self encrypting deception
play

Self-Encrypting Deception: Weaknesses in the Encryption of Solid - PowerPoint PPT Presentation

Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives (SSDs) Carlo Meijer Bernard van Gastel Radboud University Nijmegen Radboud University Nijmegen Midnight Blue Labs Open University of the Netherlands whoami Carlo


  1. Many have debugging interfaces exposed on PCB Adversary has physical access: can hot-plug the device Overall: Attack opportunities are more or less equivalent PC on Software encryption: secret key kept in RAM, which has weaknesses. (i) Cold boot attack Reboot, load custom OS, extract key from RAM (ii) DMA attack Extract key through DMA interface (PCI-e, Firewire, Thunderbolt, etc.) Hardware encryption: immune in theory , however Key is kept in RAM for virtually all implementations • To support Suspend-to-RAM (S3) Key is kept in storage controller (Not secure hardware by any standard) •

  2. Adversary has physical access: can hot-plug the device Overall: Attack opportunities are more or less equivalent PC on Software encryption: secret key kept in RAM, which has weaknesses. (i) Cold boot attack Reboot, load custom OS, extract key from RAM (ii) DMA attack Extract key through DMA interface (PCI-e, Firewire, Thunderbolt, etc.) Hardware encryption: immune in theory , however Key is kept in RAM for virtually all implementations • To support Suspend-to-RAM (S3) Key is kept in storage controller (Not secure hardware by any standard) • Many have debugging interfaces exposed on PCB

  3. Overall: Attack opportunities are more or less equivalent PC on Software encryption: secret key kept in RAM, which has weaknesses. (i) Cold boot attack Reboot, load custom OS, extract key from RAM (ii) DMA attack Extract key through DMA interface (PCI-e, Firewire, Thunderbolt, etc.) Hardware encryption: immune in theory , however Key is kept in RAM for virtually all implementations • To support Suspend-to-RAM (S3) Key is kept in storage controller (Not secure hardware by any standard) • Many have debugging interfaces exposed on PCB Adversary has physical access: can hot-plug the device •

  4. PC on Software encryption: secret key kept in RAM, which has weaknesses. (i) Cold boot attack Reboot, load custom OS, extract key from RAM (ii) DMA attack Extract key through DMA interface (PCI-e, Firewire, Thunderbolt, etc.) Hardware encryption: immune in theory , however Key is kept in RAM for virtually all implementations • To support Suspend-to-RAM (S3) Key is kept in storage controller (Not secure hardware by any standard) • Many have debugging interfaces exposed on PCB Adversary has physical access: can hot-plug the device • Overall: Attack opportunities are more or less equivalent

  5. Security guarantees of Self-Encrypting Drives Typical three attacker models for Full-Disk Encryption. All involve physical access. (i) PC on (ii) PC off, victim unaware: Physical encounter is not noticed by the victim (iii) PC off, victim aware: Drive is lost or stolen, machine considered “tainted”.

  6. (1) Install backdoor functionality (2) Wait for victim to enter secret key in the machine (3) Exfjltrate data Examples: Hardware keylogger Backdoor in boot loader Overall: SEDs don’t offer added protection equivalent PC off, victim unaware Evil maid attack

  7. (2) Wait for victim to enter secret key in the machine (3) Exfjltrate data Examples: Hardware keylogger Backdoor in boot loader Overall: SEDs don’t offer added protection equivalent PC off, victim unaware Evil maid attack (1) Install backdoor functionality

  8. (3) Exfjltrate data Examples: Hardware keylogger Backdoor in boot loader Overall: SEDs don’t offer added protection equivalent PC off, victim unaware Evil maid attack (1) Install backdoor functionality (2) Wait for victim to enter secret key in the machine

  9. Examples: Hardware keylogger Backdoor in boot loader Overall: SEDs don’t offer added protection equivalent PC off, victim unaware Evil maid attack (1) Install backdoor functionality (2) Wait for victim to enter secret key in the machine (3) Exfjltrate data

  10. Backdoor in boot loader Overall: SEDs don’t offer added protection equivalent PC off, victim unaware Evil maid attack (1) Install backdoor functionality (2) Wait for victim to enter secret key in the machine (3) Exfjltrate data Examples: Hardware keylogger •

