135 research outputs found
Software similarity and classification
This thesis analyses software programs in the context of their similarity to other software programs. Applications proposed and implemented include detecting malicious software and discovering security vulnerabilities
A comparative study of medical and health terms with special reference to seSotho sa Leboa and Western teminology
This study focuses on the comparison of medical and health terms with special reference to
Sesotho sa Leboa and Western languages. The study was conducted in the communities of
Zebediela, Groblersdal and Marble Hall. From time immemorial, traditional medical and health
terms were associated with certain types of diseases and health problems among Africans. With
the introduction of Western civilisation, most of the medical and health terms which were used
in the past by the Basotho ba Leboa, are no longer in use, as Western languages are regarded
as prestige languages compared to the indigenous African languages. This perception led to a
shortage of Sesotho sa Leboa documents that explain medical and health terms. The literature
review revealed that traditional medicine is used for healing by many communities. Scholars
further revealed that Western health terminology is more developed than traditional health
terminology. The study uses the qualitative approach to explain concepts, and coding schemes
were used to categorise medical and health terms. Ethnographic and historical theories were
used to analyse data. The similarities and differences between the Sesotho sa Leboa terms and
their Western counterparts were discussed and assessed. The study found that a relationship exists between diseases and the body parts in both Sesotho sa Leboa and Western terminology,
and that the diseases were classified according to the affected body parts. The medical terms
of both languages have similar and different semantic properties. Most of the differences were
brought about by the cultural differences of the two communities. As the Sesotho sa Leboa
medical terms are inimitable, the culture specific terms used in this study are discussed in
Sesotho sa Leboa rather than in Western terminology. Conversely, as most of the recent
outbreaks of diseases are named in Western terminology, they are translated into Sesotho sa
Leboa.African LanguagesD. Litt. et Phil. (African Languages
Exploiting loop transformations for the protection of software
Il software conserva la maggior parte del know-how che occorre per svilupparlo. Poich\ue9 oggigiorno il software pu\uf2 essere facilmente duplicato e ridistribuito ovunque, il rischio che la propriet\ue0 intellettuale venga violata su scala globale \ue8 elevato. Una delle pi\uf9 interessanti soluzioni a questo problema \ue8 dotare il software di un watermark. Ai watermark si richiede non solo di certificare in modo univoco il proprietario del software, ma anche di essere resistenti e pervasivi. In questa tesi riformuliamo i concetti di robustezza e pervasivit\ue0 a partire dalla semantica delle tracce. Evidenziamo i cicli quali costrutti di programmazione pervasivi e introduciamo le trasformazioni di ciclo come mattone di costruzione per schemi di watermarking pervasivo. Passiamo in rassegna alcune fra tali trasformazioni, studiando i loro principi di base. Infine, sfruttiamo tali principi per costruire una tecnica di watermarking pervasivo. La robustezza rimane una difficile, quanto affascinante, questione ancora da risolvere.Software retains most of the know-how required fot its development. Because nowadays software can be easily cloned and spread worldwide, the risk of intellectual property infringement on a global scale is high. One of the most viable solutions to this problem is to endow software with a watermark. Good watermarks are required not only to state unambiguously the owner of software, but also to be resilient and pervasive. In this thesis we base resiliency and pervasiveness on trace semantics. We point out loops as pervasive programming constructs and we introduce loop transformations as the basic block of pervasive watermarking schemes. We survey several loop transformations, outlining their underlying principles. Then we exploit these principles to build some pervasive watermarking techniques. Resiliency still remains a big and challenging open issue
Volume 30, Number 2, June 2010 OLAC Newsletter
Digitized June 2010 issue of the OLAC Newsletter
The Effect of Code Obfuscation on Authorship Attribution of Binary Computer Files
In many forensic investigations, questions linger regarding the identity of the authors of the software specimen. Research has identified methods for the attribution of binary files that have not been obfuscated, but a significant percentage of malicious software has been obfuscated in an effort to hide both the details of its origin and its true intent. Little research has been done around analyzing obfuscated code for attribution. In part, the reason for this gap in the research is that deobfuscation of an unknown program is a challenging task. Further, the additional transformation of the executable file introduced by the obfuscator modifies or removes features from the original executable that would have been used in the author attribution process. Existing research has demonstrated good success in attributing the authorship of an executable file of unknown provenance using methods based on static analysis of the specimen file. With the addition of file obfuscation, static analysis of files becomes difficult, time consuming, and in some cases, may lead to inaccurate findings. This paper presents a novel process for authorship attribution using dynamic analysis methods. A software emulated system was fully instrumented to become a test harness for a specimen of unknown provenance, allowing for supervised control, monitoring, and trace data collection during execution. This trace data was used as input into a supervised machine learning algorithm trained to identify stylometric differences in the specimen under test and provide predictions on who wrote the specimen. The specimen files were also analyzed for authorship using static analysis methods to compare prediction accuracies with prediction accuracies gathered from this new, dynamic analysis based method. Experiments indicate that this new method can provide better accuracy of author attribution for files of unknown provenance, especially in the case where the specimen file has been obfuscated
Becoming known: Disclosure and exposure of (in)visible difference.
