Browser code isolation
|
|
- Horace Robbins
- 6 years ago
- Views:
Transcription
1 CS 155 Sprig 2018 Browser code isolatio Joh Mitchell
2 Topic of this class meetig How ca we use sophisticated isolatio ad iteractio betwee compoets to develop flexible, iterestig web applicatios, while protectig cofidetiality ad itegrity???
3 WHY DO WE NEED ISOLATION AND COMMUNICATION?
4 Moder web sites are complex
5 Moder web site Code from may sources Combied i may ways
6 Sites hadle sesitive iformatio Fiacial data Olie bakig, tax filig, shoppig, budgetig, Health data Geomics, prescriptios, Persoal data , messagig, affiliatios,
7 Basic questios How do we isolate code from differet sources Protectig sesitive iformatio i browser Esurig selected forms of itegrity Allowig moder fuctioality, flexible iteractio
8 More specifically How to protect a page from ads/services? How to protect a page from a library? How do we protect a page from CDN? How to share data with cross-origi page? How to protect oe user from aother s cotet? How do we protect extesio from page?
9 ARE FRAMES AND SAME- ORIGIN POLICY ENOUGH?
10 Recall Same-Origi Policy (SOP) Idea: Isolate cotet from differet origis Restricts iteractio betwee compartmets Restricts etwork request ad respose Lets look at iterframe ad etwork iteractio
11 Same-origi policy: frames ad web Dom access?
12 Same-origi policy: frames ad web postmessage commuicatio?
13 Same-origi policy: frames ad web XmlHttpRequest???
14 Same-origi policy: frames ad web image request?
15 Same-origi frame ad web summary Isolate cotet from differet origis Ca sed postmessage or embed image or js Ca t access documet of cross-origi page Ca t ispect cross-origi resposes
16 Limitatio: Library Library icluded usig tag <script src="jquery.js"></script> No isolatio Rus i same frame, same origi as rest of page May cotai arbitrary code Library developer errors or malicious troja horse Ca redefie core features of JavaScript May violate developer ivariats, assumptios jquery used by 78% of the Quatcast top 10,000 sites, over 59% of the top millio
17 Limitatio: advertisemet <script src= ></script> <script src= ></script> Read password usig the DOM API var c = documet.getelemetsbyname( password )[0] Directly embedded third-party JavaScript poses a threat to critical hostig page resources Sed it to evil locatio (ot subject to SOP) <img src=`` > 17
18 Limitatio: Ad vs Ad <script src= ></script> <script src= ></script> $1 Buy Now Directly embedded third-party JavaScript poses a threat to other third-party compoets Attack the other ad: Chage the price! var a = documet.getelemetbyid( soyad ) a.ierhtml = $1 Buy Now ;
19 Same-origi policy limitatios Coarse ad iflexible Does ot restrict actios withi a executio cotext Developers caot chage policy Does ot prevet iformatio leaks Ca sed data i image request, XHR request Image size ca leak whether user logged i Cross-origi scripts ru with privilege of page Ijected scripts ca corrupt ad leak user data! No way to relax policy Ca t read cross-origi resposes
20 Commo but risky workaroud What if we wat to fetch data from provider.com? JSONP ( JSON with Paddig ) w To fetch data, isert ew script tag: <script src= > </script> w To share data, reply back with script wrappig data: f({...data...}) Why is this dagerous? Provider data ca easily be leaked (CSRF) Page is ot protected from provider (XSS)
21 WHAT IS THE GRANULARITY OF ISOLATION AND COMMUNICATION?
22 Browsig cotext A browsig cotext may be A frame with its DOM A web worker (thread), which does ot have a DOM Every browsig cotext Has a origi, determied by áprotocol, host, portñ Is isolated from others by same-origi policy May commuicate to others usig postmessage Ca make etwork requests usig XHR or tags (<image>, )
23 HTML5 Web Workers Separate thread, o DOM isolated but same origi Not origially iteded for security, but helps
24 Web Worker Ru i a isolated thread, loaded from separate file var worker = ew Worker('task.js'); worker.postmessage(); // Start the worker. Same origi as frame that creates it, but o DOM Commuicate usig postmessage mai thread dowork var worker = ew Worker('doWork.js'); worker.addevetlisteer('message', fuctio(e) { cosole.log('worker said: ', e.data); }, false); worker.postmessage('hello World'); // Sed data to worker self.addevetlisteer('message', fuctio(e) { self.postmessage(e.data); // Retur message it is set }, false);
25 Browsig cotext A browsig cotext may be A frame with its DOM A web worker (thread), which does ot have a DOM Every browsig cotext Has a origi, determied by áprotocol, host, portñ Is isolated from others by same-origi policy May commuicate to others usig postmessage Ca make etwork requests usig XHR or tags (<image>, )
