Defending Operating Systems from Malicious Peripherals

Total Page:16

File Type:pdf, Size:1020Kb

Defending Operating Systems from Malicious Peripherals DEFENDING OPERATING SYSTEMS FROM MALICIOUS PERIPHERALS By JING TIAN A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2019 c 2019 Jing Tian For my mom, who gave up her chance to go to a college for her family but firmly believes \Knowledge is power". For my dad, who knows nothing about computer but bought me one in 1998. ACKNOWLEDGMENTS I am extremely grateful to my family, who always love and support me unconditionally; my advisor Dr. Kevin Butler, who inspires me to a faculty career and keeps inspiring me; and Xie and Fubao, who accompanied me in the past five years. I am also indebted to Dr. Patrick Traynor, who provide guidance and support all along the way. I am also grateful to Dr. Adam Bates, Dr. Bradley Reaves, Dr. Benjamin Mood, and Dr. Nolen Scaife { it is my honor to work with you guys. I would like to thank Dr. Adam Bates, Dr. Patrick McDaniel, Dr. Michael Bailey, Dr. Prabhat Mishra, Dr. Raju Rangaswami, Dr. Tom Shrimpton, and Dr. Vincent Bindschaedler, who gave strong support during my job hunting. Special thanks to Dr. Emily Rine Butler, who taught me how to write an academic paper. I had great pleasure of working with all the talented and motivated students of the FICS research. Many thanks to Grant Hernandez and Joseph Choi for their consistent support whenever my paper is on fire. I would like to thank all my co-authors on the projects described in this work { these projects would not happen without your contribution. I wish to thank our graduate coordinator Adrienne Cook, who always does her best to make sure everything is on track. I am grateful to Gary and Margurite, who keep encouraging and praying for me whenever I am blue. I owe Dr. Dejing Dou a debt of gratitude for his support during my first year in Oregon. Lastly, I would also like to thank my committee members, Dr. Swarup Bhunia, Dr. Prabhat Mishra, and Dr. Patrick Traynor, who have been accommodating in spite of tight schedules and helpful in provided feedback that helped shape this work. 4 TABLE OF CONTENTS page ACKNOWLEDGMENTS.................................4 LIST OF TABLES.....................................8 LIST OF FIGURES....................................9 ABSTRACT........................................ 12 CHAPTER 1 INTRODUCTION.................................. 13 2 BACKGROUND................................... 16 2.1 USB Security.................................. 16 2.1.1 USB Protocol.............................. 16 2.1.2 USB Attacks and Defenses....................... 18 2.2 Bluetooth and NFC Security.......................... 22 2.3 BPF/eBPF................................... 23 3 GOODUSB...................................... 25 3.1 Design...................................... 26 3.1.1 Threat Model and Assumptions.................... 27 3.1.2 Mediating USB Interfaces and Drivers................. 28 3.1.3 Identifying USB Devices........................ 29 3.1.4 Profiling Malicious USB Devices.................... 31 3.2 Implementation................................. 32 3.2.1 User Space Daemon........................... 33 3.2.2 USB Honeypot............................. 37 3.2.3 Device Class Identifier......................... 38 3.2.4 Limited HID Driver........................... 39 3.3 Evaluation.................................... 40 3.3.1 Attack Analysis............................. 40 3.3.1.1 HID-based attacks...................... 41 3.3.1.2 Other USB interfaces and composite devices........ 42 3.3.1.3 Smartphone-based USB attacks............... 42 3.3.2 Performance Analysis.......................... 43 3.4 Discussion.................................... 45 4 USBFILTER..................................... 49 4.1 Design...................................... 51 4.1.1 Threat and Trust Models........................ 51 4.1.2 Design Goals............................... 52 5 4.1.3 Design and Implementation....................... 53 4.1.3.1 Packet filtering rules..................... 54 4.1.3.2 Traceback........................... 55 4.1.3.3 Userspace control....................... 56 4.1.4 Deployment............................... 57 4.1.4.1 Platform integrity....................... 57 4.1.4.2 Runtime integrity....................... 57 4.2 Security Analylsis................................ 58 4.3 Evaluation.................................... 62 4.3.1 Case Studies............................... 62 4.3.2 Benchmarks............................... 66 4.3.2.1 Microbenchmark....................... 67 4.3.2.2 Macrobenchmark....................... 70 4.3.3 Real-world Workloads.......................... 71 4.3.4 Summary................................. 72 4.4 Discussion.................................... 72 4.4.1 Process Table.............................. 