3,490 research outputs found

    An assessment of blockchain consensus protocols for the Internet of Things

    Get PDF
    In a few short years the Internet of Things has become an intrinsic part of everyday life, with connected devices included in products created for homes, cars and even medical equipment. But its rapid growth has created several security problems, with respect to the transmission and storage of vast amounts of customers data, across an insecure heterogeneous collection of networks. The Internet of Things is therefore creating a unique set of risk and problems that will affect most households. From breaches in confidentiality, which could allow users to be snooped on, through to failures in integrity, which could lead to consumer data being compromised; devices are presenting many security challenges to which consumers are ill equipped to protect themselves from. Moreover, when this is coupled with the heterogeneous nature of the industry, and the interoperable and scalability problems it becomes apparent that the Internet of Things has created an increased attack surface from which security vulnerabilities may be easily exploited. However, it has been conjectured that blockchain may provide a solution to the Internet of Things security and scalability problems. Because of blockchain’s immutability, integrity and scalability, it is possible that its architecture could be used for the storage and transfer of Internet of Things data. Within this paper a cross section of blockchain consensus protocols have been assessed against a requirement framework, to establish each consensus protocols strengths and weaknesses with respect to their potential implementation in an Internet of Things blockchain environment

    On the digital forensic analysis of the Firefox browser via recovery of SQLite artifacts from unallocated space

    Get PDF
    A technique and supporting tool for the recovery of browsing activity (both stored and deleted) from current and recent versions of the Firefox web-browser is presented. The generality of the technique is discussed: It is applicable to any software that uses the popular SQLite embedded database engine such as the Apple Safari web-browser and many Android apps

    Assessing the impact of affective feedback on end-user security awareness

    Get PDF
    A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users’ awareness of security behaviour. An ongoing research project is described, which provides a combined monitoring solution and affective feedback system, designed to provide affective feedback on automatic detection of risky security behaviour within a web browser. Results gained from the research conclude an affective feedback mechanism in a browser-based environment, can promote general awareness of online security

    Dark clouds on the horizon:the challenge of cloud forensics

    Get PDF
    We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing. All potentially render current approaches to digital forensic investigation unusable. We explain how the Cloud, due to its global distribution and multi-jurisdictional nature, exacerbates these challenges. The latest developments in the computing milieu threaten a complete “evidence blackout” with severe implications for the detection, investigation and prosecution of cybercrime. In this paper, we review the current landscape of cloud-based forensics investigations. We posit a number of potential solutions. Cloud forensic difficulties can only be addressed if we acknowledge its socio-technological nature, and design solutions that address both human and technological dimensions. No firm conclusion is drawn; rather the objective is to present a position paper, which will stimulate debate in the area and move the discipline of digital cloud forensics forward. Thus, the paper concludes with an invitation to further informed debate on this issue

    Reducing risky security behaviours:utilising affective feedback to educate users

    Get PDF
    Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview of behaviour considered to be risky, explaining potential threats users may face online. Existing tools developed to reduce risky security behaviours in end-users have been compared, discussing the success rate of various methodologies. Ongoing research is described which attempts to educate users regarding the risks and consequences of poor security behaviour by providing the appropriate feedback on the automatic recognition of risky behaviour. The paper concludes that a solution utilising a browser extension is a suitable method of monitoring potentially risky security behaviour. Ultimately, future work seeks to implement an affective feedback mechanism within the browser extension with the aim of improving security awareness

    Logarithmic deformations of the rational superpotential/Landau-Ginzburg construction of solutions of the WDVV equations

    Get PDF
    The superpotential in the Landau-Ginzburg construction of solutions to the Witten-Dijkgraaf-Verlinde-Verlinde (or WDVV) equations is modified to include logarithmic terms. This results in deformations - quadratic in the deformation parameters- of the normal prepotential solutions of the WDVV equations. Such solutions satisfy various pseudo-quasi-homogeneity conditions, on assigning a notional weight to the deformation parameters. These solutions originate in the so-called `water-bag' reductions of the dispersionless KP hierarchy. This construction includes, as a special case, deformations which are polynomial in the flat coordinates, resulting in a new class of polynomial solutions of the WDVV equations

