LUCON. Data Flow Control for Message-Based IoT Systems. Julian Schütte, Gerd Brost. Fraunhofer AISEC, Germany

Size: px
Start display at page:

Download "LUCON. Data Flow Control for Message-Based IoT Systems. Julian Schütte, Gerd Brost. Fraunhofer AISEC, Germany"

Transcription

1 LUCON Data Flow Control for Message-Based IoT Systems Julian Schütte, Gerd Brost Fraunhofer AISEC, Germany TrustCom 2018, New York, 1st of August, 2018

2 Outline 1 Message-based IoT Architectures 2 Approach Message Routes as a Control Flow Graph Usage Control as a Taint Analysis Problem Compliance Checking as Reachability Problem The LUCON Policy Language 3 Evaluation & Conclusions 1 11

3 Message-based IoT Architectures

4 A Typical IoT System Data Processing Pre-Processing Services Message Broker Edge Device Message Broker Message Queuing Sensors On-Premise Cloud Storage Sensitive data is collected from sensors Pre-processing at the edge, main processing/aggregation in the backend Communication over messages queues, orchestration by message routers 2 11

5 Usage Control in Distributed Systems Usage Control instead of Access Control Access Control only regulates if data may be used. Usage Control is about how data may be used continuous control of data processing "Flow-sensitive" Usage Control Existing work on information flow control implements specific info flow models e.g. secrecy/integrity in cloud computing (e.g., FlowK, CamFlow) only runtime enforcement of information flows Our Goal Policies over any kind of data flow Runtime enforcement & provenance of data flows Design-time compliance verification of message routes against data flow policies 3 11

6 Usage Control in Distributed Systems Usage Control instead of Access Control Access Control only regulates if data may be used. Usage Control is about how data may be used continuous control of data processing "Flow-sensitive" Usage Control Existing work on information flow control implements specific info flow models e.g. secrecy/integrity in cloud computing (e.g., FlowK, CamFlow) only runtime enforcement of information flows Our Goal Policies over any kind of data flow Runtime enforcement & provenance of data flows Design-time compliance verification of message routes against data flow policies 3 11

7 Usage Control in Distributed Systems Usage Control instead of Access Control Access Control only regulates if data may be used. Usage Control is about how data may be used continuous control of data processing "Flow-sensitive" Usage Control Existing work on information flow control implements specific info flow models e.g. secrecy/integrity in cloud computing (e.g., FlowK, CamFlow) only runtime enforcement of information flows Our Goal Policies over any kind of data flow Runtime enforcement & provenance of data flows Design-time compliance verification of message routes against data flow policies 3 11

8 Approach

9 Approach We treat information flow control as a program analysis problem. Usage Control Message Routes Runtime Enforcement Compliance Checking Program Analysis Control Flow Graph (CFG) Dynamic Taint Analysis Reachability Problem Note: Typical attacker model of dist. usage control is less strict than of program analysis Program analysis: Control flow (the program) is public. Observation of control flows at runtime is trivial (ptrace) Usage Control: Control flow (a message route) is non-public. Typically, attacker can observe only parts of control flow, esp. not termination 4 11

10 Message Routes as a Control Flow Graph <route id = " Sensor_Messaging " > <from uri = " timer: // everysecond? period=1000 " /> <to uri = "ahc://localhost:9292/temp" /> <to uri = "hdfs://a.example.com/store" /> <aggregate outbatchsize = " 10 " /> <to uri = "ahc: /> </ route > LUCON compiles Apache Camel routes into a CFG representation in Prolog. Message m Lm = {raw, temperature} Policy = {publish raw} m Service A (Database) L = L + = Lm = {raw, temperature} P = {persist(hdfs2://...)} Service B (Merges Data) m m L = {raw} L + = {merge(10)} Lm = {temperature, merge(10)} P = Service C (Publisher) L = L + = Lm = {temperature, merge(10)} P = {publish( 5 11

11 Usage Control as Taint Analysis We apply the technique of taint analysis from software analysis to information flows Labels are attached to messages Labels may change whenever a message is processed by a service (transformation functions L and L + ). Rules declare what happens when message with label X enters service Y. Block message Execute an action ( obligation ) 6 11

12 Compliance Checking as Reachability Problem Reminder: We compile Camel message routes into a CFG representation in Prolog We also compile LUCON policies into data flow constraints over the CFG Prolog We can now turn the problem of compliance checking into a reachability problem verify that there is no path through the CFG that violates the constraints of the policy Route Sensor_Messaging i s invalid because s e r v i c e may receive label ( s ) [ raw ]. This i s forbidden by rule dontpublishraw Example flows v i o l a t i n g p o l i c y follow : sensor creates message labeled [ raw ] storage receives message labeled [ raw ] aggregator receives message labeled [ raw ] receives message labeled [ raw, aggregated ] fail!. Compliance violation reported by Prolog 7 11

