Dongwoo Kim : Hyeon-jeong Lee s Husband
|
|
|
- Jane Smith
- 10 years ago
- Views:
Transcription
1
2 2/ 32
3 Who we are Dongwoo Kim : Hyeon-jeong Lee s Husband Ph.D. Candidate at Chungnam National University in South Korea Majoring in Computer Communications & Security Interested in mobile hacking, digital forensics Sangwho Kim : Hye-ji Heo s Boyfriend Master s course at the same school Interested in mobile hacking, vulnerability analysis 3/ 32
4 Our purpose We want to find remote code execution vulnerabilities of real-world Android apps. Our targets are apps that consume file data like office file browser. We re especially interested in their native libraries that can cause crashes. It s not a big deal to make targets get crashed using simple fuzzing. The problem is that it s a very time-consuming task to analyze crashes to determine exploitability. 4/ 32
5 How to determine exploitability We have to MANUALLY figure out that the operand at crash point is affected by the user input. User Input Data LDR R4, [R5, #20]... LDR R2, [R4, #4] Crash... LDR R1, [R2] LDR R3, [R1] BL R3 Shellcode 5/ 32
6 Our goal 1 / 2 We need something that can let us know whether the operand is affected by the input in an automated manner. (Time is precious!) We tried to take advantage of any tools for it. However, there is nothing that we can use for our purpose on ARM architecture. We have decided to write our own tools using taint analysis based on dynamic binary instrumentation. 6/ 32
7 Our goal 2 / 2 Our tools should be easy to use on both Android emulator and device for practical use. We want our tools to answer the following questions. Q. Operand at crash point is affected by input? A. Yes or No! Q. If yes, where is exactly coming from? A. Offset 0x1004 in the input file 7/ 32
8 VDT (Visual Data Tracer) 1 / 3 presented by Julio Auto at Source 2009 conference For crash analysis of user level applications on Windows OS (x86) Using taint analysis to determine exploitability Input data 1 Leave trace log 2 Backward taint analysis using the trace log Crash Point 8/ 32
9 VDT (Visual Data Tracer) 2 / 3 VDT-Tracer : Leave trace log (Extension of WinDBG) trace.log 9/ 32
10 VDT (Visual Data Tracer) 3 / 3 VDT-GUI : Backward taint analysis Instruction chain engaged in data flow 10 / 32
11 TREE (Tainted-enabled Reverse Engineering Environment) 1 / 2 by Lixin Li and Chao Wang in 2013 For crash analysis of user level applications on various architectures based on debugging feature of IDA Pro Using taint analysis to determine exploitability. 11 / 32
12 TREE (Tainted-enabled Reverse Engineering Environment) 2 / 2 IDA Pro TREE-Tracer TREE-Analyzer TREE-Visualizer Trace_log.idb 12 / 32
13 Type of DBI (Dynamic Binary Instrumentation) DBI Tool DBI Tool Target Target vs. Attach Type - Same process - Separate process Our choice! Pros Cons - OS support NOT required (Low overhead) - NOT appropriate for crash analysis - Appropriate for crash analysis - OS support required (High overhead) 13 / 32
14 Overview of our tools trace.log 1 ARM-Tracer (Online) - CLI Interface - Working on 32bit ARM-based Linux (Android emulator and real device) - Extracting context of every instruction until the target gets crashed 2 ARM-Analyzer (Offline) - GUI Interface - Working on Desktop for efficiency - Parsing trace.log and show the list of executed instructions - Allowing a user to choose an object for backward taint analysis 14 / 32
15 Challenges in ARM-Tracer No hardware support for single-stepping whereas Intel x86 provides it known for trap flag. We can implement it with DBM (Debug Breakpoint Mechanism). It requires various considerations which are not necessary in x86. Such as calculating Next PC, handling signals in multithreaded environment, handling atomic instruction sequence. 15 / 32
16 Challenges in ARM-Analyzer Not a simple task to identify semantic of ARM instructions in terms of data propagation, and distinguish their syntax. SIMD (Single Instruction Multiple Data) instruction set is very annoying! SIMD is for multimedia like SSE (Streaming SIMD Extensions) in x86 which has its own register bank that size is 256 bytes in total. 16 / 32
