9,819 research outputs found

    ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs

    Get PDF
    The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider (LBSP). In such a scenario, user privacy becomes a major con- cern: the knowledge about user location may lead to her identification as well as a continuous tracing of her position. Researchers proposed several approaches to preserve users’ location privacy. They also showed that hiding the location of an LBS user is not enough to guarantee her privacy, i.e., user’s pro- file attributes or background knowledge of an attacker may reveal the user’s identity. In this paper we propose ABAKA, a novel collaborative approach that provides identity privacy for LBS users considering users’ profile attributes. In particular, our solution guarantees p -sensitive k -anonymity for the user that sends an LBS request to the LBSP. ABAKA computes a cloaked area by collaborative multi-hop forwarding of the LBS query, and using Ciphertext-Policy Attribute-Based Encryption (CP-ABE). We ran a thorough set of experiments to evaluate our solution: the results confirm the feasibility and efficiency of our proposal

    The RD53 Collaboration's SystemVerilog-UVM Simulation Framework and its General Applicability to Design of Advanced Pixel Readout Chips

    Full text link
    The foreseen Phase 2 pixel upgrades at the LHC have very challenging requirements for the design of hybrid pixel readout chips. A versatile pixel simulation platform is as an essential development tool for the design, verification and optimization of both the system architecture and the pixel chip building blocks (Intellectual Properties, IPs). This work is focused on the implemented simulation and verification environment named VEPIX53, built using the SystemVerilog language and the Universal Verification Methodology (UVM) class library in the framework of the RD53 Collaboration. The environment supports pixel chips at different levels of description: its reusable components feature the generation of different classes of parameterized input hits to the pixel matrix, monitoring of pixel chip inputs and outputs, conformity checks between predicted and actual outputs and collection of statistics on system performance. The environment has been tested performing a study of shared architectures of the trigger latency buffering section of pixel chips. A fully shared architecture and a distributed one have been described at behavioral level and simulated; the resulting memory occupancy statistics and hit loss rates have subsequently been compared.Comment: 15 pages, 10 figures (11 figure files), submitted to Journal of Instrumentatio

    A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks

    Get PDF
    The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would significantly limit the potential damage of malware. This is a more profound risk in Cyber-Physical Systems (CPSs), where a malware attack may cause significant physical damage to the infrastructure. Due to limited on-device available memory and processing power in CPS devices, most of the efforts for protecting CPS networks are focused on the edge layer, where the majority of security mechanisms are deployed. Since the majority of advanced and sophisticated malware programs are combining features from different families, these malicious programs are not similar enough to any existing malware family and easily evade binary classifier detection. Therefore, in this article, we propose a novel multilabel fuzzy clustering system for malware attack attribution. Our system is deployed on the edge layer to provide insight into applicable malware threats to the CPS network. We leverage static analysis by utilizing Opcode frequencies as the feature space to classify malware families. We observed that a multilabel classifier does not classify a part of samples. We named this problem the instance coverage problem. To overcome this problem, we developed an ensemble-based multilabel fuzzy classification method to suggest the relevance of a malware instance to the stricken families. This classifier identified samples of VirusShare, RansomwareTracker, and BIG2015 with an accuracy of 94.66%, 94.26%, and 97.56%, respectively

    Calabi-Yau cones from contact reduction

    Full text link
    We consider a generalization of Einstein-Sasaki manifolds, which we characterize in terms both of spinors and differential forms, that in the real analytic case corresponds to contact manifolds whose symplectic cone is Calabi-Yau. We construct solvable examples in seven dimensions. Then, we consider circle actions that preserve the structure, and determine conditions for the contact reduction to carry an induced structure of the same type. We apply this construction to obtain a new hypo-contact structure on S^2\times T^3.Comment: 30 pages; v2: typos corrected, presentation improved, one reference added. To appear in Ann. Glob. Analysis and Geometr

    The economics of multisystemic resilience

    Get PDF
    The concept of resilience in the economic literature is centered around the capacity to overcome adverse circumstances and to mitigate the impacts of shocks through the development of human capital starting in early childhood. In this chapter, the authors review the existing evidence on multisystemic resilience in economics, from both a micro- and a macroperspective. To do so, they first introduce the theory of human capital development and the large body of empirical evidence about early interventions that seek to boost resilience in children. They then discuss two more recent strands of literature: one that examines whether subsequent investments can offset the effects of early-life shocks and another that uses micro-founded macroeconomic models to understand the indirect (multisystemic) effects of early interventions