    Complete Genome Sequence and Comparative Metabolic Profiling of the Prototypical Enteroaggregative Escherichia coli Strain 042

    Get PDF
    Background \ud Escherichia coli can experience a multifaceted life, in some cases acting as a commensal while in other cases causing intestinal and/or extraintestinal disease. Several studies suggest enteroaggregative E. coli are the predominant cause of E. coli-mediated diarrhea in the developed world and are second only to Campylobacter sp. as a cause of bacterial-mediated diarrhea. Furthermore, enteroaggregative E. coli are a predominant cause of persistent diarrhea in the developing world where infection has been associated with malnourishment and growth retardation. \ud \ud Methods \ud In this study we determined the complete genomic sequence of E. coli 042, the prototypical member of the enteroaggregative E. coli, which has been shown to cause disease in volunteer studies. We performed genomic and phylogenetic comparisons with other E. coli strains revealing previously uncharacterised virulence factors including a variety of secreted proteins and a capsular polysaccharide biosynthetic locus. In addition, by using Biolog™ Phenotype Microarrays we have provided a full metabolic profiling of E. coli 042 and the non-pathogenic lab strain E. coli K-12. We have highlighted the genetic basis for many of the metabolic differences between E. coli 042 and E. coli K-12. \ud \ud Conclusion \ud This study provides a genetic context for the vast amount of experimental and epidemiological data published thus far and provides a template for future diagnostic and intervention strategies

    Quality control for multiple breath washout tests in multicentre bronchiectasis studies:Experiences from the BRONCH-UK clinimetrics study

    Get PDF
    Multiple Breath Washout (MBW) to measure Lung Clearance Index (LCI) is increasingly being used as a secondary endpoint in multicentre bronchiectasis studies. LCI data quality control or “over-reading” is resource intensive and the impact is unclear. Objectives: To assess the proportion of MBW tests deemed unacceptable with over-reading, and to assess the change in LCI (number of turnovers), LCI coefficient of variation (CV%) and tidal volume (VT) CV% results after over-reading. Methods: Data were analysed from 250 MBW tests (from 98 adult bronchiectasis patients) collected as part of the Bronch-UK Clinimetrics study in 5 UK centres. Each MBW test was over-read centrally using pre-defined criteria. MBW tests with <2 technically valid and repeatable trials were deemed unacceptable to include in analysis. In accepted tests, values for LCI, LCI CV% and VT CV% before and after over-reading, were compared. Results: Insufficient data was collected in 10/250 tests. With over-reading, 30/240 (12%) were deemed unacceptable to include in analysis. In those accepted tests, overall the change in LCI, LCI CV% and VT CV% with over-reading was not statistically significant. When MBW new sites were compared to MBW expert sites, the change in LCI with over-reading was significantly greater in MBW new sites (p = 0.047). Data suggests that over-reading could be important up to at least 12 months post initiation of MBW activity. Conclusion: MBW over-reading was important in this study as 12% of tests were considered unacceptable. Over-reading improved test result accuracy in sites new to MBW

    Dark clouds on the horizon:the challenge of cloud forensics

    Get PDF
    We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing. All potentially render current approaches to digital forensic investigation unusable. We explain how the Cloud, due to its global distribution and multi-jurisdictional nature, exacerbates these challenges. The latest developments in the computing milieu threaten a complete “evidence blackout” with severe implications for the detection, investigation and prosecution of cybercrime. In this paper, we review the current landscape of cloud-based forensics investigations. We posit a number of potential solutions. Cloud forensic difficulties can only be addressed if we acknowledge its socio-technological nature, and design solutions that address both human and technological dimensions. No firm conclusion is drawn; rather the objective is to present a position paper, which will stimulate debate in the area and move the discipline of digital cloud forensics forward. Thus, the paper concludes with an invitation to further informed debate on this issue
    corecore