Python Crypto Misuses in the Wild

Total Page:16

File Type:pdf, Size:1020Kb

Python Crypto Misuses in the Wild Python Crypto Misuses in the Wild Anna-Katharina Wickert Lars Baumgärtner [email protected] [email protected] Technische Universität Darmstadt Technische Universität Darmstadt Darmstadt, Germany Darmstadt, Germany Florian Breitfelder Mira Mezini [email protected] [email protected] Technische Universität Darmstadt Technische Universität Darmstadt Darmstadt, Germany Darmstadt, Germany ABSTRACT 1 INTRODUCTION Background: Previous studies have shown that up to 99.59 % of the Cryptography, hereafter crypto, is widely used nowadays to protect Java apps using crypto APIs misuse the API at least once. However, our data and ensure confidentiality. For example, without crypto, these studies have been conducted on Java and C, while empirical we would not be able to securely use online banking or do online studies for other languages are missing. For example, a controlled shopping. Unfortunately, previous research results show that crypto user study with crypto tasks in Python has shown that 68.5 % of the is often used in an insecure way [3, 4, 7, 9, 11]. One such problem is professional developers write a secure solution for a crypto task. the choice of an insecure parameter, like an insecure block mode, for Aims: To understand if this observation holds for real-world code, crypto primitives like encryption. Many static analysis tools exist we conducted a study of crypto misuses in Python. Method: We to identify these misuses such as CryptoREX [13], CryptoLint [4], developed a static analysis tool that covers common misuses of5 CogniCryptSAST [8], and Cryptoguard [12]. different Python crypto APIs. With this analysis, we analyzed 895 While these tools and the respective in-the-wild studies concen- popular Python projects from GitHub and 51 MicroPython projects trate on Java and C, user studies suggest that the existing Python for embedded devices. Further, we compared our results with the APIs reduce the number of crypto misuses. Acar et al. [2] con- findings of previous studies. Results: Our analysis reveals that ducted an experiment with 307 GitHub users which had to solve 52.26 % of the Python projects have at least one misuse. Further, 3 crypto-related development tasks. They observed that 68.5 % of some Python crypto libraries’ API design helps developers from the professional developers wrote a secure solution in Python for misusing crypto functions, which were much more common in the given task. Within a controlled experiment with 256 Python studies conducted with Java and C code. Conclusion: We con- developers that tried to solve simple crypto tasks, Acar et al. [1] clude that we can see a positive impact of the good API design on identified that a simple API design, like the Python library cryp- crypto misuses for Python applications. Further, our analysis of tography, supports developers in writing secure code. However, no MicroPython projects reveals the importance of hybrid analyses. empirical in-the-wild study has yet confirmed that crypto misuses in Python occur less frequently than in Java or C. CCS CONCEPTS To empirically evaluate crypto misuses in Python, we introduce LICMA,a multi-language analysis framework with support for5 • Software and its engineering ! Software libraries and repos- different Python crypto APIs and Java’s JCA API. We provide5 dif- itories. ferent rules [4] for all Python APIs and6 different rules [ 4] for JCA to detect the most common crypto misuses. With LICMA, we ana- KEYWORDS lyzed 895 popular Python apps from GitHub and 51 MicroPython Crypto API, Security, Static Analysis. projects to gain insights into misuses in Python. We identified that arXiv:2109.01109v1 [cs.SE] 2 Sep 2021 52.26 % of the Python GitHub apps with crypto usages have at least ACM Reference Format: one misuse causing 1,501 misuses. In total, only7% of the misuses Anna-Katharina Wickert, Lars Baumgärtner, Florian Breitfelder, and Mira Mezini. 2021. Python Crypto Misuses in the Wild. In ACM / IEEE Inter- are within the application code itself, while the remaining misuses national Symposium on Empirical Software Engineering and Measurement are introduced by dependencies. Further, our study of MicroPython (ESEM) (ESEM ’21), October 11–15, 2021, Bari, Italy. ACM, New York, NY, projects reveals that developers in the embedded domain tend to USA, 6 pages. https://doi.org/10.1145/3475716.3484195 use crypto via C code. Thus, revealing the importance of hybrid static analyses, which can track program information, e.g., a call graph, across multiple languages [5, 10]. Permission to make digital or hard copies of part or all of this work for personal or To further improve our understanding whether Python APIs are classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation less prone to crypto misuses, we make the following contributions: on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). • A novel, multi-language analysis tool to detect crypto mis- ESEM ’21, October 11–15, 2021, Bari, Italy uses in Python and Java. For Python we cover crypto misuses © 2021 Copyright held by the owner/author(s). ACM ISBN 978-1-4503-8665-4/21/10. for5 common Python crypto APIs and for Java the standard https://doi.org/10.1145/3475716.3484195 API JCA. ESEM ’21, October 11–15, 2021, Bari, Italy Wickert et al. Table 1: Six commonly discussed crypto misuses in Java and C [4, 13] with an example of a violation in Python. ID Rule Python: Violation Example §1 Do not use electronic code book (ECB) mode for encryption. aes = AES.new(key, AES.MODE_ECB) §2 Do not use a non-random initiliazation vector (IV) for ciphertext aes = AES.new(key, AES.MODE_CBC, b'\0'∗ 16) block chaining (CBC) encryption. §3 Do not use constant encryption keys. aes = AES.new(b'\0'∗ 32, AES.MODE_CBC, iv) §4 Do not use constant salts for password-based encryption (PBE). kdf = PBKDF2HMAC(hashes.SHA256(), 32, b'\0'∗ 32, 10000) §5 Do not use fewer than 1,000 iterations for PBE. kdf = PBKDF2HMAC(hashes.SHA256(), 32, salt, 1) §6 Do not use static seeds to initialize secure random generator. Due to API design only possible in Java [4] and C/C++ [13] • An empirical study of crypto misuses in the 895 most popular A seed can ensure that the output of a random number generator Python applications on GitHub revealing 1,501 misuses. is non-deterministic. Rule 6 (§6) covers that static seeds lead to • A comparison of our findings in Python applications with deterministic outputs. Common Java [4] and C/C++ [13] libraries previous studies about crypto misuses in-the-wild for An- expect a seed, while the analyzed Python APIs avoid this by design. droid Apps and firmware images in C. We observed that most Python applications are more secure and the distribution 3 DESIGN AND IMPLEMENTATION OF LICMA between the concrete types of misuses differ a lot. In this section, we describe the design of our static analysis tool • An empirical study of crypto misuses in MicroPython projects LICMA, and discuss the implementation in more detail. which reveals the importance of hybrid static analyses. • A replication package including both data sets used for our 3.1 Design study, the results of our analysis, and the code of LICMA1. A general overview of LICMA is given in Figure 1. First, we parse a source code file into the respective Abstract Syntax Tree (AST). 2 BACKGROUND More specifically, we use Babelfish 2 to create a Universal Abstract Crypto libraries enable developers to use crypto primitives, like Syntax Tree (UAST) which combines language-independent AST symmetric key encryption or password-based encryption (PBE), elements with language-specific elements. For simplicity, we use in their application. However, studies have shown that developers the term AST in the remainder of the paper. Second, we apply the struggle to use those APIs correctly and securely. For example, LICMA analysis upon the AST to identify potential misuses of our Krüger et al. [8] show that 95 % of the Android applications using crypto rules. crypto have at least one crypto misuse. In the remainder of the paper, Based upon the rule defining a misuse, the analysis checks fora we define a crypto misuse, in short misuse, as a usage of acrypto violation of the rule within the source code and triggers a backward library which is a formally correct use of the API, e.g., not causing analysis for this task. The backward slice is created by filtering a crash, but is unsafe. In this paper, we focus on six commonly the AST with the help of XPath3 queries, and works as follows: discussed crypto misuses [4, 13] which we will introduce next. All First, the backward slicing algorithm (BSA) identifies all source rules including Python example code can be seen in Table 1. code lines that are referred within the respective rule. An example For AES encryption, a block mode is used to combine several of the slicing criterion is a function call parameter like the key for a blocks for encryption and decryption. However, some block modes crypto function. Second, the BSA determines for all function calls if are considered insecure by experts. Rule 1 (§1) and rule 2 (§2) cover the parameter is either hard-coded, a local assignment, or a global two insecure usages of block modes. §1 prohibits the usage of assignment. If one of the three cases is fulfilled, the corresponding ECB which is deterministic and not secure. §2 focus on a non- value is returned. This value is checked against a function defined random initialization vector (IV) for the block mode CBC.