13 The LUCON Policy Language LUCON is a DSL created in Eclipse XText ( generates IDE w/ syntax highlighter & autocomplete) Declares transformation functions and flow rules Rules are compiled into Prolog Evaluation of rules is a Prolog query Simple example: Do not publish data labeled as raw 8 11

14 Evaluation & Conclusions

15 Implementation & Evaluation Enforcement of data flow rules is sound & complete, assuming that the compilation from Camel to Prolog is, too. LUCON implementation Domain specific language with Eclipse XText Compliance checking & enforcement with tuprolog Performance of tuprolog as an enforcement engine? 9 11

16 Runtime Performance & Memory Consumption 200 Evaluation time (ms) ,000 2,000 3,000 4,000 5,000 Red=No. of labels. Blue=No. of applicable rules Memory consumption (MB) ,000 2,000 3,000 4,000 5,000 Red=No. of labels. Blue=No. of applicable rules 10 11

17 Conclusions LUCON is a policy language that controls data flows in message-based systems Implemented as a Prolog-based interceptor for Apache Camel approx. 20 ms + 20 MB runtime impact for realistic size of policies (uncached) Generalization of classic access control and information flow policies. Prevents any policy violation at runtime Compliance checking: Proofs that your message route will never violate any policy 11 / 11

LUCON: Data Flow Control for Message-Based IoT Systems

LUCON: Data Flow Control for Message-Based IoT Systems LUCON: Data Flow Control for Message-Based IoT Systems Julian Schütte, Gerd Stefan Brost Fraunhofer AISEC, Germany {julian.schuette,gerd.brost}@aisec.fraunhofer.de arxiv:1805.05887v1 [cs.cr] 14 May 2018

More information

BIG MODELS AN ALTERNATIVE APPROACH

BIG MODELS AN ALTERNATIVE APPROACH 2. BIG MODELS AN ALTERNATIVE APPROACH Whitepaper Eclipse Summit 2008 Modeling Symposium Jos Warmer, Ordina (jos.warmer@ordina.nl) Abstract Scaling up modeling within project runs into many practical problems.

More information

Automated Cloud Compliance. GxP and 21 CFR Part 11 Compliance

Automated Cloud Compliance. GxP and 21 CFR Part 11 Compliance Automated Cloud Compliance GxP and 21 CFR Part 11 Compliance Solution Overview Sierra Labs has developed a set of tools to help companies with HIPAA compliance, 21 CFR Part 11 requirement, and GxP validation

More information

Unify DevOps and SecOps: Security Without Friction

Unify DevOps and SecOps: Security Without Friction SANS Secure DevOps Summit Unify DevOps and SecOps: Security Without Friction Matt Alderman, CISSP Chief Strategy & Marketing Officer Layered Insight @maldermania Technology Trend #1: Infrastructure Migrates

More information

Eventuation properties and interaction contracts

Eventuation properties and interaction contracts Eventuation properties and interaction contracts Mario Südholt Ascola research team; Mines Nantes, Inria, Lina SCRIPT WS Vrije Universiteit Brussel, 12 Nov. 2013 Motivation 1 Motivation 2 Generalizing

More information

Preserving Data Privacy in the IoT World

Preserving Data Privacy in the IoT World MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu

More information

IoT Edge within the IoT Framework

IoT Edge within the IoT Framework IoT Edge within the IoT Framework Axel Dittmann Diplom-Betriebswirt (FH) Diplom-Wirtschaftsinformatiker (FH) Global Technical Solution Specialist IOT CISSP, MCP Twitter: @DittmannAxel Waves of Innovation

More information

CLOUD GOVERNANCE SPECIALIST Certification

CLOUD GOVERNANCE SPECIALIST Certification CLOUD GOVERNANCE SPECIALIST Certification The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture,

More information

Outline. Introduction End-to-end QoS in heterogeneous networks User-centric, cross-layered approach User-centric QoS in PLC Networks Conclusions

Outline. Introduction End-to-end QoS in heterogeneous networks User-centric, cross-layered approach User-centric QoS in PLC Networks Conclusions Managing the User-Perceived QoS in Heterogeneous Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Madrid 2003 Global Summit Outline Introduction End-to-end QoS in heterogeneous networks User-centric,

More information

Microsoft Visual Basic 2005: Reloaded

Microsoft Visual Basic 2005: Reloaded Microsoft Visual Basic 2005: Reloaded Second Edition Chapter 3 Variables, Constants, Methods, and Calculations Objectives After studying this chapter, you should be able to: Declare variables and named

More information

FogIoT Orchestrator: an Orchestration System for IoT Applications in Fog Environment

FogIoT Orchestrator: an Orchestration System for IoT Applications in Fog Environment FogIoT Orchestrator: an Orchestration System for IoT Applications in Fog Environment Bruno Donassolo - Orange Labs Ilhem Fajjari - Orange Labs Arnaud Legrand - INRIA - LIG Panayotis Mertikopoulos - INRIA

