266 research outputs found
Message in a bottle: Sailing past censorship
Exploiting recent advances in monitoring technology and the drop of its costs, authoritarian and oppressive regimes are tightening the grip around the virtual lives of their citizens. Meanwhile, the dissidents, oppressed by these regimes, are organizing online, cloaking their activity with anti-censorship systems that typically consist of a network of anonymizing proxies. The censors have become well aware of this, and they are systematically finding and blocking all the entry points to these networks. So far, they have been quite successful. We believe that, to achieve resilience to blocking, anti-censorship systems must abandon the idea of having a limited number of entry points. Instead, they should establish first contact in an online location arbitrarily chosen by each of their users. To explore this idea, we have developed Message In A Bottle, a protocol where any blog post becomes a potential “drop point ” for hidden messages. We have developed and released a proof-of-concept application using our system, and demonstrated its feasibility. To block this system, censors are left with a needle-in-a-haystack problem: Unable to identify what bears hidden messages, they must block everything, effectively disconnecting their own network from a large part of the Internet. This, hopefully, is a cost too high to bear.
Design and commissioning of a thermal stability test-rig for mixtures as working fluids for ORC applications
A novel test-rig for studying the thermal stability of mixtures as working fluids for ORC applications was designed and commissioned at the Laboratory of Compressible-fluid dynamics for Renewable Energy Applications (CREA) of Politecnico di Milano, in collaboration with the University of Brescia. The set-up is a standard one, in which a vessel containing the fluid under scrutiny is placed in a vertical oven for ~ 100 hours at a constant temperature T = Tstress. During the test, the pressure P is monitored to detect thermal decomposition of the fluid. After the test, the vessel is placed in a controlled thermal bath, where the pressure is measured at different value of the temperature T, with T < Tstress and T < Tc (Tc critical temperature). The resulting isochoric pressure-temperature dependence is compared to that obtained before the fluid underwent thermal stress. If departure from the initial fluid behavior is observed, significant thermal decomposition occurred and a chemical analysis of the decomposition products is carried out using gas chromatography and mass spectroscopy. The novelty of the set-up is the possibility of taking samples of both liquid and vapor phases of the fluid, a capability that was introduced to study thermal decomposition of mixtures, whose composition depends on the pressure and temperature, as well as to capture the more volatile products of thermal decomposition of pure fluids and mixtures. Preliminary experimental results are reported for the pure siloxane fluid MDM (Octamethyltrisiloxane, C8H24O2Si3)
Known and unknown event detection in OTDR traces by deep learning networks
Optical fiber links are customarily monitored by Optical Time Domain Reflectometer (OTDR), an optoelectronic instrument that measures the scattered or reflected light along the fiber and returns a signal, namely the OTDR trace. OTDR traces are typically analyzed by experts in laboratories or by hand-crafted algorithms running in embedded systems to localize critical events occurring along the fiber. In this work, we address the problem of automatically detecting optical events in OTDR traces through a deep learning model that can be deployed in embedded systems. In particular, we take inspiration from Faster R-CNN and present the first 1D object-detection neural network for OTDR traces. Thanks to an ad-hoc preprocessing pipeline for OTDR traces, we can also identify unknown events, namely events that are not represented in training data but that might indicate rare and unforeseen situations that need to be reported. The resulting network brings several advantages with respect to existing solutions, as these typically classify fixed-size windows of OTDR traces, thus are less accurate in the localization. Moreover, existing solutions do not report events that cannot be safely associated to any label in the training set. Our experiments, performed on real OTDR traces, show very promising performance, and can be directly executed on embedded OTDR devices
Cap rock efficiency of geothermal systems in fold-and-thrust belts:evidence from paleo-thermal and structural analyses in Rosario de La Frontera geothermal area (NW Argentina)
Cap rock characterization of geothermal systems is often neglected despite fracturing may reduce its efficiency and favours fluid migration. We investigated the siliciclastic cap rock of Rosario de La Frontera geothermal system (NW Argentina) in order to assess its quality as a function of fracture patterns and related thermal alteration.
Paleothermal investigations (XRD on fine-grained fraction of sediments, organic matter optical analysis and fluid inclusions on veins) and 1D thermal modelling allowed us to distinguish the thermal fingerprint associated to sedimentary burial from that related to fluid migration. The geothermal system is hosted in a Neogene N-S anticline dissected by high angle NNW- and ENE-striking faults. Its cap rock can be grouped into two quality categories:
● rocks acting as good insulators deformed by NNW–SSE and E–W shear fractures, NNE-SSW gypsum- and N-S striking calcite-filled veins formed during the initial stage of anticline growth. Maximum paleo-temperatures (<60°C) were experienced during deposition to folding phases.
● rocks acting as bad insulators deformed by NNW-SSE fault planes and NNW- and WNW-striking sets of fractures associated to late transpressive kinematics. Maximum paleo-temperatures higher than about 115°C are linked to fluid migration from the reservoir to surface (with a reservoir top at maximum depths of 2.5 km) along fault damage zones.
This multi-method approach turn out to be particularly useful to trace the main pathways of hot fluids and can be applied in blind geothermal systems where either subsurface data are scarce or surface thermal anomalies are lacking
Practical Attacks Against Graph-based Clustering
Graph modeling allows numerous security problems to be tackled in a general
way, however, little work has been done to understand their ability to
withstand adversarial attacks. We design and evaluate two novel graph attacks
against a state-of-the-art network-level, graph-based detection system. Our
work highlights areas in adversarial machine learning that have not yet been
addressed, specifically: graph-based clustering techniques, and a global
feature space where realistic attackers without perfect knowledge must be
accounted for (by the defenders) in order to be practical. Even though less
informed attackers can evade graph clustering with low cost, we show that some
practical defenses are possible.Comment: ACM CCS 201
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
To make cryptographic processors more resilient against side-channel attacks, engineers have developed various countermeasures. However, the effectiveness of these countermeasures is often uncertain, as it depends on the complex interplay between software and hardware. Assessing a countermeasure’s effectiveness using profiling techniques or machine learning so far requires significant expertise and effort to be adapted to new targets which makes those assessments expensive. We argue that including cost-effective automated attacks will help chip design teams to quickly evaluate their countermeasures during the development phase, paving the way to more secure chips.
In this paper, we lay the foundations toward such automated system by proposing GPAM, the first deep-learning system for power side-channel analysis that generalizes across multiple cryptographic algorithms, implementations, and side-channel countermeasures without the need for manual tuning or trace preprocessing. We demonstrate GPAM’s capability by successfully attacking four hardened hardware-accelerated elliptic-curve digital-signature implementations. We showcase GPAM’s ability to generalize across multiple algorithms by attacking a protected AES implementation and achieving comparable performance to state-of-the-art attacks, but without manual trace curation and within a limited budget. We release our data and models as an open-source contribution to allow the community to independently replicate our results and build on them
- …