Rendezvous-Based Measurement, Traffic Classification and Host Profiling
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Automatic Sandboxing of Unsafe Software Components in High Level Languages
Master Thesis Automatic Sandboxing of Unsafe Software Components in High Level Languages Benjamin Lamowski Technische Universität Dresden Fakultät Informatik Institut für Systemarchitektur Professur Betriebssysteme Betreuender Hochschullehrer: Prof. Dr. rer. nat. Hermann Härtig Betreuender Mitarbeiter: Dr. Carsten Weinhold 3. Mai 2017 Aufgabenstellung Neue “sichere“ Programmiersprachen wie Go, Swift oder Rust wurden nicht nur für die normale Anwendungsentwicklung entworfen, sondern sie zielen auch auf eine hochper- formante Ausführung und Programmierung vergleichsweise systemnaher Funktionalität ab. Eine attraktive Eigenschaft beispielsweise von Rust ist das gegenüber C und C++ deutlich strengere Speicherverwaltungsmodell, bei dem bereits zur Kompilierzeit der Lebenszyklus und die Erreichbarkeit von Objekten sowie die Zuständigkeit für deren Allokation und Deallokation wohldefiniert sind. Ganze Klassen von Programmfehlern wie etwa Buffer Overflows oder Dereferenzierung ungültige Zeiger werden dadurch eliminiert und die Programme mithin sicherer und robuster. Aus diversen Gründen müssen Programme, die in sicheren Sprachen geschriebenen wurden, aber oftmals auf “unsicheren“ Legacy-Code zurückgreifen. So bietet etwa Rust über das “unsafe“-Sprachelement die Möglichkeit, Funktionen innerhalb von Bibliotheken aufzurufen, die in fehleranfälligem C geschrieben sind. Leider werden die vom Com- piler durchgesetzten Garantien der sicheren Sprache hinfällig, sobald im Code einer C-Bibliothek ein Speicherfehler auftritt. Ein Schreibzugriff etwa durch -
A Microkernel API for Fine-Grained Decomposition
A Microkernel API for Fine-Grained Decomposition Sebastian Reichelt Jan Stoess Frank Bellosa System Architecture Group, University of Karlsruhe, Germany freichelt,stoess,[email protected] ABSTRACT from the microkernel APIs in existence. The need, for in- Microkernel-based operating systems typically require spe- stance, to explicitly pass messages between servers, or the cial attention to issues that otherwise arise only in dis- need to set up threads and address spaces in every server for tributed systems. The resulting extra code degrades per- parallelism or protection require OS developers to adopt the formance and increases development effort, severely limiting mindset of a distributed-system programmer rather than to decomposition granularity. take advantage of their knowledge on traditional OS design. We present a new microkernel design that enables OS devel- Distributed-system paradigms, though well-understood and opers to decompose systems into very fine-grained servers. suited for physically (and, thus, coarsely) partitioned sys- We avoid the typical obstacles by defining servers as light- tems, present obstacles to the fine-grained decomposition weight, passive objects. We replace complex IPC mecha- required to exploit the benefits of microkernels: First, a nisms by a simple function-call approach, and our passive, lot of development effort must be spent into matching the module-like server model obviates the need to create threads OS structure to the architecture of the selected microkernel, in every server. Server code is compiled into small self- which also hinders porting existing code from monolithic sys- contained files, which can be loaded into the same address tems. Second, the more servers exist | a desired property space (for speed) or different address spaces (for safety). -
A Practical UNIX Capability System
