Putting the dynamic into software security testing

Size: px
Start display at page:

Download "Putting the dynamic into software security testing"

Transcription

1 Ptting the dynamic into software secrity testing Detecting and Addressing Cybersecrity Isses V

2 Code ahead! 2

3 Atomated vlnerability detection and triage + = 3

4 How did we get here? Vector was engaged with a large, US Tier 1 and we were addressing software qality They acknowledged they had software qality isses Concern was related to how these qality isses cold affect secrity Project goals morphed into low-hanging secrity frit (for both the cstomer and the attacker)! Or goal was more along the lines of robstness! 4

5 VectorCAST test atomation platform 5

6 Vector testing soltion Software System Link to Reqirements System Validation System Integration Test Software Integration Test Software Unit Test System validation + code coverage on ECU Change-Based Testing SW integration testing + code coverage on PC White-box testing on host / on target CANoe, vteststdio VT System VectorCAST/QA CANoe, vteststdio vvirtualtarget VectorCAST/C++ and /QA VectorCAST/C++ VectorCAST Analytics Software Implementation Benefits Fll spport in the development process, from software nit test to system validation Uniform test management, test atomation (CI), reslt analysis and traceability 6

7 Vlnerability detection via dynamic analysis The idea The approach To be able to identify and atomatically test for ndiagnosed secrity vlnerabilities Utilizes MITRE s classification of CWEs (common weakness enmeration) Once an instance of a generic CWE is fond in the software, that isse is then classed as a CVE (common vlnerability and exposre) Atomatically interrogate the code and identify possible weaknesses (a la static analysis) Once a potential CWE is fond, generate a test exploiting the identified isse and execte it (dynamic exection) After exection, analyses the exection trace and decide if the potential CWE is a genine threat Code CWEs Tests Exection Analysis CVEs 7

8 Vlnerability detection via dynamic analysis The benefits Weaknesses identified Unlike static analysis, this method will only flag an isse if we can generate an exploit, eliminating the false-positive isse plaging static analysis The generation of test artefacts allows for their ftre re-exection to demonstrate the mitigation of a potential isse after software redesign Can be sed for both on-host and on-target exection (think secrity validation for embedded systems) Via the analysis of open-sorce projects, a nmber of API-sage related isses have been identified A large US atomotive Tier 1 has sed it to find secrity-specific rese isses on their software platform Able to atomatically find isses sch as NULL pointer dereference (CWE-476), classic bffer overflow (CWE-120) and improper resorce shtdown/release (CWE-404) Atomated Validation 8

9 Two technical approaches Mtational (test-site) fzz testing Take an existing test-site Modify the vales to be randomly erroneos Rn it with coverage Does it crash? If yes: potential weakness! Directed ( intelligent ) secrity testing Identify an expression of interest > E.g., pointer dereference, divide by zero Generate a test reaching that line with erroneos vales Rn it with coverage Does it crash? If yes: potential weakness! 9

10 Example from lighttpd int bffer_copy_string_bffer(bffer *b, const bffer *src) { if (!src) retrn -1; } if (src->sed == 0) { b->sed = 0; retrn 0; } retrn bffer_copy_string_len(b, src->ptr, src->sed - 1); Not detected: CppCheck, Facebook s Infer, Uno Possible error: Lint, CodeHawk Programmatic error detected (SIGSEGV): VectorCAST 10

11 Secrity weaknesses of interest The approach is focsed on atomatically generating tests for a nmber of classifications of vlnerabilities according to MITRE At the highest level, we look to address the general banner CWE-398 ( indication of poor code qality ) Some examples of isses we aim to detect Hard errors Use of a NULL pointer (CWE-476) Bffer {nder,over}flow (stack corrption) (CWE-124) Divide by zero (CWE-369) Mismatched calls malloc/free, fopen/fclose, pthread_mtex_lock/pthread_mtex_nlock (CWE- 401/404/413/415/590) Bad argments memcpy (CWE-120/130) Unchecked retrn malloc (CWE-252/690) 11

