The document discusses attacking proprietary Android vendor customizations through fuzz testing and fault injection testing. It presents Chizpurfle, a gray-box Android fuzzer designed to generate invalid inputs to identify vulnerabilities in vendor customization code without access to source code. Chizpurfle leverages dynamic instrumentation to trace code coverage on actual devices during fuzzing. It detected two bugs from fuzzing Samsung services. The document also discusses a fault injection testing tool that injects faults into Android components to evaluate failure propagation and mitigation. The tool found vendors have varying success in handling faults across components.
2013 Toorcon San Diego Building Custom Android Malware for Penetration TestingStephan Chenette
In this presentation Stephan will discuss some recent research that emerged he was asked to build malicious applications that bypassed custom security controls. He will walk through some of the basics of reversing malicious apps for android as well as common android malware techniques and methodologies. From the analysis of the wild android malware, he will discuss techniques and functionality to include when penetration testing against 3rd-party android security controls.
BIO
Stephan Chenette is the Director of Security Research and Development at IOActive where he conducts ongoing research to support internal and external security initiatives within the IOActive Labs. Stephan has been in involved in security research for the last 10 years and has presented at numerous conferences including: Blackhat, CanSecWest, RSA, EkoParty, RECon, AusCERT, ToorCon, SecTor, SOURCE, OWASP, B-Sides and PacSec. His specialty is in writing research tools for both the offensive and defensive front as well as investigating next generation emerging threats. He has released public analyses on various vulnerabilities and malware. Prior to joining IOActive, Stephan was the head security researcher at Websense for 6 years and a security software engineer for 4 years working in research and product development at eEye Digital Security.
Proving the Security of Low-Level Software Components & TEEsAshley Zupkus
Learn how it is possible to prove low-level software component and TEE security, as well as the Goodix driver example demoed in the webinar.
Check out the webinar replay here: https://www.youtube.com/watch?v=nG3DlejBd3k
Visit our website trust-in-soft.com for more information!
2013 Toorcon San Diego Building Custom Android Malware for Penetration TestingStephan Chenette
In this presentation Stephan will discuss some recent research that emerged he was asked to build malicious applications that bypassed custom security controls. He will walk through some of the basics of reversing malicious apps for android as well as common android malware techniques and methodologies. From the analysis of the wild android malware, he will discuss techniques and functionality to include when penetration testing against 3rd-party android security controls.
BIO
Stephan Chenette is the Director of Security Research and Development at IOActive where he conducts ongoing research to support internal and external security initiatives within the IOActive Labs. Stephan has been in involved in security research for the last 10 years and has presented at numerous conferences including: Blackhat, CanSecWest, RSA, EkoParty, RECon, AusCERT, ToorCon, SecTor, SOURCE, OWASP, B-Sides and PacSec. His specialty is in writing research tools for both the offensive and defensive front as well as investigating next generation emerging threats. He has released public analyses on various vulnerabilities and malware. Prior to joining IOActive, Stephan was the head security researcher at Websense for 6 years and a security software engineer for 4 years working in research and product development at eEye Digital Security.
Proving the Security of Low-Level Software Components & TEEsAshley Zupkus
Learn how it is possible to prove low-level software component and TEE security, as well as the Goodix driver example demoed in the webinar.
Check out the webinar replay here: https://www.youtube.com/watch?v=nG3DlejBd3k
Visit our website trust-in-soft.com for more information!
CODE BLUE 2014 : [Keynote] IDA and digital security by Ilfak GuilfanovCODE BLUE
How and why the famous disassembler was created; how it grew into a tool of choice for many security analysts; what is the current state and what is in its agenda for tomorrow.
An Antivirus API for Android Malware Recognition Fraunhofer AISEC
In this talk, given at the 8th International Conference on Malicious and Unwanted Software (MALWARE 2013), researchers from Fraunhofer AISEC present their paper "An Antivirus API for Android Malware Recognition".
The proposed API, if added to the main Android distribution or to third-party distributions such as Cyanogenmod, would significantly increase the effectiveness that antivirus software can achieve on Android. Currently, antivirus software on Android is very limited in its capabilities and very easy to circumvent for malware, as demonstrated by our previous work -> http://ais.ec/techreport - ON THE EFFECTIVENESS OF MALWARE PROTECTION ON ANDROID,
AN EVALUATION OF ANDROID ANTIVIRUS APPS by Rafael Fedler. These platform-based antivirus shortcomings are addressed by the paper presented in this talk.