72 4.4.2 System Caching............................. 73 4.4.3 Packet Analysis From USB Devices.................. 74 4.4.4 Malicious USB Drivers and USB Covert Channels.......... 74 4.4.5 Usability Issues............................. 75 5 LINUX (E)BPF MODULES............................. 76 5.1 Design...................................... 77 5.1.1 Security Model............................. 77 5.1.2 Goals: Beyond A Reference Monitor.................. 77 5.1.3 LBM Kernel Infrastructure....................... 78 5.1.4 LBM User Space............................ 83 5.2 Implementation................................. 84 5.2.1 LBM Kernel Space........................... 84 5.2.2 LBM User Space............................ 90 5.3 Evaluation.................................... 91 5.3.1 Case Studies............................... 92 5.3.2 Benchmark Setup............................ 98 5.3.3 Micro-Benchmark............................ 99 5.3.4 Macro-Benchmark............................ 99 5.3.5 Scalability................................ 101 5.4 Discussion.................................... 105 5.4.1 LBM vs. USBFILTER vs. USBFirewall................ 105 5.4.2 L2CAP Signaling in Bluetooth..................... 105 5.4.3 BPF Memory Write........................... 106 5.4.4 BPF Helper Kernel Modules...................... 106 5.4.5 LLVM Support............................. 107 5.5 Limitations................................... 107 6 5.5.1 Stateless vs. Stateful Policy...................... 107 5.5.2 DMA-Oriented Protocols........................ 108 5.5.3 Operating Systems Dependency.................... 108 5.5.4 Lbmtool Limitations.......................... 109 6 USB TYPE-C AUTHENTICATION........................ 110 6.1 Authentication Protocol............................ 110 6.1.1 USB Certificate Authorities...................... 112 6.1.2 Authentication Protocol........................ 112 6.1.3 Secure Key Storage and Processing.................. 113 6.1.4 Security Policy.............................. 113 6.2 Formal Verification............................... 114 6.3 Other Issues................................... 117 7 REFLECTIONS ON PERIPHERAL SECURITY................. 120 7.1 Future Work................................... 121 7.2 Conclusion.................................... 123 APPENDIX A A LUM EXAMPLE TO BLOCK SCSI WRITES................. 124 B LBMTOOL FRONTEND GRAMMAR....................... 125 C LBMTOOL COMPILATION EXAMPLE..................... 126 D LMBENCH RESULTS FOR LBM......................... 128 REFERENCES....................................... 130 BIOGRAPHICAL SKETCH................................ 141 7 LIST OF TABLES Table page 2-1 Notable real-world attacks on the USB/Peripheral ecosystem, grouped by the layer at which they operate and the offensive primitive of which they are an instance. 20 3-1 Microbenchmarking GoodUSB operation (in microseconds) averaged over 20 runs. 44 4-1 Prolog reasoning time (µs) averaged by 100 runs.................. 67 4-2 Rule adding operation time (ms) averaged by 100 runs............... 67 4-3 USB enumeration time (ms) averaged by 20 runs.................. 68 4-4 Packet filtering time (µs) averaged by 1500 packets................. 68 4-5 Latency (ms) of the fileserver workload with different mean file sizes....... 69 5-1 LBM compared to USBFILTER and USBFirewall. LBM unifies USBFILTER and USBFirewall, providing a superset their properties via extensible protocol support......................................... 81 5-2 LBM vs. USBFILTER vs. USBFirewall, specifically with respect to filter design of each......................................... 82 5-3 LBM statistics per subsystem, including # of fields exposed to the user space, # of BPF helpers implemented, and # of lines of code changes.......... 87 5-4 The number of lines added to support NFC..................... 98 5-5 Details about the five LBM rules used during the benchmarks........... 98 5-6 LBM overhead in µs based on processing 10K packets on the RX path. For each subsystem, the 1st row is for normal LBM and the 2nd row is for LBM-JIT. In most cases, the overhead of is within 1 µs when JIT is enabled.......... 99 D-1 lmbench results for a Vanilla kernel, LBM, and LBM-JIT............. 129 8 LIST OF FIGURES Figure page 2-1 Peripheral vulnerabilities can be classified by the abstracted communications layer at which they operated. A successful attack involves violating a design assumption or implementation error at a given layer................ 17 2-2 A USB device containing two configurations. Configuration 1 contains two interfaces, and configuration 2 contains one interface. Each interface supports two unidirectional communication channels (In/Out) with the host machine. Each channel
Recommended publications
  • Chapter 12: Mass-Storage Systems