12 12 Technical Approach

13 Atomated (mtational) fzz testing for nit testing Existing test-case: > TEST.VALUE:bffer.bffer_copy_string_bffer.src:<<malloc 1>> > TEST.VALUE:bffer.bffer_copy_string_bffer.src[0].sed:0 > TEST.VALUE:bffer.bffer_copy_string_bffer.b:<<malloc 1>> Maniplate the vales: > TEST.VALUE:bffer.bffer_copy_string_bffer.src:<<malloc 1>> > TEST.VALUE:bffer.bffer_copy_string_bffer.src[0].sed:0 > TEST.VALUE:bffer.bffer_copy_string_bffer.b:<<nll>> Execte! 13

14 From software to mathematics Replace x with code and 0 with nll pointer dereference 14

15 Directed test-case generation for weaknesses We combine in-depth static analysis with constraint solving to identify more complex weaknesses: > param_2->x += 3; > param_3->y += 2; > retrn param_1->z / (param_2->x - param_3->y); Fzz testing has to get lcky here, bt sing test-case generation we can directly generate a test sch that: > (param_2->x 3) (param_3->y 2) 0 This gets fed to a black box oracle that can provide the answer! 15

16 16 Real World Examples

17 Real examples fond (divide by zero) atomotive extern VEHICLE_T Vehicle; void check_speed(int8_t speed_thomph) { int32_t temp,tho_mph,tho_rpm; if(vehicle.wheelspeed<150) {} else { if(speed_thomph>1000) {} else { Tho_MPH=0; } } if(tho_mph==0) { // no change to Tho_MPH! } else {} There exists a nmber of paths throgh the code where Tho_MPH is nassigned (so ndefined behavior) or is assigned to zero What is srprising is that Tho_MPH is checked against 0 and then sed in a divide at the same scope-level No corrective action taken, even thogh the corrective condition is already detected! 17 } temp=(100*tho_rpm)/tho_mph;

18 Real examples fond (NULL pointer) medical STATUS process_lamp_event(lamp_pattern_t patternid, LAMP_TASK_DATA_t *ptrtaskdata) { DRV_RET_CODE_t drvretcode = DRV_RC_ERROR; STATUS retcode = OK; LAMP_PATTERN_t tmppatternid = patternid; A lot of the code for provided in this project was extremely jdicios in checking all parameters Their style of coding made this crash stand-ot, as ptrtaskdata is never checked for nll! if (((LAMP_FAST_BLINKING == ptrtaskdata->previospatternid) (LAMP_SLOW_BLINKING == ptrtaskdata->previospatternid)) && (LAMP_PATTERN_NONE == tmppatternid)) { tmppatternid = ptrtaskdata->previospatternid; } } ptrtaskdata->conter += ptrtaskdata->timeot_ms; 18

19 19 Actionable Intelligence

20 Actionable Intelligence Software metrics An approach to ascertaining qickly Chess Morningstar for Software Secrity absence of obvios reliability isses This similar to CWE-398 for poor code qality The easy ones Defect density Defects/SLoC Lines free from obvios isses (via code coverage) Confidence of defect freedom (bt not garanteed!) Ratio of secrity tests free of defects Higher ratio => more secre 20

21 Actionable Intelligence Open Sorce analysis Project Metric LIGHTTPD ZLIB LIBXML2 Version # files SLoC⁶ 36,605 6, ,179 Uniqe # isses ,926 Defect density (defects/line) 1/52 1/60 1/63 Avg. # of tests per defect Tests hitting defects 69% 28% 40% Fnctions with defects 44% 44% 29% Fnctions with vg 20 and defects⁷ 51% 55% 66% ⁶measred with cloc 21 ⁷Jones 08: [complexity] levels greater than 20 are considered hazardos

