Presentation given at WiSec 2017 by Dr. Virendra Kumar. His, along with Drs. Jonathan Petit and William Whyte's, paper was one of six to receive the reproducibility label.
This presentation discusses the use of Garbled Circuits for improving security and simplifying implementation of Secure Credential Management Systems (SCMS) in the Automotive industry
This document discusses using quantum-safe cryptography to protect against future quantum computers. It proposes a "hybrid" approach where a FIPS-approved classical algorithm is used for conformance while a quantum-safe algorithm is also used to provide long-term security. Specifically, it examines using the "OtherInfo" field when deriving keys to include a quantum-safe symmetric key as part of the key derivation process. This would allow quantum-safe encryption of data even when using a FIPS-approved scheme for key establishment and compliance. However, it is unclear if including symmetric keys in "OtherInfo" is permitted by standards.
The document discusses the development of the IEEE 1609.2 standard for security in connected vehicles. It explores how the standard was created with only partial contributions from security experts. It aims to examine specific design decisions in the standard, how the divergence between the US and EU versions occurred, and lessons learned for developing security standards in the future. The goal is to understand how to create standards in a more transparent, robust way that avoids issues like regional incompatibility.
Connected vehicles will communicate vast amounts of sensitive data over networks, but securing these systems faces unique challenges. Hackers could potentially cause accidents, track drivers, or disable safety features. The automotive industry lacks the security expertise of IT, and adding security slows development. However, vehicle-to-vehicle communication shows promise for accident prevention if privacy and security are prioritized through new protocols, like changing identifiers frequently while authenticating messages through a certificate management system. Governments are now mandating security standards for connected cars to address these risks.
This presentation by OnBoard Security's Drew van Duren was given at the IEEE 4th World Forum on Internet of Things
05-08 February 2018 in Singapore. Topics covered include:
– Connected Vehicle Architectures and Applications
– IEEE 1609.2 V2X security stack and uses
– Issues and Lessons Learned in U.S. CV Pilots
– Potential Unmanned aircraft systems (Drones) applications
– Re-tasking V2X security to other uses
This document discusses misbehavior handling throughout the vehicle-to-vehicle (V2V) system lifecycle. It proposes decomposing misbehavior activity into four parts: local misbehavior detection, reporting, investigation, and revocation decision. It suggests considering these parts independently. The best available misbehavior detection algorithm will differ depending on available vehicle sensors. Administrative considerations like privacy and oversight are important. The document outlines two approaches to misbehavior detection - an open garden approach allowing various vehicle-side approaches, and a uniform approach. It recommends following the open garden approach when possible.
This document provides an overview of certificate management protocols for 1609.2 certificates used in vehicle-to-everything (V2X) communication. It describes the terminology, topology, interfaces, and lifecycles involved in issuing and managing different types of certificates within the Security Credential Management System (SCMS). The document outlines the processes for enrolling to receive certificates, requesting operational certificates, downloading certificates, and handling revocation. It also discusses the ASN.1 module structure used to specify the protocols and packet data units for each interface.
This document discusses using IEEE 1609.2 security standards for drone communications. It begins by overviewing current drone communication methods, including drone-to-drone, drone-to-controller, and drone-to-network. It then discusses needs for drone identification, tracking, and secure real-time communications. The document provides an overview of the IEEE 1609.2 security model used for vehicle-to-vehicle communications. It describes implementing 1609.2 in an experimental demo to securely transmit ADS-B messages between drones to enable collision avoidance. The demo showed 1609.2 could mitigate message spoofing and manipulation threats. Overall, the document argues IEEE 1609.2 is applicable for securing drone-to-drone and
This presentation discusses the use of Garbled Circuits for improving security and simplifying implementation of Secure Credential Management Systems (SCMS) in the Automotive industry
This document discusses using quantum-safe cryptography to protect against future quantum computers. It proposes a "hybrid" approach where a FIPS-approved classical algorithm is used for conformance while a quantum-safe algorithm is also used to provide long-term security. Specifically, it examines using the "OtherInfo" field when deriving keys to include a quantum-safe symmetric key as part of the key derivation process. This would allow quantum-safe encryption of data even when using a FIPS-approved scheme for key establishment and compliance. However, it is unclear if including symmetric keys in "OtherInfo" is permitted by standards.
The document discusses the development of the IEEE 1609.2 standard for security in connected vehicles. It explores how the standard was created with only partial contributions from security experts. It aims to examine specific design decisions in the standard, how the divergence between the US and EU versions occurred, and lessons learned for developing security standards in the future. The goal is to understand how to create standards in a more transparent, robust way that avoids issues like regional incompatibility.
Connected vehicles will communicate vast amounts of sensitive data over networks, but securing these systems faces unique challenges. Hackers could potentially cause accidents, track drivers, or disable safety features. The automotive industry lacks the security expertise of IT, and adding security slows development. However, vehicle-to-vehicle communication shows promise for accident prevention if privacy and security are prioritized through new protocols, like changing identifiers frequently while authenticating messages through a certificate management system. Governments are now mandating security standards for connected cars to address these risks.
This presentation by OnBoard Security's Drew van Duren was given at the IEEE 4th World Forum on Internet of Things
05-08 February 2018 in Singapore. Topics covered include:
– Connected Vehicle Architectures and Applications
– IEEE 1609.2 V2X security stack and uses
– Issues and Lessons Learned in U.S. CV Pilots
– Potential Unmanned aircraft systems (Drones) applications
– Re-tasking V2X security to other uses
This document discusses misbehavior handling throughout the vehicle-to-vehicle (V2V) system lifecycle. It proposes decomposing misbehavior activity into four parts: local misbehavior detection, reporting, investigation, and revocation decision. It suggests considering these parts independently. The best available misbehavior detection algorithm will differ depending on available vehicle sensors. Administrative considerations like privacy and oversight are important. The document outlines two approaches to misbehavior detection - an open garden approach allowing various vehicle-side approaches, and a uniform approach. It recommends following the open garden approach when possible.
