10,211 research outputs found

    On the limits of engine analysis for cheating detection in chess

    Get PDF
    The integrity of online games has important economic consequences for both the gaming industry and players of all levels, from professionals to amateurs. Where there is a high likelihood of cheating, there is a loss of trust and players will be reluctant to participate — particularly if this is likely to cost them money. Chess is a game that has been established online for around 25 years and is played over the Internet commercially. In that environment, where players are not physically present “over the board” (OTB), chess is one of the most easily exploitable games by those who wish to cheat, because of the widespread availability of very strong chess-playing programs. Allegations of cheating even in OTB games have increased significantly in recent years, and even led to recent changes in the laws of the game that potentially impinge upon players’ privacy. In this work, we examine some of the difficulties inherent in identifying the covert use of chess-playing programs purely from an analysis of the moves of a game. Our approach is to deeply examine a large collection of games where there is confidence that cheating has not taken place, and analyse those that could be easily misclassified. We conclude that there is a serious risk of finding numerous “false positives” and that, in general, it is unsafe to use just the moves of a single game as prima facie evidence of cheating. We also demonstrate that it is impossible to compute definitive values of the figures currently employed to measure similarity to a chess-engine for a particular game, as values inevitably vary at different depths and, even under identical conditions, when multi-threading evaluation is used

    An economic analysis of ransomware and its welfare consequences

    Get PDF
    We present in this work an economic analysis of ransomware, a relatively new form of cyber-enabled extortion. We look at how the illegal gains of the criminals will depend on the strategies they use, examining uniform pricing and price discrimination. We also explore the welfare costs to society of such strategies. In addition, we present the results of a pilot survey which demonstrate proof of concept in evaluating the costs of ransomware attacks. We discuss at each stage whether the different strategies we analyse have been encountered already in existing malware, and the likelihood of them being implemented in the future. We hope this work will provide some useful insights for predicting how ransomware may evolve in the future

    2b-RAD genotyping for population genomic studies of Chagas disease vectors: Rhodnius ecuadoriensis in Ecuador

    Get PDF
    Background: Rhodnius ecuadoriensis is the main triatomine vector of Chagas disease, American trypanosomiasis, in Southern Ecuador and Northern Peru. Genomic approaches and next generation sequencing technologies have become powerful tools for investigating population diversity and structure which is a key consideration for vector control. Here we assess the effectiveness of three different 2b restriction site-associated DNA (2b-RAD) genotyping strategies in R. ecuadoriensis to provide sufficient genomic resolution to tease apart microevolutionary processes and undertake some pilot population genomic analyses. Methodology/Principal findings: The 2b-RAD protocol was carried out in-house at a non-specialized laboratory using 20 R. ecuadoriensis adults collected from the central coast and southern Andean region of Ecuador, from June 2006 to July 2013. 2b-RAD sequencing data was performed on an Illumina MiSeq instrument and analyzed with the STACKS de novo pipeline for loci assembly and Single Nucleotide Polymorphism (SNP) discovery. Preliminary population genomic analyses (global AMOVA and Bayesian clustering) were implemented. Our results showed that the 2b-RAD genotyping protocol is effective for R. ecuadoriensis and likely for other triatomine species. However, only BcgI and CspCI restriction enzymes provided a number of markers suitable for population genomic analysis at the read depth we generated. Our preliminary genomic analyses detected a signal of genetic structuring across the study area. Conclusions/Significance: Our findings suggest that 2b-RAD genotyping is both a cost effective and methodologically simple approach for generating high resolution genomic data for Chagas disease vectors with the power to distinguish between different vector populations at epidemiologically relevant scales. As such, 2b-RAD represents a powerful tool in the hands of medical entomologists with limited access to specialized molecular biological equipment. Author summary: Understanding Chagas disease vector (triatomine) population dispersal is key for the design of control measures tailored for the epidemiological situation of a particular region. In Ecuador, Rhodnius ecuadoriensis is a cause of concern for Chagas disease transmission, since it is widely distributed from the central coast to southern Ecuador. Here, a genome-wide sequencing (2b-RAD) approach was performed in 20 specimens from four communities from ManabĂ­ (central coast) and Loja (southern) provinces of Ecuador, and the effectiveness of three type IIB restriction enzymes was assessed. The findings of this study show that this genotyping methodology is cost effective in R. ecuadoriensis and likely in other triatomine species. In addition, preliminary population genomic analysis results detected a signal of population structure among geographically distinct communities and genetic variability within communities. As such, 2b-RAD shows significant promise as a relatively low-tech solution for determination of vector population genomics, dynamics, and spread