22 Take home Process Identify portfolio Assess vlnerabilities Manage risk Some of the isses we find yo might consider are non-isses or are mitigated against as part of yor software architectre That s great be wary abot software re-se across projects! Mainly: no one size fits all soltion se mltiple tools! Dynamic exection can find certain vlnerabilities more definitively Need to always consider DP-E ratio (damage potential vs. effort) 22

23 For more information abot Vector and or prodcts please visit Vector Informatik GmbH. All rights reserved. Any distribtion or copying is sbject to prior written approval by Vector. V

Automotive Software Security Testing

Automotive Software Security Testing Detecting and Addressing Cybersecurity Issues V1.1 2018-03-05 Code ahead! 2 Automated vulnerability detection and triage + = 3 How did we get here? Vector was engaged with a large, US Tier 1 and we were

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation

More information

Benefits of Collecting Code Coverage Metrics during HIL/ECU Testing

Benefits of Collecting Code Coverage Metrics during HIL/ECU Testing Benefits of Collecting Code Coverage Metrics during HIL/ECU Testing Jeffrey Fortin Product Manager VectorCAST V0.1 2018-10-30 Agenda 1. How VectorCAST fits into HIL/ECU Testing 2. Demo 3. Questions and

More information

Vector Logger Cloud. VECTOR GB Ltd Conference, 28th Sept, 2017 V

Vector Logger Cloud. VECTOR GB Ltd Conference, 28th Sept, 2017 V Vector Logger Clod VECTOR GB Ltd Conference, 28th Sept, 2017 V1.0 2017-09-27 Agenda Challenges Vector Logger Clod Secrity Aspects Data Acqisition Policy Conclsion 2 Vector Logger Clod Challenges Growing

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 9: Synchronization (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Cooperation between Threads

More information

Diagnostics is evolving

Diagnostics is evolving Diagnostics is evolving Vector India Conference, 208-07-8 V.0 208-07-3 Agenda AUTOSAR Development Remote Diagnostics and OTA Secrity 2 AUTOSAR Development DEXT Diagnostic Extract Template (=DEXT) Part

More information

Risk Based Security. Automotive Safety & Security, 30. Mai 2017 Christof Ebert and Dominik Lieckfeldt, Vector Consulting Services V1.

Risk Based Security. Automotive Safety & Security, 30. Mai 2017 Christof Ebert and Dominik Lieckfeldt, Vector Consulting Services V1. Risk Based Secrity Atomotive Safety & Secrity, 30. Mai 2017 Christof Ebert and Dominik Lieckfeldt, Vector Conslting Services V1.0 2017-05-30 Agenda Motivation Risk-based approach to Cybersecrity Conslsion

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 12: Deadlock Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Deadlock the deadly embrace! Synchronization

More information

webinar series

webinar series Ethernet@Atomotive webinar series Moving Forward: Tool Spported Development for Atomotive Ethernet in Time Sensitive Networks V1.06 2016-07-04 Agenda Introdction 3 Recap: Physical layers, network topology

More information

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

CAN FD. An Introduction V

CAN FD. An Introduction V CAN FD An Introdction V.02 208-0- Agenda Why CAN FD? What is CAN FD? CAN FD Use Cases Atomotive Application Domains CAN FD Controller CAN FD Performance CAN FD Devices CAN FD Standardization Smmary References

More information

DSCS6020: SQLite and RSQLite

DSCS6020: SQLite and RSQLite DSCS6020: SQLite and RSQLite SQLite History SQlite is an open sorce embedded database, meaning that it doesn t have a separate server process. Reads and writes to ordinary disk files. The original implementation

More information

Lecture 13: Exceptions and Interrupts

Lecture 13: Exceptions and Interrupts 18 447 Lectre 13: Eceptions and Interrpts S 10 L13 1 James C. Hoe Dept of ECE, CU arch 1, 2010 Annoncements: Handots: Spring break is almost here Check grades on Blackboard idterm 1 graded Handot #9: Lab

