Dynamic Taint Analysis to Handle Them

Total Page:16

File Type:pdf, Size:1020Kb

Dynamic Taint Analysis to Handle Them VU Research Portal Using information flow tracking to protect legacy binaries Slowinska, J.M. 2012 document version Publisher's PDF, also known as Version of record Link to publication in VU Research Portal citation for published version (APA) Slowinska, J. M. (2012). Using information flow tracking to protect legacy binaries. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. E-mail address: [email protected] Download date: 24. Sep. 2021 Chapter 1 Chapter 1 Introduction Even though memory corruption vulnerabilities are inherent to C, this language is not likely to be replaced by strongly typed languages with memory safety guaran- tees [76; 200; 30]. Programmers are not willing to relinquish high performance, reuse of code they wrote earlier, and backward compatibility offered by C. However, the lack of safety causes serious security problems. Memory corruption vulnerabili- ties are reported daily [180; 150; 137], and we regularly witness attacks compromis- ing popular software or critical networks [123; 198]. The research community has long recognised the problem, and has proposed multiple solutions. However, the existing proposals that are practical for production use prove inefficient, while the more comprehensive ones are either inapplicable to legacy software, or incur a high performance overhead. In this thesis, we address the problem of protecting legacy C binaries against memory corruption attacks. We focus on techniques employing data flow tracking, since they are applicable to existing software, and at the same time offer a mech- anism to monitor and accurately reason about a program execution. Because such monitoring is often prohibitively expensive, current systems employing data flow tracking are mainly limited to non production machines, such as malware analysis engines or honeypots. In our work, we seek solutions that would let us benefit from the wealth of information available during a run of the program, but at the same time be efficient and applicable in a timely fashion. We divide memory corruption attacks into two classes: (1) control-diverting, that divert the flow of execution of a program to code injected or chosen by an attacker, and (2) non-control-diverting, that do not directly divert a program’s control flow, but might modify a value in memory that represents e.g., a user’s privilege level, or a server configuration string. The research community has widely applied information flow tracking to pro- tect against both types of memory corruptions. A popular branch of the technique, known as Dynamic Taint Analysis [62; 149], has been successfully employed to de- tect control-diverting attacks. In this dissertation, we further extend this mechanism 1 2 CHAPTER 1. INTRODUCTION to perform attack analysis. We develop Prospector, an emulator capable of tracking which bytes contributed to a buffer overflow attack on the heap or stack. We use this information to generate signatures, which effectively stop polymorphic attacks, and also allow for efficient filtering. Further, we propose Hassle, a honeypot that is capable of generating signatures for attacks over both encrypted and non-encrypted channels. As far as non-control-diverting attacks are concerned, several projects have at- tempted to employ an extended version of dynamic taint analysis to handle them. We analyse and evaluate this technique. Since the mechanism appears to have se- rious problems that limit its applicability, we introduce BodyArmour, a completely new method of protecting legacy binaries against buffer overflow attacks, also the non-control-diverting ones. BodyArmour tracks how pointers are used at runtime, to see when they access memory beyond buffer’s boundaries. As BodyArmour re- quires knowledge about memory objects used by the binary, we present Howard, a dynamic approach to unearth the necessary information. 1.1 The Problem It has been already forty years since Anderson identified memory corruptions [10], and fifteen years since Aleph One provided a detailed introduction to stack smashing attacks [84]. The security community has recognised the problem, and has imple- mented various solutions in real-world systems. Static analysis has improved code quality by identifying many errors during development, but it is imprecise, and might incur both false positives and false negatives [224]. Furthermore, address space lay- out randomisation (ASLR) [27], data execution prevention (PaX/DEP) [154], and canaries [63] can thwart some of the attacks. Despite all these solutions, buffer overflows alone rank third in the CWE SANS top 25 most dangerous software errors [70]. The security implications are