A Practical UNIX Capability System Adam Langley <[email protected]> 22nd June 2005 ii Abstract This report seeks to document the development of a capability security system based on a Linux kernel and to follow through the implications of such a system. After defining terms, several other capability systems are discussed and found to be excellent, but to have too high a barrier to entry. This motivates the development of the above system. The capability system decomposes traditionally monolithic applications into a number of communicating actors, each of which is a separate process. Actors may only communicate using the capabilities given to them and so the impact of a vulnerability in a given actor can be reasoned about. This design pattern is demonstrated to be advantageous in terms of security, comprehensibility and mod- ularity and with an acceptable performance penality. From this, following through a few of the further avenues which present themselves is the two hours traffic of our stage. Acknowledgments I would like to thank my supervisor, Dr Kelly, for all the time he has put into cajoling and persuading me that the rest of the world might have a trick or two worth learning. Also, I’d like to thank Bryce Wilcox-O’Hearn for introducing me to capabilities many years ago. Contents 1 Introduction 1 2 Terms 3 2.1 POSIX ‘Capabilities’ . 3 2.2 Password Capabilities . 4 3 Motivations 7 3.1 Ambient Authority . 7 3.2 Confused Deputy . 8 3.3 Pervasive Testing . 8 3.4 Clear Auditing of Vulnerabilities . 9 3.5 Easy Configurability . -
Industrial Control Via Application Containers: Migrating from Bare-Metal to IAAS
Industrial Control via Application Containers: Migrating from Bare-Metal to IAAS Florian Hofer, Student Member, IEEE Martin A. Sehr Antonio Iannopollo, Member, IEEE Faculty of Computer Science Corporate Technology EECS Department Free University of Bolzano-Bozen Siemens Corporation University of California Bolzano, Italy Berkeley, CA 94704, USA Berkeley, CA 94720, USA fl[email protected] [email protected] [email protected] Ines Ugalde Alberto Sangiovanni-Vincentelli, Fellow, IEEE Barbara Russo Corporate Technology EECS Department Faculty of Computer Science Siemens Corporation University of California Free University of Bolzano-Bozen Berkeley, CA 94704, USA Berkeley, CA 94720, USA Bolzano, Italy [email protected] [email protected] [email protected] Abstract—We explore the challenges and opportunities of control design full authority over the environment in which shifting industrial control software from dedicated hardware to its software will run, it is not straightforward to determine bare-metal servers or cloud computing platforms using off the under what conditions the software can be executed on cloud shelf technologies. In particular, we demonstrate that executing time-critical applications on cloud platforms is viable based on computing platforms due to resource virtualization. Yet, we a series of dedicated latency tests targeting relevant real-time believe that the principles of Industry 4.0 present a unique configurations. opportunity to explore complementing traditional automation Index Terms—Industrial Control Systems, Real-Time, IAAS, components with a novel control architecture [3]. Containers, Determinism We believe that modern virtualization techniques such as application containerization [3]–[5] are essential for adequate I. INTRODUCTION utilization of cloud computing resources in industrial con- Emerging technologies such as the Internet of Things and trol systems. -
Jiajia Luo, Et Al. V. Sogou Inc., Et Al. 19-CV-00230-Complaint for Violation
Case 1:19-cv-00230-JPO Document 1 Filed 01/09/19 Page 1 of 25 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK JIAJIA LUO, Individually and on Behalf of All Case No. Others Similarly Situated, Plaintiff, CLASS ACTION vs. COMPLAINT FOR VIOLATION OF THE FEDERAL SECURITIES LAWS SOGOU INC., SOHU, INC., TENCENT HOLDINGS LIMITED, XIAOCHUAN WANG, CHARLES (CHAOYANG) ZHANG, DEMAND FOR JURY TRIAL YUXIN REN, JOANNA (YANFENG) LU, BIN GAO, JOSEPH CHEN, JANICE LEE, and JAMES (XIUFENG) DENG, Defendants Plaintiff Jiajia Luo, individually and on behalf of all the other persons similarly situated, by plaintiff’s undersigned attorneys, alleges the following based upon personal knowledge as to plaintiff and plaintiff’s own acts, and upon information and belief as to all other matters based on the investigation conducted by and through plaintiff’s attorneys, which included, among other things, a review of Securities and Exchange Commission (“SEC”) filings by Sogou Inc. (“Sogou” or the “Company”), as well as conference call transcripts and media and analyst reports about the Company. Plaintiff believes that substantial evidentiary