174 resultados para browsing
Resumo:
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity. This paper presents X-Secure, a novel browser plug-in designed to present and raise the awareness of inexperienced users by analysing web-pages before malicious scripts are executed by the host computer. X-Secure was able to detect over 90% of the tested attacks and provides a danger level based on cumulative analysis of the source code, the URL, and the remote server, by using a set of heuristics, hence increasing the situational awareness of users browsing the internet.
Resumo:
We at bepress are excited to announce the beta launch of the Expert Gallery, a new product for institutions eager to highlight the rich expertise of their faculty. The Expert Gallery facilitates the valuable work of connecting an institution’s researchers with opportunities that might otherwise be missed. Groups such as Marketing and Communications and the Office of Research can use the product to better land funding opportunities, speaking engagements, and professional collaborations for top faculty members. The Expert Gallery is designed to let stakeholders within and outside of the institution find researchers by interest, skill set, and research emphasis: simple searching and browsing, along with the flexibility to create and display custom galleries, helps facilitate targeted discovery for experts on campus. A built-in, rich toolset lets institutions organize, manage, and connect their researchers to the right opportunities and interested parties outside the institution. While most expert galleries contain just biographical information and a bibliography, integration of the bepress Expert Gallery with SelectedWorks profiles lets researchers prove their expertise with a full picture of their scholarly research, including published and unpublished works, datasets, teaching materials, and media appearances. Launching the Expert Gallery as a new product reflects an important expansion of bepress’s mission. For years we’ve helped libraries reclaim their central role through providing services across campus. We’ve especially focused on supporting the library in its important efforts to promote the institution through the scholarship it produces. With the Expert Gallery, the library can meet its campus’s needs to go beyond demonstrating the value of its scholarship. Now the library can offer a way to promote the institution through the rich skills of the people who make it unique. We plan to continue on this path of helping institutions maximize the impact of people as well as their people’s scholarship. In early 2017 we will launch a suite of services that includes SelectedWorks, the Expert Gallery, and a set of faculty reporting and analytics tools.
Resumo:
Although large-scale public hypermedia structures such as the World Wide Web are popularly referred to as "cyberspace", the extent to which they constitute a space in the everyday sense of the word is questionable. This paper reviews recent work in the area of three dimensional (3D) visualization of the Web that has attempted to depict it in the form of a recognizable space; in other words, as a navigable landscape that may be visibly populated by its users. Our review begins by introducing a range of visualizations that address different aspects of using the Web. These include visualizations of Web structure, especially of links, that act as 3D maps; browsing history; searches; evolution of the Web; and the presence and activities of multiple users. We then summarize the different techniques that are employed by these visualizations. We conclude with a discussion of key challenges for the future.
Resumo:
Data leakage is a serious issue and can result in the loss of sensitive data, compromising user accounts and details, potentially affecting millions of internet users. This paper contributes to research in online security and reducing personal footprint by evaluating the levels of privacy provided by the Firefox browser. The aim of identifying conditions that would minimize data leakage and maximize data privacy is addressed by assessing and comparing data leakage in the four possible browsing modes: normal and private modes using a browser installed on the host PC or using a portable browser from a connected USB device respectively. To provide a firm foundation for analysis, a series of carefully designed, pre-planned browsing sessions were repeated in each of the various modes of Firefox. This included low RAM environments to determine any effects low RAM may have on browser data leakage. The results show that considerable data leakage may occur within Firefox. In normal mode, all of the browsing information is stored within the Mozilla profile folder in Firefox-specific SQLite databases and sessionstore.js. While passwords were not stored as plain text, other confidential information such as credit card numbers could be recovered from the Form history under certain conditions. There is no difference when using a portable browser in normal mode, except that the Mozilla profile folder is located on the USB device rather than the host's hard disk. By comparison, private browsing reduces data leakage. Our findings confirm that no information is written to the Firefox-related locations on the hard disk or USB device during private browsing, implying that no deletion would be necessary and no remnants of data would be forensically recoverable from unallocated space. However, two aspects of data leakage occurred equally in all four browsing modes. Firstly, all of the browsing history was stored in the live RAM and was therefore accessible while the browser remained open. Secondly, in low RAM situations, the operating system caches out RAM to pagefile.sys on the host's hard disk. Irrespective of the browsing mode used, this may include Firefox history elements which can then remain forensically recoverable for considerable time.
