PE: specification vs. loader

Size: px
Start display at page:

Download "PE: specification vs. loader"

Transcription

1 PE: specification vs. loader Alexander Liskin Senior Malware Analyst, Packer Analysis Team Research & Development June 10 th, 2009 Cyprus, 2010 Event details (title, place)

2 Introduction Specification and loader June 10 th, 2009 Event details (title, place)

3 Introduction Windows Click to PE edit loader Master processes text styles executable files not in full Second compliance level with Microsoft PE & COFF specification It is possible to make PE files which 1) structure is at variance with specification 2) run normally 3) are not processed correctly by analysis tools

4 Number of sections Specific values June 10 th, 2009 Event details (title, place)

5 Zero number of sections Specification runs as follows 2 2 Fourth NumberOfSections level The number of sections. This indicates the size of the section table, which immediately follows the headers. It is presumed that every PE file has at least one section

6 Zero number of sections Click to edit Example Master of text file styles with no sections

7 Zero number of sections Click to edit Example Master of text file styles with no sections

8 Zero number of sections Click to edit This Master file text runs styles normally on

9 Zero number of sections Hiew Click v8.03 to edit (November Master text 2009) styles does not recognize this file as PE Hiew v8.10 (February 2010) handles it correctly WORD NumberOfSections;

10 Maximal number of sections Specification runs as follows At the beginning of an object file, or immediately after the signature of an image file, is a standard COFF file header in the following format. Note that the Windows loader limits the number of sections to 96.

11 Maximal number of sections Actual maximal number of sections is 95 on on and

12 Maximal number of sections IDA Click v5.6 to fails edit Master to load text file with styles sections (by default) Hiew v8.10 needs 20 seconds to open it

13 Section header Anomalous offsets and sizes June 10 th, 2009 Event details (title, place)

14 Section header: unaligned physical offset Click to edit Specification Master text runs styles as follows 20 4 PointerToRawData The file pointer to the first page of the section within the COFF file. For executable images, this must be a multiple of FileAlignment from the optional header. For object files, the value should be aligned on a 4-byte boundary for best performance. When a section contains only uninitialized data, this field should be zero.

15 Section header: unaligned physical offset Section headers of files packed by Upack are at variance with specification

16 Section header: unaligned physical offset Section headers of files packed by Upack are at variance with specification

17 Section header: unaligned physical offset But they run normally on

18 Section header: unaligned physical offset Click PE loader to edit calculates Master text section styles data offset like this // size of disk sector #define SECTOR_SIZE 512 //... // size of memory Fourth page level #define PAGE_SIZE» Fifth 4096 level //... // align down #define ALIGN_DOWN(X,Y) ((X)&(~((Y)-1))) //... IMAGE_SECTION_HEADER SectHdr; IMAGE_NT_HEADERS NtHdr; long SectOffs; //... // calculate offset to read section from SectOffs = (NtHdr.OptionalHeader.SectionAlignment >= PAGE_SIZE)? ALIGN_DOWN(SectHdr.PointerToRawData, SECTOR_SIZE) : SectHdr.PointerToRawData;

19 Section header: large physical size Specification runs as follows 16 4 SizeOfRawData The size of the section (for object files) or the size of the initialized data on disk (for image files). For executable images, this must be a multiple of FileAlignment from the optional header. If this is less than VirtualSize, the remainder of the section is zero-filled. Because the SizeOfRawData field is rounded but the VirtualSize field is not, it is possible for SizeOfRawData to be greater than VirtualSize as well. When a section contains only uninitialized data, this field should be zero.

20 Section header: large physical size Section physical size could be much bigger then file size

21 Section header: unaligned physical offset But such files run normally on

22 Section header: large physical size Click Microsoft to edit Master installer s text styles resource section case

23 Section header: zero virtual size Click to edit Specification Master text styles runs as follows Third 8 4 level VirtualSize The total size of the section when loaded into memory. If this value is greater than SizeOfRawData, the section is zero-padded. This field is valid only for executable images and should be set to zero for object files.

