scholarly journals The Onion Name System

2017 ◽  
Vol 2017 (1) ◽  
pp. 21-41 ◽  
Author(s):  
Jesse Victors ◽  
Ming Li ◽  
Xinwen Fu

Abstract Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced decentralized name resolution service. OnioNS allows Tor users to reference an onion service by a meaningful globally-unique verifiable domain name chosen by the onion service administrator.We construct OnioNS as an optional backwards-compatible plugin for Tor, simplify our design and threat model by embedding OnioNS within the Tor network, and provide mechanisms for authenticated denial-of-existence with minimal networking costs. We introduce a lottery-like system to reduce the threat of land rushes and domain squatting. Finally, we provide a security analysis, integrate our software with the Tor Browser, and conduct performance tests of our prototype.

Information ◽  
2020 ◽  
Vol 11 (5) ◽  
pp. 273 ◽  
Author(s):  
Mohammad Hamad ◽  
Vassilis Prevelakis

In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environment. While these improvements have increased the safety and incontestability of the automotive system, they have opened the door for new potential security threats which need to be defined, assessed, and mitigated. The SAE J3061 standard has defined threat modeling as a critical step toward the secure development process for vehicle systems, but it did not determine which method could be used to achieve this process. Therefore, many threat modeling approaches were adopted. However, using one individual approach will not identify all the threats which could target the system, and may lead to insufficient mitigation mechanisms. Thus, having complete security requires the usage of a comprehensive threat model which identifies all the potential threats and vulnerabilities. In this work, we tried to revise the existing threat modeling efforts in the vehicular domain. Also, we proposed using a hybrid method called the Software, Asset, Vulnerability, Threat, and Attacker (SAVTA)-centric method to support security analysis for vehicular systems. SAVTA combines different existing threat modeling approaches to create a comprehensive and hybridized threat model. The model is used as an aid to construct general attack trees which illustrate attack vectors that threaten a particular vehicle asset and classify these attacks under different sub-trees.


2000 ◽  
Vol 42 (4) ◽  
pp. 220-227 ◽  
Author(s):  
U M Fietzek ◽  
F Heinen ◽  
S Berweck ◽  
S Maute ◽  
A Hufschmidt ◽  
...  

Author(s):  
Leland van den Daele ◽  
Ashley Yates ◽  
Sharon Rae Jenkins

Abstract. This project compared the relative performance of professional dancers and nondancers on the Music Apperception Test (MAT; van den Daele, 2014 ), then compared dancers’ performance on the MAT with that on the Thematic Apperception Test (TAT; Murray, 1943 ). The MAT asks respondents to “tell a story to the music” in compositions written to represent basic emotions. Dancers had significantly shorter response latency and were more fluent in storytelling than a comparison group matched for gender and age. Criterion-based evaluation of dancers’ narratives found narrative emotion consistent with music written to portray the emotion, with the majority integrating movement, sensation, and imagery. Approximately half the dancers were significantly more fluent on the MAT than the TAT, while the other half were significantly more fluent on the TAT than the MAT. Dancers who were more fluent on the MAT had a higher proportion of narratives that integrated movement and imagery compared with those more fluent on the TAT. The results were interpreted as consistent with differences observed in neurological studies of auditory and visual processing, educational studies of modality preference, and the cognitive style literature. The MAT provides an assessment tool to complement visually based performance tests in personality appraisal.


Sign in / Sign up

Export Citation Format

Share Document