    Chapter 12: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space Management RAID Structure Disk Attachment Stable-Storage Implementation Tertiary Storage Devices Operating System Issues Performance Issues Objectives Describe the physical structure of secondary and tertiary storage devices and the resulting effects on the uses of the devices Explain the performance characteristics of mass-storage devices Discuss operating-system services provided for mass storage, including RAID and HSM Overview of Mass Storage Structure Magnetic disks provide bulk of secondary storage of modern computers Drives rotate at 60 to 200 times per second Transfer rate is rate at which data flow between drive and computer Positioning time (random-access time) is time to move disk arm to desired cylinder (seek time) and time for desired sector to rotate under the disk head (rotational latency) Head crash results from disk head making contact with the disk surface That’s bad Disks can be removable Drive attached to computer via I/O bus Busses vary, including EIDE, ATA, SATA, USB, Fibre Channel, SCSI Host controller in computer uses bus to talk to disk controller built into drive or storage array Moving-head Disk Mechanism Overview of Mass Storage Structure (Cont.) Magnetic tape Was early secondary-storage medium Relatively permanent and holds large quantities of data Access time slow Random access ~1000 times slower than disk Mainly used for backup, storage of infrequently-used data, transfer medium between systems Kept in spool and wound or rewound past read-write head Once data under head, transfer rates comparable to disk 20-200GB typical storage Common technologies are 4mm, 8mm, 19mm, LTO-2 and SDLT Disk Structure Disk drives are addressed as large 1-dimensional arrays of logical blocks, where the logical block is the smallest unit of transfer.
    [Show full text]
  • Linux Software User's Manual
    New Generation Systems (NGS) Linux Software User’s Manual Version 1.0, September 2019 www.moxa.com/product © 2019 Moxa Inc. All rights reserved. New Generation Systems (NGS) Linux Software User’s Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice © 2019 Moxa Inc. All rights reserved. Trademarks The MOXA logo is a registered trademark of Moxa Inc. All other trademarks or registered marks in this manual belong to their respective manufacturers. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Moxa China (Shanghai office) Toll-free: 1-888-669-2872 Toll-free: 800-820-5036 Tel: +1-714-528-6777 Tel: +86-21-5258-9955 Fax: +1-714-528-6778 Fax: +86-21-5258-5505 Moxa Europe Moxa Asia-Pacific Tel: +49-89-3 70 03 99-0 Tel: +886-2-8919-1230 Fax: +49-89-3 70 03 99-99 Fax: +886-2-8919-1231 Moxa India Tel: +91-80-4172-9088 Fax: +91-80-4132-1045 Table of Contents 1.
    [Show full text]
  • Use External Storage Devices Like Pen Drives, Cds, and Dvds
    External Intel® Learn Easy Steps Activity Card Storage Devices Using external storage devices like Pen Drives, CDs, and DVDs loading Videos Since the advent of computers, there has been a need to transfer data between devices and/or store them permanently. You may want to look at a file that you have created or an image that you have taken today one year later. For this it has to be stored somewhere securely. Similarly, you may want to give a document you have created or a digital picture you have taken to someone you know. There are many ways of doing this – online and offline. While online data transfer or storage requires the use of Internet, offline storage can be managed with minimum resources. The only requirement in this case would be a storage device. Earlier data storage devices used to mainly be Floppy drives which had a small storage space. However, with the development of computer technology, we today have pen drives, CD/DVD devices and other removable media to store and transfer data. With these, you store/save/copy files and folders containing data, pictures, videos, audio, etc. from your computer and even transfer them to another computer. They are called secondary storage devices. To access the data stored in these devices, you have to attach them to a computer and access the stored data. Some of the examples of external storage devices are- Pen drives, CDs, and DVDs. Introduction to Pen Drive/CD/DVD A pen drive is a small self-powered drive that connects to a computer directly through a USB port.
    [Show full text]
  • Man Pages Section 3 Library Interfaces and Headers
    man pages section 3: Library Interfaces and Headers Part No: 816–5173–16 September 2010 Copyright © 2010, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related software documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are “commercial computer software” or “commercial technical data” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms setforth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065.
