A large amount of current malware uses various anti-virtual-machine techniques in order to avoid detection by analysis. These techniques allow the malware to detect the virtual machine which will then execute a benign action or simply do nothing. Many of these techniques are bases on finding specific files in the system or consulting some windows registry keys. The purpose of this research is to study the characteristics of the ORacle Virtual Box virtualized system and try to replicate the configuration on a physical computer, in order to trick malware into thinking it is in a virtual environment and thus not triggering its execution.
Someone deployed their application as a Docker container. Then another someone came along and hacked it. Then everyone starts looking at you asking, "How did this happen?"
This talk goes into how to extract the forensics artifacts of a Docker container, both if it was still running on a live system (easy) and if you must start from a cold disk image (harder).
A cheatsheet of the high points of this talk is also available here: https://www.didactic-security.com/resources/docker-forensics-cheatsheet.pdf
The video of this presentation at BSides RDU 2018 is online here: https://youtu.be/esj_NoTsywU?t=3667
With the unemployment rate near 7%, why are we still in the situation where employers cannot find enough of the right candidates to fill their open positions?
The method of hiring top talent has changed-- no longer is it just about salary, benefits and location, but how a company can become an “Employer of Choice”. Top employers know the keys of attracting better talent and getting their teams to perform at the highest level. Winning the Talent War presented a clear strategy to recruiting the right people, building a high performing culture and creating an employer brand, all of which will put you in the lead to becoming a top desirable employer and on the road to winning the talent war.
Lee-Anne Scalley of OneInAMil and John Smith of BreakTheEquation teamed up to bring you a detailed presentation on how employment has drastically changed in the last three years and how to be a winner on the talent battlefield.
This person enjoys a variety of sweet and savory foods like pizza, cake, cookies, vanilla cupcakes, and pancakes. Their interests include the video games Plants vs. Zombies, Minecraft, and Portal 2.
The document discusses the importance of digital marketing and optimization for local businesses. It notes that 87% of local online searches lead to inquiries or visits to businesses found online. It also states that mobile marketing will account for 21% of all marketing spending in 2014 as advertisers shift funds from traditional to digital channels. The document provides tips for businesses to implement a digital strategy, including establishing goals, listening to customer feedback, engaging audiences across appropriate channels, and analyzing results to optimize efforts.
Culture, the ultimate competitive advantageJohn E. Smith
Jim Goodnight, CEO of SAS Institute, famously stated that "95% of my assets drive out the front gate every evening. It’s my job to bring them back." These "assets" that Mr. Goodnight speaks of are his employees, his team members. Ranked #1 for the second year in a row on the 2011 Forbes' Best Places to Work list, SAS and Mr. Goodnight are undoubtedly doing something right. Corporate Culture, Engagement, and Energy are the 3 fundamental principles driving not only SAS, but a majority of the top leaders on the Forbes list.
Over the last century, the United States has made a switch; we are no longer the leader of industrial/operational efficiency, but instead, our major competitive advantage is innovation. This innovation starts with a bet. Companies must be willing to place a bet on culture and the belief that shifting time, resources, and money into team member happiness and engagement will, ultimately, deliver higher revenue and increase overall profitability.
Employee engagement can be the biggest competitive advantage for company success. Culture, the Ultimate Competitive Advantage focuses on how culture and engagement can drive a company to a stage 5 success via recruiting, sales, marketing, communication, performance, overhead, and other departments. This Engagement Effect can amount to a 20% or more gain in all faucets of a business. The presentations demonstrates how this Engagement Effect can unleash an unprecedented potential for growth, what differentiates the top 100 companies from the next lower 100 companies on the Forbes list, and what the return on cultural investment can do for the bottom-line.
This document discusses engagement in the workplace. It defines engagement as having an engaged culture and employee happiness. An engaged culture is created through fairness, a positive environment, and keeping promises. Employee happiness comes from alignment between employees and their work, listening to employees, and providing opportunities for growth. This level of engagement leads to engaged employees and satisfied customers, boosting revenue. The document encourages building a culture of engagement and breaking down traditional ways of thinking about work.
Someone deployed their application as a Docker container. Then another someone came along and hacked it. Then everyone starts looking at you asking, "How did this happen?"
This talk goes into how to extract the forensics artifacts of a Docker container, both if it was still running on a live system (easy) and if you must start from a cold disk image (harder).