Presentation by Saurabh Harit att he mobile security summit in johannesburg 2011.
This presentation is about security on the iPhone and Android platforms. The presentation begins with a discussion on decrypting iPhone apps and its implications. The Android security model is discussed. The presentation ends with a series of discussions on practical Android attacks.
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...Priyanka Aash
In 2017, a sophisticated threat actor deployed the TRITON attack framework engineered to manipulate industrial safety systems at a critical infrastructure facility. This talk offers new insights into TRITON attack framework which became an unprecedented milestone in the history of cyber-warfare as it is the first publicly observed malware that specifically targets protection functions meant to safeguard human lives. While the attack was discovered before its ultimate goal was achieved, that is, disruption of the physical process, TRITON is a wakeup call regarding the need to urgently improve ICS cybersecurity.
Video at http://mrkn.co/andsec
With Android activations reaching a million devices per day, it is no surprise that security threats against our favorite mobile platform have been on the rise.
In this session, you will learn all about Android's security model, including application isolation (sandboxing) and provenance (signing), its permission system and enforcement, data protection features and encryption, as well as enterprise device administration.
Together, we will dig into Android's own internals to see how its security model is applied through the entire Android stack - from the Linux kernel, to the native layers, to the Application Framework services, and to the applications themselves.
Finally, you’ll learn about some of the weaknesses in the Android's model (including rooting, tap-jacking, malware, social-engineering) as well as what can be done to mitigate those threats, such as SE-Linux, memory protection, anti-malware, firewall, and developer best practices.
By the end of this session you will have a better understanding of what it takes to make Android a more trusted component of our personal and professional lives.
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE
Current mobile gadgets includes of rich devices (high resolution video camera, microphone, GPS, etc) which enable high quantity communication (Video conference, current location data, etc). Unfortunately, the rich devices make easy to conduct cyber espionage. For example, a high resolution video is used to read the text on a display. A GPS device is used to track the user's location ("Cerberus" and "mSpy" are famous. Japanese application named "karelog" became social issues). These devices are not used in company's office or factory and computer administrators want to prohibit these devices. Unfortunately, the devices are embedded in a mobile gadget and most of them cannot be disenabled by BIOS or EFI.
In order to In order to solve this problem, we propose a thin hypervisor called "DeviceDisEnabler (DDE)", which hides some devices from OS. DDE is a lightweight hypervisor and can be inserted to a pre-installed OS. Although the OS uses "IN" instruction to get the device information on PCI and USB (Vendor ID, Device Class, etc), the "IN" instruction is hooked by DDE and the device information is hidden if the devices is prohibited in the company.
Unfortunately, not only attackers but also employees want to bypass the DDE because they want to use the devices. In order to protect bypassing the DDE, it encrypts the disk image of the OS. It means the OS cannot be used without the help of DDE. In order to hide the encryption key, the DDE has three types of key managements (A technique gets a key from the Internet with a secure communication. A technique hides the key into a TPM chip and obtains it at a certain state of boot time only. A technique obfuscates the key into the code using Whitebox Cryptography technique).
Current implementation is based on BitVisor 1.4 and the target is a mobile gadget which has Intel CPU. I will talk about the requirements for ARM CPU based implementation.
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...Mahmoud Hammad
The Android platform has been the dominant mobile platform in recent years resulting in millions of apps and security threats against those apps. Anti-malware products aim to protect smartphone users from these threats, especially from malicious apps. However, malware authors use code obfuscation on their apps to evade detection by anti-malware products. To assess the effects of code obfuscation on Android apps and anti-malware products, we have conducted a large-scale empirical study that evaluates the effectiveness of the top anti-malware products against various obfuscation tools and strategies. To that end, we have obfuscated 3,000 benign apps and 3,000 malicious apps and generated 73,362 obfuscated apps using 29 obfuscation strategies from 7 open-source, academic, and commercial obfuscation tools. The findings of our study indicate that (1) code obfuscation significantly impacts Android anti-malware products; (2) the majority of anti-malware products are severely impacted by even trivial obfuscations; (3) in general, combined obfuscation strategies do not successfully evade anti-malware products more than individual strategies; (4) the detection of anti-malware products depend not only on the applied obfuscation strategy but also on the leveraged obfuscation tool; (5) anti-malware products are slow to adopt signatures of malicious apps; and (6) code obfuscation often results in changes to an app’s semantic behaviors.