Bodily or physical differences constitute a class of potentially stigmatized characteristics. The existing literature confirms that those with appearance altering or disfiguring conditions (“visible differences”) may experience both felt and enacted stigma and seek to conceal their difference. Furthermore, issues relating to the disclosure or revelation of visible difference are frequently cited. The present study used qualitative methods to explore participants’ experiences of having disclosed otherwise unknown or hidden visible differences to others and considered these experiences within the context of existing theories of the disclosure of stigmatized characteristics. Semistructured interviews were conducted with 15 participants who had a variety of visible differences. The data were analyzed through inductive thematic analysis with the resultant themes indicating participants’ concerns and anxieties related to disclosing their differences, variable levels of agency within, preparation for, and control over the disclosure scenario, the importance of their difference being seen by others, and the personal and interpersonal changes that disclosure could facilitate. In consideration of participants’ experiences of the disclosure of visible difference and the applicability of existing models of disclosure to this scenario, a working framework that incorporates the specific issues relevant to the disclosure of visible differences is proposed. (PsycInfo Database Record (c) 2020 APA, all rights reserved
Malware variant detection
Malware programs (e.g., viruses, worms, Trojans, etc.) are a worldwide epidemic. Studies and statistics show that the impact of malware is getting worse. Malware detectors are the primary tools in the defence against malware. Most commercial anti-malware scanners maintain a database of malware patterns and heuristic signatures for detecting malicious programs within a computer system. Malware writers use semantic-preserving code transformation (obfuscation) techniques to produce new stealth variants of their malware programs. Malware variants are hard to detect with today's detection technologies as these tools rely mostly on syntactic properties and ignore the semantics of malicious executable programs. A robust malware detection technique is required to handle this emerging security threat. In this thesis, we propose a new methodology that overcomes the drawback of existing malware detection methods by analysing the semantics of known malicious code. The methodology consists of three major analysis techniques: the development of a semantic signature, slicing analysis and test data generation analysis. The core element in this approach is to specify an approximation for malware code semantics and to produce signatures for identifying, possibly obfuscated but semantically equivalent, variants of a sample of malware. A semantic signature consists of a program test input and semantic traces of a known malware code. The key challenge in developing our semantics-based approach to malware variant detection is to achieve a balance between improving the detection rate (i.e. matching semantic traces) and performance, with or without the e ects of obfuscation on malware variants. We develop slicing analysis to improve the construction of semantic signatures. We back our trace-slicing method with a theoretical result that shows the notion of correctness of the slicer. A proof-of-concept implementation of our malware detector demonstrates that the semantics-based analysis approach could improve current detection tools and make the task more di cult for malware authors. Another important part of this thesis is exploring program semantics for the selection of a suitable part of the semantic signature, for which we provide two new theoretical results. In particular, this dissertation includes a test data generation method that works for binary executables and the notion of correctness of the method
Beyond the Circle of Life
It seems certain to me that I will die and stay dead. By “I”, I mean me, Greg Nixon, this person, this self-identity. I am so intertwined with the chiasmus of lives, bodies, ecosystems, symbolic intersubjectivity, and life on this particular planet that I cannot imagine this identity continuing alone without them. However, one may survive one’s life by believing in universal awareness, perfection, and the peace that passes all understanding. Perhaps, we bring this back with us to the Source from which we began, changing it, enriching it. Once we have lived – if we don’t choose the eternal silence of oblivion by life denial, vanity, indifference, or simple weariness – the Source learns and we awaken within it. Awareness, consciousness, is universal – it comes with the territory – so maybe you will be one of the few prepared to become unexpectedly enlightened after the loss of body and self. You may discover your own apotheosis – something you always were, but after a lifetime of primate experience, now much more. Since you are of the Source and since you have changed from life experience and yet retained the dream of ultimate awakening, plus you have brought those chaotic emotions and memories back to the Source with you (though no longer yours), your life & memories will have mattered. Those who awaken beyond the death of self will have changed Reality
The Anonymity Heuristic: How Surnames Stop Identifying People When They Become Trademarks
This Article explores the following question central to trademark law: if a homograph has both a surname and a trademark interpretation will consumers consider those interpretations as intrinsically overlapping or the surname and trademark as completely separate and unrelated words? While trademark jurisprudence typically has approached this question from a legal perspective or with assumptions about consumer behavior, this Article builds on the Law and Behavioral Science approach to legal scholarship by drawing from the fields of psychology, linguistics, economics, anthropology, sociology, and marketing.
The Article concludes that consumers will regard the two interpretations as separate and unrelated, processing surname trademarks through an anonymity heuristic comprised of two elements. First, consumers understand that the trademark signals the unknown source of the goods or services bearing the trademark. Second, consumers do not equate the trademark with a particular individual bearing that name or believe that someone with that name offers the goods or services. Contrary to the traditional characterization of surname trademarks as merely descriptive marks, the research into human behavior suggests that they fit better in the category of arbitrary marks.
Five key findings support the anonymity heuristic and the characterization of surname trademarks as arbitrary marks: (1) people process words to resolve ambiguity; (2) people process surnames differently than other words; (3) people process trademarks differently than other words; (4) consumers understand trademarks within a cultural framework; and (5) people process surnames and trademarks through separate nodes.
Frequency and uniqueness will impact the anonymity heuristic in two ways. First, for infrequently purchased goods, consumers will develop a weaker trademark node and the surname node for the related homograph may compete with that the trademark node. Second, if a famous person or a personally known service provider with an uncommon surname uses that surname as a trademark, consumers may associate that trademark directly with that person, interrupting the anonymity heuristic.
Based on the learnings from the multi-disciplinary literature, the Article recommends removing the statutory bar to trademark registration of terms deemed primarily merely surnames. Instead, a new own-name defense can supplement the existing prohibitions against deceptive trademarks to promote honest use of surnames as trademarks
- …