This document provides an overview of certificate management protocols for 1609.2 certificates used in vehicle-to-everything (V2X) communication. It describes the terminology, topology, interfaces, and lifecycles involved in issuing and managing different types of certificates within the Security Credential Management System (SCMS). The document outlines the processes for enrolling to receive certificates, requesting operational certificates, downloading certificates, and handling revocation. It also discusses the ASN.1 module structure used to specify the protocols and packet data units for each interface.
This document discusses using IEEE 1609.2 security standards for drone communications. It begins by overviewing current drone communication methods, including drone-to-drone, drone-to-controller, and drone-to-network. It then discusses needs for drone identification, tracking, and secure real-time communications. The document provides an overview of the IEEE 1609.2 security model used for vehicle-to-vehicle communications. It describes implementing 1609.2 in an experimental demo to securely transmit ADS-B messages between drones to enable collision avoidance. The demo showed 1609.2 could mitigate message spoofing and manipulation threats. Overall, the document argues IEEE 1609.2 is applicable for securing drone-to-drone and
Transforming Security: Containers, Virtualization and SoftwarizationPriyanka Aash
This session will explore how we can leverage containers, network/endpoint virtualization technologies and virtualized security instrumentation, concurrently, to transformationally improve security visibility, security analytics, system resilience and actionable context, greatly increasing our ability to attest that systems will be secure and compliant in any state into which they may be driven.
(Source: RSA USA 2016-San Francisco)
Guillou-quisquater protocol for user authentication based on zero knowledge p...TELKOMNIKA JOURNAL
Authentication is the act of confirming the validity of someone’s personal data. In the traditional
authentication system, username and password are sent to the server for verification. However, this
scheme is not secure, because the password can be sniffed. In addition, the server will keep the user’s
password for the authentication. This makes the system vulnerable when the database server is hacked.
Zero knowledge authentication allows server to authenticate user without knowing the user’s password. In
this research, this scheme was implemented with Guillou-Quisquater protocol. Two login mechanisms
were used: file-based certificate with key and local storage. Testing phase was carried out based on the
Open Web Application Security Project (OWASP) penetration testing scheme. Furthermore, penetration
testing was also performed by an expert based on Acunetix report. Three potential vulnerabilities were
found and risk estimation was calculated. According to OWASP risk rating, these vulnerabilities were at the
medium level.
This document summarizes a research paper that proposes a new framework called Modified Secure Dynamic Path Identifiers (MDSPID) to enhance network security and prevent distributed denial-of-service (DDoS) flooding attacks. The MDSPID framework uses dynamically generated secure path identifiers that are verified with each packet, unlike existing static path identifiers that are insecure. It describes the MDSPID generation process, a timestamp mechanism for authentication, a two-level packet verification architecture, an experimental implementation in NS2 simulator, and performance analysis showing MDSPID improves metrics like packet delivery ratio and detection ratio while reducing packet loss and end-to-end delay compared to other approaches. The research aims to address security issues with static path identifiers and
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
Vehicular ad hoc networks are tremendously and very effectively used for safety related applications. Especially
for driver assistance and when it comes to safety of either from an accident or stealing of data VANET is the future of the all such problems.”A New Generation of Driver Assistance and Security” gives a idea about VANET and also provide solutions to various problems comes in this. Authentication will be provided by Group signature and Identity based (ID- based) Signature scheme. The scheme Provides cost effective, highly privacy
preserving of user, efficient message authentication and verification than existing system for VANETs. This
required CA (Central Authority) and LA (Local Authority) where LA is group leader and which has to concern with CA. This safety technique is efficient, robust, and scalable for VANET’s authentication and provide reallife solution match with the standard.
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware
http://www.radware.com/Products/DefenseFlow/
Learn about the industry's first SDN application that enables network operators to program the network to provide DDoS protection as a native network service.
This document is the final honors project report submitted by Antony Law comparing the security of simple versus complex passwords when implemented in WLAN security frameworks WPA and WPA2. The project aims to evaluate the impact of password complexity on resistance to password cracking attacks. An experiment will be conducted using the aircrack-ng and oclHashcat password cracking tools against various simple and complex password scenarios to determine differences in success rates and cracking times. The results will help understand how password complexity affects security and provide guidance to users on creating more secure passwords.
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanetijcisjournal
1) The document discusses an encryption algorithm to evaluate the performance of vehicle-to-vehicle (V2V) communication in vehicular ad hoc networks (VANETs).
2) The algorithm uses private key encryption for V2V communication between two vehicles. The vehicles agree on random numbers and perform calculations to derive a shared secret key.
3) The performance of the encryption algorithm is evaluated using the QualNet network simulator.
SDN Security: Two Sides of the Same CoinZivaro Inc
When it comes to Software Defined Networking (SDN) Security there are two sides of the story. This webinar addresses both sides – what security vulnerabilities exist in modern SDN technologies and how SDN technologies can create new security protections. Also included are use cases that SDN solutions can provide and the new applications of SDN that can secure modern enterprise and data center environments.
Presented by GTRI CTO, Scott Hogg, in a webinar on June 9, 2016. For more information, visit http://www.gtri.com/.
Security is a major concern in computer networking which faces increasing threats as the commercial
Internet and related economies continue to grow. Virtualization technologies enabling
scalable Cloud services pose further challenges to the security of computer infrastructures,
demanding novel mechanisms combining the best-of-breed to counter certain types of attacks
. Our work aims to explore advances in Cyber Threat Intelligence (CTI) in the context of
Software Defined Networking (SDN) architectures. While CTI represents a recent approach
to combat threats based on reliable sources, by sharing information and knowledge about
computer criminal activities, SDN is a recent trend in architecting computer networks based
on modularization and programmability principles. In this dissertation, we propose IntelFlow,
an intelligent detection system for SDN that follows a proactive approach using OpenFlow
to deploy countermeasures to the threats learned through a distributed intelligent plane. We
show through a proof of concept implementation that the proposed system is capable of delivering
a number of benefits in terms of effectiveness, altogether contributing to the security
of modern computer network designs.
