SlideShare una empresa de Scribd logo
1 de 62
Realtek Technical Project Manager
Neo Jou
REALTEK 瑞昱半導體
全球前十大 IC 設計公司
網路通訊 IC – ethernet / wifi
PC 周邊, 多媒體 Audio – AC97 , video – ISP/H.264
TV
WHAT IS IOT
The internet working of physical devices, vehicles (also referred to as
"connected devices" and "smart devices"), buildings and other items—
embedded with electronics, software, sensors, actuators, and network
connectivity that enable these objects to collect and exchange data.
• Ref: wiki IoT
君の名は
90’s : Internet
SUN - JAVA (Oak) 智慧家電
1995 - 比爾蓋茲 - 未來之路
Motorola 銥計畫 - 50億美元 / 66顆衛星
IoE ( Internet of Everything ) - Cisco / Qualcomm
M2M : machine to machine
Web of Things
===> SkyNet?
IOT GROW
* Massive IoT - LPWAN
WHERE - EVERY
處處有智慧
SMART HOME
- smart lighting
- smart door
- smart coffee machine
- smart air conditioner
- smart weight meter
- smart vacuum cleaner
- smart water heater
IOT SCOPE
市場產品範圍廣泛
技術需求廣泛
Big Data
ASIC / HW design
SW ( HAL / driver/ RTOS / communication protocol / … )
multimedia : video / audio / .. : 視訊與影像處理
AI : 影像識別 / 行為分析規劃 / 購買建議 / ..
Security
WHY SECURITY
家是安全的避風港?
模仿遊戲
密碼學
加密 – 18 世紀
Attack at dawn
AT TA CK AT DA WN
CR RC LM CR BL VB
* Modern cryptography
加密 – 19 世紀
Gronsfeld Cipher-1844
Attack at dawn
AUVDGP GZ LJWO
* Modern cryptography
ENIGMA
http://enigmaco.de/enigma/enigma.html
加密
對稱式
Key 只有一把, 速度快, 但如何儲存/傳遞是關鍵
非對稱式
有公鑰/私鑰
對稱式加密
DES – 1970 IBM 金鑰過短, 有效位元只有 56 bits.
AES – 2000 年; 128/192/256
3DES : 112 bits
RC4 – 串流加密; 不安全
NIST FF : finite field ; IF : integer fraction ; EC: Elliptic Curve
RC4 破解
單字節偏移 / 多字節偏移
Cookie 字段開頭 “cookie:”
https://cr.yp.to/streamciphers/rc4biases-20130708.pdf
AES
CBC/CTR/其他更安全加密 : 右圖
ECB 問題
非對稱性加密
RSA
- 憑證 TLS key exchange
ECC
- ECDH :
Elliptic Curve Diffie-Hellman : key 交換
ECDSA : Elliptic Curve Digital Signal Algorithm : 簽章
HASH
MD5 / SHA-1 / SHA-2 / …
MAC : message authentication code
RAINBOW TABLE
一般: 暴力破解法 / 字典攻擊法
Hash chain : 有效縮減儲存空間
儲存起點和終點 : aaaaaa , kiebgt
e.g. Hash 值為 920ECF10 == key : sgfnyd
RANDOM NUMBER
PRNG : pseudo random number generator
TRNG : true random number generator
- NIST random test
量子密碼學
- Grover – 資料庫搜尋演算法
- 秀爾shor 量子演算法 – 質因數分解 - RSA
量子密鑰分發 – BB84 協定
IOT系統架構
攻擊 雲端 Server
攻擊 中間通訊
攻擊 IoT device
LINE LEGY
LINE 漏洞賞金計畫
https://bugbounty.linecorp.com/en/
MBED OS
LoRa : https://docs.mbed.com/docs/lora-with-mbed/en/latest/intro-to-lora/
OSI
DataLink : WIFI
WPA2
IP : IPSec
Presentation : TLS
Application :
HTTPS / Apple
Home Kit
DDOS
Distributed
Deny of Service
阻斷服務攻擊
洪水攻擊
- ICMP flood
- ping flood
- UDP flood
- TCP SYNC flood
