11,226 research outputs found

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    PrivLava: Synthesizing Relational Data with Foreign Keys under Differential Privacy

    Full text link
    Answering database queries while preserving privacy is an important problem that has attracted considerable research attention in recent years. A canonical approach to this problem is to use synthetic data. That is, we replace the input database R with a synthetic database R* that preserves the characteristics of R, and use R* to answer queries. Existing solutions for relational data synthesis, however, either fail to provide strong privacy protection, or assume that R contains a single relation. In addition, it is challenging to extend the existing single-relation solutions to the case of multiple relations, because they are unable to model the complex correlations induced by the foreign keys. Therefore, multi-relational data synthesis with strong privacy guarantees is an open problem. In this paper, we address the above open problem by proposing PrivLava, the first solution for synthesizing relational data with foreign keys under differential privacy, a rigorous privacy framework widely adopted in both academia and industry. The key idea of PrivLava is to model the data distribution in R using graphical models, with latent variables included to capture the inter-relational correlations caused by foreign keys. We show that PrivLava supports arbitrary foreign key references that form a directed acyclic graph, and is able to tackle the common case when R contains a mixture of public and private relations. Extensive experiments on census data sets and the TPC-H benchmark demonstrate that PrivLava significantly outperforms its competitors in terms of the accuracy of aggregate queries processed on the synthetic data.Comment: This is an extended version of a SIGMOD 2023 pape

    Pollution-induced community tolerance in freshwater biofilms – from molecular mechanisms to loss of community functions