An Identity-Based Mutual Authentication with Key Agreementijtsrd
Now days mobile networks are rapid development by performing the e-commerce transaction such as online shopping, internet banking and e- payment. So that to provide secure communication, authentication and key agreement is important issue in the mobile networks. Hence, schemes for authentication and key agreement have been studied widely. So that to provide efficient and more secure techniques is necessary. In this paper we are proposed random prime order key agreement protocol proposed for authentication and key agreement. Another technique is used to provide security of transferred data using key xor data transpose technique. By using this technique, we provide more security and more efficiency for transferring data. B. V. S. Manikya Rao | Y. Triveni "An Identity-Based Mutual Authentication with Key Agreement" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21562.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-security/21562/an-identity-based-mutual-authentication-with-key-agreement/b-v-s-manikya-rao
This document discusses software defined networking (SDN) security. It outlines the SDN attack surface, including vulnerabilities found in SDN controllers that are exposed via the data plane. Recent vulnerabilities in Netconf, host tracking, and packet handling are described. Defensive technologies like Topoguard and security-mode ONOS are presented. Best practices for open source security response and secure engineering are discussed. The current status and vision for OpenDaylight (ODL) security response and engineering are outlined.
IRJET- Secure Kerberos System in Distributed EnvironmentIRJET Journal
This document proposes a secure Kerberos system using AES encryption in a distributed environment. Kerberos is an authentication system that allows clients to securely access networked services. The proposed system uses a new sub-session key for communication between clients and servers to prevent attacks. Tickets in this system include explicit start and end times to allow for arbitrary lifetimes. The system architecture includes an authentication server, ticket granting server, and application server. The authentication server issues a ticket-granting ticket to the client, which can then be used to request service tickets from the ticket granting server. These tickets and authentication messages are encrypted using symmetric keys to allow for secure authentication and prevent replay attacks.
This document provides an overview of network security topics including digital signatures, authentication protocols, and authentication applications like Kerberos and X.509. Digital signatures allow verification of author, date, time and message contents. Authentication protocols are used to verify identity and exchange session keys, addressing issues like confidentiality, timeliness, and replay attacks. Kerberos is a centralized authentication system that allows users to securely access network services without trusting individual workstations, using tickets and encryption. X.509 is a public key directory service for authentication.
A look at current cyberattacks in UkraineKaspersky
Kaspersky researchers have been monitoring the activity of APT actors, cybercriminals and hacktivists currently involved in the conflict in Ukraine. During this webinar, the Global Research and Analysis Team (GReAT) will share their findings on the most recent cyberattacks targeting Ukraine and present their observations, analysis and top findings.
- The types of attacks that have been targeting Ukraine for the past few months
- The results of analysis on destructive attacks and malware (HermeticWiper, etc...)
- How organizations can defend themselves against cyberattacks
GReAT, Kaspersky’s Global Research and Analysis Team, consists of 40 researchers based around the world that work on uncovering APTs, cyberespionage campaigns, major malware, ransomware and underground cybercriminal trends across the world.
This document summarizes a presentation on analyzing the security of smart locks. It defines IoT and describes the target smart lock device. It details analyzing the device components and chipset, reverse engineering the mobile app, intercepting BLE communications, and finding vulnerabilities in the API and BLE authentication that allow exploiting the lock. Solutions proposed include updating firmware to add BLE crypto and adding authentication to the API backend.
This document provides an overview of software-defined networking (SDN) security. It begins with an introduction to SDN and explains how decoupling the control plane from the data plane creates new attack surfaces. It then discusses recent SDN vulnerabilities in OpenDaylight and ONOS controllers. Defensive technologies like Topoguard and security-mode ONOS are presented. The document concludes with recommendations for secure SDN development practices and outlines the current security status and vision for OpenDaylight.
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analys...Ivan Ruchkin
This document proposes an analysis contracts approach to address inter-domain vulnerabilities in cyber-physical systems. It describes analyzing a braking subsystem to determine sensor trustworthiness and secure control. Formal analysis contracts specify inputs, outputs, assumptions and guarantees for failure mode analysis, trustworthiness analysis and secure control analysis. The contracts approach aims to verify analyses are correctly executed to prevent vulnerabilities introduced offline from being exploited online. Future work includes developing richer behavioral and probabilistic contracts and validating the approach on other systems.
Tools Of The Hardware Hacking Trade FinalPriyanka Aash
This document provides an overview of various tools that can be used for hardware hacking and analysis. It discusses tools for tasks like information gathering, device teardown, interface monitoring and analysis, and firmware extraction. Specific tools covered include oscilloscopes, logic analyzers, protocol analyzers, the Bus Pirate, USB-to-serial adapters, software defined radios, soldering equipment, device programmers, debug tools, and imaging equipment like x-rays and electron microscopes. Examples are given of how several of these tools have been used in past hardware analyses and attacks. The document concludes by encouraging the reader to set up a hardware hacking lab and collaborate with others to stay up-to-date on new tools and techniques.
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....Shah Sheikh
This document introduces BetWorm, a defensive worm created by the author to perform penetration testing and security assessments from an attacker's perspective within an organization's internal network. BetWorm spreads through authenticated SSH connections and maps vulnerable systems by collecting information, detecting weaknesses, analyzing attack surfaces, and emulating malicious connections. The author explains how BetWorm currently functions and future plans to improve its abilities to more quickly scan networks, save collected data to a command and control server, include a local web server, support both Linux and Windows, and provide a graphical user interface. A link is provided to access BetWorm's source code on GitHub.
functions of data link layer is flow control and error control.