Breaking the Laws of Robotics: Attacking Industrial RobotsSpeck&Tech
ABSTRACT: Industrial robots are complex cyber-physical systems used for manufacturing, and a critical component of any modern factory. These robots aren't just electromechanical devices but include complex embedded controllers, which are often interconnected with other computers in the factory network, safety systems, and to the Internet for remote monitoring and maintenance. In this scenario, industrial routers also play a key role, because they directly expose the robot's controller. Therefore, the impact of a single, simple vulnerability can grant attackers an easy entry point. The talk will discuss how remote attackers are able to attack such robots up to the point where they can alter the manufactured product, physically damage the robot, steal industry secrets, or injure humans.
BIO: Stefano Zanero received a PhD in Computer Engineering from Politecnico di Milano, where he is currently a full professor with the Dipartimento di Elettronica, Informazione e Bioingegneria. His research focuses on malware analysis, cyber-physical security, and cybersecurity in general. Besides teaching “Computer Security” and “Digital Forensics and Cybercrime” at Politecnico, he has extensive speaking and training experience in Italy and abroad. He co-authored over 100 scientific papers and books. He is a Senior Member of the IEEE and the IEEE Computer Society, which has named him a Distinguished Lecturer and Distinguished Contributor; he is a lifetime senior member of the ACM, which has named him a Distinguished Speaker; and has been named a Fellow of the ISSA (Information System Security Association). Stefano is also a co-founder and chairman of Secure Network, a leading cybersecurity assessment firm, and a co-founder of BankSealer, a startup in the FinTech sector that addresses fraud detection through machine learning techniques.
CODE BLUE 2014 : [Keynote] IDA and digital security by Ilfak GuilfanovCODE BLUE
How and why the famous disassembler was created; how it grew into a tool of choice for many security analysts; what is the current state and what is in its agenda for tomorrow.
An Antivirus API for Android Malware Recognition Fraunhofer AISEC
In this talk, given at the 8th International Conference on Malicious and Unwanted Software (MALWARE 2013), researchers from Fraunhofer AISEC present their paper "An Antivirus API for Android Malware Recognition".
The proposed API, if added to the main Android distribution or to third-party distributions such as Cyanogenmod, would significantly increase the effectiveness that antivirus software can achieve on Android. Currently, antivirus software on Android is very limited in its capabilities and very easy to circumvent for malware, as demonstrated by our previous work -> http://ais.ec/techreport - ON THE EFFECTIVENESS OF MALWARE PROTECTION ON ANDROID,
AN EVALUATION OF ANDROID ANTIVIRUS APPS by Rafael Fedler. These platform-based antivirus shortcomings are addressed by the paper presented in this talk.
Presentation by Saurabh Harit att he mobile security summit in johannesburg 2011.
This presentation is about security on the iPhone and Android platforms. The presentation begins with a discussion on decrypting iPhone apps and its implications. The Android security model is discussed. The presentation ends with a series of discussions on practical Android attacks.
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...Priyanka Aash
In 2017, a sophisticated threat actor deployed the TRITON attack framework engineered to manipulate industrial safety systems at a critical infrastructure facility. This talk offers new insights into TRITON attack framework which became an unprecedented milestone in the history of cyber-warfare as it is the first publicly observed malware that specifically targets protection functions meant to safeguard human lives. While the attack was discovered before its ultimate goal was achieved, that is, disruption of the physical process, TRITON is a wakeup call regarding the need to urgently improve ICS cybersecurity.
Video at http://mrkn.co/andsec
With Android activations reaching a million devices per day, it is no surprise that security threats against our favorite mobile platform have been on the rise.
In this session, you will learn all about Android's security model, including application isolation (sandboxing) and provenance (signing), its permission system and enforcement, data protection features and encryption, as well as enterprise device administration.
Together, we will dig into Android's own internals to see how its security model is applied through the entire Android stack - from the Linux kernel, to the native layers, to the Application Framework services, and to the applications themselves.
Finally, you’ll learn about some of the weaknesses in the Android's model (including rooting, tap-jacking, malware, social-engineering) as well as what can be done to mitigate those threats, such as SE-Linux, memory protection, anti-malware, firewall, and developer best practices.
By the end of this session you will have a better understanding of what it takes to make Android a more trusted component of our personal and professional lives.
