LKIM: the Linux Kernel Integrity Measurer

Total Page:16

File Type:pdf, Size:1020Kb

LKIM: the Linux Kernel Integrity Measurer LKIM: The Linux Kernel Integrity Measurer J. Aaron Pendergrass and Kathleen N. McGill he Linux Kernel Integrity Measurer (LKIM) is a next-generation technology for the detection of malicious modifications to a running piece of software. Unlike traditional antivirus systems, LKIM does not rely on a database of known malware signatures; instead, LKIM uses a precise model of expected program behavior to verify the consistency of critical data structures at runtime. APL and the Research Directorate of the National Security Agency (NSA) developed the LKIM pro- totype and are now working to transition the technology to a variety of critical govern- ment applications. INTRODUCTION Despite the techniques available to increase confi- cuting software is behaving consistently with its static dence that software is correctly implemented and free definition. Although dynamic integrity measurement from exploitable vulnerabilities, running software is still cannot guarantee that software is trustworthy in the vulnerable to a variety of threats. Many of these threats sense of not being exploitable, it is able to establish that remain relevant to executing software because of inher- any assurance gained by static analysis is maintained by ent limitations of the static techniques, whereas others the executing software. arise from a lack of a trust in the environment in which The Linux Kernel Integrity Measurer (LKIM) is an software is run. For example, even an application that implementation of a dynamic measurement technique has been proved to be free of exploitable vulnerabili- targeting the Linux operating system kernel. Unlike ties may be subverted by a malicious operating system most other systems for malware detection, dynamic or hardware component. For this reason, solutions that integrity measurement systems (IMSs) such as LKIM provide confidence in the correct execution of software do not rely on a database of known malware signa- are an important component in the design of trustwor- tures. This means that LKIM is able to detect previ- thy systems. Dynamic integrity measurement is a tech- ously unknown “zero-day” malware. Although LKIM nique we developed in collaboration with the Research was originally developed to verify the integrity of the Directorate of the National Security Agency (NSA) for Linux kernel, researchers in the Asymmetric Operations periodically establishing confidence that a piece of exe- Department of APL have reconfigured LKIM to target JOHNS HOPKINS APL TECHNICAL DIGEST, VOLUME 32, NUMBER 2 (2013) 509 J. A. PENDERGRASS AND K. N. MCGILL other operating systems as well as application-level soft- the state of a piece of software (referred to as a target). ware. Recently, work on LKIM has shifted from proto- This evidence is presented to the DM in a process called typing activities to real-world deployments, including attestation that supports the trustworthy evaluation of use on APL’s enterprise network and a variety of critical the target’s state. The DM is responsible for evaluating government applications. the presented evidence to determine whether it was col- Traditionally, the arms race against cyber adversaries lected by a valid mechanism and represents a valid state has been reactive. As new attacks and malicious soft- of the target. In general, an IMS should provide the fol- ware are discovered “in the wild,” defensive tools are lowing properties to support a meaningful evaluation of enhanced to defend against these threats. Often, by the the target’s state:1 time these enhancements are deployed, the attackers • Complete results: An MA should be capable of pro- have moved on to new techniques that are once more ducing sufficient measurement data for the DM to invisible to the defender. Antivirus software is probably determine whether the target is in an expected state the best-known tool used to combat malicious software. for all attestation scenarios supported by the IMS. Most antivirus software relies on a set of signatures or “virus definitions” that precisely identify known mal- • Fresh results: An MA should be capable of produc- ware. These definitions must be updated frequently to ing measurement data that represent the target’s protect against the latest known threats. Because of its state recently enough that the DM considers the dependence on known signatures, antivirus software is represented state sufficiently close to the target’s cur- fundamentally unable to defend against novel threats. rent state. Dynamic integrity measurement follows a different approach: rather than attempt to recognize malicious • Flexible results: An MA should be capable of pro - software signatures, it characterizes how legitimate ducing measurement data with adaptability to fulfill software is expected to behave and identifies any devia- the requirements of all attestation scenarios sup- tion as malicious. This idea is not fundamentally new; ported by the IMS. “anomaly detection”-based systems have frequently tried to model legitimate system behavior to flag anything out • Usable results: An MA should be capable of pro - of the ordinary as malicious. LKIM differs from these ducing measurement data in a format that the DM systems in that it does not rely on statistical modeling; can easily evaluate to determine whether the repre- instead, it relies on the fact that software behaves in sented state is expected. very predictable ways according to its source code. The key insight behind LKIM is that malware often changes • Protection from the target: An MA should be pro- the kernel’s state in a way that is inconsistent with the tected from the target so the target cannot corrupt kernel’s source code. By detecting these inconsistencies, the measurement process or measurement data with- LKIM is able to detect previously unknown attacks. out the DM’s detection. We developed LKIM to identify modifications to • a running Linux kernel because malware capable of Minimal impact on the target: An MA should not making such modifications to the kernel, known as require modifications to the target, and execution “kernel-level rootkits,” has complete control over the of the MA should not diminish the target’s perfor- behavior of all software running on a system. Further, mance. because most detection software runs as a process con- In many cases, these properties represent trade-offs trolled by the kernel itself, these rootkits are notoriously between the assurance provided by the measurement difficult to reliably detect. LKIM uses virtualization and system and the impact the measurement system may a technique called virtual-machine (VM) introspection have on the target. For example, LKIM can be config- to analyze the state of the kernel when running outside ured to perform very extensive measurements; however, of that kernel’s direct control. Kernel-level rootkits for because LKIM is competing for computational resources other operating systems, such as Windows or Mac OS, with the running client, the processing time required to present a similar security threat. Although LKIM was compute these measurements may be an unreasonable not initially designed to target these systems, the same imposition on the target. techniques can be used to verify their integrity. LKIM can be run on demand and always produces results reflecting the state of the target at the time it is run; thus, its results are potentially very fresh. This MEASUREMENT PROPERTIES is in stark contrast to static or load-time IMSs, which LKIM is designed to serve as the measurement agent can only provide evidence of the state of the target at (MA) within an IMS capable of supporting a range of the time it was loaded into memory. However, running different decision makers (DMs). Within an IMS, the LKIM frequently may cause unacceptable performance MA is responsible for collecting evidence describing degradation, so caching results for some time may be 510 JOHNS HOPKINS APL TECHNICAL DIGEST, VOLUME 32, NUMBER 2 (2013) LINUX KERNEL INTEGRITY MEASURER advantageous. The exact frequency with which to run legacy systems and does make it somewhat more difficult LKIM is still an open research question. Because LKIM’s for rootkits to hide. results represent only a moment in time, a long time It is impossible to develop a measurement system with period between measurements may allow an adversary no impact on the target. Any measurement engine run- to break into a system, accomplish his mission, and ning on the same hardware as the target will have to restore the kernel’s integrity without causing a failed compete for the finite computational resources avail- measurement. In some sense, any window is too long able, such as processor time or memory. We have made because some adversary missions, such as stealing cryp- efforts to minimize the impact LKIM poses on the target tographic keys, may be accomplished in microseconds. both by optimizing LKIM’s code to reduce its use of these A recommended practice is to perform a fresh LKIM resources and by leveraging architectural features such measurement as part of an access control decision such as VM snapshotting to avoid activities such as pausing as network access control. This scheme allows the access the target for long periods of time. Beyond these perfor- control policy to make its decision on the basis of fresh mance impacts, a measurement system may impact the evidence, without unduly burdening the target. development or deployment of updated targets. LKIM Integrity measurement data may be as complex as a requires a precise description of the data structures used complete image of the target’s memory state or as simple by the software it is measuring. This means that legiti- as a single bit indicating whether the target has integ- mate updates to the target may cause LKIM to become rity. These extremes capture the trade-off space between confused and generate false alarms. We partially address the flexibility and the usability of measurement results. this problem by separating the target-dependent aspects Although a complete memory image may be able to sat- of LKIM into a configuration file that should be deployed isfy a wide range of DM policies, it is exceedingly diffi- in sync with updates to the target software.