evident— Table 1.1 lists some major buffer overflow attack outbreaks we have witnessed in recent years. The problems persist in the real world because the adopted solutions prove insuf- ficient, whereas more powerful protection mechanisms are either too slow for prac- tical usage, they break backward compatibility, or require source code and recom- pilation. While an extensive overview of major defence mechanisms is presented in Chapter 2, we focus now on the few solutions which are the most relevant to this thesis. Anti-virus software and network intrusion detection systems (NIDS) monitor ex- ecutable files or the network traffic, and frequently search for signatures, i.e., patterns distinguishing malicious attacks from benign data. However, polymorphic attacks, zero-day attacks, and data encryption, all render signature-based solutions limited. 1.1. THE PROBLEM 3 Name Year Information Morris 1988 The Morris worm [83] was the earliest documented hostile exploitation of a buffer overflow. It became also the first worm to spread extensively "in Chapter 1 the wild". It infected about 6,000 UNIX machines. Code Red 2001 The Code Red worm [225] exploited a buffer overflow in MS Internet Information Services (IIS). It spread by probing random IP addresses and infecting all hosts vulnerable to the IIS exploit. Over 359.000 unique hosts got infected in a 24-hours period on July 19th. Slammer 2003 The SQL Slammer worm [138] exploited a buffer overflow in MS SQL Server and Desktop Engine database products. It spread rapidly, infecting most of its 75,000 victims within ten minutes. Blaster 2003 The Blaster worm [42] spread on computers running MS Windows XP and Windows 2000 in August 2003. It spread by exploiting a buffer over- flow in the DCOM RPC service. Zotob 2005 The Zotob worm [202; 54] exploited a stack-based buffer overflow in the Plug and Play service for MS Windows 2000 and Windows XP SP1. Its outbreak was covered "live" on CNN television, as the network’s own computers got infected. Conficker 2008 The Conficker worm [134; 136] spread itself primarily through a buffer overflow vulnerability in the MS Server Service. It compromised many critical networks [123; 14], and security experts estimate that it has passed a milestone of having infected more than 7 million computers [58]. Stuxnet 2010 The Stuxnet worm targeted Siemens industrial software and equipment running MS Windows. It used four zero-day attacks, including a bound- ary condition error [198]. Different variants of Stuxnet targeted Iranian nuclear facilities with the probable target widely suspected to be uranium enrichment infrastructure in Iran [90; 91]. Table 1.1: Major buffer overflow attack outbreaks. Runtime host solutions take advantage of the wealth of information present when a vulnerable application is running to protect against attacks. Dynamic Taint Anal- ysis (DTA), proposed by Denning et al. [77] and later implemented in TaintCheck [149], is one of the few techniques that protect legacy binaries against memory cor- ruption attacks on control data. Because of its accuracy, the technique is very popular in the systems and security community. However, it can slow down the protected ap- plication by an order of magnitude, and in practice, it is limited to non-production machines like honeypots or malware analysis engines. Furthermore, DTA can usu- ally detect only control-flow diverting attacks, so it does not defend against the non- control-diverting ones. Another powerful protection mechanism comes in a form of compiler extensions. WIT [6] is an attractive framework that marries immediate detection of memory cor- ruption to excellent performance. To harden an application, WIT requires recompi- lation. Unfortunately, access to source code or recompilation is often not possible in 4 CHAPTER 1. INTRODUCTION practice. Most vendors do not share the source, or even the symbol tables, with their customers. In all probability, many programs in use today will never be recompiled at all. To protect such software, we need a solution that works for binaries. In this thesis, we do not consider detection mechanisms such as anomaly detec- tion or behaviour based approaches. Although they are related in the sense that they detect attacks also, they differ greatly in approach and issues (for instance, reducing the number of false positives is the core problem for these systems). 1.2 Goals The goal of this work is to investigate solutions to protect legacy binaries against memory corruption attacks in a timely fashion. Furthermore, we do not limit our- selves to control-diverting attacks, but we also address the non-control-diverting ones. Throughout the thesis, we explore different paths to binary protection, from vulnerability signatures, to host level solutions.
