bits à SATA Frames SATA Frames à Sector manipulation SATA Reconstruction Sector manipulation à File System Manipulation TSK & analyzemft SATA Reconstruction File System Reconstruction 2. Semantic 1. Data Collection 3. Analysis Reconstruction Live Disk Forensics - 43
44 Analysis Analysis step is application-dependent and open to the user Flexible and easy to use API Example uses: Simple filtering on specific files or disk regions (e.g. /bootmgr) Detect writes to slack space Feature extraction and machine learning for malware analysis 2. Semantic 1. Data Collection 3. Analysis Reconstruction Live Disk Forensics - 44
45 Analysis We are currently using our framework to detect VM-aware malware Results and future publication pending... However, we foresee there being numerous use cases that we have not yet thought of Live Disk Forensics - 45
46 Agenda Overview Motivation Architecture Live Disk Forensics Summary Future Directions Live Disk Forensics - 46
47 Advantages Less divergence from real environments Introspection at the hardware level (difficult to subvert from software) Ability to instrument proprietary, legacy, or embedded systems that can t be virtualized Open and flexible framework LO-PH Live Disk Forensics - 47
48 Summary Developed an instrumentation suite for both physical and virtual machines Showed that this instrumentation is capable of collecting complete real-time data with minimal artifacts Adapted popular forensics tools to bridge the semantic gap in real-time on live systems Provides entire instrumentation suite so that researchers can focus on higher-level problems Live Disk Forensics - 48
49 What s Next? Process introspection / zero-artifact debugging main() Function1(1,2,3) Function2(2)... FunctionN(X) Probabilistic/Zero-artifact breakpoints Live Disk Forensics - 49
50 Questions? Live Disk Forensics - 50
Implementation and Implications of a Stealth Hard-Drive Backdoor
March 3rd 2014 OSSIR/JSSI 2014 Paper first presented at ACSAC 2013 Awarded Best Student Paper Award Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach Davide Balzarotti Aure
COS 318: Operating Systems. I/O Device and Drivers. Input and Output. Definitions and General Method. Revisit Hardware
COS 318: Operating Systems I/O and Drivers Input and Output A computer s job is to process data Computation (, cache, and memory) Move data into and out of a system (between I/O devices and memory) Challenges
Computer Organization & Architecture Lecture #19
Computer Organization & Architecture Lecture #19 Input/Output The computer system s I/O architecture is its interface to the outside world. This architecture is designed to provide a systematic means of
Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM
Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture
Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
760 Veterans Circle, Warminster, PA 18974 215-956-1200. Technical Proposal. Submitted by: ACT/Technico 760 Veterans Circle Warminster, PA 18974.
760 Veterans Circle, Warminster, PA 18974 215-956-1200 Technical Proposal Submitted by: ACT/Technico 760 Veterans Circle Warminster, PA 18974 for Conduction Cooled NAS Revision 4/3/07 CC/RAIDStor: Conduction
Chapter 3: Operating-System Structures. Common System Components
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1
The QEMU/KVM Hypervisor
The /KVM Hypervisor Understanding what's powering your virtual machine Dr. David Alan Gilbert [email protected] 2015-10-14 Topics Hypervisors and where /KVM sits Components of a virtual machine KVM Devices:
Knut Omang Ifi/Oracle 19 Oct, 2015
Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What
Devices and Device Controllers
I/O 1 Devices and Device Controllers network interface graphics adapter secondary storage (disks, tape) and storage controllers serial (e.g., mouse, keyboard) sound co-processors... I/O 2 Bus Architecture
Phoenix SecureCore TM Setup Utility
Phoenix SecureCore TM Setup Utility Important information: We continually strive to bring you the latest and proven features and technologies. As part of our drive to continually improve our products modifications
IDE/ATA Interface. Objectives. IDE Interface. IDE Interface
Objectives IDE/ATA Interface In this part, you will -Learn about each of the ATA standards -Identify the ATA connector and cable -Learn how to set jumpers for master, slave and cable select configurations
Computer Systems Structure Input/Output
Computer Systems Structure Input/Output Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Examples of I/O Devices
Medical Device Design: Shorten Prototype and Deployment Time with NI Tools. NI Technical Symposium 2008
Medical Device Design: Shorten Prototype and Deployment Time with NI Tools NI Technical Symposium 2008 FDA Development Cycle From Total Product Life Cycle by David W. Fiegal, M.D., M.P.H. FDA CDRH Amazon.com
