ATLANTIS - Assembly Trace Analysis Environment
|
|
- Delphia McCoy
- 5 years ago
- Views:
Transcription
1 ATLANTIS - Assembly Trace Analysis Environment Brendan Cleary, Margaret-Anne Storey, Laura Chan Dept. of Computer Science, University of Victoria, Victoria, BC, Canada bcleary@uvic.ca, mstorey@uvic.ca, lkchan@uvic.ca Martin Salois, Frederic Painchaud Defense Research and Development Canada Valcartier, Quebec, QC, Canada martin.salois@drdc-rddc.gc.ca, frederic.painchaud@drdc-rddc.gc.ca For malware authors, software is an ever fruitful source of vulnerabilities to exploit. Exploitability assessment through fuzzing aims to proactively identify potential vulnerabilities by monitoring the execution of a program while attempting to induce a crash. In order to determine if a particular program crash is exploitable (and to create a patch), the root cause of the crash must be identified. For particular classes of programs this analysis must be conducted without the aid of the original source code using execution traces generated at the assembly layer. Currently this analysis is a highly manual, text-driven activity with poor tool support. In this paper we present ATLANTIS, an assembly trace analysis environment that combines many of the features of modern IDEs with novel trace annotation and navigation techniques to support software security engineers performing exploitability analysis. I. INTRODUCTION A zero-day exploit occurs when a vulnerability in a software program is discovered and malware exploiting the flaw is developed and released before a patch is available. Software security engineers attempt to protect against zeroday exploits by proactively finding vulnerabilities in programs before malware authors can develop code that exploits those vulnerabilities. Exploitability analysis is the process of determining if a given program may be susceptible to exploitation. One way of determining if a program may have a hidden vulnerability is to attempt to make the program crash and then to analyze the resulting execution trace. The main steps in this process are: fuzzing, crash prioritization, root cause analysis and exploitability assessment. Fuzzing is a process whereby an engineer attempts to induce a program crash by feeding that program random or planned program inputs until it crashes [1]. One of the major limitations with this type of approach is that it can find too many crashes. Crash prioritization attempts to identify crashes that are more likely to expose potential vulnerabilities [2]. While these steps can be somewhat automated, assessing the actual exploitability of a crash and performing root cause analysis requires a great deal of human reasoning. Software security engineers typically use a combination of static and dynamic analysis techniques to determine the cause of a crash and if the program is vulnerable to exploitation. In cases where access to the source code of the program under analysis is not available, engineers must instead rely on analyzing assembly-level execution traces generated during fuzzing. ATLANTIS is an integrated assembly trace analysis environment designed to assist engineers perform and manage this analysis. It provides engineers with features typical of integrated development environments as well as novel comment and tagging features designed to facilitate recording and sharing of analysis insights. II. BACKGROUND There is a large body of related work in the field of dynamic analysis for reverse engineering and performance analysis that studies methods and tools for aiding software engineers in understanding execution traces. However, tools from these fields tend to assume the availability of source code and use extra structural information present in the source (package names, meaningful function and variable names, etc.) to assist engineers in visualizing, navigating and understanding a program s execution trace. More recently, security researchers have started building tools specifically for binary security analysis that work directly with the program executable. For example the BitBlaze platform [3] provides a set of tools for performing static and dynamic analysis of binaries as well as tools designed specifically for analyzing execution traces. ATLANTIS is designed to work with and present the execution traces generated by these types of analysis tools, providing security engineers with a user-friendly environment to explore, perform, record and share their analysis. III. ATLANTIS ATLANTIS is built on the Eclipse Rich Client Platform (RCP) and provides the following views to support exploitability and trace analysis; trace view, search view, regions view, tagging view, comments view and project view (Figure 1). The trace view provides users with a familiar way to view and navigate the trace or traces under analysis. Using syntax highlighting similar to that found in programming language editors, the trace view automatically color codes different parts of each line of the execution trace. If the user selects a particular memory address in the trace, the trace view automatically highlights all other references to that address. The search view provides users with regular-expressionbased search functionality allowing them to define and execute queries over the execution trace. When the user
2 executes a search, matching occurrences of the search string are automatically highlighted in the trace view, while the search results view shows all occurrences as an easily navigable list. Users can use keyboard or navigation buttons in the search results view to quickly navigate between results. The regions view allows a user to right click in the trace view to create a new region based on the selected section of trace. The regions view then provides a hierarchical list of all regions defined in the trace. Regions can be used by security engineers to collapse or hide all non-relevant parts of a trace after successfully performing a root cause analysis or to single out parts of the trace that are of interest. The commenting and tagging views provide a way for users to quickly record hypotheses as they traverse the trace. Building on previous work on tagging in software development [4], tags allow a user to annotate a particular line and column (or entire sections) in the trace. There can be multiple occurrences of a tag. Using the tags view, the user can navigate between all occurrences of a tag. Tags can also be grouped. Comments function in a similar way but are unique and allow a user to express more complex ideas about a particular location or section of trace. Unlike traditional source code editors, where comments and tags are expressed in-line with the source, in ATLANTIS comments and tags are displayed in a layer floating above the trace view. This allows the user to selectively display only particular groups of comments and tags. For example, a user analyzing a trace might have different comment groups for different features they are investigating in the trace. Comment and tag layering allows a user to quickly show or hide all comments from one or both of those