24 Section header: large physical size Virtual size of some nonempty sections of files built by Watcom C/C++ is zero

25 Section header: unaligned physical offset But such files run normally on

26 Conclusion Where we come to June 10 th, 2009 Event details (title, place)

27 Conclusion Mismatch Click to edit of PE Master specification text styles and PE loader gives possibilities of creating executables which deceive analytics and analysis tools File may not be corrupted even if it is incorrectly processed by» Fifth analysis level tools, you need to run it to figure out

28 Thank you! Questions? Alexander Liskin Packer Analysis Team June 10 th, 2009 Event details (title, place)

Installing Microsoft Windows

Installing Microsoft Windows Installing Microsoft Windows on HP Workstations with Advanced Format Hard Drives Technical white paper Table of contents Introduction... 2 Identifying an Advanced Format drive... 2 Installing Windows on

More information

AD Image Encryption. Format Version 1.2

AD Image Encryption. Format Version 1.2 AD Image Encryption Format Version 1.2 17 May 2010 Table of Contents Introduction... 3 Overview... 3 Image Formats... 4 Keys... 4 Credentials... 4 Certificates... 4 Image Key encryption... 5 Appendix A

More information

Forensic Analysis of Internet Explorer Activity Files

Forensic Analysis of Internet Explorer Activity Files Forensic Analysis of Internet Explorer Activity Files by Keith J. Jones keith.jones@foundstone.com 3/19/03 Table of Contents 1. Introduction 4 2. The Index.dat File Header 6 3. The HASH Table 10 4. The

More information

The Linux Virtual Filesystem

The Linux Virtual Filesystem Lecture Overview Linux filesystem Linux virtual filesystem (VFS) overview Common file model Superblock, inode, file, dentry Object-oriented Ext2 filesystem Disk data structures Superblock, block group,

More information

HOW TO PAGE A DOCUMENT IN MICROSOFT WORD

HOW TO PAGE A DOCUMENT IN MICROSOFT WORD 1 HOW TO PAGE A DOCUMENT IN MICROSOFT WORD 1 PAGING A WHOLE DOCUMENT FROM 1 TO Z (Including the first page) 1.1 Arabic Numbers (a) Click the Insert tab. (b) Go to the Header & Footer Section and click

More information

Solution to the problem

Solution to the problem Solution to the problem The System has reached the maximum size allowed for the system part of the registry Additional storage requests will be ignored How you got here You were happily using your Windows

More information

How To Understand The Error Codes On A Crystal Reports Print Engine

How To Understand The Error Codes On A Crystal Reports Print Engine Overview Error Codes This document lists all the error codes and the descriptions that the Crystal Reports Print Engine generates. PE_ERR_NOTENOUGHMEMORY (500) There is not enough memory available to complete

More information

Streaming Lossless Data Compression Algorithm (SLDC)

Streaming Lossless Data Compression Algorithm (SLDC) Standard ECMA-321 June 2001 Standardizing Information and Communication Systems Streaming Lossless Data Compression Algorithm (SLDC) Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http://www.ecma.ch

More information

Lecture 10: Dynamic Memory Allocation 1: Into the jaws of malloc()

Lecture 10: Dynamic Memory Allocation 1: Into the jaws of malloc() CS61: Systems Programming and Machine Organization Harvard University, Fall 2009 Lecture 10: Dynamic Memory Allocation 1: Into the jaws of malloc() Prof. Matt Welsh October 6, 2009 Topics for today Dynamic

More information

Q&As: Microsoft Excel 2013: Chapter 2

Q&As: Microsoft Excel 2013: Chapter 2 Q&As: Microsoft Excel 2013: Chapter 2 In Step 5, why did the date that was entered change from 4/5/10 to 4/5/2010? When Excel recognizes that you entered a date in mm/dd/yy format, it automatically formats

More information

for Malware Analysis Daniel Quist Lorie Liebrock New Mexico Tech Los Alamos National Laboratory

for Malware Analysis Daniel Quist Lorie Liebrock New Mexico Tech Los Alamos National Laboratory Visualizing Compiled Executables for Malware Analysis Daniel Quist Lorie Liebrock New Mexico Tech Los Alamos National Laboratory Overview Explanation of Problem Overview of Reverse Engineering Process

More information

PE Explorer. Heaventools. Malware Code Analysis Made Easy

PE Explorer. Heaventools. Malware Code Analysis Made Easy Heaventools PE Explorer Data Sheet Malware Code Analysis Made Easy Reverse engineers within the anti-virus, vulnerability research and forensics companies face the challenge of analysing a large number

More information

Programming Interface. for. Bus Master IDE Controller. Revision 1.0

Programming Interface. for. Bus Master IDE Controller. Revision 1.0 Programming Interface for Bus Master IDE Controller Revision 1.0 5/16/94 Until this specification is ratified, it is solely owned and maintained by: Brad Hosler, Intel Corporation bwh@salem.intel.com (please

More information

How to Calculate the Probabilities of Winning the Nine PowerBall Prize Levels:

How to Calculate the Probabilities of Winning the Nine PowerBall Prize Levels: How to Calculate the Probabilities of Winning the Nine PowerBall Prize Levels: Powerball numbers are drawn from two sets of numbers. Five numbers are drawn from one set of 59 numbered white balls and one

More information

Peeking into Pandora s Bochs. Instrumenting a Full System Emulator to Analyse Malicious Software

Peeking into Pandora s Bochs. Instrumenting a Full System Emulator to Analyse Malicious Software Instrumenting a Full System Emulator to Analyse Malicious Software Lutz Böhne (lutz.boehne@redteam-pentesting.de) RedTeam Pentesting GmbH http://www.redteam-pentesting.de April 9th 2010, Paris Hackito

More information

Step-by-Step Instructions for Setting Up a Paper in APA Format

Step-by-Step Instructions for Setting Up a Paper in APA Format Step-by-Step Instructions for Setting Up a Paper in APA Format These instructions will help you format all three parts of your paper: 1. the title or cover page 2. the paper 3. the reference page 1. TITLE

More information

Record Storage and Primary File Organization

Record Storage and Primary File Organization Record Storage and Primary File Organization 1 C H A P T E R 4 Contents Introduction Secondary Storage Devices Buffering of Blocks Placing File Records on Disk Operations on Files Files of Unordered Records

More information

How to Calculate the Probabilities of Winning the Eight LUCKY MONEY Prize Levels:

How to Calculate the Probabilities of Winning the Eight LUCKY MONEY Prize Levels: How to Calculate the Probabilities of Winning the Eight LUCKY MONEY Prize Levels: LUCKY MONEY numbers are drawn from two sets of numbers. Four numbers are drawn from one set of 47 numbered white balls

More information

Escape the Limblessage

Escape the Limblessage Click Click to edit to Master edit Master text styles text styles Riverside County - Orange County Second level Third level Fourth level Fifth level 1 1 MIS Corridor Demand 2 2 County Line Crossings %

More information

Datum > Curve KIM,ME,NIU

Datum > Curve KIM,ME,NIU Datum > Curve Intersect First create at least one quilt on the surface of the model. Feature > Surface (> New) > Copy (do not use offset that creates a surface off the solid surface even with zero offset)

More information

An overview of FAT12

An overview of FAT12 An overview of FAT12 The File Allocation Table (FAT) is a table stored on a hard disk or floppy disk that indicates the status and location of all data clusters that are on the disk. The File Allocation

More information

EVTXtract. Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, 2013. Mandiant Corporation. All rights reserved.

EVTXtract. Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, 2013. Mandiant Corporation. All rights reserved. EVTXtract Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, 2013 What do we have here today? A technical presentation on a novel forensic technique for recovering past

More information

Hi and welcome to the Microsoft Virtual Academy and

Hi and welcome to the Microsoft Virtual Academy and Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering

More information

Persist It Using and Abusing Microsoft s Fix It Patches

Persist It Using and Abusing Microsoft s Fix It Patches Persist It Using and Abusing Microsoft s Fix It Patches Jon Erickson : isight Partners : jerickson@isightpartners.com Abstract: Microsoft has often used Fix it patches, which are a subset of Application

More information

Calculating Cash Flow Using Excel Data Lists

Calculating Cash Flow Using Excel Data Lists Calculating Cash Flow Using Excel Data Lists By: Curtis D. Frye 7/26/2006 Bank and credit card statements tell you where your money has gone, but they don t show you how much money you ll have on hand

More information

jexcel plugin user manual v0.2

jexcel plugin user manual v0.2 jexcel plugin user manual v0.2 Contents Introduction 1 Installation 1 Loading a table from an Excel spreadsheet 1 Data source properties 2 General tab (default) 2 Advanced tab 3 Loading a layer from an

More information

Date: March 2006. Reference No. RTS-CB 018

Date: March 2006. Reference No. RTS-CB 018 Customer Bulletin Product Model Name: CS3102 and FS3102 subsystems Date: March 2006 Reference No. RTS-CB 018 SUBJECT: Volumes greater than 2TB on Windows OS Overview This document explores how different

More information

Hands-On Microsoft Windows Server 2008

Hands-On Microsoft Windows Server 2008 Hands-On Microsoft Windows Server 2008 Chapter 9 Server and Network Monitoring Objectives Understand the importance of server monitoring Monitor server services and solve problems with services Use Task

