Towards Automatic Software Lineage Inference

Total Page:16

File Type:pdf, Size:1020Kb

Towards Automatic Software Lineage Inference Towards Automatic Software Lineage Inference Abstract—Software continuously evolves to reflect changing and Linux kernel [10] in order to verify Lehman’s laws of requirements, feature updates, and bug fixes. Most existing software evolutions and to understand software evolution research focuses on analyzing software release histories to process. understand the software evolution process and to describe evolutionary relationships among programs. However, there The security community has studied malicious software has been little research on inferring software lineage from (malware) evolution based upon the observation that the (binary) programs. majority of incoming malware are tweaked variants of well- In this paper, we take a systematic approach towards soft- known malware [4, 12, 13]. With over 1.1 million malware ware lineage inference. We explore three fundamental questions appearing in one day [2], researchers have studied such evo- not addressed by existing work. First, how do we measure the quality of a lineage inference algorithm? Second, given existing lutionary relationships to identify new variants of previously- approaches to binary similarity analysis, how good are they for analyzed malware [8], to understand the diversity of exploits lineage both currently and in an idealized setting? Third, what used by notorious worms [20], and to generate phylogeny are the challenging problems in software lineage inference? models to describe derivation relationships among programs Towards these goals we build LIMetric—a system for automatic as a dendrogram [14, 15]. software lineage inference of binary programs. We evaluated LIMetric on two types of lineage—straight line lineage and The task of software lineage inference is to infer a tem- directed acyclic graph (DAG) lineage. We have also extended poral ordering and ancestor/descendant relationships among our technique to handle multiple straight line lineages. Our programs. Software lineage can be defined as follows: experiments used large scale real-world programs, with a total of 1,777 releases spanning over a combined 110 years of Definition I.1. A lineage graph G = (N; A) is a directed development history. In order to quantify lineage quality, we acyclic graph (DAG) comprising a set of nodes N and a set propose four metrics: (i) number of inversions and (ii) edit of arcs A. A node n 2 N represents a program, and an arc distance to monotonicity for straight line lineage, and (iii) a = (x; y) 2 A denotes that program y is a derivative of number of lowest common ancestor (LCA) mismatches and (iv) average pairwise distance to true LCA for DAG lineage. program x. We say that x is a predecessor of y and y is a LIMetric effectively extracted software derivation relationships successor of x. among binary programs with high accuracy. Through close root case analysis, we also formulate several challenging problems We define some terminology. A is a node that has no in software lineage inference that need to be addressed to attain incoming arc and a leaf is a node that has no outgoing arc. even higher accuracy. Since a DAG can have multiple roots, we introduce a new Keywords-software evolution, software lineage, systematic node called the super root and add a new arc from it to every evaluation root. A DAG that has been augmented in this way is called a super DAG. Note that a root in a super DAG has exactly one I. INTRODUCTION incoming arc from the super root. An ancestor of a node n is Software evolves to adapt to changing needs, bug fixes, a node that can reach n. Note that n is an ancestor of itself. and feature requests [18]. The lineage of software through its A common ancestor of x and y is the intersection of the evolution provides a potentially rich source of information two sets of ancestors. In a DAG, a lowest common ancestor for a number of security questions. For example, given a (LCA) of two nodes x and y is a common ancestor of x collection of malware variants, which malware came first? and y that is not an ancestor to another common ancestor Given a collection of binaries in forensics, are any of of x and y [6]. Notice that there can be multiple LCAs. We them derived from the others? These kinds of questions are denote the set of LCAs of x and y as SLCA(x; y). important enough that the US Defense Advanced Research In this paper, we ask three basic research questions: Projects Agency (DARPA) is spending $43 million to study • What are good metrics? Existing research focused on them [1]. Unfortunately, existing work has primarily focused building phylogeny of malware [14, 15], but has lacked on analyzing known lineage, not inferring lineage. For exam- quality metrics to scientifically measure the quality of ple, Belady and Lehman studied software evolution of IBM their output. OS/360 [5], and Lehman and Ramil formulated eight laws Good metrics are necessary