87 research outputs found

    Emergent faithfulness to morphological and semantic heads in lexical blends

    Get PDF
    In many languages, sounds in certain "privileged" positions preserve marked structure which is eliminated elsewhere (Positional Faithfulness, Beckman 1998).  This paper presents new corpus and experimental evidence that faithfulness to main-stress location and segmental content of morpho-semantic heads emerges in English blends. The study compared right-headed (subordinating) blends, like motor + hotel -> motel (a kind of hotel) with coordinating blends like spoon + fork -> spork (equally spoon and fork).Stress: Analysis of 1095 blends from Thurner (1993) found that right-headed blends were more faithful to stress location of the second source word than were coordinating blends.  Given source words with conflicting stress (e.g., FLOUNder + sarDINE), participants preferentially matched the blend that preserved second-word stress (flounDINE) to a right-headed definition.Segmental content: When source-word length was controlled, segments from right-headed blends were more likely to survive than those from coordinating blends.  Given source words that could be spliced at two points (e.g., flaMiNGo + MoNGoose), participants preferentially matched the one that preserved more of the second word (flamongoose) to a right-headed definition.These results support the hypotheses that Positional Faithfulness constraints are universally available, that heads are a privileged position, and that blend phonology is sensitive to headedness

    Secure biometric authentication with improved accuracy

    Get PDF
    We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summarised as follows: (1) potential for much better accuracy using different types of biometric signals, including behavioural ones; and (2) improved user privacy, since user identities are not transmitted at any point in the protocol execution. The new protocol takes advantage of state-of-the-art identification classifiers, which provide not only better accuracy, but also the possibility to perform authentication without knowing who the user claims to be. Cryptographic security is based on the Paillier public key encryption scheme

    A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing

    Get PDF
    Motivated by typo correction in password authentication, we investigate cryptographic error-correction of secrets in settings where the distribution of secrets is a priori (approximately) known. We refer to this as the distribution-sensitive setting. We design a new secure sketch called the layer-hiding hash (LHH) that offers the best security to date. Roughly speaking, we show that LHH saves an additional log H_0(W) bits of entropy compared to the recent layered sketch construction due to Fuller, Reyzin, and Smith (FRS). Here H_0(W) is the size of the support of the distribution W. When supports are large, as with passwords, our new construction offers a substantial security improvement. We provide two new constructions of typo-tolerant password-based authentication schemes. The first combines a LHH or FRS sketch with a standard slow-to-compute hash function, and the second avoids secure sketches entirely, correcting typos instead by checking all nearby passwords. Unlike the previous such brute-force-checking construction, due to Chatterjee et al., our new construction uses a hash function whose run-time is proportional to the popularity of the password (forcing a longer hashing time on more popular, lower entropy passwords). We refer to this as popularity-proportional hashing (PPH). We then introduce a frame-work for comparing different typo-tolerant authentication approaches. We show that PPH always offers a better time / security trade-off than the LHH and FRS constructions, and for certain distributions outperforms the Chatterjee et al. construction. Elsewhere, this latter construction offers the best trade-off. In aggregate our results suggest that the best known secure sketches are still inferior to simpler brute-force based approaches

    BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection

    Get PDF
    We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementation of BotSwindler relies upon an out-of-host software agent that drives user-like interactions in a virtual machine, seeking to convince malware residing within the guest OS that it has captured legitimate credentials. To aid in the accuracy and realism of the simulations, we propose a low overhead approach, called virtual machine verification, for verifying whether the guest OS is in one of a predefined set of states. We present results from experiments with real credential-collecting malware that demonstrate the injection of monitored financial bait for detecting compromises. Additionally, using a computational analysis and a user study, we illustrate the believability of the simulations and we demonstrate that they are sufficiently human-like. Finally, we provide results from performance measurements to show our approach does not impose a performance burden

    Height and timing of growth spurt during puberty in young people living with vertically acquired HIV in Europe and Thailand.

