Lei Shi & Mei Wang, Qihoo 360
Virtualization is one of the most complicated software in the world. The VMware workstation is very popular in many fields. The windows 10 has a lot of mitigation technology to get avoid of exploitation. It's a great challenge to make a vm escape in VMware workstation under Win 10. Especially when the guest and host are both win 10 and the guest user are NO-ADMIN. This talk will present how to make a vm escape and execute arbitrary code in the host from a NO-ADMIN guest user under Win 10(both the guest and host are Win 10). They have developed three different exploitation. This talk will introduce them and show a very elegant exploitation technology of vm escape. Besides the vm escape technology, this talk will also show the exploitation technology in Win 10. It is quite attractive because there's a process continuation, saying that the guest can execute the exploitation without crashing/disturbing the host process(VMware workstation virtual machine process). The exploitation is very reliable, it reaches nearly 100% successful rate.
This document describes how to configure Spring Security for authentication and authorization in a web application. It defines a WebSecurityConfig class that configures HTTP security with roles like OWNER and MANAGER for access control. It also defines a UserDetailsManager service for loading users and a User entity class implementing UserDetails. Tests are shown for security configuration, login, access control and more using Spring Security's test utilities.
Systemd: the modern Linux init system you will learn to loveAlison Chaiken
?
The talk combines a design overview of systemd with some tutorial incofrmation about how to configure it. Systemd's features and pitfalls are illustrated by short demos and real-life examples. Files used in the demos are listed under "Presentations" at http://she-devel.com/
Video of the live presentation will appear here:
http://www.meetup.com/Silicon-Valley-Linux-Technology/events/208133972/
This document discusses Zend Thread Safety (ZTS) in PHP. It explains that ZTS provides a layer that abstracts thread libraries and makes PHP core and extensions thread-safe when running in a threaded environment. It does this by using thread-local storage to maintain separate data for each thread. Extensions must be compiled with ZTS to store their global data in this thread-local storage so it is properly separated for each thread. ZTS slows down PHP startup but is important for running PHP on threaded web servers or using threaded extensions. In most cases, PHP applications do not need to be run in a threaded environment.
This document outlines the steps needed to port the LLVM backend to support a new target. It discusses adding support for the new target in areas like CMake configuration, target triples, instruction definitions, register definitions, calling conventions, instruction selection, and code generation. The process involves modifying LLVM headers, defining target descriptions in TableGen files, implementing target-specific classes, and registering the new target. Following the outlined steps will allow LLVM to recognize and support code generation for the new target.
It is the presentation file used by Jim Huang (jserv) at OSDC.tw 2009. New compiler technologies are invisible but highly integrated around our world, and we can enrich the experience via facilitating LLVM.
QEMU is an emulator that uses dynamic translation to emulate one instruction set architecture (ISA) on another host ISA. It translates guest instructions to an intermediate representation (TCG IR) code, and then compiles the IR code to native host instructions. QEMU employs techniques like translation block caching and chaining to improve the performance of dynamic translation. It also uses helper functions to offload complex operations during translation to improve efficiency.
QEMU is an open source system emulator that uses just-in-time (JIT) compilation to achieve high performance system emulation. It works by translating target CPU instructions to simple host CPU micro-operations at runtime. These micro-operations are cached and chained together into basic blocks to reduce overhead. This approach avoids the performance issues of traditional emulators by removing interpretation overhead and leveraging CPU parallelism through pipelining of basic blocks.
The document discusses register allocation in LLVM. It begins with an introduction to the register allocation problem and describes LLVM's base register allocation interface. It then provides more details on LLVM's basic register allocation approach and its greedy register allocation approach. The greedy approach uses techniques like live range splitting to improve register allocation.
Systemd is a system and service manager that replaces sysvinit. It manages services, devices, mounts and other system components. It relies on control groups (cgroups) to isolate and manage processes and resources for each service. Services are configured through declarative unit files instead of shell scripts. Systemd provides features like socket activation, timers, and integrates with journald for logging.