Recommended publications
  • Micropython for Satlink 3 Documentation Release 1.8.4
    MicroPython for Satlink 3 Documentation Release 1.8.4 Damien P. George, contributors, and Sutron Corporation Jul 28, 2017 CONTENTS 1 Python first time setup & configuration1 1.1 1. Download & Install LinkComm....................................1 1.2 2. Download & Install Python......................................1 1.3 3. Download & Install Pyinstaller....................................3 1.4 4. Download & Install PyCharm.....................................3 1.5 5. Testing out .py to .exe converter....................................5 1.6 6. Python PyQt5 GUI..........................................6 1.7 7. Connect PyCharm into external programs like linkcomm or micropython..............6 1.8 8. Configure PyCharm for program development using LinkComm..................9 1.9 9. Configure PyCharm with SL3 API for auto completion....................... 11 1.10 10. Setting docstring stub in PyCharm.................................. 13 2 MicroPython libraries 15 2.1 Python standard libraries and micro-libraries.............................. 15 2.2 MicroPython-specific libraries...................................... 16 2.3 Libraries specific to the Satlink 3.................................... 19 3 The MicroPython language 39 3.1 Overview of MicroPython Differences from Standard Python..................... 39 3.2 Code examples of how MicroPython differs from Standard Python with work-arounds........ 41 3.3 The MicroPython Interactive Interpreter Mode (aka REPL)....................... 56 3.4 Maximising Python Speed.......................................
    [Show full text]
  • Setting up Your Environment
    APPENDIX A Setting Up Your Environment Choosing the correct tools to work with asyncio is a non-trivial choice, since it can significantly impact the availability and performance of asyncio. In this appendix, we discuss the interpreter and the packaging options that influence your asyncio experience. The Interpreter Depending on the API version of the interpreter, the syntax of declaring coroutines change and the suggestions considering API usage change. (Passing the loop parameter is considered deprecated for APIs newer than 3.6, instantiating your own loop should happen only in rare circumstances in Python 3.7, etc.) Availability Python interpreters adhere to the standard in varying degrees. This is because they are implementations/manifestations of the Python language specification, which is managed by the PSF. At the time of this writing, three relevant interpreters support at least parts of asyncio out of the box: CPython, MicroPython, and PyPy. © Mohamed Mustapha Tahrioui 2019 293 M. M. Tahrioui, asyncio Recipes, https://doi.org/10.1007/978-1-4842-4401-2 APPENDIX A SeTTinG Up YouR EnViROnMenT Since we are ideally interested in a complete or semi-complete implementation of asyncio, our choice is limited to CPython and PyPy. Both of these products have a great community. Since we are ideally using a lot powerful stdlib features, it is inevitable to pose the question of implementation completeness of a given interpreter with respect to the Python specification. The CPython interpreter is the reference implementation of the language specification and hence it adheres to the largest set of features in the language specification. At the point of this writing, CPython was targeting API version 3.7.
