818 resultados para high security
Resumo:
Many software applications extend their functionality by dynamically loading executable components into their allocated address space. Such components, exemplified by browser plugins and other software add-ons, not only enable reusability, but also promote programming simplicity, as they reside in the same address space as their host application, supporting easy sharing of complex data structures and pointers. However, such components are also often of unknown provenance and quality and may be riddled with accidental bugs or, in some cases, deliberately malicious code. Statistics show that such component failures account for a high percentage of software crashes and vulnerabilities. Enabling isolation of such fine-grained components is therefore necessary to increase the stability, security and resilience of computer programs. This thesis addresses this issue by showing how host applications can create isolation domains for individual components, while preserving the benefits of a single address space, via a new architecture for software isolation called LibVM. Towards this end, we define a specification which outlines the functional requirements for LibVM, identify the conditions under which these functional requirements can be met, define an abstract Application Programming Interface (API) that encompasses the general problem of isolating shared libraries, thus separating policy from mechanism, and prove its practicality with two concrete implementations based on hardware virtualization and system call interpositioning, respectively. The results demonstrate that hardware isolation minimises the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution’s correctness. This thesis concludes that, not only is it feasible to create such isolation domains for individual components, but that it should also be a fundamental operating system supported abstraction, which would lead to more stable and secure applications.
Resumo:
Global Navigation Satellite Systems (GNSS)-based observation systems can provide high precision positioning and navigation solutions in real time, in the order of subcentimetre if we make use of carrier phase measurements in the differential mode and deal with all the bias and noise terms well. However, these carrier phase measurements are ambiguous due to unknown, integer numbers of cycles. One key challenge in the differential carrier phase mode is to fix the integer ambiguities correctly. On the other hand, in the safety of life or liability-critical applications, such as for vehicle safety positioning and aviation, not only is high accuracy required, but also the reliability requirement is important. This PhD research studies to achieve high reliability for ambiguity resolution (AR) in a multi-GNSS environment. GNSS ambiguity estimation and validation problems are the focus of the research effort. Particularly, we study the case of multiple constellations that include initial to full operations of foreseeable Galileo, GLONASS and Compass and QZSS navigation systems from next few years to the end of the decade. Since real observation data is only available from GPS and GLONASS systems, the simulation method named Virtual Galileo Constellation (VGC) is applied to generate observational data from another constellation in the data analysis. In addition, both full ambiguity resolution (FAR) and partial ambiguity resolution (PAR) algorithms are used in processing single and dual constellation data. Firstly, a brief overview of related work on AR methods and reliability theory is given. Next, a modified inverse integer Cholesky decorrelation method and its performance on AR are presented. Subsequently, a new measure of decorrelation performance called orthogonality defect is introduced and compared with other measures. Furthermore, a new AR scheme considering the ambiguity validation requirement in the control of the search space size is proposed to improve the search efficiency. With respect to the reliability of AR, we also discuss the computation of the ambiguity success rate (ASR) and confirm that the success rate computed with the integer bootstrapping method is quite a sharp approximation to the actual integer least-squares (ILS) method success rate. The advantages of multi-GNSS constellations are examined in terms of the PAR technique involving the predefined ASR. Finally, a novel satellite selection algorithm for reliable ambiguity resolution called SARA is developed. In summary, the study demonstrats that when the ASR is close to one, the reliability of AR can be guaranteed and the ambiguity validation is effective. The work then focuses on new strategies to improve the ASR, including a partial ambiguity resolution procedure with a predefined success rate and a novel satellite selection strategy with a high success rate. The proposed strategies bring significant benefits of multi-GNSS signals to real-time high precision and high reliability positioning services.
Resumo:
In this study, a treatment plan for a spinal lesion, with all beams transmitted though a titanium vertebral reconstruction implant, was used to investigate the potential effect of a high-density implant on a three-dimensional dose distribution for a radiotherapy treatment. The BEAMnrc/DOSXYZnrc and MCDTK Monte Carlo codes were used to simulate the treatment using both a simplified, recltilinear model and a detailed model incorporating the full complexity of the patient anatomy and treatment plan. The resulting Monte Carlo dose distributions showed that the commercial treatment planning system failed to accurately predict both the depletion of dose downstream of the implant and the increase in scattered dose adjacent to the implant. Overall, the dosimetric effect of the implant was underestimated by the commercial treatment planning system and overestimated by the simplified Monte Carlo model. The value of performing detailed Monte Carlo calculations, using the full patient and treatment geometry, was demonstrated.