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE
Current mobile gadgets includes of rich devices (high resolution video camera, microphone, GPS, etc) which enable high quantity communication (Video conference, current location data, etc). Unfortunately, the rich devices make easy to conduct cyber espionage. For example, a high resolution video is used to read the text on a display. A GPS device is used to track the user's location ("Cerberus" and "mSpy" are famous. Japanese application named "karelog" became social issues). These devices are not used in company's office or factory and computer administrators want to prohibit these devices. Unfortunately, the devices are embedded in a mobile gadget and most of them cannot be disenabled by BIOS or EFI.
In order to In order to solve this problem, we propose a thin hypervisor called "DeviceDisEnabler (DDE)", which hides some devices from OS. DDE is a lightweight hypervisor and can be inserted to a pre-installed OS. Although the OS uses "IN" instruction to get the device information on PCI and USB (Vendor ID, Device Class, etc), the "IN" instruction is hooked by DDE and the device information is hidden if the devices is prohibited in the company.
Unfortunately, not only attackers but also employees want to bypass the DDE because they want to use the devices. In order to protect bypassing the DDE, it encrypts the disk image of the OS. It means the OS cannot be used without the help of DDE. In order to hide the encryption key, the DDE has three types of key managements (A technique gets a key from the Internet with a secure communication. A technique hides the key into a TPM chip and obtains it at a certain state of boot time only. A technique obfuscates the key into the code using Whitebox Cryptography technique).
Current implementation is based on BitVisor 1.4 and the target is a mobile gadget which has Intel CPU. I will talk about the requirements for ARM CPU based implementation.
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...Mahmoud Hammad
The Android platform has been the dominant mobile platform in recent years resulting in millions of apps and security threats against those apps. Anti-malware products aim to protect smartphone users from these threats, especially from malicious apps. However, malware authors use code obfuscation on their apps to evade detection by anti-malware products. To assess the effects of code obfuscation on Android apps and anti-malware products, we have conducted a large-scale empirical study that evaluates the effectiveness of the top anti-malware products against various obfuscation tools and strategies. To that end, we have obfuscated 3,000 benign apps and 3,000 malicious apps and generated 73,362 obfuscated apps using 29 obfuscation strategies from 7 open-source, academic, and commercial obfuscation tools. The findings of our study indicate that (1) code obfuscation significantly impacts Android anti-malware products; (2) the majority of anti-malware products are severely impacted by even trivial obfuscations; (3) in general, combined obfuscation strategies do not successfully evade anti-malware products more than individual strategies; (4) the detection of anti-malware products depend not only on the applied obfuscation strategy but also on the leveraged obfuscation tool; (5) anti-malware products are slow to adopt signatures of malicious apps; and (6) code obfuscation often results in changes to an app’s semantic behaviors.
Breaking the Laws of Robotics: Attacking Industrial RobotsSpeck&Tech
ABSTRACT: Industrial robots are complex cyber-physical systems used for manufacturing, and a critical component of any modern factory. These robots aren't just electromechanical devices but include complex embedded controllers, which are often interconnected with other computers in the factory network, safety systems, and to the Internet for remote monitoring and maintenance. In this scenario, industrial routers also play a key role, because they directly expose the robot's controller. Therefore, the impact of a single, simple vulnerability can grant attackers an easy entry point. The talk will discuss how remote attackers are able to attack such robots up to the point where they can alter the manufactured product, physically damage the robot, steal industry secrets, or injure humans.
BIO: Stefano Zanero received a PhD in Computer Engineering from Politecnico di Milano, where he is currently a full professor with the Dipartimento di Elettronica, Informazione e Bioingegneria. His research focuses on malware analysis, cyber-physical security, and cybersecurity in general. Besides teaching “Computer Security” and “Digital Forensics and Cybercrime” at Politecnico, he has extensive speaking and training experience in Italy and abroad. He co-authored over 100 scientific papers and books. He is a Senior Member of the IEEE and the IEEE Computer Society, which has named him a Distinguished Lecturer and Distinguished Contributor; he is a lifetime senior member of the ACM, which has named him a Distinguished Speaker; and has been named a Fellow of the ISSA (Information System Security Association). Stefano is also a co-founder and chairman of Secure Network, a leading cybersecurity assessment firm, and a co-founder of BankSealer, a startup in the FinTech sector that addresses fraud detection through machine learning techniques.
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
Companies and researchers are exploring ways to make software and hardware development easier for the masses. Soon you will be able to build your own autonomous drone, create a sensor that assess the watering needs of your plants, and develop a cat tracking device with minimal coding and hardware skills.
What is the place of security and privacy in this exciting development?