26 HOW CAN WE RESTRICT EXECUTION AND COMMUNICATION?
27 Two ways to restrict executio HTML5 iframe Sadbox Load with uique origi, limited privileges Cotet Security Policy (CSP) Whitelist istructig browser to oly execute or reder resources from specific sources
28 HTML5 Sadbox Idea: restrict frame actios Directive sadbox esures iframe has uique origi ad caot execute JavaScript Directive sadbox allow-scripts esures iframe has uique origi
29 HTML5 Sadbox Idea: restrict frame actios Directive sadbox esures iframe has uique origi ad caot execute JavaScript Directive sadbox allow-scripts esures iframe has uique origi
30 HTML5 Sadbox Idea: restrict frame actios Directive sadbox esures iframe has uique origi ad caot execute JavaScript Directive sadbox allow-scripts esures iframe has uique origi
31 Sadbox example Twitter butto i iframe <iframe src= " style="border: 0; width:130px; height:20px;"> </iframe> Sadbox: remove all permissios ad the allow JavaScript, popups, form submissio, ad twitter.com cookies <iframe sadbox="allow-same-origi allow-scripts allow-popups allow-forms" src=" style="border: 0; width:130px; height:20px;"></iframe>
32 Sadbox permissios allow-forms allows form submissio allow-popups allows popups allow-poiter-lock allows poiter lock (mouse moves) allow-same-origi allows the documet to maitai its origi; pages loaded from will retai access to that origi s data. allow-scripts allows JavaScript executio, ad also allows features to trigger automatically (as they d be trivial to implemet via JavaScript) allow-top-avigatio allows the documet to break out of the frame by avigatig the top-level widow
33 Two ways to restrict executio HTML5 iframe Sadbox Load with uique origi, limited privileges Cotet Security Policy (CSP) Whitelist istructig browser to oly execute or reder resources from specific sources Uses HTTP header to specify policy Cotet-Security-Policy: policy
34 Cotet Security Policy (CSP) Goal: prevet ad limit damage of XSS XSS attacks bypass the same origi policy by trickig a site ito deliverig malicious code alog with iteded cotet Approach: restrict resource loadig to a white-list Prohibits ilie scripts embedded i script tags, ilie evet hadlers ad javascript: URLs Disable JavaScript eval(), ew Fuctio(), Cotet-Security-Policy HTTP header allows site to create whitelist, istructs the browser to oly execute or reder resources from those sources
35 Cotet Security Policy (CSP) Goal: prevet ad limit damage of XSS attacks Approach: restrict resource loadig to a white-list E.g., default-src self img-src *
36 Cotet Security Policy (CSP) Goal: prevet ad limit damage of XSS attacks Approach: restrict resource loadig to a white-list E.g., default-src self img-src *
37 Cotet Security Policy (CSP) Goal: prevet ad limit damage of XSS attacks Approach: restrict resource loadig to a white-list E.g., default-src self img-src *
38 Cotet Security Policy (CSP) Goal: prevet ad limit damage of XSS attacks Approach: restrict resource loadig to a white-list E.g., default-src self img-src *
39 Cotet Security Policy (CSP) Goal: prevet ad limit damage of XSS attacks Approach: restrict resource loadig to a white-list E.g., default-src self img-src *
40 Cotet Security Policy (CSP) Goal: prevet ad limit damage of XSS attacks Approach: restrict resource loadig to a white-list E.g., default-src self img-src *
41 Cotet Security Policy (CSP) Goal: prevet ad limit damage of XSS attacks Approach: restrict resource loadig to a white-list E.g., default-src self img-src *
42 Cotet Security Policy & Sadboxig Limitatios: Data exfiltratio is oly partly cotaied w Ca leak to origis we ca load resources from ad siblig frames or child Workers (via postmessage) Scripts still ru with privilege of page w Ca we reaso about security of jquery-sized lib?
