Slides from ThotCON 0x04 presentation on penetration testing with an army of small, low-powered devices running The Deck connect by 802.15.4 and/or Zigbee mesh networking.
The Deck: a portable, low-power, full-on penetrating testing and forensics system. The Deck runs on the BeagleBoard-xM and BeagleBone. It provides hundreds of security tools
Some recent claims have been made concerning the ability to remotely hijack airplanes. This talk examines those claims.
Videos for slides are now available:
https://www.youtube.com/watch?v=dOlM1weOF8g
https://www.youtube.com/watch?v=-6IW-vJSHeU
https://www.youtube.com/watch?v=LHqnUUiowjs
DEFCON XX presentation on how to use a simple microcontroller device to make your USB mass storage device look like one that is authorized to be mounted. Also provides the ability to write block the drive to prevent deletion of security tools during use.
Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...Raul Chong
These are the slides used in the Toronto-SMAC meetup:
"Rapidly developing IoT (Internet of Things) applications - Part 2"
http://www.meetup.com/Toronto-SMAC-Social-Mobile-Analytics-Cloud-Meetup/events/195132732/
Topics covered:
- Arduino and sensors: Bus simulation project
- Freakduino and solar panels: Vibrometer project
- Raspberry-Pi: Home security system (part 2)
- Oculus Rift: Developing an Educational game (part 2)
- Beacons: Tracking customer patterns at a retail store
- Introduction to Node-Red
Kernel Recipes 2017 - HDMI CEC: Status Report - Hans VerkuilAnne Nicolas
The HDMI connector features a CEC (Consumer Electronics Control) pin that allows connected devices to detect and control one another. A new framework to handle CEC was added to the kernel in 2016.
This talk describes the current state of the CEC support, how to implement new CEC drivers and the various complications you will encounter when using CEC.
Hans Verkuil
The Beagle Bone Black is a low-cost development platform that allows developers to boot Linux in under 10 seconds and get started on development quickly using just a USB cable. It has an ARM Cortex-A8 processor, 512MB RAM, and connectivity options like USB, Ethernet, HDMI. The Beagle Bone Black supports software like Angstrom Linux, Android, and Cloud9 IDE. It can be used for physical computing, robotics, and running programs like OpenCV for image analysis. Capes expansion boards can add functionality like motors, sensors, and cameras.
Using Erlang on the RaspberryPi to interact with the physical worldBrian Chamberlain
Embedded linux systems are gaining in popularity in the maker/hacker communities. Platforms such as the BeagleBone and RaspberryPi have created new interest in systems which can interact with the physical world. However, interacting with the physical world can be a challenge. Luckily, we have Erlang to help us out. This talk covers new hardware platforms, embedded linux systems, why Erlang is a good fit, and how you can get started hardware hacking the world with Erlang.
The Deck: a portable, low-power, full-on penetrating testing and forensics system. The Deck runs on the BeagleBoard-xM and BeagleBone. It provides hundreds of security tools
Some recent claims have been made concerning the ability to remotely hijack airplanes. This talk examines those claims.
Videos for slides are now available:
https://www.youtube.com/watch?v=dOlM1weOF8g
https://www.youtube.com/watch?v=-6IW-vJSHeU
https://www.youtube.com/watch?v=LHqnUUiowjs
DEFCON XX presentation on how to use a simple microcontroller device to make your USB mass storage device look like one that is authorized to be mounted. Also provides the ability to write block the drive to prevent deletion of security tools during use.
Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...Raul Chong
These are the slides used in the Toronto-SMAC meetup:
"Rapidly developing IoT (Internet of Things) applications - Part 2"
http://www.meetup.com/Toronto-SMAC-Social-Mobile-Analytics-Cloud-Meetup/events/195132732/
Topics covered:
- Arduino and sensors: Bus simulation project
- Freakduino and solar panels: Vibrometer project
- Raspberry-Pi: Home security system (part 2)
- Oculus Rift: Developing an Educational game (part 2)
- Beacons: Tracking customer patterns at a retail store
- Introduction to Node-Red
Kernel Recipes 2017 - HDMI CEC: Status Report - Hans VerkuilAnne Nicolas
The HDMI connector features a CEC (Consumer Electronics Control) pin that allows connected devices to detect and control one another. A new framework to handle CEC was added to the kernel in 2016.
This talk describes the current state of the CEC support, how to implement new CEC drivers and the various complications you will encounter when using CEC.
Hans Verkuil
The Beagle Bone Black is a low-cost development platform that allows developers to boot Linux in under 10 seconds and get started on development quickly using just a USB cable. It has an ARM Cortex-A8 processor, 512MB RAM, and connectivity options like USB, Ethernet, HDMI. The Beagle Bone Black supports software like Angstrom Linux, Android, and Cloud9 IDE. It can be used for physical computing, robotics, and running programs like OpenCV for image analysis. Capes expansion boards can add functionality like motors, sensors, and cameras.
Using Erlang on the RaspberryPi to interact with the physical worldBrian Chamberlain
Embedded linux systems are gaining in popularity in the maker/hacker communities. Platforms such as the BeagleBone and RaspberryPi have created new interest in systems which can interact with the physical world. However, interacting with the physical world can be a challenge. Luckily, we have Erlang to help us out. This talk covers new hardware platforms, embedded linux systems, why Erlang is a good fit, and how you can get started hardware hacking the world with Erlang.
Talk given in Hackware about the details behind my PCB business card. More detailed information can be found in my blog post:
http://yeokhengmeng.com/2015/09/pcb-businessname-card/
or Github repo
https://github.com/yeokm1/pcb-name-card
The presentation deals with the range of features of the Linux sound subsystem — Advanced Linux Sound Architecture (ALSA). During the presentation, the participants were provided with case studies of the difference it makes for the development of audio drivers for PC and embedded systems. Also, it was
shared an overview of the state-of-the-art tendencies in the development of audio drivers for embedded systems.
This presentation by Vadym Shovkoplias (Senior Software Engineer, GlobalLogic Kharkiv) was delivered at GlobalLogic Kharkiv Embedded TechTalk #1 on March 13, 2018.
The document discusses how USB devices contain hidden microcontrollers that can run malicious firmware. The firmware can be reversed engineered and patched to carry out attacks like diverting network traffic or emulating keyboard input. No effective defenses against USB attacks currently exist since the firmware is hidden and can be updated.
The Arm Beetle IoT evaluation board is built around the Arm CoreLink SSE-100 Subsystem, which allows design teams to create IoT endpoints faster and with lower risk. Arm’s scalable IP solutions are designed to target across the value chain, from sensors to servers. Arm’s IoT subsystem with Mbed OS is a complete reference system, that reduces the complexity and risk of a SoC design for IoT endpoints. The subsystem features a range of peripherals and interfaces. It is specifically designed for use with Cortex-M processors and Arm Cordio Bluetooth Smart Radio IP. Arm has taken this subsystem and generated a proof of concept test chip called Beetle.
(1) The Nerves project aims to build small to mid-sized embedded systems using Erlang/OTP by creating a minimal embedded Linux environment that is cross-compiled to only include necessary libraries. (2) It uses Buildroot to customize a minimal init process and build OTP releases that can fully update systems. (3) The workflow involves developing OTP applications, cross-compiling binaries, generating an Erlang/OTP release, and burning the final system image to an SD card or updating firmware.
