Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla

Total Page:16

File Type:pdf, Size:1020Kb

Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla To cite this version: Paul Irolla. Formalization of Neural Network Applications to Secure 3D Mobile Applications. Quanti- tative Methods [q-bio.QM]. Université Paris Saclay (COmUE), 2018. English. NNT : 2018SACLS585. tel-02047792 HAL Id: tel-02047792 https://tel.archives-ouvertes.fr/tel-02047792 Submitted on 25 Feb 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Formalization of neural 2018SACLS585 network to secure 3D NNT: mobile applications Thèse de doctorat de l’Université Paris-Saclay préparée à l’Université Paris-Sud École doctorale n± 568 Biosigne Spécialité de doctorat: innovation technologique Thèse présentée et soutenue a l’ESIEA Laval, le 19 décembre 2018, par Paul Irolla Composition du jury: Éric Filiol Directeur de recherche — Laboratoire CNS Directeur de thèse Jean-Philippe Deslys Directeur de recherche — Laboratoire CEA/DRF/iMETI/SEPIA Co-directeur de thèse Ludovic Apvrille Professeur — Laboratoire LabSoC (Telecom ParisTech) Rapporteur Antonella Santone Professeur — Università degli Studi del Molise Rapporteur Maroun Chamoun Professeur — Université Saint-Joseph (Beyrouth) Président Akka Zemmari Maître de conférences — Laboratoire LaBRI (CNRS) Examinateur Thèse de doctorat Thèse Titre: Formalisation et applications des réseaux de neurones à la sécurisation d’applications mobiles 3D. Mots clés: Détection de Malware Android, Vulnérabilité, Data Mining, Apprentissage Artificiel, Séquence Résumé: Ce travail de thèse fait partie du pro- l’environnement client et les communications avec le jet 3D NeuroSecure. C’est un Projet d’Investisse- serveur doivent être sécurisés. Cette thèse contribue ment d’Avenir (PIA) qui vise à développer une so- à l’état de l’art dans la domaines suivants: analyse lution collaborative pour l’innovation thérapeutique statique et dynamique d’applications Android; web en utilisant des technologies de traitement haute per- crawling d’applications ; sélection de caractéristique formance (HPC) appliquées au monde biomédical. pour l’apprentissage automatique; algorithme d’en- Cette solution permettra aux experts de différents trainement, d’initialisation et d’anti-saturation des domaines de naviguer intuitivement dans l’Imagerie réseaux de neurones; Algorithmes formels pour l’uti- Big Data avec accès via des terminaux légers 3D. lisation des séquences communes dans un groupe de La protection des données biomédicales contre les séquences afin de le caractériser; des prototypes opé- fuites de données est primordiale. En tant que tel, rationnels ont été conçus pour chaque innovation. Title: Formalization of neural network to secure 3D mobile applications. Keywords: Android Malware Detection, Vulnerability, Data Mining, Machine Learning, Sequence. Abstract: This thesis work is part of the 3D Neu- ment and communications with the server must be roSecure project. It is an investment project, that secured. This thesis contributes to the state of the aims to develop a secure collaborative solution for art in the following areas: Static and dynamic ana- therapeutic innovation using high performance pro- lysis of Android applications; application web craw- cessing (HPC) technology to the biomedical world. ling; Feature selection for Machine Learning; Neural This solution will give the opportunity for experts Network training, initialization and anti-saturation from different fields to navigate intuitively in the algorithm; Formal algorithms to use common se- Big Data imaging with access via 3D light terminals. quences in a sequence group for characterizing it; Biomedical data protection against data leaks is of Production-ready implementations have been desi- foremost importance. As such, the client environne- gned for each innovation. Université Paris-Saclay Espace Technologique / Immeuble Discovery Route de l’Orme aux Merisiers RD 128 / 91190 Saint-Aubin, France TABLEOF CONTENTS TABLEOF CONTENTS 5 LISTOF FIGURES 7 LISTOF TABLES 9 Ackowledgements 11 1 Introduction 13 1.1 3D NeuroSecure............................................... 13 1.2 Research directions............................................. 15 2 Preliminary studies & background in Android Security 21 2.1 Android malware characterization.................................... 22 2.2 Android and infection techniques.................................... 24 2.3 Malware applications in Google PlayStore............................... 30 2.4 Application vulnerabilities......................................... 34 3 Sample & Feature Collection 47 3.1 Sample Collection.............................................. 47 3.2 Static Analysis................................................ 54 3.3 Dynamic Analysis.............................................. 65 4 Neural Networks 83 4.1 Neural Network Theory.......................................... 83 4.2 Problematics of Neural Network Application.............................. 100 4.3 Deep Learning................................................ 115 5 Systematic Characterization of a Sequence Group 125 5.1 Motivations................................................. 126 5.2 Notation & Definitions........................................... 127 5.3 The Embedding Antichain......................................... 128 5.4 The Embedding Antichain Between Two Sequences Without Intra-Repetions.......... 129 5.5 The Embedding Antichain of n Sequences Without Intra-Repetition................ 132 5.6 The Embedding Antichain of Two Sequences.............................. 134 5.7 The Embedding Antichain of n Sequences............................... 137 5.8 Experimental Results............................................ 137 5.9 Conclusion.................................................. 143 6 Experimental Results 147 6.1 Feature Selection.............................................. 147 6.2 Malware Detection with Static and Dynamic Analysis......................... 156 6.3 Conclusion.................................................. 158 Appendix 163 5 LISTOF FIGURES 2.1 Value of personal information on the dark web............................ 23 2.2 (Godless) IDO Alarm Clock, analyzed with Glassbox .......................... 27 2.3 (Godless) Drive-by download attack................................... 28 2.4 (Godless) MoboWIFI app, connected to Glassbox access point................... 29 2.5 Social engineering exploit......................................... 30 2.6 Google PlayStore download protocol.................................. 31 2.7 Cygea crawler architecture........................................ 32 2.8 Facebook user information collection.................................. 36 2.9 Yandex wifi collection........................................... 38 2.10 Interception of an encrypted message.................................. 40 2.11 Abitrary execution of shell commands received from JPMorgan servers.............. 40 2.12 Canara Bank : vulnerable server..................................... 42 2.13 Debug mode enabled in production application............................ 42 3.1 Distribution of application sequence sets (size > 1).......................... 50 3.2 Inaccuracy (%) with and without the duplicates............................ 53 3.3 DEX file format............................................... 55 3.4 How an implicit intent is delivered through the system to start another activity : (1) Activity A creates an Intent with an action description and passes it to startActivity(). (2) The Android System searches all apps for an intent filter that matches the intent. When a match is found, (3) the system starts the matching activity (Activity B) by invoking its onCreate() method and passing it the Intent............................................. 56 3.5 Top 20 permissions............................................. 58 3.6 Top 20 intents................................................ 59 3.7 Egide Control Flow Graph......................................... 62 3.8 Surgical extraction of features in memory................................ 64 3.9 Application pre-execution DVM vs ART ................................. 65 3.10 Glassbox — Architecture overview..................................... 71 3.11 Android architecture overview....................................... 72 4.1 Google Deep Dream............................................ 85 4.2 Manuscript text generation by neural network (Fujitsu — Loïc Behesti from ESIEA)....... 85 4.3 Finding three clusters in gaussian noise input data.......................... 87 4.4 Variety of neurons.............................................. 87 4.5 A close view on a layer of neurons.................................... 88 4.6 Organization of neuron layers....................................... 88 4.7 Neuron internal structure......................................... 88 4.8 Ions movement around the neuron membrane............................ 89 4.9 Potential for action............................................. 89 4.10 Transmission of the potential for action................................. 89 4.11
Recommended publications
  • Decimal Layouts for IEEE 754 Strawman3
    IEEE 754-2008 ECMA TC39/TG1 – 25 September 2008 Mike Cowlishaw IBM Fellow Overview • Summary of the new standard • Binary and decimal specifics • Support in hardware, standards, etc. • Questions? 2 Copyright © IBM Corporation 2008. All rights reserved. IEEE 754 revision • Started in December 2000 – 7.7 years – 5.8 years in committee (92 participants + e-mail) – 1.9 years in ballot (101 voters, 8 ballots, 1200+ comments) • Removes many ambiguities from 754-1985 • Incorporates IEEE 854 (radix-independent) • Recommends or requires more operations (functions) and more language support 3 Formats • Separates sets of floating-point numbers (and the arithmetic on them) from their encodings (‘interchange formats’) • Includes the 754-1985 basic formats: – binary32, 24 bits (‘single’) – binary64, 53 bits (‘double’) • Adds three new basic formats: – binary128, 113 bits (‘quad’) – decimal64, 16-digit (‘double’) – decimal128, 34-digit (‘quad’) 4 Why decimal? A web page… • Parking at Manchester airport… • £4.20 per day … … for 10 days … … calculated on-page using ECMAScript Answer shown: 5 Why decimal? A web page… • Parking at Manchester airport… • £4.20 per day … … for 10 days … … calculated on-page using ECMAScript Answer shown: £41.99 (Programmer must have truncated to two places.) 6 Where it costs real money… • Add 5% sales tax to a $ 0.70 telephone call, rounded to the nearest cent • 1.05 x 0.70 using binary double is exactly 0.734999999999999986677323704 49812151491641998291015625 (should have been 0.735) • rounds to $ 0.73, instead of $ 0.74
    [Show full text]
  • Éric FREYSSINET Lutte Contre Les Botnets
    THÈSE DE DOCTORAT DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité Informatique École doctorale Informatique, Télécommunications et Électronique (Paris) Présentée par Éric FREYSSINET Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Sujet de la thèse : Lutte contre les botnets : analyse et stratégie Présentée et soutenue publiquement le 12 novembre 2015 devant le jury composé de : Rapporteurs : M. Jean-Yves Marion Professeur, Université de Lorraine M. Ludovic Mé Enseignant-chercheur, CentraleSupélec Directeurs : M. David Naccache Professeur, École normale supérieure de thèse M. Matthieu Latapy Directeur de recherche, UPMC, LIP6 Examinateurs : Mme Clémence Magnien Directrice de recherche, UPMC, LIP6 Mme Solange Ghernaouti-Hélie Professeure, Université de Lausanne M. Vincent Nicomette Professeur, INSA Toulouse Cette thèse est dédiée à M. Celui qui n’empêche pas un crime alors qu’il le pourrait s’en rend complice. — Sénèque Remerciements Je tiens à remercier mes deux directeurs de thèse. David Naccache, officier de réserve de la gendarmerie, contribue au développement de la recherche au sein de notre institution en poussant des personnels jeunes et un peu moins jeunes à poursuivre leur passion dans le cadre académique qui s’impose. Matthieu Latapy, du LIP6, avec qui nous avions pu échanger autour d’une thèse qu’il encadrait dans le domaine difficile des atteintes aux mineurs sur Internet et qui a accepté de m’accueillir dans son équipe. Je voudrais remercier aussi, l’ensemble de l’équipe Réseaux Complexes du LIP6 et sa responsable d’équipe actuelle, Clémence Magnien, qui m’ont accueilli à bras ouverts, accom- pagné à chaque étape et dont j’ai pu découvrir les thématiques et les méthodes de travail au fil des rencontres et des discussions.
    [Show full text]
  • HILLGANG Executive IT Specialist, IBM the University of Warwick
    . An introduction to the z10 – Harv Emery, Professor in the Department of Computer Science at HILLGANG Executive IT Specialist, IBM the University of Warwick. Update on OpenSolaris on System z ABSTRACTS System Cloning – The DC VM & Linux Users’ Group Principles and Practice Changing the way computers compute There is plenty of information available for cloning Linux guests and even z/OS guests but what about Most numeric data in commercial and human-centric cloning entire VM systems? For instance - you have a applications are decimal, and floating-point decimal need for two VM environments (one for virtual increasingly important as these applications become servers and another for z/OS D/R including XRC ever more complex. Benchmarking has indicated that DASD mirroring) in two different data centers, for a some applications spend a considerable amount of total of 4 VM systems. How can you save time and time in decimal processing, and IBM has now effort? Build one and clone it! Come and hear how a implemented decimal floating-point in z9 microcode, customer adopted the philosophy that he has been z10 hardware, Power6 hardware, and in many employing for z/OS for a long time and now has software products. developed for his VM systems. The talk will include how to maintain one VM system and 'roll' the updates In this talk, Mike will cover: out to other VM systems with including large systems • Why decimal arithmetic is increasingly important into their curriculum. • Why IBM has added hardware support • The decimal floating-point formats and IBM System z10 arithmetic, derived from Rexx, which is in the Enterprise Class Announcing the 12th Meeting of the new Hillgang IEEE 754 draft, z/VM, z/OS, DB2, C and other products Overview • How to exploit the new hardware and software in In this session the speaker, will present an .
    [Show full text]
  • The Design of the REXX Language
    The design of the REXX language by M. F. Cowlishaw One way of classifying computer languagesis by two (consciously or otherwise) to be easy to compile or classes: languages needing skilled programmers, and easy to interpret, it is designed (with the help of personal languages usedby an expanding population of general users. REstructured extended executor feedback from hundreds of users) to be easy to use. (REXX) isa flexible personal language designed with particular attention to feedback from its users. It has Three major factors affect the usability of a language. proved to be effective and easyto use, yet it is suffi- First, the basic concepts of a language affect its ciently general and powerfulto fulfil theneeds of many demanding professional applications.REXX is system syntax, grammar, and consistency. Second, the his- and hardware independent,so that it has been possi- tory and development of a language determine its ble to integrate it experimentally into several operating function, usability, and completeness. Third, but systems. Here REXX isused for such purposes as com- quite independently, the implementation of a lan- mand and macro programming, prototyping, educa- guage affects its acceptability, portability, and distri- tion, and personal programming. This paper introduces REXX and describes the basic design principles that bution. This paper introduces REXX and then dis- were followed in developingit. cusses basic concepts and developmental history as applied to the design of the REXX language. There are several experimental implementations of the REXX language within IBM for both large and small machines. One of these, by the author, has omputer languages may be classified in many become a part of the Virtual Machine/System Prod- ways.
    [Show full text]
  • Proceedings of the Rexx Symposium for Developers and Users
    SLAC-R-95-464 CONF-9505198-- PROCEEDINGS OF THE REXX SYMPOSIUM FOR DEVELOPERS AND USERS May 1-3,1995 Stanford, California Convened by STANFORD LINEAR ACCELERATOR CENTER STANFORD UNIVERSITY, STANFORD, CALIFORNIA 94309 Program Committee Cathie Dager of SLAC, Convener Forrest Garnett of IBM Pam Taylor of The Workstation Group James Weissman Prepared for the Department of Energy under Contract number DE-AC03-76SF00515 Printed in the United States of America. Available from the National Technical Information Service, U.S. Department of Commerce, 5285 Port Royal Road, Springfield, Virginia 22161. DISTRIBUTION OF THIS DOCUMENT IS UNLIMITED ;--. i*-„r> ->&• DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, make any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. DISCLAIMER Portions
    [Show full text]
  • Universidad Carlos Iii De Madrid Signal Processing
    UNIVERSIDAD CARLOS III DE MADRID ESCUELA POLITÉCNICA SUPERIOR BACHELOR THESIS SIGNAL PROCESSING FOR MALWARE ANALYSIS Computer Engineering Department AUTHOR: Raquel Tabuyo Benito TUTOR: Pedro Peris Lopez June, 2016 Bachelor Thesis. Signal Processing for Malware Analysis “Perseverance is not a long race. It is many short races one aftr te oter” -Walter Elliot - Page .2 of 134. - Bachelor Thesis. Signal Processing for Malware Analysis Acknowledgements To my whole family, specially my sister, for whom I have an unconditionally love. I am really grateful for their dedication, patience, support and encouragement to follow my dreams. To Pedro, my Bachelor Thesis tutor, whose kindness and guidance have helped me during this wonderful trip. To my friends, thank you very much for showing me the meaning of true friendship. Without all of you, this would have never been possible. - Page .3 of 134. - Bachelor Thesis. Signal Processing for Malware Analysis Abstract This Project is an experimental analysis of Android malware through images. The analysis is based on classifying the malware into families or differentiating between goodware and malware. This analysis has been done considering two approaches. These two approaches have a common starting point, which is the transformation of Android applications into PNG images. After this conversion, the first approach was subtracting each image from the testing set with the images of the training set, in order to establish which unknown malware belongs to a specific family or to distinguish between goodware and malware. Although the accuracy was higher than the one defined in the requirements, this approach was a time consuming task, so we consider another approach to reduce the time and get the same or better accuracy.
    [Show full text]
  • 25 Years of Rexx ― a Personal View
    25 years of Rexx ― a personal view Böblingen 4 May 2004 Mike Cowlishaw IBM Fellow (Google: cowlishaw) Rexx25 Overview Questions, questions … Copyright © IBM Corporation 2004. All rights reserved. 2 All the … President’s questions … 3 Who was I? My IBM job? • Pre-University student with IBM (1970) – PL/I compiler, etc. • BSc Electronic Engineering – Birmingham • Day job: Test Tools Team – designing and building hardware for testing terminals such as the 3279 … 4 Microlink • Used existing coax terminal link (ANR) to attach bipolar microcomputers (based on the Signetics 8X300) to mainframe 5 Own-time projects? • Mostly PL/I and S/360 Assembler – Archaeological mapping (1974) – Cave surveying programs (1976) • STET, a STructured Editing Tool (1977) – and lots of other VM/CMS tools •Rex (1979) – a biggie: 4,000 hours to 1982 6 How old was I? well, 25 years is 25 years … 7 Why Rex? • CMS had EXEC … a bit like DOS BAT &CONTROL OFF &IF &INDEX EQ 0 &GOTO -GO EXEC DCOPT DROP &IF &RETCODE GE 12 &EXIT -GO &STACK RT … • EXEC 2: clean design, but just as ugly – language committee (Stephenson et al.) – hooks for vanilla CMS by Michel Hack 8 What were the first Rex programs? • ADDR EXEC … searches nickname file for nickname, displays name and address • SEND EXEC … send file to a local user • CONC XEDIT … concatenate and flow • … and lots of testcases 9 Who used it? • First distributable code was in May 1979; until then, only the one user • The first real users (pioneers, guinea pigs, trend-setters, …) were – Ray Mansell (Hursley, UK) – Les Koehler (Raleigh, NC) lots of useful feedback 10 How did it catch on? • Internal IBM network, VNET, rapidly growing • VM Newsletter (Peter Capek) • Word of mouth, Xmas card … • Add-ons (Steve Davies’ functions and others) 11 Was there a Rex motto? • Sort of.
    [Show full text]
  • Cybercrime Hits the Unexpected
    TrendLabsSM 1Q 2014 Security Roundup Cybercrime Hits the Unexpected Bitcoin- and PoS-System-Related Attacks Trouble Users Distributed by: TREND MICRO | TrendLabs 1Q 2014 Security Roundup TREND MICRO | TrendLabs 1Q 2014 Security Roundup Contents It gives me immense pleasure to share this report, developed by Trend Micro and distributed by ITU based on our fruitful partnership. This report is part of ITU’s overall support to its 193 Member States within the framework of the Global Cybersecurity Agenda. This is clear result of our partnership with Private Sector in our effort to tackle this growing Global phenomenon. 1 | Cybercrime and the Cybercriminal Underground These efforts are aimed at equipping Member States with information on the latest cybersecurity threats and corresponding counter-measures, and eventually contribute to the creation of a safe and secure cyberspace for consumers, businesses and youth everywhere. This Trend Micro quarterly report underlines the existing and emerging malicious cyber activities observed during the first quarter of 2014. Some highlights of this 10 | Mobile Threat Landscape report: • Cybercriminals are continuing to innovate and create new ways to commit digital crimes. Crypto-currency exchanges and wallets are being compromised for the purpose of theft. In addition, online banking malware are being enhanced with new technologies to exact the maximum damage. 15 | Targeted Attack Campaigns • With the exponential growth in the mobile industry, cyber-criminals are and Cyber Attacks increasingly targeting mobile devices. There is a proliferation of maliciously tampered and re-packaged apps that circumvent the security firewalls in mobile devices. • We are also witnessing cases of attacks directly aimed at organizations that rely on specific Point of Sales (Pos) systems features.
    [Show full text]
  • ALGORITHMIC INFORMATION THEORY Third Printing
    ALGORITHMIC INFORMATION THEORY Third Printing GJChaitin IBM, P O Box 218 Yorktown Heights, NY 10598 [email protected] April 2, 2003 This book was published in 1987 by Cambridge Uni- versity Press as the first volume in the series Cam- bridge Tracts in Theoretical Computer Science. In 1988 and 1990 it was reprinted with revisions. This is the text of the third printing. However the APL character set is no longer used, since it is not gen- erally available. Acknowledgments The author is pleased to acknowledge permission to make free use of previous publications: Chapter 6 is based on his 1975 paper “A theory of program size formally identical to information theory” published in volume 22 of the Journal of the ACM, copyright c 1975, Association for Computing Machinery, Inc., reprinted by permission. Chapters 7, 8, and 9 are based on his 1987 paper “Incompleteness theorems for random reals” published in volume 8 of Advances in Ap- plied Mathematics, copyright c 1987 by Academic Press, Inc. The author wishes to thank Ralph Gomory, Gordon Lasher, and the Physics Department of the Watson Research Center. 1 2 Foreword Turing’s deep 1937 paper made it clear that G¨odel’s astonishing earlier results on arithmetic undecidability related in a very natural way to a class of computing automata, nonexistent at the time of Turing’s paper, but destined to appear only a few years later, subsequently to proliferate as the ubiquitous stored-program computer of today. The appearance of computers, and the involvement of a large scientific community in elucidation of their properties and limitations, greatly enriched the line of thought opened by Turing.
    [Show full text]
  • The Malware Book 2016
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/305469492 Handbook of Malware 2016 - A Wikipedia Book Book · July 2016 DOI: 10.13140/RG.2.1.5039.5122 CITATIONS READS 0 13,014 2 authors, including: Reiner Creutzburg Brandenburg University of Applied Sciences 489 PUBLICATIONS 472 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: NDT CE – Assessment of structures || ZfPBau – ZfPStatik View project 14. Nachwuchswissenschaftlerkonferenz Ost- und Mitteldeutscher Fachhochschulen (NWK 14) View project All content following this page was uploaded by Reiner Creutzburg on 20 July 2016. The user has requested enhancement of the downloaded file. Handbook of Malware 2016 A Wikipedia Book By Wikipedians Edited by: Reiner Creutzburg Technische Hochschule Brandenburg Fachbereich Informatik und Medien PF 2132 D-14737 Brandenburg Germany Email: [email protected] Contents 1 Malware - Introduction 1 1.1 Malware .................................................. 1 1.1.1 Purposes ............................................. 1 1.1.2 Proliferation ........................................... 2 1.1.3 Infectious malware: viruses and worms ............................. 3 1.1.4 Concealment: Viruses, trojan horses, rootkits, backdoors and evasion .............. 3 1.1.5 Vulnerability to malware ..................................... 4 1.1.6 Anti-malware strategies ..................................... 5 1.1.7 Grayware ............................................
    [Show full text]
  • VM/ESA Network Computing with Java and Netrexx
    IBML VM/ESA Network Computing with Java and NetRexx Kris Buelens ** Bengt Heijnesson ** Dave Jones ** Salvador Torres International Technical Support Organization http://www.redbooks.ibm.com This book was printed at 240 dpi (dots per inch). The final production redbook with the RED cover will be printed at 1200 dpi and will provide superior graphics resolution. Please see “How to Get ITSO Redbooks” at the back of this book for ordering instructions. SG24-5148-00 IBML International Technical Support Organization SG24-5148-00 VM/ESA Network Computing with Java and NetRexx November 1998 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix C, “Special Notices” on page 161. First Edition (November 1998) This edition applies to Virtual Machine/Enterprise Systems Architecture (VM/ESA), Version 2 Release 3.0, Program Number 5654-030, and subsequent releases. Note This book is based on a pre-GA version of a product and may not apply when the product becomes generally available. We recommend that you consult the product documentation or follow-on versions of this redbook for more current information. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. HYJ Mail Station P099 522 South Road Poughkeepsie, New York 12601-5400 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1998. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
    [Show full text]
  • IDUG EU 2009 Ron Brown: DB2 and the Joy of Rexx
    Session: 17829 DB2 and the Joy of Rexx Ron Brown Ronek Consulting Wednesday 7th October 2009 17.00 – 18.00 Platform: DB2 for z/OS and LUW Abstract: This presentation aims to cover the use of Rexx and OO-Rexx languages to access DB2 on z/OS and LUW platforms. It will give a brief description of the languages, their standard and non-standard interfaces to DB2, explain some advanced methods of coding for DB2 access, suggest solutions to some common problems, and provide a set of useful code fragment samples. Speaker Biography: For over 20 years Ron Brown has worked with DB2 in many different large companies in roles ranging from systems programming to database administration, and he has been writing Rexx programs on VM, MVS and Windows. Hence he has written many DB2-Rexx programs, many of which are contained in technical articles in Xephon magazines and IT websites. DB2 and the Joy of Rexx • Agenda • What is Rexx? • Rexx – DB2 interfaces • Advanced SQL invocation/debugging on z/OS • SQL invocation on LUW • Sample Rexx-DB2 code 2 1. A brief history of Rexx and OO-Rexx languages on VM, z/OS and LUW, including the differences from other languages and the advantages of using Rexx. 2. Standard interfaces from Rexx to DB2 for SQL, commands, IFI, utilities and Stored Procedures on z/OS and LUW. 3. Advanced invocation and debugging of SQL on z/OS, including third-party interfaces, DSNREXX considerations and invocation of DSNTIAR. 4. Invocation and debugging of SQL on LUW, including SQLEXEC considerations and code for transporting cross platforms.
    [Show full text]