Table of Contents
• About TrustZone
– Use case of TrustZone
– Cortex-A TrustZone
– Cortex-M TrustZone
– TEE implementation
• Vulnerability of TEE implementation
• Conclusions
• References
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...FFRI, Inc.
Table of Contents
• Background • Use case and Weave
• Android Things Security Considerations
• Android Things Version Information
• File system information • Firewall setting
• ADB port setting
• SELinux setting
• Conclusions
• Reference
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
• Security incidents related to IoT devices
• About the Android Things
• Major features
• Installation and Settings
• Accessible network service
• Security configurations
• Conclusions
• References
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...FFRI, Inc.
In this slide, we introduce the TrustZone of information that has published at this time in relation to ARMv8-M.
It is possible to separate/isolate the security level by adding the security state.
ARMv8-M architecture has a different mechanism than TrustZone to provide traditional ARMv8-A architecture, which is optimized for embedded systems.
Resilient IoT Security: The end of flat security modelsMilosch Meriac
Compartmentalizing code and data on low-end MMU-less microcontrollers using the ARM memory protection unit as available on present ARM Cortex-M3 and ARM Cortex-M4 devices.
More information and source code is available at https://github.com/ARMmbed/uvisor . This slideset was presented in November at ARM TechCon 2015.
CNIT 123: Ch 7: Programming for Security ProfessionalsSam Bowne
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...FFRI, Inc.
Table of Contents
• Background • Use case and Weave
• Android Things Security Considerations
• Android Things Version Information
• File system information • Firewall setting
• ADB port setting
• SELinux setting
• Conclusions
• Reference
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
• Security incidents related to IoT devices
• About the Android Things
• Major features
• Installation and Settings
• Accessible network service
• Security configurations
• Conclusions
• References
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...FFRI, Inc.
In this slide, we introduce the TrustZone of information that has published at this time in relation to ARMv8-M.
It is possible to separate/isolate the security level by adding the security state.
ARMv8-M architecture has a different mechanism than TrustZone to provide traditional ARMv8-A architecture, which is optimized for embedded systems.
Resilient IoT Security: The end of flat security modelsMilosch Meriac
Compartmentalizing code and data on low-end MMU-less microcontrollers using the ARM memory protection unit as available on present ARM Cortex-M3 and ARM Cortex-M4 devices.
More information and source code is available at https://github.com/ARMmbed/uvisor . This slideset was presented in November at ARM TechCon 2015.
CNIT 123: Ch 7: Programming for Security ProfessionalsSam Bowne
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
Telehack: May the Command Line Live ForeverGregory Hanis
Want to play a game? I bet I can root more boxes than you and stop you from gaining control. Telehack is a simulation of a stylized arpanet/usenet, circa 1985-1990. It is a full multi-user simulation, including 25,000 hosts and BBS’s the early net, thousands of files from the era, a collection of adventure and IF games, a working BASIC interpreter with a library of programs to run, simulated historical users, and more.
The Open-Source seL4 Kernel. Military-Grade Security Through Mathematics - SF...Linaro
Session ID: SFO17-417
Session Name: The Open-Source seL4 Kernel. Military-Grade Security Through Mathematics - SFO17-417
Speaker: Gernot Heiser
Track: LITE
★ Session Summary ★
A run-time bug in operating system software that enables car control can
result in loss of life or limb. Safety assessors require evidence that such
software is provably free from any bugs. These proofs are inevitably a
combination of software development best practices and a lot of test coverage.
But can we be sure that it is enough ? Really really sure ? What if we used
maths to absolutely guarantee that there are zero bugs in the operating system
core ? This session presents seL4 - a military grade open source project that
uses machine checked formal verification to prove that the C language
implementation of the seL4 kernel and it's resulting binaries are free from
bugs. This then permits running Linux safely in virtual machines on top of
seL4 - something that the Auto world demands.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/sfo17/sfo17-417/
Presentation: https://www.slideshare.net/linaroorg/using-math-to-prevent-linux-in-your-car-from-killing-you-the-open-source-sel4-kernel-sfo17417
Video: https://www.youtube.com/watch?v=heSmrHzHcuM
---------------------------------------------------
★ Event Details ★
Linaro Connect San Francisco 2017 (SFO17)
25-29 September 2017
Hyatt Regency San Francisco Airport
---------------------------------------------------
Keyword:
'http://www.linaro.org'
'http://connect.linaro.org'
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961
In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
This shared slides is containing some of the basic information about Router Hardening project which my team and I did in our network security class project and we used it to present our project's process and procedures. Our project scenario was to harden the network and routers for hypothetical organization so we decided to do it for a bank and we called it ANS bank referring to first letters of the team members.
