Microsoft Patch 3.0
|
|
|
- Dale Russell
- 5 years ago
- Views:
Transcription
1 REPORT DOCUMENTATION PAGE Form Approved OMB NO The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggesstions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA, Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any oenalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 2. REPORT TYPE 3. DATES COVERED (From - To) Final Report 1-May Apr TITLE AND SUBTITLE 5a. CONTRACT NUMBER Final Report: Research Areas 5: Securing Untrusted Binaries W911NF with Acceptance Testing and Field Monitoring 5b. GRANT NUMBER 6. AUTHORS Jack W. Davidson, Jason D. Hiser 5c. PROGRAM ELEMENT NUMBER d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAMES AND ADDRESSES University of Virginia P. O. Box PERFORMING ORGANIZATION REPORT NUMBER Charlottesville, VA SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS (ES) U.S. Army Research Office P.O. Box Research Triangle Park, NC DISTRIBUTION AVAILIBILITY STATEMENT Approved for Public Release; Distribution Unlimited 11. SPONSOR/MONITOR'S REPORT NUMBER(S) CS SUPPLEMENTARY NOTES The views, opinions and/or findings contained in this report are those of the author(s) and should not contrued as an official Department of the Army position, policy or decision, unless so designated by other documentation. 14. ABSTRACT Today s Army relies on computing to effectively engage an increasingly sophisticated enemy. Using commercial off the shelf (COTS) software to build Army systems has many advantages: reduced development costs, leveraging of vendor resources and expertise, and greater functionality. Unfortunately, COTS software often includes untrusted components that may contain any variety of uncaught coding errors, intentionally planted time or logic bombs, trojan horses, backdoors, or other features which can cause security violations. 15. SUBJECT TERMS Final Report, Acceptance Testing, Field Certification, Cyber security 10. SPONSOR/MONITOR'S ACRONYM(S) ARO 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS PAGE ABSTRACT UU UU UU UU 15. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Jack Davidson 19b. TELEPHONE NUMBER Standard Form 298 (Rev 8/98) Prescribed by ANSI Std. Z39.18
2
3 Report Title Final Report: Research Areas 5: Securing Untrusted Binaries with Acceptance Testing and Field Monitoring ABSTRACT Today s Army relies on computing to effectively engage an increasingly sophisticated enemy. Using commercial off the shelf (COTS) software to build Army systems has many advantages: reduced development costs, leveraging of vendor resources and expertise, and greater functionality. Unfortunately, COTS software often includes untrusted components that may contain any variety of uncaught coding errors, intentionally planted time or logic bombs, trojan horses, backdoors, or other features which can cause security violations. In this research, our goal is to provide high levels of software assurance for mission-critical software systems through a novel concept called field certification of software. Field certification is a particular instance of a powerful, general approach that we have developed for providing software assurance. Our general approach for providing high levels of software assurance is to logically interpose a small, trusted software component between the application and the operating system and use this component to enforce specific program properties to ensure the proper operation of the software application and prevent vulnerabilities, either intentionally or unintentionally designed or inserted as part of the software from being exercised intentionally (by an malicious adversary) or unintentionally (by a non-malicious user). Enter List of papers submitted or published that acknowledge ARO support from the start of the project to the date of this printing. List the papers, including journal references, in the following categories: (a) Papers published in peer-reviewed journals (N/A for none) Received Paper TOTAL: Number of Papers published in peer-reviewed journals: (b) Papers published in non-peer-reviewed journals (N/A for none) Received Paper TOTAL: Number of Papers published in non peer-reviewed journals: (c) Presentations
4 Number of Presentations: 0.00 Non Peer-Reviewed Conference Proceeding publications (other than abstracts): Received Paper TOTAL:
5 Number of Non Peer-Reviewed Conference Proceeding publications (other than abstracts): Peer-Reviewed Conference Proceeding publications (other than abstracts): Received Paper 08/31/ /19/ /19/ /25/ /25/ /25/ /25/ Anh Nguyen-Tuong, Michele Co, Matthew Hall, Jason Hiser, Jack W. Davidson. ILR: Where'd My Gadgets Go?, 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change. 20-MAY-12, San Francisco, CA, USA. :, Benjamin D. Rodes, Anh Nguyen-Tuong, Jason D. Hiser, John C. Knight, Michele Co, Jack W. Davidson. Defense against Stack-Based Attacks Using Speculative Stack Layout Transformation, Run-time Verfication SEP-12,. :, Sudeep Ghosh, Jason Hiser, Jack W. Davidson. Software protection for dynamically-generated code, the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop. 26-JAN-13, Rome, Italy. :, R Rajkumar, A Wang, J D Hiser, Anh Nguyen-Tuong, J W Davidson, J C Knight. Component-Oriented Monitoring of Binaries for Security, th Hawaii International Conference on System Sciences (HICSS 2011). 04-JAN-11, Kauai, HI. :, Anh Nguyen-Tuong, Jason D. Hiser, Michele Co, Nathan Kennedy, David Melski, William Ella, David Hyde, Jack W. Davidson, John C. Knight. To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing, 2014 Tenth European Dependable Computing Conference (EDCC). 13-MAY-14, Newcastle, United Kingdom. :, Sudeep Ghosh, Jason D. Hiser, Jack W. Davidson. What's the PointiSA?, Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security. 11-JUN-14, Salzburg, Austria. :, Anh Nguyen-Tuong, Michele Co, Benjamin Rodes, Matthew Hall, Clark L. Coleman, John C. Knight, Jack W. Davidson, Jason D. Hiser. A Framework for Creating Binary Rewriting Tools (Short Paper), 2014 Tenth European Dependable Computing Conference (EDCC). 13-MAY-14, Newcastle, United Kingdom. :, TOTAL: 7
