Android Obfuscation and Deobfuscation. Group 11
|
|
- Ruth Owens
- 6 years ago
- Views:
Transcription
1 Android Obfuscation and Deobfuscation Group 11
2 Password Diary App
3 Overview App - Raj Obfuscation Cam and Jack Deobfuscation Adi and Shon
4 Overview - Concept A password manager that lets you decide whether to encrypt your password or not Add login Encrypt/Decrypt your password Edit your login Delete your login
5 Add Login
6 Encrypt/Decrypt
7 Update and Delete
8 Obfuscation
9 Overview - - Obfuscated using various techniques String Splitting Variable/Class Renaming Control Flow Flattening Method Inlining Resulting source code is magnitudes larger, 100 line class can end up over 10,000 lines of obfuscated code Can be fed into itself multiple times to obfuscate further
10 Variable Renaming - Building mapping of identifiers to randomly generated strings Renaming of variables, methods and classes Different every time Automatic - Issues: Classes and methods defined in android interfaces and classes are not renamed
11 Control Flow Flattening - Splits all statements into individual cases in a switch/case block Can be run over itself multiple times Switches on strings, which means the case variables are generated dynamically with string splitting The case variables are then split into their own switch/case blocks when run over itself Order of statements randomised
12 Example of while loop
13 String Splitting - Strings split into individual characters Rebuilt into string character by character Used in conjunction with control flow flattening If a string is used more than once, it it split up for every occurrence Split all usages of string, except when declared as a property of a class
14 String Splitting
15 Method inling - Automatically replace method calls with method contents Each inlined method is different (variable renaming, control flow flattening) -> Each must be deobfuscated - Issues when method is not defined in same class, or inherited etc
16 Method inling
17 Performance Overhead
18 Storage Overhead No significant storage or performance overhead issues.
19 Deobfuscation
20 Group Obfuscation Techniques Deobfuscation 1 Renaming Control flow flattening String Encryption with AES/CBC Cipher and Base64 Encoding Proguard Unflatten switch cases --> if statements and while loops Base64 decoding + bitwise XOR operations to get key --> Decrypt strings 2 Renaming Prone to SQL injections 3 Renaming Control flow flattening with Dead Code Merging/Splitting classes Opaque predicates Proguard Dead code removal and unflatten switch cases --> simple if statements Opaque predicates are trivial 4 Renaming Opaque predicates Identified method names Removing duplicate if statements 5 Renaming Variable splitting Loop transformations + Dead Code Identified Activity class by familiar methods e.g. oncreate(), onresume() Retransform long do-while loops --> for loops 6 Renaming Encryption with Base64 Encoding Proguard Identified Activity class through oncreate() method and Activity/Intent packages.
21 Example of Control flow flattening deobfuscation
22 Group Obfuscation Techniques Deobfuscation 7 Dead Code Control flow flattening Removal of dead code for easier deobfuscation of switch case blocks. 8 Control flow flattening Dead Code Opaque predicates Simplification of switch statements Removal of dead code. 9 Renaming AES Encryption with Base64 Encoding Control flow flattening Proguard Base64 decoding followed by AES decryption. Replication of string manipulation function to unflatten control flow. 10 Control flow flattening Deobfuscation of switch case blocks through the simplification of a method determining which switch case block to execute. 12 Renaming Proguard 13 Renaming AES Encryption with Base64 Encoding Dead Code + Opaque predicates Proguard Removal of dead code to simplify opaque predicates. Base64 decoding followed by AES decryption.