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
Slides for a college course based on "Hands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613
Teacher: Sam Bowne
Twitter: @sambowne
Website: https://samsclass.info/123/123_F16.shtml
Telehack: May the Command Line Live ForeverGregory Hanis
Want to play a game? I bet I can root more boxes than you and stop you from gaining control. Telehack is a simulation of a stylized arpanet/usenet, circa 1985-1990. It is a full multi-user simulation, including 25,000 hosts and BBS’s the early net, thousands of files from the era, a collection of adventure and IF games, a working BASIC interpreter with a library of programs to run, simulated historical users, and more.
The Open-Source seL4 Kernel. Military-Grade Security Through Mathematics - SF...Linaro
Session ID: SFO17-417
Session Name: The Open-Source seL4 Kernel. Military-Grade Security Through Mathematics - SFO17-417
Speaker: Gernot Heiser
Track: LITE
★ Session Summary ★
A run-time bug in operating system software that enables car control can
result in loss of life or limb. Safety assessors require evidence that such
software is provably free from any bugs. These proofs are inevitably a
combination of software development best practices and a lot of test coverage.
But can we be sure that it is enough ? Really really sure ? What if we used
maths to absolutely guarantee that there are zero bugs in the operating system
core ? This session presents seL4 - a military grade open source project that
uses machine checked formal verification to prove that the C language
implementation of the seL4 kernel and it's resulting binaries are free from
bugs. This then permits running Linux safely in virtual machines on top of
seL4 - something that the Auto world demands.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/sfo17/sfo17-417/
Presentation: https://www.slideshare.net/linaroorg/using-math-to-prevent-linux-in-your-car-from-killing-you-the-open-source-sel4-kernel-sfo17417
Video: https://www.youtube.com/watch?v=heSmrHzHcuM
---------------------------------------------------
★ Event Details ★
Linaro Connect San Francisco 2017 (SFO17)
25-29 September 2017
Hyatt Regency San Francisco Airport
---------------------------------------------------
Keyword:
'http://www.linaro.org'
'http://connect.linaro.org'
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961
In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
This shared slides is containing some of the basic information about Router Hardening project which my team and I did in our network security class project and we used it to present our project's process and procedures. Our project scenario was to harden the network and routers for hypothetical organization so we decided to do it for a bank and we called it ANS bank referring to first letters of the team members.
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3Linaro
LAS16-111: Raspberry Pi3, OP-TEE and JTAG debugging
Speakers:
Date: September 26, 2016
★ Session Description ★
ARM TrustZone is a critical technology for securing IoT devices and systems. But awareness of TrustZone and its benefits lags within the maker community as well as among enterprises. The first step to solving this problem is lowering the cost of access. Sequitur Labs and Linaro have joined forces to address this problem by making a port of OP-TEE available on the Raspberry Pi 3. The presentation covers the value of TrustZone for securing IoT and how customers can learn more through this joint effort.
Embedded systems security remains a challenge for many developers. Awareness of mature, proven technologies such as ARM TrustZone is very low among the Maker community as well as among enterprises. As a result this foundational technology is largely being ignored as a security solution. Sequitur Labs and Linaro have taken an innovative approach combining an Open Source solution – OP-TEE with Raspberry Pi 3. The Raspberry Pi 3 is one of the world’s most popular platforms among device makers. Its value as an educational tool for learning about embedded systems development is proven.
Sequitur Labs have also enabled bare metal debugging via JTag on the Pi 3 enhancing the value of the Pi 3 as an educational tool for embedded systems development.
