561 research outputs found
Soros, Child Sacrifices, and {5G}: {U}nderstanding the Spread of Conspiracy Theories on {Web} Communities
This paper presents a multi-platform computational pipeline geared to identify social media posts discussing (known) conspiracy theories. We use 189 conspiracy claims collected by Snopes, and find 66k posts and 277k comments on Reddit, and 379k tweets discussing them. Then, we study how conspiracies are discussed on different Web communities and which ones are particularly influential in driving the discussion about them. Our analysis sheds light on how conspiracy theories are discussed and spread online, while highlighting multiple challenges in mitigating them
MaMaDroid: Detecting Android malware by building markov chains of behavioral models (extended version)
As Android has become increasingly popular, so has malware targeting it, thus motivating the research community
to propose different detection techniques. However, the constant evolution of the Android ecosystem,
and of malware itself, makes it hard to design robust tools that can operate for long periods of time without
the need for modifications or costly re-training. Aiming to address this issue, we set to detect malware from
a behavioral point of view, modeled as the sequence of abstracted API calls. We introduce MaMaDroid, a
static-analysis based system that abstracts app’s API calls to their class, package, or family, and builds a model
from their sequences obtained from the call graph of an app as Markov chains. This ensures that the model is
more resilient to API changes and the features set is of manageable size. We evaluate MaMaDroid using a
dataset of 8.5K benign and 35.5K malicious apps collected over a period of six years, showing that it effectively
detects malware (with up to 0.99 F-measure) and keeps its detection capabilities for long periods of time
(up to 0.87 F-measure two years after training). We also show that MaMaDroid remarkably overperforms
DroidAPIMiner, a state-of-the-art detection system that relies on the frequency of (raw) API calls. Aiming to
assess whether MaMaDroid’s effectiveness mainly stems from the API abstraction or from the sequencing
modeling, we also evaluate a variant of it that uses frequency (instead of sequences), of abstracted API calls.
We find that it is not as accurate, failing to capture maliciousness when trained on malware samples that
include API calls that are equally or more frequently used by benign apps
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers
While the Internet has dramatically increased the exposure that research can receive, it has also facilitated harassment against scholars. To understand the impact that these attacks can have on the work of researchers, we perform a series of systematic interviews with researchers including academics, journalists, and activists, who have experienced targeted, Internet-facilitated harassment. We provide a framework for understanding the types of harassers that target researchers, the harassment that ensues, and the personal and professional impact on individuals and academic freedom. We then study preventative and remedial strategies available, and the institutions that prevent some of these strategies from being more effective. Finally, we discuss the ethical structures that could facilitate more equitable access to participating in research without serious personal suffering
Flexible and Robust Privacy-Preserving Implicit Authentication
Implicit authentication consists of a server authenticating a user based on
the user's usage profile, instead of/in addition to relying on something the
user explicitly knows (passwords, private keys, etc.). While implicit
authentication makes identity theft by third parties more difficult, it
requires the server to learn and store the user's usage profile. Recently, the
first privacy-preserving implicit authentication system was presented, in which
the server does not learn the user's profile. It uses an ad hoc two-party
computation protocol to compare the user's fresh sampled features against an
encrypted stored user's profile. The protocol requires storing the usage
profile and comparing against it using two different cryptosystems, one of them
order-preserving; furthermore, features must be numerical. We present here a
simpler protocol based on set intersection that has the advantages of: i)
requiring only one cryptosystem; ii) not leaking the relative order of fresh
feature samples; iii) being able to deal with any type of features (numerical
or non-numerical).
Keywords: Privacy-preserving implicit authentication, privacy-preserving set
intersection, implicit authentication, active authentication, transparent
authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May
26-28, 2015, IFIP AICT, Springer, to appea
Influence of carbon and nitrogen on electronic structure and hyperfine interactions in fcc iron-based alloys
Carbon and nitrogen austenites, modeled by Fe8N and Fe8C superstructures are
studied by full-potential LAPW method. Structure parameters, electronic and
magnetic properties as well as hyperfine interaction parameters are obtained.
Calculations prove that Fe-C austenite can be successfully modeled by ordered
Fe8C superstructure. The results show that chemical Fe-C bond in Fe8C has
higher covalent part than in Fe8N. Detailed analysis of electric field gradient
formation for both systems is performed. The calculation of electric field
gradient allow us to carry out a good interpretation of Moessbauer spectra for
Fe-C and Fe-N systems.Comment: 8 pages, 3 figures, IOP-style LaTeX, submitted to J. Phys. Condens.
Matte
Whole genome sequencing: Revolutionary medicine or privacy nightmare?
