Detecting Hardware Keyloggers. Fabian Mihailowitsch November 26, 2010
|
|
|
- Aldous Dawson
- 9 years ago
- Views:
Transcription
1 Detecting Hardware Keyloggers Fabian Mihailowitsch November 26, 2010
2 Who? Fabian Mihailowitsch Former Software Developer German energy combine IT-Security Consultant cirosec GmbH Penetration Tests Source Code Reviews Contact of 49
3 What? Hardware Keylogger PS/2 USB Hardware Keyloggers are undetectable by Software Visual inspection is the primary means of detecting hardware keyloggers, since there are no known methods of detecting them through software., en.wikipedia.org, Talk: Detection of Hardware Keyloggers with Software ;) 3 of 49
4 Why? Less research on this topic Few information No practical way to detect HKL Because HKL are a threat 2005 (GB): Sumitomo Bank Attackers tried to steal 423 million USD Multiple HKL were installed How about your company? Solution to identify HKL in large enterprises Visual inspection is impractical Only possible via software 4 of 49
5 Hardware Keylogger Hardware Keylogger USB PS/2 Keyboard Module Mini- / PCI card Installed between PC and Keyboard Records key strokes Captured data are retrieved Software Keyboard Ghost typing Flash drive Wi-Fi-Access TCP connect Bluetooth 5 of 49
6 Hardware Keylogger Features Up to 2 GB flash memory Encryption Password protection Timestamping Time use charts Search functions Upgradeable firmware Pricing PS/2: USD USB: USD 6 of 49
7 Hardware Keylogger The companies Big ones KeyDemon, KeeLog, (PL) KeyCarbon (US) Most companies rebrand KeyDemon KeyCobra KeyLlama (once own products) Also famous (older products) KEYKatcher (US) KeyGhost (NZ) KeyShark (DE) The others WirelessKeylogger (UK) Exotic Stuff (mostly CN) Some Open Source Keylogger 7 of 49
8 PS/2 How does it work Keyboard Wire matrix Microcontroller Sends scancode (make/break) PC Keyboard Controller (KBC) 0x60: I/O-Buffer 0x64: Status 8 of 49
9 PS/2 How does it work Communication KBC <-> Keyboard Obvious Scancodes Not that obvious ;) Set LEDs Choose scancode Set repeate rate Keyboard self-test / reset Ping Example (Ping) KBC sends "ping" (0xEE) via 0x60 KB sends "pong" (0xEE) to 0x60 9 of 49
10 PS/2 How does it work PS/2 is a serial interface Communication DATA CLK Bidirectional Keyboard defines clock (30 50 ns) 1. DATA GND 4. VCC 5. CLCK 6. - Data frames KB (11 bit): startbit, D0-D7 [data], odd parity, stopbit KBC (12 bit): startbit, D0-D7 [data], odd parity, stopbit, ACK (KB) 10 of 49
11 PS/2 How does it work PS/2 is a serial interface Communication DATA CLK Bidirectional Keyboard defines clock (30 50 ns) 1. DATA GND 4. VCC 5. CLCK of 49
12 Detecting PS/2 Hardware Keylogger Current measurement Additional electronic components = Additional power consumption ;) KeyDemon = 65 ma KeyKatcher = 54 ma More current is drawn Cannot be measured by software 12 of 49
13 Detecting PS/2 Hardware Keylogger Keylogger are password protected Entered via Keyboard Ghost typing Shipped with default password Password restore is complex Brute Force password Via software Check ghost typing 13 of 49
14 Detecting PS/2 Hardware Keylogger Problem Tested HKL don t tap the data line HKL are placed inline HKL Keyboard Data Data PC Clock Microprocessor Clock HKL knows the data flow KBC can t send fake keystrokes 14 of 49
15 Detecting PS/2 Hardware Keylogger However Some KB commands (0x60) lead to fake key presses Maybe keyboard response is interpreted Brute Force password Translation Table (KB command -> key press) Brute Force attack via Software Practical? Limited amount of chars (~10) Not all passwords can be Brute Forced Works for: KeyGhost, KEYKatcher (some) 15 of 49
16 Detecting PS/2 Hardware Keylogger Demo 16 of 49
17 Detecting PS/2 Hardware Keylogger Changes on the line HKL are placed inline HKL might change signals on the line Different signals (data) Own clock (30-50 ns) Slight dislocation of data/clock signal Maybe more ;) 17 of 49
18 Detecting PS/2 Hardware Keylogger Analyze the data flow Tap signal at the keyboard Tap signal after the keylogger 18 of 49
19 Detecting PS/2 Hardware Keylogger Result: Keylogger Keyboard 19 of 49
20 Detecting PS/2 Hardware Keylogger Clock is set to low Delay of the HKL Keylogger Delay Keyboard 20 of 49
21 Detecting PS/2 Hardware Keylogger Clock is set to high Same timing 21 of 49