Building a Network IP Camera using ErlangFrank Hunleth
This is my Erlang Factory SF 2014 talk on using the Nerves project to make a streaming IP camera with the Beaglebone Black and a custom image sensor cape. The presentation provides throughput, latency, and memory usage measurements to motivate using Erlang in embedded Linux-based devices.
Fear and Loathing on your Desk: BadUSB, and what you should do about it
Presented at Kiwicon 9, 10-11 December 2015, Wellington New Zealand.
For over 15 years USB has been the universal computing peripheral interface. In simpler times the host computer and the USB device trusted each other, and so USB implementations historically placed little emphasis on security issues. But what if malicious firmware were loaded into a USB device? How can you protect yourself from BadUSB?
This talk will review public implementations of BadUSB, and (the distinct lack of) available defensive techniques. A hardware gadget will then be presented to make most of your problems...disappear.
Wherein I install OpenWRT on to an inexpensive TP-Link pocket router, install perl and attempt to smoke CPAN.
I also introduce OpenWRT in possibly too much detail, and dont really explain what smoking CPAN is.
PiFlash: Linux utility to flash SD cards for Raspberry Pi computersIan Kluft
Presentation by Ian Kluft at Silicon Valley Perl (SVPerl) on Feb 7, 2019 on "PiFlash: Linux utility to flash SD cards for Raspberry Pi computers". This tool is for use on Linux systems in place of manual procedures to write SD cards to boot a Raspberry Pi board. Safety features for newcomers include checking the destination device and refusing to erase any device that isn't an SD card. Handy automation for experience users includes automatically extracting the OS image from a tar/zip archive and uncompressing it to the SD card in one step.
Kernel Recipes 2017 - An introduction to the Linux DRM subsystem - Maxime RipardAnne Nicolas
Every modern multimedia-oriented ARM SoC usually has a number of display controllers, to drive a screen or an LCD panel, and a GPU, to provide 3D acceleration. The Linux kernel framework of choice to support these controllers is the DRM subsystem.
This talk will walk through the DRM stack, the architecture of a DRM/KMS driver and the interaction between the display and GPU drivers. The presentation is based on the work we have done to develop a DRM driver for the Allwinner SoCs display controller with multiple outputs, such as parallel display interfaces, HDMI or MIPI-DSI. The work done to make the ARM Mali OpenGL driver work on top of a mainline DRM/KMS driver will also be detailed, as well as the more traditional, Mesa-based, solution used in a variety of other platforms.
Maxime Ripard, Free Electrons
Kernel Recipes 2017 - The Serial Device Bus - Johan HovoldAnne Nicolas
UARTs and RS-232 have been around since the 1960s, and despite the advent of technologies like USB and PCIe, it seems UART-attached devices are not going away anytime soon. In embedded systems, UARTs are a
commonly used peripheral interface (e.g. for Bluetooth, NFC, and GPS) even if the kernel infrastructure for dealing with such devices has been both limited in what it can provide (e.g. in terms of power management) and cumbersome to use (e.g. requiring user-space daemons).
This presentation will give an introduction to the recently merged Serial Device Bus, which aims to overcome some of these limitations by making UART-attached devices fit better into the Linux device model. After providing some historical background, the design and interfaces of the new bus will be reviewed, and some known limitations and possibilities for future enhancements will be discussed.
Johan Hovold
Microprocessors are used extensively in the design of any computing facility. It contains units to carry out arithmetic and logic calculations, fast storage in terms of registers and associated control logic to get instructions from memory and execute them. A number of devices can be interfaced with them to develop a complete system application. On the other hand, microcontrollers are single chip computers, integrating processor, memory and other peripheral modules into a single System-on-Chip (SoC). Apart from input-output ports, the peripherals often include timers, data converters, communication modules, and so on. The single chip solution makes the footprint of the computational element small in the overall system package, eliminating the necessity of additional chips on board. However, there exists a large range of such products. While the simpler microcontrollers are cheap, their capabilities (in terms of program size and analog and digital peripherals) are also limited. Such processors may be suitable for small applications. Microcontrollers like 8051, PIC belong to this category. On the other hand, advanced microcontrollers are often much more powerful, comparable to the very advanced microprocessors. The AVR and ARM processors are of this category.
Kernel Recipes 2017 - What's inside the input stack? - Benjamain TissoiresAnne Nicolas
Everybody uses at least one input device when dealing with a computer. And hopefully, this input device “just” works. However, when dealing with the brand-new latest laptop model, it’s common enough that the input devices are not working, or are not working as expected by the users. The reasons are manifold: OEMs want to have more power efficient laptops and are generally refusing to use well-tested PS/2 ball mice from 15 years ago. So they are introducing new touchpads using weird communication protocols. Or they simply want to introduce brand new types of interaction with their laptops (think the latest Macbook Pro and their function bar, but Lenovo had something equivalent 3 years ago on their X1 Carbon). Alongside new devices came the development of Wayland. The end result is that the input stack has evolved a lot in the past few years, and it’s a good thing to give an update of it.
In this talk, we will present what work has been conducted throughout the whole input stack, from the kernel to toolkits (with an emphasize on the kernel). We will explain the choices we made, and why the plans don’t always work. After an overview of the full input stack in current distributions, we will outline the development efforts to support the various device types (mice, touchpads, touchscreens, etc.). Of course, we will tell you the most crusty problems we had to face because who doesn’t like a nice anecdote about hardware oddities.
We hope to make a pleasant talk where no requirements is necessary. We also hope attendees will learn how the input stack is structured. And of course, we hope the attendees will have a more compassionate eye regarding their preferred mouse, touchpad, keyboard or any other device, thinking of the dedication we put in to make their life easier (one can always hope).
Benjamin Tissoire, Red Hat
Greybus is the name for a new application layer protocol on top of Unipro that controls the Ara Phone from Google. This protocol turns a phone into a modular device, allowing any part of the system to be hotplugged while the phone is running.
This talk will describe what this protocol is, why it was designed, and give the basics for how it works. It will discuss how this is implemented in the Linux kernel, and how it easily bridges existing hardware like USB, I2C, GPIO and others with little to no changes needed to existing kernel drivers.
Greg KH, Linux Foundation
Embedded Android system development workshop is focused on integrating new device with Android framework. Our hands-on approach makes Emertxe as the best institute to learn android system development training. This workshop deep dives into Android porting, Android Hardware Abstraction Layer (HAL), Android Services and Linux device driver ecosystem. This workshop based training program will enable you to efficiently integrate new hardware with Android HAL / Framework.
Using Erlang in an Embedded and Cross-Compiled WorldFrank Hunleth
This presentation gives an overview of turning Erlang/OTP releases into Flash images that are ready to copy to an SDCard and run on a BeagleBone Black. It was presented at the ErlangDC conference on 12/7/2013.
PDF version slides from our talk at Navaja Negra & Conecta CON 5th Edition: Destroying Router Security.