    [Show full text]
  • DA-681 Series Linux User's Manual V2
    DA-681 Series Linux User’s Manual Second Edition, May 2009 www.moxa.com/product © 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. DA-681 Series Linux User’s Manual The Moxa software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice Copyright © 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Trademarks MOXA is a registered trademark of Moxa Inc. All other trademarks or registered marks in this manual belong to their respective manufacturers. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document “as is,” without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa
    [Show full text]
  • Training USB Linux Drivers: Writing USB-2.0 and USB-3.0 Host and Gadget Drivers on Linux - Operating Systems: Android
    Training USB Linux Drivers: Writing USB-2.0 and USB-3.0 host and gadget drivers on Linux - Operating Systems: Android D8 - USB Linux Drivers Writing USB-2.0 and USB-3.0 host and gadget drivers on Linux Objectives Learn to write Linux drivers for USB-2.0 and USB-3.0 Explore the Linux USB host-driver stack Learn the structure of USB device drivers Discover USB gagdet drivers (2.0 and 3.0) Understand the support for OTG-2.0 and OTG-3.0. Understand the specifics of the Linux kernel in the management of devices and drivers. Learn to configure the Linux kernel for optimal hotplug management. Understand how hotplug events are generated and how to use them in drivers. Install and use external hotplug daemons: udev, libusb, etc ... Discover Linux kernel changes up to the latest versions (up to 3.6.39 and 3.x). Master the techniques of kernel debugging. We use a recent linux kernel, as provided by the distribution used or available on www.kernel.org. Labs are conducted on target boards, that can be: Atmel ARM9-based boards, with Lauterbach JTAG probes. Labs are conducted using the System Workbench for Linux - Basic Edition IDE, for which all trainees will get a free license, so that they can continue to work, after the training, in a convenient and efficient environment. --> Course environment A PC workstation and a target board per two trainees group. Printed course material. Prerequisite Good practice of C programming on Linux Good knowledge of Linux kernel and driver programming (see our D3 - Linux Drivers course and D7 - Linux drivers hotplug and power management courses) Plan First day D8 - USB Linux Drivers 09/23/21 Reminders on kernel programming Reminders on kernel module development Kernel objects Exercice: Writing a kernel module creating and using kernel objects and sets The sysfs file system Exercice: Interacting with a kernel module through a kernel object and the sysfs file sytem Hotplug Hotplug in the kernel uevents Exercice: Writing a kernel module sending hotplug events to a user mode program.
    [Show full text]
  • KREATIVE GRAFIK Xargs • GRAFIK-TOOLS Logo-Design Mit Inkscape S
    Qubes OS: Mehr Sicherheit COMMUNITY-EDITIONXargs: Praktischer Helfer durch Xen-Virtualisierung S. 6 für Befehlsverkettungen S. 92 Frei kopieren und beliebig weiter verteilen ! 02.2015 02.2015 Malen, zeichnen, animieren: Die besten Programme für Pixel- und Vektorgrafik TOOLS GRAFIK- • KREATIVE GRAFIK Xargs • GRAFIK-TOOLS Logo-Design mit Inkscape S. 30 Pixart-Künstler mtPaint S. 27 • Swiss File Knife Illustrationen mit Draw, SSD-Tuning Screencasts mit SSR S. 18, 22 Grafiktabletts optimal konfigurieren S. 36 • Qubes OS Semplice Dreimal Fedora 21: Fit fürs nächste Jahrzehnt S. 14 Spezialisierte Versionen für jeden Einsatzzweck, neue Tools, optionales Wayland, mehr Systemd: Wie sich Red Hats Community-Distribution für die Zukunft rüstet Gimp-Plugins Hollywoodreifer Schnitt S. 70 SSDs voll ausreizen S. 84 So zaubert Lightworks 12 beeindruckende Wie Sie den letzten Rest Leistung Effekte und Übergänge in Ihre Videoclips aus dem Flash-Speicher quetschen • Fedora 21 • • Fedora Top-Distris E-Books • auf zwei Heft-DVDs FEDORA 21 • LIGHTWORKS • SLAP • SYSTEMBACK • XARGS • • XARGS • SYSTEMBACK • LIGHTWORKSSLAP • 21 FEDORA EUR 8,50 EUR 9,35 sfr 17,00 EUR 10,85 EUR 11,05 EUR 11,05 2 DVD-10 02 www.linux-user.de Deutschland Österreich Schweiz Benelux Spanien Italien 4 196067 008502 02 001-001_titel_LU_02.indd 1 22.12.14 12:59 Editorial Zahlenspiele Sehr geehrte Leserinnen und Leser, mit schöner Regelmäßigkeit überschlu­ sammenstellungen überlebt also lang­ gen sich in den vergangenen Jahren vor fristig. Trotzdem stehen heute gut allem US­Computermedien darin, zu Jah­ 260 Distributionen zur Auswahl, da­ resbeginn das „Jahr des Linux­Desktops“ von 166 explizit für den Desktop. auszurufen. 2015 allerdings sucht man Anders, als man denken könnte, han­ entsprechende Schlagzeilen vergeblich, delt es sich bei Ubuntu und Co.
