Code Obfuscation. Mayur Kamat Nishant Kumar
|
|
|
- Julia Perkins
- 9 years ago
- Views:
Transcription
1 Code Obfuscation Mayur Kamat Nishant Kumar
2 Agenda Malicious Host Problem Code Obfuscation Watermarking and Tamper Proofing Market solutions
3 Traditional Network Security Problem Hostile Network
4 Malicious Host Hostile Network Hostile User
5 Motivation Intellectual Property Protection Under threat in various forms Reverse engineering Tampering Software Piracy Loss of revenue and finally an overall loss
6 Code under Attack Tampering Reverse Engineering Software Piracy
7 Legal battles No Electronic Theft (NET) Protection Digital Millennium Copyright Act (DMCA) Technical Protection Server-Side Protection Encryption Native Code Obfuscation
8 Server-Side Protection
9 Encryption
10 Native Code
11 Obfuscation
12 Definition T P P is an obfuscating transformation if If P fails to terminate or terminates with error, then P may or may not terminate Otherwise, P must terminate and produce same output as P
13 Measuring Obfuscation Obfuscation can be measured as sum of the following: Potency ( E(P )/E(P) 1) Resilience ( trivial, weak, strong, full, 1-way) Cost ( free, cheap, costly, dear ) Stealth
14 Forget about good software engineering principles
15 Software metrics Complexity of software increases: Program length No. of operators and operands. Data flow complexity Number of inter-block variable references. Cyclomatic complexity Number of predicates in a function. Nesting complexity Number of nesting level of conditionals in a program.
16 Software metrics Data structure complexity Complexity of the static data structures in the program like variables, vectors, records. OO Metrics Level of inheritance Coupling Number of methods triggered by another method Non-cohesiveness
17 Obfuscation Categories Layout Obfuscation Data Obfuscation Control Obfuscation Preventive Obfuscation
18 Layout Obfuscation Aimed at making the code unreadable Formatting Change (low, one-way, free) Layout Remove Comments (high, one-way, free) Scramble Identifiers (high, one-way, free)
19 Data Obfuscation Aimed at obscuring data and data structures Storage Data Obfuscation Aggregation Ordering Encoding
20 Storage & Encoding - 1 Split variables Transform single variable : v = [(v1, v2.. vk)] Increases Potency Required to provide extra functions for variable mapping ( higher cost) Original Bool a, b, c a = true, b = false, c = true Obfuscated Short a1, a2, a3, b1, b2, c1, c2 a1 = a2=a3 = true,.. c = a & b c1 = ( (a1 ^ a2 ) ^ a3) & ( b1 ^ b2) c2 = c1
21 Storage and Encoding- 2 Convert Static into Procedural Lots of information conveyed through static variables Convert into function call High potency and resilience ( depends on function) Actual String t = Net Obfuscated String retstr(int i) { string s; s[1] = N ; s[2] = e ; s[3] = t ;}
22 Storage and Encoding- 3 Other important methods are Scalers to Objects Changing encoding Changing Variable Lifetimes.
23 Array Transformation Modifying Inheritance Merging scalar variables Aggregation & Reordering - 1 Reordering execution sequence
24 Array Transformation Aggregation & Reordering - 2 Splitting & folding ( increases potency) Merging & flattening ( decreases potency) Actual Obfuscated
25 Aggregation & Reordering - 3 Inheritance Split a class
26 Aggregation & Reordering - 4 Inheritance Insert a class
27 Control Obfuscation Aimed at obfuscating the flow of execution Aggregation Control Ordering Computation
28 Opaque Construct Obfuscator knows the outcome but very hard for de-obfuscator to predict. Makes it resilient Makes it costly adding additional code. { } int v, a= 5, b= 6; v =11 = a + b; if ( b > 5 ) T if ( random ( 1, 5) < 0 ) F.
