This document discusses Apple Pay and Touch ID security. It summarizes that Apple Pay uses tokenization to securely store payment credentials in the Secure Enclave instead of actual credit card details. Touch ID fingerprints are also stored encrypted in the Secure Enclave and are never sent to Apple. The document also demonstrates how to use debugging and hooking techniques on a jailbroken device to analyze the internals of how Apple Pay and Touch ID work.
This presentation takes you through an automation Journey from self-healing to #Network #Slicing. It describes the need for orchestration and the service providers’ steps towards automation. It presents Verizon’s customer case of service life-cycle automation, including VNF on-boarding, service design, provisioning and closed loop assurance. Then it explores network slicing including the definition of blueprints and network slice life-cycle management. More information on Ericsson Dynamic orchestration - http;//www.ericsson.com/dynamic-orchestration
Energy consumption in cellular networks has rapidly
moved from an area of low priority to a focus area of the
whole telecommunication community. When analysing the
energy consumption of wireless access networks it becomes clear that in order reduce the total energy usage it is important to concentrate the efforts on the most abundant network nodes namely the base stations (BS).
This paper discusses how energy consumption can be
significantly reduced in mobile networks by introducing
discontinuous transmission (DTX) on the base station side.
This presentation/video tries to explain 5G to people with very little understanding of mobile technology in general. It looks at how 5G is different from the previous generations of mobile technology and looks at high level requirements from ITU and 3GPP.
Book: Software Architecture and Decision-MakingSrinath Perera
Uncertainty is the leading cause of mistakes made by practicing software architects. The primary goal of architecture is to handle uncertainty arising from user cases as well as architectural techniques. The book discusses how to make architectural decisions and manage uncertainty. From the book, You will learn common problems while designing a system, a default solution for each, more complex alternatives, and 5Q & 7P (Five Questions and Seven Principles) that help you choose.
Book, https://amzn.to/3v1MfZX
Blog: http://tinyurl.com/swdmblog
Six min video - https://youtu.be/jtnuHvPWlYU
This presentation takes you through an automation Journey from self-healing to #Network #Slicing. It describes the need for orchestration and the service providers’ steps towards automation. It presents Verizon’s customer case of service life-cycle automation, including VNF on-boarding, service design, provisioning and closed loop assurance. Then it explores network slicing including the definition of blueprints and network slice life-cycle management. More information on Ericsson Dynamic orchestration - http;//www.ericsson.com/dynamic-orchestration
Energy consumption in cellular networks has rapidly
moved from an area of low priority to a focus area of the
whole telecommunication community. When analysing the
energy consumption of wireless access networks it becomes clear that in order reduce the total energy usage it is important to concentrate the efforts on the most abundant network nodes namely the base stations (BS).
This paper discusses how energy consumption can be
significantly reduced in mobile networks by introducing
discontinuous transmission (DTX) on the base station side.
This presentation/video tries to explain 5G to people with very little understanding of mobile technology in general. It looks at how 5G is different from the previous generations of mobile technology and looks at high level requirements from ITU and 3GPP.
Book: Software Architecture and Decision-MakingSrinath Perera
Uncertainty is the leading cause of mistakes made by practicing software architects. The primary goal of architecture is to handle uncertainty arising from user cases as well as architectural techniques. The book discusses how to make architectural decisions and manage uncertainty. From the book, You will learn common problems while designing a system, a default solution for each, more complex alternatives, and 5Q & 7P (Five Questions and Seven Principles) that help you choose.
Book, https://amzn.to/3v1MfZX
Blog: http://tinyurl.com/swdmblog
Six min video - https://youtu.be/jtnuHvPWlYU
Hello!
Welcome to our CCNA Training (R&S) 200-125 series in Urdu.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses,
We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
A 30-minute Introduction to NETCONF and YANGTail-f Systems
This is a live document that I use to present the state of NETCONF and YANG in various contexts. I use it to inform and get conversation going, not to provide complete and final documentation of NETCONF and YANG. I update this document almost monthly, mostly with regards to industry support and working group timelines, check back!