22 Detecting PS/2 Hardware Keylogger Clock cycles are shorter for HKL Probably HKL generates own clock signal Can be detected on the wire No possibility to detect via software Exact clock state cannot be retrieved by KBC But the clock signal starts later Remember when clock was pulled low HKL might cause a delay on the wire 22 of 49
23 Detecting PS/2 Hardware Keylogger Time Measurement Tested HKL were placed inline Microprocessor has to analyze the signal and pass it on This additional logic increase signal propagation time Data signal (begin) Data signal (end) 23 of 49
24 Detecting PS/2 Hardware Keylogger Time Measurement Tested HKL were placed inline Microprocessor has to analyze the signal and pass it on This additional logic increase signal propagation time Delay 24 of 49
25 Detecting PS/2 Hardware Keylogger Basic idea Send command to KB, wait for response and measure run time Like a ping _start: _wait1: _wait2: xor %ecx, %ecx mov $0x9999, %cx in $0x60, %al xor %eax, %eax in $0x64, %al test $0x2, %al jne _wait1 mov $0xF2, %al out %al, $0x60 xor %eax, %eax in $0x60, %al cmp $0xFA, %al jne _wait2 loop _wait1 ret Repeat 9999x: Send Identify Keyboard (0xF2) Wait until Keyboard responds with MF-II (0xFA) 25 of 49
26 Detecting PS/2 Hardware Keylogger Delay introduced by the HKL is very (!) small Previous code can t be used in normal OS state scheduler, interrupts, Measurement isn t exact enough Code must run exclusively Get the most accurate measurement 26 of 49
27 Detecting PS/2 Hardware Keylogger Solution Loadable Kernel Module Get CPU exclusively Deactivate interrupts for processor Disable kernel preemption SMP locking Run ASM code ( ping ) Measure runtime of the code Interrupts are disabled Read processors time stamp counter (rdtsc) Counter is increased every clock cycle Use the number of clock cycles Restore everything and write result to kernel message buffer 27 of 49
28 Detecting PS/2 Hardware Keylogger Time Measurement Results Setup Clock cycles Keyboard KeyGhost KeyKatcher Mini KeyKatcher Magnum Inline HKL can be detected using Time Measurement Measure without HKL Define Baseline (e.g ) Measure again Win ;) 28 of 49
29 Defeat PS/2 Hardware Keylogger Fill Keylogger memory via software Some stop logging Some overwrite memory at the beginning Keystrokes are overwritten / not recorded Keyboard commands Some commands lead to fake keypress (see Brute Force) Send those repeatedly ~100 logged keys in 10s 109 minutes to fill 64kB Keyboard command 0xFE Resend Keyboard responds by resending the last-sent byte ~ 4 logged keys in 10 s Practical? Most PS/2 HKL have a few KBytes memory Nevertheless takes too much time Works for: KeyGhost, KEYKatcher (some) 29 of 49
30 Defeat PS/2 Hardware Keylogger Stop HKL from sniffing keystrokes Keyboard sends scancodes Make / Break codes Defined in scan code set Scan codes set can be choosen via KB command 0xF0 3 scancode sets 1: XT keyboards 2: MF2 keyboard 3: AT keyboads Tested Keyloggers support scancode set 2 and 3 Choose scancode set 1 Keylogger doesn t log correctly Logs can t be used New mapping scancode <-> keycode is necessary for OS hdev HAL setkeycode 30 of 49
31 USB How does it work Host controller + Hubs + devices build tree structure Device has various endpoints Buffer in / out Configuration via endpoint 0 Low Speed devices (Keyboard): endpoint endpoints with 8 Bytes Only host controller manages communication with devices Polls buffer (device configuration) Writes buffer Data are transferred as packets Data transfer types Isochronous transfer (guaranteed data rate, no error correction) Interrupt transfer (small amount of data, retransmission) Bulk transfer (big amount of data, retransmission) Control transfer (device configuration, ACKed in both directions) 31 of 49
32 USB How does it work Different device classes Plug and Play Relevant: HID class Defines communication KB sends 8 Byte input report Interrupt Transfer Periodically polled by host Contains pressed keys No make / break codes Packet: Modifier keys OEM use Keycode Keycode Keycode Keycode Keycode Keycode Byte 0 Byte 7 32 of 49
33 USB How does it work PC sends 1 Byte output report USB Control Transfer Control LEDs Packet: NUM Lock Caps Lock Scroll Lock Compose KANA Constant Constant Constant Bit 0 Bit 7 No addtional KB commands Transfer handeld via USB Typematic rate, etc. configured on PC 33 of 49