A cheatsheet of the high points of this talk is also available here: https://www.didactic-security.com/resources/docker-forensics-cheatsheet.pdf
The video of this presentation at BSides RDU 2018 is online here: https://youtu.be/esj_NoTsywU?t=3667
With the unemployment rate near 7%, why are we still in the situation where employers cannot find enough of the right candidates to fill their open positions?
The method of hiring top talent has changed-- no longer is it just about salary, benefits and location, but how a company can become an “Employer of Choice”. Top employers know the keys of attracting better talent and getting their teams to perform at the highest level. Winning the Talent War presented a clear strategy to recruiting the right people, building a high performing culture and creating an employer brand, all of which will put you in the lead to becoming a top desirable employer and on the road to winning the talent war.
Lee-Anne Scalley of OneInAMil and John Smith of BreakTheEquation teamed up to bring you a detailed presentation on how employment has drastically changed in the last three years and how to be a winner on the talent battlefield.
This person enjoys a variety of sweet and savory foods like pizza, cake, cookies, vanilla cupcakes, and pancakes. Their interests include the video games Plants vs. Zombies, Minecraft, and Portal 2.
The document discusses the importance of digital marketing and optimization for local businesses. It notes that 87% of local online searches lead to inquiries or visits to businesses found online. It also states that mobile marketing will account for 21% of all marketing spending in 2014 as advertisers shift funds from traditional to digital channels. The document provides tips for businesses to implement a digital strategy, including establishing goals, listening to customer feedback, engaging audiences across appropriate channels, and analyzing results to optimize efforts.
Culture, the ultimate competitive advantageJohn E. Smith
Jim Goodnight, CEO of SAS Institute, famously stated that "95% of my assets drive out the front gate every evening. It’s my job to bring them back." These "assets" that Mr. Goodnight speaks of are his employees, his team members. Ranked #1 for the second year in a row on the 2011 Forbes' Best Places to Work list, SAS and Mr. Goodnight are undoubtedly doing something right. Corporate Culture, Engagement, and Energy are the 3 fundamental principles driving not only SAS, but a majority of the top leaders on the Forbes list.
Over the last century, the United States has made a switch; we are no longer the leader of industrial/operational efficiency, but instead, our major competitive advantage is innovation. This innovation starts with a bet. Companies must be willing to place a bet on culture and the belief that shifting time, resources, and money into team member happiness and engagement will, ultimately, deliver higher revenue and increase overall profitability.
Employee engagement can be the biggest competitive advantage for company success. Culture, the Ultimate Competitive Advantage focuses on how culture and engagement can drive a company to a stage 5 success via recruiting, sales, marketing, communication, performance, overhead, and other departments. This Engagement Effect can amount to a 20% or more gain in all faucets of a business. The presentations demonstrates how this Engagement Effect can unleash an unprecedented potential for growth, what differentiates the top 100 companies from the next lower 100 companies on the Forbes list, and what the return on cultural investment can do for the bottom-line.
This document discusses engagement in the workplace. It defines engagement as having an engaged culture and employee happiness. An engaged culture is created through fairness, a positive environment, and keeping promises. Employee happiness comes from alignment between employees and their work, listening to employees, and providing opportunities for growth. This level of engagement leads to engaged employees and satisfied customers, boosting revenue. The document encourages building a culture of engagement and breaking down traditional ways of thinking about work.
This talk will cover the problems currently with why applications are not being sandboxed to lessen the attack surface. Mostly this is based upon the existing tools being not user friendly and requiring a low level knowledge of syscalls that is hard to find in application developers.
Seccomp is one of these tools. It defines syscall filters that allow an application to define what syscalls it allows or denies. It is commonly used in the highly-regarded Chrome sandbox.
Integrating things like seccomp filters into programming languages at build time could allow for creating a perfect set of filters based off the application code. In practice, some try to mock this behavior at runtime but it often fails due to certain functions not being called during testing and missing specific syscalls. Therefore causing the user to turn it off completely. By integrating it into the code at build time we can ensure that all the syscalls are accounted for.
This talk will also show a proof of concept with this in Golang.
This document discusses programming IoT devices with Docker. It begins with an overview of IoT and Docker, defining IoT as connecting devices over the internet and Docker as a platform for developing and running containerized applications. It then provides examples of programming IoT boards, sensors and gateways using Docker containers, including with Johnny-Five for Node.js, ESP32, Apache MyNewt, and building custom images. It emphasizes that Docker allows building once and running anywhere through isolated, portable containers.