Usability vs. Security: Find the Right Balance in Mobile AppsJosiah Renaudin
Successful mobile apps have two key features: a great user experience and the ability to protect users’ data. Balancing user experience and security—a key aspect of product design and engineering—requires a multidisciplinary approach. According to Levent Gurses, a well-balanced app is designed through a series of informed decisions, meaningful compromises, and research that supports core user behaviors. Based on lessons learned from designing winning mobile apps and securing front- and back-end infrastructure, Levent shares his method for scientifically discovering the most critical aspects of an app and creating user-centric, secure mobile experiences. Join Levent for an interactive session on how to create both the best possible user experience and an app that keeps its users’ data safe and secure. He demonstrates core concepts by borrowing from proven UX design patterns and discovering what drives engagement and data protection. Levent uses the latest science in user behavioral research and cyber analytics to discover pragmatic ways to create engaging and secure mobile apps.
This is our group presentation on how Apple develop a robust and secure Information System Infrastructure for the new mobile feature, Apple Pay. Apple has been working and developing for years. With Apply Pay, we use iPhone as a mobile wallet to pay at check out with Touch ID. In order to obtain a strong security for this new feature, the new iPhone 6 and iPhone 6 Plus are equipped with SE (Security Element), NFC (Near Field Communication), and Touch ID.
Вадим Дробинин. Защищаем себя и пользователей: руководство по безопасностиAvitoTech
Докладчик поднимет важную тему защиты пользовательских данных и непосредственно ресурсов приложений от внешних угроз, расскажет об основных проблемах, с которыми сталкиваются разработчики, обеспокоенные безопасностью своих приложений и покажет наиболее успешные способы защиты от атак на Swift
As mobile devices become more and more prevalent in our lives, the clash between security and usability moves to the forefront. Apple integrated TouchID into its main mobile devices products (iPhones/iPads). In Apple’s controlled fashion, access to the TouchID was unavailable at first and has been expanded over subsequent releases. With this expansion is a new world of authentication possible?
In this talk, we will explore the architecture of TouchID and the how Apple is pushing biometrics into the forefront of consumer-based products. As companies start embracing biometrics, there are standard client-side authentication risks and TouchID Implementations risk. We will explore the architecture and common implementations, to understand possible hidden risks, and how to strengthen the implementations.
Кортунов Никита. Как ускорить разработку приложений или есть ли жизнь после P...AvitoTech
икита расскажет о возможностях backend as a service, ответит на вопрос есть ли жизнь после Parse, поделится опытом разработки BaaS Scorocode, особенностями архитектуры и кейсами применения, как можно ускорить разработку с помощью BaaS.
Hello!
Welcome to our CCNA Training (R&S) 200-125 series in Urdu.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses,
We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
A 30-minute Introduction to NETCONF and YANGTail-f Systems
This is a live document that I use to present the state of NETCONF and YANG in various contexts. I use it to inform and get conversation going, not to provide complete and final documentation of NETCONF and YANG. I update this document almost monthly, mostly with regards to industry support and working group timelines, check back!
Usability vs. Security: Find the Right Balance in Mobile AppsJosiah Renaudin
Successful mobile apps have two key features: a great user experience and the ability to protect users’ data. Balancing user experience and security—a key aspect of product design and engineering—requires a multidisciplinary approach. According to Levent Gurses, a well-balanced app is designed through a series of informed decisions, meaningful compromises, and research that supports core user behaviors. Based on lessons learned from designing winning mobile apps and securing front- and back-end infrastructure, Levent shares his method for scientifically discovering the most critical aspects of an app and creating user-centric, secure mobile experiences. Join Levent for an interactive session on how to create both the best possible user experience and an app that keeps its users’ data safe and secure. He demonstrates core concepts by borrowing from proven UX design patterns and discovering what drives engagement and data protection. Levent uses the latest science in user behavioral research and cyber analytics to discover pragmatic ways to create engaging and secure mobile apps.
This is our group presentation on how Apple develop a robust and secure Information System Infrastructure for the new mobile feature, Apple Pay. Apple has been working and developing for years. With Apply Pay, we use iPhone as a mobile wallet to pay at check out with Touch ID. In order to obtain a strong security for this new feature, the new iPhone 6 and iPhone 6 Plus are equipped with SE (Security Element), NFC (Near Field Communication), and Touch ID.
