18,016 research outputs found

    Narrative in picture books, or, The paper that should have had slides

    Get PDF
    In this sense picture books resemble other combinative art forms, such as opera or musical theater, films, and ballet; older examples include the courtly masque and the emblem book. This resemblance is good for me, since I thrive on analogies (I was apparently permanently warped by that section of the SATs), and I therefore often find it useful to consider picture books along with those other media, without, of course, ignoring the fact that picture books also have their own individual charms and characteristics. I'd like to examine the aspects of the picture book the text, the art and other physical factors and then discuss how these narratives work together to affect each other and the final outcome.published or submitted for publicatio

    Bronze Age moss fibre garments from Scotland – the jury’s out

    Get PDF
    In the light of recent discoveries of early to middle Bronze Age burials with mats and fibrous material in Scotland, for example at Langwell farm and Forteviot, it was deemed timely to re-evaluate earlier finds of this period, several of which were discovered and initially reported on nearly a century ago. As part of this research it was noted that three Bronze Age finds from the old literature were reported as clothing or shrouds made of hair moss (Polytrichum commune). Three of these are reassessed here, with a detailed re-examination of the “hair moss apron” from North Cairn Farm. Technological analysis of this find showed no evidence for the twining previously reported and SEM fibre analysis shows that it is unlikely to be hair moss or indeed Bronze Age. However, there is other evidence for hair moss artefacts from other British Bronze Age and Roman contexts. These suggest it is possible that hair moss fibre was used in Scotland in the Bronze Age, but that the North Cairn Farm fibrous object should no longer be considered among this evidence

    Machine Learning Models that Remember Too Much

    Full text link
    Machine learning (ML) is becoming a commodity. Numerous ML frameworks and services are available to data holders who are not ML experts but want to train predictive models on their data. It is important that ML models trained on sensitive inputs (e.g., personal images or documents) not leak too much information about the training data. We consider a malicious ML provider who supplies model-training code to the data holder, does not observe the training, but then obtains white- or black-box access to the resulting model. In this setting, we design and implement practical algorithms, some of them very similar to standard ML techniques such as regularization and data augmentation, that "memorize" information about the training dataset in the model yet the model is as accurate and predictive as a conventionally trained model. We then explain how the adversary can extract memorized information from the model. We evaluate our techniques on standard ML tasks for image classification (CIFAR10), face recognition (LFW and FaceScrub), and text analysis (20 Newsgroups and IMDB). In all cases, we show how our algorithms create models that have high predictive power yet allow accurate extraction of subsets of their training data

    PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware

    Get PDF
    PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents. Similarly to other scripting languages used by malware, PowerShell attacks are challenging to analyze due to the extensive use of multiple obfuscation layers, which make the real malicious code hard to be unveiled. To the best of our knowledge, a comprehensive solution for properly de-obfuscating such attacks is currently missing. In this paper, we present PowerDrive, an open-source, static and dynamic multi-stage de-obfuscator for PowerShell attacks. PowerDrive instruments the PowerShell code to progressively de-obfuscate it by showing the analyst the employed obfuscation steps. We used PowerDrive to successfully analyze thousands of PowerShell attacks extracted from various malware vectors and executables. The attained results show interesting patterns used by attackers to devise their malicious scripts. Moreover, we provide a taxonomy of behavioral models adopted by the analyzed codes and a comprehensive list of the malicious domains contacted during the analysis

    A New Index for Predicting Catastrophes by Madhur Anand

    Get PDF
    A Review of Madhur Anand\u27s A New Index for Predicting Catastrophes
    • …
    corecore