Sector Discrimination: Sector Identification with Similarity Digest Fingerprints
|
|
- Margery Robertson
- 6 years ago
- Views:
Transcription
1 Sector Discrimination: Sector Identification with Similarity Digest Fingerprints Vassil Roussev 1
2 Problem: given a set of fragments, iden4fy the original ar4fact. Source objects (files) v Disk fragments (sectors) Network fragments (packets) Fragments of interest are 1-4KB in size Fragment alignment is arbitrary; fragment size may vary. 2
3 Key idea: generate a similarity digest to enable approximate matching. SD fingerprint features Accuracy: >99% identification (@4KB) Efficiency: ~3% of the original data Scalability: compare objects of any size Performance: expected to be I/O-bound (100 MB/s) 3
4 SD fingerprint: local representa4on using sta4s4cally improbable features. Each Bloom filter (BF) represents, on average, 8KB. 4
5 SD comparison is based on all- pairs comparison of BFs. For fragments up to 8KB, the SD fingerprint is a single Bloom filter. 5
6 SD comparison is approximate fragments may be represented in two BFs. Bloom filters are compared bitwise greater overlap signifies greater overlap between the respective data sources. 6
7 Improved feature selec4on is achieved by filtering out low- entropy content. Data with low information content 7
8 Results: Success & Error Rates Correctly classified Misclassified: FP + FN Not classified All fragments The algorithm favors rejection of weak data (low-entropy fragments) over false positives. 8
9 Test Cases 7 x 100MB sets: doc html jpg rnd pdf txt xls Four fragment sizes: 512, 1024, 2048, & 4096 bytes 9
10 Detec4on Rates > for C t = 20 10
11 Non- classifica4on Rates 11
12 Typical Misclassifica4on (MC) Behavior 0 < MC <= for C t = 20 12
13 Summary of Misclassifica4on Rate Ranges 13
14 Conclusions Developed a robust, scalable fragment identification methodology. Accuracy >99%, due to filtering of weak features Implementation: sdhash The same tool can be used to detect file versions, such as updates libraries/executables. 14
15 Future Work Performance optimization: 100 MB/s Hash the NSRL and other corpora Evaluate effectiveness of version detection Combine with sector discrimination Multi-resolution implementation 15
16 Digital Forensic Research Conference Aug 1-3, 2011 New Orleans, LA An Evaluation of Forensic Similarity Hashes Vassil Roussev
17 Agenda Ø Intro o Motivation, problems, goals, requirements, Ø High- level tool design Ø Evalua4on studies Ø Current/planned sdhash infrastructure Ø Quick demo (4me permiung) Ø Q & A 17
18 Mo4va4on: Tradi4onal Filtering Approaches Fail Ø Known file filtering: o Crypto- hash known ;iles, store in library (e.g. NSRL) o Hash ;iles on target o Filter in/out depending on interest Ø Challenges o Static libraries are falling behind Dynamic sovware updates, trivial ar4fact transforma4ons è We need version correla4on o Need to ;ind embedded objects Block/file in file/volume/network trace o Need higher- level correlations Disk- to- RAM Disk- to- network 18
19 Similarity Hash Requirements/Scenarios Ø Iden4fica4on of embedded/trace evidence o Needle in a haystack Ø Iden4fica4on of code versions o File- to- ;ile correlation Ø Iden4fica4on of related documents o File- to- ;ile correlation Ø Correla4on of RAM and disk sources o Different representation of same objects Ø Correla4on of network and disk sources o Fragmentation/alignment issues o No ;low reconstruction 19
20 Exis4ng Similarity Hashing: ssdeep Ø Context- triggered piecewise hashing o Developed by Jesse Kornblum (2006) o An adaptation of an early spam ;iltering algorithm Ø General idea o Break up the ;ile into chunks o Generate a 6- bit hash for each chunk o Concatenate the hashes to obtain the ;ile signature: 24576:fBovHm8YnR/tDn7uSt8P8SRLAD/5Qvhfpt8P8SRLm:mvHKnx5C868MAD/5uz68Mm, file.pdf" o Treat the signatures as strings; use edit distance to estimate similarity 20
21 ssdeep: Problems Ø Methodology (random polynomial fingerprin4ng) o Works well on mid- /high- entropy data Text/compressed data o Degenerates on lower- entropy data Uneven coverage Many false posi4ves o Dif;icult to ;ix Ø Design o Fixed- size signature (does not scale) o Distance metric choice (edit distance) is questionable è Fixes essen4ally require a new tool 21
22 sdhash: Similarity Digests Ø Terminology: o Feature: a 64- byte sequence (other varia8ons are possible) Ø Idea: o Consider all features: Compute rolling entropy measure o Filter out low- entropy/extreme high entropy ones o From each neighborhood, pick the rarest ones Based on entropy score and empirical observa4ons o Hash selected features and put into a Bloom ;ilter Bloom filter == probabilis4c, compressed set representa4on o Create more ;ilters as necessary o Signature is a sequence of Bloom ;ilters 22