Recommended publications
  • GUITARS at AUCTION FEBRUARY 27 Dear Guitar Collector
    GUITARS AT AUCTION FEBRUARY 27 Dear Guitar Collector: On this disc are images of the 284 guitars currently in this Auction plus an GUITARS additional 82 lots of collectible amps, music awards and other related items all being sold on Saturday, February 27. The Auction is being divided into two sessions AT AUCTION FEBRUARY 27 starting at 2pm and 6pm (all East Coast time.) Session I, contains an extraordinary array of fine and exciting instruments starting with Lot 200 on this disc. The majority of lots in this Auction are being sold without minimum reserve. AUCTION Saturday, February 27 The event is being held “live” at New York City’s Bohemian National Hall, a great Session I – 2pm: Commencing with Lot #200 setting at 321 East 73rd Street in Manhattan. For those unable to attend in person, Session II – 6pm: Commencing with Lot #400 the event is being conducted on two “bidding platforms”… liveauctioneers. com and invaluable.com. For those who so wish, telephone bidding can easily PUBLIC PREVIEW February 25 & 26 be arranged by contacting us. All the auction items will be on preview display Noon to 8pm (each day) Thursday and Friday, February 25 and 26, from 12 noon to 8 pm each day. LOCATION Bohemian National Hall 321 East 73rd Street Please note that this disc only contains photographic images of the items along New York, NY with their lot headings. For example, the heading for Lot 422 is 1936 D’Angelico ONLINE BIDDING Liveauctioneers.com Style A. Descriptions, condition reports and estimates do not appear on this disc.
    [Show full text]
  • Wavelength (October 1981)
    University of New Orleans ScholarWorks@UNO Wavelength Midlo Center for New Orleans Studies 10-1981 Wavelength (October 1981) Connie Atkinson University of New Orleans Follow this and additional works at: https://scholarworks.uno.edu/wavelength Recommended Citation Wavelength (October 1981) 12 https://scholarworks.uno.edu/wavelength/12 This Book is brought to you for free and open access by the Midlo Center for New Orleans Studies at ScholarWorks@UNO. It has been accepted for inclusion in Wavelength by an authorized administrator of ScholarWorks@UNO. For more information, please contact [email protected]. Pipes of Pan Presents ... A best seller. versus the best. icro-Acoustics Bose 301 FRM-3dx *33QOOper patr. *34900per pair Compare these two speakers, and you'd probably expect the one on the left - with the lower price - to be the better seller. You'd be right ... but is it the better value? Before you aecide, it pays to consider how much more a little more money will bu~: Comfare bass. The new FRM-3dx uses a twin-ducted enclosure with thicker cabine panels and larger cubic volume for rich, full bass. Compare highs. The new FRM-3dx1s unique Vari-AxiSTM control system, damped isolated tweeter suspension and rim-damped cone give lifelike h1ghs. Compare warranties. The new FRM-3dx is warrantied twice as long. The Micro-Acoustics new FRM-3dx. When you compare, there's really no com­ parison. Quality worth a 10-year warranty Micro-Acoustics Reg. $349.00 Bose 301" FRM·3dx Tweeter One, fixed. One, rotatable, rim·damped. Tweeter Attached Isolated from SALE NOW directly to baffle.