Authors:
- José Antonio Rodríguez García
- Álvaro Folgado Rueda
- Iván Sanz de Castro
This document discusses using a Raspberry Pi for various amateur radio projects. It begins by explaining what a Raspberry Pi is - an inexpensive single-board computer running Linux. It then provides examples of using a Raspberry Pi for software defined radio with an RTL-SDR dongle, receiving ADS-B aircraft signals, using WSPR for weak signal propagation reporting with the WsprryPi software, acting as a D-STAR access point with a DVAP dongle, using it for packet radio with software like Direwolf and hardware TNCs, setting up a packet BBS with PiLinBPQ, and using it for APRS with clients like Xastir and YAAC.
This document discusses various generations of HID attack devices that can inject keystrokes and payloads without detection from antivirus or DLP tools. It covers 1st gen devices like Teensy and Rubber Ducky, 2nd gen techniques like BadUSB, and advanced 3rd gen tools like WHID Injector and P4wnP1 that add WiFi capabilities and ways to bypass airgapping. It also discusses mitigation techniques for Linux and Windows like usbguard and duckhunt as well as resources for further information.
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012MediaEval2012
The document summarizes the JHU-HLTCOE Spoken Web Search System. It uses a technique called Randomized Acoustic Indexing for Logarithmic-Time Search (RAILS) to allow searching large audio collections 1000x faster than real-time. It extracts frequency domain linear prediction and cepstral features from audio and performs segmental dynamic time warping search. Results on development and evaluation sets show it achieves mean term-weighted value scores between 0.336-0.439 and actual term-weighted value scores between 0.321-0.369.
Talk given in Hackware about the details behind my PCB business card. More detailed information can be found in my blog post:
http://yeokhengmeng.com/2015/09/pcb-businessname-card/
or Github repo
https://github.com/yeokm1/pcb-name-card
The presentation deals with the range of features of the Linux sound subsystem — Advanced Linux Sound Architecture (ALSA). During the presentation, the participants were provided with case studies of the difference it makes for the development of audio drivers for PC and embedded systems. Also, it was
shared an overview of the state-of-the-art tendencies in the development of audio drivers for embedded systems.
This presentation by Vadym Shovkoplias (Senior Software Engineer, GlobalLogic Kharkiv) was delivered at GlobalLogic Kharkiv Embedded TechTalk #1 on March 13, 2018.
The document discusses how USB devices contain hidden microcontrollers that can run malicious firmware. The firmware can be reversed engineered and patched to carry out attacks like diverting network traffic or emulating keyboard input. No effective defenses against USB attacks currently exist since the firmware is hidden and can be updated.
The Arm Beetle IoT evaluation board is built around the Arm CoreLink SSE-100 Subsystem, which allows design teams to create IoT endpoints faster and with lower risk. Arm’s scalable IP solutions are designed to target across the value chain, from sensors to servers. Arm’s IoT subsystem with Mbed OS is a complete reference system, that reduces the complexity and risk of a SoC design for IoT endpoints. The subsystem features a range of peripherals and interfaces. It is specifically designed for use with Cortex-M processors and Arm Cordio Bluetooth Smart Radio IP. Arm has taken this subsystem and generated a proof of concept test chip called Beetle.
(1) The Nerves project aims to build small to mid-sized embedded systems using Erlang/OTP by creating a minimal embedded Linux environment that is cross-compiled to only include necessary libraries. (2) It uses Buildroot to customize a minimal init process and build OTP releases that can fully update systems. (3) The workflow involves developing OTP applications, cross-compiling binaries, generating an Erlang/OTP release, and burning the final system image to an SD card or updating firmware.
Building a Network IP Camera using ErlangFrank Hunleth
This is my Erlang Factory SF 2014 talk on using the Nerves project to make a streaming IP camera with the Beaglebone Black and a custom image sensor cape. The presentation provides throughput, latency, and memory usage measurements to motivate using Erlang in embedded Linux-based devices.
Fear and Loathing on your Desk: BadUSB, and what you should do about it
Presented at Kiwicon 9, 10-11 December 2015, Wellington New Zealand.
For over 15 years USB has been the universal computing peripheral interface. In simpler times the host computer and the USB device trusted each other, and so USB implementations historically placed little emphasis on security issues. But what if malicious firmware were loaded into a USB device? How can you protect yourself from BadUSB?
This talk will review public implementations of BadUSB, and (the distinct lack of) available defensive techniques. A hardware gadget will then be presented to make most of your problems...disappear.
Wherein I install OpenWRT on to an inexpensive TP-Link pocket router, install perl and attempt to smoke CPAN.
I also introduce OpenWRT in possibly too much detail, and dont really explain what smoking CPAN is.
PiFlash: Linux utility to flash SD cards for Raspberry Pi computersIan Kluft
Presentation by Ian Kluft at Silicon Valley Perl (SVPerl) on Feb 7, 2019 on "PiFlash: Linux utility to flash SD cards for Raspberry Pi computers". This tool is for use on Linux systems in place of manual procedures to write SD cards to boot a Raspberry Pi board. Safety features for newcomers include checking the destination device and refusing to erase any device that isn't an SD card. Handy automation for experience users includes automatically extracting the OS image from a tar/zip archive and uncompressing it to the SD card in one step.
Kernel Recipes 2017 - An introduction to the Linux DRM subsystem - Maxime RipardAnne Nicolas
Every modern multimedia-oriented ARM SoC usually has a number of display controllers, to drive a screen or an LCD panel, and a GPU, to provide 3D acceleration. The Linux kernel framework of choice to support these controllers is the DRM subsystem.
This talk will walk through the DRM stack, the architecture of a DRM/KMS driver and the interaction between the display and GPU drivers. The presentation is based on the work we have done to develop a DRM driver for the Allwinner SoCs display controller with multiple outputs, such as parallel display interfaces, HDMI or MIPI-DSI. The work done to make the ARM Mali OpenGL driver work on top of a mainline DRM/KMS driver will also be detailed, as well as the more traditional, Mesa-based, solution used in a variety of other platforms.
Maxime Ripard, Free Electrons
Kernel Recipes 2017 - The Serial Device Bus - Johan HovoldAnne Nicolas
UARTs and RS-232 have been around since the 1960s, and despite the advent of technologies like USB and PCIe, it seems UART-attached devices are not going away anytime soon. In embedded systems, UARTs are a
commonly used peripheral interface (e.g. for Bluetooth, NFC, and GPS) even if the kernel infrastructure for dealing with such devices has been both limited in what it can provide (e.g. in terms of power management) and cumbersome to use (e.g. requiring user-space daemons).
This presentation will give an introduction to the recently merged Serial Device Bus, which aims to overcome some of these limitations by making UART-attached devices fit better into the Linux device model. After providing some historical background, the design and interfaces of the new bus will be reviewed, and some known limitations and possibilities for future enhancements will be discussed.
Johan Hovold
Microprocessors are used extensively in the design of any computing facility. It contains units to carry out arithmetic and logic calculations, fast storage in terms of registers and associated control logic to get instructions from memory and execute them. A number of devices can be interfaced with them to develop a complete system application. On the other hand, microcontrollers are single chip computers, integrating processor, memory and other peripheral modules into a single System-on-Chip (SoC). Apart from input-output ports, the peripherals often include timers, data converters, communication modules, and so on. The single chip solution makes the footprint of the computational element small in the overall system package, eliminating the necessity of additional chips on board. However, there exists a large range of such products. While the simpler microcontrollers are cheap, their capabilities (in terms of program size and analog and digital peripherals) are also limited. Such processors may be suitable for small applications. Microcontrollers like 8051, PIC belong to this category. On the other hand, advanced microcontrollers are often much more powerful, comparable to the very advanced microprocessors. The AVR and ARM processors are of this category.
