1,289 research outputs found

    SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices

    Full text link
    The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things. In particular, Computational Radio Frequency Identification (CRFID) devices are an emerging class of battery-free, computational, sensing enhanced devices that harvest all of their energy for operation. Despite wireless connectivity and powering, secure wireless firmware updates remains an open challenge for CRFID devices due to: intermittent powering, limited computational capabilities, and the absence of a supervisory operating system. We present, for the first time, a secure wireless code dissemination (SecuCode) mechanism for CRFIDs by entangling a device intrinsic hardware security primitive Static Random Access Memory Physical Unclonable Function (SRAM PUF) to a firmware update protocol. The design of SecuCode: i) overcomes the resource-constrained and intermittently powered nature of the CRFID devices; ii) is fully compatible with existing communication protocols employed by CRFID devices in particular, ISO-18000-6C protocol; and ii) is built upon a standard and industry compliant firmware compilation and update method realized by extending a recent framework for firmware updates provided by Texas Instruments. We build an end-to-end SecuCode implementation and conduct extensive experiments to demonstrate standards compliance, evaluate performance and security.Comment: Accepted to the IEEE Transactions on Dependable and Secure Computin

    A cultural exploration of the social media manipulators

    Get PDF
    The widespread use of Internet social media sites for the production and dissemination of propaganda continues to grow and gather attention. Social media sites spread information faster and wider than those institutions and methods historically limited to state-affiliated organizations. There are several characteristics that are unique to virtual space and make the production and dissemination of propaganda different; they include the Internet’s global reach, the recipient’s apparent trust placed in information source as well as the information sources, and the low cost of participation. Thus, the use of social media as a method to spread misleading information exploits trust relationships between the reader and the source. Although propaganda is a weapon with a long history in war, in the 21st century, the delivery and distribution of propaganda through the trusted channel of social media is markedly different than what was historically observed. We investigated the relationships among state-affiliated actors who use social media to produce and distribute propaganda along with their national cultural values. Prior research inferred a link between culture and social media usage (Hofstede et al., 2010; Sample & Karamanian 2014). Specifically, Hofstede et al. (2010) contended that cultures that are more masculine use the Internet for information seeking, whereas more feminine-oriented cultures use social media sites for sharing information, seeking to build better “trusting” relationships. We sought to explore whether masculine countries would leverage the trust relationships that are present with social media users to further the reach of state-affiliated propaganda. We built upon Bradshaw & Howard’s (2017) study on propaganda purveyors, which examined preferred social media deployment techniques across 29 different countries. Using previously published methods, we examined associations with culture using Hofestede’s scale. Since masculine countries have previously been associated with information-seeking behaviors, we sought to explore the potential that more masculine cultural values are associated with greater information-shaping and -distributing behaviors compared with more feminine cultural values. The results showed a strong difference in distributions, countries that deployed fake news via social media tended to have more masculine cultural values. Moderate differences were observed in other cultural values, purveyors of social media propaganda exhibited more authoritarianism and uncertainty avoidance. These findings suggest that specific cultural values associate with the distrubtion of fake news, indicating that culturally aware responses may be more effective when responding to these events

    Safety aspects of infliximab in inflammatory bowel disease patients - A retrospective cohort study in 100 patients of a German University Hospital

    Get PDF
    Background: Infliximab, a chimeric anti-tumour necrosis factor monoclonal antibody with potent anti-inflammatory effects, represents an effective treatment option in patients with severe inflammatory bowel disease (IBD). Serious side-effects of such an immunomodulating therapy are speculated and therefore we reviewed our clinical experience in a retrospective safety study looking upon a single cohort of 100 IBD patients from a large German University Hospital. Methods: 100 patients with severe Crohn's disease (n = 92), ulcerative colitis (n = 7) or indeterminate colitis (n = 1) treated with infliximab (5 mg/kg) from January 2000 to December 2003 were retrospectively analysed for acute and subacute adverse events by chart review. Results: Overall, infliximab therapy was generally well tolerated. No fatal complications, malignancies, autoimmune diseases, neurologic or cardiovascular complications were observed in the cohort during the study period. Overall, adverse events were observed in 10 patients: 2 patients showed an acute infusion reaction, 1 patient a serum sickness-like reaction, in 4 patients a bacterial or viral infection occurred, in 1 patient pancytopenia and 2 patients developed surgical complications. Only 6 patients with adverse events required admission to hospital. A case of tuberculosis after infliximab was not found. The lack of adverse side-effects was associated with young median age and infrequent comorbidities of the cohort. Conclusion: Regarding its strong immunomodulating capacity, infliximab appears to be an efficient and relatively safe therapeutic option for patients with severe IBD. However, the use of infliximab requires careful screening and close patient monitoring to identify patients at risk and the infrequent, but sometimes serious complications of infliximab. Copyright (C) 2004 S. Karger AG, Basel