More information

B U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

B U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved. B U I L D I N G O N T H E G A T E W A Y Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

CMPSC 497: Static Analysis

CMPSC 497: Static Analysis CMPSC 497: Static Analysis Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Lab Computer Science and Engineering Department Pennsylvania State University Page 1 Our Goal In this course,

More information

UniLFS: A Unifying Logical Framework for Service Modeling and Contracting

UniLFS: A Unifying Logical Framework for Service Modeling and Contracting UniLFS: A Unifying Logical Framework for Service Modeling and Contracting RuleML 2103: 7th International Web Rule Symposium July 11-13, 2013 Dumitru Roman 1 and Michael Kifer 2 1 SINTEF / University of

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

Privacy Challenges in Big Data and Industry 4.0

Privacy Challenges in Big Data and Industry 4.0 Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/

More information

2779 : Implementing a Microsoft SQL Server 2005 Database

2779 : Implementing a Microsoft SQL Server 2005 Database 2779 : Implementing a Microsoft SQL Server 2005 Database Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge and skills

More information

AMon A Monitoring System for ActiveMQ

AMon A Monitoring System for ActiveMQ A Monitoring System for ActiveMQ Joe Fernandez joe.fernandez@ttmsolutions.com Total Transaction Management, LLC 570 Rancheros Drive, Suite 140 San Marcos, CA 92069 760-591-0273 www.ttmsolutions.com 1 Designed

More information

WHITEPAPER. Compliance with ITAR and Export Controls in Collaboration Systems

WHITEPAPER. Compliance with ITAR and Export Controls in Collaboration Systems WHITEPAPER Compliance with ITAR and Export Executive Summary IT executives for organizations that are subject to export controls and regulations, including ITAR, EAR, as well as German BAFA regulations,

More information

Dynamic Languages Toolkit. Presented by Andrey Tarantsov

Dynamic Languages Toolkit. Presented by Andrey Tarantsov Dynamic Languages Toolkit Presented by Andrey Tarantsov Dynamic Languages Toolkit Serves as a foundation for scripting and dynamically-typed language IDEs Generalizes JDT code and follows its architecture

More information

THE DESIGN ENVIRONMENT FOR HETEROGENEOUS SYSTEMS

THE DESIGN ENVIRONMENT FOR HETEROGENEOUS SYSTEMS THE DESIGN ENVIRONMENT FOR HETEROGENEOUS SYSTEMS SystemC / SystemC AMS based Simulation and Modeling Technologies Outline COSIDE Today COSIDE 2.0 COSIDE Future 2 Management Summary Combination of analog

More information

Customization and Provisioning of Complex Event Processing using TOSCA IAAS & IPVS

Customization and Provisioning of Complex Event Processing using TOSCA IAAS & IPVS Customization and Provisioning of Complex Event Processing using TOSCA IAAS & IPVS Ana C. Franco da Silva, Pascal Hirmer, Uwe Breitenbücher, Oliver Kopp, Bernhard Mitschang franco-da-silva@informatik.uni-stuttgart.de

More information

Secure Cloud Computing Architecture (SCCA)

Secure Cloud Computing Architecture (SCCA) Secure Cloud Computing Architecture (SCCA) Program Overview Susan Casson PM, SCCA May 15, 2018 UNITED IN IN SERVICE TO OUR NATION 1 Service Overview: Why SCCA? SCCA connects the DoD to Infrastructure and

More information

MOBILE.NET PRIVACY POLICY

MOBILE.NET PRIVACY POLICY MOBILE.NET PRIVACY POLICY As the operator of the Mobile.net website (https://mobile.net.ltd/) (Website), ADX Labs, LLC. (Company, we or us) is committed to protecting and respecting your privacy. The data

More information

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 08 Basics of IoT Networking- Part- IV So, we continue

More information

DEVELOPMENT OF A SOFIA2 CLIENT (KP) FOLLOWING THE MODEL KP ARCHITECTURE

DEVELOPMENT OF A SOFIA2 CLIENT (KP) FOLLOWING THE MODEL KP ARCHITECTURE DEVELOPMENT OF A SOFIA2 CLIENT (KP) FOLLOWING THE MODEL KP ARCHITECTURE May 2016 Version 1 DEVELOPMENT OF KP MODEL Page 1/18 INDEX INDEX... 2 STEP 1 GETTING FAMILIAR WITH SOFIA2'S BASIC CONCEPTS... 3 STEP

More information

A c t i v e w o r k s p a c e f o r e x t e r n a l d a t a a g g r e g a t i o n a n d S e a r c h. 1

A c t i v e w o r k s p a c e f o r e x t e r n a l d a t a a g g r e g a t i o n a n d S e a r c h.   1 A c t i v e w o r k s p a c e f o r e x t e r n a l d a t a a g g r e g a t i o n a n d S e a r c h B a l a K a n t h i www.intelizign.com 1 Active workspace can search and visualize PLM data better! Problems:

More information

Getting started 7. Setting properties 23

Getting started 7. Setting properties 23 Contents 1 2 3 Getting started 7 Introducing Visual Basic 8 Installing Visual Studio 10 Exploring the IDE 12 Starting a new project 14 Adding a visual control 16 Adding functional code 18 Saving projects

More information

Range Restriction for General Formulas

Range Restriction for General Formulas Range Restriction for General Formulas 1 Range Restriction for General Formulas Stefan Brass Martin-Luther-Universität Halle-Wittenberg Germany Range Restriction for General Formulas 2 Motivation Deductive

More information

How to Route Internet Traffic between A Mobile Application and IoT Device?

