The talk covers several technologies and best practices to managing Security Vulnerabilities, which are told as interconnected stories.
We will cover how the largest clouds in production came together through the Xen Project to develop an industry leading open source security process to manage software vulnerabilities effectively, how those vendors collaborated to stop cloud reboots through Live Patching and how security and CPU vendors collaborated to protect against 0-day vulnerabilities and advanced persistent threats using hardware assisted virtual machine introspection. Finally, we will also provide information how you can use tools such as CVE Details to assess how secure an open source technology is relative to another, such that you don't have to rely solely on security stories from the technology press.
The talk will cover how these technologies work, the limitations and challenges which still remain and how they are used in practice using examples of Xen Project based products and installations. We will also cover how these technologies impact software vulnerability management processes and system administrators.
LCC17 - Live Patching, Virtual Machine Introspection and Vulnerability Manag...The Linux Foundation
There are three interconnected stories of how the largest clouds in production came together through the Xen Project to develop an industry leading open source security process to manage software vulnerabilities effectively, how those vendors collaborated to stop cloud reboots through Live Patching and how security and CPU vendors collaborated to protect against 0-day vulnerabilities and advanced persistent threats using hardware assisted virtual machine introspection. The talk will cover the impact these technologies have on sys admins and in general.
LCC17 - Live Patching, Virtual Machine Introspection and Vulnerability Manag...The Linux Foundation
There are three interconnected stories of how the largest clouds in production came together through the Xen Project to develop an industry leading open source security process to manage software vulnerabilities effectively, how those vendors collaborated to stop cloud reboots through Live Patching and how security and CPU vendors collaborated to protect against 0-day vulnerabilities and advanced persistent threats using hardware assisted virtual machine introspection. The talk will cover the impact these technologies have on sys admins and in general.
Reducing attack surface on ICS with Windows native solutionsJan Seidl
Presentation given at 4SICS conference in Stockholm, Sweden about using Windows built-in solutions like Software Restriciton Policies/App Locker, EMET and other minor things.
This talk provides an overview of the Xen Project eco-system and its main use-cases in a number of important market segments: it covers server virtualization, cloud computing and embedded, automotive and related. Lars Kurth highlights why the Xen Project is relevant in these market segments: he provides an overview of the Xen Project's architecture, relevant existing functionality and ongoing and planned developments. To complement the picture, he covers open-source projects that are related to Xen and are of interest for these use-cases. Excellent Software security is key to all of these use-cases. Thus, Lars specifically covers the Xen Project's security features, track record and touches on the project's security practices. He concludes with a few resources that help you get started with the Xen Project and highlight Internship Programs which the project supports.
The talk was delivered at Root Linux Conference 2017. Learn more: http://linux.globallogic.com/materials. The video is available at https://www.youtube.com/watch?v=sjQnAIJji4k
This was a workshop I conducted at Black Hat Europe'12. The workshop explains how to program a USB HID, Teensy++ in this case, for usage in offensive security.
Project: Penetration Testing Report
(20 Points)
Scenario
You have been hired as a junior security consultant and have been tasked
with performing an in-house penetration test to demonstrate your readiness
to support the audit of a large corporate client that has employed your firm’s
services. Conducting a penetration test consists of 1) planning the test, 2)
preparing your test tools, 3) performing the test, 4) analyzing the data, and
5) writing up and communicating your findings. The project will document
your notional penetration test.
Project OVERVIEW
Your project will be submitted in four sections. The final deliverable will
include all combined sections:
Pre-Test: Deployment of attack tools and victim host (Week 2)
Testing (Mapping and Scanning): Mapping the target environment
and conducting a vulnerability scan (Week 4)
Testing (Exploitation): Gaining Access through a vulnerability
identified during the vuln scan (Week 6)
Analysis and Reporting: Communicating findings and providing
mitigation recommendation (Week 8)
Supporting Details
The purpose of this project is to evaluate the student’s ability to:
Build and deploy an attack OS (Kali Linux or other similar operating
system (OS))
Configure and deploy a victim host (Metasploitable, Broken Web
Apps, Mutillidae, other exploitable OS or virtual machine (VM))
Conduct a vulnerability scan
Research a hardware or software vulnerability
Discuss how the vulnerability can be exploited
Exploit the vulnerability
Evaluate the risk posed by this vulnerability
Provide a recommended compensating control to mitigate the
vulnerability
Students may choose to submit the project using one of two options - each
option has pros and cons that students should evaluate before making their
decision.