34 Detecting USB Hardware Keylogger Current Measurement Like PS/2 More current is drawn Cannot be measured by software Device configuration contains current However no accurate information available 34 of 49
35 Detecting USB Hardware Keylogger Brute Force KL password KeyCarbon: software to retrieve keystrokes 35 of 49
36 Detecting USB Hardware Keylogger Brute Force KL password KeyCarbon: software to retrieve keystrokes Software needs to communicate with KL USB sniffer: 36 of 49
37 Detecting USB Hardware Keylogger Software needs to communicate with KL 1 Byte output reports (set LEDs) Fixed header + HKL password + footer Password char is encoded with 4 Bytes Brute Force (default) passwords Create Lookup Table for PW chars Perform attack via software Works for: KeyCarbon models 37 of 49
38 Detecting USB Hardware Keylogger Changes to USB Properties / Topology Keyboard only: 38 of 49
39 Detecting USB Hardware Keylogger Changes to USB Properties / Topology Keyboard + KeyCarbon: 39 of 49
40 Detecting USB Hardware Keylogger Changes to USB Properties / Topology Addtional USB HUB if KeyCarbon is present Why is the device undetectable, in practice, by software? The device shows up in Windows Device Manager as a generic USB hub. This generic USB hub has no ID strings, and is indistinguishable from the generic USB hub found in 90% of all USB hubs. Well USB HUB Controller used: Texas Instruments (TUSB2046B) 40 of 49
41 Detecting USB Hardware Keylogger Changes to USB Properties / Topology KeyGhost changes device properties USB Speed Keyboard: KeyGhost: Device Status Keyboard : KeyGhost : More details later bmaxpacketsize0 08 / Speed: Low bmaxpacketsize0 64 / Speed: Full Bus Powered (0x0000) Self Powered (0x0001) 41 of 49
42 Detecting USB Hardware Keylogger Time Measurement Like PS/2 HKL are placed inline -> introduces a delay Keylogger Delay Keyboard 42 of 49
43 Detecting USB Hardware Keylogger Time Measurement Basically the same idea like for PS/2 Has to be adjusted for USB PC can send 1 Byte output report to KB (LED) sent as Control-Transfer Control-Transfer are ACKed Like PS/2 ping Can be used for runtime measurement ;) Implementation Send output report to KB Wait until ACKed Do it various times (10.000) Measure runtime Measurement can be performed from userland e.g. libusb 43 of 49
44 Detecting USB Hardware Keylogger Time Measurement Results Setup Milliseconds Keyboard KeyGhost KeyCarbon USB HKL can be detected using Time Measurement Create baseline for default setup (HUBs, etc.) Measure again Win ;) 44 of 49
45 Detecting USB Hardware Keylogger Different keyboard behaviour Normal behaviour: Interrupt read (8 Byte): \x81\x06\x00\x22\x00\x00\x00\x04 Send USB Reset Interrupt read (8 Byte): \x00\x00\x00\x00\x00\x00\x00\x00 KeyGhost behaviour: Interrupt read (8 Byte): \x81\x06\x00\x22\x00\x00\x00\x04 Send USB Reset Interrupt read (8 Byte): \x81\x06\x00\x22\x00\x00\x00\x04 45 of 49
46 Detecting USB Hardware Keylogger Different keyboard behaviour Analysis on the wire Reason: keyboard never receives USB Reset Before Keylogger After Keylogger USB Reset (D-/D+ pulled low) 46 of 49
47 Detecting USB Hardware Keylogger Keyboard never receives USB Reset USB single-chip host and device controller (ISP1161A1BD) Acts as Device for PC (causes changes to device properties) Acts as Host Controller for KB Behaviour can be tested via software e.g. libusb Note: Time Measurement for this design bug is possible too 47 of 49
48 Conclusion PS/2 USB All tested models were placed inline Time Measurement as general technique to detect them Scancode 1 as general technique to defeat them Detection via USB behaviour (USB speed, etc.) Individual bugs More research to come All tested HKL contained bugs that can be used to detect them Generic and individual bugs Each HKL has to be analyzed seperately Bugs can be combined (Pattern) PoC code Soon: 48 of 49
49 Thank you for your interest! Questions and Feedback 49 of 49
Hardware Keylogger Detection. Andy Davis. Research and Development Manager
Hardware Keylogger Detection Andy Davis Research and Development Manager Executive Summary Hardware keylogger technology poses a real risk to the confidentiality of data processed by PCs and other devices
USB 4 MB / 2 GB PS/2 4 MB / 2 GB
User s Guide KeyGrabber Module USB 4 MB / 2 GB PS/2 4 MB / 2 GB Check http://www.keelog.com/ for the latest version of this document. 1 Table of contents Introduction... 3 About the product... 3 Features...
