538 research outputs found

    Practical Attacks on Cryptographically End-to-end Verifiable Internet Voting Systems

    Get PDF
    Cryptographic end-to-end verifiable voting technologies concern themselves with the provision of a more trustworthy, transparent, and robust elections. To provide voting systems with more transparency and accountability throughout the process while preserving privacy which allows voters to express their true intent. Helios Voting is one of these systems---an online platform where anyone can easily host their own cryptographically end-to-end verifiable election, aiming to bring verifiable voting to the masses. Helios does this by providing explicit cryptographic checks that an election was counted correctly, checks that any member of the public can independently verify. All of this while still protecting one of the essential properties of open democracy, voter privacy. In spite of these cryptographic checks and the strong mathematical assertions of correctness they provide, this thesis discusses the discovery and exploit of three vulnerabilities. The first is the insufficient validation of cryptographic elements in Helios ballots uploaded by users. This allows a disgruntled voter to cast a carefully crafted ballot which will prevent an election from being tallied. The second vulnerability is the insufficient validation of cryptographic parameters used in ElGamal by an election official. This leads to an attack where the election official can upload weak parameters allowing the official to cast arbitrary votes in a single ballot. The final attack is a cross-site scripting attack that would allow anyone to steal or re-cast ballots on behalf of victims. We coordinated disclosure with the Helios developers and provided fixes for all the vulnerabilities outlined in the thesis. Additionally, this thesis adds to the body of work highlighting the fragility of internet voting applications and discusses the unique challenges faced by internet voting applications

    PHALANX: Expendable Projectile Sensor Networks for Planetary Exploration

    Get PDF
    Technologies enabling long-term, wide-ranging measurement in hard-to-reach areas are a critical need for planetary science inquiry. Phenomena of interest include flows or variations in volatiles, gas composition or concentration, particulate density, or even simply temperature. Improved measurement of these processes enables understanding of exotic geologies and distributions or correlating indicators of trapped water or biological activity. However, such data is often needed in unsafe areas such as caves, lava tubes, or steep ravines not easily reached by current spacecraft and planetary robots. To address this capability gap, we have developed miniaturized, expendable sensors which can be ballistically lobbed from a robotic rover or static lander - or even dropped during a flyover. These projectiles can perform sensing during flight and after anchoring to terrain features. By augmenting exploration systems with these sensors, we can extend situational awareness, perform long-duration monitoring, and reduce utilization of primary mobility resources, all of which are crucial in surface missions. We call the integrated payload that includes a cold gas launcher, smart projectiles, planning software, network discovery, and science sensing: PHALANX. In this paper, we introduce the mission architecture for PHALANX and describe an exploration concept that pairs projectile sensors with a rover mothership. Science use cases explored include reconnaissance using ballistic cameras, volatiles detection, and building timelapse maps of temperature and illumination conditions. Strategies to autonomously coordinate constellations of deployed sensors to self-discover and localize with peer ranging (i.e. a local GPS) are summarized, thus providing communications infrastructure beyond-line-of-sight (BLOS) of the rover. Capabilities were demonstrated through both simulation and physical testing with a terrestrial prototype. The approach to developing a terrestrial prototype is discussed, including design of the launching mechanism, projectile optimization, micro-electronics fabrication, and sensor selection. Results from early testing and characterization of commercial-off-the-shelf (COTS) components are reported. Nodes were subjected to successful burn-in tests over 48 hours at full logging duty cycle. Integrated field tests were conducted in the Roverscape, a half-acre planetary analog environment at NASA Ames, where we tested up to 10 sensor nodes simultaneously coordinating with an exploration rover. Ranging accuracy has been demonstrated to be within +/-10cm over 20m using commodity radios when compared to high-resolution laser scanner ground truthing. Evolution of the design, including progressive miniaturization of the electronics and iterated modifications of the enclosure housing for streamlining and optimized radio performance are described. Finally, lessons learned to date, gaps toward eventual flight mission implementation, and continuing future development plans are discussed

    Ikioo Flying Robot

    Get PDF

    CRISPR/Cas-based screening of long non-coding RNAs (lncRNAs) in macrophages with an NF-κB reporter.