    [Show full text]
  • How Python Is Winning New Friends
    How Python is Winning New Friends Steve Holden CTO, Global Stress Index Limited [email protected] IntroducFons • Programmer since 1967 • Computaonal scienFst by training • Engineer at heart • Python user since Python 1.4 (c. 1995) • Enjoy helping people to learn I’ve WriSen about Python Any Python users out there? Developments in CompuFng SOME HISTORY 1948 Programming Was Hard • No operang system • No libraries • No compilers • No assemblers • The painful process of abstracFon layering began 1977 Easier to Program • Assemblers/compilers available • UNIX starFng to emerge as a common base – Microprogramming handled hardware complexity • Storage flexibly handled by the OS • Networking heading to ubiquity 1984 2015 2016 2017 2020 ? Whatever it is, it will be complex! And so to Python “BUT IT’S [JUST] A SCRIPTING LANGUAGE …” What’s a “ScripFng Language”? • “First they ignore you; then they abuse you; then they crack down on you and then you win.” – not Mahatma Ghandi What’s a “ScripFng Language”? • “First they ignore you; then they abuse you; then they crack down on you and then you win.” – not Mahatma Ghandi • “Ridicule is like repression. Both give place to respect when they fail to produce the intended effect.” – Mahatma Ghandi Note to Purists • Learners do not have complex needs – Simplicity and consistency are important – ExecuFon speed mostly isn’t • Direct hands-on experience enables • Large resources not required – Wide availability and ease of access are criFcal The Programming Audience • Professional soiware engineers • ScienFsts • Lab
    [Show full text]
  • Pdf for a Detailed Explanation, Along with Various Techniques for Debouncing
    MicroPython Documentation Release 1.11 Damien P. George, Paul Sokolovsky, and contributors May 29, 2019 CONTENTS i ii CHAPTER ONE MICROPYTHON LIBRARIES Warning: Important summary of this section • MicroPython implements a subset of Python functionality for each module. • To ease extensibility, MicroPython versions of standard Python modules usually have u (“micro”) prefix. • Any particular MicroPython variant or port may miss any feature/function described in this general docu- mentation (due to resource constraints or other limitations). This chapter describes modules (function and class libraries) which are built into MicroPython. There are a few categories of such modules: • Modules which implement a subset of standard Python functionality and are not intended to be extended by the user. • Modules which implement a subset of Python functionality, with a provision for extension by the user (via Python code). • Modules which implement MicroPython extensions to the Python standard libraries. • Modules specific to a particular MicroPython port and thus not portable. Note about the availability of the modules and their contents: This documentation in general aspires to describe all modules and functions/classes which are implemented in MicroPython project. However, MicroPython is highly configurable, and each port to a particular board/embedded system makes available only a subset of MicroPython libraries. For officially supported ports, there is an effort to either filter out non-applicable items, or mark individual descriptions with “Availability:” clauses describing which ports provide a given feature. With that in mind, please still be warned that some functions/classes in a module (or even the entire module) described in this documentation may be unavailable in a particular build of MicroPython on a particular system.
    [Show full text]
  • Bringing Python to Godot
    Bringing Python to Godot 01/02/2020 Emmanuel Leblond - https://github.com/touilleMan/godot-python Godot ? Open source (MIT) Full featured Linux support ❤❤❤ Demo time ! Godot: dynamic from the ground class Node2D : public Node { godot/node2d.hpp GDCLASS(Node2D, Node); void set_rot(float p_angle); float get_rot() const; ... void _bind_methods() { ClassDB::bind_method(D_METHOD("get_rot"), &Node2D::get_rot); ClassDB::bind_method(D_METHOD("set_rot", "degrees"), &Node2D::set_rot); ... } } Godot: dynamic from the ground class Node2D : public Node { godot/node2d.hpp GDCLASS(Node2D, Node); void set_rot(float p_angle); float get_rot() const; ... void _bind_methods() { ClassDB::bind_method(D_METHOD("get_rot"), &Node2D::get_rot); ClassDB::bind_method(D_METHOD("set_rot", "degrees"), &Node2D::set_rot); ... } } Godot: dynamic from the ground class Node2D : public