IRON-HID: Create your own bad USB. Seunghun Han
IRON-HID: Create your own bad USB Seunghun Han Who am I? Security researcher at NSR (National Security Research Institute of South Korea) Operating system and firmware developer Author of the book series
Learning USB by Doing. [email protected]
Learning USB by Doing. [email protected] The question that I am asked most often is how do I start a USB project? There are many alternate starting points for the design of a USB I/O device and this
Microcontroller Based Low Cost Portable PC Mouse and Keyboard Tester
Leonardo Journal of Sciences ISSN 1583-0233 Issue 20, January-June 2012 p. 31-36 Microcontroller Based Low Cost Portable PC Mouse and Keyboard Tester Ganesh Sunil NHIVEKAR *, and Ravidra Ramchandra MUDHOLKAR
Below is a diagram explaining the data packet and the timing related to the mouse clock while receiving a byte from the PS-2 mouse:
PS-2 Mouse: The Protocol: For out mini project we designed a serial port transmitter receiver, which uses the Baud rate protocol. The PS-2 port is similar to the serial port (performs the function of transmitting
Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems
Fastboot Techniques for x86 Architectures Marcus Bortel Field Application Engineer QNX Software Systems Agenda Introduction BIOS and BIOS boot time Fastboot versus BIOS? Fastboot time Customizing the boot
GEIGER COUNTER "Gamma Check Pro"
GEIGER COUNTER "Gamma Check Pro" OPERATING INSTRUCTIONS FOR THE SOFTWARE Item no. 1377508 VERSION 11/15 TABLE OF CONTENTS Page 1. Functions of the Software... 3 2. Software/Driver Installation... 3 3.
Appendix C: Keyboard Scan Codes
Thi d t t d ith F M k 4 0 2 Appendix C: Keyboard Scan Codes Table 90: PC Keyboard Scan Codes (in hex) Key Down Up Key Down Up Key Down Up Key Down Up Esc 1 81 [ { 1A 9A, < 33 B3 center 4C CC 1! 2 82 ]
Project 4: Pseudo USB Simulation Introduction to UNIVERSAL SERIAL BUS (USB) STANDARD
Project 4: Pseudo USB Simulation Introduction to UNIVERSAL SERIAL BUS (USB) STANDARD The Universal Serial Bus is a fast, bi-directional, low cost, dynamically attachable serial interface. The motivation
AN601 I2C 2.8 Communication Protocol. SM130 SM130 - Mini APPLICATION NOTE
AN601 I2C 2.8 Communication Protocol SM130 SM130 - Mini APPLICATION NOTE 2 1. INTRODUCTION This application note explains I2C communication protocol with SM130 or SM130-Mini Mifare module based on the
UMBC. ISA is the oldest of all these and today s computers still have a ISA bus interface. in form of an ISA slot (connection) on the main board.
Bus Interfaces Different types of buses: ISA (Industry Standard Architecture) EISA (Extended ISA) VESA (Video Electronics Standards Association, VL Bus) PCI (Periheral Component Interconnect) USB (Universal
F2103 GPRS DTU USER MANUAL
F2103 GPRS DTU USER MANUAL Add:J1-J2,3rd Floor,No.44,GuanRi Road,SoftWare Park,XiaMen,China 1 Zip Code:361008 Contents Chapter 1 Brief Introduction of Product... 3 1.1 General... 3 1.2 Product Features...
An Analysis of Wireless Device Implementations on Universal Serial Bus
An Analysis of Wireless Device Implementations on Universal Serial Bus 6/3/97 Abstract Universal Serial Bus (USB) is a new personal computer (PC) interconnect that can support simultaneous attachment of
USB2.0 <=> I2C V4.4. Konverter Kabel und Box mit Galvanischetrennung
USB2.0 I2C V4.4 Konverter Kabel und Box mit Galvanischetrennung USB 2.0 I2C Konverter Kabel V4.4 (Prod. Nr. #210) USB Modul: Nach USB Spezifikation 2.0 & 1.1 Unterstützt automatisch "handshake
Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface
Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Application te Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Abstract This
Network Threats and Vulnerabilities. Ed Crowley
Network Threats and Vulnerabilities Ed Crowley Objectives At the end of this unit, you will be able to describe and explain: Network attack terms Major types of attacks including Denial of Service DoS
PC Notebook Diagnostic Card
www.winter-con.com User s Guide PC Notebook Diagnostic Card User s Guide 1 www.winter-con.com User s Guide INTRODUCTION Notebook Diagnostic Card is a powerful diagnostic tool for technicians and administrators
MCB3101 (Class I) WiRobot Serial Bluetooth Wireless Module User Manual
MCB3101 (Class I) WiRobot Serial Bluetooth Wireless Module User Manual Version: 1.0.1 Dec. 2005 Table of Contents I. Introduction 2 II. Operations 2 II.1. Theory of Operation 2 II.2. Configuration (PC-PC
USER GUIDE EDBG. Description
USER GUIDE EDBG Description The Atmel Embedded Debugger (EDBG) is an onboard debugger for integration into development kits with Atmel MCUs. In addition to programming and debugging support through Atmel
Welcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive
Welcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive Products Group within Microchip. This web seminar today
Computer Systems Structure Input/Output
Computer Systems Structure Input/Output Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Examples of I/O Devices
- 35mA Standby, 60-100mA Speaking. - 30 pre-defined phrases with up to 1925 total characters.
