13,738 research outputs found

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    Annual report of the officers of the town of Jackson, New Hampshire for the fiscal year ending December 31, 2022.

    Get PDF
    This is an annual report containing vital statistics for a town/city in the state of New Hampshire

    Consent and the Construction of the Volunteer: Institutional Settings of Experimental Research on Human Beings in Britain during the Cold War

    Get PDF
    This study challenges the primacy of consent in the history of human experimentation and argues that privileging the cultural frameworks adds nuance to our understanding of the construction of the volunteer in the period 1945 to 1970. Historians and bio-ethicists have argued that medical ethics codes have marked out the parameters of using people as subjects in medical scientific research and that the consent of the subjects was fundamental to their status as volunteers. However, the temporality of the creation of medical ethics codes means that they need to be understood within their historical context. That medical ethics codes arose from a specific historical context rather than a concerted and conscious determination to safeguard the well-being of subjects needs to be acknowledged. The British context of human experimentation is under-researched and there has been even less focus on the cultural frameworks within which experiments took place. This study demonstrates, through a close analysis of the Medical Research Council's Common Cold Research Unit (CCRU) and the government's military research facility, the Chemical Defence Experimental Establishment, Porton Down (Porton), that the `volunteer' in human experiments was a subjective entity whose identity was specific to the institution which recruited and made use of the subject. By examining representations of volunteers in the British press, the rhetoric of the government's collectivist agenda becomes evident and this fed into the institutional construction of the volunteer at the CCRU. In contrast, discussions between Porton scientists, staff members, and government officials demonstrate that the use of military personnel in secret chemical warfare experiments was far more complex. Conflicting interests of the military, the government and the scientific imperative affected how the military volunteer was perceived

    Traffic Generation using Containerization for Machine Learning

    Get PDF

    Strategies for Early Learners

    Get PDF
    Welcome to learning about how to effectively plan curriculum for young children. This textbook will address: • Developing curriculum through the planning cycle • Theories that inform what we know about how children learn and the best ways for teachers to support learning • The three components of developmentally appropriate practice • Importance and value of play and intentional teaching • Different models of curriculum • Process of lesson planning (documenting planned experiences for children) • Physical, temporal, and social environments that set the stage for children’s learning • Appropriate guidance techniques to support children’s behaviors as the self-regulation abilities mature. • Planning for preschool-aged children in specific domains including o Physical development o Language and literacy o Math o Science o Creative (the visual and performing arts) o Diversity (social science and history) o Health and safety • Making children’s learning visible through documentation and assessmenthttps://scholar.utc.edu/open-textbooks/1001/thumbnail.jp

    Queer spies in British Cold War culture: literature, film, theatre and television

    Get PDF
    This PhD thesis investigates how male homosexuality has been represented in British spy fiction from the 1950s to the 2010s in multiple media: literature, film, television and theatre. Due mainly to the betrayal of the Cambridge Spy ring around the middle of the century, British culture has associated spies with homosexuality, while the wider Anglophone world was in the grip of a homophobic atmosphere created by McCarthy's Red Scare. My thesis explores how this history is reflected in the spy genre from the Cold War to the present, in which male homosexuality and secret agency intersect as “queer”, in so far as they were both considered to be discreet and criminal, existing outside of the heteronormative order. By following multiple texts across media and time, I discuss how some writers, television and film directors and actors update queer identity in spy fiction, creating a shifting image of queer spies through decades. I refer to the findings of adaptation studies and queer studies, along with numerous studies on spy fiction. I conclude that the interrelation of different media has contributed to the re-drawing of queer identity in spy fiction. These developments have enabled the spies' queer identity to transcend its pejorative history in British culture, towards its more flexible and pliant sense which is designated by the term's modern usage. I also discuss that spies’ homosexuality has been represented as a fleeting ghost in most of the texts examined, hovering on the margins of pages and screen. Although homosexuality is not “the love that dare not speak its name” anymore, clandestine queer spies have been preserved as spectral others in the genre for many years. Spy fiction is a cultural repository retaining the memory of violence inflicted against those who have been called “queer” in twentieth century Britain, and the spectral nature of queer spies narrates this history reaching back to the Oscar Wilde trial in 1895, from which point British queer identity as we know now developed. This thesis benefits the study of spy fiction by filling a gap in the investigation of homosexual representation. It also contributes to the field of gender studies of literature, film, television, and theatre by illustrating queer history in a genre which has not received a great deal of focus on its representation of homosexuality. Spy fiction occupies a central position in British popular culture, and by exploring this genre in terms of homosexuality, this research will identify the role which same-sex desire has historically played in the British cultural imagination

    What is the importance of sperm subpopulations?

    Get PDF
    .The study of sperm subpopulations spans three decades. The origin, meaning, and practical significance, however, are less clear. Current technology for assessing sperm morphology (CASA-Morph) and motility (CASA-Mot) has enabled the accurate evaluation of these features, and there are many options for data classification. Subpopulations could occur as a result of the stage of development of each spermatozoon in the subpopulation. Spermatogenesis might contribute to the production of these subpopulations. Insights from evolutionary biology and recent molecular research are indicative of the diversity among male gametes that could occur from unequal sharing of transcripts and other elements through cytoplasmic bridges between spermatids. Sperm cohorts exiting the gonads would contain different RNA and protein contents, affecting the spermatozoon physiology and associations with the surrounding environmental milieu. Subsequently, these differences could affect how spermatozoa interact with the environmental milieu (maturation, mixing with seminal plasma, and interacting with the environmental milieu, or female genital tract and female gamete). The emergence of sperm subpopulations as an outcome of evolution, related to the reproductive strategies of the species, genital tract structures, and copulatory and fertilization processes. This kind of approach in determining the importance of sperm subpopulations in fertilization capacity should have a practical impact for conducting reproductive technologies, inspiring and enabling new ways for the more efficient use of spermatozoa in the medical, animal breeding, and conservation fields. This manuscript is a contribution to the Special Issue in memory of Dr. Duane GarnerS
    • …
    corecore