2013年にスマートフォンの国内出荷台数は3,260万台に達し、加入者数は 5,000万人を超え、ほぼ2人に1人がスマートフォンを持つことになる*。しかし、スマートフォンユーザーのセキュリティ意識は低く、モバイル Web ブラウザーが、制限や制御のないアプリケーションの自由な侵入口となるリスクは非常に高まっている。また、悪意のあるアプリケーションによるデータの盗取や、不注意によるデータ損失など、さまざまなリスクを孕んでいる。本セッションでは、最新のモバイル向けセキュリティのトレンドや、2013年に流行しそうな攻撃の傾向について紹介します。
* 出典: IDC
ブルーコートシステムズ
アジア太平洋地域担当セキュリティアーキテクト
水品 巧
IT Forum
http://www.itforum-roundtable.com/
AWS Black Belt Online Seminarの最新コンテンツ: https://aws.amazon.com/jp/aws-jp-introduction/#new
過去に開催されたオンラインセミナーのコンテンツ一覧: https://aws.amazon.com/jp/aws-jp-introduction/aws-jp-webinar-service-cut/
【DLゼミ】XFeat: Accelerated Features for Lightweight Image Matchingharmonylab
公開URL:https://arxiv.org/pdf/2404.19174
出典:Guilherme Potje, Felipe Cadar, Andre Araujo, Renato Martins, Erickson R. ascimento: XFeat: Accelerated Features for Lightweight Image Matching, Proceedings of the 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023)
概要:リソース効率に優れた特徴点マッチングのための軽量なアーキテクチャ「XFeat(Accelerated Features)」を提案します。手法は、局所的な特徴点の検出、抽出、マッチングのための畳み込みニューラルネットワークの基本的な設計を再検討します。特に、リソースが限られたデバイス向けに迅速かつ堅牢なアルゴリズムが必要とされるため、解像度を可能な限り高く保ちながら、ネットワークのチャネル数を制限します。さらに、スパース下でのマッチングを選択できる設計となっており、ナビゲーションやARなどのアプリケーションに適しています。XFeatは、高速かつ同等以上の精度を実現し、一般的なラップトップのCPU上でリアルタイムで動作します。
セル生産方式におけるロボットの活用には様々な問題があるが,その一つとして 3 体以上の物体の組み立てが挙げられる.一般に,複数物体を同時に組み立てる際は,対象の部品をそれぞれロボットアームまたは治具でそれぞれ独立に保持することで組み立てを遂行すると考えられる.ただし,この方法ではロボットアームや治具を部品数と同じ数だけ必要とし,部品数が多いほどコスト面や設置スペースの関係で無駄が多くなる.この課題に対して音𣷓らは組み立て対象物に働く接触力等の解析により,治具等で固定されていない対象物が組み立て作業中に運動しにくい状態となる条件を求めた.すなわち,環境中の非把持対象物のロバスト性を考慮して,組み立て作業条件を検討している.本研究ではこの方策に基づいて,複数物体の組み立て作業を単腕マニピュレータで実行することを目的とする.このとき,対象物のロバスト性を考慮することで,仮組状態の複数物体を同時に扱う手法を提案する.作業対象としてパイプジョイントの組み立てを挙げ,簡易な道具を用いることで単腕マニピュレータで複数物体を同時に把持できることを示す.さらに,作業成功率の向上のために RGB-D カメラを用いた物体の位置検出に基づくロボット制御及び動作計画を実装する.
This paper discusses assembly operations using a single manipulator and a parallel gripper to simultaneously
grasp multiple objects and hold the group of temporarily assembled objects. Multiple robots and jigs generally operate
assembly tasks by constraining the target objects mechanically or geometrically to prevent them from moving. It is
necessary to analyze the physical interaction between the objects for such constraints to achieve the tasks with a single
gripper. In this paper, we focus on assembling pipe joints as an example and discuss constraining the motion of the
objects. Our demonstration shows that a simple tool can facilitate holding multiple objects with a single gripper.
