193 research outputs found

    A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

    Full text link
    We present a taxonomy and an algebra for attack patterns on component-based operating systems. In a multilevel security scenario, where isolation of partitions containing data at different security classifications is the primary security goal and security breaches are mainly defined as undesired disclosure or modification of classified data, strict control of information flows is the ultimate goal. In order to prevent undesired information flows, we provide a classification of information flow types in a component-based operating system and, by this, possible patterns to attack the system. The systematic consideration of informations flows reveals a specific type of operating system covert channel, the covert physical channel, which connects two former isolated partitions by emitting physical signals into the computer's environment and receiving them at another interface.Comment: 9 page

    Modal response-based technical countersurveillance measure against laser microphones

    Get PDF
    This paper proposes a semi-active mechanical blocking method against reflected light-intensity instrument based surreptitious signal gathering via vibrating window surfaces. The technical countersurveillance method is based on driving a piezoceramic transducer mounted on the window pane with a sinusoidal input coincident with the first resonant mode of the surface. The article evaluates the simulated surveillance data gathered experimentally on a simplified laboratory model when supplying the proposed blocking system with different types of disturbance signals. It has been found that, while the use of a high amplitude random signal does block surveillance attempts effectively, the resulting acoustic noise can be bothersome to the occupants of the protected room. However, the analysis presented here also suggests that the use of a sinusoidal signal with a frequency equal to the first resonant frequency of the windowpane disrupts surveillance signals – depending on the properties of the target – without generating significant acoustic by-products. Results are applicable only to reflected light-intensity systems, as the efficacy of the method cannot be confirmed without classified surveillance equipment with broader dynamic range

    User Experience Enhancement on Smartphones using Wireless Communication Technologies