1. Local Lab: Requires access to a dedicated computer in which
students have sufficient:
o access (continued access to the same machine for the
duration of the course)
o permissions (administrative permissions to install software)
o storage (minimum of 30 GB available to the student for VM
storage)
o memory (minimum of 8 GBs)
o bandwidth (downloading large VMs can take considerable
time even with high-speed Internet connections)
2. Remote Lab: Utilizes the online lab environment used to complete
the weekly course labs
Part 1 – Pre-Test: Deployment of attack
tools and victim host (Week 2)
PROJECT SECTION 1 DETAILS: The first part of your project consists of
preparing and deploying your testing tools (the attack OS) and the
vulnerable host that will serve as your attack target. Instead of requiring the
use of two physical machines, we will utilize one physical machine and we
will leverage virtualization software to install a hypervisor (VirtualBox,
VMware, etc.) along with two (2) “guest” operating systems. For those new
to virtualization, we are simply using our “host OS” (Window, Mac, Linux) and
installing a virtualization “software application.
Advanced Malware Analysis Training Session 8 - Introduction to Androidsecurityxploded
This presentation is part of our Advanced Malware Analysis Training Series program.
For more details refer our Security Training page
http://securityxploded.com/security-training-advanced-malware-analysis.php
Beveiligingsdag SLBdiesten: 26 juni 2015
Presentatie McAfee: Leer hoe op een (kosten)efficiënte manier gebruik kunt maken van nieuwe, geïntegreerde McAfee-technologieën voor de bescherming tegen geavanceerde malware. Door Wim van Campen, Regional Vice President North & East Europe, Intel Security.
Breaking Antivirus Software
Joxean Koret, COSEINC
SYSCAN 2014
I'm not sure whether i'm allowed to upload this slide somewhere else or not, but this is a nice and fun read
"If your application runs with the highest privileges,
installs kernel drivers, a packet filter and tries to
handle anything your computer may do...
- Your attack surface dramatically increased."
Static partitioning is used to split an embedded system into multiple domains, each of them having access only to a portion of the hardware on the SoC. It is key to enable mixed-criticality scenarios, where a critical application, often based on a small RTOS, runs alongside a larger non-critical app, typically based on Linux. The two domains cannot interfere with each other.
This talk will explain how to use Xen for static partitioning. It will introduce dom0-less, a new Xen feature written for the purpose. Dom0-less allows multiple VMs to start at boot time directly from the Xen hypervisor, decreasing boot times drastically. It makes it very easy to partition the system without virtualization overhead. Dom0 becomes unnecessary.
This presentation will go into details on how to setup a Xen dom0-less system. It will show configuration examples and explain device assignment. The talk will discuss its implications for latency-sensitive and safety-critical environments.
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...The Linux Foundation
TrenchBoot is a cross-community OSS integration project for hardware-rooted, late launch integrity of open and proprietary systems. It provides a general purpose, open-source DRTM kernel for measured system launch and attestation of device integrity to trust-centric access infrastructure. TrenchBoot closes the UEFI Measurement Gap and reduces the need to trust system firmware. This talk will introduce TrenchBoot architecture and a recent collaboration with Oracle to launch the Linux kernel directly with Intel TXT or AMD SVM Secure Launch. It will propose mechanisms for integrating the Xen hypervisor into a TrenchBoot system launch. DRTM-enabled capabilities for client, server and embedded platforms will be presented for consideration by the Xen community.
More Related Content
Similar to OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
Reducing attack surface on ICS with Windows native solutionsJan Seidl
Presentation given at 4SICS conference in Stockholm, Sweden about using Windows built-in solutions like Software Restriciton Policies/App Locker, EMET and other minor things.
This talk provides an overview of the Xen Project eco-system and its main use-cases in a number of important market segments: it covers server virtualization, cloud computing and embedded, automotive and related. Lars Kurth highlights why the Xen Project is relevant in these market segments: he provides an overview of the Xen Project's architecture, relevant existing functionality and ongoing and planned developments. To complement the picture, he covers open-source projects that are related to Xen and are of interest for these use-cases. Excellent Software security is key to all of these use-cases. Thus, Lars specifically covers the Xen Project's security features, track record and touches on the project's security practices. He concludes with a few resources that help you get started with the Xen Project and highlight Internship Programs which the project supports.