Contents: 1) SPE030 speech synthesizer module 2) Programming adapter kit (pcb, 2 connectors, battery clip) Also required (for programming) : 4.5V battery pack AXE026 PICAXE download cable Specification:
CENTRONICS interface and Parallel Printer Port LPT
Course on BASCOM 8051 - (37) Theoretic/Practical course on BASCOM 8051 Programming. Author: DAMINO Salvatore. CENTRONICS interface and Parallel Printer Port LPT The Parallel Port, well known as LPT from
EZ-View Network Communications Guide www.cszindustrial.com
Network Communications Guide EzView Network Communications Guide RevB July 2013 (V2.2) Supersedes: RevA (May 2011) Cincinnati Sub-Zero Products, LLC 513-772-8810 12011 Mosteller Road Cincinnati, Ohio 45241
1. Computer System Structure and Components
1 Computer System Structure and Components Computer System Layers Various Computer Programs OS System Calls (eg, fork, execv, write, etc) KERNEL/Behavior or CPU Device Drivers Device Controllers Devices
Mastertech Diagnostic Software Frequently Asked Questions
Mastertech Diagnostic Software Frequently Asked Questions Version 1.8 02 February 2010 Table of Contents MDS USER INTERFACE - OVERVIEW... 2 HARDWARE AND O/S REQUIREMENTS... 2 HARDWARE AND O/S REQUIREMENTS...
VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy
VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15 1 Introduction File Transfer Protocol (FTP) is the protocol designed for file sharing over internet. By using TCP/IP for lower layer, FTP
SNMP-1 Configuration Guide
SNMP-1 Configuration Guide You must configure the Net Logic Card before it can operate properly. You have two methods to configure the Net Logic Card: Using telnet or terminal. Using Telnet 1. Make sure
MACHINE ARCHITECTURE & LANGUAGE
in the name of God the compassionate, the merciful notes on MACHINE ARCHITECTURE & LANGUAGE compiled by Jumong Chap. 9 Microprocessor Fundamentals A system designer should consider a microprocessor-based
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
Designing VM2 Application Boards
Designing VM2 Application Boards This document lists some things to consider when designing a custom application board for the VM2 embedded controller. It is intended to complement the VM2 Datasheet. A
COMPUTER HARDWARE. Input- Output and Communication Memory Systems
COMPUTER HARDWARE Input- Output and Communication Memory Systems Computer I/O I/O devices commonly found in Computer systems Keyboards Displays Printers Magnetic Drives Compact disk read only memory (CD-ROM)
Data Acquisition Module with I2C interface «I2C-FLEXEL» User s Guide
Data Acquisition Module with I2C interface «I2C-FLEXEL» User s Guide Sensors LCD Real Time Clock/ Calendar DC Motors Buzzer LED dimming Relay control I2C-FLEXEL PS2 Keyboards Servo Motors IR Remote Control
RS-485 Protocol Manual
RS-485 Protocol Manual Revision: 1.0 January 11, 2000 RS-485 Protocol Guidelines and Description Page i Table of Contents 1.0 COMMUNICATIONS BUS OVERVIEW... 1 2.0 DESIGN GUIDELINES... 1 2.1 Hardware Design
A DIY Hardware Packet Sniffer
A DIY Hardware Packet Sniffer Affordable Penetration Testing for the Individual Veronica Swanson: University of California, Irvine CyberSecurity for the Next Generation North American Round, New York 15
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Question Bank Subject Name: EC6504 - Microprocessor & Microcontroller Year/Sem : II/IV
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Question Bank Subject Name: EC6504 - Microprocessor & Microcontroller Year/Sem : II/IV UNIT I THE 8086 MICROPROCESSOR 1. What is the purpose of segment registers
User Manual. AS-Interface Programmer
AS-Interface Programmer Notice: RESTRICTIONS THE ZMD AS-INTERFACE PROGRAMMER HARDWARE AND ZMD AS-INTERFACE PROGRAMMER SOFTWARE IS DESIGNED FOR IC EVALUATION, LABORATORY SETUP AND MODULE DEVELOPMENT ONLY.