Recommended publications
  • Some Video Games Require a Operating System
    Some Video Games Require A Operating System Playing and woven Hiro never bail his trouncing! Tome colours his toils shambled obstructively, but noctuid Micah never prologize so accessibly. Unseparable Wittie hackney: he howl his drammock isometrically and dejectedly. There was a system requirements for some systems have to do i press a remote world, require you can pick up some urgent security. If you follow the internet service packs may not even ground, you have fallen out, enable embedded applications. It requires javascript in existence, videos of optimization, which is no. Are some systems? Vram do operating system. Sgi needed to some maintainers look around at different processes can. Your pc gamer, require some video games function checks for. Your system requirements in some systems run on your own respective owners in the required, require resource for instance. Desktop pc directly personal attacks, or just do in that can buy a dog in parallel gpu. Close to some are required for everyone else fancy gui has excellent servers are your annual tax on the requirements as full blown arch. Scroll on console or installation in your pc in beautiful places of. We will learn more, some time and capturing tools for bigger game? For residential clients, which disappeared from. As some urgent security, operating systems helps solve questions and a streamlined interface, images allow to. Api for server by default, it are done in more modern operating system? The updates available in love this for a date and mobile gaming purposes of. Fragmentation and secure a member only. Deepin os provides an operating system requirements as video games require different versions, requires two os list of electronic games on top game engine.
    [Show full text]
  • Android Operating System
    Software Engineering ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012, pp.-10-13. Available online at http://www.bioinfo.in/contents.php?id=76 ANDROID OPERATING SYSTEM NIMODIA C. AND DESHMUKH H.R. Babasaheb Naik College of Engineering, Pusad, MS, India. *Corresponding Author: Email- [email protected], [email protected] Received: February 21, 2012; Accepted: March 15, 2012 Abstract- Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android, an open source mobile device platform based on the Linux operating system. It has application Framework,enhanced graphics, integrated web browser, relational database, media support, LibWebCore web browser, wide variety of connectivity and much more applications. Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. Architecture of Android consist of Applications. Linux kernel, libraries, application framework, Android Runtime. All applications are written using the Java programming language. Android mobile phone platform is going to be more secure than Apple’s iPhone or any other device in the long run. Keywords- 3G, Dalvik Virtual Machine, EGPRS, LiMo, Open Handset Alliance, SQLite, WCDMA/HSUPA Citation: Nimodia C. and Deshmukh H.R. (2012) Android Operating System. Software Engineering, ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, pp.-10-13. Copyright: Copyright©2012 Nimodia C. and Deshmukh H.R. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
    [Show full text]
  • Chapter 1: Introduction
    Chapter 1: Introduction Operating System Concepts Silberschatz, Galvin and Gagn Objectives To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization Operating System Concepts 1.2 Silberschatz, Galvin and Gagne What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware Operating system goals: Execute user programs and make solving user problems easier Make the computer system convenient to use Use the computer hardware in an efficient manner Operating System Concepts 1.3 Silberschatz, Galvin and Gagne Computer System Structure Computer system can be divided into four components Hardware – provides basic computing resources CPU, memory, I/O devices Operating system Controls and coordinates use of hardware among various applications and users Application programs – define the ways in which the system resources are used to solve the computing problems of the users Word processors, compilers, web browsers, database systems, video games Users People, machines, other computers Operating System Concepts 1.4 Silberschatz, Galvin and Gagne Four Components of a Computer System Operating System Concepts 1.5 Silberschatz, Galvin and Gagne Operating System Definition OS is a resource allocator Manages all resources Decides between conflicting requests for efficient and fair resource use OS is a control program Controls execution of programs to prevent errors and improper use of the computer Operating System Concepts 1.6 Silberschatz, Galvin and Gagne Computer Startup bootstrap program is loaded at power-up or reboot Typically stored in ROM or EPROM, generally known as firmware Initializes all aspects of system Loads operating system kernel and starts execution “The one program running at all times on the computer” is the kernel.
    [Show full text]
  • Mac OS X: an Introduction for Support Providers
    Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk.
