Operational Profiling of OS Drivers

Total Page:16

File Type:pdf, Size:1020Kb

Operational Profiling of OS Drivers Operational Profiling of OS Drivers Vom Fachbereich Informatik der Technischen Universit¨atDarmstadt genehmigte Dissertation zur Erlangung des akademischen Grades eines Doktor-Ingenieur (Dr.-Ing.) vorgelegt von Constantin S^arbu aus Bukarest, Rum¨anien Referenten: Prof. Neeraj Suri, Ph.D. Prof. Christof Fetzer, Ph.D. Datum der Einreichung: 06. M¨arz2009 Datum der m¨undlichen Pr¨ufung:25. Mai 2009 Darmstadt 2009 D17 ii Summary Operating Systems (OS's) constitute the operational core for computing de- vices. In order to facilitate their applicability to a variety of hardware platforms, OS's have evolved into complex componentized software entities whose key func- tion is to provide applications access to the system resources. Fundamentally, the provided system services inherently depend on the stability of the underlying OS. Within the OS, the key components that dominate the cause of OS failures are the device drivers (DDs), precisely the OS parts designed to enhance the OS's sup- port for hardware. Despite intensive efforts to elevate the DDs' robustness level by employing varied test paradigms, the existing testing approaches still exhibit very high failure rates. Hence, the central premise behind this thesis involves the char- acterization of the DD's operational profile, and using it for focusing subsequent testing to the functionality areas likely to be exercised over the DD deployment. This thesis develops two novel and distinct methodologies to capture and an- alyze the operational profile of DDs. The first { termed as the operational profile (OP) { is based on the characterization of the I/O traffic between a selected DD and the rest of the OS kernel. The second { termed execution path profile (EPP) { observes the functional calls made by the respective DD in the operational phase, thus revealing the code paths followed at runtime. Both presented approaches are directly applicable to DD binaries as they do not require source-code level access to any of the involved OS components. This thesis develops the concepts and methodology for effectively profiling the operational behavior of DDs. First, a state model is introduced for describing a DD and its complete state space. Experimentally, we show that the DD's oper- ational state space (OSS) { the subset of states visited at runtime { represents a only small fraction of the total state space, thus highlighting the areas to be tested. Subsequently, occurrence- and duration-based quantifiers are defined for each of the DD states belonging to the OSS. This enables test prioritization and workload comparisons which are the key factors for testing. This conceptual process's ef- fectiveness is tested using extensive case studies including over fifty Windows XP and Vista DDs. The developed EPP is complementary to the OP as it discovers execution hotspots as frequently traversed DD code paths. To highlight the execution hotspots, a DD monitoring and code path analysis methodology is presented and tested using actual Windows DD's. Code paths are identified as call sequences to kernel functions implemented externally to the selected DD. String similarity metrics are used to compute the relative similarity among the inferred code paths. Based on likeness, the code paths are grouped into equivalence classes helping identify execution hotspots. These hotspots constitute primary targets for testing. Overall the thesis develops novel profiling approaches for testing generalized OS's. The research is also validated on actual Windows XP and Vista OSs. iii iv Kurzfassung Betriebssysteme (BS) bilden den operativen Kern eines jeden Computers. F¨ur eine einfache Anwendbarkeit auf verschiedenen Hardware-Plattformen haben sich BS zu komplexen, aus Komponenten bestehenden Software-Einheiten entwickelt, deren Hauptaufgabe darin besteht Anwendungen Zugriff auf Systemressourcen zu erm¨oglichen. Grunds¨atzlich h¨angendie bereitgestellten Systemdienste inh¨arent von der Stabilit¨atdes unterliegenden BSs ab. Die Komponenten, die innerhalb eines BSs die dominierenden Verursacher von Ausf¨allendes BSs sind, sind die Ger¨atetreiber, genauer gesagt die Teile des BSs, die entwickelt wurden um die Hardware-Unterst¨utzungdes BSs zu verbessern. Trotz intensiver Anstrengun- gen das Robustheitsniveau von Ger¨atetreibern durch Anwendung verschiedener Testparadigmen