Вадим Дробинин. Защищаем себя и пользователей: руководство по безопасностиAvitoTech
Докладчик поднимет важную тему защиты пользовательских данных и непосредственно ресурсов приложений от внешних угроз, расскажет об основных проблемах, с которыми сталкиваются разработчики, обеспокоенные безопасностью своих приложений и покажет наиболее успешные способы защиты от атак на Swift
As mobile devices become more and more prevalent in our lives, the clash between security and usability moves to the forefront. Apple integrated TouchID into its main mobile devices products (iPhones/iPads). In Apple’s controlled fashion, access to the TouchID was unavailable at first and has been expanded over subsequent releases. With this expansion is a new world of authentication possible?
In this talk, we will explore the architecture of TouchID and the how Apple is pushing biometrics into the forefront of consumer-based products. As companies start embracing biometrics, there are standard client-side authentication risks and TouchID Implementations risk. We will explore the architecture and common implementations, to understand possible hidden risks, and how to strengthen the implementations.
Кортунов Никита. Как ускорить разработку приложений или есть ли жизнь после P...AvitoTech
икита расскажет о возможностях backend as a service, ответит на вопрос есть ли жизнь после Parse, поделится опытом разработки BaaS Scorocode, особенностями архитектуры и кейсами применения, как можно ускорить разработку с помощью BaaS.
Андрей Юткин. Media Picker — to infinity and beyondAvitoTech
Paparazzo - https://github.com/avito-tech/Paparazzo
В своём докладе Андрей поделится опытом разработки собственной камеры и галереи в приложении Avito и расскажет про проблемы, с которыми столкнулся в процессе. Из доклада вы узнаете:
- как реализовать вывод изображения с камеры в нескольких view одновременно
- как оптимизировать работу с памятью при работе с картинками
- как абстрагироваться от источника картинки
- как обработать изображения с помощью фрэймворка ImageIO
- как абстрагироваться от UIKit в слое Presenter архитектуры VIPER
- как работать с изображениями из iCloud и про другие скользкие моменты фрэймворка Photos.
Few tips for iOS application development from security perspective.
Google docs presentation: https://docs.google.com/presentation/d/1eLQ40YCReg_pXp2as9FrbTgkNfOjOoPxDYUbFNyrT-M/pub?start=false&loop=false&delayms=3000
[Case study] Apple Pay, the first French users go to the till Dynvibe
Eagerly awaited by fans of the Apple brand, the Apple Pay mobile payment system was launched in France on July 19th. By registering bank cards from banks who are partners of the application, the service allows users to make purchases online and in shops that are equipped with a no-contact terminal. Dynvibe, specialist in social media strategic monitoring, has analyzed nearly 2000 conversations to understand the strengths and weaknesses of this new mobile payment service and draw strategic insights for the brands.
Masabi, the leader in mobile ticketing and innovative fare collection for transit, invites you discover what the latest updates from Apple - Apple Pay - mean in the context of mobile ticketing, NFC and Open Payments.
Apple Pay & its potential impact on the Australasian marketWilliam Belle
ApplePay & its potential impact on the Australasian market
By William Belle - October 2014
Non animated Version, if you want the orignal one, contact me.
This work is based on my knowledge and my personal research.
__________
William Belle
| Junior Marketing & Business Development Manager in Mobile Payment & Ticketing |
http://williambelle.wordpress.com/
A quick ONE PAGE Business Plan TemplateKameel Vohra
This template is designed to give you a better idea as to what’s involved in establishing your business, and to help you communicate the idea to people that can provide you feedback.
From Idea to Business with Lean Startup & the Progress Board Strategyzer
This deck shows how you get from idea to business by using the business model canvas and lean startup methodologies. It introduces the Progress Board, a new tool that brings it all together.
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
The future of retail is in removing the divide between the offline shopping state and the enhanced online buying experience. To create this type of enhanced retail experience, we can remove complexities in the process, such as simplifying checkout.