This document provides an overview of OpenStack Murano, an application catalog service for OpenStack. It discusses why Murano is used, what Murano is, the Murano architecture including key components, how to use Murano through different personas like end users and application providers, and how to install, configure, design application catalogs, and troubleshoot Murano. The document aims to explain all aspects of working with the Murano application catalog service on OpenStack.
Automated Historical Performance Analysis with kmemtracerKyungmin Lee
This document discusses using kmemtracer to automate historical performance analysis on Android. It describes how kmemtracer uses instrumentation to track activity lifecycles and collect memory usage snapshots without modifying the application code. Snapshots containing metrics like native memory usage are saved in bundles and written to files by a ResultsWriter for later analysis. This allows measuring and improving an app's performance over time.
The document discusses how to easily deploy applications into any cloud using Docker containers. It provides an overview of Docker, including how it allows building applications once and running them anywhere without recompilation. Examples are given of using Docker for development, continuous integration, and deploying and managing applications across clouds with tools like Docker Compose, Docker Machine, and Docker Swarm.
Securing TodoMVC Using the Web Cryptography APIKevin Hakanson
The open source TodoMVC project implements a Todo application using popular JavaScript MV* frameworks. Some of the implementations add support for compile to JavaScript languages, module loaders and real time backends. This presentation will demonstrate a TodoMVC implementation which adds support for the forthcoming W3C Web Cryptography API, as well as review some key cryptographic concepts and definitions.
Instead of storing the Todo list as plaintext in localStorage, this "secure" TodoMVC implementation encrypts Todos using a password derived key. The PBKDF2 algorithm is used for the deriveKey operation, with getRandomValues generating a cryptographically random salt. The importKey method sets up usage of AES-CBC for both encrypt and decrypt operations. The final solution helps address item "A6-Sensitive Data Exposure" from the OWASP Top 10.
With the Web Cryptography API being a recommendation in 2014, any Q&A time will likely include browser implementations and limitations, and whether JavaScript cryptography adds any value.
The document discusses security models and techniques for containers. It covers moving from project-level security boundaries to finer-grained namespace and pod-level boundaries. It also discusses runtime security techniques like namespaces, cgroups, AppArmor profiles, and seccomp filters that isolate processes and restrict what they can access. These techniques aim to provide least privilege for nodes, workloads, and processes within the container environment.
IoTWorld 2016 OSS Keynote Param Singh, Ian SkerrettParam Singh
Emergent Open Source IoT Ecosystem
There is a vibrant open source ecosystem developing around all layers of the IoT software stack. These technologies, when woven together, have the potential of propelling the Internet of things forward exponentially. Open source provides a trusted space where device vendors and software companies can reliably share components essential to interconnect the currently splintered IoT ecosystem.
Come see what is happening and how you can leverage open source IoT software right now.
Ian Skerrett, VP of Marketing, Eclipse Foundation
Param Singh, CEO, iotracks; IoT Advisor, City of San Francisco
https://iotworldevent.com/iot-open-source-summit/
This work is licensed under a Creative Commons Attribution 4.0 International License.
Hacking the browser with puppeteer sharp .NET conf AR 2018Darío Kondratiuk
The document discusses headless browsers and how they can be used for tasks like web scraping, screenshots, PDF generation, and UI testing using Puppeteer and Puppeteer Sharp. It provides examples of taking screenshots and PDFs of web pages, scraping data from sites, and using Puppeteer Sharp for UI testing. The document encourages contributing to open source projects like Puppeteer to help them grow.
Example Simple NodeJS Application for Docker demo
- https://gist.github.com/abtris/6aca9b2668b8b5af0208
Video
- https://www.youtube.com/watch?v=p6olO6NChno&feature=youtu.be
Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16AppDynamics
Hear from our product management and engineering teams about three topics that will help you unlock more value from our dynamic languages agents:
• Diagnosing a slow business transaction in Node.js
• Using the agent APIs to create custom transactions and exit calls
• Getting the Java proxy out of your Docker containers and connecting multiple agents to one proxy
For more information, go to: www.appdynamics.com
Automate drupal deployments with linux containers, docker and vagrant Ricardo Amaro
This document discusses strategies for automating Drupal deployments using Linux containers, Vagrant, and Docker. It begins with an overview of virtual machines and their disadvantages compared to containers. It then covers using Linux containers (LXC), Vagrant, and Docker to build and deploy containerized Drupal environments that can be easily reproduced and deployed across different systems. The document provides examples of building Drupal containers using LXC, Vagrant, and Docker that take advantage of their portability and reproducibility.