Resumo:
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being encrypted. The prevalence of encrypted protocols as the underpinning of such critical services as e-commerce, remote login, and anonymity networks and the increasing feasibility of attacks on these services represent a considerable risk to communications security. Existing mechanisms for preventing traffic analysis focus on re-routing and padding. These prevention techniques have considerable resource and overhead requirements. Furthermore, padding is easily detectable and, in some cases, can introduce its own vulnerabilities. To address these shortcomings, we propose embedding real traffic in synthetically generated encrypted cover traffic. Novel to our approach is our use of realistic network protocol behavior models to generate cover traffic. The observable traffic we generate also has the benefit of being indistinguishable from other real encrypted traffic further thwarting an adversary's ability to target attacks. In this dissertation, we introduce the design of a proxy system called TrafficMimic that implements realistic cover traffic tunneling and can be used alone or integrated with the Tor anonymity system. We describe the cover traffic generation process including the subtleties of implementing a secure traffic generator. We show that TrafficMimic cover traffic can fool a complex protocol classification attack with 91% of the accuracy of real traffic. TrafficMimic cover traffic is also not detected by a binary classification attack specifically designed to detect TrafficMimic. We evaluate the performance of tunneling with independent cover traffic models and find that they are comparable, and, in some cases, more efficient than generic constant-rate defenses. We then use simulation and analytic modeling to understand the performance of cover traffic tunneling more deeply. We find that we can take measurements from real or simulated traffic with no tunneling and use them to estimate parameters for an accurate analytic model of the performance impact of cover traffic tunneling. Once validated, we use this model to better understand how delay, bandwidth, tunnel slowdown, and stability affect cover traffic tunneling. Finally, we take the insights from our simulation study and develop several biasing techniques that we can use to match the cover traffic to the real traffic while simultaneously bounding external information leakage. We study these bias methods using simulation and evaluate their security using a Bayesian inference attack. We find that we can safely improve performance with biasing while preventing both traffic analysis and defense detection attacks. We then apply these biasing methods to the real TrafficMimic implementation and evaluate it on the Internet. We find that biasing can provide 3-5x improvement in bandwidth for bulk transfers and 2.5-9.5x speedup for Web browsing over tunneling without biasing.
Resumo:
El objetivo general de esta investigación consiste en sacar a la luz un conjunto de documentos, los documentos de patentes presentadas en España, sobre un tema concreto, la bicicleta y el ciclismo, y durante un periodo determinado, 1826-1929, presentes en la Oficina Española de Patentes y Marcas (OEPM), organizando esta documentación para su posterior utilización por la comunidad científica. Para ello se han identificado y sistematizado las patentes referidas a la bicicleta, presentadas entre 1826 y 1929, realizando tablas de frecuencia que permitan extraer datos de su incidencia en la invención en el periodo considerado. Ello ha permitido conocer una serie de datos de los inventores, que, en definitiva son los creadores del desarrollo tecnológico en este campo, extrayendo, ordenando y categorizando la información sobre lugar de origen, tipo de inventor (empresa o particular), sexo, práctica de colaboración y profesión. Finalmente se ha estudiado el tipo de inventos, mostrando los sectores en los que se producen las invenciones, identificando si se han puesto en práctica, y determinando aspectos tales como su carácter de invención incremental, su posible consideración como invento raro y curioso, y su coexistencia con una marca registrada. El trabajo se inicia con la introducción seguida de un apartado en el que se presenta el marco teórico en el que se desarrolla la investigación, en una doble vía: en primer lugar el contexto de los documentos de patente, su relación con la innovación y su utilidad como fuentes de información, y en segundo lugar el marco de la invención en el ciclismo, presentando las fases esenciales de la evolución de la bicicleta (capítulo 2). En el marco metodológico (capítulo 3) se explican fuentes y metodología, presentando a continuación el diseño de la investigación, que se resume como sigue: 1- Determinación del universo de datos, 2- Consulta en el Archivo Histórico de la OEPM, 3- Diseño y creación de la base de datos propia, 4- Consulta de los expedientes y toma de imágenes, 5- Tratamiento y análisis de los datos, 6- Búsqueda de información en fuentes para patentes extranjeras, y 7- Consulta a la base de datos de Marcas de la OEPM. El capítulo 4 está dedicado a la investigación propiamente dicha, estructurado en tres grandes bloques. El primero recoge las cuantificaciones