35,208 research outputs found

    From Normative Power to Great Power Politics: Change in the European Union's Foreign Policy Identity. Jean Monnet/Robert Schuman Paper Series. Vol. 5, No. 14 June 2008

    Get PDF
    [From the Introduction] At the beginning of the twenty-first century, one of the most significant developments in international relations is the important and growing role of the European Union (EU) as a global player in contemporary world politics. But what exactly is that role, how does the EU manage its relations with the external world and what identity does the EU wish to present to that world? In other words, what is the foreign policy identity of the EU? These are questions that analysts and scholars have grappled with since the formal creation of the EU at Maastricht in 1991 (Treaty on European Union). The EU has worked very carefully to foster a specific type of international identity. It is generally seen and theorized as a leader in the promotion of international peace and humanitarian issues. The EU presents itself as a normative force in world politics. It has customarily placed overriding emphasis on international law, democracy, human rights, international institutions, and multilateralism in its foreign policy, while eschewing a foreign policy based on traditional national interests and material gain. The EU has, in fact, explicitly and formally announced these normative goals for its foreign policymaking in the second pillar of the Treaty on European Union, more commonly known as the CFSP (Common Foreign and Security Policy). But in a world that has become markedly more perilous since September 11, 2001, many Europeans consider U.S. unilateralism as dangerous as the putative terrorist activity it is attempting to halt. As a result, are we seeing the foreign policy identity of the EU begin to change? Does the EU see itself as a possible balance against the primacy of the United States? In other words, does the EU show signs of transforming to a more traditional foreign policy orientation; one based on traditional great power politics and geared towards ensuring the most basic of state interests: survival, security and power? This paper will investigate this transforming foreign policy identity of the EU by seeking to answer the following questions: If the EU’s foreign policy identity is indeed changing, then how is it changing, what is it becoming, and most importantly, what is causing it to change? I will argue that the EU’s foreign policy identity is changing from a normative power to an identity based more closely on a great power politics model; and that the influence of epistemic communities or knowledge based networks is a primary catalyst for this change

    BandwidthBreach: Unleashing Covert and Side Channels through Cache Bandwidth Exploitation

    Full text link
    In the modern CPU architecture, enhancements such as the Line Fill Buffer (LFB) and Super Queue (SQ), which are designed to track pending cache requests, have significantly boosted performance. To exploit this structures, we deliberately engineered blockages in the L2 to L1d route by controlling LFB conflict and triggering prefetch prediction failures, while consciously dismissing other plausible influencing factors. This approach was subsequently extended to the L3 to L2 and L2 to L1i pathways, resulting in three potent covert channels, termed L2CC, L3CC, and LiCC, with capacities of 10.02 Mbps, 10.37 Mbps, and 1.83 Mbps, respectively. Strikingly, the capacities of L2CC and L3CC surpass those of earlier non-shared-memory-based covert channels, reaching a level comparable to their shared memory-dependent equivalents. Leveraging this congestion further facilitated the extraction of key bits from RSA and EdDSA implementations. Coupled with SpectreV1 and V2, our covert channels effectively evade the majority of traditional Spectre defenses. Their confluence with Branch Prediction (BP) Timing assaults additionally undercuts balanced branch protections, hence broadening their capability to infiltrate a wide range of cryptography libraries

    Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation

    Full text link
    Side-channel attacks that use machine learning (ML) for signal analysis have become prominent threats to computer security, as ML models easily find patterns in signals. To address this problem, this paper explores using Adversarial Machine Learning (AML) methods as a defense at the computer architecture layer to obfuscate side channels. We call this approach Defensive ML, and the generator to obfuscate signals, defender. Defensive ML is a workflow to design, implement, train, and deploy defenders for different environments. First, we design a defender architecture given the physical characteristics and hardware constraints of the side-channel. Next, we use our DefenderGAN structure to train the defender. Finally, we apply defensive ML to thwart two side-channel attacks: one based on memory contention and the other on application power. The former uses a hardware defender with ns-level response time that attains a high level of security with half the performance impact of a traditional scheme; the latter uses a software defender with ms-level response time that provides better security than a traditional scheme with only 70% of its power overhead.Comment: Preprint. Under revie

    Reinventing Media Activism: Public Interest Advocacy in the Making of U.S. Communication-Information Policy, 1960-2002

    Get PDF
    This report is a long-term analysis of citizens' collective action to influence public policy toward communication and information. The work discusses in greater detail what is meant by communication and information policy (CIP) and why we think it is worthwhile to study it as a distinctive domain of public policy and citizen action. The report concentrates on citizen action in the United States and looks backwards, tracing the long-term evolutionary trajectory of communications-information advocacy in the USA since the 1960s. We focus on the concept of citizen collective action and explain its relevance to CIP.Research supported by the Ford Foundation's Knowledge, Creativity and Freedom Program. The views expressed are those of the author and do not necessarily represent the views of the School of Information Studies, Syracuse University, or the Ford Foundation

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    A Survey of Techniques for Improving Security of GPUs

    Full text link
    Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures

    Nollywood in Diversity: New Dimensions for Behaviour Change and National Security in Nigeria

    Get PDF
    This paper sets out to demystify the nature of Nollywood movies existing in diversity and to propose new dimensions for using film to achieve behaviour change and a dependable national security in Nigeria. The paper views national security as the art of ensuring national safety of the government. Nollywood has naturally diversified along ethnic dimensions including the Hausa movies (Kannywood) in the North, the Yoruba movies in the West and the Ibo movies in the Eastern part of the Nigeria. Others include the Akwa-Cross movies from the Southern part and the Tiv movies from the Middle Belt region of Nigeria. The paper adopts observation and analytical research methods depending on secondary sources. The paper finds out and concludes that Nollywood’s diversity is an opportunity to ameliorate some security challenges of the country and recommends the use of behaviour change focused themes which should be featured by Nollywood movie producers in Nigerian films produced along cultural, ethnic and regional boundaries

    Four types of diaspora mobilization : Albanian diaspora activism for Kosovo independence in the US and the UK

    Get PDF
    This comparative study explores the conditions and causal pathways through which conflict-generated diasporas become moderate or radical actors when linked to homelands experiencing limited sovereignty. Situated at the nexus of scholarship on diasporas and conflict, ethnic lobbying in foreign policy, and transnationalism this article develops four types of diaspora political mobilization—radical (strong and weak) and moderate (strong and weak)—and unpacks the causal pathways that lead to these four types in different political contexts. I argue that dynamics in the original homeland drive the overall trend towards radicalism or moderation of diaspora mobilization in a host-land: high levels of violence are associated with radicalism, and low levels with moderation. Nevertheless, how diaspora mobilization takes place is a result of the conjuncture of the level of violence with another variable, the linkages of the main secessionist elites to the diaspora. The article uses observations from eight cases of Albanian diaspora mobilization in the US and the UK from 1989 until the proclamation of Kosovo's independence in 2008
    corecore