193 research outputs found
A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems
We present a taxonomy and an algebra for attack patterns on component-based
operating systems. In a multilevel security scenario, where isolation of
partitions containing data at different security classifications is the primary
security goal and security breaches are mainly defined as undesired disclosure
or modification of classified data, strict control of information flows is the
ultimate goal. In order to prevent undesired information flows, we provide a
classification of information flow types in a component-based operating system
and, by this, possible patterns to attack the system. The systematic
consideration of informations flows reveals a specific type of operating system
covert channel, the covert physical channel, which connects two former isolated
partitions by emitting physical signals into the computer's environment and
receiving them at another interface.Comment: 9 page
Modal response-based technical countersurveillance measure against laser microphones
This paper proposes a semi-active mechanical blocking method against reflected light-intensity instrument based surreptitious signal gathering via vibrating window surfaces. The technical countersurveillance method is based on driving a piezoceramic transducer mounted on the window pane with a sinusoidal input coincident with the first resonant mode of the surface. The article evaluates the simulated surveillance data gathered experimentally on a simplified laboratory model when supplying the proposed blocking system with different types of disturbance signals. It has been found that, while the use of a high amplitude random signal does block surveillance attempts effectively, the resulting acoustic noise can be bothersome to the occupants of the protected room. However, the analysis presented here also suggests that the use of a sinusoidal signal with a frequency equal to the first resonant frequency of the windowpane disrupts surveillance signals – depending on the properties of the target – without generating significant acoustic by-products. Results are applicable only to reflected light-intensity systems, as the efficacy of the method cannot be confirmed without classified surveillance equipment with broader dynamic range
User Experience Enhancement on Smartphones using Wireless Communication Technologies
학위논문 (박사) -- 서울대학교 대학원 : 공과대학 전기·정보공학부, 2020. 8. 박세웅.Recently, various sensors as well as wireless communication technologies such as
Wi-Fi and Bluetooth Low Energy (BLE) have been equipped with smartphones. In
addition, in many cases, users use a smartphone while on the move, so if a wireless
communication technologies and various sensors are used for a mobile user, a better
user experience can be provided. For example, when a user moves while using Wi-Fi,
the user experience can be improved by providing a seamless Wi-Fi service. In addition,
it is possible to provide a special service such as indoor positioning or navigation
by estimating the users mobility in an indoor environment, and additional services
such as location-based advertising and payment systems can also be provided. Therefore,
improving the user experience by using wireless communication technology and
smartphones sensors is considered to be an important research field in the future.
In this dissertation, we propose three systems that can improve the user experience
or convenience by usingWi-Fi, BLE, and smartphones sensors: (i) BLEND: BLE
beacon-aided fast Wi-Fi handoff for smartphones, (ii) PYLON: Smartphone based Indoor
Path Estimation and Localization without Human Intervention, (iii) FINISH:
Fully-automated Indoor Navigation using Smartphones with Zero Human Assistance.
First, we propose fast handoff scheme called BLEND exploiting BLE as secondary
radio. We conduct detailed analysis of the sticky client problem on commercial smartphones
with experiment and close examination of Android source code. We propose
BLEND, which exploits BLE modules to provide smartphones with prior knowledge
of the presence and information of APs operating at 2.4 and 5 GHz Wi-Fi channels.
BLEND operating with only application requires no hardware and Android source code
modification of smartphones.We prototype BLEND with commercial smartphones and
evaluate the performance in real environment. Our measurement results demonstrate
that BLEND significantly improves throughput and video bitrate by up to 61% and
111%, compared to a commercial Android application, respectively, with negligible
energy overhead.
Second, we design a path estimation and localization system, termed PYLON,
which is plug-and-play on Android smartphones. PYLON includes a novel landmark
correction scheme that leverages real doors of indoor environments consisting of floor
plan mapping, door passing time detection and correction. It operates without any user
intervention. PYLON relaxes some requirements for localization systems. It does not
require any modifications to hardware or software of smartphones, and the initial location
of WiFi APs, BLE beacons, and users. We implement PYLON on five Android
smartphones and evaluate it on two office buildings with the help of three participants
to prove applicability and scalability. PYLON achieves very high floor plan mapping
accuracy with a low localization error.
Finally, We design a fully-automated navigation system, termed FINISH, which
addresses the problems of existing previous indoor navigation systems. FINISH generates
the radio map of an indoor building based on the localization system to determine
the initial location of the user. FINISH relaxes some requirements for current
indoor navigation systems. It does not require any human assistance to provide navigation
instructions. In addition, it is plug-and-play on Android smartphones. We implement
FINISH on five Android smartphones and evaluate it on five floors of an office
building with the help of multiple users to prove applicability and scalability. FINISH
determines the location of the user with extremely high accuracy with in one step.
