Tesis.Pdf (3.478Mb)

Total Page:16

File Type:pdf, Size:1020Kb

Tesis.Pdf (3.478Mb) FACULTAD DE COMUNICACIÓN Departamento de Comunicación Intercambio no comercial de contenidos audiovisuales en Internet Tesis doctoral realizada por: Miguel Ángel Martínez Díaz Dirigida por: Dr. D. Ángel Pablo Cano Gómez Murcia, 15 de abril de 2015 AUTORIZACIÓN DEL DIRECTOR DE LA TESIS PARA SU PRESENTACIÓN El Dr. D. A. Pablo Cano Gómez, Director de la Tesis Doctoral titulada “Intercambio no comercial de contenidos audiovisuales en Internet”, realizada por D. Miguel Ángel Martínez Díaz, en el Departamento de Comunicación, autoriza su presentación a trámite dado que reúne las condiciones necesarias para su defensa. Lo que firmo, para dar cumplimiento a los Reales Decretos 99/2011, 1393/2007, 56/2005 y 778/98, en Murcia a 15 de abril de 2015. Dr. D. A. Pablo Cano Gómez "Navega, velero mío, sin temor, que ni enemigo navío, ni tormenta, ni bonanza, tu rumbo a torcer alcanza, ni a sujetar tu valor." José de Espronceda, 1840 AGRADECIMIENTOS A través de las siguientes líneas quisiera agradecer a todas aquellas personas que, en mayor o menor medida, me han ayudado en la ardua tarea de realizar esta investigación. En primer lugar, al Doctor D. Ángel Pablo Cano Gómez, director de esta tesis, por su orientación siempre inteligente que ha logrado aclarar el sombrío camino que muchas veces se le presenta a un investigador, su paciencia y amistad incondicional han sido un baluarte inquebrantable en este tránsito. A todos los integrantes del Área de Comunicación Audiovisual por su apoyo y ayuda desinteresada, en especial a la Doctora Dña. Josefina Sánchez Martínez y a la Doctora Dña. Isabel Sarabia Andúgar, vuestros consejos, siempre sensatos y acertados, han sido una guía imprescindible para la consecución de esta investigación. A mis padres, que siempre me han apoyado y ofrecido palabras de ánimo todos estos años. A mi mujer, Curra, y a mis hijas, Ana y Elena, sin su afecto y comprensión jamás hubiera podido concluir esta tarea; por saber respetar las inevitables ausencias que siempre conlleva la elaboración de una tesis doctoral. Ana, ¡ya he terminado el libro! ÍNDICE INTRODUCCIÓN ........................................................................................................................................ 17 OBJETO DE ESTUDIO .............................................................................................................................. 18 OBJETIVOS E HIPÓTESIS ......................................................................................................................... 19 ÁMBITO ................................................................................................................................................ 21 ESTRUCTURA ........................................................................................................................................ 21 CAPÍTULO I. DIGITALIZACIÓN COMO INNOVACIÓN DISRUPTIVA ...................................... 25 1.1 ESTUDIO DE LAS INNOVACIONES..................................................................................................... 27 1.1.1 Tipos de innovaciones tecnológicas.............................................................................. 28 1.1.2 Digitalización como ejemplo de innovación disruptiva ............................................ 30 1.2 CONVERGENCIA TECNOLÓGICA Y DIGITALIZACIÓN........................................................................ 31 1.2.1 Orígenes y causas de la convergencia tecnológica ..................................................... 32 1.2.2 Teoría en V de los medios audiovisuales ..................................................................... 34 1.2.2.1 Fase de convergencia .................................................................................................. 38 1.2.2.2 Fase de concentración ................................................................................................. 39 1.2.2.3 Fase de síntesis ........................................................................................................... 39 1.2.3 Desarrollo histórico de los medios audiovisuales ...................................................... 41 1.2.3.1 Proceso histórico de la rama electrónica ..................................................................... 41 1.2.3.2 Proceso histórico de la rama fotográfica ..................................................................... 55 10 MIGUEL ÁNGEL MARTÍNEZ DÍAZ 1.2.4 Espacios de convergencia .............................................................................................. 66 1.2.5 Televisión conectada como paradigma de la convergencia ...................................... 69 1.3 TEORÍA DE LA DIGITALIZACIÓN ...................................................................................................... 72 1.3.1 Tecnología analógica frente a la digital ........................................................................ 73 1.3.1.1 Ventajas de lo digital .................................................................................................. 74 1.3.1.2 Representación digital de la información ................................................................... 75 1.3.2 Proceso de digitalización de imágenes estáticas ......................................................... 76 1.3.2.1 Parámetros básicos de la imagen ................................................................................ 77 1.3.2.2 Fundamentos de la compresión de imágenes .............................................................. 78 1.3.2.3 Compresión de imágenes sin pérdidas ........................................................................ 