Resumo:
Focuses on the various aspects of advances in future information communication technology and its applications Presents the latest issues and progress in the area of future information communication technology Applicable to both researchers and professionals These proceedings are based on the 2013 International Conference on Future Information & Communication Engineering (ICFICE 2013), which will be held at Shenyang in China from June 24-26, 2013. The conference is open to all over the world, and participation from Asia-Pacific region is particularly encouraged. The focus of this conference is on all technical aspects of electronics, information, and communications ICFICE-13 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of FICE. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in FICE. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. "This work was supported by the NIPA (National IT Industry Promotion Agency) of Korea Grant funded by the Korean Government (Ministry of Science, ICT & Future Planning)."
Resumo:
Magnesium and its alloys have shown a great potential in effective hydrogen storage due to their advantages of high volumetric/gravimetric hydrogen storage capacity and low cost. However, the use of these materials in fuel cells for automotive applications at the present time is limited by high hydrogenation temperature and sluggish sorption kinetics. This paper presents the recent results of design and development of magnesium-based nanocomposites demonstrating the catalytic effects of carbon nanotubes and transition metals on hydrogen adsorption in these materials. The results are promising for the application of magnesium materials for hydrogen storage, with significantly reduced absorption temperatures and enhanced ab/desorption kinetics. High level Density Functional Theory calculations support the analysis of the hydrogenation mechanisms by revealing the detailed atomic and molecular interactions that underpin the catalytic roles of incorporated carbon and titanium, providing clear guidance for further design and development of such materials with better hydrogen storage properties.
Resumo:
Practice-led journalism research techniques were used in this study to produce a ‘first draft of history’ recording the human experience of survivors and rescuers during the January 2011 flash flood disaster in Toowoomba and the Lockyer Valley in Queensland, Australia. The study aimed to discover what can be learnt from engaging in journalistic reporting of natural disasters. This exegesis demonstrates that journalism can be both a creative practice and a research methodology. About 120 survivors, rescuers and family members of victims participated in extended interviews about what happened to them and how they survived. Their stories are the basis for two creative outputs of the study: a radio documentary and a non-fiction book, that document how and why people died, or survived, or were rescued. Listeners and readers are taken "into the flood" where they feel anxious for those in peril, relief when people are saved, and devastated when babies, children and adults are swept away to their deaths. In undertaking reporting about the human experience of the floods, several significant elements about journalistic reportage of disasters were exposed. The first related to the vital role that the online social media played during the disaster for individuals, citizen reporters, journalists and emergency services organisations. Online social media offer reporters powerful new reporting tools for both gathering and disseminating news. The second related to the performance of journalists in covering events involving traumatic experiences. Journalists are often required to cover trauma and are often amongst the first-responders to disasters. This study found that almost all of the disaster survivors who were approached were willing to talk in detail about their traumatic experiences. A finding of this project is that journalists who interview trauma survivors can develop techniques for improving their ability to interview people who have experienced traumatic events. These include being flexible with interview timing and selecting a location; empowering interviewees to understand they don’t have to answer every question they are asked; providing emotional security for interviewees; and by being committed to accuracy. Survivors may exhibit posttraumatic stress symptoms but some exhibit and report posttraumatic growth. The willingness of a high proportion of the flood survivors to participate in the flood research made it possible to document a relatively unstudied question within the literature about journalism and trauma – when and why disaster survivors will want to speak to reporters. The study sheds light on the reasons why a group of traumatised people chose to speak about their experiences. Their reasons fell into six categories: lessons need to be learned from the disaster; a desire for the public to know what had happened; a sense of duty to make sure warning systems and disaster responses to be improved in future; personal recovery; the financial disinterest of reporters in listening to survivors; and the timing of the request for an interview. Feedback to the creative-practice component of this thesis - the book and radio documentary - shows that these issues are not purely matters of ethics. By following appropriate protocols, it is possible to produce stories that engender strong audience responses such as that the program was "amazing and deeply emotional" and "community storytelling at its most important". Participants reported that the experience of the interview process was "healing" and that the creative outcome resulted in "a very precious record of an afternoon of tragedy and triumph and the bitter-sweetness of survival".
Resumo:
Stereo visual odometry has received little investigation in high altitude applications due to the generally poor performance of rigid stereo rigs at extremely small baseline-to-depth ratios. Without additional sensing, metric scale is considered lost and odometry is seen as effective only for monocular perspectives. This paper presents a novel modification to stereo based visual odometry that allows accurate, metric pose estimation from high altitudes, even in the presence of poor calibration and without additional sensor inputs. By relaxing the (typically fixed) stereo transform during bundle adjustment and reducing the dependence on the fixed geometry for triangulation, metrically scaled visual odometry can be obtained in situations where high altitude and structural deformation from vibration would cause traditional algorithms to fail. This is achieved through the use of a novel constrained bundle adjustment routine and accurately scaled pose initializer. We present visual odometry results demonstrating the technique on a short-baseline stereo pair inside a fixed-wing UAV flying at significant height (~30-100m).