How to Route Internet Traffic between A Mobile Application and IoT Device? Whitepaper How to Route Internet Traffic between A Mobile Application and IoT Device? Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. Approach: 1 Uses AWS IoT Setup

More information

Introducing SQL Query Verifier Plugin

Introducing SQL Query Verifier Plugin Introducing SQL Query Verifier Plugin IBM Application Runtime Expert for i Document version: 1.0 To download the master version of this document, visit product home site: http://www.ibm.com/systems/power/software/i/are/index.html

More information

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016 Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds

More information

Static analysis and testing of executable DSL specification

Static analysis and testing of executable DSL specification Static analysis and testing of executable DSL specification Qinan Lai 1, Andy Carpenter 1 1 School of Computer Science, the University of Manchester, Manchester, UK {laiq,afc}@cs.man.ac.uk Keywords: Abstract:

More information

F-OWL: An OWL Reasoner in Flora-2 Youyong Zou, Harry Chen, Tim Finin, Lalana Kagal

F-OWL: An OWL Reasoner in Flora-2 Youyong Zou, Harry Chen, Tim Finin, Lalana Kagal F-OWL: An OWL Reasoner in Flora-2 Youyong Zou, Harry Chen, Tim Finin, Lalana Kagal http://fowl.sourceforge.net/ Feature Supports RDF and OWL-Full Supports RDF/N-Triple query Supports Dynamic Import Provides

More information

SPECIFICATION-BASED TESTING VIA DOMAIN SPECIFIC LANGUAGE

SPECIFICATION-BASED TESTING VIA DOMAIN SPECIFIC LANGUAGE RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 10.2478/rput-2014-0003 2014, Volume 22, Special Number SPECIFICATION-BASED TESTING VIA

More information

3D Visualization. Requirements Document. LOTAR International, Visualization Working Group ABSTRACT

3D Visualization. Requirements Document. LOTAR International, Visualization Working Group ABSTRACT 3D Visualization Requirements Document LOTAR International, Visualization Working Group ABSTRACT The purpose of this document is to provide the list of requirements and their associated priorities related

More information

SAP Edge Services, cloud edition Edge Services Predictive Analytics Service Guide Version 1803

SAP Edge Services, cloud edition Edge Services Predictive Analytics Service Guide Version 1803 SAP Edge Services, cloud edition Edge Services Predictive Analytics Service Guide Version 1803 Table of Contents MACHINE LEARNING AND PREDICTIVE ANALYTICS... 3 Model Trained with R and Exported as PMML...

More information

Genie. Distributed Systems Synthesis and Verification. Marc Rosen. EN : Advanced Distributed Systems and Networks May 1, 2017

Genie. Distributed Systems Synthesis and Verification. Marc Rosen. EN : Advanced Distributed Systems and Networks May 1, 2017 Genie Distributed Systems Synthesis and Verification Marc Rosen EN.600.667: Advanced Distributed Systems and Networks May 1, 2017 1 / 35 Outline Introduction Problem Statement Prior Art Demo How does it

More information

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING WWW.HCLTECH.COM 21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING THE AGE OF DISRUPTION: THE AGE OF CYBER THREATS While the digital era has brought with it significant advances in technology, capabilities

More information

Domain-Specific Languages Language Workbenches

Domain-Specific Languages Language Workbenches Software Engineering with and Domain-Specific Languages Language Workbenches Peter Friese Itemis peter.friese@itemis.de Markus Voelter Independent/itemis voelter@acm.org 1 Programming Languages C# Erlang

More information

GSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System

GSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System Cryptography Network Security GSMK Firewall and Intrusion Detection System GSMK Firewall and intrusion detection system to prevent attacks via interconnect. Protect your Network s Achilles Heel. With the

More information

SKILL AREA 306: DEVELOP AND IMPLEMENT COMPUTER PROGRAMS

SKILL AREA 306: DEVELOP AND IMPLEMENT COMPUTER PROGRAMS Add your company slogan SKILL AREA 306: DEVELOP AND IMPLEMENT COMPUTER PROGRAMS Computer Programming (YPG) LOGO 306.1 Review Selected Programming Environment 306.1.1 Explain the concept of reserve words,