More information

Enabling Connectivity with Service Oriented Architectures

Enabling Connectivity with Service Oriented Architectures Enabling Connectivity with Service Oriented Architectres Vector GB Conference 2017 V2.0 2017-09-21 Agenda Different Perspectives on Connectivity From Signal Oriented to Service Oriented Architectres Ftre

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 25: Dynamic Memory (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Some slides modified from originals

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 26: Dynamic Memory (2) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Some slides modified from originals

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

AUTOSAR System and Software Design with PREEvision

AUTOSAR System and Software Design with PREEvision PREEvision 9.0 RELEASED V0.0 2018-10-15 Agenda CAN FD Commnication Design 2 OVERVIEW 3 Overview AUTOSAR in PREEvision Software Architectre Commnication Network Topology 4 Overview 5 Overview Mlti ser spport

More information

Overview of Security Support in Vector Tools

Overview of Security Support in Vector Tools Overview of Secrity Spport in Vector Tools Secrity Manager V0.2 2017-09-22 Agenda Motivation Challenges Secrity Manager Otlook 2 Motivation Secrity protects Featres and Bsiness Models Secrity Goals: Integrity

More information

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

CANoe/CANalyzer. Tools for comprehensive CAN Network Analysis and Test - An Overview V

CANoe/CANalyzer. Tools for comprehensive CAN Network Analysis and Test - An Overview V CANoe/CANalyzer Tools for comprehensive CAN Network Analysis and Test - An Overview V1.53 2016-03-08 Agenda Overview Measrement and Simlation Setp Working with Databases Analysis Windows Data Logging Offline

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Midterm Review Midterm in class on Friday (May 4) Covers material from arch spport to deadlock Based pon lectre material and modles of the book indicated on

More information

EXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation

EXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation EXAINATIONS 2003 COP203 END-YEAR Compter Organisation Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. There are 180 possible marks on the eam. Calclators and foreign langage dictionaries

More information

What s New in AUTOSAR?

What s New in AUTOSAR? What s New in AUTOSAR? By Stephen Waldron Local Prodct Line Manager Vector UK Conference, Wednesday 27 th September 2017 V1.6.1 2017-08-22 Agenda What s New in AUTOSAR? AUTOSAR 4.3 Software Architectre

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Dr Paolo Guagliardo. Fall 2018

Dr Paolo Guagliardo. Fall 2018 The NULL vale Dr Paolo Gagliardo dbs-lectrer@ed.ac.k Fall 2018 NULL: all-prpose marker to represent incomplete information Main sorce of problems and inconsistencies... this topic cannot be described in

More information

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03 EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

Bits, Bytes, and Integer

Bits, Bytes, and Integer 19.3 Compter Architectre Spring 1 Bits, Bytes, and Integers Nmber Representations Bits, Bytes, and Integer Representing information as bits Bit-level maniplations Integers Representation: nsigned and signed

More information

Program address space

Program address space Program address space What does the OS loader do? Creates new process Sets p address space/segments Read exectable ile, load instrctions, init global data Mapped rom ile into green segments Libraries loaded

More information

Content Safety Precaution... 4 Getting started... 7 Input method... 9 Using the Menus Use of USB Maintenance & Safety...

Content Safety Precaution... 4 Getting started... 7 Input method... 9 Using the Menus Use of USB Maintenance & Safety... STAR -1- Content 1. Safety Precation... 4 2. Getting started... 7 Installing the cards and the Battery... 7 Charging the Battery... 8 3. Inpt method... 9 To Shift Entry Methods... 9 Nmeric and English

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

EMC AppSync. User Guide. Version REV 01

EMC AppSync. User Guide. Version REV 01 EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

CANoe/CANalyzer New Features

CANoe/CANalyzer New Features CANoe/CANalyzer New Featres Version 11.0 V1.0 2018-04-10 Agenda Release Information General Diagnostics Testing (CANoe only) VT System AMD/XCP (CANoe only) Scope Sensor CAN / CAN FD Ethernet LIN Car2x

