1,143 research outputs found

    Larval morphology of the avian parasitic genus Passeromyia: playing hide and seek with a parastomal bar

    Get PDF
    The enigmatic larvae of the Old World genus Passeromyia Rodhain & Villeneuve, 1915 (Diptera: Muscidae) inhabit the nests of birds as saprophages or as haematophagous agents of myiasis among nestlings. Using light microscopy, confocal laser scanning microscopy and scanning electron microscopy, we provide the first morphological descriptions of the first, second and third instar of P. longicornis (Macquart, 1851) (Diptera: Muscidae), the first and third instar of P. indecora (Walker, 1858) (Diptera: Muscidae), and we revise the larval morphology of P. heterochaeta (Villenueve, 1915) (Diptera: Muscidae) and P. steini Pont, 1970 (Diptera: Muscidae). We provide a key to the third instar of examined species (excluding P. steini and P. veitchi Bezzi, 1928 (Diptera: Muscidae)). Examination of the cephaloskeleton revealed paired rod-like sclerites, named 'rami', between the lateral arms of the intermediate sclerite in the second and third instar larva. We reveal parastomal bars fused apically with the intermediate sclerite, the absence of which has so far been considered as apomorphic for second and third instar muscid larvae. Examination of additional material suggests that modified parastomal bars are not exclusive features of Passeromyia but occur widespread in the Muscidae, and rami may occur widespread in the Cyclorrhapha.Copyright: © 2022, The Authors. The attached document is the authors’ final accepted/submitted version of the journal article. You are advised to consult the publisher’s version if you wish to cite from it

    Stealthy Plaintext

    Get PDF
    Correspondence through email has become a very significant way of communication at workplaces. Information of most kinds such as text, video and audio can be shared through email, the most common being text. With confidential data being easily sharable through this method most companies monitor the emails, thus invading the privacy of employees. To avoid secret information from being disclosed it can be encrypted. Encryption hides the data effectively but this makes the data look important and hence prone to attacks to decrypt the information. It also makes it obvious that there is secret information being transferred. The most effective way would be to make the information seem harmless by concealing the information in the email but not encrypting it. We would like the information to pass through the analyzer without being detected. This project aims to achieve this by “encrypting” plain text by replacing suspicious keywords with non-suspicious English words, trying to keep the grammatical syntax of the sentences intact

    An intrusion and fault tolerant forensic storage for a SIEM system

    Get PDF
    Current Security Information and Events Management (SIEM) solutions lack a data storage facility which is secure enough - i.e. stored events related to security incidents cannot be forged and are always available - that it can be used for forensic purposes. Forensic storage used by current SIEM solutions uses traditional RSA algorithm to sign the security events. In this paper we have analyzed the limits of current forensic storages, and we have proposed an architecture for forensic storage, implementing a threshold-based variant of the RSA algorithm, that outperforms state of the art SIEM solutions in terms of intrusion- and fault-tolerance. We show by experiments that our forensic storage works correctly even in the presence of cyber-attacks, although with a performance penalty. We also conduct an experimental campaign to evaluate the performance cost of the proposed scheme as a function of the threshold

    Application of genetic algorithms and swarm behaviors for the development of npc's in video games

    Get PDF
    Treball final de Grau en Disseny i Desenvolupament de Videojocs. Codi: VJ1241. Curs acadèmic: 2019/2020This document presents the project report of the Video Games Design and Development Degree Final project by Jon Hodei Martínez Soto. It is a videogame titled Zombies Are Dumb that consists on exploring how to include genetic algorithms applied to a group of agents with the objective of being able to learn the player patterns and adapt to them. This will create a greater challenge considering that the AI will change its behavior depending on how the player plays. Besides, the project also integrate swarm behaviors to create a sense of group and coordination between the agents. These two main ideas will cause an unpredictable playing environment for the player and, therefore, an unique and different experience each time

    KCRS: A Blockchain-Based Key Compromise Resilient Signature System

    Get PDF
    Digital signatures are widely used to assure authenticity and integrity of messages (including blockchain transactions). This assurance is based on assumption that the private signing key is kept secret, which may be exposed or compromised without being detected in the real world. Many schemes have been proposed to mitigate this problem, but most schemes are not compatible with widely used digital signature standards and do not help detect private key exposures. In this paper, we propose a Key Compromise Resilient Signature (KCRS) system, which leverages blockchain to detect key compromises and mitigate the consequences. Our solution keeps a log of valid certificates and digital signatures that have been issued on the blockchain, which can deter the abuse of compromised private keys. Since the blockchain is an open system, KCRS also provides a privacy protection mechanism to prevent the public from learning the relationship between signatures. We present a theoretical framework for the security of the system and a provably-secure construction. We also implement a prototype of KCRS and conduct experiments to demonstrate its practicability

    A resilient architecture for forensic storage of events in critical infrastructures

    Get PDF
    In Critical Infrastructures, forensic analysis of stored events is an essential task when a security breach occurs. The goal of forensic analysis is to provide evidence to be used as valid proofs in a legal proceeding. So, it is very important to ensure the integrity of the events stored in order to perform a correct forensic analysis. Today, most of the SIEMs used to protect the Critical Infrastructures sign the security events with RSA classic algorithm in order to ensure their integrity. The signed security events cannot be admissible as evidence if the secret key is compromised, or when the module responsible for signing operations is down for any reason. In this paper a new architecture that overcomes these limitations has been proposed. Experimental tests show the performance of our architecture and the high resilience in faulty situations, i.e. some nodes are under attack

    Extracting Cryptographic Keys from .NET Applications

    Get PDF
    In the absence of specialized encryption hardware,cryptographic operations must be performed in main memory.As such,it is common place for cyber criminals to examine the content of main memory with a view to retrieving high-value data in plaintext form and/or the associated decryption key.In this paper,the author presents a number of simple methods for identifying and extracting cryptographic keys from memory dumps of software applications that utilize the Microsoft .NET Framework,as well as sourcecode level countermeasures to protect against same.Given the EXE file of an application and a basic knowledge of the cryptographic libraries utilized in the .NET Framework,the author shows how to create a memory dump of a running application and how to extract cryptographic keys from same using WinDBG - without any prior knowledge of the cryptographic key utilized.Whilst the proof-of-concept application utilized as part of this paper uses an implementation of the DES cipher,it should be noted that the steps shown can be utilized against all three generations of symmetric and asymmetric ciphers supported within the .NET Framework

    Revisiting software protection

    Get PDF
    We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography. We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions
    • …
    corecore