6,449 research outputs found
Alternative measures of the monetary base: what are the differences and are they important?
Monetary policy
Understanding Database Reconstruction Attacks on Public Data
In 2020 the U.S. Census Bureau will conduct the Constitutionally mandated decennial Census of Population and Housing. Because a census involves collecting large amounts of private data under the promise of confidentiality, traditionally statistics are published only at high levels of aggregation. Published statistical tables are vulnerable to DRAs (database reconstruction attacks), in which the underlying microdata is recovered merely by finding a set of microdata that is consistent with the published statistical tabulations. A DRA can be performed by using the tables to create a set of mathematical constraints and then solving the resulting set of simultaneous equations. This article shows how such an attack can be addressed by adding noise to the published tabulations, so that the reconstruction no longer results in the original data
Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools
This paper presents improvements in the Advanced Forensics Format Library version 3 that provide for digital signatures and other cryptographic protections for digital evidence, allowing an investigator to establish a reliable chain-of-custody for electronic evidence from the crime scene to the court room. No other system for handling and storing electronic evidence currently provides such capabilities. This paper discusses implementation details, user level commands, and the AFFLIB programmer's API.Approved for public release; distribution is unlimited
Operations with Degraded Security
Modern systems aren't designed to support some
ongoing operations after their security is compromised.
Using the ResiliNets model, the authors discuss
five strategies for operating in a degraded security
environment
Theoretical Procedures and Elder-Vass's Critical Realist Ontology
This article scrutinizes some theoretical procedures prevalent in the philosophy of social science. These procedures are exemplified in Elder-Vass’s critical realism, which promises to place the social sciences on a sound ontological footing. The article focuses on the way that Elder-Vass’s general emergentist ontology is constituted and on the methods through which it is applied to society. It is contended that the ontology is not and could not be grounded in science and that its philosophical use distorts what it is applied to. The incoherent methods that social ontological projects constitutionally rely on entail that they cannot ground social scientific explanation
IRBs and Security Research: Myths, Facts and Mission Creep
Having decided to focus attention on the “weak link”
of human fallibility, a growing number of security researchers
are discovering the US Government’s regulations
that govern human subject research. This paper discusses
those regulations, their application to research on
security and usability, and presents strategies for negotiating
the Institutional Review Board (IRB) approval process.
It argues that a strict interpretation of regulations has
the potential to stymie security research
Carving contiguous and fragmented files with fast object validation
http://dx.doi.org/10.1016/j.dlin.2007.06.017"File carving" reconstructs files based on their content, rather than using metadata that points to the content. Carving is widely used for forensics and data recovery, but no file carvers can automatically reassemble fragmented files. We survey files from more than 300 hard drives acquired on the secondary market and show that the ability to reassemble fragmented files is an important requirement for forensic work. Next we analyze the file carving problem, arguing that rapid, accurate carving is best performed by a multi-tier decision problem that seeks to quickly validate or discard candidate byte strings -- "object" -- from the media to be carved. Validators for the JPEG, Microsoft OLE (MSOLE) and ZIP file formats are discussed. Finally, we show how high speed validators can be used to reassemble fragmented files
Digital Forensics Overview
Digital Evaluation and Exploitation (DEEP): Research in "trusted" systems and exploitation
Development and fabrication of improved Schottky power diodes
Reproducible methods for the fabrication of silicon Schottky diodes have been developed for tungsten, aluminum, conventional platinum silicide, and low temperature platinum silicide. Barrier heights and barrier lowering under reverse bias have been measured, permitting the accurate prediction of forward and reverse diode characteristics. Processing procedures have been developed that permit the fabrication of large area (about 1 sq cm) mesageometry power Schottky diodes with forward and reverse characteristics that approach theoretical values. A theoretical analysis of the operation of bridge rectifier circuits has been performed, which indicates the ranges of frequency and voltage for which Schottky rectifiers are preferred to p-n junctions. Power Schottky rectifiers have been fabricated and tested for voltage ratings up to 140 volts
- …