The presentation will focus on
ARM v8a architecture and instruction set
ARM Trusted Firmware
TrustZone and OP-TEE basics
JTAG and bare metal debugging the Raspberry Pi 3
★ Resources ★
Etherpad: pad.linaro.org/p/las16-111
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-111/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEELinaro
Smart connected devices such as mobile phones, tablets and Digital TVs are required to handle data with strong security and confidentiality requirements. A “Trusted Execution Environment” (TEE) provides an environment for processing data securely, protected from normal platform applications. This talk is intended as an introduction to Trusted Execution, and the open-source Trusted Execution Environment OP-TEE in particular. It introduces the GlobalPlatform TEE Specifications, explains how Trusted Execution is implemented by ARM TrustZone and OP-TEE, and outlines how trusted boot software manages the secure boot of an ARM platform. Finally, it gives some pointers on how to get started with OP-TEE.
08680982.pdfArchitectures for Security A comparative anal.docxcroftsshanon
08680982.pdf
Architectures for Security: A comparative analysis
of hardware security features in Intel SGX and
ARM TrustZone
Muhammad Asim Mukhtar
Information Technology University
Lahore, Pakistan
[email protected]
Muhammad Khurram Bhatti
Information Technology University
Lahore, Pakistan
[email protected]
Guy Gogniat
University of South Brittany
Lorient, France
[email protected]
Abstract—A variety of applications are executing on a large
untrusted computing base, which includes the operating system,
hypervisor, firmware, and hardware. This large computing base
is becoming complex and unverifiable. This untrusted computing
base problem opens a way for a malicious application to steal
secrets of a security-critical application by compromising the
untrusted computing base. To resolve the untrusted computing
base problem, computer architectures have introduced a concept
of the trusted execution environment, which aim to ensure
the sensitive data to be stored and processed in an isolated
environment. Existing popular trusted execution environments
are relying on hardware to isolate the environments without
or minimum relying on system software. However, existing
hardware assisted trusted execution environments are still vul-
nerable to sophisticated attacks. This paper analyses popular
trusted execution environments that are Intel SGX and ARM
TrustZone in order to provide better insights about the intended
scope of the protection. This paper illustrates the functionality,
implementation and security analysis.
Index Terms—Trusted Execution Environments, TEE, Memory
isolation, Intel SGX, and ARM TrustZone.
I. INTRODUCTION
Normal and security-critical applications are executing on
a large untrusted computing base, which includes an operat-
ing system, hypervisor, firmware, and hardware. This large
computing base is becoming complex and unverifiable. For
example, an operating system such as Linux has 17 millions
of lines code [2] and CVE has reported 166 vulnerabilities in it
during the year of 2018 related to Denial-of-Service, overflow,
unauthorized privilege gain, memory corruption, directory
traversal, execute unauthorized code. Similarly, Xen is a well-
known hypervisor that has 150,000 lines code [27], which has
relatively small code than Linux but still has vulnerabilities,
and CVE has reported 18 vulnerabilities in Xen in the year
of 2018 [11]. Moreover, attacks that subvert firmware are
reported [1] [25] [23]. Execution of normal and security-
critical applications are executing on shared resources that
controlled by untrusted computing base raises security threats.
This opens the way for a malicious application to attack the
This research work is partially supported by the PHC PERIDOT Project
e-health.SECURE and National Center for Cyber Security (NCCS), Pakistan.
vulnerabilities to gain the unauthorized privilege, and then
steal secrets form security critical application’s address space.
To cope up the.
Security for VEDLIoT Components, from Cloud through Edge to IoT. Marcelo Pasin. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022
EuskalHack 2017 - Secure initialization of TEEs: when secure boot falls shortCristofaro Mune
Our presentation focuses on the critical role of secure initialization in the establishment of a Trusted Execution Environment.
The concepts are discussed in the light of the ARM TrustZone technology, although the considerations made may be valid for a wider range of TEEs.
We analyze past public attacks related to TEE initialization and we show how its security foundations go beyond the mere implementation of a Secure Boot chain of trust.
Security models used for TEE discussions often encompass a CPU-centric perspective at runtime.
We provide indications that such models should be augmented by including TEE lifecycle stages (e.g. Secure Cold/Warm Boot) and by considering the whole SoC as part of the security model.
We conclude that an holistic, system-level, view is required, along with careful design and implementation for establishing a secure TEE.
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
In 2017, Microsoft announced the ARM version of Windows. The number of devices with ARM version of Windows is increasing, such as Surface Pro X series and HP ENVY x2, and it is gradually becoming popular.