23 Example of AES Decryption and Base64 Decoding
24 Questions?
Obfuscating Transformations. What is Obfuscator? Obfuscation Library. Obfuscation vs. Deobfuscation. Summary
? Obfuscating Outline? 1? 2 of Obfuscating 3 Motivation: Java Virtual Machine? difference between Java and others? Most programming languages: Java: Source Code Machine Code Predefined Architecture Java
More informationAutomated static deobfuscation in the context of Reverse Engineering
Automated static deobfuscation in the context of Reverse Engineering Sebastian Porst (sebastian.porst@zynamics.com) Christian Ketterer (cketti@gmail.com) Sebastian zynamics GmbH Lead Developer BinNavi
More informationFormal verification of program obfuscations
Formal verification of program obfuscations Sandrine Blazy joint work with Roberto Giacobazzi and Alix Trieu IFIP WG 2.11, 2015-11-10 1 Background: verifying a compiler Compiler + proof that the compiler
More informationLecture 07: Private-key Encryption. Private-key Encryption
Lecture 07: Three algorithms Key Generation: Generate the secret key sk Encryption: Given the secret key sk and a message m, it outputs the cipher-text c (Note that the encryption algorithm can be a randomized
More informationIndustrial Approach: Obfuscating Transformations
Industrial Approach: Obfuscating Transformations Yury Lifshits Steklov Institute of Mathematics, St.Petersburg, Russia yura@logic.pdmi.ras.ru Tartu University 17/03/2006 Yury Lifshits (Steklov Inst. of
More information8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop
Bishop Encryption and Decryption centralized Single point of contact First line of defense If working with VPC Creation and management of security groups Provides additional networking and security options
More information1. Type in your account and password. If you have Windows, Mac, iphone, or Android, you can download corresponding applications here
SmartStor Cloud Web I. Login to SmartStor Cloud 1. Type in your account and password 2. Click If you have Windows, Mac, iphone, or Android, you can download corresponding applications here II. Document
More informationConfiguring Password Encryption
This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About Password Encryption,
More informationCode Obfuscation 10**2+(2*a+3)%2. When 2018/11/29 Where JSecIn Who Gaetan Ferry Why For fun!
Code Obfuscation 10**2+(2*a+3)%2 When 2018/11/29 Where JSecIn Who Gaetan Ferry Why For fun! me@jsecin:/ $ whoami Gaetan Ferry @mabo^w Not on twitter Security expert @Synacktiv : Offensive security company
More informationConfiguring Password Encryption
This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: About AES Password Encryption and Master Encryption Keys, page 1 Licensing
More informationSQL Server DBA Online Training
SQL Server DBA Online Training Microsoft SQL Server is a relational database management system developed by Microsoft Inc.. As a database, it is a software product whose primary function is to store and
More informationLiveBox Manual IOS APPLICATION V (465)
2015 LiveBox Manual IOS APPLICATION V. 3.0.3 (465) http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantees about this documentation and its use and decline any expressed or
More informationBackupAssist v6 to v7 comparison
BackupAssist v6 to v7 comparison Contents 1. What s new in BackupAssist version 7... 2 2. Comparison Matrix... 3 3. New Operating System & Environment support... 4 4. New Centralized Management... 4 5.
More informationDigital Logic Lecture 4 Binary Codes
Digital Logic Lecture 4 Binary Codes By Ghada Al-Mashaqbeh The Hashemite University Computer Engineering Department Outline Introduction. Character coding. Error detection codes. Gray code. Decimal coding.
More informationExternal Encodings Do not Prevent Transient Fault Analysis
External Encodings Do not Prevent Transient Fault Analysis Christophe Clavier Gemalto, Security Labs CHES 2007 Vienna - September 12, 2007 Christophe Clavier CHES 2007 Vienna September 12, 2007 1 / 20
More informationAnalysing ios apps: road from AppStore to security analysis report
Analysing ios apps: road from AppStore to security analysis report Egor Fominykh, Lenar Safin, Yaroslav Alexandrov SmartDec REcon, Brussels, 2017 What we do at SmartDec Decompilation, deobfuscation x86/x64
More informationHiding Information in Software
Hiding Information in Software With Respect to a White-box Security Model Master of Science Thesis in Computer Science ERICA LÖFSTRÖM ANDRÉ MALM Chalmers University of Technology University of Gothenburg
More informationThe attacker appears to use an exploit that is derived from the Metasploit FreeBSD Telnet Service Encryption Key ID Buffer Overflow?
Atlassian Home Documentation Support Blog Forums Explore Dashboard Repositories Carl Pulley owner/repo carlpulley / Challenge11 http://honeynet.org/node/829 Submission for Honeynet Challenge 11 - Dive
More informationOn-Line Self-Test of AES Hardware Implementations
On-Line Self-Test of AES Hardware Implementations G. Di Natale, M. L. Flottes, B. Rouzeyre Laboratoire d Informatique, de Robotique et de Microélectronique de Montpellier Université Montpellier II / CNRS
More informationImplementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture *
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture * Seongje Cho 1, Hyeyoung Chang 1, and Yookun Cho 2 1 Dept. of Computer Science & Engineering, Dankook
More informationSoftware Protection via Obfuscation
Software Protection via Obfuscation Ciprian Lucaci InfoSec Meetup #1 1 About me Software Protection via Obfuscation - Ciprian LUCACI 2 About me 2008-2012 # Bachelor Computer Science @ Politehnica Univerity
More informationNetwork Security Technology Project
Network Security Technology Project Shanghai Jiao Tong University Presented by Wei Zhang zhang-wei@sjtu.edu.cn!1 Part I Implement the textbook RSA algorithm. The textbook RSA is essentially RSA without
More informationAssignment 6. This lab should be performed under the Oracle Linux VM provided in the course.
