Binary Analysis Framework

Total Page:16

File Type:pdf, Size:1020Kb

Binary Analysis Framework Dakota State University Beadle Scholar Masters Theses & Doctoral Dissertations Spring 5-1-2017 Binary Analysis Framework Josh Stroschein Dakota State University Follow this and additional works at: https://scholar.dsu.edu/theses Part of the Information Security Commons Recommended Citation Stroschein, Josh, "Binary Analysis Framework" (2017). Masters Theses & Doctoral Dissertations. 311. https://scholar.dsu.edu/theses/311 This Dissertation is brought to you for free and open access by Beadle Scholar. It has been accepted for inclusion in Masters Theses & Doctoral Dissertations by an authorized administrator of Beadle Scholar. For more information, please contact [email protected]. Running head: BINARY ANALYSIS FRAMEWORK i BINARY ANALYSIS FRAMEWORK A graduate project submitted to Dakota State University in partial fulfillment of the requirements for the degree of Doctor of Science in Cyber Security May 2017 By Josh Stroschein Project Committee: Dr. Wayne E. Pauli Dr. Yong Wang Dr. Matthew J. Miller BINARY ANALYSIS FRAMEWORK ii PROJECT APPROVAL FORM We certify that we have read this project and that, in our opinion, it is satisfactory in scope and quality as a project for the degree of Doctor of Science in Cyber Security. Student Name: Josh Stroschein Dissertation Project Title: Binary Analysis Framework Faculty supervisor: Date: Wayne E. Pauli, Ph. D. Committee member: Date: Yong Wang, Ph. D. Committee member: Date: Matthew J. Miller, Ph. D. Date: Mark L. Hawkes Dean for Graduate Studies and Research Dakota State University ` BINARY ANALYSIS FRAMEWORK iii ABSTRACT The binary analysis of software has become an integral activity for security researchers and attackers alike. As the value of being able to exploit a vulnerability has increased, the need to discover, fix and prevent such vulnerabilities has never been greater. This paper proposes the Binary Analysis Framework, which is intended to be used by security researchers to query and analyze information about system and third party libraries. Researchers can use the tool to evaluate and discover unknown vulnerabilities in these libraries. Furthermore, the framework can be utilized to analyze mitigation techniques implemented by operating system and third- party vendors. The Binary Analysis Framework takes a novel approach to system-level security by introducing a framework that provides for binary analysis of libraries utilizing a relational data model for permanent storage of the binary instructions, as well as providing novel ways of searching and interacting with the parsed instructions. Keywords: binary analysis, reverse engineering, vulnerability research ` BINARY ANALYSIS FRAMEWORK iv DECLARATION I hereby certify that this project constitutes my own product, that where the language of others is set forth, quotation marks so indicate, and that appropriate credit is given where I have used the language, ideas, expressions or writings of another. I declare that the project describes original work that has not previously been presented for the award of any other degree of any institution. Signed, Josh Stroschein ` BINARY ANALYSIS FRAMEWORK v TABLE OF CONTENTS PROJECT APPROVAL FORM ............................................................................................................ II ABSTRACT ........................................................................................................................................... III DECLARATION ................................................................................................................................... IV TABLE OF CONTENTS ........................................................................................................................ V LIST OF TABLES .............................................................................................................................. VIII LIST OF FIGURES ............................................................................................................................... IX INTRODUCTION .................................................................................................................................... 1 1.1 INTRODUCTION OF THE PROBLEM .................................................................................................. 2 1.2 MOTIVATION .................................................................................................................................. 3 1.2.1 Software auditing. ................................................................................................................. 3 1.2.2 Binary Analysis Framework. ................................................................................................ 4 1.3 BACKGROUND ................................................................................................................................ 5 1.3.1 Commodity computing hardware. ........................................................................................ 5 1.3.2 Internet of Things phenomenon. ........................................................................................... 6 1.3.3 Security implications. ........................................................................................................... 7 1.4 COMMON MEMORY CORRUPTION VULNERABILITIES .................................................................. 11 1.4.1 Memory layout of a process. ............................................................................................... 12 1.4.2 Stack buffer overflow. ........................................................................................................ 14 1.4.3 Heap corruption. ................................................................................................................. 15 1.4.4 Use-After-Free. ................................................................................................................... 16 1.4.5 Double-Free. ....................................................................................................................... 16 1.5 EVOLUTION OF MEMORY CORRUPTION MITIGATIONS ................................................................. 16 1.5 DISSERTATION ORGANIZATION .................................................................................................... 