In summary, we propose systems that enhance the users convenience and experience
by utilizing wireless infrastructures such as Wi-Fi and BLE and various smartphones
sensors such as accelerometer, gyroscope, and barometer equipped in smartphones.
Systems are implemented on commercial smartphones to verify the performance
through experiments. As a result, systems show the excellent performance that
can enhance the users experience.1 Introduction 1
1.1 Motivation 1
1.2 Overview of Existing Approaches 3
1.2.1 Wi-Fi handoff for smartphones 3
1.2.2 Indoor path estimation and localization 4
1.2.3 Indoor navigation 5
1.3 Main Contributions 7
1.3.1 BLEND: BLE Beacon-aided Fast Handoff for Smartphones 7
1.3.2 PYLON: Smartphone Based Indoor Path Estimation and Localization with Human Intervention 8
1.3.3 FINISH: Fully-automated Indoor Navigation using Smartphones with Zero Human Assistance 9
1.4 Organization of Dissertation 10
2 BLEND: BLE Beacon-Aided FastWi-Fi Handoff for Smartphones 11
2.1 Introduction 11
2.2 Related Work 14
2.2.1 Wi-Fi-based Handoff 14
2.2.2 WPAN-aided AP Discovery 15
2.3 Background 16
2.3.1 Handoff Procedure in IEEE 802.11 16
2.3.2 BSS Load Element in IEEE 802.11 16
2.3.3 Bluetooth Low Energy 17
2.4 Sticky Client Problem 17
2.4.1 Sticky Client Problem of Commercial Smartphone 17
2.4.2 Cause of Sticky Client Problem 20
2.5 BLEND: Proposed Scheme 21
2.5.1 Advantages and Necessities of BLE as Secondary Low-Power Radio 21
2.5.2 Overall Architecture 22
2.5.3 AP Operation 23
2.5.4 Smartphone Operation 24
2.5.5 Verification of aTH estimation 28
2.6 Performance Evaluation 30
2.6.1 Implementation and Measurement Setup 30
2.6.2 Saturated Traffic Scenario 31
2.6.3 Video Streaming Scenario 35
2.7 Summary 38
3 PYLON: Smartphone based Indoor Path Estimation and Localization without Human Intervention 41
3.1 Introduction 41
3.2 Background and Related Work 44
3.2.1 Infrastructure-Based Localization 44
3.2.2 Fingerprint-Based Localization 45
3.2.3 Model-Based Localization 45
3.2.4 Dead Reckoning 46
3.2.5 Landmark-Based Localization 47
3.2.6 Simultaneous Localization and Mapping (SLAM) 47
3.3 System Overview 48
3.3.1 Notable RSSI Signature 49
3.3.2 Smartphone Operation 50
3.3.3 Server Operation 51
3.4 Path Estimation 52
3.4.1 Step Detection 52
3.4.2 Step Length Estimation 54
3.4.3 Walking Direction 54
3.4.4 Location Update 55
3.5 Landmark Correction Part 1: Virtual Room Generation 56
3.5.1 RSSI Stacking Difference 56
3.5.2 Virtual Room Generation 57
3.5.3 Virtual Graph Generation 59
3.5.4 Physical Graph Generation 60
3.6 Landmark Correction Part 2: From Floor Plan Mapping to Path Correction 60
3.6.1 Candidate Graph Generation 60
3.6.2 Backbone Node Mapping 62
3.6.3 Dead-end Node Mapping 65
3.6.4 Final Candidate Graph Selection 66
3.6.5 Door Passing Time Detection 68
3.6.6 Path Correction 70
3.7 Particle Filter 71
3.8 Performance Evaluation 73
3.8.1 Implementation and Measurement Setup 73
3.8.2 Step Detection Accuracy 77
3.8.3 Floor Plan Mapping Accuracy 77
3.8.4 Door Passing Time 78
3.8.5 Walking Direction and Localization Performance 81
3.8.6 Impact of WiFi AP and BLE Beacon Number 84
3.8.7 Impact of Walking Distance and Speed 84
3.8.8 Performance on Different Areas 87
3.9 Summary 87
4 FINISH: Fully-automated Indoor Navigation using Smartphones with Zero Human Assistance 91
4.1 Introduction 91
4.2 Related Work 92
4.2.1 Localization-based Navigation System 92
4.2.2 Peer-to-peer Navigation System 93
4.3 System Overview 93
4.3.1 System Architecture 93
4.3.2 An Example for Navigation 95
4.4 Level Change Detection and Floor Decision 96
4.4.1 Level Change Detection 96
4.5 Real-time navigation 97
4.5.1 Initial Floor and Location Decision 97
4.5.2 Orientation Adjustment 98
4.5.3 Shortest Path Estimation 99
4.6 Performance Evaluation 99
4.6.1 Initial Location Accuracy 99
4.6.2 Real-Time Navigation Accuracy 100
4.7 Summary 101
5 Conclusion 102
5.1 Research Contributions 102
5.2 Future Work 103
Abstract (In Korean) 118
감사의 글Docto
Recommended from our members
A model personal energy meter
Every day each of us consumes a significant amount of energy, both directly through transport, heating and use of appliances, and indirectly from our needs for the production of food, manufacture of goods and provision of services. This dissertation investigates a personal energy meter which can record and apportion an individual's energy usage in order to supply baseline information and incentives for reducing our environmental impact.
