Inlined Reference Monitors: Certification, Concurrency and Tree Based Monitoring

Total Page:16

File Type:pdf, Size:1020Kb

Inlined Reference Monitors: Certification, Concurrency and Tree Based Monitoring Inlined Reference Monitors: Certification, Concurrency and Tree Based Monitoring ANDREAS LUNDBLAD Doctoral Thesis Stockholm, Sweden 2013 TRITA-CSC-A 2013:01 ISSN-1653-5723 KTH CSC TCS ISRN-KTH/CSC/A–13/01-SE SE-100 44 Stockholm ISBN 978-91-7501-654-2 SWEDEN Akademisk avhandling som med tillstånd av Kungl Tekniska högskolan framlägges till offentlig granskning för avläggande av teknologie doktorsexamen i datalogi 15 mars 2013, 10:00 i F3, Kungl Tekniska Högskolan, Stockholm. © Andreas Lundblad, 2013 Tryck: E-print iii Abstract Reference monitor inlining is a technique for enforcing security policies by injecting security checks into the untrusted software in a style similar to aspect-oriented programming. The intention is that the injected code enforces compliance with the policy (security), without adding behavior (conservativity) or affecting existing policy compliant behavior (transparency). This thesis consists of four papers which covers a range of topics including formalization of monitor inlining correctness properties, certification of inlined monitors, limitations in multithreaded settings and extensions using data-flow monitoring. The first paper addresses the problem of having a potentially complex pro- gram rewriter as part of the trusted computing base. By means of proof- carrying code we show how the inliner can be replaced by a relatively simple proof-checker. This technique also enables the use of monitor inlining for qual- ity assurance at development time, while minimizing the need for post-shipping code rewrites. The second paper focuses on the issues associated with monitor inlining in a concurrent setting. Specifically, it discusses the problem of maintaining transparency when introducing locks for synchronizing monitor state reads and updates. Due to Java’s relaxed memory model, it turns out to be impossible for a monitor to be entirely transparent without sacrificing the security property. To accommodate for this, the paper proposes a set of new correctness properties shown to be realistic and realizable. The third paper also focuses on problems due to concurrency and identi- fies a class of race-free policies that precisely characterizes the set of inlineable policies. This is done by showing that inlining of a policy outside this class is either not secure or not transparent, and by exhibiting a concrete algorithm for inlining of policies inside the class which is secure, conservative, and transpar- ent. The paper also discusses how certification in the style of proof-carrying code could be supported in multithreaded Java programs. The fourth paper formalizes a new type of data centric runtime monitoring which combines monitor inlining with taint tracking. As opposed to ordinary techniques which focus on monitoring linear flows of events, the approach pre- sented here relies on tree shaped traces. The paper describes how the approach can be efficiently implemented and presents a denotational semantics for a sim- ple “while” language illustrating how the theoretical foundations is to be used in a practical setting. Each paper is concluded by a practical evaluation of the theoretical results, based on a prototype implementation and case studies on real-world applica- tions and policies. iv Sammanfattning Referensmonitorinvävning, eller monitorinvävning, är en teknik som an- vänds för att se till att en given säkerhetspolicy efterföljs under exekvering av potentiellt skadlig kod. Tekniken går ut på att bädda in en uppsättning sä- kerhetskontroller (en säkerhetsmonitor) i koden på ett sätt som kan jämföras med aspektorienterad programmering. Syftet med den invävda monitorn är att garantera att policyn efterföljs (säkerhet) utan att påverka ursprungsprogram- mets beteende, såvida det följer policyn (transparans och konservativitet). Denna avhandling innefattar fyra artiklar som tillsammans täcker in en rad ämnen rörande monitorinvävning. Bland annat diskuteras formalisering av korrekthetsegenskaper hos invävda monitorer, certifiering av invävda monito- rer, begränsningar i multitrådade program och utökningar för hantering av dataflödesmonitorering. Den första artikeln behandlar problemen associerade med att ha en po- tentiellt komplex programmodifierare som del i den säkerhetskritiska kompo- nenten av ett datorsystem. Genom så kallad bevisbärande kod visar vi hur en monitorinvävare kan ersättas av en relativt enkel beviskontrollerare. Denna