Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, has recently been shown to enable a slew of security attacks. All these attacks are centered around ...a common set of behaviors: During speculative execution, the architectural state of the system is kept unmodified, until the speculation can be verified. In the event that a misspeculation occurs, then anything that can affect the architectural state is reverted (squashed) and re-executed correctly. However, the same is not true for the microarchitectural state. Normally invisible to the user, changes to the microarchitectural state can be observed through various side-channels, with timing differences caused by the memory hierarchy being one of the most common and easy to exploit. The speculative side-channels can then be exploited to perform attacks that can bypass software and hardware checks in order to leak information. These attacks, out of which the most infamous are perhaps Spectre and Meltdown, have led to a frantic search for solutions.
In this work, we present our own solution for reducing the microarchitectural state-changes caused by speculative execution in the memory hierarchy. It is based on the observation that if we only allow accesses that hit in the L1 data cache to proceed, then we can easily hide any microarchitectural changes until after the speculation has been verified. At the same time, we propose to prevent stalls by value predicting the loads that miss in the L1. Value prediction, though speculative, constitutes an invisible form of speculation, not seen outside the core. We evaluate our solution and show that we can prevent observable microarchitectural changes in the memory hierarchy while keeping the performance and energy costs at 11% and 7%, respectively. In comparison, the current state of the art solution, InvisiSpec, incurs a 46% performance loss and a 51% energy increase.
This study describes the model settlement of cases through non-penal channels for crimes committed by children according to Act 11 of 2012 concerning the Juvenile Criminal Justice System with ...prioritizing restorative justice so that children who commit crimes are not stigmatized negatively. The Juvenile Criminal Justice System concept has included solving problems in a family manner or for children in conflict with the law, formally known as diversion. Diversion exists to divert the settlement of child cases from the criminal justice process to processes outside criminal justice. Diversion exists to prevent children who conflict with the law from the negative impacts of the criminal justice process on children. United Nations Standard Minimum Rules for the Administration of Juvenile (The Beijing Rules) have provided guidelines to prevent children in conflict with the law from negative impacts, namely by giving law enforcers the authority to take action in handling or resolving the problems the child offenders by not taking courts, among others stopping or not continuing or releasing or returning or handing over to society and other forms of social service activities.How to cite item: Kaimuddin, Arfan, and Hisbul Luthfi Ashsyarofi. “Model Countermeasures Children Who Commit Crimes in Review Restorative Justice.” Jurnal Cakrawala Hukum 14 no. 2(2023): 134-145. DOI: 10.26905/v14i2.10783.
The 2011 Great East Japan Tsunami exposed many hidden weaknesses in Japan's tsunami countermeasures. Since then, many improvements have been made in both structural measures (numerical simulations, ...coastal defense structures, building damage assessment and control forests) and nonstructural measures (warning/observation and evacuation). This review summarizes the lessons and improvements in the five-year time period after the 2011 event. After five years, most of the lessons from the 2011 tsunami have been applied, including more realistic tsunami simulations using very fine grids, methods to strengthen coastal defense structures, building evacuations and coastal forests, improved warning content and key points to improve evacuation measures. Nevertheless, large future challenges remain, such as an advanced simulation technique and system for real-time hazard and risk prediction, implementation of coastal defense structures/multilayer countermeasures and encouraging evacuation. In addition, among papers presented at the coastal engineering conference in Japan, the proportion of tsunami-related research in Japan increased from 15% to 35% because of the 2011 tsunami, and approximately 65-70% of tsunami-related studies involve numerical simulation, coastal structures and building damage. These results show the impact of the 2011 tsunami on coastal engineering related to academic institutions and consulting industries in Japan as well as the interest in each tsunami countermeasure.
