SlideShare a Scribd company logo
1 of 39
Download to read offline
Forging the USB armory
Andrea Barisani
<andrea@inversepath.com>
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
2007: Unusual Car Navigation Tricks
Injecting RDS-TMC Traffic Information Signals
2009: Sniff Keystrokes With Lasers/Voltmeters
Side Channel Attacks Using Optical Sampling Of
Mechanical Energy And Power Line Leakage
2011: Chip & PIN is definitely broken
Credit card skimming and PIN harvesting in an EMV world
2013: Fully arbitrary 802.3 packet injection
Maximizing the Ethernet attack surface
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Designed for personal security applications

mass storage device with advanced features such as automatic
encryption, virus scanning, host authentication and data self-
destruct

OpenSSH client and agent for untrusted hosts (kiosk)

router for end-to-end VPN tunneling, Tor

password manager with integrated web server

electronic wallet (e.g. pocket Bitcoin wallet)

authentication token

portable penetration testing platform

low level USB security testing
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
enhanced mass storage
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
enhanced mass storage
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
enhanced mass storage
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
SSH proxy
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
password manager
*trivial example, better options planned
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
authentication token
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
USB device authenticates host
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Design goals
Compact USB powered device
Fast CPU and generous RAM
Secure boot
Standard connectivity over USB
Familiar developing/execution environment
Open design
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Selecting the System on Chip (SoC)
Freescale i.MX53

ARM® Cortex™-A8 800-1200 Mhz

almost all datasheets/manuals are public (no NDA required)

Freescale datasheets are “ok” (far better than other vendors)

ARM® TrustZone®, secure boot + storage + RAM

detailed power consumption guide available

excellent native support (Android, Debian, Ubuntu, FreeBSD)

good stock and production support guarantee
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
ARM® TrustZone®
http://genode.org/documentation/articles/trustzone
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
ARM® TrustZone®
http://genode.org/documentation/articles/trustzone
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Development timeline
2014/01: first concept idea (based on AT91RM9200)
2014/03: schematics development begins
2014/04: PCB layout for breakout/prototyping board
2014/08: order for alpha board manufacturing
2014/09: USB armory alpha board arrives
2014/10: project announcement
2014/10: order for 7 optimized revisions against alpha design
2014/11: beta revisions arrive and are evaluated
future planning
2014/11: design finalization and first batch production
2014/12: shipping
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
http://inversepath.com/usbarmory
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
USB armory - Open source flash-drive-sized computer

Freescale i.MX53 ARM® Cortex™-A8 800Mhz, 512MB DDR3
RAM

USB host powered (<500 mA) device with compact form factor
(65 x 19 x 6 mm)

ARM® TrustZone®, secure boot + storage + RAM

microSD card slot

5-pin breakout header with GPIOs and UART

customizable LED, including secure mode detection

excellent native support (Android, Debian, Ubuntu, FreeBSD)

USB device emulation (CDC Ethernet, mass storage, HID, etc.)

Open Hardware & Software
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
*we actually measure consumption with better equipment ^_^
*
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
lessons learned #1
tiny inductors are fragile
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
lessons learned #2 (the five-second rule)
gold plating traces cause under-voltage on hot swap
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Forging the USB armory Copyright 2014 Inverse Path S.r.l.
Thank you!
Q & A
Andrea Barisani
<andrea@inversepath.com>

More Related Content

Viewers also liked

NSC #2 - D1 01 - Rolf Rolles - Program synthesis in reverse engineering
NSC #2 - D1 01 - Rolf Rolles - Program synthesis in reverse engineeringNSC #2 - D1 01 - Rolf Rolles - Program synthesis in reverse engineering
NSC #2 - D1 01 - Rolf Rolles - Program synthesis in reverse engineeringNoSuchCon
 
NSC #2 - Challenge Introduction
NSC #2 - Challenge IntroductionNSC #2 - Challenge Introduction
NSC #2 - Challenge IntroductionNoSuchCon
 
NSC #2 - D2 06 - Richard Johnson - SAGEly Advice
NSC #2 - D2 06 - Richard Johnson - SAGEly AdviceNSC #2 - D2 06 - Richard Johnson - SAGEly Advice
NSC #2 - D2 06 - Richard Johnson - SAGEly AdviceNoSuchCon
 
NSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
NSC #2 - D3 02 - Peter Hlavaty - Attack on the CoreNSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
NSC #2 - D3 02 - Peter Hlavaty - Attack on the CoreNoSuchCon
 
NSC #2 - D2 02 - Benjamin Delpy - Mimikatz
NSC #2 - D2 02 - Benjamin Delpy - MimikatzNSC #2 - D2 02 - Benjamin Delpy - Mimikatz
NSC #2 - D2 02 - Benjamin Delpy - MimikatzNoSuchCon
 
NSC #2 - Challenge Solution
NSC #2 - Challenge SolutionNSC #2 - Challenge Solution
NSC #2 - Challenge SolutionNoSuchCon
 