The talk was delivered at Root Linux Conference 2017. Learn more: http://linux.globallogic.com/materials. The video is available at https://www.youtube.com/watch?v=sjQnAIJji4k
This was a workshop I conducted at Black Hat Europe'12. The workshop explains how to program a USB HID, Teensy++ in this case, for usage in offensive security.
Project: Penetration Testing Report
(20 Points)
Scenario
You have been hired as a junior security consultant and have been tasked
with performing an in-house penetration test to demonstrate your readiness
to support the audit of a large corporate client that has employed your firm’s
services. Conducting a penetration test consists of 1) planning the test, 2)
preparing your test tools, 3) performing the test, 4) analyzing the data, and
5) writing up and communicating your findings. The project will document
your notional penetration test.
Project OVERVIEW
Your project will be submitted in four sections. The final deliverable will
include all combined sections:
Pre-Test: Deployment of attack tools and victim host (Week 2)
Testing (Mapping and Scanning): Mapping the target environment
and conducting a vulnerability scan (Week 4)
Testing (Exploitation): Gaining Access through a vulnerability
identified during the vuln scan (Week 6)
Analysis and Reporting: Communicating findings and providing
mitigation recommendation (Week 8)
Supporting Details
The purpose of this project is to evaluate the student’s ability to:
Build and deploy an attack OS (Kali Linux or other similar operating
system (OS))
Configure and deploy a victim host (Metasploitable, Broken Web
Apps, Mutillidae, other exploitable OS or virtual machine (VM))
Conduct a vulnerability scan
Research a hardware or software vulnerability
Discuss how the vulnerability can be exploited
Exploit the vulnerability
Evaluate the risk posed by this vulnerability
Provide a recommended compensating control to mitigate the
vulnerability
Students may choose to submit the project using one of two options - each
option has pros and cons that students should evaluate before making their
decision.
1. Local Lab: Requires access to a dedicated computer in which
students have sufficient:
o access (continued access to the same machine for the
duration of the course)
o permissions (administrative permissions to install software)
o storage (minimum of 30 GB available to the student for VM
storage)
o memory (minimum of 8 GBs)
o bandwidth (downloading large VMs can take considerable
time even with high-speed Internet connections)
2. Remote Lab: Utilizes the online lab environment used to complete
the weekly course labs
Part 1 – Pre-Test: Deployment of attack
tools and victim host (Week 2)
PROJECT SECTION 1 DETAILS: The first part of your project consists of
preparing and deploying your testing tools (the attack OS) and the
vulnerable host that will serve as your attack target. Instead of requiring the
use of two physical machines, we will utilize one physical machine and we
will leverage virtualization software to install a hypervisor (VirtualBox,
VMware, etc.) along with two (2) “guest” operating systems. For those new
to virtualization, we are simply using our “host OS” (Window, Mac, Linux) and
installing a virtualization “software application.
Advanced Malware Analysis Training Session 8 - Introduction to Androidsecurityxploded
This presentation is part of our Advanced Malware Analysis Training Series program.
For more details refer our Security Training page
http://securityxploded.com/security-training-advanced-malware-analysis.php
Beveiligingsdag SLBdiesten: 26 juni 2015
Presentatie McAfee: Leer hoe op een (kosten)efficiënte manier gebruik kunt maken van nieuwe, geïntegreerde McAfee-technologieën voor de bescherming tegen geavanceerde malware. Door Wim van Campen, Regional Vice President North & East Europe, Intel Security.
Breaking Antivirus Software
Joxean Koret, COSEINC
SYSCAN 2014
I'm not sure whether i'm allowed to upload this slide somewhere else or not, but this is a nice and fun read
"If your application runs with the highest privileges,
installs kernel drivers, a packet filter and tries to
handle anything your computer may do...
- Your attack surface dramatically increased."
Static partitioning is used to split an embedded system into multiple domains, each of them having access only to a portion of the hardware on the SoC. It is key to enable mixed-criticality scenarios, where a critical application, often based on a small RTOS, runs alongside a larger non-critical app, typically based on Linux. The two domains cannot interfere with each other.
This talk will explain how to use Xen for static partitioning. It will introduce dom0-less, a new Xen feature written for the purpose. Dom0-less allows multiple VMs to start at boot time directly from the Xen hypervisor, decreasing boot times drastically. It makes it very easy to partition the system without virtualization overhead. Dom0 becomes unnecessary.