  11. Overall: SEDs don’t offer added protection equivalent PC off, victim unaware Evil maid attack (1) Install backdoor functionality (2) Wait for victim to enter secret key in the machine (3) Exfjltrate data Examples: Hardware keylogger • Backdoor in boot loader •

  12. PC off, victim unaware Evil maid attack (1) Install backdoor functionality (2) Wait for victim to enter secret key in the machine (3) Exfjltrate data Examples: Hardware keylogger • Backdoor in boot loader • Overall: SEDs don’t offer added protection → equivalent

  13. Security guarantees of Self-Encrypting Drives Typical three attacker models for Full-Disk Encryption. All involve physical access. (i) PC on (ii) PC off, victim unaware: Physical encounter is not noticed by the victim (iii) PC off, victim aware: Drive is lost or stolen, machine considered “tainted”.

  14. Options: Open source (audited) software Proprietary software with public implementation details Proprietary (black-box) implementation With hardware encryption, no other option than the black-box Extremely hard to audit Additional pitfalls that apply particularly to hardware (later) PC off, victim aware Software encryption provides full confjdentiality of the data (given that the implementation is sound)

  15. Proprietary software with public implementation details Proprietary (black-box) implementation With hardware encryption, no other option than the black-box Extremely hard to audit Additional pitfalls that apply particularly to hardware (later) PC off, victim aware Software encryption provides full confjdentiality of the data (given that the implementation is sound) Options: Open source (audited) software •

  16. Proprietary (black-box) implementation With hardware encryption, no other option than the black-box Extremely hard to audit Additional pitfalls that apply particularly to hardware (later) PC off, victim aware Software encryption provides full confjdentiality of the data (given that the implementation is sound) Options: Open source (audited) software • Proprietary software with public implementation details •

  17. With hardware encryption, no other option than the black-box Extremely hard to audit Additional pitfalls that apply particularly to hardware (later) PC off, victim aware Software encryption provides full confjdentiality of the data (given that the implementation is sound) Options: Open source (audited) software • Proprietary software with public implementation details • Proprietary (black-box) implementation •

  18. Extremely hard to audit Additional pitfalls that apply particularly to hardware (later) PC off, victim aware Software encryption provides full confjdentiality of the data (given that the implementation is sound) Options: Open source (audited) software • Proprietary software with public implementation details • Proprietary (black-box) implementation • With hardware encryption, no other option than the black-box

  19. Additional pitfalls that apply particularly to hardware (later) PC off, victim aware Software encryption provides full confjdentiality of the data (given that the implementation is sound) Options: Open source (audited) software • Proprietary software with public implementation details • Proprietary (black-box) implementation • With hardware encryption, no other option than the black-box Extremely hard to audit •

  20. PC off, victim aware Software encryption provides full confjdentiality of the data (given that the implementation is sound) Options: Open source (audited) software • Proprietary software with public implementation details • Proprietary (black-box) implementation • With hardware encryption, no other option than the black-box Extremely hard to audit • Additional pitfalls that apply particularly to hardware (later) •

  21. Thus, security guarantees are equivalent. At best . Security guarantees of Self-Encrypting Drives Typical three attacker models for Full-Disk Encryption. All involve physical access. (i) PC on (ii) PC off, victim unaware: Physical encounter is not noticed by the victim (iii) PC off, victim aware: Drive is lost or stolen, machine considered “tainted”.

  22. Security guarantees of Self-Encrypting Drives Typical three attacker models for Full-Disk Encryption. All involve physical access. (i) PC on (ii) PC off, victim unaware: Physical encounter is not noticed by the victim (iii) PC off, victim aware: Drive is lost or stolen, machine considered “tainted”. Thus, security guarantees are equivalent. At best .

