9,963 research outputs found
ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider (LBSP). In such a scenario, user privacy becomes a major con- cern: the knowledge about user location may lead to her identification as well as a continuous tracing of her position. Researchers proposed several approaches to preserve users’ location privacy. They also showed that hiding the location of an LBS user is not enough to guarantee her privacy, i.e., user’s pro- file attributes or background knowledge of an attacker may reveal the user’s identity. In this paper we propose ABAKA, a novel collaborative approach that provides identity privacy for LBS users considering users’ profile attributes. In particular, our solution guarantees p -sensitive k -anonymity for the user that sends an LBS request to the LBSP. ABAKA computes a cloaked area by collaborative multi-hop forwarding of the LBS query, and using Ciphertext-Policy Attribute-Based Encryption (CP-ABE). We ran a thorough set of experiments to evaluate our solution: the results confirm the feasibility and efficiency of our proposal
The RD53 Collaboration's SystemVerilog-UVM Simulation Framework and its General Applicability to Design of Advanced Pixel Readout Chips
The foreseen Phase 2 pixel upgrades at the LHC have very challenging
requirements for the design of hybrid pixel readout chips. A versatile pixel
simulation platform is as an essential development tool for the design,
verification and optimization of both the system architecture and the pixel
chip building blocks (Intellectual Properties, IPs). This work is focused on
the implemented simulation and verification environment named VEPIX53, built
using the SystemVerilog language and the Universal Verification Methodology
(UVM) class library in the framework of the RD53 Collaboration. The environment
supports pixel chips at different levels of description: its reusable
components feature the generation of different classes of parameterized input
hits to the pixel matrix, monitoring of pixel chip inputs and outputs,
conformity checks between predicted and actual outputs and collection of
statistics on system performance. The environment has been tested performing a
study of shared architectures of the trigger latency buffering section of pixel
chips. A fully shared architecture and a distributed one have been described at
behavioral level and simulated; the resulting memory occupancy statistics and
hit loss rates have subsequently been compared.Comment: 15 pages, 10 figures (11 figure files), submitted to Journal of
Instrumentatio
A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would significantly limit the potential damage of malware. This is a more profound risk in Cyber-Physical Systems (CPSs), where a malware attack may cause significant physical damage to the infrastructure. Due to limited on-device available memory and processing power in CPS devices, most of the efforts for protecting CPS networks are focused on the edge layer, where the majority of security mechanisms are deployed.
Since the majority of advanced and sophisticated malware programs are combining features from different families, these malicious programs are not similar enough to any existing malware family and easily evade binary classifier detection. Therefore, in this article, we propose a novel multilabel fuzzy clustering system for malware attack attribution. Our system is deployed on the edge layer to provide insight into applicable malware threats to the CPS network. We leverage static analysis by utilizing Opcode frequencies as the feature space to classify malware families.
We observed that a multilabel classifier does not classify a part of samples. We named this problem the instance coverage problem. To overcome this problem, we developed an ensemble-based multilabel fuzzy classification method to suggest the relevance of a malware instance to the stricken families. This classifier identified samples of VirusShare, RansomwareTracker, and BIG2015 with an accuracy of 94.66%, 94.26%, and 97.56%, respectively
The economics of multisystemic resilience
The concept of resilience in the economic literature is centered around the capacity to overcome adverse circumstances and to mitigate the impacts of shocks through the development of human capital starting in early childhood. In this chapter, the authors review the existing evidence on multisystemic resilience in economics, from both a micro- and a macroperspective. To do so, they first introduce the theory of human capital development and the large body of empirical evidence about early interventions that seek to boost resilience in children. They then discuss two more recent strands of literature: one that examines whether subsequent investments can offset the effects of early-life shocks and another that uses micro-founded macroeconomic models to understand the indirect (multisystemic) effects of early interventions
Calabi-Yau cones from contact reduction
We consider a generalization of Einstein-Sasaki manifolds, which we
characterize in terms both of spinors and differential forms, that in the real