The irnetbox Manager User Guide
The irnetbox Manager User Guide Chris Dodge RedRat Ltd April 2014 For irnetbox Manager 3.05 1 Contents 1. Introduction...3 2. Initial Network Configuration...3 3. Finding irnetboxes...3 3.1 Device Information
Performance monitoring with Intel Architecture
Performance monitoring with Intel Architecture CSCE 351: Operating System Kernels Lecture 5.2 Why performance monitoring? Fine-tune software Book-keeping Locating bottlenecks Explore potential problems
Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide
BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide Version 5.0 rev 1 Advantech Corp., Ltd. Table of Contents BwSNMP Advantech WebAccess to SNMP Agent (Simple
INPUT/OUTPUT ORGANIZATION
INPUT/OUTPUT ORGANIZATION Accessing I/O Devices I/O interface Input/output mechanism Memory-mapped I/O Programmed I/O Interrupts Direct Memory Access Buses Synchronous Bus Asynchronous Bus I/O in CO and
Atmel AVR4920: ASF - USB Device Stack - Compliance and Performance Figures. Atmel Microcontrollers. Application Note. Features.
Atmel AVR4920: ASF - USB Device Stack - Compliance and Performance Figures Features Compliance to USB 2.0 - Chapters 8 and 9 - Classes: HID, MSC, CDC, PHDC Interoperability: OS, classes, self- and bus-powered
Old Company Name in Catalogs and Other Documents
To our customers, Old Company Name in Catalogs and Other Documents On April 1 st, 2010, NEC Electronics Corporation merged with Renesas Technology Corporation, and Renesas Electronics Corporation took
TURBO PROGRAMMER USB, MMC, SIM DEVELOPMENT KIT
TURBO PROGRAMMER USB, MMC, SIM DEVELOPMENT KIT HARDWARE GUIDE This document is part of Turbo Programmer documentation. For Developer Documentation, Applications and Examples, see http:/// PRELIMINARY (C)
Smart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas [email protected] Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
The I2C Bus. NXP Semiconductors: UM10204 I2C-bus specification and user manual. 14.10.2010 HAW - Arduino 1
The I2C Bus Introduction The I2C-bus is a de facto world standard that is now implemented in over 1000 different ICs manufactured by more than 50 companies. Additionally, the versatile I2C-bus is used
BLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE
BLUETOOTH SERIAL PORT PROFILE iwrap APPLICATION NOTE Thursday, 19 April 2012 Version 1.2 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for
Designing a USB Keyboard and PS/2 Mouse Combination Device Using the Cypress Semiconductor CY7C63413 USB Microcontroller
Designing a USB Keyboard and PS/2 Mouse Combination Device Using the Cypress Semiconductor CY7C6343 USB Microcontroller Introduction The Universal Serial Bus (USB) is an industry standard serial interface
Computer Setup (F10) Utility Guide HP Compaq dx2200 Microtower Business PC
Guide HP Compaq dx2200 Microtower Business PC Document Part Number: 413759-001 January 2006 This guide provides instructions on how to use Computer Setup. This tool is used to reconfigure and modify computer
E21 Mobile Users Guide
E21 Mobile Users Guide E21 Mobile is the Mobile CRM companion to TGI s Enterprise 21 ERP software. Designed with the mobile sales force in mind, E21 Mobile provides real-time access to numerous functions
Chapter 02: Computer Organization. Lesson 04: Functional units and components in a computer organization Part 3 Bus Structures
Chapter 02: Computer Organization Lesson 04: Functional units and components in a computer organization Part 3 Bus Structures Objective: Understand the IO Subsystem and Understand Bus Structures Understand
UMI (Universal Metering Interface)
UMI (Universal Metering Interface) Overview Cambridge Consultants Ltd Science Park Milton Road Cambridge England CB4 0DW Tel +44 (0)1223 420024 Fax +44 (0)1223 423373 Registered No: 1036298 England Cambridge
Axia IP-Audio Driver Update v2.6.1.18 11 June, 2013
Axia IP-Audio Driver Update v2.6.1.18 11 June, 2013 The Axia IP-Audio driver Version 2.6.1.18 is compatible with 32-bit and 64-bit versions of Windows 7 and Vista, as well as earlier 32-bit versions of
TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL
TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL w w w. c d v g r o u p. c o m CA-ETHR-A: TCP/IP Module Installation Manual Page Table of Contents Introduction...5 Hardware Components... 6 Technical Specifications...