teknik möjliggör även användandet av monitorinvävning som hjälpmedel för programutvecklare och eliminerar behovet av programmodifikationer efter att programmet distribuerats. Den andra artikeln fokuserar på problemen kring invävning av monitorer i multitrådade program. Artikeln diskuterar problemen kring att upprätthålla transparans trots införandet av lås för synkronisering av läsningar av och skriv- ningar till säkerhetstillståndet. På grund av Javas minnesmodell visar det sig dock omöjligt att bädda in en säkerhetsmonitor på ett säkert och transparent sätt. För att ackommodera för detta föreslås en ny uppsättning korrekthetse- genskaper som visas vara realistiska och realiserbara. Den tredje artikeln fokuserar även den på problemen kring flertrådad ex- ekvering och karaktäriserar en egenskap för en policy som är tillräcklig och nödvändig för att både säkerhet och transparens ska uppnås. Detta görs ge- nom att visa att en policy utan egenskapen inte kan upprätthållas på ett säkert och transparent sätt, och genom att beskriva en implementation av en moni- torinvävare som är säker och transparent för en policy som har egenskapen. Artikeln diskuterar också hur certifiering av säkerhetsmonitorer i flertrådade program kan realiseras genom bevisbärande kod. Den fjärde artikeln beskriver en ny typ av datacentrisk säkerhetsmonitore- ring som kombinerar monitorinvävning med dataflödesanalys. Till skillnad mot existerande tekniker som fokuserar på linjära sekvenser av säkerhetskritiska händelser förlitar sig tekniken som presenteras här på trädformade händelse- sekvenser. Artikeln beskriver hur tekniken kan implementeras på ett effektivt sätt med hjälp av abstraktion. Varje artikel avslutas med en praktisk evaluering av de teoretiska resultaten baserat på en prototypimplementation och fallstudier av verkliga program och säkerhetsegenskaper. v Acknowledgements First and foremost, I would like to take the opportunity to thank all those who have supported me and encouraged me during the past six years. I owe my deepest gratitude to my adviser professor Mads Dam for all his help and guidance during my time as a graduate student. I want to thank him for his confidence in me and my work and for always finding the time and patience to stimulate me and keep me on track. Mads, with his deep knowledge of the subject and academical experience have been truly invaluable to me and I am honored and proud to have had Mads as my adviser. I also want to thank Dilian Gurov for introducing me to the subject of formal methods. If it was not for his excellent teaching and inspiring course on semantics for programming languages, I would most likely never have pursued a doctoral degree in computer science to begin with. I thank all my co-authors; Mads Dam, Frank Piessens, Bart Jacobs and Gurvan Le Guernic for all great discussions and fruitful collaboration. My office mates, Fei Niu and Muddassar Azam Sindhu and my former ones Mika Cohen and Irem Aktug–I have really enjoyed your company. Thank you. Musard Balliu, Torbjörn Granlund, Karl Palmskog, Gunnar Kreitz, Oliver Schwartz, Siavash Soleimanifard, Pedro de Carvalho Gomes, Benjamin Greschbach, Emma Enström, thanks for providing such friendly and enjoyable atmosphere here at the department. David Wennström, you are a better friend than I could ever wish for. I have shared more laughs and technically interesting discussions with you than with any one else during my graduate studies. Thank you. A special thanks goes to my father-in-law Professor Björn Bergenståhl for all the discussions and advice on research in general. I would like to thank mom, dad and my sister for all your warmth, encourage- ment and support the past years. Tora–without your patience, your support and your love I would never have come this far. I simply can not thank you enough. I love you. Finally, two very special persons have come into my life during the work on this thesis; Siri and Isabelle, my daughters. I dedicate this thesis to you. Contents Contents vi 1 Introduction 1 1.1 Background . 2 1.2 Reference Monitors . 6 1.2.1 Reference Monitor Inlining . 7 1.2.2 Linear vs Tree based Monitoring . 12 1.3 Research Issues and Motivation . 13 1.4 This Thesis . 16 1.4.1 Included Papers . 17 1.4.2 Author Contributions . 20 2 A Proof-Carrying Code Framework for Inlined Reference Mon- itors in Sequential Java Bytecode 21 2.1 Introduction . 22 2.1.1 Related Work . 24 2.2 A Single Threaded Program Model . 26 2.2.1 Programs . 27 2.2.2 Configurations . 27 2.2.3 Types . 27 2.2.4 API Method Calls . 27 2.2.5 Transition Semantics . 28 2.3 Assertions . 30 2.4 Extended Method Definitions . 