KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities

Total Page:16

File Type:pdf, Size:1020Kb

KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities Weiteng Chen Xiaochen Zou Guoren Li Zhiyun Qian UC Riverside UC Riverside UC Riverside UC Riverside Abstract from Microsoft [37], around 70% of security bugs that were The monolithic nature of modern OS kernels leads to a con- fixed between 2006 and 2018 are memory safety bugs. These stant stream of bugs being discovered. It is often unclear bugs can lead to serious consequences such as privilege esca- which of these bugs are worth fixing, as only a subset of them lation, allowing an attacker to gain complete control over a may be serious enough to lead to security takeovers (i.e., privi- system [6, 57, 59]. lege escalations). Therefore, researchers have recently started What’s worse, because these alleged security bugs are re- to develop automated exploit generation techniques (for UAF ported every day, it is challenging for developers to keep bugs) to assist the bug triage process. In this paper, we inves- up. According to the Google’s syzbot dashboard [25], which tigate another top memory vulnerability in Linux kernel — reports bugs from continuously fuzzing Linux kernels, in a out-of-bounds (OOB) memory write from heap. We design single year (from Aug 2017 to Sep 2018), there were 1,216 KOOBE to assist the analysis of such vulnerabilities based Linux kernel bugs discovered by syzkaller [26] and fixed. on two observations: (1) Surprisingly often, different OOB This translates to an average of 3.42 Linux kernel bugs dis- vulnerability instances exhibit a wide range of capabilities. covered daily by syzbot alone. It is no surprise that it has taken (2) Kernel exploits are multi-interaction in nature (i.e., mul- developers weeks and even months to fix security bugs [34]. tiple syscalls are involved in an exploit) which allows the Given such a long procedure, the key missing piece is the exploit crafting process to be modular. Specifically, we fo- ability to separate wheat from chaff — prioritizing the fix of cus on the extraction of capabilities of an OOB vulnerability security bugs that are positively exploitable. To this end, a which will feed the subsequent exploitability evaluation pro- promising direction is to automate the exploit generation of cess. Our system builds on several building blocks, including common types of memory corruption vulnerabilities [12, 17, a novel capability-guided fuzzing solution to uncover hidden 27, 54, 56] and prioritize those that are eminently exploitable. capabilities, and a way to compose capabilities together to These studies employ various program analysis techniques to further enhance the likelihood of successful exploitations. In search for a possible exploit path (that can achieve arbitrary our evaluation, we demonstrate the applicability of KOOBE code execution) given a Proof-of-Concept (PoC) test case. by exhaustively analyzing 17 most recent Linux kernel OOB Exploits of OS kernel vulnerabilities have unique charac- vulnerabilities (where only 5 of them have publicly available teristics compared to those of user applications — any kernel exploits), for which KOOBE successfully generated candi- exploit is multi-interaction by design, involving a sequence date exploit strategies for 11 of them (including 5 that do of attacker-chosen inputs (i.e., syscalls and their arguments) not even have any CVEs assigned). Subsequently from these where one is dependent on another; this is in contrast with strategies, we are able to construct fully working exploits for many user applications such as command line programs that all of them. take input in one-shot. Coupled with the fact that OS kernels maintain massive internal states, they lead to a huge search space to locate exploitable states. In practice, many more 1 Introduction syscalls are typically added to a PoC to form an exploit that can fully hijack the control flow or escalate privileges. Operating system (OS) kernels play a critical role in securing On the other hand, multi-interaction exploits also create the computing infrastructure that we rely on on a daily basis. opportunities for “divide-and-conquer” where we break down Unfortunately, OS kernels such as Linux are mostly written in an exploit into a series of goals which can be reasoned about the C language which is inherently type unsafe and frequently and achieved separately. Up to this point, only the use-after- leads to memory safety errors. According to a recent report free (UAF) bugs have been explored in the context of kernel exploit generation [56, 57]. and we believe it represents an important step towards the In this paper, we investigate another top memory vulnera- ultimate goal. Specifically, given a PoC triggering one or bility in Linux kernel — out-of-bounds (OOB) memory write more OOB accesses, our system generates exploit primitives from heap (25 UAF write vs. 28 heap OOB write bugs from to achieve Instruction Pointer (IP) hijacking. Aug 2017 to Sep 2018 on syzbot [25]). As the name suggests, We assume that the kernel is protected by widely-deployed OOB vulnerabilities cause the kernel to access locations out- defenses including Address Space Layout Randomization side of the expected memory region (e.g., writing outside of (KASLR), Supervisor Mode Execution Prevention (SMEP), a heap buffer). Exploiting Linux kernel OOB memory write and Supervisor Mode Access Prevention (SMAP). How- vulnerabilities (OOB vulnerabilities in short) presents unique ever, bypassing them is usually performed after a successful challenges. Surprisingly often, different OOB vulnerability IP hijacking and thus considered independent of this work instances exhibit a wide range of capabilities, which we con- (see §4.5). Nevertheless, complementary techniques exist that sider roughly as how much maneuver space a vulnerability can address these limitations [32,55,57]. Among these, KE- gives to the attacker. In the case of OOB, the capabilities are PLER [55] is especially noteworthy as it can automatically defined in terms of how far the write can reach, how many turn IP controls into arbitrary code execution unconditionally. bytes can be written, and what value can be written (see a more formal and complete definition in §4.2). For example, 3 Background and Motivating Example CVE-2016-6187 can overwrite only one single byte; CVE- 2017-7184 can write more bytes but only the same fixed value. The basic idea in crafting a kernel OOB write exploit is Coupled with the diversity of kernel memory objects and their straightforward — when an OOB write access occurs, an ad- fitness of exploitation (e.g., whether a function pointer ex- versary would pre-arrange the memory layout such that some ists at a desired offset), it effectively becomes a necessity to critical data is overwritten (e.g., a function pointer), which understand and summarize the precise capability of individ- can be used to perform control flow hijacking. However, in ual kernel OOB vulnerabilities. Even worse, we find that a practice it is often labor-intensive and sometimes infeasible PoC (e.g., generated by syzkaller [26]) sometimes fails to for a security analyst to manually craft an exploit. As we will exercise the complete capability of a vulnerability, making it elaborate through a real-world kernel OOB vulnerability, this seemingly unexploitable. is because that (1) a PoC program may not fully explore the To this end, we develop KOOBE that automates the pro- capability of an OOB vulnerability; (2) there is often a huge cess of all key steps in evaluating a kernel OOB vulnerability, search space to locate an appropriate memory layout that can focusing on the key module of capability extraction, which facilitate the exploit. We go through a concrete example to feeds into subsequent exploitability evaluation. We demon- illustrate this process. strate the applicability of KOOBE by analyzing 17 OOB Fig. 1a shows a simplified excerpt of the vulnerable code in vulnerabilities (7 CVEs), for which KOOBE successfully Linux Kernel 4.14.0 (CVE-2018-5703). Following the same generated candidate exploit strategies for 11 of them. terminology in [54], we denote the site where the security We make the following contributions: violation happens, e.g., Kernel Address Sanitizer (KASAN) reports an OOB access at line 12, as a vulnerability point. • We distill key challenges in exploiting Linux kernel OOB Also, a typical heap OOB exploit involves two kinds of ob- vulnerabilities and design an effective analysis frame- jects: we denote the object intended to be accessed as the work focusing on capability extraction that captures the vulnerable object (vul in line 12) and the overwritten one intrinsics of this specific type of vulnerabilities. containing critical data (e.g., a function pointer) as the target • We implement KOOBE primarily on top of Syzkaller, object. As we can see in this example, the size of the vul- S2E and Angr with 10,887 LoC. We release the source nerable object is fixed, but there is a type confusion bug at code