97 resultados para Speculative attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During the last 30 years governments almost everywhere in the world are furthering a global neoliberal agenda by withdrawing the state from the delivery of services, decreasing social spending and lowering corporate taxation etc. This restructuring has led to a massive transfer of wealth from the welfare state and working class people into capital. In order to legitimize this restructuring conservative governments engage in collective blaming towards their denizens. This presentation will examine some of the well circulated phrases that have been used by the dominant elite in some countries during the last year to legitimize the imposition of austerity measures. Phrases such as, ‘We all partied’ used by the Irish finance minister, Brian Lenihan, to explain the Irish crisis and collectively blame all Irish people, ‘We must all share the pain’, deployed by another Irish Minister Gilmore and the UK coalition administration’s sound bite ‘We are all in this together’, legitimize the imposition of austerity measures. Utilizing the Gramscian concept of common sense (Gramsci, 1971), I call these phrases ‘austerity common sense’. They are austerity common sense because they both reflect and legitimate the austerity agenda. By deploying these phrases, the ruling economic and political elite seek to influence the perception of the people and pre-empt any intention of resistance. The dominant theme of these phrases is that there is no alternative and that austerity measures are somehow self-inflicted and, as such, should not be challenged because we are all to blame. The purpose of this presentation is to explore the “austerity common sense” theme from a Gramscian approach, focus on its implications for the social work profession and discuss the ways to resist the imposition of the global neoliberal agenda.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stealthy attackers move patiently through computer networks - taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a challenge. This paper presents an efficient monitoring technique for stealthy attacks. It investigates the feasibility of proposed method under number of different test cases and examines how design of the network affects the detection. A methodological way for tracing anonymous stealthy activities to their approximate sources is also presented. The Bayesian fusion along with traffic sampling is employed as a data reduction method. The proposed method has the ability to monitor stealthy activities using 10-20% size sampling rates without degrading the quality of detection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines W.B. Yeats's affiliation to a counter-revolutionary tradition that had its origins in the works of Edmund Burke and incorporated a range of later writers from Alexis de Tocqueville to Hippolyte Taine. This tradition possesses significant internal differences and contradictions, but it derives its general structure and coherence from a shared distrust of particular kinds of theoretical abstraction. Placed against this background, Yeats's extravagant campaign against the abstract develops political substance and form. The article demonstrates how Yeats's general denunciation of abstraction in politics drives his attacks on both nationalism and democracy in Ireland.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The two-country monetary model is extended to include a consumption externality with habit persistence. The model is simulated using the artificial economy methodology. The 'puzzles' in the forward market are re-examined. The model is able to account for: (a) the low volatility of the forward discount; (b) the higher volatility of expected forward speculative profit; (c) the even higher volatility of the spot return; (d) the persistence in the forward discount; (e) the martingale behavior of spot exchange rates; and (f) the negative covariance between the expected spot return and expected forward speculative profit. It is unable to account for the forward market bias because the volatility of the expected spot return is too large relative to the volatility of the expected forward speculative profit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We extend the literature on regime-dependent volatility in two ways. First, our microstructural model provides a qualitatively new explanation. Second, we test implications of our model using Europe's recent shift to rigidly fixed rates (EMS to EMU). In the model, shocks to order flow induce more volatility under flexible rates because the elasticity of speculative demand is (endogenously) low, leading to pronounced portfolio-balance effects. New data on FF/DM transactions show that order flow had persistent effects on the exchange rate before EMU parities were announced. After announcement, the FF/DM rate was decoupled from order flow, as the model predicts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Clinical decisions which impact directly on patient safety and quality of care are made during acute asthma attacks by individual doctors on the basis of their knowledge and experience. These include administration of systemic corticosteroids (CS), oral antibiotics, and admission to hospital. Clinical judgement analysis provides a methodology for comparing decisions between practitioners