BHyVe. BSD Hypervisor. Neel Natu Peter Grehan
BHyVe BSD Hypervisor Neel Natu Peter Grehan 1 Introduction BHyVe stands for BSD Hypervisor Pronounced like beehive Type 2 Hypervisor (aka hosted hypervisor) FreeBSD is the Host OS Availability NetApp is
Gigabit Ethernet Packet Capture. User s Guide
Gigabit Ethernet Packet Capture User s Guide Copyrights Copyright 2008 CACE Technologies, Inc. All rights reserved. This document may not, in whole or part, be: copied; photocopied; reproduced; translated;
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
Chapter 11 I/O Management and Disk Scheduling
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
The Advanced JTAG Bridge. Nathan Yawn [email protected] 05/12/09
The Advanced JTAG Bridge Nathan Yawn [email protected] 05/12/09 Copyright (C) 2008-2009 Nathan Yawn Permission is granted to copy, distribute and/or modify this document under the terms of the
Applications of Data Recovery Tools to Digital Forensics: Analyzing the Host Protected Area with the PC-3000
Applications of Data Recovery Tools to Digital Forensics: Analyzing the Host Protected Area with the PC-3000 Richard Leickly and David Angell Circle Hook Data Recovery { Richard, David}@CircleHookDR.com
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Operating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
KVM Architecture Overview
KVM Architecture Overview 2015 Edition Stefan Hajnoczi 1 Introducing KVM virtualization KVM hypervisor runs virtual machines on Linux hosts Mature on x86, recent progress on ARM and
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Virtualization and Other Tricks.
Virtualization and Other Tricks. Pavel Parízek, Tomáš Kalibera, Peter Libič DEPARTMENT OF DISTRIBUTED AND DEPENDABLE SYSTEMS http://d3s.mff.cuni.cz CHARLES UNIVERSITY PRAGUE Faculty of Mathematics and
Frontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
Real-Time KVM for the Masses Unrestricted Siemens AG 2015. All rights reserved
Siemens Corporate Technology August 2015 Real-Time KVM for the Masses Unrestricted Siemens AG 2015. All rights reserved Real-Time KVM for the Masses Agenda Motivation & requirements Reference architecture
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
Intel Rapid Storage Technology
Intel Rapid Storage Technology User Guide August 2011 Revision 1.0 1 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata
Implementing Network Attached Storage Ken Fallon Bill Bullers Impactdata Abstract The Network Peripheral Adapter (NPA) is an intelligent controller and optimized file server that enables network-attached
A Comparison of NVMe and AHCI
A Comparison of NVMe and AHCI Enterprise Storage OCTO Primary Contacts: Don H Walker Version: 1.0 Date Created: 7/31/2012 Page 1 Page 2 Table of Contents NVME AND AHCI... 1 1 INTRODUCTION... 6 2 OVERVIEW...
Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader
Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization
Virtual Platforms Addressing challenges in telecom product development
white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous
Chapter 10 Case Study 1: LINUX
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 10 Case Study 1: LINUX History of UNIX and Linux UNICS PDP-11 UNIX Portable UNIX Berkeley UNIX Standard UNIX MINIX Linux UNIX/Linux Goals
How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself
How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,
CSC 2405: Computer Systems II
CSC 2405: Computer Systems II Spring 2013 (TR 8:30-9:45 in G86) Mirela Damian http://www.csc.villanova.edu/~mdamian/csc2405/ Introductions Mirela Damian Room 167A in the Mendel Science Building [email protected]
Configuring Your Computer and Network Adapters for Best Performance
Configuring Your Computer and Network Adapters for Best Performance ebus Universal Pro and User Mode Data Receiver ebus SDK Application Note This application note covers the basic configuration of a network
NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ
What is NAND Flash? What is the major difference between NAND Flash and other Memory? Structural differences between NAND Flash and NOR Flash What does NAND Flash controller do? How to send command to
Plug and Play for Windows 2000
Operating System Plug and Play for Windows 2000 White Paper Abstract This paper describes the Microsoft Windows 2000 operating system implementation of Plug and Play. Plug and Play is one of a number of
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
UEFI on Dell BizClient Platforms
UEFI on Dell BizClient Platforms Authors: Anand Joshi Kurt Gillespie This document is for informational purposes only and may contain typographical errors and technical inaccuracies. The content is provided
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Linux Driver Devices. Why, When, Which, How?
Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com
Best Practises for LabVIEW FPGA Design Flow 1 Agenda Overall Application Design Flow Host, Real-Time and FPGA LabVIEW FPGA Architecture Development FPGA Design Flow Common FPGA Architectures Testing and
Operating Systems Design 16. Networking: Sockets
Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski [email protected] 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
MAGENTO HOSTING Progressive Server Performance Improvements
MAGENTO HOSTING Progressive Server Performance Improvements Simple Helix, LLC 4092 Memorial Parkway Ste 202 Huntsville, AL 35802 [email protected] 1.866.963.0424 www.simplehelix.com 2 Table of Contents
GPU File System Encryption Kartik Kulkarni and Eugene Linkov
GPU File System Encryption Kartik Kulkarni and Eugene Linkov 5/10/2012 SUMMARY. We implemented a file system that encrypts and decrypts files. The implementation uses the AES algorithm computed through
Router Architectures
Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components
Virtualization in Linux KVM + QEMU
CS695 Topics in Virtualization and Cloud Computing KVM + QEMU Senthil, Puru, Prateek and Shashank 1 Topics covered KVM and QEMU Architecture VTx support CPU virtualization in KMV Memory virtualization
Linux. Reverse Debugging. Target Communication Framework. Nexus. Intel Trace Hub GDB. PIL Simulation CONTENTS
Android NEWS 2016 AUTOSAR Linux Windows 10 Reverse ging Target Communication Framework ARM CoreSight Requirements Analysis Nexus Timing Tools Intel Trace Hub GDB Unit Testing PIL Simulation Infineon MCDS
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
CS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 2: Operating System Structures Prof. Alan Mislove ([email protected]) Operating System Services Operating systems provide an environment for
Understanding Flash SSD Performance
Understanding Flash SSD Performance Douglas Dumitru CTO EasyCo LLC August 16, 2007 DRAFT Flash based Solid State Drives are quickly becoming popular in a wide variety of applications. Most people think
Storage and File Systems. Chester Rebeiro IIT Madras
Storage and File Systems Chester Rebeiro IIT Madras 1 Two views of a file system system calls protection rwx attributes Application View Look & Feel File system Hardware view 2 Magnetic Disks Chester Rebeiro
I/O. Input/Output. Types of devices. Interface. Computer hardware
I/O Input/Output One of the functions of the OS, controlling the I/O devices Wide range in type and speed The OS is concerned with how the interface between the hardware and the user is made The goal in
PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools
COMPUTER HARDWARE. Input- Output and Communication Memory Systems
COMPUTER HARDWARE Input- Output and Communication Memory Systems Computer I/O I/O devices commonly found in Computer systems Keyboards Displays Printers Magnetic Drives Compact disk read only memory (CD-ROM)
KVM: Kernel-based Virtualization Driver
KVM: Kernel-based Virtualization Driver White Paper Overview The current interest in virtualization has led to the creation of several different hypervisors. Most of these, however, predate hardware-assisted
A Day in the Life of a Cyber Tool Developer
A Day in the Life of a Cyber Tool Developer by Jonathan Tomczak [email protected] Jonathan Tomczak ( Front Man ) Software Engineer w/ over 7 years experience working in software and web development Dave
Linux Kernel Architecture
Linux Kernel Architecture Amir Hossein Payberah [email protected] Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management
Have both hardware and software. Want to hide the details from the programmer (user).
Input/Output Devices Chapter 5 of Tanenbaum. Have both hardware and software. Want to hide the details from the programmer (user). Ideally have the same interface to all devices (device independence).
Software Stacks for Mixed-critical Applications: Consolidating IEEE 802.1 AVB and Time-triggered Ethernet in Next-generation Automotive Electronics
Software : Consolidating IEEE 802.1 AVB and Time-triggered Ethernet in Next-generation Automotive Electronics Soeren Rumpf Till Steinbach Franz Korf Thomas C. Schmidt [email protected] September
Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012
Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Proprietary 2012 Media5 Corporation Scope of this Document This Technical Bulletin aims to inform the reader on the troubleshooting
Big Data Technologies for Ultra-High-Speed Data Transfer and Processing
White Paper Intel Xeon Processor E5 Family Big Data Analytics Cloud Computing Solutions Big Data Technologies for Ultra-High-Speed Data Transfer and Processing Using Technologies from Aspera and Intel
Virtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
5-BAY RAID STATION. Manual
5-BAY RAID STATION Manual Content 1. Features 3 1.1 Overview 3 1.2 SATA features 3 1.3 USB features 4 2. Specifications 4 3. System requirements 4 4. The device at a glance 4 4.1 Rear panel 5 4.2 The LED
Red Hat VDI. David Simmons