features. Often users will not be concerned with analyzing a single trace but rather multiple related traces. To accommodate this, we have implemented a project view that allows users to treat multiple traces as part of a single project. Another feature provided by this view is the ability to import comment and tag files from other users who might be analyzing the same trace file. This feature enables lightweight collaboration in an environment where, due to the sometime dangerous and disconnected nature of the work (e.g. where one does not want to accidentally release malware), sharing information and collaboration across networks can be difficult. IV. CONCLUSION This paper presents ATLANTIS, a tool designed to assist software security engineers with identifying potentially exploitable programs based on analysis of their execution traces. In our previous work [5], we reported on a first-of-itskind field study of the work practices of software security engineers where we identified the tools and processes used, as well as the unique constraints and challenges those engineers face. ATLANTIS directly follows from that research and has been designed in collaboration with software security engineers to meet their requirements. Future work will add features such as trace comparison, visualization and investigate integration of software understanding techniques like software reconnaissance. We will also perform empirical studies on how well this tool assists engineers performing trace and exploitability analysis. REFERENCES [1] Sutton, M., Greene, A., Amin, P., Fuzzing: Brute Force Vulnerability Discovery, Addison-Wesley, [2] Microsoft,!exploitable Crash Analyzer - MSEC Debugger Extensions, 7/11/2012 [3] Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M., Liang, Z., Newsome, J., Poosankam, P., Saxena, P., Sekar, R., Pujari, A., BitBlaze: A New Approach to Computer Security via Binary Analysis Book Title: Information Systems Security, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2008, pp [4] Storey, M.A., Ryall, J., Singer, J., Myers, D., Li-Te Cheng, Muller, M., How Software Developers Use Tagging to Support Reminding and Refinding, IEEE Transactions on Software Engineering, Vol 43, No 4, July-Aug [5] Treude, C., Figueira Filho, F., Storey, M.A., Salois, M., "An Exploratory Study of Software Reverse Engineering in a Security Context", 18th Working Conference on Reverse Engineering (WCRE), pp , Figure 1 - ATLANTIS User Interface
3 Appendix. Demonstration Outline The ATLANTIS trace analysis environment provides a set of plugins to help security engineers perform program exploitability analysis using program traces. Our demonstration will provide the audience with an introduction to the problem of exploitability analysis followed by a detailed description of each of these plugins using a simple exploitability analysis scenario to help explain how the tool can be used by security engineers. ATLANTIS User Interface ATLANTIS is an Eclipse RCP (Rich Client Platform) application. Being an RCP application allows ATLANTIS to leverage the file handling, windowing, view docking and plugin capabilities of the Eclipse platform as well as rich user interface customization abilities. ATLANTIS is composed of a set of views, each of which provides specific functionality useful to security engineers performing exploitability analysis. An overview of the ATLANTIS user interface with major views outlined is provided in Figure 1. The next sections will describe each view in turn. Figure 1 - ATLANTIS User Interface A. Project Management
4 Often when performing exploitability analysis over traces engineers will not be concerned with analyzing a single trace but rather multiple related traces such as comparing a good trace (normal behavior) with a bad trace (crash) (Figure 2). Figure 2 - Project Management View For the demonstration we will show how the Project Management View allows security engineers to: - Create a new project - Group multiple traces and associated annotation files together into a hierarchical project structure - Import and export existing trace analysis projects - Import and export annotation files from other users such as comments and tags B. Search Being able to quickly search over the trace is an important part of the functionality required by security engineers when they perform exploitability analysis of execution traces. The Search View allows a user to create and execute a regular expression like search. Search results are presented in the Search Results View and highlighted in the Trace View. For the demonstration we will show how the user can use the search and results views to: - Define and execute a simple search Figure 3 - Review the search results in the Search Results View Figure 4 - Navigate between search results using the keyboard and the Search Results View - How the search results are highlighted in the Trace View Figure 5
5 Figure 3 - Search View Figure 4 - Search Results View
6 Figure 5 - Trace View Search Result Highlighting C. Trace View The Trace View is the main component of the ATLANTIS environment and provides users with a way to view and navigate through execution traces. The trace view provides security researchers with many of the features of a source code editor found in a software development IDE such as syntax highlighting and automatic reference highlighting. For the demonstration we will show the following features of the Trace View: - Annotating trace lines with comments and tags Figure 6 A - A trace overview showing the locations of items of interest such as comments, tags and search results Figure 6 B - Memory location reference highlighting Figure 6 C - Display 2 or more traces side by side Figure 7 Figure 6 - Trace View
7 Figure 7 - Trace View (two traces side by side) D. Regions The Regions View allows a user to selectively collapse or expand parts of a trace. This feature is similar to that which a programmer might use in a programming IDE for hiding irrelevant parts of a program s source file. For the demonstration we will show: - How to create a new region Figure 9 - How to expand and collapse regions Figure 10 - How to create sub-regions Figure 11 - Navigating through the trace using the regions view Figure 8
8 Figure 8 - Regions View Figure 9 - Trace View with regions collapsed
9 Figure 10 - Expanding a region
10 Figure 11 - Trace View with collapsed (B) and expanded regions (A) E. Metadata Layers A unique feature of ATLANTIS is the facilities it offers for separation of annotations and metadata from the trace and controlling what annotations like comments and tags are displayed and how. The Layers View allows a user to quickly and easily control the types of metadata or annotations that are displayed in the Trace Viewer. This design is a departure from traditional approaches to annotations in source code which tend to be made inline in the code rather than separate. This layering approach to metadata allows the engineer to decide what annotations they want to see and when they want to see them rather than the all-or-nothing approach of source code IDEs.