zu heben, zeigen existierende Testmethoden nach wie vor ¨außerst hohe Fehlerraten. Die Charakterisierung des operativen Profils von Ger¨atetreibern und dessen Anwendung w¨ahrend der Entwicklung von Ger¨atetreibern zum ziel- gerichteten Testen von mit hoher Wahrscheinlichkeit aufgerufenen Funktionen bildet den Kernbeitrag der vorliegenden Arbeit. Die vorliegende Arbeit beschreibt zwei neue Methoden um ein operatives Profil von Ger¨atetreibern zu erstellen und zu analysieren. Die erste Methode | opera- tional profile (OP) genannt | basiert auf der Charakterisierung der Ein-/Ausgabe- Kommunikation zwischen einem ausgew¨ahltenGer¨atetreiber und dem Rest des BS- Kerns. Die zweite Methode | execution path profile (EPP) genannt | verfolgt die vom entsprechenden Ger¨atetreiber w¨ahrendder Betriebsphase gemachten Funk- tionsaufrufe, wobei die zur Laufzeit durchschrittenen Pfade im Code aufgezeigt werden. Beide vorgestellten Ans¨atzek¨onnendirekt auf die ausf¨uhrbarenDateien von Ger¨atetreibern angewendet werden, weil kein Zugriff auf den Quellcode einer beteiligten BS-Komponente ben¨otigtwird. Die vorliegende Arbeit pr¨asentiert Konzepte und Methoden zur effektiven Pro- filierung des operativen Verhaltens von Ger¨atetreibern. Zun¨achst wird ein Zu- standsmodell eingef¨uhrt um einen Ger¨atetreiber und den kompletten Zustand- sraum zu beschreiben. Wir zeigen mit Hilfe von Experimenten, dass der opera- tive Zustandsraum (die Teilmenge von Zust¨anden,die zur Laufzeit besucht wer- den) eines Ger¨atetreibers nur einen kleinen Anteil des gesamten Zustandsraums ausmacht und somit die Gebiete im Zustandsraum hervorhebt, die vornehmlich durch Tests abgedeckt werden m¨ussen. Anschließend werden f¨urjeden Zustand des Ger¨atetreibers Quantifizierer, basierend auf dem (zeitlichen) Auftreten des Zustandes, definiert. Dies erm¨oglicht Priorisierung von Tests und den Vergle- ich von Arbeitslasten, welche die Schl¨usselfaktorenf¨urgenaues und angemessenes Testen sind. Die generelle Effektivit¨at des gesamten Prozesses wird anhand von ausf¨uhrlichen Fallstudien, die mehr als f¨unfzig Windows XP und Vista Ger¨atetreiber umfassen, erprobt. Das EPP, welches ebenso in dieser Arbeit vorgestellt wird, ist komplement¨ar zum OP weil es Ausf¨uhrungs-Hotspots in Form von h¨aufig durchschrittenen Pfaden im Code auffindet. Um solche Ausf¨uhrungs-Hotspots hervorzuheben wird v eine Methode zum Monitoring von Ger¨atetreibern und zur Code-Pfad-Analyse pr¨asentiert und an echten Windows-Ger¨atetreibern getestet. Code-Pfade werden als Sequenzen von BS-Kern-Funktionsaufrufen charakterisiert, die außerhalb des gew¨ahltenGer¨atetreibers implementiert sind. String-Ahnlichkeitsmetriken¨ werden herangezogen um die relative Ahnlichkeit¨ zwischen den abgeleiteten Code-Pfaden zu bestimmen. Die Code-Pfade werden, basierend auf Wahrscheinlichkeiten, in Aquivalenzklassen¨ unterteilt um das Identifizieren von Ausf¨uhrungs-Hotspots zu erleichtern. Solche Hotspots bilden prim¨areZiele f¨urdas Testen. Zusammenfassend entwickelt die vorliegende Arbeit neue Profilierungsans¨atze zum Testen allgemeiner BS. Die Forschungsarbeit wird an den realen Betriebssys- temen Windows XP und Windows Vista validiert. vi Acknowledgements Almost six years have passed since I started the work that eventually crystallized into this PhD thesis. Looking back from today's perspective, I must admit that there was a lot of hard work but fun was always present. It was hard as I had to learn how to do research, how to present my work and how to be critical with other people's work when it came to writing conference reviews. It has been fun when socializing with the members of our group or celebrating birthdays over home-made, international-flavor dishes or cakes. There are many people that helped me to whom I am very thankful. First I'd like to thank my advisor for teaching me everything I know about doing research. From him I learned that there is always a higher gear, but also that research can be (sometimes) fun. Thanks, Neeraj ! Then, I am very thankful to all past and present DEEDS group's members for helping me, listening to my boring presentations and giving me feedback on early drafts of my papers. Hoping not to forget anyone of the past and present guys, many thanks to Andr´eas,Adina, Robert, Ripon, Brahim, Peter, Dan, Marco, Faisal, Matthias, Majid, Azad, Piotr and Vinay. Also, special thanks go to Birgit, Sabine and Ute for helping me with various paperwork, for