43 CSP resource directives script-src limits the origis for loadig scripts coect-src limits the origis to which you ca coect (via XHR, WebSockets, ad EvetSource). fot-src specifies the origis that ca serve web fots. frame-src lists origis ca be embedded as frames img-src lists origis from which images ca be loaded. media-src restricts the origis for video ad audio. object-src allows cotrol over Flash, other plugis style-src is script-src couterpart for stylesheets default-src defie the defaults for ay directive ot otherwise specified
44 CSP source lists Specify by scheme, e.g., https: Host ame, matchig ay origi o that host Fully qualified URI, e.g., Wildcards accepted, oly as scheme, port, or i the leftmost positio of the hostame: 'oe matches othig 'self' matches the curret origi, but ot subdomais 'usafe-ilie' allows ilie JavaScript ad CSS 'usafe-eval' allows text-to-javascript mechaisms like eval
45 CAN WE PROTECT AGAINST NETWORK ATTACKERS OR CDN THAT SERVES THE WRONG SCRIPT OR CODE?
46 Motivatio for SRI May pages pull scripts ad styles from a wide variety of services ad cotet delivery etworks. How ca we protect agaist dowloadig cotet from a hostile server (via DNS poisoig, or other such meas), or modified file o the Cotet Delivery Network (CDN) Would usig HTTPS address this problem?
47 Subresource itegrity Idea: page author specifies hash of (sub)resource they are loadig; browser checks itegrity E.g., itegrity for scripts w <lik rel="stylesheet" href=" itegrity="sha256-sdfwewfae...wefjijfe"> E.g., itegrity for lik elemets w <script src=" mi.js" itegrity="sha256- C6CB9UYIS9UJeqiPHWTHVqh/E1uhG5Tw+Y5qF QmYg=">
48 What happes whe check fails? Case 1 (default): Browser reports violatio ad does ot reder/ execute resource Case 2: CSP directive with itegrity-policy directive set to report Browser reports violatio, but may reder/execute resource
49 CAN WE DEFINE MORE PERMISSIVE ORIGIN POLICIES?
50 Cross-Origi Resource Sharig (CORS) Amazo has multiple domais E.g., amazo.com ad aws.com Problem: amazo.com ca t read cross-origi aws.com With CORS amazo.com ca whitelist aws.com
51 How CORS works Browser seds Origi header with XHR request Server ca ispect Origi header ad respod with Access-Cotrol-Allow-Origi header
52
53 HAVE WE SOLVED EVERY SECURITY PROBLEM?
54 Goal: Password-stregth checker Stregth checker ca ru i a separate frame Commuicate by postmessage But we give password to utrusted code! Is there ay way to make sure utrusted code does ot export our password?
55 Cofiig the checker with COWL Express sesitivity of data Checker ca oly receive password if its cotext label is as sesitive as the password Use postmessage API to sed password Source specifies sesitivity of data at time of sed
56 Staford startup: Itrisic
57 CONCLUSIONS?
58 Moder Structurig Mechaisms HTML5 Web Workers; Separate thread; isolated but same origi Not origially iteded for security, but helps HTML5 iframe Sadbox Load with uique origi, limited privileges Cotet Security Policy (CSP) Whitelist istructig browser to oly execute or reder resources from specific sources SubResource itegrity (SRI) Cross-Origi Resource Sharig (CORS) Relax same-origi restrictios
59 Moder web site Code from may sources Combied i may ways
60 Challeges
61 Actig parties o a site Page developer Library developers Service providers Data provides Ad providers Other users CDNs Extesio developers
62 Browser Extesios Firefox user iterface writte i JavaScript ad XUL, a XML grammar that provides buttos, meus, The browser is implemeted i a XUL file cotaiig, e.g., this code defiig the status bar <statusbar id="status-bar">... <statusbarpael>s... </statusbar> Exted the browser by isertig ew XUL DOM elemets ito the browser widow ad modifyig them usig script ad attachig evet hadlers
63 I reviewig, thik about: How to protect a page from ads/services? How to protect a page from a library? How do we protect a page from CDN? How to share data with cross-origi page? How to protect oe user from aother s cotet? How do we protect extesio from page?
