2,302 research outputs found

    Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection

    Full text link
    Recent studies observe that app foreground is the most striking component that influences the access control decisions in mobile platform, as users tend to deny permission requests lacking visible evidence. However, none of the existing permission models provides a systematic approach that can automatically answer the question: Is the resource access indicated by app foreground? In this work, we present the design, implementation, and evaluation of COSMOS, a context-aware mediation system that bridges the semantic gap between foreground interaction and background access, in order to protect system integrity and user privacy. Specifically, COSMOS learns from a large set of apps with similar functionalities and user interfaces to construct generic models that detect the outliers at runtime. It can be further customized to satisfy specific user privacy preference by continuously evolving with user decisions. Experiments show that COSMOS achieves both high precision and high recall in detecting malicious requests. We also demonstrate the effectiveness of COSMOS in capturing specific user preferences using the decisions collected from 24 users and illustrate that COSMOS can be easily deployed on smartphones as a real-time guard with a very low performance overhead.Comment: Accepted for publication in IEEE INFOCOM'201

    The Profiling Potential of Computer Vision and the Challenge of Computational Empiricism

    Full text link
    Computer vision and other biometrics data science applications have commenced a new project of profiling people. Rather than using 'transaction generated information', these systems measure the 'real world' and produce an assessment of the 'world state' - in this case an assessment of some individual trait. Instead of using proxies or scores to evaluate people, they increasingly deploy a logic of revealing the truth about reality and the people within it. While these profiling knowledge claims are sometimes tentative, they increasingly suggest that only through computation can these excesses of reality be captured and understood. This article explores the bases of those claims in the systems of measurement, representation, and classification deployed in computer vision. It asks if there is something new in this type of knowledge claim, sketches an account of a new form of computational empiricism being operationalised, and questions what kind of human subject is being constructed by these technological systems and practices. Finally, the article explores legal mechanisms for contesting the emergence of computational empiricism as the dominant knowledge platform for understanding the world and the people within it

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Advanced metering infrastructures:security risks and mitigation

    Get PDF

    From banal surveillance to function creep: automated license plate recognition (ALPR) in Denmark

    Get PDF
    This article discusses how Automated License Plate Recognition (ALPR) has been implemented in Denmark across three different sectors: parking, environmental zoning, and policing. ALPR systems are deployed as a configuration of cameras, servers, and algorithms of computer vision that automatically reads and records license plates of passing cars. Through digital ethnography and interviews with key stakeholders in Denmark, we contribute to the fields of critical algorithm and surveillance studies with a concrete empirical study on how ALPR systems are configured according to user-specific demands. Each case gives nuance to how ALPR systems are implemented: (1) how the seamless charging for a “barrier-free” parking experience poses particular challenges for customers and companies; (2) how environmental zoning enforcement through automated fines avoids dragnet data collection through customized design and regulation; and (3) how the Danish Police has widened its dragnet data collection with little public oversight and questionable efficacy. We argue that ALPR enacts a form of “banal surveillance” because such systems operate inconspicuously under the radar of public attention. As the central analytic perspective, banality highlights how the demand for increasing efficiency in different domains makes surveillance socially and politically acceptable in the long run. Although we find that legal and civic modes of regulation are important for shaping the deployment of ALPR, the potential for function creep is embedded into the very process of infrastructuring due to a lack of public understanding of these technologies. We discuss wider consequences of ALPR as a specific and overlooked instance of algorithmic surveillance, contributing to academic and public debates around the embedding of algorithmic governance and computer vision into everyday life
    • …
    corecore