In this session we’ll learn how to use internet-connected microelectronics to attach to a buyer’s mobile device to provide the functionality to buy products right from the aisle.
eSmartlock - an antipiracy dongle with integrated DRM functionalitiesYiannis Hatzopoulos
eSmartlock is a complex prototype, which demonstrates the use of a Java Card based smartcard dongle as an integrated anti-piracy module and networked DRM engine; plus offering a hardware toolkit that can enhance the security of SSL backed transactions; authenticate timeStamp receptors; function
as a digital eSignature validator over commercial off-the-shelf software products - all in one: Forming an
integrated system that allows users of an application to operate in a closed-user-group setting with their
software producer or vendor; either online or even off-line.
Why? Apart from antipiracy security, the eSmartLock networked DRM model supports a diverse variety
of billing options like: leasing, renting, TimeCrediting, pay-as-you-use ValueCrediting, remote feature unlock, full
feature demo use. It can provide controlled crypto Web access to your eShop; or even secure CD/DVD offline
content access. For high-security conscious users, eSmartLock can encrypt local file Save/Load operations
with internal self-generated keySets; uniquely binding saved data to a specific eSmartLock card. It can be used
in a Server - Client configuration (Trusted Third Party – Key Distribution Center), over a LAN or WAN (extranet)
to authenticate other eSmartLock cards, establish encryption channels between eSmartLocked network nodes
and assist the verification of signed content – all in a single JavaCard applet.
Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECU...Priyanka Aash
We, Keen Security Lab of Tencent, have successfully implemented two remote attacks on the Tesla Model S/X in year 2016 and 2017. Last year, at Black Hat USA, we presented the details of our first attack chain. At that time, we showed a demonstration video of our second attack chain, but without technical aspects. This year, we are willing to share our full, in-depth details on this research.
In this presentation, we will explain the inner workings of this technology and showcase the new capability that was developed in the Tesla hacking 2017. Multiple 0-days of different in-vehicle components are included in the new attack chain.
We will also present an in-depth analysis of the critical components in the Tesla car, including the Gateway, BCM(Body Control Modules), and the Autopilot ECUs. For instance, we utilized a code-signing bypass vulnerability to compromise the Gateway ECU; we also reversed and then customized the BCM to play the Model X "Holiday Show" Easter Egg for entertainment.
Finally, we will talk about a remote attack we carried out to successfully gain an unauthorized user access to the Autopilot ECU on the Tesla car by exploiting one more fascinating vulnerability. To the best of our knowledge, this presentation will be the first to demonstrate hacking into an Autopilot module.
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...CODE BLUE
Smartphones are commonly used as the controller and Internet gateway for BLE-enabled IoT devices. Designing a strong authentication protocol between them is the key part of IoT security. However mobile app design has many challenges such as limited input & output interfaces as well as user privacy protection features. Due to these restrictions, many vendors has given-up BLE's build-in security manager protocol and choose to build their own authentication protocols.
This study focused on a generalized method to analyze these BLE authentication protocols, discovering and solving challenges mentioned above. We applied this method on commercial products, including popular Gogoro Smart Scooter from Taiwan. We will demo under some certain circumstances it is possible to dump key used to unlock your Gogoro Scooter and send fake BLE authentication protocol packets to steal the scooter.
--- Chen-yu Dai [GD]
Chen-yu Dai (GD) is CTO at Team T5 Research, providing Digital Forensics & Incident Response services, developing Threat Intelligence Program and Platforms, consulting enterprise cyber defenses.
He is studying at the graduate school of Department of Information Management in the National Taiwan University of Science and Technology.
He also volunteered as deputy coordinator of HITCON, the largest hacker community and security conference in Taiwan.
He has received many prizes from domestic and international CTFs, as well as bug bounty programs.
--- Shi-Cho Cha [CSC]
Professor Shi-Cho Cha [CSC]
Shi-Cho Cha (CSC) is currently an associate professor at the Department of Information Management in the National Taiwan University of Science and Technology, where he has been a faculty member since 2006. He received his B.S. and Ph.D. in Information Management from the National Taiwan University in 1996 and 2003. He is a certified PMP, CISSP, CCFP and CISM. From 2000~2003.
He was a senior consultant in eLand technologies and played the role of project leaders to develop several systems about e-marketing. From 2003~2006, he was a manager at PricewaterhouseCoopers, Taiwan and helped several major government agencies to develop their information security management systems.