Browser code isolation
CS 155 Spring 2016 Browser code isolation John Mitchell Acknowledgments: Lecture slides are from the Computer Security course taught by Dan Boneh and John Mitchell at Stanford University. When slides are
More informationMatch the attack to its description:
Match the attack to its description: 8 7 5 6 4 2 3 1 Attacks: Using Components with Known Vulnerabilities Missing Function Level Access Control Sensitive Data Exposure Security Misconfiguration Insecure
More informationModern client-side defenses. Deian Stefan
Modern client-side defenses Deian Stefan Modern web site Modern web site Page code Modern web site Modern web site Page code Ad code Modern web site Page code Ad code Third-party APIs Modern web site Page
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More informationExtending the browser to secure applications
Extending the browser to secure applications Highlights from W3C WebAppSec Group Deian Stefan Modern web apps have many moving pieces & parties Application code & content itself User provided content (e.g.,
More informationBaan Tools User Management
Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio
More informationGoals of the Lecture UML Implementation Diagrams
Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More informationUsing the Keyboard. Using the Wireless Keyboard. > Using the Keyboard
1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries
More informationMOTIF XF Extension Owner s Manual
MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus
More informationWeston Anniversary Fund
Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue
More informationGuide to Applying Online
Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their
More informationBOOSTING THE SECURITY
BOOSTING THE SECURITY OF YOUR ANGULAR APPLICATION Philippe De Ryck March 2017 https://www.websec.be ANGULAR APPLICATIONS RUN WITHIN THE BROWSER JS code HTML code Load application JS code / HTML code JS
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.
Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple
More informationSystem and Software Architecture Description (SSAD)
System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationRKN 2015 Application Layer Short Summary
RKN 2015 Application Layer Short Summary HTTP standard version now: 1.1 (former 1.0 HTTP /2.0 in draft form, already used HTTP Requests Headers and body counterpart: answer Safe methods (requests): GET,
More informationComputers and Scientific Thinking
Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput
More informationChapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings
Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The
More informationWYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET
WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56
More informationCS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python
CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about
More informationBaan Finance Financial Statements
Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace
More informationChapter 11 Web-based Information Systems
Prof. Dr.-Ig. Stefa Deßloch AG Heterogee Iformatiossysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@iformatik.ui-kl.de Chapter 11 Web-based Iformatio Systems TP Applicatio Architecture Frot-ed program
More informationGetting Started. Getting Started - 1
Gettig Started Gettig Started - 1 Issue 1 Overview of Gettig Started Overview of Gettig Started This sectio explais the basic operatios of the AUDIX system. It describes how to: Log i ad log out of the
More informationContent Security Policy
Content Security Policy And mitigating Cross-site Scripting vulnerabilities Joseph Fields M.Sc Computer Science - December 2016 Introduction HTML and Javascript power billions of websites visited daily
More informationSession Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)
F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationBasic Design Principles
+ Basic Desig Priciples + Assigmet 2: Your studet web site 1. Baer 2. Your ame 3. Your accout umber 4. A lik to aother web page, preferably oe useful to you i this class 5. A photo, preferably of you 6.
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationCSP ODDITIES. Michele Spagnuolo Lukas Weichselbaum
ODDITIES Michele Spagnuolo Lukas Weichselbaum ABOUT US Michele Spagnuolo Lukas Weichselbaum Information Security Engineer Information Security Engineer We work in a special focus area of the Google security
More informationPanel for Adobe Premiere Pro CC Partner Solution
Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere
More informationUnit 4. NFS and Samba
it 4 F ad amba oa Warre F (etwork File ystem) F allows remote access to files o a Liux system he F cliet logs ito the F server ad mouts the exported directories i at a local l mout poit hared files ca
More informationBEA WebLogic XML/Non-XML Translator
BEA WebLogic XML/No-XML Traslator A Compoet of BEA WebLogic Itegratio Plug-I Guide BEA WebLogic XML/No-XML Traslator Release 2.0 Documet Editio 2.0 July 2001 Copyright Copyright 2001 BEA Systems, Ic. All
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationCustomer Portal Quick Reference User Guide
Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is
More informationNeolane Social Marketing. Neolane v6.1
Neolae Social Marketig Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No
More informationBEA WebLogic Process Integrator
BEA WebLogic Process Itegrator A Compoet of BEA WebLogic Itegratio BEA WebLogic Process Itegrator Studio Olie Help BEA WebLogic Process Itegrator Release 2.0 Documet Editio 2.0 July 2001 Copyright Copyright
More informationUsing VTR Emulation on Avid Systems
Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit
More informationAvid recommends that you read all the information in this ReadMe file thoroughly before installing or using any new software release.
PostDeko for Editors Versio 8.4 ReadMe Importat Iformatio Avid recommeds that you read all the iformatio i this ReadMe file thoroughly before istallig or usig ay ew software release. Importat: Search the
More informationChapter 4 The Datapath
The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that
More informationAvid Interplay Bundle
Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers
More informationBAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8
BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationSoftware development of components for complex signal analysis on the example of adaptive recursive estimation methods.
Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig
More informationPackage RcppRoll. December 22, 2014
Type Package Package RcppRoll December 22, 2014 Title Fast rollig fuctios through Rcpp ad RcppArmadillo Versio 0.1.0 Date 2013-01-10 Author Kevi Ushey Maitaier Kevi Ushey RcppRoll
More information1&1 Next Level Hosting
1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat
More informationn Explore virtualization concepts n Become familiar with cloud concepts
Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to
More informationBasic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.
5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator
More informationSharing Collections. Share a Collection via . Share a Collection via Google Classroom. Quick Reference Guide
Quick Referece Guide Share a Collectio via Email Sharig your collectio with others is a great way to collaborate. You ca easily sed a lik to your colleagues, studets, classmates ad frieds. Recipiets do
More informationSolution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:
CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed
More informationHigh -Tech Bridge s Web Server Security Service API Developer Documentation Version v1.3 February 13 th 2018
HTB_WEBSECDOCS_v1.3.pdf Page 1 of 29 High -Tech Bridge s Web Server Security Service API Developer Documentation Version v1.3 February 13 th 2018 General Overview... 2 Meta-information... 4 HTTP Additional
More informationOne advantage that SONAR has over any other music-sequencing product I ve worked
*gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig
More informationOutline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers
Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate
More informationBike MS: 2013 Participant Center guide
Bike MS: 2013 Participat Ceter guide bikems.org 1 Why use Olie Fudraisig Tools? Usig olie tools makes fudraisig easier Table of Cotets Participats who use persoal pages raise more moey! Bike MS $883 v.
More informationBike MS: 2014 Participant Center guide
Bike MS: 2014 Participat Ceter guide bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...
More informationChapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3
More informationL I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW
it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other
More informationParabolic Path to a Best Best-Fit Line:
Studet Activity : Fidig the Least Squares Regressio Lie By Explorig the Relatioship betwee Slope ad Residuals Objective: How does oe determie a best best-fit lie for a set of data? Eyeballig it may be
More informationBrowser Security Model
CS155 Sprig 2017 Browser Security Model Joh Mitchell Top Web Vulerabilities 2017 https://www.owasp.org/idex.php/category:owasp_top_te_project Historical Web Vulerabilities "I the Wild" Data from aggregator
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationGraphic Standards for District Identification. September, 2012
Graphic Stadards for District Idetificatio September, 2012 CASE Graphic Stadards for District Idetificatio DRAFT 12.8.14 Coucil for Advacemet ad Support of Educatio, 2012. 1 . This documet is a draft of
More informationWriting Secure Chrome Apps and Extensions
Writing Secure Chrome Apps and Extensions Keeping your users safe Jorge Lucángeli Obes Software Engineer Keeping users safe A lot of work going into making browsers more secure What about users' data?
More informationFirewall and IDS. TELE3119: Week8
Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad
More informationL5355 Modbus Plus Communications Interface
L5355 Modbus Plus Commuicatios Iterface Techical Maual HA470897 Issue 2 Copyright SSD Drives Ic 2005 All rights strictly reserved. No part of this documet may be stored i a retrieval system, or trasmitted
More informationn Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk
Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet
More informationIS-IS for IPv6. ISP Workshops
IS-IS for IPv6 ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 8 th April 2018
More informationTRANSACTION MANAGEMENT [CH 16]
Sprig 2017 TRANSACTION MANAGEMENT [CH 16] 4/25/17 CS 564: Database Maagemet Systems; (c) Jigesh M. Patel, 2013 1 Trasactio Maagemet Read (A); Check (A > $25); Pay ($25); A = A 25; Write (A); Yes You Read
More informationStructuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software
Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationDimensions 728x90 300x x x30. 40k 40k 40k 40k. 100k 100k 100k 100k
GENERAL GUIDLINES IMPORTANT INFORMATION HTML 5 baers are supported for all platforms All creatives are subject to fial approval by Haymarket Media, Ic Dimesios 728x90 300x250 300x600 970x30 Stadard File
More information% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998
Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado
More informationReview: The ACID properties
Recovery Review: The ACID properties A tomicity: All actios i the Xactio happe, or oe happe. C osistecy: If each Xactio is cosistet, ad the DB starts cosistet, it eds up cosistet. I solatio: Executio of
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationn We have discussed classes in previous lectures n Here, we discuss design of classes n Library design considerations
Chapter 14 Graph class desig Bjare Stroustrup Abstract We have discussed classes i previous lectures Here, we discuss desig of classes Library desig cosideratios Class hierarchies (object-orieted programmig)
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationGoals of this Lecture Activity Diagram Example
Goals of this Lecture Activity Diagram Example Object-Orieted Aalysis ad Desig - Fall 998 Preset a example activity diagram Ð Relate to requiremets, use cases, ad class diagrams Also, respod to a questio
More informationCS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1
CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()
More informationBIKE MS: 2015 PARTICIPANT CENTER GUIDE
BIKE MS: 2015 PARTICIPANT CENTER GUIDE bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...