We have been in business for 15 years. We have a diverse, global customer base focused on the security and quality-of-service needs of the Global 5,000. Our core franchise is built around our secure web gateway where we have a 44% market share and where we orchestrate the securityprotection,controls, policies and integration of other security products at the Internet connection for our customers. Over the years, we have focused ontechnology leadership with nearly 200 current and pending patents.We are recognized leaders in both the Secure Web Gateway and WAN Optimization categories by Gartner and other Industry analysts. Earlier this year we became a private company through a syndicate led by Thoma Bravo, a 30 year old growth oriented private equity firm. Their investment in Blue Coat came from their new fund, which is at the beginning of a 10 year period of investments, meaning they are patient and long-term investors. Thoma-Bravo has an excellent track record in security and networking.Throughout this transition, we have continued to sustain our business growth and leadership position. As a private company, we can now more easily invest in technology and our customer relationships rather than having to focus on the demands of Wall Street analysts and public shareholders every 90 days. By way of example, we have shutdown our low-cost development operations in India and expanded our three R&D excellence centers in California, Utah and Canada. This allows us to more rapidly drive new innovations to market. We are now in position to also aggressively build out our global points-of-presence for our Cloud Service. Everyone at Blue Coat is energized and focused on delivering greater value to our customers. Let me give you a sense of the priorities we have at Blue Coat today.
All of this converges to one main shift - In order to secure the network today – you need to secure the userIf IT organizations do not develop a strategy to define the policies and security controls for all user, users will define it for them. If companies do not get ahead of that wave, they will be pulled down underneath that wave and be crushed by recurring costs associated with downtime, corp reputation, data loss etc
From a web security perspective, Blue Coat is provides the key capabilities required to secure your network by securing your users – across all devices and locations. Our global threat defense is trusted and used by 88% of the Fortune Global 500. <CLICK>The universal policy framework is a key requirement for IT leaders in order to stay ahead of user mandated web usage – driven by device, access and application proliferation. We provide the most granular web control of content, applications and access, used by top financials and government agencies. <CLICK>The unified reporting capability brings you actionable intelligencethat provides a unified view of ALL web and user traffic. <CLICK>And all of that is delivered with flexibility to your business built on high performance architecture for both our appliances and our web security saas
From a web security perspective, Blue Coat is provides the key capabilities required to secure your network by securing your users – across all devices and locations. Our global threat defense is trusted and used by 88% of the Fortune Global 500. <CLICK>The universal policy framework is a key requirement for IT leaders in order to stay ahead of user mandated web usage – driven by device, access and application proliferation. We provide the most granular web control of content, applications and access, used by top financials and government agencies. <CLICK>The unified reporting capability brings you actionable intelligencethat provides a unified view of ALL web and user traffic. <CLICK>And all of that is delivered with flexibility to your business built on high performance architecture for both our appliances and our web security saas
All of this value delivered now as an internet service allows you to put your valuable resources to strategic use, while providing your users with global coverage. Blue Coat has been operating an enterprise class cloud service for over 7 years now, with our WebPulse infrastructure, used by almost 90% of the Fortune 500 companies. With the Web Security Service, we are now extending that infrastructure out to provide you with the full web security solution via a streamlined interface, accessible from any location.This allows you to instantly add new users and location as needed without any on premises hardware software.The flexibility in deployment and budget, without compromising the protection and control.
As we discussed earlier, Blue Coat provides Threat protection in a way that is both unique from the competition and much more effective. All Blue Coat products already utilize WebPulse to some decree, and we have a vision that WebPulse will continue to expand it’s scope in protecting our customers. Today, WebPulse has more than 75 million users and a number of techniques that we’ve already discussed providing proactive malnet tracking for negative day defenses against botnets, phishing, etc. Over the next 12 months our plan is to significantly expand our inputs to include not just Web traffic on port 80 and 443, but also other potentially malicious traffic. Specifically, PacketShaper will start sending non-web traffic, for example unknown traffic, SSL traffic without a certificate and Peer-to-peer traffic. Likewise mobile devices hooked into WebPulse will send all application traffic, so we not only get the web browser traffic, but also all of the user loaded applications. These increased inputs will significantly expand the scope of research to start identifying more traffic, malicious sites and applications, and interesting ties between applications and the malicious things on the Internet. This will allow for new levels of APT forensics that no other company will have the technology or data to understand and protect our customers. WebPulse will also add the GeoIP tagging to provide another important data point of information for customers to base policy decisions. Longer term, we fully expect WebPulse to provide protection across all traffic and all ports and provide deeper threat reporting. The last point on WebPulse around the certificate notary is that because the number of users and amount of data we receive Blue Coat is in a unique position to know where a certificate should be served from. If we see something change and get served from an unexpected location we can alert the customer that suspicious behavior is occurring.Moving on to ProxyAV, we currently support 5 leading AV engines – Kaspersky, Sophos, Panda, McAfee and Symantec on dedicated processing platforms. We also integrate with any 3rd party solution that supports ICAP or Secure ICAP. For users of our Cloud Security Service, we run every file through multiple AV engines to provide a higher level of security than a typical enterprise could afford with a single solution. In the next 12 months, we plan to offer ProxyAV as a virtual appliance and longer term, our target is to offer ProxySG and ProxyAV on a single hardware platform.Finally on the Threat Protection side, we talk about Reverse Proxy. Today, many customers deploy ProxySG in front of application servers to provide the flexible policy control that has made ProxySG a fixture in large enterprises with very high performance. In the next 12 months, you see a significant investment around reverse proxy where we will add GeoIP to the local level and continue to add more protections as well as an automated protection update service. Longer term, we are working on a Reverse Proxy specific User Interface to simplify the setup and management in reverse proxy deployments.
