11,226 research outputs found
The Viability and Potential Consequences of IoT-Based Ransomware
With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested.
As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed.
For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim.
Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research
PrivLava: Synthesizing Relational Data with Foreign Keys under Differential Privacy
Answering database queries while preserving privacy is an important problem
that has attracted considerable research attention in recent years. A canonical
approach to this problem is to use synthetic data. That is, we replace the
input database R with a synthetic database R* that preserves the
characteristics of R, and use R* to answer queries. Existing solutions for
relational data synthesis, however, either fail to provide strong privacy
protection, or assume that R contains a single relation. In addition, it is
challenging to extend the existing single-relation solutions to the case of
multiple relations, because they are unable to model the complex correlations
induced by the foreign keys. Therefore, multi-relational data synthesis with
strong privacy guarantees is an open problem. In this paper, we address the
above open problem by proposing PrivLava, the first solution for synthesizing
relational data with foreign keys under differential privacy, a rigorous
privacy framework widely adopted in both academia and industry. The key idea of
PrivLava is to model the data distribution in R using graphical models, with
latent variables included to capture the inter-relational correlations caused
by foreign keys. We show that PrivLava supports arbitrary foreign key
references that form a directed acyclic graph, and is able to tackle the common
case when R contains a mixture of public and private relations. Extensive
experiments on census data sets and the TPC-H benchmark demonstrate that
PrivLava significantly outperforms its competitors in terms of the accuracy of
aggregate queries processed on the synthetic data.Comment: This is an extended version of a SIGMOD 2023 pape
Pollution-induced community tolerance in freshwater biofilms – from molecular mechanisms to loss of community functions
Exposure to herbicides poses a threat to aquatic biofilms by affecting their community structure, physiology and function. These changes render biofilms to become more tolerant, but on the downside community tolerance has ecologic costs. A concept that addresses induced community tolerance to a pollutant (PICT) was introduced by Blanck and Wängberg (1988). The basic principle of the concept is that microbial communities undergo pollution-induced succession when exposed to a pollutant over a long period of time, which changes communities structurally and functionally and enhancing tolerance to the pollutant exposure. However, the mechanisms of tolerance and the ecologic consequences were hardly studied up to date. This thesis addresses the structural and functional changes in biofilm communities and applies modern molecular methods to unravel molecular tolerance mechanisms.
Two different freshwater biofilm communities were cultivated for a period of five weeks, with one of the communities being contaminated with 4 μg L-1 diuron. Subsequently, the communities were characterized for structural and functional differences, especially focusing on their crucial role of photosynthesis. The community structure of the autotrophs was assessed using HPLC-based pigment analysis and their functional alterations were investigated using Imaging-PAM fluorometry to study photosynthesis and community oxygen profiling to determine net primary production. Then, the molecular fingerprints of the communities were measured with meta-transcriptomics (RNA-Seq) and GC-based community metabolomics approaches and analyzed with respect to changes in their molecular functions. The communities were acute exposed to diuron for one hour in a dose-response design, to reveal a potential PICT and uncover related adaptation to diuron exposure. The combination of apical and molecular methods in a dose-response design enabled the linkage of functional effects of diuron exposure and underlying molecular mechanisms based on a sensitivity analysis.