Whole genome sequencing will soon become affordable for many individuals, but thorny privacy and ethical issues could jeopardize its popularity and thwart the large-scale adoption of genomics in healthcare and slow potential medical advances. The Web extra at http://youtu.be/As3J9NYsbbY is an audio recording of Alf Weaver interviewing Bradley Malin and Jacques Fellay about the possibilities and challenges of whole genome sequencing. © 1970-2012 IEEE
Eriophyid mites in classical biological control of weeds: Progress and challenges
A classical biological control agent is an exotic host-specific natural enemy, which is intentionally introduced to obtain long-term control of an alien invasive species. Among the arthropods considered for this role, eriophyid mites are likely to possess the main attributes required: Host specificity, efficacy, and long-lasting effects. However, so far, only a few species have been approved for release. Due to their microscopic size and the general lack of knowledge regarding their biology and behavior, working with eriophyids is particularly challenging. Furthermore, mites disperse in wind, and little is known about biotic and abiotic constraints to their population growth. All these aspects pose challenges that, if not properly dealt with, can make it particularly difficult to evaluate eriophyids as prospective biological control agents and jeopardize the general success of control programs. We identified some of the critical aspects of working with eriophyids in classical biological control of weeds and focused on how they have been or may be addressed. In particular, we analyzed the importance of accurate mite identification, the difficulties faced in the evaluation of their host specificity, risk assessment of nontarget species, their impact on the weed, and the final steps of mite release and post-release monitoring
Secure Similar Sequence Query on Outsourced Genomic Data
The growing availability of genomic data is unlocking research potentials on genomic-data analysis. It is of great importance to outsource the genomic-analysis tasks onto clouds to leverage their powerful computational resources over the large-scale genomic sequences. However, the remote placement of the data raises personal-privacy concerns, and it is challenging to evaluate data-analysis functions on outsourced genomic data securely and efficiently. In this work, we study the secure similar-sequence-query (SSQ) problem over outsourced genomic data, which has not been fully investigated. To address the challenges of security and efficiency, we propose two protocols in the mixed form, which combine two-party secure secret sharing, garbled circuit, and partial homomorphic encryptions together and use them to jointly fulfill the secure SSQ function. In addition, our protocols support multi-user queries over a joint genomic data set collected from multiple data owners, making our solution scalable. We formally prove the security of protocols under the semi-honest adversary model, and theoretically analyze the performance. We use extensive experiments over real-world dataset on a commercial cloud platform to validate the efficacy of our proposed solution, and demonstrate the performance improvements compared with state-of-the-art works
Combining Private Set-Intersection with Secure Two-Party Computation
Private Set-Intersection (PSI) is one of the most popular and practically relevant secure two-party computation (2PC) tasks. Therefore, designing special-purpose PSI protocols (which are more efficient than generic 2PC solutions) is a very active line of research. In particular, a recent line of work has proposed PSI protocols based on oblivious transfer (OT) which, thanks to recent advances in OT-extension techniques, is nowadays a very cheap cryptographic building block.
Unfortunately, these protocols cannot be plugged into larger 2PC applications since in these protocols one party (by design) learns the output of the intersection. Therefore, it is not possible to perform secure post-processing of the output of the PSI protocol.
In this paper we propose a novel and efficient OT-based PSI protocol that produces an encrypted output that can therefore be later used as an input to other 2PC protocols. In particular, the protocol can be used in combination with all common approaches to 2PC including garbled circuits, secret sharing and homomorphic encryption. Thus, our protocol can be combined with the right 2PC techniques to achieve more efficient protocols for computations of the form for arbitrary functions
Last-male sperm precedence in Rhynchophorus ferrugineus (Olivier): observations in laboratory mating experiments with irradiated males
The Red PalmWeevil (RPW)Rhynchophorus ferrugineus(Olivier 1790) is an invasive
pest from southeastern Asia and Melanesia that in the last 30 years has spread widely
in the Middle East and Mediterranean Basin. Its stem-boring larvae cause great damage to several palm species of the Arecaceae family, many of which are economically
important for agricultural and ornamental purposes. Therefore, great attention has recently been focused in studying this species to identify sustainable and effective eradication strategies, such as sterile insect technique (SIT). The rapid spread of RPW is
associated with its high reproductive success. To evaluate the suitability of a SIT strategy, particular physiological and behavioral aspects of RPW reproduction, such as the
presence of polyandry and post-copulatory sperm selection mechanisms, were
investigated. To determine paternity of progeny from multiply mated females, double-crossing experiments were carried out confining individual females with either a
wild-type male or a γ-irradiated male (Co-60). Fecundity and fertility of females were
scored to evaluate post-copulatory sperm selection. Results showed that progeny
were almost exclusively produced by the sperm of the second male, suggesting that
a last-male sperm precedence is expressed at high levels in this species, and providing
interesting insights for an area-wide RPW management strategy such as the SIT
- …