Recently, he helped NTUST to establish security analysis workforce and help several organizations to evaluate their system security. His current research interests are in the area information security management, identity management, smartphone security, and IoT security.
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...Hackito Ergo Sum
Unlike the previous jailbreakme.com exploits targeting MobileSafari that could be used against an unwitting victim, publicly available jailbreaks require USB tethering. Since iDevices refuse to communicate over USB if they are locked unless they have previously paired with the connecting device these jailbreaks have a lower security impact, and are usually only useful to the phone’s owner. Then it is legitimate to think we are safe. Nevertheless, malicious codes already running on hosting personal computers silently steal confidential information using iTunes services or leverage USB jailbreaks.
This talk will discuss about the most interesting Apple services (from the attacker point of view) and describe how they can be exploited in order to retrieve confidential information or to deploy the evasi0n jailbreak. Finally, the author will present the analysis of a Made For Apple (MFI) dock station and its weapownizing in order to allow an automated jailbreak.
Audio available here : http://2013.hackitoergosum.org/presentations/Day3-04.Hacking%20apple%20accessories%20to%20pown%20iDevices%20%e2%80%93%20Wake%20up%20Neo!%20Your%20phone%20got%20pwnd%20!%20by%20Mathieu%20GoToHack%20RENARD.mp3
More information about the conference : http://www.hackitoergosum.org
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...PROIDEA
There is no doubt that mobile contactless payments has grown exponentially and Host Card Emulation – the possibility to emulate payment cards on a mobile device, without dependency on special Secure Element hardware, has also significantly boosted the number of applications. HCE support for Android is usually delivered as an external, certified “black-box” library to compile in your application. Obviously vendors promise “highest level of security” – including: card data tokenization, “secure element in the cloud”, device fingerprinting, phone unlock requirement, code obfuscation, additional authorization, etc. For mobile payments, they often successfully convince implementing bank that it is technically impossible to “clone” a virtual card from owner’s device to another one.
Based on several assessments, we have noticed that even IT security representatives were surprised by the possibilities of mobile malware to attack the process. Not to mention risk departments, which took into consideration only a few limited-value fraudulent transactions made by an accidental thief using a stolen phone. Therefore, delivering the PoC demo of card cloning to a different device, every time caused confusion and uncertainty the least. Furthermore, proving that the intruder is also able to renew virtual card tokens, or make payments for higher amounts, turned out to be a shock.
With introduction of root-exploiting financial malware, the bad guys already have technical means to attack HCE. Therefore it is now crucial to understand associated risks, and properly plan mitigation ahead. This presentation will start with a short introduction on HCE – including “ISIS”‘s role in its complicated history, current coverage and growth predictions, basics of operation, typical infrastructure and differences in hardware Secure Element. We will cover several possibilities to attack HCE, and introduce a universal method of cloning any Android contactless payment to a different device, demoed using Google’s own Android Pay. Several layers of security mechanisms to mitigate the risk will be presented along with some statistics on methods used by current applications in Poland. The audience will leave with a deep understanding of HCE technology and its limitations, along with exemplary solutions to potential problems.
During this talk, we looked at some of the typical controls that Android/iOS applications exhibit, how they work, how to spot them, and how to sidestep them. We’ll demonstrate analysis and techniques using free open source tooling such as Radare and Frida, and for some parts, we’ll use IDA Pro. And since “automation” is the buzzword of the year, we’ll discuss how to automate some of these activities, which typically take up most of the assessment window.
For more information, please visit our website at www.synopsys.com/software
mDevCamp 2016 - Zingly, or how to design multi-banking appPetr Dvorak
What problems do you need to deal with when designing an app for multiple banks? How do you solve a security of such apps? And how about a user interface design and application structure? What technologies are under the hood? And what does Zingly bring to you?
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Natalia Rutkowska - BIM School Course in Krakówbim.edu.pl
Teaching effects after 128 hours of Building Information Modeling course in Cracow, Poland. Natalia works in Revit, Navisworks and Dynamo for BIM Coordination position. More https://bim.edu.pl or https://bimedu.eu
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
This document is by explosives industry in which document discussed manufacturing process and flow charts details by nitric acid and sulfuric acid and tetra benzene and step by step details of explosive industry explosives industry is produced raw materials and manufacture it by manufacturing process
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Online resume builder management system project report.pdfKamal Acharya
This project aims at the Introduction to app Service Management.
