53,614 research outputs found

    Octopus: A Secure and Anonymous DHT Lookup

    Full text link
    Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. We present Octopus, a novel DHT lookup which provides strong guarantees for both security and anonymity. Octopus uses attacker identification mechanisms to discover and remove malicious nodes, severely limiting an adversary's ability to carry out active attacks, and splits lookup queries over separate anonymous paths and introduces dummy queries to achieve high levels of anonymity. We analyze the security of Octopus by developing an event-based simulator to show that the attacker discovery mechanisms can rapidly identify malicious nodes with low error rate. We calculate the anonymity of Octopus using probabilistic modeling and show that Octopus can achieve near-optimal anonymity. We evaluate Octopus's efficiency on Planetlab with 207 nodes and show that Octopus has reasonable lookup latency and manageable communication overhead

    Is the emotional modulation of the attentional blink driven by response bias?

    Get PDF
    Several studies have shown that the attentional blink (AB; Raymond, Shapiro, & Arnell, 1992) is diminished for highly arousing T2 stimuli (e.g., Anderson, 2005). Whereas this effect is most often interpreted as evidence for a more efficient processing of arousing information, it could be due also to a bias to report more arousing stimuli than neutral stimuli. We introduce a paradigm that allows one to control for such a response bias. Using this paradigm, we obtained evidence that the diminished AB for taboo words cannot be explained by a response bias. This supports the idea that the emotional modulation of the AB is caused by attentional processes

    A New Role for Human Resource Managers: Social Engineering Defense

    Get PDF
    [Excerpt] The general risk of social engineering attacks to organizations has increased with the rise of digital computing and communications, while for an attacker the risk has decreased. In order to counter the increased risk, organizations should recognize that human resources (HR) professionals have just as much responsibility and capability in preventing this risk as information technology (IT) professionals. Part I of this paper begins by defining social engineering in context and with a brief history pre-digital age attacks. It concludes by showing the intersection of HR and IT through examples of operational attack vectors. In part II, the discussion moves to a series of measures that can be taken to help prevent social engineering attacks

    The Law and the Human Target in Information Warfare: Cautions and Opportunities

    Get PDF
    This bachelor thesis will explore how two traffic shaping mechanisms can help preserve battery power while retaining a certain Quality of Service (QoS) in an Android based application developed for crisis management. The implemented user-space mechanisms will delay all elastic data requests in order to reduce the number of times the 3G transmission radio enters high power states. This lowers the QoS but extends the user equipment's battery life. The thesis will show that a shaping mechanism has the capability to reduce radio energy usage by up to 50% for the given Android application at the cost of added transmission delays by up to 134 seconds for background traffic. The study also presents two policies that help the application adapt to the current battery level and lower the QoS accordingly, namely one that has a lenient savings effect and one that has an aggressive savings effect
    corecore