This presentation will go into details on how to setup a Xen dom0-less system. It will show configuration examples and explain device assignment. The talk will discuss its implications for latency-sensitive and safety-critical environments.
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...The Linux Foundation
TrenchBoot is a cross-community OSS integration project for hardware-rooted, late launch integrity of open and proprietary systems. It provides a general purpose, open-source DRTM kernel for measured system launch and attestation of device integrity to trust-centric access infrastructure. TrenchBoot closes the UEFI Measurement Gap and reduces the need to trust system firmware. This talk will introduce TrenchBoot architecture and a recent collaboration with Oracle to launch the Linux kernel directly with Intel TXT or AMD SVM Secure Launch. It will propose mechanisms for integrating the Xen hypervisor into a TrenchBoot system launch. DRTM-enabled capabilities for client, server and embedded platforms will be presented for consideration by the Xen community.
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...The Linux Foundation
Artem will briefly cover what has been done since the first talk on Xen in Automotive domain back in 2013, what is going on now and what is still missing for broad adaptation of Xen in vehicles. The following topics will be covered:
Embedded/automotive features of Xen
Collaboration with AGL and GENIVI organizations for standardization
Efforts on Functional Safety compliance
Artem will also go over typical automotive use scenarios for Xen which may not be the same as generic computing use of hypervisor.
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...The Linux Foundation
In this keynote talk, we will give an overview of the state of the Xen Project, trends that impact the project, see whether challenges that surfaced last year have been addressed and how we did it, and highlight new challenges and solutions for the coming year.
In recent years unikernels have shown immense performance potential (e.g., boot times of only a few ms, image sizes of only hundreds of KBs).The fundamental drawback of unikernels is that they require that applications be manually ported to the underlying minimalistic OS, needing both expert work and often considerable amount of time.
The Unikraft project provides a unikernel code base and build system that significantly simplifies the building of unikernels. In addition to support for a number CPU architectures, languages and frameworks, Unikraft provides debugging and tracing features that are generally sorely missing from unikernel projects. In this talk we will talk about these features, show a set of preliminary performance numbers, and provide a roadmap for the project's future.
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...The Linux Foundation
The idea of making Xen secret-free has been floating since Spectre and Meltdown came into light. In this talk we will discuss what is being done and what needs to be done next.
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxThe Linux Foundation
This talk will introduce Dom0-less: a new way of using Xen to build mixed-criticality solutions. Dom0-less is a Xen feature that adds a novel approach to static partitioning based on virtualization. It allows multiple domains to start at boot time directly from the Xen hypervisor, decreasing boot times dramatically. Xen userspace tools, such as xl and libvirt, become optional.
Dom0-less extends the existing device tree based Xen boot protocol to cover information required by additional domains. Binaries, such as kernels and ramdisks, are loaded by the bootloader (u-boot) and advertised to Xen via new device tree bindings.
The audience will learn how to use Dom0-less to partition the system. Uboot and device tree configuration details will be explained to enable the audience to get the most out of this feature. The talk will include a status update and details on future plans.
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...The Linux Foundation
As the number of contributions grow, reviewer bandwidth becomes a bottleneck; and maintainers are always asking for more help. However, ultimately maintainers must at least Ack every patch that goes in; so if you're not a maintainer, how can you contribute? Why should anyone care about your opinion?
This talk will try to lay out some advice and guidelines for non-maintainers, for how they can do code review in a way which will effectively reduce the load on maintainers when they do come to review a patch.
This talk is a follow-up to our Summit 2017 presentation in which we covered our plans for Intel VMFUNC and #VE, as well as related use-cases. This year, we will provide a report on what we have accomplished in Xen 4.12, and what remains to be addressed. We will also give a brief status update of VMI on AMD hardware. The session will end with some real-world numbers of the Hypervisor Introspection solution running on Citrix Hypervisor 8.0 with #VE enabled.
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...The Linux Foundation
Safety certification is one of the essential requirements for software to be used in highly regulated industries. Besides technical and compliance issues (such as ISO 26262 vs IEC 611508) transitioning an existing project to become more easily safety certifiable requires significant changes to development practices within an open source project.
In this session, we will lay out some challenges of making safety certification achievable in open source and the Xen Project. We will outline the process the Xen Project has followed thus far and highlight lessons learned along the way. The talk will primarily focus on necessary process, tooling changes and community challenges that can prevent progress. We will be offering an in-depth review of how Xen Project is approaching this challenging goal and try to derive lessons for other projects and contributors.