More information

Ma Lesson 18 Section 1.7

Ma Lesson 18 Section 1.7 Ma 15200 Lesson 18 Section 1.7 I Representing an Ineqality There are 3 ways to represent an ineqality. (1) Using the ineqality symbol (sometime within set-bilder notation), (2) sing interval notation,

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

Bits, Bytes, and Integers. Bits, Bytes, and Integers. The Decimal System and Bases. Everything is bits. Converting from Decimal to Binary

Bits, Bytes, and Integers. Bits, Bytes, and Integers. The Decimal System and Bases. Everything is bits. Converting from Decimal to Binary with contribtions from Dr. Bin Ren, College of William & Mary Addition, negation, mltiplication, shifting 1 Everything is bits The Decimal System and Bases Each bit is or 1 By encoding/interpreting sets

More information

DIVAR IP U. Video DIVAR IP U.

DIVAR IP U. Video DIVAR IP U. Video DIVAR IP 6000 2U DIVAR IP 6000 2U RAID-5 protected (standard configration), all-in-one recording soltion for p to 128 channels Pre-installed, pre-configred IP storage soltion with p to 32 TB storage

More information

DIVAR IP U. Video DIVAR IP U.

DIVAR IP U. Video DIVAR IP U. Video DIVAR IP 6000 3U DIVAR IP 6000 3U www.boschsecrity.com RAID-5 protected (standard configration), all-in-one recording soltion for p to 128 channels Pre-installed, pre-configred IP storage soltion

More information

ICMS3 Integrated Corrosion Management System

ICMS3 Integrated Corrosion Management System Integrated System Featres Total Data Data Exhange with DCS/PCS/SCADA Systems Correlate & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Personnel Fll Client- Operation The Integrated

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

The best decision leaves you options

The best decision leaves you options From Eye to Insight Digital HD Microscope Cameras The best decision leaves yo options The Leica MC170 HD and Leica MC190 HD 2 Easy. Fast. Brilliant. Fast and precise HD live preview images right on yor

More information

Lecture 7. Building A Simple Processor

Lecture 7. Building A Simple Processor Lectre 7 Bilding A Simple Processor Christos Kozyrakis Stanford University http://eeclass.stanford.ed/ee8b C. Kozyrakis EE8b Lectre 7 Annoncements Upcoming deadlines Lab is de today Demo by 5pm, report

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

AUTOSAR Diagnostic Extract

AUTOSAR Diagnostic Extract AUTOSAR Diagnostic Extract The Standard in Practice V1.0 2017-09-26 Agenda Diagnostic Processes in Place AUTOSAR DEXT Introdction Designed for ECU development Enhancement of E/E Workflow Conclsion 2 Diagnostic

More information

DLA AIOL Series IP Video Storage Array

DLA AIOL Series IP Video Storage Array Video DLA AIOL0 1400 Series IP Video Storage Array DLA AIOL0 1400 Series IP Video Storage Array www.boschsecrity.com RAID-5 protected, all-in-one recording soltion for p to 64 channels Pre-installed, pre-configred

More information

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage

More information

Today: Bits, Bytes, and Integers. Bits, Bytes, and Integers. For example, can count in binary. Everything is bits. Encoding Byte Values

Today: Bits, Bytes, and Integers. Bits, Bytes, and Integers. For example, can count in binary. Everything is bits. Encoding Byte Values Today: Bits, Bytes, and Integers Representing information as bits Bits, Bytes, and Integers CSci : Machine Architectre and Organization September th-9th, Yor instrctor: Stephen McCamant Bit-level maniplations

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

Features. ICMS Integrated Corrosion Management System

Features. ICMS Integrated Corrosion Management System ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion

More information

DIVAR IP Video DIVAR IP Remote viewing via Video Security App and Video Security Client from Bosch

DIVAR IP Video DIVAR IP Remote viewing via Video Security App and Video Security Client from Bosch Video DIVAR IP 5000 DIVAR IP 5000 www.boschsecrity.com Remote viewing via Video Secrity App and Video Secrity Client from Bosch Flly featred video recording soltion for p to 32 channels Ot-of-the-box IP

More information

LDAP Configuration Guide

LDAP Configuration Guide LDAP Configration Gide Content Content LDAP directories on Gigaset phones............................................... 3 Configration.....................................................................