Fix order
As you know, we currently offer two cloud-based security solution to customers:Web security module which is an ideal Web security solution for remote office, branch office or retail locations. These locations usually have limited or no on-site IT staff and wiring closet making the cloud solution very attractive. Blue Coat Web Security Module is also ideal for remote workers. Insurance adjusters and realtors are good example of field workers.Hosted reporting is another cloud-based solution we offer. With the ability to create an enterprise-wide report encompassing on-premise and cloud security solutions, customers have consolidated report across all their users. No need for on-premise reporting server and leveraging the scalability of the cloud are additional benefits.We are now bolstering Blue Coat cloud solutions to include Mobile Security Module. This new product offers enterprise-grade security for smart phones as they access the Internet wherever they may be using whatever network infrastructure available such as 3G, 4G, Hot Spot and home WiFi.
Today there’s really three kinds of applications that use the web.First there’s the traditional application that runs on a Desktop Web Browser, the one that you use on your PC or your laptop.Then there’s the native application on the smartphone and tablet. For example, there’s a specific Facebook application for iOS, and it shows up as a Facebook icon on your iPhone, iPad or iPod Touch.There’s also a third type of application, and that’s the one that runs inside a mobile web browser, for those users that either choose not to install the specific app. For most websites, they create specific page for mobile web browsers. Often the www page gets redirected to a “M-dot” page, like the one shown here for Facebook.
When looking at these applications, really there’s an inherent risk with them regardless of the platform. For example, let’s look at a phishing attempt. <click>In your standard desktop browser, looking at the email though the web email application (in this case Yahoo Mail), you can click on message that’s phishing. This one’s rather obvious, they even misspelled “card”<click>The browser even tries to help you here, and you can quickly identify this is a phishing attempt, when you hover over the link, and it redirects you to something other than chase.com<click> Looking closely at the link you can see it’s obviously a phishing attempt. Even if we click it though, on a desktop or laptop, we should be protected from going to the site by BCWF and Webpulse.<click>But if we’re on a mobile device without BCWF and Webpulse, what happens?<click>First let’s look at the native email app, the icon that’s available to you on your smartphone to read email.Here’s the same email. Here, there’s no obvious signs to help you identify this as a phishing email. Without mobile protection, you’d click on the link and go to the phishing site.Note, these threats exist regardless of operating system and platform, and it’s a threat that a mobile solution like Blue Coat’s can help you address.<click>What if you protect the user by blocking the application (say using MDM).Well, the user can still get to the application using a mobile web browser. Here’s what the same email looks like using a mobile web browser, in this case Safari.Once again, no help in identifying this is phishing. Without BCWF/Webpulse, a user can easily go to the link and possibly lose personal identifiable information.