More information

E--Mail Archive Mail Ar User G u d ide

E--Mail Archive Mail Ar User G u d ide SCRIPT LOGIC E-Mail Archive User Guide E-MAIL ARCHIVE County E-mail is a public record. Alexander County is now Archiving all inbound and outbound e-mail. This has become necessary to comply with existing

More information

NAND Flash Memories. Using Linux MTD compatible mode. on ELNEC Universal Device Programmers. (Quick Guide)

NAND Flash Memories. Using Linux MTD compatible mode. on ELNEC Universal Device Programmers. (Quick Guide) NAND Flash Memories Using Linux MTD compatible mode on ELNEC Universal Device Programmers (Quick Guide) Application Note April 2012 an_elnec_linux_mtd, version 1.04 Version 1.04/04.2012 Page 1 of 16 As

More information

Static Analysis of Anomalies and Security Vulnerabilities in Executable Files

Static Analysis of Anomalies and Security Vulnerabilities in Executable Files Static Analysis of Anomalies and Security Vulnerabilities in Executable Files Jay-Evan J. Tevis Department of Computer Science Western Illinois University Macomb, Illinois 61455 (309) 298-1035 jj-tevis@wiu.edu

More information

4K Sector Disk Drives: Transitioning to the Future with Advanced Format Technologies

4K Sector Disk Drives: Transitioning to the Future with Advanced Format Technologies 4K Sector Disk Drives: Transitioning to the Future with Advanced Format Technologies By Michael E. Fitzpatrick, Engineering Fellow, Storage Products Marketing Toshiba America Information Systems, Inc.

More information

Computer Basics: Chapters 1 & 2

Computer Basics: Chapters 1 & 2 Computer Basics: Chapters 1 & 2 Definition of a Computer What does IPOS stand for? Input Process Output Storage Other types of Computers Name some examples of other types of computers, other than a typical

More information

INTRODUCTION... 4 MODULE 5. TIMESHEET... 5. Overview... 5 5.1 TIMESHEET CALENDAR VIEW... 7 INTRODUCTION... 7. What you will learn in this section...

INTRODUCTION... 4 MODULE 5. TIMESHEET... 5. Overview... 5 5.1 TIMESHEET CALENDAR VIEW... 7 INTRODUCTION... 7. What you will learn in this section... Step by Step Guide PSA 2015 Module 5 5.1 calendar view 5.2 by line 5.3 Instant Time Entry PSA 2015 (Release 2.3.0.243) PSA 2015 Step by Step Guide is published by Assistance Software. All rights reserved.

More information

An Effective Framework of Behavior Detection- Advanced Static Analysis for Malware Detection

An Effective Framework of Behavior Detection- Advanced Static Analysis for Malware Detection 2014 International Symposium on Communications and Information Technologies (ISCIT) An Effective Framework of Behavior Detection- Advanced Static Analysis for Malware Detection Maya Louk 1, Hyotaek Lim

More information

CHAPTER 2: CASE STUDY SPEAR-PHISHING CAMPAIGN GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 2: CASE STUDY SPEAR-PHISHING CAMPAIGN GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : CASE STUDY SPEAR-PHISHING CAMPAIGN 1 SPEAR-PHISHING CAMPAIGN CASE STUDY MORAL Attacks do not have to be technically advanced to succeed. OVERVIEW In August of 2014, Aerobanet (named changed to protect

More information

MARCH 2005. Conversion Software User Guide for Windows. Version 2.0

MARCH 2005. Conversion Software User Guide for Windows. Version 2.0 MARCH 2005 CDS Conversion Software User Guide for Windows Version 2.0 Updated: 2/24/2006 Table of Contents CDS Conversion Software V2 for Windows User Guide... 1 System Requirements... 1 Introduction...

More information

Imation LOCK User Manual

Imation LOCK User Manual Page: - 0 - Imation LOCK User Manual Security Application Program V2.0 - D Page: - 1 - Table of Contents A. Introduction... 2 B. General Description... 2 C. Features... 2 D. Before Using the Security Application

More information

DS2438EVKIT+ Smart Battery Monitor Evaluation Kit

DS2438EVKIT+ Smart Battery Monitor Evaluation Kit 19-4829; Rev 1; 8/09 www.maxim-ic.com DS2438EVKIT+ Smart Battery Monitor Evaluation Kit FEATURES Demonstrates the Capabilities of the DS2438 Smart Battery Monitor, Including: Temperature Measurement Voltage

More information

IRF Business Objects. Using Excel as a Data Provider in an IRF BO Report. September, 2009