Node { godot/node2d.hpp GDCLASS(Node2D, Node); void set_rot(float p_angle); float get_rot() const; ... void _bind_methods() { ClassDB::bind_method(D_METHOD("get_rot"), &Node2D::get_rot); ClassDB::bind_method(D_METHOD("set_rot", "degrees"), &Node2D::set_rot); ... } } # C++ static traditional way Node2D *obj = new Node2D(); obj->set_ret(4.2); Godot: dynamic from the ground class Node2D : public Node { godot/node2d.hpp GDCLASS(Node2D, Node); void set_rot(float p_angle); float get_rot() const; ... void _bind_methods() { ClassDB::bind_method(D_METHOD("get_rot"), &Node2D::get_rot); ClassDB::bind_method(D_METHOD("set_rot", "degrees"), &Node2D::set_rot); ... } } # C++ static traditional way # C++ Dynamic
    [Show full text]
  • Micropython Documentation Release 1.10 Damien P. George, Paul
    MicroPython Documentation Release 1.10 Damien P. George, Paul Sokolovsky, and contributors Jan 25, 2019 CONTENTS 1 MicroPython libraries 1 1.1 Python standard libraries and micro-libraries..............................2 1.1.1 Builtin functions and exceptions................................2 1.1.2 array – arrays of numeric data................................5 1.1.3 cmath – mathematical functions for complex numbers....................5 1.1.4 gc – control the garbage collector...............................6 1.1.5 math – mathematical functions................................7 1.1.6 sys – system specific functions................................9 1.1.7 ubinascii – binary/ASCII conversions........................... 11 1.1.8 ucollections – collection and container types...................... 11 1.1.9 uerrno – system error codes................................. 12 1.1.10 uhashlib – hashing algorithms............................... 13 1.1.11 uheapq – heap queue algorithm................................ 14 1.1.12 uio – input/output streams................................... 14 1.1.13 ujson – JSON encoding and decoding............................ 16 1.1.14 uos – basic “operating system” services............................ 16 1.1.15 ure – simple regular expressions............................... 20 1.1.16 uselect – wait for events on a set of streams........................ 22 1.1.17 usocket – socket module................................... 23 1.1.18 ussl – SSL/TLS module................................... 28 1.1.19 ustruct – pack and unpack
    [Show full text]
  • Sistema Basado En Tecnología 5G De Monitorización Psicoacústica Del Paisaje Sonoro En Smart Cities Con Offloading Computacional Dinámico En El Edge
    SISTEMA BASADO EN TECNOLOGÍA 5G DE MONITORIZACIÓN PSICOACÚSTICA DEL PAISAJE SONORO EN SMART CITIES CON OFFLOADING COMPUTACIONAL DINÁMICO EN EL EDGE Jaume Segura-Garcia1, Santiago Felici-Castell1, Jose M. Alcaraz Calero2, Qi Wang2, Jesús López-Ballester1, Rafael Fayos-Jordán1, Juan J. Pérez-Solano1, Miguel Arana-Burgui3 1 Dpt Informàtica, ETSE – Universitat de València {e-mail: [email protected], [email protected], [email protected], [email protected], [email protected]} 2 School of Computing, Engineering and Physical Sciences – University of the West of Scotland 3 INAMAT – Universidad Pública de Navarra, Spain Resumen En las tecnologías de próxima generación, el control de las molestias por ruido ambiental en una Smart City debería ser lo más eficiente posible. Los sistemas IoT sobre tecnologías 5G ofrecen una gran oportunidad para hacer offloading del cómputo en los nodos sensores, ya que proporciona una serie de nuevos conceptos para el cómputo dinámico que las tecnologías anteriores no ofrecían. En este artículo, se ha implementado un sistema IoT completo basado en tecnología 5G para la monitorización psicoacústica utilizando diferentes opciones para descargar el cómputo a diferentes partes del sistema. Esta descarga se ha realizado mediante el desarrollo de diferentes splittings funcionales de los algoritmos de cálculo de las métricas psicoacústicas. Por último, se muestra una comparación del rendimiento entre los diferentes splittings funcionales y su aplicación con un análisis detallado. Palabras clave: 5G LTE-M1, psicoacústica, monitorización del soundscape, splitting funcional, Smart City. Abstract In the next generation technologies, the environmental noise nuisance monitoring in a Smart City should be as much efficient as possible. 5G IoT systems offer a big opportunity to offload the computation from the sensor nodes, since it provides a series of new concepts for dynamic computing that the previous technologies did not offer.