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

CS421 COMPILERS AND INTERPRETERS. the point it was passed (line 11). explicit vs implicit memory de-allocation? (malloc-free vs. garbage collection)

CS421 COMPILERS AND INTERPRETERS. the point it was passed (line 11). explicit vs implicit memory de-allocation? (malloc-free vs. garbage collection) rocedre arameters (in ascal) rocedre parameters permit procedres to be invoked ot-of-scope ; 1 program main(inpt, otpt); 2 3 procedre b(fnction h(n : integer): integer); 4 var m : integer; 5 begin m :=

More information

More on Runtime Environments. Procedure Parameters (in Pascal) Traditional Stack Scheme. Restrictions in C & Pascal. code.

More on Runtime Environments. Procedure Parameters (in Pascal) Traditional Stack Scheme. Restrictions in C & Pascal. code. More on Rntime Environments How to efficiently implement procedre call and retrn in the presence of higher-order fnctions? 1. what are higher-order fnctions? 2. how to ext frames to spport higher-order

More information

Nortel DECT Handset 4025 User Guide

Nortel DECT Handset 4025 User Guide DECT 4025 Nortel DECT Handset 4025 User Gide Revision history Revision history October 2005 Standard 2.00. This docment is p-issed to spport Nortel Commnication Server 1000 Release 4.5. Febrary 2005 Standard

More information

Ellucian ODS9.0 Upgrade Migrating from OWB to ODI. Amir Saleem Centennial College May 17, 2017

Ellucian ODS9.0 Upgrade Migrating from OWB to ODI. Amir Saleem Centennial College May 17, 2017 Ellcian ODS9.0 Upgrade Migrating from OWB to ODI Amir Saleem Centennial College May 17, 2017 Topics OWB Spport Oracle Data Integrator (ODI) ODI Architectre Upgrade paths General Gideline for ODS infrastrctre

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 23: File Systems (2) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Abstractions for the

More information

Addressing in Future Internet: Problems, Issues, and Approaches

Addressing in Future Internet: Problems, Issues, and Approaches Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 8: Threads Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Processes P1 P2 Recall that Bt OS A process

More information

Content Content Introduction

Content Content Introduction Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

DPDK s Best Kept Secret: Micro-benchmarks. M Jay DPDK Summit - San Jose 2017

DPDK s Best Kept Secret: Micro-benchmarks. M Jay DPDK Summit - San Jose 2017 DPDK s Best Kept Secret: Micro-benchmarks M Jay Mthrajan.Jayakmar@intel.com DPDK Smmit - San Jose 2017 Legal Information Optimization Notice: Intel s compilers may or may not optimize to the same degree

More information

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard

More information

FT3. Testing Systems. Precision Thickness Gauge.

FT3. Testing Systems. Precision Thickness Gauge. Testing Systems www.igt.nl FT3 Precision Thickness Gage Accrate and repeatable thickness measrements Compliant to a mltiple standards Choice of configration FT3 Precision Thickness Gage P R E C I S E L

More information

AAA CENTER FOR DRIVING SAFETY & TECHNOLOGY

AAA CENTER FOR DRIVING SAFETY & TECHNOLOGY AAA CENTER FOR DRIVING SAFETY & TECHNOLOGY 2017 FORD MUSTANG PREMIUM CONVERTIBLE INFOTAINMENT SYSTEM* DEMAND RATING Very High Demand The Ford Mstang Convertible s SYNC 3 (version 2.20) infotainment system

More information

Review Multicycle: What is Happening. Controlling The Multicycle Design

Review Multicycle: What is Happening. Controlling The Multicycle Design Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em

More information

DIVAR IP U. Video DIVAR IP U.