- HTTP flood
- …
CPU / Network Resource
WEB ATTACK
1. https port 443 掃端口
2. XOR-based firmware encryption 反
組譯
3. found buffer overflow vulnerability in
the CGI script 找漏洞
4. sending a very long session cookie to
the script
5. full control over the device
Ref:
http://126kr.com/article/8fer1xbx1m
9
IOT CLIENT ATTACK
Program
Buffer overflow
random number - TRNG
System
unnecessary open ports
firmware rollback / firmware update
Device Attack
物理接觸 : e.g. flash, steal code
DOS/DDOS/wifi jammer/… : 功能癱瘓
物理性攻擊
側通道攻擊 / 邊通道攻擊 ( side channel attack )
針對加密電子設備在運行過程中, 通過測量功耗、電磁輻射以及產熱量的側通道信息洩露,
來計算出晶元的內部工作
• RSA4096 / SIM card (AES-128) / …
外部 flash / LDPPR
steal code / confidential data
insertion / destroy the code
JTAG
efuse : 不適合存密碼, 但適合做控制保護
MEMORY LAYOUT
緩衝區溢位
改變控制流程
stack-based
buffer overflow
緩衝區溢位
Ref: http://pws.niu.edu.tw/~hbc/StackBO.pdf
TCP 3WHS
Why not 2 ways?
SYNC FLOOD
Timeout : 1 sec
首包丟棄 / 封包追蹤/....
SYNC COOKIE
SYNC PROXY
TCP FAST OPEN
RFC7413 - TCP Fast Open : 降低延遲
Linux 3.13 開始, IPv4 的 TCP fast open 預設開啟
SYNC PROXY
可搭配 sync cookie 檢測
SEC PROG
strcpy -> strncpy -> strlcpy
strncpy : NUL , 長度計算
strlcpy 是 OpenBSD 2.4, 不屬於 ANSI C
compiler option : -fstack-protector-strong
SEC CODE
static code analysis
緩衝區溢位保護
HW Improve - ARM v8m StackLimit
Improve OS
can not run code in stack
malfunction -> Program DOS
SEC POLICY
用人不疑, 疑人不用
分成 secure / non-secure :
放到 secure 的, 自己人相信他
不要輕易放進 secure
身份認證
ACL
安全門
secure / non-secure 區之間溝通要控管
WHAT TO DO
HW solutions - 以 ARM 為例
ARM v8m TrustZone
RTOS security solutions - 和硬體結合
Communication Security
ARM ARCH
ARM V8M
ARM V7M
privileged
thread / handler
handler only have
privileged mode
ARM MPU
從 ARM11 開始就有
ARMv7m 時, mbed 利用 MPU 做
uvisor
ARM V8M 時, 改進 size 需要是2的
次方倍數的限制
1kB 16kB 256kB 1kB
SINGLE 274kB REGION
PMSAv
7
PMSAv
8
0x3BC00 0x80400
MBED UVISOR - V7M
MBED UVISOR - V7M
但 privilege + MPU 來做 uvisor, 會有 額外 overhead
interrupt forwarding - ISR 是在 privilege mode , 可以改 MPU 設定
ARM V8M SAU
除了原本 MPU 外, 新增 SAU 來幫忙
做權限管理
memory 先透過 SAU 劃分成 secure
/ no-secure
IRQ 也分為 secure / non-secure
Non-Secure
MPU
Secure
MPU
Security
Attribution
Unit (SAU)
System
Level
Control
Request from CPU
Request to System
TRUSTZONE
ARM TRUSTZONE
v8m 效能增進, 會比 v8A 來得好
ARM V8M
SEC RTOS
網路安全
wifi 不安全, 仍需靠上層 protocol 加密
WEP: RC4->AES;
PSK: DK = PBKDF2(HMAC−SHA1,
passphrase, ssid, 4096, 256)
HTTPS
SSL -> TLS
DTLS : 針對 UDP 安全性加強
SEC INFO
BugTraq
回顧
IoT market and architecture
Why Security
Attacks
Solutions
HW based security solution - ARM v8M
RTOS security
Communication Security
工商時間
AMEBA
空氣盒子
AMEBA
Q&A
THANK YOU