to assess how good our describing software evolution process [18]: 1) continuing approach is with respect to the ground truth. Good change, 2) increasing complexity, 3) self regulation, 4) metrics also allow us to quantify the quality of our conservation of organisational stability, 5) conservation of output, and to compare different approaches. familiarity, 6) continuing growth, 7) declining quality, and • How well are we doing now? We would like to 8) feedback system. With a wealth of release information understand what are the limits of existing techniques such as release dates and program versions, researchers have even in ideal cases, meaning we have 1) control over analyzed histories of open source projects [28], Firefox [21], variables affecting the compilation of programs such Contiguous Revisions Released Versions Released Binaries DAG-like Revisions Software Lineage Inference Datasets 3 Datasets 1 Straight Line Lineage DAG Lineage Features 9 Root Revision 2 Features 1 Root Revision 2 Timestamp 3 Section Size n-grams Inferred Root Hybrid Inferred Root No Timestamp File Size Real Root Real Root Pseudo Timestamp Cyclomatic Complexity Real Timestamp Disassembly Instructions Mnemonics with operands types Quality Metrics 2 Quality Metrics 2 Normalized Mnemonics Sorted Normalized Mnemonics Number of Inversions Number of LCA Mismatches Hybrid Edit Distance to Monotonicity Average Distance to True LCA Figure 1: Design space in software lineage inference as compiler versions and optimization options so that addition, we extend our approach for straight line lineage to binary code compiled from similar source code would k-straight line lineage. be similar, 2) reliable feature extraction techniques • Four metrics to measure quality. We propose two to abstract binary programs accurately and precisely, metrics for straight line lineage: number of inversions which is not always guaranteed due to the difficulty of and edit distance to monotonicity. Given an inferred disassembling, and 3) the ground truth with which we graph G and the ground truth G∗, the number of can compare our results to measure accuracy and to inversions measures how often we get the question spot error cases. “which one of program pi and program pj comes first” Although previous approaches have focused on mal- wrong. The edit distance to monotonicity asks “how ware, we argue that it is necessary to first system- many nodes do we need to remove in G such that the atically validate a lineage inference technique with remaining nodes are in sorted order and thus respect “goodware”, e.g., open source projects. Since malware G∗”. is often surreptitiously developed by adversaries, it is We also propose two metrics for DAG lineage: number hard or even impossible to obtain the ground truth. of LCA mismatches and average pairwise distance to Furthermore, we cannot hope to understand evolution true LCA. An LCA mismatch is a generalized version of on adversarial programs unless we first understand an inversion because the LCA of two nodes in a straight limits of our approach without an adversary. To the best line is the earlier node. In case we have a wrong LCA, of our knowledge, no systematic experiment addressing we also measure the average pairwise distance between all the variables has been done before. the true LCA(s) and the derived LCA(s) in G∗. This • What are the challenging problems? We need to detailed measurement is desirable because it often helps identify challenging problems in order to improve soft- us to decide which of methods is better even when their ware lineage inference techniques. We should evaluate LCA scores are the same. with an eye towards uncovering fundamental limits or • Large scale systematic evaluation. We systematically problems. Previous work has not addressed this. evaluated LIMetric with goodware that we have ground In this paper, we propose techniques and metrics for the truth. For straight line lineage, we collected three kinds systematic investigation on software lineage as described of datasets: 1) contiguous revisions from a version in Figure1. We explore two types of lineage: straight control system with highly varying time gap between line lineage and directed acyclic graph (DAG) lineage. In adjacent commits (<10 minutes to over a month)— 371 revisions from 3 programs representing 4 years from the difficulty of getting precise disassembly outputs of combined history, 2) released versions distributed to from binary programs [17, 19]. In order to exclude the end users, meaning that experimental features that con- errors introduced at the feature extraction step and focus on tiguous revisions may have are excluded—271 releases evaluating the performance of a software lineage inference from 5 programs representing 55 years of combined algorithm, we also leverage assembly obtained using gcc history, and 3) actual released binary programs from -S (not source code itself) to obtain basic blocks more deb or rpm package files where we do not have accurately.