22 LITERATURE REVIEW ...................................................................................................................... 23 2.1 GENERATING AN EXECUTABLE PROGRAM ................................................................................... 23 2.1.1 File formats. ........................................................................................................................ 24 2.2 STATIC BINARY ANALYSIS ........................................................................................................... 24 2.3 INSTRUCTION SET ARCHITECTURES ............................................................................................. 25 2.3.1 Differentiating code and data in ISAs. ................................................................................ 25 2.4 PREVAILING METHODS OF DISASSEMBLY .................................................................................... 26 2.4.1 Disassembly complications. ................................................................................................ 27 ` BINARY ANALYSIS FRAMEWORK vi 2.5 BINARY FILE FORMATS ................................................................................................................ 28 2.5.1 File format malformations. ................................................................................................. 28 2.6 BINARY ANALYSIS FRAMEWORKS ............................................................................................... 29 2.6.1 PEV. .................................................................................................................................... 29 2.6.2 BARF. ................................................................................................................................. 29 2.6.3 Angr. ................................................................................................................................... 30 2.6.4 Limitations addressed by the Binary Analysis Framework. .............................................. 30 2.7 LITERATURE REVIEW SUMMARY ................................................................................................. 32 SYSTEM DESIGN ................................................................................................................................. 33 3.1 RESEARCH APPROACH ................................................................................................................. 33 3.2 LIMITATIONS ................................................................................................................................ 34 3.3 CODE ORGANIZATION .................................................................................................................. 35 3.4 OVERVIEW OF THE BINARY ANALYSIS FRAMEWORK COMPONENTS ............................................ 36 3.4.1 Graphical user interface. ..................................................................................................... 39 3.4.2 Input file validation. ............................................................................................................ 41 3.4.3 File parsing and disassembling. .........................................................................................
Recommended publications
  • Fielding the Guide to the Common Laptop
    05_589598 ch01.qxd 9/29/05 2:41 PM Page 7 Chapter 1 Fielding the Guide to the Common Laptop In this chapter ᮣ Taking the measure of a laptop computer ᮣ Powering up for portable computing ᮣ Viewing your work and pointing at words and icons A laptop is just like a desktop computer, except that it has to be ߜ Smaller ߜ Lighter ߜ Tougher ߜ Much less demanding of electrical power It also has to include ߜ A high-capacity, relatively lightweight battery that can be recharged over and over again ߜ A built-in high-resolution flat LCD color display ߜ An easy-to-useCOPYRIGHTED but unobtrusive mouse, MATERIAL trackball, or other pointing device That’s not too much to ask, is it? Actually, it’s quite a lot — quite a lot in a very small package. 05_589598 ch01.qxd 9/29/05 2:41 PM Page 8 8 Part I: Putting a Computer in Your Lap Calling Them Anything but Late for Supper Way, way back in the ancient history of personal computers, when I was the first executive editor of PC Magazine, the high-tech world was stunned at the arrival of a class of suitcase-sized computers that came with a small built-in CRT monitor, a handle on top, and a long electrical cord. They were called “portable” computers and they were portable — in the same way that you can move a television set from room to room. We preferred to call them “luggable” or “transportable” computers. Later on, the first battery-powered computers using monochrome and later color LCD screens arrived; they were called laptop computers.
    [Show full text]
  • THE ICON-Newsletter of the Interactive Computer Owners Network August 2014
    THE ICON-Newsletter of the Interactive Computer Owners Network August 2014 WHAT’S INSIDE —- Page Andrew Cummins President, ICON Computer Users Group August & September [email protected] Program Schedules ….……. 2 You are ICON! Word of the month ………… 2 Interesting Sites to Summer is almost over, but not before our annual picnic. We’ve Visit on the Internet ..….…... 3 moved it inside and to the second Saturday of August at Golden Corral. So, no weather worries. If we haven’t seen you around for Minutes of 12 July 14……….4 a while, be all the more sure to come and catch up with old friends. Q&A Google Drive (Part 1) . 4 We’ve had some good classes over the past several months. New Trends in Laptop And, I regret not being able to make it to some of the classes in Computing....……….…. ...5-6 the first quarter of the year. Even when the topic of a class isn’t my cup of tea, I’m still thrilled with getting to chat and talk about Computer Tutor.…....………..7 computers with the others in class. Skype for Windows 8……8-10 You’re a part of ICON, and you can make ICON better. As al- 3 Better Ways to Store Files ways, if you have a new gadget or are familiar with some soft- ware or an app, come and share with us what you’ve learned. Than on Your Desktop...10-12 Share with us your experience. I know each of you have experi- Create & Save a Custom ence with something you could tell us about, just between friends.
