Arxiv:1710.10225V2 [Cs.CR] 14 Jul 2020 to Counteract Such Attacks, Researchers Proposed So- Such As Gradient-Descent)

Total Page:16

File Type:pdf, Size:1020Kb

Arxiv:1710.10225V2 [Cs.CR] 14 Jul 2020 to Counteract Such Attacks, Researchers Proposed So- Such As Gradient-Descent) Adversarial Detection of Flash Malware: Limitations and Open Issues Davide Maiorcaa,1,∗, Ambra Demontisa,1, Battista Biggioa,b, Fabio Rolia,b, Giorgio Giacintoa aDepartment of Electrical and Electronic Engineering, University of Cagliari, Piazza dArmi 09123, Cagliari, Italy bPluribus One, Italy Abstract During the past four years, Flash malware has become one of the most insidious threats to detect, with almost 600 critical vulnerabilities targeting Adobe Flash Player disclosed in the wild. Research has shown that machine learning can be successfully used to detect Flash malware by leveraging static analysis to extract information from the structure of the file or its bytecode. However, the robustness of Flash malware detectors against well-crafted evasion attempts - also known as adversarial examples - has never been investigated. In this paper, we propose a security evaluation of a novel, representative Flash detector that embeds a combination of the prominent, static features employed by state-of-the-art tools. In particular, we discuss how to craft adversarial Flash malware examples, showing that it suffices to manipulate the corresponding source malware samples slightly to evade detection. We then empirically demonstrate that popular defense techniques proposed to mitigate evasion attempts, including re-training on adversarial examples, may not always be sufficient to ensure robustness. We argue that this occurs when the feature vectors extracted from adversarial examples become indistinguishable from those of benign data, meaning that the given feature representation is intrinsically vulnerable. In this respect, we are the first to formally define and quantitatively characterize this vulnerability, highlighting when an attack can be countered by solely improving the security of the learning algorithm, or when it requires also considering additional features. We conclude the paper by suggesting alternative research directions to improve the security of learning-based Flash malware detectors. Keywords: Adobe Flash, Malware Detection, Secure Machine Learning, Adversarial Training, Computer Security 1. Introduction namely, well-crafted manipulations of the input samples at test time [8, 9, 10] (also recently referred to as adversarial Malware detection is still a critical priority for re- examples in the context of deep learning [11, 12, 13]). The searchers and industry, as countless of polymorphic attacks efficacy of such attacks depends on the information that are continually being released [1]. In particular, a very in- the attacker possesses about the system, and on her ability sidious threat is represented by infection vectors, i.e., files to perform enough changes to the extracted features. that exploit vulnerabilities of third-party applications to The robustness of machine learning approaches against drop or execute malicious executables. Such vectors are adversarial attacks has been assessed in various case stud- typically documents (e.g., PDF, Office) or multimedia files ies. In particular, some works employed code obfuscation (e.g. Flash), and attackers leverage their structure to con- through off-the-shelf tools or custom techniques [14, 15, ceal scripting codes that exploit the target vulnerabilities. 16, 17, 18] to perform evasion. Other approaches directly For example, pages of PDF documents can hide malicious targeted the learning algorithms by employing black-box JavaScript codes or even additional executables [2, 3]. and white-box evasion techniques (e.g., by using algorithms arXiv:1710.10225v2 [cs.CR] 14 Jul 2020 To counteract such attacks, researchers proposed so- such as gradient-descent). Popular case-studies in which lutions based on machine-learning algorithms applied to these techniques have been systematically studied are the information extracted by employing static or dynamic detection of malicious PDF files [3, 19, 20, 8] and the de- analysis of the embedded code, with excellent results for tection of Android malware [21, 22, 23]. document-based infection vectors (e.g. [4, 5, 6, 7]). How- ever, research also showed that such detection approaches Multimedia malware, in particular in the Flash (also have several robustness issues against evasion attacks, known as Adobe