More information

III. Check if the divisors add up to the number. Now we may consider each of these tasks separately, assuming the others will be taken care of

III. Check if the divisors add up to the number. Now we may consider each of these tasks separately, assuming the others will be taken care of Top-Down Design 1 Top-Down Design: A solution method where the problem is broken down into smaller sub-problems, which in turn are broken down into smaller subproblems, continuing until each sub-problem

More information

When Modeling meets Productivity. Sven Efftinge - itemis

When Modeling meets Productivity. Sven Efftinge - itemis When Modeling meets Productivity Sven Efftinge - itemis I Eclipse JDT I GIT So what s the Problem? It s the Language not the Tooling! Level of Abstraction Reuse existing, proven technology and apply

More information

IoT with Apache ActiveMQ, Camel and Spark

IoT with Apache ActiveMQ, Camel and Spark IoT with Apache ActiveMQ, Camel and Spark Burr Sutter - Red Hat Agenda Business & IT Architecture IoT Architecture IETF IoT Use Case Ingestion: Apache ActiveMQ, Apache Camel Analytics: Apache Spark Demos

More information

Fast Indexing Strategies for Robust Image Hashes

Fast Indexing Strategies for Robust Image Hashes DIGITAL FORENSIC RESEARCH CONFERENCE Fast Indexing Strategies for Robust Image Hashes By Christian Winter, Martin Steinebach and York Yannikos Presented At The Digital Forensic Research Conference DFRWS

More information

Generic Programming Constructs and Applications in Object-Oriented Languages

Generic Programming Constructs and Applications in Object-Oriented Languages Generic Programming Constructs and Applications in Object-Oriented Languages Maurizio Cimadamore maurizio.cimadamore@[unibo.it sun.com] alice research group Alma Mater Studiorum Università di Bologna Sun

More information

CSE 403: Software Engineering, Fall courses.cs.washington.edu/courses/cse403/16au/ Static Analysis. Emina Torlak

CSE 403: Software Engineering, Fall courses.cs.washington.edu/courses/cse403/16au/ Static Analysis. Emina Torlak CSE 403: Software Engineering, Fall 2016 courses.cs.washington.edu/courses/cse403/16au/ Static Analysis Emina Torlak emina@cs.washington.edu Outline What is static analysis? How does it work? Free and

More information

Dániel Darvas Domain-specific languages (DSLs): what, how and when?

Dániel Darvas Domain-specific languages (DSLs): what, how and when? Dániel Darvas Domain-specific languages (DSLs): what, how and when? ICE Tea 21/02/2014 Outline Theory Concept of DSLs Technology Support for DSLs Reality Some details of the ST Example DSL Theory / Concept

More information

An Implementation of Fog Computing Attributes in an IoT Environment

An Implementation of Fog Computing Attributes in an IoT Environment An Implementation of Fog Computing Attributes in an IoT Environment Ranjit Deshpande CTO K2 Inc. Introduction Ranjit Deshpande CTO K2 Inc. K2 Inc. s end-to-end IoT platform Transforms Sensor Data into

More information

Graph-based analysis of JavaScript source code repositories

Graph-based analysis of JavaScript source code repositories Graph-based analysis of JavaScript source code repositories Gábor Szárnyas Graph Processing devroom @ FOSDEM 2018 JAVASCRIPT Latest standard: ECMAScript 2017 STATIC ANALYSIS Static source code analysis

More information

Date yyyy-mm-dd binding declaration GASTEC QA GENERAL REQUIREMENTS

Date yyyy-mm-dd binding declaration GASTEC QA GENERAL REQUIREMENTS Date yyyy-mm-dd binding declaration GASTEC QA GENERAL REQUIREMENTS 253/160324 Foreword Kiwa These have been approved by the GASTEC QA Board of Experts, in which all relevant parties in the field of gas-related

More information

Architectural patterns and models for implementing CSPA

Architectural patterns and models for implementing CSPA Architectural patterns and models for implementing CSPA Marco Silipo THE CONTRACTOR IS ACTING UNDER A FRAMEWORK CONTRACT CONCLUDED WITH THE COMMISSION Application architecture Outline SOA concepts and

More information

Waste Electrical and Electronic Equipment (WEEE)

Waste Electrical and Electronic Equipment (WEEE) Waste Electrical and Electronic Equipment (WEEE) Waste Management Plan Guidance manual for WEEE Waste Management Plan online submission This document is for guidance only. It does not purport to be and

More information

1 What-is-anopen-platform/

1   What-is-anopen-platform/ universaal IOT a Technical Overview Topics Semantic Discovery & Interoperability Service Broker & Orchestrator Context Broker, Context History Entrepôt, & Semantic Reasoning Human-Environment Interaction

More information

Semantic Analysis. Outline. The role of semantic analysis in a compiler. Scope. Types. Where we are. The Compiler so far

Semantic Analysis. Outline. The role of semantic analysis in a compiler. Scope. Types. Where we are. The Compiler so far Outline Semantic Analysis The role of semantic analysis in a compiler A laundry list of tasks Scope Static vs. Dynamic scoping Implementation: symbol tables Types Statically vs. Dynamically typed languages

More information

WHITE PAPER. Meeting GDPR Challenges with Delphix. KuppingerCole Report

WHITE PAPER. Meeting GDPR Challenges with Delphix. KuppingerCole Report KuppingerCole Report WHITE PAPER by Mike Small December 2017 GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance.