The document discusses how browser helper objects (BHOs) can be used maliciously to hack websites. It provides an overview of the attack, demonstrations modifying website content and JavaScript, an analysis of the scope and advantages, technical details on how BHOs work and access browser interfaces, and potential defenses including disabling BHOs or improving how browsers handle them. The presentation aims to teach how to hack websites using BHOs and ends with contact information and a question/answer section.
1. The document discusses modern techniques used by malware to obfuscate code, such as virtualization, encryption, and anti-reversing tricks.
2. Packers and protectors like VMProtect, Themida, and Arxan use virtual machines and other techniques to transform and encrypt code, making static analysis very difficult.
3. Reversing obfuscated code involves understanding how the virtual machine works, including how it fetches, decodes, and dispatches instructions to handlers. The document provides examples of how virtualized code is structured and executed.
Learn how to build decentralized and serverless html5 applications with embar...Alessandro Confetti
Codemotion, Rome 13/04/2018
Do you have an idea for a startup and don't want to pay for scaling it up? Forget about bandwidth problems, servers to install and pay for, with the power of IPFS, DAT and the blockchain.
In this talk, we will explore how to build an HTML5 DAPP (distributed application) with EmbarkJS, and figure out how to rethink servers, storage, messaging, data and payments in a distributed and decentralised way with the help of Ethereum's smart contracts, IPFS and DAT distributed storage.
Discover more at http://blog.zigolab.it
Learn how to build decentralized and serverless html5 applications with Embar...Codemotion
Do you have an idea for a startup and don't want to pay for scaling it up? Forget about bandwidth problems, servers to install and pay for, with the power of IPFS, DAT and the blockchain. In this talk, we will explore how to build an HTML5 DAPP (distributed application) with EmbarkJS, and figure out how to rethink servers, storage, messaging, data and payments in a distributed and decentralised way with the help of Ethereum's smart contracts, IPFS and DAT distributed storage.
Congrats! You and your coworkers love Docker. Docker has become an increasingly helpful tool when it comes to DevOps. We can now build smaller, more robust local development setups with the promise of mirroring production. One thing that still plagues many situations is how to get those containers into production and update them over time. We'll explore different tools for setting up, configuring, and maintaining containers as they go live.
Christian Kniep has over 10 years of experience in HPC and automotive industries in Germany. He co-founded a container and cloud workshop at an HPC conference when told HPC could not learn from cloud companies. Since then, he has led DevOps and containerization efforts. He joined Docker Inc in 2017 to help push adoption forward. Walid Shaari is passionate about open source, DevOps, and security. He is a Red Hat Certified Architect and Certified Kubernetes Administrator. He organizes Docker and Ansible meetups as a community leader. The workshop aims to get participants up and running with the containers ecosystem through an informal, interactive format.
Software Define your Current Storage with OpensourceAntonio Romeo
While Software Defined Storage is becoming one of the major trend topics in the Data Center, what do you do with your current “legacy” arrays?
Learn how with ViPR Controller, or its Open Source counterpart, CoprHD, you can automate and make your datacenter “software defined” with your current infrastructure.
Content from my Brighttalk webinar available here: https://www.brighttalk.com/webcast/10739/169959
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
This talk will cover the problems currently with why applications are not being sandboxed to lessen the attack surface. Mostly this is based upon the existing tools being not user friendly and requiring a low level knowledge of syscalls that is hard to find in application developers.
Seccomp is one of these tools. It defines syscall filters that allow an application to define what syscalls it allows or denies. It is commonly used in the highly-regarded Chrome sandbox.
Integrating things like seccomp filters into programming languages at build time could allow for creating a perfect set of filters based off the application code. In practice, some try to mock this behavior at runtime but it often fails due to certain functions not being called during testing and missing specific syscalls. Therefore causing the user to turn it off completely. By integrating it into the code at build time we can ensure that all the syscalls are accounted for.
This talk will also show a proof of concept with this in Golang.
This document discusses programming IoT devices with Docker. It begins with an overview of IoT and Docker, defining IoT as connecting devices over the internet and Docker as a platform for developing and running containerized applications. It then provides examples of programming IoT boards, sensors and gateways using Docker containers, including with Johnny-Five for Node.js, ESP32, Apache MyNewt, and building custom images. It emphasizes that Docker allows building once and running anywhere through isolated, portable containers.
