12,374 research outputs found

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    Cost-effective non-destructive testing of biomedical components fabricated using additive manufacturing

    Get PDF
    Biocompatible titanium-alloys can be used to fabricate patient-specific medical components using additive manufacturing (AM). These novel components have the potential to improve clinical outcomes in various medical scenarios. However, AM introduces stability and repeatability concerns, which are potential roadblocks for its widespread use in the medical sector. Micro-CT imaging for non-destructive testing (NDT) is an effective solution for post-manufacturing quality control of these components. Unfortunately, current micro-CT NDT scanners require expensive infrastructure and hardware, which translates into prohibitively expensive routine NDT. Furthermore, the limited dynamic-range of these scanners can cause severe image artifacts that may compromise the diagnostic value of the non-destructive test. Finally, the cone-beam geometry of these scanners makes them susceptible to the adverse effects of scattered radiation, which is another source of artifacts in micro-CT imaging. In this work, we describe the design, fabrication, and implementation of a dedicated, cost-effective micro-CT scanner for NDT of AM-fabricated biomedical components. Our scanner reduces the limitations of costly image-based NDT by optimizing the scanner\u27s geometry and the image acquisition hardware (i.e., X-ray source and detector). Additionally, we describe two novel techniques to reduce image artifacts caused by photon-starvation and scatter radiation in cone-beam micro-CT imaging. Our cost-effective scanner was designed to match the image requirements of medium-size titanium-alloy medical components. We optimized the image acquisition hardware by using an 80 kVp low-cost portable X-ray unit and developing a low-cost lens-coupled X-ray detector. Image artifacts caused by photon-starvation were reduced by implementing dual-exposure high-dynamic-range radiography. For scatter mitigation, we describe the design, manufacturing, and testing of a large-area, highly-focused, two-dimensional, anti-scatter grid. Our results demonstrate that cost-effective NDT using low-cost equipment is feasible for medium-sized, titanium-alloy, AM-fabricated medical components. Our proposed high-dynamic-range strategy improved by 37% the penetration capabilities of an 80 kVp micro-CT imaging system for a total x-ray path length of 19.8 mm. Finally, our novel anti-scatter grid provided a 65% improvement in CT number accuracy and a 48% improvement in low-contrast visualization. Our proposed cost-effective scanner and artifact reduction strategies have the potential to improve patient care by accelerating the widespread use of patient-specific, bio-compatible, AM-manufactured, medical components

    Annals [...].

    Get PDF
    Pedometrics: innovation in tropics; Legacy data: how turn it useful?; Advances in soil sensing; Pedometric guidelines to systematic soil surveys.Evento online. Coordenado por: Waldir de Carvalho Junior, Helena Saraiva Koenow Pinheiro, Ricardo SimĂŁo Diniz Dalmolin

    From wallet to mobile: exploring how mobile payments create customer value in the service experience

    Get PDF
    This study explores how mobile proximity payments (MPP) (e.g., Apple Pay) create customer value in the service experience compared to traditional payment methods (e.g. cash and card). The main objectives were firstly to understand how customer value manifests as an outcome in the MPP service experience, and secondly to understand how the customer activities in the process of using MPP create customer value. To achieve these objectives a conceptual framework is built upon the Grönroos-Voima Value Model (Grönroos and Voima, 2013), and uses the Theory of Consumption Value (Sheth et al., 1991) to determine the customer value constructs for MPP, which is complimented with Script theory (Abelson, 1981) to determine the value creating activities the consumer does in the process of paying with MPP. The study uses a sequential exploratory mixed methods design, wherein the first qualitative stage uses two methods, self-observations (n=200) and semi-structured interviews (n=18). The subsequent second quantitative stage uses an online survey (n=441) and Structural Equation Modelling analysis to further examine the relationships and effect between the value creating activities and customer value constructs identified in stage one. The academic contributions include the development of a model of mobile payment services value creation in the service experience, introducing the concept of in-use barriers which occur after adoption and constrains the consumers existing use of MPP, and revealing the importance of the mobile in-hand momentary condition as an antecedent state. Additionally, the customer value perspective of this thesis demonstrates an alternative to the dominant Information Technology approaches to researching mobile payments and broadens the view of technology from purely an object a user interacts with to an object that is immersed in consumers’ daily life

    Physical phenomena controlling quiescent flame spread in porous wildland fuel beds