correcting and improving my German and all other circumstances related to living in Germany. A great many thanks also to Prof. Christof Fetzer for accepting to be my co-advisor. I'd also like to thank my parents and brother for their continual support and love which spanned the geographical distance separating us in all these years. Thank you, Mama, Tata and Mai! I saved the best for the last: Thank you Adina for all the understanding, love and support that you always found for me all these years! Thank you Daniel for making everything so easy for me! vii viii Contents List of Figures xiii List of Tables xv 1 Introduction and Problem Context1 1.1 Operational Profiling: A Testing Prerequisite..........3 1.1.1 OS Complexity { Between Necessity and Burden....3 1.1.2 Faulty Drivers Despite Testing?.............6
Recommended publications
  • Autogr: Automated Geo-Replication with Fast System Performance and Preserved Application Semantics
    AutoGR: Automated Geo-Replication with Fast System Performance and Preserved Application Semantics Jiawei Wang1, Cheng Li1,4, Kai Ma1, Jingze Huo1, Feng Yan2, Xinyu Feng3, Yinlong Xu1,4 1University of Science and Technology of China 2University of Nevada, Reno 3State Key Laboratory for Novel Software Technology, Nanjing University 4Anhui Province Key Laboratory of High Performance Computing [email protected],{chengli7,ylxu}@ustc.edu.cn,{ksqsf,jzfire}@mail.ustc.edu.cn,[email protected],[email protected] ABSTRACT static runtime Geo-replication is essential for providing low latency response AP AP and quality Internet services. However, designing fast and correct Analyzer Code App ( Rigi ) geo-replicated services is challenging due to the complex trade-off US EU US EU between performance and consistency semantics in optimizing the expensive cross-site coordination. State-of-the-art solutions rely Restrictions on programmers to derive sufficient application-specific invariants Cross-site Causally Consistent Schema Coordination and code specifications, which is both time-consuming and error- Database Service Geo-Replicated Store prone. In this paper, we propose an end-to-end geo-replication APP Servers deployment framework AutoGR (AUTOmated Geo-Replication) to free programmers from such label-intensive tasks. AutoGR en- Figure 1: An overview of the proposed end-to-end AutoGR ables the geo-replication features for non-replicated, serializable solution. AP, US, and EU stand for data centers in Singapore, applications in an automated way with optimized performance and Oregon, and Frankfurt, respectively. The runtime library is correct application semantics. Driven by a novel static analyzer Rigi, co-located with Server, omitted from the graph.
    [Show full text]
  • Visual Studio Team Test Quick Reference a Quick Reference for Users of the Team Testing Features of Visual Studio Team System
    MICROSOFT Visual Studio Team Test Quick Reference A quick reference for users of the Team Testing features of Visual Studio Team System Geoff Gray and the Microsoft VSTS Rangers team 3/30/2009 VSTS Rangers This content was originally created by Geoff Gray for internal Microsoft use and then adopted and expanded as a Visual Studio Team System (“VSTS”) Rangers project. “Our mission is to accelerate the adoption of Team System by delivering out of band solutions for missing features or guidance. We work closely with members of Microsoft Services to make sure that our solutions address real world blockers.” -- Bijan Javidi, VSTS Rangers Lead Copyright 2009 Microsoft Corporation Page | 1 Summary This document is a collection of items from public blog sites, Microsoft® internal discussion aliases (sanitized) and experiences from various Test Consultants in the Microsoft Services Labs. The idea is to provide quick reference points around various aspects of Microsoft Visual Studio® Team Test edition that may not be covered in core documentation, or may not be easily understood. The different types of information cover: How does this feature work under the covers? How can I implement a workaround for this missing feature? This is a known bug and here is a fix or workaround. How do I troubleshoot issues I am having? The document contains two Tables of Contents (high level overview, and list of every topic covered) as well as an index. The current plan is to update the document on a regular basis as new information is found. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.
