Steganography consists of hiding a secret message within another message. Unlike cryptography, steganography tries to achieve security through obscurity, hiding the very presence of the message. Ideally, the steganographic message will look identically to a normal message.
This talk examines different techniques to hide messages using steganography from the perspective of a PHP developer. From more classical techniques such as hiding an image within another image using the least significant bits of each pixel, to more advanced ones like using TCP/IP packets.
WANT CODING just visit----------http://bit.ly/image_javaproject
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points.
this is about international data encryption algorithm. this is first ever ppt which includes its history, encryption , figure, decryption and application.. do share ur views after viewing it if u like..
A project which implements the Elliptic Curve Cryptography for the Diffie-Hellman keys exchange, in order to establish a secure channel between two Android devices.
This is a short presentation on Vertex Cover Problem for beginners in the field of Graph Theory...
Download the presentation for a better experience...
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
WANT CODING just visit----------http://bit.ly/image_javaproject
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points.
this is about international data encryption algorithm. this is first ever ppt which includes its history, encryption , figure, decryption and application.. do share ur views after viewing it if u like..
A project which implements the Elliptic Curve Cryptography for the Diffie-Hellman keys exchange, in order to establish a secure channel between two Android devices.
This is a short presentation on Vertex Cover Problem for beginners in the field of Graph Theory...
Download the presentation for a better experience...
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Introduction to homomorphic encryption, encryption which allows computations on ciphertext. An overview of key aspects and the ideas that allow these schemes to work is given, as well as examples of how to apply it.
Christoph Matthies (@chrisma0), Hubert Hesse (@hubx), Robert Lehmann (@rlehmann)
U-Net is a convolutional neural network (CNN) architecture designed for semantic segmentation tasks, especially in the field of medical image analysis. It was introduced by Olaf Ronneberger, Philipp Fischer, and Thomas Brox in 2015. The name "U-Net" comes from its U-shaped architecture.
Key features of the U-Net architecture:
U-Shaped Design: U-Net consists of a contracting path (downsampling) and an expansive path (upsampling). The architecture resembles the letter "U" when visualized.
Contracting Path (Encoder):
The contracting path involves a series of convolutional and pooling layers.
Each convolutional layer is followed by a rectified linear unit (ReLU) activation function and possibly other normalization or activation functions.
Pooling layers (usually max pooling) reduce spatial dimensions, capturing high-level features.
Expansive Path (Decoder):
The expansive path involves a series of upsampling and convolutional layers.
Upsampling is achieved using transposed convolution (also known as deconvolution or convolutional transpose).
Skip connections are established between corresponding layers in the contracting and expansive paths. These connections help retain fine-grained spatial information during the upsampling process.
Skip Connections:
Skip connections concatenate feature maps from the contracting path to the corresponding layers in the expansive path.
These connections facilitate the fusion of low-level and high-level features, aiding in precise localization.
Final Layer:
The final layer typically uses a convolutional layer with a softmax activation function for multi-class segmentation tasks, providing probability scores for each class.
U-Net's architecture and skip connections help address the challenge of segmenting objects with varying sizes and shapes, which is often encountered in medical image analysis. Its success in this domain has led to its application in other areas of computer vision as well.
The U-Net architecture has also been extended and modified in various ways, leading to improvements like the U-Net++ architecture and variations with attention mechanisms, which further enhance the segmentation performance.
U-Net's intuitive design and effectiveness in semantic segmentation tasks have made it a cornerstone in the field of medical image analysis and an influential architecture for researchers working on segmentation challenges.
The following slides explains about elliptic curves, their interpretation over Gallois finite fields, algorithms that reduces arithmetic computational requirements and primarly applications of the ECC.
http://imatge-upc.github.io/telecombcn-2016-dlcv/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of big annotated data and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which had been addressed until now with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks and Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles and applications of deep learning to computer vision problems, such as image classification, object detection or text captioning.
Pgp-Pretty Good Privacy is the open source freely available tool to encrypt your emails then you can very securely send mails to others over internet without fear of eavesdropping by cryptanalyst.
DOXLON November 2016 - ELK Stack and Beats Outlyer
Jon Hammant, Head of Cloud & DevOps for UK & EU for Epam Systems, presented an overview of using the ELK stack together with the Beats Plugin data shippers to provide detailed system metrics, network traffic, file analysis, and more. In addition, he provided an overview of how to monitor multiple Docker containers in a cloud native environment, with logs sent back to a central host.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Introduction to homomorphic encryption, encryption which allows computations on ciphertext. An overview of key aspects and the ideas that allow these schemes to work is given, as well as examples of how to apply it.