11 Figure 12 - Layers View Currently ATLANTIS has the capability to display two metadata layers; comments and tags (Figure 12). Future versions will include more layers, for example, Taint information. Annotations like comments and tags appear both as icons in the left hand gutter of the Trace View Figure 6 A and as floating tooltips above the Trace View Figure 13. For the demo we will show how to: - Show or hide layers - How annotations float and scroll with the trace view - How to use color coding for annotation types or groups F. Tags The Tags View allows a user to annotate a particular line and column (or entire sections) in the trace with a tag. There can be multiple occurrences of a tag. Using the tags view, the user can navigate between all occurrences of a tag Figure 13. Tags can also be grouped and groups of tags can be selectively displayed or hidden from the user Figure 14.
12 Figure 13 - Tag View & tag occurrences For the demonstration we will show; - How to create a new tag - How to add a tag to a character, line or section of trace - How to manage tag groups - How to navigate the trace using tags - How to selectively display or hide tag groups
13 Figure 14 - Tag View (hide tags) G. Comments Comments in ATLANTIS function in a similar way to tags but are unique and allow a user to express more complex ideas about a particular location or section of trace Figure 15. For the demonstration we will show: - How to create a new comment - How to add a comment to a character, line or section of trace - How to manage comment groups - How to navigate the trace using comment - How to selectively display or hide comment groups Figure 16
14 Figure 15 - Comments View and floating comments in Trace View
15 Figure 16 - Comments View hiding and changing comment colors
16 UNCLASSIFIED SECURITY CLASSIFICATION OF FORM (highest classification of Title, Abstract, Keywords) DOCUMENT CONTROL DATA (Security classification of title, body of abstract and indexing annotation must be entered when the overall document is classified.) 1. ORIGINATOR (Name and address of the organization preparing the document.) University of Victoria Computer science Victoria (BC) Canada 2. SECURITY CLASSIFICATION (Overall security classification of the document, including special warning terms if applicable.) Unclassified 3. TITLE (The complete document title as indicated on the title page. Its classification should be indicated by the appropriate abbreviation (S, C or U) in parentheses after the title.) ATLANTIS - Assembly Trace Analysis Environment 4. AUTHORS (Last name, followed by initials ranks, titles, etc. not to be used.) Chan, L.; Cleary, B.; Painchaud, F.; Salois, M.; Storey, M.A. 5. DATE OF PUBLICATION (month and year of publication of document.) October NO. OF PAGES (Including Annexes, Appendices and DCD sheet.) DESCRIPTIVE NOTES (the category of the document, e.g. technical report, technical note or memorandum. If appropriate, enter the type of report, e.g. interim, progress, summary, annual or final. Give the inclusive dates when a specific reporting period is covered.) Conference proceedings 8a. PROJECT OR GRANT NO. (If appropriate, the applicable research and development project or grant number under which the document was written. Please specify whether project or grant) 15FC04 9a. ORIGINATOR S DOCUMENT NUMBER (Official document number by which the document is identified by the originating activity. Number must be unique to this document.) 8b. CONTRACT NO. (If appropriate, the applicable number under which the document was written) DNDPJ b. OTHER DOCUMENT NOS. (Any other numbers which may be assigned to this document either by the originator or the sponsor.) SL 2012-XXX 10. DOCUMENT AVAILABILITY (Any limitation on further distribution of the document, other than those imposed by security classification.) ( X ) Unlimited distribution ( ) Distribution limited to defence departments ( ) Distribution limited to defence contractors ( ) Distribution limited to government ( ) Distribution limited to Defence R&D Canada ( ) Controlled by Source 11. DOCUMENT ANNOUNCEMENT (Any limitation to the bibliographic announcement of this document. This will normally correspond to the Document Availability (10). However, where further distribution (beyond the audience specified in (10) is possible, a wider announcement audience may be selected.) UNCLASSIFIED SECURITY CLASSIFICATION OF FORM DRDKIM December 2009
17 UNCLASSIFIED SECURITY CLASSIFICATION OF FORM 12. ABSTRACT (Brief and factual summary of the document. May also appear elsewhere in the body of the document itself. It is highly desirable that the abstract of classified documents be unclassified. Each paragraph of the abstract shall begin with an indication of the security classification of the information in the paragraph (unless the document itself is unclassified) represented as (S), (C), or (U). May be in English only). For malware authors, software is an ever fruitful source of vulnerabilities to exploit. Exploitability assessment through fuzzing aims to proactively identify potential vulnerabilities by monitoring the execution of a program while attempting to induce a crash. In order to determine if a particular program crash is exploitable (and to create a patch), the root cause of the crash must be identified. For particular classes of programs this analysis must be conducted without the aid of the original source code using execution traces generated at the assembly layer. Currently this analysis is a highly manual, text-driven activity with poor tool support. In this paper we present ATLANTIS, an assembly trace analysis environment that combines many of the features of modern IDEs with novel trace annotation and navigation techniques to support software security engineers performing exploitability analysis. 13. KEYWORDS, DESCRIPTORS or IDENTIFIERS (Technically meaningful terms or short phrases characterizing a document and could be helpful in cataloguing it. Should be Unclassified text. If not, the classification of each term should be indicated as with the title. Equipment model designation, trade name, military project code name, and geographic location may be included. If possible, should be selected from a published thesaurus. e.g. Thesaurus of Engineering and Scientific Terms (TEST) and that thesaurus-identified. ) reverse engineering, malware, tracer, visualisation, memory, taint analysis UNCLASSIFIED SECURITY CLASSIFICATION OF FORM
Polaris Big Boss oise eduction
Defence Research and Development Canada Recherche et développement pour la défense Canada Polaris Big Boss oise eduction Report 2: Component ound ource anking C. Antelmi HGC Engineering Contract Authority:.
