2,520 research outputs found

    Your WiFi Is Leaking: Inferring Private User Information Despite Encryption

    Get PDF
    This thesis describes how wireless networks can inadvertently leak and broadcast users' personal information despite the correct use of encryption. Users would likely assume that their activities (for example, the program or app they are using) and personal information (including age, religion, sexuality and gender) would remain confidential when using an encrypted network. However, we demonstrate how the analysis of encrypted traffic patterns can allow an observer to infer potentially sensitive data remotely, passively, undetectably, and without any network credentials. Without the ability to read encrypted WiFi traffic directly, the limited side-channel data available is processed. Following an investigation to determine what information is available and how it can be represented, it was determined that the comparison of various permutations of timing and frame size information is sufficient to distinguish specific user activities. The construction of classifiers via machine learning (Random Forests) utilising this side-channel information represented as histograms allows for the detection of user activity despite WiFi encryption. Studies showed that Skype voice traffic could be identified despite being interleaved with other activities. A subsequent study then demonstrated that mobile apps could be individually detected and, concerningly, used to infer potentially sensitive information about users due to their personalised nature. Furthermore, a full prototype system is developed and used to demonstrate that this analysis can be performed in real-time using low-cost commodity hardware in real-world scenarios. Avenues for improvement and the limitations of this approach are identified, and potential applications for this work are considered. Strategies to prevent these leaks are discussed and the effort required for an observer to present a practical privacy threat to the everyday WiFi user is examined

    Your WiFi is leaking: what do your mobile apps gossip about you?

    Get PDF
    This paper describes how mobile device apps can inadvertently broadcast personal information through their use of wireless networks despite the correct use of encryption. Using a selection of personas we illustrate how app usage can be tied to personal information. Users would likely assume the confidentiality of personal information (including age, religion, sexuality and gender) when using an encrypted network. However, we demonstrate how encrypted traffic pattern analysis can allow a remote observer to infer potentially sensitive data passively and undetectably without any network credentials. Without the ability to read encrypted WiFi traffic directly, we process the limited side-channel data available (timings and frame sizes) to enable remote app detection. These side-channel data measurements are represented as histograms and used to construct a Random Forest classifier capable of accurately identifying mobile apps from the encrypted traffic they cause. The Random Forest algorithm was able to correctly identify apps with a mean accuracy of ∼99% within the training set. The classifier was then adapted to form the core of a detection program that could monitor multiple devices in real-time. Tests in a closed-world scenario showed 84% accuracy and demonstrated the ability to overcome the data limitations imposed by WiFi encryption. Although accuracy suffers greatly (67%) when moving to an open-world scenario, a high recall rate of 86% demonstrates that apps can unwittingly broadcast personal information openly despite using encrypted WiFi. The open-world false positive rate (38% overall, or 72% for unseen activity alone) leaves much room for improvement but the experiment demonstrates a plausible threat nevertheless. Finally, avenues for improvement and the limitations of this approach are identified. We discuss potential applications, strategies to prevent these leaks, and consider the effort required for an observer to present a practical privacy threat to the everyday WiFi user. This paper presents and demonstrates a nuanced and difficult to solve privacy vulnerability that cannot not be mitigated without considerable changes to current- and next-generation wireless communication protocols

    Forage Preferences of the European Beaver Castor fiber

    Get PDF
    By the beginning of the twentieth century, hunting and land use change had reduced the European beaver Castor fiber to a relict population of no more than 1200 individuals. In some European states, re introduction has successfully established viable populations, whilst other schemes have failed. Environmental, social and economic issues associated with beaver reintroduction have given rise to a range of information needs in relation to the species«SQ» ecology. In 2005, six European beavers were translocated from Bavaria to a reintroduction site in southern England. The following year, a 6 month study was undertaken to investigate which tree species and size classes were most frequently utilised by the beavers, and to determine if the utilised species and size classes reflected resource availability within the home range. These questions were answered by comparing the use and the availability of foraged tree species in two ways: (1) using a survey of tree stumps; and (2) as a food choice experiment. The results showed that the reintroduced beavers were highly selective in relation to both the species and the size of the trees they used i.e. the reintroduced beavers selected species in significantly different proportions to their availability. However, they selected similar size classes between the preferred tree species, and did not utilise human timber. The relevance of the study is discussed with respect to information needs associated with the reintroduction of a keystone species, overcoming negative perceptions, population viability, welfare and soft release strategies