  23. Standards for Self-Encrypting Drives

  24. (ii) TCG Opal Modern standard designed specifjcally for SEDs Standards for Self-Encrypting Drives Two widely used standards exist (i) ATA Security Feature Set Originally designed for access control only https://medium.com/@andrewpgsweeny/ beyond-the-red-pill-and-the-blue-pill-9ef953d6e133

  25. Standards for Self-Encrypting Drives Two widely used standards exist (i) ATA Security Feature Set Originally designed for access control only (ii) TCG Opal Modern standard designed specifjcally for SEDs https://medium.com/@andrewpgsweeny/ beyond-the-red-pill-and-the-blue-pill-9ef953d6e133

  26. Keyed hash DEK So far, easy Suppose you would implement this yourself It would probably look something like this Stored data User-supplied password Salt # 1 Salt # 2 Hash output Keyed hash Compare Match/no match Hash result

  27. So far, easy Suppose you would implement this yourself It would probably look something like this Stored data User-supplied password Salt # 1 Salt # 2 Hash output Keyed hash Compare Match/no match Hash result Keyed hash DEK

  28. Suppose you would implement this yourself It would probably look something like this Stored data User-supplied password Salt # 1 Salt # 2 Hash output Keyed hash Compare Match/no match Hash result Keyed hash DEK So far, easy

  29. Standards for Self-Encrypting Drives Two widely used standards exist (i) ATA Security Feature Set Originally designed for access control only (ii) TCG Opal Modern standard designed specifjcally for SEDs https://medium.com/@andrewpgsweeny/ beyond-the-red-pill-and-the-blue-pill-9ef953d6e133

  30. Two password types: User , Master Both are user-settable, initial master password factory set MASTER PASSWORD CAPABILITY : High (0), Maximum (1) High : both User and Master password unlock drive Maximum : Only User unlocks drive, Master may erase Bottom line: Always change the Master password or set to Maximum In practice, even this is almost always insuffjcient (later) ATA Security feature set Originated in the pre-SED era • Thus, “encryption” is not even mentioned in the spec

  31. Both are user-settable, initial master password factory set MASTER PASSWORD CAPABILITY : High (0), Maximum (1) High : both User and Master password unlock drive Maximum : Only User unlocks drive, Master may erase Bottom line: Always change the Master password or set to Maximum In practice, even this is almost always insuffjcient (later) ATA Security feature set Originated in the pre-SED era • Thus, “encryption” is not even mentioned in the spec Two password types: User , Master •

  32. MASTER PASSWORD CAPABILITY : High (0), Maximum (1) High : both User and Master password unlock drive Maximum : Only User unlocks drive, Master may erase Bottom line: Always change the Master password or set to Maximum In practice, even this is almost always insuffjcient (later) ATA Security feature set Originated in the pre-SED era • Thus, “encryption” is not even mentioned in the spec Two password types: User , Master • Both are user-settable, initial master password factory set •

  33. High : both User and Master password unlock drive Maximum : Only User unlocks drive, Master may erase Bottom line: Always change the Master password or set to Maximum In practice, even this is almost always insuffjcient (later) ATA Security feature set Originated in the pre-SED era • Thus, “encryption” is not even mentioned in the spec Two password types: User , Master • Both are user-settable, initial master password factory set • MASTER PASSWORD CAPABILITY : High (0), Maximum (1) •

  34. Maximum : Only User unlocks drive, Master may erase Bottom line: Always change the Master password or set to Maximum In practice, even this is almost always insuffjcient (later) ATA Security feature set Originated in the pre-SED era • Thus, “encryption” is not even mentioned in the spec Two password types: User , Master • Both are user-settable, initial master password factory set • MASTER PASSWORD CAPABILITY : High (0), Maximum (1) • · High : both User and Master password unlock drive

  35. Bottom line: Always change the Master password or set to Maximum In practice, even this is almost always insuffjcient (later) ATA Security feature set Originated in the pre-SED era • Thus, “encryption” is not even mentioned in the spec Two password types: User , Master • Both are user-settable, initial master password factory set • MASTER PASSWORD CAPABILITY : High (0), Maximum (1) • · High : both User and Master password unlock drive · Maximum : Only User unlocks drive, Master may erase

  36. In practice, even this is almost always insuffjcient (later) ATA Security feature set Originated in the pre-SED era • Thus, “encryption” is not even mentioned in the spec Two password types: User , Master • Both are user-settable, initial master password factory set • MASTER PASSWORD CAPABILITY : High (0), Maximum (1) • · High : both User and Master password unlock drive · Maximum : Only User unlocks drive, Master may erase Bottom line: Always change the Master password or set to Maximum •

  37. ATA Security feature set Originated in the pre-SED era • Thus, “encryption” is not even mentioned in the spec Two password types: User , Master • Both are user-settable, initial master password factory set • MASTER PASSWORD CAPABILITY : High (0), Maximum (1) • · High : both User and Master password unlock drive · Maximum : Only User unlocks drive, Master may erase Bottom line: Always change the Master password or set to Maximum • In practice, even this is almost always insuffjcient (later)