Are we building the next generation of Internet security vulnerabilities right now?
In his talk Hannes Tschofenig will highlight challenges with Internet of Things, what role standardization plays, and what contributions ARM, a provider of microprocessor IP, is making to improve IoT security.
Eclipse Edje: A Java API for MicrocontrollersMicroEJ
The Eclipse Edje project, initiated by MicroEJ, defines a standard high-level Java API for accessing hardware features delivered by 32-bit microcontrollers for using serial links, general purpose inputs/outputs, or digital/analog converters. MCUs are small, low-cost, low-power processors designed to run software in resource-constrained environments: low memory (typically KB), flash (typically MB) and frequency (typically MHz). MCUs are provided by silicon vendors along with evaluation kits and are typically the ideal vectors for large scale deployments of low-power and cost-effective IoT, embedded or wearable devices. Edje aims at unifying and easing the programming of apps for MCUs with the largely adopted Java language.
For new age touch-based embedded devices, Android is becoming a popular OS going beyond mobile phones. With its roots from Embedded Linux, Android framework offers benefits in terms of rich libraries, open-source and multi-device support. Emertxe’s hands-on Embedded Android Training Course is designed to customize, build and deploy custom Embedded OS on ARM target. Rich set of projects will make your learning complete.
WoT.js - WoT App. Framework for Open Source HardwareJonathan Jeon
Talk on WebAppsCamp. WoT.js is one of application framework based on node.js with open source hardware. It's a short introduction about WoT.js framework.
VEDLIoT – A heterogeneous hardware platform for next-gen AIoT applications, Jens Hagemeyer, EU-IoT Training Session on “Machine Learning at the Edge and the FarEdge”, IoT Week (online event), August 2021
Transforming your Security Products at the EndpointIvanti
Are you thinking about extending the endpoint capabilities of your Security Solution? Join us for a dep dive into the value of embedding patch management capabilities into your security software. Learn how other security companies have chosen to add patching and remdiation. Why in 2018 patching is more important than ever as your customers confront ransomware, zero day attacks, and more.
Embedded Fest 2019. Іван Пустовіт. From AOSP to Android powered deviceEmbeddedFest
На даний момент Android є найпопулярнішою ОС для мобільних пристроїв. Він працює на різних платформах з різною конфігурацією обладнання. Потрібно багато інженерних зусиль, щоб створити Android BSP, що повністю відповідає потребам кінцевого користувача.
Я розповім, як шматок скла та металу стає пристроєм, що працює на Android.
Я проведу вас основними фазами розробки компонентів Android, поясню різницю між Android та AOSP, і розповім про процес сертифікації Google.
EclipseEmbeddedDay2009-OSGi: Best Tool In Your Embedded Systems ToolboxBrett Hackleman
We discuss several of our past and current OSGi-based solutions for defense systems, mining equipment, construction equipment, industrial automation, and automotive/telematics domains. We present some best practices for building flexible, cross-platform, high-performance embedded application and the resulting lessons learned along the way. We demonstrate how the Eclipse Runtime Components and Frameworks can be used to access communication buses such as CAN, J1939, J1850, and MIL-STD-1553. Finally, we explain how using OSGi and Equinox can simplify the development, testing, and deployment of your next application, whether embedded or not.
Similar to Attacking Proprietary Android Vendor Customizations (20)
Strategies for Successful Data Migration Tools.pptxvarshanayak241
Data migration is a complex but essential task for organizations aiming to modernize their IT infrastructure and leverage new technologies. By understanding common challenges and implementing these strategies, businesses can achieve a successful migration with minimal disruption. Data Migration Tool like Ask On Data play a pivotal role in this journey, offering features that streamline the process, ensure data integrity, and maintain security. With the right approach and tools, organizations can turn the challenge of data migration into an opportunity for growth and innovation.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
2. The Android OS now
dominates the global
smartphone market
Dozens of vendors customize
the Android Open-Source
Project (AOSP) to compete on
the market
Vendor customizations
widen the attack surface
3. Custom system services in three commercial devices
69%
31%
Samsung Galaxy S6 Edge
45%
55%
Huawei P8 Lite
28%
72%
HTC One M9
4. Linux kernel
RILD GPSD
Camera
HAL
Sensors
HAL
...
Bionic
SQLite
socket socketlib lib
Teleph.
registry
service
Location
mngmt
service
Camera
service
Sensor
service
binder
Activity/
Package/
... Mngmt.
lib
binder binder binder binder
User apps, stock apps (camera, phone, store, ...)
