Enhanced Performance and Privacy for Core Internet Protocols

Total Page:16

File Type:pdf, Size:1020Kb

Enhanced Performance and Privacy for Core Internet Protocols Enhanced Performance and Privacy for Core Internet Protocols Kumulative Dissertation zur Erlangung des akademischen Grades Dr. rer. nat. an der Fakultät für Mathematik, Informatik und Naturwissenschaften der Universität Hamburg eingereicht beim Fach-Promotionsausschuss Informatik von Erik Sy aus Pasewalk November 2019 Gutachter: Prof. Dr.-Ing. Hannes Federrath Prof. Dr-Ing. Claudia Diaz Tag der Disputation: 18. August 2020 Danksagung Diese Dissertation ist zwischen 2016 und 2019 am Arbeitsbereich Security and Privacy der Universität Hamburg entstanden. An dieser Stelle möchte ich mich bei allen bedanken, die zu ihrem Gelingen beigetragen haben. Besonderer Dank gilt meinem Doktorvater Hannes Federrath, der mich bei der Erstellung dieser Dissertation begleitet hat. Er hat mit mir die Zuversicht geteilt, dass ich nach meinem Studium der Physik erfolgreich in der IT-Sicherheit forschen werde. Mein Dank gilt ferner Christian Burkert, Mathias Fischer, Dominik Herrmann, Moritz Mön- nich, Tobias Müller, und Matthias Marx für die tolle Zusammenarbeit beim Verfassen von Forschungsbeiträgen. Ich bedanke mich auch bei meinen Kollegen die ich während meiner Promotionszeit kennen und schätzen gelernt habe: Maximilian Blochberger, Britta Böhm, Doganalp Ergenc, Steffen Haas, Malte Hamann, Stefanie Jasser, David Jost, Jens Lindemann, Sadaf Momeni, Johanna Nehring- Ansohn, Tom Petersen, Dimitra Pons, Henning Pridöhl, Eugen Ruppert, Monina Schwarz, Nurefsan Sertbas, Bahareh Shojaie, Marius Stübs, Florian Wilkens und Ephraim Zimmer. Schließlich bedanke ich mich bei meiner Familie, die mich nach Kräften unterstützt und bestärkt hat. Mein ganz besonderer Dank gilt meiner Partnerin Lisa und meinen Kindern Malou und Bela. Sie haben mich intensiv während des Entstehens dieser Arbeit begleitet und mich, immer wenn es nötig war, wieder auf andere Gedanken gebracht. Zusammenfassung Der Datenverkehr im Internet besteht zu einem Großteil aus kurzen Datenübertragungen, welche die Protokolle Domain Name System (DNS), Transmission Control Protocol (TCP), Transport Layer Security (TLS) oder QUIC nutzen. Im Rahmen dieser Dissertation werden Möglichkeiten untersucht, wie diese Protokolle im Hinblick auf Datenschutz, Ressourcenverbrauch sowie Latenz für den Verbindungsaufbau optimiert werden können. Zu den Ergebnissen dieser Dissertation im Bereich DNS gehört die Vorstellung eines Designs zur Auflösung von Domainnamen in IP-Adressen, bei dem der Nutzer relevante DNS-Einträge nicht nur von DNS-Resolvern sondern ebenfalls direkt von Webservern erhalten kann. Dieser Ansatz kann dem Nutzer traditionelle DNS-Anfragen ersparen und damit den Aufruf von Websites erheblich beschleunigen. Ferner, ermöglicht dieser Ansatz einen besseren Schutz von Nutzerdaten, weil der verwendete DNS-Resolver deutlich weniger DNS-Anfragen vom Nutzer einsehen kann. Die Protokolle TCP, TLS und QUIC wurden im Rahmen dieser Dissertation auf Datenschutzprob- leme untersucht. Jedes dieser Protokolle erlaubt ein mehrtägiges Tracking von Onlineaktivitäten eines Internetnutzers. Im Fall der Fast Open Erweiterung des TCP-Protokolls sind die Daten- schutzprobleme besonders gravierend, weil der ausgenutzte Trackingmechanismus im Kernel der Betriebssysteme verankert ist und sich der Kontrolle durch Nutzeranwendungen weitgehend entzieht. Als Reaktion auf dieses Datenschutzproblem wurde u.a. im Browser Firefox die Unterstützung für diese TCP-Protokollerweiterung eingestellt. Zur konstruktiven Lösung der identifizierten Datenschutzprobleme wurden jeweils Verbesserungsmöglichkeiten vorgestellt, evaluiert und gegebenenfalls implementiert. Als Gegenmaßnahme zum erwähnten Problem von TCP Fast Open wurde das TCP Fast Open Privacy Protokoll eingeführt, welches unter an- derem einen TLS-verschlüsselten Datenkanal einsetzt, um Tracking auf Basis von beobachteten Datenverkehr zu verhindern. Zur Steigerung der Performanz von TCP, TLS und QUIC werden in dieser Dissertation zahlreiche Forschungsbeiträge vorgestellt. Beispielsweise konnte für den Aufbau von TLS-Verbindungen während des Aufrufs einer durchschnittlichen Website ein Einsparpotential von 44% der benötigten CPU-Berechnungen und bis zu 30,6% der benötigten Zeit aufgezeigt werden. Diese erhebliche Performanzsteigerung