  38. Keyed hash Key Decrypt Shared key Decrypt DEK ATA security feature set Stored data Master password: Salt # 1 Salt # 2 Hash output KEK User password: Salt # 1 Salt # 2 Hash output KEK KEK User-supplied User password Keyed hash Compare Hash result Match/no match

  39. ATA security feature set Stored data Master password: Salt # 1 Salt # 2 Hash output KEK User password: Salt # 1 Salt # 2 Hash output KEK KEK User-supplied User password Keyed hash Compare Hash result Match/no match Key Decrypt Decrypt Keyed hash Shared key DEK

  40. Standards for Self-Encrypting Drives Two widely used standards exist (i) ATA Security Feature Set Originally designed for access control only (ii) TCG Opal Modern standard designed specifjcally for SEDs https://medium.com/@andrewpgsweeny/ beyond-the-red-pill-and-the-blue-pill-9ef953d6e133

  41. Multiple partitions ( locking ranges ) Multiple passwords ( credentials ) Single credential can unlock multiple ranges Single range can be unlocked by multiple credentials i.e. many-to-many “Scramble” (i.e. re-generate key) range independently of others Fully trusted by BitLocker Drive space Range 1 Range 2 Range 3 Range 4 Passwords Password 1 Password 2 Password 3 TCG Opal De facto standard for hardware full-disk encryption •

  42. Multiple passwords ( credentials ) Single credential can unlock multiple ranges Single range can be unlocked by multiple credentials i.e. many-to-many “Scramble” (i.e. re-generate key) range independently of others Fully trusted by BitLocker Drive space Range 1 Range 2 Range 3 Range 4 Passwords Password 1 Password 2 Password 3 TCG Opal De facto standard for hardware full-disk encryption • Multiple partitions ( locking ranges ) •

  43. Single credential can unlock multiple ranges Single range can be unlocked by multiple credentials i.e. many-to-many “Scramble” (i.e. re-generate key) range independently of others Fully trusted by BitLocker Drive space Range 1 Range 2 Range 3 Range 4 Passwords Password 1 Password 2 Password 3 TCG Opal De facto standard for hardware full-disk encryption • Multiple partitions ( locking ranges ) • Multiple passwords ( credentials ) •

  44. Single range can be unlocked by multiple credentials i.e. many-to-many “Scramble” (i.e. re-generate key) range independently of others Fully trusted by BitLocker Drive space Range 1 Range 2 Range 3 Range 4 Passwords Password 1 Password 2 Password 3 TCG Opal De facto standard for hardware full-disk encryption • Multiple partitions ( locking ranges ) • Multiple passwords ( credentials ) • Single credential can unlock multiple ranges •

  45. i.e. many-to-many “Scramble” (i.e. re-generate key) range independently of others Fully trusted by BitLocker Drive space Range 1 Range 2 Range 3 Range 4 Passwords Password 1 Password 2 Password 3 TCG Opal De facto standard for hardware full-disk encryption • Multiple partitions ( locking ranges ) • Multiple passwords ( credentials ) • Single credential can unlock multiple ranges • Single range can be unlocked by multiple credentials •

  46. “Scramble” (i.e. re-generate key) range independently of others Fully trusted by BitLocker TCG Opal De facto standard for hardware full-disk encryption • Multiple partitions ( locking ranges ) • Multiple passwords ( credentials ) • Single credential can unlock multiple ranges • Single range can be unlocked by multiple credentials • i.e. many-to-many • Drive space Range 1 Range 2 Range 3 Range 4 � ✗ � ✗ ✗ � ✗ � � ✗ � � Passwords Password 1 Password 2 Password 3

  47. Fully trusted by BitLocker TCG Opal De facto standard for hardware full-disk encryption • Multiple partitions ( locking ranges ) • Multiple passwords ( credentials ) • Single credential can unlock multiple ranges • Single range can be unlocked by multiple credentials • i.e. many-to-many • “Scramble” (i.e. re-generate key) range independently of others • Drive space Range 1 Range 2 Range 3 Range 4 � ✗ � ✗ ✗ � ✗ � � ✗ � � Passwords Password 1 Password 2 Password 3