of KOOBE to facilitate further research (https: line 11 leading to an OOB write at line 12 (where 8 addi- //github:com/seclab-ucr/KOOBE). tional bytes will be overwritten). At first glance, we might conclude that this vulnerability allows a write of a constant • We thoroughly evaluate KOOBE using known CVEs 0x08080000000000, which is not so interesting as it is neither as well as crash reports from syzbot. We show that it is a valid kernel space pointer nor user space pointer. However, extremely effective to aid the exploit crafting process. the overflown content is in fact controllable by an adversary if sys_setsockopt is invoked before triggering the OOB 2 Scope and Assumptions access (its argument controls the value of gsock.option). Unfortunately, this invocation is missing in the original PoC, Automatic Exploit Generation (AEG) against monolithic ker- limiting the value/exploitability of the bug.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Effective Unified Communications As a Service (Ucaas)
    The Definitive Guide to UCaaS: Simplifying Unified Communications as a Service Table of Contents Complex and Expensive................... 3 Effective unified communications as a service Talking VoIP...................................... 4 (UCaaS) promises to deliver seamless, secure, and Communication System Patchwork.. 5 cost-effective communications—across multiple UCaaS in a Nutshell......................... 6 channels (voice, text, video, etc.), and on different Multiple Payoffs................................ 7 devices, anywhere the user needs it. The Real Risk................................... 8 Maximizing User Adoption................ 9 With UCaaS, virtually any business can realize the The Only Practical Solution: UCaaS. 10 benefits of a simpler, more cost effective way to UCaaS and Collaboration................ 11 communicate and collaborate. A trucking company Benefits of UCaaS........................... 12 saves on long distance charges and gains better Moving Forward with UCaaS........... 13 connections to customers. A global commerce company cuts costs and increases employee engagement with richer meetings leveraging VoIP and video. But how do you get there? Read on to learn about moving enterprise communications to the cloud, challenges behind unified communications, the role of the user, and the multiple pay-offs of successful UCaaS and collaboration. “With the modern, global workplace being increasingly disconnected due to differences in time and location, the need for effective unified communications and collaboration
    [Show full text]
  • Terell Johnson (323) 323-0646 [email protected] Unified Communication and Collaboration Engineer Linkedin.Com/In/Terelljayjohn Son
    8692 Falmouth Ave #3 Playa Del Rey, Ca 90293 Terell Johnson (323) 323-0646 [email protected] Unified Communication and Collaboration Engineer linkedin.com/in/terelljayjohn son EXPERIENCE SKILLS Video Engineer Snapchat, ​Venice, CA —IT Video Engineer Voice Engineer April 2017 - PRESENT IT Infrastructure Video Engineer and service owner responsible for Streaming and Content designing, deploying and managing all internal Video Conferencing, Live Delivery Streaming, Voice, Video and Collaboration technologies used globally by Collaboration Engineer Snap Inc. Placed, Looksery and Zen.ly..​F Enterprise Design Deployment Facebook, Menlo Park, CA—UC Engineer SEPT 2015 - APR 2017 Operations Engineer supporting Facebook's Global Video Conference Administration Infrastructure as apart of the AV/VC Team. Designed Global Dial plan and Cisco VCS worked cross functional with other Facebook Collaboration teams, Service Providers, VARs, and Vendors. Cisco TMS Cisco Call Manager Cisco Systems (Insight Global), ​San Jose, CA​ ​—UC Engineer Fuze FEB 2012 – SEP 2015 Zoom Cloud Conferencing Engineering Lead for the Advanced Cisco Experience Hangouts Meet Team supporting the Cisco Worldwide Sales Organization in rolling out WebEx Collaboration Meeting and TelePresence Cloud Conferencing Okta Solution. Architect and Partner Engineer for the rollout of and integration Teem of VBrick Content Management System. Jira Scrum master and site admin for creating group workflows for managing products, bugs, enhancements, and various types of team projects for Cisco IT, ACE, and Software Innovation Group. Infrastructure Cisco UCS Cisco Systems (Insight Global), ​San Jose, CA​ ​—Lead Video Analyst and QA Engineer VMWare FEB 2010 – OCT 2014 Lead QA Engineer and Service Manager for the ACE Endpoint Experience AWS Validation Team.