    [Show full text]
  • Microsoft Patches Were Evaluated up to and Including CVE-2020-1587
    Honeywell Commercial Security 2700 Blankenbaker Pkwy, Suite 150 Louisville, KY 40299 Phone: 1-502-297-5700 Phone: 1-800-323-4576 Fax: 1-502-666-7021 https://www.security.honeywell.com The purpose of this document is to identify the patches that have been delivered by Microsoft® which have been tested against Pro-Watch. All the below listed patches have been tested against the current shipping version of Pro-Watch with no adverse effects being observed. Microsoft Patches were evaluated up to and including CVE-2020-1587. Patches not listed below are not applicable to a Pro-Watch system. 2020 – Microsoft® Patches Tested with Pro-Watch CVE-2020-1587 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2020-1584 Windows dnsrslvr.dll Elevation of Privilege Vulnerability CVE-2020-1579 Windows Function Discovery SSDP Provider Elevation of Privilege Vulnerability CVE-2020-1578 Windows Kernel Information Disclosure Vulnerability CVE-2020-1577 DirectWrite Information Disclosure Vulnerability CVE-2020-1570 Scripting Engine Memory Corruption Vulnerability CVE-2020-1569 Microsoft Edge Memory Corruption Vulnerability CVE-2020-1568 Microsoft Edge PDF Remote Code Execution Vulnerability CVE-2020-1567 MSHTML Engine Remote Code Execution Vulnerability CVE-2020-1566 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-1565 Windows Elevation of Privilege Vulnerability CVE-2020-1564 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1562 Microsoft Graphics Components Remote Code Execution Vulnerability
    [Show full text]
  • Functional SMT Solving: a New Interface for Programmers
    Functional SMT solving: A new interface for programmers A thesis submitted in Partial Fulfillment of the Requirements for the Degree of Master of Technology by Siddharth Agarwal to the DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING INDIAN INSTITUTE OF TECHNOLOGY KANPUR June, 2012 v ABSTRACT Name of student: Siddharth Agarwal Roll no: Y7027429 Degree for which submitted: Master of Technology Department: Computer Science & Engineering Thesis title: Functional SMT solving: A new interface for programmers Name of Thesis Supervisor: Prof Amey Karkare Month and year of thesis submission: June, 2012 Satisfiability Modulo Theories (SMT) solvers are powerful tools that can quickly solve complex constraints involving booleans, integers, first-order logic predicates, lists, and other data types. They have a vast number of potential applications, from constraint solving to program analysis and verification. However, they are so complex to use that their power is inaccessible to all but experts in the field. We present an attempt to make using SMT solvers simpler by integrating the Z3 solver into a host language, Racket. Our system defines a programmer’s interface in Racket that makes it easy to harness the power of Z3 to discover solutions to logical constraints. The interface, although in Racket, retains the structure and brevity of the SMT-LIB format. We demonstrate this using a range of examples, from simple constraint solving to verifying recursive functions, all in a few lines of code. To my grandfather Acknowledgements This project would have never have even been started had it not been for my thesis advisor Dr Amey Karkare’s help and guidance. Right from the time we were looking for ideas to when we finally had a concrete proposal in hand, his support has been invaluable.
    [Show full text]
  • Download Full CV (PDF)
    Full name : Lars Bjergner Mikkelsen. Practical experience: Company name: LARSMIKKELSEN.COM Aps Street & number: Husoddebakken 26 City: Horsens Zip code: 8700 Country: Denmark. Web address: http://www.larsmikkelsen.com Start date of employment: 27-July-2007. End date of employment: Not ended Job title: Owner at LARSMIKKELSEN.COM Aps. Job description: Freelance specialist Microsoft Dynamics Ax and .NET. Technical solution architect Dynamics Ax projects. Development in x++ and C#. Integration specialist between Dynamics Ax and .NET on several projects. SharePoint Enterprise Portal solutions on Dynmaics Ax 4.0 and ASP.NET based Dynamics Ax 2009 solution. Invented, designed and developed Advanced Ax Batch. Advanced Ax Batch is a Dynamics Ax and .NET based scheduler which are used by several companies for batch execution in Dynamcis Ax. Performance optimization Dynamics Ax solutions. Specialized knowledge: Highly experienced with performance optimization and trouble shooting of Dynamics Ax installations. Technologies mastered: Programming Languages (X++, C#) Programming Libraries (Axapta, .NET Framework) Component Technology (Axapta, .NET , COM, COM+, Active X) Databases (SQL server) Markup Languages (HTML, XML) Internet (SharePoint Enterprise Portal) Development tools (Axapta, Visual studio .NET) Protocols (HTTP, SOAP, TCP/IP) 1 Company name: Columbus IT Street & number: 3151 Airway, Building N-1 City: Costa Mesa, CA Zip code: 8240 Country: USA. Web address: http://www.columbusit.com Start date of employment: 23-May-2005. End date of employment: 27-July-2007. Job title: Technology / integration manager and solution architect. Job description: Responsible for technology and integration strategies. Technical solution architect on major Dynamics Ax projects. Development in x++ and C#. Technical responsible for worldwide mobility platform.
