SlideShare a Scribd company logo
Android/KNOX	Device	Protec3on	
•  Objec3ve:	Audit	SELinux	and	KNOX	device-
based	security	protec3on	implementa3ons	
and	determine	their	effec3veness	to	counter	
compromising	a	mobile	device	
– ARM	TrustZone	security	architecture	and	its	
implementa3on	in	Samsung	KNOX	2.0	
– SELinux	implementa3on	in	official	Android	OS	and	
KNOX	protected	Android	OS,	with	a	focus	on	
default	set	of	security	policy	configura3on
Summary	
•  KNOX	retains	most	func3onality	from	Android	ecosystem	while	integra3ng	
security	and	management	enhancements	
•  In	addi3on,	KNOX	phone	provides	three	enhanced	plaSorm	security	features:	
Customized	Secure	Boot	for	hardware	boot,	TrustZone-based	Integrity	
Measurement	Architecture	(TIMA)	for	protec3ng	Linux	Kernel,	and	Security	
Enhancements	for	Android	for	Framework	
–  KNOX	uses	a	Secure	Boot	protocol	that	requires	the	device	boot	loader,	
kernel,	and	system	soware	to	be	cryptographically	signed	by	a	key	whose	
root	of	trust	is	verified	by	the	hardware.		A	root	cer3ficate	and	some	hardware	
keys	are	stored	in	TrustZone	
–  KNOX	or	SELinux	u3lizes	Mandatory	Access	Control	(MAC)	policies	to	isolate	
applica3ons	and	data	into	different	domains	within	the	plaSorm.	In	Android	
5.0,	Android	moves	to	full	enforcement	of	SELinux,	that	is	enforcement	on	
more	than	60	domains	rather	than	a	limited	set	of	crucial	domains
KNOX	Security	Architecture	
Hardware	
Secure	Boot		
Linux	Kernel		
Android	Framework		
TrustZone	
App	 App	 …	
Security	Enhancements	for	Android	
(SEAndroid)	
TrustZone-based	Integrity	
Measurement	Architecture	(TIMA)		
Customized	Secure	Boot		
KNOX	Security	Android
Hardware	Keys	in	KNOX	
Hardware	keys	 Description	
Samsung	 Secure	
Boot	Key	
Verifies	that	all	firmware	is	from	Samsung	
before	allowing	the	device	to	boot.	
Device	Root	Key	 Provides	 a	 unique	 key	 per	 device	 that	 is	
used	to	perform	cryptographic	operations	
(authentication	 and	 encryption)	
associated	with	that	specific	device.	
Warranty	Bit	 Creates	 a	 one-time,	 writeable	 hardware	
“fuse”	used	to	flag	devices	whose	system	
software	has	been	tampered.	
Rollback	
Prevention	
Fuses	
Set	at	manufacturing	time	in	the	Samsung	
factory	to	prevent	old	firmware	versions	
from	overwriting	newer	ones
Customized	Secure	Boot	with	TIMA	
Verifica3on	
Primary	Boot	
Loader	
Secondary	
Boot	
Loader1/2/3	
TIMA	 Android	Boot	
Loader	
Android	
Kernel	
Hardware	
Secure	Boot	
SE	for	Android	
Hardware	--->	sbl1	--->	sbl2	--->	sbl3	--->		tz.mbn		--->	aboot.mbn		--->		NON_HLOS.bin		--->		kernel		
e-fuse
SE	Android	=	SE	Linux	+	Android	
•  Android	4.3:	SE	Linux	was	firstly	introduced		
•  Android	4.4:	Google	introduced	SE	Android	
based	on	SELinux	
•  Android	5.0:	Full	enforcement	of	SELinux.		
– From	on	a	limited	set	of	crucial	domains	(installd,	
netd,	vold	and	zygote)	to	everything	(more	than	
60	domains)
Comparison	among	Linux/SELinux/SEAndroid/KNOX	
	
•  SE	Android	takes	mobile	device	plaSorm	into	considera3on,	so	it	only	ports	a	
subset	of	SE	Linux	into	Android.	Besides	Linux	uid	and	gid	based	access	
control,	addi3onal	components	added	in	bionic	for	SE	Android:	
–  Android	manifest	permission	control.	
–  12	new	system	calls	were	added	into	SE	Android	bionic.	
–  An	AT_SECURE		auxv	flag	was	added	for	loaded	applica3on,	seen	in	
bionic/linker/linker.c.	
•  KNOX	is	similar	to	SE	Android	if	we	only	look	
at	security	policy	mechanism.	SE	for	Android	
includes	a	set	of	security	policy	
configura<on	files	designed	to	achieve	the	
above	security	goal	
–  KNOX	phones	are	provisioned	with	a	
set	of	security	policy	configura<on	
files	designed	to	strengthen	for	
enterprise	needs.		
–  KNOX	provides	management	APIs	that	
allow	the	default	SE	for	Android	policy	
files	to	be	replaced	with	enterprise-
specific	policy	files.		
SEAndroid	-	KNOX	
SELinux	-	SEAndroid	
Linux	-	SELinux
Mandatory	Access	Control	
Original	Android	
App	
(user	privilege)	
Daemon	etc.	
(root	privilege)	
User	Land	
Root	Land	
App	
(user	privilege)	
Daemon	etc.	
(root	privilege)	
MAC	
SE	Android	
SE Policy
KNOX	On-Device	Policy	Files		
Policy	Files	 Notes	
/sepolicy	 Kernel	binary	policy	
/file_contexts	 File	security	contexts	
/property_contexts	 Property	security	contexts	
/seapp_contexts	 App	security	contexts.		
/system/etc/security/mac_pe
rmissions.xml	
App	certificate	to	seinfo	
mapping.