Más contenido relacionado

La actualidad más candente

使用 Arduino 控制 ESP8266 的各種方式
使用 Arduino 控制 ESP8266 的各種方式使用 Arduino 控制 ESP8266 的各種方式
使用 Arduino 控制 ESP8266 的各種方式Kenson Chiang
 
Robotis Servo 與 RoBoard 之連接介面
Robotis Servo 與 RoBoard 之連接介面Robotis Servo 與 RoBoard 之連接介面
Robotis Servo 與 RoBoard 之連接介面roboard
 
AI/ML-driven closed-loop automation using ONAP - Kate Hsuan
AI/ML-driven closed-loop automation using ONAP - Kate HsuanAI/ML-driven closed-loop automation using ONAP - Kate Hsuan
AI/ML-driven closed-loop automation using ONAP - Kate HsuanHanLing Shen
 
成果展簡報-Zigbee無線自動燈光及溫度調控系統
成果展簡報-Zigbee無線自動燈光及溫度調控系統成果展簡報-Zigbee無線自動燈光及溫度調控系統
成果展簡報-Zigbee無線自動燈光及溫度調控系統艾鍗科技
 
2014年HFD硬件自由日活动清华站-GNURadio x HackRF - 王康 / scateu
2014年HFD硬件自由日活动清华站-GNURadio x HackRF  -  王康 / scateu 2014年HFD硬件自由日活动清华站-GNURadio x HackRF  -  王康 / scateu
2014年HFD硬件自由日活动清华站-GNURadio x HackRF - 王康 / scateu Wang Kang
 
Raspberry Pi專題製作四旋翼飛行器
Raspberry Pi專題製作四旋翼飛行器Raspberry Pi專題製作四旋翼飛行器
Raspberry Pi專題製作四旋翼飛行器艾鍗科技
 
認識 RoBoard 硬體
認識 RoBoard 硬體認識 RoBoard 硬體
認識 RoBoard 硬體roboard
 
我們與 M-CORD Release 的距離
我們與 M-CORD Release 的距離我們與 M-CORD Release 的距離
我們與 M-CORD Release 的距離Wei-Yu Chen
 
第18讲 Hdlc和Ppp
第18讲 Hdlc和Ppp第18讲 Hdlc和Ppp
第18讲 Hdlc和PppF.l. Yu
 
Raspberry Pi 溫濕度發報機
Raspberry Pi 溫濕度發報機Raspberry Pi 溫濕度發報機
Raspberry Pi 溫濕度發報機艾鍗科技
 
Raspberry Pi 智能風扇
Raspberry Pi 智能風扇Raspberry Pi 智能風扇
Raspberry Pi 智能風扇艾鍗科技
 
使用L293 d 驅動馬達
使用L293 d 驅動馬達使用L293 d 驅動馬達
使用L293 d 驅動馬達澤維 郭
 
物聯網技術分享 使用ESP8266
物聯網技術分享 使用ESP8266物聯網技術分享 使用ESP8266
物聯網技術分享 使用ESP8266Power Wu
 
Free rtos简介
Free rtos简介Free rtos简介
Free rtos简介Bei Li
 
2015 JSDC Build Anything with JavaScript
2015 JSDC Build Anything with JavaScript2015 JSDC Build Anything with JavaScript
2015 JSDC Build Anything with JavaScriptWeb Arduino
 

La actualidad más candente (16)

使用 Arduino 控制 ESP8266 的各種方式
使用 Arduino 控制 ESP8266 的各種方式使用 Arduino 控制 ESP8266 的各種方式
使用 Arduino 控制 ESP8266 的各種方式
 
Robotis Servo 與 RoBoard 之連接介面
Robotis Servo 與 RoBoard 之連接介面Robotis Servo 與 RoBoard 之連接介面
Robotis Servo 與 RoBoard 之連接介面
 