6 Number of Peer-Reviewed Conference Proceeding publications (other than abstracts): (d) Manuscripts Received Paper TOTAL: Number of Manuscripts: Books Received Book TOTAL: Received Book Chapter TOTAL: Patents Submitted Methods, systems and computer readable media for detecting command injection attacks System, Method & Computer Readable Medium for Software Protection via Composable Process-level Virtual Machines Patents Awarded Awards Best paper award for "Software Protection for Dynamically-generated Code at 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop, Rome,Italy, January 2013.
7 Graduate Students NAME PERCENT_SUPPORTED Matthew Hall 1.00 FTE Equivalent: 1.00 Total Number: 1 Discipline Names of Post Doctorates NAME PERCENT_SUPPORTED FTE Equivalent: Total Number: Names of Faculty Supported NAME PERCENT_SUPPORTED National Academy Member Jack W. Davidson 0.08 No Jason D. Hiser 0.05 John C. Knight 0.02 FTE Equivalent: Total Number: Names of Under Graduate students supported NAME PERCENT_SUPPORTED FTE Equivalent: Total Number: Student Metrics This section only applies to graduating undergraduates supported by this agreement in this reporting period The number of undergraduates funded by this agreement who graduated during this period: The number of undergraduates funded by this agreement who graduated during this period with a degree in science, mathematics, engineering, or technology fields: The number of undergraduates funded by your agreement who graduated during this period and will continue to pursue a graduate or Ph.D. degree in science, mathematics, engineering, or technology fields:... Number of graduating undergraduates who achieved a 3.5 GPA to 4.0 (4.0 max scale): Number of graduating undergraduates funded by a DoD funded Center of Excellence grant for Education, Research and Engineering: The number of undergraduates funded by your agreement who graduated during this period and intend to work for the Department of Defense The number of undergraduates funded by your agreement who graduated during this period and will receive scholarships or fellowships for further studies in science, mathematics, engineering or technology fields: Names of Personnel receiving masters degrees 0.00 NAME Matthew Hall Total Number: 1
8 Names of personnel receiving PHDs NAME Total Number: Names of other research staff NAME PERCENT_SUPPORTED FTE Equivalent: Total Number: Sub Contractors (DD882)
9 Inventions (DD882) 5b: Methods, systems and computer readable media for detecting command injection attacks Patent Filed in US? (5d-1) Y Patent Filed in Foreign Countries? (5d-2) N Was the assignment forwarded to the contracting officer? (5e) Foreign Countries of application (5g-2): 5a: Anh Nguyen-Tuong 5f-1a: University of Virginia 5f-c: 85 Engineer's Way Charlottesville VA a: Jason D. Hiser 5f-1a: University of Virginia 5f-c: 85 Engineer's Way Charlottesville VA a: Michele Co 5f-1a: University of Virginia 5f-c: 85 Engineer's Way Charlottesville VA a: John C. Knight 5f-1a: University of Virginia 5f-c: 85 Engineer's Way Charlottesville VA a: Jack W. Davidson 5f-1a: University of Virginia 5f-c: 85 Engineer's Way Charlottesville VA N 5b: System, Method & Computer Readable Medium for Software Protection via Composable Process-level Virtual Machines Patent Filed in US? (5d-1) Y Patent Filed in Foreign Countries? (5d-2) N Was the assignment forwarded to the contracting officer? (5e) Foreign Countries of application (5g-2): 5a: Jack W. Davidson 5f-1a: University of Virginia 5f-c: 85 Engineer's Way Charlottesville VA Y
10 5a: Jason D. Hiser 5f-1a: University of Virginia 5f-c: 85 Engineer's Way Charlottesville VA a: Sudeep Ghosh 5f-1a: University of Virginia 5f-c: 85 Engineer's Way Charlottesville VA See Attachment See Attachment Scientific Progress Technology Transfer
11 Research Area 5: Securing Untrusted Binaries with Acceptance Testing and Field Monitor Proposal Number CS Jack W. Davidson, University of Virginia Objective A major problem for the Army is the inability of software testing to produce full trust in a software system, and the resulting need to deploy software that is untrusted and thus subject to malicious attack and failure. This research has aimed to increase the trustworthiness of software at deployment, while providing an environment in which the (still not fully trusted) software can operate safely after deployment despite the presence of malware or exploitable vulnerabilities. In particular, this research has: Developed methods to ensure that portions of an untrusted program that have not undergone thorough acceptance testing (which could include time bombs, logic bombs, back doors, viruses, etc.) cannot be executed in an insecure manner, Allowed installation and distribution of untrusted software such that use of the software helps define normal behavior of the program, without compromising system security, and Provided mechanisms that allow the system administrator to learn about the safe execution of the programs and authorize additional program features postdeployment. Approach Our general approach for providing high levels of software assurance is to logically interpose a small, trusted software component between the application and the operating system (see Figure 1) and use this component to enforce specific program properties to ensure the proper