17 ARM-Tracer 1 / 8 Instruction tracing with DBM single-stepping using system call Breakpoint instruction differentiate according to the instruction state [Step 1] Determine Next PC [Step 2] Set BP [Step 3] Restore Instr. 0x C0 24 0x BD E8 0x100C 1E FF 2F E1 0x C0 24 0x1008 Breakpoint 0x100C 1E FF 2F E1 0x C0 24 0x BD E8 0x100C 1E FF 2F E1 1. Analyze current instr. 0x C Determine Next PC Next PC = 0x Backup instr. at Next PC 0x BD E8 4. Set BP at Next PC 0x1008 Breakpoint 5. Execute 0x C Restore Instr. 0x BD E8 17 / 32
18 ARM-Tracer 2 / 8 Instruction state State Instruction Size ARM state ARM instruction 32 Thumb state Thumb instruction 16 Thumb2 instruction 16/32 Instruction state change (interworking) can happen by BX/BLX instructions. 18 / 32
19 ARM-Tracer 3 / 8 Considerations on calculating Next PC We have to identify opcode of instructions according to instruction state. (based on GDB) ARM (32bit) Thumb (16bit) Thumb2 (16/32bit) BLX #Offset BLX <Reg> BX <Reg> LDR PC, [<Reg>] LDM <Reg>, {(RegList,) PC} B #Offset BL #Offset POP {(RegList,) PC} B #Offset BX <Reg> BLX <Reg> MOV PC, <Reg> CBZ <Reg>, #Offset CBNZ <Reg>, #Offset B #Offset BL #Offset BLX #Offset SUBS PC, LR, #Offset LDMIA <Reg>, {(RegList)} LDMDB <Reg>, {(RegList)} RFEIA <Reg> RFEDB <Reg> MOV PC, <Reg> LDR PC, [<Reg>] TBB [<RegA>, <RegB>] TBH [<RegA>, <RegB>] 19 / 32
20 ARM-Tracer 4 / 8 Addressing interference by other threads Caused by code sharing Thread Thread Thread Target Thread Thread Thread Thread Target Thread Breakpoint Breakpoint We have to guarantee all the threads run properly. 20 / 32
21 ARM-Tracer 5 / 8 Handling instruction sequence for atomic operation ARM does not provide atomic instruction. Instead, it provides sequence for it. (LDREX/STREX) We should not intervene the sequence otherwise, it may cause infinite loop. infinite loop 21 / 32
22 ARM-Tracer 6 / 8 The good starting point We designate a specific thread as the target thread which opens the input file. We can know memory address where the input file is loaded by checking and functions. Target starts Target crashes! Input file is loaded! (We start tracing here. ) 22 / 32
23 ARM-Tracer 7 / 8 Before logging, filter out instructions not executed (ARM) [ CPSR ] [ ARM Instruction ] 23 / 32
24 ARM-Tracer 8 / 8 Before logging, filter out instructions not executed (Thumb2) [ Thumb2 IT Instruction ] [ CPSR ] 24 / 32
25 ARM-Analyzer 1 / 3 Parsing each entry from the trace log file Identify instruction syntax based on disassembly Identify object : register, memory address (byte level) 25 / 32
26 ARM-Analyzer 2 / 3 Classification of instructions ARM Architecture Reference Manual ARMv7-A Edition Group Mnemonic Target Syntax Impl. Memory access General data processing Multiply Saturating Parallel Packing and unpacking Branch and control Coprocessor Total We have also considered some SIMD instructions (vld, vst). 26 / 32
27 ARM-Analyzer 3 / 3 How it works Backward taint analysis View for user Crash Inside of ARM-Analyzer 2 1 Dst : r6 / Src : r0 Dst : r3 / Src : r1, *0x2224 Dst : r5 / Src : r1 Dst : r4 / Src : r0 Dst : r0 / Src : r1 Dst : r1 / Src : r6 Dst : r3 / Src : r3, *0x1018 Enqueue Queue r3 27 / 32
28 Experiment 1 / 3 We generated crashes against Polaris Office Among them, we chose 7 crashes that look cool! Such as.. Crash LDR BLX R3, [R3, #0x18] R3 Let s try to put them into our tools! 28 / 32
29 Experiment 2 / 3 Tested on GalasxyS4 2.3 GHz Quad-core, 2GB RAM, Android 4.4.2, Kernel ARM-Tracer Crash 1 Crash 2 Crash 3 Crash 4 Crash 5 Crash 6 Crash 7 # of instructions executed # of instructions filtered out # of atomic handler Taken time (sec) Dump file size (MB) 6,804,072 6,830,983 7,008,764 7,048,261 10,000, ,000, ,000, , , , , , , ,000+ 2,600 2,600 2,662 2,630 3,800+ 3,800+ 3,800+ 1,563 1,562 1,616 1,673 2,300+ 2,300+ 2,300+ 1,038 1,042 1,069 1,075 1,500+ 1,500+ 1, / 32
30 Experiment 3 / 3 Tested on Desktop 3.3 GHz Quad-core, 16GB RAM, Windows 7 ARM-Analyzer Crash 1 Crash 2 Crash 3 Crash 4 Probably Exploitable X O X O # of instructions executed 6,804,072 6,830,983 7,008,764 7,048,261 Taken time to full scan Fast Mode Normal Mode 10 ~ 15 sec A couple of days... Fast Mode enqueues only effective address of source into the search queue. ex) LDR R1, [R2, R3] *(R2+R3) // 0x1004 0x1000 0x4 30 / 32
31 31 / 32