    Effect of scatter correction when comparing attenuation maps: Application to brain PET/MR

    Get PDF
    Email Print Request Permissions In PET imaging, attenuation and scatter corrections are an essential requirement to accurately quantify the radionuclide uptake. In the context of PET/MR scanners, obtaining the attenuation information can be challenging. Various authors have quantified the effect of an imprecise attenuation map on the reconstructed PET image but its influence on scatter correction has usually been ignored. In this paper, we investigate the effects of imperfect attenuation maps (μmaps) on the scatter correction in a simulation setting. We focused our study on three μmaps: the reference μmap derived from a CT image, and two MR-based methods. Two scatter estimation strategies were implemented: a μmap-specific scatter estimation and an ideal scatter estimation relying only on the reference CT μmap. The scatter estimation used the Single Scatter Simulation algorithm with tail-fitting. The results show that, for FDG brain PET, regardless of the μmap used in the reconstruction, the difference on PET images between μmap-specific and ideal scatter estimations is small (less than 1%). More importantly, the relative error between attenuation correction methods does not change depending on the scatter estimation method included in the simulation and reconstruction process. This means that the effect of errors in the μmap on the PET image is dominated by the attenuation correction, while the scatter estimate is relatively unaffected. Therefore, while scatter correction improves reconstruction accuracy, it is unnecessary to include scatter in the simulation when comparing different attenuation correction methods for brain PET/MR

    The conserved C-terminus of the PcrA/UvrD helicase interacts directly with RNA polymerase

    Get PDF
    Copyright: © 2013 Gwynn et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Funding: This work was supported by a Wellcome Trust project grant to MD (Reference: 077368), an ERC starting grant to MD (Acronym: SM-DNA-REPAIR) and a BBSRC project grant to PM, NS and MD (Reference: BB/I003142/1). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.Peer reviewedPublisher PD

    Carbon Emission Flow in Networks

    Get PDF
    As the human population increases and production expands, energy demand and anthropogenic carbon emission rates have been growing rapidly, and the need to decrease carbon emission levels has drawn increasing attention. The link between energy production and consumption has required the large-scale transport of energy within energy transmission networks. Within this energy flow, there is a virtual circulation of carbon emissions. To understand this circulation and account for the relationship between energy consumption and carbon emissions, this paper introduces the concept of “carbon emission flow in networks” and establishes a method to calculate carbon emission flow in networks. Using an actual analysis of China's energy pattern, the authors discuss the significance of this new concept, not only as a feasible approach but also as an innovative theoretical perspective

    The formation of professional identity in medical students: considerations for educators

    Get PDF
    <b>Context</b> Medical education is about more than acquiring an appropriate level of knowledge and developing relevant skills. To practice medicine students need to develop a professional identity – ways of being and relating in professional contexts.<p></p> <b>Objectives</b> This article conceptualises the processes underlying the formation and maintenance of medical students’ professional identity drawing on concepts from social psychology.<p></p> <b>Implications</b> A multi-dimensional model of identity and identity formation, along with the concepts of identity capital and multiple identities, are presented. The implications for educators are discussed.<p></p> <b>Conclusions</b> Identity formation is mainly social and relational in nature. Educators, and the wider medical society, need to utilise and maximise the opportunities that exist in the various relational settings students experience. Education in its broadest sense is about the transformation of the self into new ways of thinking and relating. Helping students form, and successfully integrate their professional selves into their multiple identities, is a fundamental of medical education

    Metabolomics and microbial composition increase insight into the impact of dietary differences in cirrhosis.

