Thanks to fruitful collaboration between language scholars and machine learning specialists, a new application developed by researchers at the University of Eastern Finland and Linnaeus University in Sweden can detect Twitter bots independent of the language used.
Speculative memory side-channel attacks like Meltdown and Spectre are security vulnerabilities in computers. No efficient solutions have been found. Existing solutions only address specific security threats without solving the underlying issue. Now, researchers from University of Murcia, Uppsala University and NTNU have come up with a more appealing solution, which will be presented at the International Symposium on Computer Architecture (ISCA) at the end of June.
To help train government and industry organizations on how to prevent cyberattacks, as part of a research project for the US Army, scientists at The University of Texas at San Antonio, developed the first framework to score the agility of cyber attackers and defenders.
The framework proposed by the researchers will help government and industry organizations visualize how well they out-maneuver attacks over time. This groundbreaking work will be published in an upcoming issue of IEEE Transactions on Information Forensics and Security, a top cybersecurity journal.
Picture the future. You can hop in your car or one from a ride-share, buckle up and tell the car where you want to go. During your ride, you can look up a few things online through your dashboard. Meanwhile, your whereabouts and other details are being tracked. As self-driving cars develop further, they will play a much larger role in the digital economy as car companies and others harness personalized customer information through geospatial and navigation technologies, according to a Dartmouth study.
Cybersecurity researcher Karthik Pattabiraman, an associate professor of electrical and computer engineering at the University of British Columbia, has developed an automated program aimed at foiling smart meter hacking and boosting security in the smart grid.
'Our proposed detection modules are trusted and secured, based on information that can be measured from side-channel resources, in addition to data transmission,' Farhi says. 'These include (1) the keyboard's power consumption; (2) the keystrokes' sound; and (3) the user's behavior associated with his or her ability to respond to typographical errors.'
ORNL story tips: Tiny test fuels by ORNL explore new reactor fuels more rapidly; ORNL-developed computing method detects, reports bugs in VA's healthcare data system; new heat transport study in thermoelectric materials may lead to better heat-to-electricity conversion.
For some people, the thought of their partner, friend or colleague snooping through their phone, reading their texts and emails, is an automatic deal breaker. However, some relationships can survive the snooping, a new study examining the motivations behind phone snooping has found.
One of the latest cyber threats involves hackers encrypting user files and then charging "ransom" to get them back. In the paper, 'Project Almanac: A Time-Traveling Solid State Drive,' CSL students Chance Coats and Xiaohao Wang and Assistant Professor Jian Huang look at how they can use the commodity storage devices already in a computer, to save the files without having to pay the ransom.