    Get PDF
    Despite well-developed solid surface flame spread theories, we still lack a coherent theory to describe flame spread through porous wildland fuel beds. This porosity results in additional complexity, reducing the thermal conductivity of the fuel bed, but allowing in-bed radiative and convective heat transfer to occur. While previous studies have explored the effect of fuel bed structure on the overall fire behaviour, there remains a need for further investigation of the effect of fuel structure on the underlying physical phenomena controlling flame spread. Through an extensive series of laboratory-based experiments, this thesis provides detailed, physics-based insights for quiescent flame spread through natural porous beds, across a range of structural conditions. Measurements are presented for fuel beds representative of natural field conditions within an area of the fire-prone New Jersey Pinelands National Reserve, which compliment a related series of field experiments conducted as part of a wider research project. Additional systematic investigation across a wider range of fuel conditions identified independent effects of fuel loading and bulk density on the spread rate, flame height and heat release rate. However, neither fuel loading nor bulk density alone provided adequate prediction of the resulting fire behaviour. Drawing on existing structural descriptors (for both natural and engineered fuel beds) an alternative parameter ασΎ was proposed. This parameter (incorporating the fuel bed porosity (α), fuel element surface-to-volume ratio (σ), and the fuel bed height (ÎŽ)) was strongly correlated with the spread rate. One effect of the fuel bed structure is to influence the heat transfer mechanisms both above and within the porous fuel bed. Existing descriptions of radiation transport through porous fuel beds are often predicated on the assumption of an isotropic fuel bed. However, given their preferential angle of inclination, the pine needle beds in this study may not exhibit isotropic behaviour. Regardless, for the structural conditions investigated, horizontal heat transfer through the fuel bed was identified as the dominant heating mechanism within this quiescent flame spread scenario. However, the significance of heat transfer contributions from the above-bed flame generally increased with increasing ασΎ value of the fuel bed. Using direct measurements of the heat flux magnitude and effective heating distance, close agreement was observed between experimentally observed spread rates and a simple thermal model considering only radiative heat transfer through the fuel bed, particularly at lower values of ασΎ. Over-predictions occurred at higher ασΎ values, or where other heat transfer terms were incorporated, which may highlight the need to include additional heat loss terms. A significant effect of fuel structure on the primary flow regimes, both within and above these porous fuel beds, was also observed, with important implications for the heat transfer and oxygen supply within the fuel bed. Independent effects of fuel loading and bulk density on both the buoyant and buoyancy-driven entrainment flow were observed, with a complex feedback cycle occurring between Heat Release Rate (HRR) and combustion behaviour. Generally, increases in fuel loading resulted in increased HRR, and therefore increased buoyant flow velocity, along with an increase in the velocity of flow entrained towards the combustion region. The complex effects of fuel structure in both the flaming and smouldering combustion phases may necessitate modifications to other common modelling approaches. The widely used Rothermel model under-predicted spread rate for higher bulk density and lower ασΎ fuel beds. As previously suggested, an over-sensitivity to fuel bed height was observed, with experimental comparison indicating an under-prediction of reaction intensity at lower fuel heights. These findings have important implications particularly given the continuing widespread use of the Rothermel model, which continues to underpin elements of the BehavePlus fire modelling system and the US National Fire Danger Rating System. The physical insights, and modelling approaches, developed for this low-intensity, quiescent flame spread scenario, are applicable to common prescribed fire activities. It is hoped that this work (alongside complimentary laboratory and field experiments conducted by various authors as part of a wider multi-agency project (SERDP-RC2641)) will contribute to the emerging field of prescribed fire science, and help to address the pressing need for further development of fire prediction and modelling tools

    Playing and Making History: How Game Design and Gameplay Afford Opportunities for a Critical Engagement with the Past

    Get PDF
    For decades there has been a call for educators to explore new possibilities for meeting educational goals defined broadly under a number of 'twenty-first century competencies' curricula (Dede, 2014; Voogt et al., 2013). These stress the need for students to combine critical skills development with an understanding of the processes and reach of technologies in daily life, in order to prepare them for a shifting cultural and economic landscape. In response, an extensive literature has grown up about game-based learning (Brown, 2008; de Castell, 2011; Gee, 2003; Gee and Hayes, 2011; Jenson, Taylor, de Castell, 2011; Jenson et al., 2016; Kafai, 1995; 2012; 2016; Prensky, 2001; Squire, 2004; 2011; Steinkuehler, 2006) that seeks to explore whether/how games can be used productively in education. History as a discipline lends itself particularly well to game-based learning. It is bound up in questions of interpretation, agency, and choice, considerations that gameplay and game design as processes highlight well. My research explores the uses of digital historical games in history education, and most especially in the acquisition of critical historical skills. These skills are defined as the capacity to view and engage with the constitutive parts of historical scholarship and objects: interpretation, argument, evidence, ideology, subject position, class, race, sex, etc. This thesis will present findings from two participant-based research studies that I organized and ran between 2018 and 2019. In the first, participants were tasked with playing a counterfactual historical game, Fallout 4, and talking about their experiences, as well as answering questions about history and historical understandings. The second study took the form of an interactive digital history course. In it, students, working in small groups, were tasked with creating their own historical games. Exploring both gameplay and game production answers the call issued by Kafai and Burke (2016) that researchers should view the potential for games in education holistically, rather than in either/or terms. Taken together, this thesis argues that playing and especially making historical games offers opportunities for learners to engage with epistemological concepts in history in meaningful ways that can advance their critical understanding of history as a subject

