1,464 research outputs found

    Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices

    Full text link
    Bluetooth is among the dominant standards for wireless short-range communication with multi-billion Bluetooth devices shipped each year. Basic Bluetooth analysis inside consumer hardware such as smartphones can be accomplished observing the Host Controller Interface (HCI) between the operating system's driver and the Bluetooth chip. However, the HCI does not provide insights to tasks running inside a Bluetooth chip or Link Layer (LL) packets exchanged over the air. As of today, consumer hardware internal behavior can only be observed with external, and often expensive tools, that need to be present during initial device pairing. In this paper, we leverage standard smartphones for on-device Bluetooth analysis and reverse engineer a diagnostic protocol that resides inside Broadcom chips. Diagnostic features include sniffing lower layers such as LL for Classic Bluetooth and Bluetooth Low Energy (BLE), transmission and reception statistics, test mode, and memory peek and poke

    Trait openness and agreeableness are related to a left-leaning political orientation but are negatively related to the endorsement of totalitarian ideals

    Get PDF
    Although relationships between temperament and political orientation are well established [1-2], it is unclear whether they are moderated by opinions on how we should execute our political ambitions, with or without regard to individual liberty. We examined whether prior relationships between personality and political orientation are replicated using a short-form measure of the Big Five, and whether the extent of these relationships differ when including the endorsement of totalitarian ideals in the same model. We also examined whether self-reported dominance was related to the endorsement of totalitarian ideals, which may develop recent theorizing on the role of agentic personality traits in alliance politics and leadership emergence. [1] Gerber et al. (2010). Am Political Sci Rev, 104, 111-133. [2] Hirsh et al. (2010). Pers Soc Psychol Bull, 36, 655-664 [3] Watkins (2018). In Facial Displays of Leaders (Chapter). [4] van Vugt & Grabo (2015). Curr Dir Psychol Sci, 24, 484-489. [5] Judge & Bono (2000). J Appl Psychol, 85, 751-765

    Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link

    Full text link
    Apple Wireless Direct Link (AWDL) is a proprietary and undocumented wireless ad hoc protocol that Apple introduced around 2014 and which is the base for applications such as AirDrop and AirPlay. We have reverse engineered the protocol and explain its frame format and operation in our MobiCom '18 paper "One Billion Apples' Secret Sauce: Recipe of the Apple Wireless Direct Link Ad hoc Protocol." AWDL builds on the IEEE 802.11 standard and implements election, synchronization, and channel hopping mechanisms on top of it. Furthermore, AWDL features an IPv6-based data path which enables direct communication. To validate our own work, we implement a working prototype of AWDL on Linux-based systems. Our implementation is written in C, runs in userspace, and makes use of Linux's Netlink API for interactions with the system's networking stack and the pcap library for frame injection and reception. In our demonstrator, we show how our Linux system synchronizes to an existing AWDL cluster or takes over the master role itself. Furthermore, it can receive data frames from and send them to a MacBook or iPhone via AWDL. We demonstrate the data exchange via ICMPv6 echo request and replies as well as sending and receiving data over a TCP connection.Comment: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18

    DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework

    Full text link
    In this demo, we provide an overview of the macOS Bluetooth stack internals and gain access to undocumented low-level interfaces. We leverage this knowledge to add macOS support to the InternalBlue firmware modification and wireless experimentation framework.Comment: 13th ACM Conference on Security and Privacy in Wireless and Mobile Network

    South Yarding focus catchment report

    Get PDF
    This report provides a record of the activities carried out by the South Yarding Focus Support Team and Catchment Group. It covers the results of investigations and summarises the group\u27s catchment plan of South Yarding, Western Australia, based on the best available information on soils, groundwater hydrology, surface water control, alternative crops and pastures and revegetation options

    Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks

    Full text link
    Millimeter-wave (mmWave) communication is a promising technology to cope with the expected exponential increase in data traffic in 5G networks. mmWave networks typically require a very dense deployment of mmWave base stations (mmBS). To reduce cost and increase flexibility, wireless backhauling is needed to connect the mmBSs. The characteristics of mmWave communication, and specifically its high directional- ity, imply new requirements for efficient routing and scheduling paradigms. We propose an efficient scheduling method, so-called schedule-oriented optimization, based on matching theory that optimizes QoS metrics jointly with routing. It is capable of solving any scheduling problem that can be formulated as a linear program whose variables are link times and QoS metrics. As an example of the schedule-oriented optimization, we show the optimal solution of the maximum throughput fair scheduling (MTFS). Practically, the optimal scheduling can be obtained even for networks with over 200 mmBSs. To further increase the runtime performance, we propose an efficient edge-coloring based approximation algorithm with provable performance bound. It achieves over 80% of the optimal max-min throughput and runs 5 to 100 times faster than the optimal algorithm in practice. Finally, we extend the optimal and approximation algorithms for the cases of multi-RF-chain mmBSs and integrated backhaul and access networks.Comment: To appear in Proceedings of INFOCOM '1

    South East Humps focus catchment report

    Get PDF
    This report provides a record of the activities carried out by the Lockhart Focus Support Team and the Catchment Group. It covers the results of the investigations and a summary of the group\u27s catchment plan for the South East Humps Catchment east of Hyden in Western Australia. It covers the current best available information on soils, groundwater hydrology, surface water control, alternative crops and pastures, and revegetation options

    The metamorphic and structural evolution of the Alpujarride Complex - Internal Zone, Betic Cordillera (S. Spain)

    Get PDF
    The Metamorphic and Structural Evolution of the Alpujarride Complex - Internal Zone - Betic Cordillera (S Spain) Metamorphosed pelitic schists within the Alpujarride Complex - a component of the Internal Zones of the Betic Cordillera, southern Spain - have experienced a complex metamorphic/structural evolution, most recently during an Alpine-age orogenic event. Preservation of disequilibrium textures permits an insight into the metamorphic conditions during the formation of structural fabrics. Metamorphic grade in the area varies from sillimanite grade to chlorite grade. Rocks in the area (50 km south of Granada) have been affected by at least three phases of ductile deformation. The two most recent fabrics, Ss and St, are both crenulation cleavages; widespread examples occur which demonstrate the superposition of St on to Ss. Ductile/brittle normal faults developed during and after both phases of ductile deformation. The Dt phase of deformation generates kilometre-scale folds, the inverted limbs of which overturn the metamorphic sequence related to the Ds deformation and fault contacts that developed during and after the Ds deformation, but prior to Dt. High grade rocks are apparently structurally above low grade rocks in the overturned limbs of Dt folds. Trajectories in P-T space for rocks of different metamorphic grades, constrained from mineral relations with the regional foliations Ss and St and the application of thermobarometric techniques to appropriate assemblages, show that the Ss and St foliations developed during decompression, accompanied by heating. Peak metamorphic temperature occurred after the end of the Ds deformation event, and temperatures of above 550°C persisted to low pressure (3-4 kbar) conditions. Results from geochrology techniques - U-Pb, Ar-Ar on muscovite and biotite, and apatite fission track - yield ages that are within error of each other, indicating that the Alpujarride Complex experienced rapid cooling during decompression from around 19.2 Ma

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    United States Oceans Politics

    Get PDF
    The current law of the sea debate concerns on the allocation and use of ocean space. This Article discusses the United States seabed policy including territorial, sea, straits, and fisheries by focusing on the participants in policy-making, the National Security Council system, and the President\u27s seabed policy. Diverse national and commercial interests shape the United States\u27 position on these ocean issues. Following this discussion, the Article examines the United Nations Conference on law of the sea in which the domestic and international perspectives are analyzed to determine whether the Conference\u27s Seabed Committee can build a compromise on the seabed resources
    corecore