This document provides an overview of OpenStack Murano, an application catalog service for OpenStack. It discusses why Murano is used, what Murano is, the Murano architecture including key components, how to use Murano through different personas like end users and application providers, and how to install, configure, design application catalogs, and troubleshoot Murano. The document aims to explain all aspects of working with the Murano application catalog service on OpenStack.
Automated Historical Performance Analysis with kmemtracerKyungmin Lee
This document discusses using kmemtracer to automate historical performance analysis on Android. It describes how kmemtracer uses instrumentation to track activity lifecycles and collect memory usage snapshots without modifying the application code. Snapshots containing metrics like native memory usage are saved in bundles and written to files by a ResultsWriter for later analysis. This allows measuring and improving an app's performance over time.
The document discusses how to easily deploy applications into any cloud using Docker containers. It provides an overview of Docker, including how it allows building applications once and running them anywhere without recompilation. Examples are given of using Docker for development, continuous integration, and deploying and managing applications across clouds with tools like Docker Compose, Docker Machine, and Docker Swarm.
Securing TodoMVC Using the Web Cryptography APIKevin Hakanson
The open source TodoMVC project implements a Todo application using popular JavaScript MV* frameworks. Some of the implementations add support for compile to JavaScript languages, module loaders and real time backends. This presentation will demonstrate a TodoMVC implementation which adds support for the forthcoming W3C Web Cryptography API, as well as review some key cryptographic concepts and definitions.
Instead of storing the Todo list as plaintext in localStorage, this "secure" TodoMVC implementation encrypts Todos using a password derived key. The PBKDF2 algorithm is used for the deriveKey operation, with getRandomValues generating a cryptographically random salt. The importKey method sets up usage of AES-CBC for both encrypt and decrypt operations. The final solution helps address item "A6-Sensitive Data Exposure" from the OWASP Top 10.
With the Web Cryptography API being a recommendation in 2014, any Q&A time will likely include browser implementations and limitations, and whether JavaScript cryptography adds any value.
The document discusses security models and techniques for containers. It covers moving from project-level security boundaries to finer-grained namespace and pod-level boundaries. It also discusses runtime security techniques like namespaces, cgroups, AppArmor profiles, and seccomp filters that isolate processes and restrict what they can access. These techniques aim to provide least privilege for nodes, workloads, and processes within the container environment.
IoTWorld 2016 OSS Keynote Param Singh, Ian SkerrettParam Singh
Emergent Open Source IoT Ecosystem
There is a vibrant open source ecosystem developing around all layers of the IoT software stack. These technologies, when woven together, have the potential of propelling the Internet of things forward exponentially. Open source provides a trusted space where device vendors and software companies can reliably share components essential to interconnect the currently splintered IoT ecosystem.
Come see what is happening and how you can leverage open source IoT software right now.
Ian Skerrett, VP of Marketing, Eclipse Foundation
Param Singh, CEO, iotracks; IoT Advisor, City of San Francisco
https://iotworldevent.com/iot-open-source-summit/
This work is licensed under a Creative Commons Attribution 4.0 International License.
Hacking the browser with puppeteer sharp .NET conf AR 2018Darío Kondratiuk
The document discusses headless browsers and how they can be used for tasks like web scraping, screenshots, PDF generation, and UI testing using Puppeteer and Puppeteer Sharp. It provides examples of taking screenshots and PDFs of web pages, scraping data from sites, and using Puppeteer Sharp for UI testing. The document encourages contributing to open source projects like Puppeteer to help them grow.
Example Simple NodeJS Application for Docker demo
- https://gist.github.com/abtris/6aca9b2668b8b5af0208
Video
- https://www.youtube.com/watch?v=p6olO6NChno&feature=youtu.be
Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16AppDynamics
Hear from our product management and engineering teams about three topics that will help you unlock more value from our dynamic languages agents:
• Diagnosing a slow business transaction in Node.js
• Using the agent APIs to create custom transactions and exit calls
• Getting the Java proxy out of your Docker containers and connecting multiple agents to one proxy
For more information, go to: www.appdynamics.com
Automate drupal deployments with linux containers, docker and vagrant Ricardo Amaro
This document discusses strategies for automating Drupal deployments using Linux containers, Vagrant, and Docker. It begins with an overview of virtual machines and their disadvantages compared to containers. It then covers using Linux containers (LXC), Vagrant, and Docker to build and deploy containerized Drupal environments that can be easily reproduced and deployed across different systems. The document provides examples of building Drupal containers using LXC, Vagrant, and Docker that take advantage of their portability and reproducibility.