with different training and experience, and improving decision making. Methods: Stepwise linear regression was used to select clinical cues based on visual analogue scale assessments of the propensity of 62 clinicians to prescribe a short course of oral CS (decision 1), a course of antibiotics (decision 2), and/or admit to hospital (decision 3) for 60 â??paperâ?? patients. Results:When compared by specialty, paediatriciansâ?? models for decision 1 were more likely to include as a cue level of alertness (54% v. 16%); for decision 2 presence of crepitations (49% v. 16%), and less likely to include inhaled CS (8% v. 40%), respiratory rate (0% v. 24%), and air entry (70% v. 100%). When compared to other grades, the models derived for decision 3 by consultants/general practitioners were more likely to include wheeze severity as a cue (39% v. 6%). Conclusions: Clinicians differed in their use of individual cues and the number included in their models. Patient safety and quality of care will benefit from clarification of decision making strategies as general learning points during medical training, in the development of guidelines and care pathways, and by clinicians developing self-awareness of their own preferences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Parallelizing compilers have difficulty analysing and optimising complex code. To address this, some analysis may be delayed until run-time, and techniques such as speculative execution used. Furthermore, to enhance performance, a feedback loop may be setup between the compile time and run-time analysis systems, as in iterative compilation. To extend this, it is proposed that the run-time analysis collects information about the values of variables not already determined, and estimates a probability measure for the sampled values. These measures may be used to guide optimisations in further analyses of the program. To address the problem of variables with measures as values, this paper also presents an outline of a novel combination of previous probabilistic denotational semantics models, applied to a simple imperative language.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information retrieval in the age of Internet search engines has become part of ordinary discourse and everyday practice: "Google" is a verb in common usage. Thus far, more attention has been given to practical understanding of information retrieval than to a full theoretical account. In Human Information Retrieval, Julian Warner offers a comprehensive overview of information retrieval, synthesizing theories from different disciplines (information and computer science, librarianship and indexing, and information society discourse) and incorporating such disparate systems as WorldCat and Google into a single, robust theoretical framework. There is a need for such a theoretical treatment, he argues, one that reveals the structure and underlying patterns of this complex field while remaining congruent with everyday practice. Warner presents a labor theoretic approach to information retrieval, building on his previously formulated distinction between semantic and syntactic mental labor, arguing that the description and search labor of information retrieval can be understood as both semantic and syntactic in character. Warner's information science approach is rooted in the humanities and the social sciences but informed by an understanding of information technology and information theory. The chapters offer a progressive exposition of the topic, with illustrative examples to explain the concepts presented. Neither narrowly practical nor largely speculative, Human Information Retrieval meets the contemporary need for a broader treatment of information and information systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Differences in shell morphology in the intertidal prosobranch mollusc Calliostoma zizyphinum were studied from a number of sites within four geographical reo ions of the British Isles with varying exposures to wave action and crab predation. Mean values of damage scarring were highest in shells sampled from Strangford Lough, Northern Ireland, and lowe;t in individuals from the Atlantic Coast. Shells collected front the Isle of Man were smaller than those from either the Atlantic coast of Ireland or Strangford Lough. Shells front Strangford Lough had taller shells (higher aspect ratio) than shells from the County Down and Atlantic Coast and shells from the County Down coast were more squat (lower aspect ratio) than those from all other areas. Shells from Strangford Lough were significantly thinner than shells from all other geographical areas. The relationships between shell damage scarring and shell size and tallness were not consistent among areas. Shells from Strangford Lough are notable in showing a steep, positive relationship between shell size and scarring and a steep, negative relationship between scarring and tallness. The unusual shell phenotypes observed in shells from Strangford 1,Lough may be explained by rapid shell growth, which would not only allow Calliostoma to attain a size refuge from crab predators but also to recover successfully from repeated crab attacks on the shell lip. Such a strategy would result in larger, thinner shells with a high number of damage scars.