Chronic exposure to diuron impaired freshwater biofilms in their biomass accrual. The contaminated communities particularly lost autotrophic biomass, reflected by the decrease in specific chlorophyll a content. This loss was associated with a change in the molecular fingerprint of the communities, which substantiates structural and physiological changes. The decline in autotrophic biomass could be due to a primary loss of sensitive autotrophic organisms caused by the selection of better adapted species in the course of chronic exposure. Related to this hypothesis, an increase in diuron tolerance has been detected in the contaminated communities and molecular mechanisms facilitating tolerance have been found. It was shown that genes of the photosystem, reductive-pentose phosphate cycle and arginine metabolism were differentially expressed among the communities and that an increased amount of potential antioxidant degradation products was found in the contaminated communities. This led to the hypothesis that contaminated communities may have adapted to oxidative stress, making them less sensitive to diuron exposure. Moreover, the photosynthetic light harvesting complex was altered and the photoprotective xanthophyll cycle was increased in the contaminated communities. Despite these adaptation strategies, the loss of autotrophic biomass has been shown to impair primary production. This impairment persisted even under repeated short-term exposure, so that the tolerance mechanisms cannot safeguard primary production as a key function in aquatic systems.:1. The effect of chemicals on organisms and their functions .............................. 1
1.1 Welcome to the anthropocene .......................................................................... 1
1.2 From cellular stress responses to ecosystem resilience ................................... 3
1.2.1 The individual pursuit for homeostasis ....................................................... 3
1.2.2 Stability from diversity ................................................................................. 5
1.3 Community ecotoxicology - a step forward in monitoring the effects of chemical
pollution? ................................................................................................................. 6
1.4 Functional ecotoxicological assessment of microbial communities ................... 9
1.5 Molecular tools – the key to a mechanistic understanding of stressor effects
from a functional perspective in microbial communities? ...................................... 12
2. Aims and Hypothesis ......................................................................................... 14
2.1 Research question .......................................................................................... 14
2.2 Hypothesis and outline .................................................................................... 15
2.3 Experimental approach & concept .................................................................. 16
2.3.1 Aquatic freshwater biofilms as model community ..................................... 16
2.3.2 Diuron as model herbicide ........................................................................ 17
2.3.3 Experimental design ................................................................................. 18
3. Structural and physiological changes in microbial communities after chronic
exposure - PICT and altered functional capacity ................................................. 21
3.1 Introduction ..................................................................................................... 21
3.2 Methods .......................................................................................................... 23
3.2.1 Biofilm cultivation ...................................................................................... 23
3.2.2 Dry weight and autotrophic index ............................................................. 23
3.2.4 Pigment analysis of periphyton ................................................................. 23
3.2.4.1 In-vivo pigment analysis for community characterization ....................... 24
3.2.4.2 In-vivo pigment analysis based on Imaging-PAM fluorometry ............... 24
3.2.4.3 In-vivo pigment fluorescence for tolerance detection ............................. 26
3.2.4.4 Ex-vivo pigment analysis by high-pressure liquid-chromatography ....... 27
3.2.5 Community oxygen metabolism measurements ....................................... 28
3.3 Results and discussion ................................................................................... 29
3.3.1 Comparison of the structural community parameters ............................... 29
3.3.2 Photosynthetic activity and primary production of the communities after
selection phase ................................................................................................. 33
3.3.3 Acquisition of photosynthetic tolerance .................................................... 34
3.3.4 Primary production at exposure conditions ............................................... 36
3.3.5 Tolerance detection in primary production ................................................ 37
3.4 Summary and Conclusion ........................................................................... 40
4. Community gene expression analysis by meta-transcriptomics ................... 41
4.1 Introduction to meta-transcriptomics ............................................................... 41
4.2. Methods ......................................................................................................... 43
4.2.1 Sampling and RNA extraction................................................................... 43
4.2.2 RNA sequencing analysis ......................................................................... 44
4.2.3 Data assembly and processing................................................................. 45
4.2.4 Prioritization of contigs and annotation ..................................................... 47
4.2.5 Sensitivity analysis of biological processes .............................................. 48
4.3 Results and discussion ................................................................................... 48
4.3.1 Characterization of the meta-transcriptomic fingerprints .......................... 49
4.3.2 Insights into community stress response mechanisms using trend analysis
(DRomic’s) ......................................................................................................... 51
