438 research outputs found

    Photomultiplier tube development for the 1.06 micrometer wavelength

    Get PDF
    High speed, electrostatic photomultipliers were developed for use in 400 megabit laser communication systems operating at the 1.06 micron wavelength. A high performance, electrostatic III-V photocathode PMT was shown in communication system tests to perform competitively with solid state and avalanche photodiodes. Signal-induced noise and III-V cathode stability were identified as remaining technical problems while cathode quantum efficiencies of or = 5% at 1.06 micron and 320 picosecond rise and fall time pulse performance were achieved

    ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic

    Get PDF
    It is well known that apps running on mobile devices extensively track and leak users' personally identifiable information (PII); however, these users have little visibility into PII leaked through the network traffic generated by their devices, and have poor control over how, when and where that traffic is sent and handled by third parties. In this paper, we present the design, implementation, and evaluation of ReCon: a cross-platform system that reveals PII leaks and gives users control over them without requiring any special privileges or custom OSes. ReCon leverages machine learning to reveal potential PII leaks by inspecting network traffic, and provides a visualization tool to empower users with the ability to control these leaks via blocking or substitution of PII. We evaluate ReCon's effectiveness with measurements from controlled experiments using leaks from the 100 most popular iOS, Android, and Windows Phone apps, and via an IRB-approved user study with 92 participants. We show that ReCon is accurate, efficient, and identifies a wider range of PII than previous approaches.Comment: Please use MobiSys version when referencing this work: http://dl.acm.org/citation.cfm?id=2906392. 18 pages, recon.meddle.mob

    Overcoming Barriers to Efficiency

    Get PDF
    The article discusses factors that hinder the installation of high-performance heating, ventilation and air conditioning (HVAC) equipment in commercial and residential buildings in the United States. For owner-occupied buildings, the utility and capital expenses are ultimately included in one corporate budget. Thus, decision processes become a justification of any additional expense for higher performing equipment relative to the expected returns via lower energy costs. In an existing building, business management principles determine the evaluation process. Certain economic factors apply regardless of building ownership. For example, a cost is associated with the information gathering process for new technology or obtaining information relevant to current resource use. This is primarily a direct expense in the form of employee salaries or consultant fees. INSET: Sustainable HVAC for Modular Classrooms

    ConXsense - Automated Context Classification for Context-Aware Access Control

    Full text link
    We present ConXsense, the first framework for context-aware access control on mobile devices based on context classification. Previous context-aware access control systems often require users to laboriously specify detailed policies or they rely on pre-defined policies not adequately reflecting the true preferences of users. We present the design and implementation of a context-aware framework that uses a probabilistic approach to overcome these deficiencies. The framework utilizes context sensing and machine learning to automatically classify contexts according to their security and privacy-related properties. We apply the framework to two important smartphone-related use cases: protection against device misuse using a dynamic device lock and protection against sensory malware. We ground our analysis on a sociological survey examining the perceptions and concerns of users related to contextual smartphone security and analyze the effectiveness of our approach with real-world context data. We also demonstrate the integration of our framework with the FlaskDroid architecture for fine-grained access control enforcement on the Android platform.Comment: Recipient of the Best Paper Awar

    Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China

    Get PDF
    Many mobile apps are integrated with mobile advertising and tracking services running in the background to collect information for tracking users. Considering China currently tops mobile traffic growth globally, this paper aims to take a first look at China’s mobile tracking patterns from a large 4G network. We observe the dominance of the top popular domestic trackers and the pervasive tracking on mobile apps. We also discover a very well-connected tracking community, where the non-popular trackers form many local communities with each community tracking a particular category of mobile apps. We further conclude that some trackers have a monopoly on specific groups of mobile users and 10% of users upload Personally Identifiable Information (PII) to trackers (with 90% of PII tracking flows local to China). Our results consistently show a distinctive mobile tracking market in China. We hope the results can inform users and stakeholders on the interplay between mobile tracking and potential security and privacy issues

    Effective action of a 2+1 dimensional system of nonrelativistic fermions in the presence of a uniform magnetic field: dissipation effects

    Full text link
    The effective action of nonrelativistic fermions in 2+1 dimensions is analyzed at finite temperature and chemical potential in the presence of a uniform magnetic field perpendicular to the plane. The method used is a generalization of the derivative expansion technique. The induced Chern-Simons term is computed and shown to exhibit the Hall quantization. Effects of dissipation due to collisions are also analyzed.Comment: 12 page

    Secure Multi-Execution in Android

    Get PDF
    Mobile operating systems, such as Google’s Android, have become a fixed part of our daily lives and are entrusted with a plethora of private information. Congruously, their data protection mechanisms have been improved steadily over the last decade and, in particular, for Android, the research community has explored various enhancements and extensions to the access control model. However, the vast majority of those solutions has been concerned with controlling the access to data, but equally important is the question of how to control the flow of data once released. Ignoring control over the dissemination of data between applications or between components of the same app, opens the door for attacks, such as permission re-delegation or privacy-violating third-party libraries. Controlling information flows is a long-standing problem, and one of the most recent and practical-oriented approaches to information flow control is secure multi-execution. In this paper, we present Ariel, the design and implementation of an IFC architecture for Android based on the secure multi-execution of apps. Ariel demonstrably extends Android’s system with support for executing multiple instances of apps, and it is equipped with a policy lattice derived from the protection levels of Android’s permissions as well as an I/O scheduler to achieve control over data flows between application instances. We demonstrate how secure multi-execution with Ariel can help to mitigate two prominent attacks on Android, permission re-delegations and malicious advertisement libraries

    Novel study designs to investigate the placebo response

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Investigating the size and mechanisms of the placebo response in clinical trials have relied on experimental procedures that simulate the double-blind randomized placebo-controlled design. However, as the conventional design is thought to elucidate drug rather than placebo actions, different methodological procedures are needed for the placebo response.</p> <p>Methods</p> <p>We reviewed the respective literature for trials designs that may be used to elucidate the size of the placebo response and the mechanisms associated with it.</p> <p>Results</p> <p>In general, this can be done by either manipulation the information provided to the subjects, or by manipulation the timing of the drug applied. Two examples of each strategy are discussed: the "balanced placebo design" (BDP) and the "balanced cross-over design" (BCD) and their variants are based on false information, while the "hidden treatment" (HT) and the ""delayed response test" (DRT) are based on manipulating the time of drug action. Since most such approaches include deception or incomplete information of the subjects they are suitable for patient only with authorized deception.</p> <p>Conclusion</p> <p>Both manipulating the information provided to subjects (BDP, DCD) or manipulating the timing of drug application (HT, DRT) allows overcoming some of the restrictions of conventional drug trials in the assessment of the placebo response, but they are feasible mostly in healthy subjects for ethical reasons.</p
    • …
    corecore