253 research outputs found
Tracking Users across the Web via TLS Session Resumption
User tracking on the Internet can come in various forms, e.g., via cookies or
by fingerprinting web browsers. A technique that got less attention so far is
user tracking based on TLS and specifically based on the TLS session resumption
mechanism. To the best of our knowledge, we are the first that investigate the
applicability of TLS session resumption for user tracking. For that, we
evaluated the configuration of 48 popular browsers and one million of the most
popular websites. Moreover, we present a so-called prolongation attack, which
allows extending the tracking period beyond the lifetime of the session
resumption mechanism. To show that under the observed browser configurations
tracking via TLS session resumptions is feasible, we also looked into DNS data
to understand the longest consecutive tracking period for a user by a
particular website. Our results indicate that with the standard setting of the
session resumption lifetime in many current browsers, the average user can be
tracked for up to eight days. With a session resumption lifetime of seven days,
as recommended upper limit in the draft for TLS version 1.3, 65% of all users
in our dataset can be tracked permanently.Comment: 11 page
Efficacy of 3D visualization in mobile apps for patient education regarding orthognathic surgery
‘Sur-face’ is an interactive mobile app illustrating different orthognathic surgeries and their potential complications. This study aimed to evaluate the efficacy of Sur-face by comparing two methods of delivering patient information on orthognathic surgeries and their related potential complications: a mobile app with interactive 3D animations and a voice recording containing verbal instructions only. For each method, the participants’ acquired knowledge was assessed using a custom-designed questionnaire. Participants in the ‘app’ group performed significantly better (P<0.0034) than those in the ‘voice’ group and retained more knowledge, suggesting that interactive visualizations play a key role in improving understanding of the orthognathic surgical procedure and its associated complications. This study emphasizes the impact of 3D visualizations in delivering information regarding orthognathic surgery and highlights the advantage of delivering validated patient information through mobile apps
I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out
The adoption of smart home Internet of Things (IoT) devices continues to grow. What if your devices can snitch on you and let us know where you are at any given point in time? In this work we examined the forensic artifacts produced by Nest devices, and in specific, we examined the logical backup structure of an iPhone used to control a Nest thermostat, Nest Indoor Camera and a Nest Outdoor Camera. We also integrated the Google Home Mini as another method of controlling the studied Smart Home devices. Our work is the primary account for the examination of Nest artifacts produced by an iPhone, and is also the first open source research to produce a usable forensics tool we name the Forensic Evidence Acquisition and Analysis System (FEAAS). FEAAS consolidates evidentiary data into a readable report that can infer user events (like entering or leaving a home) and what triggered an event (whether it was the Google Assistant through a voice command, or the use of an iPhone application). Our results are important for the advancement of digital forensics, as there are cases starting to emerge in which smart home IoT devices have already been used as culpatory evidence
Understanding the Use of Crisis Informatics Technology among Older Adults
Mass emergencies increasingly pose significant threats to human life, with a
disproportionate burden being incurred by older adults. Research has explored
how mobile technology can mitigate the effects of mass emergencies. However,
less work has examined how mobile technologies support older adults during
emergencies, considering their unique needs. To address this research gap, we
interviewed 16 older adults who had recent experience with an emergency
evacuation to understand the perceived value of using mobile technology during
emergencies. We found that there was a lack of awareness and engagement with
existing crisis apps. Our findings characterize the ways in which our
participants did and did not feel crisis informatics tools address human
values, including basic needs and esteem needs. We contribute an understanding
of how older adults used mobile technology during emergencies and their
perspectives on how well such tools address human values.Comment: 10 page
Image use in field guides and identification keys: review and recommendations
We review image use in field guides and keys, and formulate a set of best practices for image use. The review covers the full range of guides, from those that consist only of species descriptions, to lavishly illustrated technical guides
- …