29 Redundant Code Introducing opaque predicates Introducing multiple obfuscated loops Introducing buggy loops
30 Inline and Outline Inline: removes procedural abstraction. Outline: creates bogus procedural abstraction. High resilience
31 Cloning Other Control Obfuscation methods Interleaving Methods Non-reducible Flow Graphs
32 Preventive Obfuscation Works by trying to break the known deobfuscation techniques. Preventive Targeted Inherent
33 In the example Added bogus data Inherent Prevented de-obfuscator from automatic analysis Actual Code For ( i = 1; i<= 10; i++) A[i] = I; Obfuscated Code Int B[50] For (i=10; i>= 1; i--) { A[i] = I; B[i] += B[i*i/2];}
34 Target It targets specific de-obfuscating programs E.g. HoseMocha example Crashes if we add any code after return statement
35 Cost of obfuscation Execution time Why don t we use obfuscation High program complexity Effort More $$$ Ignorance
36 Solutions to Malicious Host Code Obfuscation Digital Rights Management Tamper -Proofing Watermarking
37 Watermarking Seed = Software Seed = Seed = Seed =
38 Tamper - Proofing Key component of client-side security User is assumed to have sufficient time, resources and inclination to subvert protection Demonstrates need for stronger protection against reverse engineering
39 Tamper-Proofing Reverse Engineering Attack P S P S T P Software Auth Module (SAM) Tamper-Proof SAM
40 Commercial Applications Code Obfuscators Zelix Klassmaster Semantic Design Digital Rights Management Windows RMS Lockbox Apple s itunes Tamper Proofing Cloakware Watermarking Digimarc
41 Conclusion Malicious host presents new security threats Code obfuscation makes reverse engineering difficult Watermarking and tamper-proofing address issues of software piracy and tampering respectively Still an inchoative field
42 References [1] Collberg, C., Thomberson, C., Low, D., A Taxonomy of Obfuscating Transformation, Technical Report # 148, 1997 [2] Wang, C., A Security Architecture of Survivability Mechanisms, PhD thesis, University of Virginia, October 2000 [3] Wroblewski, G., General Method of Program Code Obfuscation, Wrowclaw, 2002 [4] Collberg, C., Thomberson, C., Watermarking, Tamperproofing, and Obfuscation Tools for Software protection, 2002
43
Software Protection through Code Obfuscation
Software Protection through Code Obfuscation Dissertation submitted in partial fulfillment of the requirements for the degree of Master of Technology, Computer Engineering by Aniket Kulkarni Roll No: 121022016
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture *
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture * Seongje Cho, Hyeyoung Chang, and Yookun Cho 1 Dept. of Computer Science & Engineering, Dankook University,
Introduction to Program Obfuscation
Introduction to Program Obfuscation p. 1/26 Introduction to Program Obfuscation Yury Lifshits Saint-Petersburg State University http://logic.pdmi.ras.ru/ yura/ [email protected] Introduction to Program
Code Obfuscation Literature Survey
Code Obfuscation Literature Survey Arini Balakrishnan, Chloe Schulze CS701 Construction of Compilers, Instructor: Charles Fischer Computer Sciences Department University of Wisconsin, Madison December
Software Code Protection Through Software Obfuscation
Software Code Protection Through Software Obfuscation Presented by: Sabu Emmanuel, PhD School of Computer Engineering Nanyang Technological University, Singapore E-mail: [email protected] 20, Mar,
SOURCE CODE OBFUSCATION BY MEAN OF EVOLUTIONARY ALGORITHMS
SOURCE CODE OBFUSCATION BY MEAN OF EVOLUTIONARY ALGORITHMS Sébastien Martinez 2011 Tutor : Sébastien Varrette Advisor : Benoît Bertholon University of Luxembourg, Faculty of Sciences, Technologies and
Applications of obfuscation to software and hardware systems
Applications of obfuscation to software and hardware systems Victor P. Ivannikov Institute for System Programming Russian Academy of Sciences (ISP RAS) www.ispras.ru Program obfuscation is an efficient
Lecture 12: Software protection techniques. Software piracy protection Protection against reverse engineering of software
Lecture topics Software piracy protection Protection against reverse engineering of software Software piracy Report by Business Software Alliance for 2001: Global economic impact of software piracy was