23 Feature Selec4on data selected 3iltered out 23
24 Similarity Digest Signature ~7-8KB data 128 features (up to) 128 features f 1 f 2 f 3 f bytes On average, a 256- byte filter represents 7-8KB chunk of the original data. Digest size is ~3% of original data (could be smaller). (No original data is stored.) 24
25 Similarity Digest Comparison g 1 g 2 g 3 g m f 1 D(f 1, g 1 ) D(f 1, g 2 ) D(f 1, g 3 ) D(f 1, g m ) max i=1..m D(f 1, g i ) f 2 f n D(f n, g 1 ) D(f n, g 2 ) D(f n, g m ) max i=1..m D(f n, g i ) S = Avg i=1..i D i 25
26 ssdeep vs. sdhash Round 1: Controlled Study Ø Controlled study o All targets generated using random data o Allows for precise control of common data o Provides a baseline for the tools capabilities o Best case scenario Ø Scenarios o Embedded object detection o Single- common- block ;ile correlation o Multiple- common- blocks ;ile correlation 26
27 Embedded Object Detec4on Target Object 27
28 Embedded Object Detec4on Target Object 27
29 Embedded Object Detec4on Target Ø Scenario implementa4on Object o o o o Generate target & object Place object randomly in target Run tools on <object, target> Do 1,000 runs changing target, object, and placement Ø Evalua4on criterion o o Given: target of ;ixed size Q: What is the smallest embedded object that can be reliably detected? Reliable detec4on == 95% + successful correla4ons 27
30 Min Embedded Block Correla4on (KB) (smaller is beder) * * max values tested 28
31 Single- Common- Block Correla4on T 1 T 2 29
32 Single- Common- Block Correla4on T 1 T 2 29
33 Single- Common- Block Correla4on T 1 T 2 29
34 Single- Common- Block Correla4on T 1 T 2 Ø Scenario implementa4on o o Generate targets & object Place object randomly in both target o Run tools on <T 1, T 2 > o Do 1,000 runs changing target, object, and placement Ø Evalua4on criterion o o Given: targets of ;ixed size Q: What is the smallest embedded object that can be reliably detected? Reliable detec4on == 95% + successful correla4ons 29
35 Min Common Block Correla4on (KB) (smaller is beder) ssdeep sdhash
36 Mul4ple- Common- Blocks Correla4on T 1 T 2 31
37 Mul4ple- Common- Blocks Correla4on T 1 T 2 31
38 Mul4ple- Common- Blocks Correla4on T 1 T 2 31
39 Mul4ple- Common- Blocks Correla4on T 1 T 2 Ø Scenario implementa4on o Generate targets & object; split object in 4/8 pieces o Place pieces randomly in both target o Run tools on <T 1, T 2 > o Do 1,000 runs changing target, object, and placement Ø Evalua4on criterion o Given: targets of ;ixed size, object size = ½ target size o Q: What is the probability that a tool will detect it? 31
40 Mul4ple Common Block Correla4on (Frac4on) (BIGGER is beder) 32
41 ssdeep vs. sdhash Round 2: Real Data Study Ø Real files from the NPS GovDocs1 corpus o Fundamentally, a user study Ø Q: How does byte- level correla4on map to human- perceived ar4fact correla4on? o Not all commonality is re;lected at the semantic level Ø Related files defined: o Versions of the same ;ile o Shared format/content (e.g. web layout, JPEG) o Flash evaluation: similarity obvious within 30sec 33
42 Real Data Study Ø The T5 set o GovDocs1 sample: o 4,557 ;iles, 1.8GB total o 4KB- 16.4MB Ø Evalua4on o For all unique pairs (~10 mln.) Run ssdeep Run sdhash Evaluate posi4ve results manually 34
43 Evalua4on Sta4s4cs 35
44 The Raw Numbers 16 36
45 Recall Rates: TP/Total 37
46 Precision Rates: TP/(TP+FP) 38
47 ssdeep: FP & TP substan4ally scores overlap Ø Cannot use thresholds for ROC trade off 39
48 sdhash: FP & TP scores are separable Threshold used in study Ø Thresholding is effec4ve in cheaply elimina4ng FPs 40
49 Example ssdeep false posi4ves (score: 54-86) 41
50 Evalua4on Summary Ø New hashing scheme based on similarity digests o Scalable, robust, parallelizable o Evaluated under controlled & realistic conditions o Outperforms existing work by a wide margin Recall: 95% vs. 55% Precision: 94% vs. 68% o Graceful behavior at the margin Intui4ve behavior of the similarity score Scores drop gradually as detec4on limits are approached o Meets at least three requirements More evalua4on needed for disk/network & disk/ram 42
51 Current Throughput (ver 1.3) 43
52 Current Throughput (ver 1.3) Ø Hash genera4on rate o Six- core Intel Xeon 2.93GHz ~27MB/s per core o Quad- Core Intel 2.8 GHz ~20MB/s per core 43
53 Current Throughput (ver 1.3) Ø Hash genera4on rate o Six- core Intel Xeon 2.93GHz ~27MB/s per core o Quad- Core Intel 2.8 GHz ~20MB/s per core Ø Hash comparison o 1MB vs. 1MB: 0.5ms 43
54 Current Throughput (ver 1.3) Ø Hash genera4on rate o Six- core Intel Xeon 2.93GHz ~27MB/s per core o Quad- Core Intel 2.8 GHz ~20MB/s per core Ø Hash comparison o 1MB vs. 1MB: 0.5ms Ø T5 corpus (4,457 files, all pairs) o 10mln ;ile comparisons in ~ 15min 667K file comps per second Single core 43
