300 research outputs found

    Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels

    Full text link
    We show that subtle acoustic noises emanating from within computer screens can be used to detect the content displayed on the screens. This sound can be picked up by ordinary microphones built into webcams or screens, and is inadvertently transmitted to other parties, e.g., during a videoconference call or archived recordings. It can also be recorded by a smartphone or "smart speaker" placed on a desk next to the screen, or from as far as 10 meters away using a parabolic microphone. Empirically demonstrating various attack scenarios, we show how this channel can be used for real-time detection of on-screen text, or users' input into on-screen virtual keyboards. We also demonstrate how an attacker can analyze the audio received during video call (e.g., on Google Hangout) to infer whether the other side is browsing the web in lieu of watching the video call, and which web site is displayed on their screen

    Advanced Integrated Database System For Petronas Mitco Sdn Bhd

    Get PDF
    Trading Corporation advanced integrated database system is used for marketing and trading of petrochemicals and general merchandise. Trading is mostly done with third parties. Trading corporation is getting information from third parties in database system. Database system is used by different departments to keep track on business flow of trading corporation and to do financial analysis of information for future updates of trading. This database system involves in different platform (Systems), different departments and different level of user involvement. So integration of database system is most important factor to produce the Business purpose Reports of marketing and trading of petrochemicals and general merchandises. Trading corporation is using SAP system and lotus Notes to keep track on information gathered from third parties and to produce Business purpose Reports for corporation use.The following paper shall present the background of study, problem statement and the objectives and scope of this study. Then the method to be used to achieve those objectives is explained where it examines the technical side of the project, in terms of software to be used, methodology that will suit the project's development as well as data collection techniques. Detail Explanation of Proposed system use case diagram, data flow diagram, SQL query Design, VB.net Report Design and User friendly Vb.Net interface. Further more at the end conclusion, recommendation, project limitation and project enhancement are also describe in detail for future updates of database system

    Recent Trends in Communication Networks

    Get PDF
    In recent years there has been many developments in communication technology. This has greatly enhanced the computing power of small handheld resource-constrained mobile devices. Different generations of communication technology have evolved. This had led to new research for communication of large volumes of data in different transmission media and the design of different communication protocols. Another direction of research concerns the secure and error-free communication between the sender and receiver despite the risk of the presence of an eavesdropper. For the communication requirement of a huge amount of multimedia streaming data, a lot of research has been carried out in the design of proper overlay networks. The book addresses new research techniques that have evolved to handle these challenges

    Drug abusers have impaired cerebral oxygenation and cognition during exercise

    Get PDF
    Sem informaçãoBackground: Individuals with Substance Use Disorder (SUD) have lower baseline metabolic activity of the prefrontal cortex (PFC) associated with impairment of cognitive functions in decisionmaking and inhibitory control. Aerobic exercise has shown to improve PFC function and cognitive performance, however, its effects on SUD individuals remain unclear. Purpose: To verify the cognitive performance and oxygenation of the PFC during an incremental exercise in SUD individuals. Methods: Fourteen individuals under SUD treatment performed a maximum graded exercise test on a cycle ergometer with continuous measurements of oxygen consumption, PFC oxygenation, and inhibitory control (Stroop test) every two minutes of exercise at different intensities. Fifteen non-SUD individuals performed the same protocol and were used as control group. Results: Exercise increased oxyhemoglobin (O(2)Hb) and total hemoglobin (tHb) by 9% and 7%, respectively. However, when compared to a non-SUD group, this increase was lower at high intensities (p< 0.001), and the inhibitory cognitive control was lower at rest and during exercise (p< 0.007). In addition, PFC hemodynamics during exercise was inversely correlated with inhibitory cognitive performance (reaction time) (r = -0.62, p = 0.001), and a lower craving perception for the specific abused substance (p = 0.0189) was reported immediately after exercise. Conclusion: Despite SUD individuals having their PFC cerebral oxygenation increased during exercise, they presented lower cognition and oxygenation when compared to controls, especially at elevated intensities. These results may reinforce the role of exercise as an adjuvant treatment to improve PFC function and cognitive control in individuals with SUD.1211115Sem informaçãoSem informaçãoSem informaçã

    Presenting tiered recommendations in social activity streams

    Get PDF
    Modern social networking sites offer node-centralized streams that display recent updates from the other nodes in one's network. While such social activity streams are convenient features that help alleviate information overload, they can often become overwhelming themselves, especially high-throughput streams like Twitter’s home timelines. In these cases, recommender systems can help guide users toward the content they will find most important or interesting. However, current efforts to manipulate social activity streams involve hiding updates predicted to be less engaging or reordering them to place new or more engaging content first. These modifications can lead to decreased trust in the system and an inability to consume each update in its chronological context. Instead, I propose a three-tiered approach to displaying recommendations in social activity streams that hides nothing and preserves original context by highlighting updates predicted to be most important and de-emphasizing updates predicted to be least important. This presentation design allows users easily to consume different levels of recommended items chronologically, is able to persuade users to agree with its positive recommendations more than 25% more often than the baseline, and shows no significant loss of perceived accuracy or trust when compared with a filtered stream, possibly even performing better when extreme recommendation errors are intentionally introduced. Numerous directions for future research follow from this work that can shed light on how users react to different recommendation presentation designs and explain how study of an emphasis-based approach might help improve the state of the art