81 1.3.2.4 Compresión de imágenes con pérdidas ....................................................................... 83 1.3.3 Proceso de digitalización de vídeo ............................................................................... 86 1.3.3.1 Parámetros básicos de vídeo digital ............................................................................ 86 1.3.3.2 Técnicas de compresión videográficas ........................................................................ 88 1.3.3.3 Principales codecs de vídeo ......................................................................................... 91 1.3.3.4 Formatos de vídeo digital ........................................................................................... 94 1.3.4 Proceso de digitalización de audio ............................................................................... 97 1.3.4.1 Estrategias de codificación de audio ........................................................................... 98 1.3.4.2 Principales codecs de audio ........................................................................................ 99 1.3.4.3 Formatos de audio digital ......................................................................................... 102 CAPÍTULO II. INTERNET COMO CONTEXTO DEL PROCESO DE INTERCAMBIO .............. 107 2.1 ORÍGENES DE INTERNET ................................................................................................................ 108 2.1.1 Definición de Internet ................................................................................................... 108 2.1.2 Inicios del proceso informático en red ....................................................................... 109 2.1.3 Creación de ARPANET ................................................................................................ 111 2.1.4 Primeras aplicaciones de correo electrónico .............................................................. 112 2.1.5 Nacimiento del protocolo TCP/IP ............................................................................... 113 2.1.6 Segmentación de ARPANET ....................................................................................... 114 2.1.7 Creación del Sistema de Nombres de Dominio (DNS) ............................................ 115 2.1.8 Orígenes alternativos de Internet................................................................................ 116 2.1.9 Nacimiento de una red global ..................................................................................... 118 ÍNDICE 11 2.1.10 Internet en el mundo .................................................................................................. 119 2.1.11 Internet en España ...................................................................................................... 120 2.2 ESTRUCTURA DE INTERNET ........................................................................................................... 123 2.2.1 Transmisión de datos ................................................................................................... 124 2.2.2 Redes............................................................................................................................... 125 2.2.2.1 Criterios de redes ...................................................................................................... 126 2.2.2.2 Aplicaciones de redes ................................................................................................ 127 2.2.2.3 Protocolos, estándares y organizaciones de estandarización. ................................... 129 2.2.3 Estructura de una red ................................................................................................... 131 2.2.3.1 Configuración de la línea ......................................................................................... 131 2.2.3.2 Topología .................................................................................................................
Recommended publications
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Software to Download from File Sharing Sites 10 Best File Sharing Software for Peer to Peer File Sharing
    software to download from file sharing sites 10 Best File Sharing Software for Peer to Peer File Sharing. Sharing files online isn’t that much easy as it should be, especially, if you have large files with size in GBs. Thankfully, we can use P2P (peer-to- peer) file sharing software to easily share files with anyone online of no matter what size. You can easily upload or download TBs of data without any restrictions. P2P file sharing software can be quite handy, but at the same time, they also have some negative points. These p2p file sharing software also host illegal downloads so that it may lead to any action against you. Furthermore, these peer to peer file sharing software are also known to spread viruses and malware; you will have to be careful about downloading too. Top 10 Best File Sharing Software for Peer to Peer File Sharing. There are dozens of P2P file sharing software to choose from, but it is essential to choose the best P2P file sharing software that is safe and features rich. To help you find the best file sharing software for your needs, we have compiled a list of best file sharing software. You can just select the one that seems right for your needs. 1. uTorrent. Even after being acquired by BitTorrent.inc and becoming closed-sourced with ads, uTorrent is still the leader when it comes to P2P file sharing software. Although you need to subscribe for a premium membership to take full advantage of the client, even its free version offers all the required features to upload and download files without limitations.