    [Show full text]
  • 1 Before the U.S. COPYRIGHT OFFICE, LIBRARY of CONGRESS
    Before the U.S. COPYRIGHT OFFICE, LIBRARY OF CONGRESS In the Matter of Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies Under 17 U.S.C. §1201 Docket No. 2014-07 Reply Comments of the Electronic Frontier Foundation 1. Commenter Information Mitchell L. Stoltz Corynne McSherry Kit Walsh Electronic Frontier Foundation 815 Eddy St San Francisco, CA 94109 (415) 436-9333 [email protected] The Electronic Frontier Foundation (EFF) is a member-supported, nonprofit public interest organization devoted to maintaining the traditional balance that copyright law strikes between the interests of rightsholders and the interests of the public. Founded in 1990, EFF represents over 25,000 dues-paying members, including consumers, hobbyists, artists, writers, computer programmers, entrepreneurs, students, teachers, and researchers, who are united in their reliance on a balanced copyright system that ensures adequate incentives for creative work while promoting innovation, freedom of speech, and broad access to information in the digital age. In filing these reply comments, EFF represents the interests of the many people in the U.S. who have “jailbroken” their cellular phone handsets and other mobile computing devices—or would like to do so—in order to use lawfully obtained software of their own choosing, and to remove software from the devices. 2. Proposed Class 16: Jailbreaking – wireless telephone handsets Computer programs that enable mobile telephone handsets to execute lawfully obtained software, where circumvention is accomplished for the sole purposes of enabling interoperability of such software with computer programs on the device or removing software from the device. 1 3.
    [Show full text]
  • Facebook's Libra 2.0: Why You Might Like It Even If We Can't Trust Facebook
    f JUNE 2020 Facebook’s Libra 2.0: Why you might like it even if we can’t trust Facebook ______________________________________________________ Timothy G. Massad Senior Fellow, The John F. Kennedy School of Government, Harvard University This report is available online at: https://www.brookings.edu The Brookings Economic Studies program analyzes current and emerging economic issues facing the United States and the world, focusing on ideas to achieve broad-based economic growth, a strong labor market, sound fiscal and monetary pol- icy, and economic opportunity and social mobility. The re- search aims to increase understanding of how the economy works and what can be done to make it work better. ECONOMIC STUDIES AT BROOKINGS Contents About the Author ................................................................................................................... 3 Statement of Independence ................................................................................................... 3 Acknowledgements ................................................................................................................ 3 Introduction ........................................................................................................................... 5 What this paper is about .................................................................................................... 6 A summary of my own views ............................................................................................. 7 The organization of the paper ...........................................................................................
    [Show full text]
  • The Aragon Research Globe™ for Intelligent Contact Centers, 2021
    The Aragon Research Globe™ for Intelligent Contact Centers, 2021 Data and AI Will Power Next-Generation Customer Experiences Author: Jim Lundy July 15, 2021 | Research Note 2021-24 Video Producer: Adam Pease Topic: Intelligent contact center Issue: Who are the intelligent contact center providers and how will they evolve? SUMMARY Key Findings: Aragon Research releases its third Aragon Research Globe™ for intelligent contact centers (ICCs). The ICC Prediction: By YE 2021, virtual agents (e.g., digital market is in the midst of consolidation as the demand for labor) will become a key feature of intelligent contact center offerings. This will force enterprises to do contact centers has grown during the pandemic. As planning for the ratio of human labor to digital labor. digital labor continues to grow, the 15 major vendors in this report are offering different levels of virtual agent Cost per Case Humans vs. Bots: capabilities. Virtual Agents: $1-$4 Human Agents: $15-$100 Prediction: By YE 2022, AI-based contact centers will be able to identify the real issue a customer is facing 50% faster than traditional approaches. Copyright © 2021 Aragon Research Inc. and/or its affiliates. All rights reserved. Digital Workplace Service RESEARCH NOTE Number: 2021-24 July 15, 2021 TABLE OF CONTENTS Introduction .................................................................................................................................................. 3 The Contact Center in a Post-Covid Economy ...........................................................................................