Recommended publications
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Les Menus Indépendants
    les menus indépendants étant un grand fan de minimalisme, et donc pas vraiment attiré vers les environnements de bureaux complets (Gnome/KDE/E17) je me trouve souvent confronté au problème du menu. bien sûr les raccourcis clavier sont parfaits, mais que voulez-vous, j'aime avoir un menu… voici quelques uns des menus indépendants que j'utilise: associés à un raccourcis clavier, un lanceur dans un panel/dock ou intégré dans une zone de notification. Sommaire les menus indépendants....................................................................................................1 compiz-deskmenu...........................................................................................................2 installation..................................................................................................................2 paquet Debian.........................................................................................................2 depuis les sources...................................................................................................2 configuration...............................................................................................................2 MyGTKMenu....................................................................................................................5 installation..................................................................................................................5 configuration...............................................................................................................5
    [Show full text]
  • 2020 Annual Statement of Affairs
    Page 1 Page 1 A B C D E F G H I J 1 This page must be sent to ISBE Note: For submitting to ISBE, the "Statement of Affairs" can 2 and retained within the district/joint agreement ILLINOIS STATE BOARD OF EDUCATION be submitted as one file to avoid separating worksheets. 3 administrative office for public inspection. School Business Services 4 (217)785-8779 5 ANNUAL STATEMENT OF AFFAIRS FOR THE FISCAL YEAR ENDING 6 June 30, 2020 7 (Section 10-17 of the School Code) 8 9 SCHOOL DISTRICT/JOINT AGREEMENT NAME: Aurora East School District 131 DISTRICT TYPE 10 RCDT NUMBER: 31-045-1310-22 Elementary 11 ADDRESS: 417 5th St, Aurora, IL 60505 High School 12 COUNTY: Kane Unit X 1413 NAME OF NEWSPAPER WHERE PUBLISHED: Beacon News 15 ASSURANCE 16 YES x The statement of affairs has been made available in the main administrative office of the school district/joint agreement and the required Annual Statement of Affairs Summary has been published in accordance with Section 10-17 of the School Code. 1817 19 CAPITAL ASSETS VALUE SIZE OF DISTRICT IN SQUARE MILES 13 20 WORKS OF ART & HISTORICAL TREASURES NUMBER OF ATTENDANCE CENTERS 22 21 LAND 2,771,855 9 MONTH AVERAGE DAILY ATTENDANCE 13,327 22 BUILDING & BUILDING IMPROVEMENTS 191,099,506 NUMBER OF CERTIFICATED EMPLOYEES 23 SITE IMPROVMENTS & INFRASTRUCTURE 813,544 FULL-TIME 1,240 24 CAPITALIZED EQUIPMENT 1,553,276 PART-TIME 1 25 CONSTRUCTION IN PROGRESS 13,923,489 NUMBER OF NON-CERTIFICATED EMPLOYEES 26 Total 210,161,670 FULL-TIME 335 27 PART-TIME 113 28 NUMBER OF PUPILS ENROLLED PER GRADE TAX RATE BY FUND
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • VENDOR CO-OP 1St Choice Restaurant Equipment and Supply
    VENDOR CO-OP 1st Choice Restaurant Equipment and Supply LLC BuyBoard 1-800 Radiator and A/C of El Paso ESC 19 1st Choice Restaurant Equipment & Supply, LLC ESC 19 1st Class Solutions TIPS 22nd Century Technologies Inc. Choice Partners 2717 Group, LLC. 1GPA 2NDGEAR LLC TIPS 2ove1, LLC ESC 19 2TAC Corporation TIPS 2Ten Coffee Roasters ESC 19 3 C Technology LLC TIPS 308 Construction LLC TIPS 323 Link LLC TIPS 360 Degree Customer, Inc. ESC 19 360 Solutions Group TIPS 360Civic 1GPA 3-C Technology BuyBoard 3N1 Office Products Inc TIPS 3P Learning Choice Partners 3P Learning ESC 19 3Rivers Telecom Consulting Plenteous Consulting LLC TIPS 3Sixty Integrated.com BuyBoard 3W Consulting Group LLC ESC 19 3W Consulting Group LLC TIPS 3W Consulting Group, LLC ESC 19 4 Rivers Equipment ESC 19 4 Rivers Equipment LLC BuyBoard 4imprint BuyBoard 4Imprint Choice Partners 4imprint, Inc. ESC 20 4Kboards TIPS 4T Partnership LLc TIPS 4TellX LLC ESC 19 5 L5E LLC TIPS 5-F Mechanical Group Inc. BuyBoard 5W Contracting LLC TIPS 5W Contracting LLC Assignee TIPS 806 Technologies, Inc. Choice Partners 9 to 5 Seating Choice Partners A & H Painting, Inc. 1GPA A & M Awards ESC 19 A 2 Z Educational Supplies BuyBoard A and E Seamless Raingutters Inc TIPS A and S Air Conditioning Assignee TIPS A Bargas and Associates LLC TIPS A King's Image ESC 18 A Lert Roof Systems TIPS A Lingua Franca LLC ESC 19 A Pass Educational Group LLC TIPS A Photo Identification ESC 18 A Photo Identification ESC 20 A Quality HVAC Air Conditioning & Heating 1GPA A to Z Books LLC TIPS A V Pro, Inc.