More informationIterative constrained least squares for robust constant modulus beamforming
CAN UNCLASSIFIED Iterative constrained least squares for robust constant modulus beamforming X. Jiang, H.C. So, W-J. Zeng, T. Kirubarajan IEEE Members A. Yasotharan DRDC Ottawa Research Centre IEEE Transactions
More informationRecherche et développement pour la défense Canada. Centre des sciences pour la sécurité 222, rue Nepean, 11ième étage Ottawa, Ontario K1A 0K2
Defence Research and Development Canada Centre for Security Science 222 Nepean Street, 11 th floor Ottawa, Ontario K1A 0K2 Recherche et développement pour la défense Canada Centre des sciences pour la
More informationNon-dominated Sorting on Two Objectives
Non-dominated Sorting on Two Objectives Michael Mazurek Canadian Forces Aerospace Warfare Centre OR Team Coop Student Slawomir Wesolkowski, Ph.D. Canadian Forces Aerospace Warfare Centre OR Team DRDC CORA
More informationConceptual Model Architecture and Services
CAN UNCLASSIFIED Conceptual Model Architecture and Services Contribution to the National Science Foundation Report on Research Challenges in Modeling and Simulation for Engineering Complex Systems Nathalie
More informationModel and Data Management Tool for the Air Force Structure Analysis Model - Final Report
Air Force Structure Analysis Model - Final Report D.G. Hunter DRDC CORA Prepared By: CAE Integrated Enterprise Solutions - Canada 1135 Innovation Drive Ottawa, ON, K2K 3G7 Canada Telephone: 613-247-0342
More informationHigh-level accessibility review BTAA (Elsevier ScienceDirect - final version)
High-level accessibility review BTAA (Elsevier ScienceDirect - final version) Primary Point of Contact Denis Boudreau Principal Web Accessibility Consultant Deque Systems, Inc. Web: www.deque.com Email:
More informationJQueryScapes: customizable Java code perspectives
JQueryScapes: customizable Java code perspectives [Forum Demonstration Proposal] Lloyd Markle, Kris De Volder Department of Computer Science University of British Columbia Vancouver, BC, Canada 604-822-1290
More informationIntroduction to Information Retrieval. Lecture Outline
Introduction to Information Retrieval Lecture 1 CS 410/510 Information Retrieval on the Internet Lecture Outline IR systems Overview IR systems vs. DBMS Types, facets of interest User tasks Document representations
More informationA Domain-Customizable SVG-Based Graph Editor for Software Visualizations
A Domain-Customizable SVG-Based Graph Editor for Software Visualizations Tony Lin, Feng Zou, Holger M. Kienle and Hausi A. Müller University of Victoria, Canada {gaoyun,fzou,kienle,hausi}@cs.uvic.ca Abstract
More informationAn Integrated Framework to Enhance the Web Content Mining and Knowledge Discovery
An Integrated Framework to Enhance the Web Content Mining and Knowledge Discovery Simon Pelletier Université de Moncton, Campus of Shippagan, BGI New Brunswick, Canada and Sid-Ahmed Selouani Université
More informationIBM Security AppScan Enterprise v9.0.1 Importing Issues from Third Party Scanners
IBM Security AppScan Enterprise v9.0.1 Importing Issues from Third Party Scanners Anton Barua antonba@ca.ibm.com October 14, 2014 Abstract: To manage the challenge of addressing application security at
More informationMeeting PCI DSS 3.2 Compliance with RiskSense Solutions
Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business
More informationeguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments
eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments Today s PCI compliance landscape is one of continuing change and scrutiny. Given the number
More informationVulnerability Assessments and Penetration Testing
CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze
More informationMODERN integrated development environments (IDEs)
470 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 35, NO. 4, JULY/AUGUST 2009 How Software Developers Use Tagging to Support Reminding and Refinding Margaret-Anne Storey, Jody Ryall, Janice Singer, Del
More information1.1 For Fun and Profit. 1.2 Common Techniques. My Preferred Techniques
1 Bug Hunting Bug hunting is the process of finding bugs in software or hardware. In this book, however, the term bug hunting will be used specifically to describe the process of finding security-critical
More information> Semantic Web Use Cases and Case Studies
> Semantic Web Use Cases and Case Studies Case Study: The Semantic Web for the Agricultural Domain, Semantic Navigation of Food, Nutrition and Agriculture Journal Gauri Salokhe, Margherita Sini, and Johannes
More informationNavigating Large Source Files Using a Fisheye View
Navigating Large Source Files Using a Fisheye View Jakub Dostál 1 1 University College Dublin, Ireland dostal.j@gmail.com Abstract As programs grow larger, it becomes more difficult to understand their
More informationEnterprise Architect. User Guide Series. Portals. Author: Sparx Systems. Date: 19/03/2018. Version: 1.0 CREATED WITH
Enterprise Architect User Guide Series Portals Author: Sparx Systems Date: 19/03/2018 Version: 1.0 CREATED WITH Table of Contents Portals 3 Perspective Portal 6 Workspace Portal 7 Window Portal 9 Status
More informationCommonLook Office GlobalAccess Quick Start Guide using Microsoft PowerPoint
CommonLook Office GlobalAccess Quick Start Guide using Microsoft PowerPoint Welcome to the NetCentric Technologies CommonLook Office GlobalAccess Quick Start Guide. This tutorial is intended to help users
More informationOvidSP Quick Reference Guide
OvidSP Quick Reference Guide Select Resources On the Select a Database to Begin Searching page, select one resource by clicking on the database name link, or select several resources by clicking the checkbox
More informationFunctional Blue Prints for the Development of a KMapper Prototype
Functional Blue Prints for the Development of a KMapper Prototype SOFTWARE DESIGN DOCUMENT KMAPPER KNOWLEDGE INFERRING SERVICES And prepared by Martin Froment and Ludovic Tobin Fujitsu Consulting (Canada)
More informationA Guide to Quark Author Web Edition October 2017 Update
A Guide to Quark Author Web Edition 2015 - October 2017 Update Contents Getting Started...1 Smart Documents...1 Introduction to the Quark Author Web Edition User Guide...1 Quark Author Web Edition configuration...1
More informationNew Mexico State University. Financial Systems Administration - RMR BDMS Scan/Load and Indexing
New Mexico State University Financial Systems Administration - RMR BDMS Scan/Load and Indexing November 11, 2016 Blank Page Table of Contents Business Rules... 1 Terminology... 2 Synchronizing Banner Security
More informationHow Often and What StackOverflow Posts Do Developers Reference in Their GitHub Projects?
