555 research outputs found

    Soros, Child Sacrifices, and {5G}: {U}nderstanding the Spread of Conspiracy Theories on {Web} Communities

    Get PDF
    This paper presents a multi-platform computational pipeline geared to identify social media posts discussing (known) conspiracy theories. We use 189 conspiracy claims collected by Snopes, and find 66k posts and 277k comments on Reddit, and 379k tweets discussing them. Then, we study how conspiracies are discussed on different Web communities and which ones are particularly influential in driving the discussion about them. Our analysis sheds light on how conspiracy theories are discussed and spread online, while highlighting multiple challenges in mitigating them

    MaMaDroid: Detecting Android malware by building markov chains of behavioral models (extended version)

    Get PDF
    As Android has become increasingly popular, so has malware targeting it, thus motivating the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard to design robust tools that can operate for long periods of time without the need for modifications or costly re-training. Aiming to address this issue, we set to detect malware from a behavioral point of view, modeled as the sequence of abstracted API calls. We introduce MaMaDroid, a static-analysis based system that abstracts app’s API calls to their class, package, or family, and builds a model from their sequences obtained from the call graph of an app as Markov chains. This ensures that the model is more resilient to API changes and the features set is of manageable size. We evaluate MaMaDroid using a dataset of 8.5K benign and 35.5K malicious apps collected over a period of six years, showing that it effectively detects malware (with up to 0.99 F-measure) and keeps its detection capabilities for long periods of time (up to 0.87 F-measure two years after training). We also show that MaMaDroid remarkably overperforms DroidAPIMiner, a state-of-the-art detection system that relies on the frequency of (raw) API calls. Aiming to assess whether MaMaDroid’s effectiveness mainly stems from the API abstraction or from the sequencing modeling, we also evaluate a variant of it that uses frequency (instead of sequences), of abstracted API calls. We find that it is not as accurate, failing to capture maliciousness when trained on malware samples that include API calls that are equally or more frequently used by benign apps

    "I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers

    Get PDF
    While the Internet has dramatically increased the exposure that research can receive, it has also facilitated harassment against scholars. To understand the impact that these attacks can have on the work of researchers, we perform a series of systematic interviews with researchers including academics, journalists, and activists, who have experienced targeted, Internet-facilitated harassment. We provide a framework for understanding the types of harassers that target researchers, the harassment that ensues, and the personal and professional impact on individuals and academic freedom. We then study preventative and remedial strategies available, and the institutions that prevent some of these strategies from being more effective. Finally, we discuss the ethical structures that could facilitate more equitable access to participating in research without serious personal suffering

    Flexible and Robust Privacy-Preserving Implicit Authentication

    Full text link
    Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.). While implicit authentication makes identity theft by third parties more difficult, it requires the server to learn and store the user's usage profile. Recently, the first privacy-preserving implicit authentication system was presented, in which the server does not learn the user's profile. It uses an ad hoc two-party computation protocol to compare the user's fresh sampled features against an encrypted stored user's profile. The protocol requires storing the usage profile and comparing against it using two different cryptosystems, one of them order-preserving; furthermore, features must be numerical. We present here a simpler protocol based on set intersection that has the advantages of: i) requiring only one cryptosystem; ii) not leaking the relative order of fresh feature samples; iii) being able to deal with any type of features (numerical or non-numerical). Keywords: Privacy-preserving implicit authentication, privacy-preserving set intersection, implicit authentication, active authentication, transparent authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May 26-28, 2015, IFIP AICT, Springer, to appea

    Influence of carbon and nitrogen on electronic structure and hyperfine interactions in fcc iron-based alloys

    Full text link
    Carbon and nitrogen austenites, modeled by Fe8N and Fe8C superstructures are studied by full-potential LAPW method. Structure parameters, electronic and magnetic properties as well as hyperfine interaction parameters are obtained. Calculations prove that Fe-C austenite can be successfully modeled by ordered Fe8C superstructure. The results show that chemical Fe-C bond in Fe8C has higher covalent part than in Fe8N. Detailed analysis of electric field gradient formation for both systems is performed. The calculation of electric field gradient allow us to carry out a good interpretation of Moessbauer spectra for Fe-C and Fe-N systems.Comment: 8 pages, 3 figures, IOP-style LaTeX, submitted to J. Phys. Condens. Matte

    Whole genome sequencing: Revolutionary medicine or privacy nightmare?