32 We have developed tools for crash analysis of userlevel applications on ARM architecture. It can avoid non-deterministic behavior. We can efficiently analyze crashes in a limited time. We have tested it with real-world app on Android device. As a result, we got two exploitable crashes after short testing our tools with crash samples that we have already generated. Before long, we re going to release our tools with source code after some revisions for those who are interested in them. Please participate in improving our tools. 32 / 32
33
ios applications reverse engineering Julien Bachmann [email protected]
ios applications reverse engineering 1 Julien Bachmann [email protected] Agenda Motivations The architecture Mach-O Objective-C ARM AppStore binaries Find'em Decrypt'em Reverse'em What to look for Where to
The ARM Architecture. With a focus on v7a and Cortex-A8
The ARM Architecture With a focus on v7a and Cortex-A8 1 Agenda Introduction to ARM Ltd ARM Processors Overview ARM v7a Architecture/Programmers Model Cortex-A8 Memory Management Cortex-A8 Pipeline 2 ARM
A Choices Hypervisor on the ARM architecture
A Choices Hypervisor on the ARM architecture Rishi Bhardwaj, Phillip Reames, Russell Greenspan Vijay Srinivas Nori, Ercan Ucan ABSTRACT Choices is an object oriented operating system that runs on the x86
Real-time Debugging using GDB Tracepoints and other Eclipse features
Real-time Debugging using GDB Tracepoints and other Eclipse features GCC Summit 2010 2010-010-26 [email protected] Summary Introduction Advanced debugging features Non-stop multi-threaded debugging
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
An Introduction to the ARM 7 Architecture
An Introduction to the ARM 7 Architecture Trevor Martin CEng, MIEE Technical Director This article gives an overview of the ARM 7 architecture and a description of its major features for a developer new
Automatic Logging of Operating System Effects to Guide Application-Level Architecture Simulation
Automatic Logging of Operating System Effects to Guide Application-Level Architecture Simulation Satish Narayanasamy, Cristiano Pereira, Harish Patil, Robert Cohn, and Brad Calder Computer Science and
Bug hunting. Vulnerability finding methods in Windows 32 environments compared. FX of Phenoelit
Bug hunting Vulnerability finding methods in Windows 32 environments compared FX of Phenoelit The goal: 0day What we are looking for: Handles network side input Runs on a remote system Is complex enough
Exception and Interrupt Handling in ARM
Exception and Interrupt Handling in ARM Architectures and Design Methods for Embedded Systems Summer Semester 2006 Author: Ahmed Fathy Mohammed Abdelrazek Advisor: Dominik Lücke Abstract We discuss exceptions
THUMB Instruction Set
5 THUMB Instruction Set This chapter describes the THUMB instruction set. Format Summary 5-2 Opcode Summary 5-3 5. Format : move shifted register 5-5 5.2 Format 2: add/subtract 5-7 5.3 Format 3: move/compare/add/subtract
Instruction Set Architecture
Instruction Set Architecture Consider x := y+z. (x, y, z are memory variables) 1-address instructions 2-address instructions LOAD y (r :=y) ADD y,z (y := y+z) ADD z (r:=r+z) MOVE x,y (x := y) STORE x (x:=r)
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
Eloquence Training What s new in Eloquence B.08.00
Eloquence Training What s new in Eloquence B.08.00 2010 Marxmeier Software AG Rev:100727 Overview Released December 2008 Supported until November 2013 Supports 32-bit and 64-bit platforms HP-UX Itanium
Cortex-A9 MPCore Software Development
Cortex-A9 MPCore Software Development Course Description Cortex-A9 MPCore software development is a 4 days ARM official course. The course goes into great depth and provides all necessary know-how to develop
Computer Organization and Architecture
Computer Organization and Architecture Chapter 11 Instruction Sets: Addressing Modes and Formats Instruction Set Design One goal of instruction set design is to minimize instruction length Another goal
Fine-grained covert debugging using hypervisors and analysis via visualization
Reverse Engineering by Crayon: Game Changing Hypervisor and Visualization Analysis Fine-grained covert debugging using hypervisors and analysis via visualization Daniel A. Quist Lorie M. Liebrock Offensive