    [Show full text]
  • Approximations and Abstractions for Reasoning About Machine Arithmetic
    IT Licentiate theses 2016-010 Approximations and Abstractions for Reasoning about Machine Arithmetic ALEKSANDAR ZELJIC´ UPPSALA UNIVERSITY Department of Information Technology Approximations and Abstractions for Reasoning about Machine Arithmetic Aleksandar Zeljic´ [email protected] October 2016 Division of Computer Systems Department of Information Technology Uppsala University Box 337 SE-751 05 Uppsala Sweden http://www.it.uu.se/ Dissertation for the degree of Licentiate of Philosophy in Computer Science c Aleksandar Zeljic´ 2016 ISSN 1404-5117 Printed by the Department of Information Technology, Uppsala University, Sweden Abstract Safety-critical systems rely on various forms of machine arithmetic to perform their tasks: integer arithmetic, fixed-point arithmetic or floating-point arithmetic. Machine arithmetic can exhibit subtle dif- ferences in behavior compared to the ideal mathematical arithmetic, due to fixed-size of representation in memory. Failure of safety-critical systems is unacceptable, because it can cost lives or huge amounts of money, time and e↵ort. To prevent such incidents, we want to form- ally prove that systems satisfy certain safety properties, or otherwise discover cases when the properties are violated. However, for this we need to be able to formally reason about machine arithmetic. The main problem with existing approaches is their inability to scale well with the increasing complexity of systems and their properties. In this thesis, we explore two alternatives to bit-blasting, the core procedure lying behind many common approaches to reasoning about machine arithmetic. In the first approach, we present a general approximation framework which we apply to solve constraints over floating-point arithmetic. It is built on top of an existing decision procedure, e.g., bit-blasting.
    [Show full text]
  • Automated Theorem Proving
    CS 520 Theory and Practice of Software Engineering Spring 2021 Automated theorem proving April 22, 2020 Upcoming assignments • Week 12 Par4cipaon Ques4onnaire will be about Automated Theorem Proving • Final project deliverables are due Tuesday May 11, 11:59 PM (just before midnight) Programs are known to be error-prone • Capture complex aspects such as: • Threads and synchronizaon (e.g., Java locks) • Dynamically heap allocated structured data types (e.g., Java classes) • Dynamically stack allocated procedures (e.g., Java methods) • Non-determinism (e.g., Java HashSet) • Many input/output pairs • Challenging to reason about all possible behaviors of these programs Programs are known to be error-prone • Capture complex aspects such as: • Threads and synchronizaon (e.g., Java locks) • Dynamically heap allocated structured data types (e.g., Java classes) • Dynamically stack allocated procedures (e.g., Java methods) • Non-determinism (e.g., Java HashSet) • Many input/output pairs • Challenging to reason about all possible behaviors of these programs Overview of theorem provers Key idea: Constraint sa4sfac4on problem Take as input: • a program modeled in first-order logic (i.e. a set of boolean formulae) • a queson about that program also modeled in first-order logic (i.e. addi4onal boolean formulae) Overview of theorem provers Use formal reasoning (e.g., decision procedures) to produce as output one of the following: • sasfiable: For some input/output pairs (i.e. variable assignments), the program does sasfy the queson • unsasfiable: For all
    [Show full text]
  • Microsoft SQL Server Analysis Services Multidimensional Performance and Operations Guide Thomas Kejser and Denny Lee