Two categories of flow control:
Stop-and-wait
Send one frame at a time.
Sliding window
Send several frames at a time.
Hamming codes, like polynomial codes, are appended to the transmitted message
Hamming codes, unlike polynomial codes, contain the information necessary to locate a single bit error
In IEEE 802.3 Ethernet Data link layer is split into two sublayers:
Bottom part: MAC
The frame is called IEEE 802.3
Handles framing, MAC addressing, Medium Access control
PREAMBLE
8 bytes with pattern 10101010 used to synchronize receiver, sender clock rates.
In IEEE 802.3, eighth byte is start of frame (10101011)
Addresses: 6 bytes (explained latter)
Type (DIX)
Indicates the type of the Network layer protocol being carried in the payload (data) field, mostly IP but others may be supported such as IP (0800), Novell IPX (8137) and AppleTalk (809B), ARP (0806) )
Allow multiple network layer protocols to be supported on a single machine
(multiplexing)
Its value starts at 0600h (=1536 in decimal)
Length (IEEE 802.3): number of bytes in the data field.
Maximum 1500 bytes (= 05DCh)
CRC: checked at receiver, if error is detected, the frame is discarded
CRC-32
Data: carries data encapsulated from the upper-layer protocols
Pad: Zeros are added to the data field to make the minimum data length = 46 bytes
This document describes a vehicle theft detection system that uses radio frequency identification (RFID) technology. The system involves embedding an RFID chip in each vehicle that continuously transmits a unique identification signal. When a vehicle is stolen, the owner reports it to the police, who upload the vehicle's information to a central database. Police vehicles are equipped with RFID receivers. If a stolen vehicle passes within range of a receiver, the receiver detects the vehicle's ID signal and displays its details on a tablet. This allows police to quickly identify and recover stolen vehicles. The system aims to make it difficult for thieves to hide a vehicle's identity and allows vehicles to be tracked globally wherever the detection system is implemented.
Transforming Security: Containers, Virtualization and SoftwarizationPriyanka Aash
This session will explore how we can leverage containers, network/endpoint virtualization technologies and virtualized security instrumentation, concurrently, to transformationally improve security visibility, security analytics, system resilience and actionable context, greatly increasing our ability to attest that systems will be secure and compliant in any state into which they may be driven.
(Source: RSA USA 2016-San Francisco)
Guillou-quisquater protocol for user authentication based on zero knowledge p...TELKOMNIKA JOURNAL
Authentication is the act of confirming the validity of someone’s personal data. In the traditional
authentication system, username and password are sent to the server for verification. However, this
scheme is not secure, because the password can be sniffed. In addition, the server will keep the user’s
password for the authentication. This makes the system vulnerable when the database server is hacked.
Zero knowledge authentication allows server to authenticate user without knowing the user’s password. In
this research, this scheme was implemented with Guillou-Quisquater protocol. Two login mechanisms
were used: file-based certificate with key and local storage. Testing phase was carried out based on the
Open Web Application Security Project (OWASP) penetration testing scheme. Furthermore, penetration
testing was also performed by an expert based on Acunetix report. Three potential vulnerabilities were
found and risk estimation was calculated. According to OWASP risk rating, these vulnerabilities were at the
medium level.
This document summarizes a research paper that proposes a new framework called Modified Secure Dynamic Path Identifiers (MDSPID) to enhance network security and prevent distributed denial-of-service (DDoS) flooding attacks. The MDSPID framework uses dynamically generated secure path identifiers that are verified with each packet, unlike existing static path identifiers that are insecure. It describes the MDSPID generation process, a timestamp mechanism for authentication, a two-level packet verification architecture, an experimental implementation in NS2 simulator, and performance analysis showing MDSPID improves metrics like packet delivery ratio and detection ratio while reducing packet loss and end-to-end delay compared to other approaches. The research aims to address security issues with static path identifiers and
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
Vehicular ad hoc networks are tremendously and very effectively used for safety related applications. Especially
for driver assistance and when it comes to safety of either from an accident or stealing of data VANET is the future of the all such problems.”A New Generation of Driver Assistance and Security” gives a idea about VANET and also provide solutions to various problems comes in this. Authentication will be provided by Group signature and Identity based (ID- based) Signature scheme. The scheme Provides cost effective, highly privacy
preserving of user, efficient message authentication and verification than existing system for VANETs. This
required CA (Central Authority) and LA (Local Authority) where LA is group leader and which has to concern with CA. This safety technique is efficient, robust, and scalable for VANET’s authentication and provide reallife solution match with the standard.
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware
http://www.radware.com/Products/DefenseFlow/
Learn about the industry's first SDN application that enables network operators to program the network to provide DDoS protection as a native network service.
This document is the final honors project report submitted by Antony Law comparing the security of simple versus complex passwords when implemented in WLAN security frameworks WPA and WPA2. The project aims to evaluate the impact of password complexity on resistance to password cracking attacks. An experiment will be conducted using the aircrack-ng and oclHashcat password cracking tools against various simple and complex password scenarios to determine differences in success rates and cracking times. The results will help understand how password complexity affects security and provide guidance to users on creating more secure passwords.
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanetijcisjournal
1) The document discusses an encryption algorithm to evaluate the performance of vehicle-to-vehicle (V2V) communication in vehicular ad hoc networks (VANETs).
2) The algorithm uses private key encryption for V2V communication between two vehicles. The vehicles agree on random numbers and perform calculations to derive a shared secret key.
3) The performance of the encryption algorithm is evaluated using the QualNet network simulator.
SDN Security: Two Sides of the Same CoinZivaro Inc
When it comes to Software Defined Networking (SDN) Security there are two sides of the story. This webinar addresses both sides – what security vulnerabilities exist in modern SDN technologies and how SDN technologies can create new security protections. Also included are use cases that SDN solutions can provide and the new applications of SDN that can secure modern enterprise and data center environments.
