Framework for Easy Malware Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Framework for Easy Malware Analysis MASARYK UNIVERSITY FACULTY}w¡¢£¤¥¦§¨ OF I !"#$%&'()+,-./012345<yA|NFORMATICS Framework for Easy Malware Analysis BACHELOR’S THESIS Radoslava Povalov´a Brno, autumn 2014 Declaration Hereby I declare, that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Advisor: Mgr. V´ıt Bukacˇ ii Acknowledgement I would like to thank my supervisor Mgr. V´ıt Bukacˇ and my con- sultant RNDr. Vaclav´ Lorenc for their continuous support, guidance and valuable feedback which helped me to write this thesis. iii Abstract The primary purpose of this thesis is to study tools which are used for malware deobfuscation and to implement web application for de- obfuscation and detection of malware. The web application allows set type of deobfuscation methods, their keys and order of them. It also supports automatic analysis without necessity to set analysis configuration. The application uses pattern matching system YARA for malware detection. iv Keywords malware, deobfuscation, Python, web application, Flask, cluster, Cel- ery, YARA v Contents 1 Introduction ............................ 3 2 Malware Overview ........................ 5 2.1 General Malware Categories ................ 5 2.2 Malware Lifecycle ...................... 6 2.3 Examples of Malware Lifecycle .............. 8 2.3.1 New Malware Sample Example Scenario . 8 2.4 Obfuscation ......................... 10 3 Analysis .............................. 12 3.1 Overview of Existing Tools . 12 3.2 Specification of Requirements . 14 3.2.1 Functional Requirements . 14 3.2.2 Non-fuctional Requirements . 15 4 System Design .......................... 17 4.1 Available technologies ................... 17 4.1.1 Web Framework . 18 4.1.2 Database . 18 4.1.3 User Interface . 19 4.1.4 Parallel Processing . 21 4.1.5 Deobfuscation Heuristics . 23 5 Implementation .......................... 24 5.1 User Interface ........................ 24 5.1.1 Home Page . 24 5.1.2 Administration . 24 5.1.3 Analysis Configuration . 24 5.1.4 Details of a Result . 25 5.2 Application Layer ...................... 25 5.2.1 Flask . 27 5.2.2 Celery . 28 5.2.3 Creation of a New Deobfuscation Analysis . 28 5.3 Database Layer ....................... 31 1 5.4 Presentation Layer ..................... 33 5.5 Deployment ......................... 34 5.5.1 Application Preparation . 34 5.5.2 Nginx and uWSGI Deployment . 35 5.5.3 Apache and uWSGI . 36 5.5.4 Alternative Deployment . 36 5.6 Extending the Application . 37 5.6.1 Adding New YARA Rules . 37 5.6.2 Changing the Configuration . 37 5.6.3 Adding New Operation . 37 6 Testing ............................... 39 6.1 Unknown Malware ..................... 39 6.2 Kordeef Trojan Horse .................... 40 6.3 Infected Word Document . 41 7 Conclusions ............................ 43 7.1 Future Improvements .................... 43 7.2 Conclusion .......................... 44 A Attachments ............................ 51 B Contents of attached ZIP archive . 59 2 Chapter 1 Introduction Nowadays it is hard to imagine a world without computers. They are used in banking, medical, various control and communication systems, business application etc. This IT era gives us a lot of new possibilities and brings improvement in efficiency, but also brings security risks. The best solution of these risks would be to completely prevent intrusions and attacks to the systems. However, in real world, despite using various defensive and safety mechanisms, some secu- rity attacks are successful, system is infected and it is necessary to solve this security incident by analyzing it. Malware analysis is dissecting the malware to understand how it works, how to identify it, and how to defeat or eliminate it. [39, p. 29]. There are two types of analysis techniques. Dynamic analysis involves launching and also debugging an executable file in a con- trolled and monitored environment so that its effects on a system can be observed and documented[5, p. 287]. Static analysis includes loading the executables into disassembler and examing program in- struction to discover what the program does. In this thesis dynamic analysis is not in my concern. I will mainly focus on static analysis. In static analysis the disassembled executable is not often readable, because malware authors usually used some techniques to mask the code and to hide their targets, for example, common encryption, en- coding or obfuscation. Thereby in the beginning of analysis it is nec- essary to convert the executables to the decoded forms. It is more efficient and comfortable for security analyst to use some automatic tool to provide this conversion. 