Embedded Programming in C/C++: Lesson-1: Programming Elements and Programming in C
Embedded Programming in C/C++: Lesson-1: Programming Elements and Programming in C 1 An essential part of any embedded system design Programming 2 Programming in Assembly or HLL Processor and memory-sensitive
Chapter 13. PIC Family Microcontroller
Chapter 13 PIC Family Microcontroller Lesson 01 PIC Characteristics and Examples PIC microcontroller characteristics Power-on reset Brown out reset Simplified instruction set High speed execution Up to
Chapter 11: Input/Output Organisation. Lesson 06: Programmed IO
Chapter 11: Input/Output Organisation Lesson 06: Programmed IO Objective Understand the programmed IO mode of data transfer Learn that the program waits for the ready status by repeatedly testing the status
User s Guide. KeyLlama PS/2 KeyLlama PS/2 Forensic. www.keyllama.com. with USB Download Accelerator. Page. Introduction. Recording
User s Guide KeyLlama PS/2 KeyLlama PS/2 Forensic with USB Download Accelerator Page Introduction Recording Reading the Data (Text Menu) Reading the Data (Download Accelerator) Clock Configuration (Forensic
User Manual Software for DSL Digital Speed Switch
User Manual Software for DSL Digital Speed Switch Software version from 1.0.1 Baumer Hübner GmbH Max-Dohrn-Str. 2+4 D-10589 Berlin Phone +49 (0)30 690 03-0 Fax +49 (0)30 690 03-104 [email protected]
Nemo 96HD/HD+ MODBUS
18/12/12 Pagina 1 di 28 MULTIFUNCTION FIRMWARE 2.30 Nemo 96HD/HD+ MODBUS COMMUNICATION PROTOCOL CONTENTS 1.0 ABSTRACT 2.0 DATA MESSAGE DESCRIPTION 2.1 Parameters description 2.2 Data format 2.3 Description
Bluetooth + USB 16 Servo Controller [RKI-1005 & RKI-1205]
Bluetooth + USB 16 Servo Controller [RKI-1005 & RKI-1205] Users Manual Robokits India [email protected] http://www.robokitsworld.com Page 1 Bluetooth + USB 16 Servo Controller is used to control up to
AliOffice 2.0 Installation Guide
January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.
IX Support Tool Setting Manual
IX System IP network-compatible intercom IX Support Tool Setting Manual Software version 2.0.0.0 or later Before configuring and using the system, read Setting Manual and Operation Manual (PDF) carefully.
OpenBSD s New Suspend and Resume Framework
OpenBSD s New Suspend and Resume Framework Paul Irofti [email protected] 10th European BSD Conference October 6 9, 2011 Maarssen, The Netherlands Outline 1 Introduction History The Winds of Change 2
Linux Driver Devices. Why, When, Which, How?
Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may
MONITORING PERFORMANCE IN WINDOWS 7
MONITORING PERFORMANCE IN WINDOWS 7 Performance Monitor In this demo we will take a look at how we can use the Performance Monitor to capture information about our machine performance. We can access Performance
ENTTEC Pixie Driver API Specification
ENTTEC Pixie Driver API Specification Purpose This document specifies the interface requirements for PC based application programs to use the ENTTEC Pixie Driver board to drive RGB or RGBW type LED strips.