    Get PDF
    학위논문 (박사) -- 서울대학교 대학원 : 공과대학 전기·정보공학부, 2020. 8. 박세웅.Recently, various sensors as well as wireless communication technologies such as Wi-Fi and Bluetooth Low Energy (BLE) have been equipped with smartphones. In addition, in many cases, users use a smartphone while on the move, so if a wireless communication technologies and various sensors are used for a mobile user, a better user experience can be provided. For example, when a user moves while using Wi-Fi, the user experience can be improved by providing a seamless Wi-Fi service. In addition, it is possible to provide a special service such as indoor positioning or navigation by estimating the users mobility in an indoor environment, and additional services such as location-based advertising and payment systems can also be provided. Therefore, improving the user experience by using wireless communication technology and smartphones sensors is considered to be an important research field in the future. In this dissertation, we propose three systems that can improve the user experience or convenience by usingWi-Fi, BLE, and smartphones sensors: (i) BLEND: BLE beacon-aided fast Wi-Fi handoff for smartphones, (ii) PYLON: Smartphone based Indoor Path Estimation and Localization without Human Intervention, (iii) FINISH: Fully-automated Indoor Navigation using Smartphones with Zero Human Assistance. First, we propose fast handoff scheme called BLEND exploiting BLE as secondary radio. We conduct detailed analysis of the sticky client problem on commercial smartphones with experiment and close examination of Android source code. We propose BLEND, which exploits BLE modules to provide smartphones with prior knowledge of the presence and information of APs operating at 2.4 and 5 GHz Wi-Fi channels. BLEND operating with only application requires no hardware and Android source code modification of smartphones.We prototype BLEND with commercial smartphones and evaluate the performance in real environment. Our measurement results demonstrate that BLEND significantly improves throughput and video bitrate by up to 61% and 111%, compared to a commercial Android application, respectively, with negligible energy overhead. Second, we design a path estimation and localization system, termed PYLON, which is plug-and-play on Android smartphones. PYLON includes a novel landmark correction scheme that leverages real doors of indoor environments consisting of floor plan mapping, door passing time detection and correction. It operates without any user intervention. PYLON relaxes some requirements for localization systems. It does not require any modifications to hardware or software of smartphones, and the initial location of WiFi APs, BLE beacons, and users. We implement PYLON on five Android smartphones and evaluate it on two office buildings with the help of three participants to prove applicability and scalability. PYLON achieves very high floor plan mapping accuracy with a low localization error. Finally, We design a fully-automated navigation system, termed FINISH, which addresses the problems of existing previous indoor navigation systems. FINISH generates the radio map of an indoor building based on the localization system to determine the initial location of the user. FINISH relaxes some requirements for current indoor navigation systems. It does not require any human assistance to provide navigation instructions. In addition, it is plug-and-play on Android smartphones. We implement FINISH on five Android smartphones and evaluate it on five floors of an office building with the help of multiple users to prove applicability and scalability. FINISH determines the location of the user with extremely high accuracy with in one step. In summary, we propose systems that enhance the users convenience and experience by utilizing wireless infrastructures such as Wi-Fi and BLE and various smartphones sensors such as accelerometer, gyroscope, and barometer equipped in smartphones. Systems are implemented on commercial smartphones to verify the performance through experiments. As a result, systems show the excellent performance that can enhance the users experience.1 Introduction 1 1.1 Motivation 1 1.2 Overview of Existing Approaches 3 1.2.1 Wi-Fi handoff for smartphones 3 1.2.2 Indoor path estimation and localization 4 1.2.3 Indoor navigation 5 1.3 Main Contributions 7 1.3.1 BLEND: BLE Beacon-aided Fast Handoff for Smartphones 7 1.3.2 PYLON: Smartphone Based Indoor Path Estimation and Localization with Human Intervention 8 1.3.3 FINISH: Fully-automated Indoor Navigation using Smartphones with Zero Human Assistance 9 1.4 Organization of Dissertation 10 2 BLEND: BLE Beacon-Aided FastWi-Fi Handoff for Smartphones 11 2.1 Introduction 11 2.2 Related Work 14 2.2.1 Wi-Fi-based Handoff 14 2.2.2 WPAN-aided AP Discovery 15 2.3 Background 16 2.3.1 Handoff Procedure in IEEE 802.11 16 2.3.2 BSS Load Element in IEEE 802.11 16 2.3.3 Bluetooth Low Energy 17 2.4 Sticky Client Problem 17 2.4.1 Sticky Client Problem of Commercial Smartphone 17 2.4.2 Cause of Sticky Client Problem 20 2.5 BLEND: Proposed Scheme 21 2.5.1 Advantages and Necessities of BLE as Secondary Low-Power Radio 21 2.5.2 Overall Architecture 22 2.5.3 AP Operation 23 2.5.4 Smartphone Operation 24 2.5.5 Verification of aTH estimation 28 2.6 Performance Evaluation 30 2.6.1 Implementation and Measurement Setup 30 2.6.2 Saturated Traffic Scenario 31 2.6.3 Video Streaming Scenario 35 2.7 Summary 38 3 PYLON: Smartphone based Indoor Path Estimation and Localization without Human Intervention 41 3.1 Introduction 41 3.2 Background and Related Work 44 3.2.1 Infrastructure-Based Localization 44 3.2.2 Fingerprint-Based Localization 45 3.2.3 Model-Based Localization 45 3.2.4 Dead Reckoning 46 3.2.5 Landmark-Based Localization 47 3.2.6 Simultaneous Localization and Mapping (SLAM) 47 3.3 System Overview 48 3.3.1 Notable RSSI Signature 49 3.3.2 Smartphone Operation 50 3.3.3 Server Operation 51 3.4 Path Estimation 52 3.4.1 Step Detection 52 3.4.2 Step Length Estimation 54 3.4.3 Walking Direction 54 3.4.4 Location Update 55 3.5 Landmark Correction Part 1: Virtual Room Generation 56 3.5.1 RSSI Stacking Difference 56 3.5.2 Virtual Room Generation 57 3.5.3 Virtual Graph Generation 59 3.5.4 Physical Graph Generation 60 3.6 Landmark Correction Part 2: From Floor Plan Mapping to Path Correction 60 3.6.1 Candidate Graph Generation 60 3.6.2 Backbone Node Mapping 62 3.6.3 Dead-end Node Mapping 65 3.6.4 Final Candidate Graph Selection 66 3.6.5 Door Passing Time Detection 68 3.6.6 Path Correction 70 3.7 Particle Filter 71 3.8 Performance Evaluation 73 3.8.1 Implementation and Measurement Setup 73 3.8.2 Step Detection Accuracy 77 3.8.3 Floor Plan Mapping Accuracy 77 3.8.4 Door Passing Time 78 3.8.5 Walking Direction and Localization Performance 81 3.8.6 Impact of WiFi AP and BLE Beacon Number 84 3.8.7 Impact of Walking Distance and Speed 84 3.8.8 Performance on Different Areas 87 3.9 Summary 87 4 FINISH: Fully-automated Indoor Navigation using Smartphones with Zero Human Assistance 91 4.1 Introduction 91 4.2 Related Work 92 4.2.1 Localization-based Navigation System 92 4.2.2 Peer-to-peer Navigation System 93 4.3 System Overview 93 4.3.1 System Architecture 93 4.3.2 An Example for Navigation 95 4.4 Level Change Detection and Floor Decision 96 4.4.1 Level Change Detection 96 4.5 Real-time navigation 97 4.5.1 Initial Floor and Location Decision 97 4.5.2 Orientation Adjustment 98 4.5.3 Shortest Path Estimation 99 4.6 Performance Evaluation 99 4.6.1 Initial Location Accuracy 99 4.6.2 Real-Time Navigation Accuracy 100 4.7 Summary 101 5 Conclusion 102 5.1 Research Contributions 102 5.2 Future Work 103 Abstract (In Korean) 118 감사의 글Docto