4.3.3 Response pattern in the isoform PS genes .............................................. 63
4.5 Summary and conclusion ................................................................................ 65
5. Community metabolome analysis ..................................................................... 66
5.1 Introduction to community metabolomics ........................................................ 66
5.2 Methods .......................................................................................................... 68
5.2.1 Sampling, metabolite extraction and derivatisation................................... 68
5.2.2 GC-TOF-MS analysis ............................................................................... 69
5.2.3 Data processing and statistical analysis ................................................... 69
5.3 Results and discussion ................................................................................... 70
5.3.1 Characterization of the metabolic fingerprints .......................................... 70
5.3.2 Difference in the metabolic fingerprints .................................................... 71
5.3.3 Differential metabolic responses of the communities to short-term exposure
of diuron ............................................................................................................ 73
5.4 Summary and conclusion ................................................................................ 78
6. Synthesis ............................................................................................................. 79
6.1 Approaches and challenges for linking molecular data to functional
measurements ...................................................................................................... 79
6.2 Methods .......................................................................................................... 83
6.2.1 Summary on the data ............................................................................... 83
6.2.2 Aggregation of molecular data to index values (TELI and MELI) .............. 83
6.2.3 Functional annotation of contigs and metabolites using KEGG ................ 83
6.3 Results and discussion ................................................................................... 85
6.3.1 Results of aggregation techniques ........................................................... 85
6.3.2 Sensitivity analysis of the different molecular approaches and endpoints 86
6.3.3 Mechanistic view of the molecular stress responses based on KEGG
functions ............................................................................................................ 89
6.4 Consolidation of the results – holistic interpretation and discussion ............... 93
6.4.1 Adaptation to chronic diuron exposure - from molecular changes to
community effects.............................................................................................. 93
6.4.2 Assessment of the ecological costs of Pollution-induced community
tolerance based on primary production ............................................................. 94
6.5 Outlook ............................................................................................................ 9
Countermeasures for the majority attack in blockchain distributed systems
La tecnologÃa Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus caracterÃsticas únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraÃdo o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnologÃa. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en IngenierÃa de Sistemas y Computació
PreFair: Privately Generating Justifiably Fair Synthetic Data
When a database is protected by Differential Privacy (DP), its usability is
limited in scope. In this scenario, generating a synthetic version of the data
that mimics the properties of the private data allows users to perform any
operation on the synthetic data, while maintaining the privacy of the original
data. Therefore, multiple works have been devoted to devising systems for DP
synthetic data generation. However, such systems may preserve or even magnify
properties of the data that make it unfair, endering the synthetic data unfit
for use. In this work, we present PreFair, a system that allows for DP fair
synthetic data generation. PreFair extends the state-of-the-art DP data
generation mechanisms by incorporating a causal fairness criterion that ensures
fair synthetic data. We adapt the notion of justifiable fairness to fit the
synthetic data generation scenario. We further study the problem of generating
DP fair synthetic data, showing its intractability and designing algorithms
that are optimal under certain assumptions. We also provide an extensive
experimental evaluation, showing that PreFair generates synthetic data that is
significantly fairer than the data generated by leading DP data generation
mechanisms, while remaining faithful to the private data.Comment: 15 pages, 11 figure
The cosmic waltz of Coma Berenices and Latyshev 2 (Group X). Membership, phase-space structure, mass, and energy distributions
Context. Open clusters (OCs) are fundamental benchmarks where theories of
star formation and stellar evolution can be tested and validated. Coma Ber and
Latyshev 2 (Group X) are the second and third OCs closest to the Sun, making
them excellent targets to search for low-mass stars and ultra-cool dwarfs. In
addition, this pair will experience a flyby in 10-16 Myr which makes it a
benchmark to test OCs pair interactions. Aims. We aim at analysing the
membership, luminosity, mass, phase-space (i.e., positions and velocities), and
energy distributions for Coma Ber and Latyshev 2 and test the hypothesis of the
mixing of their populations at the encounter time. Methods. We develop a new
phase-space membership methodology and apply it to Gaia data. With the
recovered members we infer the phase-space, luminosity and mass distributions
using publicly available Bayesian inference codes. Then, with a publicly
available orbit integration code and members' positions and velocities, we
integrate their orbits 20 Myr into the future. Results. In Coma Ber, we
identify 302 candidate members distributed in the core and tidal tails. The
tails are dynamically cold and asymmetrically populated. The stellar system
called Group X is made of two structures: the disrupted OC Latyshev 2 (186
candidate members) and a loose stellar association called Mecayotl 1 (146
candidate members), both of them will fly by Coma Ber in Myr and
Myr, respectively, and each other in Myr. Conclusions.