    [Show full text]
  • New Music for Trumpet and Guitar
    "Radiant... there's an open, intensely emotional quality to the duo's playing... spare, haunting, with hints of modernist avant garde gestures." –Andy Hamilton, The Wire Magazine "Excellent... trumpeter Kris Tiner and guitarist Mike Baggetta explore abstract yet jazz‐derived realms of expansive lyricism and liquid melody." TIN/BAG –Time Out New York NEW MUSIC FOR TRUMPET AND GUITAR “Careful listening is always evident as the two play off of each other, whether shadowing lines or counterbalancing densities and textures of the freely Tin/Bag, the bi‐coastal duo of California trumpeter Kris Tiner and evolving pieces… What stands out is the tension the two create as they shape New York guitarist Mike Baggetta, deals with a music that is the improvisational forms with the juxtaposition of raw extended technique and resonating tones and hanging harmonics… the two maintain a taut, spare, ethereal, and highly exploratory, "clearly cut from cloth that insightful approach to duet interaction.” hasn't been designed yet..." (–Improvijazzation Nation). Both are –Michael Rosenstein, Cadence Magazine among a generation of young creative musicians contributing "Tin/Bag makes music that is both spare and rich, at times thick with ideas. Yet original new music and pushing a re‐examination of the roles and there are moments of quiet contemplation… like conversation in which each possibilities of their instruments. word is ripe with meaning and one wishes not to lose anything." –Richard Kamins, Hartford Courant Since 2004 Tiner and Baggetta have toured extensively in the United States, presenting an expansive repertoire of original “There is a strong balance of written and free sections, intricately put together… both players are well matched, listening and responding quickly compositions and improvisations alongside inventive renderings and creatively.” of the music of Bob Dylan, Thelonious Monk, Sun Ra, Carla Bley, –Bruce Gallanter, Downtown Music Gallery Anthony Braxton and others.
    [Show full text]
  • Magic Triangle Jazz Series Timeline
    Close to the Music 25 Years of Magic Triangle Jazz Series Close to the Music 25 Years of Magic Triangle Jazz Series February 2014 WMUA 91.1 FM and the Fine Arts Center University of Massachusetts Amherst Concept and Project Director: Priscilla Page Founding Director of Magic Triangle: Glenn Siegel Book and Cover Design: Rebecca Neimark, Twenty-Six Letters Magic Triangle Posters: Ryan O’Donnell Contributing Writers: John Bracey, Jason Robinson, Ed Hazell Contributing Photographers: Jim Gipe, Ed Cohen, Maurice Robertson, Ben Barnhart, Parthasarathi Valluri, Frank Ward !!!"\$%&'()*%$(%'"*+,-,&./*('/&$.0% Magic Triangle archives are housed in the UMass Special Collections and University Archives, W.E.B. DuBois Library. Information at: 1((23--0/4'&'5"6,&))"%76-)2*+00- . Front Cover: Jonathan Finlayson, April 26, 2012, photo: Parthasarathi Valluri Back Cover: Bezanson Recital Hall, April 26, 2012, photo: Maurice Robertson © 2014 All Rights Reserved Glenn Siegel would like to thank: Dr. Fred Tillis, Director Emeritus of the UMass Fine Arts Center, !1+8\')(826(8/$)(/(6(/+$&08'%)+6'*%)84%1/$78+6'8%$(16)/&),"89+4%'(&8:$+;8<+6$7/$.8=/'%*(+'8+<8>%!8 WORLD Theater, for giving me entré to the world of presenting via the Bright Moments Festival and the Black Musicians Conference. Dr. Willie Hill and the entire FAC staff, for their unwavering sup- port. The jazz djs of WMUA-91.1FM. The Pioneer Valley is blessed to have a college radio station so *+,,/((%78(+8'%&08,6)/*&087/?%')/(5"8@+48A$(/08<+'8$6'(6'/$.8(1%8B%'/%)8(1'+6.18/()8\')(87%*&7%"8C58 beloved Priscilla Page, she hatched this book idea, and was its shepherd.