operation of the software application and prevent vulnerabilities, either intentionally or unintentionally designed or inserted as part of the software, from being exercised intentionally (by a malicious adversary) or unintentionally (by a nonmalicious user). The trusted software component, called Strata, is a highly efficient software dynamic translator that provides facilities for efficiently monitoring and dynamically modifying a program as it executes. The key idea is to use the acceptance-testing phase of the software lifecycle to determine the program properties that characterize the normal behavior (i.e., non-malicious) behavior of the application. After acceptance testing, the application, a characterization of its acceptable behavior, and a Strata-based Field Certification Software Dynamic Translator (FC-SDT) is deployed. FC-SDT ensures that the application can only perform operations that were determined or specified during the acceptance-testing phase. The following sections provides more details about the various components and the research challenges that must be addressed for field certification to be a viable approach for deploying potentially untrusted code.
12 Application Trusted Interposition Agent (Strata) Program Properties Host OS and CPU Figure 1: Trusted software layer interposed between the application and the OS. Scientific Opportunities and Barriers The performed research has worked to address many research opportunities and challenges, including: Determining the run-time properties and behaviors that characterize operation of each of several classes of malware (e.g., Trojan horses, back doors, time bombs, logic bombs, viruses, code injection attacks, arc-injection attacks, etc.), Determining the synergy possible between static and dynamic analyses in the identification, observation and enforcement of program properties, Developing appropriate criteria and mechanisms for determining whether the predeployment testing phases has sufficiently established normal application behavior, Determining the run-time properties and behaviors that can be disallowed without generating false positives for non-malicious applications, Determining run-time enforcement policies for each suspicious or malicious behaviors that will achieve the goal of thwarting malware while not disrupting normal program use, Determining the interaction between higher-level monitoring and lower-level monitoring policies, and Developing ways to structure and convey information between the acceptance testing and the field certification components. Significance The Army needs high assurance that the programs it uses on sensitive data or for military applications cannot execute malicious code. This requirement has previously limited the use of uncertified programs. Our techniques allow uncertified software on many more systems with a significantly improved level of security. We believe that the concept of using acceptance testing to define the normal behavior of a program is a significant advancement to the state of the art of software assurance. Delaying full certification of the software until
13 post- deployment provides the unique ability to safely execute an uncertified program in an environment with secure data. Accomplishments We have made significant progress during our work on the project. In particular, we have: Designed a system for collecting traces of the application to help characterize normal behavior. In each mechanism, we have traces that end at a system call that contain various useful information. In particular, we have focused on a variety of information to hold within the trace: o System call execution, o Function invocation, o Basic block execution, and o Call stack history. To help assist the acceptance tester, we have used automatic test generation techniques. In particular, we have used "concolic" execution and fuzzing of the program to generate high-coverage acceptance testing. We have identified a key issue in determining normal behavior of a program based on recording program traces. This problem is generally label as path explosion, relating to the potentially infinite number of possible program executions. We find that even a single input has sources of randomness that result in a large number of paths due to system calls such as time(), date(), gettid(), getuid(), etc. We used the system to produce a prototype system for handling a special class of uncertified software that is widely used browser plug-ins. The system, called COMB (Component-Oriented Monitoring of Binaries), provides fine-grained monitoring of these untrusted components. The system is unique in that it uses context information collected as the application runs to determine which components are executing and apply component-specific security policies. A paper describing a preliminary prototype was presented at the Information Security and Cybercrime track at the 44 th International Hawaii Conference on System Sciences. 1 We have investigated several mechanisms for dealing with the "path explosion problem", a situation that potentially lead to an infinite number of possible paths through a program, and practically results in a very large number of program paths. In particular, we have investigated: Limiting the length of the path, Summarizing paths using regular expressions, Using paths of length 1, which is equivalent to characterizing which basic blocks in a program represent normal behavior, and Combining the above with call stack history. 1 R. Rajkhumar, A. Wang, J. D. Hiser, A. Nguyen-Tuong, J. W. Davidson, and J. C. Knight. Component-Oriented Monitoring of Binaries for Security. Proceedings of the 44 th Hawaii International Conference on System Sciences, Kauai, HI, January 2011, pp
