25 research outputs found

    The far side of mobile application integrated development environments

    Get PDF
    © Springer International Publishing Switzerland 2016. Smart phones are, nowadays, a necessity for the vast majority of individuals around the globe. In addition to the ubiquitous computing paradigm supported by such devices, there are numerous software applications that utilize the high computational capabilities that they offer. This type of software is a vital part of what is known as e-Commerce, with a variety of business models proposed and implemented. Lately, a new era of free-ware mobile application has arisen with paid features and promoted content in them. Piracy is not only the weakest point of software’s financial ecosystem for conventional computing systems but also for smartphones. Actions like replication, redistribution and licensing violations can cause financial losses of colossal extent to their creators. Mobile applications also introduce the following peculiarity: They are distributed through predefined channels (Application Stores) owned by mobile operating system vendors such as Apple, Google and Microsoft. In this research we present several scenarios where cracked and modified applications can be freely used into every non jailbroken iOS device. Moreover it is demonstrated that not even in strict mobile environments, such as Apple’s, end-users should be considered as trusted entities from application developers by default

    Best Effort and Practice Activation Codes

    Get PDF
    Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent value. Even though this class of codes is extensively used there are no general guidelines for the design of Activation Code schemes. We discuss different methods that are used in practice and propose BEPAC, a new Activation Code scheme that provides both authenticity and confidentiality. The small message space of activation codes introduces some problems that are illustrated by an adaptive chosen-plaintext attack (CPA-2) on a general 3-round Feis- tel network of size 2^(2n) . This attack recovers the complete permutation from at most 2^(n+2) plaintext-ciphertext pairs. For this reason, BEPAC is designed in such a way that authenticity and confidentiality are in- dependent properties, i.e. loss of confidentiality does not imply loss of authenticity.Comment: 15 pages, 3 figures, TrustBus 201

    The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud

    Get PDF
    The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their quest came to end with the birth of Cloud Computing infrastructures. However, along with the new promising technology, new attack vectors were born, and one old and known threat, that of Malicious Insiders reappeared. Insiders can use their privileged position inside the Cloud infrastructure to accomplish or help in attacks against a Cloud infrastructure. In this paper, we propose a practical and efficient intrusion detection system solution for Cloud infrastructures based on Graphical Processing Unit (GPU) acceleration. Our solution monitors the deployed virtual machines operations and especially those of the host Operating System’s, known as Dom0, correlating the collected information to detect uncommon behavior based on the SmithWaterman algorithm. Our proposal makes possible the cooperation of a variety of known hypervisors along with every known GPU acceleration unit used, thus offering the maximum of security mechanics while at the same time minimizing the imposed overhead in terms of Central Processing Unit (CPU) usage

    The far side of mobile application integrated development environments

    Get PDF
    © Springer International Publishing Switzerland 2016. Smart phones are, nowadays, a necessity for the vast majority of individuals around the globe. In addition to the ubiquitous computing paradigm supported by such devices, there are numerous software applications that utilize the high computational capabilities that they offer. This type of software is a vital part of what is known as e-Commerce, with a variety of business models proposed and implemented. Lately, a new era of free-ware mobile application has arisen with paid features and promoted content in them. Piracy is not only the weakest point of software’s financial ecosystem for conventional computing systems but also for smartphones. Actions like replication, redistribution and licensing violations can cause financial losses of colossal extent to their creators. Mobile applications also introduce the following peculiarity: They are distributed through predefined channels (Application Stores) owned by mobile operating system vendors such as Apple, Google and Microsoft. In this research we present several scenarios where cracked and modified applications can be freely used into every non jailbroken iOS device. Moreover it is demonstrated that not even in strict mobile environments, such as Apple’s, end-users should be considered as trusted entities from application developers by default

    Capital structure and financial flexibility: Expectations of future shocks

    Get PDF
    We test one of the main predictions of the financial flexibility paradigm, that expectations about future firm-specific investment shocks affect the firm's leverage. We extract the expectations of small and large future shocks from the market prices of equity options. We find that leverage decreases when expectations for any one of the two types of future shocks increase and the relation is statistically significant even when we control for standard determinants of leverage and the firm's probability of default. Expectations for future shocks explain a greater fraction of leverage variation than most standard determinants of leverage do and they affect more the small and financially constrained firms. Our results are not subject to an endogeneity bias and they confirm DeAngelo et al. (2011) model's predictions and the evidence that managers seek for financial flexibility

    Consumer Sentiment: The Influence of Social Media

    No full text
    Since the late 1940s consumer sentiment has been used by policy makers, companies and investors as an indicator of economic mood. However, the rapid growth and spread of social media has changed the landscape of the consumer. By using a unique hand-collected dataset of more than 11 million influencers’ posts, we test whether consumer sentiment is related to social media influencer sentiment. We find consumer sentiment, after testing for endogeneity concerns, is robustly related to different categories of influencer sentiment across different groupings of individuals

    Technical guidelines for enhancing privacy and data protection in modern electronic medical environments

    No full text
    Raising awareness and providing guidance to on-line data protection is undoubtedly a crucial issue worldwide. Equally important is the issue of applying privacy-related legislation in a coherent and coordinated way. Both these topics gain extra attention when referring to medical environments and, thus, to the protection of patients' privacy and medical data. Electronic medical transactions require the transmission of personal and medical information over insecure communication channels like the Internet. It is, therefore, a rather straightforward task to capture the electronic medical behavior of a patient, thus constructing "patient profiles," or reveal sensitive information related to a patient's medical history. The consequence is clearly a potential violation of the patient's privacy. We performed a risk analysis study for a Greek shared care environment for the treatment of patients suffering from beta-thalassemia, an empirically embedded scenario that is representative of many other electronic medical environments; we capitalized on its results to provide an assessment of the associated risks, focusing on the description of countermeasures, in the form of technical guidelines that can be employed in such medical environments for protecting the privacy of personal and medical information. © 2005 IEEE

    Supply of capital and capital structure: The role of financial development

    No full text
    We explore the effect of financial development on corporate capital structure and the tightness of financial constraints that firms face. We employ an econometric technique that allows us to explicitly test for convergence in capital structure. This technique increases the power of our statistical tests. In doing so, we identify a group of convergent firms. The driving force of convergence is financial development, which positively affects the firms' leverage ratio. We also identify a group of firms, whose leverage is not affected by financial development, because they are financially constrained

    Asclepion of Epidaurus: the application of a historical perspective in medical education

    No full text
    Background: The Asclepion of Epidaurus is one of the first healing environments in the world. Descendants of Asclepius, specifically medical students, have been singularly deprived of any information concerning this legacy. This article illuminates the role of Asclepion of Epidaurus and examines the view of medical students upon the subject and the possible benefits of this knowledge in their medical education. Methods: The participants were 105 senior-year students from the Athens Medical School, who attended a multi-media assisted lecture related to the structure and the role of the Asclepion of Epidaurus. Afterwards, they answered anonymously a questionnaire of 12 pairs of opposite adjectives in order to describe their view regarding the meaning of Asclepion. The method used in the evaluation of their answers was that of semantic differential. Results: The attitude of the students towards the meaning of Asclepion was positive, showing interest and excitement about a powerful, though unfamiliar piece of knowledge. Conclusion: Today’s novice doctors have welcomed the concept of Asclepion as essential knowledge for the service they will be called to fulfill. The potential benefits of the Asclepian ideals in medical education and ethos are thoroughly discussed. © 2022, The Author(s)
    corecore