If the energy costs of large shared resources are split evenly without regard for individual consumption each person minimises his own losses by taking advantage of others. Context awareness offers the potential to change this balance and apportion energy costs to those who cause them to be incurred. This dissertation explores how sensor systems installed in many buildings today can be used to apportion energy consumption between users, including an evaluation of a range of strategies in a case study and elaboration of the overriding principles that are generally applicable. It also shows how second-order estimators combined with location data can provide a proxy for fine-grained sensing.
A key ingredient for apportionment mechanisms is data on energy usage. This may come from metering devices or buildings directly, or from profiling devices and using secondary indicators to infer their power state. A mechanism for profiling devices to determine the energy costs of specific activities, particularly applicable to shared programmable devices is presented which can make this process simpler and more accurate. By combining crowdsourced building-inventory information and a simple building energy model it is possible to estimate an individual's energy use disaggregated by device class with very little direct
sensing.
Contextual information provides crucial cues for apportioning the use and energy costs of resources, and one of the most valuable sources from which to infer context is location. A key ingredient for a personal energy meter is a low cost, low infrastructure location system that can be deployed on a truly global scale. This dissertation presents a description and evaluation of the new concept of inquiry-free Bluetooth tracking that has the potential to offer indoor location information with significantly less infrastructure and calibration than other systems.
Finally, a suitable architecture for a personal energy meter on a global scale is demonstrated using a mobile phone application to aggregate energy feeds based on the case studies and technologies developed
Investigation Of Ultrasound Targeted Microbubbles As A Therapeutic Gene Delivery System For Prostate Cancer
A major challenge for effective gene therapy is systemic delivery of viruses carrying therapeutic genes into affected tissue. The immunogenic nature of human adenoviruses (Ads) limits their use for intratumoral (IT) injection in gene therapy. Ads transfection is further hampered by the fluctuating presence of Coxsackie and Adenovirus Receptor (CAR) and integrins on the cells’ surface. To circumvent these limitations we developed a novel approach wherein Ads are encapsulated inside the shell of lyophilized, lipid-encapsulated, perfluorocarbon microbubbles (MBs)/ultrasound (US) contrast agents, which act as delivery vehicles for a sitespecific gene transfer system.
We performed infection studies with Ad.GFP (Green Fluorescent Protein), Ad.mda-7 (melanoma differentiation associated gene 7) and CTV.mda-7 on human DU145 and mouse prostate cancer cells as well as observed enhanced GFP expression when Ad.GFP was delivered by MBs and US. Our results show that US breaks open the MB/Ads complexes by undergoing cavitation at the sonoporated site, which allows Ads to transfer their transgene only to the sonoporated region. Cavitation collapse of the MBs creates small shockwaves that increase cell permeability by forming temporary micropores on the cell surface bypassing the receptormediated dependence of Ads for transfection. Fetal bovine serum (FBS) containing complement did not allow the unprotected Ads to infect the cells; however, MBs complexed with Ad.GFP did infect DU145 and TRAMP-C2 cells in a FBS rich media.
We studied MB assisted gene delivery of reporter (GFP) and therapeutic genes (p53, Rb, Rb2 (p130) and Mda-7/IL-24) into prostate cancer (PC) xenografted in immune-compromised athymic mice. The results demonstrated that MBs protect the host from unspecific viral immune response thus protecting the viral payload and allowing for intravenous (IV) injection rather than IT injection. Additionally, Ad gene transfer was enhanced at the targeted/sonoporated mice tumor xenografts. This research demonstrated mda-7’s efficacy in reducing primary (treated) and untreated tumors that simulated the presence of metastasis in athymic mice xenograft models bearing human PC cells. Bystander anti-tumor activity of mda-7, a secreted cytokine was noted for non-targeted tumors.