How Often and What StackOverflow Posts Do Developers Reference in Their GitHub Projects? Saraj Singh Manes School of Computer Science Carleton University Ottawa, Canada sarajmanes@cmail.carleton.ca Olga
More informationFall 2013 Harvard Library User Survey Summary December 18, 2013
Fall 2013 Harvard Library User Survey Summary December 18, 2013 The Discovery Platform Investigation group placed links to a User Survey on the four major Harvard Library web sites (HOLLIS, HOLLIS Classic,
More informationContent Sharing and Reuse in PTC Integrity Lifecycle Manager
Content Sharing and Reuse in PTC Integrity Lifecycle Manager Author: Scott Milton 1 P age Table of Contents 1. Abstract... 3 2. Introduction... 4 3. Document Model... 5 3.1. Reference Modes... 6 4. Reusing
More informationEnterprise Architect. User Guide Series. Portals
Enterprise Architect User Guide Series Portals What are Portals? In Sparx Systems Enterprise Architect, each Portal is a high-level logical grouping of common tools, custom searches, window layouts and
More informationPALANTIR CYBERMESH INTRODUCTION
100 Hamilton Avenue Palo Alto, California 94301 PALANTIR CYBERMESH INTRODUCTION Cyber attacks expose organizations to significant security, regulatory, and reputational risks, including the potential for
More informationUniversity of Amsterdam at INEX 2010: Ad hoc and Book Tracks
University of Amsterdam at INEX 2010: Ad hoc and Book Tracks Jaap Kamps 1,2 and Marijn Koolen 1 1 Archives and Information Studies, Faculty of Humanities, University of Amsterdam 2 ISLA, Faculty of Science,
More informationOntology-based Architecture Documentation Approach
4 Ontology-based Architecture Documentation Approach In this chapter we investigate how an ontology can be used for retrieving AK from SA documentation (RQ2). We first give background information on the
More informationEmbarcadero PowerSQL 1.1 Evaluation Guide. Published: July 14, 2008
Embarcadero PowerSQL 1.1 Evaluation Guide Published: July 14, 2008 Contents INTRODUCTION TO POWERSQL... 3 Product Benefits... 3 Product Benefits... 3 Product Benefits... 3 ABOUT THIS EVALUATION GUIDE...
More informationUser Interface Design. Interface Design 4. User Interface Design. User Interface Design. User Interface Design. User Interface Design
Specification of a conversation between the user and the computer. Generally results in either input, output or both. An important part of systems and software development. An intuitive and easy to use
More informationAutoCAD 2009 User InterfaceChapter1:
AutoCAD 2009 User InterfaceChapter1: Chapter 1 The AutoCAD 2009 interface has been enhanced to make AutoCAD even easier to use, while making as much screen space available as possible. In this chapter,
More informationRiskSense Attack Surface Validation for IoT Systems
RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing
More informationLexisNexis CD. on Folio 4. User s Guide
LexisNexis CD on Folio 4 User s Guide LexisNexis and the Knowledge Burst logo are trademarks and Lexis, lexis.com and Shepard s are registered trademarks of Reed Elsevier Properties Inc., used under license.
More informationLearning Management System 2.0 User Information Guide
Learning Management System 2.0 User Information Guide Version 2.0.2 January 22, 2015 0 Contents General info... 2 User Log In... 2 Home Page... 2 Classes... 3 List View... 3 Calendar View... 5 Class Details...