More information

IBM Advantage: IBM Watson Compare and Comply Element Classification

IBM Advantage: IBM Watson Compare and Comply Element Classification IBM Advantage: IBM Watson Compare and Comply Element Classification Executive overview... 1 Introducing Watson Compare and Comply... 2 Definitions... 3 Element Classification insights... 4 Sample use cases...

More information

Assertions, pre/postconditions

Assertions, pre/postconditions Programming as a contract Assertions, pre/postconditions Assertions: Section 4.2 in Savitch (p. 239) Specifying what each method does q Specify it in a comment before method's header Precondition q What

More information

Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led

Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led Introduction This three-day instructor-led course provides students with product knowledge and skills needed to

More information

A consumer-driven access control approach to censorship circumvention in content-centric networking

A consumer-driven access control approach to censorship circumvention in content-centric networking A consumer-driven access control approach to censorship circumvention in content-centric networking Jun Kurihara, Kenji Yokota and Atsushi Tagami KDDI R&D Laboratories, Inc. ACM ICN 2016 Kyoto, Japan,

More information

1. What is used by the extension application to get access to the extended SAP solution?

1. What is used by the extension application to get access to the extended SAP solution? SAP EDUCATION SAMPLE QUESTIONS: C_HCP_10 SAP Certified Development Associate - SAP HANA Cloud Platform (Edition 2016) Disclaimer: These sample questions are for self-evaluation purposes only and do not

More information

Towards A Formal Theory of On Chip Communications in the ACL2 Logic

Towards A Formal Theory of On Chip Communications in the ACL2 Logic (c) Julien Schmaltz, ACL2 2006, San José August 15-16 p. 1/37 Towards A Formal Theory of On Chip Communications in the ACL2 Logic Julien Schmaltz Saarland University - Computer Science Department Saarbrücken,

More information

Cloud-Native Applications. Copyright 2017 Pivotal Software, Inc. All rights Reserved. Version 1.0

Cloud-Native Applications. Copyright 2017 Pivotal Software, Inc. All rights Reserved. Version 1.0 Cloud-Native Applications Copyright 2017 Pivotal Software, Inc. All rights Reserved. Version 1.0 Cloud-Native Characteristics Lean Form a hypothesis, build just enough to validate or disprove it. Learn

More information

INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION

INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION Bulletin of the Transilvania University of Braşov Vol. 7 (56) No. 2-2014 Series I: Engineering Sciences INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION Mihai MACHEDON-PISU

More information

Are functional languages a good way to represent productive meta models?

Are functional languages a good way to represent productive meta models? Are functional languages a good way to represent productive meta models? Rainbow Team, I3S Lab, CNRS University of Nice, France http://rainbow.i3s.unice.fr 4 th European Lisp Workshop ECOOP 07, 07/30/2007,

More information

Assessing the Security of Internet Connected Critical Infrastructures

Assessing the Security of Internet Connected Critical Infrastructures Assessing the Security of Internet Connected Critical Infrastructures The Comifin Project Approach H. Ghani, A. Khelil, N. Suri, G. Csertán, L. Gönczy, G. Urbanics, J. Clarke Dept of Computer Science,

More information

Manual. TC3 Power Monitoring. TwinCAT 3. Version: Date: Order No.: TF3650

Manual. TC3 Power Monitoring. TwinCAT 3. Version: Date: Order No.: TF3650 Manual TC3 Power Monitoring TwinCAT 3 Version: Date: Order No.: 1.1 2019-01-03 TF3650 Table of contents Table of contents 1 Foreword... 5 1.1 Notes on the documentation... 5 1.2 Safety instructions...

More information

SOA-14: Continuous Integration in SOA Projects Andreas Gies

SOA-14: Continuous Integration in SOA Projects Andreas Gies Tooling for Service Mix 4 Principal Architect http://www.fusesource.com http://open-source-adventures.blogspot.com About the Author Principal Architect PROGRESS - Open Source Center of Competence Degree

More information

McAfee Embedded Control

McAfee Embedded Control McAfee Embedded Control System integrity, change control, and policy compliance in one solution McAfee Embedded Control maintains the integrity of your system by only allowing authorized code to run and

More information

Modeling and Discovering Vulnerabilities with Code Property Graphs

Modeling and Discovering Vulnerabilities with Code Property Graphs Modeling and Discovering Vulnerabilities with Code Property Graphs Fabian Yamaguchi, Nico Golde (Qualcomm), Daniel Arp, and Konrad Rieck Security & Privacy 2014 GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Implementation