Assignment 6 This assignment includes hands-on exercises in the Oracle VM. It has two Parts. Part 1 is SQL Injection Lab and Part 2 is Encryption Lab. Deliverables You will be submitting evidence that
More informationOracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents
Oracle B2B 11g Technical Note Technical Note: 11g_006 Security This technical note lists the security options available in Oracle B2B Table of Contents Users... 2 Roles... 2 Step 1: Create the user in
More informationBlock Cipher Modes of Operation
Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 23 rd March 2018 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book
More informationServer Manager User and Permissions Setup
Login and Security Once you successfully create your company databases, the next step is to define the groups and users that can access the TRAVERSE data and the functionality they will have within the
More informationServer-based code obfuscation scheme for APK tamper detection
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:457 467 Published online 10 March 2014 in Wiley Online Library (wileyonlinelibrary.com)..936 SPECIAL ISSUE PAPER Server-based code obfuscation
More informationAn Introduction to JavaScript & Bootstrap Basic concept used in responsive website development Form Validation Creating templates
PHP Course Contents An Introduction to HTML & CSS Basic Html concept used in website development Creating templates An Introduction to JavaScript & Bootstrap Basic concept used in responsive website development
More informationobfuscator Documentation
obfuscator Documentation Release 1.1.5 Timothy McFadden July 17, 2015 Contents 1 Introduction 3 2 Install 5 3 Usage 7 4 Auto Generated API Documentation 9 4.1 obfuscator.file..............................................
More informationPerformance improvements to peer-to-peer file transfers using network coding
Performance improvements to peer-to-peer file transfers using network coding Aaron Kelley April 29, 2009 Mentor: Dr. David Sturgill Outline Introduction Network Coding Background Contributions Precomputation
More informationFree Download Dev. Virto Workflow Activities Kit for SP2010 computer software free download ]
Free Download Dev. Virto Workflow Activities Kit for SP2010 computer software free download ] Description: Although customized working processes are included in Microsoft Office SharePoint 2007, 2010 and
More informationEncrypting Critical Data In Databases. An Overview of the Database Integration Process
Encrypting Critical Data In Databases An Overview of the Database Integration Process Overview As the incidence and severity of security breaches continues to grow, it is increasingly incumbent upon organizations
More informationHow To Send Invites. Send invites from the Cinando website
How To Send Invites General instructions Send invites from the Cinando website Step 1: Access your Send Invites page Step 2: Add Screeners to your invite Step 3: Choose settings Step 4: Send Invite Step
More informationDELL EMC DATA DOMAIN ENCRYPTION
WHITEPAPER DELL EMC DATA DOMAIN ENCRYPTION A Detailed Review ABSTRACT The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers
More informationCpr E 281 FINAL PROJECT ELECTRICAL AND COMPUTER ENGINEERING IOWA STATE UNIVERSITY. FINAL Project. Objectives. Project Selection
Objectives The main objective of the final project is to teach you how to put together all of the class material that you have learned so far in order to program the Altera DE2 board to carry out an independent
More informationODDS (Olympus Dictation Delivery Service) Setup
ODDS (Olympus Dictation Delivery Service) Setup This quick and easy How-To Guide will help you set up your new ODDS account and enable you to start using the Olympus Dictation App on your Smartphone. 1.
More informationMobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents
MobilePASS SOFTWARE AUTHENTICATION SOLUTIONS Security Features Contents Introduction... 2 Technical Features... 2 Security Features... 3 PIN Protection... 3 Seed Protection... 3 Security Mechanisms per
More informationlike a boss Automatically Extracting Obfuscated Strings from Malware
like a boss Automatically Extracting Obfuscated Strings from Malware d41d8cd98f00b204e9800998ecf8427e a5ca7e7281d8b8a570a529895106b1fa PE file format Imports Exports Section metadata strings.exe PE
More informationLamassu: Storage-Efficient Host-Side Encryption
Lamassu: Storage-Efficient Host-Side Encryption Peter Shah, Won So Advanced Technology Group 9 July, 2015 1 2015 NetApp, Inc. All rights reserved. Agenda 1) Overview 2) Security 3) Solution Architecture
More informationKeePass Keep your passwords SAFE. John Steele. August 2015 Copyright John Steele
KeePass Keep your passwords SAFE John Steele August 2015 Copyright John Steele 2015 1 What we will cover What is the problem with passwords How complex do they need to be How can they be stored safely
More informationTechnology Overview. Gallery SIENNA London, England T
Technology Overview Gallery SIENNA London, England T +44 208 340 5677 sales@sienna.tv www.sienna.tv http://ndi.newtek.com SIENNA Cloud for NDI An IP Video Protocol which works today NDI Protocol The NDI
More informationIntroduction Classical Confidentiality Modern Confidentiality Integrity Authentication
Cryptography Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication Introduction Cryptography in the Real World Cryptography is the process of writing or reading secret
More informationWinAutomation Version 8 Release Notes
WinAutomation Version 8 Release Notes Last Updated: 2018-06-05 1 Table of Contents Introduction... 3 Naming Conventions... 4 WinAutomation Console... 5 Robust Robot and control... 5 Enhanced central options
More informationA Reliable Architecture for Substitution Boxes in Integrated Cryptographic Devices
Author manuscript, published in "DCIS'08: Conference on Design of Circuits and Integrated Systems, (2008)" A Reliable Architecture for Substitution Boxes in Integrated Cryptographic Devices G. Di Natale,
More informationPredicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning
Fakultät für Informatik Technische Universität München 26th USENIX Security Symposium Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning Sebastian Banescu
More information70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced. Chapter 7: Advanced File System Management
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management Objectives Understand and configure file and folder attributes Understand
More informationLO! LLVM Obfuscator FRANCISCO BLAS IZQUIERDO RIERA. An LLVM obfuscator for binary patch generation. Master of Science Thesis
LO! LLVM Obfuscator An LLVM obfuscator for binary patch generation Master of Science Thesis FRANCISCO BLAS IZQUIERDO RIERA Chalmers University of Technology University of Gothenburg Department of Computer
More informationBlock Cipher Modes of Operation
Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 24th March 2016 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book
More informationCryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.
Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets
More informationSecret-in.me. A pentester design of password secret manager
Secret-in.me A pentester design of password secret manager Who am I? Security engineer Working at SCRT France! Password manager Password A string Secret Information shared by very few people You have to
More information1. INTRODUCTION to Object Storage
1. INTRODUCTION to Object Storage Welcome to AURO Enterprise Cloud! This document will be help you get started using our Object Storage service. Object Storage is a storage system where objects are stored
More informationEC500. Design of Secure and Reliable Hardware. Lecture 1 & 2
EC500 Design of Secure and Reliable Hardware Lecture 1 & 2 Mark Karpovsky January 17 th, 2013 1 Security Errors injected by the attacker (active attacks) Reliability Errors injected by random sources e.g.
More informationHiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT
More informationUser Manual. UniMag II Magnetic Stripe Reader For Mobile Devices
User Manual UniMag II Magnetic Stripe Reader For Mobile Devices 80110509-001-53 10/21/2011 Copyright 2010-2011, International Technologies & Systems Corporation. All rights reserved. Revision History Revision
More informationBreakingVault SAP DataVault Security Storage vulnerabilities
BreakingVault SAP DataVault Security Storage vulnerabilities Technical details Author: Fernando Russ (fruss@onapsis.com) Sr. Researcher Abstract: This document describes a series of vulnerabilities found
More informationBlock cipher modes. Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 75
Block cipher modes Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 75 Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 76 Block cipher modes Block ciphers (like
More informationmsis Security Policy and Protocol
msis Security Policy and Protocol Introduction This Policy details the secure use of msis as a tool for the capture and reporting of internet intelligence and investigations (i3). msis is a powerful i3
More informationENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel
(a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two
More informationLecture 2B. RTL Design Methodology. Transition from Pseudocode & Interface to a Corresponding Block Diagram
Lecture 2B RTL Design Methodology Transition from Pseudocode & Interface to a Corresponding Block Diagram Structure of a Typical Digital Data Inputs Datapath (Execution Unit) Data Outputs System Control
More informationAttacks on Advanced Encryption Standard: Results and Perspectives
Attacks on Advanced Encryption Standard: Results and Perspectives Dmitry Microsoft Research 29 February 2012 Design Cryptanalysis history Advanced Encryption Standard Design Cryptanalysis history AES 2
More informationMicrosoft - Querying Microsoft SQL Server 2014 (M20461) (M20461)
Microsoft - Querying Microsoft SQL Server 2014 (M20461) (M20461) Code: 6552 Lengt h: URL: 5 days View Online In this course, you will learn the technical skills required to write basic Transact-SQL (T-SQL)
More informationSql Server Syllabus. Overview
Sql Server Syllabus Overview This SQL Server training teaches developers all the Transact-SQL skills they need to create database objects like Tables, Views, Stored procedures & Functions and triggers
More informationThe Android security jungle: pitfalls, threats and survival tips. Scott
The Android security jungle: pitfalls, threats and survival tips Scott Alexander-Bown @scottyab The Jungle Ecosystem Google s protection Threats Risks Survival Network Data protection (encryption) App/device
More informationISSISP 2014 Code Obfuscation Verona, Italy
ISSISP 2014 Code Obfuscation Verona, Italy Christian Collberg University of Arizona www.cs.arizona.edu/ collberg c July 27, 2014 Christian Collberg Overview 3 / 109 Code obfuscation what is it? Informally,
More informationProgressive Authentication in ios
Progressive Authentication in ios Genghis Chau, Denis Plotnikov, Edwin Zhang December 12 th, 2014 1 Overview In today s increasingly mobile-centric world, more people are beginning to use their smartphones
More informationHomework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING
UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING ENEE 457 Computer Systems Security Instructor: Charalampos Papamanthou Homework 2 Out: 09/23/16 Due: 09/30/16 11:59pm Instructions
More information6 Cryptographic Operations API
118/202 TEE Internal API Specification Public Release v1.0 6 Cryptographic Operations API This part of the Cryptographic API defines how to actually perform cryptographic operations: Cryptographic operations
More informationBlock Ciphers and Data Encryption Standard. CSS Security and Cryptography
Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322
More informationCourse 834 EC-Council Certified Secure Programmer Java (ECSP)
Course 834 EC-Council Certified Secure Programmer Java (ECSP) Duration: 3 days You Will Learn How To Apply Java security principles and secure coding practices Java Security Platform, Sandbox, JVM, Class
More informationHolistic Database Security
Holistic Database Security 1 Important Terms Exploit: Take advantage of a flaw or feature Attack Surface: Any node on the network that can be attacked. That can be the UI, People, anything that touches
More informationDesign and development of a distributed, secure and resilient vault management system
Design and development of a distributed, secure and resilient vault management system Mathonet G. University of Liège, Belgium June 2017 Mathonet G. (University of Liège, Belgium) Design and development
More informationA nice outline of the RSA algorithm and implementation can be found at:
Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.
