scholarly journals Mitigating Dictionary Attacks on Password-Protected Local Storage

Author(s):  
Ran Canetti ◽  
Shai Halevi ◽  
Michael Steiner
1995 ◽  
Vol 05 (02) ◽  
pp. 139-148 ◽  
Author(s):  
TORBEN HAGERUP ◽  
JÖRG KELLER

We investigate the problem of permuting n data items on an EREW PRAM with p processors using little additional storage. We present a simple algorithm with run time O((n/p) log n) and an improved algorithm with run time O(n/p + log n log log (n/p)). Both algorithms require n additional global bits and O(1) local storage per processor. If prefix summation is supported at the instruction level, the run time of the improved algorithm is O(n/p). The algorithms can be used to rehash the address space of a PRAM emulation.


2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Ante Dagelić ◽  
Toni Perković ◽  
Bojan Vujatović ◽  
Mario Čagalj

User’s location privacy concerns have been further raised by today’s Wi-Fi technology omnipresence. Preferred Network Lists (PNLs) are a particularly interesting source of private location information, as devices are storing a list of previously used hotspots. Privacy implications of a disclosed PNL have been covered by numerous papers, mostly focusing on passive monitoring attacks. Nowadays, however, more and more devices no longer transmit their PNL in clear, thus mitigating passive attacks. Hidden PNLs are still vulnerable against active attacks whereby an attacker mounts a fake SSID hotspot set to one likely contained within targeted PNL. If the targeted device has this SSID in the corresponding PNL, it will automatically initiate a connection with the fake hotspot thus disclosing this information to the attacker. By iterating through different SSIDs (from a predefined dictionary) the attacker can eventually reveal a big part of the hidden PNL. Considering user mobility, executing active attacks usually has to be done within a short opportunity window, while targeting nontrivial SSIDs from user’s PNL. The existing work on active attacks against hidden PNLs often neglects both of these challenges. In this paper we propose a simple mathematical model for analyzing active SSID dictionary attacks, allowing us to optimize the effectiveness of the attack under the above constraints (limited window of opportunity and targeting nontrivial SSIDs). Additionally, we showcase an example method for building an effective SSID dictionary using top-N recommender algorithm and validate our model through simulations and extensive real-life tests.


2013 ◽  
Vol 4 (1) ◽  
pp. 130-137
Author(s):  
Mehryar Nooriafshar

This paper is based on an ongoing research project. Its main purpose is to demonstrate the effectiveness of adopting the project lifecycle approach to learning Project Management through an interactive multimedia system. This multimedia system, referred to as the interactive tool (or the tool) in the paper, is a flash based environment. It can be accessed from either the local storage device of a computer or the Internet under both Microsoft and Apple based operating systems. The tool follows the standard lifecycle phases of a project in teaching fundamentals of Project Management at the undergraduate level. In order to demonstrate its learning effectiveness, the tool was put to the test at three different universities in Australia, Japan and Canada. All the participants were taking Project Management as part of their studies. This combination provided the opportunity of studying participants from different learning, linguistic and cultural backgrounds. The test consisted of a specially designed workshop with customisations for each country. The main objective was to measure and gauge the learning outcome in each case. The findings confirmed that all the participants from every group achieved two main goals of learning the field; and enjoying the learning process.


2021 ◽  
Author(s):  
Vassil Roussenov ◽  
Ric Williams ◽  
Anna Katavouta

<p>Projected changes in ocean heat and carbon storage are assessed in terms of the added and 
redistributed tracer using a transport-based framework for 6 CMIP5 Earth system models following an annual 1% rise in atmospheric 
CO2. Heat and carbon budgets for the added and redistributed tracer are used to compare the reasons for the relatively-reduced storage of heat and carbon within the Southern Ocean. Here the added tracer takes 
 account of the net tracer source and the advection of the added tracer, while the redistributed tracer takes account of the time-varying advection of the pre-industrial tracer  distribution. The added heat and carbon are nearly always positive over the Southern Ocean with the net source acting to supply tracer. However, there is a relatively-reduced local storage of heat and carbon in the Southern Ocean due to the passive northward transport of heat and carbon by the overturning, which is augmented by a passive northward carbon transport for the gyre circulation. In contrast, the redistributed heat is usually negative and the redistributed carbon is positive over the Southern Ocean due to the transport effects of a strengthening residual circulation and the opposing gradients in the pre-industrial temperature and 
carbon. Hence, climate projections for the Southern Ocean are expected to have heat anomalies of a variable sign and carbon anomalies of a consistently positive  sign, since the effects of added and redistribution heat are opposing in sign, while the effects of added and redistributed 
carbon reinforce each other.
</p><p> </p>


2013 ◽  
pp. 131-149
Author(s):  
Christoph Burger ◽  
Jens Weinmann

Author(s):  
Wasan Awad ◽  
Hanin Mohammed Abdullah

Developing security systems to protect the storage systems are needed. The main objective of this paper is to study the security of file storage server of an organization. Different kinds of security threats and a number of security techniques used to protect information will be examined. Thus, in this paper, an assessment plan for evaluating cyber security of local storage systems in organizations is proposed. The assessment model is based on the idea of cyber security domains and risk matrix. The proposed assessment model has been implemented on two prestigious and important organizations in the Kingdom of Bahrain. Storage systems of the assessed organizations found to have cyber security risks of different scales. This conclusion gives certainty to the fact that organizations are not capable of following the cyber security evolution and secure their storage systems from cyber security vulnerabilities and breaches. Organizations with local storage systems can improve the cyber security of their storage systems by applying certain techniques.


Sign in / Sign up

Export Citation Format

Share Document