More information

TAXII 2.0 Specification Pre Draft

TAXII 2.0 Specification Pre Draft TAXII 2.0 Specification Pre Draft Current Status/Intent This document serves to gain consensus on pre draft concepts of TAXII 2.0. Please feel free to poke holes and comment! Overview TAXII is an open

More information

Data Governance Overview

Data Governance Overview 3 Data Governance Overview Date of Publish: 2018-04-01 http://docs.hortonworks.com Contents Apache Atlas Overview...3 Apache Atlas features...3...4 Apache Atlas Overview Apache Atlas Overview Apache Atlas

More information

Saba Hosted Customer Privacy Policy

Saba Hosted Customer Privacy Policy Saba Hosted Customer Privacy Policy Last Revised 23 May 2018 1. Introduction Saba is committed to protecting information which can be used to directly or indirectly identify an individual ( personal data

More information

Integration Service. Admin Console User Guide. On-Premises

Integration Service. Admin Console User Guide. On-Premises Kony MobileFabric TM Integration Service Admin Console User Guide On-Premises Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and

More information

Practical Network-wide Packet Behavior Identification by AP Classifier

Practical Network-wide Packet Behavior Identification by AP Classifier Practical Network-wide Packet Behavior Identification by AP Classifier NETWORK-WIDE PACKET BEHAVIOR IDENTIFICATION o An control plane application identifying forwarding behaviors of packets in a flow:

More information

Xtext. Introduction and Real World Samples. Hendrik Bünder, itemis AG. itemis AG

Xtext. Introduction and Real World Samples. Hendrik Bünder, itemis AG. itemis AG Xtext Introduction and Real World Samples Hendrik Bünder, itemis AG Who is this guy? Hendrik Bünder IT-Consultant Agenda Introduction to Xtext What, How, Why? Common DSLs DSLs that no longer impress anybody.

More information

Temporal Data Model for Program Debugging

Temporal Data Model for Program Debugging Temporal Data Model for Program Debugging Demian Lessa Jan Chomicki Bharat Jayaraman Department of Computer Science and Engineering State University of New York, Buffalo August 29, 2011 Current Debuggers

More information

SEARCH by Sound. API Documentation. Spectralmind Audio Intelligence Platform. Spectralmind. Platform version: 1.3 Document version: 1.1.

SEARCH by Sound. API Documentation. Spectralmind Audio Intelligence Platform. Spectralmind. Platform version: 1.3 Document version: 1.1. Spectralmind Platform version: 1.3 Document version: 1.1.1 SEARCH by Sound Spectralmind Audio Intelligence Platform Authors: Wolfgang Jochum, Ewald Peiszer API Documentation Version... 3 Overview... 3

More information

Module 4: Advanced Development

Module 4: Advanced Development Module 4: Advanced Development Objective Create and build a Standard Make Project from source files in CVS Contents Version control Standard Make Projects Fortran Refactoring Searching LACSI 2006 Version

More information

XDK LIVE A NEW PROGRAMMING LANGUAGE FOR THE EMBEDDED IOT. Christian Weichel Bosch Connected Devices and Solutions GmbH

XDK LIVE A NEW PROGRAMMING LANGUAGE FOR THE EMBEDDED IOT. Christian Weichel Bosch Connected Devices and Solutions GmbH XDK LIVE A NEW PROGRAMMING LANGUAGE FOR THE EMBEDDED IOT Christian Weichel Bosch Connected Devices and Solutions GmbH Cumulated Effort Eclipse PAX Scaling over quantity Breadboard Custom PCBA DFM Industrialization

More information

FMCAD 2011 (Austin, Texas) Jonathan Kotker, Dorsa Sadigh, Sanjit Seshia University of California, Berkeley

FMCAD 2011 (Austin, Texas) Jonathan Kotker, Dorsa Sadigh, Sanjit Seshia University of California, Berkeley FMCAD 2011 (Austin, Texas) Jonathan Kotker, Dorsa Sadigh, Sanjit Seshia University of California, Berkeley 1 Cyber-Physical = Computation + Physical Processes Quantitative analysis of programs is crucial:

More information

Part III. Issues in Search Computing

Part III. Issues in Search Computing Part III Issues in Search Computing Introduction to Part III: Search Computing in a Nutshell Prior to delving into chapters discussing search computing in greater detail, we give a bird s eye view of its

More information

Apache Wink Developer Guide. Draft Version. (This document is still under construction)

Apache Wink Developer Guide. Draft Version. (This document is still under construction) Apache Wink Developer Guide Software Version: 1.0 Draft Version (This document is still under construction) Document Release Date: [August 2009] Software Release Date: [August 2009] Apache Wink Developer

More information

This Readme describes the NetIQ Access Manager 3.1 SP5 release.