31 2.5 Security Specifications . 35 2.5.1 Security Automata . 35 2.6 Example Inlining Algorithm . 36 2.7 The Ghost Monitor . 38 2.8 Contract Adherence Proofs . 40 2.8.1 Example Proof Generation . 41 2.8.2 Proof Recognition . 42 2.9 Implementation and Evaluation . 45 2.9.1 MobileJam . 45 vi CONTENTS vii 2.9.2 Snake . 45 2.9.3 Statistics . 46 2.10 Conclusions . 46 3 Provably Correct Inline Monitoring for Multithreaded Java-like Programs 49 3.1 Introduction . 49 3.2 Security by Contract . 51 3.2.1 Security for mobile applications and services . 52 3.2.2 Application contracts and policies . 53 3.2.3 Example: Mobile 2-player Chess . 54 3.3 A Multithreaded Program Model . 56 3.3.1 Executions and Traces . 56 3.3.2 Field Accesses and Legal Executions . 56 3.3.3 Transition Semantics . 57 3.4 Security Automata . 58 3.5 Inlining . 58 3.5.1 Inlining Correctness Properties . 59 3.5.2 Example Inliner . 63 3.6 Case Studies and Benchmarks . 70 3.6.1 Inlining Overhead . 71 3.7 Conclusions . 71 3.8 Acknowledgements . 72 4 Security Monitor Inlining and Certification for Multithreaded Java 73 4.1 Introduction .
Recommended publications
  • Computer Demos—What Makes Them Tick?
    AALTO UNIVERSITY School of Science and Technology Faculty of Information and Natural Sciences Department of Media Technology Markku Reunanen Computer Demos—What Makes Them Tick? Licentiate Thesis Helsinki, April 23, 2010 Supervisor: Professor Tapio Takala AALTO UNIVERSITY ABSTRACT OF LICENTIATE THESIS School of Science and Technology Faculty of Information and Natural Sciences Department of Media Technology Author Date Markku Reunanen April 23, 2010 Pages 134 Title of thesis Computer Demos—What Makes Them Tick? Professorship Professorship code Contents Production T013Z Supervisor Professor Tapio Takala Instructor - This licentiate thesis deals with a worldwide community of hobbyists called the demoscene. The activities of the community in question revolve around real-time multimedia demonstrations known as demos. The historical frame of the study spans from the late 1970s, and the advent of affordable home computers, up to 2009. So far little academic research has been conducted on the topic and the number of other publications is almost equally low. The work done by other researchers is discussed and additional connections are made to other related fields of study such as computer history and media research. The material of the study consists principally of demos, contemporary disk magazines and online sources such as community websites and archives. A general overview of the demoscene and its practices is provided to the reader as a foundation for understanding the more in-depth topics. One chapter is dedicated to the analysis of the artifacts produced by the community and another to the discussion of the computer hardware in relation to the creative aspirations of the community members.
    [Show full text]
  • Archive and Compressed [Edit]
    Archive and compressed [edit] Main article: List of archive formats • .?Q? – files compressed by the SQ program • 7z – 7-Zip compressed file • AAC – Advanced Audio Coding • ace – ACE compressed file • ALZ – ALZip compressed file • APK – Applications installable on Android • AT3 – Sony's UMD Data compression • .bke – BackupEarth.com Data compression • ARC • ARJ – ARJ compressed file • BA – Scifer Archive (.ba), Scifer External Archive Type • big – Special file compression format used by Electronic Arts for compressing the data for many of EA's games • BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools • BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE • bzip2 – (.bz2) • bld - Skyscraper Simulator Building • c4 – JEDMICS image files, a DOD system • cab – Microsoft Cabinet • cals – JEDMICS image files, a DOD system • cpt/sea – Compact Pro (Macintosh) • DAA – Closed-format, Windows-only compressed disk image • deb – Debian Linux install package • DMG – an Apple compressed/encrypted format • DDZ – a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a program similar to RAGS, it's mainly used to make somewhat short games. • DPE – Package of AVE documents made with Aquafadas digital publishing tools. • EEA – An encrypted CAB, ostensibly for protecting email attachments • .egg – Alzip Egg Edition compressed file • EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab • ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system folders, replaced by EGT Universal Document • ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system. • GHO (.gho, .ghs) – Norton Ghost • gzip (.gz) – Compressed file • IPG (.ipg) – Format in which Apple Inc.