IRF Business Objects. Using Excel as a Data Provider in an IRF BO Report. September, 2009 IRF Business Objects Using Excel as a Data Provider in an IRF BO Report September, 2009 1 Why use Excel Data? Integrating data from: External systems (e.g. foreign accounting and payroll systems) Budget

More information

Email Quick Reference. Administrator Guide

Email Quick Reference. Administrator Guide Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Setting Up APA Format (Page and Header) for PC s. Step 1 (Preparing the Pages)

Setting Up APA Format (Page and Header) for PC s. Step 1 (Preparing the Pages) Setting Up APA Format (Page and Header) for PC s Step 1 (Preparing the Pages) 1. Click WORD 2. Click Page Layout 3. Click Margins 4. Click Normal 5. Click small arrow in right corner of Paragraph Should

More information

Exam Questions 70-243

Exam Questions 70-243 Exam Questions 70-243 Administering and Deploying System Center 2012 Configuration Manager http://www.2passeasy.com/dumps/70-243/ 1. Your company uses System Center 2012 Configuration Manager with Microsoft

More information

SDK/Demo software Installation manual for windows using Matrox grabber Document number : Issue : 1.0.1 Classification : Customer : Date : 14/04/2014

SDK/Demo software Installation manual for windows using Matrox grabber Document number : Issue : 1.0.1 Classification : Customer : Date : 14/04/2014 Page : 1 Title : SDK/Demo software Installation manual for windows using Matrox grabber Document number : Customer : Name and Function Signature Date Prepared by : LEMARCHAND Stephane 19/03/2014 Reviewed

More information

Adobe Acrobat: Creating Interactive Forms

Adobe Acrobat: Creating Interactive Forms Adobe Acrobat: Creating Interactive Forms This document provides information regarding creating interactive forms in Adobe Acrobat. Please note that creating forms requires the professional version (not

More information

Tech-KNOW Topic. for Microsoft Office 2000. Outlook - "You've Got Mail!"

Tech-KNOW Topic. for Microsoft Office 2000. Outlook - You've Got Mail! Tech-KNOW Topic for Microsoft Office 2000 Outlook - "You've Got Mail!" Christina School District Network Users: Log in and save today s work in your My Documents folder. Objectives: Participants will be

More information

Attacking the TCP Reassembly Plane of Network Forensics Tools

Attacking the TCP Reassembly Plane of Network Forensics Tools Attacking the TCP Reassembly Plane of Network Forensics Tools Gérard 12 Thomas Engel 1 1 University of Luxembourg - SECAN LAB 2 SES ASTRA Outline Introduction Definitions and terminology A PCAP file contains

More information

Partition Alignment Dramatically Increases System Performance

Partition Alignment Dramatically Increases System Performance Partition Alignment Dramatically Increases System Performance Information for anyone in IT that manages large storage environments, data centers or virtual servers. Paragon Software Group Paragon Alignment

More information

IT Service Management with System Center Service Manager

IT Service Management with System Center Service Manager Course 10965B: IT Service Management with System Center Service Manager Course Details Course Outline Module 1: Service Management Overview Effective IT Service Management includes process driven methodologies

More information

Excel 2010: Create your first spreadsheet

Excel 2010: Create your first spreadsheet Excel 2010: Create your first spreadsheet Goals: After completing this course you will be able to: Create a new spreadsheet. Add, subtract, multiply, and divide in a spreadsheet. Enter and format column

More information

Mass Email. General Use

Mass Email. General Use Mass Email The Q Mass Email application allows users to compose and mass email students and/or their contacts. The application will mass send emails based on the selected Sender and creation of a Recipients

More information

Seagate Crystal Reports Designer

Seagate Crystal Reports Designer Objectives Contents This document is intended to assist you in creating or modifying a report in the Crystal Reports Designer, Seagate Info Report Designer, or the Design tab of Seagate Analysis that exports

More information

Storage in Database Systems. CMPSCI 445 Fall 2010

Storage in Database Systems. CMPSCI 445 Fall 2010 Storage in Database Systems CMPSCI 445 Fall 2010 1 Storage Topics Architecture and Overview Disks Buffer management Files of records 2 DBMS Architecture Query Parser Query Rewriter Query Optimizer Query

More information

MICROSOFT ACCESS 2007 BOOK 2

MICROSOFT ACCESS 2007 BOOK 2 MICROSOFT ACCESS 2007 BOOK 2 4.1 INTRODUCTION TO ACCESS FIRST ENCOUNTER WITH ACCESS 2007 P 205 Access is activated by means of Start, Programs, Microsoft Access or clicking on the icon. The window opened

More information

Internet Architecture and Philosophy

Internet Architecture and Philosophy Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying

More information

Surf it Easy. User Guide

Surf it Easy. User Guide Surf it Easy User Guide User Manual Version 1.1 2004 CoSoSys SRL Surf it Easy User Manual Table of Contents Table of Contents... I 1. Introduction... 1 2. System Requirements... 2 3. Installation... 2

More information

Phoenix Technologies Ltd.