Kernel Recipes 2017 - What's inside the input stack? - Benjamain TissoiresAnne Nicolas
Everybody uses at least one input device when dealing with a computer. And hopefully, this input device “just” works. However, when dealing with the brand-new latest laptop model, it’s common enough that the input devices are not working, or are not working as expected by the users. The reasons are manifold: OEMs want to have more power efficient laptops and are generally refusing to use well-tested PS/2 ball mice from 15 years ago. So they are introducing new touchpads using weird communication protocols. Or they simply want to introduce brand new types of interaction with their laptops (think the latest Macbook Pro and their function bar, but Lenovo had something equivalent 3 years ago on their X1 Carbon). Alongside new devices came the development of Wayland. The end result is that the input stack has evolved a lot in the past few years, and it’s a good thing to give an update of it.
In this talk, we will present what work has been conducted throughout the whole input stack, from the kernel to toolkits (with an emphasize on the kernel). We will explain the choices we made, and why the plans don’t always work. After an overview of the full input stack in current distributions, we will outline the development efforts to support the various device types (mice, touchpads, touchscreens, etc.). Of course, we will tell you the most crusty problems we had to face because who doesn’t like a nice anecdote about hardware oddities.
We hope to make a pleasant talk where no requirements is necessary. We also hope attendees will learn how the input stack is structured. And of course, we hope the attendees will have a more compassionate eye regarding their preferred mouse, touchpad, keyboard or any other device, thinking of the dedication we put in to make their life easier (one can always hope).
Benjamin Tissoire, Red Hat
Greybus is the name for a new application layer protocol on top of Unipro that controls the Ara Phone from Google. This protocol turns a phone into a modular device, allowing any part of the system to be hotplugged while the phone is running.
This talk will describe what this protocol is, why it was designed, and give the basics for how it works. It will discuss how this is implemented in the Linux kernel, and how it easily bridges existing hardware like USB, I2C, GPIO and others with little to no changes needed to existing kernel drivers.
Greg KH, Linux Foundation
Embedded Android system development workshop is focused on integrating new device with Android framework. Our hands-on approach makes Emertxe as the best institute to learn android system development training. This workshop deep dives into Android porting, Android Hardware Abstraction Layer (HAL), Android Services and Linux device driver ecosystem. This workshop based training program will enable you to efficiently integrate new hardware with Android HAL / Framework.
Using Erlang in an Embedded and Cross-Compiled WorldFrank Hunleth
This presentation gives an overview of turning Erlang/OTP releases into Flash images that are ready to copy to an SDCard and run on a BeagleBone Black. It was presented at the ErlangDC conference on 12/7/2013.
PDF version slides from our talk at Navaja Negra & Conecta CON 5th Edition: Destroying Router Security.
Authors:
- José Antonio Rodríguez García
- Álvaro Folgado Rueda
- Iván Sanz de Castro
This document discusses using a Raspberry Pi for various amateur radio projects. It begins by explaining what a Raspberry Pi is - an inexpensive single-board computer running Linux. It then provides examples of using a Raspberry Pi for software defined radio with an RTL-SDR dongle, receiving ADS-B aircraft signals, using WSPR for weak signal propagation reporting with the WsprryPi software, acting as a D-STAR access point with a DVAP dongle, using it for packet radio with software like Direwolf and hardware TNCs, setting up a packet BBS with PiLinBPQ, and using it for APRS with clients like Xastir and YAAC.
This document discusses various generations of HID attack devices that can inject keystrokes and payloads without detection from antivirus or DLP tools. It covers 1st gen devices like Teensy and Rubber Ducky, 2nd gen techniques like BadUSB, and advanced 3rd gen tools like WHID Injector and P4wnP1 that add WiFi capabilities and ways to bypass airgapping. It also discusses mitigation techniques for Linux and Windows like usbguard and duckhunt as well as resources for further information.
The JHU-HLTCOE Spoken Web Search System for MediaEval 2012MediaEval2012
The document summarizes the JHU-HLTCOE Spoken Web Search System. It uses a technique called Randomized Acoustic Indexing for Logarithmic-Time Search (RAILS) to allow searching large audio collections 1000x faster than real-time. It extracts frequency domain linear prediction and cepstral features from audio and performs segmental dynamic time warping search. Results on development and evaluation sets show it achieves mean term-weighted value scores between 0.336-0.439 and actual term-weighted value scores between 0.321-0.369.
Search and Hyperlinking Task at MediaEval 2012MediaEval2012
This document summarizes the Search and Hyperlinking Task at the MediaEval 2012 evaluation. It describes the two subtasks of search and linking of videos using automatic speech recognition transcripts and video clues. Participants were evaluated on their ability to search and retrieve relevant video segments based on queries, and to link related video segments for given anchor videos. The task aimed to provide a unified scenario for search and linking using crowdsourcing to assess results relevance. Several research groups participated by submitting runs for the search and linking subtasks.
Overview of MediaEval 2012 Visual Privacy TaskMediaEval2012
This document provides an overview of a visual privacy task that aims to obscure or scramble regions of people in videos in an acceptable and attractive way while protecting their identity. The task involves 200 test videos ranging from 30-90 seconds long and uses an evaluation set of 12 videos to objectively and subjectively evaluate three approaches based on accuracy, anonymity, intelligibility, quality, and user study questionnaires. The results show that the University of Reading approach had the best performance based on the objective metrics and user study feedback.
Dr. Richard Swart disagrees with several traditional economic theories and approaches to entrepreneurship. He believes the key ingredients for a successful startup are ideas, talent, and capital. However, bringing these together is challenging due to social barriers like distrust between groups. His prescription is for communities to build networks and share information to help entrepreneurs connect with mentors, co-founders, and investors outside their typical circles. Grow America aims to support this by providing opportunities for feedback, learning, and competitions to bridge different communities.
The document summarizes the MediaEval 2012 Multimedia Benchmark Workshop held in Pisa, Italy on October 5, 2012. It discusses the "less is more" philosophy of the workshop, which forces participants to focus on the essentials with only 5 runs, 2 pages, and 10 minutes. It describes how MediaEval is a group dedicated to advancing multimedia state-of-the-art by focusing efforts on collaborative tasks. Finally, it provides information on the timeline and process for MediaEval 2013.
Oliver Wendell Holmes was an American physician and poet who lived from 1809 to 1894. He was known for his witty and insightful writings. Harriet Tubman was an African American abolitionist, humanitarian, and Union spy during the American Civil War. She helped free hundreds of slaves using the Underground Railroad and later worked as a scout and spy for the Union Army during the Civil War.
John Richards: My Life Lessons As An EntrepreneurGrow America
This document profiles John E. Richards, an entrepreneur, investor, and professor. It outlines his professional roles including Managing Partner of UtahAngels Venture Investment Group and positions at BYU. Richards has founded several organizations including BoomStartup and Utah Student 25. He has had success investing in startups like Omniture and Oakley Networks. Richards teaches entrepreneurship and mentors students. He is also the founder of BoomStartup, a startup accelerator based on the TechStars model.