Obfuscation of Abstract Data-Types
Obfuscation of Abstract Data-Types Stephen Drape St John s College Thesis submitted for the degree of Doctor of Philosophy at the University of Oxford Trinity Term 2004 Obfuscation of Abstract Data Types
Obfuscating C++ Programs via Control Flow Flattening
Obfuscating C++ Programs via Control Flow Flattening Tímea László and Ákos Kiss University of Szeged, Department of Software Engineering Árpád tér 2., H-6720 Szeged, Hungary [email protected],
OBFUSCATING C++ PROGRAMS VIA CONTROL FLOW FLATTENING
Annales Univ. Sci. Budapest., Sect. Comp. 30 (2009) 3-19 OBFUSCATING C++ PROGRAMS VIA CONTROL FLOW FLATTENING T. László and Á. Kiss (Szeged, Hungary) Abstract. Protecting a software from unauthorized access
Design of Java Obfuscator MANGINS++ - A novel tool to secure code
J. Comp. & Math. Sci. Vol. 1 (6), 646-652 (2010) Design of Java Obfuscator MANGINS++ - A novel tool to secure code HARSHA VARDHAN RAJENDRAN, CH KALYAN CHANDRA and R. SENTHIL KUMAR School of Computing Sciences
Obfuscation: know your enemy
Obfuscation: know your enemy Ninon EYROLLES [email protected] Serge GUELTON [email protected] Prelude Prelude Plan 1 Introduction What is obfuscation? 2 Control flow obfuscation 3 Data flow
Using Evolutionary Algorithms to obfuscate code
Using Evolutionary Algorithms to obfuscate code Benoît Bertholon 1, Sébastien Varrette 2 et Pascal Bouvry 2 1 Security and Trust (SnT) interdisciplinary center, 2 Computer Science and Communication (CSC)
Platform Independent Code Obfuscation
Platform Independent Code Obfuscation OSKAR ARVIDSSON Master s Thesis at CSC Supervisor: Mikael Goldmann Examiner: Johan Håstad TRITA xxx yyyy-nn Abstract Code obfuscation is a technique used to make software
Surreptitious Software
Surreptitious Software Obfuscation, Watermarking, and Tamperproofing for Software Protection Christian Collberg Jasvir Nagra rw T Addison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco
Static Analysis of Virtualization- Obfuscated Binaries
Static Analysis of Virtualization- Obfuscated Binaries Johannes Kinder School of Computer and Communication Sciences École Polytechnique Fédérale de Lausanne (EPFL), Switzerland Virtualization Obfuscation
Obfuscation by Partial Evaluation of Distorted Interpreters
Obfuscation by Partial Evaluation of Distorted Interpreters Neil D. Jones DIKU, University of Copenhagen (prof. emeritus) Joint work with Roberto Giacobazzi and Isabella Mastroeni University of Verona
Software Reverse Engineering
Software Reverse Engineering Jacco Krijnen June 19, 2013 Abstract While reverse engineering probably started with the analysis of hardware, today it plays a significant role in the software world. We discuss
DATA OBFUSCATION. What is data obfuscation?
DATA OBFUSCATION What data obfuscation? Data obfuscations break the data structures used in the program and encrypt literals. Th method includes modifying inheritance relations, restructuring arrays, etc.
Secret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
Introduction to Computers and Programming. Testing
Introduction to Computers and Programming Prof. I. K. Lundqvist Lecture 13 April 16 2004 Testing Goals of Testing Classification Test Coverage Test Technique Blackbox vs Whitebox Real bugs and software
An Iteration Obfuscation Based on Instruction Fragment Diversification and Control Flow Randomization
An Iteration Obfuscation Based on Instruction Fragment Diversification and Control Flow Randomization Xin Xie, Fenlin Liu, Bin Lu, and Fei Xiang Abstract As the control flow graph can reflect the logic
LASTLINE WHITEPAPER. Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade
LASTLINE WHITEPAPER Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade Abstract Malicious code is an increasingly important problem that threatens the security of computer systems. The
C++ INTERVIEW QUESTIONS
C++ INTERVIEW QUESTIONS http://www.tutorialspoint.com/cplusplus/cpp_interview_questions.htm Copyright tutorialspoint.com Dear readers, these C++ Interview Questions have been designed specially to get
Efficient Data Structures for Decision Diagrams
Artificial Intelligence Laboratory Efficient Data Structures for Decision Diagrams Master Thesis Nacereddine Ouaret Professor: Supervisors: Boi Faltings Thomas Léauté Radoslaw Szymanek Contents Introduction...