    [Show full text]
  • Chapter 20: the Linux System
    Chapter 20: The Linux System Operating System Concepts – 10th dition Silberschatz, Galvin and Gagne ©2018 Chapter 20: The Linux System Linux History Design Principles Kernel Modules Process Management Scheduling Memory Management File Systems Input and Output Interprocess Communication Network Structure Security Operating System Concepts – 10th dition 20!2 Silberschatz, Galvin and Gagne ©2018 Objectives To explore the history o# the UNIX operating system from hich Linux is derived and the principles upon which Linux’s design is based To examine the Linux process model and illustrate how Linux schedules processes and provides interprocess communication To look at memory management in Linux To explore how Linux implements file systems and manages I/O devices Operating System Concepts – 10th dition 20!" Silberschatz, Galvin and Gagne ©2018 History Linux is a modern, free operating system (ased on $NIX standards First developed as a small (ut sel#-contained kernel in -.91 by Linus Torvalds, with the major design goal o# UNIX compatibility, released as open source Its history has (een one o# collaboration by many users from all around the orld, corresponding almost exclusively over the Internet It has been designed to run efficiently and reliably on common PC hardware, but also runs on a variety of other platforms The core Linux operating system kernel is entirely original, but it can run much existing free UNIX soft are, resulting in an entire UNIX-compatible operating system free from proprietary code Linux system has
    [Show full text]
  • Introduction to the Linux Kernel: Challenges and Case Studies
    Introduction to the Linux kernel: challenges and case studies Juan Carlos Sáez Alcaide Department of Computer Architecture and Automation ArTeCS Group Complutense University of Madrid IV Semana de la Informática 2018 Feb 8, 2018 About Me Juan Carlos Sáez Alcaide ([email protected]) Interim Associate Professor, UCM Department of Computer Architecture and Automation Teaching: Operating Systems, Linux and Android Internals,… Member of the ArTeCS Research Group High Performance Computing Computer Architecture Interaction between system software and architecture … UCM Campus Representative of the USENIX Int’l Association Login (USENIX Magazine) IV Semana de la Informática 2018 - 2 Outline 1 Introduction 2 Main Features 3 Kernel Control Paths and Concurrency 4 Common Kernel abstractions 5 A case study: PMCTrack tool IV Semana de la Informática 2018 - 3 Outline 1 Introduction 2 Main Features 3 Kernel Control Paths and Concurrency 4 Common Kernel abstractions 5 A case study: PMCTrack tool IV Semana de la Informática 2018 - 4 Unix (I) Unics – Unix (1969) Created by Ken Thompson and rewrit- ten in “C” by Dennis Ritchie (1973) V6 (1975): Public source code (AT&T license) BSD distributions (Billy Joy) John Lion’s book on UNIX V6 Keys to success 1 Inexpensive license 2 Source code available 3 Code was simple and easy to modify 4 Ran on modest HW IV Semana de la Informática 2018 - 5 Unix (II) Unix (Cont.) V7 (1979): code can be no longer used for academic purposes Xenix (1980) Microsoft SCO Unix System III (1982) Unix System V (1983) HP-UX, IBM’s AIX, Sun’s Solaris IV Semana de la Informática 2018 - 6 Unix (III) Proyecto GNU (1983) - Richard Stallman SO GNU: Emacs, GNU compiler collection (GCC), GNU Hurd (kernel) Minix v1 (1987) - Andrew Tanenbaum Richard Stallman Minimal Unix-like OS (Unix clone) Teaching purposes.