In this paper, we address the problem of target detection in the presence of coherent (or fully correlated) signals, which can be due to multipath propagation effects or electronic attacks by smart ...jammers. To this end, we formulate the problem at hand as a multiple-hypothesis test that, besides the conventional radar alternative hypothesis, contains additional hypotheses accounting for the presence of an unknown number of interfering signals. In this context and leveraging the classification capabilities of the Model Order Selection rules, we devise penalized likelihood-ratio-based detection architectures that can establish, as a byproduct, which hypothesis is in force. Moreover, we propose a suboptimum procedure to estimate the angles of arrival of multiple coherent signals ensuring (at least for the considered parameters) almost the same performance as the exhaustive search. Finally, the performance assessment, conducted over simulated data and in comparison with conventional radar detectors, highlights that the proposed architectures can provide satisfactory performance in terms of probability of detection and correct classification.
SMoTherSpectre Bhattacharyya, Atri; Sandulescu, Alexandra; Neugschwandtner, Matthias ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
11/2019
Conference Proceeding
Spectre, Meltdown, and related attacks have demonstrated that kernels, hypervisors, trusted execution environments, and browsers are prone to information disclosure through micro-architectural ...weaknesses. However, it remains unclear as to what extent other applications, in particular those that do not load attacker-provided code, may be impacted. It also remains unclear as to what extent these attacks are reliant on cache-based side channels. We introduce SMoTherSpectre, a speculative code-reuse attack that leverages port-contention in simultaneously multi-threaded processors (SMoTher) as a side channel to leak information from a victim process. SMoTher is a fine-grained side channel that detects contention based on a single victim instruction. To discover real-world gadgets, we describe a methodology and build a tool that locates SMoTher-gadgets in popular libraries. In an evaluation on glibc, we found hundreds of gadgets that can be used to leak information. Finally, we demonstrate proof-of-concept attacks against the OpenSSH server, creating oracles for determining four host key bits, and against an application performing encryption using the OpenSSL library, creating an oracle which can differentiate a bit of the plaintext through gadgets in libcrypto and glibc.
This study is the first to scrutinize the psychological effects of online astroturfing in the context of Russia’s digitally enabled foreign propaganda. Online astroturfing is a communicative strategy ...that uses websites, “sock puppets,” or social bots to create the false impression that a particular opinion has widespread public support. We exposed N = 2353 subjects to pro-Russian astroturfing comments and tested: (1) their effects on political opinions and opinion certainty and (2) the efficiency of three inoculation strategies to prevent these effects. All effects were investigated across three issues and from a short- and long-term perspective. Results show that astroturfing comments can indeed alter recipients’ opinions, and increase uncertainty, even when subjects are inoculated before exposure. We found exclusively short-term effects of only one inoculation strategy (refutational-same). As these findings imply, preemptive media literacy campaigns should deploy (1) continuous rather than one-time efforts and (2) issue specific rather than abstract inoculation messages.
Due to the rapid development of information technology, traditional classroom teaching is not able to meet the needs of students. Therefore, colleges and universities are paying more and more ...attention to cultivating students’ individuality and comprehensive quality. The “student-centered, teacher-led” online and offline hybrid teaching mode emerged as the times require, and has become a new teaching method, which has gradually become the focus of attention of colleges and universities. In the teaching practices of colleges and universities, blended instruction has made some progress, but issues with instruction quality also arise. Upon review of the relevant literature and interviews with teachers and students, this study determined that outmoded teaching practices, lack of awareness of students’ independent learning, and absence of external conditions in colleges and universities are the most influential factors affecting the quality of mixed teaching. Based on these, corresponding measures are proposed from the perspectives of teachers, students, and schools to aid the development of blended teaching in colleges and universities and improve its effects. Teachers should continuously improve their hybrid teaching skills and ensure quality. Moreover, students should improve their sense of participation in teaching activities and develop a consciousness of independent learning. Finally, the school should improve the support structure to implement blended teaching seamlessly.