Christoph Matthies (@chrisma0), Hubert Hesse (@hubx), Robert Lehmann (@rlehmann)
U-Net is a convolutional neural network (CNN) architecture designed for semantic segmentation tasks, especially in the field of medical image analysis. It was introduced by Olaf Ronneberger, Philipp Fischer, and Thomas Brox in 2015. The name "U-Net" comes from its U-shaped architecture.
Key features of the U-Net architecture:
U-Shaped Design: U-Net consists of a contracting path (downsampling) and an expansive path (upsampling). The architecture resembles the letter "U" when visualized.
Contracting Path (Encoder):
The contracting path involves a series of convolutional and pooling layers.
Each convolutional layer is followed by a rectified linear unit (ReLU) activation function and possibly other normalization or activation functions.
Pooling layers (usually max pooling) reduce spatial dimensions, capturing high-level features.
Expansive Path (Decoder):
The expansive path involves a series of upsampling and convolutional layers.
Upsampling is achieved using transposed convolution (also known as deconvolution or convolutional transpose).
Skip connections are established between corresponding layers in the contracting and expansive paths. These connections help retain fine-grained spatial information during the upsampling process.
Skip Connections:
Skip connections concatenate feature maps from the contracting path to the corresponding layers in the expansive path.
These connections facilitate the fusion of low-level and high-level features, aiding in precise localization.
Final Layer:
The final layer typically uses a convolutional layer with a softmax activation function for multi-class segmentation tasks, providing probability scores for each class.
U-Net's architecture and skip connections help address the challenge of segmenting objects with varying sizes and shapes, which is often encountered in medical image analysis. Its success in this domain has led to its application in other areas of computer vision as well.
The U-Net architecture has also been extended and modified in various ways, leading to improvements like the U-Net++ architecture and variations with attention mechanisms, which further enhance the segmentation performance.
U-Net's intuitive design and effectiveness in semantic segmentation tasks have made it a cornerstone in the field of medical image analysis and an influential architecture for researchers working on segmentation challenges.
The following slides explains about elliptic curves, their interpretation over Gallois finite fields, algorithms that reduces arithmetic computational requirements and primarly applications of the ECC.
http://imatge-upc.github.io/telecombcn-2016-dlcv/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of big annotated data and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which had been addressed until now with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks and Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles and applications of deep learning to computer vision problems, such as image classification, object detection or text captioning.
Pgp-Pretty Good Privacy is the open source freely available tool to encrypt your emails then you can very securely send mails to others over internet without fear of eavesdropping by cryptanalyst.
DOXLON November 2016 - ELK Stack and Beats Outlyer
Jon Hammant, Head of Cloud & DevOps for UK & EU for Epam Systems, presented an overview of using the ELK stack together with the Beats Plugin data shippers to provide detailed system metrics, network traffic, file analysis, and more. In addition, he provided an overview of how to monitor multiple Docker containers in a cloud native environment, with logs sent back to a central host.
Create an IoT Gateway and Establish a Data Pipeline to AWS IoT with Intel - I...Amazon Web Services
In this session, learn how to create a complete Gateway-based IoT framework – from the edge to the cloud and back. By using an IoT Gateway as a central data collection, processing, and communication hub, you can create IoT connectivity without having to replace legacy hardware. We show you how to use an Intel NUC gateway and Arduino 101 sensor hub to gather environmental data, and step you through establishing a data pipeline to AWS IoT. We use AWS Lambda to create a rules engine for your data, and then send a control signal back down the Intel Gateway. Bring your laptop and your AWS account for this workshop.
Have you ever wondered “Should I log this?” or “What should I put in this log statement?” or ”What level should I log this at?” If so, you are not alone. Logging is often an afterthought, and usually when you are having a production issue that lacks sufficient logging. If the proper things are logged, lots of value can be unlocked from them. You can help answer a variety of questions: “Is this functionality even being used?”, “Have we seen this before, and if so, under what conditions?”. Questions that can be answered from all perspectives: development, operations and the actual business users themselves!
Larry Shatzer
Hardware fails, applications fail, our code... well, it fails too (at least mine). To prevent software failure we test. Hardware failures are inevitable, so we write code that tolerates them, then we test. From tests we gather metrics and act upon them by improving parts that perform inadequately. Measuring right things at right places in an application is as much about good engineering practices and maintaining SLAs as it is about end user experience and may differentiate successful product from a failure.
In order to act on performance metrics such as max latency and consistent response times we need to know their accurate value. The problem with such metrics is that when using popular tools we get results that are not only inaccurate but also too optimistic.
During my presentation I will simulate services that require monitoring and show how gathered metrics differ from real numbers. All this while using what currently seems to be most popular metric pipeline - Graphite together with metrics.dropwizard.io library - and get completely false results. We will learn to tune it and get much better accuracy. We will use JMeter to measure latency and observe how falsely reassuring the results are. Finally I will show how HdrHistogram helps in gathering reliable metrics. We will also run tests measuring performance of different metric classes.
Poison Pixels—Combatting Image Steganography in CybercrimePriyanka Aash
Image steganography is becoming the attack vector of choice for cyber criminals. This session explains what Stegware is, how it is being used (anti-virus evasion, covert command & control channels, data exfiltration), how it works (redundant data, LSB injection, ordering), why detection strategies will continue to fail to tackle the problem and how transformation can annihilate it.
Learning Objectives:
1: Learn why steganography is now the attack vector of choice for cybercriminals.
2: Understand precisely how it renders detection-based cybersecurity ineffective.
3: Discover a ground-breaking approach to destroying the steganography threat.
(Source: RSA Conference USA 2018)
4Developers 2015: Measure to fail - Tomasz KowalczewskiPROIDEA
YouTube: https://www.youtube.com/watch?v=H5F0D55nKX4&index=11&list=PLnKL6-WWWE_WNYmP_P5x2SfzJ7jeJNzfp
Tomasz Kowalczewski
Language: English
Hardware fails, applications fail, our code... well, it fails too (at least mine). To prevent software failure we test. Hardware failures are inevitable, so we write code that tolerates them, then we test. From tests we gather metrics and act upon them by improving parts that perform inadequately. Measuring right things at right places in an application is as much about good engineering practices and maintaining SLAs as it is about end user experience and may differentiate successful product from a failure.
In order to act on performance metrics such as max latency and consistent response times we need to know their accurate value. The problem with such metrics is that when using popular tools we get results that are not only inaccurate but also too optimistic.
During my presentation I will simulate services that require monitoring and show how gathered metrics differ from real numbers. All this while using what currently seems to be most popular metric pipeline - Graphite together with com.codahale metrics library - and get completely false results. We will learn to tune it and get much better accuracy. We will use JMeter to measure latency and observe how falsely reassuring the results are. We will check how graphite averages data just to helplessly watch important latency spikes disappear. Finally I will show how HdrHistogram helps in gathering reliable metrics. We will also run tests measuring performance of different metric classes
Hardware fails, applications fail, our code... well, it fails too (at least mine). To prevent software failure we test. Hardware failures are inevitable, so we write code that tolerates them, then we test. From tests we gather metrics and act upon them by improving parts that perform inadequately. Measuring right things at right places in an application is as much about good engineering practices and maintaining SLAs as it is about end user experience and may differentiate successful product from a failure.
In order to act on performance metrics such as max latency and consistent response times we need to know their accurate value. The problem with such metrics is that when using popular tools we get results that are not only inaccurate but also too optimistic.
During my presentation I will simulate services that require monitoring and show how gathered metrics differ from real numbers. All this while using what currently seems to be most popular metric pipeline - Graphite together with metrics.dropwizard.io library - and get completely false results. We will learn to tune it and get much better accuracy. We will use JMeter to measure latency and observe how falsely reassuring the results are. Finally I will show how HdrHistogram helps in gathering reliable metrics. We will also run tests measuring performance of different metric classes.
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus44CON
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
This 2 hour workshop will introduce you to Industrial Ethernet Switches and their vulnerabilities. These are switches used in industrial environments, like substations, factories, refineries, ports, or other other homes of industrial automation equipment. In other words, scada and ICS switches. You will gain familiarity with the basic usage of these switches, and do some very light traffic analysis and firmware reverse engineering.
Not only will vulnerabilities be disclosed for the first time (exclusively at 44CON), but the methods of finding those vulnerabilities will be shared. If you have never done any reverse engineering or firmware analysis, this might be a good place to start.
You will need to be familiar with a linux commandline, and the usage of tools such as BURP and wireshark. If you are an IDA Pro wizard we welcome your attendance, but we won’t be teaching you anything new. However, we will examine firmware and device embedded webservers with tools such binwalk, strings, grep, xxd, python, scapy, and compression utilities.
All vulnerabilities taught/disclosed will be in the default configuration state of the devices. While these vulnerabilities have been responsibly disclosed to the vendors, SCADA/ICS patching in live environments tends to take 1-3 years. So this work will be fresh and useful for your penetration tests in the future.
You might even find new vulnerabilities with the chance to play with these devices (which are being brought to 44CON for this workshop)!
Encryption is a process of converting a message, image, or any other .pdfrachanaprade
Encryption is a process of converting a message, image, or any other form of data into encoded
data that can only be decoded by someone who can decrypt the message (usually with a key or
the like). The science of writing secret codes is called cryptography For thousands of years,
cryptography has made secret messages that only the sender and recipient could read, even if
someone captured the messenger and read the coded message. A secret code system is called a
cipher. A good encryption algorithm should produce output that looks random to a bystander but
is easily decipherable with the correct key. Thus, encryption algorithms make use of pseudo-
random encryption keys. Let's start with some definitions: - Encryption or Enciphering: the
process of encoding messages to make them unreadable. This algorithm has two inputs: a
plaintext and a secret key. - Decryption or deciphering: making encrypted messages readable
again by decoding them (recovering the plaintext from ciphertext). - Cipher: an algorithm for
performing encryption and decryption. - Plaintext: the original message. - Ciphertext: the
encrypted message. Note: a ciphertext still contains all of the original message information, even
if it looks nonsense. - Secret key; the same key used for encryption and decryption. -
Cryptography, the science of studying ciphers. For this project, you need to develop a game that
converts normal English words into secret codes. In order to convert, the program randomly
applies an encryption algorithm to any given message. The algorithms you need to implement
include Substitution, Playfais Caesas Transposition, Product, and RSA ciphers. 1. Substitution
cipher, replacing each letter of the alphabet in the plaintext with a different letter in the
ciphertext. For example, if you want to encrypt the word 'Cat', you need to come up with a
substitution for each plaintext letter to a ciphertext letter. For example, you may substitute the
letter ' a ' with the letter ' o '. The rule is that the letter we substitute can only be used once. So,
the letter 'o' is crossed off as it has already been used. The same would be applied to all
alphabetic letters.
1. Substitution cipher; replacing each letter of the alphabet in the plaintext with a different letter
in the ciphertext. For example, if you want to encrypt the word 'Cat'; you need to come up with a
substitution for each plaintext letter to a ciphertext letter, For example. you may substitute the
letter 'a' with the letter ' 0 . The rule is that the letter we substitute can only be used once. So, the
letter 'o' is crossed off as it has already been used. The same would be applied to all alphabetic
letters. You can also substitute a letter with itself. If you are not familiar with this cipher. please
visit: Substitution cipher Page 3 of 5 2. Playfair cipher is a digraph substitution cipher. It
employs a table where one letter of the alphabet is omitted, and the letters are arranged in a 55
grid. For more informat.
Aplicaciones CLI profesionales con SymfonyRaul Fraile
El componente de consola de Symfony permite crear aplicaciones CLI de una forma rápida y sencilla, pero nos encontramos con algunas dificultades cuando esa aplicación va a ser usada por múltiples usuarios. A diferencia de una aplicación web, no controlamos el entorno, por lo que hay algunos retos a tener en cuenta.
En la charla se explicarán distintas estrategias para crear, mantener, extender y distribuir de forma segura aplicaciones de consola con un aspecto profesional. Entre otros, se verá cómo empaquetar aplicaciones CLI en un archivo PHAR, firmarlo digitalmente, ofrecer actualizaciones automáticas (self-update), uso de "dotfiles", permitir extender la aplicación a través de plugins, así como lidiar con distintas versiones de PHP y distintos sistemas operativos.
How GZIP compression works - JS Conf EU 2014Raul Fraile
Data compression is an amazing topic. Even in today’s world, with fast networks and almost unlimited storage, data compression is still relevant, especially for mobile devices and countries with poor Internet connections.
For better or worse, GZIP compression is the de-facto lossless compression method for compressing text data in websites. It is not the fastest nor the better, but provides an excellent tradeoff between speed and compression ratio. The way Internet works makes it also difficult to use newer compression methods.
This talk examines how GZIP works internally, explaining the internals of the DEFLATE algorithm, which is a combination of LZ77 and Huffman coding. Different implementations will be compared, such as GNU GZIP, 7-ZIP and zopfli, focusing on why and how some of these implementations perform better than others.
Finally, we will try to go beyond GZIP, preprocessing our data to achieve better results. For example, transposing JSON.
$kernel->infect(): Creating a cryptovirus for Symfony2 appsRaul Fraile
Slides for my presentation at the Symfony Valencia meetup on creating a cryptovirus for Symfony2 apps.
Video (in Spanish): http://www.youtube.com/watch?v=rLHzmA0UuIw
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
2. E U Q W E X S A O S L Z U
L R T Z S R P V I Y E P N
H A F H G Z I P L M F I E
G U R I C E R T I F I E D
B L A A Q N T E T O R T T
E K I M A D H S G N O 💩 A
P O L Y G L O T A Y E S U
A J E W H I T E S P A C E
O B R F S A C I L I A P Y
S T E G A N O G R A P H Y
R A M C Y T I R W C P P A
About me
10. • Esoteric programming language with
only three lexical tokens: Space (ASCII
32), Tab (ASCII 9) and Line Feed (ASCII
10).
• Stack based language with support for
I/O, flow control and arithmetic
operations.
Motivation
Source: http://youtu.be/u_kqM0gn63M
15. Bacon’s Bilateral Cipher
A AAAAA
B AAAAB
C AAABA
D AAABB
E AABAA
F AABAB
G AABBA
H AABBB
I/J ABAAA
K ABAAB
L ABABA
M ABABB
N ABBAA
O ABBAB
P ABBBA
Q ABBBB
R BAAAA
S BAAAB
T BAABA
U/V BAABB
W BABAA
X BABAB
Y BABBA
Z BABBB
Take the red pill
BAABA AAAAA ABAAB AABAA BAABA
AABBB AABAA BAAAA AABAA AAABB
ABBBA ABAAA ABABA ABABA
Steganography is the art or practice of
concealing messages within other messages
S t e g a n o g r a p h y i s t h e a r t
o r p r a c t i c e o f c o n c e a l i n g
m e s s a g e s w i t h i n o t h e r
m e s s a g e s
70
16. • Backmasking is a technique in which a
sound or message is recorded backward
onto a track that is meant to be played
forward.
• It is a deliberate process, whereas a
message found through phonetic
reversal may be unintentional.
Backmasking
17. Backmasking
If there's a bustle in your hedgerow,
don't be alarmed now, it's just a spring
clean for the May queen. Yes there are
two paths you can go by, but in the long
run there's still time to change the road
you're on.
Oh here's to my sweet Satan. The one
whose little path would make me sad,
whose power is satan. He'll give those
with him 666, there was a little
toolshed where he made us suffer, sad
Satan.
18. • Some brand color laser printers add tiny
yellow dots to each page, that contain
encoded printer serial numbers and
timestamps.
• Monochrome printers and copiers from
major manufacturers also include the
markings.
• Most printers' codes have not been
decoded.
Printer steganography
24. Piet is a programming language in which
programs look like abstract paintings.
Piet
Composition with Red, Yellow and Blue. 1921, Piet Mondrian
Source: http://www.dangermouse.net/esoteric/piet.html
25. 525
Piet
Darkness change
Hue change None 1 2
None push pop
1 step add substract multiply
2 steps divide mod not
3 steps greater pointer switch
4 steps duplicate roll in(number)
5 steps in(char) out(number) out(char)
DP right CC left
$ npiet example1.png
? 5
25
5
27. • We already have filesystems with support
for encryption, so they only can be read
with the password. But… the attacker
may obtain it illegally or torture the user
to give it up.
• The steganographic filesystem goes one
step further: it does not even show the
existence of sensitive information (even
when raw sectors of the hard disc are
accessed).
Steganographic filesystem
29. • Network steganography uses communication
protocols and are harder to detect.
• Techniques:
• Steganophony: Delayed or corrupted
packets that would normally be ignored by
the receiver.
• WLAN Steganography: Transmission of
steganograms in Wireless Local Area
Networks
Network Steganography
30. • Custom HTTP headers to include geeky
messages or as a recruiting tool.
• For example, booking.com:
• X-Recruiting: Like HTTP headers?