More informationTool-Supported Cyber-Risk Assessment
Tool-Supported Cyber-Risk Assessment Security Assessment for Systems, Services and Infrastructures (SASSI'15) Bjørnar Solhaug (SINTEF ICT) Berlin, September 15, 2015 1 Me Bjørnar Solhaug Bjornar.Solhaug@sintef.no
More informationBlackboard Portfolio System Owner and Designer Reference
Blackboard Learning System Blackboard Portfolio System Owner and Designer Reference Application Pack 2 for Blackboard Learning System CE Enterprise License (Release 6) Application Pack 2 for Blackboard
More informationGarrison Technology HOW SECURE REMOTE BROWSING DELIVERS HIGH SECURITY EVEN FOR MAINSTREAM COMMERCIAL ORGANISATIONS
Garrison Technology HOW SECURE REMOTE BROWSING DELIVERS HIGH SECURITY EVEN FOR MAINSTREAM COMMERCIAL ORGANISATIONS The weak underbelly for most enterprises cybersecurity is the user endpoint. Laptops,
More informationOr. Engl. EUROPEAN COMMISSION FOR DEMOCRACY THROUGH LAW (VENICE COMMISSION) User s Guide
Strasbourg, 22 January 2019 CDL-JU(2019)005 Or. Engl. EUROPEAN COMMISSION FOR DEMOCRACY THROUGH LAW (VENICE COMMISSION) User s Guide CDL-JU(2019)005-2 - Contents I. Introduction... 3 II. CODICES Quick
More informationEnd User s Guide Release 5.0
[1]Oracle Application Express End User s Guide Release 5.0 E39146-04 August 2015 Oracle Application Express End User's Guide, Release 5.0 E39146-04 Copyright 2012, 2015, Oracle and/or its affiliates. All
More informationCurriculum Guide. Integrity 11
Curriculum Guide Integrity 11 Live Classroom Curriculum Guide Requirements Engineering with Integrity 11 Test Management with Integrity 11 Workflows and Documents with Integrity 11 Requirements Engineering
More informationSecureAssist Eclipse Plugin User Guide December 2015
SecureAssist Eclipse Plugin User Guide December 2015 Copyright 2015 by Codiscope, LLC. All rights reserved. No part or parts of this documentation may be reproduced, translated, stored in any electronic
More informationFeatures & Functionality
Features & Functionality Chris Oliver August 2008 Slides Created by... Nannette Naught, Product Development Manager Presentation Overview RDA Content features for: Reading, Finding, Printing, & Annotating
More informationCHECKPOINT CATALYST QUICK REFERENCE CARD
CHECKPOINT CATALYST QUICK REFERENCE CARD Logging in to Checkpoint 1. Launch your browser and enter the Checkpoint address in the browser location bar. http://checkpoint.thomsonreuters.com The Checkpoint
More informationPrototype Real-Time Monitor: Requirements
Technical Report CMU/SEI-87-TR-036 ESD-TR-87-199 Prototype Real-Time Monitor: Requirements Richard D Ippolito Kenneth Lee Charles Plinta Michael Rissman Roger Van Scoy November 1987 Technical Report CMU/SEI-87-TR-36
More informationThermo Scientific. GRAMS Envision. Version 2.1. User Guide
Thermo Scientific GRAMS Envision Version 2.1 User Guide 2013 Thermo Fisher Scientific Inc. All rights reserved. Thermo Fisher Scientific Inc. provides this document to its customers with a product purchase
More informationIOSR Journal of Computer Engineering (IOSRJCE) ISSN: Volume 3, Issue 3 (July-Aug. 2012), PP
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 3 (July-Aug. 2012), PP 50-55 Modeling Object Oriented Applications by Using Dynamic Information for the Iterative Recovery
More informationCreating and Maintaining Vocabularies
CHAPTER 7 This information is intended for the one or more business administrators, who are responsible for creating and maintaining the Pulse and Restricted Vocabularies. These topics describe the Pulse
More informationKnowledge Retrieval. Franz J. Kurfess. Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A.
Knowledge Retrieval Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Acknowledgements This lecture series has been sponsored by the European
More informationSAS/ACCESS Interface to R/3
9.1 SAS/ACCESS Interface to R/3 User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS/ACCESS 9.1 Interface to R/3: User s Guide. Cary, NC: SAS Institute
More informationStrategic Intelligence for R&D Contractors
Strategic Intelligence for R&D Contractors DTIC Services to Technology Companies Wendy Hill DTIC SBIR Program whill@dtic.mil 703.767.8225 800 DOD SBIR Richard Sparks Special Programs Branch rsparks@dtic.mil
More informationSEO According to Google
SEO According to Google An On-Page Optimization Presentation By Rachel Halfhill Lead Copywriter at CDI Agenda Overview Keywords Page Titles URLs Descriptions Heading Tags Anchor Text Alt Text Resources
More informationWPS Workbench. user guide. "To help guide you through using the WPS user interface (Workbench) to create, edit and run programs"
WPS Workbench user guide "To help guide you through using the WPS user interface (Workbench) to create, edit and run programs" Version: 3.1.7 Copyright 2002-2018 World Programming Limited www.worldprogramming.com
More informationNaCIN An Eclipse Plug-In for Program Navigation-based Concern Inference
NaCIN An Eclipse Plug-In for Program Navigation-based Concern Inference Imran Majid and Martin P. Robillard School of Computer Science McGill University Montreal, QC, Canada {imajid, martin} @cs.mcgill.ca
More informationAn Eclipse Plug-In for Generating Database Access Documentation in Java Code
An Eclipse Plug-In for Generating Database Access Documentation in Java Code Paul L. Bergstein and Aditya Gade Dept. of Computer and Information Science, University of Massachusetts Dartmouth, Dartmouth,
More informationGet Compliant with the New DFARS Cybersecurity Requirements
Get Compliant with the New DFARS 252.204-7012 Cybersecurity Requirements Reginald M. Jones ( Reggie ) Chair, Federal Government Contracts Practice Group rjones@foxrothschild.com; 202-461-3111 August 30,
More informationSEO Meta Descriptions: The What, Why, and How
Topics Alexa.com Home > SEO > SEO Meta Descriptions: The What, Why, and How ABOUT THE AUTHOR: JENNIFER YESBECK SEO Meta Descriptions: The What, Why, and How 7 minute read When it comes to using content
More informationMaramaEML: An Integrated Multi-View Business Process Modelling Environment with Tree-Overlays, Zoomable Interfaces and Code Generation
MaramaEML: An Integrated Multi-View Business Process Modelling Environment with Tree-Overlays, Zoomable Interfaces and Code Generation Lei Li 1, John Hosking 1 and John Grundy 1,2 1 Department of Computer
More informationPolicy Based Network Management System Design Document
Policy Based Network Management System Design Document J. Spagnolo, D. Cayer The scientific or technical validity of this Contract Report is entirely the responsibility of the contractor and the contents
More informationEnterprise Architect. User Guide Series. Portals
Enterprise Architect User Guide Series Portals What are Portals? In Sparx Systems Enterprise Architect, each Portal is a high-level logical grouping of common tools, custom searches, window layouts and
More informationINFORMATION RETRIEVAL SYSTEM: CONCEPT AND SCOPE
15 : CONCEPT AND SCOPE 15.1 INTRODUCTION Information is communicated or received knowledge concerning a particular fact or circumstance. Retrieval refers to searching through stored information to find
More informationGRAPHIC WEB DESIGNER PROGRAM
NH128 HTML Level 1 24 Total Hours COURSE TITLE: HTML Level 1 COURSE OVERVIEW: This course introduces web designers to the nuts and bolts of HTML (HyperText Markup Language), the programming language used
More informationInternet Database Service Version 6 QUICK REFERENCE CARD SEARCH HISTORY/ ALERTS Review Your Search History
Internet Database Service Version 6 QUICK REFERENCE CARD SEARCH HISTORY/ ALERTS Review Your Search History View the current searches you have just created. Mark strategies to be saved on a long-term basis.
