438 research outputs found
Photomultiplier tube development for the 1.06 micrometer wavelength
High speed, electrostatic photomultipliers were developed for use in 400 megabit laser communication systems operating at the 1.06 micron wavelength. A high performance, electrostatic III-V photocathode PMT was shown in communication system tests to perform competitively with solid state and avalanche photodiodes. Signal-induced noise and III-V cathode stability were identified as remaining technical problems while cathode quantum efficiencies of or = 5% at 1.06 micron and 320 picosecond rise and fall time pulse performance were achieved
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic
It is well known that apps running on mobile devices extensively track and
leak users' personally identifiable information (PII); however, these users
have little visibility into PII leaked through the network traffic generated by
their devices, and have poor control over how, when and where that traffic is
sent and handled by third parties. In this paper, we present the design,
implementation, and evaluation of ReCon: a cross-platform system that reveals
PII leaks and gives users control over them without requiring any special
privileges or custom OSes. ReCon leverages machine learning to reveal potential
PII leaks by inspecting network traffic, and provides a visualization tool to
empower users with the ability to control these leaks via blocking or
substitution of PII. We evaluate ReCon's effectiveness with measurements from
controlled experiments using leaks from the 100 most popular iOS, Android, and
Windows Phone apps, and via an IRB-approved user study with 92 participants. We
show that ReCon is accurate, efficient, and identifies a wider range of PII
than previous approaches.Comment: Please use MobiSys version when referencing this work:
http://dl.acm.org/citation.cfm?id=2906392. 18 pages, recon.meddle.mob
Overcoming Barriers to Efficiency
The article discusses factors that hinder the installation of high-performance heating, ventilation and air conditioning (HVAC) equipment in commercial and residential buildings in the United States. For owner-occupied buildings, the utility and capital expenses are ultimately included in one corporate budget. Thus, decision processes become a justification of any additional expense for higher performing equipment relative to the expected returns via lower energy costs. In an existing building, business management principles determine the evaluation process. Certain economic factors apply regardless of building ownership. For example, a cost is associated with the information gathering process for new technology or obtaining information relevant to current resource use. This is primarily a direct expense in the form of employee salaries or consultant fees. INSET: Sustainable HVAC for Modular Classrooms
ConXsense - Automated Context Classification for Context-Aware Access Control
We present ConXsense, the first framework for context-aware access control on
mobile devices based on context classification. Previous context-aware access
control systems often require users to laboriously specify detailed policies or
they rely on pre-defined policies not adequately reflecting the true
preferences of users. We present the design and implementation of a
context-aware framework that uses a probabilistic approach to overcome these
deficiencies. The framework utilizes context sensing and machine learning to
automatically classify contexts according to their security and privacy-related
properties. We apply the framework to two important smartphone-related use
cases: protection against device misuse using a dynamic device lock and
protection against sensory malware. We ground our analysis on a sociological
survey examining the perceptions and concerns of users related to contextual
smartphone security and analyze the effectiveness of our approach with
real-world context data. We also demonstrate the integration of our framework
with the FlaskDroid architecture for fine-grained access control enforcement on
the Android platform.Comment: Recipient of the Best Paper Awar
Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China
Many mobile apps are integrated with mobile advertising and tracking services running in the background to collect information for tracking users. Considering China currently tops mobile traffic growth globally, this paper aims to take a first look at China’s mobile tracking patterns from a large 4G network. We observe the dominance of the top popular domestic trackers and the pervasive tracking on mobile apps. We also discover a very well-connected tracking community, where the non-popular trackers form many local communities with each community tracking a particular category of mobile apps. We further conclude that some trackers have a monopoly on specific groups of mobile users and 10% of users upload Personally Identifiable Information (PII) to trackers (with 90% of PII tracking flows local to China). Our results consistently show a distinctive mobile tracking market in China. We hope the results can inform users and stakeholders on the interplay between mobile tracking and potential security and privacy issues
Effective action of a 2+1 dimensional system of nonrelativistic fermions in the presence of a uniform magnetic field: dissipation effects
The effective action of nonrelativistic fermions in 2+1 dimensions is
analyzed at finite temperature and chemical potential in the presence of a
uniform magnetic field perpendicular to the plane. The method used is a
generalization of the derivative expansion technique. The induced Chern-Simons
term is computed and shown to exhibit the Hall quantization. Effects of
dissipation due to collisions are also analyzed.Comment: 12 page
Secure Multi-Execution in Android
Mobile operating systems, such as Google’s Android, have become a fixed part of our daily lives and are entrusted with a plethora of private information. Congruously, their data protection mechanisms have been improved steadily over the last decade and, in particular, for Android, the research community has explored various enhancements and extensions to the access control model. However, the vast majority of those solutions has been concerned with controlling the access to data, but equally important is the question of how to control the flow of data once released. Ignoring control over the dissemination of data between applications or between components of the same app, opens the door for attacks, such as permission re-delegation or privacy-violating third-party libraries. Controlling information flows is a long-standing problem, and one of the most recent and practical-oriented approaches to information flow control is secure multi-execution.
In this paper, we present Ariel, the design and implementation of an IFC architecture for Android based on the secure multi-execution of apps. Ariel demonstrably extends Android’s system with support for executing multiple instances of apps, and it is equipped with a policy lattice derived from the protection levels of Android’s permissions as well as an I/O scheduler to achieve control over data flows between application instances. We demonstrate how secure multi-execution with Ariel can help to mitigate two prominent attacks on Android, permission re-delegations and malicious advertisement libraries
Novel study designs to investigate the placebo response
<p>Abstract</p> <p>Background</p> <p>Investigating the size and mechanisms of the placebo response in clinical trials have relied on experimental procedures that simulate the double-blind randomized placebo-controlled design. However, as the conventional design is thought to elucidate drug rather than placebo actions, different methodological procedures are needed for the placebo response.</p> <p>Methods</p> <p>We reviewed the respective literature for trials designs that may be used to elucidate the size of the placebo response and the mechanisms associated with it.</p> <p>Results</p> <p>In general, this can be done by either manipulation the information provided to the subjects, or by manipulation the timing of the drug applied. Two examples of each strategy are discussed: the "balanced placebo design" (BDP) and the "balanced cross-over design" (BCD) and their variants are based on false information, while the "hidden treatment" (HT) and the ""delayed response test" (DRT) are based on manipulating the time of drug action. Since most such approaches include deception or incomplete information of the subjects they are suitable for patient only with authorized deception.</p> <p>Conclusion</p> <p>Both manipulating the information provided to subjects (BDP, DCD) or manipulating the timing of drug application (HT, DRT) allows overcoming some of the restrictions of conventional drug trials in the assessment of the placebo response, but they are feasible mostly in healthy subjects for ethical reasons.</p
- …