    Get PDF
    BACKGROUND & AIMS: Dietary changes can modulate gut microbiota and interact with cirrhosis. Our prior study demonstrated that microbial diversity was higher in Turkish versus USA cirrhotics, which was associated with lower risk of 90-day hospitalizations. We aimed to define gut microbial functional and metabolomic changes to increase insight into benefits of the Mediterranean compared to Western diets. METHODS: 139 Turkish (46 controls/50 compensated/43 decompensated) and 157 American subjects (48 controls/59 compensated/50 decompensated) were studied. Turkish subjects consumed a modified Mediterranean diet with daily fermented milk intake while Americans consumed a Western diet. Predicted gut microbial functionalities and plasma metabolomics were compared between/within countries. Correlation network differences between microbiota and metabolites in cirrhotics from Turkey versus USA were evaluated. RESULTS: Predicted microbial function showed lower amino acid, bioenergetics and lipid pathways, with functions related to vitamin B, glycan, xenobiotic metabolism, DNA/RNA synthesis, in Turkey compared to USA cirrhotics. Plasma metabolomics demonstrated higher relative lactate levels in Turkey versus USA. The metabolite changes in decompensated cirrhosis, compared to controls, showed similar trends in Turkey and USA, with reduced lipids and phosphocholines. Phosphocholines were significantly lower in patients hospitalized in 90 days (p=0.03). Correlation networks in cirrhotics demonstrated linkage differences between beneficial taxa, Blautia and Oscillispira, and lactate and unsaturated lipids, in Turkey compared to American patients. CONCLUSIONS: A modified Mediterranean diet was associated with altered plasma metabolomics and beneficially alters microbiota functionality and correlations compared to Western diet in cirrhosis. These altered diet-microbial interactions could potentially affect the 90-day hospitalization risk

    Universality, limits and predictability of gold-medal performances at the Olympic Games

    Get PDF
    Inspired by the Games held in ancient Greece, modern Olympics represent the world's largest pageant of athletic skill and competitive spirit. Performances of athletes at the Olympic Games mirror, since 1896, human potentialities in sports, and thus provide an optimal source of information for studying the evolution of sport achievements and predicting the limits that athletes can reach. Unfortunately, the models introduced so far for the description of athlete performances at the Olympics are either sophisticated or unrealistic, and more importantly, do not provide a unified theory for sport performances. Here, we address this issue by showing that relative performance improvements of medal winners at the Olympics are normally distributed, implying that the evolution of performance values can be described in good approximation as an exponential approach to an a priori unknown limiting performance value. This law holds for all specialties in athletics-including running, jumping, and throwing-and swimming. We present a self-consistent method, based on normality hypothesis testing, able to predict limiting performance values in all specialties. We further quantify the most likely years in which athletes will breach challenging performance walls in running, jumping, throwing, and swimming events, as well as the probability that new world records will be established at the next edition of the Olympic Games.Comment: 8 pages, 3 figures, 1 table. Supporting information files and data are available at filrad.homelinux.or

    Managerial Work in a Practice-Embodying Institution - The role of calling, the virtue of constancy

    Get PDF
    What can be learned from a small scale study of managerial work in a highly marginal and under-researched working community? This paper uses the ‘goods-virtues-practices-institutions’ framework to examine the managerial work of owner-directors of traditional circuses. Inspired by MacIntyre’s arguments for the necessity of a narrative understanding of the virtues, interviews explored how British and Irish circus directors accounted for their working lives. A purposive sample was used to select subjects who had owned and managed traditional touring circuses for at least 15 years, a period in which the economic and reputational fortunes of traditional circuses have suffered badly. This sample enabled the research to examine the self-understanding of people who had, at least on the face of it, exhibited the virtue of constancy. The research contributes to our understanding of the role of the virtues in organizations by presenting evidence of an intimate relationship between the virtue of constancy and a ‘calling’ work orientation. This enhances our understanding of the virtues that are required if management is exercised as a domain-related practice
    corecore