AI/ML-driven closed-loop automation using ONAP - Kate Hsuan
AI/ML-driven closed-loop automation using ONAP - Kate HsuanAI/ML-driven closed-loop automation using ONAP - Kate Hsuan
AI/ML-driven closed-loop automation using ONAP - Kate Hsuan
 
成果展簡報-Zigbee無線自動燈光及溫度調控系統
成果展簡報-Zigbee無線自動燈光及溫度調控系統成果展簡報-Zigbee無線自動燈光及溫度調控系統
成果展簡報-Zigbee無線自動燈光及溫度調控系統
 
2014年HFD硬件自由日活动清华站-GNURadio x HackRF - 王康 / scateu
2014年HFD硬件自由日活动清华站-GNURadio x HackRF  -  王康 / scateu 2014年HFD硬件自由日活动清华站-GNURadio x HackRF  -  王康 / scateu
2014年HFD硬件自由日活动清华站-GNURadio x HackRF - 王康 / scateu
 
Raspberry Pi專題製作四旋翼飛行器
Raspberry Pi專題製作四旋翼飛行器Raspberry Pi專題製作四旋翼飛行器
Raspberry Pi專題製作四旋翼飛行器
 
認識 RoBoard 硬體
認識 RoBoard 硬體認識 RoBoard 硬體
認識 RoBoard 硬體
 
Sdn 101-2
Sdn 101-2Sdn 101-2
Sdn 101-2
 
我們與 M-CORD Release 的距離
我們與 M-CORD Release 的距離我們與 M-CORD Release 的距離
我們與 M-CORD Release 的距離
 
第18讲 Hdlc和Ppp
第18讲 Hdlc和Ppp第18讲 Hdlc和Ppp
第18讲 Hdlc和Ppp
 
Raspberry Pi 溫濕度發報機
Raspberry Pi 溫濕度發報機Raspberry Pi 溫濕度發報機
Raspberry Pi 溫濕度發報機
 
Raspberry Pi 智能風扇
Raspberry Pi 智能風扇Raspberry Pi 智能風扇
Raspberry Pi 智能風扇
 
使用L293 d 驅動馬達
使用L293 d 驅動馬達使用L293 d 驅動馬達
使用L293 d 驅動馬達
 
物聯網技術分享 使用ESP8266
物聯網技術分享 使用ESP8266物聯網技術分享 使用ESP8266
物聯網技術分享 使用ESP8266
 
Free rtos简介
Free rtos简介Free rtos简介
Free rtos简介
 
2015 JSDC Build Anything with JavaScript
2015 JSDC Build Anything with JavaScript2015 JSDC Build Anything with JavaScript
2015 JSDC Build Anything with JavaScript
 

Destacado

Rtos ameba
Rtos amebaRtos ameba
Rtos amebaJou Neo
 
Трудовые будни охотника на угрозы
Трудовые будни охотника на угрозыТрудовые будни охотника на угрозы
Трудовые будни охотника на угрозыSergey Soldatov
 
Kaspersky managed protection
Kaspersky managed protectionKaspersky managed protection
Kaspersky managed protectionSergey Soldatov
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkSqrrl
 
Ubuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesUbuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesDustin Kirkland
 
Very stable PUF based on two mosfet
Very stable PUF based on two mosfetVery stable PUF based on two mosfet
Very stable PUF based on two mosfetRiccardo Bernardini
 
RTOS on ARM cortex-M platform -draft
RTOS on ARM cortex-M platform -draftRTOS on ARM cortex-M platform -draft
RTOS on ARM cortex-M platform -draftJou Neo
 
Active Directory - Real Defense For Domain Admins
Active Directory - Real Defense For Domain AdminsActive Directory - Real Defense For Domain Admins
Active Directory - Real Defense For Domain AdminsJason Lang
 
A Very Stable Diode-Based Physically Unclonable Constant
A Very Stable Diode-Based  Physically Unclonable ConstantA Very Stable Diode-Based  Physically Unclonable Constant
A Very Stable Diode-Based Physically Unclonable ConstantRiccardo Bernardini
 