NSC #2 - D2 03 - Nicolas Collignon - Google Apps Engine Security
NSC #2 - D2 03 - Nicolas Collignon - Google Apps Engine SecurityNSC #2 - D2 03 - Nicolas Collignon - Google Apps Engine Security
NSC #2 - D2 03 - Nicolas Collignon - Google Apps Engine SecurityNoSuchCon
 
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database AttacksNSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database AttacksNoSuchCon
 
NSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practice
NSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practiceNSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practice
NSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practiceNoSuchCon
 

Viewers also liked (9)

NSC #2 - D1 01 - Rolf Rolles - Program synthesis in reverse engineering
NSC #2 - D1 01 - Rolf Rolles - Program synthesis in reverse engineeringNSC #2 - D1 01 - Rolf Rolles - Program synthesis in reverse engineering
NSC #2 - D1 01 - Rolf Rolles - Program synthesis in reverse engineering
 
NSC #2 - Challenge Introduction
NSC #2 - Challenge IntroductionNSC #2 - Challenge Introduction
NSC #2 - Challenge Introduction
 
NSC #2 - D2 06 - Richard Johnson - SAGEly Advice
NSC #2 - D2 06 - Richard Johnson - SAGEly AdviceNSC #2 - D2 06 - Richard Johnson - SAGEly Advice
NSC #2 - D2 06 - Richard Johnson - SAGEly Advice
 
NSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
NSC #2 - D3 02 - Peter Hlavaty - Attack on the CoreNSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
NSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
 
NSC #2 - D2 02 - Benjamin Delpy - Mimikatz
NSC #2 - D2 02 - Benjamin Delpy - MimikatzNSC #2 - D2 02 - Benjamin Delpy - Mimikatz
NSC #2 - D2 02 - Benjamin Delpy - Mimikatz
 
NSC #2 - Challenge Solution
NSC #2 - Challenge SolutionNSC #2 - Challenge Solution
NSC #2 - Challenge Solution
 
NSC #2 - D2 03 - Nicolas Collignon - Google Apps Engine Security
NSC #2 - D2 03 - Nicolas Collignon - Google Apps Engine SecurityNSC #2 - D2 03 - Nicolas Collignon - Google Apps Engine Security
NSC #2 - D2 03 - Nicolas Collignon - Google Apps Engine Security
 
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database AttacksNSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
 
NSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practice
NSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practiceNSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practice
NSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practice
 

Similar to NSC #2 - D2 05 - Andrea Barisani - Forging the USB Armory

WebRTC Asia Forum - What's Next for WebRTC in Asia - Dean Bubley, Disruptive ...
WebRTC Asia Forum - What's Next for WebRTC in Asia - Dean Bubley, Disruptive ...WebRTC Asia Forum - What's Next for WebRTC in Asia - Dean Bubley, Disruptive ...
WebRTC Asia Forum - What's Next for WebRTC in Asia - Dean Bubley, Disruptive ...Dean Bubley
 
Sydney UC - February 2015
Sydney UC - February 2015Sydney UC - February 2015
Sydney UC - February 2015justimorris
 
20040927-Commons-Riddle.ppt
20040927-Commons-Riddle.ppt20040927-Commons-Riddle.ppt
20040927-Commons-Riddle.pptVideoguy
 
Zero Day Plus Anti Malware LTD 2016 sales pdf
Zero Day Plus Anti Malware LTD 2016 sales pdfZero Day Plus Anti Malware LTD 2016 sales pdf
Zero Day Plus Anti Malware LTD 2016 sales pdfAlexander Rogan
 
Acs ip-so c-10-tips-presentation
Acs ip-so c-10-tips-presentationAcs ip-so c-10-tips-presentation
Acs ip-so c-10-tips-presentationDesign And Reuse
 
Fortune Marketing Private Limited, Delhi, Keyboard
Fortune Marketing Private Limited, Delhi, Keyboard Fortune Marketing Private Limited, Delhi, Keyboard
Fortune Marketing Private Limited, Delhi, Keyboard IndiaMART InterMESH Limited
 
Cross Device Accessibility
Cross Device AccessibilityCross Device Accessibility
Cross Device AccessibilityChris Mills
 
OGDC 2014: Cross Platform Mobile Game Application Development
OGDC 2014: Cross Platform Mobile Game Application DevelopmentOGDC 2014: Cross Platform Mobile Game Application Development
OGDC 2014: Cross Platform Mobile Game Application DevelopmentGameLandVN
 
OGDC 2014_Cross platform mobile game application development_Mr. Makku J.Kero
OGDC 2014_Cross platform mobile game application development_Mr. Makku J.KeroOGDC 2014_Cross platform mobile game application development_Mr. Makku J.Kero
OGDC 2014_Cross platform mobile game application development_Mr. Makku J.Keroogdc
 