55 The Envisioned Architecture libsd CLI: Files: Disk: Network: Servi Cluster: Client: Client: API C/C++ C# Python 44
56 The Current State CLI: libsd Servi API Files: Disk: Network: Cluster: Client: Client: C/C++ C# Python 45
57 Todo List (1) Ø libsdbf o Ver 2.0 rewrite o Full parallelization (TBB?) o Compression (?) Ø sdhash- file o More command line options/compatibility w/ssdeep o Parallel processing o Service- based processing (w/ sdbf_d) Ø sdhash- pcap o Pcap- aware processing: payload extrac4on, file discovery, 4melining 46
58 Todo List (2) Ø sdhash- dd o Block- aware processing, compression Ø sdbf_d o Persistance: XML o Service interface: JSON o Server clustering Ø sdbfweb o Browser- based management/query Ø sdbfviz o Large- scale visualization & clustering 47
59 Further Development Ø Ø Ø Ø Integra4on w/ RDS o sdhash- set: construct SDBFs from existing SHA1 sets Compare/iden4fy whole folders, distribu4ons, etc. Structural feature selec4on o E.g., exe/dll, pdf, zip, Op4miza4ons o o o o Sampling Skipping Under min con4nuous block assump4on Cluster core extraction/comparison GPU acceleration Representa4on o o o Multi- resolution digests New crypto hashes Data offsets 48
60 Thank you! Ø hdp://roussev.net/sdhash o wget zip o make o./sdhash Ø References o V. Roussev, Data Fingerprinting with Similarity Digests, in K.- P. Chow, S. Shenoi (Eds.): Advances in Digital Forensics VI, IFIP AICT 337, pp , 2010 o V. Roussev, An Evaluation of Forensic Similarity Hashes, in DFRWS 2011 Ø Contact: Vassil Roussev vassil@roussev.net Ø Q & A 49
File Systems: Fundamentals
File Systems: Fundamentals 1 Files What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type, location, size, protection, creator,
More informationCS 5523: Operating Systems
Lecture1: OS Overview CS 5523: Operating Systems Instructor: Dr Tongping Liu Midterm Exam: Oct 2, 2017, Monday 7:20pm 8:45pm Operating System: what is it?! Evolution of Computer Systems and OS Concepts
More informationSECURE REMOTE VOTER REGISTRATION
SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current
More informationReal- Time Wireless Control Networks for Cyber- Physical Systems
Real- Time Wireless Control Networks for Cyber- Physical Systems Chenyang Lu Cyber- Physical Systems Laboratory Department of Computer Science and Engineering Wireless Control Networks Ø Real-time Ø Reliability
More informationHoboken Public Schools. PLTW Introduction to Computer Science Curriculum
Hoboken Public Schools PLTW Introduction to Computer Science Curriculum Introduction to Computer Science Curriculum HOBOKEN PUBLIC SCHOOLS Course Description Introduction to Computer Science Design (ICS)
More informationA Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset
A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset Sisi Xiong*, Feiyi Wang + and Qing Cao* *University of Tennessee Knoxville, Knoxville, TN, USA + Oak Ridge National Laboratory,
More informationLecture 6 Cryptographic Hash Functions
Lecture 6 Cryptographic Hash Functions 1 Purpose Ø CHF one of the most important tools in modern cryptography and security Ø In crypto, CHF instantiates a Random Oracle paradigm Ø In security, used in
More informationWhy Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology
Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or
More informationRecommendations For Reddit Users Avideh Taalimanesh and Mohammad Aleagha Stanford University, December 2012
Recommendations For Reddit Users Avideh Taalimanesh and Mohammad Aleagha Stanford University, December 2012 Abstract In this paper we attempt to develop an algorithm to generate a set of post recommendations
More informationProcesses. Criteria for Comparing Scheduling Algorithms
1 Processes Scheduling Processes Scheduling Processes Don Porter Portions courtesy Emmett Witchel Each process has state, that includes its text and data, procedure call stack, etc. This state resides
More informationThe Social Web: Social networks, tagging and what you can learn from them. Kristina Lerman USC Information Sciences Institute
The Social Web: Social networks, tagging and what you can learn from them Kristina Lerman USC Information Sciences Institute The Social Web The Social Web is a collection of technologies, practices and
More informationCase Study. MegaMatcher Accelerator
MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,
More informationComparison of the Psychometric Properties of Several Computer-Based Test Designs for. Credentialing Exams
CBT DESIGNS FOR CREDENTIALING 1 Running head: CBT DESIGNS FOR CREDENTIALING Comparison of the Psychometric Properties of Several Computer-Based Test Designs for Credentialing Exams Michael Jodoin, April
More informationDesigning a Social Network Prep for Lab 10. March 26, 2018 Sprenkle - CSCI Why classes and objects? How do we create new data types?