The document discusses how browser helper objects (BHOs) can be used maliciously to hack websites. It provides an overview of the attack, demonstrations modifying website content and JavaScript, an analysis of the scope and advantages, technical details on how BHOs work and access browser interfaces, and potential defenses including disabling BHOs or improving how browsers handle them. The presentation aims to teach how to hack websites using BHOs and ends with contact information and a question/answer section.
1. The document discusses modern techniques used by malware to obfuscate code, such as virtualization, encryption, and anti-reversing tricks.
2. Packers and protectors like VMProtect, Themida, and Arxan use virtual machines and other techniques to transform and encrypt code, making static analysis very difficult.
3. Reversing obfuscated code involves understanding how the virtual machine works, including how it fetches, decodes, and dispatches instructions to handlers. The document provides examples of how virtualized code is structured and executed.
Learn how to build decentralized and serverless html5 applications with embar...Alessandro Confetti
Codemotion, Rome 13/04/2018
Do you have an idea for a startup and don't want to pay for scaling it up? Forget about bandwidth problems, servers to install and pay for, with the power of IPFS, DAT and the blockchain.
In this talk, we will explore how to build an HTML5 DAPP (distributed application) with EmbarkJS, and figure out how to rethink servers, storage, messaging, data and payments in a distributed and decentralised way with the help of Ethereum's smart contracts, IPFS and DAT distributed storage.
Discover more at http://blog.zigolab.it
Learn how to build decentralized and serverless html5 applications with Embar...Codemotion
Do you have an idea for a startup and don't want to pay for scaling it up? Forget about bandwidth problems, servers to install and pay for, with the power of IPFS, DAT and the blockchain. In this talk, we will explore how to build an HTML5 DAPP (distributed application) with EmbarkJS, and figure out how to rethink servers, storage, messaging, data and payments in a distributed and decentralised way with the help of Ethereum's smart contracts, IPFS and DAT distributed storage.
Congrats! You and your coworkers love Docker. Docker has become an increasingly helpful tool when it comes to DevOps. We can now build smaller, more robust local development setups with the promise of mirroring production. One thing that still plagues many situations is how to get those containers into production and update them over time. We'll explore different tools for setting up, configuring, and maintaining containers as they go live.
Christian Kniep has over 10 years of experience in HPC and automotive industries in Germany. He co-founded a container and cloud workshop at an HPC conference when told HPC could not learn from cloud companies. Since then, he has led DevOps and containerization efforts. He joined Docker Inc in 2017 to help push adoption forward. Walid Shaari is passionate about open source, DevOps, and security. He is a Red Hat Certified Architect and Certified Kubernetes Administrator. He organizes Docker and Ansible meetups as a community leader. The workshop aims to get participants up and running with the containers ecosystem through an informal, interactive format.
Software Define your Current Storage with OpensourceAntonio Romeo
While Software Defined Storage is becoming one of the major trend topics in the Data Center, what do you do with your current “legacy” arrays?
Learn how with ViPR Controller, or its Open Source counterpart, CoprHD, you can automate and make your datacenter “software defined” with your current infrastructure.
Content from my Brighttalk webinar available here: https://www.brighttalk.com/webcast/10739/169959
Similar to Emulate virtual machines to avoid malware infections - GrrCON 2014 (20)
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
14. Introduction
If malware tries to avoid Virtual machines…
14
!
Why not try to emulate these environments
to avoid infections?
GrrCON Page | Hacker Conference | 16-17 Oct, 2014
15. Introduction
The purposes
15
Study the characteristics of VirtualBox
Specific drivers
Registry keys
Processes
VirtualBox Guest Additions Files
!
Know how the malware detects a virtual machine
!
Try to replicate these configurations on a physical
computer
GrrCON Page | Hacker Conference | 16-17 Oct, 2014
21. Virtual Machine Detection
Why?
!
Malware researchers increasingly use virtual machine technology to analyze
samples, since it offers many benefits:
!
Multiple operating systems
Ability to reset to a previous snapshot undoing changes made by malware
Easily monitored
Isolation
!
Typical methods to detect a VME
!