Brave New Task: Musiclef Multimodal Music TaggingMediaEval2012
The document describes the Multimodal Music Tagging Task evaluation organized by MediaEval. The task involves categorizing songs from a commercial music library according to tags for their usage in TV and radio. It utilizes multiple modalities including audio features, social tags, and webpages. The test collection includes 1355 songs annotated with 355 tags. A reference implementation in MATLAB serves as a baseline, evaluating individual modalities and their combination. Participation was low with only one group submitting runs. The task aims to further evaluation of multimodal approaches to music tagging.
This document describes a study that tested using a combination of low-grade rock phosphate and human urine as a novel fertilizer for chickpea plants. The study found that applying this fertilizer combination directly to soil resulted in similar plant growth performance as applying commercial diammonium phosphate fertilizer at the same ratios. Using a waste product like low-grade rock phosphate enriched with human urine holds promise for sustainable agriculture by enabling waste utilization and minimizing waste while improving resource-use efficiency for food production. Crop trials were conducted on chickpea plants in trays with different soil treatments to evaluate the effects on plant growth responses.
Telefonica Research System for the Spoken Web Search task at Mediaeval 2012MediaEval2012
The document describes two spoken web search systems proposed by Telefonica Research - Segmental-DTW (S-DTW) and IR-DTW. Both systems use the same frontend processing and feature extraction but differ in their matching algorithms, with IR-DTW aiming to reduce memory usage and speed up retrieval compared to S-DTW. The systems are evaluated on the Mediaeval 2012 Spoken Web Search task and results show IR-DTW achieves similar accuracy to S-DTW but with improved efficiency.
Violence Detection in Video by Large Scale Multi-Scale Local Binary Pattern D...MediaEval2012
The document discusses a multi-scale local binary pattern (MSLBP) dynamics approach for detecting violence in video streams. It downsamples video to 5Hz, generates an MSLBP vector for each image, and computes the average and variance of changes in M over 20 second sections. A linear SVM is trained on the 20480 dimensions to classify sections as violent or not. Results on one movie were misleading due to feature errors, and the model struggles with desynchronization, but can distinguish fast movements from violent events.
How INRIA identifies Geographic Location of a VideoMediaEval2012
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The Watershed-based Social Events Detection Method with Support from External...MediaEval2012
The document proposes a method for detecting social events from photo metadata by applying watershed segmentation techniques to cluster images into events based on similarity of user annotations, with images assigned to the same event if they share common markers like username, date, tags or nearby GPS locations. The watershed transform treats each unique annotation as a marker and floods image regions from these markers using merging conditions to group images into homogeneous event segments, with boundaries between non-overlapping user involvement preventing images from being assigned to multiple events. External data sources on keywords, locations and semantic relatedness could help prune markers and improve precision and recall of identified social events.
The document announces the winners of some awards or competition. It does not provide any details about the event, awards, or winners. The document consists of punctuation marks and line breaks without any other text.
MediaEval 2012 Visual Privacy Task: Privacy and Intelligibility through Pixel...MediaEval2012
This document discusses privacy protection through visual anonymization techniques. It summarizes research on pixellating and edge detection filters to anonymize faces while maintaining image intelligibility. Two main challenges are detecting faces and filtering them privately. The researchers evaluate face detection algorithms and combine them with tracking and discrimination of front and back faces. They also describe pixellating and edge detection filters and their objective and subjective evaluation, finding the filters protect privacy to some extent but with room for improvement in detection accuracy and reducing filter irritation.
Secrets of Storytelling by Candace KleinGrow America
The document provides an overview of the 5-minute pitch for startups seeking funding. It outlines the key topics investors look for, including the products/services, market, sales strategy, management team, intellectual property, finances, and capital needs. The document also warns of common pitfalls to avoid, such as having no exit plan or unrealistic projections. An example pitch is then provided for a peer-to-peer commercial lending platform called SoMoLend, covering its market opportunity, management team, financial projections, capital raised and milestones.
LIG at MediaEval 2012 affect task: use of a generic methodMediaEval2012
The document summarizes the LIG Quaero consortium's system for detecting violent scenes in videos submitted to the MediaEval 2012 evaluation. The system uses a hierarchical classification pipeline that extracts multiple audio, visual, and motion descriptors from video shots. It applies optimization techniques to the descriptors and uses multiple support vector machine and k-nearest neighbor classifiers. The classifiers and descriptor variants are fused at different levels of the hierarchy. Techniques like conceptual feedback and temporal re-ranking are used to improve performance. The best performing run achieved a MAP@100 score of 0.3138 on the test data.
DCU Search Runs at MediaEval 2012: Search and Hyperlinking TaskMediaEval2012
This document summarizes the DCU Search runs submitted to the MediaEval 2012 Search and Hyperlinking task. It describes the segmentation method used, which segmented audio into 180 second segments with 60 seconds of overlap and included pauses. It also provides details on the sub-corpora used, including the number of documents and terms for runs using the LIUM and LIMSI transcripts with and without pause segmentation and overlap. The runs used the Terrier IR system with a standard language model.
This document discusses hacking and forensics using small, low-power devices like the Beagleboard and Beaglebone. It describes choosing the Beagleboard as a platform due to its small size, low power usage, and features like built-in Ethernet and USB ports. It outlines selecting Ubuntu as the base OS and leveraging existing repositories to obtain forensics and hacking tools. It also covers building tools from source by either natively compiling on the device or cross-compiling from a desktop. The document demonstrates using udev rules to automatically mount external USB drives in read-only mode for forensics purposes when connected to a special USB hub. It concludes by discussing future directions like optimizing more packages and port
This presentations introduces some common protocols used in electronics, and how to sniff/speak them. Then a bit about USB, and some interesting hacks with these things.
Then a bit about openwrt and router hacking.
The objective of this conference is to explain how to develop on small machines that can boot fast, fanless … It’s convenient and often more realistic than to work in virtual machines, especially when working on developping drivers.
Willy will list all the necessary items to setup an optimal environment to be as efficient as possible. Among these one: the importance of investing time to speed up the boot, etc …
He will also speak a bit about crosstool-ng, used in this environement.
I was asked to talk in front of Computer science students at the Bar-Ilan university about "what happens" when you don't care about writing "secured" or "safe" code. A perfect example for that, in my opinion, was the world of embedded computing AKA the IoT. I talked about the history of consumer embedded devices and showed a live demo of an 0day I found in one of the most popular routers in the country.
Some experiences for porting application to Intel Xeon PhiMaho Nakata
The document discusses experiences porting applications to Intel Xeon Phi. It provides tips for compiling applications with Intel Composer XE 2013 using the -mmic flag. While some applications like DGEMM require tuning to achieve peak performance, others like Gaussian09 and Povray require patches and multi-step configurations to build for Xeon Phi. There is also an effort underway to port the pkgsrc packaging system to help bring more software packages to the Xeon Phi.
pfSense 2.2 Preview - pfSense Hangout November 2014Netgate
- pfSense 2.2 is nearing release candidate stage with many updates including a base OS upgrade to FreeBSD 10, improvements to IPsec, OpenVPN, DNS resolver, CARP, outbound NAT, package system, and more.