    Get PDF
    The innate immune system protects against infections by initiating an inducible inflammatory response. NF-κB is one of the critical transcription factors controlling this complex response, but some aspects of its regulation remain unclear. For example, although long non-coding RNAs (lncRNAs) have been shown to critically regulate gene expression, only a fraction of these have been functionally characterized, and the extent to which lncRNAs control NF-κB expression is unknown. Here, we describe the generation of a GFP-based NF-κB reporter system in immortalized murine bone marrow-derived macrophages (iBMDM). Activation of this reporter, using Toll-like receptor ligands, resulted in GFP expression, which could be monitored by flow cytometry. We also established a CRISPR/Cas9 gene deletion system in this NF-κB reporter line, enabling us to screen for genes that regulate NF-κB signaling. Our deletion-based approach identified two long intergenic non-coding(linc)RNAs, lincRNA-Cox2 and lincRNA-AK170409, that control NF-κB signaling. We demonstrate a potential novel role for lincRNA-Cox2 in promoting IκBα degradation in the cytoplasm. For lincRNA-AK170409, we provide evidence that this nuclearly-localized lincRNA regulates a number of inflammation-related genes. In conclusion, we have established an NF-κB-GFP iBMDM reporter cell line and a line that stably expresses Cas9. Our approach enabled the identification of lincRNA-Cox2 and lincRNA-AK170409 as NF-κB regulators, and this tool will be useful for identifying additional genes involved in regulating this transcription factor critical for immune function

    Clumping Morphology Influences Virulence Uncoupled from Echinocandin Resistance in \u3cem\u3eCandida glabrata\u3c/em\u3e

    Get PDF
    Here, we report two paired sets of an index wild-type Candida glabrata bloodstream isolate and subsequent echinocandin-resistant FKS mutant. One paired set exhibited a higher proportion of clumping cells and was more virulent in the invertebrate host Galleria mellonella than the other paired set. No virulence difference between the paired index and FKS strains was observed. These findings imply a potential link of clumping morphology with virulence in C. glabrata that is uncoupled from FKS-mediated echinocandin resistance. IMPORTANCE Candida glabrata is a leading cause of invasive candidiasis. In contrast to other species, it has a high propensity for developing resistance to echinocandins, which are the first-line treatment. Unlike the dimorphic Candida albicans which can grow invasive filamentous hyphae, C. glabrata lacks this ability. Here, we report a link between virulence and clumping cell morphology in two different sets of clinical C. glabrata strains obtained from patients failing echinocandin therapy. One set of paired strains (echinocandin-susceptible and subsequent resistant mutant) had a high proportion of clumping cells in the population and were significantly more virulent than another set which had fewer clumping cells. Additionally, we corroborate that echinocandin resistance does not impart a significant fitness cost. Our findings suggest that clumping morphology may be an important but previously underestimated virulence factor for C. glabrata and also aid our understand for the high prevalence of resistance observed in this species

    Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS

    Get PDF
    Software implementations of discrete logarithm based cryptosystems over finite fields typically make the assumption that any domain parameters they are presented with are trustworthy, i.e., the parameters implement cyclic groups where the discrete logarithm problem is assumed to be hard. An informal and widespread justification for this seemingly exists that says validating parameters at run time is too computationally expensive relative to the perceived risk of a server sabotaging the privacy of its own connection. In this paper we explore this trust assumption and examine situations where it may not always be justified. We conducted an investigation of discrete logarithm domain parameters in use across the Internet and discovered evidence of a multitude of potentially backdoored moduli of unknown order in TLS and STARTTLS spanning numerous countries, organizations, and protocols. Although our disclosures resulted in a number of organizations taking down suspicious parameters, we argue the potential for TLS backdoors is systematic and will persist until either until better parameter hygiene is taken up by the community, or finite field based cryptography is eliminated altogether

    WeJ collaborative playlists

    Get PDF
    WeJ (pronounced we-jay) is a mobile web application that provides users with the ability to collaboratively create music playlists and listen to them with each other in real time. Users will be able to search for songs to be added to the playlist, select songs from pre-made libraries, and up and down vote songs to determine what will be played next. Our goal is to bring people together through the power of music

    Topological kink plasmons on magnetic-domain boundaries.

    Get PDF
    Two-dimensional topological materials bearing time reversal-breaking magnetic fields support protected one-way edge modes. Normally, these edge modes adhere to physical edges where material properties change abruptly. However, even in homogeneous materials, topology still permits a unique form of edge modes - kink modes - residing at the domain boundaries of magnetic fields within the materials. This scenario, despite being predicted in theory, has rarely been demonstrated experimentally. Here, we report our observation of topologically-protected high-frequency kink modes - kink magnetoplasmons (KMPs) - in a GaAs/AlGaAs two-dimensional electron gas (2DEG) system. These KMPs arise at a domain boundary projected from an externally-patterned magnetic field onto a uniform 2DEG. They propagate unidirectionally along the boundary, protected by a difference of gap Chern numbers ([Formula: see text]) in the two domains. They exhibit large tunability under an applied magnetic field or gate voltage, and clear signatures of nonreciprocity even under weak-coupling to evanescent photons
    corecore