This software is designed keeping in mind the user’s efficiency & ease of handling and maintenance , as and secured system over centralized data handling and providing with the features to get the complete study and control over the business.
The report depicts the basics logic used for software development long with the Activity diagrams so that logics may be apprehended without difficulty.
For detailed information, screen layouts, provided along with this report can be viewed.
Although this report is prepared with considering the results required these may be across since the project is subjected to future enhancements as per the need of organizations.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Toll tax management system project report..pdfKamal Acharya
Toll Tax Management System is a web based application that can provide all the information related to toll plazas and the passenger checks in and pays the amount, then he/she will be provided by a receipt. With this receipt he/she can leave the toll booth without waiting for any verification call.
The information would also cover registration of staff, toll plaza collection, toll plaza collection entry for vehicles, date wise report entry, Vehicle passes and passes reports b/w dates.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Online blood donation management system project.pdfKamal Acharya
Blood Donation Management System is a web database application that enables the public to make online session reservation, to view nationwide blood donation events online and at the same time provides centralized donor and blood stock database. This application is developed
by using ASP.NET technology from Visual Studio with the MySQL 5.0 as the database management system. The methodology used to develop this system as a whole is Object Oriented Analysis and Design; whilst, the database for BDMS is developed by following the steps in Database Life Cycle. The targeted users for this application are the public who is eligible to donate blood ,'system moderator, administrator from National Blood Center and the staffs who are working in the blood banks of the participating hospitals. The main objective of the development of this application is to overcome the problems that exist in the current system, which are the lack of facilities for online session reservation and online advertising on the nationwide blood donation events, and also decentralized donor and blood stock database. Besides, extra features in the system such as security protection by using password, generating reports, reminders of blood stock shortage and workflow tracking can even enhance the efficiency of the management in the blood banks. The final result of this project is the development of web database application, which is the BDMS.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
2. Disclaimer
• Apple Pay research is work in progress.
• Yes, a jailbroken device is required.
• No 0-day vulnerabilities in this talk.
• This talk is about Apple Pay internals and TouchID
implementation.
Download the slides from:
twitter.com/0xroot
3. Agenda
•Part I: Introduction to Apple Pay.
•Part II: Demystifying Apple Pay.
•Part III: Messing with runtime.
•Part IV: TouchID implementation caveats.
6. WhatisApplePay?
“Mobile payments service and digital wallet app that
uses NFC to initiate secure payment transactions
between contactless payment terminals and Apple
iOS devices.”
7. HowcanIuseit?
• Pay in-store Purchase by just tapping the
phone against a contactless POS and
placing the finger on the TouchID
• Pay in mobile apps Pay for items within
mobile apps that support ApplePay
8. SE&HCE
• Secure Element (SE) - Tamper-resistant platform capable of securely hosting
applications and their confidential and cryptographic data in accordance with
the rules and security requirements. It can be considered a chip that offers a
dynamic environment to store data securely.
• Host Card Emulation (HCE) - Assumes that any data stored on a handset is
vulnerable and therefore restricts the storage of sensitive data to host or
‘cloud’ databases, managed to a high security standard. Preventing
unauthorized access depends on four pillars: limited use key, tokens, device
fingerprinting and transaction risk analysis.
11. WhatisstoredintheSE?
“Every time a consumer adds a credit card to the Passbook
application, the real payment credentials like the PAN,
Expiration Date, CVV, etc. are not stored into the SE.
Apple Pay instead stores a token and some
associated data inside the SE.”
12. Whatisthetokenused?
“We can consider a token like a fake credit card number.
Which is de-tokenized before being transmitted on to the
Issuer for authorization.
The Acquirer is the responsible for tokenization and de-
tokenization. But, Apple Pay uses the standard created by
EMVCo, being the payment network the one that
performs de-tokenization.”