DIVAR IP U. Video DIVAR IP U. Video DIVAR IP 7000 3U DIVAR IP 7000 3U www.boschsecrity.com RAID-5 protected (standard configration), all-in-one video management soltion for p to 128 channels Ot-of-the-box IP video management soltion

More information

The Volcano Optimizer Generator: Extensibility and Efficient Search

The Volcano Optimizer Generator: Extensibility and Efficient Search The Volcano Optimizer Generator: Extensibility and Efficient Search - Prithvi Lakshminarayanan - 301313262 Athors Goetz Graefe, Portland State University Won the Most Inflential Paper award in 1993 Worked

More information

EEC 483 Computer Organization

EEC 483 Computer Organization EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and

More information

BIS - Basic Package V4.6

BIS - Basic Package V4.6 Engineered Soltions BIS - Basic Package V4.6 BIS - Basic Package V4.6 www.boschsecrity.com The Bilding Integration System (BIS) BIS is a flexible, scalable secrity and safety management system that can

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

webinar series

webinar series Ethernet@Atomotive webinar series Introdction to Atomotive Ethernet V1.08 2017-09-21 Agenda Information 3 Introdction 6 Physical layers 9 IEEE Ethernet MAC + VLAN 16 Internet Protocol (IPv4/IPv6) 19 TCP

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 2: Historical Perspective Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time What is an OS?

More information

6 Using Bookmarks Using Saved Pages Advanced Features

6 Using Bookmarks Using Saved Pages Advanced Features Overview... - Yahoo! Keitai... -3 Connecting to Yahoo! Keitai... -3 PC Site Browser... -5 PC Site Browser... -5 Connecting to PC Websites... -5 Page Operations... -8 Navigating Pages... -8 Jmping to Next

More information

VirtuOS: an operating system with kernel virtualization

VirtuOS: an operating system with kernel virtualization VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design

More information

AUTOSAR Diagnostic Extract

AUTOSAR Diagnostic Extract AUTOSAR Diagnostic Extract The Standard in Practice V1.0 2016-09-12 Agenda Diagnostic Processes in Place AUTOSAR DEXT Introdction Possibilities with DEXT in Diagnostic Tools Diagnostic Processes with DEXT

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

QoS-driven Runtime Adaptation of Service Oriented Architectures

QoS-driven Runtime Adaptation of Service Oriented Architectures Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi

More information

BIS - Basic package V4.2

BIS - Basic package V4.2 Engineered Soltions BIS - Basic package V4.2 BIS - Basic package V4.2 www.boschsecrity.com Integration of Bosch and third party systems throgh deployment of OPC All relevant information in one ser interface

More information

Access Professional Edition 2.1

Access Professional Edition 2.1 Engineered Soltions Access Professional Edition 2.1 Access Professional Edition 2.1 www.boschsecrity.com Compact access control based on Bosch s innovative AMC controller family Integrated Video Verification

More information

BIS - Basic package V4.3

BIS - Basic package V4.3 Engineered Soltions BIS - Basic package V4.3 BIS - Basic package V4.3 www.boschsecrity.com Integration of Bosch and third party systems throgh deployment of OPC All relevant information in one ser interface

More information

BIS - Basic Package V4.4

BIS - Basic Package V4.4 Engineered Soltions BIS - Basic Package V4.4 BIS - Basic Package V4.4 www.boschsecrity.com Integration of Bosch and third party systems via open interfaces and SDK All relevant information in one ser interface

More information

Cameras. for the Classroom. Easy as Dell. Dell K-12 Education. Dell Software & Peripherals

Cameras. for the Classroom. Easy as Dell. Dell K-12 Education. Dell Software & Peripherals Cameras for the Classroom. Easy as Dell. Dell K-12 Edcation One sorce for all yor camera needs. Easy as Dell. Yor Gide to Dell Camera Soltions. Choosing the right camera......................................1

More information