Embedded systems have become prominent targets for cyberattacks. To exploit firmware's memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the large shared library codebase (e.g., ...
详细信息
ISBN:
(纸本)9781450392051
Embedded systems have become prominent targets for cyberattacks. To exploit firmware's memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the large shared library codebase (e.g., uClibc). Unfortunately, unlike their desktop counterparts, embedded systems lack essential computing resources to enforce security hardening techniques. Recently, we have witnessed a surge of software debloating as a new defense mechanism against code-reuse attacks;it erases unused code to significantly diminish the possibilities of constructing reusable gadgets. Because of the single firmware image update style, static library debloating shows promise to fortify embedded systems without compromising performance and forward compatibility. However, static library debloating on stripped binaries (e.g., firmware's shared libraries) is still an enormous challenge. In this paper, we show that this challenge is not insurmountable for MIPS firmware. We develop a novel system, named. mu Trimmer, to identify and wipe out unused basic blocks from shared libraries' binary code, without causing additional runtime overhead or memory consumption. We propose a new method to identify address-taken blocks/functions, which further help us maintain an interprocedural control flow graph to conservatively include library code that could be potentially used by firmware. By capturing address access patterns for position-independent code, we circumvent the challenge of determining code-pointer targets and safely eliminate unused code. We run. mu Trimmer to debloat shared libraries for SPEC CPU2017 benchmarks, popular firmware applications (e.g., Apache, BusyBox, and OpenSSL), and a real-world wireless router firmware image. Our experiments show that not only does. mu Trimmer deliver functional programs, but also it can cut the exposed code surface and eliminate various reusable code gadgets remarkably. mu Trimmer's debloating capability can compete with the static linking results.
We collected Instagram Direct Messages (DMs) from 100 adolescents and young adults (ages 13-21) who then flagged their own conversations as safe or unsafe. We performed a mixed-method analysis of the media files share...
详细信息
ISBN:
(纸本)9781450391573
We collected Instagram Direct Messages (DMs) from 100 adolescents and young adults (ages 13-21) who then flagged their own conversations as safe or unsafe. We performed a mixed-method analysis of the media files shared privately in these conversations to gain human-centered insights into the risky interactions experienced by youth. Unsafe conversations ranged from unwanted sexual solicitations to mental health related concerns, and images shared in unsafe conversations tended to be of people and convey negative emotions, while those shared in regular conversations more often conveyed positive emotions and contained objects. Further, unsafe conversations were significantly shorter, suggesting that youth disengaged when they felt unsafe. Our work uncovers salient characteristics of safe and unsafe media shared in private conversations and provides the foundation to develop automated systems for online risk detection and mitigation.
Recognizing emotions through pervasive technologies has been the objective of several research studies. Still, the inherent complexities of emotion recognition result in applications that support the process rather th...
详细信息
ISBN:
(纸本)9781450384612
Recognizing emotions through pervasive technologies has been the objective of several research studies. Still, the inherent complexities of emotion recognition result in applications that support the process rather than fully address it. Existing methods for data collection combine multiple sensors and devices. The analysis and classification of users' and environmental data face challenges to reach high accuracy, responsiveness, and reliability. Because emotion recognition is user-dependent, it still remains as an open challenge to be resolved. This paper provides a unified view about emotion recognition, presenting a multidimensional design space that includes multiple approaches. We discuss the practicalities involved with the implementation of each approach and the deployment of emotion recognition systems. We conclude with a discussion about their advantages, limitations, and open questions.
The surging of deep learning brings new vigor and vitality to shape the prospect of intelligent Internet of Things (IoT), and edge intelligence arises to provision real-time deep neural network (DNN) inference service...
详细信息
ISBN:
(纸本)9781450394796
The surging of deep learning brings new vigor and vitality to shape the prospect of intelligent Internet of Things (IoT), and edge intelligence arises to provision real-time deep neural network (DNN) inference services for mobile users. To perform efficient and effective DNN model training in edge environments while preserving training data security and privacy of IoT devices, federated learning has been envisioned as an ideal learning paradigm for this purpose. In this paper we study energy-aware DNN model training in an edge environment. We first formulate a novel energy-aware, device-to-device (D2D) assisted federated learning problem with the aim to minimize the global loss of a training DNN model, subject to bandwidth capacity on an edge server and the energy capacity on each IoT device. We then devise an efficient heuristic algorithm for the problem. The crux of the proposed algorithm is to explore the energy usage of neighboring devices of each device for its local model uploading, by reducing the problem to a series of maximum weight matching problems in corresponding auxiliary graphs. We finally evaluate the performance of the proposed algorithm through experimental simulations. Experimental results show that the proposed algorithm is promising.