    [Show full text]
  • Medeski, Blackman Santana, Reid & Bruce Explore the Music of Tony
    DOWNBEAT Steve Turre Preservation Hall Jazz Band @ 50 SPECTRUM R OA D // STEVE STEVE T URRE // P RE S ERVATION HALL JAZZ BAN D // Spectrum Road M ARY HALVOR ARY MEDESKI, BLACKMAN SANTANA, REID & BRUCE S ON EXPLORE THE MUSIC OF TONY WILLIAMS Guitar School Mary Halvorson John McLaughlin TRANSCRIBED JULY 2012 U.K. £3.50 Neil Haverstick MASTER CLASS J ULY Eric Revis 2012 BLINDFOLDED DOWNBEAT.COM JULY 2012 VOLUme 79 – NUMBER 7 President Kevin Maher Publisher Frank Alkyer Managing Editor Bobby Reed News Editor Hilary Brown Reviews Editor Aaron Cohen Contributing Editors Ed Enright Zach Phillips Art Director Ara Tirado Production Associate Andy Williams Bookkeeper Margaret Stevens Circulation Manager Sue Mahal Circulation Assistant Evelyn Oakes ADVERTISING SALES Record Companies & Schools Jennifer Ruban-Gentile 630-941-2030 [email protected] Musical Instruments & East Coast Schools Ritche Deraney 201-445-6260 [email protected] Advertising Sales Assistant Theresa Hill 630-941-2030 [email protected] OFFICES 102 N. Haven Road Elmhurst, IL 60126–2970 630-941-2030 / Fax: 630-941-3210 http://downbeat.com [email protected] CUSTOMER SERVICE 877-904-5299 [email protected] CONTRIBUTORS Senior Contributors: Michael Bourne, John McDonough Atlanta: Jon Ross; Austin: Michael Point, Kevin Whitehead; Boston: Fred Bouchard, Frank-John Hadley; Chicago: John Corbett, Alain Drouot, Michael Jackson, Peter Margasak, Bill Meyer, Mitch Myers, Paul Natkin, Howard Reich; Denver: Norman Provizer; Indiana: Mark Sheldon; Iowa: Will Smith; Los Angeles: Earl Gibson, Todd Jenkins, Kirk Silsbee, Chris Walker, Joe Woodard; Michigan: John Ephland; Minneapolis: Robin James; Nashville: Bob Doerschuk; New Or- leans: Erika Goldring, David Kunian, Jennifer Odell; New York: Alan Bergman, Herb Boyd, Bill Douthart, Ira Gitler, Eugene Gologursky, Norm Harris, D.D.
    [Show full text]
  • Airwaves (1983-02 And
    ·AIRWAVES A Service of Continuing Education and Extension tm · University of Minnesota, Qulut~ ·- - . February-March 1983 .... C 0 -a (1) 0 :::c -a C C ..c-.... -0 ...z '"I- ....0 \ Cl) / 0 ..c C Cl) Cl) (I) Ii.. C ' '.'> "<C ·~. \ ..c "' 1 f 0 \ - - ..._ I I\UM() \taff S1a1ion Managtt , ...... Tum Livingsion Program Dittc;tor ... •. ... • John Zi~glrr -,\nt. Program Dirl'<'1or . .• •. Paul Schmitz t:nginttring .. .. .. ... ..... Kirk Kintm Producn/Ou1ttach ....... Jran Johnson AIRWAVES is the bi-monthly program Re or>t to the Listener guide of KUMD, which is the 100,000 watt public radio station at the University of Minnesota-Duluth, broadcasting at 103.3 fro. KUMD is part By Tom Livingston, Station Manager of University Media Resources, a department of Continuing Education The next several weeks will see the NPR PLAYHOUSE - A 5 days/week ½ help. If you just can't wait, go to the and Extension at the University of worst of winter over and the first glimmer- hour radio drama program. With Twin Cities and visit some of the big Minnesota . KUMD's program ings of spring (How's that for optimistic?). the demise of "CBS Mystery record stores there. If that isn't pos- · philosophy is to provide the highest It will also bring another several weeks Theater", I think it will be the sible I suggest you write the record quality non-commercial program- of some of the finest radio anywhere only daily radio drama program company and ask if they will send you ming, including music, news and from KUMD (a lead-pipe cinch).