Android Framework API
... ......
5. Linux kernel
...
Bionic
SQLite
socket socketlib lib
Teleph.
registry
service
Location
mngmt
service
Camera
service
Sensor
service
binder
Activity/
Package/
... Mngmt.
lib
binder binder binder binder
User apps, stock apps (camera, phone, store, ...)
Android Framework API
socket
S Pen
Gesture
service
binder
RILD GPSD
Camera
HAL
Sensors
HAL
... ......
S Pen
HAL
New services and related drivers:
• Mobile personal assistants
• Mobile payments
• User interfaces
• ...
RILD GPSD
Camera
HAL
Sensors
HAL
Custom drivers for proprietary hw:
• Phone
• Camera
• ...
7. Linux kernel
...
Bionic
SQLite
socket socketlib lib
Teleph.
registry
service
Location
mngmt
service
Camera
service
Sensor
service
binder
Activity/
Package/
... Mngmt.
lib
binder binder binder binder
User apps, stock apps (camera, phone, store, ...)
Android Framework API
... ......
socket
S Pen
Gesture
service
binder
S Pen
HAL
RILD GPSD
Camera
HAL
Sensors
HAL
Fuzzer
Fuzzing is a security testing technique to
identify vulnerable software interfaces, by
injecting invalid and unexpected inputs
9. easy to
apply
• does not
look at
target’s
internals
• uses purely
random
inputs
low
coverage
• executes the
same code,
over and
over
• misses
corner cases
high
coverage
• generates
inputs by
looking at
target’s
internals
hard to
apply
• needs source
code, or
• needs to run
on emulated
environments
Vendor customizations do not
provide source code, and cannot
run on a device emulator!
White-boxBlack-box
10. Chizpurfle is a fuzzing tool designed
to run on the actual device and to
attack its vendor customizations
no need for recompiling the
target code
no execution on emulated
environment
The tool leverages dynamic binary
instrumentation techniques (such
as just-in-time code rewriting) to
trace coverage
fuzz
inputs
coverage
info
Actual
Android
device
Fuzzer
11. ANDROID DEVICE
SEED
MANAGER
FUZZ INPUT
GENERATOR
METHOD
EXTRACTOR
SYSTEM SERVICE
STORAGE
TEST
EXECUTOR
OUTPUT
ANALYZER
INSTRUMENTATION
MODULE
1) Identifies
customized services
running on the
device
2) Executes the target
with just-in-time
rewriting, to track code
coverage
3) Generates new test
inputs by mutating the best
test inputs from the
previous generation
For technical details, see the paper:
“Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations,”
28th IEEE International Symposium on Software Reliability Engineering (Best Paper Award)
13. CHIZPURFLE TARGET PROCESS
INSTRUM.
MODULE
STALKER
SERVER
PROCESS
THREAD
for each block
DYN LIB
NJECT
FOLLOW
INJECT
REWRITE
BLOCK
ADDRESS
mov x29, sp
mov x3, x30
ldp x29,x30,[sp],16
stp x29,x30,[sp-16]!
add x30,x0,#4
save address
stalk (bl f_label)
save address
stalk(ret)
mov x29, sp
mov x3, x30
ldp x29,x30,[sp],16
stp x29,x30,[sp-16]!
add x30,x0,#4
ret
bl f_label
Block
(before rewriting)
Block
(after rewriting)
14. Chizpurfle detected
2,272 service methods
from Samsung
customizations
Chizpurfle performed
34,645 tests on these
methods
Found 9 failures caused
by 2 distinct bugs
Samsung Galaxy S6 Edge
Android 7.0 Nougat
15. Input strings that include
SQL control expressions
(such as single quotes)
trigger an SQL exception
The input crashes the
phone process, and
interrupts any ongoing call
VOIP SERVICE
callInVoIP(String SIPAddress)
SELECT reject_number FROM
reject_num WHERE reject
number=‘[...a random string with
a single quote...]’
CRASH
16. A tricky input to
the S Pen Gesture
service triggers a
fatal error
(NullPointerExc.)
The System Server
process fails,
causing a reboot of
the smartphone
SPENGESTURE SERVICE
injectInput(…, android.view.InputEvent [ ], ...)
android.view.InputEvent array is
non-null and non-empty, and at
least one of its elements is null
REBOOT
17. On average, Chizpurfle covers 2.3x
more code than black-box testing
(within the same time budget)
Chizpurfle has an average execution
slow-down of 11.97x (comparable to
other dynamic analysis tools)
19. Linux kernel
...