    Get PDF
    Exposure to herbicides poses a threat to aquatic biofilms by affecting their community structure, physiology and function. These changes render biofilms to become more tolerant, but on the downside community tolerance has ecologic costs. A concept that addresses induced community tolerance to a pollutant (PICT) was introduced by Blanck and Wängberg (1988). The basic principle of the concept is that microbial communities undergo pollution-induced succession when exposed to a pollutant over a long period of time, which changes communities structurally and functionally and enhancing tolerance to the pollutant exposure. However, the mechanisms of tolerance and the ecologic consequences were hardly studied up to date. This thesis addresses the structural and functional changes in biofilm communities and applies modern molecular methods to unravel molecular tolerance mechanisms. Two different freshwater biofilm communities were cultivated for a period of five weeks, with one of the communities being contaminated with 4 μg L-1 diuron. Subsequently, the communities were characterized for structural and functional differences, especially focusing on their crucial role of photosynthesis. The community structure of the autotrophs was assessed using HPLC-based pigment analysis and their functional alterations were investigated using Imaging-PAM fluorometry to study photosynthesis and community oxygen profiling to determine net primary production. Then, the molecular fingerprints of the communities were measured with meta-transcriptomics (RNA-Seq) and GC-based community metabolomics approaches and analyzed with respect to changes in their molecular functions. The communities were acute exposed to diuron for one hour in a dose-response design, to reveal a potential PICT and uncover related adaptation to diuron exposure. The combination of apical and molecular methods in a dose-response design enabled the linkage of functional effects of diuron exposure and underlying molecular mechanisms based on a sensitivity analysis. Chronic exposure to diuron impaired freshwater biofilms in their biomass accrual. The contaminated communities particularly lost autotrophic biomass, reflected by the decrease in specific chlorophyll a content. This loss was associated with a change in the molecular fingerprint of the communities, which substantiates structural and physiological changes. The decline in autotrophic biomass could be due to a primary loss of sensitive autotrophic organisms caused by the selection of better adapted species in the course of chronic exposure. Related to this hypothesis, an increase in diuron tolerance has been detected in the contaminated communities and molecular mechanisms facilitating tolerance have been found. It was shown that genes of the photosystem, reductive-pentose phosphate cycle and arginine metabolism were differentially expressed among the communities and that an increased amount of potential antioxidant degradation products was found in the contaminated communities. This led to the hypothesis that contaminated communities may have adapted to oxidative stress, making them less sensitive to diuron exposure. Moreover, the photosynthetic light harvesting complex was altered and the photoprotective xanthophyll cycle was increased in the contaminated communities. Despite these adaptation strategies, the loss of autotrophic biomass has been shown to impair primary production. This impairment persisted even under repeated short-term exposure, so that the tolerance mechanisms cannot safeguard primary production as a key function in aquatic systems.:1. The effect of chemicals on organisms and their functions .............................. 1 1.1 Welcome to the anthropocene .......................................................................... 1 1.2 From cellular stress responses to ecosystem resilience ................................... 3 1.2.1 The individual pursuit for homeostasis ....................................................... 3 1.2.2 Stability from diversity ................................................................................. 5 1.3 Community ecotoxicology - a step forward in monitoring the effects of chemical pollution? ................................................................................................................. 6 1.4 Functional ecotoxicological assessment of microbial communities ................... 9 1.5 Molecular tools – the key to a mechanistic understanding of stressor effects from a functional perspective in microbial communities? ...................................... 12 2. Aims and Hypothesis ......................................................................................... 14 2.1 Research question .......................................................................................... 14 2.2 Hypothesis and outline .................................................................................... 15 2.3 Experimental approach & concept .................................................................. 16 2.3.1 Aquatic freshwater biofilms as model community ..................................... 16 2.3.2 Diuron as model herbicide ........................................................................ 17 2.3.3 Experimental design ................................................................................. 18 3. Structural and physiological changes in microbial communities after chronic exposure - PICT and altered functional capacity ................................................. 21 3.1 Introduction ..................................................................................................... 21 3.2 Methods .......................................................................................................... 23 3.2.1 Biofilm cultivation ...................................................................................... 23 3.2.2 Dry weight and autotrophic index ............................................................. 23 3.2.4 Pigment analysis of periphyton ................................................................. 23 3.2.4.1 In-vivo pigment analysis for community characterization ....................... 24 3.2.4.2 In-vivo pigment analysis based on Imaging-PAM fluorometry ............... 24 3.2.4.3 In-vivo pigment fluorescence for tolerance detection ............................. 26 3.2.4.4 Ex-vivo pigment analysis by high-pressure liquid-chromatography ....... 27 3.2.5 Community oxygen metabolism measurements ....................................... 28 3.3 Results and discussion ................................................................................... 29 3.3.1 Comparison of the structural community parameters ............................... 29 3.3.2 Photosynthetic activity and primary production of the communities after selection phase ................................................................................................. 33 3.3.3 Acquisition of photosynthetic tolerance .................................................... 34 3.3.4 Primary production at exposure conditions ............................................... 36 3.3.5 Tolerance detection in primary production ................................................ 37 3.4 Summary and Conclusion ........................................................................... 40 4. Community gene expression analysis by meta-transcriptomics ................... 41 4.1 Introduction to meta-transcriptomics ............................................................... 41 4.2. Methods ......................................................................................................... 43 4.2.1 Sampling and RNA extraction................................................................... 43 4.2.2 RNA sequencing analysis ......................................................................... 44 4.2.3 Data assembly and processing................................................................. 45 4.2.4 Prioritization of contigs and annotation ..................................................... 47 4.2.5 Sensitivity analysis of biological processes .............................................. 48 4.3 Results and discussion ................................................................................... 48 4.3.1 Characterization of the meta-transcriptomic fingerprints .......................... 49 4.3.2 Insights into community stress response mechanisms using trend analysis (DRomic’s) ......................................................................................................... 51 4.3.3 Response pattern in the isoform PS genes .............................................. 63 4.5 Summary and conclusion ................................................................................ 65 5. Community metabolome analysis ..................................................................... 66 5.1 Introduction to community metabolomics ........................................................ 66 5.2 Methods .......................................................................................................... 68 5.2.1 Sampling, metabolite extraction and derivatisation................................... 68 5.2.2 GC-TOF-MS analysis ............................................................................... 69 5.2.3 Data processing and statistical analysis ................................................... 69 5.3 Results and discussion ................................................................................... 70 5.3.1 Characterization of the metabolic fingerprints .......................................... 70 5.3.2 Difference in the metabolic fingerprints .................................................... 71 5.3.3 Differential metabolic responses of the communities to short-term exposure of diuron ............................................................................................................ 73 5.4 Summary and conclusion ................................................................................ 78 6. Synthesis ............................................................................................................. 79 6.1 Approaches and challenges for linking molecular data to functional measurements ...................................................................................................... 79 6.2 Methods .......................................................................................................... 83 6.2.1 Summary on the data ............................................................................... 83 6.2.2 Aggregation of molecular data to index values (TELI and MELI) .............. 83 6.2.3 Functional annotation of contigs and metabolites using KEGG ................ 83 6.3 Results and discussion ................................................................................... 85 6.3.1 Results of aggregation techniques ........................................................... 85 6.3.2 Sensitivity analysis of the different molecular approaches and endpoints 86 6.3.3 Mechanistic view of the molecular stress responses based on KEGG functions ............................................................................................................ 89 6.4 Consolidation of the results – holistic interpretation and discussion ............... 93 6.4.1 Adaptation to chronic diuron exposure - from molecular changes to community effects.............................................................................................. 93 6.4.2 Assessment of the ecological costs of Pollution-induced community tolerance based on primary production ............................................................. 94 6.5 Outlook ............................................................................................................ 9