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
Safety certification is one of the essential requirements for software to be used in highly regulated industries. The Xen Project, a secure and stable hypervisor that is used in many different markets, has been exploring the feasibility of building safety certified products on top of Xen for a year, looking at key aspects of its code base and development practices.
In this session, we will lay out the motivation and challenges of making safety certification achievable in open source and the Xen Project. We will outline the process the project has followed thus far and highlight lessons learned along the way. The talk will cover technical enablers, necessary process and tooling changes and community challenges offering an in-depth review of how Xen Project is approaching this exciting and and challenging goal.
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixThe Linux Foundation
2018 saw fundamental shifts in security boundaries which were previously taken for granted. A lot of work has been done in the past 2 years, and largely in secret under embargo, but there is plenty more work to be done to strengthen the existing mitigations and to try to recover some performance without reopening security holes.
This talk will look at speculative execution sidechannels, the work which has already been done to mitigate the security holes, and future work which hopes to bring some improvements.
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdThe Linux Foundation
The Arm architecture provides a set of guidelines that any software should abide by when accessing the memory with MMU off and update page-tables. Failing to do so may result in getting TLB conflicts or breaking coherency.
In a previous talk ("Keeping coherency on Arm"), we focused on updating safely the stage-2 (aka P2M) page-tables. This talk will focus on the boot code and Xen memory management.
During this session, we will introduce some of the guidelines and when they should be used. We will also discuss how Xen boot sequence needs to be reworked to avoid breaking the guidelines.
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...The Linux Foundation
For many years the QEMU codebase has contained PV backends for Xen guests, giving them paravirtual access to storage, network, keyboard, mouse, etc. however these backends have not been configurable as QEMU devices as their implementation did not fully adhere to the QEMU Object Model (QOM).
Particularly the PV storage backend not using proper QOM devices, or qdevs, meant that the QEMU block layer needed to maintain legacy code that was cluttering up the source. This was causing push-back from the maintainers who did not want to accept any patches relating to that Xen backend until it was 'qdevified'.
In this talk, I'll explain the modifications I made to QEMU to achieve 'qdevification' of the PV storage backend, how compatibility with the libxl toolstack was maintained, and what the next steps in both QEMU and libxl development should be.
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DThe Linux Foundation
PCI is a local computer bus for attaching hardware devices in a computer, and is the main peripheral bus on modern x86 systems. As such, having a proper way to emulate it is crucial for Xen to be able to expose both fully emulated devices or passthrough devices to guests.
This talk will focus on the current status of PCI emulation in Xen, how and where it is used, what are its main limitations and future plans to improve it in order to be more robust and modular.
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsThe Linux Foundation
Volodymyr will speak about TEE mediators. This is a new feature in Xen which allows multiple virtual machines to interact with Trusted Execution Environment available on platform. He developed mediator for one of TEEs, namely OP-TEE.
He will give background information on why TEE is needed at all and share some implementation details.
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...The Linux Foundation
Xen is a very powerful hypervisor with a talented and diverse developers community. Despite the fact it's almost everywhere (from the Cloud to the embedded world), it can be difficult to set up and manage as a system administrator. General purpose distros have Xen packages, but that's just a start in your Xen journey: you need some tooling and knowledge to have a working and scalable platform.
XCP-ng was built to overcome those issues: by bringing Xen to the masses with a fully turnkey distro with Xen as its core. It's the logical sequel to the XCP project, with a community focus from the start. We'll see how it happened, what we did, and what's next. Finally, we'll see the impact of XCP-ng on the Xen Project.
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...The Linux Foundation
Doug has long advocated for more CI/CD (Continuous Integration / Continuous Delivery) processes to be adopted by the Xen Project from the use of Travis CI and now GitLab CI. This talk aims to propose ideas for building upon the existing process and transforming the development process to provide users a higher quality with each release by the Xen Project.
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...The Linux Foundation
High level toolstacks for server and cloud virtualization are very mature with large communities using and supporting them. Client virtualization is a much more niche community with unique requirements when compared to those found in the server space. In this talk, we’ll introduce a client virtualization toolstack for Xen (redctl) that we are using in Redfield, a new open-source client virtualization distribution that builds upon the work done by the greater virtualization and Linux communities. We will present a case for maturing libxl’s Go bindings and discuss what advantages Go has to offer for high level toolstacks, including in the server space.