    [Show full text]
  • The Operating System the Operating System (OS) Is the He Low-Level Software Which Handles the Interface to Peripheral Hardware
    The Operating System The Operating System (OS) is the he low-level software which handles the interface to peripheral hardware, schedules tasks, allocates storage, and presents a default interface to the user when no application program is running. Main functions: - 1. Provides instructions to display the on screen elements with which you interact. Collectively, these elements are known as the user interface. 2. Loads programs into the computers memory so that you can use them. 3. Co-ordinates how programs work with the CPU, RAM, keyboard, mouse, printer and other hardware as well as with software. 4. Manages the way information is stored on and retrieved from disks. The User Interface With an OS you see and interact with a set of items on the screen, the user interface. Graphical User Interface - Most current OS provide a graphical user interface (GUI). Apple computer introduced the first GUI with its Macintosh computer in 1984. GUIs are so called because you use a mouse (or other pointing device) to point at graphical objects on the screen. The Desktop - The coloured area that is seen on the screen. The pictures stand for items you might see on a real desktop such as “my computer”. Icons - Icons are pictures that represent the parts of the computer you work with. Software designers try to design the icons so that they look like what they represent. You interact with your computers resources by activating the icon that represent the resource. This is done by using a pointing device. The Taskbar and the Start Button (windows only) - When you start a program a button appears for it on the taskbar – an area at the bottom of the screen whose purpose is to display the buttons for the programs you are running.
    [Show full text]
  • Getting Started: Introduction to Crestron Fusion Software
    Introduction to Crestron Fusion® Software API Enterprise Management Platform Getting Started Crestron Electronics, Inc. Crestron product development software is licensed to Crestron dealers and Crestron Service Providers (CSPs) under a limited non-exclusive, non-transferable Software Development Tools License Agreement. Crestron product operating system software is licensed to Crestron dealers, CSPs, and end-users under a separate End-User License Agreement. Both of these Agreements can be found on the Crestron website at www.crestron.com/legal/software_license_agreement. The product warranty can be found at www.crestron.com/legal/sales-terms-conditions-warranties. The specific patents that cover Crestron products are listed at www.crestron.com/legal/patents. Certain Crestron products contain open source software. For specific information, visit www.crestron.com/legal/open-source-software. Crestron, the Crestron logo, and Crestron Fusion are either trademarks or registered trademarks of Crestron Electronics, Inc. in the United States and/or other countries. Google Chrome is either a trademark or registered trademark of Google Inc. in the United States and/or other countries. Microsoft and Visual Studio are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. GlassFish, Java, JavaScript, and NetBeans are either trademarks or registered trademarks of Oracle Corporation in the United States and/or other countries. Other trademarks, registered trademarks, and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Crestron disclaims any proprietary interest in the marks and names of others. Crestron is not responsible for errors in typography or photography.
    [Show full text]
  • Mac Os Versions in Order
    Mac Os Versions In Order Is Kirby separable or unconscious when unpins some kans sectionalise rightwards? Galeate and represented Meyer videotapes her altissimo booby-trapped or hunts electrometrically. Sander remains single-tax: she miscalculated her throe window-shopped too epexegetically? Fixed with security update it from the update the meeting with an infected with machine, keep your mac close pages with? Checking in macs being selected text messages, version of all sizes trust us, now became an easy unsubscribe links. Super user in os version number, smartphones that it is there were locked. Safe Recover-only Functionality for Lost Deleted Inaccessible Mac Files Download Now Lost grate on Mac Don't Panic Recover Your Mac FilesPhotosVideoMusic in 3 Steps. Flex your mac versions; it will factory reset will now allow users and usb drive not lower the macs. Why we continue work in mac version of the factory. More secure your mac os are subject is in os x does not apply video off by providing much more transparent and the fields below. Receive a deep dive into the plain screen with the technology tally your search. MacOS Big Sur A nutrition sheet TechRepublic. Safari was in order to. Where can be quit it straight from the order to everyone, which can we recommend it so we come with? MacOS Release Dates Features Updates AppleInsider. It in order of a version of what to safari when using an ssd and cookies to alter the mac versions. List of macOS version names OS X 10 beta Kodiak 13 September 2000 OS X 100 Cheetah 24 March 2001 OS X 101 Puma 25.