    Countermeasures for the majority attack in blockchain distributed systems

    Get PDF
    La tecnología Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus características únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraído o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnología. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en Ingeniería de Sistemas y Computació

    PreFair: Privately Generating Justifiably Fair Synthetic Data

    Full text link
    When a database is protected by Differential Privacy (DP), its usability is limited in scope. In this scenario, generating a synthetic version of the data that mimics the properties of the private data allows users to perform any operation on the synthetic data, while maintaining the privacy of the original data. Therefore, multiple works have been devoted to devising systems for DP synthetic data generation. However, such systems may preserve or even magnify properties of the data that make it unfair, endering the synthetic data unfit for use. In this work, we present PreFair, a system that allows for DP fair synthetic data generation. PreFair extends the state-of-the-art DP data generation mechanisms by incorporating a causal fairness criterion that ensures fair synthetic data. We adapt the notion of justifiable fairness to fit the synthetic data generation scenario. We further study the problem of generating DP fair synthetic data, showing its intractability and designing algorithms that are optimal under certain assumptions. We also provide an extensive experimental evaluation, showing that PreFair generates synthetic data that is significantly fairer than the data generated by leading DP data generation mechanisms, while remaining faithful to the private data.Comment: 15 pages, 11 figure

    The cosmic waltz of Coma Berenices and Latyshev 2 (Group X). Membership, phase-space structure, mass, and energy distributions

    Full text link
    Context. Open clusters (OCs) are fundamental benchmarks where theories of star formation and stellar evolution can be tested and validated. Coma Ber and Latyshev 2 (Group X) are the second and third OCs closest to the Sun, making them excellent targets to search for low-mass stars and ultra-cool dwarfs. In addition, this pair will experience a flyby in 10-16 Myr which makes it a benchmark to test OCs pair interactions. Aims. We aim at analysing the membership, luminosity, mass, phase-space (i.e., positions and velocities), and energy distributions for Coma Ber and Latyshev 2 and test the hypothesis of the mixing of their populations at the encounter time. Methods. We develop a new phase-space membership methodology and apply it to Gaia data. With the recovered members we infer the phase-space, luminosity and mass distributions using publicly available Bayesian inference codes. Then, with a publicly available orbit integration code and members' positions and velocities, we integrate their orbits 20 Myr into the future. Results. In Coma Ber, we identify 302 candidate members distributed in the core and tidal tails. The tails are dynamically cold and asymmetrically populated. The stellar system called Group X is made of two structures: the disrupted OC Latyshev 2 (186 candidate members) and a loose stellar association called Mecayotl 1 (146 candidate members), both of them will fly by Coma Ber in 11.3±0.511.3\pm0.5 Myr and 14.0±0.614.0\pm0.6 Myr, respectively, and each other in 8.1±1.38.1\pm1.3 Myr. Conclusions. We study the dynamical properties of the core and tails of Coma Ber and also confirm the existence of the OC Latyshev 2 and its neighbour stellar association Mecayotl 1. Although these three systems will experience encounters we find no evidence supporting the mixing of their populations.Comment: 25 pages, 19 figures, accepted for publication in Astronomy & Astrophysic