Objec(ves Designing a Social Network Prep for Lab 10 March 26, 2018 Sprenkle - CSCI111 1 Review What trends did we see in the names of students at W&L? Ø What was as you expected? Ø What surprised you?
More informationLuciano Nicastro
Luciano Nicastro nicastro@ias.o.inaf.it PI: Enzo Brocato INAF: OA Roma, Napoli, Padova, Milano + IASF Bologna University of Urbino, SNS Pisa, ASI SDC Gravitown server (OA-Roma) CPU: 24 core @ 2.4 GHz RAM:
More informationWTO Research Workshop on BLOCKCHAIN
WTO Research Workshop on BLOCKCHAIN Blockchain and International Trade: Opportunities and Challenges Lance THOMPSON Secretary, UN/CEFACT lance.thompson@un.org UNECE UN/CEFACT 27 November 2018 UN/CEFACT
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRADE/C/CEFACT/2013/MISC.2 Distr.: General 17 May 2013 Original: English Economic Commission for Europe Committee on Trade Centre for Trade Facilitation and
More informationLPGPU. Low- Power Parallel Compu1ng on GPUs. Ben Juurlink. Technische Universität Berlin. EPoPPEA workshop
LPGPU Low- Power Parallel Compu1ng on GPUs Ben Juurlink Technische Universität Berlin Cri1cal Ques1ons We Seek to Ask Power consump9on has become the cri9cal limi9ng factor in performance of processors
More informationWe should share our secrets
We should share our secrets Shamir secret sharing: how it works and how to implement it Daan Sprenkels hello@dsprenkels.com Radboud University Nijmegen 28 December 2017 Daan Sprenkels We should share our
More informationLast Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs
Last Time u Embedded networks Ø Characteristics Ø Requirements Ø Simple embedded LANs Bit banged SPI I2C LIN Ethernet Today u CAN Bus Ø Intro Ø Low-level stuff Ø Frame types Ø Arbitration Ø Filtering Ø
More informationE-DISCOVERY Will it byte you or your client? COPYRIGHT 2014 ALL RIGHTS RESERVED
E-DISCOVERY Will it byte you or your client? COPYRIGHT 2014 ALL RIGHTS RESERVED SOME TERMINOLOGY TO KNOW AND UNDERSTAND Imaged format - files designed to look like a page in the original creating application
More informationSupreme Court of Florida
Supreme Court of Florida No. AOSC18-58 IN RE: JUROR SELECTION PLAN: MIAMI-DADE COUNTY ADMINISTRATIVE ORDER Section 40.225, Florida Statutes, provides for the selection of jurors to serve within the county
More informationCSCI 325: Distributed Systems. Objec?ves. Professor Sprenkle. Course overview Overview of distributed systems Introduc?on to reading research papers
CSCI 325: Distributed Systems Professor Sprenkle Objec?ves Course overview Overview of distributed systems Introduc?on to reading research papers Sept 8, 2017 Sprenkle - CSCI 325 2 1 Distributed Systems?
More informationDoes Decentralization Lessen or Worsen Poverty? Evidence from
Does Decentralization Lessen or Worsen Poverty? Evidence from Post- Big Bang Indonesia* SUDARNO SUMARTO Senior fellow, SMERU Research Institute Policy adviser, National Team for the Acceleration of Poverty
More information4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands
4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands Dr. Peter Michielse Deputy Director 1 Agenda q Historical example: oil reservoir simulation
More informationObjec&ves. Usability Project Discussion. May 9, 2016 Sprenkle - CSCI335 1
Objec&ves Usability Project Discussion May 9, 2016 Sprenkle - CSCI335 1 JavaScript review True or False: JavaScript is just like Java How do you declare a variable? (2 ways) How do you write text to the
More informationCS 5523 Operating Systems: Intro to Distributed Systems
CS 5523 Operating Systems: Intro to Distributed Systems Instructor: Dr. Tongping Liu Thank Dr. Dakai Zhu, Dr. Palden Lama for providing their slides. Outline Different Distributed Systems Ø Distributed
More informationFinal Review. Chenyang Lu. CSE 467S Embedded Compu5ng Systems
Final Review Chenyang Lu CSE 467S Embedded Compu5ng Systems OS: Basic Func2ons Ø OS controls resources: q who gets the CPU; q when I/O takes place; q how much memory is allocated; q power management. Ø
More informationServilla: Service Provisioning in Wireless Sensor Networks. Chenyang Lu
Servilla: Provisioning in Wireless Sensor Networks Chenyang Lu Sensor Network Challenges Ø Device heterogeneity Ø Network dynamics q due to mobility and interference Ø Limited resources and energy Signal
More informationEstonian National Electoral Committee. E-Voting System. General Overview
Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.