Phoenix Technologies Ltd. PC Division Desktop Product Line Subject: Standard BIOS 32-bit Service Directory Proposal Revision: 0.4 Revision Date: June 22, 1993 Document ID: Author: ATBIOS Thomas C. Block Origin Date: May 24, 1993

More information

MICROSOFT OUTLOOK 2011 SEND AND RESPOND TO E-MAILS

MICROSOFT OUTLOOK 2011 SEND AND RESPOND TO E-MAILS MICROSOFT OUTLOOK 2011 SEND AND RESPOND TO E-MAILS Lasted Edited: 2012-07-10 1 Send E-mail... 3 Create a new message... 3 Change the signature in the e-mail body,... 4 Change the sending out e-mail account...

More information

Crystal Reports Designer

Crystal Reports Designer Overview This document is intended to assist you in creating or modifying a report in the Crystal Reports Designer, Seagate Info Report Designer, or the Design tab of Seagate Analysis that exports successfully

More information

Configuring Load Balancing

Configuring Load Balancing When you use Cisco VXC Manager to manage thin client devices in a very large enterprise environment, a single Cisco VXC Manager Management Server cannot scale up to manage the large number of devices.

More information

MADRAS: Multi-Architecture Binary Rewriting Tool Technical report. Cédric Valensi University of Versailles Saint-Quentin en Yvelines

MADRAS: Multi-Architecture Binary Rewriting Tool Technical report. Cédric Valensi University of Versailles Saint-Quentin en Yvelines MADRAS: Multi-Architecture Binary Rewriting Tool Technical report Cédric Valensi University of Versailles Saint-Quentin en Yvelines September 2, 2013 Chapter 1 Introduction In the domain of High Performance

More information

A Survey of Shared File Systems

A Survey of Shared File Systems Technical Paper A Survey of Shared File Systems Determining the Best Choice for your Distributed Applications A Survey of Shared File Systems A Survey of Shared File Systems Table of Contents Introduction...

More information

Host Connectivity Kit PVCAM for PI Cameras Installation

Host Connectivity Kit PVCAM for PI Cameras Installation 4411-0074 v1b Host Connectivity Kit PVCAM for PI Cameras Installation Introduction After confirming that your computer meets all hardware and software requirements, install the Host Connectivity Kit (HCK)

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

Adi Hayon Tomer Teller

Adi Hayon Tomer Teller Adi Hayon Tomer Teller Why are we here? (one of many reasons) A malicious program: Allocates memory in a remote process (and write to it) Executes the code in that memory region Frees the code Memory dump

More information

Android Packer. facing the challenges, building solutions. Rowland YU. Senior Threat Researcher Virus Bulletin 2014

Android Packer. facing the challenges, building solutions. Rowland YU. Senior Threat Researcher Virus Bulletin 2014 Android Packer facing the challenges, building solutions Rowland YU Senior Threat Researcher Virus Bulletin 2014 1 What is Android Packer? Android packers are able to encrypt an original classes.dex file,

More information

Hands-on CUDA exercises

Hands-on CUDA exercises Hands-on CUDA exercises CUDA Exercises We have provided skeletons and solutions for 6 hands-on CUDA exercises In each exercise (except for #5), you have to implement the missing portions of the code Finished

More information

Instructions for Formatting MLA Style Papers in Microsoft Word 2010

Instructions for Formatting MLA Style Papers in Microsoft Word 2010 Instructions for Formatting MLA Style Papers in Microsoft Word 2010 To begin a Microsoft Word 2010 project, click on the Start bar in the lower left corner of the screen. Select All Programs and then find

More information

New Features in Microsoft Office 2007

New Features in Microsoft Office 2007 New Features in Microsoft Office 2007 TABLE OF CONTENTS The Microsoft Office Button... 2 The Quick Access Toolbar... 2 Adding buttons to the Quick Access Toolbar... 2 Removing buttons from the Quick Access

More information

Instructions for Creating Silly Survey Database

Instructions for Creating Silly Survey Database Instructions for Creating Silly Survey Database Create a New Database 1. Find the shortcut or the file that starts MS Access and click it to activate the program. 2. In the Create a New Database Using

More information

APPLICATION PROGRAMMING INTERFACE

APPLICATION PROGRAMMING INTERFACE APPLICATION PROGRAMMING INTERFACE Advanced Card Systems Ltd. Website: www.acs.com.hk Email: info@acs.com.hk Table of Contents 1.0. Introduction... 4 2.0.... 5 2.1. Overview... 5 2.2. Communication Speed...