Earlier in vitro studies on the combination of radiation and gene therapy (Ad.p53, Ad.Rb, and Ad.p130) demonstrated an increase in the percentage of cell death for DU145 cells. We also studied UTMD (ultrasound targeted microbubble destruction) gene therapy in combination with external beam radiation for radiation resistant PC. The results demonstrated an enhanced therapeutic benefit of tumor suppressor genes in radiation resistant PC. We also demonstrated an increase in the expression of tumor suppressor genes at the tumor site due to MBs and US.
These findings highlight the potential therapeutic benefit of this novel image guided gene transfer technology alone or in combination with external beam radiation for prostate cancer patients with therapy resistant disease
Applications across Co-located Devices
We live surrounded by many computing devices. However, their presence has yet to
be fully explored to create a richer ubiquitous computing environment. There is an
opportunity to take better advantage of those devices by combining them into a unified
user experience. To realize this vision, we studied and explored the use of a framework,
which provides the tools and abstractions needed to develop applications that distribute
UI components across co-located devices.
The framework comprises the following components: authentication and authorization
services; a broker to sync information across multiple application instances; background
services that gather the capabilities of the devices; and a library to integrate
web applications with the broker, determine which components to show based on UI
requirements and device capabilities, and that provides custom elements to manage the
distribution of the UI components and the multiple application states. Collaboration
between users is supported by sharing application states. An indoor positioning solution
had to be developed in order to determine when devices are close to each other to trigger
the automatic redistribution of UI components.
The research questions that we set out to respond are presented along with the contributions
that have been produced. Those contributions include a framework for crossdevice
applications, an indoor positioning solution for pervasive indoor environments,
prototypes, end-user studies and developer focused evaluation. To contextualize our
research, we studied previous research work about cross-device applications, proxemic
interactions and indoor positioning systems.
We presented four application prototypes. The first three were used to perform studies
to evaluate the user experience. The last one was used to study the developer experience
provided by the framework. The results were largely positive with users showing preference
towards using multiple devices under some circumstances. Developers were also
able to grasp the concepts provided by the framework relatively well.Vivemos rodeados de dispositivos computacionais. No entanto, ainda não tiramos partido
da sua presença para criar ambientes de computação ubíqua mais ricos. Existe uma
oportunidade de combiná-los para criar uma experiência de utilizador unificada. Para
realizar esta visão, estudámos e explorámos a utilização de uma framework que forneça
ferramentas e abstrações que permitam o desenvolvimento de aplicações que distribuem
os componentes da interface do utilizador por dispositivos co-localizados.
A framework é composta por: serviços de autenticação e autorização; broker que sincroniza
informação entre várias instâncias da aplicação; serviços que reúnem as capacidades
dos dispositivos; e uma biblioteca para integrar aplicações web com o broker, determinar
as componentes a mostrar com base nos requisitos da interface e nas capacidades dos
dispositivos, e que disponibiliza elementos para gerir a distribuição dos componentes da
interface e dos estados de aplicação. A colaboração entre utilizadores é suportada através
da partilha dos estados de aplicação. Foi necessário desenvolver um sistema de posicionamento
em interiores para determinar quando é que os dispositivos estão perto uns dos
outros para despoletar a redistribuição automática dos componentes da interface.
As questões de investigação inicialmente colocadas são apresentadas juntamente com
as contribuições que foram produzidas. Essas contribuições incluem uma framework para
aplicações multi-dispositivo, uma solução de posicionamento em interiores para computação
ubíqua, protótipos, estudos com utilizadores finais e avaliação com programadores.
Para contextualizar a nossa investigação, estudámos trabalhos anteriores sobre aplicações
multi-dispositivo, interação proxémica e sistemas de posicionamento em interiores.
Apresentámos quatro aplicações protótipo. As primeiras três foram utilizadas para
avaliar a experiência de utilização. A última foi utilizada para estudar a experiência
de desenvolvimento com a framework. Os resultados foram geralmente positivos, com
os utilizadores a preferirem utilizar múltiplos dispositivos em certas circunstâncias. Os
programadores também foram capazes de compreender a framework relativamente bem
Space shuttle low cost/risk avionics study
All work breakdown structure elements containing any avionics related effort were examined for pricing the life cycle costs. The analytical, testing, and integration efforts are included for the basic onboard avionics and electrical power systems. The design and procurement of special test equipment and maintenance and repair equipment are considered. Program management associated with these efforts is described. Flight test spares and labor and materials associated with the operations and maintenance of the avionics systems throughout the horizontal flight test are examined. It was determined that cost savings can be achieved by using existing hardware, maximizing orbiter-booster commonality, specifying new equipments to MIL quality standards, basing redundancy on cost effective analysis, minimizing software complexity and reducing cross strapping and computer-managed functions, utilizing compilers and floating point computers, and evolving the design as dictated by the horizontal flight test schedules
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms
- …