When looking at these applications, really there’s an inherent risk with them regardless of the platform. For example, let’s look at a phishing attempt. <click>In your standard desktop browser, looking at the email though the web email application (in this case Yahoo Mail), you can click on message that’s phishing. This one’s rather obvious, they even misspelled “card”<click>The browser even tries to help you here, and you can quickly identify this is a phishing attempt, when you hover over the link, and it redirects you to something other than chase.com<click> Looking closely at the link you can see it’s obviously a phishing attempt. Even if we click it though, on a desktop or laptop, we should be protected from going to the site by BCWF and Webpulse.<click>But if we’re on a mobile device without BCWF and Webpulse, what happens?<click>First let’s look at the native email app, the icon that’s available to you on your smartphone to read email.Here’s the same email. Here, there’s no obvious signs to help you identify this as a phishing email. Without mobile protection, you’d click on the link and go to the phishing site.Note, these threats exist regardless of operating system and platform, and it’s a threat that a mobile solution like Blue Coat’s can help you address.<click>What if you protect the user by blocking the application (say using MDM).Well, the user can still get to the application using a mobile web browser. Here’s what the same email looks like using a mobile web browser, in this case Safari.Once again, no help in identifying this is phishing. Without BCWF/Webpulse, a user can easily go to the link and possibly lose personal identifiable information.
When looking at these applications, really there’s an inherent risk with them regardless of the platform. For example, let’s look at a phishing attempt. <click>In your standard desktop browser, looking at the email though the web email application (in this case Yahoo Mail), you can click on message that’s phishing. This one’s rather obvious, they even misspelled “card”<click>The browser even tries to help you here, and you can quickly identify this is a phishing attempt, when you hover over the link, and it redirects you to something other than chase.com<click> Looking closely at the link you can see it’s obviously a phishing attempt. Even if we click it though, on a desktop or laptop, we should be protected from going to the site by BCWF and Webpulse.<click>But if we’re on a mobile device without BCWF and Webpulse, what happens?<click>First let’s look at the native email app, the icon that’s available to you on your smartphone to read email.Here’s the same email. Here, there’s no obvious signs to help you identify this as a phishing email. Without mobile protection, you’d click on the link and go to the phishing site.Note, these threats exist regardless of operating system and platform, and it’s a threat that a mobile solution like Blue Coat’s can help you address.<click>What if you protect the user by blocking the application (say using MDM).Well, the user can still get to the application using a mobile web browser. Here’s what the same email looks like using a mobile web browser, in this case Safari.Once again, no help in identifying this is phishing. Without BCWF/Webpulse, a user can easily go to the link and possibly lose personal identifiable information.
On top of the ability to protect the user using Webpulse and BCWF against web threats, there’s also the ability to offer control of specific operations, across all the different variants of an application.In this example, here’s box.com in it’s various incarnations, reaching it through a web browser, the native box.com app, and through a mobile web browser. You’ll notice each has a slightly different appearance and uses different operations across the web.<click>Let’s say a user logs in and wants to download a file. With Blue Coat’s Mobile, Mobile Web and Web application controls, you can block the user from downloading a file to their device, either to prevent bandwidth usage abuse or possibly infecting their computer (Blue Coat can of course also scan the file with ProxyAV/in-the-cloud AV if desired).<click>The operational controls allow access to box.com but can prevent an operation like file download.And Blue Coat does this across all variations of the application.
Let’s bring this all together and look at how this all deploys globally.With the products and capabilities that we bring together, you can have the appliances you need for example at the corporate office.Perhaps you have some branches where you choose to install an appliance for local control and caching advantages. This proxy, plus firewalls in place at other branches can be securely forwarded to the cloud. In addition mobile and remote users can be connected via the client connector.You now have the most robust choices for cloud connectivity that support your enterprise grade needs for secure deployments.All users, regardless of whether they are behind the Cloud service or an appliance, receive the Negative day defense from WebPulse. Real time rating are submitted from ALL users and immediate protection is delivered to ALL users, where ever they are located. And Intelligent Routing is applied as your users move. Location Aware Web Security…cloud sees where you are and routes your data the shortest route…all of the policies go with you as well…you’re getting to the closest datacenter for optimal performance. <CLICK>Once deployed, your administrator can set policy from any location and simply click and apply to all cloud service users. This same policy can be set on the appliances and deployed across all appliances, creating a consistent policy enforcement for universal policies that follow the user – i.e once they leave corporate and are accessing the cloud, a consistent policy is enforced.<CLICK>As traffic is being passed, real time reports can be accessed from any location to give a unified view of all users web traffic patterns and trends. This allows you to quickly see and drill down on any symptoms or data points of interest and determine whether your policy assignments need to be adjusted.