resultiert aus dem Umstand, dass oft TLS-Verbindungen zu anderen Hostnamen mit einem optimierten Verbindungsaufbau basierend auf TLS Session Resumptions durchgeführt werden können. Insgesamt stellt diese Dissertation mehrere Forschungsbeiträge vor, um dem Ziel von daten- schutzfreundlichen und performanten Datenübertragungen im Internet etwas näher zu kom- men. Abstract Most flows on the Internet are short transfers using the protocols Domain Name System (DNS), Transmission Control Protocol (TCP), Transport Layer Security (TLS), or QUIC. This thesis investigates opportunities to improve these protocols regarding their privacy protections, the consumed resources, and the delay caused by the connection establishment. The results of this thesis comprise in the scope of DNS the presentation of a design allowing web servers to push relevant DNS records to their clients. This novel approach can save the client traditional DNS lookups, which would add additional delay to the resolving of domain names into IP addresses. Concerning privacy protections, this design improves the privacy posture of the client with respect to the traditional DNS resolver because it reduces the number of DNS lookups that can be observed by the DNS resolver. Furthermore, this thesis studies privacy threats in the protocols TCP, TLS, and QUIC that each can be exploited to track a user’s online activities for several days. In the case of the Fast Open extension of the TCP protocol the identified privacy threats are especially serious because this tracking mechanism is implemented in the kernel of the operating systems and user applications have difficulties to restrict it. As a reaction to this detected tracking mechanism, the Mozilla Foundation deactivated this protocol extension in all their products including the popular Firefox browser. To mitigate the presented privacy problems, this thesis introduces, evaluates and, where appropriate, implements countermeasures. The issues of TCP Fast Open are addressed by the proposed TCP Fast Open Privacy protocol, which uses for this purpose a cross-layer approach combining TLS and TCP. Thus, a transport-encrypted data channel is used to prevent tracking based on traffic analysis. Moreover, in the scope of this thesis performance-optimizations for TCP, TLS, and QUIC are investigated. For example, savings of 44% of the required CPU computations and up to 30.6% of the required elapsed time are demonstrated for the TLS connection establishments during the retrieval of an average website. This improvement becomes feasible when efficient TLS session resumption handshakes are used across different hostnames. In summary, this thesis provides several contributions towards the goal of secure, privacy-friendly and well-performing transactions on the Internet. Contents 1 Introduction 1 1.1 Problem Statement . .1 1.2 Research Questions . .3 1.3 Research Methodology . .4 1.4 Contributions . .5 1.5 Structure of this Thesis . .9 1.6 List of Publications . 10 2 Enhanced Performance and Privacy via Resolver-Less DNS 13 2.1 Introduction . 14 2.2 DNS Overview and Problem Statement . 15 2.3 Resolver-less DNS . 17 2.4 Performance Evaluation . 22 2.5 Discussion . 26 2.6 Related Work . 28 2.7 Conclusions . 28 2.8 References . 29 3 Enhanced Performance and Privacy for TLS over TCP Fast Open 31 3.1 Introduction . 32 3.2 TCP Fast Open . 34 3.3 Tracking via TCP Fast Open . 38 3.4 TCP Fast Open Privacy . 45 3.5 Related Work . 55 3.6 Conclusion . 55 3.7 References . 56 4 Tracking Users across the Web via TLS Session Resumption 59 4.1 Introduction . 60 4.2 Background . 62 4.3 Privacy Problems with TLS Session Resumption . 64 4.4 Data Collection . 66 4.5 Evaluation . 68 4.6 Countermeasures . 77 4.7 Related Work . 78 4.8 Conclusion . 79 4.9 References . 80 5 Enhanced Performance for the encrypted Web through TLS Resumption across Hostnames 82 5.1 Introduction . 83 5.2 Problem Statement . 84 Contents 5.3 TLS Resumption across Hostnames . 86 5.4 Evaluation . 87 5.5 Discussion . 97 5.6 Related Work . 101 5.7 Conclusions . 101 5.8 References . 101 6 A QUIC Look at Web Tracking 103 6.1 Introduction . 104 6.2 Background on QUIC’s Handshake . 105 6.3 Tracking via QUIC . 107 6.4 Evaluation . 109 6.5 Discussion . 113 6.6 Related Work . 118 6.7 Conclusion . 119 6.8 References . 119 7 Surfing the Web Quicker Than QUIC via a Shared Address Validation 123 7.1 Introduction . 