More informationAddressing the Challenges of e-voting Through Crypto Design
Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University
More informationAdaptive QoS Control for Real-Time Systems
Adaptive QoS Control for Real-Time Systems Chenyang Lu CSE 520S Challenges Ø Classical real-time scheduling theory relies on accurate knowledge about workload and platform. New challenges under uncertainties
More informationQuestion 1. Does your library plan to remain in the Federal Depository Library Program?
Bender, Trudy L. From: fdlp [fdlp@gpo.gov] Sent: Friday, February 08, 2008 8:36 AM To: Bender, Trudy L. Cc: Acton, Susan J. Subject: Biennial Survey 0025B 2007 Biennial Survey of Federal Depository Libraries
More informationInternet of Things Wireless Sensor Networks. Chenyang Lu
Internet of Things Wireless Sensor Networks Chenyang Lu Internet of Things Ø Convergence of q Miniaturized hardware: processor+sensors+wireless q Low-power wireless: connect millions of devices to the
More informationAnalysis of Social Voting Patterns on Digg
Analysis of Social Voting Patterns on Digg Kristina Lerman Aram Galstyan USC Information Sciences Institute {lerman,galstyan}@isi.edu Content, content everywhere and not a drop to read Explosion of user-generated
More informationbitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc.
bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc. Page 1 TABLE OF CONTENTS Introduction to Cryptocurrency 3 Plan
More informationIMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM
IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM PROJECT REFERENCE NO.: 39S_BE_1662 COLLEGE BRANCH GUIDE STUDETS : AMRUTHA INSTITUTE OF ENGINEERING AND MANAGEMENT SCIENCE, BENGALURU : DEPARTMENT
More informationTelephone Survey. Contents *
Telephone Survey Contents * Tables... 2 Figures... 2 Introduction... 4 Survey Questionnaire... 4 Sampling Methods... 5 Study Population... 5 Sample Size... 6 Survey Procedures... 6 Data Analysis Method...
More informationCase: 1:16-cv Document #: 586 Filed: 01/03/18 Page 1 of 10 PageID #:10007 FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION
Case: 1:16-cv-08637 Document #: 586 Filed: 01/03/18 Page 1 of 10 PageID #:10007 FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION IN RE BROILER CHICKEN ANTITRUST LITIGATION This Document Relates To:
More informationCyber-Physical Systems Scheduling
Cyber-Physical Systems Scheduling ICEN 553/453 Fall 2018 Prof. Dola Saha 1 Quick Recap 1. What characterizes the memory architecture of a system? 2. What are the issues with heaps in embedded/real-time
More informationOutline. From Pixels to Semantics Research on automatic indexing and retrieval of large collections of images. Research: Main Areas
From Pixels to Semantics Research on automatic indexing and retrieval of large collections of images James Z. Wang PNC Technologies Career Development Professorship School of Information Sciences and Technology
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This
More informationData 100. Lecture 9: Scraping Web Technologies. Slides by: Joseph E. Gonzalez, Deb Nolan
Data 100 Lecture 9: Scraping Web Technologies Slides by: Joseph E. Gonzalez, Deb Nolan deborah_nolan@berkeley.edu hellerstein@berkeley.edu? Last Week Visualization Ø Tools and Technologies Ø Maplotlib
More informationCombating Friend Spam Using Social Rejections
Combating Friend Spam Using Social Rejections Qiang Cao Duke University Michael Sirivianos Xiaowei Yang Kamesh Munagala Cyprus Univ. of Technology Duke University Duke University Friend Spam in online
More informationMaps and Hash Tables. EECS 2011 Prof. J. Elder - 1 -
Maps and Hash Tables - 1 - Outline Ø Maps Ø Hashing Ø Multimaps Ø Ordered Maps - 2 - Learning Outcomes Ø By understanding this lecture, you should be able to: Ø Outline the ADT for a map and a multimap
More informationUNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA. Plaintiff, Defendant.
Case :-cv-00-cab-ksc Document Filed 0/0/ Page of 0 0 MALIBU MEDIA, LLC, v. JOHN DOE subscriber assigned IP address 0..0., UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA Plaintiff, Defendant.