  48. TCG Opal De facto standard for hardware full-disk encryption • Multiple partitions ( locking ranges ) • Multiple passwords ( credentials ) • Single credential can unlock multiple ranges • Single range can be unlocked by multiple credentials • i.e. many-to-many • “Scramble” (i.e. re-generate key) range independently of others • Fully trusted by BitLocker • Drive space Range 1 Range 2 Range 3 Range 4 � ✗ � ✗ ✗ � ✗ � � ✗ � � Passwords Password 1 Password 2 Password 3

  49. Pitfalls

  50. Password unlocks drive and DEK is used to encrypt data How they are related is unknown They might not be related at all Pitfall 1: DEK not derived from password { data } DEK Password NAND Flash Host PC Black box

  51. How they are related is unknown They might not be related at all Pitfall 1: DEK not derived from password { data } DEK Password NAND Flash Host PC Black box Password unlocks drive and DEK is used to encrypt data •

  52. They might not be related at all Pitfall 1: DEK not derived from password { data } DEK Password NAND Flash Host PC Black box Password unlocks drive and DEK is used to encrypt data • How they are related is unknown •

  53. Pitfall 1: DEK not derived from password { data } DEK Password NAND Flash Host PC Black box Password unlocks drive and DEK is used to encrypt data • How they are related is unknown • They might not be related at all •

  54. Weakest password will grant access to all ranges Even to ranges for which no permission is granted No cryptographic enforcement, but if-statements BitLocker leaves an Opal range unprotected (partition table) Thus, in this case, DEK is recoverable without a password Pitfall 2: Single DEK for entire drive Strong Password 1 Decrypt Decrypt DEK Weak Password 3 Encrypted DEK 1 Encrypted DEK 3 Strong Password 2 Decrypt Encrypted DEK 2

  55. No cryptographic enforcement, but if-statements BitLocker leaves an Opal range unprotected (partition table) Thus, in this case, DEK is recoverable without a password Pitfall 2: Single DEK for entire drive Strong Password 1 Decrypt Decrypt DEK Weak Password 3 Encrypted DEK 1 Encrypted DEK 3 Strong Password 2 Decrypt Encrypted DEK 2 Weakest password will grant access to all ranges • Even to ranges for which no permission is granted

  56. BitLocker leaves an Opal range unprotected (partition table) Thus, in this case, DEK is recoverable without a password Pitfall 2: Single DEK for entire drive Strong Password 1 Decrypt Decrypt DEK Weak Password 3 Encrypted DEK 1 Encrypted DEK 3 Strong Password 2 Decrypt Encrypted DEK 2 Weakest password will grant access to all ranges • Even to ranges for which no permission is granted No cryptographic enforcement, but if-statements •

  57. Thus, in this case, DEK is recoverable without a password Pitfall 2: Single DEK for entire drive Strong Password 1 Decrypt Decrypt DEK Weak Password 3 Encrypted DEK 1 Encrypted DEK 3 Strong Password 2 Decrypt Encrypted DEK 2 Weakest password will grant access to all ranges • Even to ranges for which no permission is granted No cryptographic enforcement, but if-statements • BitLocker leaves an Opal range unprotected (partition table) •

  58. Pitfall 2: Single DEK for entire drive Strong Password 1 Decrypt Decrypt DEK Weak Password 3 Encrypted DEK 1 Encrypted DEK 3 Strong Password 2 Decrypt Encrypted DEK 2 Weakest password will grant access to all ranges • Even to ranges for which no permission is granted No cryptographic enforcement, but if-statements • BitLocker leaves an Opal range unprotected (partition table) • → Thus, in this case, DEK is recoverable without a password

  59. Recall: You should set the MASTER PASSWORD CAPABILITY to Max Ideally, this erases key material However, the standard allows resetting it to High , using only the user password In practice, key material remains stored. If unchanged, factory default master password allows data to be recovered Pitfall 3: ATA Master password re-enable Stored data Master password: Salt # 1 Salt # 2 Hash output KEK User password: Salt # 1 Salt # 2 Hash output KEK