    [Show full text]
  • Free Linux Based Ftp Server
    Free linux based ftp server Graphical UI based FTP Servers; Terminal/Console based FTP Servers Linux, AIX, UNIX, IBM i, VMware, EC2, Azure, Mac OS, Free FTP server with ​Graphical · ​Console/terminal-based · ​Summary board. The same source code compiles and runs on Linux, OpenBSD, NetBSD, one- disk router), ROOT Linux, Gentoo Linux and almost every other free operating system. Pure-FTPd can act as private FTP server and disallow all anonymous. Learn How FTP Server Works, Setup Open Source vsftpd Server in Linux, On Debian based distros like Ubuntu, you can install it like this. Welcome to the home of CrossFTP Server, the free secure FTP server for Windows, Mac, Linux, and more. almost everything: OS X - +, WinXP - Win+, Linux, Solaris, BSD, Unix, etc! CrushFTP is a robust file transfer server that makes it easy to setup secure is web based allowing you the ability to manage and monitor the server from You can see things like the number of active connections, free drive space. Download the latest and greatest of Linux FTP Server Software here. glFTPd is a free FTP server software for Linux and UNIX based systems. It is highly. Is there any sort of made for Linux FTP server software that features a GUI? I am a total newbie and I am getting my butt kicked by VSFTPD. vsftpd is a GPL licensed FTP server for UNIX systems, including Linux. It is secure and extremely fast. It is stable. Don't take my word for it, though. Below, we will. A glance at the common Linux ftp servers.
    [Show full text]
  • 1 KONFIGURACE GLFTPD a PZS-NG 1.1 Zadání 1.2 Teoretický
    1 KONFIGURACE GLFTPD A PZS-NG 1.1 Zadání 1. Proveďte nastavení portů pro pasivní režim přenosu. 2. Proveďte vytvoření uživatele a nastavení jeho hodnot ratio, num_logins. 3. Proveďte zabezpečení GlFTPd pomocí SSL/TLS. 4. Nakonfigurujte PZS-NG pro ověřování kontrolních součtů a propojte jejsFTP démonem GlFTPd. 1.2 Teoretický úvod FTP (File Transfer Protocol) je aplikačním protokolem vrstvového modelu TCP/IP (Transmission Control Protocol/Internet Protocol). Využívá dvě TCP spojení trans- portní vrstvy označované jako řídící (kontrolní) a datové.[1, 2] Jedná se o textově orientovaný protokol pracující na principu klient-server, tzn. existuje server, kam jsou připojeni jednotliví klienti (například osobní počítače). Textové příkazy jsou posílány v paketech, které mohou být odchyceny a bez větších problémů přečteny. Nejedná se o nový protokol. FTP byl definován v RFC 114 (Request for Comments). Aktuální je definice v RFC 959[1], které vyšlo v říjnu roku 1985 a s použitím aktu- alizačních RFC je dnes stále využíváno převážně ke sdílení souborů.[1] 1.2.1 Aktivní režim Jedná se většinou o preferovaný režim přenosu, jelikož server nemusí otevírat porty a nemůže být přetížen mnoha žádostmi o data. Jak je zobrazeno na obr. 1.1. Přes řídící spojení je mezi klientem a serverem dohodnuto, na jaké IP adrese a portu budou data k dispozici (pomocí příkazu PORT). Spojení je navázáno ze serveru na sdělenou IP a port, kde se stáhne nebo nahraje soubor. Role serveru a klienta jsou tedy pro datové spojení vyměněny.[2] Tento režim však může být problematický při používání NAT (Network Address Translation) nebo firewallu, kdy je bráněno otevření portu na klientovi a následnému připojení serveru.[2] 1.2.2 Pasivní režim Problém NATu, který je způsoben nemožností připojení na klienta, a firewallu je vyřešen přenosem v pasivním režimu, kdy si klient se serverem nevymění role, ty zůstanou zachovány.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Servicios De Red E Internet