Today Xen is scheduling guest virtual cpus on all available physical cpus independently from each other. Recent security issues on modern processors (e.g. L1TF) require to turn off hyperthreading for best security in order to avoid leaking information from one hyperthread to the other. One way to avoid having to turn off hyperthreading is to only ever schedule virtual cpus of the same guest on one physical core at the same time. This is called core scheduling.
This presentation shows results from the effort to implement core scheduling in the Xen hypervisor. The basic modifications in Xen are presented and performance numbers with core scheduling active are shown.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
6. Vulnerability
A weakness in the computational logic of software that, when exploited, results in a negative
impact to confidentiality, integrity, OR availability of that software.
Patch / Live Patch
A fix for a security vulnerability.
A live patch can be applied to a running system
Known vulnerabilities
with patches
7. Malware
Software designed to disrupt, damage, or gain authorized access to a computer system.
Exploit
Malware designed to take advantage of a vulnerability
This includes file-less/memory based attack techniques (around 14% at end of 2016)
0-Day Exploit
An exploit of an undisclosed/previously unknown vulnerability that is/has been exploited
Some malware relies on
social engineering: e.g.
phishing, trojans, adware, …
8. Exploit Framework (e.g. Metasploit, …)
A tool for developing and executing exploit code against a remote target machine
Rootkit
Software tools that enable unauthorized users to gain control of a computer system without
being detected, some for for a long period of time
9. A new way to protect against malware
Developed by Zentific, Citrix,
Bitdefender, Intel and others
10. VM3
Guest OS
App
VMn
Guest OS
App
VM2
Guest OS
App
Dom0
Dom0 Kernel
Drivers Agent(s) Agent(s) Agent(s)
Installed in-guest agents, e.g. anti-virus software,
VM disk & memory scanner, network monitor, etc.
Can be disabled by rootkits
11. Several
VM3 VMnVM2Dom0
Dom0 Kernel
Drivers
VM3
Guest OS
App
VMn
Guest OS
App
VM2
Guest OS
App
Security
Appliance
VM1
Introspection
Engine
Protected area
authentication mechanism to protect the IF
Uses HW extensions to monitor memory (e.g. Intel EPT) Low Intrusion
Register rules with Xen to trap on and inspect suspicious activities
(e.g. execution of memory on the dynamic heap)
12. All malware need an attack technique to gain a foothold
Attack techniques exploit specific software bugs/vulnerability
Most exploits use one of a small set of attack techniques
Buffer Overflows, Heap Sprays, Code Injection, API Hooking, …
Because VMI protects against attack techniques
It can protect against entirely new malware
Verified to block these advanced attacks in real-time
APT28, Energetic Bear, DarkHotel, Epic Turla, Regin, ZeuS, Dyreza, EternalBlue
… solely by relying on VMI
WannaCry/EternalBlue blocked in real installations1
1 businessinsights.bitdefender.com/hypervisor-introspection-defeated-enternalblue-a-priori
13. Rootkits
Exploit 0-days in Operating Systems/System Software
Can disable agent based security solutions (mask their own existence)
VMI solutions operate from outside the VM
Thus, it cannot be disabled using traditional attack vectors
BUT:
VMI is not a replacement, for traditional security solutions
It is an extra tool that can be used to increase protection
18. R: Vulnerability reported to security@xenproject.org
P: Vulnerability pre-disclosed on xen-security-issues@lists.xenproject.org
R P
Fixing Security Bugs:
Dedicated security team =
security experts from within
the Xen Project Community
Security Team:
Triage
Creation of fix/patches
Validation of fix/patches
Assignment of CVE
Issue description and risk analysis
19. AR P
Fix their systems/software:
Eligible Xen Project Users
are informed under embargo
of the vulnerability
Eligible Users = Pre-disclosure list members:
Product Companies, Open Source & Commercial Distros (e.g. Huawei, Debian)
Service/Cloud Providers (e.g. Alibaba)
Large Private Downstream (e.g. Google)
Allowed to share information via
xen-security-issues- discuss@lists.xenproject.org
R: Vulnerability reported to security@xenproject.org
P: Vulnerability pre-disclosed on xen-security-issues@lists.xenproject.org
A: Vulnerability announced on xen-announce@lists.xenproject.org & xenbits.xen.org/xsa
20. A XR P
General Publication:
Information about
vulnerability is made public
Everyone else:
Patches their systems either through
security updates from distros/products or
builds them from source.