Linux. Reverse Debugging. Target Communication Framework. Nexus. Intel Trace Hub GDB. PIL Simulation CONTENTS
Android NEWS 2016 AUTOSAR Linux Windows 10 Reverse ging Target Communication Framework ARM CoreSight Requirements Analysis Nexus Timing Tools Intel Trace Hub GDB Unit Testing PIL Simulation Infineon MCDS
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory p.1/11
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory DFRWS 2006: Work in Progress (WIP) Aug 16, 2006 AAron Walters 4TΦ Research Nick L. Petroni Jr. University
Custom Penetration Testing
Custom Penetration Testing Compromising a Vulnerability through Discovery and Custom Exploitation Stephen Sims Advanced Penetration Testing - 2009 SANS 1 Objectives Penetration Testing Precompiled Tools
SierraVMI Sizing Guide
SierraVMI Sizing Guide July 2015 SierraVMI Sizing Guide This document provides guidelines for choosing the optimal server hardware to host the SierraVMI gateway and the Android application server. The
COS 318: Operating Systems
COS 318: Operating Systems OS Structures and System Calls Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Outline Protection mechanisms
Interpreters and virtual machines. Interpreters. Interpreters. Why interpreters? Tree-based interpreters. Text-based interpreters
Interpreters and virtual machines Michel Schinz 2007 03 23 Interpreters Interpreters Why interpreters? An interpreter is a program that executes another program, represented as some kind of data-structure.
StrongARM** SA-110 Microprocessor Instruction Timing
StrongARM** SA-110 Microprocessor Instruction Timing Application Note September 1998 Order Number: 278194-001 Information in this document is provided in connection with Intel products. No license, express
CHAPTER 7: The CPU and Memory
CHAPTER 7: The CPU and Memory The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
Sequential Performance Analysis with Callgrind and KCachegrind
Sequential Performance Analysis with Callgrind and KCachegrind 4 th Parallel Tools Workshop, HLRS, Stuttgart, September 7/8, 2010 Josef Weidendorfer Lehrstuhl für Rechnertechnik und Rechnerorganisation
Instruction Set Design
Instruction Set Design Instruction Set Architecture: to what purpose? ISA provides the level of abstraction between the software and the hardware One of the most important abstraction in CS It s narrow,
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Advanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
ELEC 377. Operating Systems. Week 1 Class 3
Operating Systems Week 1 Class 3 Last Class! Computer System Structure, Controllers! Interrupts & Traps! I/O structure and device queues.! Storage Structure & Caching! Hardware Protection! Dual Mode Operation
High-Performance Processing of Large Data Sets via Memory Mapping A Case Study in R and C++
High-Performance Processing of Large Data Sets via Memory Mapping A Case Study in R and C++ Daniel Adler, Jens Oelschlägel, Oleg Nenadic, Walter Zucchini Georg-August University Göttingen, Germany - Research
4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access
4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows
BEAGLEBONE BLACK ARCHITECTURE MADELEINE DAIGNEAU MICHELLE ADVENA
BEAGLEBONE BLACK ARCHITECTURE MADELEINE DAIGNEAU MICHELLE ADVENA AGENDA INTRO TO BEAGLEBONE BLACK HARDWARE & SPECS CORTEX-A8 ARMV7 PROCESSOR PROS & CONS VS RASPBERRY PI WHEN TO USE BEAGLEBONE BLACK Single
General Introduction
Managed Runtime Technology: General Introduction Xiao-Feng Li ([email protected]) 2012-10-10 Agenda Virtual machines Managed runtime systems EE and MM (JIT and GC) Summary 10/10/2012 Managed Runtime
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Return-oriented programming without returns
Faculty of Computer Science Institute for System Architecture, Operating Systems Group Return-oriented programming without urns S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy
CHAPTER FIVE RESULT ANALYSIS
CHAPTER FIVE RESULT ANALYSIS 5.1 Chapter Introduction 5.2 Discussion of Results 5.3 Performance Comparisons 5.4 Chapter Summary 61 5.1 Chapter Introduction This chapter outlines the results obtained from
Central Processing Unit (CPU)
Central Processing Unit (CPU) CPU is the heart and brain It interprets and executes machine level instructions Controls data transfer from/to Main Memory (MM) and CPU Detects any errors In the following