    [Show full text]
  • Comptia A+ Complete Study Guide A+ Essentials (220-601) Exam Objectives
    4830bperf.fm Page 1 Thursday, March 8, 2007 10:03 AM CompTIA A+ Complete Study Guide A+ Essentials (220-601) Exam Objectives OBJECTIVE CHAPTER Domain 1.0 Personal Computer Components 1.1 Identify the fundamental principles of using personal computers 1 1.2 Install, configure, optimize and upgrade personal computer components 2 1.3 Identify tools, diagnostic procedures and troubleshooting techniques for personal computer components 2 1.4 Perform preventative maintenance on personal computer components 2 Domain 2.0 Laptops and Portable Devices 2.1 Identify the fundamental principles of using laptops and portable devices 3 2.2 Install, configure, optimize and upgrade laptops and portable devices 3 2.3 Identify tools, basic diagnostic procedures and troubleshooting techniques for laptops and portable devices 3 2.4 Perform preventative maintenance on laptops and portable devices 3 Domain 3.0 Operating Systems 3.1 Identify the fundamentals of using operating systems 4 3.2 Install, configure, optimize and upgrade operating systems 5 3.3 Identify tools, diagnostic procedures and troubleshooting techniques for operating systems 6 3.4 Perform preventative maintenance on operating systems 6 Domain 4.0 Printers and Scanners 4.1 Identify the fundamental principles of using printers and scanners 7 4.2 Identify basic concepts of installing, configuring, optimizing and upgrading printers and scanners 7 4.3 Identify tools, basic diagnostic procedures and troubleshooting techniques for printers and scanners 7 Domain 5.0 Networks 5.1 Identify the fundamental
    [Show full text]
  • Laptops Advice Sheet 4
    NCTE Advice Sheet – Laptops Advice Sheet 4 Laptops What is a Laptop? A laptop is a general term referring to a computer that has a built-in display and keyboard and is intended to be a portable personal computer. A laptop computer runs the same operating system and software applications as a larger desktop PC, but it is considerably smaller in size and lighter in weight. Today`s laptops weigh between 2-10 lbs and can incorporate a wide array of modern technologies. Furthermore, a laptop contains a battery, which allows it to be used away from and one can use either term interchangeably. The specifications of a laptop are very similar to those of a PC and the same basic criteria determine its functionality (i.e., processor speed, amount of memory and storage space). Refer to Advice Sheet 2 for more information on general computer specifications. However, there are a few components that are unique to laptops (i.e., pointing devices, display panels and external devices) and it is these items that are discussed in this advice sheet. Display screen Laptop Specifications Laptop displays are lightweight and flat. Two types are available: TFT (active matrix) or STN (passive matrix). • AMD or Intel Processor (Mobile) • 2GB DDR RAM • 160GB Hard Drive Trackpad • Integrated DVD/RW Drive An alternative pointing device to a mouse. • Graphics with 256MB DDR VRAM • Audio capability • MS® Windows XP Pro or Vista (or LAN/Internet connectivity Linux) In this laptop, the modem and network adapter • 15" SXGA+ TFT (1400x1050) Display are built-in (integrated). Other laptop • Integrated TrackPad/ External Mouse specifications may mention a combo modem/NIC • Integrated 56Kbps V90 Modem and (network interface card), which is more versatile 10/100/1000 network adapter built in and ideal for a laptop that is likely to access the • 4 USB Ports • Internal wireless card Ports Laptops today have faster connection speeds with built in USB ports.
