Hardware Information Flow Tracking Hu, Wei; Ardeshiricham, Armaiti; Kastner, Ryan
ACM computing surveys,
07/2021, Letnik:
54, Številka:
4
Journal Article
Recenzirano
Odprti dostop
Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security ...vulnerabilities related to the design, verification, testing, manufacturing, and deployment of hardware circuits. Hardware IFT can detect unintentional design flaws, malicious circuit modifications, timing side channels, access control violations, and other insecure hardware behaviors. This article surveys the area of hardware IFT. We start with a discussion on the basics of IFT, whose foundations were introduced by Denning in the 1970s. Building upon this, we develop a taxonomy for hardware IFT. We use this to classify and differentiate hardware IFT tools and techniques. Finally, we discuss the challenges yet to be resolved. The survey shows that hardware IFT provides a powerful technique for identifying hardware security vulnerabilities, as well as verifying and enforcing hardware security properties.
Summary
The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model ...where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC model, information which a subject is not allowed to get may illegally flow to the subject. Hence, the operation interruption (OI) protocol to prevent illegal information flow is proposed in our previous studies. However, although a subject is not allowed to get data at time τ, the subject can get the data later than the time τ. Here, the data come to the subject later than expected by the subject to get the data, that is, the information flows late to the subject. In this article, we newly propose a time‐based OI (TBOI) protocol to prevent not only illegal information flow but also late information flow. Here, operations implying illegal or late information flow are interrupted, that is, not performed at devices. In the evaluation, we show not only illegal information flow but also late information flow are prevented in the TBOI protocol differently from the OI protocol.
Thermal Neuristors
In article number 2306818, Erbin Qiu and co‐workers demonstrate the first instance of direct information flow and excitatory and inhibitory interactions between cascaded neural ...layers in hardware, exclusively implemented with thermally coupled neuristors, thus eliminating the need for complicated CMOS circuits. The emergent functionalities closely resemble biological neurons, fostering progress in brain‐inspired computing.
The dynamics and influence of fake news on Twitter during the 2016 US presidential election remains to be clarified. Here, we use a dataset of 171 million tweets in the five months preceding the ...election day to identify 30 million tweets, from 2.2 million users, which contain a link to news outlets. Based on a classification of news outlets curated by www.opensources.co , we find that 25% of these tweets spread either fake or extremely biased news. We characterize the networks of information flow to find the most influential spreaders of fake and traditional news and use causal modeling to uncover how fake news influenced the presidential election. We find that, while top influencers spreading traditional center and left leaning news largely influence the activity of Clinton supporters, this causality is reversed for the fake news: the activity of Trump supporters influences the dynamics of the top fake news spreaders.
The information and technological changes have increased the flow of information, and it has crossed space and time limits. Radical changes in ICT have accelerated the rhythm of life and work. The ...rhythmic acceleration can be felt in the professional as well as personal life. Information and communication technology is widely used in today’s work culture and it is contributing to the newly growing problem known as technostress. Technostress cannot be avoided as most organizations across the globe are using digital technology. Continuous digitization significantly affects the work and workers in organizations. It has both negative as well as positive consequences but negative consequences are more as per the different studies. Numerous empirical studies have been conducted on technostress but among them, few have comprehensive reviews, which have led to fragmented information about the technostress. The main objective of this study is to review the negative implications of technostress and how to cope with them. We gathered data from published articles available in different databases. The integrative research design has been used to carry out the research. Based on the results available from different studies, we have conceptualized this study and it will help individuals and managers to be aware of technostress impacts. Organizations can manage well in time the unwanted risks that technostress brings into them. In this review article, we have shown the negative impacts of technostress and strains arising as a result of technostress along with the coping mechanism that helps to mitigate the negative outcomes of technostress.
•A paradigm, Disaster City Digital Twin, integrating AI for disaster management.•Multimodal data collection, integration, and analytics for situational awareness.•Gaming theoretical decision-making ...approach for learning behaviors of multi-actors.•Dynamic network analysis to assess network resilience and relief performance.
This paper presents a vision for a Disaster City Digital Twin paradigm that can: (i) enable interdisciplinary convergence in the field of crisis informatics and information and communication technology (ICT) in disaster management; (ii) integrate artificial intelligence (AI) algorithms and approaches to improve situation assessment, decision making, and coordination among various stakeholders; and (iii) enable increased visibility into network dynamics of complex disaster management and humanitarian actions. The number of humanitarian relief actions is growing due to the increased frequency of natural and man-made crises. Various streams of research across different disciplines have focused on ICT and AI solutions for enhancing disaster management processes. However, most of the existing research is fragmented without a common vision towards a converging paradigm. Recognizing this, this paper presents the Disaster City Digital Twin as a unifying paradigm. The four main components of the proposed Digital Twin paradigm include: multi-data sensing for data collection, data integration and analytics, multi-actor game-theoretic decision making, and dynamic network analysis. For each component, the current state of the art related to AI methods and approaches are examined and gaps are identified.
We analyze the relation between completely positive (CP) divisibility and the lack of information backflow for an arbitrary-not necessarily invertible-dynamical map. It is well known that CP ...divisibility always implies a lack of information backflow. Moreover, these two notions are equivalent for invertible maps. In this Letter, it is shown that for a map which is not invertible the lack of information backflow always implies the existence of a completely positive propagator which, however, needs not be trace preserving. Interestingly, for a wide class of image nonincreasing dynamical maps, this propagator becomes trace preserving as well, and hence, the lack of information backflow implies CP divisibility. This result sheds new light into the structure of the time-local generators giving rise to CP-divisible evolutions. We show that if the map is not invertible then positivity of dissipation/decoherence rates is no longer necessary for CP divisibility.
We experimentally simulate nonunitary quantum dynamics using a single-photon interferometric network and study the information flow between a parity-time- (PT-)symmetric non-Hermitian system and its ...environment. We observe oscillations of quantum-state distinguishability and complete information retrieval in the PT-symmetry-unbroken regime. We then characterize in detail critical phenomena of the information flow near the exceptional point separating the PT-unbroken and PT-broken regimes, and demonstrate power-law behavior in key quantities such as the distinguishability and the recurrence time. We also reveal how the critical phenomena are affected by symmetry and initial conditions. Finally, introducing an ancilla as an environment and probing quantum entanglement between the system and the environment, we confirm that the observed information retrieval is induced by a finite-dimensional entanglement partner in the environment. Our work constitutes the first experimental characterization of critical phenomena in PT-symmetric nonunitary quantum dynamics.