Small Web Format - SWF) format, has been studied considerably less from the perspective of ad- versarial attacks (in particular, against white- and black- ∗Corresponding author box attacks). One of the reasons for such a lack of study is Email addresses: [email protected] (Davide Maiorca), that, albeit Flash malware caused a massive uproar start- [email protected] (Ambra Demontis), ing from 2015 (due to the significant increment of vulnera- [email protected] (Battista Biggio), [email protected] (Fabio Roli) bilities for Adobe Flash Player), its technology is going to 1Those authors contributed equally to this manuscript. be discontinued in 2020. Nevertheless, this technology is Preprint submitted to Elsevier July 15, 2020 still active from the perspective of malware-based attacks. evasion attacks entirely mimic the feature values of benign Flash-based attacks represent excellent examples of highly data, thus becoming indistinguishable for the learning al- obfuscated and evasive infection vectors. Critical vulner- gorithm. We define this vulnerability in formal terms, and abilities are still released for the Flash platform, and very quantitatively evaluate it by defining a specific metric that dangerous attacks are still possible, such as the one that measures the extent to which the attack samples converge targeted North Korea in 2018 [24]. towards benign data. We believe not only that it will take years before Flash Our findings highlight a crucial problem that must be completely stops being used, but also that analyzing Flash considered when designing secure machine-learning sys- attacks constitutes an excellent test-bench for machine tems, i.e., that of evaluating in advance the vulnerability learning-based detection. The main reason for this claim is of the given features. Indeed, vulnerable information may that most infection vectors (including the most used ones compromise the whole system even if the employed deci- at the moment - e.g., PDF, Office documents, etc.) share sion function is robust. In this respect, we sketch possible a similar organization, composed of an external structure research directions that may lead one to design more se- and a code-based content. Research on such infection vec- cure machine learning-based malware detectors. tors showed that the analysis of their structure and/or Finally, we note that we publicly released FlashBuster, content led to encouraging results in their detection, and together with the features employed in the experiments for the Flash format is no exception in this [2, 25, 26]. Hence, this paper.2 the lessons learned from the study of adversarial attacks The rest of this paper is structured as follows. Section 2 on formats like Flash can provide precious insights into the provides the basics to understand the SWF format and an robustness of systems to detect other file formats. example of ActionScript code. Section 3 describes the re- In this paper, we provide an in-depth analysis of lated work in the field. Section 4 describes the architecture Flash-based learning systems, focusing on their robustness of FlashBuster. Section 5 describes the threat model in re- against adversarial attacks. Our analysis aims to give in- lation to adversarial environments. Section 6 describes the teresting insights into how to design more secure systems evasion attacks employed in this paper. Section 7 discusses for detecting infection vectors, and to point out possible the vulnerabilities that affect learning-based systems, and vulnerabilities in the feature representations and the clas- introduces a quantitative measure of feature and learning sification algorithms. vulnerabilities. Section 8 provides the experimental eval- To this end, we first propose a representative system uation. Section 9 provides a discussion on the attained for Flash malware detection, named FlashBuster. It is a results. Section 10 closes the paper by sketching possible static machine-learning system that employs information future work. extracted by both the structure and the content of SWF files. Such an approach allows for a more comprehensive 2. ShockWave Flash File Format assessment of the extracted static information by repre- senting and combining the contents employed by previous Small Web Format (SWF) is a file type that efficiently state-of-the-art systems [25, 26]. We show that Flash- delivers multimedia contents, and it is processed by Adobe Buster could detect the majority of malware samples in Software such as Adobe Flash Player.3 the wild, by