Bionic
SQLite
socket socketlib lib
Teleph.
registry
service
Location
mngmt
service
Camera
service
Sensor
service
binder
Activity/
Package/
... Mngmt.
lib
binder binder binder binder
User apps, stock apps (camera, phone, store, ...)
Android Framework API
socket
S Pen
Gesture
service
binder
RILD GPSD
Camera
HAL
Sensors
HAL
... ......
S Pen
HAL
RILD GPSD
Camera
HAL
Sensors
HAL
What if it is faulty?
(no response; exceptions or
errors; slow response;
corrupted data/metadata)
Software fault injection is an
innovative form of testing that
evaluates how components’ failures
can escalate into system failures
20. Linux kernel
...
Bionic
SQLite
socket socketlib lib
Teleph.
registry
service
Location
mngmt
service
Camera
service
Sensor
service
binder
Activity/
Package/
... Mngmt.
lib
binder binder binder binder
User apps, stock apps (camera, phone, store, ...)
Android Framework API
socket
S Pen
Gesture
service
binder
RILD GPSD
Camera
HAL
Sensors
HAL
... ......
S Pen
HAL
RILD GPSD
Camera
HAL
Sensors
HAL
The user is notified about the
problem (not only with a crash, but
with an “informative” message)
The faulty component
is disabled, killed or
restarted
The rest of the system
“masks” the fault
(for example, retry the
failed operation)
Fault
Injector
What if it is faulty?
(no response; exceptions or
errors; slow response;
corrupted data/metadata)
21. Linux kernel
...
Bionic
SQLite
socket socketlib lib
Teleph.
registry
service
Location
mngmt
service
Camera
service
Sensor
service
binder
Activity/
Package/
... Mngmt.
lib
binder binder binder binder
User apps, stock apps (camera, phone, store, ...)
Android Framework API
socket
S Pen
Gesture
service
binder
RILD GPSD
Camera
HAL
Sensors
HAL
... ......
S Pen
HAL
RILD GPSD
Camera
HAL
Sensors
HAL
The upper services ignore errors
from the lower components
The user gets weird, cryptic notifications
(without any clue on the problem)
The system ignores the
failed state of the
subsystem
Fault
Injector
What if it is faulty?
(no response; exceptions or
errors; slow response;
corrupted data/metadata)
22. Linux kernel
...
Bionic
SQLite
socket socketlib lib
Teleph.
registry
service
Location
mngmt
service
Camera
service
Sensor
service
binder
Activity/
Package/ ...
Mngmt.
lib
binder binder binder binder
User apps, stock apps (camera, phone, store, ...)
Android Framework API
socket
S Pen
Gesture
service
binder
RILD GPSD
Camera
HAL
Sensors
HAL
S Pen
HAL
RILD GPSD
Camera
HAL
Sensors
HAL
LIBHOOK
The LIBHOOK injects arbitrary code into Android processes (both C++ and Java-based).
The collection of faults injectors emulate the failure of the components.
Binderinjector
Socketinjector
Libraryinjector
Syscallinjector
Processinjector
Stressinjector
Control scripts and data
analysis scripts (on PC)
L.H.L.H.
L.H. L.H.
24. • Comparative analysis of
three commercial devices
Which device experiences the
most severe or frequent
failures?
Which faults (delays, data
corruptions, resource leaks, ...)
are the most critical?
How to mitigate failures (e.g.,
device freezes, stuck UI, etc.)?
Huawei
Samsung
HTC
For technical details, see the paper:
“Dependability Assessment of the Android OS Through Fault Injection”
IEEE Transactions on Reliability
25. • The Huawei device had the highest failure rate
• Most of Camera failures are CRASHes (the system is not able to handle
exceptions)
• Most of Phone failures failures are FATAL errors (the phone appears available,
but it is unable to make or receive calls)
0%
20%
40%
60%
80%
100%
Samsung S6
Edge
Huawei P8 HTC M9
CRASH ANR FATAL OK
0%
20%
40%
60%
80%
100%
Samsung S6
Edge
Huawei P8 HTC M9
CRASH ANR FATAL OK
CAMERA PHONE
26. baseband
processor
RILD Phone Services
Telephony
Registry
com.vendor.phone
Service
Manager
1. Drop AT
messages
2. Crash of the
process that hosts
phone services
3. The Telephony Registry looks for the
Subscription Service (one of the unavailable phone
services), but the Service Manager returns an
exception because the service is dead.