More Related Content

What's hot

Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Dawn Yankeelov
 
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
Justrassity996
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
Ajinkya Nikam
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
Luigi Perrone
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
mysoria
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
EnergySec
 
Stuxnet
StuxnetStuxnet
Stuxnet
Symantec
 
ios device protection review
ios device protection reviewios device protection review
ios device protection review
nlog2n
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
Irsandi Hasan
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Codiax
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
Ahmed Habib
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
MarcoAfzali
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
TI Safe
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
EnergySec
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
TI Safe
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system
UrmilasSrinivasan
 
Ipfire open source firewall
Ipfire  open source firewallIpfire  open source firewall
Ipfire open source firewall
saing sab
 
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
Mike Maurer
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
Larry Vandenaweele
 
IPCop Firewall
IPCop FirewallIPCop Firewall
IPCop Firewall
Mohammed Farrah
 

What's hot (20)

Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
 
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
ios device protection review
ios device protection reviewios device protection review
ios device protection review
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system
 
Ipfire open source firewall
Ipfire  open source firewallIpfire  open source firewall
Ipfire open source firewall
 
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
IPCop Firewall
IPCop FirewallIPCop Firewall
IPCop Firewall
 

Viewers also liked

WCMSU Strategy
WCMSU StrategyWCMSU Strategy
WCMSU Strategy
Katie Murray
 
WC Social Media Strategy #MSU
WC Social Media Strategy #MSUWC Social Media Strategy #MSU
WC Social Media Strategy #MSU
Katie Murray
 
Veri̇mli̇ ders çalişma tekni̇kleri̇
Veri̇mli̇ ders çalişma tekni̇kleri̇Veri̇mli̇ ders çalişma tekni̇kleri̇
Veri̇mli̇ ders çalişma tekni̇kleri̇Erdal Demir
 
Arti_Trainer
Arti_TrainerArti_Trainer
Arti_Trainer
ArtiGarg
 
Code obfuscation theory and practices
Code obfuscation theory and practicesCode obfuscation theory and practices
Code obfuscation theory and practices
nlog2n
 
Fisica moderna serway- 3ra edicion
Fisica moderna  serway- 3ra edicionFisica moderna  serway- 3ra edicion
Fisica moderna serway- 3ra edicion
Luis Core
 
Crack ios firmware-nlog2n
Crack ios firmware-nlog2nCrack ios firmware-nlog2n
Crack ios firmware-nlog2n
nlog2n
 
Barthes, roland - de la obra al texto - el susurro del lenguaje
Barthes, roland - de la obra al texto - el susurro del lenguajeBarthes, roland - de la obra al texto - el susurro del lenguaje
Barthes, roland - de la obra al texto - el susurro del lenguaje
Alvaro Elgueta
 
Chobani Digital Media Strategy
Chobani Digital Media StrategyChobani Digital Media Strategy
Chobani Digital Media Strategy
Katie Murray
 
Bad news messages
Bad news messagesBad news messages
Bad news messages
Akshay Kumar
 
Coaliciones una guía para Partidos Políticos
Coaliciones una guía para Partidos PolíticosCoaliciones una guía para Partidos Políticos
Coaliciones una guía para Partidos Políticos
Red Innovación
 
Chapter 2, 7 cs of_business_communication_a
Chapter 2, 7 cs of_business_communication_aChapter 2, 7 cs of_business_communication_a
Chapter 2, 7 cs of_business_communication_a
Akshay Kumar
 
Chapter 7, the appearance and design of business message
Chapter 7, the appearance and design of business messageChapter 7, the appearance and design of business message
Chapter 7, the appearance and design of business message
Akshay Kumar
 
Bao cao thuc tap hoan chinh
Bao cao thuc tap hoan chinhBao cao thuc tap hoan chinh
Bao cao thuc tap hoan chinh
Nguyễn Thị Thảo
 

Viewers also liked (15)

WCMSU Strategy
WCMSU StrategyWCMSU Strategy
WCMSU Strategy
 
WC Social Media Strategy #MSU
WC Social Media Strategy #MSUWC Social Media Strategy #MSU
WC Social Media Strategy #MSU
 
Veri̇mli̇ ders çalişma tekni̇kleri̇
Veri̇mli̇ ders çalişma tekni̇kleri̇Veri̇mli̇ ders çalişma tekni̇kleri̇
Veri̇mli̇ ders çalişma tekni̇kleri̇
 