    Get PDF
    Whole genome sequencing will soon become affordable for many individuals, but thorny privacy and ethical issues could jeopardize its popularity and thwart the large-scale adoption of genomics in healthcare and slow potential medical advances. The Web extra at http://youtu.be/As3J9NYsbbY is an audio recording of Alf Weaver interviewing Bradley Malin and Jacques Fellay about the possibilities and challenges of whole genome sequencing. © 1970-2012 IEEE

    Eriophyid mites in classical biological control of weeds: Progress and challenges

    Get PDF
    A classical biological control agent is an exotic host-specific natural enemy, which is intentionally introduced to obtain long-term control of an alien invasive species. Among the arthropods considered for this role, eriophyid mites are likely to possess the main attributes required: Host specificity, efficacy, and long-lasting effects. However, so far, only a few species have been approved for release. Due to their microscopic size and the general lack of knowledge regarding their biology and behavior, working with eriophyids is particularly challenging. Furthermore, mites disperse in wind, and little is known about biotic and abiotic constraints to their population growth. All these aspects pose challenges that, if not properly dealt with, can make it particularly difficult to evaluate eriophyids as prospective biological control agents and jeopardize the general success of control programs. We identified some of the critical aspects of working with eriophyids in classical biological control of weeds and focused on how they have been or may be addressed. In particular, we analyzed the importance of accurate mite identification, the difficulties faced in the evaluation of their host specificity, risk assessment of nontarget species, their impact on the weed, and the final steps of mite release and post-release monitoring

    Secure Similar Sequence Query on Outsourced Genomic Data

    Get PDF
    The growing availability of genomic data is unlocking research potentials on genomic-data analysis. It is of great importance to outsource the genomic-analysis tasks onto clouds to leverage their powerful computational resources over the large-scale genomic sequences. However, the remote placement of the data raises personal-privacy concerns, and it is challenging to evaluate data-analysis functions on outsourced genomic data securely and efficiently. In this work, we study the secure similar-sequence-query (SSQ) problem over outsourced genomic data, which has not been fully investigated. To address the challenges of security and efficiency, we propose two protocols in the mixed form, which combine two-party secure secret sharing, garbled circuit, and partial homomorphic encryptions together and use them to jointly fulfill the secure SSQ function. In addition, our protocols support multi-user queries over a joint genomic data set collected from multiple data owners, making our solution scalable. We formally prove the security of protocols under the semi-honest adversary model, and theoretically analyze the performance. We use extensive experiments over real-world dataset on a commercial cloud platform to validate the efficacy of our proposed solution, and demonstrate the performance improvements compared with state-of-the-art works

    Combining Private Set-Intersection with Secure Two-Party Computation

    Get PDF
    Private Set-Intersection (PSI) is one of the most popular and practically relevant secure two-party computation (2PC) tasks. Therefore, designing special-purpose PSI protocols (which are more efficient than generic 2PC solutions) is a very active line of research. In particular, a recent line of work has proposed PSI protocols based on oblivious transfer (OT) which, thanks to recent advances in OT-extension techniques, is nowadays a very cheap cryptographic building block. Unfortunately, these protocols cannot be plugged into larger 2PC applications since in these protocols one party (by design) learns the output of the intersection. Therefore, it is not possible to perform secure post-processing of the output of the PSI protocol. In this paper we propose a novel and efficient OT-based PSI protocol that produces an encrypted output that can therefore be later used as an input to other 2PC protocols. In particular, the protocol can be used in combination with all common approaches to 2PC including garbled circuits, secret sharing and homomorphic encryption. Thus, our protocol can be combined with the right 2PC techniques to achieve more efficient protocols for computations of the form z=f(X∩Y)z=f(X\cap Y) for arbitrary functions ff

    Last-male sperm precedence in Rhynchophorus ferrugineus (Olivier): observations in laboratory mating experiments with irradiated males

    Get PDF
    The Red PalmWeevil (RPW)Rhynchophorus ferrugineus(Olivier 1790) is an invasive pest from southeastern Asia and Melanesia that in the last 30 years has spread widely in the Middle East and Mediterranean Basin. Its stem-boring larvae cause great damage to several palm species of the Arecaceae family, many of which are economically important for agricultural and ornamental purposes. Therefore, great attention has recently been focused in studying this species to identify sustainable and effective eradication strategies, such as sterile insect technique (SIT). The rapid spread of RPW is associated with its high reproductive success. To evaluate the suitability of a SIT strategy, particular physiological and behavioral aspects of RPW reproduction, such as the presence of polyandry and post-copulatory sperm selection mechanisms, were investigated. To determine paternity of progeny from multiply mated females, double-crossing experiments were carried out confining individual females with either a wild-type male or a γ-irradiated male (Co-60). Fecundity and fertility of females were scored to evaluate post-copulatory sperm selection. Results showed that progeny were almost exclusively produced by the sperm of the second male, suggesting that a last-male sperm precedence is expressed at high levels in this species, and providing interesting insights for an area-wide RPW management strategy such as the SIT
    • …
    corecore