    Microsoft SQL Server Analysis Services Multidimensional Performance and Operations Guide Thomas Kejser and Denny Lee Contributors and Technical Reviewers: Peter Adshead (UBS), T.K. Anand, KaganArca, Andrew Calvett (UBS), Brad Daniels, John Desch, Marius Dumitru, WillfriedFärber (Trivadis), Alberto Ferrari (SQLBI), Marcel Franke (pmOne), Greg Galloway (Artis Consulting), Darren Gosbell (James & Monroe), DaeSeong Han, Siva Harinath, Thomas Ivarsson (Sigma AB), Alejandro Leguizamo (SolidQ), Alexei Khalyako, Edward Melomed, AkshaiMirchandani, Sanjay Nayyar (IM Group), TomislavPiasevoli, Carl Rabeler (SolidQ), Marco Russo (SQLBI), Ashvini Sharma, Didier Simon, John Sirmon, Richard Tkachuk, Andrea Uggetti, Elizabeth Vitt, Mike Vovchik, Christopher Webb (Crossjoin Consulting), SedatYogurtcuoglu, Anne Zorner Summary: Download this book to learn about Analysis Services Multidimensional performance tuning from an operational and development perspective. This book consolidates the previously published SQL Server 2008 R2 Analysis Services Operations Guide and SQL Server 2008 R2 Analysis Services Performance Guide into a single publication that you can view on portable devices. Category: Guide Applies to: SQL Server 2005, SQL Server 2008, SQL Server 2008 R2, SQL Server 2012 Source: White paper (link to source content, link to source content) E-book publication date: May 2012 200 pages This page intentionally left blank Copyright © 2012 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners.
    [Show full text]
  • Windows Poster 20-12-2013 V3
    Microsoft® Discover the Open Specifications technical documents you need for your interoperability solutions. To obtain these technical documents, go to the Open Specifications Interactive Tiles: open specifications poster © 2012-2014 Microsoft Corporation. All rights reserved. http://msdn.microsoft.com/openspecifications/jj128107 Component Object Model (COM+) Technical Documentation Technical Documentation Presentation Layer Services Technical Documentation Component Object Model Plus (COM+) Event System Protocol Active Directory Protocols Overview Open Data Protocol (OData) Transport Layer Security (TLS) Profile Windows System Overview Component Object Model Plus (COM+) Protocol Active Directory Lightweight Directory Services Schema WCF-Based Encrypted Server Administration and Notification Protocol Session Layer Services Windows Protocols Overview Component Object Model Plus (COM+) Queued Components Protocol Active Directory Schema Attributes A-L Distributed Component Object Model (DCOM) Remote Protocol Windows Overview Application Component Object Model Plus (COM+) Remote Administration Protocol Directory Active Directory Schema Attributes M General HomeGroup Protocol Supplemental Shared Abstract Data Model Elements Component Object Model Plus (COM+) Tracker Service Protocol Active Directory Schema Attributes N-Z Peer Name Resolution Protocol (PNRP) Version 4.0 Windows Data Types Services General Application Services Services Active Directory Schema Classes Services Peer-to-Peer Graphing Protocol Documents Windows Error Codes ASP.NET
    [Show full text]
  • Speedtouch™ 985 Residential ADSL Triple-Play Gateway
    SpeedTouch™ 985 Residential ADSL Triple-Play Gateway SpeedTouch 985 Next Generation Device for Next Generation Networks of wired and wireless, data, voice and video from anywhere To offer exciting new broadband services to their custom- in the home with the convenience of a consumer electron- ers, service providers are looking for a rich, solid, reliable, ics device. and upgradeable platform to deploy in the homes. The SpeedTouch 985 Residential ADSL Triple-Play Gateway has A solid platform as the foundation for building been designed specifically with these objectives in mind value-added services and represents a new step forward when it comes to mak- Based on an expertise gained from millions of ADSL gate- ing Triple-Play a reality. ways sold to service providers around the world the Speed- Touch 985 offers the reliability required to deploy a com- The SpeedTouch 985 is an ADSL gateway combining mul- plex mix of services. tiple integrated wireless LAN access points, an integrated The State-of-the-art integrated modem supports ADSL, 4-port Ethernet switch, USB master and slave ports, an in- ADSL2 and ADSL2+. tegrated VoIP telephone interface and an integrated IP set- With an integrated 802.11g access point, speed, security, top-box. The SpeedTouch 985 offers seamless connection and performance are guaranteed. When SpeedTouch™ 985 Residential ADSL Triple-Play Gateway using 802.11g, you can transfer data at up to 54Mb/s Video services (five times the speed of older 802.11b wireless net- The IP Set-Top-Box component offers support for so- works), and still connect to existing 802.11b products.