When using these ARM devices, there is a compatibility issue that existing x86/x64 applications cannot be used.
However, this problem has been addressed by providing x86/x64 emulation capabilities. In recent years, ARM64EC has been announced, allowing for the gradual migration of x64 applications to ARM. The aggressive introduction of these compatibility technologies is a sign of Microsoft's strong will to promote the ARM version of Windows.
On the other hand, doesn't the introduction of new compatibility technologies provide a new avenue of attack for attackers? As far as we know, this point has not even been discussed much at this point. Therefore, we reverse engineered the compatibility technology that exists in Windows on ARM and examined its exploitability.
We found that various techniques are available, such as code injection by modifying XTA cache files, and obfuscation by exploiting newly introduced relocation entries. All of these techniques have in common the characteristic that the binary "appearance" and runtime behavior are different, making them difficult to detect and track. In addition, some of the techniques can be widely exploited to interfere with static analysis or sandbox analysis. Therefore, there is a high possibility that they will become a threat to the ARM version of Windows in the future.
In this presentation, we will explain the details of our new method and its features with demonstrations. We hope that this presentation will be a good opportunity to develop and promote the security research of Windows on ARM.
The PoC code and detailed reverse engineering results will be available on GitHub.
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
In 2017, Microsoft announced the ARM version of Windows. The number of devices with ARM version of Windows is increasing, such as Surface Pro X series and HP ENVY x2, and it is gradually becoming popular.
When using these ARM devices, there is a compatibility issue that existing x86/x64 applications cannot be used.
However, this problem has been addressed by providing x86/x64 emulation capabilities. In recent years, ARM64EC has been announced, allowing for the gradual migration of x64 applications to ARM. The aggressive introduction of these compatibility technologies is a sign of Microsoft's strong will to promote the ARM version of Windows.
On the other hand, doesn't the introduction of new compatibility technologies provide a new avenue of attack for attackers? As far as we know, this point has not even been discussed much at this point. Therefore, we reverse engineered the compatibility technology that exists in Windows on ARM and examined its exploitability.
We found that various techniques are available, such as code injection by modifying XTA cache files, and obfuscation by exploiting newly introduced relocation entries. All of these techniques have in common the characteristic that the binary "appearance" and runtime behavior are different, making them difficult to detect and track. In addition, some of the techniques can be widely exploited to interfere with static analysis or sandbox analysis. Therefore, there is a high possibility that they will become a threat to the ARM version of Windows in the future.
In this presentation, we will explain the details of our new method and its features with demonstrations. We hope that this presentation will be a good opportunity to develop and promote the security research of Windows on ARM.
The PoC code and detailed reverse engineering results will be available on GitHub.
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) FFRI, Inc.
• About Black Hat
• Intriguing reports – Breaking BHAD: Abusing Belkin Home Automation Devices – (PEN)TESTING VEHICLES WITH CANTOOLZ YACHT – YET ANOTHER CAR HACKING TOOL – Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks
• Conclusions
• References
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)FFRI, Inc.
• About threat analysis support tool
• Examples of tools
• Analysis target system
• Analysis result
– How to read result
– Overview of threats
• Effective usage
– About template
– Additional definition of threat information
• Conclusions
• References
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)FFRI, Inc.
• About Black Hat USA
• Hot Research
• Vehicle
– CANSPY: A Platform For Auditing CAN Devices
– Advanced CAN Injection Techniques For Vehicle Networks
– Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle
• IoT
– Into The Core – In-Depth Exploration of Windows 10 IoT Core
– GATTAttacking Bluetooth Smart Devices
– Introducing A New BLE Proxy Tool
– GreatFET: Making GoodFET Great Again
• Conclusions
• References
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)FFRI, Inc.
In this report, we pick up briefings of Black Hat Asia 2016
• Mobile Security
– Android Commercial Spyware Disease and Medication, Mustafa Saad
– Su-a-Cyder: Home-Brewing iOS Malware Like a B0$$!, Chilik Tamir
• IoT Security
– Lets See Whats Out There Mapping The Wireless IOT, Tobias Zillner
– Hacking a Professional Drone, Nils Rodday
• Windows Security
– DSCompromised:A Windows DSC Attack Framework, Ryan Kazanciyan & Matt Hastings
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)FFRI, Inc.
