9 research outputs found

    Nature-inspired survivability: Prey-inspired survivability countermeasures for cloud computing security challenges

    Get PDF
    As cloud computing environments become complex, adversaries have become highly sophisticated and unpredictable. Moreover, they can easily increase attack power and persist longer before detection. Uncertain malicious actions, latent risks, Unobserved or Unobservable risks (UUURs) characterise this new threat domain. This thesis proposes prey-inspired survivability to address unpredictable security challenges borne out of UUURs. While survivability is a well-addressed phenomenon in non-extinct prey animals, applying prey survivability to cloud computing directly is challenging due to contradicting end goals. How to manage evolving survivability goals and requirements under contradicting environmental conditions adds to the challenges. To address these challenges, this thesis proposes a holistic taxonomy which integrate multiple and disparate perspectives of cloud security challenges. In addition, it proposes the TRIZ (Teorija Rezbenija Izobretatelskib Zadach) to derive prey-inspired solutions through resolving contradiction. First, it develops a 3-step process to facilitate interdomain transfer of concepts from nature to cloud. Moreover, TRIZ’s generic approach suggests specific solutions for cloud computing survivability. Then, the thesis presents the conceptual prey-inspired cloud computing survivability framework (Pi-CCSF), built upon TRIZ derived solutions. The framework run-time is pushed to the user-space to support evolving survivability design goals. Furthermore, a target-based decision-making technique (TBDM) is proposed to manage survivability decisions. To evaluate the prey-inspired survivability concept, Pi-CCSF simulator is developed and implemented. Evaluation results shows that escalating survivability actions improve the vitality of vulnerable and compromised virtual machines (VMs) by 5% and dramatically improve their overall survivability. Hypothesis testing conclusively supports the hypothesis that the escalation mechanisms can be applied to enhance the survivability of cloud computing systems. Numeric analysis of TBDM shows that by considering survivability preferences and attitudes (these directly impacts survivability actions), the TBDM method brings unpredictable survivability information closer to decision processes. This enables efficient execution of variable escalating survivability actions, which enables the Pi-CCSF’s decision system (DS) to focus upon decisions that achieve survivability outcomes under unpredictability imposed by UUUR

    Memory hierarchy and data communication in heterogeneous reconfigurable SoCs

    Get PDF
    The miniaturization race in the hardware industry aiming at continuous increasing of transistor density on a die does not bring respective application performance improvements any more. One of the most promising alternatives is to exploit a heterogeneous nature of common applications in hardware. Supported by reconfigurable computation, which has already proved its efficiency in accelerating data intensive applications, this concept promises a breakthrough in contemporary technology development. Memory organization in such heterogeneous reconfigurable architectures becomes very critical. Two primary aspects introduce a sophisticated trade-off. On the one hand, a memory subsystem should provide well organized distributed data structure and guarantee the required data bandwidth. On the other hand, it should hide the heterogeneous hardware structure from the end-user, in order to support feasible high-level programmability of the system. This thesis work explores the heterogeneous reconfigurable hardware architectures and presents possible solutions to cope the problem of memory organization and data structure. By the example of the MORPHEUS heterogeneous platform, the discussion follows the complete design cycle, starting from decision making and justification, until hardware realization. Particular emphasis is made on the methods to support high system performance, meet application requirements, and provide a user-friendly programmer interface. As a result, the research introduces a complete heterogeneous platform enhanced with a hierarchical memory organization, which copes with its task by means of separating computation from communication, providing reconfigurable engines with computation and configuration data, and unification of heterogeneous computational devices using local storage buffers. It is distinguished from the related solutions by distributed data-flow organization, specifically engineered mechanisms to operate with data on local domains, particular communication infrastructure based on Network-on-Chip, and thorough methods to prevent computation and communication stalls. In addition, a novel advanced technique to accelerate memory access was developed and implemented

    Towards Practical Privacy-Preserving Protocols

    Get PDF
    Protecting users' privacy in digital systems becomes more complex and challenging over time, as the amount of stored and exchanged data grows steadily and systems become increasingly involved and connected. Two techniques that try to approach this issue are Secure Multi-Party Computation (MPC) and Private Information Retrieval (PIR), which aim to enable practical computation while simultaneously keeping sensitive data private. In this thesis we present results showing how real-world applications can be executed in a privacy-preserving way. This is not only desired by users of such applications, but since 2018 also based on a strong legal foundation with the General Data Protection Regulation (GDPR) in the European Union, that forces companies to protect the privacy of user data by design. This thesis' contributions are split into three parts and can be summarized as follows: MPC Tools Generic MPC requires in-depth background knowledge about a complex research field. To approach this, we provide tools that are efficient and usable at the same time, and serve as a foundation for follow-up work as they allow cryptographers, researchers and developers to implement, test and deploy MPC applications. We provide an implementation framework that abstracts from the underlying protocols, optimized building blocks generated from hardware synthesis tools, and allow the direct processing of Hardware Definition Languages (HDLs). Finally, we present an automated compiler for efficient hybrid protocols from ANSI C. MPC Applications MPC was for a long time deemed too expensive to be used in practice. We show several use cases of real-world applications that can operate in a privacy-preserving, yet practical way when engineered properly and built on top of suitable MPC protocols. Use cases presented in this thesis are from the domain of route computation using BGP on the Internet or at Internet Exchange Points (IXPs). In both cases our protocols protect sensitive business information that is used to determine routing decisions. Another use case focuses on genomics, which is particularly critical as the human genome is connected to everyone during their entire lifespan and cannot be altered. Our system enables federated genomic databases, where several institutions can privately outsource their genome data and where research institutes can query this data in a privacy-preserving manner. PIR and Applications Privately retrieving data from a database is a crucial requirement for user privacy and metadata protection, and is enabled amongst others by a technique called Private Information Retrieval (PIR). We present improvements and a generalization of a well-known multi-server PIR scheme of Chor et al., and an implementation and evaluation thereof. We also design and implement an efficient anonymous messaging system built on top of PIR. Furthermore we provide a scalable solution for private contact discovery that utilizes ideas from efficient two-server PIR built from Distributed Point Functions (DPFs) in combination with Private Set Intersection (PSI)