    The place where curses are manufactured : four poets of the Vietnam War

    Get PDF
    The Vietnam War was unique among American wars. To pinpoint its uniqueness, it was necessary to look for a non-American voice that would enable me to articulate its distinctiveness and explore the American character as observed by an Asian. Takeshi Kaiko proved to be most helpful. From his novel, Into a Black Sun, I was able to establish a working pair of 'bookends' from which to approach the poetry of Walter McDonald, Bruce Weigl, Basil T. Paquet and Steve Mason. Chapter One is devoted to those seemingly mismatched 'bookends,' Walt Whitman and General William C. Westmoreland, and their respective anthropocentric and technocentric visions of progress and the peculiarly American concept of the "open road" as they manifest themselves in Vietnam. In Chapter, Two, I analyze the war poems of Walter McDonald. As a pilot, writing primarily about flying, his poetry manifests General Westmoreland's technocentric vision of the 'road' as determined by and manifest through technology. Chapter Three focuses on the poems of Bruce Weigl. The poems analyzed portray the literal and metaphorical descent from the technocentric, 'numbed' distance of aerial warfare to the world of ground warfare, and the initiation of a 'fucking new guy,' who discovers the contours of the self's interior through a set of experiences that lead from from aerial insertion into the jungle to the degradation of burning human feces. Chapter Four, devoted to the thirteen poems of Basil T. Paquet, focuses on the continuation of the descent begun in Chapter Two. In his capacity as a medic, Paquet's entire body of poems details his quotidian tasks which entail tending the maimed, the mortally wounded and the dead. The final chapter deals with Steve Mason's JohnnY's Song, and his depiction of the plight of Vietnam veterans back in "The World" who are still trapped inside the interior landscape of their individual "ghettoes" of the soul created by their war-time experiences

    The MeerKAT Galaxy Cluster Legacy Survey: Survey overview and highlights

    Get PDF
    MeerKAT’s large number (64) of 13.5 m diameter antennas, spanning 8 km with a densely packed 1 km core, create a powerful instrument for wide-area surveys, with high sensitivity over a wide range of angular scales. The MeerKAT Galaxy Cluster Legacy Survey (MGCLS) is a programme of long-track MeerKAT L-band (900−1670 MHz) observations of 115 galaxy clusters, observed for ∼6−10 h each in full polarisation. The first legacy product data release (DR1), made available with this paper, includes the MeerKAT visibilities, basic image cubes at ∼8″ resolution, and enhanced spectral and polarisation image cubes at ∼8″ and 15″ resolutions. Typical sensitivities for the full-resolution MGCLS image products range from ∼3−5 μJy beam−1. The basic cubes are full-field and span 2° × 2°. The enhanced products consist of the inner 1.2° × 1.2° field of view, corrected for the primary beam. The survey is fully sensitive to structures up to ∼10′ scales, and the wide bandwidth allows spectral and Faraday rotation mapping. Relatively narrow frequency channels (209 kHz) are also used to provide H I mapping in windows of 0 < z < 0.09 and 0.19 < z < 0.48. In this paper, we provide an overview of the survey and the DR1 products, including caveats for usage. We present some initial results from the survey, both for their intrinsic scientific value and to highlight the capabilities for further exploration with these data. These include a primary-beam-corrected compact source catalogue of ∼626 000 sources for the full survey and an optical and infrared cross-matched catalogue for compact sources in the primary-beam-corrected areas of Abell 209 and Abell S295. We examine dust unbiased star-formation rates as a function of cluster-centric radius in Abell 209, extending out to 3.5 R 200. We find no dependence of the star-formation rate on distance from the cluster centre, and we observe a small excess of the radio-to-100 μm flux ratio towards the centre of Abell 209 that may reflect a ram pressure enhancement in the denser environment. We detect diffuse cluster radio emission in 62 of the surveyed systems and present a catalogue of the 99 diffuse cluster emission structures, of which 56 are new. These include mini-halos, halos, relics, and other diffuse structures for which no suitable characterisation currently exists. We highlight some of the radio galaxies that challenge current paradigms, such as trident-shaped structures, jets that remain well collimated far beyond their bending radius, and filamentary features linked to radio galaxies that likely illuminate magnetic flux tubes in the intracluster medium. We also present early results from the H I analysis of four clusters, which show a wide variety of H I mass distributions that reflect both sensitivity and intrinsic cluster effects, and the serendipitous discovery of a group in the foreground of Abell 3365