More information

PERFORMING REGRESSION ANALYSIS USING MICROSOFT EXCEL

PERFORMING REGRESSION ANALYSIS USING MICROSOFT EXCEL PERFORMING REGRESSION ANALYSIS USING MICROSOFT EXCEL John O. Mason, Ph.D., CPA Professor of Accountancy Culverhouse School of Accountancy The University of Alabama Abstract: This paper introduces you to

More information

Using VMware ESX Server with IBM System Storage SAN Volume Controller ESX Server 3.0.2

Using VMware ESX Server with IBM System Storage SAN Volume Controller ESX Server 3.0.2 Technical Note Using VMware ESX Server with IBM System Storage SAN Volume Controller ESX Server 3.0.2 This technical note discusses using ESX Server hosts with an IBM System Storage SAN Volume Controller

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Microsoft Word 2010: How to Resize and Move Clip Art

Microsoft Word 2010: How to Resize and Move Clip Art Microsoft Word 2010: How to Resize and Move Clip Art Resizing Clip Art If your clip art is too big or too small you can resize to suit your needs. Click on your image with the left mouse button. You should

More information

Bypassing Browser Memory Protections in Windows Vista

Bypassing Browser Memory Protections in Windows Vista Bypassing Browser Memory Protections in Windows Vista Mark Dowd & Alexander Sotirov markdowd@au1.ibm.com alex@sotirov.net Setting back browser security by 10 years Part I: Introduction Thesis Introduction

More information

Outlook Rules and Alerts

Outlook Rules and Alerts Outlook Rules and Alerts Utilizing Outlook Rules and Alerts to help you organize and prioritize your e-mail. Table of Contents: 1. Tackling Your In-box 2. Outlook Rules and Alerts 3. Examples 4. Rule Set-up

More information

Installation guidance ProjectWise Explorer

Installation guidance ProjectWise Explorer MANUAL 1 (7) Installation guidance: ProjectWise Explorer, v, Trafikverket s installation pack Installation guidance ProjectWise Explorer v., Trafikverket s installation pack Document versions: Version:

More information

Speeding up a Slow SuperSalon PC

Speeding up a Slow SuperSalon PC Speeding up a Slow SuperSalon PC Inevitably, a computer will slow down in operation when an improper maintenance and/or set up is a factor. And unfortunately, most salon staff do not double as IT personnel.

More information

Microsoft Word 2011: Create a Table of Contents

Microsoft Word 2011: Create a Table of Contents Microsoft Word 2011: Create a Table of Contents Creating a Table of Contents for a document can be updated quickly any time you need to add or remove details for it will update page numbers for you. A

More information

Using the Advanced Tier Data Collection Tool. A Troubleshooting Guide

Using the Advanced Tier Data Collection Tool. A Troubleshooting Guide Using the Advanced Tier Data Collection Tool A Troubleshooting Guide Table of Contents Mouse Click the heading to jump to the page Enable Content/ Macros... 4 Add a new student... 6 Data Entry Screen...

More information

Chapter 5. Phrase-based models. Statistical Machine Translation

Chapter 5. Phrase-based models. Statistical Machine Translation Chapter 5 Phrase-based models Statistical Machine Translation Motivation Word-Based Models translate words as atomic units Phrase-Based Models translate phrases as atomic units Advantages: many-to-many

More information

SafeGuard Enterprise Tools guide

SafeGuard Enterprise Tools guide SafeGuard Enterprise Tools guide Product version: 5.60 Document date: April 2011 Contents 1 About this guide...3 2 Displaying the system status with SGNState...3 3 Reverting an unsuccessful installation

More information

ACS Proposal - Device Internal Status Log

ACS Proposal - Device Internal Status Log ACS Proposal - Device Internal Status Log July 28, 2010 Revision 3 Author: Nathan Obr 1 Microsoft Way Redmond, WA 98052 425-705-9157 NatObr@Microsoft.com ACS Proposal - Device Internal Status Log 1 Document

More information

Exporting an image from Sibelius to Microsoft Word

Exporting an image from Sibelius to Microsoft Word Exporting an image from Sibelius to Microsoft Word Introduction I created this document because many people have problems making Word documents with Sibelius-generated graphics (EMF) files in them. And

More information

Introducing the Microsoft IIS deployment guide

Introducing the Microsoft IIS deployment guide Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying

More information

From The Little SAS Book, Fifth Edition. Full book available for purchase here.