Resumo:
The emergence of shopping malls in Europe, the UK and Australia over the last thirty years or so, raises questions about the disruptive effects of such capital intensive developments on local area shopping facilities, transport and other infrastructures and the maintenance of artificially high prices for goods, whereby the promised greater choice of shops and prices is rarely a genuine free market of competition leading to lower prices. A central question to be addressed is whom these centres represent and belong to. While many claim to exist to ‘serve the community’ almost all malls and centres are private property and the community of shoppers has few, if any rights compared with the conventional high street, which is a public thoroughfare. This permits the management of the centres through their own private security staff, to observe, follow, eject and refuse further admission to anyone considered to be ‘undesirable’. What is different about the newest shopping centres is the routine use of increasingly sophisticated CCTV surveillance equipment to observe and record, for later evidential and entry restriction use, the movements of centre visitors.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
Aims Physical activity has been shown to increase adolescent self-esteem. The aim of this investigation was to assess adolescent perceptions of parental support for physical activity endeavours, and its relationship with self-esteem among high and low SES groups. Methods Perceptions of parental support, and Rosenberg’s self-esteem (1965) were derived from the Children’s Physical Activity Correlates questionnaire, with scores ranging from 1 (lowest) to 4 (highest). Independent sample t-tests were conducted and Levene’s test indicated homogenous group variance, while Pearson’s r was employed to assess relationships between perceptions of parental support, and self-esteem. Results Overall, 111 (89%) and 64 (55%) high and low SES participants had complete data and were included in the analysis. The high SES differed for self-esteem (M = 3.39, SE = .05) from the low SES group (M = 2.75, SE = .08), t (173) = 6.82, p < .05, with a medium effect size (ES) r = .46. The high SES group scored higher for perceptions of parental support (M = 2.95, SE = .06) than the low SES group (M = 2.71, SE = .07), t (173) = 2.58, p < .05, with a low ES r = .04. Self-esteem was significantly correlated with parental support in both high (r = .34) and low (r = .47) SES groups. Conclusion Results indicate that perceptions of parental support may be a stronger indicator of self-esteem for low, than for high SES adolescents. Future physical activity strategies to promote self-esteem should involve parents as active facilitators.
Resumo:
Aims Wellness assessments can determine adolescent lifestyle behaviors. A better understanding of wellness differences between high and low SES adolescents could assist policy makers to develop improved strategies to bridge the gap between these two groups. The aim of this investigation was to explore wellness differences between high and low SES adolescents. Methods In total, 241 (125 high and 116 low SES) adolescents completed the 5-Factor Wellness Inventory (5F-Wel). The 5F-Wel comprises 97 items contributing to 17 subscales, 5 dimensions, 4 contexts, total wellness, and a life satisfaction index, with scores ranging from 0-100. Independent sample t-tests were performed with Levene’s test of equality for variances, which checked the assumption of homogeneity of variances. Results Overall, 117 (94%) and 112 (97 %) high and low SES participants had complete data and were included in the analysis. The high SES group scored higher for total wellness (M = 81.09, SE = .61) than the low SES group (M = 75.73, SE = .99). This difference was significant t (186) = 4.635, p < .05, with a medium effect size r = .32. The high SES group scored higher on 23 of 27 scales (21 scales, p < .05), while the low SES group scored higher on the remaining 3 scales (all non-significant). Conclusion These results contribute empirical data to the body of literature, indicating a large wellness discrepancy between high and low SES youth. Deficient areas can be targeted by policymakers to assist in bridging the gap between these groups.
Resumo:
In situ FT-IR spectroscopy allows the methanol synthesis reaction to be investigated under actual industrial conditions of 503 K and 10 MPa. On Cu/SiO2 catalyst formate species were initially formed which were subsequently hydrogenated to methanol. During the reaction a steady state concentration of formate species persisted on the copper. Additionally, a small quantity of gaseous methane was produced. In contrast, the reaction of CO2 and H2 on ZnO/SiO2 catalyst only resulted in the formation of zinc formate species: no methanol was detected. The interaction of CO2 and H2 with Cu/ZnO/SiO2 catalyst gave formate species on both copper and zinc oxide. Methanol was again formed by the hydrogenation of copper formate species. Steady-state concentrations of copper formate existed under actual industrial reaction conditions, and copper formate is the pivotal intermediate for methanol synthesis. Collation of these results with previous data on copper-based methanol synthesis catalysts allowed the formulation of a reaction mechanism
Resumo:
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.
Resumo:
The count-min sketch is a useful data structure for recording and estimating the frequency of string occurrences, such as passwords, in sub-linear space with high accuracy. However, it cannot be used to draw conclusions on groups of strings that are similar, for example close in Hamming distance. This paper introduces a variant of the count-min sketch which allows for estimating counts within a specified Hamming distance of the queried string. This variant can be used to prevent users from choosing popular passwords, like the original sketch, but it also allows for a more efficient method of analysing password statistics.