6 resultados para fighting counterfeiting
em DRUM (Digital Repository at the University of Maryland)
Resumo:
Malware is a foundational component of cyber crime that enables an attacker to modify the normal operation of a computer or access sensitive, digital information. Despite the extensive research performed to identify such programs, existing schemes fail to detect evasive malware, an increasingly popular class of malware that can alter its behavior at run-time, making it difficult to detect using today’s state of the art malware analysis systems. In this thesis, we present DVasion, a comprehensive strategy that exposes such evasive behavior through a multi-execution technique. DVasion successfully detects behavior that would have been missed by traditional, single-execution approaches, while addressing the limitations of previously proposed multi-execution systems. We demonstrate the accuracy of our system through strong parallels with existing work on evasive malware, as well as uncover the hidden behavior within 167 of 1,000 samples.
Resumo:
Presentation from the MARAC conference in Cape May, NJ on April 12–14, 2012. S9 - Monsters, Myths & Legends: “Haunting” Through Archival Collections For Frolicsome Tales Worth Retelling
Resumo:
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is circuit obfuscation which seeks to modify the gate-level (or structural) description of a circuit without affecting its functionality in order to increase the complexity and cost of reverse engineering. Most of the existing circuit obfuscation methods are based on the insertion of additional logic (called “key gates”) or camouflaging existing gates in order to make it difficult for a malicious user to get the complete layout information without extensive computations to determine key-gate values. However, when the netlist or the circuit layout, although camouflaged, is available to the attacker, he/she can use advanced logic analysis and circuit simulation tools and Boolean SAT solvers to reveal the unknown gate-level information without exhaustively trying all the input vectors, thus bringing down the complexity of reverse engineering. To counter this problem, some ‘provably secure’ logic encryption algorithms that emphasize methodical selection of camouflaged gates have been proposed previously in literature [1,2,3]. The contribution of this paper is the creation and simulation of a new layout obfuscation method that uses don't care conditions. We also present proof-of-concept of a new functional or logic obfuscation technique that not only conceals, but modifies the circuit functionality in addition to the gate-level description, and can be implemented automatically during the design process. Our layout obfuscation technique utilizes don’t care conditions (namely, Observability and Satisfiability Don’t Cares) inherent in the circuit to camouflage selected gates and modify sub-circuit functionality while meeting the overall circuit specification. Here, camouflaging or obfuscating a gate means replacing the candidate gate by a 4X1 Multiplexer which can be configured to perform all possible 2-input/ 1-output functions as proposed by Bao et al. [4]. It is important to emphasize that our approach not only obfuscates but alters sub-circuit level functionality in an attempt to make IP piracy difficult. The choice of gates to obfuscate determines the effort required to reverse engineer or brute force the design. As such, we propose a method of camouflaged gate selection based on the intersection of output logic cones. By choosing these candidate gates methodically, the complexity of reverse engineering can be made exponential, thus making it computationally very expensive to determine the true circuit functionality. We propose several heuristic algorithms to maximize the RE complexity based on don’t care based obfuscation and methodical gate selection. Thus, the goal of protecting the design IP from malicious end-users is achieved. It also makes it significantly harder for rogue elements in the supply chain to use, copy or replicate the same design with a different logic. We analyze the reverse engineering complexity by applying our obfuscation algorithm on ISCAS-85 benchmarks. Our experimental results indicate that significant reverse engineering complexity can be achieved at minimal design overhead (average area overhead for the proposed layout obfuscation methods is 5.51% and average delay overhead is about 7.732%). We discuss the strengths and limitations of our approach and suggest directions that may lead to improved logic encryption algorithms in the future. References: [1] R. Chakraborty and S. Bhunia, “HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009. [2] J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” in 2008 Design, Automation and Test in Europe, 2008, pp. 1069–1074. [3] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security Analysis of Integrated Circuit Camouflaging,” ACM Conference on Computer Communications and Security, 2013. [4] Bao Liu, Wang, B., "Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks,"Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014 , vol., no., pp.1,6, 24-28 March 2014.
Resumo:
World War II was one of the most devastating events in history, and it profoundly affected European culture and art. I examined the period around World War II, and the effects it had on the lives of composers and their flute music. I investigated who wrote for flute during the war, what they were composing, and what effects, if any, the war had on them and their music. After examining the biographies of nine composers and studying eleven of their works, I found that in some cases the war affected their flute music, but in others the music shows no apparent influences of the war. Interestingly, most of the flute music written by composers affected by World War II was happy and joyful rather than dark and dismal. I performed three recitals during my research. I studied nine composers and performed some of their most important works for flute. Recital One is “Sonatas for Flute.” Recital Two is “Virtuosic Flute Music,” and my final recital is “Emotional Overview of Flute Music During World War II.” I discovered that many of these composers had to change their lives in drastic ways due to the war, but most them wrote music that had did not reflect the horror or destruction of war—perhaps music represented an escape from their horrible circumstances, or an effort to recall better times. I also found that a few of these composers used music to mock the Nazi regime. They used music as an emotional outlet, which could have been dangerous for them during that time. Other composers used music to share their own personal experiences while fighting in the war.
Resumo:
Trafficking in persons has attracted seemingly boundless attention over the last two decades and the work aimed at fighting it is best understood when this cause is contextualized against the backdrop of other social forces—economic, social, and cultural—shaping contemporary nonprofit activities. This project argues that the paid and volunteer labor that takes place in metro Washington, D.C., to combat trafficking in persons can be understood as both a movement and an industry. In addition to arguing that anti-trafficking work is part of a nonprofit industrial complex that situates activist and advocacy work firmly inside state and economic institutions, this project is concerned with the ways in which trafficking work and workers conduct their business collectively. As an organizational study, it identifies the key players in the D.C. region focused on this issue and traces their interactions, collaborations, and cooperation. Significantly, this project suggests that despite variations in objectives, methods, priorities, and characterizations of trafficking, thirty organizations in metro D.C. working on this issue “get along” because they are bound by the benign common goal of raising awareness. Awareness, in this context, is best understood as both a cultural anchor facilitating cohesion and as a social currency allowing groups to opt into joint efforts. The dissertation concludes that organizations centralize awareness in their collective activities over more drastic priorities around which consensus would need to be gained. This is a lost opportunity for making sense of the ways that individual bodies—men, women, and children—experience not just trafficking, but the world around them.
Resumo:
This dissertation examines four life writings by militant-authors of the Việt Minh and Front de la Libération Nationale (FLN): Ngô Văn Chiêu’s Journal d’un combattant Viet-Minh (1955), Đặng Văn Việt’s De la RC 4 à la N 4: la campagne des frontières (2000), Si Azzedine’s On nous appelait fellaghas (1976), and Saadi Yacef’s two-volume La Bataille d’Alger (2002). In describing the Vietnamese and Algerian Revolutions through the perspectives of combatants who participated in their respective countries’ national liberation struggles, the texts reveal that four key factors motivated the militants and led them to believe that independence was historically inevitable: (1) a philosophical, political, and ideological framework, (2) the support of multiple segments of the local population, (3) the effective use of guerrilla and psychological warfare, and (4) military, moral, and political assistance provided by international allies. By fighting for the independence of their countries and documenting their revolutionary experiences, the four militant-authors leave their mark on the world using both the sword and the pen.