3 1. INTRODUCTION In my work I will implement the tool which security analyst could use during static analysis to obtain the decoded disassembled exe- cutable. In the tool the user will have option to completely manage the process of analysis. There will be possible to choose type, pa- rameters and also order of the functions used to decoding the given source. In addition to the set of predefined malware detection pattern rules, the tool also will allow to define and use only custom pattern rules. This tool will be implemented as intuitive and user-friendly web application. The application will be developed in collaboration with a global Computer Incident Response Team (CIRT) at Honey- well International Inc. 4 Chapter 2 Malware Overview 2.1 General Malware Categories Malware is any software that does something that causes harm to user, computer, or network [39, p. 29]. Software which is not primary harmful, but performs potentionally unwanted actions, such as gath- ering sensitive information, is also often considered as malware. The most common forms of malware are executable programs, the oth- ers include scripts, applets, plugins, etc. Malicious software can be categorized into following groups: • Rootkits modify the operating system so that they are capable of hiding themselves and other system components from users and even the operating system itself [5, p. 309] . They can op- erate in a kernel mode (Ring 0 on MS Windows systems) or userland (Ring 3) mode. • Backdoors have primary function to create remote access to the compromised system or network. Most of them are used dur- ing direct attacks to ensure access to the victims and for data exfiltration. They are often combined with rootkits. • Downloaders exist mainly to download other malicious code. They are usually a part of a botnet ecosystem that is available as a service for other malware authors who can pay the botmaster (owner of a botnet) to spread their malware. • Spyware collects sensitive information. Collected data often in- cludes information about bank accounts, user behavior, brows- ing history and user accounts. 5 2. MALWARE OVERVIEW • Worms use self-replication for rapid infection spread. They do not modify files, but create a copy of itself to spread via security vulnerabilities. They may cause some harm, but they are not designed to modify systems. • Trojan horses infect other executables to spread infection. They usually carry other malware payload and spread by modifying existing files, for example, executables, documents or scripts. • Adware displays unwanted advertisements, often classified as Potentionally unwanted Program (PuP) which is not intented to be malicious. It is often installed as a part of legitimate pro- gram. • Ransomware tries to obtain money by threating users. Most of the ransomware display a notice from the police to pay ransom to avoid legal prosecution because of illegal activity or notice that user’s important files have been encrypted and he must to pay the malware author to decrypt them. • Bots connect to botnet to receive commands from botmaster. An infected computer becomes a zombie in a large botnet con- sisting of other infected systems receiving commands from bot- master. A botnet is usually used for DDoS (Distributed Denial of Service) attacks, sending spam, minning bitcoins, spreading other malware and so on. It is difficult to exactly categorize malware, because it is often combination of several categories mentioned above. 2.2 Malware Lifecycle A typical malware lifecycle begins by using a delivery system to spread the malware to the potential targets which is most often in a form of a script on a compromised web site. This is done by ex- ploit kit, set of exploits - the pieces of software, the chunks of data or the sequences of commands, that take advantage of vulnerability or a bug in another software to execute attacker intended instruc- tions. It can cause unusual behavior in the vulnerable software [40, 6 2. MALWARE OVERVIEW Figure 2.1: Malware lifecycle stages [1] p. 191]. Exploit kit tries to detect outdated plugins/software of po- tential targets and exploit them to deliver malware. Another type of delivery can be done by sending phishing emails with malicious pay- load, such as infected PDF or ZIP archive containing executable file with double extension. Next stage is to deliver malware by exploiting victim and ensur- ing persistence to survive reboot of the compromised host. After the persistence is ensured, the malware begins to perform actions which has been designed to. Actions may differ per malware, but usually include establishing a callback (C2 channel) to the CnC server to re- cieve commands or data exfiltration. Malware lifecycle can be often different, for example, delivery sys- tem can be omitted, because it is deployed by another malware or by a stager. The stager is responsible for downloading a large payload (actual malware), injecting it into memory, and passing execution to it. By using a stager, it is almost guaranteed that the malware will be deployed on the victim host. 7 2. MALWARE OVERVIEW 2.3 Examples of Malware Lifecycle Zeus [30] (trojan horse) and CryptoLocker [23] (ransomware) - A victim browses to the web site infected by Blackhole exploit kit [21] (well-known exploit kit). By opening this infected web site, the ex- ploit kit is executed (in form of JavaScript) and then it detects that the victim has an outdated Java version.