124 7.2 Problem Statement . 125 7.3 Shared Address Validation across Hostnames . 128 7.4 Evaluation . 129 7.5 Related Work . 133 7.6 Conclusions . 133 7.7 References . 134 8 QUICker Connection Establishment with Out-Of-Band Validation Tokens 136 8.1 Introduction . 137 8.2 Out-Of-Band Validation Token . 138 8.3 Evaluation and Discussion . 141 8.4 Related Work . 143 8.5 Conclusions . 144 8.6 References . 144 9 Accelerating QUIC’s Connection Establishment on High-Latency Access Net- works 145 9.1 Introduction . 146 9.2 Background and Problem Statement . 147 9.3 QuicSocks . 150 9.4 Evaluation . 153 9.5 Related Work . 158 9.6 Conclusion . 159 9.7 References . 159 10 Conclusion and Outlook 162 10.1 Conclusion . 162 10.2 Outlook . 163 Bibliography.
Recommended publications
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]
  • “Hidden Backdoor” in Qihoo 360 Secure Browser
    Independent Report on Alledged “Hidden Backdoor” in Qihoo 360 Secure Browser . IDF Laboratory Release Date: November 25, 2012 INTELLIGENCE DEFENSE FRIENDS LABORATORY http://www.idf.cn IDF Laboratory Version: <1.4> Independent Report on Alledged “Hidden Backdoor” in Qihoo 360 Date: <24/11/2012> Secure Browser Document Sign:IDF-REPDOC-20121124 Copyright Statement This research report is complied by IDF laboratory, unless it is published and agreed, its copyright belongs to IDF laboratory. While the quoted parts in the report belong to the original writer or corresponding units. Without the permission of IDF laboratory and the writer, any unit and individual are not allowed to transfer the contents of this report or use for other purpose, and this report is only for the reference of the industry research without commercial purposes. Welcome your criticism and correction. IDF Laboratory (Intelligence Defense Friends Laboratory) is a technical civil club for the enthusiasts of network information security, the backbone of which is made up of professionals, technicians and hobbyists from relevant fields. The research direction of IDF mainly focus on: the technical fields such as the development tendency of Internet threat, terminal security management, communication security of wireless network, botnet, as well as product research. IDF laboratory provides universal education of computer security knowledge for a great many enthusiasts of network information security, participates in the evaluation of the technology and market research for the products and development trends of relevant fields within the industry objectively and independently, thus providing the platform and bridge for the enthusiasts of network information security to be grow up as professional security or technical employees.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • Internet Safety Tips
    Welcome to the Internet SIG Internet Safety Many of the items in today’s presentation have been previously discussed. I hope nobody minds a review. Discussion Topics ● Browser Safety ● Social Media Safety ● Password Safety ● Personal Data Tips ● Off Line Safety? ● Some Final Links Browser Safety Tips Update Your Browser ● Updates prevent many attacks ● Keep your anti-virus updated ● Make sure add-ons and extensions are safe ● Don’t click on links you are not sure of ● Make sure your connection is secure 1) HTTPS 2) Better yet – Use a VPN ● Follow your instincts Consider Using an Anonymous Browser ● Tor ● Brave ● Epic ● SRWare Iron ● Comodo Dragon ● Yandex ● Tails – Much More Than a Browser Social Media Safety Tips ● Keep your personal data personal ● Be careful when liking or sharing ● Are your friends really your friends? ● Don’t share your passwords ● Avoid posting your location ● Double check links before you click them Password Safety Tips ● It’s YOUR password – don’t share it ● Longer is Stronger ● Different sites – Different passwords ● Test your passwords ● Consider using a Password Manager ● One of many good videos – 3:30 minutes ● Don’t forget the old Underwear Joke Personal Data Tips Check If You’ve Been Compromised ● Have I been PWNED? ● PWNED Passwords ● Privacy Rights Clearinghouse – Data Breaches ● There are many other sites that do the same thing. These three I know are safe to use. Check out sites before you use them. You don’t want to get hacked while checking to see if you were hacked. Offline Safety Tips Offline Things Can Affect Online Safety ● Remember that your phone is a computer.