obtaining comparable performances to other SWF files are composed of three essential elements: (i) a systems at state of the art, and demonstrate that it can header that describes important file properties such as the predict previously unseen attacks. We also tested Flash- presence of compression, the version of the SWF format, Buster against popular obfuscation techniques, showing and the number of video frames; (ii) a list of tags, i.e., that our approach could also be employed in the presence data structures that establish and control the operations of obfuscated malware. performed by the reader on the file data; (iii) a unique tag We then evaluate FlashBuster robustness by simulat- called End that terminates the file. ing evasion attacks that leverage the knowledge that the
Recommended publications
  • Flash Mx Actionscript Gratis Epub, Ebook
    FLASH MX ACTIONSCRIPT GRATIS Auteur: Bob van Duuren Aantal pagina's: 242 pagina's Verschijningsdatum: 2002-07-20 Uitgever: Duuren Media, Van EAN: 9789059400108 Taal: nl Link: Download hier Macromedia Flash MX & ActionScripting * Hoe worden beoordelingen berekend? Voor het berekenen van de totale sterrenbeoordeling en de procentuele verdeling per ster gebruiken we geen gewoon gemiddelde. In plaats daarvan houdt ons systeem rekening met zaken als hoe recent een recensie is en of de recensent het item op Amazon heeft gekocht. Verder worden recensies ook geanalyseerd om de betrouwbaarheid te verifiëren. Toprecensies Recentste Toprecensies. Beste recensies uit Nederland. Er zijn 0 recensies en 0 beoordelingen van Nederland. Beste recensies uit andere landen. Vertaal alle beoordelingen naar het Nederlands. Geverifieerde aankoop. This is different. Philip achieves this in his own weighty tome nearly pages! Ze kunnen namelijk niet zonder problemen worden vergroot of verkleind. De afbeelding is voor één schermresolutie opgeslagen. Vergroten kan wel, maar dit gaat ten koste van de scherpte van de afbeelding. Vectorafbeeldingen daarentegen kunnen zonder problemen worden aangepast, omdat de coördinaten wiskundig worden herberekend met als gevolg dat vectorafbeeldingen op alle verschillende media hetzelfde worden getoond. Dit garandeert een uniforme presentatie van de gegevens. Samen met de beperkte omvang van het bestand zorgt dit voor een aantal unieke eigenschappen van Flash. Adobe Flash beschikt over een eigen programmeertaal , ActionScript, waarmee men volwaardige websites en applicaties kan ontwikkelen. In nieuwere versies van Flash, vanaf Flash MX, is het door de toevoeging van het LoadVars-object mogelijk gemaakt gemakkelijker te communiceren met MySQL en PHP , waardoor er een wereld opengegaan is voor het gebruiken van dynamische gegevens.
    [Show full text]
  • Using Replicated Execution for a More Secure and Reliable Web Browser
    Using Replicated Execution for a More Secure and Reliable Web Browser Hui Xue Nathan Dautenhahn Samuel T. King University of Illinois at Urbana Champaign huixue2, dautenh1, kingst @uiuc.edu { } Abstract Unfortunately, hackers actively exploit these vulnerabil- ities as indicated in reports from the University of Wash- Modern web browsers are complex. They provide a ington [46], Microsoft [61], and Google [49, 48]. high-performance and rich computational environment Both industry and academia have improved the se- for web-based applications, but they are prone to nu- curity and reliability of web browsers. Current com- merous types of security vulnerabilities that attackers modity browsers make large strides towards improving actively exploit. However, because major browser plat- the security and reliability of plugins by using sandbox- forms differ in their implementations they rarely exhibit ing techniques to isolate plugins from the rest of the the same vulnerabilities. browser [62, 33]. However, these browsers still scatter In this paper we present Cocktail, a system that uses security logic throughout millions of lines of code, leav- three different off-the-shelf web browsers in parallel to ing these systems susceptible to browser-based attacks. provide replicated execution for withstanding browser- Current research efforts, like Tahoma [32], the OP web based attacks and improving browser reliability. Cock- browser [36], the Gazelle web browser [59], and the Illi- tail mirrors inputs to each replica and votes on browser nois Browser Operating System [58] all propose build- states and outputs to detect potential attacks, while con- ing new web browsers to improve security. Although tinuing to run.