Recommended publications
  • Ironpython in Action
    IronPytho IN ACTION Michael J. Foord Christian Muirhead FOREWORD BY JIM HUGUNIN MANNING IronPython in Action Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> IronPython in Action MICHAEL J. FOORD CHRISTIAN MUIRHEAD MANNING Greenwich (74° w. long.) Download at Boykma.Com Licensed to Deborah Christiansen <[email protected]> For online information and ordering of this and other Manning books, please visit www.manning.com. The publisher offers discounts on this book when ordered in quantity. For more information, please contact Special Sales Department Manning Publications Co. Sound View Court 3B fax: (609) 877-8256 Greenwich, CT 06830 email: [email protected] ©2009 by Manning Publications Co. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps. Recognizing the importance of preserving what has been written, it is Manning’s policy to have the books we publish printed on acid-free paper, and we exert our best efforts to that end. Recognizing also our responsibility to conserve the resources of our planet, Manning books are printed on paper that is at least 15% recycled and processed without the use of elemental chlorine.
    [Show full text]
  • 102-401-08 3 Fiches SOFTW.Indd
    PYPY to be adapted to new platforms, to be used in education Scope and to give new answers to security questions. Traditionally, fl exible computer languages allow to write a program in short time but the program then runs slow- Contribution to standardization er at the end-user. Inversely, rather static languages run 0101 faster but are tedious to write programs in. Today, the and interoperability issues most used fl exible and productive computer languages Pypy does not contribute to formal standardization proc- are hard to get to run fast, particularly on small devices. esses. However, Pypy’s Python implementation is practi- During its EU project phase 2004-2007 Pypy challenged cally interoperable and compatible with many environ- this compromise between fl exibility and speed. Using the ments. Each night, around 12 000 automatic tests ensure platform developed in Pypy, language interpreters can that it remains robust and compatible to the mainline now be written at a higher level of abstraction. Pypy au- Python implementation. tomatically produces effi cient versions of such language interpreters for hardware and virtual target environ- Target users / sectors in business ments. Concrete examples include a full Python Inter- 010101 10 preter, whose further development is partially funded by and society the Google Open Source Center – Google itself being a Potential users are developers and companies who have strong user of Python. Pypy also showcases a new way of special needs for using productive dynamic computer combining agile open-source development and contrac- languages. tual research. It has developed methods and tools that support similar projects in the future.