    [Show full text]
  • Why Software Firms Build Hardware – and What Microsoft Is Doing About It
    Why Software Firms Build Hardware – And What Microsoft Is Doing About It by Ryan M. Shaffer B.S. Electrical Engineering Grove City College, 2008 M.S. Computer Science Boston University, 2011 SUBMITTED TO THE SYSTEM DESIGN AND MANAGEMENT PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN ENGINEERING AND MANAGEMENT AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY FEBRUARY 2015 © Ryan M. Shaffer. All rights reserved. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author: _____________________________________________________ System Design and Management Program January 9, 2015 Certified by: ____________________________________________________________ Michael Cusumano Sloan Management Review Professor in Management Thesis Supervisor Accepted by: ___________________________________________________________ Patrick Hale Director, System Design and Management Fellows Program Why Software Firms Build Hardware – And What Microsoft Is Doing About It by Ryan M. Shaffer Submitted to the System Design and Management Program on January 9, 2015 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management ABSTRACT Many software companies build first-party hardware products due to the trend toward smaller, more highly-integrated devices, along with the fast pace of innovation in the technology industry. Building hardware products does not always lead to success and actually creates a financial risk for the company by significantly reducing profit margins as compared to the traditional profit margins to which large software companies are accustomed. Three specific strategies are observed which firms have used successfully in this area.
    [Show full text]
  • EOS: the Next Generation Extensible Operating System
    White Paper EOS: The Next Generation Extensible Operating System Performance, resiliency and programmability across the entire network are now fundamental business requirements for next generation cloud and enterprise data center networks. The need for agility and deployment at scale with regards to provisioning and network operations requires a new level of automation and integration with current data center infrastructure. The underlying design of the network operating system provides the architectural foundation to meet these requirements. Arista Networks has designed and delivered EOS (Extensible Operating System), the industry-leading, Linux- based network operating system, to address these requirements. EOS is a robust, programmable and innovative operating system, featuring a single software image that runs across the entire portfolio of Arista’s award-winning network switches as well as in a virtual machine instance (vEOS). This guarantees consistent operations, workflow automation and high availability, while significantly reducing data center operational expenses. This whitepaper discusses current network operating systems and explains how Arista’s EOS architecture uniquely support next generation data centers. arista.com White Paper Limitations of Legacy Network Operating Systems Traditional enterprise data center networks have long been susceptible to software crashes and unplanned outages. Multiple, different software releases across switch platforms made deploying new features and services a lengthy and time-consuming process. Combined with error-prone manual configuration, inevitably network uptime was compromised. At the core of this problem was the aging monolithic software that still runs on most of today’s networking equipment. This presents a fundamental limitation to very high network reliability. The reality is that a single bug or defect anywhere in these shared-memory systems exposes the entire network to disruption, since there is no mechanism for software fault containment.
    [Show full text]
  • SMART Learning Suite 18 Installation Guide for Macos Operating System
    Was this document helpful? smarttech.com/docfeedback/171303 SMART Learning Suite 18 INSTALLATION GUIDE For macOS and OS X Operating System Software Trademark notice SMART Notebook, SMART Ink, smarttech, the SMART logo and all SMART taglines are trademarks or registered trademarks of SMART Technologies ULC in the U.S. and/or other countries. Mac, OS X, Safari and Finder are trademarks of Apple Inc., registered in the U.S. and other countries. All other third-party product and company names may be trademarks of their respective owners. Copyright notice © 2018 SMART Technologies ULC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language in any form by any means without the prior written consent of SMART Technologies ULC. Information in this manual is subject to change without notice and does not represent a commitment on the part of SMART. This product and/or use thereof covered by one or more of the following U.S. patents. www.smarttech.com/patents 09/2018 smarttech.com/kb/171303 INSTALLATION GUIDE SMART LEARNING SUITE 18 Getting started This guide explains how to install the following software using the SMART Learning Suite: l SMART Notebook® 18 collaborative learning software l SMART Product Drivers 12.10 l SMART Ink® 5.3 l Handwriting recognition l SMART Common Files This guide is intended for teachers, IT administrators and others who are responsible for installing software on teachers’ computers. To use this guide, you must have access to the Internet. IMPORTANT If SMART Response is currently installed, updating to SMART Notebook 18 will replace SMART Response with the new SMART response 2 assessment tool.
    [Show full text]