We study the dynamical properties of the core and tails of Coma Ber and also
confirm the existence of the OC Latyshev 2 and its neighbour stellar
association Mecayotl 1. Although these three systems will experience encounters
we find no evidence supporting the mixing of their populations.Comment: 25 pages, 19 figures, accepted for publication in Astronomy &
Astrophysic
The place where curses are manufactured : four poets of the Vietnam War
The Vietnam War was unique among American wars. To pinpoint its uniqueness, it was necessary to look for a non-American voice that would enable me to articulate its distinctiveness and explore the American character as observed by an Asian. Takeshi Kaiko proved to be most helpful. From his novel, Into a Black Sun, I was able to establish a working pair of 'bookends' from which to approach the poetry of Walter McDonald, Bruce Weigl, Basil T. Paquet and Steve Mason. Chapter One is devoted to those seemingly mismatched 'bookends,' Walt Whitman and General William C. Westmoreland, and their respective anthropocentric and technocentric visions of progress and the peculiarly American concept of the "open road" as they manifest themselves in Vietnam. In Chapter, Two, I analyze the war poems of Walter McDonald. As a pilot, writing primarily about flying, his poetry manifests General Westmoreland's technocentric vision of the 'road' as determined by and manifest through technology. Chapter Three focuses on the poems of Bruce Weigl. The poems analyzed portray the literal and metaphorical descent from the technocentric, 'numbed' distance of aerial warfare to the world of ground warfare, and the initiation of a 'fucking new guy,' who discovers the contours of the self's interior through a set of experiences that lead from from aerial insertion into the jungle to the degradation of burning human
feces. Chapter Four, devoted to the thirteen poems of Basil T. Paquet, focuses on the continuation of the descent begun in Chapter Two. In his capacity as a medic, Paquet's entire body of poems details his quotidian tasks which entail tending the maimed, the mortally wounded and the dead. The final chapter deals with Steve Mason's JohnnY's Song, and his depiction of the plight of Vietnam veterans back in "The World" who are still trapped inside the interior landscape of their individual "ghettoes" of the soul created by their war-time experiences
The MeerKAT Galaxy Cluster Legacy Survey: Survey overview and highlights
MeerKAT’s large number (64) of 13.5 m diameter antennas, spanning 8 km with a densely packed 1 km core, create a powerful instrument for wide-area surveys, with high sensitivity over a wide range of angular scales. The MeerKAT Galaxy Cluster Legacy Survey (MGCLS) is a programme of long-track MeerKAT L-band (900−1670 MHz) observations of 115 galaxy clusters, observed for ∼6−10 h each in full polarisation. The first legacy product data release (DR1), made available with this paper, includes the MeerKAT visibilities, basic image cubes at ∼8″ resolution, and enhanced spectral and polarisation image cubes at ∼8″ and 15″ resolutions. Typical sensitivities for the full-resolution MGCLS image products range from ∼3−5 μJy beam−1. The basic cubes are full-field and span 2° × 2°. The enhanced products consist of the inner 1.2° × 1.2° field of view, corrected for the primary beam. The survey is fully sensitive to structures up to ∼10′ scales, and the wide bandwidth allows spectral and Faraday rotation mapping. Relatively narrow frequency channels (209 kHz) are also used to provide H I mapping in windows of 0 < z < 0.09 and 0.19 < z < 0.48. In this paper, we provide an overview of the survey and the DR1 products, including caveats for usage. We present some initial results from the survey, both for their intrinsic scientific value and to highlight the capabilities for further exploration with these data. These include a primary-beam-corrected compact source catalogue of ∼626 000 sources for the full survey and an optical and infrared cross-matched catalogue for compact sources in the primary-beam-corrected areas of Abell 209 and Abell S295. We examine dust unbiased star-formation rates as a function of cluster-centric radius in Abell 209, extending out to 3.5 R 200. We find no dependence of the star-formation rate on distance from the cluster centre, and we observe a small excess of the radio-to-100 μm flux ratio towards the centre of Abell 209 that may reflect a ram pressure enhancement in the denser environment. We detect diffuse cluster radio emission in 62 of the surveyed systems and present a catalogue of the 99 diffuse cluster emission structures, of which 56 are new. These include mini-halos, halos, relics, and other diffuse structures for which no suitable characterisation currently exists. We highlight some of the radio galaxies that challenge current paradigms, such as trident-shaped structures, jets that remain well collimated far beyond their bending radius, and filamentary features linked to radio galaxies that likely illuminate magnetic flux tubes in the intracluster medium. We also present early results from the H I analysis of four clusters, which show a wide variety of H I mass distributions that reflect both sensitivity and intrinsic cluster effects, and the serendipitous discovery of a group in the foreground of Abell 3365
The determinants of value addition: a crtitical analysis of global software engineering industry in Sri Lanka
It was evident through the literature that the perceived value delivery of the global software
engineering industry is low due to various facts. Therefore, this research concerns global
software product companies in Sri Lanka to explore the software engineering methods and
practices in increasing the value addition. The overall aim of the study is to identify the key
determinants for value addition in the global software engineering industry and critically
evaluate the impact of them for the software product companies to help maximise the value
addition to ultimately assure the sustainability of the industry.