Operating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
CSC 2405: Computer Systems II
CSC 2405: Computer Systems II Spring 2013 (TR 8:30-9:45 in G86) Mirela Damian http://www.csc.villanova.edu/~mdamian/csc2405/ Introductions Mirela Damian Room 167A in the Mendel Science Building [email protected]
Sequential Performance Analysis with Callgrind and KCachegrind
Sequential Performance Analysis with Callgrind and KCachegrind 2 nd Parallel Tools Workshop, HLRS, Stuttgart, July 7/8, 2008 Josef Weidendorfer Lehrstuhl für Rechnertechnik und Rechnerorganisation Institut
ARM Microprocessor and ARM-Based Microcontrollers
ARM Microprocessor and ARM-Based Microcontrollers Nguatem William 24th May 2006 A Microcontroller-Based Embedded System Roadmap 1 Introduction ARM ARM Basics 2 ARM Extensions Thumb Jazelle NEON & DSP Enhancement
Software based Finite State Machine (FSM) with general purpose processors
Software based Finite State Machine (FSM) with general purpose processors White paper Joseph Yiu January 2013 Overview Finite state machines (FSM) are commonly used in electronic designs. FSM can be used
Figure 1: RotemNet Main Screen
1 REMOTE CONTROLLER ACCESS This paper summarizes the installation and configuration procedures needed to enable accessing your Communicator and controllers via the Internet. The information contained in
GIVE WINGS TO YOUR IDEAS TOOLS MANUAL
GIVE WINGS TO YOUR IDEAS TOOLS MANUAL PLUG IN TO THE WIRELESS WORLD Version: 001 / 1.0 Date: October 30, 2001 Reference: WM_TOO_OAT_UGD_001 confidential Page: 1 / 22 (THIS PAGE IS INTENTIONALY LEFT BLANK)
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER Pierre A. von Kaenel Mathematics and Computer Science Department Skidmore College Saratoga Springs, NY 12866 (518) 580-5292 [email protected] ABSTRACT This paper
CSE 141L Computer Architecture Lab Fall 2003. Lecture 2
CSE 141L Computer Architecture Lab Fall 2003 Lecture 2 Pramod V. Argade CSE141L: Computer Architecture Lab Instructor: TA: Readers: Pramod V. Argade ([email protected]) Office Hour: Tue./Thu. 9:30-10:30
OfficeServ Application Suite
OfficeServ Application Suite Introduction to the standard package The OfficeServ application suite consists of a number of applications designed to enhance the functionality and usability of the Samsung
Gigabit Ethernet Packet Capture. User s Guide
Gigabit Ethernet Packet Capture User s Guide Copyrights Copyright 2008 CACE Technologies, Inc. All rights reserved. This document may not, in whole or part, be: copied; photocopied; reproduced; translated;
Attacking Obfuscated Code with IDA Pro. Chris Eagle
Attacking Obfuscated Code with IDA Pro Chris Eagle Outline Introduction Operation Demos Summary 2 First Order Of Business MOVE UP AND IN! There is plenty of room up front I can't increase the font size
Xen and the Art of. Virtualization. Ian Pratt
Xen and the Art of Virtualization Ian Pratt Keir Fraser, Steve Hand, Christian Limpach, Dan Magenheimer (HP), Mike Wray (HP), R Neugebauer (Intel), M Williamson (Intel) Computer Laboratory Outline Virtualization
PARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
ARM VIRTUALIZATION FOR THE MASSES. Christoffer Dall <[email protected]> <[email protected]>
ARM VIRTUALIZATION FOR THE MASSES Christoffer Dall ARM Smartphones Smartphones Tablets Tablets ARM Servers But now also... But now also... ARM Servers
Tizen SDK Annual Report Key Improvements. Changseok Oh (Samsung), Yeongkyoon Lee (S-Core)
Tizen SDK Annual Report Key Improvements Changseok Oh (Samsung), Yeongkyoon Lee (S-Core) Introduction Tizen SDK Release History Samsung Gear-S2 Next Tizen Mobile Next Tizen SDK Samsung Z130H Mobile Native(C/C++)
OpenFlow with Intel 82599. Voravit Tanyingyong, Markus Hidell, Peter Sjödin
OpenFlow with Intel 82599 Voravit Tanyingyong, Markus Hidell, Peter Sjödin Outline Background Goal Design Experiment and Evaluation Conclusion OpenFlow SW HW Open up commercial network hardware for experiment
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM 1 The ARM architecture processors popular in Mobile phone systems 2 ARM Features ARM has 32-bit architecture but supports 16 bit
l C-Programming l A real computer language l Data Representation l Everything goes down to bits and bytes l Machine representation Language