This document describes how to configure Spring Security for authentication and authorization in a web application. It defines a WebSecurityConfig class that configures HTTP security with roles like OWNER and MANAGER for access control. It also defines a UserDetailsManager service for loading users and a User entity class implementing UserDetails. Tests are shown for security configuration, login, access control and more using Spring Security's test utilities.
Systemd: the modern Linux init system you will learn to loveAlison Chaiken
?
The talk combines a design overview of systemd with some tutorial incofrmation about how to configure it. Systemd's features and pitfalls are illustrated by short demos and real-life examples. Files used in the demos are listed under "Presentations" at http://she-devel.com/
Video of the live presentation will appear here:
http://www.meetup.com/Silicon-Valley-Linux-Technology/events/208133972/
This document discusses Zend Thread Safety (ZTS) in PHP. It explains that ZTS provides a layer that abstracts thread libraries and makes PHP core and extensions thread-safe when running in a threaded environment. It does this by using thread-local storage to maintain separate data for each thread. Extensions must be compiled with ZTS to store their global data in this thread-local storage so it is properly separated for each thread. ZTS slows down PHP startup but is important for running PHP on threaded web servers or using threaded extensions. In most cases, PHP applications do not need to be run in a threaded environment.
This document outlines the steps needed to port the LLVM backend to support a new target. It discusses adding support for the new target in areas like CMake configuration, target triples, instruction definitions, register definitions, calling conventions, instruction selection, and code generation. The process involves modifying LLVM headers, defining target descriptions in TableGen files, implementing target-specific classes, and registering the new target. Following the outlined steps will allow LLVM to recognize and support code generation for the new target.
It is the presentation file used by Jim Huang (jserv) at OSDC.tw 2009. New compiler technologies are invisible but highly integrated around our world, and we can enrich the experience via facilitating LLVM.
QEMU is an emulator that uses dynamic translation to emulate one instruction set architecture (ISA) on another host ISA. It translates guest instructions to an intermediate representation (TCG IR) code, and then compiles the IR code to native host instructions. QEMU employs techniques like translation block caching and chaining to improve the performance of dynamic translation. It also uses helper functions to offload complex operations during translation to improve efficiency.
QEMU is an open source system emulator that uses just-in-time (JIT) compilation to achieve high performance system emulation. It works by translating target CPU instructions to simple host CPU micro-operations at runtime. These micro-operations are cached and chained together into basic blocks to reduce overhead. This approach avoids the performance issues of traditional emulators by removing interpretation overhead and leveraging CPU parallelism through pipelining of basic blocks.
The document discusses register allocation in LLVM. It begins with an introduction to the register allocation problem and describes LLVM's base register allocation interface. It then provides more details on LLVM's basic register allocation approach and its greedy register allocation approach. The greedy approach uses techniques like live range splitting to improve register allocation.
Systemd is a system and service manager that replaces sysvinit. It manages services, devices, mounts and other system components. It relies on control groups (cgroups) to isolate and manage processes and resources for each service. Services are configured through declarative unit files instead of shell scripts. Systemd provides features like socket activation, timers, and integrates with journald for logging.
This document summarizes a presentation about React Native given at DroidKaigi 2017. It discusses how React Native allows building native Android and iOS apps using React by rendering UI components to native platform views. It describes how React Native maps React components to native platform views, implements native modules to access platform features, and uses the JavaScript bridge to allow calling native code from JavaScript. It highlights how React Native enables writing once and deploying to both Android and iOS with shared JavaScript code.
Why and How should you approach to Android Security in architecting phase, implementation phase, and operation phase.
This includes what type of secure planning should be considered in term of business domain, what type of universal secure coding should be done. It also talks about how should you store keystores and its password in safe manner.
1) The presenter discussed several techniques for animating paths in Android including using the cubicTo, op, and TypeEvaluator methods.
2) Interpolators were explained as defining the rate of change of animations through acceleration and deceleration.
3) Methods for extracting paths from Illustrator using ExtendScript Toolkit were presented.