    Reading Dorothy Hewett as boundary writer

    Get PDF
    This thesis locates the writings of Dorothy Hewett in a firm relationship with postmodern thought. The argument focuses on evidence that the dominant aesthetic of Hewett\u27s writing is the feminine sublime which comprises a commitment to uncertainty. In this modality, reason does not foreclose on the action of the imagination in the sublime moment. The revised dynamic is explored with an emphasis on the radical nature of the doubt in question. It reflects a deliberate resistance to certainty, and fol1ows from Hewett\u27s early experience with communism. At a formal level, in Hewett\u27s texts, the commitment to uncertainty is not least apparent in layered operations of the sublime aesthetic within the writing. The feminine sublime also operates in the orientations of Hewett\u27s subject construction, in which a complex sense of identity as processual and divided is clear. It is evident in thematic and political aspects of the writing which are inflected towards uncertainty in various ways and conform to this mode of the sublime. In this regard, the thesis illustrates, Hewett\u27s engagements with the themes of death and the maternal and her admissions of the irrational are exemplary. Such inflections produce moments of ethical tension, contradictions, ambivalences and accommodations of incommensurability, some of which are examined here. Hewett\u27s diverse and wide-ranging engagements with genre provide another instance of the commitment to uncertainty, and this governs the selection of texts addressed in the thesis. The emphasis is on Hewett\u27s prose writings. Their aesthetic diversity is produced, in part, by literary precedents and multiple discourses, which feed into the writing as inclusiveness, both of thought and artistry. The thesis addresses some of these and argues that, combined, these factors position Hewett as a writer with a postmodern sensibility

    Chasing Mythical Beasts

    Get PDF
    Classical Antiquity is strongly present in youth culture globally. It accompanies children during their initiation into adulthood and thereby deepens their knowledge of the cultural code based on the Greek and Roman heritage. It enables intergenerational communication, with the reception of the Classics being able to serve as a marker of transformations underway in societies the world over. The team of contributors from Europe, North America, Africa, Asia, Australia, and New Zealand focuses on the reception of mythical creatures as the key to these transformations, including the changes in human mentality. The volume gathers the results of a stage of the programme ‘Our Mythical Childhood’, supported by an Alexander von Humboldt Foundation Alumni Award for Innovative Networking Initiatives and an ERC Consolidator Grant. Thanks to the multidisciplinary character of its research (Classics, Modern Philologies, Animal Studies) and to the universal importance of the theme of childhood, the volume offers stimulating reading for scholars, students, and educators, as well as for a wider audience

    Chasing Mythical Beasts

    Get PDF
    Classical Antiquity is strongly present in youth culture globally. It accompanies children during their initiation into adulthood and thereby deepens their knowledge of the cultural code based on the Greek and Roman heritage. It enables intergenerational communication, with the reception of the Classics being able to serve as a marker of transformations underway in societies the world over. The team of contributors from Europe, North America, Africa, Asia, Australia, and New Zealand focuses on the reception of mythical creatures as the key to these transformations, including the changes in human mentality. The volume gathers the results of a stage of the programme ‘Our Mythical Childhood’, supported by an Alexander von Humboldt Foundation Alumni Award for Innovative Networking Initiatives and an ERC Consolidator Grant. Thanks to the multidisciplinary character of its research (Classics, Modern Philologies, Animal Studies) and to the universal importance of the theme of childhood, the volume offers stimulating reading for scholars, students, and educators, as well as for a wider audience

    A Holmes and Doyle Bibliography, Volume 9: All Formats—Combined Alphabetical Listing

    Get PDF
    This bibliography is a work in progress. It attempts to update Ronald B. De Waal’s comprehensive bibliography, The Universal Sherlock Holmes, but does not claim to be exhaustive in content. New works are continually discovered and added to this bibliography. Readers and researchers are invited to suggest additional content. This volume contains all listings in all formats, arranged alphabetically by author or main entry. In other words, it combines the listings from Volume 1 (Monograph and Serial Titles), Volume 3 (Periodical Articles), and Volume 7 (Audio/Visual Materials) into a comprehensive bibliography. (There may be additional materials included in this list, e.g. duplicate items and items not yet fully edited.) As in the other volumes, coverage of this material begins around 1994, the final year covered by De Waal's bibliography, but may not yet be totally up-to-date (given the ongoing nature of this bibliography). It is hoped that other titles will be added at a later date. At present, this bibliography includes 12,594 items
    corecore