    [Show full text]
  • Scons API Docs Version 4.2
    SCons API Docs version 4.2 SCons Project July 31, 2021 Contents SCons Project API Documentation 1 SCons package 1 Module contents 1 Subpackages 1 SCons.Node package 1 Submodules 1 SCons.Node.Alias module 1 SCons.Node.FS module 9 SCons.Node.Python module 68 Module contents 76 SCons.Platform package 85 Submodules 85 SCons.Platform.aix module 85 SCons.Platform.cygwin module 85 SCons.Platform.darwin module 86 SCons.Platform.hpux module 86 SCons.Platform.irix module 86 SCons.Platform.mingw module 86 SCons.Platform.os2 module 86 SCons.Platform.posix module 86 SCons.Platform.sunos module 86 SCons.Platform.virtualenv module 87 SCons.Platform.win32 module 87 Module contents 87 SCons.Scanner package 89 Submodules 89 SCons.Scanner.C module 89 SCons.Scanner.D module 93 SCons.Scanner.Dir module 93 SCons.Scanner.Fortran module 94 SCons.Scanner.IDL module 94 SCons.Scanner.LaTeX module 94 SCons.Scanner.Prog module 96 SCons.Scanner.RC module 96 SCons.Scanner.SWIG module 96 Module contents 96 SCons.Script package 99 Submodules 99 SCons.Script.Interactive module 99 SCons.Script.Main module 101 SCons.Script.SConsOptions module 108 SCons.Script.SConscript module 115 Module contents 122 SCons.Tool package 123 Module contents 123 SCons.Variables package 125 Submodules 125 SCons.Variables.BoolVariable module 125 SCons.Variables.EnumVariable module 125 SCons.Variables.ListVariable module 126 SCons.Variables.PackageVariable module 126 SCons.Variables.PathVariable module 127 Module contents 127 SCons.compat package 129 Module contents 129 Submodules 129 SCons.Action
    [Show full text]
  • Porting of Micropython to LEON Platforms
    Porting of MicroPython to LEON Platforms Damien P. George George Robotics Limited, Cambridge, UK TEC-ED & TEC-SW Final Presentation Days ESTEC, 10th June 2016 George Robotics Limited (UK) I a limited company in the UK, founded in January 2014 I specialising in embedded systems I hardware: design, manufacturing (via 3rd party), sales I software: development and support of MicroPython code D.P. George (George Robotics Ltd) MicroPython on LEON 2/21 Motivation for MicroPython Electronics circuits now pack an enor- mous amount of functionality in a tiny package. Need a way to control all these sophisti- cated devices. Scripting languages enable rapid development. Is it possible to put Python on a microcontroller? Why is it hard? I Very little memory (RAM, ROM) on a microcontroller. D.P. George (George Robotics Ltd) MicroPython on LEON 3/21 Why Python? I High-level language with powerful features (classes, list comprehension, generators, exceptions, . ). I Large existing community. I Very easy to learn, powerful for advanced users: shallow but long learning curve. I Ideal for microcontrollers: native bitwise operations, procedural code, distinction between int and float, robust exceptions. I Lots of opportunities for optimisation (this may sound surprising, but Python is compiled). D.P. George (George Robotics Ltd) MicroPython on LEON 4/21 Why can't we use existing CPython? (or PyPy?) I Integer operations: Integer object (max 30 bits): 4 words (16 bytes) Preallocates 257+5=262 ints −! 4k RAM! Could ROM them, but that's still 4k ROM. And each integer outside the preallocated ones would be another 16 bytes. I Method calls: led.on(): creates a bound-method object, 5 words (20 bytes) led.intensity(1000) −! 36 bytes RAM! I For loops: require heap to allocate a range iterator.