4. The Telephony Registry
does not properly handle the
exception and crashes
5. Even if the phone UI is
still responsive, the phone
is not working (e.g., cannot
start a phone call)
27. com.huawei.Camera
1. Inject an erroneous return code
from reads on the virtual device file
2. The Mediaserver reports a fatal error
“method not yet implemented”
3. The Mediaserver
process crashes
Mediaserver/dev/video*
4. The stock camera
app crashes
28. 28
0%
20%
40%
60%
80%
100%
Samsung S6
Edge
Huawei P8 HTC M9
CRASH ANR FATAL OK
SURFACE FLINGER
0%
20%
40%
60%
80%
100%
Samsung S6
Edge
Huawei P8 HTC M9
CRASH ANR FATAL OK
SYSTEM SERVER
The System Server and Surface Flinger are critical components of
Android OS
Faults in these targets are likely to cause weird effects on user
interactions
The System UI can get stuck if they are slow or do not respond
31. Injections in the SQLite and Bionic libraries linked to the System
Server
The faults propagated to many apps through unhandled
exceptions
e.g., the Package Manager crashes in the case of corrupted APK
metadata
31
0%
20%
40%
60%
80%
100%
Samsung S6
Edge
Huawei P8 HTC M9
CRASH ANR FATAL OK
SQLITE
0%
20%
40%
60%
80%
100%
Samsung S6
Edge
Huawei P8 HTC M9
CRASH ANR FATAL OK
BIONIC
32. 32
I/CorruptionManager( 2966): corrupting Bionic open return value
W/CorruptionManager( 2966): ints_to_replace is empty, adding defaults
I/INJEVENT( 2966): INJECTED CORRUPTION
I/LIBHOOK ( 2966): Bionic Hooks close function
I/LIBHOOK ( 2966): Bionic Hooks read function (222)E/CursorWindow( 2966): ashmem_create_region ashmemFd=-1, result=-9
E/CursorWindow( 2966): Could not allocate CursorWindow '/data/system/locksettings.db' of size 2097152 due to error -9.
E/JavaBinder( 2966): *** Uncaught remote exception! (Exceptions are not yet supported across processes.)
E/JavaBinder( 2966): android.database.CursorWindowAllocationException: Cursor window allocation of 2048 kb failed. # Open Cursors=1 (#
cursors opened by this proc=1)
E/JavaBinder( 2966): at android.database.CursorWindow.<init>(CursorWindow.java:108)
E/JavaBinder( 2966): at android.database.AbstractWindowedCursor.clearOrCreateWindow(AbstractWindowedCursor.java:198)
E/JavaBinder( 2966): at android.database.sqlite.SQLiteCursor.fillWindow(SQLiteCursor.java:139)
E/JavaBinder( 2966): at android.database.sqlite.SQLiteCursor.getCount(SQLiteCursor.java:133)
E/JavaBinder( 2966): at android.database.AbstractCursor.moveToPosition(AbstractCursor.java:197)
E/JavaBinder( 2966): at android.database.AbstractCursor.moveToFirst(AbstractCursor.java:237)
E/JavaBinder( 2966): at com.android.server.LockSettingsService.readFromDb(LockSettingsService.java:595)
E/JavaBinder( 2966): at com.android.server.LockSettingsService.getLong(LockSettingsService.java:258)
E/JavaBinder( 2966): at com.android.internal.widget.ILockSettings$Stub.onTransact(ILockSettings.java:108)
E/JavaBinder( 2966): at com.android.server.HwLockSettingsService.onTransact(HwLockSettingsService.java:170)
E/JavaBinder( 2966): at android.os.Binder.execTransact(Binder.java:446)
…. The user
cannot unlock
the device!
Injected an
invalid file
handle
The Android OS has become the most popular mobile OS, as it is the foundation of dozens of mobile devices from more than 20 Android vendors (including Samsung, HTC, Huawei, Motorola, Xiaomi, LG, and others). Basing on the open-source version of the Android OS, these vendors develop their own proprietary Android OS in order to differentiate from the competition and to make the user experience unique and more enjoyable. For example, vendor customizations include mobile personal assistants, advanced photo enhancements, mobile payments, and so on. Unfortunately, these customizations also introduce new vendor-specific software flaws, thus widening the attack surface of the Android OS and making it more prone to security, reliability and performance issues.