世界中学生文摘Pub Date : 2017-10-20DOI: 10.1145/3131348.3131354
Shilin Zhu, Chi Zhang, Xinyu Zhang
{"title":"Demo: LiShield: Create a Capture-Resistant Environment Against Photographing","authors":"Shilin Zhu, Chi Zhang, Xinyu Zhang","doi":"10.1145/3131348.3131354","DOIUrl":"https://doi.org/10.1145/3131348.3131354","url":null,"abstract":"The ubiquity of mobile camera devices has been triggering an outcry of privacy concerns. In this demo, we introduce LiShield, which automatically protects a physical scene against photographing, by illuminating it with smart LEDs flickering in specialized waveform. We have also designed mechanisms to unblock authorized cameras and enable graceful degradation under strong ambient light interference.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3131348.3131354","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72521618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
世界中学生文摘Pub Date : 2017-10-20DOI: 10.1145/3131348.3131355
Timothy J. Pierson, Reza Rawassizadeh, Ronald A. Peterson, D. Kotz
{"title":"Secure Information Transfer Between Nearby Wireless Devices","authors":"Timothy J. Pierson, Reza Rawassizadeh, Ronald A. Peterson, D. Kotz","doi":"10.1145/3131348.3131355","DOIUrl":"https://doi.org/10.1145/3131348.3131355","url":null,"abstract":"Securely transferring data between two devices that have never previously met nor shared a secret is a difficult task. Previous solutions to the problem are susceptible to well-known attacks or may require extensive infrastructure that may not be suitable for wireless devices such as Internet of Things sensors that do not have advanced computational capabilities. We propose a new approach: using jamming to thwart adversaries located more than a few centimeters away, while still allowing devices in close physical proximity to securely share data. To accomplish this secure data transfer we exploit MIMO antennas and the Inverse-Square Law.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88509263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
世界中学生文摘Pub Date : 2017-10-20DOI: 10.1145/3131348.3134466
R. Kravets
{"title":"Taming of the Wild: IoT in Public Spaces","authors":"R. Kravets","doi":"10.1145/3131348.3134466","DOIUrl":"https://doi.org/10.1145/3131348.3134466","url":null,"abstract":"The progression of wireless communication into lower power, smaller form factor devices has heralded the age of the Internet of Things (IoT). Predictions show the integration of IoT devices into all facets of our public and private lives. It is not hard to imagine an IoT-enabled home that allows a user to interact with their personal environment or an IoT-enhanced store that advertises available products, enhanced with targeted offers to nearby or frequent shoppers. However, there are many dangers inherent in the use of IoT in public spaces, including violations of a user's privacy and overwhelming the limited bandwidth in dense IoT deployments. Challenges lie at all layers of the IoT ecosystem and privacy must ultimately be built into the devices and protocols we use.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75311702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 9th ACM Workshop on Wireless of the Students, by the Students, and for the Students","authors":"","doi":"10.1145/3131348","DOIUrl":"https://doi.org/10.1145/3131348","url":null,"abstract":"","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82952226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
世界中学生文摘Pub Date : 2015-09-11DOI: 10.1145/2801694.2801713
S. Sooriyaarachchi
{"title":"Poster: A Cell Biology Inspired Model for Controlling Redundant Rebroadcasts in Mobile Ad-hoc Networks","authors":"S. Sooriyaarachchi","doi":"10.1145/2801694.2801713","DOIUrl":"https://doi.org/10.1145/2801694.2801713","url":null,"abstract":"Dense MANETs should be designed to be as stateless as possible and the nodes should not keep global network-wide states. Blind rebroadcasting agrees with this requirement but it causes broadcast storm problem. We propose a protocol consisting of (i) storm control and (ii) flood control mechanisms to operate as a link layer protocol to carry unicast data in multihop manner. Our protocol startes with blind rebroadcasting and controls redundant rebroadcasts through a method inspired by chalone mechanism found in biological cell proliferation control in organ growth.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"83 6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83559403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
世界中学生文摘Pub Date : 2015-09-11DOI: 10.1145/2801694.2801699
