135 research outputs found

    Software similarity and classification

    Full text link
    This thesis analyses software programs in the context of their similarity to other software programs. Applications proposed and implemented include detecting malicious software and discovering security vulnerabilities

    A comparative study of medical and health terms with special reference to seSotho sa Leboa and Western teminology

    Get PDF
    This study focuses on the comparison of medical and health terms with special reference to Sesotho sa Leboa and Western languages. The study was conducted in the communities of Zebediela, Groblersdal and Marble Hall. From time immemorial, traditional medical and health terms were associated with certain types of diseases and health problems among Africans. With the introduction of Western civilisation, most of the medical and health terms which were used in the past by the Basotho ba Leboa, are no longer in use, as Western languages are regarded as prestige languages compared to the indigenous African languages. This perception led to a shortage of Sesotho sa Leboa documents that explain medical and health terms. The literature review revealed that traditional medicine is used for healing by many communities. Scholars further revealed that Western health terminology is more developed than traditional health terminology. The study uses the qualitative approach to explain concepts, and coding schemes were used to categorise medical and health terms. Ethnographic and historical theories were used to analyse data. The similarities and differences between the Sesotho sa Leboa terms and their Western counterparts were discussed and assessed. The study found that a relationship exists between diseases and the body parts in both Sesotho sa Leboa and Western terminology, and that the diseases were classified according to the affected body parts. The medical terms of both languages have similar and different semantic properties. Most of the differences were brought about by the cultural differences of the two communities. As the Sesotho sa Leboa medical terms are inimitable, the culture specific terms used in this study are discussed in Sesotho sa Leboa rather than in Western terminology. Conversely, as most of the recent outbreaks of diseases are named in Western terminology, they are translated into Sesotho sa Leboa.African LanguagesD. Litt. et Phil. (African Languages

    Exploiting loop transformations for the protection of software

    Get PDF
    Il software conserva la maggior parte del know-how che occorre per svilupparlo. Poich\ue9 oggigiorno il software pu\uf2 essere facilmente duplicato e ridistribuito ovunque, il rischio che la propriet\ue0 intellettuale venga violata su scala globale \ue8 elevato. Una delle pi\uf9 interessanti soluzioni a questo problema \ue8 dotare il software di un watermark. Ai watermark si richiede non solo di certificare in modo univoco il proprietario del software, ma anche di essere resistenti e pervasivi. In questa tesi riformuliamo i concetti di robustezza e pervasivit\ue0 a partire dalla semantica delle tracce. Evidenziamo i cicli quali costrutti di programmazione pervasivi e introduciamo le trasformazioni di ciclo come mattone di costruzione per schemi di watermarking pervasivo. Passiamo in rassegna alcune fra tali trasformazioni, studiando i loro principi di base. Infine, sfruttiamo tali principi per costruire una tecnica di watermarking pervasivo. La robustezza rimane una difficile, quanto affascinante, questione ancora da risolvere.Software retains most of the know-how required fot its development. Because nowadays software can be easily cloned and spread worldwide, the risk of intellectual property infringement on a global scale is high. One of the most viable solutions to this problem is to endow software with a watermark. Good watermarks are required not only to state unambiguously the owner of software, but also to be resilient and pervasive. In this thesis we base resiliency and pervasiveness on trace semantics. We point out loops as pervasive programming constructs and we introduce loop transformations as the basic block of pervasive watermarking schemes. We survey several loop transformations, outlining their underlying principles. Then we exploit these principles to build some pervasive watermarking techniques. Resiliency still remains a big and challenging open issue

    Volume 30, Number 2, June 2010 OLAC Newsletter

    Get PDF
    Digitized June 2010 issue of the OLAC Newsletter

    The Effect of Code Obfuscation on Authorship Attribution of Binary Computer Files

    Get PDF
    In many forensic investigations, questions linger regarding the identity of the authors of the software specimen. Research has identified methods for the attribution of binary files that have not been obfuscated, but a significant percentage of malicious software has been obfuscated in an effort to hide both the details of its origin and its true intent. Little research has been done around analyzing obfuscated code for attribution. In part, the reason for this gap in the research is that deobfuscation of an unknown program is a challenging task. Further, the additional transformation of the executable file introduced by the obfuscator modifies or removes features from the original executable that would have been used in the author attribution process. Existing research has demonstrated good success in attributing the authorship of an executable file of unknown provenance using methods based on static analysis of the specimen file. With the addition of file obfuscation, static analysis of files becomes difficult, time consuming, and in some cases, may lead to inaccurate findings. This paper presents a novel process for authorship attribution using dynamic analysis methods. A software emulated system was fully instrumented to become a test harness for a specimen of unknown provenance, allowing for supervised control, monitoring, and trace data collection during execution. This trace data was used as input into a supervised machine learning algorithm trained to identify stylometric differences in the specimen under test and provide predictions on who wrote the specimen. The specimen files were also analyzed for authorship using static analysis methods to compare prediction accuracies with prediction accuracies gathered from this new, dynamic analysis based method. Experiments indicate that this new method can provide better accuracy of author attribution for files of unknown provenance, especially in the case where the specimen file has been obfuscated

    Becoming known: Disclosure and exposure of (in)visible difference.