Red Hat VDI David Simmons Senior Architect, Red Hat Virtualization AGENDA Open Source and the Evolution of Virtualization Desktop VDI Value Components Real VDI TCO The Future of the Desktop and the savings
A Storage Architecture for High Speed Signal Processing: Embedding RAID 0 on FPGA
Journal of Signal and Information Processing, 12, 3, 382-386 http://dx.doi.org/1.4236/jsip.12.335 Published Online August 12 (http://www.scirp.org/journal/jsip) A Storage Architecture for High Speed Signal
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
HRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
Providing a jump start to EFI application development and a uniform pre-boot environment
Providing a jump start to EFI application development and a uniform pre-boot environment Yosi Govezensky Program Manager Microcomputer Software Corp. February 15-17, 2000 Agenda l EFI Application Toolkit
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Chapter 6. 6.1 Introduction. Storage and Other I/O Topics. p. 570( 頁 585) Fig. 6.1. I/O devices can be characterized by. I/O bus connections
Chapter 6 Storage and Other I/O Topics 6.1 Introduction I/O devices can be characterized by Behavior: input, output, storage Partner: human or machine Data rate: bytes/sec, transfers/sec I/O bus connections
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a
Virtualization Performance on SGI UV 2000 using Red Hat Enterprise Linux 6.3 KVM
White Paper Virtualization Performance on SGI UV 2000 using Red Hat Enterprise Linux 6.3 KVM September, 2013 Author Sanhita Sarkar, Director of Engineering, SGI Abstract This paper describes how to implement
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
I/O Device and Drivers
COS 318: Operating Systems I/O Device and Drivers Prof. Margaret Martonosi Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall11/cos318/ Announcements Project
Benefits of Intel Matrix Storage Technology
Benefits of Intel Matrix Storage Technology White Paper December 2005 Document Number: 310855-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
VLAN for DekTec Network Adapters
Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs
Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems
Fastboot Techniques for x86 Architectures Marcus Bortel Field Application Engineer QNX Software Systems Agenda Introduction BIOS and BIOS boot time Fastboot versus BIOS? Fastboot time Customizing the boot
Gigabit Ethernet Design
Gigabit Ethernet Design Laura Jeanne Knapp Network Consultant 1-919-254-8801 [email protected] www.lauraknapp.com Tom Hadley Network Consultant 1-919-301-3052 [email protected] HSEdes_ 010 ed and
85MIV2 / 85MIV2-L -- Components Locations
Chapter Specification 85MIV2 / 85MIV2-L -- Components Locations RJ45 LAN Connector for 85MIV2-L only PS/2 Peripheral Mouse (on top) Power PS/2 K/B(underside) RJ45 (on top) +2V Power USB0 (middle) USB(underside)
SATA 150 RAID. user. Model 176767 MAN-176767-UM-1007-01
SATA 150 RAID Controller PCI Card user manual Model 176767 MAN-176767-UM-1007-01 introduction Thank you for purchasing this MANHATTAN SATA 150 RAID Controller PCI Card, Model 176767. The easy-to-follow
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
Programming Interface. for. Bus Master IDE Controller. Revision 1.0
Programming Interface for Bus Master IDE Controller Revision 1.0 5/16/94 Until this specification is ratified, it is solely owned and maintained by: Brad Hosler, Intel Corporation [email protected] (please
Windows8 Internals, Sixth Edition, Part 1
Microsoft Windows8 Internals, Sixth Edition, Part 1 Mark Russinovich David A. Solomon Alex lonescu Windows Internals, Sixth Edition, Part i Introduction xvii Chapter 1 Concepts and Tools 1 Windows Operating
CMPS223 Final Project Virtual Machine Introspection Techniques
CMPS223 Final Project Virtual Machine Introspection Techniques Michael Sevilla University of California, Santa Cruz [email protected] December 4, 2012 1 Introduction This work is a survey of Virtual
Going Linux on Massive Multicore
Embedded Linux Conference Europe 2013 Going Linux on Massive Multicore Marta Rybczyńska 24th October, 2013 Agenda Architecture Linux Port Core Peripherals Debugging Summary and Future Plans 2 Agenda Architecture
A quantitative comparison between xen and kvm
Home Search Collections Journals About Contact us My IOPscience A quantitative comparison between xen and kvm This content has been downloaded from IOPscience. Please scroll down to see the full text.
What is a System on a Chip?
What is a System on a Chip? Integration of a complete system, that until recently consisted of multiple ICs, onto a single IC. CPU PCI DSP SRAM ROM MPEG SoC DRAM System Chips Why? Characteristics: Complex
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Learning Outcomes. Simple CPU Operation and Buses. Composition of a CPU. A simple CPU design
Learning Outcomes Simple CPU Operation and Buses Dr Eddie Edwards [email protected] At the end of this lecture you will Understand how a CPU might be put together Be able to name the basic components