•CODE BLUE 2015 had over 600 visitors from many countries.
–It had started two track presentation and youth track.
–Two teenagers and a student were on stage.
•IoT Security
–Medical equipment and social infrastructure were studied.
–The white hackers reported these vulnerabilities.
•Bug Bounty
–Japanese bug hunters are active in the world.
–There are things to learn from their way.
•APT
–APT would have invaded various organizations in Japan.
–Forum for information exchange, such as the CODE BLUE is required to counter APT.
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...FFRI, Inc.
•Automobile security is hot topic in many conferences.
•Cyber security measures are essential for the automobile.
•We summarize the following topics based on the above background.
–Presentations at the conferences other than Black Hat USA 2015 and DEF CON 23.
–Introduction of vulnerability assessment methods of automobile security by CVSS v3.
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)FFRI, Inc.
Recently, OS X and iOS are becoming target of cyber attacks.
–As a result, attack technique peculiar to OS X and iOS comes up.(e.g. Abuse of sync function, malware distribution by AdHocetc.)
We recommend some security settings for Mac and iPhone based on current state of threats.
–Target system is OS X 10.10.x (Yosemite) and iOS 8.x.
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
•Windows 10 IoT is successor platform of Windows Embedded that optimized for embedded devices.
•Windows 10 IoT Core Insider Preview has been provided for single-board computers such as the Raspberry Pi 2.
•We show tutorial about security of Windows 10 IoT Core using the Raspberry Pi 2.
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...FFRI, Inc.
Background
•Automobiles equip a lot of ECUs which communicate mutually on In-Vehicle Network to control engine, power window, and so on
•IVI devices such as navigation system and ADAS*known-as lane-keeping or brake-assist systems often are connected in the same network
•BecauseIn-Vehicle network becoming complicated by various devices, next-generation In-Vehicle network attracts interest as feasible technology at low cost
•This slide summarized about following topics
–Ethernet prospective as next-generation In-Vehicle network
–Recent security research about conventional In-Vehicle network andproposal of measures for the CAN
MR201504 Web Defacing Attacks Targeting WordPressFFRI, Inc.
Large number web sites defacing for various purposes are increasing.
Many used technique within of the these attacks is targeting a popular product or these plug-ins like WordPress.
In this report, was analyses about vulnerability that made 18,000 websites victims by exploiting “Slider Revolution".
The point different from general attacks like SQL injection is that using normal function.
Many of these vulnerabilities within of the CMS product are often in where there are assume used by admin.
So, Limit of access to "/wp-admin" or "/admin" by editing ".htaccess" is very important.
MR201502 Intel Memory Protection Extensions OverviewFFRI, Inc.
• Intel MPX provides primitive functions for runtime memory protection via compiler’s code instrumentation
• Performance impact is not clear
– However, we guess it is faster than another approach of memory protection such as software fault isolation or runtime instrumentation
• After all, Intel MPX and runtime memory protection are not expected to come into wide use for some time because we need replacement our
desktops and servers for to use buffer overflow protection
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
1. FFRI,Inc.
1
TrustZone use case and trend
FFRI, Inc.
http://www.ffri.jp/enE-Mail: research-feedback[at]ffri.jp
Twitter: @FFRI_Research
Monthly Research 2017.3
2. FFRI,Inc.
2
Table of Contents
• About TrustZone
– Use case of TrustZone
– Cortex-A TrustZone
– Cortex-M TrustZone
– TEE implementation
• Vulnerability of TEE implementation
• Conclusions
• References
3. FFRI,Inc.
About TrustZone
• About ARM TrustZone
– Security mechanism of ARM processor
– Cortex-A series and Cortex-M series are different mechanism
– It makes a trusted world and non-trusted world on memory
• For payment system, NFC, etc.,
• TEE (Trusted Execution Environment)
– Secure execution environment realized at hardware level
– Enactment by Global Platform and Trusted Computing Group
• Global Platform create and publish specifications for
secure chip and more
3
4. FFRI,Inc.
Use case of TrustZone
• Android 7.0 requires the implementation of a keystore using
TrustZone etc.