198:211 Computer Architecture Topics: Processor Design Where are we now? C-Programming A real computer language Data Representation Everything goes down to bits and bytes Machine representation Language
Webinar Information. Title: Websense Remote Filtering Audio information: Dial-in numbers:
Webinar Information Title: Websense Remote Filtering Audio information: This presentation incorporates STREAMING AUDIO. Use of speakers or headsets is required. If unable to hear streaming audio or it
System Requirements for Microsoft Dynamics NAV 2016
System Requirements for Microsoft Dynamics NAV 2016 Microsoft Dynamics NAV 2016 The following sections list the minimum hardware and software requirements to install and run Microsoft Dynamics NAV 2016.
Rethinking SIMD Vectorization for In-Memory Databases
SIGMOD 215, Melbourne, Victoria, Australia Rethinking SIMD Vectorization for In-Memory Databases Orestis Polychroniou Columbia University Arun Raghavan Oracle Labs Kenneth A. Ross Columbia University Latest
İSTANBUL AYDIN UNIVERSITY
İSTANBUL AYDIN UNIVERSITY FACULTY OF ENGİNEERİNG SOFTWARE ENGINEERING THE PROJECT OF THE INSTRUCTION SET COMPUTER ORGANIZATION GÖZDE ARAS B1205.090015 Instructor: Prof. Dr. HASAN HÜSEYİN BALIK DECEMBER
Embedded Linux RADAR device
Embedded Linux Conference Europe 2012 (Barcelona - November 5-7) Embedded Linux RADAR device Taking advantage on Linaro tools and HTML5 AJAX real-time visualization Agustí FONTQUERNI GORCHS [email protected]
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Instruction Set Architecture (ISA)
Instruction Set Architecture (ISA) * Instruction set architecture of a machine fills the semantic gap between the user and the machine. * ISA serves as the starting point for the design of a new machine
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
Live und in Farbe Live Migration. André Przywara [email protected] CLT 2010
Live und in Farbe Live Migration André Przywara [email protected] CLT 2010 Agenda (Live) Migration explained (Why? Limits!) Xen and KVM usage Details Memory synchronization QEMU device state transfer Host considerations
System Requirements for Microsoft Dynamics NAV 2016
1 of 13 19.01.2016 17:52 System Requirements for Microsoft Dynamics NAV 2016 Microsoft Dynamics NAV 2016 The following sections list the minimum hardware and software requirements to install and run Microsoft
Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
Getting Started with Tizen SDK : How to develop a Web app. Hong Gyungpyo 洪 競 杓 Samsung Electronics Co., Ltd
Getting Started with Tizen SDK : How to develop a Web app Hong Gyungpyo 洪 競 杓 Samsung Electronics Co., Ltd Introduction to Tizen SDK Tizen Platform (1/2) Application Web Applications Native Applications
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Chapter 3. Hardware and software requirements
Chapter 3. Hardware and software requirements The following sections provide specific information about the memory, software, and hardware requirements for installing IBM Tivoli Monitoring. This section
Dynamic Behavior Analysis Using Binary Instrumentation
Dynamic Behavior Analysis Using Binary Instrumentation Jonathan Salwan [email protected] St'Hack Bordeaux France March 27 2015 Keywords: program analysis, DBI, DBA, Pin, concrete execution, symbolic
Reverse Engineering by Crayon: Game Changing Hypervisor and Visualization Analysis
Reverse Engineering by Crayon: Game Changing Hypervisor and Visualization Analysis Game Changing Hypervisor Based Malware Analysis and Visualization Danny Quist Lorie Liebrock New Mexico Tech Computer
Lecture 26: Obfuscation
Lecture 26: Obfuscation 15411: Compiler Design Robbie Harwood and Maxime Serrano 21 November 2013 1 Introduction We have previously (lecture 20) considered the problem of doing compilation backwards (i.e.,
Performance Monitoring of the Software Frameworks for LHC Experiments
Proceedings of the First EELA-2 Conference R. mayo et al. (Eds.) CIEMAT 2009 2009 The authors. All rights reserved Performance Monitoring of the Software Frameworks for LHC Experiments William A. Romero
Storage Class Memory Support in the Windows Operating System Neal Christiansen Principal Development Lead Microsoft nealch@microsoft.
