148 research outputs found
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces
Website Fingerprinting (WF) is a type of traffic analysis attack that enables
a local passive eavesdropper to infer the victim's activity, even when the
traffic is protected by a VPN or an anonymity system like Tor. Leveraging a
deep-learning classifier, a WF attacker can gain over 98% accuracy on Tor
traffic. In this paper, we explore a novel defense, Mockingbird, based on the
idea of adversarial examples that have been shown to undermine machine-learning
classifiers in other domains. Since the attacker gets to design and train his
attack classifier based on the defense, we first demonstrate that at a
straightforward technique for generating adversarial-example based traces fails
to protect against an attacker using adversarial training for robust
classification. We then propose Mockingbird, a technique for generating traces
that resists adversarial training by moving randomly in the space of viable
traces and not following more predictable gradients. The technique drops the
accuracy of the state-of-the-art attack hardened with adversarial training from
98% to 42-58% while incurring only 58% bandwidth overhead. The attack accuracy
is generally lower than state-of-the-art defenses, and much lower when
considering Top-2 accuracy, while incurring lower bandwidth overheads.Comment: 18 pages, 13 figures and 8 Tables. Accepted in IEEE Transactions on
Information Forensics and Security (TIFS
Educational Methods from Jahez Point of View
The aim of writing this article is to assert Jahez point of view about educational methods. The present study has been conducted by taking benefit from qualitative approach and descriptive-analytical method and has analyzed and inferred Jahez point of view about educational methods by using existing and available resources. The inferred training methods from Jahez point of view are as follows: observation-experience and testing (learning opportunity in practice), using repetition and practice method, encouraging and punishing learners and considering its principles and points, memorizing and recalling the materials, writing and recording learned contents, teaching in group and in the form of participation of all learners, giving recommendations and guiding the learners, presenting speeches, problem- oriented teaching and discovering the problem by the learners themselves, using books and the method of stimulating several senses in teaching learners or sharing senses in the trend of learning. Key words: Islamic training, Jahez, educational methods
Guard Sets in Tor using AS Relationships
The mechanism for picking guards in Tor suffers from security problems like guard fingerprinting and from performance issues. To address these issues, Hayes and Danezis proposed the use of guard sets, in which the Tor system groups all guards into sets, and each client picks one of these sets and uses its guards. Unfortunately, guard sets frequently need nodes added or they are broken up due to fluctuations in network bandwidth. In this paper, we first show that these breakups create opportunities for malicious guards to join many guard sets by merely tuning the bandwidth they make available to Tor, and this greatly increases the number of clients exposed to malicious guards. To address this problem, we propose a new method for forming guard sets based on Internet location. We construct a hierarchy that keeps clients and guards together more reliably and prevents guards from easily joining arbitrary guard sets. This approach also has the advantage of confining an attacker with access to limited locations on the Internet to a small number of guard sets. We simulate this guard set design using historical Tor data in the presence of both relay-level adversaries and network-level adversaries, and we find that our approach is good at confining the adversary into few guard sets, thus limiting the impact of attacks
BP-NTT: Fast and Compact in-SRAM Number Theoretic Transform with Bit-Parallel Modular Multiplication
Number Theoretic Transform (NTT) is an essential mathematical tool for
computing polynomial multiplication in promising lattice-based cryptography.
However, costly division operations and complex data dependencies make
efficient and flexible hardware design to be challenging, especially on
resource-constrained edge devices. Existing approaches either focus on only
limited parameter settings or impose substantial hardware overhead. In this
paper, we introduce a hardware-algorithm methodology to efficiently accelerate
NTT in various settings using in-cache computing. By leveraging an optimized
bit-parallel modular multiplication and introducing costless shift operations,
our proposed solution provides up to 29x higher throughput-per-area and
2.8-100x better throughput-per-area-per-joule compared to the state-of-the-art.Comment: This work is accepted to the 60th Design Automation Conference (DAC),
202
Antibacterial Effects of Chitosan, Formocresol and CMCP as Pulpectomy Medicament on Enterococcus ‎faecalis, Staphylococcus aureus and Streptococcus ‎mutans
Introduction: During pulpectomy of primary teeth, cytotoxic medicaments such as formocresol or camphor mono-chlorophenol (CMCP) are used as medicaments. For the first time it is theorized that chitosan can substitute these traditional materials used in pulpectomy of infectious primary teeth. Methods and Materials: This preliminary in vitro study consisted of two separate phases (n=75), each of which assessed the antibacterial effects of chitosan versus formocresol and CMCP and positive/negative controls (n=15) on three bacteria types [Enterococcus ‎faecalis, Staphylococcus aureus, Streptococcus ‎mutans, (n=5 per subgroup)]. Phases 1 and 2 concerned respectively with 1- and 7-day effects of these materials. Bacteria were cultured and injected into sterilized canals and colonies were counted. Medicaments were applied and colonies were re-counted after 1 day of treatment (phase 1). Specimens were re-sterilized and re-randomized, and used for phase 2, in which the same procedures were performed for a 7-day period. Effects of agents on bacteria were analyzed statistically (Kruskal-Wallis α=0.05 and Mann-Whitney α=0.017). Results: Treatments reduced bacterial count either after 1 or 7 days (P=0.000). Their effects on different bacteria types were not significant either after 1 or 7 days (P>0.48). Antibacterial efficacies of treatments (indicated by colony reduction) were significantly different, after 7 days (P=0.045). Antibacterial efficacy of chitosan was similar to that of formocresol or CMCP, in both phases [either after 1 or 7 days of treatment (P>0.017). Formocresol and CMCP had similar efficacies in either phase (P>0.017). Conclusions: This preliminary study confirmed the appropriate antibacterial efficacy of chitosan as a medicament in pulpectomy of infectious primary teeth.Keywords: Antibacterial Agents; Camphor Mono-Chlorophenol; Chitosan; CMCP; Enterococcus ‎faecalis; Formocresol; Medicament; Pulpectomy; Staphylococcus aureus; Streptococcus ‎mutan
Investigation of the Relationship between Faith and Attitude from the Viewpoint of the Holy Quran
Faith and attitude as two important categories have many similarities and differences. Beliefs and attitudes are not the same, they are different in concept and character, they have established one as a sacred preacher and the other as psychologists. However, the remarkable similarities and the strong relationship between them are illustrated in a descriptive-analytic manner. The paper deals with the central role of "faith" in the verses of the Holy Quran and "attitude" in social psychology. This paper uses a descriptive-analytical research method. The findings of the study indicate that the religious pattern of attitude change as an internal mechanism, by increasing the coefficient of intellectual and spiritual transformation, reaches the highest level of beliefs in three cognitive, emotional and behavioral dimensions
- …