    Radiative Muon Capture on Hydrogen and the Induced Pseudoscalar Coupling

    Full text link
    The first measurement of the elementary process μpνμnγ\mu^- p \rightarrow \nu_{\mu} n \gamma is reported. A photon pair spectrometer was used to measure the partial branching ratio (2.10±0.22)×1082.10 \pm 0.22) \times 10^{-8} for photons of k > 60 MeV. The value of the weak pseudoscalar coupling constant determined from the partial branching ratio is gp(q2=0.88mμ2)=(9.8±0.7±0.3)ga(0)g_p(q^{2}=-0.88m_{\mu}^2) = (9.8 \pm 0.7 \pm 0.3) \cdot g_a(0), where the first error is the quadrature sum of statistical and systematic uncertainties and the second error is due to the uncertainty in λop\lambda_{op}, the decay rate of the ortho to para pμpp \mu p molecule. This value of g_p is \sim1.5 times the prediction of PCAC and pion-pole dominance.Comment: 13 pages, RevTeX type, 3 figures (encapsulated postscript), submitted to Phys. Rev. Let

    Parity Violation in Elastic Electron-Proton Scattering and the Proton's Strange Magnetic Form Factor

    Get PDF
    We report a new measurement of the parity-violating asymmetry in elastic electron scattering from the proton at backward scattering angles. This asymmetry is sensitive to the strange magnetic form factor of the proton as well as electroweak axial radiative corrections. The new measurement of A = -4.92±0.61±0.73 ppm provides a significant constraint on these quantities. The implications for the strange magnetic form factor are discussed in the context of theoretical estimates for the axial corrections

    VerdictDB: Universalizing Approximate Query Processing

    Full text link
    Despite 25 years of research in academia, approximate query processing (AQP) has had little industrial adoption. One of the major causes of this slow adoption is the reluctance of traditional vendors to make radical changes to their legacy codebases, and the preoccupation of newer vendors (e.g., SQL-on-Hadoop products) with implementing standard features. Additionally, the few AQP engines that are available are each tied to a specific platform and require users to completely abandon their existing databases---an unrealistic expectation given the infancy of the AQP technology. Therefore, we argue that a universal solution is needed: a database-agnostic approximation engine that will widen the reach of this emerging technology across various platforms. Our proposal, called VerdictDB, uses a middleware architecture that requires no changes to the backend database, and thus, can work with all off-the-shelf engines. Operating at the driver-level, VerdictDB intercepts analytical queries issued to the database and rewrites them into another query that, if executed by any standard relational engine, will yield sufficient information for computing an approximate answer. VerdictDB uses the returned result set to compute an approximate answer and error estimates, which are then passed on to the user or application. However, lack of access to the query execution layer introduces significant challenges in terms of generality, correctness, and efficiency. This paper shows how VerdictDB overcomes these challenges and delivers up to 171×\times speedup (18.45×\times on average) for a variety of existing engines, such as Impala, Spark SQL, and Amazon Redshift, while incurring less than 2.6% relative error. VerdictDB is open-sourced under Apache License.Comment: Extended technical report of the paper that appeared in Proceedings of the 2018 International Conference on Management of Data, pp. 1461-1476. ACM, 201

    Future Directions in Parity Violation: From Quarks to the Cosmos

    Get PDF
    I discuss the prospects for future studies of parity-violating (PV) interactions at low energies and the insights they might provide about open questions in the Standard Model as well as physics that lies beyond it. I cover four types of parity-violating observables: PV electron scattering; PV hadronic interactions; PV correlations in weak decays; and searches for the permanent electric dipole moments of quantum systems.Comment: Talk given at PAVI 06 workshop on parity-violating interactions, Milos, Greece (May, 2006); 10 page

    Parity-violating Electron Deuteron Scattering and the Proton's Neutral Weak Axial Vector Form Factor

    Get PDF
    We report on a new measurement of the parity-violating asymmetry in quasielastic electron scattering from the deuteron at backward angles at Q2= 0.038 (GeV/c)2. This quantity provides a determination of the neutral weak axial vector form factor of the nucleon, which can potentially receive large electroweak corrections. The measured asymmetry A=-3.51 +/- 0.57(stat) +/- 0.58(sys)ppm is consistent with theoretical predictions. We also report on updated results of the previous experiment at Q2=0.091 (GeV/c)2, which are also consistent with theoretical predictions.Comment: 4 pages, 2 figures, submitted to Phys. Rev. Let

    Jamming and Fluctuations in Granular Drag

    Full text link
    We investigate the dynamic evolution of jamming in granular media through fluctuations in the granular drag force. The successive collapse and formation of jammed states give a stick-slip nature to the fluctuations which is independent of the contact surface between the grains and the dragged object -- thus implying that the stress-induced collapse is nucleated in the bulk of the granular sample. We also find that while the fluctuations are periodic at small depths, they become "stepped" at large depths, a transition which we interpret as a consequence of the long-range nature of the force chains.Comment: 7 pages, 4 figures, RevTe
    corecore