75 research outputs found

    Inter-cluster reactivity of Metallo-aromatic and anti-aromatic Compounds and Their Applications in Molecular Electronics: A Theoretical Investigation

    Full text link
    Local reactivity descriptors such as the condensed local softness and Fukui function have been employed to investigate the inter-cluster reactivity of the metallo-aromatic (Al4Li- and Al4Na-) and anti-aromatic (Al4Li4 and Al4Na4) compounds. We use the concept of group softness and group Fukui function to study the strength of the nucleophilicity of the Al4 unit in these compounds. Our analysis shows that the trend of nucleophilicity of the Al4 unit in the above clusters is as follows; Al4Li- > Al4Na- > Al4Li4 > Al4Na 4 For the first time we have used the reactivity descriptors to show that these clusters can act as electron donating systems and thus can be used as a molecular cathode.Comment: 23 pages, 1 figure and 1 table of conten

    Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality

    No full text
    Website fingerprinting attacks use statistical analysis on network traffic to compromise user privacy. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who observes traffic traveling between the user’s computer and the network. In this article we investigate a different attack model, in which the adversary sends JavaScript code to the target user’s computer. This code mounts a cache side-channel attack to identify other websites being browsed. Using machine learning techniques to classify traces of cache activity, we achieve high classification accuracy in both the open-world and the closed-world models. Our attack is more resistant than network-based fingerprinting to the effects of response caching, and resilient both to network-based defenses and to side-channel countermeasures. Wecarry out a real-world evaluation of several aspects of our attack, exploring the impact of the changes in websites and browsers over time, as well as of the attacker’s ability to guess the software and hardware configuration of the target user’s computer. To protect against cache-based website fingerprinting, new defense mechanisms must be introduced to privacy-sensitive browsers and websites.Weinvestigate one such mechanism, and show that it reduces the effectiveness of the attack and completely eliminates it when used in the Tor Browser.Anatoly Shusterman, Zohar Avraham, Eliezer Croitoru, Yarden Haskal, Lachlan Kang, Dvir Levi, Yosef Meltser, Prateek Mittal, Senior Member, Yossi Oren and Yuval Yaro
    • …
    corecore