    [Show full text]
  • Perfect Devices: the Amazing Endurance of Hard Disk Drives Giora J
    T TarnoTek Perfect Devices: The Amazing Endurance of Hard Disk Drives Giora J. Tarnopolsky TARNOTEK & INSIC - Information Storage Industry Consortium www.tarnotek.com [email protected] www.insic.org 2004 - Mass Storage Systems & Technologies Outline z Perfect Inventions z Hard Disk Drives & other consumer products z Hard Disk Drives: Developments 1990 - 2004 z Marketplace z How the technology advances have affected the product offerings z Technology z How market opportunities propelled basic research forward z Disk Drives at the Boundaries z INSIC and Data Storage Systems Research z Closing Remarks: Hard Disk Drive Endurance Giora J. Tarnopolsky HDD - Perfect Devices © 2002-2004\14 April 2004\2 TARNOTEK 2004 - Mass Storage Systems & Technologies PERFECT INVENTIONS Giora J. Tarnopolsky HDD - Perfect Devices © 2002-2004\14 April 2004\3 TARNOTEK 2004 - Mass Storage Systems & Technologies Nearly Perfect Inventions z Certain inventions are created “perfect:” their operation relies on a fundamental principle that cannot be improved, or does not merit improvement z This assures their endurance … z … and defines their domain of development, the limits of applicability of the invention z Examples of perfect inventions are the bicycle, the umbrella, the book, and the disk drive Giora J. Tarnopolsky HDD - Perfect Devices © 2002-2004\14 April 2004\4 TARNOTEK 2004 - Mass Storage Systems & Technologies Bicycle z Gyroscope effect assures stability of the rider z Under torque T, the bike turns but does not fall z Low ratio of vehicle mass to rider mass z ~ 15 % (as compared to ~2,200% for car) z Efficient r T z Rugged r dL z Mass-produced r dt L z Affordable Giora J.
    [Show full text]
  • USBESAFE: an End-Point Solution to Protect Against USB-Based Attacks
    USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks Amin Kharraz†‡ Brandon L. Daley ‡ Graham Z. Baker William Robertson‡ Engin Kirda‡ MIT Lincoln Laboratory †University of Illinois at Urbana-Champaign ‡Northeastern University Abstract automatically scans removable devices including USB sticks, memory cards, external hard drives, and even cameras after Targeted attacks via transient devices are not new. How- being plugged into a machine. Unfortunately, bypassing such ever, the introduction of BadUSB attacks has shifted the attack checks is often not very difficult as the firmware of USB de- paradigm tremendously. Such attacks embed malicious code vices cannot be scanned by the host. In fact, the introduction in device firmware and exploit the lack of access control in of BadUSB attacks has shifted the attack paradigm tremen- the USB protocol. In this paper, we propose USBESAFE as a dously as adversaries can easily hide their malicious code mediator of the USB communication mechanism. By lever- in the firmware, allowing the device to take covert actions aging the insights from millions of USB packets, we propose on the host [9]. A USB flash drive could register itself as techniques to generate a protection model that can identify both a storage device and a Human Interface Device (HID) covert USB attacks by distinguishing BadUSB devices as a such as a keyboard, enabling the ability to inject surreptitious set of novel observations. Our results show that USBESAFE keystrokes to carry out malice. works well in practice by achieving a true positive [TP] rate of 95.7% with 0.21% false positives [FP] with latency as low Existing defenses against malicious USB devices have re- as three malicious USB packets on USB traffic.