14 Findings indicate that it very challenging to fully characterize all of a program, even with help from an acceptance tester and automatic test generation techniques. Consequently, we have extended our system design to include mechanisms to automatically and safely allow continued execution of unsafe program portions. We have preliminary results on a variety of continued execution techniques that prevent malicious programs from controlling the system when online detection mechanisms: When branch instruction in the program attempts to jump to unsafe or unauthorized code, we can force the program to transfer control to a tested or known-good target of the branch. We have several example programs where this mechanism yields programs that continue to operate correctly, and other programs where appropriate error-handling messages are reported. When a branch instruction in a program attempts to jump to unsafe or unauthorized code, we can attempt to force the containing function to automatically return an error code. While this technique is still preliminary, we have one example where this may work better than the previous technique. We have ported our initial prototypes based on Strata, to use PEASOUP's Strata/SPRI infrastructure. This change has allowed additional analysis and recovery mechanisms to be implemented on programs shared libraries, not just the main program code. In addition, the integration within this infrastructure allows testing or "vetting" of policies before deployment. Our system design includes mechanisms to automatically and safely allow continued execution of unsafe program portions. We have further refined our initial approaches with the deeper analysis of the PEASOUP infrastructure to yield more precise mechanisms for continued execution when unsafe code is detected. These include: o Detecting the functions with unsafe code, and determining characteristics of the function, such as the return type (integer, string, struct, array, float, etc.) o Characterize common, safe return values from functions with unsafe code (i.e., return -1 as an error code or create an empty string.) o For functions with complex return types (i.e., a function which returns a pointer to a structure with an array inside), our characterization technique can also tractably analyze the type, and construct appropriate complex return values. Our conversion to use PEASOUP's Strata/SPRI infrastructure has allowed us to test and evaluate our approach on larger bodies of code, such as SPEC's CPU2006 benchmark suite. Initial findings are promising: o Several benchmarks are characterized completely -- that is, no unsafe code is detected on new inputs. o On other benchmarks, continued execution techniques are successful on several benchmarks. o While our technique does yet not handle several programs, we have investigated the failures and anticipate that there are only a few causes of error, and simple extensions can resolve these issues. Our system design includes mechanisms to automatically and safely allow continued execution of unsafe program portions. We have further refined our initial approaches with the deeper analysis of the PEASOUP infrastructure to yield more precise mechanisms for continued execution when unsafe code is detected. These include:
15 o After detecting the functions with unsafe code, determining characteristics of the function (such as the return type), and characterizing common return values, we have evaluated the effectiveness of returning a constant value. Key findings Returning constant values from functions that return integers is often effective at keeping the program running and useful. However, returning NULL from a function that returns a pointer is often ineffective. Furthermore, returning a pointer to zeroed memory is also ineffective. o Programs often expect pointers to be return from a function with particular properties. For example, a function that returns a pointer to a list node may expect that the node has a valid pointer to the node's data. We explored a profiling technique to determine the structure of data that is returned from unsafe functions. Key finding Structure of the memory pointed to by returned pointers is important. We have continued work on converting our techniques to use PEASOUP's Strata/SPRI infrastructure. Testing on larger bodies of code, such as SPEC's CPU2006 benchmark suite have revealed issues and challenges that were unanticipated. Our results have lead us to a variety of findings: o Our techniques are now operating correctly on the entire SPEC CPU2006 benchmark suite, indicating we can analyze and protect common coding constructs, compiler idioms, and instruction sequences. Key finding Handling the entire instruction set systematically is important. o Our techniques still detect that some program blocks are unsafe. Key finding It is unlikely that we all code can be proven safe a priori. Recovery techniques that protect the program while not executing unsafe code will be necessary. We extended the Field Certification Strata/SPRI infrastructure to support 64-bit code. This allows us to test a wider variety of applications, and also increases transition opportunities. We published two papers related to the technology developed under the ARO contract. These papers were presented at the 10 th European Dependable Computing Conference in May They are: Framework for Creating Binary Rewriting Tools, J. D. Hiser, A. Nguyen- Tuong, M. Co, B. Rodes, M. Hall, C. L. Coleman, J. C. Knight, and J. W. Davidson. This paper describes a language and framework for rewriting arbitrary binaries so that code that checks and enforces security properties can be easily inserted into the binary either statically or dynamically.