    Investigation Of Ultrasound Targeted Microbubbles As A Therapeutic Gene Delivery System For Prostate Cancer

    Get PDF
    A major challenge for effective gene therapy is systemic delivery of viruses carrying therapeutic genes into affected tissue. The immunogenic nature of human adenoviruses (Ads) limits their use for intratumoral (IT) injection in gene therapy. Ads transfection is further hampered by the fluctuating presence of Coxsackie and Adenovirus Receptor (CAR) and integrins on the cells’ surface. To circumvent these limitations we developed a novel approach wherein Ads are encapsulated inside the shell of lyophilized, lipid-encapsulated, perfluorocarbon microbubbles (MBs)/ultrasound (US) contrast agents, which act as delivery vehicles for a sitespecific gene transfer system. We performed infection studies with Ad.GFP (Green Fluorescent Protein), Ad.mda-7 (melanoma differentiation associated gene 7) and CTV.mda-7 on human DU145 and mouse prostate cancer cells as well as observed enhanced GFP expression when Ad.GFP was delivered by MBs and US. Our results show that US breaks open the MB/Ads complexes by undergoing cavitation at the sonoporated site, which allows Ads to transfer their transgene only to the sonoporated region. Cavitation collapse of the MBs creates small shockwaves that increase cell permeability by forming temporary micropores on the cell surface bypassing the receptormediated dependence of Ads for transfection. Fetal bovine serum (FBS) containing complement did not allow the unprotected Ads to infect the cells; however, MBs complexed with Ad.GFP did infect DU145 and TRAMP-C2 cells in a FBS rich media. We studied MB assisted gene delivery of reporter (GFP) and therapeutic genes (p53, Rb, Rb2 (p130) and Mda-7/IL-24) into prostate cancer (PC) xenografted in immune-compromised athymic mice. The results demonstrated that MBs protect the host from unspecific viral immune response thus protecting the viral payload and allowing for intravenous (IV) injection rather than IT injection. Additionally, Ad gene transfer was enhanced at the targeted/sonoporated mice tumor xenografts. This research demonstrated mda-7’s efficacy in reducing primary (treated) and untreated tumors that simulated the presence of metastasis in athymic mice xenograft models bearing human PC cells. Bystander anti-tumor activity of mda-7, a secreted cytokine was noted for non-targeted tumors. Earlier in vitro studies on the combination of radiation and gene therapy (Ad.p53, Ad.Rb, and Ad.p130) demonstrated an increase in the percentage of cell death for DU145 cells. We also studied UTMD (ultrasound targeted microbubble destruction) gene therapy in combination with external beam radiation for radiation resistant PC. The results demonstrated an enhanced therapeutic benefit of tumor suppressor genes in radiation resistant PC. We also demonstrated an increase in the expression of tumor suppressor genes at the tumor site due to MBs and US. These findings highlight the potential therapeutic benefit of this novel image guided gene transfer technology alone or in combination with external beam radiation for prostate cancer patients with therapy resistant disease