C o m e w r i t e o u r s : h t t p s : / /
workingatbooking.com
HTTP headers
32. • St e ga n o g r a p h i c m e t h o d fo r t h e
BitTorrent P2P file transfer service.
• It is based on modifying the order of
data packets in the peer-peer data
exchange protocol.
• Steganographic bandwidth of up to 270
b/s while introducing little transmission
distortion and providing difficult
detectability.
StegTorrent
34. • Spammimic embeds a message into
spam.
• There is tons of spam. Also, real spam is
usually dumb, so it's sometimes hard to
tell if it was written by a human or a
machine.
Spammimic
35. Spammimic
Dear Professional , Your email address has been submitted
to us indicating your interest in our newsletter !
This is a one time mailing there is no need to request
removal if you won't want any more ! This mail is being
sent in compliance with Senate bill 2516 , Title 9
, Section 303 . Do NOT confuse us with Internet scam
artists . Why work for somebody else when you can become
rich in 16 days . Have you ever noticed most everyone
has a cellphone and nearly every commercial on television
has a .com on in it ! Well, now is your chance to capitalize
on this ! We will help you decrease perceived waiting
time by 190% and deliver goods right to the customer's
doorstep ! The best thing about our system is that
it is absolutely risk free for you ! But don't believe
us . Mrs Simpson of Maryland tried us and says "I was
skeptical but it worked for me" . We assure you that
we operate within all applicable laws ! We implore
you - act now ! Sign up a friend and you get half off
. Thanks .
Message: attack
Source: http://www.spammimic.com
Disappearing Cryptography.
Information Hiding: Steganography & Watermarking
37. • Steganalysis is the study of detecting
messages hidden using steganography.
• The goal of steganalysis is to identify
suspected packages, determine whether
or not they have a payload encoded into
them, and, if possible, recover that
payload.
• The problem is generally handled with
statistical analysis.
Steganalysis
40. Binary strings
• In PHP, strings are just a sequence of
bytes (C char type).
• PHP stores the length of strings
explicitly. Unlike C it does not need a
zero termination to find the end of a
string.
41. 5
l l oh e*val
len
Binary strings
typedef union _zvalue_value {
long lval;
double dval;
struct {
char *val;
int len;
} str;
HashTable *ht;
zend_object_value obj;
} zvalue_value;
6
091 21314 0123 88
$str[5]
Big endian: 14 - 0
Little endian: 0 - 14
strlen()
42. pack()/unpack()
• pack() packs data into a binary string
according to a given format.
• unpack() unpacks from a binary string
into an array according to a given
format.
58. • PHP extension to use the
• It provides high level function to deal
directly with pixels (they will be used to
encode data), such as imagecolorat()
and imagesetpixel().
GD extension
Source: http://libgd.bitbucket.org/
59. Demo #2.1
Embedding text data into
images (+ steganalysis)
/demos/demo2/demo2_1
raulfraile/steganography_talk
62. • A polyglot is a program written in a valid
form of multiple programming
languages.
• Generally are written in a combination of
C (which allows redefinition of tokens
with a preprocessor) and a scripting
language.
Polyglot programs
64. Demo #3.1
Embedding PHP code using
__halt_compiler()
/demos/demo3/demo3_1
raulfraile/steganography_talk
65. __halt_compiler()
• Halts the execution of the compiler.
• The byte position of the data start is
given by the __COMPILER_HALT_OFFSET__
constant.
• PHAR files make use of this function to
separate the stub (loader functionality)
and the rest of the file (manifest, files
and signature).
70. Whitespace
• Esoteric programming language with
only three lexical tokens: Space (ASCII
32), Tab (ASCII 9) and Line Feed (ASCII
10).
• Stack based language with support for
I/O, flow control and arithmetic
operations.
72. nikic/php-parser
• A PHP parser written in PHP.
• Useful for static code analysis, manipulation
and generation.
• Converts PHP code into an AST (Abstract
Syntax Tree).
• Uses a PHP 5.6 compliant grammar (backwards
compatible with PHP 5.2+). Also, emulates
tokens from different versions of the one
running (for example, parse 5.6 code from 5.3).
Source: https://github.com/nikic/PHP-Parser
75. nikic/php-parser
• The parser provides two main
components:
• NodeTraverser: For traversing and
visiting the node tree.
• PrettyPrinter: To compile the AST
back to PHP code.