tabuladas del total de patentes y el análisis de determinados aspectos generales como la cronología de la invención y diversas comparaciones con resultados obtenidos en otros trabajos. El segundo bloque está centrado en los estudios de solicitantes de patentes, protagonistas de las invenciones. De ellos se contemplan una serie de datos extraídos de los expedientes, y posteriormente tabulados y cuantificados: su procedencia geográfica, su adscripción como empresas o solicitantes particulares, y sus datos de colaboración, finalizando el bloque con un apartado que dedicamos a la innovación femenina, que consideramos una línea de investigación interés. El tercer bloque, el más amplio de todos, está dedicado a la descripción y análisis de los datos referidos a los propios inventos, puesto que es la aplicación de los inventos lo que marca el desarrollo tecnológico de la máquina bicicleta, y su consiguiente evolución histórica y social. Se estructura asimismo en varias secciones. La primera es la más amplia, donde se muestran y explican los datos que tienen que ver con la adscripción de los inventos a sectores temáticos, es decir, que desarrolla las funciones o componentes de la bicicleta que han sido objeto de invención. Los apartados siguientes muestran datos y consideraciones sobre las patentes puestas en práctica, las invenciones incrementales, los inventos curiosos, y las patentes con posible marca registrada de su nombre. Finalmente, las conclusiones del estudio, el establecimiento de posibles líneas abiertas de investigación, la relación de fuentes consultadas y los anexos cerrarán la exposición de esta tesis. ABSTRACT The main goal of this research thesis is to shed light on a specific documentary record: patents presented in Spain, regarding a specific theme: bicycles and cycling, within a given period: 1826-1929. This record is organized for the ulterior use by the scientific community. In order to carry out this goal, the mentioned patents have been identified and systematized, and analyzed for frequency in order to infer the incidence of its invention in the period under consideration. This has brought to light some information on the inventors which are, after all, the creators in the technological development of that field. Their bibliographical information: origin, type of inventor (company or individual), gender, collaboration behavior and profession. Finally, the type of inventions has been studied, showing the sectors in which inventions are produced, whether these were transferred to practice, and other key information like the incremental nature of their invention, their possible consideration as ‘rare or curious invention’, and their coexistence with a registered trademark. This thesis is organized with an initial introduction, after which a section outlines the theoretical framework for the research along two axes: first the context of the patent documents, their relation with innovation and their usefulness as information sources; second, the invention of cycling and the development phases of bicycles. In the methodological section the sources and methodology are explained and reasoned, followed by the research design: 1-determination of the data universe, 2-consultation at the historical archive of the OEPM (National Patent Office), 3-design and creation of a database, 3-analysis of the files and image catchment, 5-treatment and analysis of data, 6-browsing of source information for foreign patents, and 7-consultation of the trademark information at the OEPM. Chapter 4 is dedicated to research itself, in three main sections. The first one has the quantification of the patent total in tables and the analysis of specific overall chronological aspects of the invention, and some comparisons with the results obtained in other research. The second section is centered on the studies of patent requests and inventors. Some data extracted from the files has been systematized: geographical origin, adscriptions as companies or individuals, and their collaboration data, ending with a sub-section on women’s invention, which we consider an interesting research line. The third section, the biggest one of them all, is dedicated to the description and analysis of the data referred to the inventions themselves, because it is the application of the inventions which constitutes the technological development of the bicycle, and therefore its historical and social evolution. It is also structured in various sub-sections. The first one is the longest one, with information regarding the thematic typology of the inventions: functions and bicycle components which are innovated. The other ensuing subsections study patents which were actually incorporated and used, incremental inventions, curious inventions and patents with possible associated trademarks. Finally, the study conclusions, the establishment of lines of potential further research, the references used, and the annexes which culminate the thesis exposition.
Resumo:
Relatório final apresentado para a obtenção do grau de mestre na Especialidade profissional do ensino do 1.º e 2.º ciclos do ensino básico
Resumo:
Relatório final apresentado para a obtenção do grau de mestre na Especialidade profissional do ensino do 1.º e 2.º ciclos do ensino básico