    [Show full text]
  • Goless Documentation Release 0.6.0
    goless Documentation Release 0.6.0 Rob Galanakis July 11, 2014 Contents 1 Intro 3 2 Goroutines 5 3 Channels 7 4 The select function 9 5 Exception Handling 11 6 Examples 13 7 Benchmarks 15 8 Backends 17 9 Compatibility Details 19 9.1 PyPy................................................... 19 9.2 Python 2 (CPython)........................................... 19 9.3 Python 3 (CPython)........................................... 19 9.4 Stackless Python............................................. 20 10 goless and the GIL 21 11 References 23 12 Contributing 25 13 Miscellany 27 14 Indices and tables 29 i ii goless Documentation, Release 0.6.0 • Intro • Goroutines • Channels • The select function • Exception Handling • Examples • Benchmarks • Backends • Compatibility Details • goless and the GIL • References • Contributing • Miscellany • Indices and tables Contents 1 goless Documentation, Release 0.6.0 2 Contents CHAPTER 1 Intro The goless library provides Go programming language semantics built on top of gevent, PyPy, or Stackless Python. For an example of what goless can do, here is the Go program at https://gobyexample.com/select reimplemented with goless: c1= goless.chan() c2= goless.chan() def func1(): time.sleep(1) c1.send(’one’) goless.go(func1) def func2(): time.sleep(2) c2.send(’two’) goless.go(func2) for i in range(2): case, val= goless.select([goless.rcase(c1), goless.rcase(c2)]) print(val) It is surely a testament to Go’s style that it isn’t much less Python code than Go code, but I quite like this. Don’t you? 3 goless Documentation, Release 0.6.0 4 Chapter 1. Intro CHAPTER 2 Goroutines The goless.go() function mimics Go’s goroutines by, unsurprisingly, running the routine in a tasklet/greenlet.
    [Show full text]
  • Setting up Your Environment
    APPENDIX A Setting Up Your Environment Choosing the correct tools to work with asyncio is a non-trivial choice, since it can significantly impact the availability and performance of asyncio. In this appendix, we discuss the interpreter and the packaging options that influence your asyncio experience. The Interpreter Depending on the API version of the interpreter, the syntax of declaring coroutines change and the suggestions considering API usage change. (Passing the loop parameter is considered deprecated for APIs newer than 3.6, instantiating your own loop should happen only in rare circumstances in Python 3.7, etc.) Availability Python interpreters adhere to the standard in varying degrees. This is because they are implementations/manifestations of the Python language specification, which is managed by the PSF. At the time of this writing, three relevant interpreters support at least parts of asyncio out of the box: CPython, MicroPython, and PyPy. © Mohamed Mustapha Tahrioui 2019 293 M. M. Tahrioui, asyncio Recipes, https://doi.org/10.1007/978-1-4842-4401-2 APPENDIX A SeTTinG Up YouR EnViROnMenT Since we are ideally interested in a complete or semi-complete implementation of asyncio, our choice is limited to CPython and PyPy. Both of these products have a great community. Since we are ideally using a lot powerful stdlib features, it is inevitable to pose the question of implementation completeness of a given interpreter with respect to the Python specification. The CPython interpreter is the reference implementation of the language specification and hence it adheres to the largest set of features in the language specification. At the point of this writing, CPython was targeting API version 3.7.
    [Show full text]
  • Optimizing and Evaluating Transient Gradual Typing
    Optimizing and Evaluating Transient Gradual Typing Michael M. Vitousek Jeremy G. Siek Avik Chaudhuri Indiana University, USA Indiana University, USA Facebook Inc., USA [email protected] [email protected] [email protected] Abstract 1 Introduction Gradual typing enables programmers to combine static and Gradual typing enables programmers to gradually evolve dynamic typing in the same language. However, ensuring their programs from the dynamic typing, which allows flex- sound interaction between the static and dynamic parts can ibility, to static typing, providing security [Siek and Taha incur runtime cost. In this paper, we analyze the perfor- 2006; Tobin-Hochstadt and Felleisen 2006]. Over the last mance of the transient design for gradual typing in Retic- decade, gradual typing has been of great interest to both ulated Python, a gradually typed variant of Python. This the research community [Ahmed et al. 2011; Allende et al. approach inserts lightweight checks throughout a program 2013a; Rastogi et al. 2012; Ren et al. 2013; Siek et al. 2015b; rather than installing proxies on higher order values. We Swamy et al. 2014; Takikawa et al. 2012], and to industry, show that, when using CPython as a host, performance de- which has introduced several languages with elements of creases as programs evolve from dynamic to static types, up gradual typing, such as TypeScript [Microsoft 2012], Flow to a 6× slowdown compared to equivalent Python programs. [Facebook 2014], and Dart [Google 2011]. Many existing To reduce this overhead, we design a static analysis and gradually typed languages operate by translating a “surface optimization that removes redundant runtime checks, em- language” program (i.e.