More informationConstraint satisfaction problems. Lirong Xia
Constraint satisfaction problems Lirong Xia Spring, 2017 Project 1 Ø You can use Windows Ø Read the instruction carefully, make sure you understand the goal search for YOUR CODE HERE Ø Ask and answer questions
More informationCluster Analysis. (see also: Segmentation)
Cluster Analysis (see also: Segmentation) Cluster Analysis Ø Unsupervised: no target variable for training Ø Partition the data into groups (clusters) so that: Ø Observations within a cluster are similar
More informationEstimating the Margin of Victory for Instant-Runoff Voting
Estimating the Margin of Victory for Instant-Runoff Voting David Cary Abstract A general definition is proposed for the margin of victory of an election contest. That definition is applied to Instant Runoff
More informationThe Open Biometrics Initiative and World Card
The Open Biometrics Initiative and World Card Notes on RealTechSupport for Biometrics Marc Böhlen, MediaRobotics Lab, University at Buffalo Out-collect the data collectors WhatTheHack2005, The Netherlands
More informationKey Considerations for Implementing Bodies and Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made
More informationLocal differential privacy
Local differential privacy Adam Smith Penn State Bar-Ilan Winter School February 14, 2017 Outline Model Ø Implementations Question: what computations can we carry out in this model? Example: randomized
More informationSubreddit Recommendations within Reddit Communities
Subreddit Recommendations within Reddit Communities Vishnu Sundaresan, Irving Hsu, Daryl Chang Stanford University, Department of Computer Science ABSTRACT: We describe the creation of a recommendation
More informationExposure-Resilience for Free: The Hierarchical ID-based Encryption Case
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case Yevgeniy Dodis Department of Computer Science New York University Email: dodis@cs.nyu.edu Moti Yung Department of Computer Science
More informationDecentralised solutions for renewable energies and water in developing countries
Decentralised solutions for renewable energies and water in developing countries Energy and Water Solu0ons in sub- Saharan Africa 16. - 17. October 2014 Radolfzell at Lake Constance, Germany Dr. Julia
More informationComparison Sorts. EECS 2011 Prof. J. Elder - 1 -
Comparison Sorts - 1 - Sorting Ø We have seen the advantage of sorted data representations for a number of applications q Sparse vectors q Maps q Dictionaries Ø Here we consider the problem of how to efficiently
More informationFlorida Supreme Court Standards for Electronic Access to the Courts
Florida Supreme Court Standards for Electronic Access to the Courts Adopted June 2009 Adopted modifications August 2017 Version 18.0 TABLE OF CONTENTS 1.0. PORTAL TECHNOLOGY STANDARDS... 4 2.0 PORTAL FUNCTIONALITY...
More informationHISTORY GEOSHARE, DRINET, U2U
INTEGRATING HUBZERO AND IRODS GEOSPATIAL DATA MANAGEMENT FOR COLLABORATIVE SCIENTIFIC RESEARCH Rajesh Kalyanam, Robert Campbell, Samuel Wilson, Pascal Meunier, Lan Zhao, Elizabett Hillery, Carol Song Purdue
More informationPolydisciplinary Faculty of Larache Abdelmalek Essaadi University, MOROCCO 3 Department of Mathematics and Informatics
International Journal of Pure and Applied Mathematics Volume 115 No. 4 2017, 801-812 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 10.12732/ijpam.v115i4.13
More informationText UI. Data Store Ø Example of a backend to a real Could add a different user interface. Good judgment comes from experience
Reviewing Lab 10 Text UI Created two classes Ø Used one class within another class Ø Tested them Graphical UI Backend Data Store Ø Example of a backend to a real applica@on Could add a different user interface
More informationMaps, Hash Tables and Dictionaries
Maps, Hash Tables and Dictionaries Chapter 9-1 - Outline Ø Maps Ø Hashing Ø Dictionaries Ø Ordered Maps & Dictionaries - 2 - Outline Ø Maps Ø Hashing Ø Dictionaries Ø Ordered Maps & Dictionaries - 3 -
More informationApplica'on of UQ Principles to Calibra'on, Sensi'vity, and Experimental Design
Applica'on of UQ Principles to Calibra'on, Sensi'vity, and Experimental Design Omar Knio Center for Material Genomics Mechanical Engineering and Materials Science Duke University SRI Center for Uncertainty
More informationSupreme Court of Florida
Supreme Court of Florida No. AOSC16-66 IN RE: JUROR SELECTION PLAN: PASCO COUNTY ADMINISTRATIVE ORDER Section 40.225, Florida Statutes, provides for the selection of jurors to serve within the county by
More informationElectronic Voting Service Using Block-Chain
Journal of Digital Forensics, Security and Law Volume 11 Number 2 Article 8 2016 Electronic Voting Service Using Block-Chain Kibin Lee Korea University Joshua I. James Hallym University, joshua+jdfsl@dfir.science
More informationElection Audit Report for Pinellas County, FL. March 7, 2006 Elections Using Sequoia Voting Systems, Inc. ACV Edge Voting System, Release Level 4.