We study the problem of truthfully scheduling m tasks to n selfish unrelated machines, under the objective of makespan minimization, as was introduced in the seminal work of Nisan and Ronen (in: The 31st Annual acm sy...
详细信息
We study the problem of truthfully scheduling m tasks to n selfish unrelated machines, under the objective of makespan minimization, as was introduced in the seminal work of Nisan and Ronen (in: The 31st Annual acm symposium on Theory of computing (STOC), 1999). Closing the current gap of [2.618, n] on the approximation ratio of deterministic truthful mechanisms is a notorious open problem in the field of algorithmic mechanism design. We provide the first such improvement in more than a decade, since the lower bounds of 2.414 (for n = 3) and 2.618 (for n -> infinity) by Christodoulou et al. (in: proceedings of the 18th Annual acm-SIAM Symposium on Discrete Algorithms (SODA), 2007) and Koutsoupias and Vidali (in: proceedings of Mathematical Foundations of Computer Science (MFCS), 2007), respectively. More specifically, we show that the currently best lower bound of 2.618 can be achieved even for just n = 4 machines;for n = 5 we already get the first improvement, namely 2.711;and allowing the number of machines to grow arbitrarily large we can get a lower bound of 2.755.
Jump height estimation is well-studied problem in sports science with a variety of methods proposed over the years. This paper introduces a portable, simple-to-setup and a cost-effective video-based jump height estima...
详细信息
Computer vision is an important branch of computer science and artificial intelligence. The main content of its research is how to use a variety of imaging systems instead of visual organs as signal input means, by th...
详细信息
The proceedings contain 325 papers. The topics discussed include: an overview on emerging security threats in big data clusters and their defenses;construction of intelligent network for sports training safety assuran...
ISBN:
(纸本)9781665482325
The proceedings contain 325 papers. The topics discussed include: an overview on emerging security threats in big data clusters and their defenses;construction of intelligent network for sports training safety assurance based on portable heart rate detection intelligent equipment;blockchain based electronic voting machine;implementing machine learning adoption and blockchain in the health care system;enhanced optimized link state secure routing algorithm using RSA crypto key exchange & revocation in FANET framework;federated learning approach for tracking malicious activities in cyber-physical systems;federated learning approach for tracking malicious activities in cyber-physical systems;design of emergency management system for public emergencies under big data, intrusion detection, and defense;data interface matching and information security measurement of scientific and technological innovation measurementanalysis and multi-agent economic MIS;an adaptive long-short term prediction model for resource management in cloud;improving security in edge computing by using cognitive trust management model;and trustworthy cloud storage data protection based on blockchain technology.
Microtransactions have become a major monetisation model in digital games, shaping their design, impacting player experience, and raising ethical concerns. Research in this area has chiefly focused on loot boxes. This...
详细信息
ISBN:
(纸本)9781450391573
Microtransactions have become a major monetisation model in digital games, shaping their design, impacting player experience, and raising ethical concerns. Research in this area has chiefly focused on loot boxes. This begs the question whether other microtransactions might actually be more relevant and problematic for players. We therefore conducted a content analysis of negative player reviews (n=801) of top-grossing mobile and desktop games to determine which problematic microtransactions are most prevalent and salient for players. We found that problematic microtransactions with mobile games featuring more frequent and different techniques compared to desktop games. Across both, players minded issues related to fairness, transparency, and degraded user experience, supporting prior theoretical work, and importantly take issue with monetisation-driven design as such. We identify future research needs on why microtransactions in particular spark this critique, and which player communities it may be more or less representative of.
Stochastic approximation (SA) and stochastic gradient descent (SGD) algorithms are work-horses for modern machine learning algorithms. Their constant stepsize variants are preferred in practice due to fast convergence...
详细信息
暂无评论