Users of service/cloud providers will
not be impacted
R: Vulnerability reported to security@xenproject.org
P: Vulnerability pre-disclosed on xen-security-issues@lists.xenproject.org
A: Vulnerability announced on xen-announce@lists.xenproject.org & xenbits.xen.org/xsa
21. A XR P
R: Vulnerability reported to security@xenproject.org
P: Vulnerability pre-disclosed on xen-security-issues@lists.xenproject.org
A: Vulnerability announced on xen-announce@lists.xenproject.org & xenbits.xen.org/xsa
Product Vendors:
Create and test live patches
Product customers:
Apply live patches here
Service Providers:
Create, test and deploy live patches
Users of service/cloud providers will
not be impacted
Security Team:
Can a Livepatch can be created?
No? If possible, re-write fix/patches
22. A tale of close collaboration within
the Xen Project Community
23. 2015 2016 2017
4.84.7 P
Why did we develop Live Patching?
Cloud reboot affected AWS, Rackspace, IBM SoftLayer and others
Deploying security patches may require reboots; Inconveniences users
How did we fix this?
2015: Design with input from AWS, Alibaba, Citrix, Oracle and SUSE
2016: Xen 4.7 came with Live Patching for x86
2016: Xen 4.8 added extra x86 use-cases and ARM support
2017: XenServer 7.1 releases Live Patching in first commercial product
D
10% 1%
24. const char *xen_extra_version(void)
{
return XEN_EXTRAVERSION;
}
push %rbp
mov %rsp,%rbp
lea 0x16698b(%rip),%rax
leaveq
retq
const char *xen_extra_version(void)
{
return “Hello World”;
}
push %rbp
mov %rsp,%rbp
lea 0x29333b(%rip),%rax
leaveq
Retq
Replacing compiled functions with new code, encoded in an ELF file called
payload, while the hypervisor is running without impacting running guests.
Design: xenbits.xenproject.org/docs/unstable/misc/livepatch.html
25. The exact source tree used to
build the running Xen instance.
The .config from the original
build of Xen.
A build-id onto which the
livepatch will be applied.
A source patch.
livepatch-
build-
tools
The exact same
compilation toolchain
used to build the
running Xen.
Livepatch
payload
26. Supports stacking of different payloads; payloads depend on build-id
Functionality:
list: lists loaded and applied live patches
upload: load & verify a live patch
unload: unload a live patch
apply: apply a live patch
revert: un-apply a live patch Xen 4.8.1
XSA 213
XSA 214
XSA 215
Depends on
build-id of 4.8.1
Depends on
build-id of XSA 213
Depends on
build-id of XSA 214
28. Source patches
+ other
build artifacts
Hot Fixes contain
Per valid patch level: a Xen or Dom0 Live Patch
Matching RPMs for most recent patch level
In case of a reboot or for Xen/Dom0 not capable of Live Patching
Extensive Verification and Validation:
The process of patching a live hypervisor or kernel
is not an easy task. What happens is a little bit like open
heart surgery. The patient is the hypervisor and/or Dom0
itself, and precision and care are needed to get things right.
One wrong move and it is game over.
Live
Patch
Live
Patch
Live
Patch
build
for each
patch level
package
Hot Fix
LPsRPMs
RPMRPMRPM
build
for most recent
patch level
Hot Fix
LPsRPMs
Publication
SigningValidation
Verification
Q&A
(livepatch-build
or kpatch-build)
(iso)
29. XAPI
Toolstack
Hot Fix
LPsRPM
downloadHot Fix
LPsRPM
Dom0
Dom0 Kernel
(CentOS)
Hypervisor
XenCenter
or xe
Initiates
host update
SysAdmin
Running System
instance that supports
live patching
Disk
updates
(such that
after reboot
the patches
are applied)
works out
correct LP
& updates
(using native
live patching
tools or APIs)
34. A XR P
Responsible Disclosure: fix critical systems/software before publication
R: Vulnerability reported to security@...
P: Vulnerability pre-disclosed to eligible users
A: Vulnerability announced publicly
F: Fix available
Full Disclosure, immediate (no-fix): public disclosure without a fix
A XR F
A XR
Full Disclosure, post-fix: public disclosure with a fix
F
F
35. 4) New members: http://seclists.org/oss-sec/2017/q2/638
5) http://www.openwall.com/lists/oss-security or devel list
6) https://wiki.qemu.org/index.php/SecurityProcess
Only handles x86 KVM bugs (no ARM or other bugs)
1) Is the CVE severity used to handle vulnerabilities differently?