More informationInformatica Enterprise Information Catalog
Data Sheet Informatica Enterprise Information Catalog Benefits Automatically catalog and classify all types of data across the enterprise using an AI-powered catalog Identify domains and entities with
More informationM o d e l d r i v e n M o d e r n i s a t i o n o f C o m p l e x S y s t e m s
MOMOCS M o d e l d r i v e n M o d e r n i s a t i o n o f C o m p l e x S y s t e m s D E L I V E R A B L E # D 5 1 B D A T A M O D E R N I Z A T I O N T O O L I M P L E M E N T A T I O N ( X S M K N
More informationMn/DOT Market Research Reporting General Guidelines for Qualitative and Quantitative Market Research Reports Revised: August 2, 2011
Mn/DOT Market Research Reporting General Guidelines for Qualitative and Quantitative Market Research Reports Revised: August 2, 2011 The following guidelines have been developed to help our vendors understand
More informationMOODLE MANUAL TABLE OF CONTENTS
1 MOODLE MANUAL TABLE OF CONTENTS Introduction to Moodle...1 Logging In... 2 Moodle Icons...6 Course Layout and Blocks...8 Changing Your Profile...10 Create new Course...12 Editing Your Course...15 Adding
More information<Insert Picture Here> JDeveloper Treasure Hunt
JDeveloper Treasure Hunt Shay Shmeltzer Principal Product Manager Oracle Fusion Middleware Agenda Did you know that in JDeveloper you can. Day to Day Work Afraid
More informationOvidSP. Think fast. Search faster. User Guide. Copyright Ovid Technologies All Rights Reserved 1
OvidSP Think fast. Search faster. User Guide Copyright Ovid Technologies All Rights Reserved 1 TABLE OF CONTENTS GET STARTED Browser Requirements...1 Access OvidSP...2 Select a Resource...4 CONDUCT A SEARCH
More informationFebruary 17 th, 2010
Ontology tiontology as a February 17 th, 2010 Margaret-Anne Storey University of Victoria Our goal: Provide cognitive support for ontology developers and users through visual and intelligent user interfaces
More informationAutomated, Real-Time Risk Analysis & Remediation
Automated, Real-Time Risk Analysis & Remediation TABLE OF CONTENTS 03 EXECUTIVE SUMMARY 04 VULNERABILITY SCANNERS ARE NOT ENOUGH 06 REAL-TIME CHANGE CONFIGURATION NOTIFICATIONS ARE KEY 07 FIREMON RISK
More informationFacet Folders: Flexible Filter Hierarchies with Faceted Metadata
Facet Folders: Flexible Filter Hierarchies with Faceted Metadata Markus Weiland Dresden University of Technology Multimedia Technology Group 01062 Dresden, Germany mweiland@acm.org Raimund Dachselt University
More informationMy Tracker. The Power of Intelligence. Accessing My Tracker Visit to access the homepage. 1. Profile History
1 My Tracker My Tracker is an exciting new procurement resource area populated with your contract information and containing a whole host of features to assist you with the tendering process. Accessing
More informationCourse No. S-3C-0001 Student Guide Lesson Topic 5.1 LESSON TOPIC 5.1. Control Measures for Classified Information
REFERENCES LESSON TOPIC 5.1 Control Measures for Classified Information SECNAV M-5510.36, Chapters 2, 7, 9 and 10 SECNAV M-5510.30, Chapter 3 LESSON A. Basic Policy (ISP 7-2) 1. Classified information
More informationTheHotMap.com: Enabling Flexible Interaction in Next-Generation Web Search Interfaces
TheHotMap.com: Enabling Flexible Interaction in Next-Generation Web Search Interfaces Orland Hoeber Department of Computer Science Memorial University of Newfoundland St. John s, NL, Canada A1B 3X5 hoeber@cs.mun.ca
More informationApparel Research Network Upgrade Special Measurement Electronic Order File Final Technical Report September 27, 2004
Apparel Research Network Upgrade Special Measurement Electronic Order File Final Technical Report September 27, 2004 DLA Contract # SP0103-02-D-0017 Delivery Order # 0002 Clemson University Clemson Apparel
More informationRepresenting Software Traceability using UML and XTM with an investigation into Traceability Patterns
Honours Project 2005 Representing Software Traceability using UML and XTM with an investigation into Traceability Patterns David Hollings University of Cape Town Dept. of Computer Science South Africa
More informationData publication and discovery with Globus
Data publication and discovery with Globus Questions and comments to outreach@globus.org The Globus data publication and discovery services make it easy for institutions and projects to establish collections,
More informationOracle SQL Developer Data Modeler Accessibility Guide. Release 18.1
Oracle SQL Developer Data Modeler Accessibility Guide Release 18.1 E94844-01 March 2018 Oracle SQL Developer Data Modeler Accessibility Guide, Release 18.1 E94844-01 Copyright 2017, 2018, Oracle and/or
More informationModelling Security in UML/OCL for C2IS