    [Show full text]
  • 14 Stories of Visionary Cios Changing the Game Through Digital Transformation
    Welcome to the era of: 14 stories of visionary CIOs changing the game through digital transformation. Table of Contents Game Changers Company Jennifer Terrill iPayment...................................................... 3 Don Schuerman Pegasystems...............................................7 Andre Wei Group Chantelle.......................................... 11 Dan Doggendorf Dallas Stars................................................ 15 Robert Fort BCBG Max Azria Group, LLC...................... 19 Jacob Gammelgaard FLSmidth.................................................... 23 Doug Edwards PGA TOUR................................................. 27 Mike Verdeyen Aptos..........................................................31 James Greene SAS International.........................................35 Ron Blahnik Hibbett Sports............................................ 39 Phil Bute Clay County Hospital................................... 43 Rakesh Tondon Le Tote...................................................... .47 Mark Settle Okta...........................................................51 Francisco Manzano Frederique Constant....................................55 1 What does a CIO do? What does a CIO do? For years, that answer was simple: manage IT, and make sure the lights stay on. As recently as 2014, CIOs were seen as order takers rather than change agents and cost center managers rather than strat egic drivers, according to a CIO/IDG survey. But that perception is evolving. CIOs—and other technology leaders—are taking
    [Show full text]
  • Team Collaboration and the Future of Work Irwin Lazar VP & Service Director, Nemertes Research [email protected] @Nemertes @Imlazar 12 March, 2020
    Team Collaboration and the Future of Work Irwin Lazar VP & Service Director, Nemertes Research [email protected] @Nemertes @imlazar 12 March, 2020 © 2020 Nemertes Research DN8381 Agenda • Introductions • Defining Team Collaboration • State of Deployment • Achieving Success • Next Steps • Q&A © 2020 Nemertes Research DN8381 About Nemertes Global research and strategic consulting firm that analyzes the business value of emerging technologies. Our real-world operational and business metrics help organizations achieve successful technology transformations. Founded in 2002. Topics We Cover Research We Conduct Services We Provide • Cloud, Networking & Infrastructure • Benchmarks: Live discussions with • Research advisory service Services IT leaders • Strategy & roadmap consulting • Cybersecurity & Risk Management • Vendor & technology assessment • Digital Customer Experience • Surveys: Industry-leading data • Digital Transformation integrity methodology • Cost models • Digital Workplace • Maturity models • Internet of things (IoT) • Vendor discussions: Product, • Annual conference technology analysis © 2020 Nemertes Research DN8381 Who Am I? • Lead coverage of collaboration and digital workplace technologies • Consult with organizations on collaboration strategy • Advise vendors/service providers on go to market and product development @imlazar • Regular speaker/contributor for @nemertes NoJitter/Enterprise Connect, SearchEnterpriseUnifiedCommunications • Based in Virginia © 2020 Nemertes Research DN8381 What Are Team Collaboration Apps?
    [Show full text]
  • MAPPING the DEVELOPMENT of AUTONOMY in WEAPON SYSTEMS Vincent Boulanin and Maaike Verbruggen
    MAPPING THE DEVELOPMENT OF AUTONOMY IN WEAPON SYSTEMS vincent boulanin and maaike verbruggen MAPPING THE DEVELOPMENT OF AUTONOMY IN WEAPON SYSTEMS vincent boulanin and maaike verbruggen November 2017 STOCKHOLM INTERNATIONAL PEACE RESEARCH INSTITUTE SIPRI is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources, to policymakers, researchers, media and the interested public. The Governing Board is not responsible for the views expressed in the publications of the Institute. GOVERNING BOARD Ambassador Jan Eliasson, Chair (Sweden) Dr Dewi Fortuna Anwar (Indonesia) Dr Vladimir Baranovsky (Russia) Ambassador Lakhdar Brahimi (Algeria) Espen Barth Eide (Norway) Ambassador Wolfgang Ischinger (Germany) Dr Radha Kumar (India) The Director DIRECTOR Dan Smith (United Kingdom) Signalistgatan 9 SE-169 72 Solna, Sweden Telephone: +46 8 655 97 00 Email: [email protected] Internet: www.sipri.org © SIPRI 2017 Contents Acknowledgements v About the authors v Executive summary vii Abbreviations x 1. Introduction 1 I. Background and objective 1 II. Approach and methodology 1 III. Outline 2 Figure 1.1. A comprehensive approach to mapping the development of autonomy 2 in weapon systems 2. What are the technological foundations of autonomy? 5 I. Introduction 5 II. Searching for a definition: what is autonomy? 5 III. Unravelling the machinery 7 IV. Creating autonomy 12 V. Conclusions 18 Box 2.1. Existing definitions of autonomous weapon systems 8 Box 2.2. Machine-learning methods 16 Box 2.3. Deep learning 17 Figure 2.1. Anatomy of autonomy: reactive and deliberative systems 10 Figure 2.2.