Presented by GTRI CTO, Scott Hogg, in a webinar on June 9, 2016. For more information, visit http://www.gtri.com/.
Security is a major concern in computer networking which faces increasing threats as the commercial
Internet and related economies continue to grow. Virtualization technologies enabling
scalable Cloud services pose further challenges to the security of computer infrastructures,
demanding novel mechanisms combining the best-of-breed to counter certain types of attacks
. Our work aims to explore advances in Cyber Threat Intelligence (CTI) in the context of
Software Defined Networking (SDN) architectures. While CTI represents a recent approach
to combat threats based on reliable sources, by sharing information and knowledge about
computer criminal activities, SDN is a recent trend in architecting computer networks based
on modularization and programmability principles. In this dissertation, we propose IntelFlow,
an intelligent detection system for SDN that follows a proactive approach using OpenFlow
to deploy countermeasures to the threats learned through a distributed intelligent plane. We
show through a proof of concept implementation that the proposed system is capable of delivering
a number of benefits in terms of effectiveness, altogether contributing to the security
of modern computer network designs.
An Identity-Based Mutual Authentication with Key Agreementijtsrd
Now days mobile networks are rapid development by performing the e-commerce transaction such as online shopping, internet banking and e- payment. So that to provide secure communication, authentication and key agreement is important issue in the mobile networks. Hence, schemes for authentication and key agreement have been studied widely. So that to provide efficient and more secure techniques is necessary. In this paper we are proposed random prime order key agreement protocol proposed for authentication and key agreement. Another technique is used to provide security of transferred data using key xor data transpose technique. By using this technique, we provide more security and more efficiency for transferring data. B. V. S. Manikya Rao | Y. Triveni "An Identity-Based Mutual Authentication with Key Agreement" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21562.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-security/21562/an-identity-based-mutual-authentication-with-key-agreement/b-v-s-manikya-rao
This document discusses software defined networking (SDN) security. It outlines the SDN attack surface, including vulnerabilities found in SDN controllers that are exposed via the data plane. Recent vulnerabilities in Netconf, host tracking, and packet handling are described. Defensive technologies like Topoguard and security-mode ONOS are presented. Best practices for open source security response and secure engineering are discussed. The current status and vision for OpenDaylight (ODL) security response and engineering are outlined.
IRJET- Secure Kerberos System in Distributed EnvironmentIRJET Journal
This document proposes a secure Kerberos system using AES encryption in a distributed environment. Kerberos is an authentication system that allows clients to securely access networked services. The proposed system uses a new sub-session key for communication between clients and servers to prevent attacks. Tickets in this system include explicit start and end times to allow for arbitrary lifetimes. The system architecture includes an authentication server, ticket granting server, and application server. The authentication server issues a ticket-granting ticket to the client, which can then be used to request service tickets from the ticket granting server. These tickets and authentication messages are encrypted using symmetric keys to allow for secure authentication and prevent replay attacks.
This document provides an overview of network security topics including digital signatures, authentication protocols, and authentication applications like Kerberos and X.509. Digital signatures allow verification of author, date, time and message contents. Authentication protocols are used to verify identity and exchange session keys, addressing issues like confidentiality, timeliness, and replay attacks. Kerberos is a centralized authentication system that allows users to securely access network services without trusting individual workstations, using tickets and encryption. X.509 is a public key directory service for authentication.
A look at current cyberattacks in UkraineKaspersky
Kaspersky researchers have been monitoring the activity of APT actors, cybercriminals and hacktivists currently involved in the conflict in Ukraine. During this webinar, the Global Research and Analysis Team (GReAT) will share their findings on the most recent cyberattacks targeting Ukraine and present their observations, analysis and top findings.
- The types of attacks that have been targeting Ukraine for the past few months
- The results of analysis on destructive attacks and malware (HermeticWiper, etc...)
- How organizations can defend themselves against cyberattacks
GReAT, Kaspersky’s Global Research and Analysis Team, consists of 40 researchers based around the world that work on uncovering APTs, cyberespionage campaigns, major malware, ransomware and underground cybercriminal trends across the world.
This document summarizes a presentation on analyzing the security of smart locks. It defines IoT and describes the target smart lock device. It details analyzing the device components and chipset, reverse engineering the mobile app, intercepting BLE communications, and finding vulnerabilities in the API and BLE authentication that allow exploiting the lock. Solutions proposed include updating firmware to add BLE crypto and adding authentication to the API backend.
This document provides an overview of software-defined networking (SDN) security. It begins with an introduction to SDN and explains how decoupling the control plane from the data plane creates new attack surfaces. It then discusses recent SDN vulnerabilities in OpenDaylight and ONOS controllers. Defensive technologies like Topoguard and security-mode ONOS are presented. The document concludes with recommendations for secure SDN development practices and outlines the current security status and vision for OpenDaylight.
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analys...Ivan Ruchkin
This document proposes an analysis contracts approach to address inter-domain vulnerabilities in cyber-physical systems. It describes analyzing a braking subsystem to determine sensor trustworthiness and secure control. Formal analysis contracts specify inputs, outputs, assumptions and guarantees for failure mode analysis, trustworthiness analysis and secure control analysis. The contracts approach aims to verify analyses are correctly executed to prevent vulnerabilities introduced offline from being exploited online. Future work includes developing richer behavioral and probabilistic contracts and validating the approach on other systems.
Tools Of The Hardware Hacking Trade FinalPriyanka Aash
This document provides an overview of various tools that can be used for hardware hacking and analysis. It discusses tools for tasks like information gathering, device teardown, interface monitoring and analysis, and firmware extraction. Specific tools covered include oscilloscopes, logic analyzers, protocol analyzers, the Bus Pirate, USB-to-serial adapters, software defined radios, soldering equipment, device programmers, debug tools, and imaging equipment like x-rays and electron microscopes. Examples are given of how several of these tools have been used in past hardware analyses and attacks. The document concludes by encouraging the reader to set up a hardware hacking lab and collaborate with others to stay up-to-date on new tools and techniques.