- Notable changes include switching to Unbound for the DNS resolver, new CARP implementation, AES-GCM support for IPsec, easier outbound NAT configuration, signed packages, and updated firewall logging format.
- Other updates include new GEOM mirror management GUI, wider FreeBSD driver support, expanded NTP options, and various performance, stability, and usability improvements.
The document discusses building an emulation environment called MIPS-X for analyzing MIPS-based IoT devices. It introduces the presenters and their backgrounds in IoT and embedded security research. It then covers challenges in emulating MIPS CPUs and building toolchains, kernels, and filesystems to support running IoT firmware. The talk agenda is outlined which includes demos of using QEMU and Docker for MIPS emulation. Next steps discussed are refining emulation of device NVRAM and developing automated build systems for analyzing IoT firmware.
This document discusses embedded platform choices and compares microcontroller-based systems to Linux-based systems. It provides examples of popular microcontrollers like AVR, PIC, and STM32. It also discusses developing firmware in C/C++ and the importance of understanding a microcontroller's memory layout and peripheral interfaces. The document then covers building embedded Linux systems using tools like Yocto and choosing hardware like system on modules. It provides an example application that uses a microcontroller connected via serial to control an LCD/keypad and a Linux host for networking, storage, and programming in Python.
Kernel Recipes 2016 - Speeding up development by setting up a kernel build farmAnne Nicolas
Building a full kernel takes time but is often necessary during development or when backporting patches. The nature of the kernel makes it easy to distribute its build on multiple cheap machines. This presentation will explain how to set up a build farm based on cost, size, and performance.
Willy Tarreau, HaProxy
Strategies for developing and deploying your embedded applications and imagesMender.io
We will delve into multiple strategies you can use for developing and deploying code to embedded devices. We will compare and contrast the following:
– Lightweight package managers: ipkg/opkg
– Desktop package managers: rpm/deb
– Configuration Management Tools
– Smart Package Manager
– Yocto Runtime Package Management
– PXE boot
– OTA updaters: Mender
As with any decision, it is rarely black-and-white and we will cover some of the benefits and the limitations of all the different methods mentioned, to make sure you have the most critical information needed to decide for yourself whether a given strategy would be a good fit for your embedded application development.
This talk will cover how different mechanisms are implemented in the real world and how choosing the right strategy, understanding its benefits and drawbacks, can speed up and improve the whole development process.
The default applications on an embedded Linux system include many common command line utilities from BusyBox, such as cat, cp, grep, ls, mkdir, more, mv, ping, ps, rm, top, and vi. BusyBox provides minimal versions of many common UNIX commands in a single executable to reduce the size of the system. Other default applications may include services like bootchartd, crond, and syslogd.
This summary covers two lightning talks from BSDTW17:
1) The first talk proposed allowing multiple encrypted GEOM providers to attach using the same passphrase, improving on having to enter the passphrase multiple times. A new rc.conf syntax was suggested.
2) The second talk discussed ongoing work to improve MP-safe networking in NetBSD, including improvements to layers 2-3, drivers, and other components like pfill and npf. Remaining work and questions were also outlined.
Linux Kernel Platform Development: Challenges and InsightsGlobalLogic Ukraine
This presentation is about the main tasks which Linux kernel platform engineers take care of. The talk includes real-life cases which help understand the role of respective specialists and might be helpful to those who consider such change in their careers.
The talk was delivered by Sam Protsenko (Software Engineer, Consultant, GlobalLogic) at GlobalLogic Embedded Career Day #2 on February 10, 2018.
More about GlobalLogic Embedded Career Day #2: https://www.globallogic.com/ua/events/globallogic-kyiv-embedded-career-day-2-materials
A Kernel of Truth: Intrusion Detection and Attestation with eBPFoholiab
"Attestation is hard" is something you might hear from security researchers tracking nation states and APTs, but it's actually pretty true for most network-connected systems!
Modern deployment methodologies mean that disparate teams create workloads for shared worker-hosts (ranging from Jenkins to Kubernetes and all the other orchestrators and CI tools in-between), meaning that at any given moment your hosts could be running any one of a number of services, connecting to who-knows-what on the internet.
So when your network-based intrusion detection system (IDS) opaquely declares that one of these machines has made an "anomalous" network connection, how do you even determine if it's business as usual? Sure you can log on to the host to try and figure it out, but (in case you hadn't noticed) computers are pretty fast these days, and once the connection is closed it might as well not have happened... Assuming it wasn't actually a reverse shell...
At Yelp we turned to the Linux kernel to tell us whodunit! Utilizing the Linux kernel's eBPF subsystem - an in-kernel VM with syscall hooking capabilities - we're able to aggregate metadata about the calling process tree for any internet-bound TCP connection by filtering IPs and ports in-kernel and enriching with process tree information in userland. The result is "pidtree-bcc": a supplementary IDS. Now whenever there's an alert for a suspicious connection, we just search for it in our SIEM (spoiler alert: it's nearly always an engineer doing something "innovative")! And the cherry on top? It's stupid fast with negligible overhead, creating a much higher signal-to-noise ratio than the kernels firehose-like audit subsystems.
This talk will look at how you can tune the signal-to-noise ratio of your IDS by making it reflect your business logic and common usage patterns, get more work done by reducing MTTR for false positives, use eBPF and the kernel to do all the hard work for you, accidentally load test your new IDS by not filtering all RFC-1918 addresses, and abuse Docker to get to production ASAP!
As well as looking at some of the technologies that the kernel puts at your disposal, this talk will also tell pidtree-bcc's road from hackathon project to production system and how focus on demonstrating business value early on allowed the organization to give us buy-in to build and deploy a brand new project from scratch.
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon
Matt Carroll
Infrastructure Security Engineer at Yelp
"Attestation is hard" is something you might hear from security researchers tracking nation states and APTs, but it's actually pretty true for most network-connected systems!
Modern deployment methodologies mean that disparate teams create workloads for shared worker-hosts (ranging from Jenkins to Kubernetes and all the other orchestrators and CI tools in-between), meaning that at any given moment your hosts could be running any one of a number of services, connecting to who-knows-what on the internet.
So when your network-based intrusion detection system (IDS) opaquely declares that one of these machines has made an "anomalous" network connection, how do you even determine if it's business as usual? Sure you can log on to the host to try and figure it out, but (in case you hadn't noticed) computers are pretty fast these days, and once the connection is closed it might as well not have happened... Assuming it wasn't actually a reverse shell...
At Yelp we turned to the Linux kernel to tell us whodunit! Utilizing the Linux kernel's eBPF subsystem - an in-kernel VM with syscall hooking capabilities - we're able to aggregate metadata about the calling process tree for any internet-bound TCP connection by filtering IPs and ports in-kernel and enriching with process tree information in userland. The result is "pidtree-bcc": a supplementary IDS. Now whenever there's an alert for a suspicious connection, we just search for it in our SIEM (spoiler alert: it's nearly always an engineer doing something "innovative")! And the cherry on top? It's stupid fast with negligible overhead, creating a much higher signal-to-noise ratio than the kernels firehose-like audit subsystems.