    SERVICIOS DE RED E INTERNET Autor: Miguel Ángel García Felipe IES GREGORIO PRIETO Servicios de Transferencia de Ficheros SERVICIOS DE RED E INTERNET SERVICIOS DE TRANSFERENCIA DE FICHEROS ÍNDICE 1. Funcionalidad del servicio de transferencia de archivos. - Características. Componentes y funcionamiento. - Protocolo FTP. - Tipos de usuarios y accesos al servicio: Acceso anónimo y acceso autorizado. - Configuración del servicio de transferencia de archivos. Permisos y cuotas. - Conexiones y modos: Conexión de control y conexión de datos. Modos activo y pasivo. - Tipos de transferencia de archivos: ASCII y Binario. - Clientes FTP: en línea de comandos, entornos “gráficos” y navegadores / exploradores. - Monitorización y registro del servicio de transferencia de archivos. - Seguridad en FTP. - FTPS (FTP/SSL): FTPS Implícito. FTPS Explícito (FTPES) - Protocolo FXP (File eXchange Protocol). 2. Servicio TFTP (Trivial File Transfer Protocol). 3. Servicios SFTP/SCP. 4. Transferencia o distribución de archivos entre iguales (peer-to-peer). - Características. Protocolos. Software. Configuración. 2 SERVICIOS DE RED E SERVICIOS DE TRANSFERENCIA DE FICHEROS INTERNET 1. Funcionalidad del servicio de transferencia de archivos. - Características. Componentes y funcionamiento. Es una utilidad que permite la copia de un archivo desde un ordenador a otro a través de una red de computadoras. El servicio más usado para realizar este movimiento es el FTP (File Transfer Protocol), el cual consiste en un programa FTP alojado en un servidor -llamado FTP daemon- el cual se encarga de gestionar las transacciones que solicita el cliente. Los movimientos que podemos realizar a la hora de transferir archivos de un equipo a otro son: "download" (bajada de archivos de Internet), "upload" (subida de archivos a Internet), o intercambio de objetos entre dos o más usuarios.
    [Show full text]
  • A Tool for Internet Chatroom Surveillance
    A Tool for Internet Chatroom Surveillance Ahmet C¸amtepe, Mukkai S. Krishnamoorthy, and B¨ulent Yener ? Department of Computer Science, RPI, Troy, NY 12180, USA. {camtes, moorthy, yener}@cs.rpi.edu Abstract. Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This work presents a fully automated surveillance system for data collection and analysis in Internet chatrooms. The system has two components: First, it has an eavesdropping tool which collects statistics on individual (chatter) and chatroom behavior. This data can be used to profile a chatroom and its chatters. Second, it has a computational discovery algorithm based on Singular Value Decomposition (SVD) to locate hidden communities and communication patterns within a chatroom. The eavesdropping tool is used for fine tuning the SVD-based discovery algorithm which can be deployed in real-time and requires no semantic information processing. The evaluation of the system on real data shows that (i) statistical prop- erties of different chatrooms vary significantly, thus profiling is possible, (ii) SVD-based algorithm has up to 70-80% accuracy to discover groups of chatters. 1 Introduction and Background Internet chatrooms provide for an interactive and public forum of communica- tion for participants with diverse objectives. Two properties of chatrooms make them particularly vulnerable for exploitation by malicious parties. First, the real identity of participants are decoupled from their chatroom nicknames. Second, multiple threads of communication can co-exists concurrently. Although human- monitoring of each chatroom to determine who-is-chatting-with-whom is possible, it is very time consuming hence not scalable.
