2,575 research outputs found

    Innovation From Above, Below, and Behind: The Linguistics of the Hebrew Revival

    Get PDF
    This thesis seeks to investigate the unique example of Modern Hebrew’s linguistic revival and determine the historical and linguistic qualities that made it successful. I intend to challenge the common narrative of Hebrew revival as \u27miraculous\u27 and isolated from Jewish history. I will demonstrate the long legacy of Hebrew creativity, preservation, and reinvention that formed the foundations the Zionist movement was able to build upon. I also seek to expand the narrative of the revival process itself to more accurately account for the modern result that is Israeli Hebrew. The ‘planned’ element of the revival process, i.e. the well-documented top-down impositions of the Hebrew revivalists, was just one of many conflicting forces that converged to actualize a functioning vernacular; in fact, simultaneously, the population was engaging with, and even defying, the rules of the establishment–introducing foreign loanwords, using ‘incorrect’ grammar, inventing slang, and, ultimately, choosing which of the Hebrew revivalists’ innovations would survive. In this way, the organic and unorganized actions of a young Hebrew-speaking population worked alongside the revivalists to determine what ‘correct’ Hebrew is today

    ObliviSync: Practical Oblivious File Backup and Synchronization

    Get PDF
    Oblivious RAM (ORAM) protocols are powerful techniques that hide a client's data as well as access patterns from untrusted service providers. We present an oblivious cloud storage system, ObliviSync, that specifically targets one of the most widely-used personal cloud storage paradigms: synchronization and backup services, popular examples of which are Dropbox, iCloud Drive, and Google Drive. This setting provides a unique opportunity because the above privacy properties can be achieved with a simpler form of ORAM called write-only ORAM, which allows for dramatically increased efficiency compared to related work. Our solution is asymptotically optimal and practically efficient, with a small constant overhead of approximately 4x compared with non-private file storage, depending only on the total data size and parameters chosen according to the usage rate, and not on the number or size of individual files. Our construction also offers protection against timing-channel attacks, which has not been previously considered in ORAM protocols. We built and evaluated a full implementation of ObliviSync that supports multiple simultaneous read-only clients and a single concurrent read/write client whose edits automatically and seamlessly propagate to the readers. We show that our system functions under high work loads, with realistic file size distributions, and with small additional latency (as compared to a baseline encrypted file system) when paired with Dropbox as the synchronization service.Comment: 15 pages. Accepted to NDSS 201

    Towards Baselines for Shoulder Surfing on Mobile Authentication

    Full text link
    Given the nature of mobile devices and unlock procedures, unlock authentication is a prime target for credential leaking via shoulder surfing, a form of an observation attack. While the research community has investigated solutions to minimize or prevent the threat of shoulder surfing, our understanding of how the attack performs on current systems is less well studied. In this paper, we describe a large online experiment (n=1173) that works towards establishing a baseline of shoulder surfing vulnerability for current unlock authentication systems. Using controlled video recordings of a victim entering in a set of 4- and 6-length PINs and Android unlock patterns on different phones from different angles, we asked participants to act as attackers, trying to determine the authentication input based on the observation. We find that 6-digit PINs are the most elusive attacking surface where a single observation leads to just 10.8% successful attacks, improving to 26.5\% with multiple observations. As a comparison, 6-length Android patterns, with one observation, suffered 64.2% attack rate and 79.9% with multiple observations. Removing feedback lines for patterns improves security from 35.3\% and 52.1\% for single and multiple observations, respectively. This evidence, as well as other results related to hand position, phone size, and observation angle, suggests the best and worst case scenarios related to shoulder surfing vulnerability which can both help inform users to improve their security choices, as well as establish baselines for researchers.Comment: Will appear in Annual Computer Security Applications Conference (ACSAC
    • …
    corecore