support will exist for the allegations set forth herein after a reasonable opportunity for discovery. SUMMARY OF THE ACTION 1. This is a federal securities class action on behalf of a class consisting of all persons other than defendants who purchased or otherwise acquired Sogou American Depository Shares (“ADSs”) pursuant and/or traceable to Sogou’s false and misleading Registration Statement and Prospectus issued in connection with the Company’s initial public offering on November 9, 2017 (the “IPO” or the Case 1:19-cv-00230-JPO Document 1 Filed 01/09/19 Page 2 of 25 “Offering”), seeking to recover compensable damages caused by defendants’ Securities Act of 1933 (the “Securities Act”) violations (the “Class”). -
Annual Report
08 Annual Report iinet.net.au iiNet Limited ACN 068 628 937 ABN 48 068 628 937 Contents Financial Calendar and Corporate Information 1 About iiNet 3 iiNet History 17 Financial Highlights 19 Operational Highlights 20 Corporate Highlights 21 Education and Community Outreach 23 Chairman’s Review 25 Managing Director’s Report 29 Directors’ Report 35 Corporate Governance Statement 65 Financial Report 71 Directors’ Declaration 139 Independent Auditor’s Report 141 Shareholder Information 143 Financial Calendar Annual General Meeting The Annual General Meeting of iiNet Limited will be held at the Sheraton Hotel, 297 Adelaide Terrace, Perth, Western Australia, on Monday the 24th of November, 2008 at 10:30am. Other key dates in the 2009 financial year: • Annual report and Notice of Annual General Meeting mailed to shareholders October 2008 • Half-year results February 2009 • Full-year results August 2009 Corporate Information Directors Michael Smith Chairman Michael Malone Managing Director Andrew Milner Director (non-executive) Peter James Director (non-executive) Paul Broad Director (non-executive) Tony Grist Director (non-executive) David Grant Director (non-executive) Company Secretary David Buckingham Principal Place of Business and Registered Office iiNet Limited Durack Centre, Level 6 263 Adelaide Terrace Perth WA 6000 Share Registry Computershare Investor Services Pty Ltd Level 2 Reserve Bank Building 45 St George’s Terrace Perth WA 6000 Telephone: +61 8 9323 2000 Internet: www.computershare.com.au Stock Exchange Listings iiNet Limited’s ordinary shares are quoted on the Australian Stock Exchange Limited (ASX: IIN). Auditors Ernst & Young The Ernst & Young Building 11 Mounts Bay Road Perth WA 6000 1 iiNet Annual Report 2008 Financial Calendar and Corporate Information 2 08 About iiNet We’ve come a long way since our days of working out of a suburban garage in the early 90s. -
TPG Telecom Limited and Its Controlled Entities ABN 46 093 058 069
TPG Telecom Limited and its controlled entities ABN 46 093 058 069 Annual Report Year ended 31 July 2016 2 TPG Telecom Limited and its controlled entities Annual report For the year ended 31 July 2016 Contents Page Chairman’s letter 3 Directors’ report 5 Lead auditor’s independence declaration 34 Consolidated income statement 35 Consolidated statement of comprehensive income 36 Consolidated statement of financial position 37 Consolidated statement of changes in equity 38 Consolidated statement of cash flows 39 Notes to the consolidated financial statements 40 Directors’ declaration 91 Independent auditor’s report 92 ASX additional information 94 3 TPG Telecom Limited and its controlled entities Chairman’s letter For the year ended 31 July 2016 Dear Shareholders On behalf of the Board of Directors, I am pleased to present to you the TPG Telecom Limited Annual Report for the financial year ended 31 July 2016 (“FY16”). Financial Performance FY16 was another successful year for the Group. Continued organic growth and the integration of iiNet into the business have resulted in further increases in revenue, profits and dividends for shareholders. FY16 represents the eighth consecutive year that this has been the case. A detailed review of the Group’s operating and financial performance for the year is provided in the Operating and Financial Review section of the Directors’ Report starting on page 7 of this Annual Report, and set out below are some of the key financial highlights and earnings attributable to shareholders from the year. FY16 FY15 Movement Revenue ($m) 2,387.8 1,270.6 +88% EBITDA ($m) 849.4 484.5 +75% NPAT ($m) 379.6 224.1 +69% EPS (cents/share) 45.3 28.2 +61% Dividends (cents/share) 14.5 11.5 +26% iiNet Acquisition At the beginning of FY16 we completed the acquisition of iiNet and consequently there has been significant focus during the year on integrating the businesses to improve the efficiency of the combined organisation. -