16 To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing, A. Nguyen-Tuong, J. D. Hiser, M. Co, J. W. Davidson, J. C. Knight. The paper describes an innovative and powerful approach that prevents malicious adversaries from executing malicious code within a binary. The approach is inspired by DNA shotgun sequencing that efficiently assembles potential fragments of code to determine if command may be malicious or not. A provisional patent has been filed covering the technique (PCT/US2013/ entitled "Methods, Systems and Computer Readable Media for Detecting Command Injection Attacks "). We are extending this technique to handle SQL-injection attacks against web applications. These attacks are #1 on Mitre's list of CWE/SANS list of top 25 Most Dangerous Software Errors and #2 on OWASP's list of Top 10 Most Dangerous Software Errors. Collaborations and Leveraged Funding We have been able to leverage other funding sources and collaborations in a variety of ways. In our Multi-University Research Initiative (MURI) project, called Helix, we have developed several techniques and prototypes that we have leveraged in this project. o First, we have the implemented a shadow stack. The shadow stack is technology to monitor the program's activation stack and make shadow copies of return addresses on the stack. We used this low-overhead technology for Field Certification to record or verify the current activation record trace at system call points. o To deal with arbitrary binaries, the MURI project developed a tool called the Stratafier. The Stratafier inserts the Strata library into any binary so that the program will run under control of Strata. We have needed this technology to meet our goal of dealing with arbitrary binaries. In our AFRL-funded project, called Kevlar, we have seen significant hardening and extension of the base technology used for Field Certification: o We have improved Strata and the Stratafier to be near-production quality, ready for large-scale deployment. The technology now can safely deal with almost any program, including programs that 1) use signal handling (including nested signal handing), 2) throw exceptions, 3) demand high performance, 4) use threading, 5) use interprocess communication, 6) use the network, and many other program idioms. o Further extended the SPRI interface to include a callback mechanism, useful for monitoring function or system calls for potentially malicious parameters. o Part of the Kevlar project is to port current technologies to a Windows platform, further extending reach of the base technology for Field Certification. Windows support will greatly enhance the impact of Field Certification.
17 Another project that we are working on is called Preventing Exploits Against Software of Unknown Provenance (PEASOUP). Our collaboration with this project has yielded several interesting results. o PEASOUP deals extensively with concolic testing and smart fuzzing. We have done preliminary investigation for using this technology for Field Certification, but plan to use it more extensively in the next year. o We have also developed a program rewriting interface for Strata that we call SPRI. We plan to use this interface to help prevent malicious time bombs, logic bombs, and other malicious codes from becoming active and resulting in system compromise. Conclusions Field certification is a paradigm shift in the traditional software development lifecycle and would represent a significant advancement to the state of the art in software assurance. Extending the certification process to include post-deployment provides the ability to safely executed untrusted code in Army critical applications. Our progress to date includes several mechanisms and observations about characterizing an application, as well as investigating preliminary approaches to assisting the acceptance test engineers in their duties. We have identified several key problems in characterizing applications, including the path explosion problem. Further, we have layed out plans to explore these issues in the upcoming year. Technology Transfer Our techniques are predicated on the ability to perform low overhead software dynamic translation as an application runs. This technology, although still emerging, is already in use in industry and has demonstrated its ability to perform reliably and efficiently. Previous work in this area has yielded two patent applications. Consequently, we believe, once completed, that our techniques could be practically applied in a variety of realms with minimal future research effort. Both PIs have companies (Davidson-Zephyr Software; Knight-Dependable Computing) that are actively engaged in commercialization of these technologies through aggressive pursuit of relevant Small Business Innovative Research (SBIR) funds as well as strategic partnerships with larger companies (e.g., Raytheon, SAIC, Symantec). Zephyr Software has now received two Phase II SBIR contracts. The first is being award by the Office of Naval Research. The title of the project, "Preventing Program Hijacking via Static and Dynamic Analysis" takes the techniques developed as part of this Army Research Office project and applies it to prevent a very common mode of attack used by malware subverting control flow of the application to effect malicious actions. Our industrial partner on this project is Raytheon, IDS Cyber Solutions and Integration Division.