    [Show full text]
  • Jazz Guitarists
    List of Jazz Guitarists 1. Blake Aaron 2. Eivind Aarset 3. Rez Abbasi 4. John Abercrombie 5. Paul Abler 6. Steve Abshire 7. Morris Acevedo 8. Bernard Addison 9. Steve Adelson 10. Dan Adler 11. Ron Affif 12. Noel Akchote 13. Jan Akkerman 14. Odd Steinar Albrigtsen 15. Howard Alden 16. Johnny Alegre 17. Oscar Alemán 18. Glenn Alexander 19. Neal Alger 20. Laurindo Almeida 21. Peter Almqvist 22. Frode Alnæs 23. Leonardo Amuedo 24. Chuck Anderson 25. Tuck Andress 26. John Anello Jr 27. Michael Anthony 28. Ron Anthony 29. Marc Antoine 30. Bruce Arnold 31. Irving Ashby 32. Dave Askren 33. Badi Assad 34. Gustavo Assis-Brasil 35. Chet Atkins 36. Erich Avinger B 37. Elek Bacsik 38. Mike Baggetta 39. Derek Bailey (the most radical) 40. Sheryl Bailey (blazing style, need to check out) 41. Bob Bain 42. Clint Baker 43. Duck Baker 44. Matt Balitsaris 45. Dave Barbour 46. A Spencer Barefield 47. Danny Barker 48. Everett Barksdale 49. Junior Barnard 50. George Barnes 51. Jeff Barone 52. Carl Barry 53. John Basile 54. Frode Barth 55. Billy Bauer 56. Billy Bean 57. Gerry Beaudoin 58. Jeff Beck 59. Joe Beck 60. David Becker 61. Jean-Marc Belkadi 62. Robert Bell 63. Roni Ben-Hur 64. George Benson 65. Rolf Berg 66. Gonzalo Bergara 67. Chris Bergson 68. Randy Bernsen’s 69. Peter Bernstein 70. Gene Bertoncini 71. Mads Berven 72. Skeeter Best 73. Ed Bickert 74. Brian Blade 75. Jack Bland 76. Michael Bocian 77. Pascal Bokar 78. Paul Bollenback 79. Luiz Bonfá 80. Perry Botkin Sr 81.
    [Show full text]
  • Lee Morgan Blue Train Solo Transcription
    Lee Morgan Blue Train Solo Transcription melanocyteAdventurous mells and wayfarerwooingly, Rey is Darrell coagulate unlively her andcephalochordate migrainous enough? milden while Is Normie Adolpho ageless sharks or someaccelerated teachers when collectedly. hurrying someFitzgerald aphorists never damask micturate pushingly? any Western classical tempered tunings, take off in bank order. These traits and concepts encompass many more than harmonic informationand extend only those physical elements that site been briefly mentioned above. Jazz Trumpet Solos site. Jingles and solos focus primarily of the transcription process is often drawn to write it will learn and tricks with kenny drew on original compositions and integrating them. Eighthnotebased lines with triplet and sixteennote figures. Coleman: A Harmolodic Life. How do you, transcriptions using a train that create a b major trumpeter. The transcription by sonny, lee morgan jazz ensemble itself is at cliff bells! Brown and blue train has mastered scads of themselves? He was exciting lazy bird, transcriptions can speak jazz blues. Did this solo transcription. Hence my additional phrasetypes. Lee Morgan All The ultimate trumpet solo from Candy 1957 Bb Instruments. They were happy to cootie williams, lee morgan blue train solo transcription and hubbard and john jacob graas, too happy to being performed by altering a repressive shallowness in! Each blues solos of tongue positionand air to new orleans piano only trained to play a truly great. Morgan has a unique way of phrasing that is at once angular and melodic and this tune is a great example. Emphasis on life playing, Vol. Part of Mosaic MR6-162 MD4-162 as either Complete interest Note Lee Morgan Fifties Sessions.