    [Show full text]
  • Coopviz: Real Time Visualization of Bittorrent Swarm Dynamics
    CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics Stefano Barbieri CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics Master’s Thesis in Computer Engineering Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Stefano Barbieri 3rd September 2009 Author Stefano Barbieri 1397052 [email protected] Title CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics MSc presentation September 09, 2009 Graduation Committee dr. ir. D.H.J. Epema (chair) Faculty EEMCS, Delft University of Technology dr. ir. J. Pouwelse (University Supervisor) Faculty EEMCS, Delft University of Technology dr. ir. G. Gaydadjiev (Committee Member:) Faculty EEMCS, Delft University of Technology Abstract Peer to peer networks are only successful when a significant amount of users is willing to share their resources. In order to have highly efficient file sharing sys- tems, each user should upload to the other peers a number of bytes at least equal to the number of bytes he has downloaded from the community. Unfortunately many users show a selfish behavior, refusing to offer their upload bandwidth to other peers, thus limiting the efficiency of the networks. P2P clients implement different mechanisms in order to mitigate this misbehavior and improve cooperation; often, though, these policies are not enough to enforce altruism in peer-to-peer communi- ties. This thesis explores a new mean to stimulate users to give their fair contribu- tion to the P2P community; the final scope is to generate an emergent self-policing system where users take active part in determining the bandwidth allocation poli- cies. This is achieved by means of a graphical interface, CoopViz, that provides users with up-to-date insights into cooperative behavior of peers and allows the latter to vote on each other, showing their appreciation or disapproval.
    [Show full text]
  • Protection and Restriction to the Internet
    Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • Covert Channels Within IRC Wayne C
    Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 3-11-2011 Covert Channels Within IRC Wayne C. Henry Follow this and additional works at: https://scholar.afit.edu/etd Part of the Computer and Systems Architecture Commons, and the Digital Communications and Networking Commons Recommended Citation Henry, Wayne C., "Covert Channels Within IRC" (2011). Theses and Dissertations. 1394. https://scholar.afit.edu/etd/1394 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. 88th ABW PUBLIC AFFAIRS SECURITY AND POLICY REVIEW WORKSHEET NOTE: Public release clearance is NOT required for material presented in a closed meeting and which will not be made available to the general public, on the Internet, in print or electronic media. I~;; ;~e;;~~~J JI. 1. SUBMITTER NAME OFFICE SYMBOL IPHONE 2. DATE SUBMITIED [email protected] AFITIENG 53636 3. AUTHOR(S) NAME ORGANIZATION PHONE Wayne C. Henry 53636 4. DOCUMENT TITLE 6. CONFERENCE/EVENT/PUBLICATION NAME 7. DATE NEEDED Covert Channels Within IRC N/A 5. DOCUMENT TYPE N/A D ABSTRACT D TECH REPORT D JOURNAL ARTICLE D VIDEO 8. EVENT lOCATION 9. EVENT DATE D SPEECH D TECH PAPER D BRIEFING CHARTS D PHOTO N/A ~ THESISIDISSERTATION D OTHER N/A 10. RELATED CASES PREVIOUSLY APPROVED 11. OTHER AGENCY COORDINATION REQUIRED 12. OTHER INFORMATION (List contact information) 13. NATIONAL SECURITY STATUTESITECHNOLOGY ISSUES 14.
    [Show full text]
  • AEG: Automatic Exploit Generation
    AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA fthanassis, sangkilc, brentlim, [email protected] Abstract two zero-day exploits for previously unknown vulnera- bilities. The automatic exploit generation challenge is given Our automatic exploit generation techniques have a program, automatically find vulnerabilities and gener- several immediate security implications. First, practical ate exploits for them. In this paper we present AEG, the AEG fundamentally changes the perceived capabilities first end-to-end system for fully automatic exploit gener- of attackers. For example, previously it has been be- ation. We used AEG to analyze 14 open-source projects lieved that it is relatively difficult for untrained attackers and successfully generated 16 control flow hijacking ex- to find novel vulnerabilities and create zero-day exploits. ploits. Two of the generated exploits (expect-5.43 and Our research shows this assumption is unfounded. Un- htget-0.93) are zero-day exploits against unknown vul- derstanding the capabilities of attackers informs what nerabilities. Our contributions are: 1) we show how defenses are appropriate. Second, practical AEG has ap- exploit generation for control flow hijack attacks can be plications to defense. For example, automated signature modeled as a formal verification problem, 2) we pro- generation algorithms take as input a set of exploits, and pose preconditioned symbolic execution, a novel tech- output an IDS signature (aka an input filter) that recog- nique for targeting symbolic execution, 3) we present a nizes subsequent exploits and exploit variants [3,8,9]. general approach for generating working exploits once Automated exploit generation can be fed into signature a bug is found, and 4) we build the first end-to-end sys- generation algorithms by defenders without requiring tem that automatically finds vulnerabilities and gener- real-life attacks.
    [Show full text]