Division of Elections Election Audit Report for Pinellas County, FL March 7, 2006 Elections Using Sequoia Voting Systems, Inc. ACV Edge Voting System, Release Level 4.2 May 24, 2006 Prepared by: Bureau
More informationColorado Secretary of State Election Rules [8 CCR ]
Rule 25. Post-election audit 25.1 Definitions. As used in this rule, unless stated otherwise: 25.1.1 Audit Center means the page or pages of the Secretary of State s website devoted to risk-limiting audits.
More informationNetTest A European Solution from Austria for measuring Broadband Quality SERENTSCHY.COM ADVISORY SERVICES GMBH
NetTest A European Solution from Austria for measuring Broadband Quality NetTest - Background Ø 2011, the Austrian Telecom Regulatory Authority RTR developed a new concept for measuring broadband quality
More information2014 Second Chance Act Planning and Implementa4on (P&I) Guide
2014 Second Chance Act Planning and Implementa4on (P&I) Guide Cynthia Thaler, Program Associate Council of State Governments Jus4ce Center December 4, 2014 Council of State Governments Jus4ce Center 1
More informationTowards Large Eddy Simulation for Turbo-machinery Flows
Towards Large Eddy Simulation for Turbo-machinery Flows Z.J. Wang (zjwang.com) Department of Aerospace Engineering University of Kansas, Lawrence, Kansas Presented at International Conference on Flow Physics
More informationNatural Language Technologies for E-Rulemaking. Claire Cardie Department of Computer Science Cornell University
Natural Language Technologies for E-Rulemaking Claire Cardie Department of Computer Science Cornell University An E-Rulemaking Scenario Summarize the public commentary regarding the prohibition of potassium
More informationFREQUENTLY ASKED QUESTION
1. What is ACES Project of CBEC? FREQUENTLY ASKED QUESTION CBEC has rolled-out a new centralized, web-based and workflow-based software application called Automation of Central Excise and Service Tax (ACES)
More informationResponse to the Report Evaluation of Edison/Mitofsky Election System
US Count Votes' National Election Data Archive Project Response to the Report Evaluation of Edison/Mitofsky Election System 2004 http://exit-poll.net/election-night/evaluationjan192005.pdf Executive Summary
More informationTowards a Practical, Secure, and Very Large Scale Online Election
Towards a Practical, Secure, and Very Large Scale Online Election Jared Karro and Jie Wang Division of Computer Science The University of North Carolina at Greensboro Greensboro, NC 27402, USA Email: {jqkarro,
More informationBallot Reconciliation Procedure Guide
Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most
More informationCity of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013
City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 Demonstration Time: Scheduled Breaks: Demonstration Format: 9:00 AM 4:00 PM 10:15 AM 10:30
More informationReal-Time Wireless Control Networks for Cyber-Physical Systems
Real-Time Wireless Control Networks for Cyber-Physical Systems Chenyang Lu Cyber-Physical Systems Laboratory Department of Computer Science and Engineering Wireless Control Networks Ø Real-time Sensor
More informationBelton I.S.D. Records Management Policy and Procedural Manual. Compiled by: Record Management Committee
Belton I.S.D. Records Management Policy and Procedural Manual Compiled by: Record Management Committee Table of Contents I. Definitions and Purpose Pages 3-5 II. Roles and Responsibilities Pages 6-8 III.
More informationReport for the Associated Press. November 2015 Election Studies in Kentucky and Mississippi. Randall K. Thomas, Frances M. Barlas, Linda McPetrie,
Report for the Associated Press November 2015 Election Studies in Kentucky and Mississippi Randall K. Thomas, Frances M. Barlas, Linda McPetrie, Annie Weber, Mansour Fahimi, & Robert Benford GfK Custom
More informationMalicious URI resolving in PDFs
Malicious URI resolving in PDFs Valen6n HAMON Opera&onal cryptology and virology laboratory (C+V) valen6n.hamon@et.esiea- ouest.fr h
More informationSPARC Version New Features
SPARC Version 1.5.0 New Features SPARC Request New Features: 1. Users can click Export Consolidated Request to create a.csv file from the user dashboard *This can then be saved and manipulated in Excel
More informationCoin-Vote. Abstract: Version 0.1 Sunday, 21 June, Year 7 funkenstein the dwarf
Coin-Vote Version 0.1 Sunday, 21 June, Year 7 funkenstein the dwarf Abstract: Coin-vote is a voting system for establishing opinion and resolving disputes amongst willing participants. Rather than using
More informationSYRIAN ARAB REPUBLIC
NEEDS AND POPULATION MONITORING REPORT POPULATION BASELINE ROUND V NOVEMBER 2015 SYRIAN ARAB REPUBLIC NPM Aleppo Team Contents 1. Background... 3 2. Methodology... 3 2.1 Classification of Target Population...