An exploratory research approach was used initially since findings would emerge while the
study unfolds. Mixed method was employed as the literature itself was inadequate to
investigate the problem effectively to formulate the research framework. Twenty-three face-to-face online interviews were conducted with the subject matter experts covering all the
disciplines from the targeted organisations which was combined with the literature findings as
well as the outcomes of the market research outcomes conducted by both government and nongovernment institutes. Data from the interviews were analysed using NVivo 12. The findings
of the existing literature were verified through the exploratory study and the outcomes were
used to formulate the questionnaire for the public survey. 371 responses were considered after
cleansing the total responses received for the data analysis through SPSS 21 with alpha level
0.05. Internal consistency test was done before the descriptive analysis. After assuring the
reliability of the dataset, the correlation test, multiple regression test and analysis of variance
(ANOVA) test were carried out to fulfil the requirements of meeting the research objectives.
Five determinants for value addition were identified along with the key themes for each area.
They are staffing, delivery process, use of tools, governance, and technology infrastructure.
The cross-functional and self-organised teams built around the value streams, employing a
properly interconnected software delivery process with the right governance in the delivery
pipelines, selection of tools and providing the right infrastructure increases the value delivery.
Moreover, the constraints for value addition are poor interconnection in the internal processes,
rigid functional hierarchies, inaccurate selections and uses of tools, inflexible team
arrangements and inadequate focus for the technology infrastructure. The findings add to the
existing body of knowledge on increasing the value addition by employing effective processes,
practices and tools and the impacts of inaccurate applications the same in the global software
engineering industry
In her own words: exploring the subjectivity of Freud’s ‘teacher’ Anna von Lieben
This project is inspired by Roy Porter (1985), who draws attention to the patient-shaped gap in medical history, and Rita Charon (2006), who emphasises the need to bring the patient’s narrative to the fore in the practice of medicine. The principal aim was to devise a means of accessing the lived experience of a patient who is no longer alive in order to gain an understanding of her narrative. Anna von Lieben was identified as a suitable subject as she wrote a substantial quantity of autopathographical poetry suitable for analysis and her status as Freud’s patient makes her a person of significant interest to the history of medicine.
The poems were analysed using Interpretative Phenomenological Analysis (IPA), an idiographic and inductive method of qualitative research, based on Heideggerian hermeneutic phenomenology, which explores the lived experience of individuals and is committed to understanding the first-person perspective from the third-person position.
The main findings from the IPA study reveal that Anna experienced a prolonged period of malaise, starting in late adolescence which she believed to result, at least partly, from a traumatic experience which occurred at that time. The analysis also indicates that Anna suffered from deep and lasting feelings of guilt and shame. The discovery of additional family documentation enabled me to contextualise and add substance to the findings of the IPA study. Anna’s husband’s diaries in particular reveal that Anna:
• had a severe and longstanding gynaecological disorder
• suffered from severe morphinism
• did not benefit from Freud’s treatment which seemed neither to ease her symptoms nor identify any cause
• was treated in Paris, not by Jean-Martin Charcot as previously supposed, but by a French hydrotherapist, Theodore Keller, who appears to have become a person of considerable significance in her life.
The above findings led me to investigate Anna’s comorbidities (gynaecological disease and morphinism) and to show how those could be responsible for much of the symptomatology identified by Freud as ‘hysteria’. I then explore the possibility that her psychotic-like experiences could have been iatrogenically induced by her treatment first by Keller and then by Freud. Finally, I propose a fourfold set of hypotheses as an alternative to Freud’s diagnosis of hysteria
- …