    [Show full text]
  • Learning-Aided Program Synthesis and Verification
    LEARNING-AIDED PROGRAM SYNTHESIS AND VERIFICATION Xujie Si A DISSERTATION in Computer and Information Science Presented to the Faculties of the University of Pennsylvania in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy 2020 Supervisor of Dissertation Mayur Naik, Professor, Computer and Information Science Graduate Group Chairperson Mayur Naik, Professor, Computer and Information Science Dissertation Committee: Rajeev Alur, Zisman Family Professor of Computer and Information Science Osbert Bastani, Research Assistant Professor of Computer and Information Science Steve Zdancewic, Professor of Computer and Information Science Le Song, Associate Professor in College of Computing, Georgia Institute of Technology LEARNING-AIDED PROGRAM SYNTHESIS AND VERIFICATION COPYRIGHT 2020 Xujie Si Licensed under a Creative Commons Attribution 4.0 License. To view a copy of this license, visit: http://creativecommons.org/licenses/by/4.0/ Dedicated to my parents and brothers. iii ACKNOWLEDGEMENTS First and foremost, I would like to thank my advisor, Mayur Naik, for providing a constant source of wisdom, guidance, and support over the six years of my Ph.D. journey. Were it not for his mentorship, I would not be here today. My thesis committee consisted of Rajeev Alur, Osbert Bastani, Steve Zdancewic, and Le Song: I thank them for the careful reading of this document and suggestions for improvement. In addition to providing valuable feedback on this dissertation, they have also provided extremely helpful advice over the years on research, com- munication, networking, and career planning. I would like to thank all my collaborators, particularly Hanjun Dai, Mukund Raghothaman, and Xin Zhang, with whom I have had numerous fruitful discus- sions, which finally lead to this thesis.
    [Show full text]
  • Kindle \\ Windows Software Introduction « Download
    Windows software Introduction < PDF / 6UJIY3QLQT Windows software Introduction By Source Reference Series Books LLC Jun 2011, 2011. Taschenbuch. Book Condition: Neu. 246x192x10 mm. Neuware - Source: Wikipedia. Pages: 64. Chapters: MediaMonkey, Microsoft SharePoint Designer, Microsoft Office 95, Genbox Family History, EMC Legato NetWorker, IObit Security 360, DoPDF, Conserver, RootsMagic, Intel Parallel Studio, Exposé clone, Microsoft Office Accounting, IsoBuster, Microsoft Digital Image, DOSKey, Creo Elements/Direct, GoldWave, Universal Converter, Indigo Renderer, Jing, Internet Explorer 1, DirectVobSub, Adobe Flash Builder, MSDN Academic Alliance, Unidrv, Microsoft Write, Cadstar, DVD Flick, Winpooch, GoBinder, ICore Virtual Accounts, Contig, VSTS Profiler, Xplorer , Portrait Professional, Emergent, Bootsplash, STDU Explorer, UltraISO, Recuva, GCompris, WinEdt, ATOK, The Hessling Editor, SpeedCommander, FlexWiki, Brother's Keeper, Microsoft Live Labs Deepfish, Orbit Downloader, FreeCAD, BullsHit Converter, XYplorer, TUGZip, Take Command, AppLocale, Group Shot, Adobe Technical Communication Suite, DiskXtender, Network UPS Tools, SE-Explorer, SpywareBlaster, Adobe eLearning Suite, Foxy, TortoiseCVS, Adobe Version Cue, FlexPro, Altap Salamander, ConTEXT, Norton PC Checkup, Family Historian, Format, Dolphin Smalltalk, GenStat, Keynote, Resource Hacker, CDRWIN, Crystal Enterprise, RUMBA, Cartes du Ciel, Enigmail, Apcupsd, Biblioscape, ChemDraw, Pocomail, Glk, WinBUGS, Bandicam, EPrompter, Microsoft Vizact, SwordSearcher, HP NewWave, Microsoft
    [Show full text]