    [Show full text]
  • TIMES of CHANGE in the DEMOSCENE a Creative Community and Its Relationship with Technology
    TIMES OF CHANGE IN THE DEMOSCENE A Creative Community and Its Relationship with Technology Markku Reunanen ACADEMIC DISSERTATION To be presented, with the permission of the Faculty of Humanities of the University of Turku, for public examination in Classroom 125 University Consortium of Pori, on February 17, 2017, at 12.00 TURUN YLIOPISTON JULKAISUJA – ANNALES UNIVERSITATIS TURKUENSIS Sarja - ser. B osa - tom. 428 | Humanoria | Turku 2017 TIMES OF CHANGE IN THE DEMOSCENE A Creative Community and Its Relationship with Technology Markku Reunanen TURUN YLIOPISTON JULKAISUJA – ANNALES UNIVERSITATIS TURKUENSIS Sarja - ser. B osa - tom. 428 | Humanoria | Turku 2017 University of Turku Faculty of Humanities School of History, Culture and Arts Studies Degree Programme in Cultural Production and Landscape Studies Digital Culture, Juno Doctoral Programme Supervisors Professor Jaakko Suominen University lecturer Petri Saarikoski University of Turku University of Turku Finland Finland Pre-examiners Professor Nick Montfort Associate professor Olli Sotamaa Massachusetts Institute of Technology University of Tampere United States Finland Opponent Assistant professor Carl Therrien University of Montreal Canada The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service. ISBN 978-951-29-6716-2 (PRINT) ISBN 978-951-29-6717-9 (PDF) ISSN 0082-6987 (PRINT) ISSN 2343-3191 (ONLINE) Cover image: Markku Reunanen Juvenes Print, Turku, Finland 2017 Abstract UNIVERSITY OF TURKU Faculty of Humanities School of History, Culture and Arts Studies Degree Programme in Cultural Production and Landscape Studies Digital Culture REUNANEN, MARKKU: Times of Change in the Demoscene: A Creative Commu- nity and Its Relationship with Technology Doctoral dissertation, 100 pages, 88 appendix pages January 17, 2017 The demoscene is a form of digital culture that emerged in the mid-1980s after home computers started becoming commonplace.
    [Show full text]
  • Amigaos4 Download
    Amigaos4 download click here to download Read more, Desktop Publishing with PageStream. PageStream is a creative and feature-rich desktop publishing/page layout program available for AmigaOS. Read more, AmigaOS Application Development. Download the Software Development Kit now and start developing native applications for AmigaOS. Read more.​Where to buy · ​Supported hardware · ​Features · ​SDK. Simple DirectMedia Layer port for AmigaOS 4. This is a port of SDL for AmigaOS 4. Some parts were recycled from older SDL port for AmigaOS 4, such as audio and joystick code. Download it here: www.doorway.ru Thank you James! 19 May , In case you haven't noticed yet. It's possible to upload files to OS4Depot using anonymous FTP. You can read up on how to upload and create the required readme file on this page. 02 Apr , To everyone downloading the Diablo 3 archive, April Fools on. File download command line utility: http, https and ftp. Arguments: URL/A,DEST=DESTINATION=TARGET/K,PORT/N,QUIET/S,USER/K,PASSWORD/K,LIST/S,NOSIZE/S,OVERWRITE/S. URL = Download address DEST = File name / Destination directory PORT = Internet port number QUIET = Do not display progress bar. AmigaOS 4 is a line of Amiga operating systems which runs on PowerPC microprocessors. It is mainly based on AmigaOS source code developed by Commodore, and partially on version developed by Haage & Partner. "The Final Update" (for OS version ) was released on 24 December (originally released Latest release​: ​ Final Edition Update 1 / De. Purchasers get a serial number inside their box or by email to register their purchase at our website in order to get access to our restricted download area for the game archive, the The game was originally released in for AmigaOS 68k/WarpOS and in December for AmigaOS 4 by Hyperion Entertainment CVBA.