    [Show full text]
  • Jazz Studies Handbook the University of Central Florida Department of Music
    Jazz Studies Handbook The University of Central Florida Department of Music [Sincere jazz musicians] aim at excellence and apparently nothing else. They are hard to buy and if bought they either backslide into honesty or lose the respect of their peers. And this is the loss that terrifies them. In any other field of American life, great reward can be used to cover the loss of honesty, but not with jazz players- a slip is known and recognized instantly. And further, while there may be some jealousies, they do not compare with those in other professions. Let a filthy kid, unknown, unheard of and un backed sit in-and if he can do it-he is recognized and accepted instantly. Do you know of any other field where this is true? -JOHN STEINBECK 1 UCF JAZZ STUDIES HANDBOOK Table of contents I Introduction ………………………………………………………. 3 II Curriculum ………………………………………………………. 4-11 General requirements Core courses Specialty requirements Suggested four year course load III Jazz Juries by Semester ……………………………………… 12-15 IV Jazz Compulsory Examinations by Semester………. 15-17 V Professional Sequence Review …………………………. 18 VI Repertoire list and Discography ………………………… 19-23 VII Ear training and scale studies by semester .......... 24-28 VIII Scale Patterns ……………………………………………………. 29-69 Saxophone ……………………………………………. 29-38 Trumpet ……………………………………………….. 39-48 Trombone …………………………………………….. 49-58 Piano ……………………………………………………. 59-64 Guitar ………………………………………………….. 65-69 IX Selected piano voicings Freshman compositions shell voicings ………………. 70-77 Jazz theory voicings ( ii V7 I’s and variations) ….. 78-85 The Ted Dunbar chord sheet ……………………………. 86 Selected compositions …………………………………….. 87-99 X Required and recommended texts ………………….. 100 XI Recitals: Junior and Senior year ……………………… 101 UCF Jazz Studies Handbook The BM degree in Jazz Studies is a track within the UCF Music BM degree, and was founded in 2007.
    [Show full text]
  • Kenny Loggins
    DEDICATED TO THE NEEDS OF THE MUSIC/RECORD INDUSTRYRY ianr`1DECEMBER 9, 1978 $1.95 91M12: Zi,zZ t78 1 1II Kenny Loggins FOREIGNER, "BLUE MORNING, BLUE STEPHEN BISHOP, "ANIMAL HOUSE" NEIL DIAMOND, "YOU DON'T DAY" (prod. by Olsen -Jones -Mc- (prod. by K. Vance) (writer: Bi- B Donald) (writers: Gramm -Jones) shop) (Stephen Bishop/Duchess, b bO9I6 (Somerset/Evansongs/WB, BMI) EMI) (2:55). could this be the titi *VD `AWID OIQf1,LS (3:08). This third single from their lilting voice of "On and On." Yup, du Ip should follow the others, quick- one and the same and expertly to I,LInOD b2.1f1.LN3/1 OfiI ly, to the top of the charts. weirded up for this theme from son SQLI':)D3L: Q'IO`J Q'a.LI'/.I'INfl Lou Gramm's vocals are penetrat- the big movie hit. To -Ga. ABC ble SIIHD T76 6G -0,I S ing. Atlantic 3543. 12435 tati - ROLLING STONES, "SHATTERED" (prod. TED NUGENT, "NEED YOU BAD" (prod. by CAT STEVENS, "BACK TO by Glimmer Twins) (writers: Futterman-Daies-Werman) (writ- EARTH." An album of varied moods Jagger -Richards) (Colgems, er: NJgent) (Magicland, ASCAP) from Stevens ranging from the rock- ASCAP) (2:44). This third release (2:44). The certifiable rock crazy ing "Bad Brakes" (the single) to from their new Ip shculd already proves, once again, to be one of the instrumental "Nascimento." be as familiar to AOR listeners as the genre's p-emier guitarists on Still very much a distinctive stylist, their previous singles. It's rock 'n this relentlessly driving new he holds this new work together roll funk with a flourish.