18 In February 2014, Zephyr Software was selected by DARPA for Phase II funding of the project, "Embedded Systems Protection." The focus of this project is to deal with the challenges of protecting embedded systems, which often have major constraints such as memory constraints, real-time constraints, and power constraints that must be considered when protecting them. Our industrial partner is Raytheon, IDS Cyber Solutions and Integration Division.
REPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
Curriculum Vitae. Jason D. Hiser Department of Computer Science Phone: (434)284-2214 85 Engineer s Way Fax: (434)982-2214
Curriculum Vitae Jason D. Hiser Department of Computer Science Phone: (434)284-2214 85 Engineer s Way Fax: (434)982-2214 P.O. Box 400740 Email: [email protected] Charlottesville, VA 22904-4740 http://www.cs.virginia.edu/
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
DEFENSE CONTRACT AUDIT AGENCY
DEFENSE CONTRACT AUDIT AGENCY Fundamental Building Blocks for an Acceptable Accounting System Presented by Sue Reynaga DCAA Branch Manager San Diego Branch Office August 24, 2011 Report Documentation Page
Overview Presented by: Boyd L. Summers
Overview Presented by: Boyd L. Summers Systems & Software Technology Conference SSTC May 19 th, 2011 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation Mathias Payer, ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application
Report Documentation Page
(c)2002 American Institute Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216 A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure J. Darrell Morgeson Jason A. Dechant Yev Kirpichevsky
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation 21-23 June 2005, at US Military Academy, West Point, NY 712CD For office use only 41205 Please complete this form 712CD as your cover
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center Technical Report - Final Award Number N00014-03-1-0844 Mod.
EAD Expected Annual Flood Damage Computation
US Army Corps of Engineers Hydrologic Engineering Center Generalized Computer Program EAD Expected Annual Flood Damage Computation User's Manual March 1989 Original: June 1977 Revised: August 1979, February
FIRST IMPRESSION EXPERIMENT REPORT (FIER)
THE MNE7 OBJECTIVE 3.4 CYBER SITUATIONAL AWARENESS LOE FIRST IMPRESSION EXPERIMENT REPORT (FIER) 1. Introduction The Finnish Defence Forces Concept Development & Experimentation Centre (FDF CD&E Centre)
A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach
A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach Cynthia E. Irvine and Timothy E. Levin Department of Computer Science, Naval Postgraduate
Asset Management- Acquisitions
Indefinite Delivery, Indefinite Quantity (IDIQ) contracts used for these services: al, Activity & Master Plans; Land Use Analysis; Anti- Terrorism, Circulation & Space Management Studies; Encroachment
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management James W. Bilbro JB Consulting International Huntsville, AL Multi-dimensional Assessment of Technology Maturity Technology
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples
AD Award Number: W81WH-07-1-0069 TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples PRINCIPAL INVESTIGATOR: Sally L. Maliski, Ph.D., R.N. CONTRACTING ORGANIZATION:
REPORT DOCUMENTATION PAGE
#$%&&%_%&& #& ' ( )* +&&&, -* +&&. REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 Public Reporting burden for this collection of information is estimated to average 1 hour per response, including
AFRL-RX-WP-TP-2008-4023
AFRL-RX-WP-TP-2008-4023 HOW KILLDEER MOUNTAIN MANUFACTURING IS OPTIMIZING AEROSPACE SUPPLY CHAIN VISIBILITY USING RFID (Postprint) Jeanne Duckett Killdeer Mountain Manufacturing, Inc. FEBRUARY 2008 Final
DCAA and the Small Business Innovative Research (SBIR) Program
Defense Contract Audit Agency (DCAA) DCAA and the Small Business Innovative Research (SBIR) Program Judice Smith and Chang Ford DCAA/Financial Liaison Advisors NAVAIR 2010 Small Business Aviation Technology
John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011
John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the
MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS
MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS E. E. Eilertson*, L. Ertoz, and V. Kumar Army High Performance Computing Research Center Minneapolis, MN 55414 K. S. Long U.S. Army Research Laboratory
ADVANCED NETWORK SECURITY PROJECT
AFRL-IF-RS-TR-2005-395 Final Technical Report December 2005 ADVANCED NETWORK SECURITY PROJECT Indiana University APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AIR FORCE RESEARCH LABORATORY INFORMATION
Fine-Grained User-Space Security Through Virtualization. Mathias Payer and Thomas R. Gross ETH Zurich
Fine-Grained User-Space Security Through Virtualization Mathias Payer and Thomas R. Gross ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application access
Algorithmic Research and Software Development for an Industrial Strength Sparse Matrix Library for Parallel Computers
The Boeing Company P.O.Box3707,MC7L-21 Seattle, WA 98124-2207 Final Technical Report February 1999 Document D6-82405 Copyright 1999 The Boeing Company All Rights Reserved Algorithmic Research and Software
Implementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
Network Security Using Job Oriented Architecture (SUJOA)
www.ijcsi.org 222 Network Security Using Job Oriented Architecture (SUJOA) Tariq Ahamad 1, Abdullah Aljumah 2 College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA ABSTRACT In
Headquarters U.S. Air Force
Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Air Force Technology Readiness Assessment (TRA) Process for Major Defense Acquisition Programs LtCol Ed Masterson Mr
(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.