analytic case corresponds to contact manifolds whose symplectic cone is
Calabi-Yau. We construct solvable examples in seven dimensions. Then, we
consider circle actions that preserve the structure, and determine conditions
for the contact reduction to carry an induced structure of the same type. We
apply this construction to obtain a new hypo-contact structure on S^2\times
T^3.Comment: 30 pages; v2: typos corrected, presentation improved, one reference
added. To appear in Ann. Glob. Analysis and Geometr
H-Band Spectroscopic Classification of OB Stars
We present a new spectroscopic classification for OB stars based on H-band
(1.5 micron to 1.8 micron) observations of a sample of stars with optical
spectral types. Our initial sample of nine stars demonstrates that the
combination of He I 1.7002 micron and H Brackett series absorption can be used
to determine spectral types for stars between about O4 and B7 (to within about
+/- 2 sub-types). We find that the Brackett series exhibits luminosity effects
similar to the Balmer series for the B stars. This classification scheme will
be useful in studies of optically obscured high mass star forming regions. In
addition, we present spectra for the OB stars near 1.1 micron and 1.3 micron
which may be of use in analyzing their atmospheres and winds.Comment: Accepted by AJ, 16 pages Latex (aastex4.0) including 4 figures and 2
tables. A complete PostScript copy is available at
ftp://degobah.colorado.edu/pub/rblum/Hband
Shaken Granular Lasers
Granular materials have been studied for decades, also driven by industrial
and technological applications. These very simple systems, composed by
agglomerations of mesoscopic particles, are characterized, in specific regimes,
by a large number of metastable states and an extreme sensitivity (e.g., in
sound transmission) on the arrangement of grains; they are not substantially
affected by thermal phenomena, but can be controlled by mechanical
solicitations. Laser emission from shaken granular matter is so far unexplored;
here we provide experimental evidence that it can be affected and controlled by
the status of motion of the granular, we also find that competitive random
lasers can be observed. We hence demonstrate the potentialities of gravity
affected moving disordered materials for optical applications, and open the
road to a variety of novel interdisciplinary investigations, involving modern
statistical mechanics and disordered photonics.Comment: 4 pages, 3 figures. To be published in Physical Review Letter
On the feasibility of attribute-based encryption on Internet of Things devices
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far. This article explores such feasibility for well-known IoT platforms, namely, Intel Galileo Gen 2, Intel Edison, Raspberry pi 1 model B, and Raspberry pi zero, and concludes that adopting ABE in the IoT is indeed feasible
Experimental measurement of photothermal effect in Fabry-Perot cavities
We report the experimental observation of the photothermal effect. The
measurements are performed by modulating the laser power absorbed by the
mirrors of two high-finesse Fabry-Perot cavities. The results are very well
described by a recently proposed theoretical model [M. Cerdonio, L. Conti, A.
Heidmann and M. Pinard, Phys. Rev. D 63 (2001) 082003], confirming the
correctness of such calculations. Our observations and quantitative
characterization of the photothermal effect demonstrate its critical importance
for high sensitivity interferometric displacement measurements, as those
necessary for gravitational wave detection.Comment: 4 pages, 3 figures, submitted to Phys. Rev. Let
Shining a Light on the Federal Reserve’s Foreign Affairs
Throughout its history, the U.S. Federal Reserve has engaged in international diplomacy, outside the bounds of (and sometimes in conflict with) the priorities of the White House and U.S. State Department. In directing monetary policy, the Fed’s primary concern is to benefit the U.S. economy. In the process, the Fed at times acts in concert with foreign central banks, as was the case in setting new bank regulations after the 2008 financial crisis. At other times, the Fed acts in ways that other countries view as detrimental to their economic interests. Either way, the Fed operates with little public accountability and can wind up complicating the work of U.S. diplomats. This issue brief focuses on the questions of whether and how greater oversight of the Fed’s international activities should be pursued. It recommends not an overhaul of the Fed’s structure or the elimination of its role in international affairs but instead calls for greater disclosure of its international activities. The Fed should provide testimony to Congress twice per year on its foreign policies, just as it does for monetary and regulatory policy. This kind of disclosure permits broader discussion of the Fed’s activities without eliminating the benefits of its institutional independence for monetary policy.https://repository.upenn.edu/pennwhartonppi/1063/thumbnail.jp
- …