More informationJavaFX. JavaFX 2.2 Installation Guide Release 2.2 E August 2012 Installation instructions by operating system for JavaFX 2.
JavaFX JavaFX 2.2 Istallatio Guide Release 2.2 E20474-06 August 2012 Istallatio istructios by operatig system for JavaFX 2.2 JavaFX/JavaFX 2.2 Istallatio Guide E20474-06 Copyright 2008, 2012, Oracle ad/or
More information% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995
Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza
More informationWeb Security. advanced topics on SOP. Yan Huang. Credits: slides adapted from Stanford and Cornell Tech
Web Security advanced topics on SOP Yan Huang Credits: slides adapted from Stanford and Cornell Tech Same Origin Policy protocol://domain:port/path?params Same Origin Policy (SOP) for DOM: Origin A can
More informationGraphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)
Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total
More informationExtending the Web Security Model with Information Flow Control
Extending the Web Security Model with Information Flow Control Deian Stefan Advised by David Herman Motivation: 3rd party libraries Password-strength checker Desired security policy: Password is not leaked
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationCourse Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks
Walrad Lecture 1 Course Iformatio Lecture 1 Overview: Networks Jea Walrad www.eecs.berkeley.edu/~wlr Istructor: Jea Walrad Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 i 285 Cory Home Page: http://wwwist.eecs.berkeley.edu/~ee228a
More informationWorkflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.
Workflow model GM AR Gumpy RM Dyagump At a very high level, this is what gump does. We ll be lookig at each of the items described here seperately. User edits project descriptor ad commits s maitai their
More informationBEA WebLogic Commerce Server. Registration and User Processing Package
BEA WebLogic Commerce Server Registratio ad User Processig Package BEA WebLogic Commerce Server 3.2 Documet Editio 3.2 December 2000 Copyright Copyright 2000 BEA Systems, Ic. All Rights Reserved. Restricted
More informationCustodial Integrator Automation Guide
Custodial Itegrator Automatio Guide Compay Cofidetial Custodial Itegrator Product Versio: V3.8 Documet Versio: 14 Documet Issue Date: April 21, 2017 Techical Support: (866) 856-4951 Telephoe: (781) 376-0801
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationAbstract Data Types (ADTs) Stacks. The Stack ADT ( 4.2) Stack Interface in Java
Abstract Data Types (ADTs) tacks A abstract data type (ADT) is a abstractio of a data structure A ADT specifies: Data stored Operatios o the data Error coditios associated with operatios Example: ADT modelig
More informationCS 111: Program Design I Lecture 18: Web and getting text from it
CS 111: Program Desig I Lecture 18: Web ad gettig text from it Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago October 25, 2016 Goals Lear about Iteret ad how to access it directly from
More informationBEA Tuxedo. Creating CORBA Server Applications
BEA Tuxedo Creatig CORBA Server Applicatios BEA Tuxedo Release 8.0 Documet Editio 8.0 Jue 2001 Copyright Copyright 2001 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This software ad documetatio
More informationWhat does JFC stand for?
IS4300 HCI No-Quiz What does JFC stad for?! Java Fudametal Classes! Java Foudatio Creator! Java Fried Chicke! Java Foudatio Classes! Java Framework Creator 1 No-Quiz What is pluggable look ad feel?! Swig
More informationTUTORIAL Create Playlist Helen Doron Course
TUTORIAL Create Playlist Hele Doro Course TUTY Tutorial Create Playlist Hele Doro Course Writte by Serafii Giampiero (INV SRL) Revised by Raffaele Forgioe (INV SRL) Editio EN - 0 Jue 0-0, INV S.r.l. Cotact:
More informationOctober 08: Introduction to Web Security
October 08: Introduction to Web Security Scribe: Rohan Padhye October 8, 2015 Web security is an important topic because web applications are particularly hard to secure, and are one of the most vulnerable/buggy
More information15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015
15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:
More information