    [Show full text]
  • Webkit and Blink: Open Development Powering the HTML5 Revolution
    WebKit and Blink: Open Development Powering the HTML5 Revolution Juan J. Sánchez LinuxCon 2013, New Orleans Myself, Igalia and WebKit Co-founder, member of the WebKit/Blink/Browsers team Igalia is an open source consultancy founded in 2001 Igalia is Top 5 contributor to upstream WebKit/Blink Working with many industry actors: tablets, phones, smart tv, set-top boxes, IVI and home automation. WebKit and Blink Juan J. Sánchez Outline The WebKit technology: goals, features, architecture, code structure, ports, webkit2, ongoing work The WebKit community: contributors, committers, reviewers, tools, events How to contribute to WebKit: bugfixing, features, new ports Blink: history, motivations for the fork, differences, status and impact in the WebKit community WebKit and Blink Juan J. Sánchez WebKit: The technology WebKit and Blink Juan J. Sánchez The WebKit project Web rendering engine (HTML, JavaScript, CSS...) The engine is the product Started as a fork of KHTML and KJS in 2001 Open Source since 2005 Among other things, it’s useful for: Web browsers Using web technologies for UI development WebKit and Blink Juan J. Sánchez Goals of the project Web Content Engine: HTML, CSS, JavaScript, DOM Open Source: BSD-style and LGPL licenses Compatibility: regression testing Standards Compliance Stability Performance Security Portability: desktop, mobile, embedded... Usability Hackability WebKit and Blink Juan J. Sánchez Goals of the project NON-goals: “It’s an engine, not a browser” “It’s an engineering project not a science project” “It’s not a bundle of maximally general and reusable code” “It’s not the solution to every problem” http://www.webkit.org/projects/goals.html WebKit and Blink Juan J.
    [Show full text]
  • Hardware Architectures for Secure, Reliable, and Energy-Efficient Real-Time Systems
    HARDWARE ARCHITECTURES FOR SECURE, RELIABLE, AND ENERGY-EFFICIENT REAL-TIME SYSTEMS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Daniel Lo August 2015 c 2015 Daniel Lo ALL RIGHTS RESERVED HARDWARE ARCHITECTURES FOR SECURE, RELIABLE, AND ENERGY-EFFICIENT REAL-TIME SYSTEMS Daniel Lo, Ph.D. Cornell University 2015 The last decade has seen an increased ubiquity of computers with the widespread adoption of smartphones and tablets and the continued spread of embedded cyber-physical systems. With this integration into our environ- ments, it has become important to consider the real-world interactions of these computers rather than simply treating them as abstract computing machines. For example, cyber-physical systems typically have real-time constraints in or- der to ensure safe and correct physical interactions. Similarly, even mobile and desktop systems, which are not traditionally considered real-time systems, are inherently time-sensitive because of their interaction with users. Traditional techniques proposed for improving hardware architectures are not designed with these real-time constraints in mind. In this thesis, we explore some of the challenges and opportunities in hardware design for real-time systems. Specifi- cally, we study recent techniques for improving security, reliability, and energy- efficiency of computer systems. Run-time monitoring has been shown to be a promising technique for im- proving system security and reliability. Applying run-time monitoring to real- time systems introduces challenges due to the performance impact of monitor- ing. To address this, we first developed a technique for estimating the worst- case execution time impact of run-time monitoring, enabling it to be applied within existing real-time system design methodologies.