    [Show full text]
  • Understanding Laptops Chapter
    Chapter Understanding Laptops 9 THE FOLLOWING COMPTIA A+ EXAM 220-801 OBjECTIVES ARE COVERED IN THIS CHAPTER: NÛ 3.1 Install and configure laptop hardware and components. NNExpansion options: Express card/34, Express card/54, PCMCIA, SODIMM, Flash NNHardware/device replacement: Keyboard, Hard Drive (2 5 vs 3 5), Memory, Optical drive, Wireless card, Mini- PCIe, Screen, DC jack, Battery, Touchpad, Plastics, Speaker, System board, CPU NÛ 3.2 Compare and contrast the components within the display of a laptop. NNTypes: LCD, LED, OLED, Plasma NNWi-Fi antenna connector/placement NNInverter and its function NNBacklight NÛ 3.3 Compare and contrast laptop features. NNSpecial function keys: Dual displays, Wireless (on/off), Volume settings, Screen brightness, Bluetooth (on/off), Keyboard backlight NNDocking station vs port replicator NNPhysical laptop lock and cable lock As recently as the early 1990s, portable computers were luxu- ries that were affordable to only the wealthy or the select few businesspeople who traveled extensively. As with all other technologies, though, portable systems have gotten smaller, lighter (more portable), more powerful, and less expensive. Because the technology and price disparity between the two platforms has decreased signifcantly, laptops have outsold desktops since the mid-2000s. Every indication is that the movement toward mobile computing will continue, so you defnitely need to be well versed in portable technologies, which contain both nifty fea- tures and frustrating quirks. For this discussion, assume that a portable computer is any computer that contains all the functionality of a desktop computer system but is portable. Most people defne portable in terms of weight and size.
    [Show full text]
  • The Impact of Brand Image on Customer Loyalty and Commitment
    International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS) Volume VII, Issue VIII, August 2018 | ISSN 2278-2540 The Impact of Brand Image on Customer Loyalty and Commitment Anupama Sundar D Assistant Professor, JSS Centre for Management Studies, JSS Science and Technology University Sri Jayachamarajendra College of Engineering, JSS Technical Institutions Campus, Mysore-570006, Karnataka, India Abstract: - The aim of this research is to understand the factors the most important and effective strategy to influence behind laptop purchase decisions of consumers. Nowadays consumer behavior in the product selection is using the brand companies make use of various strategies in order to attract new for the products. Brands are valuable to the consumers for two customers, retain existing customers and differentiate their reasons: first, brands decrease the risks for the consumers. products from those of their competitors. Perhaps, the most Second, it leads to saving the costs in decision-making. important and effective strategy to influence consumer behavior in the product selection is emphasizing the “brand name” of the Furthermore brands can simplify choice, promise a particular products. Aim in this paper is to investigate how Laptop brands quality level, and/or engender trust. Brands serve as reminders can influence consumer’s loyalty and Commitment. Brand equity of a customer’s overall past experience with a product. Aaker is a set of brand assets and liabilities linked to a brand name and (1991) believes brands are important because companies are symbol, which add to or subtract from the value provided by a recognized through their brand. Customers have many brand product or service.
    [Show full text]
  • GICTS GROUP of COLLEGES, GWALIOR Shivpuri Link Road LASHKAR Gwaliortel: 91-751-2448801, 02, 03 Email: [email protected] Website
    SUMMER TRAINING PROJECT REPORT ON “To Study Customer Perception towards Ultra Portable Laptops” for For the partial fulfillment of bachelor of Business administration 2009-12 SUBMITTED TO :- SUBMITTED BY:- Jiwaji University, Gwalior MONU UPADHYAY BBA V Semester Roll No. 809210 GICTS GROUP OF COLLEGES, GWALIOR Shivpuri Link Road LASHKAR GWALIORTel: 91-751-2448801, 02, 03 Email: [email protected] Website: www.gicts.org. DECLARATION This is to declare that the Summer Training Report has been accomplished by me and being submitted in partial fulfillment of requirement for the award of the Degree of Bachelor of Business Administration from GICTS Group of Institution affiliated to Jiwaji University, Gwalior. The work has not been submitted by me anywhere else for the award of any degree or diploma. All source of information are based on my on training experience and learning. Date: MONU UPADHYAY Place: BBA V Semester 2 CERTIFICATE This is to certify that Mr. MONU UPADHYAY student of BBA V Semester of GICTS Groups of Colleges has successfully completed his Summer Training dated from 05/09/2011 to 20/10/2011 and this report is submitted by Him for the completion of the training requirement under my guidance and supervision. Date : (Asst. Prof. AASHISH SHARMA ) Place: 3 ACKNOWLEDGEMENT It is great pleasure for me to put on record my appreciation and gratitude towards Placement and Training Coordinator GICTS Group of College, Gwalior my special thanks to my respected faculty Asst. Prof. AASHISH SHARMA for his valuable support and suggestions for the execution of Summer Training. I thank him for the right direction and providing direction for the completion of my summer training project.