What is Software Watermarking? Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks
hat is Software atermarking? Software atermarking Through Register Allocation: Implementation, Analysis, and Attacks Ginger Myles Christian Collberg {mylesg,collberg}@cs.arizona.edu University of Arizona
PART-A Questions. 2. How does an enumerated statement differ from a typedef statement?
1. Distinguish & and && operators. PART-A Questions 2. How does an enumerated statement differ from a typedef statement? 3. What are the various members of a class? 4. Who can access the protected members
Next-Generation Protection Against Reverse Engineering
Next-Generation Protection Against Reverse Engineering 4 February 2005 Chris Coakley, Jay Freeman, Robert Dick [email protected]; [email protected]; [email protected] Purpose This white
2) Write in detail the issues in the design of code generator.
COMPUTER SCIENCE AND ENGINEERING VI SEM CSE Principles of Compiler Design Unit-IV Question and answers UNIT IV CODE GENERATION 9 Issues in the design of code generator The target machine Runtime Storage
Overview. What is software testing? What is unit testing? Why/when to test? What makes a good test? What to test?
Testing CMSC 202 Overview What is software testing? What is unit testing? Why/when to test? What makes a good test? What to test? 2 What is Software Testing? Software testing is any activity aimed at evaluating
Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012
Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about
2) trusted network, resilient against large scale Denial of Service attacks
Sam Crooks Network Design Engineer My background is that I have worked in the gaming (as in casinos, gambling), credit card processing industries, consumer credit and related
MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION
Diyala Journal of Engineering Sciences Second Engineering Scientific Conference College of Engineering University of Diyala 16-17 December. 2015, pp. 479-492 ISSN 1999-8716 Printed in Iraq MULTIFACTOR
You are to simulate the process by making a record of the balls chosen, in the sequence in which they are chosen. Typical output for a run would be:
Lecture 7 Picking Balls From an Urn The problem: An urn has n (n = 10) balls numbered from 0 to 9 A ball is selected at random, its' is number noted, it is set aside, and another ball is selected from
A Survey of Anti-Tamper Technologies
A Survey of Anti-Tamper Technologies The unauthorized modification and subsequent misuse of software is often referred to as software cracking. Usually, cracking requires disabling one or more software
Pseudo code Tutorial and Exercises Teacher s Version
Pseudo code Tutorial and Exercises Teacher s Version Pseudo-code is an informal way to express the design of a computer program or an algorithm in 1.45. The aim is to get the idea quickly and also easy
Test case design techniques I: Whitebox testing CISS
Test case design techniques I: Whitebox testing Overview What is a test case Sources for test case derivation Test case execution White box testing Flowgraphs Test criteria/coverage Statement / branch
Introduction to Parallel Programming and MapReduce
Introduction to Parallel Programming and MapReduce Audience and Pre-Requisites This tutorial covers the basics of parallel programming and the MapReduce programming model. The pre-requisites are significant
Higher Computing Science Course Assessment Specification (C716 76)
Higher Computing Science Course Assessment Specification (C716 76) Valid from August 2014 This edition: June 2015, version 1.3 This specification may be reproduced in whole or in part for educational purposes
k-gram Based Software Birthmarks
k-gram Based Software Birthmarks 2005 ACM Symposium on Applied Computing Ginger Myles Christian Collberg Department of Computer Science University of Arizona Tucson, AZ 85721 {mylesg,collberg}@cs.arizona.edu
CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
Assessment of Data Obfuscation with Residue Number Coding
Assessment of Data Obfuscation with Residue Number Coding Biniam Fisseha Demissie, Mariano Ceccato, Roberto Tiella Fondazione Bruno Kessler, Trento, Italy Email: {demissie,ceccato,tiella}@fbk.eu Abstract
Lecture Notes on Linear Search
Lecture Notes on Linear Search 15-122: Principles of Imperative Computation Frank Pfenning Lecture 5 January 29, 2013 1 Introduction One of the fundamental and recurring problems in computer science is
Man at the end (MATE) attacks are an understudied