Whitewood entropy and random numbers - owasp - austin - jan 2017
Whitewood   entropy and random numbers - owasp - austin - jan 2017Whitewood   entropy and random numbers - owasp - austin - jan 2017
Whitewood entropy and random numbers - owasp - austin - jan 2017WhitewoodOWASP
 
Physically Unclonable Random Permutations
Physically Unclonable Random PermutationsPhysically Unclonable Random Permutations
Physically Unclonable Random PermutationsRiccardo Bernardini
 
Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Blue Teamer
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureSergey Soldatov
 
PHDays '14 Cracking java pseudo random sequences by egorov & soldatov
PHDays '14   Cracking java pseudo random sequences by egorov & soldatovPHDays '14   Cracking java pseudo random sequences by egorov & soldatov
PHDays '14 Cracking java pseudo random sequences by egorov & soldatovSergey Soldatov
 
Advanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement DetectionAdvanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement DetectionGreg Foss
 
Generalized Elias Schemes for Truly Random Bits
Generalized Elias Schemes for Truly Random BitsGeneralized Elias Schemes for Truly Random Bits
Generalized Elias Schemes for Truly Random BitsRiccardo Bernardini
 
Threat hunting as SOC process
Threat hunting as SOC processThreat hunting as SOC process
Threat hunting as SOC processSergey Soldatov
 

Destacado (20)

Rtos ameba
Rtos amebaRtos ameba
Rtos ameba
 
Трудовые будни охотника на угрозы
Трудовые будни охотника на угрозыТрудовые будни охотника на угрозы
Трудовые будни охотника на угрозы
 
Kaspersky managed protection
Kaspersky managed protectionKaspersky managed protection
Kaspersky managed protection
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Ubuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesUbuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security Features
 
Very stable PUF based on two mosfet
Very stable PUF based on two mosfetVery stable PUF based on two mosfet
Very stable PUF based on two mosfet
 
RTOS on ARM cortex-M platform -draft
RTOS on ARM cortex-M platform -draftRTOS on ARM cortex-M platform -draft
RTOS on ARM cortex-M platform -draft
 
Active Directory - Real Defense For Domain Admins
Active Directory - Real Defense For Domain AdminsActive Directory - Real Defense For Domain Admins
Active Directory - Real Defense For Domain Admins
 
A Very Stable Diode-Based Physically Unclonable Constant
A Very Stable Diode-Based  Physically Unclonable ConstantA Very Stable Diode-Based  Physically Unclonable Constant
A Very Stable Diode-Based Physically Unclonable Constant
 
Whitewood entropy and random numbers - owasp - austin - jan 2017
Whitewood   entropy and random numbers - owasp - austin - jan 2017Whitewood   entropy and random numbers - owasp - austin - jan 2017
Whitewood entropy and random numbers - owasp - austin - jan 2017
 
Physically Unclonable Random Permutations
Physically Unclonable Random PermutationsPhysically Unclonable Random Permutations
Physically Unclonable Random Permutations
 
Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)
 
Two-fet based PUF
Two-fet based PUFTwo-fet based PUF
Two-fet based PUF
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows Infrastructure
 
Dakotacon 2017
Dakotacon 2017Dakotacon 2017
Dakotacon 2017
 
PHDays '14 Cracking java pseudo random sequences by egorov & soldatov
PHDays '14   Cracking java pseudo random sequences by egorov & soldatovPHDays '14   Cracking java pseudo random sequences by egorov & soldatov
PHDays '14 Cracking java pseudo random sequences by egorov & soldatov
 
Advanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement DetectionAdvanced Threats and Lateral Movement Detection
Advanced Threats and Lateral Movement Detection
 
Generalized Elias Schemes for Truly Random Bits
Generalized Elias Schemes for Truly Random BitsGeneralized Elias Schemes for Truly Random Bits
Generalized Elias Schemes for Truly Random Bits
 
Threat hunting as SOC process
Threat hunting as SOC processThreat hunting as SOC process
Threat hunting as SOC process
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 