1. Look for VME artifacts in processes, file system and registry
2. Look for VME specific virtual hardware
3. Look for VME specific processor capabilities
Page 21
| GrrCON Hacker Conference | 16-17 Oct, 2014
22. Virtual Machine Detection - VMWare
Artifacts in processes, system files and registry
Page 22
| GrrCON Hacker Conference | 16-17 Oct, 2014
VMWare tools
Some references in system files to “VMWare”
Some references in the registry to “VMWare”
Some drivers:
vmmouse.sys
vmhgfs.sys
27. Virtual Machine Detection - Virtual Box
Folder Key Type Value
HKLMSoftwareOracleVirtualBox Guest Additions InstallDir REG_SZ Guest Additions folder
27
Revision REG_SZ Revision number
Version REG_SZ Version number
VersionExt REG_SZ Version number
HKLMHardwareDEVICEMAPScsiScsi Port 0ScSi
Bus 0Target Id 0Logical Unit Id 0
Identifier REG_SZ VBOX HARDDISK
HKLMHardwareDEVICEMAPScsiScsi Port 0ScSi
Bus 0Target Id 1Logical Unit Id 0
Identifier REG_SZ VBOX CD-ROM
HKLMHardwareDESCRIPTIONSystem SystemBiosVersion REG_MULTI_SZ VBOX -1
VideoBiosVersion REG_MULTI_SZ Oracle VM VirtualBox
Version (version number)
HKLMHardwareAcpiDSDTVBOX__VBOXBIOS
00000002
00000000 REG_BINARY DSDT......VBOX
VBOXBIOS....INTL
Specific registry keys
GrrCON Page | Hacker Conference | 16-17 Oct, 2014
28. Virtual Machine Detection - Virtual Box
Folder Key Type Value
HKLMSystemCurrentControlSetServicesDiskEnum 0 REG_SZ IDE
28
DiskVBOX_HARDDISK________________
___________1.0_____
42566264366366323661362d32656239
39632031
HKLMSystemCurrentControlSetServicesVBoxGuest DisplayName REG_SZ VirtualBox Guest Driver
ImagePath REG_EXPAND_SZ system32DRIVERSVBoxGuest.sys
HKLMSystemCurrentControlSetServicesVBoxGuest
Enum
0 REG_SZ PCI
VEN_80EE&DEV_CAFE&SUBSYS_00000
000&REV_003&267a616a&0&20
HKLMSystemCurrentControlSetServicesVBoxMouse DisplayName REG_SZ VirtualBox Guest Mouse Service
ImagePath REG_EXPAND_SZ system32DRIVERSVBoxMouse.sys
HKLMSystemCurrentControlSetServicesVBoxMouse
Enum
0 REG_SZ ACPIPNP0F034&1d401fb5&0
Specific registry keys
*These keys are in ControlSet001, ControlSet002 and CurrentControlSet folders
GrrCON Page | Hacker Conference | 16-17 Oct, 2014
29. Virtual Machine Detection - Virtual Box
Folder Key Type Value
HKLMSystemCurrentControlSetEnumIde
DiskVBOX_HARDDISK4256636463663
29
FriendlyName REG_SZ VBOX HARDDISK
HKLMSystemCurrentControlSetEnumIde
DiskVBOX_HARDDISK9257936463871
FriendlyName REG_SZ VBOX CD-ROM
HKLMSystemCurrentControlSetServices
VBoxService
DisplayName REG_SZ VirtualBox Guest Aditions Service
ImagePath REG_EXPAND_SZ system32VBoxService.exe
Description REG_SZ Manages VM runtime information
and utilities for guest operating
systems.
ObjectName REG_SZ LocalSystem
HKLMSystemCurrentControlSetServices
VBoxServiceEnum
0 REG_SZ RootLEGACY_VBOXSERVICE
0000
HKLMSystemCurrentControlSetServicesVBoxSF DisplayName REG_SZ VirtualBox Shared Folders
ImagePath REG_EXPAND_SZ system32DRIVERSVBoxSF.sys
Specific registry keys
GrrCON Page | Hacker Conference | 16-17 Oct, 2014
44. Conclusions
Main findings and future lines of research
Main findings
It’s possible to simulate a virtual machine with a python script.
We can avoid infections by unknown malware.
!
!
Future lines of research
Investigate more VM Solutions and Sandboxes. (VmWare, Sandboxie…)
Try the script with more malware samples.
Investigate possible side-effects in a real environment.
Page 44
| GrrCON Hacker Conference | 16-17 Oct, 2014