    The determinants of value addition: a crtitical analysis of global software engineering industry in Sri Lanka

    Get PDF
    It was evident through the literature that the perceived value delivery of the global software engineering industry is low due to various facts. Therefore, this research concerns global software product companies in Sri Lanka to explore the software engineering methods and practices in increasing the value addition. The overall aim of the study is to identify the key determinants for value addition in the global software engineering industry and critically evaluate the impact of them for the software product companies to help maximise the value addition to ultimately assure the sustainability of the industry. An exploratory research approach was used initially since findings would emerge while the study unfolds. Mixed method was employed as the literature itself was inadequate to investigate the problem effectively to formulate the research framework. Twenty-three face-to-face online interviews were conducted with the subject matter experts covering all the disciplines from the targeted organisations which was combined with the literature findings as well as the outcomes of the market research outcomes conducted by both government and nongovernment institutes. Data from the interviews were analysed using NVivo 12. The findings of the existing literature were verified through the exploratory study and the outcomes were used to formulate the questionnaire for the public survey. 371 responses were considered after cleansing the total responses received for the data analysis through SPSS 21 with alpha level 0.05. Internal consistency test was done before the descriptive analysis. After assuring the reliability of the dataset, the correlation test, multiple regression test and analysis of variance (ANOVA) test were carried out to fulfil the requirements of meeting the research objectives. Five determinants for value addition were identified along with the key themes for each area. They are staffing, delivery process, use of tools, governance, and technology infrastructure. The cross-functional and self-organised teams built around the value streams, employing a properly interconnected software delivery process with the right governance in the delivery pipelines, selection of tools and providing the right infrastructure increases the value delivery. Moreover, the constraints for value addition are poor interconnection in the internal processes, rigid functional hierarchies, inaccurate selections and uses of tools, inflexible team arrangements and inadequate focus for the technology infrastructure. The findings add to the existing body of knowledge on increasing the value addition by employing effective processes, practices and tools and the impacts of inaccurate applications the same in the global software engineering industry

    In her own words: exploring the subjectivity of Freud’s ‘teacher’ Anna von Lieben

    Get PDF
    This project is inspired by Roy Porter (1985), who draws attention to the patient-shaped gap in medical history, and Rita Charon (2006), who emphasises the need to bring the patient’s narrative to the fore in the practice of medicine. The principal aim was to devise a means of accessing the lived experience of a patient who is no longer alive in order to gain an understanding of her narrative. Anna von Lieben was identified as a suitable subject as she wrote a substantial quantity of autopathographical poetry suitable for analysis and her status as Freud’s patient makes her a person of significant interest to the history of medicine. The poems were analysed using Interpretative Phenomenological Analysis (IPA), an idiographic and inductive method of qualitative research, based on Heideggerian hermeneutic phenomenology, which explores the lived experience of individuals and is committed to understanding the first-person perspective from the third-person position. The main findings from the IPA study reveal that Anna experienced a prolonged period of malaise, starting in late adolescence which she believed to result, at least partly, from a traumatic experience which occurred at that time. The analysis also indicates that Anna suffered from deep and lasting feelings of guilt and shame. The discovery of additional family documentation enabled me to contextualise and add substance to the findings of the IPA study. Anna’s husband’s diaries in particular reveal that Anna: • had a severe and longstanding gynaecological disorder • suffered from severe morphinism • did not benefit from Freud’s treatment which seemed neither to ease her symptoms nor identify any cause • was treated in Paris, not by Jean-Martin Charcot as previously supposed, but by a French hydrotherapist, Theodore Keller, who appears to have become a person of considerable significance in her life. The above findings led me to investigate Anna’s comorbidities (gynaecological disease and morphinism) and to show how those could be responsible for much of the symptomatology identified by Freud as ‘hysteria’. I then explore the possibility that her psychotic-like experiences could have been iatrogenically induced by her treatment first by Keller and then by Freud. Finally, I propose a fourfold set of hypotheses as an alternative to Freud’s diagnosis of hysteria
    • …
    corecore