    [Show full text]
  • Data Politics;Worlds, Subjects, Rights;
    DATA POLITICS Data has become a social and political issue because of its capacity to reconfigure relationships between states, subjects, and citizens. This book explores how data has acquired such an important capacity and examines how critical interventions in its uses in both theory and practice are possible. Data and politics are now inseparable: data is not only shaping our social relations, preferences, and life chances but our very democracies. Expert inter- national contributors consider political questions about data and the ways it provokes subjects to govern themselves by making rights claims. Concerned with the things (infrastructures of servers, devices, and cables) and language (code, programming, and algorithms) that make up cyberspace, this book demonstrates that without understanding these conditions of possibility it is impossible to intervene in or to shape data politics. Aimed at academics and postgraduate students interested in political aspects of data, this volume will also be of interest to experts in the fields of internet studies, international studies, Big Data, digital social sciences, and humanities. Didier Bigo is Professor of War Studies at King’s College London and Research Professor at Sciences-Po, CERI Paris. Engin Isin is Professor in International Politics at Queen Mary University of London, UK and University of London Institute in Paris (ULIP). Evelyn Ruppert is Professor of Sociology at Goldsmiths, University of London. Routledge Studies in International Political Sociology Series Editors: Tugba Basaran, University of Kent, UK, Didier Bigo, King’s College London, UK, Emmanuel-Pierre Guittet, University of Manchester, UK, Jef Huysmans, Queen Mary, University of London, UK Routledge Studies in International Political Sociology aims to provide a forum for out- standing empirical and theoretical research engaging with the interplays between the international, the political and the social.
    [Show full text]
  • Ant Download Manager (Antdm) V.2.3.2
    English Ant Download Manager (AntDM) v.2.4.0 Some of the contents in this manual may differ from the software, as software development continues. User Guide 2021 Table of Contents Overview ....................................................................................................................................................4 System Requirements .........................................................................................................................5 Installation ..................................................................................................................................................6 Uninstall .............................................................................................................................................11 Premium Link Generators (Debrids) .......................................................................................................12 Torrents ....................................................................................................................................................14 Browser Integration ..................................................................................................................................15 Google Chrome .................................................................................................................................16 Chromium Clones ........................................................................................................................17 Mozilla Firefox ....................................................................................................................................18
    [Show full text]
  • Attack Surface Analysis and Code Coverage Improvement for Fuzzing
    This document is downloaded from DR‑NTU (https://dr.ntu.edu.sg) Nanyang Technological University, Singapore. Attack surface analysis and code coverage improvement for fuzzing Peng, Lunan 2019 Peng, L. (2019). Attack surface analysis and code coverage improvement for fuzzing. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/105642 https://doi.org/10.32657/10356/105642 Downloaded on 07 Oct 2021 23:08:40 SGT Attack Surface Analysis and Code Coverage Improvement for Fuzzing PENG LUNAN School of Physical and Mathematical Sciences 2019 Attack Surface Analysis and Code Coverage Improvement for Fuzzing PENG LUNAN School of Physical and Mathematical Sciences A thesis submitted to the Nanyang Technological University in partial fulfillment of the requirements for the degree of Master of Science 2019 Supervisor Declaration Statement I have reviewed the content and presentation style of this thesis and declare it of sufficient grammatical clarity to be examined. To the best of my knowledge, the thesis is free of plagiarism and the research and writing are those of the candidate’s except as acknowledged in the Author Attribution Statement. I confirm that the investigations were conducted in accord with the ethics policies and integrity standards of Nanyang Technological University and that the research data are presented honestly and without prejudice. Date Wu Hongjun Abstract As cybercrime becoming a worldwide threat in the past decades, research on cyber- security keeps attracting a great deal of attention. During a long time competition between attackers and defenders, vulnerability detection has been considered as the decisive pre-step for both sides. Among the massive methodologies of vulnerability detection, fuzzing test has demonstrated its outstanding performance on finding bugs automatically and effectively.