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Developing understandings of protest and cultures of resistance has been a central theme of the 'new' cultural geography of the 1990s and 2000s. But whilst geographers of the here and now have been highly sensitive to the importance of acts of protest which occur outside of the context of broader social movements, geographers concerned with past protests have tended to focus overwhelmingly upon either understanding the development of social movements or highly specific place-based studies. Through a focus upon the hitherto ignored practice of 'tree maiming', this paper demonstrates not only the value of examining specific protest practices in helping to better understand the complexity of conflict, but also how in periods of acute socio-economic change the evolving relationship between humans and the non-human – in this case trees – is a central discourse to the protest practices of the poor. Such attacks often involved complex cultural understandings about the ways in which trees should – and should not – be socially enrolled.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the publication of Hobsbawm and Rudé's Captain Swing our understanding of the role(s) of covert protests in Hanoverian rural England has advanced considerably. Whilst we now know much about the dramatic practices of incendiarism and animal maiming and the voices of resistance in seemingly straightforward acquisitive acts, one major gap remains. Despite the fact that almost thirty years have passed since E. P. Thompson brought to our attention that under the notorious ‘Black Act’ the malicious cutting of trees was a capital offence, no subsequent research has been published. This paper seeks to address this major lacuna by systematically analysing the practices and patterns of malicious attacks on plants (‘plant maiming’) in the context of late eighteenth- and early nineteenth-century southern England. It is shown that not only did plant maiming take many different forms, attacking every conceivable type of flora, but also that it was universally understood and practised. In some communities plant maiming was the protestors' weapon of choice. As a social practice it therefore embodied wider community beliefs regarding the defence of plebeian livelihoods and identities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Suicide attacks have raised the stakes for officers deciding whether or not to shoot a suspect ('Police Officer's Terrorist Dilemma'). Despite high-profile errors we know little about how trust in the police is affected by their response to the terrorist threat. Building on a conceptualisation of lay observers as intuitive signal detection theorists, a general population sample (N= 1153) were presented with scenarios manipulated in terms of suspect status (Armed/Unarmed), officer decision (Shoot/Not Shoot) and outcome severity (e.g. suspect armed with Bomb/Knife; police shoot suspect/ suspect plus child bystander). Supporting predictions, people showed higher trust in officers who made correct decisions. reflecting good discrimination ability and who decided to shoot, reflecting an 'appropriate' response bias given the relative costs and benefits. This latter effect was moderated by (a) outcome severity, suggesting it did not simply reflect a preference for a particular type of action, and (b) preferences for a tough stance towards terrorism indexed by Right-Wing Authoritarianism (RWA). Despite loss of civilian life, failure to prevent minor terror attacks resulted in no loss of trust amongst people low in RWA. whereas among people high in RWA trust was positive when police erroneously shot all unarmed suspect. Relations to alternative definitions of trust and procedural justice research are discussed. Copyright (C),. 2007 John Wiley & Sons, Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tamarin monkeys, of the genus Saguinus, spend over half their lives at arboreal sleeping sites. The decision as to which site to use is likely to have considerable fitness consequences. These decisions about sleeping sites by three troops of golden-handed tamarin Saguinus midas midas were examined over a 9-mo period at a rainforest site in French Guiana. Data are presented on the physical nature of sleeping sites, their number, position within home ranges, and pattern of use and reuse, aspects of behaviour at retirement and egress, and predation attempts on the study troops. Cumulative plot analysis indicated that a tamarin troop used 30-40 sleeping sites in a 100-day period, approximately half of which were used very infrequently, so that consecutive reuse was never greater than three nights. Sleeping trees were superior in architectural parameters and liana weight to non-sleeping trees. There were no more sleeping sites than expected within the home range boundary region of the tamarins or in areas of overlap with the home ranges of neighbouring troops. Tamarins selected sleeping sites nearest to the last feeding site of the day on 25% of occasions. The study troops engaged in a number of activities that may reduce predation risk; raptor attacks on the study troops over 9 mo were frequent but unsuccessful. Tamarins often visited a sleeping site several hours before arrival, and were more likely to visit a site before use if they had not used it recently. The decision to select a sleeping site therefore involved knowledge of the previous frequency of use of that site.