From The Little SAS Book, Fifth Edition. Full book available for purchase here. From The Little SAS Book, Fifth Edition. Full book available for purchase here. Acknowledgments ix Introducing SAS Software About This Book xi What s New xiv x Chapter 1 Getting Started Using SAS Software

More information

Intro to Excel spreadsheets

Intro to Excel spreadsheets Intro to Excel spreadsheets What are the objectives of this document? The objectives of document are: 1. Familiarize you with what a spreadsheet is, how it works, and what its capabilities are; 2. Using

More information

EWF specification. Expert Witness Compression Format specification. By Joachim Metz <joachim.metz@gmail.com>

EWF specification. Expert Witness Compression Format specification. By Joachim Metz <joachim.metz@gmail.com> EWF specification Expert Witness Compression Format specification By Joachim Metz Summary EWF is short for Expert Witness Compression Format, according to [ASR02]. It is a file

More information

Site Maintenance. Table of Contents

Site Maintenance. Table of Contents Site Maintenance Table of Contents Adobe Contribute How to Install... 1 Publisher and Editor Roles... 1 Editing a Page in Contribute... 2 Designing a Page... 4 Publishing a Draft... 7 Common Problems...

More information

Tunable Base Page Size

Tunable Base Page Size Tunable Base Page Size Table of Contents Executive summary... 1 What is Tunable Base Page Size?... 1 How Base Page Size Affects the System... 1 Integrity Virtual Machines Platform Manager... 2 Working

More information

SkyRecon Cryptographic Module (SCM)

SkyRecon Cryptographic Module (SCM) SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.

More information

In this session, we will explain some of the basics of word processing. 1. Start Microsoft Word 11. Edit the Document cut & move

In this session, we will explain some of the basics of word processing. 1. Start Microsoft Word 11. Edit the Document cut & move WORD PROCESSING In this session, we will explain some of the basics of word processing. The following are the outlines: 1. Start Microsoft Word 11. Edit the Document cut & move 2. Describe the Word Screen

More information

How to use Wireframe in Visio

How to use Wireframe in Visio Visio Tutorial: How to use Wireframe How to use Wireframe in Visio By Derek Tobler Table of Contents Getting started... 2 To start go to the Start icon and click on it. Then type Visio in the Search programs

More information

Guide for usage of digital signatures in Microsoft Office Documents

Guide for usage of digital signatures in Microsoft Office Documents Guide for usage of digital signatures in Microsoft Office Documents i. Digitally Signing a Microsoft Word Document in 2003: This section demonstrates digitally signing a Microsoft Word document. In order

More information

Dynamics NAV/SQL Server Configuration Recommendations

Dynamics NAV/SQL Server Configuration Recommendations Dynamics NAV/SQL Server Configuration Recommendations This document describes SQL Server configuration recommendations that were gathered from field experience with Microsoft Dynamics NAV and SQL Server.

More information

Specifications of Paradox for Windows

Specifications of Paradox for Windows Specifications of Paradox for Windows Appendix A 1 Specifications of Paradox for Windows A IN THIS CHAPTER Borland Database Engine (BDE) 000 Paradox Standard Table Specifications 000 Paradox 5 Table Specifications

More information

Microsoft Axapta Inventory Closing White Paper

Microsoft Axapta Inventory Closing White Paper Microsoft Axapta Inventory Closing White Paper Microsoft Axapta 3.0 and Service Packs Version: Second edition Published: May, 2005 CONFIDENTIAL DRAFT INTERNAL USE ONLY Contents Introduction...1 Inventory

More information

Computer Logic (2.2.3)

Computer Logic (2.2.3) Computer Logic (2.2.3) Distinction between analogue and discrete processes and quantities. Conversion of analogue quantities to digital form. Using sampling techniques, use of 2-state electronic devices

More information

Section 5: Installing the Print Driver

Section 5: Installing the Print Driver Section 5: Installing the Print Driver In This Section Print Driver Installation for USB Connection Using the Ethernet Connection and a Crossover Cable Print Driver: The Epilog print driver is the software

More information