    [Show full text]
  • Vbcc Compiler System
    vbcc compiler system Volker Barthelmann i Table of Contents 1 General :::::::::::::::::::::::::::::::::::::::::: 1 1.1 Introduction ::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Legal :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.3 Installation :::::::::::::::::::::::::::::::::::::::::::::::::::: 2 1.3.1 Installing for Unix::::::::::::::::::::::::::::::::::::::::: 3 1.3.2 Installing for DOS/Windows::::::::::::::::::::::::::::::: 3 1.3.3 Installing for AmigaOS :::::::::::::::::::::::::::::::::::: 3 1.4 Tutorial :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 5 2 The Frontend ::::::::::::::::::::::::::::::::::: 7 2.1 Usage :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 7 2.2 Configuration :::::::::::::::::::::::::::::::::::::::::::::::::: 8 3 The Compiler :::::::::::::::::::::::::::::::::: 11 3.1 General Compiler Options::::::::::::::::::::::::::::::::::::: 11 3.2 Errors and Warnings :::::::::::::::::::::::::::::::::::::::::: 15 3.3 Data Types ::::::::::::::::::::::::::::::::::::::::::::::::::: 15 3.4 Optimizations::::::::::::::::::::::::::::::::::::::::::::::::: 16 3.4.1 Register Allocation ::::::::::::::::::::::::::::::::::::::: 18 3.4.2 Flow Optimizations :::::::::::::::::::::::::::::::::::::: 18 3.4.3 Common Subexpression Elimination :::::::::::::::::::::: 19 3.4.4 Copy Propagation :::::::::::::::::::::::::::::::::::::::: 20 3.4.5 Constant Propagation :::::::::::::::::::::::::::::::::::: 20 3.4.6 Dead Code Elimination::::::::::::::::::::::::::::::::::: 21 3.4.7 Loop-Invariant Code Motion
    [Show full text]
  • Vasm Assembler System
    vasm assembler system Volker Barthelmann, Frank Wille June 2021 i Table of Contents 1 General :::::::::::::::::::::::::::::::::::::::::: 1 1.1 Introduction ::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Legal :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.3 Installation :::::::::::::::::::::::::::::::::::::::::::::::::::: 1 2 The Assembler :::::::::::::::::::::::::::::::::: 3 2.1 General Assembler Options ::::::::::::::::::::::::::::::::::::: 3 2.2 Expressions :::::::::::::::::::::::::::::::::::::::::::::::::::: 5 2.3 Symbols ::::::::::::::::::::::::::::::::::::::::::::::::::::::: 7 2.4 Predefined Symbols :::::::::::::::::::::::::::::::::::::::::::: 7 2.5 Include Files ::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.6 Macros::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.7 Structures:::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.8 Conditional Assembly :::::::::::::::::::::::::::::::::::::::::: 8 2.9 Known Problems ::::::::::::::::::::::::::::::::::::::::::::::: 9 2.10 Credits ::::::::::::::::::::::::::::::::::::::::::::::::::::::: 9 2.11 Error Messages :::::::::::::::::::::::::::::::::::::::::::::: 10 3 Standard Syntax Module ::::::::::::::::::::: 13 3.1 Legal ::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 13 3.2 Additional options for this module :::::::::::::::::::::::::::: 13 3.3 General Syntax ::::::::::::::::::::::::::::::::::::::::::::::: 13 3.4 Directives ::::::::::::::::::::::::::::::::::::::::::::::::::::: 14 3.5 Known Problems::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Apov Issue 4 Regulars
    issue 4 - june 2010 - an abime.net publication the amiga dedicated to amIga poInt of vIew AMIGA reviews w news tips w charts apov issue 4 regulars 8 editorial 10 news 14 who are we? 116 charts 117 letters 119 the back page reviews 16 leander 18 dragon's breath 22 star trek: 25th anniversary 26 operation wolf 28 cabal 30 cavitas 32 pinball fantasies 36 akira 38 the king of chicago ap o 40 wwf wrestlemania v 4 42 pd games 44 round up 5 features 50 in your face The first person shooter may not be the first genre that comes to mind when you think of the Amiga, but it's seen plenty of them. Read about every last one in gory detail. “A superimposed map is very useful to give an overview of the levels.” 68 emulation station There are literally thousands of games for the Amiga. Not enough for you? Then fire up an emulator and choose from games for loads of other systems. Wise guy. “More control options than you could shake a joypad at and a large number of memory mappers.” 78 sensi and sensibility Best football game for the Amiga? We'd say so. Read our guide to the myriad versions of Sensi. “The Beckhams had long lived in their estate, in the opulence which their eminence afforded them.” wham into the eagles nest 103 If you're going to storm a castle full of Nazis you're going to need a plan. colorado 110 Up a creek without a paddle? Read these tips and it'll be smooth sailing.