    Field study of infiltration capacity reduction of porous mixture surfaces

    Get PDF
    Porous surfaces have been used all over the world in source control techniques to minimize flooding problems in car parks. Several studies highlighted the reduction in the infiltration capacity of porous mixture surfaces after several years of use. Therefore, it is necessary to design and develop a new methodology to quantify this reduction and to identify the hypothetical differences in permeability between zones within the same car park bay due to the influence of static loads in the parked vehicles. With this aim, nine different zones were selected in order to check this hypothesis (four points under the wheels of a standard vehicle and five points between wheels). This article presents the infiltration capacity reduction results, using the LCS permeameter, of Polymer-Modified Porous Concrete (9 bays) and Porous Asphalt (9 bays) surfaces in the University of Cantabria Campus parking area (Spain) 5 years after their construction. Statistical analysis methodology was proposed for assessing the results. Significant differences were observed in permeability and reduction in infiltration capacity in the case of porous concrete surfaces, while no differences were found for porous asphalt depending on the measurement zone

    Steganalysis of Hydan

    Get PDF
    Hydan is a steganographic tool which can be used to hide any kind of information inside executable files. In this work, we present an efficient distinguisher for it: We have developed a system that is able to detect executable files with embedded information through Hydan. Our system uses statistical analysis of instruction set distribution to distinguish between files with no hidden information and files that have been modified with Hydan. We have tested our algorithm against a mix of clean and stego-executable files. The proposed distinguisher is able to tell apart these files with a 0 ratio of false positives and negatives, thus detecting all files with hidden information through Hydan

    Water quality and quantity assessment of pervious pavements performance in experimental car park areas

    Get PDF
    Pervious pavements have become one of the most used sustainable urban drainage system (SUDS) techniques in car parks. This research paper presents the results of monitoring water quality from several experimental car park areas designed and constructed in Spain with bays made of interlocking concrete block pavement, porous asphalt, polymer-modified porous concrete and reinforced grass with plastic and concrete cells. Moreover, two different sub-base materials were used (limestone aggregates and basic oxygen furnace slag). This study therefore encompasses the majority of the materials used as permeable surfaces and sub-base layers all over the world. Effluent from the test bays was monitored for dissolved oxygen, pH, electric conductivity, total suspended solids, turbidity and total petroleum hydrocarbons in order to analyze the behaviour shown by each combination of surface and sub-base materials. In addition, permeability tests were undertaken in all car parks using the ‘Laboratorio Caminos Santander’ permeameter and the Cantabrian Portable Infiltrometer. All results are presented together with the influence of surface and sub-base materials on water quality indicators using bivariate correlation statistical analysis at a confidence level of 95%. The polymer-modified porous concrete surface course in combination with limestone aggregate sub-base presented the best performance

    Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections

    Get PDF
    One of the most relevant applications of digital image forensics is to accurately identify the device used for taking a given set of images, a problem called source identification. This paper studies recent developments in the field and proposes the mixture of two techniques (Sensor Imperfections and Wavelet Transforms) to get better source identification of images generated with mobile devices. Our results show that Sensor Imperfections and Wavelet Transforms can jointly serve as good forensic features to help trace the source camera of images produced by mobile phones. Furthermore, the model proposed here can also determine with high precision both the brand and model of the device
    • 

    corecore