• ARM Ltd. proposes the following use cases of TrustZone
– Mobile payment
• Credit card information and transaction are protected in a
trusted world
– Digital Rights Management
• DRM data are protected in a trusted world
– Credential information
• Credential information such as fingerprint are protected in
a trusted world
4
5. FFRI,Inc.
Cortex-A TrustZone
• Cortex-A series
– Used a mobile and network device and more
– ARMv7-A and ARMv8-A
• TrustZone
– Memory isolation of Normal World and Secure World using
monitor mode
– Trusted OS works in the Secure World
• Switch the monitor mode by
the SMC instruction
• For more information FFRI Monthly Research 2013.3
5
ARMv8-A
Normal World Secure World
Monitor
User Mode
Priv Mode
User Mode
Priv Mode
6. FFRI,Inc.
Cortex-M TrustZone
• TrustZone for low-power chips
– ARMv8-M, s Cortex-M23/M33
• Memory isolation mechanism using state
– Each memory area have state
• Secure State, Non-Secure State, Non-Secure Callable State
• Non-Secure State call the Secure State
– Via security gateway by the BL
– Return to Secure State by the BX
• Secure State call the Non-Secure State
– Use the BXNS and BLXNS
• For more information FFRI Monthly Research 2016.2
6
blxns [function]
bx lr
bxns [function]
Non-Secure
Secure
Security
Gateway
bl [function]
7. FFRI,Inc.
Well-known TEE implementation
• Trusty TEE
– Developed by Google
– Third party can't add the trusted application
– Source code has published in AOSP
• OP-TEE
– Developed by STMicroelectronics and Linaro Security Working Group
– Source code has published in GitHub
– Supports many board using Cortex-A series processor
• ARM mbed
– An IoT platform developed by ARM Ltd.
– Source code has published in the bed official site
– It realizes TEE on board with Cortex-M
7
8. FFRI,Inc.
Security Research for TEE implementation
• Gal Beniamini (2017) TrustZone TEEs An Attacker’s Perspective
– Lecture at BlueHat IL Security Conference held by Microsoft
– Analysis target are Qualcomm TEE and Trustonic TEE
• Both TEEs also were pointed out problems
– ASLR is unused or entropy deficiency
– Stack cookie is unused or implementation deficit
• The speaker recommends TEE implementation will be open source
to get many reviews
• There is a risk that the vulnerability of TA is exploited and TEE breaks
down if the security mechanism of the TEE implementation is
insufficient
8
9. FFRI,Inc.
Vulnerability detail
• Qualcomm TEE
– Insufficient entropy of ASLR
• Non-Secure World OS can load a Trusted App(TA) into the Secure
World user area(QSEE)
• Trusted OS (QSEOS) load the TA at QSEE, but available memory is
very limited
– Buffer overflow
• A TA check an overflow using stack cookie, but stack cookie is not
random because many TA use BSS buffer
• TA stack exist immediately after BSS, and a guard page doesn't exist
– System call
• QSEOS receives pointers at a system call from QSEE
• QSEOS kernel memory can destruction because QSEOS don't check
pointer value
• Trustonic TEE
– ASLR and stack cookie are not available for TA
9
10. FFRI,Inc.
Conclusions
• TrustZone isolates memory for the trusted world and the non-trusted
world
– Security mechanism to realize TEE(Trusted Execution Environment)
• TrustZone protect the confidentiality code or resource
– Available in Cortex-A and Cortex-M
• TEE implementation with TrustZone
– OP-TEE, Trusty TEE, mbed and more
• Vulnerability of TEE implementation
– ASLR and stack cookie are incomplete
– TEE implementation should be open sourced and reviewed more
– Should use TEE implementation with solid ASLR and stack
protection
10
11. FFRI,Inc.
11
References
• ARM Security Technology
– http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-
009492c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf
• TrustZone TEEs An Attacker’s Perspective
– https://microsoftrnd.co.il/Press%20Kit/BlueHat%20IL%20Decks/GalB
eniamini.pdf
• Trusty TEE | Android Open Source Project
– https://source.android.com/security/trusty/
• mbed OS | mbed
– https://www.mbed.com/en/platform/mbed-os/
• OP-TEE
– https://www.op-tee.org/