118 research outputs found

    Analyzing confidentiality and privacy concerns: insights from Android issue logs

    Get PDF
    Context: Post-release user feedback plays an integral role in improving software quality and informing new features. Given its growing importance, feedback concerning security enhancements is particularly noteworthy. In considering the rapid uptake of Android we have examined the scale and severity of Android security threats as reported by its stakeholders. Objective: We systematically mine Android issue logs to derive insights into stakeholder perceptions and experiences in relation to certain Android security issues. Method: We employed contextual analysis techniques to study issues raised regarding confidentiality and privacy in the last three major Android releases, considering covariance of stakeholder comments, and the level of consistency in user preferences and priorities. Results: Confidentiality and privacy concerns varied in severity, and were most prevalent over Jelly Bean releases. Issues raised in regard to confidentiality related mostly to access, user credentials and permission management, while privacy concerns were mainly expressed about phone locking. Community users also expressed divergent preferences for new security features, ranging from more relaxed to very strict. Conclusions: Strategies that support continuous corrective measures for both old and new Android releases would likely maintain stakeholder confidence. An approach that provides users with basic default security settings, but with the power to configure additional security features if desired, would provide the best balance for Android's wide cohort of stakeholders

    Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks.

    Get PDF
    The two-dimensional quick response (QR) codes can be misleading due to the difficulty in differentiating a genuine QR code from a malicious one. Since, the vulnerability is practically part of their design, scanning a malicious QR code can direct the user to cloned malicious sites resulting in revealing sensitive information. In order, to evaluate the vulnerabilities and propose subsequent countermeasures, we demonstrate this type of attack through a simulated experiment, where a malicious QR code directs a user to a phishing site. For our experiment, we cloned Google's web page providing access to their email service (Gmail). Since, the URL is masqueraded into the QR code the unsuspecting user who opens the URL is directed to the malicious site. Our results proved that hackers could easily leverage QR codes into phishing attack vectors targeted at smartphone users, even bypassing web browsers safe browsing feature. In addition, the second part of our paper presents adequate countermeasures and introduces QRCS (Quick Response Code Secure). QRCS is a universal efficient and effective solution focusing exclusively on the authenticity of the originator and consequently, the integrity of QR code by using digital signatures

    Coideal Quantum Affine Algebra and Boundary Scattering of the Deformed Hubbard Chain

    Full text link
    We consider boundary scattering for a semi-infinite one-dimensional deformed Hubbard chain with boundary conditions of the same type as for the Y=0 giant graviton in the AdS/CFT correspondence. We show that the recently constructed quantum affine algebra of the deformed Hubbard chain has a coideal subalgebra which is consistent with the reflection (boundary Yang-Baxter) equation. We derive the corresponding reflection matrix and furthermore show that the aforementioned algebra in the rational limit specializes to the (generalized) twisted Yangian of the Y=0 giant graviton.Comment: 21 page. v2: minor correction

    Secret Symmetries in AdS/CFT

    Get PDF
    We discuss special quantum group (secret) symmetries of the integrable system associated to the AdS/CFT correspondence. These symmetries have by now been observed in a variety of forms, including the spectral problem, the boundary scattering problem, n-point amplitudes, the pure-spinor formulation and quantum affine deformations.Comment: 20 pages, pdfLaTeX; Submitted to the Proceedings of the Nordita program `Exact Results in Gauge-String Dualities'; Based on the talk presented by A.T., Nordita, 15 February 201

    The Bound State S-matrix of the Deformed Hubbard Chain

    Full text link
    In this work we use the q-oscillator formalism to construct the atypical (short) supersymmetric representations of the centrally extended Uq (su(2|2)) algebra. We then determine the S-matrix describing the scattering of arbitrary bound states. The crucial ingredient in this derivation is the affine extension of the aforementioned algebra.Comment: 44 pages, 3 figures. v2: minor correction

    On the reflection of magnon bound states

    Full text link
    We investigate the reflection of two-particle bound states of a free open string in the light-cone AdS_5 x S^5 string sigma model, for large angular momentum J=J_56 and ending on a D7 brane which wraps the entire AdS_5 and a maximal S^3 of S^5. We use the superspace formalism to analyse fundamental and two-particle bound states in the cases of supersymmetry-preserving and broken-supersymmetry boundaries. We find the boundary S-matrices corresponding to bound states both in the bulk and on the boundary.Comment: 35 pages, v2: few typos and ref corrected, accepted for publication in JHE

    The secret symmetries of the AdS/CFT reflection matrices

    Full text link
    We find new twisted Yangian symmetries of the AdS/CFT reflection matrices for the Y=0 maximal giant graviton and D5-brane. These new symmetries originate from the known secret symmetries of the Yangian symmetry of the AdS/CFT S-matrix.Comment: 9 pages, v2: published versio

    Reflection algebra, Yangian symmetry and bound-states in AdS/CFT

    Full text link
    We present the `Heisenberg picture' of the reflection algebra by explicitly constructing the boundary Yangian symmetry of an AdS/CFT superstring which ends on a boundary with non-trivial degrees of freedom and which preserves the full bulk Lie symmetry algebra. We also consider the spectrum of bulk and boundary states and some automorphisms of the underlying algebras.Comment: 31 page, 8 figures. Updated versio
    • …
    corecore