    How to Be a God

    Get PDF
    When it comes to questions concerning the nature of Reality, Philosophers and Theologians have the answers. Philosophers have the answers that can’t be proven right. Theologians have the answers that can’t be proven wrong. Today’s designers of Massively-Multiplayer Online Role-Playing Games create realities for a living. They can’t spend centuries mulling over the issues: they have to face them head-on. Their practical experiences can indicate which theoretical proposals actually work in practice. That’s today’s designers. Tomorrow’s will have a whole new set of questions to answer. The designers of virtual worlds are the literal gods of those realities. Suppose Artificial Intelligence comes through and allows us to create non-player characters as smart as us. What are our responsibilities as gods? How should we, as gods, conduct ourselves? How should we be gods

    Chinese Benteng Women’s Participation in Local Development Affairs in Indonesia: Appropriate means for struggle and a pathway to claim citizen’ right?

    Get PDF
    It had been more than two decades passing by aftermath the devastating Asia’s Financial Crisis in 1997, subsequently followed by Suharto’s step down from his presidential throne which he occupied for more than three decades. The financial turmoil turned to a political disaster furthermore has led to massive looting that severely impacted Indonesians of Chinese descendant, including unresolved mystery of the most atrocious sexual violation against women and covert killings of students and democracy activists in this country. Since then, precisely aftermath May 1998, which publicly known as “Reformasi”1, Indonesia underwent political reform that eventually corresponded positively to its macroeconomic growth. Twenty years later, in 2018, Indonesia captured worldwide attention because it has successfully hosted two internationally renowned events, namely the Asian Games 2018 – the most prestigious sport events in Asia – conducted in Jakarta and Palembang; and the IMF/World Bank Annual Meeting 2018 in Bali. Particularly in the IMF/World Bank Annual Meeting, this event has significantly elevated Indonesia’s credibility and international prestige in the global economic powerplay as one of the nations with promising growth and openness. However, the narrative about poverty and inequality, including increasing racial tension, religious conservatism, and sexual violation against women are superseded by friendly climate for foreign investment and eventually excessive glorification of the nation’s economic growth. By portraying the image of promising new economic power, as rhetorically promised by President Joko Widodo during his presidential terms, Indonesia has swept the growing inequality in this highly stratified society that historically compounded with religious and racial tension under the carpet of digital economy.Arte y Humanidade

    Hunting Wildlife in the Tropics and Subtropics

    Get PDF
    The hunting of wild animals for their meat has been a crucial activity in the evolution of humans. It continues to be an essential source of food and a generator of income for millions of Indigenous and rural communities worldwide. Conservationists rightly fear that excessive hunting of many animal species will cause their demise, as has already happened throughout the Anthropocene. Many species of large mammals and birds have been decimated or annihilated due to overhunting by humans. If such pressures continue, many other species will meet the same fate. Equally, if the use of wildlife resources is to continue by those who depend on it, sustainable practices must be implemented. These communities need to remain or become custodians of the wildlife resources within their lands, for their own well-being as well as for biodiversity in general. This title is also available via Open Access on Cambridge Core

    Graphical scaffolding for the learning of data wrangling APIs

    Get PDF
    In order for students across the sciences to avail themselves of modern data streams, they must first know how to wrangle data: how to reshape ill-organised, tabular data into another format, and how to do this programmatically, in languages such as Python and R. Despite the cross-departmental demand and the ubiquity of data wrangling in analytical workflows, the research on how to optimise the instruction of it has been minimal. Although data wrangling as a programming domain presents distinctive challenges - characterised by on-the-fly syntax lookup and code example integration - it also presents opportunities. One such opportunity is how tabular data structures are easily visualised. To leverage the inherent visualisability of data wrangling, this dissertation evaluates three types of graphics that could be employed as scaffolding for novices: subgoal graphics, thumbnail graphics, and parameter graphics. Using a specially built e-learning platform, this dissertation documents a multi-institutional, randomised, and controlled experiment that investigates the pedagogical effects of these. Our results indicate that the graphics are well-received, that subgoal graphics boost the completion rate, and that thumbnail graphics improve navigability within a command menu. We also obtained several non-significant results, and indications that parameter graphics are counter-productive. We will discuss these findings in the context of general scaffolding dilemmas, and how they fit into a wider research programme on data wrangling instruction
    • 

    corecore