This talk will look at how you can tune the signal-to-noise ratio of your IDS by making it reflect your business logic and common usage patterns, get more work done by reducing MTTR for false positives, use eBPF and the kernel to do all the hard work for you, accidentally load test your new IDS by not filtering all RFC-1918 addresses, and abuse Docker to get to production ASAP!
As well as looking at some of the technologies that the kernel puts at your disposal, this talk will also tell pidtree-bcc's road from hackathon project to production system and how focus on demonstrating business value early on allowed the organization to give us buy-in to build and deploy a brand new project from scratch.
One Year of Porting - Post-mortem of two Linux/SteamOS launchesLeszek Godlewski
2013 was the year in which Linux finally got the attention of game developers; it was also the year in which my first two Linux/SteamOS ports were released. This talk will cover the learnings of one year of porting work from a programmer's point of view: DOs and DON'Ts and issues both expected and unexpected.
Network services on Kubernetes on premiseHans Duedal
Deep dive into Kubernetes Networking and presentation of a usecase of running network services like DNS on a bare metal Kubernetes cluster for a major Danish e-sport event.
Hardwear.io 2018 BLE Security Essentials workshopSlawomir Jasek
Bluetooth Low Energy (Smart, 4) is recently gaining more and more traction as one of the most common and rapidly growing IoT technologies. Unfortunatelly the prevalence of technology does not come with security. Alarming vulnerabilities in BLE smart locks, medical devices and banking tokens are revealed day by day. And yet, the knowledge on how to comprehensively assess them seems very uncommon.
In this workshop you will get familiar with the basics of BLE security. We will work on a dedicated, readily available BLE hardware nRF devkit device. You will learn how to program and flash it yourself, using special web interface and ready templates. Such approach allows to better understand how things work “under the hood”, experiment with different options, and then secure the hardware properly.
From attacker’s perspective, we will cover among others: sniffing, spoofing, MITM, replay and relay.
Having enough time, we will play with a collection of vulnerable smart locks, sex toys and other devices.
The document discusses the Linux boot process and management tools Grub and Dracut. It provides an overview of the BIOS and UEFI boot methods, the kernel loading process, and the role of the initramfs and systemd. It describes Grub fundamentals like the multi-stage boot process and configuration via grub.cfg. Diagnostic tools like the Grub shell, initramfs shell, and systemd targets are covered. The document concludes with demonstrations of BIOS vs UEFI boot and recovering from a boot failure.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Generating privacy-protected synthetic data using Secludy and Milvus
Thotcon2013
1. Mesh Stalkings – Penetration Testing with
Networked Devices Running The Deck
Philip Polstra
@ppolstra
DrPhil@polstra.org
2. What is this talk about?
● Hacking and/or forensics with small, low-
power devices
● ARM-based Beagleboard & Beaglebone
running full suite of security/forensics tools
● Porting tools to a new platform
● Performing coordinated attacks with networks
of devices
3. Who am I?
● Professor at an undisclosed university
● Programming from age 8
● Hacking hardware from age 12
● Also known to fly and build airplanes
4. Roadmap
● Choosing a platform
● Selecting a base OS
● Building a base system
● The easy part – leveraging repositories
● The slightly harder part – building tools
● Building your own accessories
● Solo Demonstrations
● Networking with 802.15.4
● Attack Networks
● Future directions
5. Choosing a Platform
● Small
● Low-power
● Affordable
● Mature
● Networking built in
● Good USB support
● Convenient input and output
6. And the Winning Platform is... the Beagles
● Beagleboard
– 3.25” square
– <10 Watts
– only $149
– Based on Cortex A8
– 100 Mbps Ethernet built in
– 4 high-speed USB plus USB-on-the-go
– DVI-D, S-video, and LCD output
– RS-232, webcam, audio, and microSD
8. As of Tuesday... BeagleBone Black
● Only $45
● 1GHz
● HDMI Output
● 2GB internal storage
● Same code as BB-xM
9. I know at least one of you will ask...
● Why not Raspberry Pi?
– Not as powerful as even old BeagleBone
– Doesn't run Ubuntu (ARM6 not supported)
– Not truly open (Broadcom won't release info)
– Not as mature
– Cost savings for full-featured platform are slight
– Limited availability (especially in USA)
– Power stability and other issues
10. Selecting a Base OS
● Angstrom comes in the box
– Optimized for hardware
– Nice package management
– Poor repository support for our purposes
● Ubuntu is available
– BT is based on Ubuntu (Kali Debian)
– Ubuntu is very popular
– Good repository and community support
11. Building a Base Device on BB-xM and Original BBone
● Upgrade to 8GB or larger microSD
● Download an image for microSD card
– Canonical image or
– Robert C. Nelson demo images
– I used Nelson's because they are tweaked for Beagleboard and
updated frequently
● Good instructions available at
http://elinux.org/BeagleBoardUbuntu
12. Building a Bbone Black Device
● Simpliest way – ignore built in MMC
● Better way – use MMC and supplement
– Better performance
– Faster boot
– More storage on uSD card
– Currently work in progress
13. The Easy Part – Using Repositories
● Many of the tools we want are available in the
standard Ubuntu repositories
● Some are also available as .deb files
– Packages written in interpreted languages (Java, Python,
PERL, Ruby) usually work out of the box
– C-based packages depend on libraries that may or may not
be available/installed
14. The Harder Part – Building Your Own Tools
● Native or cross-compile?
● Native
– Straightforward
– Can be slow on 1GHz ARM with 512 MB RAM
● Cross-compile
– A bit more complicated
– Take advantage of multi-core desktop with plenty of RAM
15. Native Compilation
● “Sudo apt-get install build-essential” is about
all you need to be on your way
● Something to keep in mind if you SSH in and
use DHCP: Ethernet is via USB chipset and MAC
address varies from one boot to next which
leads to different address being assigned
16. Cross-Compile Basic Method
● Download a toolchain “wget http://angstrom-distribution.org/toolchains/angstrom-<ver>-
armv7a...”
● Untar toolchain “tar -xf angstrom-<ver>-armv7a-linux-gnueabi-toolchain.tar.bz2 -C”
● Setup build environment “. /usr/local/angstrom/arm/environment-setup”
● Download source
● Configure with “./configure --host=arm-angstrom-linux-gnueabi –prefix=/home/...”
