6,267 research outputs found

    A Methodology for Information Flow Experiments

    Full text link
    Information flow analysis has largely ignored the setting where the analyst has neither control over nor a complete model of the analyzed system. We formalize such limited information flow analyses and study an instance of it: detecting the usage of data by websites. We prove that these problems are ones of causal inference. Leveraging this connection, we push beyond traditional information flow analysis to provide a systematic methodology based on experimental science and statistical analysis. Our methodology allows us to systematize prior works in the area viewing them as instances of a general approach. Our systematic study leads to practical advice for improving work on detecting data usage, a previously unformalized area. We illustrate these concepts with a series of experiments collecting data on the use of information by websites, which we statistically analyze

    Feedback Control of Human Stress with Music Modulation

    Get PDF
    Mental stress has known detrimental effects on human health, however few algorithmic methods of reducing mental stress have been widely explored. While the act of listening to music has been shown to have beneficial effects for stress reduction, and furthermore, audio players have been designed to selectively choose music and other inputs with the intent of stress reduction, limited work has been conducted for real-time stress reduction with feedback control using physiological input signals such as heart rate or Heart Rate Variability (HRV). This thesis proposes a feedback controller that uses HRV signals from wearable sensors to perform real-time (< 1 second) modulations to music through tempo changes with the goal to regulate and reduce stress levels. A standardized, stress inducing test based on the popular Stroop test is also introduced, which has been shown to induce acute stress in subjects and can be used as a testing benchmark for controller design. Ultimately, a controller is presented that when used is not only able to maintain stress levels during stress-inducing inputs to a human but even provides de-stressing effects beyond baseline performance.No embargoAcademic Major: Electrical and Computer Engineerin

    CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions

    Get PDF
    By regularly querying Web search engines, users (unconsciously) disclose large amounts of their personal data as part of their search queries, among which some might reveal sensitive information (e.g. health issues, sexual, political or religious preferences). Several solutions exist to allow users querying search engines while improving privacy protection. However, these solutions suffer from a number of limitations: some are subject to user re-identification attacks, while others lack scalability or are unable to provide accurate results. This paper presents CYCLOSA, a secure, scalable and accurate private Web search solution. CYCLOSA improves security by relying on trusted execution environments (TEEs) as provided by Intel SGX. Further, CYCLOSA proposes a novel adaptive privacy protection solution that reduces the risk of user re- identification. CYCLOSA sends fake queries to the search engine and dynamically adapts their count according to the sensitivity of the user query. In addition, CYCLOSA meets scalability as it is fully decentralized, spreading the load for distributing fake queries among other nodes. Finally, CYCLOSA achieves accuracy of Web search as it handles the real query and the fake queries separately, in contrast to other existing solutions that mix fake and real query results

    Reducing Attack Surface of a Web Application by Open Web Application Security Project Compliance

    Get PDF
    The attack surface of a system is the amount of application area that is exposed to the adversaries. The overall vulnerability can be reduced by reducing the attack surface of a web application. In this paper, we have considered the web components of two versions of an in-house developed project management web application and the attack surface has been calculated prior and post open web application security project (OWASP) compliance based on a security audit to determine and then compare the security of this Project Management Application. OWASP is an open community to provide free tools and guidelines for application security. It was observed that the attack surface of the software reduced by 45 per cent once it was made OWASP compliant. The vulnerable surface exposed by the code even after OWASP compliance was due to the mandatory access points left in the software to ensure accessibility over a network.Defence Science Journal, 2012, 62(5), pp.324-330, DOI:http://dx.doi.org/10.14429/dsj.62.129
    • …
    corecore