2,575 research outputs found
Innovation From Above, Below, and Behind: The Linguistics of the Hebrew Revival
This thesis seeks to investigate the unique example of Modern Hebrew’s linguistic revival and determine the historical and linguistic qualities that made it successful. I intend to challenge the common narrative of Hebrew revival as \u27miraculous\u27 and isolated from Jewish history. I will demonstrate the long legacy of Hebrew creativity, preservation, and reinvention that formed the foundations the Zionist movement was able to build upon. I also seek to expand the narrative of the revival process itself to more accurately account for the modern result that is Israeli Hebrew. The ‘planned’ element of the revival process, i.e. the well-documented top-down impositions of the Hebrew revivalists, was just one of many conflicting forces that converged to actualize a functioning vernacular; in fact, simultaneously, the population was engaging with, and even defying, the rules of the establishment–introducing foreign loanwords, using ‘incorrect’ grammar, inventing slang, and, ultimately, choosing which of the Hebrew revivalists’ innovations would survive. In this way, the organic and unorganized actions of a young Hebrew-speaking population worked alongside the revivalists to determine what ‘correct’ Hebrew is today
ObliviSync: Practical Oblivious File Backup and Synchronization
Oblivious RAM (ORAM) protocols are powerful techniques that hide a client's
data as well as access patterns from untrusted service providers. We present an
oblivious cloud storage system, ObliviSync, that specifically targets one of
the most widely-used personal cloud storage paradigms: synchronization and
backup services, popular examples of which are Dropbox, iCloud Drive, and
Google Drive. This setting provides a unique opportunity because the above
privacy properties can be achieved with a simpler form of ORAM called
write-only ORAM, which allows for dramatically increased efficiency compared to
related work. Our solution is asymptotically optimal and practically efficient,
with a small constant overhead of approximately 4x compared with non-private
file storage, depending only on the total data size and parameters chosen
according to the usage rate, and not on the number or size of individual files.
Our construction also offers protection against timing-channel attacks, which
has not been previously considered in ORAM protocols. We built and evaluated a
full implementation of ObliviSync that supports multiple simultaneous read-only
clients and a single concurrent read/write client whose edits automatically and
seamlessly propagate to the readers. We show that our system functions under
high work loads, with realistic file size distributions, and with small
additional latency (as compared to a baseline encrypted file system) when
paired with Dropbox as the synchronization service.Comment: 15 pages. Accepted to NDSS 201
Towards Baselines for Shoulder Surfing on Mobile Authentication
Given the nature of mobile devices and unlock procedures, unlock
authentication is a prime target for credential leaking via shoulder surfing, a
form of an observation attack. While the research community has investigated
solutions to minimize or prevent the threat of shoulder surfing, our
understanding of how the attack performs on current systems is less well
studied. In this paper, we describe a large online experiment (n=1173) that
works towards establishing a baseline of shoulder surfing vulnerability for
current unlock authentication systems. Using controlled video recordings of a
victim entering in a set of 4- and 6-length PINs and Android unlock patterns on
different phones from different angles, we asked participants to act as
attackers, trying to determine the authentication input based on the
observation. We find that 6-digit PINs are the most elusive attacking surface
where a single observation leads to just 10.8% successful attacks, improving to
26.5\% with multiple observations. As a comparison, 6-length Android patterns,
with one observation, suffered 64.2% attack rate and 79.9% with multiple
observations. Removing feedback lines for patterns improves security from
35.3\% and 52.1\% for single and multiple observations, respectively. This
evidence, as well as other results related to hand position, phone size, and
observation angle, suggests the best and worst case scenarios related to
shoulder surfing vulnerability which can both help inform users to improve
their security choices, as well as establish baselines for researchers.Comment: Will appear in Annual Computer Security Applications Conference
(ACSAC
- …