    [Show full text]
  • Donald Kay Munro
    Library of the Australian Defence Force Academy University College The University of New South Wales Donor: Donald Kay Munro PLEASE TYPE UNTVERSITY OF NEW SOUTH WALES Thesis/Project Report Sheet SumameorFamilyname: Firstname: DONALD Othername/s: MI Abbreviation for degree as given in the University calendar: Ml NF. S.Q School: COMPUrER..SCIENCE p^cuity: ZIIII^IIIZZIIIIZIIZIIIIIZ m: Fanners conduct their business in a spatial environment They make decisions about the area of land to place under various crops, the area for livestock and the areas which need to have ^^^^^^^^^^^^^^^^^^^^^^^^^ certain treatments (spraying, ploughing) carried out on them. On domestic personal computers, software such as Word Processors and Spreadsheets can assist them with record keeping and financial records; however, there is no commonly available software that can assist with the spatial decisions and spatial record keeping. Geographic Information Systems (CIS) can provide such support, but the existing software is targeted at an expert specialist user and, while offering powerful processing, is too complex for a novice user to derive benefit. Most of the software has its origins in the scientific or research community and would previously have been running on mainframe or powerful minicomputer environments. Many programs require complex instructions and parameters to be typed at a command line, and learning how to use these instructions would consume months of training. This Project used the Evolutionary Model of Structured Rapid Prototyping to define the user requirements of a DeskTop GIS for use by farmers. This work involved a repetitive cycle of talking to farmers about the information that they regularly used and the sort of information they would like in the future; finding ways of collecting and storing that data; writing programs that would manipulate and display the information; and making those programs accessible to the farmer in an easy-to-use environment on a domestic personal computer.
    [Show full text]
  • English SCACOM Issue 3
    English.SCACOM issue 3 (July 2008 ) Issue 3 www.scacom.de.vu July 2008 GGGGoooolllllldddd QQQQuuuueeeesssstttt 4444```` MMMMaaaakkkkiiiinnnngggg ooooffff NNNNyyyyaaaaaaaaaaaaaaaahhhh!!!! 11111111 !!!!nnnntttteeeerrrrvvvviiiieeeewwww wwwwiiiitttthhhh TTTThhhhoooorrrrsssstttteeeennnn SSSScccchhhhrrrreeeecccckkkk IIIInnnntttteeeerrrreeeessssttttiiiinnnngggg tttthhhhiiiinnnnggggssss BBBBeeeesssstttt rrrrCCCC66664444 GGGGaaaammmmeeeessss LLLLiiiisssstttt BBBBaaaarrrraaaaccccuuuuddddaaaassss ssssttttoooorrrryyyy aaa aaaaa aaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaa Page - 1 -aaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaa aaaaa aaa English.SCACOM issue 3 (July 2008 ) aaa aaaaa aaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaa Page - 2 -aaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaa aaaaa aaa English.SCACOM issue 3 (July 2008 ) Prologue . English SCACOM issue 3 with beautiful Imprint background pictures, interesting texts and a good game done by Richard Bayliss! English SCACOM is a free download- able PDF magazine.It’s scheduled every 3 months. First test of the new 1541U is included as well as the news from the last three month. There You can publish the magazine on your are a lot of interesting articles and the story of homepage without changes and link to www.scacom.de.vu only. the new game Gold Quest 4 with an Interview of the developer. Each author has Copyright of articles published in the magazine. Don’t use But it’s sad that there was very little feedback without permission of the author! for issue 2. Too nobody sent us texts or wants The best way to help would be if you to translate things. Due to this problems Eng- write some articles for us. lish.SCACOM is now scheduled every three Please send suggestions, corrections months. The next one will be released in Oc- or complaints via e-mail. tober 2008! Editoral staff: Please help us: write articles and give feed- Stefan Egger back. Write an E-mail to Joel Reisinger [email protected].
    [Show full text]
  • Download Issue 14
    IssueBiggest Ever! £4.00 Issue 14, Spring 2003 8.00Euro Quake 2 Read our comprehensive review of Hyperions’s latest port. Hollywood Take a seat and enjoy our full review of this exciting new multimedia blockbuster! Contents Features The Show Must Go On! Editorial Welcome to another issue of Candy for SEAL’s Mick Sutton gives us an insight into the production of WoASE. Total Amiga, as you will no-doubt Issue 14 usergroups can afford. To give balance between space for the have noticed this issue is rather ack in the good old days we you an idea a venue capable of punters and giving the exhibitors late, which is a pity as we had Candy Factory is a graphics A built-in character generator had World of Amiga shows holding between 300 and 500 the stand space they require improved our punctuality over OS4 B the last few issues. application designed for allows you to add effects to Spring 2002 put on every year, usually at a people can cost anywhere from (some companies get a real bee high profile site (Wembley) and £500 to £1000 (outside London) in their bonnet about where they Unfortunately the main reason making logos and other text in any font without leaving texture again based on the all well attended. Everybody for a day. are situated). The floorplan goes behind the delay was that the graphics with high quality 3D the program. You can also load Contents wanted to be there and be seen, through many revisions before SCSI controller and PPC on my textured effects quickly and shapes (for example a logo) light source.
    [Show full text]
  • QUAKE 2 (Amiga)
    Quake 2 for AmigaOS Table of Contents Quake 2 for AmigaOS Licence issues Features of this port Installation and Gamestart The GUI Mini-FAQ Speed-Tweaking Hyperion-Demos List of included Quake 2 Mods Technical Support Quake 2 Web-Links Credits System Requirements The GUI When you doubleclick the Icon you see four tabs: Gfx Here you can select between MiniGL/Warp3D and Software Rendering. People with 3D Hardware should select MiniGL/Warp3D. It looks nicer and performs better. The game is also playable in Software-Rendering, though. You also can select between Fullscreen and Window Mode on this Tab. Audio On this tab you can choose between AHI and Paula-Sound. Also you can setup your CD Drive for CD Audio Replay (or disable it). Input On this Tab you can Enable or Disable the Mouse and the Joystick. As to the Joystick, the following Input-Devices are supported: - CD 32 Pad - PSX Port - PC-Analog-Stick, by using a Custom-Made Adapter and wessupport.library (included on CD). The same adaptor which worked for Descent:Freespace and ADescent also works for Quake 2. For PSX Port and PC-Joysticks you can also manipulate the Joystick-Speed and the Deadzone. In case you use a PC-Joystick, PSX Port and CD32 Pad will be disabled. In case you use PSX Port you can choose to disable all other Joysticks, if wanted. Game This is the Tab which comes up, when you start up the GUI. Here you can chooce between Deathmatch, Cooperative Gaming and CTF (as supported by Mods).
    [Show full text]
  • Standard Commands (.MOD &.XM) • 0Xy Arpeggio • 1Xx Portamento Up
    Standard commands (.MOD &.XM) 0xy Arpeggio 1xx Portamento up 2xx Portamento down 3xx Portamento to note 4xy Vibrato 5xy Portamento to note with volume slide 6xy Vibrato with volume slide 7xy Tremolo 8xx Set note panning position 9xx Sample offset Axy Volume slide Bxx Jump to order Cxx Set note volume Dxx Pattern break Exy Subcommands: o E0x Amiga LED Filter toggle * o E1x Fine portamento up o E2x Fine portamento down o E3x Glissando control ** o E4x Vibrato control ** o E5x Set note fine-tune o E6x Pattern loop o E7x Tremolo control ** o E8x Set note panning position *** o E9x Re-trigger note o EAx Fine volume slide up o EBx Fine volume slide down o ECx Note cut o EDx Note delay o EEx Pattern delay o EFx Funk it! * Fxx Set song speed/BPM Extended commands (.XM only) Gxx Set global volume Hxy Global volume slide Kxx Key-off Lxx Set volume envelope position Pxy Panning slide Rxy Re-trigger note with volume slide Txy Tremor Xxy Extra fine portamentos: o X1x Extra fine portamento up o X2x Extra fine portamento down Volume column commands (.XM only) xx Set note volume +x Volume slide up -x Volume slide down Dx Fine volume slide down (displayed as ▼x) Lx Panning slide left (displayed as ◀x) Mx Portamento to note Px Set note panning position Rx Panning slide right (displayed as ▶x) Sx Set vibrato speed Ux Fine volume slide up (displayed as ▲x) Vx Vibrato *) Not implemented, no plans to support **) Not implemented yet, will be required for feature completeness ***) Not supported on Amiga nor in FT2, effect relocation (8xx, Px) advised 0xy Arpeggio 0 Syntax: x = semitone offset y = semitone offset C-4 ·1 ·· 037 ··· ·· ·· 037 Example: ··· ·· ·· 037 ··· ·· ·· 037 Arpeggio quickly alters the note pitch between the base note (C-4) and the semitone offsets x (3 = D#4) and y (7 = G-4).
    [Show full text]