Wasif Masood, J. F. Schmidt
{"title":"Exploring Autoregressive Integrated Models for Time Synchronization in Wireless Sensor Networks","authors":"Wasif Masood, J. F. Schmidt","doi":"10.1145/2801694.2801699","DOIUrl":"https://doi.org/10.1145/2801694.2801699","url":null,"abstract":"Time synchronization provides the basis for several applications in wireless sensor networks but the limited memory and computational power, and the use of low precision oscillators make the task of time synchronization non-trivial. In this demonstration, we present a novel time synchronization scheme that is based on time series analysis. To provide a general model for the practical behavior of low precision oscillators, autoregressive integrated moving average models are explored. Based on the analysis of experimental data, an autoregressive integrated model (ARI (1,1)) is derived. Unlike the resource hungry Kalman filter based formulations, the proposed scheme is resource efficient as it results in simple linear regression processing. Experiments are performed on real sensor devices including Zolertia and TelosB, where an accuracy below 1 clock tick1 is achieved.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"154 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86273265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
世界中学生文摘Pub Date : 2015-09-11DOI: 10.1145/2801694.2802141
Kirill Kononenko
{"title":"Demo: Dynamic Neutralization of Data Leakages","authors":"Kirill Kononenko","doi":"10.1145/2801694.2802141","DOIUrl":"https://doi.org/10.1145/2801694.2802141","url":null,"abstract":"The security of hardware-software systems is at risk from a wide range of attack vectors that appear at various stages during the execution of machine code. The existing approaches for repairing software defects have numerous restrictions with respect to their applicability and functionality and to the range of vulnerabilities that can be identified and eliminated. We propose an approach for removing software errors in program code that is based on just-in-time compilation in a virtual execution environment. The virtual environment uses static, dynamic, and hybrid analyses of the intermediate representation of vulnerable code and re-compiles such code to be safe. The language of code annotations allows us to manage static and dynamic analyses and code transformations. We can change the level of analysis and the amount of time spent on such analyses by dynamically adapting the precision.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91264964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
世界中学生文摘Pub Date : 2015-09-11DOI: 10.1145/2801694.2801696
A. Shuba, Anh Le, Minas Gjoka, Janus Varmarken, Simon Langhoff, A. Markopoulou
{"title":"Demo: AntMonitor: Network Traffic Monitoring and Real-Time Prevention of Privacy Leaks in Mobile Devices","authors":"A. Shuba, Anh Le, Minas Gjoka, Janus Varmarken, Simon Langhoff, A. Markopoulou","doi":"10.1145/2801694.2801696","DOIUrl":"https://doi.org/10.1145/2801694.2801696","url":null,"abstract":"Mobile devices play an essential role in the Internet today, and there is an increasing interest in using them as a vantage point for network measurement from the edge. At the same time, these devices store personal, sensitive information, and there is a growing number of applications that leak it. We propose AntMonitor -- the first system of its kind that supports (i) collection of large-scale, semantic-rich network traffic in a way that respects users' privacy preferences and (ii) detection and prevention of leakage of private information in real time. The first property makes AntMonitor a powerful tool for network researchers who want to collect and analyze large-scale yet fine-grained mobile measurements. The second property can work as an incentive for using AntMonitor and contributing data for analysis. As a proof-of-concept, we have developed a prototype of AntMonitor, deployed it to monitor 9 users for 2 months, and collected and analyzed 20 GB of mobile data from 151 applications. Preliminary results show that fine-grained data collected from AntMonitor could enable application classification with higher accuracy than state-of-the-art approaches. In addition, we demonstrated that AntMonitor could help prevent several apps from leaking private information over unencrypted traffic, including phone numbers, emails, and device identifiers.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"89 6 Pt 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89410102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}