● Build with “make && sudo make install”
● Copy binaries to BB-xM
● Could have problems if there is a kernel mismatch between setup and what is installed to BB-
xM
17. More Sophisticated Cross-Compile Method
● Install a toolchain as in basic method
● Install Eclipse
● Install C/C++ Development Tools in Eclipse
● Download software
● Use makefile to create Eclipse project
● Create a Build Configuration in Eclipse
● Compile
● Move binaries to BB-xM
18. Even More Sophisticated Cross-Compile Method
● Same as previous, but with the addition of remote debugging
● Has advantage of easy transfer of binaries
● In Eclipse under Mobile Development add
– C/C++ DSF GDB Debugger Integration
– C/C++ Remote Launch
– Remote System Explorer End-User Runtime
– Remote System Explorer User Actions
● Full Tutorial at http://lvr.com/eclipse1.htm
33. 802.15.4 Networking
● Basics
● Hardware
● Simple case: 2 Xbee adapters
● Slightly harder case: multiple adapters one at a
time
● Hard case: multiple adapters simultaneously
● Really Hard case: true mesh network
34. 802.15.4 Basics
● Typically used in low-power embedded systems
● Regular (150') and Pro (1 mile) versions
● AT and API modes of operation
● Low-speed (250 kbps max)
● Supports multiple network topologies
– Peer to Peer
– Star
– Mesh
35. Xbee Hardware
● Manufactured by Digi
● Regular and Pro formats are interchangeable and interoperable
● Uses 2 mm pin spacing
– Most breadboards are 0.1” or 2.54 mm
– Requires an adapter
● Several antenna options
● Be careful not to use S2 or ZB series which are the same dimensions, but are not compatible
36. Xbee Adapters
● UART (serial) adapters
– Can be wired directly to Beagles using 4 wires
– Don't take up USB ports
37. Xbee Adapters (contd)
● USB Adapters
– More expensive
– Helpful for initial setup
– Easier to setup: just plug it in
38. Simple Case: 2 Xbee Adapters
● Xbee modules must be configured for desired
network topology
● Digi provides X-CTU software for configuration,
but it only runs on Windows
● Recently Moltosenso has released Network
Manager IRON 1.0 which runs on Linux, Mac,
and Windows – free edition is sufficient for our
limited usage
39. Configuring Xbee Modules
● Place Xbee module in USB adapter and connect to PC running X-CTU or IRON
● Select correct USB port and set baud rate (default is 9600)
● From Modem Configuration tab select Read to get current configuration
● Ensure modem is XB24 and Function Set is XBEE 802.15.4
● Set the channel and PAN ID (1337?) noting the settings which must be the same for
all modems
● Pick a Destination Low and Destination High address for the other adapter (say 2
and 0)
● Set the My Address to a chosen value (say 01)
● Click Write to stored the new config on the Xbee
● Repeat this process on the second Xbee but reverse the addresses
● The modules should now talk to each other just fine
40. Wiring the Xbee to Beagles
If you splurged for the USB adapter you can just
plug in to a USB port
– BeagleBone has only 1 USB port which you might want for
something else
– BeagleBoard has 4 USB ports
● Using the UART interface slightly more
complicated
– Connect 4 wires: 3.3V, Ground, TX, RX
– Configure the Beagle multiplexer for proper operation
41. Setting up a UART Interface
● Appropriate pins & modes in Beagle manuals
● For BeagleBone UART2
– 3.3V & Ground P9 pin 3 & 1, respectively
– TX P9 pin 21 (to Xbee Din)
– RX P9 pin 22 (to Xbee Dout)
– Configure BeagleBone
● echo 1 > /sys/kernel/debug/omap_mux/spi0_d0
● echo 21 > /sys/kernel/debug/omap_mux/spi0_sclk
– Test connection by connecting terminal program to /dev/ttyO2 (not a zero)
● Recommend against using UART on BeagleBoard
– 1.8V logic levels requires level shifting
– Slightly more complicated software configuration
42. Simple Case: Accessing your single drone
● By default Xbee adapters operate in
transparent mode
● Setup TTY on drone and you can login in with
terminal program
– Simple
– Works with interactive programs
– If you go out of range you are still connected when you
return
43. Slightly Harder Case: Multiple Drones One at a Time
● Configure drones as with the single drone case but with
different MY addresses
● Use terminal program on command console to connect to
drones one at a time
● Simple: no programming required
● Must enter AT command mode to switch between drones
– Enter “+++” (no enter) and wait for OK
– Enter “ATDL0002 <enter>” to select drone 2
– Enter “ATWR <enter>” to write to NVRAM
– Enter “ATCN <enter>” to exit command mode
45. Slightly Harder Case: Multiple Drones Simultaneously
● API mode is used vs. AT mode
● Configure Xbee with X-CTU
– For Series 1 stick with 802.15.4 Function Set
– For Series 2 (ZB)
●
Drones set to Function Set ZNET 2.5 ROUTER/ENDDEVICE API 1347
● Controller set to Function Set ZNET 2.5 COORDINATOR API 1147
● Multiple choices for communication
– Java xbee-api
– Python-xbee (what I used)
– Raw commands to TTY device
● Recommended for most situations involving 3 or more devices
46. Multiple Drone Communications
● Really this is a point-to-multipoint topology
● For each drone communication appears to be
simple peer-to-peer
● API mode provides better performance and
allows simpler software operation
47. Multiple Drones Using Python: One Possibility
● Each drone runs a simple Python script which waits for
commands and sends announcements
● Controller listens for announcements/responses and
sends commands (all activity is logged)
● Upside is that it lends itself easily to scripting
● Downside is that it doesn't support interactive shells
(yet)
● Announcements can be sent to controller for important
events (such as successful cracking)
52. Harder Case: True Mesh Network
● Only recommended when larger number of
drones or when devices are too far apart
● Will negatively impact battery life
● Requires series 2 (aka ZB) Xbee adapters
● No changes to scripts are required
53. Networked attacks – Simplest Case
● In the simplest case there is only 1 drone
● Networking is peer-to-peer
● Allows hacking from a distance
– Better WiFi hacking when drone is in building
– Drone runs 24x7
– Drone can run for days off battery
– Important updates such as successfully cracked passwords can be sent to master
periodically in case you weren't in range when they happened
– Drone has full version of The Deck – lots of possibilities
– Less conspicuous than sitting outside the building
– If you are lucky you can patch into wired network
– If you are extra lucky they use Power Over Ethernet!
54. Networked Attack with Multiple Drones
● One process on master monitors status updates from
all drones
● Interactive shell into each drone
– Multiple subshells can be created
– Processing continues if master disconnects
● Endless possibilities since each drone has full version
of The Deck
● Drone are easily retasked based on objectives achieved
by other drones
55. Future Directions
● Continue to add useful packages as need arises
● Optimize some packages for BB-xM
● Other output devices
● Associate with a standard pentest distro
● Port to another platform
● BeagleBone Black Edition!
● Exploit USB OTG functionality
● Make The Deck fly (literally)
56. Bibliography
●
General BeagleBoard xM/BeagleBone http://beagleboard.org
● Installing Ubuntu on Beagles http://elinux.org/BeagleBoardUbuntu
● Cross-compiling for Beagles by Jan Axelson http://www.lvr.com/eclipse1.htm
● Instructions on how to build The Deck
http://www.instructables.com/id/The-Deck-Portable-Penetration-Testing-and-Forens/
● My blog where updates will be posted
http://ppolstra.blogspot.com/2012/09/introducing-deck-complete-pentesting.html
● Download link for The Deck (warning 6 GB) http://www.udcis.org/TheDeck/thedeck-v1.1.01-
thotcon-ed.tar.gz
● Getting Started with Xbee by Parallax
http://www.parallax.com/portals/0/downloads/docs/prod/book/122-32450-XBeeTutorial-v1.0.1.pdf
●
General information on Xbee modules from the manufacturer http://digi.com
● Download Moltosenso Network Manager IRON software
http://www.moltosenso.com/#/pc==/client/fe/download.php