    Applications across Co-located Devices

    Get PDF
    We live surrounded by many computing devices. However, their presence has yet to be fully explored to create a richer ubiquitous computing environment. There is an opportunity to take better advantage of those devices by combining them into a unified user experience. To realize this vision, we studied and explored the use of a framework, which provides the tools and abstractions needed to develop applications that distribute UI components across co-located devices. The framework comprises the following components: authentication and authorization services; a broker to sync information across multiple application instances; background services that gather the capabilities of the devices; and a library to integrate web applications with the broker, determine which components to show based on UI requirements and device capabilities, and that provides custom elements to manage the distribution of the UI components and the multiple application states. Collaboration between users is supported by sharing application states. An indoor positioning solution had to be developed in order to determine when devices are close to each other to trigger the automatic redistribution of UI components. The research questions that we set out to respond are presented along with the contributions that have been produced. Those contributions include a framework for crossdevice applications, an indoor positioning solution for pervasive indoor environments, prototypes, end-user studies and developer focused evaluation. To contextualize our research, we studied previous research work about cross-device applications, proxemic interactions and indoor positioning systems. We presented four application prototypes. The first three were used to perform studies to evaluate the user experience. The last one was used to study the developer experience provided by the framework. The results were largely positive with users showing preference towards using multiple devices under some circumstances. Developers were also able to grasp the concepts provided by the framework relatively well.Vivemos rodeados de dispositivos computacionais. No entanto, ainda não tiramos partido da sua presença para criar ambientes de computação ubíqua mais ricos. Existe uma oportunidade de combiná-los para criar uma experiência de utilizador unificada. Para realizar esta visão, estudámos e explorámos a utilização de uma framework que forneça ferramentas e abstrações que permitam o desenvolvimento de aplicações que distribuem os componentes da interface do utilizador por dispositivos co-localizados. A framework é composta por: serviços de autenticação e autorização; broker que sincroniza informação entre várias instâncias da aplicação; serviços que reúnem as capacidades dos dispositivos; e uma biblioteca para integrar aplicações web com o broker, determinar as componentes a mostrar com base nos requisitos da interface e nas capacidades dos dispositivos, e que disponibiliza elementos para gerir a distribuição dos componentes da interface e dos estados de aplicação. A colaboração entre utilizadores é suportada através da partilha dos estados de aplicação. Foi necessário desenvolver um sistema de posicionamento em interiores para determinar quando é que os dispositivos estão perto uns dos outros para despoletar a redistribuição automática dos componentes da interface. As questões de investigação inicialmente colocadas são apresentadas juntamente com as contribuições que foram produzidas. Essas contribuições incluem uma framework para aplicações multi-dispositivo, uma solução de posicionamento em interiores para computação ubíqua, protótipos, estudos com utilizadores finais e avaliação com programadores. Para contextualizar a nossa investigação, estudámos trabalhos anteriores sobre aplicações multi-dispositivo, interação proxémica e sistemas de posicionamento em interiores. Apresentámos quatro aplicações protótipo. As primeiras três foram utilizadas para avaliar a experiência de utilização. A última foi utilizada para estudar a experiência de desenvolvimento com a framework. Os resultados foram geralmente positivos, com os utilizadores a preferirem utilizar múltiplos dispositivos em certas circunstâncias. Os programadores também foram capazes de compreender a framework relativamente bem

    East Lancashire Research 2008

    Get PDF
    East Lancashire Research 200

    Space shuttle low cost/risk avionics study

    Get PDF
    All work breakdown structure elements containing any avionics related effort were examined for pricing the life cycle costs. The analytical, testing, and integration efforts are included for the basic onboard avionics and electrical power systems. The design and procurement of special test equipment and maintenance and repair equipment are considered. Program management associated with these efforts is described. Flight test spares and labor and materials associated with the operations and maintenance of the avionics systems throughout the horizontal flight test are examined. It was determined that cost savings can be achieved by using existing hardware, maximizing orbiter-booster commonality, specifying new equipments to MIL quality standards, basing redundancy on cost effective analysis, minimizing software complexity and reducing cross strapping and computer-managed functions, utilizing compilers and floating point computers, and evolving the design as dictated by the horizontal flight test schedules

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms
    corecore