    [Show full text]
  • Flash E Software Libero Stefano Sabatini
    Flash e software libero Stefano Sabatini GULCh Cagliari, 2009-10-24 GULCh - Gruppo Utenti Linux Cagliari - www.gulch.it Stefano Sabatini, Flash e software libero 1 La tecnologia alla base di Flash ● Un file flash / SWF (Small Web Format / ShockWave Format) è interpretato da una macchina virtuale Flash ● I file SWF possono essere interpretati sia da un interprete standalone sia da un plugin inserito all'interno del browser. ● Il linguaggio della VM è orientato alla renderizzazione di animazioni ● Motore di rendering basato su grafica scalare ● Il linguaggio solitamente utilizzato per la programmazione degli SWF è un file Action Script (2 / 3), gli ambiente di sviluppo visuale generano automaticamente il codice (programmazione “visuale”). ● Esistono vari formati del linguaggio della VM (SWF 1– SWF 10). ● L'esecuzione di uno swiff è soggetto a delle restrizioni di sicurezza ● Con la tecnologia AIR (Adobe Integrate Realtime) è possibile utilizzare la stessa teconologia di sviluppo e renderizzazione per applicazioni desktop native (senza le limitazioni di sicurezza di Flash) ● A partire da Flash 10, supporto a un motore 3D Cagliari, 2009-10-24 GULCh - Gruppo Utenti Linux Cagliari - www.gulch.it Stefano Sabatini, Flash e software libero 2 La tecnologia alla base di Flash ● Supporto a stream multimediali: ● Video: On2 VP6 (Flash 8), Sorenson Spark (Flash 6/7), H.264 (Flash 10) ● Audio: MP3, Nellymoser, Speex (Flash 10), ADPCM ● Tecnologia di comunicazione e streaming multimediale (RTMP, RTMPT, RTMPS, RTMPE) Cagliari, 2009-10-24 GULCh - Gruppo Utenti Linux Cagliari - www.gulch.it Stefano Sabatini, Flash e software libero 3 Ambiti di utilizzo di Flash ● Presentazione di elementi multimediali all'interno di pagine web (youtube / vimeo / facebook) ● Inclusione di animazioni all'interno di pagine web (e.g.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • A Detailed Look at Cairo's Opengl Spans Compositor Performance
    A Detailed Look at Cairo's OpenGL Spans Compositor Performance Bryce Harrington – Senior Open Source Developer Samsung Research America (Silicon Valley) [email protected] Open Source Group – Silicon Valley 1 © 2013 SAMSUNG Electronics Co. What is Cairo? 2D pen-based drawing model For both display and print Includes backends for acceleration and for vector output formats Open Source Group – Silicon Valley 2 © 2013 SAMSUNG Electronics Co. http://www.tortall.net/mu/wiki/CairoTutorialhttp://www.tortall.net/mu/wiki/CairoTutorial Open Source Group – Silicon Valley 3 © 2013 SAMSUNG Electronics Co. Where is Cairo Used on the Linux Desktop? GTK+/Pango GNOME, XFCE4 Gnuplot Gnucash $$ apt-cache apt-cache rdepends rdepends libcairo2 libcairo2 | |wc wc -l -l Mozilla 712712 Evince (xpdf) Scribus Inkscape : : : Open Source Group – Silicon Valley 4 © 2013 SAMSUNG Electronics Co. Cairo Backends Format backends Platform backends ps image pdf xlib svg xcb cairo-gl quartz win32 beos Open Source Group – Silicon Valley 5 © 2013 SAMSUNG Electronics Co. Cairo-gl on the Linux Desktop Cairo-gl is not enabled for some distros (e.g. Ubuntu): --enable-gl links cairo to libgl NVIDIA's libgl gets linked to every client app Enormous RAM increase per app running (300%) See Launchpad #725434 Several GL backends supported cairo-gl (OpenGL) - EGL, GLX, WGL glesv2 (OpenGL ES 2.0) - EGL glesv3 (OpenGL ES 3.0) - EGL vg (OpenVG) - EGL, GLX cogl - experimental Open Source Group – Silicon Valley 6 © 2013 SAMSUNG Electronics Co. Cairo-gl Compositors Compositing combines visual elements into a single scene The cairo-gl backend has multiple compositors: MSAA Spans Mask Traps cairo-gl heuristically selects best compositor for operation.
    [Show full text]
  • Jabber SDK 9.2 Open Source Documentation
    Open Source Used In Jabber SDK 9.2 This document contains the licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of the source code to which you are entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-34115968 Contents 1.1 AES-128 3.0 1.1.1 Available under license 1.2 APR 1.4.6 1.2.1 Available under license 1.3 APR-UTIL 1.4.1 1.3.1 Available under license 1.4 Base64 not versioned 1.4.1 Available under license 1.5 base64.cpp 1.0 1.5.1 Available under license 1.6 csf2g_boost_1.44-modified 1.44 1.6.1 Available under license 1.7 curl 7.25.0 1.7.1 Available under license 1.8 expat 2.1.0 Open Source Used In Jabber SDK 9.2 1 1.8.1 Available under license 1.9 FireBreath 1.6.0 1.9.1 Available under license 1.10 glib 2.27.1 1.10.1 Available under license 1.11 gstreamer 0.10.35.1 1.11.1 Available under license 1.12 gstreamer-plugins-bad 0.10.22.1 1.12.1 Available under license 1.13 gstreamer-plugins-base 0.10.35.1 1.13.1 Available under license 1.14 gstreamer-plugins-good 0.10.30.1 1.14.1 Available under license 1.15 jQuery 1.4.2 1.15.1 Available under license 1.16 ldns 1.6.13 1.16.1 Available under license 1.17 liboil 0.3.16.1 1.17.1 Available under license 1.18 libxml2 2.7.7 1.18.1 Available under license 1.19 libxml2-2.7.7
    [Show full text]
  • Cisco Jabber for Ipad 9.3 Licensing Documentation
    Open Source Used In Cisco Jabber for iPad 9.3(1) Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-38358869 Open Source Used In Cisco Jabber for iPad 9.3(1) 1 This document contains the licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of the source code to which you are entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-38358869 Contents 1.1 base64.cpp 1.0 1.1.1 Available under license 1.2 Boost 1.39.0 1.2.1 Available under license 1.3 csf2g_boost_1.44-modified 1.44 1.3.1 Available under license 1.4 curl 7.21.1 1.4.1 Available under license 1.5 Expat XML Parser - expat 1.95.8 1.5.1 Available under license 1.6 glib 2.27.1 1.6.1 Available under license 1.7 gstreamer 0.10.35.1 1.7.1 Available under license 1.8 gstreamer-plugins-bad 0.10.22.1 1.8.1 Available under license 1.9 gstreamer-plugins-base 0.10.35.1 1.9.1 Available under license 1.10 gstreamer-plugins-good 0.10.30.1 1.10.1 Available under license 1.11 libxml2-2.7.7 2.7.7 1.11.1 Available under license 1.12 openldap 2.4.7 1.12.1 Available under license 1.13 OpenSSL 0.9.8l 1.13.1 Notifications Open
    [Show full text]
  • Adobe Flash Digitales Video Steffen Puhlmann 15.06.2012 Gliederung
    Adobe Flash Digitales Video Steffen Puhlmann 15.06.2012 Gliederung •Flash im Überblick •Geschichtliches •Adobe Flash Player, Adobe AIR •Zusammenhänge •Das SWF – Format •ActionScript •Das Flash Video •Das FLV - Format •Das F4V – Format •Kritik und Alternativen Flash im Überblick •Plattform für multimediale, interaktive Inhalte •Darstellung von Vektorgrafiken, Rastergrafiken und Videos •Ermöglicht Life-Streaming •Kann Nutzereingaben verarbeiten •Inhalte werden im SWF – Format gespeichert •Programmierung in ActionScript •Abspielprogramm erforderlich Einsatzgebiete •Eigentlich: •Animationswerkzeug •Früher: •Intro-Animationen • Werbebanner •Später: •Rich Internet Applications •Video Streaming •GIF Ersatz •Aktuell: •3D Browsergames Einsatzgebiete ff. Beispiel zeigen! Geschichtliches •1995: FutureWave entwickelt SmartSketch und FutureSplash •1996: Macromedia übernimmt FutureWave •FutureSplash -> Flash •Abspielprogramm: Shockwave Flash Player •1997: Flash Versionen 1 und 2 •1999: Mit Version 4: ActionScript •bis 2004: Verbesserungen vor allem bei ActionScript •2005: Adobe kauft Macromedia für 3,4 Mrd. US-Dollar •2008: Spezifikationen werden offengelegt •2011: 3D Inhalte, 64-Bit, keine Mobilgeräte Adobe Flash Player •Von Macromedia entwickelt •Plattformunabhängiges Abspielprogramm •Multimedia und interaktive Applikationen •3 Möglichkeiten •Web Browser Plug in •Standalone Player •Projector •Spielt SWF – Dateien ab •Ab Flash 6: auch FLV via RTMP – Streaming Server •Ab Flash 7: auch über HTTP - Webserver •Ab Flash 9: auch F4V •Flash Player überprüft
    [Show full text]
  • Instrucciones Para La Preparación De Ponencias Para Informática
    CAZABE: HERRAMIENTA DE AUTOR LIBRE PARA FLASH CAZABE: FREE AUTHORING TOOL FOR FLASH Darien Alonso Camacho Joven Club de Computación y Electrónica, Cuba, [email protected], Colón #222A Sagua la Grande, Villa Clara RESUMEN Cazabe could be useful to designers, cartoons El presente documento refleja un estudio makers and software developers. It might avoid realizado acerca de las opciones para la creación paying for licence of proprietary software. de animaciones y software multimedia usando tecnología flash sobre plataformas GNU/Linux. KeyWords: Flash, free software, linux, open Dada la ausencia de un entorno de desarrollo source integrado para flash en este sistema operativo, se comenzó un proyecto práctico e investigativo que permita suplir esta carencia. Se concibió un 1. INTRODUCCIÓN desarrollo colaborativo, de software libre y código Cuando en el año 2009 fueron creados los abierto, con resultados satisfactorios en la Grupos de Desarrollo de Software en los Joven implementación de la herramienta debido a que Club de Computación y Electrónica (JCCE) de se obtuvo una versión preliminar pero funcional de Cuba, se informó por parte de la dirección que el la misma. perfil de trabajo de los mismos sería el desarrollo Cazabe puede ser útil para diseñadores, de software multimedia y juegos. La plataforma animadores y desarrolladores de software en flash es ampliamente usada en entornos Microsoft general y además evitará el pago de licencias de Windows para la creación de este tipo de programas propietarios de este tipo. programas, sin embargo, al intentar usar únicamente software de código abierto para este Palabras Clave: Flash, software libre, linux, propósito, se llegó a la conclusión de que no código abierto existe una herramienta, distribuida bajo alguna licencia de software libre, que sea lo suficientemente usable para cumplir en tiempo ABSTRACT con un proyecto de envergadura.
    [Show full text]
  • Ubuntu: Powerful Hacks and Customizations
    Hacks, tips, and tricks to Krawetz put your OS into overdrive ubuntu Whether it’s speed, glitz, sounds, or security, you want to get the most out of your Ubuntu Linux system. This book shows you how to do just that. You’ll fi nd out how to customize the user interface, implement networking tools, optimize video, and more. You’ll then be able to build on these hacks to further tune, tweak, and customize Ubuntu to meet all your needs. The basic Ubuntu system is good, but with a few modifi cations, it can be made great. This book is packed with techniques that will help you: • Choose the right options when installing Ubuntu onto a Netbook, server, or other system • Install fi les for interoperability and collaborate with non-Linux systems • Tune the operating system for optimal performance ® • Enhance your graphics to take them to the next level Powerful Hacks and Customizations Powerful • Navigate the desktop, manage windows, and multitask between applications • Check for vulnerabilities and prevent undesirable access • Learn tricks to safely opening up the system with external network services Neal Krawetz, PhD, is a computer security professional with experience in computer forensics, ® profi ling, cryptography and cryptanalysis, artifi cial intelligence, and software solutions. Dr. Krawetz’s company, Hacker Factor, specializes in uncommon forensic techniques and anti-anonymity technologies. He has confi gured Ubuntu on everything from personal workstations to mission-critical servers. ubuntu Visit our Web site at www.wiley.com/compbooks $39.99 US/$47.99 CAN Powerful Hacks and Customizations ISBN 978-0-470-58988-5 Neal Krawetz Operating Systems / Linux Ubuntu® Powerful Hacks and Customizations Dr.
    [Show full text]
  • Automatic Error Elimination by Multi-Application Code Transfer Stelios Sidiroglou-Douskos, Eric Lahtinen, Fan Long, Paolo Piselli, and Martin Rinard
    Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2014-024 October 22, 2014 Automatic Error Elimination by Multi-Application Code Transfer Stelios Sidiroglou-Douskos, Eric Lahtinen, Fan Long, Paolo Piselli, and Martin Rinard massachusetts institute of technology, cambridge, ma 02139 usa — www.csail.mit.edu Automatic Error Elimination by Multi-Application Code Transfer Stelios Sidiroglou-Douskos Eric Lahtinen Fan Long Paolo Piselli Martin Rinard August 11, 2014 ABSTRACT • Error Discovery: pDNA works with a seed input that does not trigger the error and a related input We present pDNA, a system for automatically transfer- that does trigger the error. pDNA currently uses the ring correct code from donor applications into recipient DIODE integer overflow discovery tool, which starts applications to successfully eliminate errors in the recipi- with a seed input, then uses instrumented executions ent. Experimental results using three donor applications of the recipient program to find related inputs that to eliminate seven errors in four recipient applications trigger integer overflow errors at critical memory al- highlight the ability of pDNA to transfer code across appli- location sites. cations to eliminate otherwise fatal integer overflow errors • Donor Selection: pDNA next uses instrumented ex- at critical memory allocation sites. Because pDNA works ecutions of other systems that can process the same with binary donors with no need for source code or sym- inputs to find a donor that processes both the seed and bolic information, it supports a wide range of use cases. error-triggering inputs successfully. The hypothesis To the best of our knowledge, pDNA is the first system is that the donor contains a check, missing in the re- to eliminate software errors via the successful transfer of cipient, that enables it to process the error-triggering correct code across applications.
    [Show full text]
  • How to Install Software Page 1 of 6
    How to Install Software Page 1 of 6 HOW TO INSTALL SOFTWARE A. Howlett, 8 September 2004 Debian Packages A GNU/Linux system includes hundreds of Free and Open Source Software projects. For instance, the Linux kernel is a Free Software project, OpenOffice is an Open Source software project, the XFree86 Window system is an Open Source software project, and the K Desktop Environment is a Free Software project.. You could download the source code for each of these projects, compile the program and install it. Some people do that, but it requires a lot of skill and takes a long time. Another way is to let someone else compile everything and you just copy the resulting “stuff” - manual pages, shared library files, executable binary files, and so on – to your computer. There are several problems with these precompiled binary files. Most importantly, the precompiled binary might require other files on the original computer. For instance, if you compile the mplayer multimedia player, then you must have aalib1, xlibs, libncurses, and about twenty other software projects on your system. If you then copy the mplayer binary to another computer, all those other projects must be copied over also. Almost every project depends upon other projects. Before you can use the binaries from one software project, you need to know which other binaries to install – the project's dependencies. The Debian Project overcame this problem by creating the Debian Package system. Debian Project volunteers compile the software projects and build all the binaries, documentation and so forth into a debian package file.
    [Show full text]