131 research outputs found

    Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces

    Full text link
    Website Fingerprinting (WF) is a type of traffic analysis attack that enables a local passive eavesdropper to infer the victim's activity, even when the traffic is protected by a VPN or an anonymity system like Tor. Leveraging a deep-learning classifier, a WF attacker can gain over 98% accuracy on Tor traffic. In this paper, we explore a novel defense, Mockingbird, based on the idea of adversarial examples that have been shown to undermine machine-learning classifiers in other domains. Since the attacker gets to design and train his attack classifier based on the defense, we first demonstrate that at a straightforward technique for generating adversarial-example based traces fails to protect against an attacker using adversarial training for robust classification. We then propose Mockingbird, a technique for generating traces that resists adversarial training by moving randomly in the space of viable traces and not following more predictable gradients. The technique drops the accuracy of the state-of-the-art attack hardened with adversarial training from 98% to 42-58% while incurring only 58% bandwidth overhead. The attack accuracy is generally lower than state-of-the-art defenses, and much lower when considering Top-2 accuracy, while incurring lower bandwidth overheads.Comment: 18 pages, 13 figures and 8 Tables. Accepted in IEEE Transactions on Information Forensics and Security (TIFS

    Educational Methods from Jahez Point of View

    Get PDF
    The aim of writing this article is to assert Jahez point of view about educational methods. The present study has been conducted by taking benefit from qualitative approach and descriptive-analytical method and has analyzed and inferred Jahez point of view about educational methods by using existing and available resources. The inferred training methods from Jahez point of view are as follows: observation-experience and testing (learning opportunity in practice), using repetition and practice method, encouraging and punishing learners and considering its principles and points, memorizing and recalling the materials, writing and recording learned contents, teaching in group and in the form of participation of all learners, giving recommendations and guiding the learners, presenting speeches, problem- oriented teaching and discovering the problem by the learners themselves, using books and the method of stimulating several senses in teaching learners or sharing senses in the trend of learning. Key words: Islamic training, Jahez, educational methods

    Guard Sets in Tor using AS Relationships

    Get PDF
    The mechanism for picking guards in Tor suffers from security problems like guard fingerprinting and from performance issues. To address these issues, Hayes and Danezis proposed the use of guard sets, in which the Tor system groups all guards into sets, and each client picks one of these sets and uses its guards. Unfortunately, guard sets frequently need nodes added or they are broken up due to fluctuations in network bandwidth. In this paper, we first show that these breakups create opportunities for malicious guards to join many guard sets by merely tuning the bandwidth they make available to Tor, and this greatly increases the number of clients exposed to malicious guards. To address this problem, we propose a new method for forming guard sets based on Internet location. We construct a hierarchy that keeps clients and guards together more reliably and prevents guards from easily joining arbitrary guard sets. This approach also has the advantage of confining an attacker with access to limited locations on the Internet to a small number of guard sets. We simulate this guard set design using historical Tor data in the presence of both relay-level adversaries and network-level adversaries, and we find that our approach is good at confining the adversary into few guard sets, thus limiting the impact of attacks

    BP-NTT: Fast and Compact in-SRAM Number Theoretic Transform with Bit-Parallel Modular Multiplication

    Full text link
    Number Theoretic Transform (NTT) is an essential mathematical tool for computing polynomial multiplication in promising lattice-based cryptography. However, costly division operations and complex data dependencies make efficient and flexible hardware design to be challenging, especially on resource-constrained edge devices. Existing approaches either focus on only limited parameter settings or impose substantial hardware overhead. In this paper, we introduce a hardware-algorithm methodology to efficiently accelerate NTT in various settings using in-cache computing. By leveraging an optimized bit-parallel modular multiplication and introducing costless shift operations, our proposed solution provides up to 29x higher throughput-per-area and 2.8-100x better throughput-per-area-per-joule compared to the state-of-the-art.Comment: This work is accepted to the 60th Design Automation Conference (DAC), 202

    Antibacterial Effects of Chitosan, Formocresol and CMCP as Pulpectomy Medicament on Enterococcus ‎faecalis, Staphylococcus aureus and Streptococcus ‎mutans

    Get PDF
    Introduction: During pulpectomy of primary teeth, cytotoxic medicaments such as formocresol or camphor mono-chlorophenol (CMCP) are used as medicaments. For the first time it is theorized that chitosan can substitute these traditional materials used in pulpectomy of infectious primary teeth. Methods and Materials: This preliminary in vitro study consisted of two separate phases (n=75), each of which assessed the antibacterial effects of chitosan versus formocresol and CMCP and positive/negative controls (n=15) on three bacteria types [Enterococcus ‎faecalis, Staphylococcus aureus, Streptococcus ‎mutans, (n=5 per subgroup)]. Phases 1 and 2 concerned respectively with 1- and 7-day effects of these materials. Bacteria were cultured and injected into sterilized canals and colonies were counted. Medicaments were applied and colonies were re-counted after 1 day of treatment (phase 1). Specimens were re-sterilized and re-randomized, and used for phase 2, in which the same procedures were performed for a 7-day period. Effects of agents on bacteria were analyzed statistically (Kruskal-Wallis α=0.05 and Mann-Whitney α=0.017). Results: Treatments reduced bacterial count either after 1 or 7 days (P=0.000). Their effects on different bacteria types were not significant either after 1 or 7 days (P>0.48). Antibacterial efficacies of treatments (indicated by colony reduction) were significantly different, after 7 days (P=0.045). Antibacterial efficacy of chitosan was similar to that of formocresol or CMCP, in both phases [either after 1 or 7 days of treatment (P>0.017). Formocresol and CMCP had similar efficacies in either phase (P>0.017). Conclusions: This preliminary study confirmed the appropriate antibacterial efficacy of chitosan as a medicament in pulpectomy of infectious primary teeth.Keywords: Antibacterial Agents; Camphor Mono-Chlorophenol; Chitosan; CMCP; Enterococcus ‎faecalis; Formocresol; Medicament; Pulpectomy; Staphylococcus aureus; Streptococcus ‎mutan

    Investigation of the Relationship between Faith and Attitude from the Viewpoint of the Holy Quran

    Get PDF
    Faith and attitude as two important categories have many similarities and differences. Beliefs and attitudes are not the same, they are different in concept and character, they have established one as a sacred preacher and the other as psychologists. However, the remarkable similarities and the strong relationship between them are illustrated in a descriptive-analytic manner. The paper deals with the central role of "faith" in the verses of the Holy Quran and "attitude" in social psychology. This paper uses a descriptive-analytical research method. The findings of the study indicate that the religious pattern of attitude change as an internal mechanism, by increasing the coefficient of intellectual and spiritual transformation, reaches the highest level of beliefs in three cognitive, emotional and behavioral dimensions
    • …
    corecore