11,832 research outputs found

    ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs

    Get PDF
    The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider (LBSP). In such a scenario, user privacy becomes a major con- cern: the knowledge about user location may lead to her identification as well as a continuous tracing of her position. Researchers proposed several approaches to preserve users’ location privacy. They also showed that hiding the location of an LBS user is not enough to guarantee her privacy, i.e., user’s pro- file attributes or background knowledge of an attacker may reveal the user’s identity. In this paper we propose ABAKA, a novel collaborative approach that provides identity privacy for LBS users considering users’ profile attributes. In particular, our solution guarantees p -sensitive k -anonymity for the user that sends an LBS request to the LBSP. ABAKA computes a cloaked area by collaborative multi-hop forwarding of the LBS query, and using Ciphertext-Policy Attribute-Based Encryption (CP-ABE). We ran a thorough set of experiments to evaluate our solution: the results confirm the feasibility and efficiency of our proposal

    The RD53 Collaboration's SystemVerilog-UVM Simulation Framework and its General Applicability to Design of Advanced Pixel Readout Chips

    Full text link
    The foreseen Phase 2 pixel upgrades at the LHC have very challenging requirements for the design of hybrid pixel readout chips. A versatile pixel simulation platform is as an essential development tool for the design, verification and optimization of both the system architecture and the pixel chip building blocks (Intellectual Properties, IPs). This work is focused on the implemented simulation and verification environment named VEPIX53, built using the SystemVerilog language and the Universal Verification Methodology (UVM) class library in the framework of the RD53 Collaboration. The environment supports pixel chips at different levels of description: its reusable components feature the generation of different classes of parameterized input hits to the pixel matrix, monitoring of pixel chip inputs and outputs, conformity checks between predicted and actual outputs and collection of statistics on system performance. The environment has been tested performing a study of shared architectures of the trigger latency buffering section of pixel chips. A fully shared architecture and a distributed one have been described at behavioral level and simulated; the resulting memory occupancy statistics and hit loss rates have subsequently been compared.Comment: 15 pages, 10 figures (11 figure files), submitted to Journal of Instrumentatio

    A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks

    Get PDF
    The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would significantly limit the potential damage of malware. This is a more profound risk in Cyber-Physical Systems (CPSs), where a malware attack may cause significant physical damage to the infrastructure. Due to limited on-device available memory and processing power in CPS devices, most of the efforts for protecting CPS networks are focused on the edge layer, where the majority of security mechanisms are deployed. Since the majority of advanced and sophisticated malware programs are combining features from different families, these malicious programs are not similar enough to any existing malware family and easily evade binary classifier detection. Therefore, in this article, we propose a novel multilabel fuzzy clustering system for malware attack attribution. Our system is deployed on the edge layer to provide insight into applicable malware threats to the CPS network. We leverage static analysis by utilizing Opcode frequencies as the feature space to classify malware families. We observed that a multilabel classifier does not classify a part of samples. We named this problem the instance coverage problem. To overcome this problem, we developed an ensemble-based multilabel fuzzy classification method to suggest the relevance of a malware instance to the stricken families. This classifier identified samples of VirusShare, RansomwareTracker, and BIG2015 with an accuracy of 94.66%, 94.26%, and 97.56%, respectively

    Calabi-Yau cones from contact reduction

    Full text link
    We consider a generalization of Einstein-Sasaki manifolds, which we characterize in terms both of spinors and differential forms, that in the real analytic case corresponds to contact manifolds whose symplectic cone is Calabi-Yau. We construct solvable examples in seven dimensions. Then, we consider circle actions that preserve the structure, and determine conditions for the contact reduction to carry an induced structure of the same type. We apply this construction to obtain a new hypo-contact structure on S^2\times T^3.Comment: 30 pages; v2: typos corrected, presentation improved, one reference added. To appear in Ann. Glob. Analysis and Geometr

    On the feasibility of attribute-based encryption on Internet of Things devices

    Get PDF
    Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far. This article explores such feasibility for well-known IoT platforms, namely, Intel Galileo Gen 2, Intel Edison, Raspberry pi 1 model B, and Raspberry pi zero, and concludes that adopting ABE in the IoT is indeed feasible

    Shaken Granular Lasers

    Full text link
    Granular materials have been studied for decades, also driven by industrial and technological applications. These very simple systems, composed by agglomerations of mesoscopic particles, are characterized, in specific regimes, by a large number of metastable states and an extreme sensitivity (e.g., in sound transmission) on the arrangement of grains; they are not substantially affected by thermal phenomena, but can be controlled by mechanical solicitations. Laser emission from shaken granular matter is so far unexplored; here we provide experimental evidence that it can be affected and controlled by the status of motion of the granular, we also find that competitive random lasers can be observed. We hence demonstrate the potentialities of gravity affected moving disordered materials for optical applications, and open the road to a variety of novel interdisciplinary investigations, involving modern statistical mechanics and disordered photonics.Comment: 4 pages, 3 figures. To be published in Physical Review Letter

    Experimental measurement of photothermal effect in Fabry-Perot cavities

    Get PDF
    We report the experimental observation of the photothermal effect. The measurements are performed by modulating the laser power absorbed by the mirrors of two high-finesse Fabry-Perot cavities. The results are very well described by a recently proposed theoretical model [M. Cerdonio, L. Conti, A. Heidmann and M. Pinard, Phys. Rev. D 63 (2001) 082003], confirming the correctness of such calculations. Our observations and quantitative characterization of the photothermal effect demonstrate its critical importance for high sensitivity interferometric displacement measurements, as those necessary for gravitational wave detection.Comment: 4 pages, 3 figures, submitted to Phys. Rev. Let

    Area-preserving dynamics of a long slender finger by curvature: a test case for the globally conserved phase ordering

    Full text link
    A long and slender finger can serve as a simple ``test bed'' for different phase ordering models. In this work, the globally-conserved, interface-controlled dynamics of a long finger is investigated, analytically and numerically, in two dimensions. An important limit is considered when the finger dynamics are reducible to the area-preserving motion by curvature. A free boundary problem for the finger shape is formulated. An asymptotic perturbation theory is developed that uses the finger aspect ratio as a small parameter. The leading-order approximation is a modification of ``the Mullins finger" (a well-known analytic solution) which width is allowed to slowly vary with time. This time dependence is described, in the leading order, by an exponential law with the characteristic time proportional to the (constant) finger area. The subleading terms of the asymptotic theory are also calculated. Finally, the finger dynamics is investigated numerically, employing the Ginzburg-Landau equation with a global conservation law. The theory is in a very good agreement with the numerical solution.Comment: 8 pages, 4 figures, Latex; corrected typo

    H-Band Spectroscopic Classification of OB Stars

    Get PDF
    We present a new spectroscopic classification for OB stars based on H-band (1.5 micron to 1.8 micron) observations of a sample of stars with optical spectral types. Our initial sample of nine stars demonstrates that the combination of He I 1.7002 micron and H Brackett series absorption can be used to determine spectral types for stars between about O4 and B7 (to within about +/- 2 sub-types). We find that the Brackett series exhibits luminosity effects similar to the Balmer series for the B stars. This classification scheme will be useful in studies of optically obscured high mass star forming regions. In addition, we present spectra for the OB stars near 1.1 micron and 1.3 micron which may be of use in analyzing their atmospheres and winds.Comment: Accepted by AJ, 16 pages Latex (aastex4.0) including 4 figures and 2 tables. A complete PostScript copy is available at ftp://degobah.colorado.edu/pub/rblum/Hband
    corecore