Similar a Io t security-ameba-ppt

智慧家庭 簡報
智慧家庭 簡報智慧家庭 簡報
智慧家庭 簡報艾鍗科技
 
防火墙产品原理介绍20080407
防火墙产品原理介绍20080407防火墙产品原理介绍20080407
防火墙产品原理介绍20080407paulqi
 
如何应用Tcpdump分析应用性能
如何应用Tcpdump分析应用性能如何应用Tcpdump分析应用性能
如何应用Tcpdump分析应用性能穆 成
 
高性能并发Web服务器实现核心内幕
高性能并发Web服务器实现核心内幕高性能并发Web服务器实现核心内幕
高性能并发Web服务器实现核心内幕ideawu
 
物联网与微博平台探索
物联网与微博平台探索物联网与微博平台探索
物联网与微博平台探索Tang Fulin
 
数据中心网络架构与全球化服务-Qcon2011
数据中心网络架构与全球化服务-Qcon2011数据中心网络架构与全球化服务-Qcon2011
数据中心网络架构与全球化服务-Qcon2011Yiwei Ma
 
网络基础知识(经典)
网络基础知识(经典)网络基础知识(经典)
网络基础知识(经典)littlesujin
 
Pki guide v1.0a_aka
Pki guide v1.0a_akaPki guide v1.0a_aka
Pki guide v1.0a_akaWASecurity
 
Alibaba server-zhangxuseng-qcon
Alibaba server-zhangxuseng-qconAlibaba server-zhangxuseng-qcon
Alibaba server-zhangxuseng-qconYiwei Ma
 
LinkIt Smart 7688程式開發
LinkIt Smart 7688程式開發LinkIt Smart 7688程式開發
LinkIt Smart 7688程式開發Wei-Tsung Su
 
构建ActionScript游戏服务器,支持超过15000并发连接
构建ActionScript游戏服务器,支持超过15000并发连接 构建ActionScript游戏服务器,支持超过15000并发连接
构建ActionScript游戏服务器,支持超过15000并发连接 Renaun Erickson
 
2018 VLSI/CAD Symposium Tutorial (Aug. 7, 20:00-21:00 Room 3F-VII)
2018 VLSI/CAD Symposium Tutorial (Aug. 7, 20:00-21:00 Room 3F-VII)2018 VLSI/CAD Symposium Tutorial (Aug. 7, 20:00-21:00 Room 3F-VII)
2018 VLSI/CAD Symposium Tutorial (Aug. 7, 20:00-21:00 Room 3F-VII)Simen Li
 
全端物聯網探索之旅 - 重點整理版
全端物聯網探索之旅 - 重點整理版全端物聯網探索之旅 - 重點整理版
全端物聯網探索之旅 - 重點整理版Simen Li
 
Hacking Nginx at Taobao
Hacking Nginx at TaobaoHacking Nginx at Taobao
Hacking Nginx at TaobaoJoshua Zhu
 
Linux bonding
Linux bondingLinux bonding
Linux bondinghubugui
 
高性能并发网络服务器设计与实现
高性能并发网络服务器设计与实现高性能并发网络服务器设计与实现
高性能并发网络服务器设计与实现ideawu
 
探索 ISTIO 新型 DATA PLANE 架構 AMBIENT MESH - GOLANG TAIWAN GATHERING #77 X CNTUG
探索 ISTIO 新型 DATA PLANE 架構 AMBIENT MESH - GOLANG TAIWAN GATHERING #77 X CNTUG探索 ISTIO 新型 DATA PLANE 架構 AMBIENT MESH - GOLANG TAIWAN GATHERING #77 X CNTUG
探索 ISTIO 新型 DATA PLANE 架構 AMBIENT MESH - GOLANG TAIWAN GATHERING #77 X CNTUGYingSiang Geng
 
AI使能网络自动驾驶 AI Building Autonomous Driving Network
AI使能网络自动驾驶 AI Building Autonomous Driving NetworkAI使能网络自动驾驶 AI Building Autonomous Driving Network
AI使能网络自动驾驶 AI Building Autonomous Driving NetworkLeo Zhou
 

Similar a Io t security-ameba-ppt (20)