    [Show full text]
  • ICT TEACHER HAND BOOK (Computer Education)
    ICT TEACHER HAND BOOK (Computer Education) Class : VIII State Council of Educational Research & Training, Andhra Pradesh, Hyderabad. ICT Teacher Hand Book i Content Development Committee Sri G.V.S.P. Kumar, Trustee, Remedia Trust, Hyderabad. Programme Officer, C-DAC, Hyderabad. Sri M. Jagadish Babu, Sri Mahesh Varal, Consultant, I.T., Hyderabad Sri M. Ramanjaneyulu, Lecturer, Diet Vikarabad, Rangareddy Editing & Co-ordination Dr. P. Jani Reddy Dr. N. Upender Reddy Lecturer Professor & Head Diet, Vikarabad C &T Department, Rangareddy Dist. SCERT, A.P., Hyderabad Advisor Sri G. Gopal Reddy Director State Council of Educational Research & Training, A.P., Hyderabad Foreword Information Communication Technology (ICT) is one of the rapidly changing area in domain of learning. The main purpose of introducing ICT in schools is to help the students to make use of different ICT tools in enhancing their learning. The ICT education helps the students to face the challenges of 21st century and attain the millennium developmental goals in education. ICT also helps in reducing the digital divide among the rural and urban students. As per the UNESCO “technology can be powerful education multiplier, but we must know how to use it. It is not enough to install technology into classrooms- it must be integrated into learning. Nothing can be substitute for a good teacher. It is not technology itself that empowers people- empowerment comes from skills and knowledge”. The teachers have become more critical than ever- the challenge is how to enable teachers not only to overcome the technology barriers but also to empower them to integrate appropriate technology into the teaching and learning process.
    [Show full text]
  • Фос По Угс 09.00.00 Нач Этап 19-20
    1 Фонд оценочных средств Начального этапа Всероссийской олимпиады профессионального мастерства обучающихся по специальностям среднего профессионального образования укрупненной группы специальностей СПО 09.00.00 «Информатика и вычислительная техника» г. Коломна 2019 2 КОМПЛЕКСНОЕ ЗАДАНИЕ 1 УРОВНЯ «ТЕСТОВОЕ ЗАДАНИЕ» (и критерии оценивания) УГС 09.00.00 «Информатика и вычислительная техника» 09.02.03 Программирование в компьютерных системах. КРИТЕРИИ ОЦЕНИВАНИЯ «ТЕСТОВОЕ ЗАДАНИЕ» Время, отводимое на выполнение задания – 1 час (астрономический = 60 минут) Максимальное количество баллов – 20 баллов. Задача 1. Ответьте на вопросы тестового задания. Условия выполнения задания 1. задание выполняется в форме проведения компьютерного тестирования; 2. при выполнении тестового задания участнику Олимпиады предоставляется возможность в течение всего времени, отведенного на выполнение задания, вносить изменения в свои ответы, пропускать ряд вопросов с возможностью последующего возврата к пропущенным заданиям; Перечень вопросов: 1. Инвариантная часть тестового задания № Эталон Количе-ство Вопрос п/п ответа баллов Информационные технологии в профессиональной деятельности 1 Какой тэг используется для начала 1) <HEAD> 3 0,25 текста с новой строки, не начиная 2) <IMG> нового абзаца? 3) <BR> 4) <HR> 2 Ниже представлен фрагмент 13 0,25 электронной таблицы. Определите значение в ячейке D6. Запишите ответ: ____________ 3 3 Установите соответствие между типом файла и его расширением: 1)-2 0,5 1) *.ppt 2)-3 2) *.avi 3)-1 3) *.doc 4)-4 4) *.mp3 1__ Текстовый файл
    [Show full text]
  • BUDAPESTI CORVINUS EGYETEM Az Információrendszerek És A
    BUDAPESTI CORVINUS EGYETEM Az információrendszerek és a jövőkutatás összekapcsolása és értelmezése a döntéstámogatásban Doktori értekezés Témavezetők: Nováky Erzsébet, DSc Vas Réka Franciska, PhD Monda Eszter BUDAPEST 2018 1 MONDA ESZTER INFORMÁCIÓRENDSZEREK TANSZÉK Témavezetők: Nováky Erzsébet, DSc Vas Réka Franciska, PhD © Monda Eszter BUDAPESTI CORVINUS EGYETEM Az információrendszerek és a jövőkutatás összekapcsolása és értelmezése a döntéstámogatásban Doktori értekezés Témavezetők: Nováky Erzsébet, DSc Vas Réka Franciska, PhD Monda Eszter BUDAPEST 2018 TARTALOMJEGYZÉK TARTALOMJEGYZÉK ........................................................................................................ 1 ÁBRAJEGYZÉK .................................................................................................................. 