8,110 research outputs found

    Fall armyworm (Spodoptera frugiperda Smith) feeding elicits differential defense responses in upland and lowland switchgrass

    Get PDF
    Switchgrass (Panicum virgatum L.) is a low input, high biomass perennial grass being developed for the bioenergy sector. Upland and lowland cultivars can differ in their responses to insect herbivory. Fall armyworm [FAW; Spodoptera frugiperda JE Smith (Lepidoptera: Noctuidae)] is a generalist pest of many plant species and can feed on switchgrass as well. Here, in two different trials, FAW larval mass were significantly reduced when fed on lowland cultivar Kanlow relative to larvae fed on upland cultivar Summer plants after 10 days. Hormone content of plants indicated elevated levels of the plant defense hormone jasmonic acid (JA) and its bioactive conjugate JA-Ile although significant differences were not observed. Conversely, the precursor to JA, 12-oxo-phytodienoic acid (OPDA) levels were significantly different between FAW fed Summer and Kanlow plants raising the possibility of differential signaling by OPDA in the two cultivars. Global transcriptome analysis revealed a stronger response in Kanlow plant relative to Summer plants. Among these changes were a preferential upregulation of several branches of terpenoid and phenylpropanoid biosynthesis in Kanlow plants suggesting that enhanced biosynthesis or accumulation of antifeedants could have negatively impacted FAW larval mass gain on Kanlow plants relative to Summer plants. A comparison of the switchgrass-FAW RNA-Seq dataset to those from maize-FAW and switchgrass-aphid interactions revealed that key components of plant responses to herbivory, including induction of JA biosynthesis, key transcription factors and JA-inducible genes were apparently conserved in switchgrass and maize. In addition, these data affirm earlier studies with FAW and aphids that the cultivar Kanlow can provide useful genetics for the breeding of switchgrass germplasm with improved insect resistance

    Defending against Sybil Devices in Crowdsourced Mapping Services

    Full text link
    Real-time crowdsourced maps such as Waze provide timely updates on traffic, congestion, accidents and points of interest. In this paper, we demonstrate how lack of strong location authentication allows creation of software-based {\em Sybil devices} that expose crowdsourced map systems to a variety of security and privacy attacks. Our experiments show that a single Sybil device with limited resources can cause havoc on Waze, reporting false congestion and accidents and automatically rerouting user traffic. More importantly, we describe techniques to generate Sybil devices at scale, creating armies of virtual vehicles capable of remotely tracking precise movements for large user populations while avoiding detection. We propose a new approach to defend against Sybil devices based on {\em co-location edges}, authenticated records that attest to the one-time physical co-location of a pair of devices. Over time, co-location edges combine to form large {\em proximity graphs} that attest to physical interactions between devices, allowing scalable detection of virtual vehicles. We demonstrate the efficacy of this approach using large-scale simulations, and discuss how they can be used to dramatically reduce the impact of attacks against crowdsourced mapping services.Comment: Measure and integratio

    PlaceRaider: Virtual Theft in Physical Spaces with Smartphones

    Full text link
    As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of sensor malware has been developing that leverages these sensors to steal information from the physical environment (e.g., researchers have recently demonstrated how malware can listen for spoken credit card numbers through the microphone, or feel keystroke vibrations using the accelerometer). Yet the possibilities of what malware can see through a camera have been understudied. This paper introduces a novel visual malware called PlaceRaider, which allows remote attackers to engage in remote reconnaissance and what we call virtual theft. Through completely opportunistic use of the camera on the phone and other sensors, PlaceRaider constructs rich, three dimensional models of indoor environments. Remote burglars can thus download the physical space, study the environment carefully, and steal virtual objects from the environment (such as financial documents, information on computer monitors, and personally identifiable information). Through two human subject studies we demonstrate the effectiveness of using mobile devices as powerful surveillance and virtual theft platforms, and we suggest several possible defenses against visual malware

    Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

    Full text link
    Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demonstrate that VPSes are vulnerable to the injection of hidden commands - audio obscured by noise that is correctly recognized by a VPS but not by human beings. Such attacks, though, are often highly dependent on white-box knowledge of a specific machine learning model and limited to specific microphones and speakers, making their use across different acoustic hardware platforms (and thus their practicality) limited. In this paper, we break these dependencies and make hidden command attacks more practical through model-agnostic (blackbox) attacks, which exploit knowledge of the signal processing algorithms commonly used by VPSes to generate the data fed into machine learning systems. Specifically, we exploit the fact that multiple source audio samples have similar feature vectors when transformed by acoustic feature extraction algorithms (e.g., FFTs). We develop four classes of perturbations that create unintelligible audio and test them against 12 machine learning models, including 7 proprietary models (e.g., Google Speech API, Bing Speech API, IBM Speech API, Azure Speaker API, etc), and demonstrate successful attacks against all targets. Moreover, we successfully use our maliciously generated audio samples in multiple hardware configurations, demonstrating effectiveness across both models and real systems. In so doing, we demonstrate that domain-specific knowledge of audio signal processing represents a practical means of generating successful hidden voice command attacks

    Five feet high and rising : cities and flooding in the 21st century

    Get PDF
    Urban flooding is an increasingly important issue. Disaster statistics appear to show flood events are becoming more frequent, with medium-scale events increasing fastest. The impact of flooding is driven by a combination of natural and human-induced factors. As recent flood events in Pakistan, Brazil, Sri Lanka and Australia show, floods can occur in widespread locations and can sometimes overwhelm even the best prepared countries and cities. There are known and tested measures for urban flood risk management, typically classified as structural or engineered measures, and non-structural, management techniques. A combination of measures to form an integrated management approach is most likely to be successful in reducing flood risk. In the short term and for developing countries in particular, the factors affecting exposure and vulnerability are increasing at the fastest rate as urbanization puts more people and more assets at risk. In the longer term, however, climate scenarios are likely to be one of the most important drivers of future changes in flood risk. Due to the large uncertainties in projections of climate change, adaptation to the changing risk needs to be flexible to a wide range of future scenarios and to be able to cope with potentially large changes in sea level, rainfall intensity and snowmelt. Climate uncertainty and budgetary, institutional and practical constraints are likely to lead to a combining of structural and non-structural measures for urban flood risk management, and arguably, to a move away from what is sometimes an over-reliance on hard-engineered defenses and toward more adaptable and incremental non-structural solutions.Hazard Risk Management,Wetlands,Natural Disasters,Adaptation to Climate Change,Climate Change Impacts
    • …
    corecore