    The Cutting Edge, September/October 2006, Vol. 16 Issue 5

    Get PDF

    Novel classes of side channels and covert channels

    Get PDF
    When assessing the security of security-critical systems, it is crucial to consider conceptually new attacks, as appropriate countermeasures can only be implemented against known threats. Consequently, in this thesis we explore new classes of attacks and evaluate countermeasures. Our contribution is three-fold. We identify two previously unknown side channel attacks, i.e., attacks that exploit unintended information leakage. First, we consider optical emanations, i.e., the unavoidable emanation of every monitor. We demonstrate how to exploit tiny reflections in stationary objects and the human eye, and even diffuse reflections in objects such as the user';s shirt. Second, we study acoustic emanations of dot-matrix printers and show that the printed text can be reconstructed from a recording of the sound emitted while printing. Furthermore, we demonstrate a conceptually new covert channel: whereas side channels leak information unintentionally, in a covert channel there is an explicit sender that cooperates with the receiver. We present a new covert channel in the peer-reviewing process in scientific publishing that reveals the reviewer';s identity to the author. We additionally expose several related problems in the design of the PostScript language.Das Aufdecken neuer Arten von Angriffen ist wichtig zur Verbesserung der Sicherheit von sicherheitskritischen Systemen, da nur für bekannte Angriffe Gegenmaßnahmen ergriffen werden können. Deshalb untersuchen wir in dieser Arbeit neue Arten von Angriffen sowie geeignete Gegenmaßnahmen. Die Arbeit gliedert sich in drei Teile. Zunächst demonstrieren wir zwei neue Seitenkanalangriffe, also Angriffe die unbeabsichtigte Informationslecks ausnutzen. Zum Einen betrachten wir optische Abstrahlungen von Monitoren. Wir zeigen, dass das Bild des Monitors aus Reflexionen in verschiedenen Objekten rekonstruiert werden kann: aus winzigen Reflexionen in vielen stationären Objekten sowie im menschlichen Auge, und sogar aus diffusen Reflexionen beispielsweise auf dem Hemd eines Nutzers. Zum Anderen untersuchen wir die akustischen Abstrahlungen von Nadeldruckern und zeigen, dass der gedruckte Text aus einer Aufnahme der Druckgeräusche rekonstruiert werden kann. Des Weiteren demonstrieren wir einen neuen verdeckten Kanal: Während Seitenkanäle normalerweise durch unvorsichtige Implementierung entstehen, werden die Daten auf einem verdeckten Kanal absichtlich übertragen. Wir demonstrieren einen neuen verdeckten Kanal im Peer-Review-Prozess zur Begutachtung wissenschaftlicher Publikationen, welcher die Identität der Gutachter offenlegt. Darüberhinaus weisen wir auf mehrere grundlegende Probleme im Design der PostScript Sprache hin

    Capture, control, circulate : can we queer regulatory power in Graphic Design?

    Get PDF
    Capture, Control, Circulate addresses regulatory power, the transmission and enforcement of culturally-sanctioned behaviors and identity. How does regulatory power operate in graphic design and what—if anything—can the graphic designer do to subvert that operation? The methodologies for subversion explored in this book typically draw from queer and trans* experience and thought. Therefore, the work herein takes up issues of identity, normativity, marginalization, and community. This thesis also considers design education, and its contemporary emphasis on the capture and control of content. It advocates instead for an educational model that centers circulation; that is, graphic design’s capacity to platform, to publish, and to distribute. Capture, Control, Circulate imagines how design education can build community through informal platforms for reflection, collaboration, distribution, and collective celebration

    The Gamut: A Journal of Ideas and Information, No. 07, Fall 1982

    Get PDF
    CONTENTS OF ISSUE NO.7, FALL, 1982 Marianne Evett: The Many Faces of Ariel, 3 The strikingly different ways in which Shakespeare\u27s airy spirit in The Tempest has been represented on the stage reflect major shifts in sexual and social, as well as theatrical, attitudes since the first production 371 years ago. Frederick H. Holck: By Their Handwriting Ye Shall Know Them, 15 Grapho-psychology is being used in personnel selection, law, and other situations requiring insight into peoples\u27 personalities. Lawrence Martin: A Case for Intensive Care, 33 Often a hospital\u27s Intensive Care Unit can only keep a patient alive while the body tries to heal itself. Without such support, however, a critically ill patient has no chance. Even with full ICU support, the outcome may be disastrous. An actual case history. Larry R. Sherman and Nancy L. Carney: The False Saint Nicholas, 43 Detecting and evaluating a forged nineteenth-century Russian icon. James A. Miller: No Stranger Could Have Said. , 50 An elegy for John Gardner (1933-1982) Robert Fox: Two Short-Short Stories, 51 The Malarky Sisters, The Divorce of the Unmarried. Henry T. King, Jr: Nuremberg Revisited, 54 Former prosecutor at the Nuremberg Trials in 1945-46 returns after 35 years and talks with the German defense attorney who opposed him at the trials, and also with Albert Speer, the convicted Nazi war criminal. Peter Baker: Birth Defects: a Realistic View, 63 Medical science has no remedy for the majority of birth defects, but some, such as those caused by alcohol, can be prevented. Louis T. Millc: Arabic, 68 First in a series of Languages of the World. Thylias Moss: Four Poems, 72 One-Legged Cook, Good Amnesia, Usual Betrayals, From the Bride\u27s Journal. Robert Finn: Critics: the Essential Outsiders, 75 Award-winning critic maintains that critics and reviewers serve a vital function in the world of the arts a function that the artists themselves cannot perform. Leah Beth Ward: The Consumers League of Ohio: Early Champion of Working Women, 81 Wealthy Oeveland women versus employers who exploited working women sixty and eighty years ago. David Guralnik: Word Watch: Productive suffixes, 94 Watergate has spawned a multitude of new coinages based on the suffix -gate. Harold Ticktin: My Fair Lady is Italian, 95 The rain in Spain leads to a romance with Italian -and to Italian Romanzas, in one of which the author discovers Henry Kissinger.https://engagedscholarship.csuohio.edu/gamut_archives/1004/thumbnail.jp
    • …
    corecore