13. Howarethetokensprovided?
Customer Apple Pay Apple Pay
Servers
Issuer Bank
Token Service Provider
Secure Element
Credit card
PAN / Exp. Date / CVV
PAN / Exp. Date / CVV Token / Token-key
PAN / Exp. Date / CVV
Token / Token-key /
cvv-key
Token / Token-key /
cvv-key
- token-key will be used to generate a dynamic cryptogram
- cvv-key will be used to generate a dynamic security code
14. Paymenttokenformat
PKPaymentToken Object
Transaction ID
Payment Network
PaymentToken Data
Signature
Header
Encrypted Payment Data
Amount
Cardholder name
….
Payment Processing Data
Top-Level Structure
Key Value Description
data Payment data dictionary,
Base64 encoded as string
Encrypted Payment Data
header Header dictionary Additional information used to
decrypt and verify the payment.
signature Detached PKCS #7
signature, Base64
encoded as string
Signature of the payment and
header data.
version String Version information about the
payment token.
15. Paymenttokenformat
Payment Data Keys
Key Value Description
applicationPrimaryAccount
Number
string Device-specific account number of
the card that funds this transaction.
applicationExpirationDate date
(string)
Card expiration date in the format
YYMMDD.
currencyCode string ISO 4217 numeric currency code.
transactionAmount number Transaction amount.
Key Value Description
cardholderName string Cardholder name.
deviceManufacturerIdentifi
er
string Hex-encoded device manufacturer
identifier.
paymentDataType string Either ‘3DSecure’ or ‘EMV’.
paymentData payment data
dictionary
Detailed payment data
18. Whathappensinapayment?
“Each transaction is authorized with a one-time unique number using your
Device Account Number and instead of using the security code from the back
of your card, Apple Pay creates a dynamic security code to securely validate
each transaction.”
- From the press release
The Device Account Number represents the Token, the One-time Unique
Number represents the dynamic cryptogram and the Dynamic Security Code
represents the dynamic CVV
19. SecureEnclave
• Part of the A7 and A8 chips used for Touch ID. According to Apple, within the Secure
Enclave, the fingerprint data is stored in an encrypted form which can only be decrypted
by a key available by the SecureEnclave thus making fingerprint data walled off from
the rest of A7/A8 chip.
• It’s a flashable 4MB processor named the Secure Enclave Processor (SEP).
• It contains its own OS called SEP OS and there is an utility called SEPUtil that can be
used to communicate with it.
• It’s contained in the ramdisk of H7SURamDisk.dmg which is located in /usr/standalone/
update/ramdisk and there in /usr/libexec.
• Is necessary to strip off the first 0x1b (27) bytes to make the DMG readable.
RootǝdCON
20. SecureEnclave
• We believe that all the information being stored
in the SecureEnclave is erased once the
device is turned off.
• Inside biometrickitd we find at memory address
‘000000010001DD3C’ a ‘bl sub_10001376c’
instruction. Such method is the one used to
upload all the information to the
SecureEnclave.
• Probably a good starter point to figure out how
things work in the SecureEnclave.
RootǝdCON
22. TouchID
“Fingerprint recognition feature, designed by Apple
and available on the iPhone 5S, 6 and 6+. Which
has as purpose to allow users to unlock their
device, as well as make purchases in the various
Apple stores and to authenticate Apple Pay online
or in apps.”
23. TouchIDProcess
Sense for
scannable object
Scan object
Construct input
map based on
scan results
Construct
lower resolution
input pattern
Provide input
pattern and
template pattern
Run match
comparisons of
input pattern and
template pattern
Provide identity
of possible match
results
Run match
comparison of
input map with
possible match
identities
Provide result
24. Whathappensunderthehood
• First Obstacle What is happening at filesystem level when the user interacts with
the TouchID component and a new fingerprint is added/removed into/from the
system?
• Workaround FileMon utility, made by J. Levin, into steroids thanks to Pancake. Lets
the user to peek behind the scenes what iOS Daemons are doing.
• Goal We obtain the binaries involved and their operations performed when the Apple
Pay technology or TouchID component are used.
25. Identifyingbinaries
• SpringBoard framework binary generates sort of interesting images.