(General purpose) Program security These ideas apply also to OS and DB. Read Chapter 3. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.
RT 24 - Architecture, Modeling & Simulation, and Software Design
RT 24 - Architecture, Modeling & Simulation, and Software Design Dennis Barnabe, Department of Defense Michael zur Muehlen & Anne Carrigy, Stevens Institute of Technology Drew Hamilton, Auburn University
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP By Dr. Carl M. Powe, Jr. 2-3 March 2005 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
PREPARED FOR: U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland 21702-5012
AD Award Number: W81XWH-10-1-0957 TITLE: PRINCIPAL INVESTIGATOR: Andrea L. Behrman, Ph.D., P.T. CONTRACTING ORGANIZATION: University of Florida Gainesville, FL 32611 REPORT DATE: October 2011 TYPE OF REPORT:
Integrated Force Method Solution to Indeterminate Structural Mechanics Problems
NASA/TP 2004-207430 Integrated Force Method Solution to Indeterminate Structural Mechanics Problems Surya N. Patnaik Ohio Aerospace Institute, Brook Park, Ohio Dale A. Hopkins and Gary R. Halford Glenn
Interagency National Security Knowledge and Skills in the Department of Defense
INSTITUTE FOR DEFENSE ANALYSES Interagency National Security Knowledge and Skills in the Department of Defense June 2014 Approved for public release; distribution is unlimited. IDA Document D-5204 Log:
DATA ITEM DESCRIPTION
DATA ITEM DESCRIPTION Form Approved OMB NO.0704-0188 Public reporting burden for collection of this information is estimated to average 110 hours per response, including the time for reviewing instructions,
Intrusion Detection via Static Analysis
Intrusion Detection via Static Analysis IEEE Symposium on Security & Privacy 01 David Wagner Drew Dean Presented by Yongjian Hu Outline Introduction Motivation Models Trivial model Callgraph model Abstract
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System
AirGap The Technology That Makes Isla a Powerful Web Malware Isolation System Introduction Web browsers have become a primary target for cyber attacks on the enterprise. If you think about it, it makes
Award Number: W81XWH-10-1-0739
AD Award Number: W81XWH-10-1-0739 TITLE: Voxel-Wise Time-Series Analysis of Quantitative MRI in Relapsing-Remitting MS: Dynamic Imaging Metrics of Disease Activity Including Prelesional Changes PRINCIPAL
A GPS Digital Phased Array Antenna and Receiver
A GPS Digital Phased Array Antenna and Receiver Dr. Alison Brown, Randy Silva; NAVSYS Corporation ABSTRACT NAVSYS High Gain Advanced GPS Receiver (HAGR) uses a digital beam-steering antenna array to enable
Embedded/Real-Time Software Development with PathMATE and IBM Rational Systems Developer
Generate Results. Real Models. Real Code. Real Fast. Embedded/Real-Time Software Development with PathMATE and IBM Rational Systems Developer Andreas Henriksson, Ericsson [email protected]
An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation
NASA/TM 2005-213568 An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation Steve Bauman Glenn Research Center, Cleveland, Ohio March 2005 The NASA STI Program Office... in Profile
N-Variant Systems. Slides extracted from talk by David Evans. (provenance in footer) http://www.cs.virginia.edu/evans/sdwest
1 N-Variant Systems Slides extracted from talk by David Evans (provenance in footer) 2 Inevitability of Failure Despite all the best efforts to build secure software, we will still fail (or have to run
Eugene Tsyrklevich. Ozone HIPS: Unbreakable Windows
Eugene Tsyrklevich Eugene Tsyrklevich has an extensive security background ranging from designing and implementing Host Intrusion Prevention Systems to training people in research, corporate, and military
Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX)
NASA/CR 2005-213422 AIAA 2004 6361 Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX) William A. Maul, Amy Chicatelli, and Christopher E. Fulton Analex
CONTRACTING ORGANIZATION: University of Alabama at Birmingham Birmingham, AL 35294
AD Award Number: W81XWH-08-1-0030 TITLE: Regulation of Prostate Cancer Bone Metastasis by DKK1 PRINCIPAL INVESTIGATOR: Gregory A. Clines, M.D., Ph.D. CONTRACTING ORGANIZATION: University of Alabama at
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Why should I care about PDF application security?