More informationPlease reach out to for a complete list of our GET::search method conditions. 3
Appendix 2 Technical and Methodological Details Abstract The bulk of the work described below can be neatly divided into two sequential phases: scraping and matching. The scraping phase includes all of
More informationRandom Forests. Gradient Boosting. and. Bagging and Boosting
Random Forests and Gradient Boosting Bagging and Boosting The Bootstrap Sample and Bagging Simple ideas to improve any model via ensemble Bootstrap Samples Ø Random samples of your data with replacement
More informationVoting and Complexity
Voting and Complexity legrand@cse.wustl.edu Voting and Complexity: Introduction Outline Introduction Hardness of finding the winner(s) Polynomial systems NP-hard systems The minimax procedure [Brams et
More informationConcurrent Programing: Why you should care, deeply. Don Porter Portions courtesy Emmett Witchel
Concurrent Programing: Why you should care, deeply Don Porter Portions courtesy Emmett Witchel 1 Uniprocessor Performance Not Scaling Performance (vs. VAX-11/780) 10000 1000 100 10 1 20% /year 52% /year
More informationIntroduction-cont Pattern classification
How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something
More informationVoteCastr methodology
VoteCastr methodology Introduction Going into Election Day, we will have a fairly good idea of which candidate would win each state if everyone voted. However, not everyone votes. The levels of enthusiasm
More informationAn Application of time stamped proxy blind signature in e-voting
An Application of time stamped oxy blind signature in e-voting Suryakanta Panda Department of Computer Science NIT, Rourkela Odisha, India Suryakanta.silu@gmail.com Santosh Kumar Sahu Department of computer
More informationMeasurement and Analysis of an Online Content Voting Network: A Case Study of Digg
Measurement and Analysis of an Online Content Voting Network: A Case Study of Digg Yingwu Zhu Department of CSSE, Seattle University Seattle, WA 9822, USA zhuy@seattleu.edu ABSTRACT In online content voting
More informationGoogle App Engine 8/10/17. CS Cloud Compu5ng Systems--Summer II 2017
Google App Engine CS 6030--Cloud Compu5ng Systems--Summer II 2017 WESTERN MICHIGAN UNIVERSITY Professor: Dr. AJAY K. GUPTA SubmiPed by: JAPINDER PAL SINGH GHOTRA Contents Ø Introduc/on Ø Key Features Ø
More informationA Retrospective Study of State Aid Control in the German Broadband Market
A Retrospective Study of State Aid Control in the German Broadband Market Tomaso Duso 1 Mattia Nardotto 2 Jo Seldeslachts 3 1 DIW Berlin, TU Berlin, Berlin Centre for Consumer Policies, CEPR, and CESifo
More informationFeasibility Study on a system for Registration of Albanian Emigrants TO BE. June, 30P
P 2005 Feasibility Study on a system for Registration of Albanian Emigrants TO BE June, 30P th 1 TU1UT TUSystem s TU2UT TUCollateral TU3UT TURisk TU4UT TUProposed TU5UT TUCost TU6UT TUTable 38 39 39 Index
More informationPosition Paper IDENT Implementation for U.S. VISIT
Position Paper IDENT Implementation for U.S. VISIT LDENT Proven Value o Currently supporting 14,000+ trained active users and over 2,200 workstations (including international locations) o Currently approximate1
More informationMinimum Spanning Tree Union-Find Data Structure. Feb 28, 2018 CSCI211 - Sprenkle. Comcast wants to lay cable in a neighborhood. Neighborhood Layout
Objec&ves Minimum Spanning Tree Union-Find Data Structure Feb, 0 CSCI - Sprenkle Started teasing out some algorithms. Laying Cable Focus on commonality: what should our final solution look like? Comcast
More informationThis tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.
Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities
More informationCONCRETE: A benchmarking framework to CONtrol and Classify REpeatable Testbed Experiments
CONCRETE: A benchmarking framework to CONtrol and Classify REpeatable Testbed Experiments Stratos Keranidis* Wei Liu, Michael Mehari, Pieter Becue, Stefan Bouckaert, Ingrid Moerman, Thanasis Korakis*,
More informationUser s Guide and Codebook for the ANES 2016 Time Series Voter Validation Supplemental Data
User s Guide and Codebook for the ANES 2016 Time Series Voter Validation Supplemental Data Ted Enamorado Benjamin Fifield Kosuke Imai January 20, 2018 Ph.D. Candidate, Department of Politics, Princeton
More informationProtocol to Check Correctness of Colorado s Risk-Limiting Tabulation Audit
1 Public RLA Oversight Protocol Stephanie Singer and Neal McBurnett, Free & Fair Copyright Stephanie Singer and Neal McBurnett 2018 Version 1.0 One purpose of a Risk-Limiting Tabulation Audit is to improve
More information