3 TÁBLÁZATJEGYZÉK .......................................................................................................... 4 1. TÉMAVÁLASZTÁS, KUTATÁSI KÉRDÉSEK ÉS AZ ÉRTEKEZÉS FELÉPÍTÉSE ................... 5 1.1. Témaválasztás, bevezetés .................................................................................................. 5 1.2. Kutatási kérdések és tartalmi felépítés .............................................................................. 7 1.3. A kutatás jellege, az alkalmazott módszertan .................................................................... 9 1.4. Kutatási koncepció .......................................................................................................... 11 2. AZ INFORMÁCIÓRENDSZEREK
    [Show full text]
  • Combodian University for Specialties Management Information System
    Combodian University For Specialties Management Information System CHAPTER 1 IDENTIFYING PERSONAL COMPUTERCOMPONENTS Introduction Management Information Systems (MIS) is the study of people, technology, organizations and the relationships among them. MIS professionals help firms realize maximum benefit from investment in personnel, equipment, and business processes. MIS is a people-oriented field with an emphasis on service through technology. If you have an interest in technology and have the desire to use technology to improve people‟s lives, a degree in MIS may be for you. Businesses use information systems at all levels of operation to collect, process and store data. Management aggregates and disseminates this data in the form of information needed to carry out the daily operations of business. Everyone who works in business, from someone who pays the bills to the person who makes employment decisions, uses information systems. A car dealership could use a computer database to keep track of which products sell best. A retail store might use a computer-based information system to sell products over the Internet. In fact, many (if not most) businesses concentrate on the alignment of MIS with business goals to achieve competitive advantage over other businesses. MIS professionals create information systems for data management (i.e., storing, searching and analyzing data). In addition, they manage various information systems to meet the needs of managers, staff and customers. By working collaboratively with various members of their work group, as well as with their customers and clients, MIS professionals are able to play a key role in areas such as information security, integration and exchange.
    [Show full text]
  • How Taiwanese Contract Manufacturers Matter in The
    THE DYNAMICS OF DESIGN-MANUFACTURING LAPTOPS: HOW TAIWANESE CONTRACT MANUFACTURERS MATTER IN THE HISTORY OF LAPTOP PRODUCTION A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Ling-Fei Lin January 2015 © 2015 Ling-Fei Lin THE DYNAMICS OF DESIGN-MANUFACTURING LAPTOPS: HOW TAIWANESE CONTRACT MANUFACTURERS MATTER IN THE HISTORY OF LAPTOP PRODUCTION Ling-Fei Lin, Ph.D. Cornell University, 2015 This dissertation aims to open the knowledge production “black box” of laptop contract manufacturers in Taiwan and their factories in China from 1988 to 2012. By examining their engineering practices, I demonstrate the complexity and changing dynamics of design-manufacturing laptops across different time periods, which not only refutes a perception of linear progress from manufacturing to design for Taiwan’s industry, but also challenges the idea that manufacturing lacks innovation and importance. I show how manufacturing and design capability are equally crucial and argue that it is also the intensive interaction between design and manufacturing, internally and externally, that matters. I develop a concept, field knowledge, to describe this interactiveness that involves frequent multiple-sited and trans-organizational exchanges between actors from heterogeneous backgrounds. My research, based on extensive interviews, unpacks the sociotechnical process in producing laptops that involves the transnational flow of people, ideas, and materials. In Chapter One, I show how Taiwanese producers designed their first laptops in the late 1980s based primarily on design engineering capability and how they learned to specialize the development process through collaborating with brand-name firms.
    [Show full text]