E X P E R T O P I N I O N Editor: Fei-Yue Wang, Chinese Academy of Sciences, [email protected] Toward Digital Asset Protection Christian Collberg, University of Arizona Jack Davidson, University of Virginia
Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0
Special Publication 500-269 Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0 Paul E. Black Elizabeth Fong Vadim Okun Romain Gaucher Software Diagnostics and
AP Computer Science Java Mr. Clausen Program 9A, 9B
AP Computer Science Java Mr. Clausen Program 9A, 9B PROGRAM 9A I m_sort_of_searching (20 points now, 60 points when all parts are finished) The purpose of this project is to set up a program that will
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Object Oriented Design
Object Oriented Design Kenneth M. Anderson Lecture 20 CSCI 5828: Foundations of Software Engineering OO Design 1 Object-Oriented Design Traditional procedural systems separate data and procedures, and
2 SYSTEM DESCRIPTION TECHNIQUES
2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips Agenda Overview W32/Xpaj analysis Overview of a virtual machine Software protection trends W32/Winemmem analysis W32/Induc
1 Description of The Simpletron
Simulating The Simpletron Computer 50 points 1 Description of The Simpletron In this assignment you will write a program to simulate a fictional computer that we will call the Simpletron. As its name implies
Masters programmes in Computer Science and Information Systems. Object-Oriented Design and Programming. Sample module entry test xxth December 2013
Masters programmes in Computer Science and Information Systems Object-Oriented Design and Programming Sample module entry test xxth December 2013 This sample paper has more questions than the real paper
Oracle Database Security Services
Oracle Database Security Services BUSINESS CHALLENGES Public announcements of major IT security breaches have become an almost daily occurrence. The causes of publicized breaches are diverse and include
Software Metrics. Lord Kelvin, a physicist. George Miller, a psychologist
Software Metrics 1. Lord Kelvin, a physicist 2. George Miller, a psychologist Software Metrics Product vs. process Most metrics are indirect: No way to measure property directly or Final product does not
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Lab Experience 17. Programming Language Translation
Lab Experience 17 Programming Language Translation Objectives Gain insight into the translation process for converting one virtual machine to another See the process by which an assembler translates assembly
AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions
MOBILE APPLICATIONS AGENDA Background The Attack Surface Case Studies Binary Protections Bypasses Conclusions BACKGROUND Mobile apps for everything == lots of interesting data Banking financial Social
Software Testing Strategies and Techniques
Software Testing Strategies and Techniques Sheetal Thakare 1, Savita Chavan 2, Prof. P. M. Chawan 3 1,2 MTech, Computer Engineering VJTI, Mumbai 3 Associate Professor, Computer Technology Department, VJTI,
CHASE Survey on 6 Most Important Topics in Hardware Security
University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit
Multichoice Quetions 1. Atributes a. are listed in the second part of the class box b. its time is preceded by a colon. c. its default value is
Multichoice Quetions 1. Atributes a. are listed in the second part of the class box b. its time is preceded by a colon. c. its default value is preceded by an equal sign d. its name has undereline 2. Associations
Sequential Data Structures
Sequential Data Structures In this lecture we introduce the basic data structures for storing sequences of objects. These data structures are based on arrays and linked lists, which you met in first year
Case studies: Outline. Requirement Engineering. Case Study: Automated Banking System. UML and Case Studies ITNP090 - Object Oriented Software Design
I. Automated Banking System Case studies: Outline Requirements Engineering: OO and incremental software development 1. case study: withdraw money a. use cases b. identifying class/object (class diagram)
PES Institute of Technology-BSC QUESTION BANK
PES Institute of Technology-BSC Faculty: Mrs. R.Bharathi CS35: Data Structures Using C QUESTION BANK UNIT I -BASIC CONCEPTS 1. What is an ADT? Briefly explain the categories that classify the functions
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with
An Open Framework for Reverse Engineering Graph Data Visualization. Alexandru C. Telea Eindhoven University of Technology The Netherlands.