Arti_Trainer
Arti_TrainerArti_Trainer
Arti_Trainer
 
Code obfuscation theory and practices
Code obfuscation theory and practicesCode obfuscation theory and practices
Code obfuscation theory and practices
 
Cv
CvCv
Cv
 
Fisica moderna serway- 3ra edicion
Fisica moderna  serway- 3ra edicionFisica moderna  serway- 3ra edicion
Fisica moderna serway- 3ra edicion
 
Crack ios firmware-nlog2n
Crack ios firmware-nlog2nCrack ios firmware-nlog2n
Crack ios firmware-nlog2n
 
Barthes, roland - de la obra al texto - el susurro del lenguaje
Barthes, roland - de la obra al texto - el susurro del lenguajeBarthes, roland - de la obra al texto - el susurro del lenguaje
Barthes, roland - de la obra al texto - el susurro del lenguaje
 
Chobani Digital Media Strategy
Chobani Digital Media StrategyChobani Digital Media Strategy
Chobani Digital Media Strategy
 
Bad news messages
Bad news messagesBad news messages
Bad news messages
 
Coaliciones una guía para Partidos Políticos
Coaliciones una guía para Partidos PolíticosCoaliciones una guía para Partidos Políticos
Coaliciones una guía para Partidos Políticos
 
Chapter 2, 7 cs of_business_communication_a
Chapter 2, 7 cs of_business_communication_aChapter 2, 7 cs of_business_communication_a
Chapter 2, 7 cs of_business_communication_a
 
Chapter 7, the appearance and design of business message
Chapter 7, the appearance and design of business messageChapter 7, the appearance and design of business message
Chapter 7, the appearance and design of business message
 
Bao cao thuc tap hoan chinh
Bao cao thuc tap hoan chinhBao cao thuc tap hoan chinh
Bao cao thuc tap hoan chinh
 

Similar to Android device protection

Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
Samsung Biz Mobile
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0
Javier Gonzalez
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
Javier Gonzalez
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
Javier Gonzalez
 
cn-series-container-firewall.pdf
cn-series-container-firewall.pdfcn-series-container-firewall.pdf
cn-series-container-firewall.pdf
eli lama sabachtani sinaga
 
Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of Systems
Jamal Jamali
 
Secure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure SphereSecure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure Sphere
Microsoft Tech Community
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
Hamed Moghaddam
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
Javier Gonzalez
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
Samsung Biz Mobile
 
Best Practices To Secure Kubernetes Cluster
Best Practices To Secure Kubernetes ClusterBest Practices To Secure Kubernetes Cluster
Best Practices To Secure Kubernetes Cluster
Urolime Technologies
 
Container security within Cisco Container Platform
Container security within Cisco Container PlatformContainer security within Cisco Container Platform
Container security within Cisco Container Platform
Sanjeev Rampal
 
Container Security Mmanagement
Container Security MmanagementContainer Security Mmanagement
Container Security Mmanagement
Suresh Thivanka Rupasinghe
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld
 
QNX OS
QNX OSQNX OS
Qnx
QnxQnx
Building Secure IoT Solutions using Azure Sphere
Building Secure IoT Solutions using Azure SphereBuilding Secure IoT Solutions using Azure Sphere
Building Secure IoT Solutions using Azure Sphere
Chris Pietschmann (Microsoft MVP)
 
Santander DevopsandCloudDays 2021 - Hardening containers.pdf
Santander DevopsandCloudDays 2021 - Hardening containers.pdfSantander DevopsandCloudDays 2021 - Hardening containers.pdf
Santander DevopsandCloudDays 2021 - Hardening containers.pdf
Juan Vicente Herrera Ruiz de Alejo
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-data
Kevin Mayo
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
solarisyougood
 

Similar to Android device protection (20)

Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
 
cn-series-container-firewall.pdf
cn-series-container-firewall.pdfcn-series-container-firewall.pdf
cn-series-container-firewall.pdf
 
Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of Systems
 
Secure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure SphereSecure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure Sphere
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Best Practices To Secure Kubernetes Cluster
Best Practices To Secure Kubernetes ClusterBest Practices To Secure Kubernetes Cluster
Best Practices To Secure Kubernetes Cluster
 
Container security within Cisco Container Platform
Container security within Cisco Container PlatformContainer security within Cisco Container Platform
Container security within Cisco Container Platform
 
Container Security Mmanagement
Container Security MmanagementContainer Security Mmanagement
Container Security Mmanagement
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
QNX OS
QNX OSQNX OS
QNX OS
 
Qnx
QnxQnx
Qnx
 
Building Secure IoT Solutions using Azure Sphere
Building Secure IoT Solutions using Azure SphereBuilding Secure IoT Solutions using Azure Sphere
Building Secure IoT Solutions using Azure Sphere
 
Santander DevopsandCloudDays 2021 - Hardening containers.pdf
Santander DevopsandCloudDays 2021 - Hardening containers.pdfSantander DevopsandCloudDays 2021 - Hardening containers.pdf
Santander DevopsandCloudDays 2021 - Hardening containers.pdf
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-data
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
 

Recently uploaded

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 

Recently uploaded (20)

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 

Android device protection