    [Show full text]
  • La Trayectoria De Cambio De Los Sistemas Operativos De Conectar
    STS, Simposio Argentino sobre Tecnología y Sociedad La trayectoria de cambio de los sistemas operativos de Conectar Igualdad (2010 - 2015) Por María del Valle Nuñez (a)y Ariel Vercelli (b) (a) UNRN / Ciclos de Licenciatura en Educación / Sede Atlántica mvnunez@unrn .edu.ar Av. Don Bosco y Leloir - Viedma (R8500AEC) - Río Negro y (b) CONICET / IESCT-UNQ [email protected] Roque Sáenz Peña 352, Bernal, Buenos Aires Resumen. Esta ponencia presenta la investigación de tesis de Maestría en Ciencia Tecnología y Sociedad “Los sistemas operativos de Conectar Igualdad: Análisis socio- técnico sobre las tensiones por el carácter del software (2010-2015). En el año 2010 se lanzó el Programa Conectar Igualdad, una política pública socio-educativa de alcance federal. Su meta fue recuperar y valorizar la escuela pública y reducir las brechas digitales, educativas y sociales en Argentina, mediante la incorporación de computadoras portátiles en los procesos de enseñanza. Conectar Igualdad distribuyó alrededor de 5 millones de netbooks entre los años 2010 y 2015 con un modelo 1 a 1 (una computadora por alumno y docente de las escuelas secundarias, de educación especial y de los institutos de formación docente del ámbito de la educación pública). Esta incorporación masiva de netbooks provocó tensiones políticas, tecnológicas, económicas, educativas, pedagógicas, legales y filosóficas, entre otras. Una de estas tensiones, una de las más complejas, giró en torno a los sistemas operativos se usarían en las computadoras de Conectar Igualdad. A las escuelas no arribaron tecnologías digitales neutras, instrumentales, naturalizadas, deshistorizadas y apolíticas. Entre los años 2010 y 2015 las netbooks ofrecieron siete sistemas operativos.
    [Show full text]
  • USB Mass Storage Device (MSD) Bootloader
    Freescale Semiconductor Document Number: AN4379 Application Note Rev. 0, October 2011 Freescale USB Mass Storage Device Bootloader by: Derek Snell Freescale Contents 1 Introduction 1 Introduction................................................................1 Freescale offers a broad selection of microcontrollers that 2 Functional description...............................................2 feature universal serial bus (USB) access. A product with a 3 Using the bootloader.................................................9 USB port allows very easy field updates of the firmware. This application note describes a mass storage device (MSD) USB 4 Porting USB MSD device bootloader to bootloader that has been written to work with several other platforms.........................................................13 Freescale USB families. A device with this bootloader is 5 Developing new applications..................................15 connected to a host computer, and the bootloader enumerates as a new drive. The new firmware is copied onto this drive, 6 Conclusion...............................................................20 and the device reprograms itself. Freescale does offer other bootloaders. For example, application note AN3561, "USB Bootloader for the MC9S08JM60," describes a USB bootloader that was written for the Flexis JM family. The MSD bootloader described in this application note is offered as another option, and has these advantages: • It does not require a driver to be installed on the host. • It does not require an application to run on the host. • Any user can use it with a little training. The only action required is to copy a file onto a drive. • It can be used with many different host operating systems since it requires no host software or driver This bootloader was specifically written for several families of Freescale microcontrollers that share similar USB peripherals. These families include, but are not limited to, the following: • Flexis JM family MCF51JM © 2011 Freescale Semiconductor, Inc.
    [Show full text]
  • America Exposed Who’S Watching You Through Your Computer’S
    America Exposed Who’s Watching You Through Your Computer’s Camera? May 2017 By: James Scott, Senior Fellow, The Institute for Critical Infrastructure Technology 1 America Exposed Who’s Watching You Through Your Computer’s Camera May 2017 Authored by: James Scott, Sr. Fellow, ICIT Except for (1) brief quotations used in media coverage of this publication, (2) links to the www.icitech.org website, and (3) certain other noncommercial uses permitted as fair use under United States copyright law, no part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher. For permission requests, contact the Institute for Critical Infrastructure Technology. Copyright © 2017 Institute for Critical Infrastructure Technology – All Rights Reserved ` 2 Support ICIT & Increase Webcam Privacy CamPatch®, the world’s leading manufacturer of webcam covers, is proud to donate 100% of net proceeds to ICIT. Custom Branded Webcam Covers are a powerful tool for security training initiatives, and are a valuable and impactful promotional giveaway item. Visit www.CamPatch.com or contact [email protected] to learn more. Upcoming Events The Annual ICIT Forum June 7, 2017, The Four Seasons Washington D.C. www.icitforum.org ` 3 Contents Are You Being Watched? .............................................................................................................................. 4 Computing Devices
    [Show full text]