An Open Framework for Reverse Engineering Graph Data Visualization Alexandru C. Telea Eindhoven University of Technology The Netherlands Overview Reverse engineering (RE) overview Limitations of current
Stacks. Linear data structures
Stacks Linear data structures Collection of components that can be arranged as a straight line Data structure grows or shrinks as we add or remove objects ADTs provide an abstract layer for various operations
1. The memory address of the first element of an array is called A. floor address B. foundation addressc. first address D.
1. The memory address of the first element of an array is called A. floor address B. foundation addressc. first address D. base address 2. The memory address of fifth element of an array can be calculated
CSE 880. Advanced Database Systems. Active Database Design Issues
CSE 880 Advanced Database Systems Active Database Design Issues S. Pramanik 1 Design Principles for Active Databases 1. Problems: Complex interactions due to cascading of triggers. Unknown side effects
BCS2B02: OOP Concepts and Data Structures Using C++
SECOND SEMESTER BCS2B02: OOP Concepts and Data Structures Using C++ Course Number: 10 Contact Hours per Week: 4 (2T + 2P) Number of Credits: 2 Number of Contact Hours: 30 Hrs. Course Evaluation: Internal
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Cohort: BCA/07B/PT - BCA/06/PT - BCNS/06/FT - BCNS/05/FT - BIS/06/FT - BIS/05/FT - BSE/05/FT - BSE/04/PT-BSE/06/FT
BSc (Hons) in Computer Applications, BSc (Hons) Computer Science with Network Security, BSc (Hons) Business Information Systems & BSc (Hons) Software Engineering Cohort: BCA/07B/PT - BCA/06/PT - BCNS/06/FT
WebSphere Business Monitor
WebSphere Business Monitor Monitor models 2010 IBM Corporation This presentation should provide an overview of monitor models in WebSphere Business Monitor. WBPM_Monitor_MonitorModels.ppt Page 1 of 25
Keywords are identifiers having predefined meanings in C programming language. The list of keywords used in standard C are : unsigned void
1. Explain C tokens Tokens are basic building blocks of a C program. A token is the smallest element of a C program that is meaningful to the compiler. The C compiler recognizes the following kinds of
Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance
Emerging Technology Whitepaper Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance For Transmissions of Cardholder Data and Sensitive Authentication Data Program Guide Version
plc numbers - 13.1 Encoded values; BCD and ASCII Error detection; parity, gray code and checksums
plc numbers - 3. Topics: Number bases; binary, octal, decimal, hexadecimal Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;
MongoDB Aggregation and Data Processing Release 3.0.4
MongoDB Aggregation and Data Processing Release 3.0.4 MongoDB Documentation Project July 08, 2015 Contents 1 Aggregation Introduction 3 1.1 Aggregation Modalities..........................................
RIA SECURITY TECHNOLOGY
RIA SECURITY TECHNOLOGY Ulysses Wang Security Researcher, Websense Hermes Li Security Researcher, Websense 2009 Websense, Inc. All rights reserved. Agenda RIA Introduction Flash Security Attack Vectors
Moving from CS 61A Scheme to CS 61B Java
Moving from CS 61A Scheme to CS 61B Java Introduction Java is an object-oriented language. This document describes some of the differences between object-oriented programming in Scheme (which we hope you
Organization of Programming Languages CS320/520N. Lecture 05. Razvan C. Bunescu School of Electrical Engineering and Computer Science bunescu@ohio.
Organization of Programming Languages CS320/520N Razvan C. Bunescu School of Electrical Engineering and Computer Science [email protected] Names, Bindings, and Scopes A name is a symbolic identifier used