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....Shah Sheikh
This document introduces BetWorm, a defensive worm created by the author to perform penetration testing and security assessments from an attacker's perspective within an organization's internal network. BetWorm spreads through authenticated SSH connections and maps vulnerable systems by collecting information, detecting weaknesses, analyzing attack surfaces, and emulating malicious connections. The author explains how BetWorm currently functions and future plans to improve its abilities to more quickly scan networks, save collected data to a command and control server, include a local web server, support both Linux and Windows, and provide a graphical user interface. A link is provided to access BetWorm's source code on GitHub.
functions of data link layer is flow control and error control.
Two categories of flow control:
Stop-and-wait
Send one frame at a time.
Sliding window
Send several frames at a time.
Hamming codes, like polynomial codes, are appended to the transmitted message
Hamming codes, unlike polynomial codes, contain the information necessary to locate a single bit error
In IEEE 802.3 Ethernet Data link layer is split into two sublayers:
Bottom part: MAC
The frame is called IEEE 802.3
Handles framing, MAC addressing, Medium Access control
PREAMBLE
8 bytes with pattern 10101010 used to synchronize receiver, sender clock rates.
In IEEE 802.3, eighth byte is start of frame (10101011)
Addresses: 6 bytes (explained latter)
Type (DIX)
Indicates the type of the Network layer protocol being carried in the payload (data) field, mostly IP but others may be supported such as IP (0800), Novell IPX (8137) and AppleTalk (809B), ARP (0806) )
Allow multiple network layer protocols to be supported on a single machine
(multiplexing)
Its value starts at 0600h (=1536 in decimal)
Length (IEEE 802.3): number of bytes in the data field.
Maximum 1500 bytes (= 05DCh)
CRC: checked at receiver, if error is detected, the frame is discarded
CRC-32
Data: carries data encapsulated from the upper-layer protocols
Pad: Zeros are added to the data field to make the minimum data length = 46 bytes
This document describes a vehicle theft detection system that uses radio frequency identification (RFID) technology. The system involves embedding an RFID chip in each vehicle that continuously transmits a unique identification signal. When a vehicle is stolen, the owner reports it to the police, who upload the vehicle's information to a central database. Police vehicles are equipped with RFID receivers. If a stolen vehicle passes within range of a receiver, the receiver detects the vehicle's ID signal and displays its details on a tablet. This allows police to quickly identify and recover stolen vehicles. The system aims to make it difficult for thieves to hide a vehicle's identity and allows vehicles to be tracked globally wherever the detection system is implemented.
This document proposes a system to help police more quickly locate stolen vehicles. It involves embedding a unique identification chip in each vehicle that continuously transmits the vehicle's ID. When a vehicle is reported stolen, its information is uploaded to a server database. Police vehicles equipped with receivers can detect the ID of a stolen vehicle if it comes into range. This allows police to obtain details about the vehicle like its registration and location to aid recovery. The system aims to make a vehicle's identity impossible to hide globally wherever the tracking system is available. Key components are RF transmitter and receiver circuits in vehicles and with police to facilitate communication between the vehicle ID and receiver.
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESIRJET Journal
This document proposes a lightweight payment verification system using blockchain technology for IoT devices. It describes implementing a basic payment verification blockchain coding in Python and deploying it on an ESP8266 IoT development kit. The system uses RFID cards to store user payment information and verify transactions in real-time. When an RFID card is scanned, the user's data is added as a new block to the blockchain ledger. Each new block contains a hash of the previous block, linking the blocks together and making the record tamper-proof. This allows secure payment verification even on low-powered IoT devices.
The document discusses circuit switching vs packet switching networks, with circuit switching reserving bandwidth for constant real-time communication but being less efficient than packet switching which allocates bandwidth on demand. It also describes how botnets can compromise many devices to perform distributed denial of service attacks by recruiting devices to target servers.
Web3’s red pill: Smashing Web3 transaction simulations for fun and profitTal Be'ery
The introduction of Web3 smart contracts has opened unlimited opportunities for decentralized apps (dApps) and users. With smart contracts, anything that can be coded can be deployed by anyone on the blockchain. As a result, in a Web3 environment, the users’ blockchain transactions, previously merely used for sending coins to peers, are now, in fact, Remote Procedure Calls (RPCs) for smart contracts.
The flip side of this expressiveness is that it’s almost impossible to know analytically in advance what would be the outcome of such RPC to an arbitrary smart contract. Attackers abuse this observability gap to trick users into signing transactions that are harmful in reality. This situation bears a close resemblance to the desktop environment: users need to evaluate in advance if a particular program behavior will be benign.
To solve this gap, Web3 security has taken a page out of the desktop’s security book by using a sandbox-style emulation to evaluate the transaction's outcome before it gets sent to the blockchain. In Web3 lingo, such sandbox emulation is referred to as transaction simulation.
In this talk, we will present our newly discovered attack methods against Web3 simulations, including the first-ever Web3 red pill exploits that allow smart contracts to know that they are running in a simulation and as a result, need to behave differently.
We have tested our findings against numerous leading simulation providers in the Ethereum Virtual Machine (EVM) domain and found that they are indeed vulnerable to such attacks. As a result of our responsible disclosure, multiple (currently three) issues were fixed, and we were awarded bug bounties. We will explain these exploits in detail, including the research methodology allowing us to inspect simulators’ inaccessible inner workings.
We will conclude with new and enlightening insights we gained through this research regarding the true capabilities and limitations of Web3 simulations.
5-LEC- 5.pptxTransport Layer. Transport Layer ProtocolsZahouAmel1
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transport Layer.