    [Show full text]
  • Webkit and Blink: Bridging the Gap Between the Kernel and the HTML5 Revolution
    WebKit and Blink: Bridging the Gap Between the Kernel and the HTML5 Revolution Juan J. Sánchez LinuxCon Japan 2014, Tokyo Myself, Igalia and WebKit Co-founder, member of the WebKit/Blink/Browsers team Igalia is an open source consultancy founded in 2001 Igalia is Top 5 contributor to upstream WebKit/Blink Working with many industry actors: tablets, phones, smart tv, set-top boxes, IVI and home automation. WebKit and Blink Juan J. Sánchez Outline 1 Why this all matters 2 2004-2013: WebKit, a historical perspective 2.1. The technology: goals, features, architecture, ports, webkit2, code, licenses 2.2. The community: kinds of contributors and contributions, tools, events 3 April 2013. The creation of Blink: history, motivations for the fork, differences and impact in the WebKit community 4 2013-2014: Current status of both projects, future perspectives and conclusions WebKit and Blink Juan J. Sánchez PART 1: Why this all matters WebKit and Blink Juan J. Sánchez Why this all matters Long time trying to use Web technologies to replace native totally or partially Challenge enabled by new HTML5 features and improved performance Open Source is key for innovation in the field Mozilla focusing on the browser WebKit and now Blink are key projects for those building platforms and/or browsers WebKit and Blink Juan J. Sánchez PART 2: 2004-2013 WebKit, a historical perspective WebKit and Blink Juan J. Sánchez PART 2.1 WebKit: the technology WebKit and Blink Juan J. Sánchez The WebKit project Web rendering engine (HTML, JavaScript, CSS...) The engine is the product Started as a fork of KHTML and KJS in 2001 Open Source since 2005 Among other things, it’s useful for: Web browsers Using web technologies for UI development WebKit and Blink Juan J.
    [Show full text]
  • Insight Manufacturers, Publishers and Suppliers by Product Category
    Manufacturers, Publishers and Suppliers by Product Category 2/15/2021 10/100 Hubs & Switch ASANTE TECHNOLOGIES CHECKPOINT SYSTEMS, INC. DYNEX PRODUCTS HAWKING TECHNOLOGY MILESTONE SYSTEMS A/S ASUS CIENA EATON HEWLETT PACKARD ENTERPRISE 1VISION SOFTWARE ATEN TECHNOLOGY CISCO PRESS EDGECORE HIKVISION DIGITAL TECHNOLOGY CO. LT 3COM ATLAS SOUND CISCO SYSTEMS EDGEWATER NETWORKS INC Hirschmann 4XEM CORP. ATLONA CITRIX EDIMAX HITACHI AB DISTRIBUTING AUDIOCODES, INC. CLEAR CUBE EKTRON HITACHI DATA SYSTEMS ABLENET INC AUDIOVOX CNET TECHNOLOGY EMTEC HOWARD MEDICAL ACCELL AUTOMAP CODE GREEN NETWORKS ENDACE USA HP ACCELLION AUTOMATION INTEGRATED LLC CODI INC ENET COMPONENTS HP INC ACTI CORPORATION AVAGOTECH TECHNOLOGIES COMMAND COMMUNICATIONS ENET SOLUTIONS INC HYPERCOM ADAPTEC AVAYA COMMUNICATION DEVICES INC. ENGENIUS IBM ADC TELECOMMUNICATIONS AVOCENT‐EMERSON COMNET ENTERASYS NETWORKS IMC NETWORKS ADDERTECHNOLOGY AXIOM MEMORY COMPREHENSIVE CABLE EQUINOX SYSTEMS IMS‐DELL ADDON NETWORKS AXIS COMMUNICATIONS COMPU‐CALL, INC ETHERWAN INFOCUS ADDON STORE AZIO CORPORATION COMPUTER EXCHANGE LTD EVGA.COM INGRAM BOOKS ADESSO B & B ELECTRONICS COMPUTERLINKS EXABLAZE INGRAM MICRO ADTRAN B&H PHOTO‐VIDEO COMTROL EXACQ TECHNOLOGIES INC INNOVATIVE ELECTRONIC DESIGNS ADVANTECH AUTOMATION CORP. BASF CONNECTGEAR EXTREME NETWORKS INOGENI ADVANTECH CO LTD BELDEN CONNECTPRO EXTRON INSIGHT AEROHIVE NETWORKS BELKIN COMPONENTS COOLGEAR F5 NETWORKS INSIGNIA ALCATEL BEMATECH CP TECHNOLOGIES FIRESCOPE INTEL ALCATEL LUCENT BENFEI CRADLEPOINT, INC. FORCE10 NETWORKS, INC INTELIX
    [Show full text]
  • Building a Browser for Automotive: Alternatives, Challenges and Recommendations
    Building a Browser for Automotive: Alternatives, Challenges and Recommendations Juan J. Sánchez Automotive Linux Summit 2015, Tokyo Myself, Igalia and Webkit/Chromium Co-founder of Igalia Open source consultancy founded in 2001 Igalia is Top 5 contributor to upstream WebKit/Chromium Working with many industry actors: automotive, tablets, phones, smart tv, set-top boxes, IVI and home automation Building a Browser for Automotive Juan J. Sánchez Outline 1 A browser for automotive: requirements and alternatives 2 WebKit and Chromium, a historical perspective 3 Selecting between WebKit and Chromium based alternatives Building a Browser for Automotive Juan J. Sánchez PART 1 A browser for automotive: requirements and alternatives Building a