Why should I care about PDF application security? What you need to know to minimize your risk Table of contents 1: Program crashes present an opportunity for attack 2: Look for software that fully uses
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
DEFENSE BUSINESS PRACTICE IMPLEMENTATION BOARD
Defense Business Practice Implementation Board DEFENSE BUSINESS PRACTICE IMPLEMENTATION BOARD Report to the Senior Executive Council, Department of Defense MANAGEMENT INFORMATION TASK GROUP Report FY02-3
Cyber Security Training and Awareness Through Game Play
Cyber Security Training and Awareness Through Game Play Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, and Thuy D. Nguyen Naval Postgraduate School, Monterey, CA 93943, USA {bdcone,mfthomps,irvine,tdnguyen}@nps.edu
Intelligence Community Public Key Infrastructure (IC PKI)
Intelligence Community Public Key Infrastructure (IC PKI) 2002 The MITRE Corporation This technical data was produced for the U.S. Government under contract 99-G000109-000, and is subject to the Rights
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
THE FLATWORLD SIMULATION CONTROL ARCHITECTURE (FSCA): A FRAMEWORK FOR SCALABLE IMMERSIVE VISUALIZATION SYSTEMS
THE FLATWORLD SIMULATION CONTROL ARCHITECTURE (FSCA): A FRAMEWORK FOR SCALABLE IMMERSIVE VISUALIZATION SYSTEMS Anton Treskunov, Jarrell Pair*, and Bill Swartout Institute for Creative Technologies University
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND. Ready. Resourceful. Responsive!
~ IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND Ready. Resourceful. Responsive! Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated
Abstract. 1. Introduction. 2. Threat Model
Beyond Ring-3: Fine Grained Application Sandboxing Ravi Sahita ([email protected]), Divya Kolar ([email protected]) Communication Technology Lab. Intel Corporation Abstract In the recent years
Obsolescence Considerations for Materials in the Lower Sub-Tiers of the Supply Chain
INSTITUTE FOR DEFENSE ANALYSES Obsolescence Considerations for Materials in the Lower Sub-Tiers of the Supply Chain Jay Mandelbaum Christina M. Patterson April 2015 Approved for public release; distribution
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Coverity White Paper. Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing
Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing The Stakes Are Rising Security breaches in software and mobile devices are making headline news and costing companies
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems
Cyber Adversary Characterization. Know thy enemy!
Cyber Adversary Characterization Know thy enemy! Brief History of Cyber Adversary Modeling Mostly Government Agencies. Some others internally. Workshops DARPA 2000 Other Adversaries, RAND 1999-2000 Insider
Advanced Micro Ring Resonator Filter Technology
Advanced Micro Ring Resonator Filter Technology G. Lenz and C. K. Madsen Lucent Technologies, Bell Labs Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
UML-based Test Generation and Execution
UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA [email protected] ABSTRACT
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
NAVSUP FLC NORFOLK PHILADELPHIA OFFICE
NAVSUP FLC NORFOLK PHILADELPHIA OFFICE Gerald Furey Deputy for Small Business Ready. Resourceful. Responsive! 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the
Cybersecurity on a Global Scale
Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Guide to Using DoD PKI Certificates in Outlook 2000
Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group Author: Margaret Salter Updated: April 6, 2001 Version 1.0 National Security Agency 9800 Savage Rd.
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
DATA ITEM DESCRIPTION
DD Form 1664, APR 89 Previous editions are obsolete Page 1 of 4 Pages 135/123 DATA ITEM DESCRIPTION Form Approved OMB NO.0704-0188 Public reporting burden for collection of this information is estimated
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Frontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
IA-64 Application Developer s Architecture Guide
IA-64 Application Developer s Architecture Guide The IA-64 architecture was designed to overcome the performance limitations of today s architectures and provide maximum headroom for the future. To achieve
