296 research outputs found

    Stakeholder engagement in marine spatial planning of Bangladesh

    Get PDF

    Covid-19 infection; loss of taste, smell, and neurogenic respiratory failure

    Get PDF
    Neurological Signs and Symptoms in COVID-19: Like the rest of the world, Pakistan is been gripped by unprecedented and complex burden of COVID-19. While the diseases got upgraded to a pandemic, the preparedness of even the first world countries to combat COVID-19 is distressing, as there seems to be a lack of clear strategy to tackle the disease spread and treatment

    Hidden in Plain Sight: Exploring Encrypted Channels in Android apps

    Full text link
    As privacy features in Android operating system improve, privacy-invasive apps may gradually shift their focus to non-standard and covert channels for leaking private user/device information. Such leaks also remain largely undetected by state-of-the-art privacy analysis tools, which are very effective in uncovering privacy exposures via regular HTTP and HTTPS channels. In this study, we design and implement, ThirdEye, to significantly extend the visibility of current privacy analysis tools, in terms of the exposures that happen across various non-standard and covert channels, i.e., via any protocol over TCP/UDP (beyond HTTP/S), and using multi-layer custom encryption over HTTP/S and non-HTTP protocols. Besides network exposures, we also consider covert channels via storage media that also leverage custom encryption layers. Using ThirdEye, we analyzed 12,598 top-apps in various categories from Androidrank, and found that 2887/12,598 (22.92%) apps used custom encryption/decryption for network transmission and storing content in shared device storage, and 2465/2887 (85.38%) of those apps sent device information (e.g., advertising ID, list of installed apps) over the network that can fingerprint users. Besides, 299 apps transmitted insecure encrypted content over HTTP/non-HTTP protocols; 22 apps that used authentication tokens over HTTPS, happen to expose them over insecure (albeit custom encrypted) HTTP/non-HTTP channels. We found non-standard and covert channels with multiple levels of obfuscation (e.g., encrypted data over HTTPS, encryption at nested levels), and the use of vulnerable keys and cryptographic algorithms. Our findings can provide valuable insights into the evolving field of non-standard and covert channels, and help spur new countermeasures against such privacy leakage and security issues.Comment: Extended version of an ACM CCS 2022 pape

    Bangunan bersejarah di kota Makassar

    Get PDF
    Buku Bangunan Bersejarah di Kota Makassar merupakan salah satu upaya publikasi pelestarian yang dilakukan oleh Balai Pelestarian Cagar Budaya Makassar, dengan tujuan untuk mempublikasikan tinggalan kepurbakalaan khususnya bangunan bersejarah . Oleh karena itu, sasaran utama buku ini adalah untuk menyajikan kondisi kekinian bangunan terse but yang ada di Kota Makassar. Informasi ini disajikan, berdasarkan kelompok antara lain; fasilitas pemerintahan, layanan masyarakat dan pembangunan ekonomi, layanan/ pembangunan pendidikan, tempat ibadah dan sarana rekreasi/ istirahat/ rumah tinggal

    Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight

    Full text link
    Public key infrastructure (PKI) is a certificate-based technology that helps in authenticating systems identities. HTTPS/TLS relies mainly on PKI to minimize fraud over the Internet. Nowadays, websites utilize CDNs to improve user experience, performance, and resilience against cyber attacks. However, combining HTTPS/TLS with CDNs has raised new security challenges. In any PKI system, keeping private keys private is of utmost importance. However, it has become the norm for CDN-powered websites to violate that fundamental assumption. Several solutions have been proposed to make HTTPS CDN-friendly. However, protection of private keys from the very instance of generation; and how they can be made secure against exposure by malicious (CDN) administrators and malware remain unexplored. We utilize trusted execution environments to protect private keys by never exposing them to human operators or untrusted software. We design Blindfold to protect private keys in HTTPS/TLS infrastructures, including CAs, website on-premise servers, and CDNs. We implemented a prototype to assess Blindfold's performance and performed several experiments on both the micro and macro levels. We found that Blindfold slightly outperforms SoftHSM in key generation by 1% while lagging by 0.01% for certificate issuance operations

    Neurological manifestations of COVID-19

    Get PDF
    Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome coronavirus 2 (SARS CoV-2) has turned out to be a formidable pandemic. Upcoming evidence from confirmed cases of COVID-19 suggests an anticipated incursion of patients with neurological manifestations in the weeks to come. An expression of the angiotensin-converting enzyme 2 (ACE 2), the cellular receptor for SARS-CoV-2 over the glial cells and neurons have made the brain a potential target. Neurotoxicity may occur as a result of direct, indirect and post-infectious complications. Attention to neurological deficits in COVID-19 is fundamental to ensure appropriate, timely, beneficial management of the affected patients. Most common neurological manifestations seen include dizziness, headache, impaired consciousness, acute cerebrovascular disease, ataxia, and seizures. Anosmia and ageusia have recently been hinted as significant early symptoms in COVID-19. As cases with neurological deficits in COVID-19 emerge, the overall prognosis is yet unknown

    On Food and Nutrition Policy Activities in the USA, Australia, and Norway

    Get PDF
    Formulation and implementation of a national food and nutrition policy is important for ensuring good health and quality of life. This study examined the formulation and implementation of food and nutrition policies in the USA, Australia, and Norway. Library searches, MEDLINE and POPLINE searches, and personal communications were used for collecting information and data on nutrition activities and policy formulation and implementation in each country. These countries were selected because policy activities have been ongoing since the 1930s with a clear improvement in the nutritional status of the people. Multisectoral participation, conflicts of interest, strategies to alter diet, and attempts to deal with new problems have been highlighted and compared. Findings of the study may be useful to policy-makers in less-developed countries during future policy-making processes
    • …
    corecore