Amaga 2020 Individual.Pdf
Tax invoice Membership category Payment details ABN 83 048 139 955 Membership Form Regular (Loyalty) Concession* (Loyalty) Membership Fee $ (inc of GST) (inc of GST) + Networks $ Individual □ $180 ($162) □ $90 ($81) + Donation* $ Your information Individual (existing Total Payable $ New member ICOM members only) □ $171 ($153) □ $86 ($76.50) □ Australian Museums and Galleries Association AMaGA Membership Card * Donations over $2.00 are tax deductible. □ Renewing member Individual employed by a member - Australian Museums and Galleries Association □ $144 ($144**) Member number (if known) AMaGA □ Membership Card institution Individual employed Payment method AMaGA by a member Please email or post your completed form for payment □ Please send me a new membership card □ $144 ($144**) - Member Number institution (existing New members will automatically get sent a card. Expiry processing. Your receipt and membership card or sticker will be Member Name AMaGA is a partner to ICOM members only) Renewing members will receive a sticker with your Australian AMaGA Museums ICOM Australia. and Galleries If found, please return to Association PO Box 24, Deakin West receipt/invoice to attach to your current card. Member ACT 2600 issued when payment has been processed. * Concession rates available to retired, full-time students, pensioners, unemployed Member Number Expiry Member Name and volunteers Australian AMaGA is a partner to Museums ICOM Australia. and Galleries If found, please return to Association PO Box 24, Deakin West Member ACT 2600 made payable to Australian Museums and Galleries Association ** Discounts are capped at 20% □ Cheque Title □ Mr □ Miss □ Ms □ Mrs □ Dr □ Name Loyalty Discount Members of more than five consecutive years can claim a 10% loyalty Credit Card (Visa or Mastercard only) discount on their membership. -
CA Network Flow Analysis Release Notes
CA Network Flow Analysis Release Notes Release 9.1.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. -
Digital Skills in Sub-Saharan Africa Spotlight on Ghana
Digital Skills in Sub-Saharan Africa Spotlight on Ghana IN COOPERATION WITH: ABOUT IFC Research and writing underpinning the report was conducted by the L.E.K. Global Education practice. The L.E.K. IFC—a sister organization of the World Bank and member of team was led by Ashwin Assomull, Maryanna Abdo, and the World Bank Group—is the largest global development Ridhi Gupta, including writing by Maryanna Abdo, Priyanka institution focused on the private sector in emerging Thapar, and Jaisal Kapoor and research contributions by Neil markets. We work with more than 2,000 businesses Aneja, Shrrinesh Balasubramanian, Patrick Desmond, Ridhi worldwide, using our capital, expertise, and influence to Gupta, Jaisal Kapoor, Rohan Sur, and Priyanka Thapar. create markets and opportunities in the toughest areas of Sudeep Laad provided valuable insights on the Ghana the world. For more information, visit www.ifc.org. market landscape and opportunity sizing. ABOUT REPORT L.E.K. is a global management consulting firm that uses deep industry expertise and rigorous analysis to help business This publication, Digital Skills in Sub-Saharan Africa: Spotlight leaders achieve practical results with real impact. The Global on Ghana, was produced by the Manufacturing Agribusiness Education practice is a specialist international team based in and Services department of the International Finance Singapore serving a global client base from China to Chile. Corporation, in cooperation with the Global Education practice at L.E.K. Consulting. It was developed under the ACKNOWLEDGMENTS overall guidance of Tomasz Telma (Senior Director, MAS), The report would not have been possible without the Mary-Jean Moyo (Director, MAS, Middle-East and Africa), participation of leadership and alumni from eight case study Elena Sterlin (Senior Manager, Global Health and Education, organizations, including: MAS) and Olaf Schmidt (Manager, Services, MAS, Sub- Andela: Lara Kok, Executive Coordinator; Anudip: Dipak Saharan Africa). -