Modelling Security in UML/OCL for C2IS Robert Charpentier & Martin Salois R et D pour la défense Canada Defence R&D Canada Canada Plan Motivation & Objectives Software Certification Techniques Modelling
More informationWriting for the web and SEO. University of Manchester Humanities T4 Guides Writing for the web and SEO Page 1
Writing for the web and SEO University of Manchester Humanities T4 Guides Writing for the web and SEO Page 1 Writing for the web and SEO Writing for the web and SEO... 2 Writing for the web... 3 Change
More informationSmartView. User Guide - Analysis. Version 2.0
SmartView User Guide - Analysis Version 2.0 Table of Contents Page i Table of Contents Table Of Contents I Introduction 1 Dashboard Layouts 2 Dashboard Mode 2 Story Mode 3 Dashboard Controls 4 Dashboards
More informationOpen Research Online The Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs The Smart Book Recommender: An Ontology-Driven Application for Recommending Editorial Products
More informationSharepoint-Committee and Task Force Sites-For Saddleback College
Site Design The Committee site has been designed with the Microsoft Office Document Workspace Template. It is the customized model for a committee or task force. Other sites available will be Team sites.
More informationCABI Training Materials Forest Science Database User Guide. KNOWLEDGE FOR LIFEwww.cabi.org
CABI Training Materials Forest Science Database User Guide KNOWLEDGE FOR LIFEwww.cabi.org Contents Introduction... 3 Accessing the database... 4 By personal credentials:... 4 By IP Address:... 4 Troubleshooting...
More informationAre Your Mobile Apps Well Protected? Daniel Xiapu Luo Department of Computing The Hong Kong Polytechnic Unviersity
Are Your Mobile Apps Well Protected? Daniel Xiapu Luo csxluo@comp.polyu.edu.hk Department of Computing The Hong Kong Polytechnic Unviersity 1 What if your mobile app is reverse-engineered by others? Core
More informationAn Approach to Quality Achievement at the Architectural Level: AQUA
An Approach to Quality Achievement at the Level: AQUA Heeseok Choi 1, Keunhyuk Yeom 2, Youhee Choi 3, and Mikyeong Moon 2 1 NTIS Organization, Korea Institute of Science and Technology Information Eoeun-dong
More informationOracle SQL Developer Accessibility Guide. Release 18.1
Oracle SQL Developer Accessibility Guide Release 18.1 E94845-01 March 2018 Oracle SQL Developer Accessibility Guide, Release 18.1 E94845-01 Copyright 2017, 2018, Oracle and/or its affiliates. All rights
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW PAPER ON IMPLEMENTATION OF DOCUMENT ANNOTATION USING CONTENT AND QUERYING
More informationSingle Menus No other menus will follow necessitating additional user choices
57 UNIT-III STRUCTURES OF MENUS Single Menus No other menus will follow necessitating additional user choices Sequential Linear Menus Simultaneous Menus 58 Hierarchical Menus When many relationships exist
More informationMAS 90/200 Intelligence Tips and Tricks Booklet Vol. 1
MAS 90/200 Intelligence Tips and Tricks Booklet Vol. 1 1 Contents Accessing the Sage MAS Intelligence Reports... 3 Copying, Pasting and Renaming Reports... 4 To create a new report from an existing report...
More informationExpense: Process Reports
Expense: Process Reports User Guide for Standard Edition Applies to these SAP Concur solutions: Expense Professional/Premium edition Standard edition Travel Professional/Premium edition Standard edition
More informationJ2EE Application Development : Conversion and Beyond Osmond Ng
IBM Software Group J2EE Application Development : Conversion and Beyond Osmond Ng IBM Software Group Practitioner View Point IBM Rational Application Developer J2EE/EJB Tooling J2EE construction tools
More informationChapter 6: Information Retrieval and Web Search. An introduction
Chapter 6: Information Retrieval and Web Search An introduction Introduction n Text mining refers to data mining using text documents as data. n Most text mining tasks use Information Retrieval (IR) methods
More informationIntroduction to Ovid. As a Clinical Librarían tool! Masoud Mohammadi Golestan University of Medical Sciences
Introduction to Ovid As a Clinical Librarían tool! Masoud Mohammadi Golestan University of Medical Sciences Overview Ovid helps researchers, librarians, clinicians, and other healthcare professionals find
More informationIntegrated Software Environment. Part 2
Integrated Software Environment Part 2 Operating Systems An operating system is the most important software that runs on a computer. It manages the computer's memory, processes, and all of its software
More informationNETZONE CMS User Guide Copyright Tomahawk
NETZONE CMS User Guide Copyright 2015. Tomahawk 1 Phone: + 64 9 522 2333 Email: getintouch@tomahawk.co.nz Tomahawk 2015 www.tomahawk.co.nz 2 NETZONE CMS USER GUIDE WHAT YOU LL FIND INSIDE LOGGING IN 4
More information