More informationComputer and Data Security. Lecture 3 Block cipher and DES
Computer and Data Security Lecture 3 Block cipher and DES Stream Ciphers l Encrypts a digital data stream one bit or one byte at a time l One time pad is example; but practical limitations l Typical approach
More informationDynamically-typed Languages. David Miller
Dynamically-typed Languages David Miller Dynamically-typed Language Everything is a value No type declarations Examples of dynamically-typed languages APL, Io, JavaScript, Lisp, Lua, Objective-C, Perl,
More informationTale of a mobile application ruining the security of global solution because of a broken API design. SIGS Geneva 21/09/2016 Jérémy MATOS
Tale of a mobile application ruining the security of global solution because of a broken API design SIGS Geneva 21/09/2016 Jérémy MATOS whois securingapps Developer background Spent last 10 years working
More informationSP xdrive Explorer. User Manual
SP xdrive Explorer User Manual Table of Contents 1. Intellectual & Copyright Disclaimer....3 2. Introduction..4 3. System Requirements...4 4. Illustration of Application functions.4 4.1 Installation.4
More informationPASS SQL DBA Virtual Chapter
PASS SQL DBA Virtual Chapter Wed, 7:00 PM - 8:00 PM GMT Lecture By Ronen Ariely Implementing new Security Features in SQL Server 2016, Part 2 SQL Server 2016 provides several new data security features
More informationGT.M Database Encryption
GT.M Database Encryption Protecting Data At Rest (DAR) [ 1 ] April 30, 2009 What it is Protects data at rest (DAR) Data records in database & journal files are encrypted [ 2 ] What it is not Data not at
More informationTinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture
More informationOverview of Activities
d.schmidt@vanderbilt.edu www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee, USA CS 282 Principles of Operating Systems II Systems Programming
More informationSolution Challenge. Old Memories
Solution Challenge Old Memories Steps 9 Steps 5 «ordinosaures» 4 «technical» steps Ordinosaure steps separated by technical tasks Step 1 - Frenchy Thomson MO5 (RAM cartridge helps) Step 2 Before the web
More informationCryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL
Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E
More informationCreating Trust in a Highly Mobile World
Creating Trust in a Highly Mobile World Technical White Paper Oct, 2014 MobileCrypt with Hardware Strength Security MobileCrypt s solution leverages an Android based mobile application and a Hardware Security
More informationDuo Enrollment for DA Employees
Duo Enrollment for DA Employees Duo s Multi-Factor Authentication will be used to authenticate DA employees when using DA Portal, DA s Outlook Web Access (OWA), and DA s O365. It is RECOMMENDED to have
More informationTackling runtime-based obfuscation in Android with TIRO
Tackling runtime-based obfuscation in Android with Michelle Wong and David Lie University of Toronto Usenix Security 2018 Android malware and analysis Mobile devices are a valuable target for malware developers
More informationContent of this part
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 5 More About Block Ciphers Israel Koren ECE597/697 Koren Part.5.1 Content of this
More informationAuthentication CHAPTER 17
Authentication CHAPTER 17 Authentication Authentication is the process by which you decide that someone is who they say they are and therefore permitted to access the requested resources. getting entrance
More informationDemystifying ISIM s Encryption
Demystifying ISIM s Encryption Version 1.1, 2017-12-21 Abstract Almost everything you ever wanted to know about the IBM Security Identity Manager encryption. We are sure many of the information below can
More informationTrue Potential Client Site
True Potential Client Site New Login Process Including the iphone & ipad app process 1 P a g e Account Activation & New Login Process We re changing the way you log into your account on the True Potential
More informationCrypto: Symmetric-Key Cryptography
Computer Security Course. Song Crypto: Symmetric-Key Cryptography Slides credit: Dan Boneh, David Wagner, Doug Tygar Overview Cryptography: secure communication over insecure communication channels Three
More informationAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware Mathy Vanhoef and Frank Piessens (KU Leuven) ACSAC 2014 Background WiFi assumes each station acts fairly With special hardware this isn t the case Continuous
More informationData Modeling and Database Design
INF1343, Winter 2012 Data Modeling and Database Design Yuri Takhteyev Faculty of Information University of Toronto This presentation is licensed under Creative Commons Attribution License, v. 3.0. To view
More informationLab 1: Getting Started With Android Programming
Islamic University of Gaza Faculty of Engineering Computer Engineering Dept. Eng. Jehad Aldahdooh Mobile Computing Android Lab Lab 1: Getting Started With Android Programming To create a new Android Project
More informationBreaking State-of-the-Art Binary Code Obfuscation
Breaking State-of-the-Art Binary Code Obfuscation A Program Synthesis-based Approach REcon Brussels February 2, 2018 Tim Blazytko, @mr_phrazer http://synthesis.to Moritz Contag, @dwuid https://dwuid.com
More informationPassword Based Cryptography
Written By: Adam Berent Document Revision 1.1 Password Based Cryptography Outline 1.0 Preface 1. Preface 2. Summary 3. Message Format 3.1. XML Schema 4. Padding 5. Salt Generation 6. Deriving the Iteration
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Block cipher DES 3DES
More informationCisco Desktop Collaboration Experience DX650 Security Overview
White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationXamarin for C# Developers
Telephone: 0208 942 5724 Email: info@aspecttraining.co.uk YOUR COURSE, YOUR WAY - MORE EFFECTIVE IT TRAINING Xamarin for C# Developers Duration: 5 days Overview: C# is one of the most popular development
More informationObfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel,
More information