    [Show full text]
  • Introducing Python
    Introducing Python Bill Lubanovic Introducing Python by Bill Lubanovic Copyright © 2015 Bill Lubanovic. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safaribooksonline.com). For more information, contact our corporate/ institutional sales department: 800-998-9938 or [email protected]. Editors: Andy Oram and Allyson MacDonald Indexer: Judy McConville Production Editor: Nicole Shelby Cover Designer: Ellie Volckhausen Copyeditor: Octal Publishing Interior Designer: David Futato Proofreader: Sonia Saruba Illustrator: Rebecca Demarest November 2014: First Edition Revision History for the First Edition: 2014-11-07: First release 2015-02-20: Second release See http://oreilly.com/catalog/errata.csp?isbn=9781449359362 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Introducing Python, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While the publisher and the author have used good faith efforts to ensure that the information and instruc‐ tions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work.
    [Show full text]
  • Biopython Project Update 2013
    Biopython Project Update 2013 Peter Cock & the Biopython Developers, BOSC 2013, Berlin, Germany Twitter: @pjacock & @biopython Introduction 2 My Employer After PhD joined Scottish Crop Research Institute In 2011, SCRI (Dundee) & MLURI (Aberdeen) merged as The James Hutton Institute Government funded research institute I work mainly on the genomics of Plant Pathogens I use Biopython in my day to day work More about this in tomorrow’s panel discussion, “Strategies for Funding and Maintaining Open Source Software” 3 Biopython Open source bioinformatics library for Python Sister project to: BioPerl BioRuby BioJava EMBOSS etc (see OBF Project BOF meeting tonight) Long running! 4 Brief History of Biopython 1999 - Started by Andrew Dalke & Jef Chang 2000 - First release, announcement publication Chapman & Chang (2000). ACM SIGBIO Newsletter 20, 15-19 2001 - Biopython 1.00 2009 - Application note publication Cock et al. (2009) DOI:10.1093/bioinformatics/btp163 2011 - Biopython 1.57 and 1.58 2012 - Biopython 1.59 and 1.60 2013 - Biopython 1.61 and 1.62 beta 5 Recap from last BOSC 2012 Eric Talevich presented in Boston Biopython 1.58, 1.59 and 1.60 Visualization enhancements for chromosome and genome diagrams, and phylogenetic trees More file format parsers BGZF compression Google Summer of Code students ... Bio.Phylo paper submitted and in review ... Biopython working nicely under PyPy 1.9 ... 6 Publications 7 Bio.Phylo paper published Talevich et al (2012) DOI:10.1186/1471-2105-13-209 Talevich et al. BMC Bioinformatics 2012, 13:209 http://www.biomedcentral.com/1471-2105/13/209 SOFTWARE OpenAccess Bio.Phylo: A unified toolkit for processing, analyzing and visualizing phylogenetic trees in Biopython Eric Talevich1*, Brandon M Invergo2,PeterJACock3 and Brad A Chapman4 Abstract Background: Ongoing innovation in phylogenetics and evolutionary biology has been accompanied by a proliferation of software tools, data formats, analytical techniques and web servers.
