8,110 research outputs found
Fall armyworm (Spodoptera frugiperda Smith) feeding elicits differential defense responses in upland and lowland switchgrass
Switchgrass (Panicum virgatum L.) is a low input, high biomass perennial grass being developed for the bioenergy sector. Upland and lowland cultivars can differ in their responses to insect herbivory. Fall armyworm [FAW; Spodoptera frugiperda JE Smith (Lepidoptera: Noctuidae)] is a generalist pest of many plant species and can feed on switchgrass as well. Here, in two different trials, FAW larval mass were significantly reduced when fed on lowland cultivar Kanlow relative to larvae fed on upland cultivar Summer plants after 10 days. Hormone content of plants indicated elevated levels of the plant defense hormone jasmonic acid (JA) and its bioactive conjugate JA-Ile although significant differences were not observed. Conversely, the precursor to JA, 12-oxo-phytodienoic acid (OPDA) levels were significantly different between FAW fed Summer and Kanlow plants raising the possibility of differential signaling by OPDA in the two cultivars. Global transcriptome analysis revealed a stronger response in Kanlow plant relative to Summer plants. Among these changes were a preferential upregulation of several branches of terpenoid and phenylpropanoid biosynthesis in Kanlow plants suggesting that enhanced biosynthesis or accumulation of antifeedants could have negatively impacted FAW larval mass gain on Kanlow plants relative to Summer plants. A comparison of the switchgrass-FAW RNA-Seq dataset to those from maize-FAW and switchgrass-aphid interactions revealed that key components of plant responses to herbivory, including induction of JA biosynthesis, key transcription factors and JA-inducible genes were apparently conserved in switchgrass and maize. In addition, these data affirm earlier studies with FAW and aphids that the cultivar Kanlow can provide useful genetics for the breeding of switchgrass germplasm with improved insect resistance
Defending against Sybil Devices in Crowdsourced Mapping Services
Real-time crowdsourced maps such as Waze provide timely updates on traffic,
congestion, accidents and points of interest. In this paper, we demonstrate how
lack of strong location authentication allows creation of software-based {\em
Sybil devices} that expose crowdsourced map systems to a variety of security
and privacy attacks. Our experiments show that a single Sybil device with
limited resources can cause havoc on Waze, reporting false congestion and
accidents and automatically rerouting user traffic. More importantly, we
describe techniques to generate Sybil devices at scale, creating armies of
virtual vehicles capable of remotely tracking precise movements for large user
populations while avoiding detection. We propose a new approach to defend
against Sybil devices based on {\em co-location edges}, authenticated records
that attest to the one-time physical co-location of a pair of devices. Over
time, co-location edges combine to form large {\em proximity graphs} that
attest to physical interactions between devices, allowing scalable detection of
virtual vehicles. We demonstrate the efficacy of this approach using
large-scale simulations, and discuss how they can be used to dramatically
reduce the impact of attacks against crowdsourced mapping services.Comment: Measure and integratio
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
As smartphones become more pervasive, they are increasingly targeted by
malware. At the same time, each new generation of smartphone features
increasingly powerful onboard sensor suites. A new strain of sensor malware has
been developing that leverages these sensors to steal information from the
physical environment (e.g., researchers have recently demonstrated how malware
can listen for spoken credit card numbers through the microphone, or feel
keystroke vibrations using the accelerometer). Yet the possibilities of what
malware can see through a camera have been understudied. This paper introduces
a novel visual malware called PlaceRaider, which allows remote attackers to
engage in remote reconnaissance and what we call virtual theft. Through
completely opportunistic use of the camera on the phone and other sensors,
PlaceRaider constructs rich, three dimensional models of indoor environments.
Remote burglars can thus download the physical space, study the environment
carefully, and steal virtual objects from the environment (such as financial
documents, information on computer monitors, and personally identifiable
information). Through two human subject studies we demonstrate the
effectiveness of using mobile devices as powerful surveillance and virtual
theft platforms, and we suggest several possible defenses against visual
malware
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Voice Processing Systems (VPSes), now widely deployed, have been made
significantly more accurate through the application of recent advances in
machine learning. However, adversarial machine learning has similarly advanced
and has been used to demonstrate that VPSes are vulnerable to the injection of
hidden commands - audio obscured by noise that is correctly recognized by a VPS
but not by human beings. Such attacks, though, are often highly dependent on
white-box knowledge of a specific machine learning model and limited to
specific microphones and speakers, making their use across different acoustic
hardware platforms (and thus their practicality) limited. In this paper, we
break these dependencies and make hidden command attacks more practical through
model-agnostic (blackbox) attacks, which exploit knowledge of the signal
processing algorithms commonly used by VPSes to generate the data fed into
machine learning systems. Specifically, we exploit the fact that multiple
source audio samples have similar feature vectors when transformed by acoustic
feature extraction algorithms (e.g., FFTs). We develop four classes of
perturbations that create unintelligible audio and test them against 12 machine
learning models, including 7 proprietary models (e.g., Google Speech API, Bing
Speech API, IBM Speech API, Azure Speaker API, etc), and demonstrate successful
attacks against all targets. Moreover, we successfully use our maliciously
generated audio samples in multiple hardware configurations, demonstrating
effectiveness across both models and real systems. In so doing, we demonstrate
that domain-specific knowledge of audio signal processing represents a
practical means of generating successful hidden voice command attacks
Five feet high and rising : cities and flooding in the 21st century
Urban flooding is an increasingly important issue. Disaster statistics appear to show flood events are becoming more frequent, with medium-scale events increasing fastest. The impact of flooding is driven by a combination of natural and human-induced factors. As recent flood events in Pakistan, Brazil, Sri Lanka and Australia show, floods can occur in widespread locations and can sometimes overwhelm even the best prepared countries and cities. There are known and tested measures for urban flood risk management, typically classified as structural or engineered measures, and non-structural, management techniques. A combination of measures to form an integrated management approach is most likely to be successful in reducing flood risk. In the short term and for developing countries in particular, the factors affecting exposure and vulnerability are increasing at the fastest rate as urbanization puts more people and more assets at risk. In the longer term, however, climate scenarios are likely to be one of the most important drivers of future changes in flood risk. Due to the large uncertainties in projections of climate change, adaptation to the changing risk needs to be flexible to a wide range of future scenarios and to be able to cope with potentially large changes in sea level, rainfall intensity and snowmelt. Climate uncertainty and budgetary, institutional and practical constraints are likely to lead to a combining of structural and non-structural measures for urban flood risk management, and arguably, to a move away from what is sometimes an over-reliance on hard-engineered defenses and toward more adaptable and incremental non-structural solutions.Hazard Risk Management,Wetlands,Natural Disasters,Adaptation to Climate Change,Climate Change Impacts
- …