    [Show full text]
  • Knowledge Extraction and Representation Learning for Music Recommendation and Classification
    Knowledge Extraction and Representation Learning for Music Recommendation and Classification Sergio Oramas Martín TESI DOCTORAL UPF / 2017 Director de la tesi: Dr. Xavier Serra Casals Dept. of Information and Communication Technologies Universitat Pompeu Fabra, Barcelona, Spain Dissertation submitted to the Department of Information and Communication Technologies of Universitat Pompeu Fabra in partial fulfillment of the require- ments for the degree of DOCTOR PER LA UNIVERSITAT POMPEU FABRA Copyright © 2017 by Sergio Oramas Martín Licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 Music Technology Group (http://mtg.upf.edu), Department of Information and Commu- nication Technologies (http://www.upf.edu/dtic), Universitat Pompeu Fabra (http://www. upf.edu), Barcelona, Spain. iii The doctoral defense was held on ......................... at the Universitat Pompeu Fabra and scored as ........................................................... Dr. Xavier Serra Casals (Thesis Supervisor) Universitat Pompeu Fabra (UPF), Barcelona, Spain Dr. Markus Schedl (Thesis Committee Member) Johannes Kepler University, Linz, Austria Dr. Emilia Gómez (Thesis Committee Member) Universitat Pompeu Fabra (UPF), Barcelona, Spain Dr. Brian Whitman (Thesis Committee Member) Spotify, New York, USA a Olivia y Chiara, la luz en el camino... Acknowledgements First of all, I would like to thank my supervisor, Dr. Xavier Serra, for giving me the opportunity to work in this fantastic environment, the Music Technology Group, and for his wise advises. Also, I want to give special thanks to Paco Gomez for teaching me how to be a researcher. This thesis does not have a specific co-supervisor, but along this journey I have met three great researchers and better persons who have helped me through my PhD and without whom this work would have not been possible, Mohamed Sordo, Vito Claudio Ostuni, and Oriol Nieto.
    [Show full text]
  • CES Presents the David Sánchez Group
    F R OStateLines S T B U R G S T A T E U N I V E R S I T Y wwwfrostburgedu/news/statelineshtm For and about FSU people A publication of the FSU Office of Advancement Volume 35, Number 12, November 15, 2004 Copy deadline: noon Wednesday, 228 Hitchins or emedcalf@frostburg%edu CES Presents The David Sánchez Group The FSU CES Jazz Club, sponsored by like Paquito D’Rivera and Claudio Roditi Kauffman Music, presents the Grammy before eventually joining Dizzy award-winning David Sánchez Group on Gillespie’s United Nation Orchestra. He Saturday, Nov. 20, at 8 p.m. in the has toured with the Phillip Morris Super Cumberland Ballroom at Rocky Gap Band, recorded with Slide Hampton’s Resort and Lodge. Jazz Masters and headed his own Sánchez, a gifted tenor saxophone sessions for Columbia. The David player, took up conga at age 8 and Sánchez Group won the Grammy for started playing the saxophone at age Best Latin Jazz Performance in 1997. 12. His music incorporates Afro-Cuban To purchase tickets or for more rhythms with bebop. He studied information, call the FSU Cultural alongside jazz masters such as Kenny Events Box Office at x3137 or toll free Barron, Ted Dunbar and John Purcell. at 1-866-TIXX-CES, or visit online at Sánchez played with top Latin artists http://ces.frostburg.edu. David Sánchez Fischer’s original work “The Butterfly “Music Down In My Soul,” commissioned Waltz.” by the 6th World Choral Symposium on Tickets are $10 for the general public Choral Music.
    [Show full text]