Pysal Documentation Release 1.14.3
pysal Documentation Release 1.14.3 PySAL Developers Oct 04, 2019 Contents 1 User Guide 3 2 Developer Guide 73 3 Library Reference 97 Bibliography 109 i ii pysal Documentation, Release 1.14.3 Releases • Stable 1.14.3 (Released 2017-11-2) • Development PySAL is an open source library of spatial analysis functions written in Python intended to support the development of high level applications. PySAL is open source under the BSD License. Contents 1 pysal Documentation, Release 1.14.3 2 Contents CHAPTER 1 User Guide 1.1 Introduction Contents • Introduction – History – Scope – Research Papers and Presentations 1.1.1 History PySAL grew out of a collaborative effort between Luc Anselin’s group previously located at the University of Illinois, Champaign-Urbana, and Serge Rey who was at San Diego State University. It was born out of a recognition that the respective projects at the two institutions, PySpace (now GeoDaSpace) and STARS - Space Time Analysis of Regional Systems, could benefit from a shared analytical core, since this would limit code duplication and free up additional developer time to focus on enhancements of the respective applications. This recognition also came at a time when Python was starting to make major inroads in geographic information systems as represented by projects such as the Python Cartographic Library, Shapely and ESRI’s adoption of Python as a scripting language, among others. At the same time there was a dearth of Python modules for spatial statistics, spatial econometrics, location modeling and other areas of spatial analysis, and the role for PySAL was then expanded beyond its support of STARS and GeoDaSpace to provide a library of core spatial analytical functions that could support the next generation of spatial analysis applications. -
The Many Approaches to Real-Time and Safety Critical Linux Systems
Corporate Technology The Many Approaches to Real-Time and Safety-Critical Linux Open Source Summit Japan 2017 Prof. Dr. Wolfgang Mauerer Siemens AG, Corporate Research and Technologies Smart Embedded Systems Corporate Competence Centre Embedded Linux Copyright c 2017, Siemens AG. All rights reserved. Page 1 31. Mai 2017 W. Mauerer Siemens Corporate Technology Corporate Technology The Many Approaches to Real-Time and Safety-Critical Linux Open Source Summit Japan 2017 Prof. Dr. Wolfgang Mauerer, Ralf Ramsauer, Andreas Kolbl¨ Siemens AG, Corporate Research and Technologies Smart Embedded Systems Corporate Competence Centre Embedded Linux Copyright c 2017, Siemens AG. All rights reserved. Page 1 31. Mai 2017 W. Mauerer Siemens Corporate Technology Overview 1 Real-Time and Safety 2 Approaches to Real-Time Architectural Possibilities Practical Approaches 3 Approaches to Linux-Safety 4 Guidelines and Outlook Page 2 31. Mai 2017 W. Mauerer Siemens Corporate Technology Introduction & Overview About Siemens Corporate Technology: Corporate Competence Centre Embedded Linux Technical University of Applied Science Regensburg Theoretical Computer Science Head of Digitalisation Laboratory Target Audience Assumptions System Builders & Architects, Software Architects Linux Experience available Not necessarily RT-Linux and Safety-Critical Linux experts Page 3 31. Mai 2017 W. Mauerer Siemens Corporate Technology A journey through the worlds of real-time and safety Page 4 31. Mai 2017 W. Mauerer Siemens Corporate Technology Outline 1 Real-Time and Safety 2 Approaches to Real-Time Architectural Possibilities Practical Approaches 3 Approaches to Linux-Safety 4 Guidelines and Outlook Page 5 31. Mai 2017 W. Mauerer Siemens Corporate Technology Real-Time: What and Why? I Real Time Real Fast Deterministic responses to stimuli Caches, TLB, Lookahead Bounded latencies (not too late, not too Pipelines early) Optimise average case Repeatable results Optimise/quantify worst case Page 6 31.