    Get PDF
    OBJECTIVE: The aim of this study was to describe growth during puberty in young people with vertically acquired HIV. DESIGN: Pooled data from 12 paediatric HIV cohorts in Europe and Thailand. METHODS: One thousand and ninety-four children initiating a nonnucleoside reverse transcriptase inhibitor or boosted protease inhibitor based regimen aged 1-10 years were included. Super Imposition by Translation And Rotation (SITAR) models described growth from age 8 years using three parameters (average height, timing and shape of the growth spurt), dependent on age and height-for-age z-score (HAZ) (WHO references) at antiretroviral therapy (ART) initiation. Multivariate regression explored characteristics associated with these three parameters. RESULTS: At ART initiation, median age and HAZ was 6.4 [interquartile range (IQR): 2.8, 9.0] years and -1.2 (IQR: -2.3 to -0.2), respectively. Median follow-up was 9.1 (IQR: 6.9, 11.4) years. In girls, older age and lower HAZ at ART initiation were independently associated with a growth spurt which occurred 0.41 (95% confidence interval 0.20-0.62) years later in children starting ART age 6 to 10 years compared with 1 to 2 years and 1.50 (1.21-1.78) years later in those starting with HAZ less than -3 compared with HAZ at least -1. Later growth spurts in girls resulted in continued height growth into later adolescence. In boys starting ART with HAZ less than -1, growth spurts were later in children starting ART in the oldest age group, but for HAZ at least -1, there was no association with age. Girls and boys who initiated ART with HAZ at least -1 maintained a similar height to the WHO reference mean. CONCLUSION: Stunting at ART initiation was associated with later growth spurts in girls. Children with HAZ at least -1 at ART initiation grew in height at the level expected in HIV negative children of a comparable age

    iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric

    Get PDF
    With the growing number of smartcard applications there comes an increasing need to restrict access to the card itself. In previous work we proposed the pressure sequence biometric, within which a biometric sensor is integrated onto the card in a low-cost and mechanically compliant manner. Using an off-card verifier we demonstrated reasonable discrimination between users. In this paper we consider a number of on-card verification schemes, the best of which offers an equal error rate of 2.3%. On-card computational time requirements were found to be 3.1 seconds for enrolment and 0.12 seconds for verification. Incorporating our implementation into an existing applet used 684 bytes of program space. Whilst data memory requirements are estimated to be 1400 and 300 bytes for enrolment and verification, respectively. These time and size requirements demonstrate our biometric as a practical proposition for the protection of smart cards. Experiments were performed with the iButton's Java Card platform

    Continuous and transparent multimodal authentication: reviewing the state of the art

    Get PDF
    Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. They are also still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. Thus, it is apparent that a more innovative, convenient and secure user authentication solution is vital. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art and identifying the open problems to be tackled and available solutions to be adopted. It also investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. This is followed by a literature review of the existing research on continuous and transparent multimodal authentication. It concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level. Ultimately, a potential federated biometric authentication solution is presented; however it needs to be developed and extensively evaluated, thus operating in a transparent, continuous and user-friendly manner

    Neurocognition and quality of life after reinitiating antiretroviral therapy in children randomized to planned treatment interruption

    Get PDF
    Objective: Understanding the effects of antiretroviral treatment (ART) interruption on neurocognition and quality of life (QoL) are important for managing unplanned interruptions and planned interruptions in HIV cure research. Design: Children previously randomized to continuous (continuous ART, n=41) vs. planned treatment interruption (PTI, n=47) in the Pediatric European Network for Treatment of AIDS (PENTA) 11 study were enrolled. At study end, PTI children resumed ART. At 1 and 2 years following study end, children were assessed by the coding, symbol search and digit span subtests of Wechsler Intelligence Scale for Children (6-16 years old) or Wechsler Adult Intelligence Scale ( 6517 years old) and by Pediatrics QoL questionnaires for physical and psychological QoL. Transformed scaled scores for neurocognition and mean standardized scores for QoL were compared between arms by t-test and Mann-Whitney U test, respectively. Scores indicating clinical concern were compared (<7 for neurocognition and <70 for QoL tests). Results: Characteristics were similar between arms with a median age of 12.6 years, CD4 + of 830 cells/\u3bcl and HIV RNA of 1.7 log 10 copies/ml. The median cumulative ART exposure was 9.6 in continuous ART vs. 7.7 years in PTI (P=0.02). PTI children had a median of 12 months off ART and had resumed ART for 25.2 months at time of first assessment. Neurocognitive scores were similar between arms for all tests. Physical and psychological QoL scores were no different. About 40% had low neurocognitive and QoL scores indicating clinical concern. Conclusion: No differences in information processing speed, sustained attention, short-term memory and QoL functioning were observed between children previously randomized to continuous ART vs. PTI in the PENTA 11 trial
    corecore