Information Technology as a Service ... Computer Networking and IT solutions
Information Technology as a Service ... Computer Networking and IT solutionsInformation Technology as a Service ... Computer Networking and IT solutions
Information Technology as a Service ... Computer Networking and IT solutionsAbdullah El-Deeb
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hackSlawomir Jasek
 
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...Mike Qin
 
Tech Term Defination
Tech Term DefinationTech Term Defination
Tech Term DefinationMuneeb Ahmad
 
IoT development (APIcon 2014 presentation)
IoT development (APIcon 2014 presentation)IoT development (APIcon 2014 presentation)
IoT development (APIcon 2014 presentation)Mike Milinkovich
 
Multimedia Analytics with 5G Edge Nodes
Multimedia Analytics with 5G Edge NodesMultimedia Analytics with 5G Edge Nodes
Multimedia Analytics with 5G Edge NodesAnand Bhojan
 
[Dec./2017] My Personal/Professional Journey after Graduate Univ.
[Dec./2017] My Personal/Professional Journey after Graduate Univ.[Dec./2017] My Personal/Professional Journey after Graduate Univ.
[Dec./2017] My Personal/Professional Journey after Graduate Univ.Hayoung Yoon
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...FFRI, Inc.
 

Similar to NSC #2 - D2 05 - Andrea Barisani - Forging the USB Armory (20)

USB Defender Overview
USB Defender OverviewUSB Defender Overview
USB Defender Overview
 
WebRTC Asia Forum - What's Next for WebRTC in Asia - Dean Bubley, Disruptive ...
WebRTC Asia Forum - What's Next for WebRTC in Asia - Dean Bubley, Disruptive ...WebRTC Asia Forum - What's Next for WebRTC in Asia - Dean Bubley, Disruptive ...
WebRTC Asia Forum - What's Next for WebRTC in Asia - Dean Bubley, Disruptive ...
 
Sydney UC - February 2015
Sydney UC - February 2015Sydney UC - February 2015
Sydney UC - February 2015
 
20040927-Commons-Riddle.ppt
20040927-Commons-Riddle.ppt20040927-Commons-Riddle.ppt
20040927-Commons-Riddle.ppt
 
Zero Day Plus Anti Malware LTD 2016 sales pdf
Zero Day Plus Anti Malware LTD 2016 sales pdfZero Day Plus Anti Malware LTD 2016 sales pdf
Zero Day Plus Anti Malware LTD 2016 sales pdf
 
Acs ip-so c-10-tips-presentation
Acs ip-so c-10-tips-presentationAcs ip-so c-10-tips-presentation
Acs ip-so c-10-tips-presentation
 
Fortune Marketing Private Limited, Delhi, Keyboard
Fortune Marketing Private Limited, Delhi, Keyboard Fortune Marketing Private Limited, Delhi, Keyboard
Fortune Marketing Private Limited, Delhi, Keyboard
 
Cross Device Accessibility
Cross Device AccessibilityCross Device Accessibility
Cross Device Accessibility
 
OGDC 2014: Cross Platform Mobile Game Application Development
OGDC 2014: Cross Platform Mobile Game Application DevelopmentOGDC 2014: Cross Platform Mobile Game Application Development
OGDC 2014: Cross Platform Mobile Game Application Development
 
OGDC 2014_Cross platform mobile game application development_Mr. Makku J.Kero
OGDC 2014_Cross platform mobile game application development_Mr. Makku J.KeroOGDC 2014_Cross platform mobile game application development_Mr. Makku J.Kero
OGDC 2014_Cross platform mobile game application development_Mr. Makku J.Kero
 
Information Technology as a Service ... Computer Networking and IT solutions
Information Technology as a Service ... Computer Networking and IT solutionsInformation Technology as a Service ... Computer Networking and IT solutions
Information Technology as a Service ... Computer Networking and IT solutions
 
FireWire
FireWireFireWire
FireWire
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
 
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...
Blockchain Software for Hardware: The Canaan AvalonMiner Open Source Embedded...
 
Tech Term Defination
Tech Term DefinationTech Term Defination
Tech Term Defination
 
IoT development (APIcon 2014 presentation)
IoT development (APIcon 2014 presentation)IoT development (APIcon 2014 presentation)
IoT development (APIcon 2014 presentation)
 
Multimedia Analytics with 5G Edge Nodes
Multimedia Analytics with 5G Edge NodesMultimedia Analytics with 5G Edge Nodes
Multimedia Analytics with 5G Edge Nodes
 
[Dec./2017] My Personal/Professional Journey after Graduate Univ.
[Dec./2017] My Personal/Professional Journey after Graduate Univ.[Dec./2017] My Personal/Professional Journey after Graduate Univ.
[Dec./2017] My Personal/Professional Journey after Graduate Univ.
 
Far South Networks Vision
Far South Networks VisionFar South Networks Vision
Far South Networks Vision
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

NSC #2 - D2 05 - Andrea Barisani - Forging the USB Armory