Browser for Automotive Juan J. Sánchez Requirements Different User Experiences UI modifications (flexibility) New ways of interacting: accessibility support Support of specific standards (mostly communication and interfaces) Portability: support of specific hardware boards (performance optimization) Functionality and completeness can be less demanding in some cases (for now) Provide both browser as an application and as a runtime Building a Browser for Automotive Juan J. Sánchez Available alternatives Option 1) Licensing a proprietary solution: might bring a reduced time-to-market but involves a cost per unit and lack of flexibility Option 2) Deriving a new browser from the main open source browser technologies: Firefox (Gecko) Chromium WebKit (Safari and others) Mozilla removed support in their engine for third
    [Show full text]
  • Introduction to the Web
    Introduction to the Web MPRI 2.26.2: Web Data Management Antoine Amarilli 1/25 POLL: World Wide Web creation The Web was invented... • A: About at the same as the Internet • B: 2 years after the Internet • C: 5 years after the Internet • D: More than 5 years after the Internet 2/25 POLL: World Wide Web creation The Web was invented... • A: About at the same as the Internet • B: 2 years after the Internet • C: 5 years after the Internet • D: More than 5 years after the Internet 2/25 The old days 1969 ARPANET (ancestor of the Internet) 1974 TCP 1990 The World Wide Web, HTTP, HTML 1994 Yahoo! was founded 1995 Amazon.com, Ebay, AltaVista are founded 1998 Google are founded 2001 Wikipedia is created 3/25 POLL: Number of Internet domains How many domain names exist on the Internet? • A: 3 million • B: 30 million • C: 300 million • D: 3 billion 4/25 POLL: Number of Internet domains How many domain names exist on the Internet? • A: 3 million • B: 30 million • C: 300 million • D: 3 billion 4/25 Statistics • Around 370 million domains, including 150 million in .com1 • 54% of content in English and 4% in French2 • Google knows over one trillion (1012) of unique URLs3 ! The same content can live in many dierent URLs ! Parts of the Web are not indexable: the hidden Web or deep Web 1https://www.verisign.com/en_US/domain-names/dnib/index.xhtml 2https://w3techs.com/technologies/overview/content_language/all 3https://googleblog.blogspot.fr/2008/07/we-knew-web-was-big.html 5/25 POLL: Internet users Which proportion of the world population is using the Internet
    [Show full text]
  • Harrnonic Flow Analysis in Power Distribution Networks
    Harrnonic Flow Analysis in Power Distribution Networks by Nima Bayan A Thesis Submitted to the College of Graduate Studies and Research through the Electrical Engineering Program in Partial Fulfillment of the Requirements for the Degree of Master of Applied Science at the University of Windsor Windsor, Ontario 1999 National Library Bibliothèque nationale 1*1 of Canada du Canada Acquisitions and Acquisitions et Bibliographie Services services bibliographiques 395 Wellington Street 395. me Wellirigtori OttawaON KlAON4 OttawaON KlAON4 Canada Canada The author has granted a non- L'auteur a accordé une licence non exclusive licence aliowing the exclusive permettant à la National Library of Canada to Bibliothèque nationale du Canada de reproduce, loan, distribute or sel1 reproduire, prêter, distribuer ou copies of this thesis in microform, vendre des copies de cette thèse sous paper or electronic formats. la forme de microfiche/tilm, de reproduction sur papier ou sur format électronique. The author retains ownership of the L'auteur conserve la propriété du copyright in Uiis thesis. Neither the droit d'auteur qui protège cette thèse. thesis nor substantial extracts fiom it Ni la thèse ni des extraits substantiels may be printed or othenvise de celle-ci ne doivent être imprimés reproduced without the author's ou autrement reproduits sans son permission. autorisation. ONima Bayan 1999 Conventional AC electric power systems are designed to operate with sinusoidal voltages and currents. However, nonlinear and electronically switched loads will distort steady state AC voltage and current waveforrns. Periodically distorted waveforms can be studied by examining the hamonic components of the waveforms. Power system harmonic analysis investigates the generation and propagation of these components throughout the system.
    [Show full text]