    H-Band Spectroscopic Classification of OB Stars

    Get PDF
    We present a new spectroscopic classification for OB stars based on H-band (1.5 micron to 1.8 micron) observations of a sample of stars with optical spectral types. Our initial sample of nine stars demonstrates that the combination of He I 1.7002 micron and H Brackett series absorption can be used to determine spectral types for stars between about O4 and B7 (to within about +/- 2 sub-types). We find that the Brackett series exhibits luminosity effects similar to the Balmer series for the B stars. This classification scheme will be useful in studies of optically obscured high mass star forming regions. In addition, we present spectra for the OB stars near 1.1 micron and 1.3 micron which may be of use in analyzing their atmospheres and winds.Comment: Accepted by AJ, 16 pages Latex (aastex4.0) including 4 figures and 2 tables. A complete PostScript copy is available at ftp://degobah.colorado.edu/pub/rblum/Hband

    Shaken Granular Lasers

    Full text link
    Granular materials have been studied for decades, also driven by industrial and technological applications. These very simple systems, composed by agglomerations of mesoscopic particles, are characterized, in specific regimes, by a large number of metastable states and an extreme sensitivity (e.g., in sound transmission) on the arrangement of grains; they are not substantially affected by thermal phenomena, but can be controlled by mechanical solicitations. Laser emission from shaken granular matter is so far unexplored; here we provide experimental evidence that it can be affected and controlled by the status of motion of the granular, we also find that competitive random lasers can be observed. We hence demonstrate the potentialities of gravity affected moving disordered materials for optical applications, and open the road to a variety of novel interdisciplinary investigations, involving modern statistical mechanics and disordered photonics.Comment: 4 pages, 3 figures. To be published in Physical Review Letter

    On the feasibility of attribute-based encryption on Internet of Things devices

    Get PDF
    Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far. This article explores such feasibility for well-known IoT platforms, namely, Intel Galileo Gen 2, Intel Edison, Raspberry pi 1 model B, and Raspberry pi zero, and concludes that adopting ABE in the IoT is indeed feasible

    Experimental measurement of photothermal effect in Fabry-Perot cavities

    Get PDF
    We report the experimental observation of the photothermal effect. The measurements are performed by modulating the laser power absorbed by the mirrors of two high-finesse Fabry-Perot cavities. The results are very well described by a recently proposed theoretical model [M. Cerdonio, L. Conti, A. Heidmann and M. Pinard, Phys. Rev. D 63 (2001) 082003], confirming the correctness of such calculations. Our observations and quantitative characterization of the photothermal effect demonstrate its critical importance for high sensitivity interferometric displacement measurements, as those necessary for gravitational wave detection.Comment: 4 pages, 3 figures, submitted to Phys. Rev. Let

    Shining a Light on the Federal Reserve’s Foreign Affairs

    Get PDF
    Throughout its history, the U.S. Federal Reserve has engaged in international diplomacy, outside the bounds of (and sometimes in conflict with) the priorities of the White House and U.S. State Department. In directing monetary policy, the Fed’s primary concern is to benefit the U.S. economy. In the process, the Fed at times acts in concert with foreign central banks, as was the case in setting new bank regulations after the 2008 financial crisis. At other times, the Fed acts in ways that other countries view as detrimental to their economic interests. Either way, the Fed operates with little public accountability and can wind up complicating the work of U.S. diplomats. This issue brief focuses on the questions of whether and how greater oversight of the Fed’s international activities should be pursued. It recommends not an overhaul of the Fed’s structure or the elimination of its role in international affairs but instead calls for greater disclosure of its international activities. The Fed should provide testimony to Congress twice per year on its foreign policies, just as it does for monetary and regulatory policy. This kind of disclosure permits broader discussion of the Fed’s activities without eliminating the benefits of its institutional independence for monetary policy.https://repository.upenn.edu/pennwhartonppi/1063/thumbnail.jp
    • …
    corecore