Transport Layer Protocols
Transpor
The Role Of Software And Hardware As A Common Part Of The...Sheena Crouch
This document discusses the implementation of a software-defined networking (SDN) system using Field Programmable Gate Arrays (FPGAs). It describes an SDN switch core that can modify packet headers based on flow tables and forward packets to different ports. An SDN controller programmed the flow tables and monitored packet flows. Attacker nodes, implemented with a Microblaze processor, transmitted packets to the SDN switch network at programmable rates. The system allowed observation and testing of the SDN switches and network. Hardware and software implementations are discussed to realize the SDN system on FPGAs.
This document provides an overview of Sigfox and how to communicate using Sigfox networks. Some key points:
- Sigfox is a network operator that provides connectivity for low-bandwidth IoT devices using its proprietary radio protocol.
- The Sigfox protocol is designed for energy efficiency to enable battery-powered devices to send small payloads up to 140 times per day.
- Developers can get started easily by sending simple AT commands to Sigfox modules to transmit 12-byte payloads over the global Sigfox network.
- The document covers Sigfox concepts like ultra narrowband communication, security, and how developers can receive uplink data and send downlink messages to devices through the Sigfox backend and callbacks
This session covered cyber security and ethical hacking topics such as network hacking, Kali Linux, IPV4 vs IPV6, MAC addresses, wireless hacking techniques like deauthentication attacks, cracking WEP and WPA encryption, and post-connection attacks including ARP spoofing and MITM attacks. The presenter emphasized the importance of securing networks by using strong passwords, disabling WPS, and enabling HTTPS to prevent hacking attempts.
This document provides an overview of the data link layer. It discusses several key topics:
1. The data link layer is the second layer of the OSI model and receives data from the physical layer and sends it to the network layer. It makes the physical layer appear error-free.
2. The data link layer is responsible for moving frames from one node to the next. It provides error control, addressing, framing, and flow control.
3. Error control techniques include error detection using parity checks, cyclic redundancy checks, and checksums. Error correction uses retransmission or forward error correction.
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)Igalia
By Andy Wingo.
Refreshing your Twitter feed is such a drag over 3G, taking forever to connect and fetch those precious kilobytes. The reasons for this go deep into the architecture of the internet: making an HTTPS connection simply has terrible latency.
So let’s fix the internet! MinimaLT is an exciting new network protocol that connects faster than TCP, is more secure than TLS (crypto by DJ Bernstein), and allows mobile devices to keep connections open as they change IP addresses. This talk presents the MinimaLT protocol and a Node library that allows JS hackers to experimentally build a new Internet.
A broad-ranging introduction into Blockchain, the Mental Models to use to think about its implications (Blockchain as a Database, as a City and as a Continent); and a technical introduction into the key ingredients to build a blockchain as well as dApps.
This paper develops a hardware architecture for cryptanalyzing the KeeLoq block cipher using the Cost-Optimized Parallel Code Breaker (COPACOBANA). The system is able to recover the secret key of a remote control in under 0.5 seconds if a 32-bit seed is used, less than 6 hours for a 48-bit seed, and around 1011 days for a 60-bit seed. The attack is massively parallelizable across multiple COPACOBANAs, reducing the time required. Using less than a 60-bit seed provides little security against this type of brute force hardware attack.
The prevalence of computers in form of so called "smart" devices embedded in our everyday environment is inevitable. From pentester's perspective, the adjective "smart" at first glance can hardly be used to describe their inventors and ambassadors.
Based on a few examples (i.a. BTLE beacons, smart meters, security cameras...) I will show how easily "smart" devices can be outsmarted. Sometimes you don't even need any 'hacking' skills, or the default configuration is wide-open. But are we doomed? What are the conditions for real threat? Can the vulnerabilities be exploited anonymously and as easily as in web application? Where is the physical border the intruder would be likely to cross? The risks involved are usually different, but does it mean we don't have to worry? Are we sure how to use securely the emerging technology?
The document discusses various topics related to the data link layer, including:
- Data link control, error detection techniques like CRC, error correction using Hamming codes, and MAC protocols.
- Common LAN technologies like Ethernet, Token Ring, Token Bus, Wireless LAN, and Bluetooth.
- Networking devices that connect different networks like bridges, switches, routers, and gateways. Bridges connect segments at the data link layer while routers connect at the network layer.
- Ethernet standards including 10Base5, 10Base2, 10BaseT, Fast Ethernet, Gigabit Ethernet, and 10Gbps Ethernet. Ethernet uses CSMA/CD for medium access.
- Token
The document discusses real-time embedded communication and networking concepts. It describes explicit and implicit flow control, where explicit uses acknowledgments and implicit relies on redundancy. Media access control methods like TDMA, polling, token passing, and CSMA/CD are explained. Controller Area Network (CAN) is introduced as an example real-time embedded network protocol.
Omni gprs+gps+ble (permenant connection) smart lock air interface protocol v0...zeroormax1
The document describes the communication protocols between a smart bike lock and server or app. It includes:
1) The overall framework which uses Bluetooth and TCP protocols.
2) Bluetooth communication details such as packet format, encryption, and commands for unlocking, locking, status queries.
3) TCP communication details such as command lists for unlocking, locking, positioning, with parameters for device code, IMEI, timestamps.
Similar to Binary Hash Tree based Certificate Access Management for Connected Vehicles (BCAM) (20)
This presentation on Lattice-based Digital Signatures from April 2018 was given to the Chinese academy of science from OnBoard Security's Zhenfei Zhang.
This document provides a short review of the NTRU cryptosystem. It begins with an outline introducing NTRU lattice, NTRUEncrypt, pqNTRUSign, and the conclusion. It then discusses why lattice-based cryptography is important, particularly with the threat of quantum computers. It provides background on lattice cryptography and the NTRU lattice, describing the NTRU ring and the NTRU assumption. The document focuses on introducing the key concepts behind the NTRU cryptosystem in under 3 sentences.