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS
PNOZmulti Configurator V8.1.1
General 1000 PNOZmulti 1.1 1100 General 1- ][Allgemein Configurator V8.1.1 This document contains important information, which must be noted. This document also contains details of the changes made in
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
INTRODUCTION FEATURES OF THE ICM
INTRODUCTION The ICM, Internet Control Module, is a remote controller device accessible via the Internet that allows operational access to the IPS (and other base units available). Through the ICM you
Application Note AN_209. AN_209 PDIUSBD12 to FT120 Migration Guide
AN_209 AN_209 PDIUSBD12 to FT120 Migration Guide Issue Date: 2012-12-14 The FT120 is a cost and feature optimized USB Full-Speed device controller. It communicates with a micro-controller over a generic
The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology
3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related
COS 318: Operating Systems. I/O Device and Drivers. Input and Output. Definitions and General Method. Revisit Hardware
COS 318: Operating Systems I/O and Drivers Input and Output A computer s job is to process data Computation (, cache, and memory) Move data into and out of a system (between I/O devices and memory) Challenges
Using the JNIOR with the GDC Digital Cinema Server. Last Updated November 30, 2012
Using the JNIOR with the GDC Digital Cinema Server Last Updated November 30, 2012 The following is an explanation of how to utilize the JNIOR with the GDC Digital Cinema Server. Please contact INTEG via
User Guide for Windows 10
User Guide for Windows 10 System requirements E10684 First Edition July 2015 To facilitate a smoother transition from your previous operating system, read the system requirements below before upgrading
AVR151: Setup and Use of the SPI. Introduction. Features. Atmel AVR 8-bit Microcontroller APPLICATION NOTE
Atmel AVR 8-bit Microcontroller AVR151: Setup and Use of the SPI APPLICATION NOTE Introduction This application note describes how to set up and use the on-chip Serial Peripheral Interface (SPI) of the
Installation Guide for LynxClient
Installation Guide for LynxClient Technical Support: 972-231-6874 Ext. 140 8am to 5pm CST Email: [email protected] PC Keyboard Duress Button LynxKey & LynxKeyPro USB Duress Button LynxUSB Notification Popup
Data Sheet. Adaptive Design ltd. Arduino Dual L6470 Stepper Motor Shield V1.0. 20 th November 2012. L6470 Stepper Motor Shield
Arduino Dual L6470 Stepper Motor Shield Data Sheet Adaptive Design ltd V1.0 20 th November 2012 Adaptive Design ltd. Page 1 General Description The Arduino stepper motor shield is based on L6470 microstepping
PRT3 Printer Module: ASCII Protocol Programming Instructions
PRT3 Printer Module: ASCII Protocol Programming Instructions We hope this product performs to your complete satisfaction. Should you have any questions or comments, please visit www.paradox.com and send
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
4 Character 5x7 LED Matrix Display
Mini project report on 4 Character 5x7 LED Matrix Display Submitted by Agarwal Vikas, MTech II, CEDT K.Sreenivasulu M.E (Micro) II, CEDT CENTRE FOR ELECTRONICS DESIGN AND TECHNOLOGY INDIAN INSTITUTE OF
How to design and implement firmware for embedded systems
How to design and implement firmware for embedded systems Last changes: 17.06.2010 Author: Rico Möckel The very beginning: What should I avoid when implementing firmware for embedded systems? Writing code
ENTBUS PLUS SOFTWARE FOR ENERGY MONITORING AND RECORDING INSTALLATION AND OPERATING MANUAL
ENTBUS PLUS SOFTWARE FOR ENERGY MONITORING AND RECORDING INSTALLATION AND OPERATING MANUAL Foreword Entbus services manage the collection of information and storing this information in the database. Services
Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature
Table of Content Error Messages List... 2 Troubleshooting the Storage System... 3 I can t access the Manager... 3 I forgot the password for logging in to the Manager... 3 The users can t access the shared
Timeout The Crosspoint Status Request message has a timeout, which means that you need to wait 1 second in between request messages.
Network Control Protocol Important notes Binary Code The strings shown on the next pages are in binary coded format. Please be aware that any terminal program you may use to control a Network unit from
Next Generation ETS Software A preview of the upcoming new ETS5 system & user enhancements. KNX Association, Brussels André Hänel
A preview of the upcoming new ETS5 system & user enhancements KNX Association, Brussels André Hänel What's new in ETS5; Introduction All technical details given here are for your information only. A public
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
BIOS Update Release Notes
BIOS Update Release Notes PRODUCTS: DG31PR, DG31PRBR (Standard BIOS) BIOS Version 0059 October 24, 2008 PRG3110H.86A.0059.2008.1024.1834 Added Fixed Disk Boot Sector option under Maintenance Mode. Fixed
SX-3000EDM Integration Guide
SX-3000EDM Integration Guide SX-3000EDM Integration Guide PN: 140-20116-110 Rev. A 1 Table of Contents SX-3000EDM Integration Guide Product Overview... 3 Introduction... 3 Features... 4 Block Diagram...
Pen Drive to Pen Drive and Mobile Data Transfer Using ARM
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735, PP: 43-47 www.iosrjournals.org Pen Drive to Pen Drive and Mobile Data Transfer Using ARM 1 Mr.V.S.Gawali,
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
Avalanche Site Edition
Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
Getting Started with the Xilinx Zynq- 7000 All Programmable SoC Mini-ITX Development Kit
Getting Started with the Xilinx Zynq- 7000 All Programmable SoC Mini-ITX Development Kit Table of Contents ABOUT THIS GUIDE... 3 ADDITIONAL DOCUMENTATION... 3 ADDITIONAL SUPPORT RESOURCES... 3 INTRODUCTION...
ValveLink Mobile Software
Quick Start Guide ValveLink Mobile Software Version 4.0 ValveLink Mobile Software ValveLink Mobile software lets you configure, calibrate, and troubleshoot FIELDVUE DVC2000, DVC6000, DVC6000f, DVC6200,