Storage Class Memory Support in the Windows Operating System Neal Christiansen Principal Development Lead Microsoft [email protected] What is Storage Class Memory? Paradigm Shift: A non-volatile storage
Efficient and Large-Scale Infrastructure Monitoring with Tracing
CloudOpen Europe 2013 Efficient and Large-Scale Infrastructure Monitoring with Tracing [email protected] 1 Content Overview of tracing and LTTng LTTng features for Cloud Providers LTTng as a
Eliminate Memory Errors and Improve Program Stability
Eliminate Memory Errors and Improve Program Stability with Intel Parallel Studio XE Can running one simple tool make a difference? Yes, in many cases. You can find errors that cause complex, intermittent
Eddy Integrated Development Environment, LemonIDE for Embedded Software System Development
Introduction to -based solution for embedded software development Section 1 Eddy Real-Time, Lemonix Section 2 Eddy Integrated Development Environment, LemonIDE Section 3 Eddy Utility Programs Eddy Integrated
Overview of the Cortex-M3
CHAPTER Overview of the Cortex-M3 2 In This Chapter Fundamentals 11 Registers 12 Operation Modes 14 The Built-In Nested Vectored Interrupt Controller 15 The Memory Map 16 The Bus Interface 17 The MPU 18
Understanding the Benefits of IBM SPSS Statistics Server
IBM SPSS Statistics Server Understanding the Benefits of IBM SPSS Statistics Server Contents: 1 Introduction 2 Performance 101: Understanding the drivers of better performance 3 Why performance is faster
Windows Vista (DARC) Matthew Cook http://escarpment.net/ http://darc-tech.org.uk/
Windows Vista (DARC) Matthew Cook http://escarpment.net/ http://darc-tech.org.uk/ 1 Introduction to Vista Five years worth of development Complex and big product Many versions Lots of under the hood changes
Introduction. Application Performance in the QLinux Multimedia Operating System. Solution: QLinux. Introduction. Outline. QLinux Design Principles
Application Performance in the QLinux Multimedia Operating System Sundaram, A. Chandra, P. Goyal, P. Shenoy, J. Sahni and H. Vin Umass Amherst, U of Texas Austin ACM Multimedia, 2000 Introduction General
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
https://login.microsoftonline.com
MICROSOFT OFFICE 365 PRO PLUS Through an EES agreement that is maintained with Microsoft, Calumet College of St. Joseph is able to provide Microsoft Office 365 Pro Plus for currently active students, faculty
MICROPROCESSOR AND MICROCOMPUTER BASICS
Introduction MICROPROCESSOR AND MICROCOMPUTER BASICS At present there are many types and sizes of computers available. These computers are designed and constructed based on digital and Integrated Circuit
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Lecture 11: Multi-Core and GPU. Multithreading. Integration of multiple processor cores on a single chip.
Lecture 11: Multi-Core and GPU Multi-core computers Multithreading GPUs General Purpose GPUs Zebo Peng, IDA, LiTH 1 Multi-Core System Integration of multiple processor cores on a single chip. To provide
System Requirements for Microsoft Dynamics NAV 2016
Page 1 of 7 System Requirements for Microsoft Dynamics NAV 2016 Microsoft Dynamics NAV 2016 The following sections list the minimum hardware and software requirements to install and run Microsoft Dynamics