    Get PDF
    Bodily or physical differences constitute a class of potentially stigmatized characteristics. The existing literature confirms that those with appearance altering or disfiguring conditions (“visible differences”) may experience both felt and enacted stigma and seek to conceal their difference. Furthermore, issues relating to the disclosure or revelation of visible difference are frequently cited. The present study used qualitative methods to explore participants’ experiences of having disclosed otherwise unknown or hidden visible differences to others and considered these experiences within the context of existing theories of the disclosure of stigmatized characteristics. Semistructured interviews were conducted with 15 participants who had a variety of visible differences. The data were analyzed through inductive thematic analysis with the resultant themes indicating participants’ concerns and anxieties related to disclosing their differences, variable levels of agency within, preparation for, and control over the disclosure scenario, the importance of their difference being seen by others, and the personal and interpersonal changes that disclosure could facilitate. In consideration of participants’ experiences of the disclosure of visible difference and the applicability of existing models of disclosure to this scenario, a working framework that incorporates the specific issues relevant to the disclosure of visible differences is proposed. (PsycInfo Database Record (c) 2020 APA, all rights reserved

    Malware variant detection

    Get PDF
    Malware programs (e.g., viruses, worms, Trojans, etc.) are a worldwide epidemic. Studies and statistics show that the impact of malware is getting worse. Malware detectors are the primary tools in the defence against malware. Most commercial anti-malware scanners maintain a database of malware patterns and heuristic signatures for detecting malicious programs within a computer system. Malware writers use semantic-preserving code transformation (obfuscation) techniques to produce new stealth variants of their malware programs. Malware variants are hard to detect with today's detection technologies as these tools rely mostly on syntactic properties and ignore the semantics of malicious executable programs. A robust malware detection technique is required to handle this emerging security threat. In this thesis, we propose a new methodology that overcomes the drawback of existing malware detection methods by analysing the semantics of known malicious code. The methodology consists of three major analysis techniques: the development of a semantic signature, slicing analysis and test data generation analysis. The core element in this approach is to specify an approximation for malware code semantics and to produce signatures for identifying, possibly obfuscated but semantically equivalent, variants of a sample of malware. A semantic signature consists of a program test input and semantic traces of a known malware code. The key challenge in developing our semantics-based approach to malware variant detection is to achieve a balance between improving the detection rate (i.e. matching semantic traces) and performance, with or without the e ects of obfuscation on malware variants. We develop slicing analysis to improve the construction of semantic signatures. We back our trace-slicing method with a theoretical result that shows the notion of correctness of the slicer. A proof-of-concept implementation of our malware detector demonstrates that the semantics-based analysis approach could improve current detection tools and make the task more di cult for malware authors. Another important part of this thesis is exploring program semantics for the selection of a suitable part of the semantic signature, for which we provide two new theoretical results. In particular, this dissertation includes a test data generation method that works for binary executables and the notion of correctness of the method

    Beyond the Circle of Life

    Get PDF
    It seems certain to me that I will die and stay dead. By “I”, I mean me, Greg Nixon, this person, this self-identity. I am so intertwined with the chiasmus of lives, bodies, ecosystems, symbolic intersubjectivity, and life on this particular planet that I cannot imagine this identity continuing alone without them. However, one may survive one’s life by believing in universal awareness, perfection, and the peace that passes all understanding. Perhaps, we bring this back with us to the Source from which we began, changing it, enriching it. Once we have lived – if we don’t choose the eternal silence of oblivion by life denial, vanity, indifference, or simple weariness – the Source learns and we awaken within it. Awareness, consciousness, is universal – it comes with the territory – so maybe you will be one of the few prepared to become unexpectedly enlightened after the loss of body and self. You may discover your own apotheosis – something you always were, but after a lifetime of primate experience, now much more. Since you are of the Source and since you have changed from life experience and yet retained the dream of ultimate awakening, plus you have brought those chaotic emotions and memories back to the Source with you (though no longer yours), your life & memories will have mattered. Those who awaken beyond the death of self will have changed Reality

    The Anonymity Heuristic: How Surnames Stop Identifying People When They Become Trademarks

    Get PDF
    This Article explores the following question central to trademark law: if a homograph has both a surname and a trademark interpretation will consumers consider those interpretations as intrinsically overlapping or the surname and trademark as completely separate and unrelated words? While trademark jurisprudence typically has approached this question from a legal perspective or with assumptions about consumer behavior, this Article builds on the Law and Behavioral Science approach to legal scholarship by drawing from the fields of psychology, linguistics, economics, anthropology, sociology, and marketing. The Article concludes that consumers will regard the two interpretations as separate and unrelated, processing surname trademarks through an anonymity heuristic comprised of two elements. First, consumers understand that the trademark signals the unknown source of the goods or services bearing the trademark. Second, consumers do not equate the trademark with a particular individual bearing that name or believe that someone with that name offers the goods or services. Contrary to the traditional characterization of surname trademarks as merely descriptive marks, the research into human behavior suggests that they fit better in the category of arbitrary marks. Five key findings support the anonymity heuristic and the characterization of surname trademarks as arbitrary marks: (1) people process words to resolve ambiguity; (2) people process surnames differently than other words; (3) people process trademarks differently than other words; (4) consumers understand trademarks within a cultural framework; and (5) people process surnames and trademarks through separate nodes. Frequency and uniqueness will impact the anonymity heuristic in two ways. First, for infrequently purchased goods, consumers will develop a weaker trademark node and the surname node for the related homograph may compete with that the trademark node. Second, if a famous person or a personally known service provider with an uncommon surname uses that surname as a trademark, consumers may associate that trademark directly with that person, interrupting the anonymity heuristic. Based on the learnings from the multi-disciplinary literature, the Article recommends removing the statutory bar to trademark registration of terms deemed primarily merely surnames. Instead, a new own-name defense can supplement the existing prohibitions against deceptive trademarks to promote honest use of surnames as trademarks
    • …
    corecore