    [Show full text]
  • Tencent Cloud Comunication Solutions for China
    Tencent Cloud Comunication Solutions for China 28.10.2020 © 2020 Tencent Cloud, LLC. All rights reserved. AGENDA • Tencent: “A Chinese Digital Dragon” • The Chinese opportunity • Who is Tencent? • Globalization strategy • Public Cloud • Cloud Communication Solutions • Tencent VooV Meeting • WeChat Work • Tencent Cloud Conference & Exhibition © 2020 Tencent Cloud, LLC. All rights reserved. - Tencent, “A Chinese Digital Dragon” 4 Founded in 1998 and headquartered in Tencent by the numbers: Shenzhen, Tencent is one of the largest • 550+ billion USD market capitalization** technology companies in the world and a global leader in messaging, social media, gaming, • 1.203+ billion monthly active Weixin/WeChat mobile payment, music streaming, digital users* literature, video and other digital content services. • 112 million video subscriptions* • #1 Mobile Payment in China by monthly active users and daily active users* • 62,000+ employees* *As of March 2020 **As of June 10, 2020 © 2020 Tencent Cloud, LLC. All rights reserved. Tencent - User Centric 360-Degree Ecosystem 6 TEG PCG IEG WXG CSIG CDG Technical Platform & Content Interactive Weixin (WeChat) Cloud & Smart Industries Corporate & Engineering Group Group Entertainment Group Group Group Development Group Tencent QQ Tencent Games WeChat Tencent Cloud Tencent Fintech Big Data Tencent YouTu QQ zone Tencent Tencent Tencent e-Sports Marketing WeChat Pay Transit QR Code AI Lab Tencent App Store Solution Tencent Maps WeiShi Timi Studio Tencent Security WeChat Work Platform Smart Retail Tencent News Lightspeed & Mr. Translator Tencent Quantum Studio QQ Mail Data Center QQ Browser Tencent Mobile Manager Tencent Animation Tencent PC Manager Aurora Studio WeRead Tencent Pictures Tencent Miying Next Studio Auto intelligence Penguin Pictures Mini Program Tencent HealthCare Tencent Video MOREFUN Official Tencent Autonomous Studio Account Driving Kuai Bao Tencent Classroom © 2020 Tencent Cloud, LLC.
    [Show full text]
  • Live Video Broadcasting Playing Method
    Playing Method Product Introduction Live Video Broadcasting Playing Method Product Introduction ©2013-2018 Tencent Cloud. All rights reserved. Page 1 of 53 Playing Method Product Introduction Copyright Notice ©2013-2018 Tencent Cloud. All rights reserved. Copyright in this document is exclusively owned by Tencent Cloud. You must not reproduce, modify, copy or distribute in any way, in whole or in part, the contents of this document without Tencent Cloud's the prior written consent. Trademark Notice All trademarks associated with Tencent Cloud and its services are owned by Tencent Cloud Computing (Beijing) Company Limited and its affiliated companies. Trademarks of third parties referred to in this document are owned by their respective proprietors. Service Statement This document is intended to provide users with general information about Tencent Cloud's products and services only and does not form part of Tencent Cloud's terms and conditions. Tencent Cloud's products or services are subject to change. Specific products and services and the standards applicable to them are exclusively provided for in Tencent Cloud's applicable terms and conditions. ©2013-2018 Tencent Cloud. All rights reserved. Page 2 of 53 Playing Method Product Introduction Contents Playing Method Mobile Play Web Play Web Player TcPlayer Web Player TcPlayer FAQ Web LVB Player 1.0 Web LVB Player 1.0 Problem solving Web VOD Player 1.0 Web VOD Player 1.0 Problem solving ©2013-2018 Tencent Cloud. All rights reserved. Page 3 of 53 Playing Method Product Introduction Playing Method Mobile Play Last updated:2018-06-27 11:08:50 Quick integration You can quickly integrate LVB playback feature into your existing App by following the steps below: Step 1: Activate LVB service Step 2: Download RTMP SDK package Step 3: Complete interfacing process by referring to relevant documents (iOS & Android) Complete solution Mobile LVB is a collection of mobile LVB solutions.
    [Show full text]
  • China Tech Food Chain
    Information Technology / Asia ex Japan 15 November 2013 Standing out from the crowd China Tech Food Chain • We expect investors to focus on China smartphones, tablets, Positive (unchanged) components, and mobile Internet/services in 2014 Neutral • On our forecasts, smartphone and tablet shipments will grow by 43% and 42% YoY, respectively Negative • Our top stock picks for 2014 are: Mediatek, SK Hynix, Tencent, Lenovo and Sunny Optical How do we justify our view? See important disclosures, including any required research certifications, beginning on page 60 China Tech Food Chain 15 November 2013 Contents Standing out from the crowd in 2014 ..........................................................................................3 China Smartphone Sector ............................................................................................................ 5 China Tablet Sector ..................................................................................................................... 8 China Components Sector ......................................................................................................... 10 China Mobile Service/Internet sector ........................................................................................ 12 China smartphone supply chain directory ................................................................................. 15 Company Section AAC Technologies ................................................................................................................... 16 Lenovo
    [Show full text]
  • Webkit and Blink: Open Development Powering the HTML5 Revolution
    WebKit and Blink: Open Development Powering the HTML5 Revolution Juan J. Sánchez LinuxCon 2013, New Orleans Myself, Igalia and WebKit Co-founder, member of the WebKit/Blink/Browsers team Igalia is an open source consultancy founded in 2001 Igalia is Top 5 contributor to upstream WebKit/Blink Working with many industry actors: tablets, phones, smart tv, set-top boxes, IVI and home automation. WebKit and Blink Juan J. Sánchez Outline The WebKit technology: goals, features, architecture, code structure, ports, webkit2, ongoing work The WebKit community: contributors, committers, reviewers, tools, events How to contribute to WebKit: bugfixing, features, new ports Blink: history, motivations for the fork, differences, status and impact in the WebKit community WebKit and Blink Juan J. Sánchez WebKit: The technology WebKit and Blink Juan J. Sánchez The WebKit project Web rendering engine (HTML, JavaScript, CSS...) The engine is the product Started as a fork of KHTML and KJS in 2001 Open Source since 2005 Among other things, it’s useful for: Web browsers Using web technologies for UI development WebKit and Blink Juan J. Sánchez Goals of the project Web Content Engine: HTML, CSS, JavaScript, DOM Open Source: BSD-style and LGPL licenses Compatibility: regression testing Standards Compliance Stability Performance Security Portability: desktop, mobile, embedded... Usability Hackability WebKit and Blink Juan J. Sánchez Goals of the project NON-goals: “It’s an engine, not a browser” “It’s an engineering project not a science project” “It’s not a bundle of maximally general and reusable code” “It’s not the solution to every problem” http://www.webkit.org/projects/goals.html WebKit and Blink Juan J.
    [Show full text]
  • FOCUS: Shedding Light on the High Search Response Time in the Wild
    FOCUS: Shedding Light on the High Search Response Time in the Wild Dapeng Liu†, Youjian Zhao†, Kaixin Sui†, Lei Zou†, Dan Pei†⇤ , Qingqian Tao‡, Xiyang Chen‡, Dai Tan‡ †Tsinghua University †Tsinghua National Laboratory for Information Science and Technology (TNList) ‡Baidu Abstract—Response time plays a key role in Web services, as it 1) What are the HSRT conditions (the combinations of significantly impacts user engagement, and consequently the Web attributes and specific values in search logs which have providers’ revenue. Using a large search engine as a case study, a higher concentration of HSRT)? we propose a machine learning based analysis framework, called FOCUS, as the first step to automatically debug high search 2) Which HSRT condition types are prevalent across days? response time (HSRT) in search logs. The output of FOCUS offers 3) How does each attribute affect SRT in those prevalent a promising starting point for operators’ further investigation. HSRT condition types? FOCUS has been deployed in one of the largest search engines for 2.5 months and analyzed about one billion search logs. The answers to the above questions can offer a promising Compared with a previous approach, FOCUS generates 90% starting point to narrow down the HSRT debugging space to less items for investigation and achieves both higher recall and a few suspect attributes and specific values, based on which higher precision. The results of FOCUS enable us to make several further effective investigation can be done through taking interesting observations. For example, we find that popular advantage of additional data sources (beyond search logs) and queries are more image-intensive (e.g., TV series and shopping), but they have relatively low SRT because they are cached domain knowledge.
    [Show full text]