  60. Ideally, this erases key material However, the standard allows resetting it to High , using only the user password In practice, key material remains stored. If unchanged, factory default master password allows data to be recovered Pitfall 3: ATA Master password re-enable Stored data Master password: Salt # 1 Salt # 2 Hash output KEK User password: Salt # 1 Salt # 2 Hash output KEK Recall: You should set the MASTER PASSWORD CAPABILITY to Max •

  61. However, the standard allows resetting it to High , using only the user password In practice, key material remains stored. If unchanged, factory default master password allows data to be recovered Pitfall 3: ATA Master password re-enable Stored data Master password: Salt # 1 Salt # 2 Hash output KEK User password: Salt # 1 Salt # 2 Hash output KEK Recall: You should set the MASTER PASSWORD CAPABILITY to Max • Ideally, this erases key material •

  62. In practice, key material remains stored. If unchanged, factory default master password allows data to be recovered Pitfall 3: ATA Master password re-enable Stored data Master password: Salt # 1 Salt # 2 Hash output KEK User password: Salt # 1 Salt # 2 Hash output KEK Recall: You should set the MASTER PASSWORD CAPABILITY to Max • Ideally, this erases key material • However, the standard allows resetting it to High , using only the user • password

  63. Pitfall 3: ATA Master password re-enable Stored data Master password: Salt # 1 Salt # 2 Hash output KEK User password: Salt # 1 Salt # 2 Hash output KEK Recall: You should set the MASTER PASSWORD CAPABILITY to Max • Ideally, this erases key material • However, the standard allows resetting it to High , using only the user • password In practice, key material remains stored. If unchanged, factory default • master password allows data to be recovered

  64. Plaintext DEK Plaintext DEK User sets password Encrypted DEK NAND before NAND after Set password overwrite of unprotected DEK with encrypted variant Unprotected DEK may still be present in physical fmash Pitfall 4: Wear Leveling Multiple writes to the same logical sector trigger writes to different physical sectors

  65. Set password overwrite of unprotected DEK with encrypted variant Unprotected DEK may still be present in physical fmash Pitfall 4: Wear Leveling Multiple writes to the same logical sector trigger writes to different physical sectors Plaintext DEK Plaintext DEK User sets password Encrypted DEK NAND before NAND after

  66. Unprotected DEK may still be present in physical fmash Pitfall 4: Wear Leveling Multiple writes to the same logical sector trigger writes to different physical sectors Plaintext DEK Plaintext DEK User sets password Encrypted DEK NAND before NAND after Set password → overwrite of unprotected DEK with encrypted variant •

  67. Pitfall 4: Wear Leveling Multiple writes to the same logical sector trigger writes to different physical sectors Plaintext DEK Plaintext DEK User sets password Encrypted DEK NAND before NAND after Set password → overwrite of unprotected DEK with encrypted variant • Unprotected DEK may still be present in physical fmash •

  68. Power-saving mode: DEVSLP Drive may dump its RAM incl. crypto keys to non-volatile memory, and shut off the RAM. General implementation issues Mode of operation (ECB, CBC, CTR, XTS) , Side channels, Key derivation, etc. Other pitfalls Random entropy generation •

  69. Drive may dump its RAM incl. crypto keys to non-volatile memory, and shut off the RAM. General implementation issues Mode of operation (ECB, CBC, CTR, XTS) , Side channels, Key derivation, etc. Other pitfalls Random entropy generation • Power-saving mode: DEVSLP •

  70. General implementation issues Mode of operation (ECB, CBC, CTR, XTS) , Side channels, Key derivation, etc. Other pitfalls Random entropy generation • Power-saving mode: DEVSLP • Drive may dump its RAM incl. crypto keys to non-volatile memory, and shut off the RAM.

  71. Mode of operation (ECB, CBC, CTR, XTS) , Side channels, Key derivation, etc. Other pitfalls Random entropy generation • Power-saving mode: DEVSLP • Drive may dump its RAM incl. crypto keys to non-volatile memory, and shut off the RAM. General implementation issues •

  72. Other pitfalls Random entropy generation • Power-saving mode: DEVSLP • Drive may dump its RAM incl. crypto keys to non-volatile memory, and shut off the RAM. General implementation issues • Mode of operation (ECB, CBC, CTR, XTS) , Side channels, Key derivation, etc.

  73. Methodology

  74. (i) Obtain a fjrmware image (ii) Gain low level control over the device (iii) Analyze the fjrmware Methodology General approach

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend