Sector Discrimination: Sector Identification with Similarity Digest Fingerprints

Size: px
Start display at page:

Download "Sector Discrimination: Sector Identification with Similarity Digest Fingerprints"

Transcription

1 Sector Discrimination: Sector Identification with Similarity Digest Fingerprints Vassil Roussev 1

2 Problem: given a set of fragments, iden4fy the original ar4fact. Source objects (files) v Disk fragments (sectors) Network fragments (packets) Fragments of interest are 1-4KB in size Fragment alignment is arbitrary; fragment size may vary. 2

3 Key idea: generate a similarity digest to enable approximate matching. SD fingerprint features Accuracy: >99% identification (@4KB) Efficiency: ~3% of the original data Scalability: compare objects of any size Performance: expected to be I/O-bound (100 MB/s) 3

4 SD fingerprint: local representa4on using sta4s4cally improbable features. Each Bloom filter (BF) represents, on average, 8KB. 4

5 SD comparison is based on all- pairs comparison of BFs. For fragments up to 8KB, the SD fingerprint is a single Bloom filter. 5

6 SD comparison is approximate fragments may be represented in two BFs. Bloom filters are compared bitwise greater overlap signifies greater overlap between the respective data sources. 6

7 Improved feature selec4on is achieved by filtering out low- entropy content. Data with low information content 7

8 Results: Success & Error Rates Correctly classified Misclassified: FP + FN Not classified All fragments The algorithm favors rejection of weak data (low-entropy fragments) over false positives. 8

9 Test Cases 7 x 100MB sets: doc html jpg rnd pdf txt xls Four fragment sizes: 512, 1024, 2048, & 4096 bytes 9

10 Detec4on Rates > for C t = 20 10

11 Non- classifica4on Rates 11

12 Typical Misclassifica4on (MC) Behavior 0 < MC <= for C t = 20 12

13 Summary of Misclassifica4on Rate Ranges 13

14 Conclusions Developed a robust, scalable fragment identification methodology. Accuracy >99%, due to filtering of weak features Implementation: sdhash The same tool can be used to detect file versions, such as updates libraries/executables. 14

15 Future Work Performance optimization: 100 MB/s Hash the NSRL and other corpora Evaluate effectiveness of version detection Combine with sector discrimination Multi-resolution implementation 15

16 Digital Forensic Research Conference Aug 1-3, 2011 New Orleans, LA An Evaluation of Forensic Similarity Hashes Vassil Roussev

17 Agenda Ø Intro o Motivation, problems, goals, requirements, Ø High- level tool design Ø Evalua4on studies Ø Current/planned sdhash infrastructure Ø Quick demo (4me permiung) Ø Q & A 17

18 Mo4va4on: Tradi4onal Filtering Approaches Fail Ø Known file filtering: o Crypto- hash known ;iles, store in library (e.g. NSRL) o Hash ;iles on target o Filter in/out depending on interest Ø Challenges o Static libraries are falling behind Dynamic sovware updates, trivial ar4fact transforma4ons è We need version correla4on o Need to ;ind embedded objects Block/file in file/volume/network trace o Need higher- level correlations Disk- to- RAM Disk- to- network 18

19 Similarity Hash Requirements/Scenarios Ø Iden4fica4on of embedded/trace evidence o Needle in a haystack Ø Iden4fica4on of code versions o File- to- ;ile correlation Ø Iden4fica4on of related documents o File- to- ;ile correlation Ø Correla4on of RAM and disk sources o Different representation of same objects Ø Correla4on of network and disk sources o Fragmentation/alignment issues o No ;low reconstruction 19

20 Exis4ng Similarity Hashing: ssdeep Ø Context- triggered piecewise hashing o Developed by Jesse Kornblum (2006) o An adaptation of an early spam ;iltering algorithm Ø General idea o Break up the ;ile into chunks o Generate a 6- bit hash for each chunk o Concatenate the hashes to obtain the ;ile signature: 24576:fBovHm8YnR/tDn7uSt8P8SRLAD/5Qvhfpt8P8SRLm:mvHKnx5C868MAD/5uz68Mm, file.pdf" o Treat the signatures as strings; use edit distance to estimate similarity 20

21 ssdeep: Problems Ø Methodology (random polynomial fingerprin4ng) o Works well on mid- /high- entropy data Text/compressed data o Degenerates on lower- entropy data Uneven coverage Many false posi4ves o Dif;icult to ;ix Ø Design o Fixed- size signature (does not scale) o Distance metric choice (edit distance) is questionable è Fixes essen4ally require a new tool 21

22 sdhash: Similarity Digests Ø Terminology: o Feature: a 64- byte sequence (other varia8ons are possible) Ø Idea: o Consider all features: Compute rolling entropy measure o Filter out low- entropy/extreme high entropy ones o From each neighborhood, pick the rarest ones Based on entropy score and empirical observa4ons o Hash selected features and put into a Bloom ;ilter Bloom filter == probabilis4c, compressed set representa4on o Create more ;ilters as necessary o Signature is a sequence of Bloom ;ilters 22

23 Feature Selec4on data selected 3iltered out 23

24 Similarity Digest Signature ~7-8KB data 128 features (up to) 128 features f 1 f 2 f 3 f bytes On average, a 256- byte filter represents 7-8KB chunk of the original data. Digest size is ~3% of original data (could be smaller). (No original data is stored.) 24

25 Similarity Digest Comparison g 1 g 2 g 3 g m f 1 D(f 1, g 1 ) D(f 1, g 2 ) D(f 1, g 3 ) D(f 1, g m ) max i=1..m D(f 1, g i ) f 2 f n D(f n, g 1 ) D(f n, g 2 ) D(f n, g m ) max i=1..m D(f n, g i ) S = Avg i=1..i D i 25

26 ssdeep vs. sdhash Round 1: Controlled Study Ø Controlled study o All targets generated using random data o Allows for precise control of common data o Provides a baseline for the tools capabilities o Best case scenario Ø Scenarios o Embedded object detection o Single- common- block ;ile correlation o Multiple- common- blocks ;ile correlation 26

27 Embedded Object Detec4on Target Object 27

28 Embedded Object Detec4on Target Object 27

29 Embedded Object Detec4on Target Ø Scenario implementa4on Object o o o o Generate target & object Place object randomly in target Run tools on <object, target> Do 1,000 runs changing target, object, and placement Ø Evalua4on criterion o o Given: target of ;ixed size Q: What is the smallest embedded object that can be reliably detected? Reliable detec4on == 95% + successful correla4ons 27

30 Min Embedded Block Correla4on (KB) (smaller is beder) * * max values tested 28

31 Single- Common- Block Correla4on T 1 T 2 29

32 Single- Common- Block Correla4on T 1 T 2 29

33 Single- Common- Block Correla4on T 1 T 2 29

34 Single- Common- Block Correla4on T 1 T 2 Ø Scenario implementa4on o o Generate targets & object Place object randomly in both target o Run tools on <T 1, T 2 > o Do 1,000 runs changing target, object, and placement Ø Evalua4on criterion o o Given: targets of ;ixed size Q: What is the smallest embedded object that can be reliably detected? Reliable detec4on == 95% + successful correla4ons 29

35 Min Common Block Correla4on (KB) (smaller is beder) ssdeep sdhash

36 Mul4ple- Common- Blocks Correla4on T 1 T 2 31

37 Mul4ple- Common- Blocks Correla4on T 1 T 2 31

38 Mul4ple- Common- Blocks Correla4on T 1 T 2 31

39 Mul4ple- Common- Blocks Correla4on T 1 T 2 Ø Scenario implementa4on o Generate targets & object; split object in 4/8 pieces o Place pieces randomly in both target o Run tools on <T 1, T 2 > o Do 1,000 runs changing target, object, and placement Ø Evalua4on criterion o Given: targets of ;ixed size, object size = ½ target size o Q: What is the probability that a tool will detect it? 31

40 Mul4ple Common Block Correla4on (Frac4on) (BIGGER is beder) 32

41 ssdeep vs. sdhash Round 2: Real Data Study Ø Real files from the NPS GovDocs1 corpus o Fundamentally, a user study Ø Q: How does byte- level correla4on map to human- perceived ar4fact correla4on? o Not all commonality is re;lected at the semantic level Ø Related files defined: o Versions of the same ;ile o Shared format/content (e.g. web layout, JPEG) o Flash evaluation: similarity obvious within 30sec 33

42 Real Data Study Ø The T5 set o GovDocs1 sample: o 4,557 ;iles, 1.8GB total o 4KB- 16.4MB Ø Evalua4on o For all unique pairs (~10 mln.) Run ssdeep Run sdhash Evaluate posi4ve results manually 34

43 Evalua4on Sta4s4cs 35

44 The Raw Numbers 16 36

45 Recall Rates: TP/Total 37

46 Precision Rates: TP/(TP+FP) 38

47 ssdeep: FP & TP substan4ally scores overlap Ø Cannot use thresholds for ROC trade off 39

48 sdhash: FP & TP scores are separable Threshold used in study Ø Thresholding is effec4ve in cheaply elimina4ng FPs 40

49 Example ssdeep false posi4ves (score: 54-86) 41

50 Evalua4on Summary Ø New hashing scheme based on similarity digests o Scalable, robust, parallelizable o Evaluated under controlled & realistic conditions o Outperforms existing work by a wide margin Recall: 95% vs. 55% Precision: 94% vs. 68% o Graceful behavior at the margin Intui4ve behavior of the similarity score Scores drop gradually as detec4on limits are approached o Meets at least three requirements More evalua4on needed for disk/network & disk/ram 42

51 Current Throughput (ver 1.3) 43

52 Current Throughput (ver 1.3) Ø Hash genera4on rate o Six- core Intel Xeon 2.93GHz ~27MB/s per core o Quad- Core Intel 2.8 GHz ~20MB/s per core 43

53 Current Throughput (ver 1.3) Ø Hash genera4on rate o Six- core Intel Xeon 2.93GHz ~27MB/s per core o Quad- Core Intel 2.8 GHz ~20MB/s per core Ø Hash comparison o 1MB vs. 1MB: 0.5ms 43

54 Current Throughput (ver 1.3) Ø Hash genera4on rate o Six- core Intel Xeon 2.93GHz ~27MB/s per core o Quad- Core Intel 2.8 GHz ~20MB/s per core Ø Hash comparison o 1MB vs. 1MB: 0.5ms Ø T5 corpus (4,457 files, all pairs) o 10mln ;ile comparisons in ~ 15min 667K file comps per second Single core 43

55 The Envisioned Architecture libsd CLI: Files: Disk: Network: Servi Cluster: Client: Client: API C/C++ C# Python 44

56 The Current State CLI: libsd Servi API Files: Disk: Network: Cluster: Client: Client: C/C++ C# Python 45

57 Todo List (1) Ø libsdbf o Ver 2.0 rewrite o Full parallelization (TBB?) o Compression (?) Ø sdhash- file o More command line options/compatibility w/ssdeep o Parallel processing o Service- based processing (w/ sdbf_d) Ø sdhash- pcap o Pcap- aware processing: payload extrac4on, file discovery, 4melining 46

58 Todo List (2) Ø sdhash- dd o Block- aware processing, compression Ø sdbf_d o Persistance: XML o Service interface: JSON o Server clustering Ø sdbfweb o Browser- based management/query Ø sdbfviz o Large- scale visualization & clustering 47

59 Further Development Ø Ø Ø Ø Integra4on w/ RDS o sdhash- set: construct SDBFs from existing SHA1 sets Compare/iden4fy whole folders, distribu4ons, etc. Structural feature selec4on o E.g., exe/dll, pdf, zip, Op4miza4ons o o o o Sampling Skipping Under min con4nuous block assump4on Cluster core extraction/comparison GPU acceleration Representa4on o o o Multi- resolution digests New crypto hashes Data offsets 48

60 Thank you! Ø hdp://roussev.net/sdhash o wget zip o make o./sdhash Ø References o V. Roussev, Data Fingerprinting with Similarity Digests, in K.- P. Chow, S. Shenoi (Eds.): Advances in Digital Forensics VI, IFIP AICT 337, pp , 2010 o V. Roussev, An Evaluation of Forensic Similarity Hashes, in DFRWS 2011 Ø Contact: Vassil Roussev vassil@roussev.net Ø Q & A 49

File Systems: Fundamentals

File Systems: Fundamentals File Systems: Fundamentals 1 Files What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type, location, size, protection, creator,

More information

CS 5523: Operating Systems

CS 5523: Operating Systems Lecture1: OS Overview CS 5523: Operating Systems Instructor: Dr Tongping Liu Midterm Exam: Oct 2, 2017, Monday 7:20pm 8:45pm Operating System: what is it?! Evolution of Computer Systems and OS Concepts

More information

SECURE REMOTE VOTER REGISTRATION

SECURE REMOTE VOTER REGISTRATION SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current

More information

Real- Time Wireless Control Networks for Cyber- Physical Systems

Real- Time Wireless Control Networks for Cyber- Physical Systems Real- Time Wireless Control Networks for Cyber- Physical Systems Chenyang Lu Cyber- Physical Systems Laboratory Department of Computer Science and Engineering Wireless Control Networks Ø Real-time Ø Reliability

More information

Hoboken Public Schools. PLTW Introduction to Computer Science Curriculum

Hoboken Public Schools. PLTW Introduction to Computer Science Curriculum Hoboken Public Schools PLTW Introduction to Computer Science Curriculum Introduction to Computer Science Curriculum HOBOKEN PUBLIC SCHOOLS Course Description Introduction to Computer Science Design (ICS)

More information

A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset

A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset Sisi Xiong*, Feiyi Wang + and Qing Cao* *University of Tennessee Knoxville, Knoxville, TN, USA + Oak Ridge National Laboratory,

More information

Lecture 6 Cryptographic Hash Functions

Lecture 6 Cryptographic Hash Functions Lecture 6 Cryptographic Hash Functions 1 Purpose Ø CHF one of the most important tools in modern cryptography and security Ø In crypto, CHF instantiates a Random Oracle paradigm Ø In security, used in

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

Recommendations For Reddit Users Avideh Taalimanesh and Mohammad Aleagha Stanford University, December 2012

Recommendations For Reddit Users Avideh Taalimanesh and Mohammad Aleagha Stanford University, December 2012 Recommendations For Reddit Users Avideh Taalimanesh and Mohammad Aleagha Stanford University, December 2012 Abstract In this paper we attempt to develop an algorithm to generate a set of post recommendations

More information

Processes. Criteria for Comparing Scheduling Algorithms

Processes. Criteria for Comparing Scheduling Algorithms 1 Processes Scheduling Processes Scheduling Processes Don Porter Portions courtesy Emmett Witchel Each process has state, that includes its text and data, procedure call stack, etc. This state resides

More information

The Social Web: Social networks, tagging and what you can learn from them. Kristina Lerman USC Information Sciences Institute

The Social Web: Social networks, tagging and what you can learn from them. Kristina Lerman USC Information Sciences Institute The Social Web: Social networks, tagging and what you can learn from them Kristina Lerman USC Information Sciences Institute The Social Web The Social Web is a collection of technologies, practices and

More information

Case Study. MegaMatcher Accelerator

Case Study. MegaMatcher Accelerator MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,

More information

Comparison of the Psychometric Properties of Several Computer-Based Test Designs for. Credentialing Exams

Comparison of the Psychometric Properties of Several Computer-Based Test Designs for. Credentialing Exams CBT DESIGNS FOR CREDENTIALING 1 Running head: CBT DESIGNS FOR CREDENTIALING Comparison of the Psychometric Properties of Several Computer-Based Test Designs for Credentialing Exams Michael Jodoin, April

More information

Designing a Social Network Prep for Lab 10. March 26, 2018 Sprenkle - CSCI Why classes and objects? How do we create new data types?

Designing a Social Network Prep for Lab 10. March 26, 2018 Sprenkle - CSCI Why classes and objects? How do we create new data types? Objec(ves Designing a Social Network Prep for Lab 10 March 26, 2018 Sprenkle - CSCI111 1 Review What trends did we see in the names of students at W&L? Ø What was as you expected? Ø What surprised you?

More information

Luciano Nicastro

Luciano Nicastro Luciano Nicastro nicastro@ias.o.inaf.it PI: Enzo Brocato INAF: OA Roma, Napoli, Padova, Milano + IASF Bologna University of Urbino, SNS Pisa, ASI SDC Gravitown server (OA-Roma) CPU: 24 core @ 2.4 GHz RAM:

More information

WTO Research Workshop on BLOCKCHAIN

WTO Research Workshop on BLOCKCHAIN WTO Research Workshop on BLOCKCHAIN Blockchain and International Trade: Opportunities and Challenges Lance THOMPSON Secretary, UN/CEFACT lance.thompson@un.org UNECE UN/CEFACT 27 November 2018 UN/CEFACT

More information

Secure Electronic Voting

Secure Electronic Voting Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council ECE/TRADE/C/CEFACT/2013/MISC.2 Distr.: General 17 May 2013 Original: English Economic Commission for Europe Committee on Trade Centre for Trade Facilitation and

More information

LPGPU. Low- Power Parallel Compu1ng on GPUs. Ben Juurlink. Technische Universität Berlin. EPoPPEA workshop

LPGPU. Low- Power Parallel Compu1ng on GPUs. Ben Juurlink. Technische Universität Berlin. EPoPPEA workshop LPGPU Low- Power Parallel Compu1ng on GPUs Ben Juurlink Technische Universität Berlin Cri1cal Ques1ons We Seek to Ask Power consump9on has become the cri9cal limi9ng factor in performance of processors

More information

We should share our secrets

We should share our secrets We should share our secrets Shamir secret sharing: how it works and how to implement it Daan Sprenkels hello@dsprenkels.com Radboud University Nijmegen 28 December 2017 Daan Sprenkels We should share our

More information

Last Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs

Last Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs Last Time u Embedded networks Ø Characteristics Ø Requirements Ø Simple embedded LANs Bit banged SPI I2C LIN Ethernet Today u CAN Bus Ø Intro Ø Low-level stuff Ø Frame types Ø Arbitration Ø Filtering Ø

More information

E-DISCOVERY Will it byte you or your client? COPYRIGHT 2014 ALL RIGHTS RESERVED

E-DISCOVERY Will it byte you or your client? COPYRIGHT 2014 ALL RIGHTS RESERVED E-DISCOVERY Will it byte you or your client? COPYRIGHT 2014 ALL RIGHTS RESERVED SOME TERMINOLOGY TO KNOW AND UNDERSTAND Imaged format - files designed to look like a page in the original creating application

More information

Supreme Court of Florida

Supreme Court of Florida Supreme Court of Florida No. AOSC18-58 IN RE: JUROR SELECTION PLAN: MIAMI-DADE COUNTY ADMINISTRATIVE ORDER Section 40.225, Florida Statutes, provides for the selection of jurors to serve within the county

More information

CSCI 325: Distributed Systems. Objec?ves. Professor Sprenkle. Course overview Overview of distributed systems Introduc?on to reading research papers

CSCI 325: Distributed Systems. Objec?ves. Professor Sprenkle. Course overview Overview of distributed systems Introduc?on to reading research papers CSCI 325: Distributed Systems Professor Sprenkle Objec?ves Course overview Overview of distributed systems Introduc?on to reading research papers Sept 8, 2017 Sprenkle - CSCI 325 2 1 Distributed Systems?

More information

Does Decentralization Lessen or Worsen Poverty? Evidence from

Does Decentralization Lessen or Worsen Poverty? Evidence from Does Decentralization Lessen or Worsen Poverty? Evidence from Post- Big Bang Indonesia* SUDARNO SUMARTO Senior fellow, SMERU Research Institute Policy adviser, National Team for the Acceleration of Poverty

More information

4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands

4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands 4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands Dr. Peter Michielse Deputy Director 1 Agenda q Historical example: oil reservoir simulation

More information

Objec&ves. Usability Project Discussion. May 9, 2016 Sprenkle - CSCI335 1

Objec&ves. Usability Project Discussion. May 9, 2016 Sprenkle - CSCI335 1 Objec&ves Usability Project Discussion May 9, 2016 Sprenkle - CSCI335 1 JavaScript review True or False: JavaScript is just like Java How do you declare a variable? (2 ways) How do you write text to the

More information

CS 5523 Operating Systems: Intro to Distributed Systems

CS 5523 Operating Systems: Intro to Distributed Systems CS 5523 Operating Systems: Intro to Distributed Systems Instructor: Dr. Tongping Liu Thank Dr. Dakai Zhu, Dr. Palden Lama for providing their slides. Outline Different Distributed Systems Ø Distributed

More information

Final Review. Chenyang Lu. CSE 467S Embedded Compu5ng Systems

Final Review. Chenyang Lu. CSE 467S Embedded Compu5ng Systems Final Review Chenyang Lu CSE 467S Embedded Compu5ng Systems OS: Basic Func2ons Ø OS controls resources: q who gets the CPU; q when I/O takes place; q how much memory is allocated; q power management. Ø

More information

Servilla: Service Provisioning in Wireless Sensor Networks. Chenyang Lu

Servilla: Service Provisioning in Wireless Sensor Networks. Chenyang Lu Servilla: Provisioning in Wireless Sensor Networks Chenyang Lu Sensor Network Challenges Ø Device heterogeneity Ø Network dynamics q due to mobility and interference Ø Limited resources and energy Signal

More information

Estonian National Electoral Committee. E-Voting System. General Overview

Estonian National Electoral Committee. E-Voting System. General Overview Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.

More information

Addressing the Challenges of e-voting Through Crypto Design

Addressing the Challenges of e-voting Through Crypto Design Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University

More information

Adaptive QoS Control for Real-Time Systems

Adaptive QoS Control for Real-Time Systems Adaptive QoS Control for Real-Time Systems Chenyang Lu CSE 520S Challenges Ø Classical real-time scheduling theory relies on accurate knowledge about workload and platform. New challenges under uncertainties

More information

Question 1. Does your library plan to remain in the Federal Depository Library Program?

Question 1. Does your library plan to remain in the Federal Depository Library Program? Bender, Trudy L. From: fdlp [fdlp@gpo.gov] Sent: Friday, February 08, 2008 8:36 AM To: Bender, Trudy L. Cc: Acton, Susan J. Subject: Biennial Survey 0025B 2007 Biennial Survey of Federal Depository Libraries

More information

Internet of Things Wireless Sensor Networks. Chenyang Lu

Internet of Things Wireless Sensor Networks. Chenyang Lu Internet of Things Wireless Sensor Networks Chenyang Lu Internet of Things Ø Convergence of q Miniaturized hardware: processor+sensors+wireless q Low-power wireless: connect millions of devices to the

More information

Analysis of Social Voting Patterns on Digg

Analysis of Social Voting Patterns on Digg Analysis of Social Voting Patterns on Digg Kristina Lerman Aram Galstyan USC Information Sciences Institute {lerman,galstyan}@isi.edu Content, content everywhere and not a drop to read Explosion of user-generated

More information

bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc.

bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc. bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc. Page 1 TABLE OF CONTENTS Introduction to Cryptocurrency 3 Plan

More information

IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM

IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM PROJECT REFERENCE NO.: 39S_BE_1662 COLLEGE BRANCH GUIDE STUDETS : AMRUTHA INSTITUTE OF ENGINEERING AND MANAGEMENT SCIENCE, BENGALURU : DEPARTMENT

More information

Telephone Survey. Contents *

Telephone Survey. Contents * Telephone Survey Contents * Tables... 2 Figures... 2 Introduction... 4 Survey Questionnaire... 4 Sampling Methods... 5 Study Population... 5 Sample Size... 6 Survey Procedures... 6 Data Analysis Method...

More information

Case: 1:16-cv Document #: 586 Filed: 01/03/18 Page 1 of 10 PageID #:10007 FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION

Case: 1:16-cv Document #: 586 Filed: 01/03/18 Page 1 of 10 PageID #:10007 FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION Case: 1:16-cv-08637 Document #: 586 Filed: 01/03/18 Page 1 of 10 PageID #:10007 FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION IN RE BROILER CHICKEN ANTITRUST LITIGATION This Document Relates To:

More information

Cyber-Physical Systems Scheduling

Cyber-Physical Systems Scheduling Cyber-Physical Systems Scheduling ICEN 553/453 Fall 2018 Prof. Dola Saha 1 Quick Recap 1. What characterizes the memory architecture of a system? 2. What are the issues with heaps in embedded/real-time

More information

Outline. From Pixels to Semantics Research on automatic indexing and retrieval of large collections of images. Research: Main Areas

Outline. From Pixels to Semantics Research on automatic indexing and retrieval of large collections of images. Research: Main Areas From Pixels to Semantics Research on automatic indexing and retrieval of large collections of images James Z. Wang PNC Technologies Career Development Professorship School of Information Sciences and Technology

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This

More information

Data 100. Lecture 9: Scraping Web Technologies. Slides by: Joseph E. Gonzalez, Deb Nolan

Data 100. Lecture 9: Scraping Web Technologies. Slides by: Joseph E. Gonzalez, Deb Nolan Data 100 Lecture 9: Scraping Web Technologies Slides by: Joseph E. Gonzalez, Deb Nolan deborah_nolan@berkeley.edu hellerstein@berkeley.edu? Last Week Visualization Ø Tools and Technologies Ø Maplotlib

More information

Combating Friend Spam Using Social Rejections

Combating Friend Spam Using Social Rejections Combating Friend Spam Using Social Rejections Qiang Cao Duke University Michael Sirivianos Xiaowei Yang Kamesh Munagala Cyprus Univ. of Technology Duke University Duke University Friend Spam in online

More information

Maps and Hash Tables. EECS 2011 Prof. J. Elder - 1 -

Maps and Hash Tables. EECS 2011 Prof. J. Elder - 1 - Maps and Hash Tables - 1 - Outline Ø Maps Ø Hashing Ø Multimaps Ø Ordered Maps - 2 - Learning Outcomes Ø By understanding this lecture, you should be able to: Ø Outline the ADT for a map and a multimap

More information

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA. Plaintiff, Defendant.

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA. Plaintiff, Defendant. Case :-cv-00-cab-ksc Document Filed 0/0/ Page of 0 0 MALIBU MEDIA, LLC, v. JOHN DOE subscriber assigned IP address 0..0., UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA Plaintiff, Defendant.

More information

Constraint satisfaction problems. Lirong Xia

Constraint satisfaction problems. Lirong Xia Constraint satisfaction problems Lirong Xia Spring, 2017 Project 1 Ø You can use Windows Ø Read the instruction carefully, make sure you understand the goal search for YOUR CODE HERE Ø Ask and answer questions

More information

Cluster Analysis. (see also: Segmentation)

Cluster Analysis. (see also: Segmentation) Cluster Analysis (see also: Segmentation) Cluster Analysis Ø Unsupervised: no target variable for training Ø Partition the data into groups (clusters) so that: Ø Observations within a cluster are similar

More information

Estimating the Margin of Victory for Instant-Runoff Voting

Estimating the Margin of Victory for Instant-Runoff Voting Estimating the Margin of Victory for Instant-Runoff Voting David Cary Abstract A general definition is proposed for the margin of victory of an election contest. That definition is applied to Instant Runoff

More information

The Open Biometrics Initiative and World Card

The Open Biometrics Initiative and World Card The Open Biometrics Initiative and World Card Notes on RealTechSupport for Biometrics Marc Böhlen, MediaRobotics Lab, University at Buffalo Out-collect the data collectors WhatTheHack2005, The Netherlands

More information

Key Considerations for Implementing Bodies and Oversight Actors

Key Considerations for Implementing Bodies and Oversight Actors Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made

More information

Local differential privacy

Local differential privacy Local differential privacy Adam Smith Penn State Bar-Ilan Winter School February 14, 2017 Outline Model Ø Implementations Question: what computations can we carry out in this model? Example: randomized

More information

Subreddit Recommendations within Reddit Communities

Subreddit Recommendations within Reddit Communities Subreddit Recommendations within Reddit Communities Vishnu Sundaresan, Irving Hsu, Daryl Chang Stanford University, Department of Computer Science ABSTRACT: We describe the creation of a recommendation

More information

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case Yevgeniy Dodis Department of Computer Science New York University Email: dodis@cs.nyu.edu Moti Yung Department of Computer Science

More information

Decentralised solutions for renewable energies and water in developing countries

Decentralised solutions for renewable energies and water in developing countries Decentralised solutions for renewable energies and water in developing countries Energy and Water Solu0ons in sub- Saharan Africa 16. - 17. October 2014 Radolfzell at Lake Constance, Germany Dr. Julia

More information

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 -

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 - Comparison Sorts - 1 - Sorting Ø We have seen the advantage of sorted data representations for a number of applications q Sparse vectors q Maps q Dictionaries Ø Here we consider the problem of how to efficiently

More information

Florida Supreme Court Standards for Electronic Access to the Courts

Florida Supreme Court Standards for Electronic Access to the Courts Florida Supreme Court Standards for Electronic Access to the Courts Adopted June 2009 Adopted modifications August 2017 Version 18.0 TABLE OF CONTENTS 1.0. PORTAL TECHNOLOGY STANDARDS... 4 2.0 PORTAL FUNCTIONALITY...

More information

HISTORY GEOSHARE, DRINET, U2U

HISTORY GEOSHARE, DRINET, U2U INTEGRATING HUBZERO AND IRODS GEOSPATIAL DATA MANAGEMENT FOR COLLABORATIVE SCIENTIFIC RESEARCH Rajesh Kalyanam, Robert Campbell, Samuel Wilson, Pascal Meunier, Lan Zhao, Elizabett Hillery, Carol Song Purdue

More information

Polydisciplinary Faculty of Larache Abdelmalek Essaadi University, MOROCCO 3 Department of Mathematics and Informatics

Polydisciplinary Faculty of Larache Abdelmalek Essaadi University, MOROCCO 3 Department of Mathematics and Informatics International Journal of Pure and Applied Mathematics Volume 115 No. 4 2017, 801-812 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 10.12732/ijpam.v115i4.13

More information

Text UI. Data Store Ø Example of a backend to a real Could add a different user interface. Good judgment comes from experience

Text UI. Data Store Ø Example of a backend to a real Could add a different user interface. Good judgment comes from experience Reviewing Lab 10 Text UI Created two classes Ø Used one class within another class Ø Tested them Graphical UI Backend Data Store Ø Example of a backend to a real applica@on Could add a different user interface

More information

Maps, Hash Tables and Dictionaries

Maps, Hash Tables and Dictionaries Maps, Hash Tables and Dictionaries Chapter 9-1 - Outline Ø Maps Ø Hashing Ø Dictionaries Ø Ordered Maps & Dictionaries - 2 - Outline Ø Maps Ø Hashing Ø Dictionaries Ø Ordered Maps & Dictionaries - 3 -

More information

Applica'on of UQ Principles to Calibra'on, Sensi'vity, and Experimental Design

Applica'on of UQ Principles to Calibra'on, Sensi'vity, and Experimental Design Applica'on of UQ Principles to Calibra'on, Sensi'vity, and Experimental Design Omar Knio Center for Material Genomics Mechanical Engineering and Materials Science Duke University SRI Center for Uncertainty

More information

Supreme Court of Florida

Supreme Court of Florida Supreme Court of Florida No. AOSC16-66 IN RE: JUROR SELECTION PLAN: PASCO COUNTY ADMINISTRATIVE ORDER Section 40.225, Florida Statutes, provides for the selection of jurors to serve within the county by

More information

Electronic Voting Service Using Block-Chain

Electronic Voting Service Using Block-Chain Journal of Digital Forensics, Security and Law Volume 11 Number 2 Article 8 2016 Electronic Voting Service Using Block-Chain Kibin Lee Korea University Joshua I. James Hallym University, joshua+jdfsl@dfir.science

More information

Election Audit Report for Pinellas County, FL. March 7, 2006 Elections Using Sequoia Voting Systems, Inc. ACV Edge Voting System, Release Level 4.

Election Audit Report for Pinellas County, FL. March 7, 2006 Elections Using Sequoia Voting Systems, Inc. ACV Edge Voting System, Release Level 4. Division of Elections Election Audit Report for Pinellas County, FL March 7, 2006 Elections Using Sequoia Voting Systems, Inc. ACV Edge Voting System, Release Level 4.2 May 24, 2006 Prepared by: Bureau

More information

Colorado Secretary of State Election Rules [8 CCR ]

Colorado Secretary of State Election Rules [8 CCR ] Rule 25. Post-election audit 25.1 Definitions. As used in this rule, unless stated otherwise: 25.1.1 Audit Center means the page or pages of the Secretary of State s website devoted to risk-limiting audits.

More information

NetTest A European Solution from Austria for measuring Broadband Quality SERENTSCHY.COM ADVISORY SERVICES GMBH

NetTest A European Solution from Austria for measuring Broadband Quality SERENTSCHY.COM ADVISORY SERVICES GMBH NetTest A European Solution from Austria for measuring Broadband Quality NetTest - Background Ø 2011, the Austrian Telecom Regulatory Authority RTR developed a new concept for measuring broadband quality

More information

2014 Second Chance Act Planning and Implementa4on (P&I) Guide

2014 Second Chance Act Planning and Implementa4on (P&I) Guide 2014 Second Chance Act Planning and Implementa4on (P&I) Guide Cynthia Thaler, Program Associate Council of State Governments Jus4ce Center December 4, 2014 Council of State Governments Jus4ce Center 1

More information

Towards Large Eddy Simulation for Turbo-machinery Flows

Towards Large Eddy Simulation for Turbo-machinery Flows Towards Large Eddy Simulation for Turbo-machinery Flows Z.J. Wang (zjwang.com) Department of Aerospace Engineering University of Kansas, Lawrence, Kansas Presented at International Conference on Flow Physics

More information

Natural Language Technologies for E-Rulemaking. Claire Cardie Department of Computer Science Cornell University

Natural Language Technologies for E-Rulemaking. Claire Cardie Department of Computer Science Cornell University Natural Language Technologies for E-Rulemaking Claire Cardie Department of Computer Science Cornell University An E-Rulemaking Scenario Summarize the public commentary regarding the prohibition of potassium

More information

FREQUENTLY ASKED QUESTION

FREQUENTLY ASKED QUESTION 1. What is ACES Project of CBEC? FREQUENTLY ASKED QUESTION CBEC has rolled-out a new centralized, web-based and workflow-based software application called Automation of Central Excise and Service Tax (ACES)

More information

Response to the Report Evaluation of Edison/Mitofsky Election System

Response to the Report Evaluation of Edison/Mitofsky Election System US Count Votes' National Election Data Archive Project Response to the Report Evaluation of Edison/Mitofsky Election System 2004 http://exit-poll.net/election-night/evaluationjan192005.pdf Executive Summary

More information

Towards a Practical, Secure, and Very Large Scale Online Election

Towards a Practical, Secure, and Very Large Scale Online Election Towards a Practical, Secure, and Very Large Scale Online Election Jared Karro and Jie Wang Division of Computer Science The University of North Carolina at Greensboro Greensboro, NC 27402, USA Email: {jqkarro,

More information

Ballot Reconciliation Procedure Guide

Ballot Reconciliation Procedure Guide Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most

More information

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 Demonstration Time: Scheduled Breaks: Demonstration Format: 9:00 AM 4:00 PM 10:15 AM 10:30

More information

Real-Time Wireless Control Networks for Cyber-Physical Systems

Real-Time Wireless Control Networks for Cyber-Physical Systems Real-Time Wireless Control Networks for Cyber-Physical Systems Chenyang Lu Cyber-Physical Systems Laboratory Department of Computer Science and Engineering Wireless Control Networks Ø Real-time Sensor

More information

Belton I.S.D. Records Management Policy and Procedural Manual. Compiled by: Record Management Committee

Belton I.S.D. Records Management Policy and Procedural Manual. Compiled by: Record Management Committee Belton I.S.D. Records Management Policy and Procedural Manual Compiled by: Record Management Committee Table of Contents I. Definitions and Purpose Pages 3-5 II. Roles and Responsibilities Pages 6-8 III.

More information

Report for the Associated Press. November 2015 Election Studies in Kentucky and Mississippi. Randall K. Thomas, Frances M. Barlas, Linda McPetrie,

Report for the Associated Press. November 2015 Election Studies in Kentucky and Mississippi. Randall K. Thomas, Frances M. Barlas, Linda McPetrie, Report for the Associated Press November 2015 Election Studies in Kentucky and Mississippi Randall K. Thomas, Frances M. Barlas, Linda McPetrie, Annie Weber, Mansour Fahimi, & Robert Benford GfK Custom

More information

Malicious URI resolving in PDFs

Malicious URI resolving in PDFs Malicious URI resolving in PDFs Valen6n HAMON Opera&onal cryptology and virology laboratory (C+V) valen6n.hamon@et.esiea- ouest.fr h

More information

SPARC Version New Features

SPARC Version New Features SPARC Version 1.5.0 New Features SPARC Request New Features: 1. Users can click Export Consolidated Request to create a.csv file from the user dashboard *This can then be saved and manipulated in Excel

More information

Coin-Vote. Abstract: Version 0.1 Sunday, 21 June, Year 7 funkenstein the dwarf

Coin-Vote. Abstract: Version 0.1 Sunday, 21 June, Year 7 funkenstein the dwarf Coin-Vote Version 0.1 Sunday, 21 June, Year 7 funkenstein the dwarf Abstract: Coin-vote is a voting system for establishing opinion and resolving disputes amongst willing participants. Rather than using

More information

SYRIAN ARAB REPUBLIC

SYRIAN ARAB REPUBLIC NEEDS AND POPULATION MONITORING REPORT POPULATION BASELINE ROUND V NOVEMBER 2015 SYRIAN ARAB REPUBLIC NPM Aleppo Team Contents 1. Background... 3 2. Methodology... 3 2.1 Classification of Target Population...

More information

Please reach out to for a complete list of our GET::search method conditions. 3

Please reach out to for a complete list of our GET::search method conditions. 3 Appendix 2 Technical and Methodological Details Abstract The bulk of the work described below can be neatly divided into two sequential phases: scraping and matching. The scraping phase includes all of

More information

Random Forests. Gradient Boosting. and. Bagging and Boosting

Random Forests. Gradient Boosting. and. Bagging and Boosting Random Forests and Gradient Boosting Bagging and Boosting The Bootstrap Sample and Bagging Simple ideas to improve any model via ensemble Bootstrap Samples Ø Random samples of your data with replacement

More information

Voting and Complexity

Voting and Complexity Voting and Complexity legrand@cse.wustl.edu Voting and Complexity: Introduction Outline Introduction Hardness of finding the winner(s) Polynomial systems NP-hard systems The minimax procedure [Brams et

More information

Concurrent Programing: Why you should care, deeply. Don Porter Portions courtesy Emmett Witchel

Concurrent Programing: Why you should care, deeply. Don Porter Portions courtesy Emmett Witchel Concurrent Programing: Why you should care, deeply Don Porter Portions courtesy Emmett Witchel 1 Uniprocessor Performance Not Scaling Performance (vs. VAX-11/780) 10000 1000 100 10 1 20% /year 52% /year

More information

Introduction-cont Pattern classification

Introduction-cont Pattern classification How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something

More information

VoteCastr methodology

VoteCastr methodology VoteCastr methodology Introduction Going into Election Day, we will have a fairly good idea of which candidate would win each state if everyone voted. However, not everyone votes. The levels of enthusiasm

More information

An Application of time stamped proxy blind signature in e-voting

An Application of time stamped proxy blind signature in e-voting An Application of time stamped oxy blind signature in e-voting Suryakanta Panda Department of Computer Science NIT, Rourkela Odisha, India Suryakanta.silu@gmail.com Santosh Kumar Sahu Department of computer

More information

Measurement and Analysis of an Online Content Voting Network: A Case Study of Digg

Measurement and Analysis of an Online Content Voting Network: A Case Study of Digg Measurement and Analysis of an Online Content Voting Network: A Case Study of Digg Yingwu Zhu Department of CSSE, Seattle University Seattle, WA 9822, USA zhuy@seattleu.edu ABSTRACT In online content voting

More information

Google App Engine 8/10/17. CS Cloud Compu5ng Systems--Summer II 2017

Google App Engine 8/10/17. CS Cloud Compu5ng Systems--Summer II 2017 Google App Engine CS 6030--Cloud Compu5ng Systems--Summer II 2017 WESTERN MICHIGAN UNIVERSITY Professor: Dr. AJAY K. GUPTA SubmiPed by: JAPINDER PAL SINGH GHOTRA Contents Ø Introduc/on Ø Key Features Ø

More information

A Retrospective Study of State Aid Control in the German Broadband Market

A Retrospective Study of State Aid Control in the German Broadband Market A Retrospective Study of State Aid Control in the German Broadband Market Tomaso Duso 1 Mattia Nardotto 2 Jo Seldeslachts 3 1 DIW Berlin, TU Berlin, Berlin Centre for Consumer Policies, CEPR, and CESifo

More information

Feasibility Study on a system for Registration of Albanian Emigrants TO BE. June, 30P

Feasibility Study on a system for Registration of Albanian Emigrants TO BE. June, 30P P 2005 Feasibility Study on a system for Registration of Albanian Emigrants TO BE June, 30P th 1 TU1UT TUSystem s TU2UT TUCollateral TU3UT TURisk TU4UT TUProposed TU5UT TUCost TU6UT TUTable 38 39 39 Index

More information

Position Paper IDENT Implementation for U.S. VISIT

Position Paper IDENT Implementation for U.S. VISIT Position Paper IDENT Implementation for U.S. VISIT LDENT Proven Value o Currently supporting 14,000+ trained active users and over 2,200 workstations (including international locations) o Currently approximate1

More information

Minimum Spanning Tree Union-Find Data Structure. Feb 28, 2018 CSCI211 - Sprenkle. Comcast wants to lay cable in a neighborhood. Neighborhood Layout

Minimum Spanning Tree Union-Find Data Structure. Feb 28, 2018 CSCI211 - Sprenkle. Comcast wants to lay cable in a neighborhood. Neighborhood Layout Objec&ves Minimum Spanning Tree Union-Find Data Structure Feb, 0 CSCI - Sprenkle Started teasing out some algorithms. Laying Cable Focus on commonality: what should our final solution look like? Comcast

More information

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems. Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities

More information

CONCRETE: A benchmarking framework to CONtrol and Classify REpeatable Testbed Experiments

CONCRETE: A benchmarking framework to CONtrol and Classify REpeatable Testbed Experiments CONCRETE: A benchmarking framework to CONtrol and Classify REpeatable Testbed Experiments Stratos Keranidis* Wei Liu, Michael Mehari, Pieter Becue, Stefan Bouckaert, Ingrid Moerman, Thanasis Korakis*,

More information

User s Guide and Codebook for the ANES 2016 Time Series Voter Validation Supplemental Data

User s Guide and Codebook for the ANES 2016 Time Series Voter Validation Supplemental Data User s Guide and Codebook for the ANES 2016 Time Series Voter Validation Supplemental Data Ted Enamorado Benjamin Fifield Kosuke Imai January 20, 2018 Ph.D. Candidate, Department of Politics, Princeton

More information

Protocol to Check Correctness of Colorado s Risk-Limiting Tabulation Audit

Protocol to Check Correctness of Colorado s Risk-Limiting Tabulation Audit 1 Public RLA Oversight Protocol Stephanie Singer and Neal McBurnett, Free & Fair Copyright Stephanie Singer and Neal McBurnett 2018 Version 1.0 One purpose of a Risk-Limiting Tabulation Audit is to improve

More information