    [Show full text]
  • Release 1.9.2 Damien P. George, Paul Sokolovsky, and Contributors
    MicroPython Documentation Release 1.9.2 Damien P. George, Paul Sokolovsky, and contributors August 23, 2017 CONTENTS 1 Quick reference for the WiPy1 1.1 General board control (including sleep modes).............................1 1.2 Pins and GPIO..............................................1 1.3 Timers..................................................1 1.4 PWM (pulse width modulation).....................................2 1.5 ADC (analog to digital conversion)...................................2 1.6 UART (serial bus)............................................2 1.7 SPI bus..................................................2 1.8 I2C bus..................................................3 1.9 Watchdog timer (WDT).........................................3 1.10 Real time clock (RTC)..........................................3 1.11 SD card..................................................4 1.12 WLAN (WiFi)..............................................4 1.13 Telnet and FTP server..........................................4 1.14 Heart beat LED..............................................4 2 General information about the WiPy7 2.1 No floating point support.........................................7 2.2 Before applying power..........................................7 2.3 WLAN default behaviour........................................7 2.4 Telnet REPL...............................................7 2.5 Local file system and FTP access....................................7 2.6 FileZilla settings.............................................8 2.7 Upgrading
    [Show full text]
  • Building Micropython with KEIL and Programming with Python on I.MX RT1050/1060 Rev
    AN13242 Building Micropython with KEIL and Programming with Python on i.MX RT1050/1060 Rev. 0 — 27 April, 2021 Application Note Contents 1 Introduction 1 Introduction......................................1 This application note introduces the porting of MicroPython, the packaging of 2 Hardware platform...........................1 2.1 i.MX RT1050/60 crossover peripheral functions, and the adaptation of circuit boards, using the example process........................................ 1 of our work on the i.MX RT1050/1060EVK development board. The code are 2.2 i.MX RT1050/60 EVK board........ 1 mainly written in C language, but are presented to the users as Python modules 3 Micropython.....................................2 and types. You can either evaluate and use MicroPython on this development 3.1 Brief introduction to Python board, or use it to port and adapt your new board design. MicroPython’s native Language.....................................2 project management and build environment is based on GCC and Make under 3.2 Brief introduction to Micropython Linux. To facilitate the development habits of most MCU embedded engineers, .....................................................3 the development environment is also ported to Keil MDK5. 4 Building and running Micropython on i.MX RT1050/1060 EVK.................. 3 The readers are expected to have basic experience of development with KEIL 4.1 Downloading source code........... 3 MDK, knowing what is CMSIS-Pack, the concept of target in KEIL and how to 4.2 Opening project with KEIL
    [Show full text]
  • Or How to Avoid Recoding Your (Entire) Application in Another Language Before You Start
    Speeding up Python Or how to avoid recoding your (entire) application in another language Before you Start ● Most Python projects are “fast enough”. This presentation is not for them. ● Profle your code, to identify the slow parts AKA “hot spots”. ● The results can be surprising at times. ● Don’t bother speeding up the rest of your code. Improving your Python ● Look into using a better algorithm or datastructure next. ● EG: Sorting inside a loop is rarely a good idea, and might be better handled with a tree or SortedDict. Add Caching ● Memorize expensive-to-compute (and recompute) values. ● Can be done relatively easily using functools.lru_cache in 3.2+. Parallelise ● Multicore CPU’s have become common. ● Probably use threading or multiprocessing. Threading ● CPython does not thread CPU-bound tasks well. ● CPython can thread I/O-bound tasks well. ● CPython cannot thread a mix of CPU-bound and I/ O-bound well. ● Jython, IronPython and MicroPython can thread arbitrary workloads well. ● Data lives in the same threaded process. This is good for speed, bad for reliability. Multiprocessing ● Works with most Python implementations. ● Is a bit slower than threading when threading is working well. ● Gives looser coupling than threading, so is easier to “get right”. ● Can pass data from one process to another using shared memory. Numba ● If you’re able to isolate your performance issue to a small number of functions or methods (callables), consider using Numba. ● It’s just a decorator – simple. ● It has “object mode” (which doesn’t help much), and “nopython mode” (which can help a lot, but is more restrictive).