This Readme describes the NetIQ Access Manager 3.1 SP5 release. NetIQ Access Manager 3.1 SP5 Readme January 2013 This Readme describes the NetIQ Access Manager 3.1 SP5 release. Section 1, What s New, on page 1 Section 2, Upgrading or Migrating to Access Manager 3.1

More information

What Do We Mean by the Term Personal Identifiable Information?

What Do We Mean by the Term Personal Identifiable Information? PRIVACY POLICY Privacy Policy of Level 3 Communications, Inc. and its group companies (referred to throughout as Level 3, we or us ). We are committed to protecting the privacy of individuals. This Privacy

More information

Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric

Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric Revision 2.1 Page 1 of 17 www.whamtech.com (972) 991-5700 info@whamtech.com August 2018 Contents Introduction... 3

More information

Generating String Attack Inputs Using Constrained Symbolic Execution. presented by Kinga Dobolyi

Generating String Attack Inputs Using Constrained Symbolic Execution. presented by Kinga Dobolyi Generating String Attack Inputs Using Constrained Symbolic Execution presented by Kinga Dobolyi What is a String Attack? Web applications are 3 tiered Vulnerabilities in the application layer Buffer overruns,

More information

Model Driven Engineering in High Tech Industry

Model Driven Engineering in High Tech Industry Model Driven Engineering in High Tech Industry Mark van den Brand LUCAS-dagen, Lund, October 2016 Short introduction of myself 1992-1997: Assistant professor at UvA (NL) 1997-2005: Senior researcher at

More information

The Integrated Smart & Security Platform Powered the Developing of IOT

The Integrated Smart & Security Platform Powered the Developing of IOT The Integrated Smart & Security Platform Powered the Developing of IOT We Are Entering A New Era- 50million connections Smart-Healthcare Smart-Wearable VR/AR Intelligent Transportation Eco-Agriculture

More information

Features of the New MySignals Cloud

Features of the New MySignals Cloud Features of the New MySignals Cloud Libelium s IoT ehealth Platform As part of our continuous improvement process in Libelium, we are pleased to announce the new MySignals Cloud 1.0 version, which will

More information

Technical Brief Distributed Trusted Computing

Technical Brief Distributed Trusted Computing Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,

More information

Provenance-aware Secure Networks

Provenance-aware Secure Networks Provenance-aware Secure Networks Wenchao Zhou Eric Cronin Boon Thau Loo University of Pennsylvania Motivation Network accountability Real-time monitoring and anomaly detection Identifying and tracing malicious

More information

@2010 Badri Computer Architecture Assembly II. Virtual Memory. Topics (Chapter 9) Motivations for VM Address translation

@2010 Badri Computer Architecture Assembly II. Virtual Memory. Topics (Chapter 9) Motivations for VM Address translation Virtual Memory Topics (Chapter 9) Motivations for VM Address translation 1 Motivations for Virtual Memory Use Physical DRAM as a Cache for the Disk Address space of a process can exceed physical memory

More information

ABAP Platform 7.4/7.5 Overview. Technology Core Platform Product Management, SAP SE March 22 th, 2017

ABAP Platform 7.4/7.5 Overview. Technology Core Platform Product Management, SAP SE March 22 th, 2017 ABAP Platform 7.4/7.5 Overview Technology Core Platform Product Management, SAP SE March 22 th, 2017 Disclaimer This presentation outlines our general product direction and should not be relied on in making

More information

Introduction to Machine-Independent Optimizations - 6

Introduction to Machine-Independent Optimizations - 6 Introduction to Machine-Independent Optimizations - 6 Machine-Independent Optimization Algorithms Department of Computer Science and Automation Indian Institute of Science Bangalore 560 012 NPTEL Course

More information

CSE 307: Principles of Programming Languages

CSE 307: Principles of Programming Languages CSE 307: Principles of Programming Languages Advanced Topics R. Sekar Topics 1 / 14 1. 2 / 14 Section 1 3 / 14 Semantics of Programs Syntax defines what programs are valid. Semantics defines what the valid

More information

Cisco EnergyWise Optimize and Cost Saving. Traditional IT Power Management

Cisco EnergyWise Optimize and Cost Saving. Traditional IT Power Management Cisco EnergyWise Introduction In response to energy costs, environmental concerns, and government directives, there is an increased need for sustainable and green business IT operations. Methods to measure

More information

Compiler Construction

Compiler Construction Compiler Construction Thomas Noll Software Modeling and Verification Group RWTH Aachen University https://moves.rwth-aachen.de/teaching/ss-16/cc/ Seminar Analysis and Verification of Pointer Programs (WS

More information

Apache Beam. Modèle de programmation unifié pour Big Data

Apache Beam. Modèle de programmation unifié pour Big Data Apache Beam Modèle de programmation unifié pour Big Data Who am I? Jean-Baptiste Onofre @jbonofre http://blog.nanthrax.net Member of the Apache Software Foundation

More information