This document summarizes the key findings of a survey conducted by the Ponemon Institute regarding automotive cybersecurity. Some of the main points from the survey include:
- There is a growing concern among automakers and suppliers that hackers are actively targeting modern connected vehicles. However, organizations are not prioritizing security.
- A lack of skilled security personnel and pressure to meet deadlines are hindering secure development practices. Cryptography use and legacy systems are also issues.
- While security responsibility is unclear, respondents believe the most challenging aspects of securing vehicles are the expenses involved, the time added to development, and lack of formal requirements and policies.
The survey of 524 automotive software professionals found:
1) Security is not fully integrated into development processes and developers lack training on secure development practices.
2) Nearly half believe a major overhaul of automotive technology architecture is needed to improve security.
3) There is uncertainty around whether a hack-proof vehicle can be built, with pressures around costs, timelines, and prioritization of security.
This document discusses security challenges and successes for connected vehicles. It outlines how the Secure Credential Management System (SCMS) has been developed and implemented to securely provision vehicle credentials. It also describes how a threat analysis framework identifies device security requirements based on analyzing data confidentiality, integrity and availability levels. Key challenges discussed are how to securely provision device certificates without frequent connectivity and how to balance privacy and misbehavior detection for credential revocation.
Scaling secure systems like vehicle-to-vehicle communication presents challenges around growing the number of devices, maintaining them securely over long periods of time, and managing privacy across international borders. The biggest constraint is ensuring the many human decisions needed are made correctly and at scale. Centralizing some decisions, like device certification requirements and revocation criteria, while decentralizing others, like authorization, can help reduce the number of human judgments needed. Proper data management is also crucial to balance security, privacy, and accountability. Attention to future threats from quantum computers and evolving standards will further support scalability over time.
More from OnBoard Security, Inc. - a Qualcomm Company (6)
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
15. Binary Tree Encoding
Encoding Size Decoding Time
Unique index of each
published node
r * log2(n/r) * (log2(n) + 1)
number of published nodes
Same as searching
Unique index of each
revoked leaf node
r * log2(n)
No efficient algorithm
known
n: number of leaf-nodes, r: number of revoked vehicles, 1 ≤ r ≤ n/2
Can we get the best of both worlds? 15
16. A New Algorithm for Full Binary Trees
Observations:
1. Topology known, only need to know which
nodes are published and which are omitted.
2. Subtree of a published node can be ignored
without any loss of information.
Encoding:
1. Start from root with an empty string.
2. Do breadth-first traversal.
1. Append 0 for revoked node.
2. Append 1 for published node.
3. Do nothing for derived node.
0
0 0
1 0 0 1
0 1 0 0
0 00 1001 0100Encoded string:
Disclaimer: Authors are not aware of any prior art with equivalent encoding sizes and decoding times.
1 2
3
Published nodes: 00, 11, 011
16
17. A New Algorithm for Full Binary Trees Contd.
Decoding:
1. Start from root and process 1 level at a time.
2. At every level, look at the bit of interest
1. If 0, go to next level.
2. If 1, output the number of 1s so far, and stop.
Example (vehicle 3 011):
Disclaimer: Authors are not aware of any prior art with equivalent encoding sizes and decoding times.
Encoding: 0 00 1001 0100
Bits at a level:
# bits before bit of interest: 0
# bits after bit of interest: 0
Rules for going to next level:
1. # bits before = 2 * (# 0s in bits before bit of interest)
2. Add 1 to (# bits before), if next bit of vehicle ID is 1.
3. # bits after = 2 * (# 0s in bits after bit of interest)
4. Add 1 to (# bits after), if next bit of vehicle ID is 0.
bit of interest
Vehicle ID bit
Bits at a level:
# bits before bit of interest: 0
# bits after bit of interest: 1
Bits at a level:
# bits before bit of interest: 1
# bits after bit of interest: 2
Bits at a level:
# bits before bit of interest: 1
# bits after bit of interest: 2
3
1 2
3
17
18. Efficiency of Encoding Algorithm
Encoding size
– # published nodes ≈ # revoked nodes, i.e. encoding has roughly the same
number of 0s and 1s.
– Size ≈ 2*r*log2(n/r)
– For n=240, r=1,000, encoding takes less than 1% of the full packet, i.e. about 20
times smaller than using unique index of each published node.
Decoding time
– Breadth-first but queue size ≤ r.
– For n=240, r=10,000, a consumer laptop (2.7 GHz Intel Core i7, 16GB RAM) takes
less than 3 milliseconds on average.
18
n: number of leaf-nodes, r: number of revoked vehicles, 1 ≤ r ≤ n/2
19. “Not all compromises are created equal.”
Software Compromise Hardware Compromise
Can be easily replicated and spread quickly Most likely require specialized hardware
Can be easily fixed by over-the-air updates Most likely need to replace the hardware
Attack can be distributed over the Internet
requiring less effort and resources
Most likely require lot of effort and resources
19
20. “So, we treat them differently.”
Software compromise “soft revocation list”
0 1 2 3 4 5 6 7 8 9 …
A compromised vehicle is put on the SRL first, by flipping its bit.
If the vehicle on SRL continues to misbehave, it is “hard” revoked via
binary tree approach.
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 …1 1 1
20
21. Conclusion
Positives
– No need of bidirectional connectivity for certificate download
– Revocation enforced at sender
Soft/hard revocation prevent sender from sending valid messages
Receivers don’t need to store revocation information
Scales naturally, can handle a much higher rate of revocation than current system
– Vehicles can be unrevoked
Vehicles revoked in error
Vehicles whose issues have been addressed
Negatives
– Less agile
– Longer CA lifetimes
Our belief is that positives outweigh the negatives. We hope you feel the same.
21
positives