Tcpip
TcpipTcpip
Tcpip
 
智慧家庭 簡報
智慧家庭 簡報智慧家庭 簡報
智慧家庭 簡報
 
防火墙产品原理介绍20080407
防火墙产品原理介绍20080407防火墙产品原理介绍20080407
防火墙产品原理介绍20080407
 
如何应用Tcpdump分析应用性能
如何应用Tcpdump分析应用性能如何应用Tcpdump分析应用性能
如何应用Tcpdump分析应用性能
 
高性能并发Web服务器实现核心内幕
高性能并发Web服务器实现核心内幕高性能并发Web服务器实现核心内幕
高性能并发Web服务器实现核心内幕
 
物联网与微博平台探索
物联网与微博平台探索物联网与微博平台探索
物联网与微博平台探索
 
数据中心网络架构与全球化服务-Qcon2011
数据中心网络架构与全球化服务-Qcon2011数据中心网络架构与全球化服务-Qcon2011
数据中心网络架构与全球化服务-Qcon2011
 
网络基础知识(经典)
网络基础知识(经典)网络基础知识(经典)
网络基础知识(经典)
 
Pki guide v1.0a_aka
Pki guide v1.0a_akaPki guide v1.0a_aka
Pki guide v1.0a_aka
 
Alibaba server-zhangxuseng-qcon
Alibaba server-zhangxuseng-qconAlibaba server-zhangxuseng-qcon
Alibaba server-zhangxuseng-qcon
 
LinkIt Smart 7688程式開發
LinkIt Smart 7688程式開發LinkIt Smart 7688程式開發
LinkIt Smart 7688程式開發
 
构建ActionScript游戏服务器,支持超过15000并发连接
构建ActionScript游戏服务器,支持超过15000并发连接 构建ActionScript游戏服务器,支持超过15000并发连接
构建ActionScript游戏服务器,支持超过15000并发连接
 
2018 VLSI/CAD Symposium Tutorial (Aug. 7, 20:00-21:00 Room 3F-VII)
2018 VLSI/CAD Symposium Tutorial (Aug. 7, 20:00-21:00 Room 3F-VII)2018 VLSI/CAD Symposium Tutorial (Aug. 7, 20:00-21:00 Room 3F-VII)
2018 VLSI/CAD Symposium Tutorial (Aug. 7, 20:00-21:00 Room 3F-VII)
 
全端物聯網探索之旅 - 重點整理版
全端物聯網探索之旅 - 重點整理版全端物聯網探索之旅 - 重點整理版
全端物聯網探索之旅 - 重點整理版
 
Hacking Nginx at Taobao
Hacking Nginx at TaobaoHacking Nginx at Taobao
Hacking Nginx at Taobao
 
Linux bonding
Linux bondingLinux bonding
Linux bonding
 
LinkIt 7697 IoT tutorial
LinkIt 7697 IoT tutorialLinkIt 7697 IoT tutorial
LinkIt 7697 IoT tutorial
 
高性能并发网络服务器设计与实现
高性能并发网络服务器设计与实现高性能并发网络服务器设计与实现
高性能并发网络服务器设计与实现
 
探索 ISTIO 新型 DATA PLANE 架構 AMBIENT MESH - GOLANG TAIWAN GATHERING #77 X CNTUG
探索 ISTIO 新型 DATA PLANE 架構 AMBIENT MESH - GOLANG TAIWAN GATHERING #77 X CNTUG探索 ISTIO 新型 DATA PLANE 架構 AMBIENT MESH - GOLANG TAIWAN GATHERING #77 X CNTUG
探索 ISTIO 新型 DATA PLANE 架構 AMBIENT MESH - GOLANG TAIWAN GATHERING #77 X CNTUG
 
AI使能网络自动驾驶 AI Building Autonomous Driving Network
AI使能网络自动驾驶 AI Building Autonomous Driving NetworkAI使能网络自动驾驶 AI Building Autonomous Driving Network
AI使能网络自动驾驶 AI Building Autonomous Driving Network
 

Io t security-ameba-ppt