    [Show full text]
  • Social Media Plan- Daily Checklist
    Social Media Plan- Daily Checklist Facebook- Daily Checklist 3-5 updates per day Login each morning as your fanpage. Share a post from the newsfeed. Check for all notifications, answer comments, thank likes, answer messages. Schedule two other updates for the day. Login in the late evening to check notifications again. Twitter- Daily Checklist 5-10 tweets per day Schedule all tweets through Hootsuite (free for 3 social media accounts) Login to Hootsuite twice a day to check for mentions, responses Retweet 3-8 tweets from your followers per day Pinterest- Daily Checklist (for B2C companies) Login and repin 5-8 items your followers will enjoy seeing, across several boards Pin your own content 1-2 items Comment on the likes you make (2-5) Visit at the end of the day and repin again (if you have the time) Linkedin- Daily Checklist (for B2B companies) Read through your follower updates and comment on atleast 2 Visit 2 groups and make a comment Schedule 2-5 updates for your personal profile in Hootsuite Make a new connection By Social Media Fuze Social Media Plan- Weekly Checklist Facebook- Weekly Checklist Like 5 new fanpages Comment on each new fanpage Share at least one link to your website Twitter- Weekly Checklist Follow 20 new profiles Add each account to appropriate list Join an industry chat to meet more profiles Pinterest- Weekly Checklist (for B2C companies) Find 10-15 new accounts to follow Find industry specific boards to follow that your followers will like Join industry group board and pin several items to it Linkedin- Daily Checklist (for B2B companies) Reach out to at least 3 connections and start conversation Follow 5 new companies Join a new group (if you haven’t met your quota of 50) Need Help? Social media Fuze provides weekly and monthly packages to cover all of your social media marketing needs.
    [Show full text]
  • Fuze Portfolio
    Buyer’s Guide THE FUZE PORTFOLIO FUZE DESKTOP: Fuze Desktop is an application that can be installed on Mac and Windows systems. Features in the application include softphone calling, joining meetings, hosting meetings, 1:1 or group chatting, and presence. Users with the Fuze Calling license, Fuze Collaboration license, or Fuze Guest privileges can all use Fuze Desktop. FUZE MOBILE: Fuze Mobile is an app that can be found on the Apple App Store or Google Play Store and installed on iOS and Android devices. Fuze Mobile shares the same design elements as Fuze Desktop, along with the same features of calling, meeting, 1:1 or group chatting, and presence. Users with Fuze Calling and FUZE CALLING Collaboration licenses, as well as Fuze Guest, can use Fuze Mobile. Fuze Mobile allows users to make WiFi-based VoIP calls from a mobile device over a trusted network or prompts a user to switch to carrier mode in the case of a poor network connection. FUZE WEB: Fuze Web offers the full experience of Fuze Desktop, no download required. Available on Chrome browsers, users with Fuze Calling, Fuze Collaboration, Fuze Guests, or external, third par- ty participants can use Fuze Web with various features depending on their license type. FUZE ROOMS: Extend the Fuze Meeting experience to conference rooms, boardrooms, and executive offices for a single-touch meet- ing experience that is seamlessly integrated with your Office 365 or Google calendar. FUZE CONTACT CENTER: Fuze Contact Center provides powerful call routing and queuing, as well as real-time dashboards FUZE COLLABORATION and historical reports for managers and supervisors.
    [Show full text]
  • Research Note
    Digital Workplace Service RESEARCH NOTE Number: 2017-47 December 06, 2017 Topic: Collaboration Issue: Who are the collaboration Author: Jim Lundy vendors and how are they evolving? The Aragon Research Globe™ for Web and Video Conferencing, 2017: Visual Collaboration is Here Summary: The 2017 Aragon Research Globe™ for Web and Video Conferencing examines 22 major providers in the market. Visual Collaboration, with increased quality and more connectivity, has emerged to become a key way to move faster as an enterprise. New use cases make Visual Collaboration a strategic imperative that can provide an enterprise with a competitive advantage. TABLE OF CONTENTS Introduction ...................................................................................................................... 2 Video Mobility: Mobile, Desktop and Rooms .................................................................. 2 The Platform Play: Messaging, Voice, and Devices ................................................................. 3 How to Evaluate Providers in Mobile Use Cases .................................................................... 4 HD Video: 1080P and the Race to 4K Ultra HD ....................................................................... 4 The Demand for Real-time Cloud vs On-Premise .................................................................... 4 Making a Choice between Webcasting and Live Broadcast .................................................... 4 Automating the Enterprise: Intelligent Video Rooms ...............................................................
    [Show full text]