2) Days embargoed (information is classified)
3) D = Distros/Products, S = Public Service, P = Private Downstream
4) http://oss-security.openwall.org/wiki/mailing-lists/distros
Responsible only
Days 2 Who? 3FOSS Project Bug Severity 1 Process Type
14-19 D 4
Linux Kernel via
OSS-security distros 4 ≥ Medium – Critical Responsible Disclosure
14-19 D 4
QEMU (KVM) via
QEMU Security
Process 6
≥ Medium – Critical
≤ Low
Responsible Disclosure
Full Disclosure, no-fix
3-5 D, S, POpenStack OSSA
OpenStack OSSN
≥ Medium – Critical
≤ Low
Responsible Disclosure
Full Disclosure, post-fix
Xen Hypervisor
Includes Linux & QEMU
vulnerabilities in supported Xen
configurations
Low – Critical Responsible Disclosure 14 D, S, P
14-19
Linux Kernel via
OSS-security distros 4
OSS-security 5
≥ Medium – Critical
≤ Low
Responsible Disclosure
Full Disclosure, no-fix
36. Impacts how long a user (aka you) is at risk
Is my distro/vendor on a pre-disclosure list?
A surprisingly large number of distros are not:
including a few on Linux.com’s Best Linux Distros of 2016 list
Impacts cloud / service providers
As a user, are security issues fixed before public disclosure?
Low Severity vulnerabilities can still be High Risk
Temporal and Environmental CVSS scores are not covered by CVE databases
(neither cvedetails.com or nvd.nist.gov)
Vulnerabilities can be chained together, making the combo High Severity
(e.g. Hot Potato used 3 old unpatched vulnerabilities to gain root access)
37. cvedetails.com (bit.do/guide-cvedetails)
Easy to use interface for vulnerability data
Data from several sources
Browsable by vendor, product, version, type, date…
Vulnerability statistics, trends, reports
BUT: rigid ➜ getting data outside pre-defined vendor/product categories is near-impossible
vulners.com (good guides on slideshare.net – search for vulners)
In many ways more accurate and flexible than cvedetails
type:cve AND (description:kvm OR description:qemu) AND published: [2012 TO *] ➜307
type:cve AND (description:xen) AND published: [2012 TO *] ➜ 245
…
Works best when used through its API (in particular if you want to visualize the data)
38. Vulnerability data from vulners.com
0
50
100
150
200
250
300
350
2012 2013 2014 2015 2016 2017
Linux Kernel
KVM w. QEMU
Xen Project
*) Data up to Sept 4th, 2017
169
517
222
197
129
120
51
7
63
143
34
5
Legend: CVSS
Score Distribution
Low
Medium
High
Critical
*
39. Data covering September 2016 – September 2017: from vulners.com, mention.com and theregister.com
Clips covering
vulnerabilities
(US only)
% of Vulnerability
Stories on
The Register155
370 314
7283
0
1000
2000
3000
4000
5000
6000
7000
8000
Xen KVM QEMU Linux
0
50
100
150
200
250
300
350
400
450
Xen KVM QEMU Linux
Number of
Vulnerabilities
0%
5%
10%
15%
20%
25%
30%
35%
40%
Xen KVM QEMU Linux
33% of Xen stories
cover Vulnerabilities
2.5%
16%
6.5%
40. Does the Project Look for Vulnerabilities?
Approach to Quality and Testing: e.g. Fuzzing, Audits of components
Does the project award Bug Bounties (e.g. NetBSD)?
Do vendors supporting the project offer Bug Bounties?
Infrastructure related to Vulnerabilities
Transparency: How well are processes documented
Vulnerability Testing: XTF (in Xen)
Vulnerability Tooling: XSATool, XSAMatch (in Xen)
42. Xen Project:
Only Hypervisor with VMI
Protection from new classes of malware
Several security companies working with XenServer
Live Patching
Disruption free application of vulnerabilities
Used by several cloud providers
Used best in commercial products, e.g. XenServer
Industry Leading Vulnerability Process
Includes QEMU and Kernel XSAs
General:
Tools do assess project’s track records
Not an easy task
Harder for proprietary products due to lack of information
Picture by Lars Kurth