    [Show full text]
  • Python Auf Dem Microcontroller
    Python auf dem Microcontroller Python auf dem Microcontroller Alexander Böhm [email protected] Chemnitzer Linux-Tage, 16. März 2019 Alexander Böhm [email protected] Chemnitzer Linux-Tage, 16. März 2019 1 / 26 Microcontroller-Entwicklung im IoT mehr Leistung mehr eingebaute Geräte energieeffizienter ! mehr Möglichkeiten Verschmelzung von Desktop- und Microcontroller-Welt Python auf dem Microcontroller Einführung Motivation Python ist schnell und einfach Alexander Böhm [email protected] Chemnitzer Linux-Tage, 16. März 2019 2 / 26 mehr eingebaute Geräte energieeffizienter ! mehr Möglichkeiten Verschmelzung von Desktop- und Microcontroller-Welt Python auf dem Microcontroller Einführung Motivation Python ist schnell und einfach Microcontroller-Entwicklung im IoT mehr Leistung Alexander Böhm [email protected] Chemnitzer Linux-Tage, 16. März 2019 2 / 26 energieeffizienter ! mehr Möglichkeiten Verschmelzung von Desktop- und Microcontroller-Welt Python auf dem Microcontroller Einführung Motivation Python ist schnell und einfach Microcontroller-Entwicklung im IoT mehr Leistung mehr eingebaute Geräte Alexander Böhm [email protected] Chemnitzer Linux-Tage, 16. März 2019 2 / 26 ! mehr Möglichkeiten Verschmelzung von Desktop- und Microcontroller-Welt Python auf dem Microcontroller Einführung Motivation Python ist schnell und einfach Microcontroller-Entwicklung im IoT mehr Leistung mehr eingebaute Geräte energieeffizienter Alexander Böhm [email protected] Chemnitzer Linux-Tage, 16. März
    [Show full text]
  • Moreno Valley College 2020-21 Catalog
    RIVERSIDE COMMUNITY COLLEGE DISTRICT MORENO VALLEY COLLEGE Wolde-Ab Isaac, Ph.D., Chancellor Riverside Community College District Robin L. Steinback, Ph.D., President Moreno Valley College BOARD OF TRUSTEES Mary Figueroa . President Bill Hedrick . Vice President Jose Alcala . Secretary Virginia Blumenthal . Trustee Tracey Vackar . Trustee TBD . Student Trustee 2020-21 All information contained in the 2020-21 Catalog is current as of March 2020. Although every effort has been made to ensure accuracy of the information in this catalog, students and others who use this catalog should consult with a counselor, dean, department chair or program director for recent additions, deletions or changes. Updates can also be found online at www.rccd.edu. The catalog contains policies and/or procedures that are current at the time of printing. However, policies and procedures are continually being updated. In order to be sure it is the most recent language, please check the latest online version at: https://www.rccd.edu/bot/Pages/policies.aspx. The Riverside Community College District complies with all federal and state rules and regulations and does not discriminate on the basis of ethnic group identification, national origin, religion, age, gender, gender identity, gender expression, race, color, ancestry, genetic information, sexual orientation, physical or mental disability, or any characteristic listed or defined in Section 11135 of the Government Code or any characteristic that is contained in the prohibition of hate crimes set forth in subdivision (1) of Section 422.6 of the California Penal Code, or any other status protected by law. This holds true for all students who are interested in participating in education programs and/or extracurricular school activities.
    [Show full text]