•Roadway, environmental, and driver factors associated with ROR crashes were investigated.•The analysis was carried out using the rule discovery technique.•Data refer to the crashes occurred in the ...A16 motorway, Italy in the period 2001–2011.•The analysis provided new information which was previously hidden in the data.•Countermeasures to solve or mitigate the safety issues identified in the study were proposed.
The main objective of this paper was to analyse the roadway, environmental, and driver-related factors associated with an overrepresentation of frequency and severity of run-off-the-road (ROR) crashes. The data used in this study refer to the 6167 crashes occurred in the section Naples–Candela of A16 motorway, Italy in the period from 2001 to 2011. The analysis was carried out using the rule discovery technique due to its ability of extracting knowledge from large amounts of data previously unknown and indistinguishable by investigating patterns that occur together in a given event. The rules were filtered by support, confidence, lift, and validated by the lift increase criterion. A two-step analysis was carried out. In the first step, rules discovering factors contributing to ROR crashes were identified. In the second step, studying only ROR crashes, rules discovering factors contributing to severe and fatal injury (KSI) crashes were identified. As a result, 94 significant rules for ROR crashes and 129 significant rules for KSI crashes were identified. These rules represent several combinations of geometric design, roadside, barrier performance, crash dynamic, vehicle, environmental and drivers’ characteristics associated with an overrepresentation of frequency and severity of ROR crashes. From the methodological point of view, study results show that the a priori algorithm was effective in providing new information which was previously hidden in the data. Finally, several countermeasures to solve or mitigate the safety issues identified in this study were discussed. It is worthwhile to observe that the study showed a combination of factors contributing to the overrepresentation of frequency and severity of ROR crashes. Consequently, the implementation of a combination of countermeasures is recommended.
The recent Spectre attacks have demonstrated the fundamental insecurity of current computer microarchitecture. The attacks use features like pipelining, out-of-order and speculation to extract ...arbitrary information about the memory contents of a process. A comprehensive formal microarchitectural model capable of representing the forms of out-of-order and speculative behavior that can meaningfully be implemented in a high performance pipelined architecture has not yet emerged. Such a model would be very useful, as it would allow the existence and non-existence of vulnerabilities, and soundness of countermeasures to be formally established. This paper presents such a model targeting single core processors. The model is intentionally very general and provides an infrastructure to define models of real CPUs. It incorporates microarchitectural features that underpin all known Spectre vulnerabilities. We use the model to elucidate the security of existing and new vulnerabilities, as well as to formally analyze the effectiveness of proposed countermeasures. Specifically, we discover three new (potential) vulnerabilities, including a new variant of Spectre v4, a vulnerability on speculative fetching, and a vulnerability on out-of-order execution, and analyze the effectiveness of existing countermeasures including constant time and serializing instructions.
Vesicants, from vesica (Latin for blister), can cause local and systemic toxicity. They include the chemotherapy drug nitrogen mustard and chemical warfare agents sulfur mustard, Lewisite, and ...phosgene oxime. These agents are commonly released in vapor form and consequently, eyes and skin are the most vulnerable. The ocular and cutaneous injuries can be acute, subacute, or chronic, and can predispose casualties to secondary deleterious effects. Underlying these broad organ responses are shared and tissue-specific cellular and molecular biological cascades that attempt to counteract such chemical injuries. Depending on the severity of the chemical insult, biological responses often lead to inadequate wound healing and result in long-term pathology instead. Exposure to other toxic industrial chemicals such as acrolein, chloropicrin, and hydrogen fluoride, can also cause prominent eye and skin damage. There are currently no FDA-approved drugs to counteract these injuries. Hence, the possibility of a mass casualty emergency involving these chemicals is a major public health concern. Recognizing this critical challenge, the United States Department of Health and Human Services (HHS) is committed to the development of medical countermeasures to advance national health and medical preparedness against these highly toxic chemicals. Here, we provide an overview of various HHS funding and scientific opportunities available in this space, emphasizing parallels between eye and skin response to chemical injury. We also discuss a main limitation of existing data and suggest ways to overcome it.