pdf page 2 - Dave's Blog

Search
My timeline on Mastodon

Fight Against 1-day Exploits: Diffing Binaries vs Anti-diffing Binaries

2009 Aug 24, 9:52Notes on how bin diff'ing tools work and thoughts on defeating them. "We call the threat "1-day exploits". Just few minutes after the release of patches, binary diffing technique can be used to identify the vulnerabilities that the security patches are remedying."PermalinkCommentsexploit security binary diff tool research technical system:filetype:pdf system:media:document

Compact E-Cash

2009 Aug 14, 6:20"This paper presents efficient off-line anonymous e-cash schemes where a user can withdraw a wallet containing coins each of which she can spend unlinkably."PermalinkCommentsmoney future reference research economics cryptography technical system:filetype:pdf system:media:document

Guidelines for Media Sanitization - Recommendations of the National Institute of Standards and Technology

2009 Jul 29, 3:18PermalinkCommentssecurity computer storage nist erase technical system:filetype:pdf system:media:document

DSpace@MIT : Parallel and Distributed Computation:Numerical Methods

2009 Jul 27, 5:27"Parallel and Distributed Computation:Numerical Methods", Bertsekas, Dimitri P.; Tsitsiklis, John N., 2003-11-21PermalinkCommentsprogramming mit pdf algorithm distributed parallel math todo technical

The 'Is It UTF-8?' Quick and Dirty Test

2009 Mar 6, 5:16

I've found while debugging networking in IE its often useful to quickly tell if a string is encoded in UTF-8. You can check for the Byte Order Mark (EF BB BF in UTF-8) but, I rarely see the BOM on UTF-8 strings. Instead I apply a quick and dirty UTF-8 test that takes advantage of the well-formed UTF-8 restrictions.

Unlike other multibyte character encoding forms (see Windows supported character sets or IANA's list of character sets), for example Big5, where sticking together any two bytes is more likely than not to give a valid byte sequence, UTF-8 is more restrictive. And unlike other multibyte character encodings, UTF-8 bytes may be taken out of context and one can still know that its a single byte character, the starting byte of a three byte sequence, etc.

The full rules for well-formed UTF-8 are a little too complicated for me to commit to memory. Instead I've got my own simpler (this is the quick part) set of rules that will be mostly correct (this is the dirty part). For as many bytes in the string as you care to examine, check the most significant digit of the byte:

F:
This is byte 1 of a 4 byte encoded codepoint and must be followed by 3 trail bytes.
E:
This is byte 1 of a 3 byte encoded codepoint and must be followed by 2 trail bytes.
C..D:
This is byte 1 of a 2 byte encoded codepoint and must be followed by 1 trail byte.
8..B:
This is a trail byte.
0..7:
This is a single byte encoded codepoint.
The simpler rules can produce false positives in some cases: that is, they'll say a string is UTF-8 when in fact it might not be. But it won't produce false negatives. The following is table from the Unicode spec. that actually describes well-formed UTF-8.
Code Points 1st Byte 2nd Byte 3rd Byte 4th Byte
U+0000..U+007F 00..7F
U+0080..U+07FF C2..DF 80..BF
U+0800..U+0FFF E0 A0..BF 80..BF
U+1000..U+CFFF E1..EC 80..BF 80..BF
U+D000..U+D7FF ED 80..9F 80..BF
U+E000..U+FFFF EE..EF 80..BF 80..BF
U+10000..U+3FFFF F0 90..BF 80..BF 80..BF
U+40000..U+FFFFF F1..F3 80..BF 80..BF 80..BF
U+100000..U+10FFFF F4 80..8F 80..BF 80..BF

PermalinkCommentstest technical unicode boring charset utf8 encoding

No Media Kings - Sword of My Mouth #1 Out Soon

2009 Feb 28, 11:34"It's completely nuts... It's a book about what if the Rapture actually happened, and that's all I'm gonna tell you." -Junot Diaz, 2008 Pulitzer Prize Winner for FictionPermalinkCommentscreativecommons comic literature religion magic download pdf

Dopplr Blog - Blog Archive - Dopplr presents the Personal Annual Report 2008: freshly generated for you, and Barack Obama…

2009 Jan 15, 4:57Lovely travel visualization: "We've generated what we call the Personal Annual Report for all our users. It's a unique-to-you PDF of data, visualisations and factoids about your travel in 2008, that we're delivering over the next week via email to every Dopplr user who travelled in 2008. To give you an example, we thought we'd show you the Personal Annual Report of someone who's had a very busy 2008 - President Elect Barack Obama."PermalinkCommentsvia:mattb visualization blog dopplr obama travel statistics map

Shoulder Surfing a Malicious PDF Author - Didier Stevens

2008 Nov 13, 10:21"Ever since I read about the incremental updates feature of the PDF file format, I've been patiently waiting for a malicious PDF document with incremental updates to come my way. Thanks to Bojan, that day has finally arrived."PermalinkCommentspdf security javascript exploit malware adobe

PdfMeNot.com - a nicer way of linking to PDFs

2008 May 13, 3:59Displays PDFs using Flash. Is Flash really the lesser of the two evils?PermalinkCommentspdf flash browser web

nin.com [download] - the slip

2008 May 12, 2:38Nine Inch Nails latest album 'The Slip' is available for free to download. Got mine as a zip of mp3s including cover art as pdf, although other audio formats are available. OK!PermalinkCommentsnin music free download

MSIE facilitates Cross Site Scripting [splitbrain.org]

2008 Mar 6, 2:22Using IE's mimetype sniffing for XSS attacks.PermalinkCommentsmime http sniffing sniff security browser ie ie7 pdf

Canon SD800is SD850is Digital Camera owners manual

2008 Mar 3, 10:16The manual for the SD800IS digital camera.PermalinkCommentscamera manual reference product canon sd800is pdf

suda.co.uk/projects/microformats [Cheat Sheet]

2007 Apr 5, 10:26A microformats cheat sheet.PermalinkCommentsmicroformats pdf reference cheatsheet

CutePDF - Create PDF for free, Save PDF Forms, Edit PDF easily;.

2007 Apr 4, 9:15CutePDF lets you print things out to a PDF file.PermalinkCommentspdf print windows free software download
Older EntriesNewer Entries Creative Commons License Some rights reserved.