• biometrickitd daemon creates and modifies the content of a file called TemplateList.cat
[E] Error copying /tmp/_private_var_root_Library_Catacomb_TemplateList.cat.tmp
26. Overridingunlink
carapene:~ root# cycript -p PID
cy# @import com.saurik.substrate.MS
cy# unlink = dlsym(RTLD_DEFAULT,“unlink")
cy# unlink = @encode(void *(char *, char *))(unlink)
cy# var oldu = {}
cy# var log = []
cy# MS.hookFunction(unlink, function(path){
cy> log.push([path]);
cy> return 0;
cy> }, oldu)
• Second Obstacle Unlink method avoid us from
copying the resource, since it removes the link
named by the path parameter from its directory
right after before we can copy it.
• Workaround Override its implementation and
return always false.
• Goal Obtain a copy of the files generated.
27. dyld_shared_cache
• Third Obstacle Since iPhoneOS 3.1 all default (private and public) libraries have been
compiled into a big cache file. All binaries or libraries from /System/Library/
Frameworks and /System/Library/PrivateFrameworks are now located in /
System/Library/Caches/com.apple.dyld/dyld_shared_cache_armX
• Workaround Makes use of jtool utility, extracting a specific binary from the cache, or
dumping all the binaries at once.
• Goal Access to all the binaries, and the ability to dump their classes/methods and RE
their source code.
jtool -extract UIKit path/to/dyld_shared_cache
jtool -lv cache_armv7 | cut -c 24- | tail +5 | while read line ;
do jtool -extract $line cache_armv7 ; done
28. Putyourseat-belt
• Fourth Obstacle The binary contains in its entitlement the sandbox profile ‘seat-belt’,
which is a kernel extension that restricts a set of features from being used for some
processes.
• Workaround Use ldid utility to extract the entitlements and modify the ‘seat-belt’ field
of a binary.
• Goal The ability to attach cycript to the process and dump the information from the
variables and modify its behavior at runtime
<key>seatbelt-profiles</key>
<array>
<string>seld</string>
</array>
<key>tlebtaes-profiles</key>
<array>
<string>seld</string>
</array>
ThugLife
29. TouchIDSecurity
“The resulting map of nodes is stored without any identity information in
an encrypted format that can only be read by the Secure Enclave, and is
never sent to Apple or backed up to iCloud or iTunes.”
Partially true
30. EnablingTouchIDDebugLog
• biometrickitd binary contains a string
reference to ‘/var/mobile/Library/Logs/
CrashReporter/BioLog’. Such file is
generated by the class ‘BioLog’ which is
disabled by default
• Save the following
‘com.apple.biometrickitd.plist’ file under
the ‘/Library/Managed Preferences/
mobile/‘ path.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN"
"http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>debugLogEnabled</key>
<true/>
</dict>
</plist>
39. TemplateList.cat
• Located at /private/var/root/Library/Catacomb/
TemplateList.cat
• Is the template that contains all the information about the
fingerprints added into the system.
• Some information is readable, but most interesting one is Base64
encoded and encrypted (?)
44. LASecurity
• LocalAuthentication Trust the OS
• Keychain Trust the Secure Enclave
No direct access to secure enclave
No access to registered fingers
No access to fingerprint image
45. • Shared Libraries Check with Otool if
LocalAuthentication.framework is present.
• canEvaluatePolicy Preflights an authentication policy to see if
its possible for authentication to succeed.
• evaluatePolicy Evaluates the specified policy.
Block that evaluates a boolean statement.
• Policy LAPolicyDeviceOwnerAuthenticationWithBiometrics
No passcode authentication
Fallback to application’s own password entry UI
LocalAuthenticationAPI
53. • ApplePay technology is pretty solid, and well structure, maybe
not all the statements made by Apple are true, but the global
security deployed is robust.
• A jailbroken device is required to at least scratch the surface,
and even with that, the information obtained is not highly
sensitive.
• TouchID integration works better with Keychain ACLs, the
integration with LocalAuthentication.framework is not
recommended to protect your assets.
Conclusions
54. ThankYou
special thanks to @abelenko, @trufae (pancake), @revskills (F. Alonso) and J. Levin
(@technologeeks)
Sebas Guerrero
@0xroot
sguerrero@nowsecure.com