    [Show full text]
  • Micropython and the Internet of Things
    MicroPython and the Internet of Things Damien P. George George Robotics Limited, Cambridge, UK GOTO Amsterdam, 15th June 2016 Motivation for MicroPython Electronics circuits now pack an enor- mous amount of functionality in a tiny package. Need a way to control all these sophisti- cated devices. Scripting languages enable rapid development. Is it possible to put Python on a microcontroller? Why is it hard? I Very little memory (RAM, ROM) on a microcontroller. D.P. George MicroPython and IoT 3/23 Why Python? I High-level language with powerful features (classes, list comprehension, generators, exceptions, . ). I Large existing community. I Very easy to learn, powerful for advanced users: shallow but long learning curve. I Ideal for microcontrollers: native bitwise operations, procedural code, distinction between int and float, robust exceptions. I Lots of opportunities for optimisation (Python is compiled). D.P. George MicroPython and IoT 4/23 Why can’t we use CPython? (or PyPy?) I Integer operations: Integer object (max 30 bits): 4 words (16 bytes) Preallocates 257+5=262 ints 4k RAM! ! Could ROM them, but that’s still 4k ROM. And each integer outside the preallocated ones would be another 16 bytes. I Method calls: led.on(): creates a bound-method object, 5 words (20 bytes) led.intensity(1000) 36 bytes RAM! ! I For loops: require heap to allocate a range iterator. D.P. George MicroPython and IoT 5/23 Crowdfunding via Kickstarter Kickstarter is a good way to see if your idea has traction, or not. I 30th April 2013: start! I 17th September: flashing LED with button in bytecode Python.
    [Show full text]
  • Fiole Documentation Release 0.4.1 Florent
    Fiole Documentation Release 0.4.1 Florent Xicluna July 03, 2014 Contents 1 Overview 3 1.1 Quickstart................................................3 1.2 Next steps................................................4 2 Routing requests 5 2.1 Decorators................................................5 2.2 Dynamic routes..............................................5 2.3 Hooks...................................................6 2.4 Helpers..................................................7 3 Build templates 9 3.1 Template loading............................................. 10 3.2 Inline expressions............................................ 10 3.3 Directives................................................. 12 3.4 Python code............................................... 13 3.5 Restrictions................................................ 14 4 Fiole API 17 4.1 Decorators................................................ 17 4.2 Helpers.................................................. 17 4.3 WSGI application............................................ 18 4.4 Template engine............................................. 21 5 Developer’s notes 25 5.1 Frequently asked questions........................................ 25 5.2 Source code............................................... 27 5.3 Changes................................................. 27 6 Indices and tables 29 7 Credits 31 8 License 33 Python Module Index 35 i ii Fiole Documentation, Release 0.4.1 Contents: Contents 1 Fiole Documentation, Release 0.4.1 2 Contents CHAPTER 1 Overview fiole.py
    [Show full text]
  • Micropython Documentation Release 1.10 Damien P. George, Paul
    MicroPython Documentation Release 1.10 Damien P. George, Paul Sokolovsky, and contributors Jan 25, 2019 CONTENTS 1 MicroPython libraries 1 1.1 Python standard libraries and micro-libraries..............................2 1.1.1 Builtin functions and exceptions................................2 1.1.2 array – arrays of numeric data................................5 1.1.3 cmath – mathematical functions for complex numbers....................5 1.1.4 gc – control the garbage collector...............................6 1.1.5 math – mathematical functions................................7 1.1.6 sys – system specific functions................................9 1.1.7 ubinascii – binary/ASCII conversions........................... 11 1.1.8 ucollections – collection and container types...................... 11 1.1.9 uerrno – system error codes................................. 12 1.1.10 uhashlib – hashing algorithms............................... 13 1.1.11 uheapq – heap queue algorithm................................ 14 1.1.12 uio – input/output streams................................... 14 1.1.13 ujson – JSON encoding and decoding............................ 16 1.1.14 uos – basic “operating system” services............................ 16 1.1.15 ure – simple regular expressions............................... 20 1.1.16 uselect – wait for events on a set of streams........................ 22 1.1.17 usocket – socket module................................... 23 1.1.18 ussl – SSL/TLS module................................... 28 1.1.19 ustruct – pack and unpack
    [Show full text]