Página 1 dos resultados de 287 itens digitais encontrados em 0.002 segundos

Circuito alterado em três atos: abrir, tatear e multiplicar; Circuit-Bending and Hardware Hacking in trhee acts: Open, Touch and Multiply.

Fernandez, Alexandre Marino
Fonte: Biblioteca Digitais de Teses e Dissertações da USP Publicador: Biblioteca Digitais de Teses e Dissertações da USP
Tipo: Dissertação de Mestrado Formato: application/pdf
Publicado em 24/09/2013 Português
Relevância na Pesquisa
37.598352%
Nesta pesquisa analiso as metodologias de luteria experimental chamadas Circuit-Bending e Hardware Hacking, as quais englobo no termo Circuito Alterado, criado especificamente para este trabalho. Tais metodologias baseiam-se na construção de aparelhos musicais a partir da reutilização de componentes eletrônicos descartados. O principal objetivo desta dissertação é estabelecer relações contextuais entre os três atos fundamentais envolvidos na alteração de circuitos - abrir o circuito, tateá-lo em busca de sonoridades interessantes e multiplicar a metodologia, através de concertos, blogs e/ou oficinas - e questões culturais relacionadas a cada ato.; On this research I analyze the experimental luthier methodologies called Circuit-Bending and Hardware Hacking, which I call Circuito Alterado (Altered Circuits). This methodologies are based in the construction of musical instruments from the reuse of obsolete electronic components. The main goal of this dissertation is to establish contextual relationships between the tree acts involved in the methodologies - to open-up the circuit, to touch it, in the search of interesting sonorities and to multiply it, through concerts, blogs and/or workshops - and cultural issues related to each act.

Entrevista com Ian Hacking: (por Paul Kennedy e David Cayley)

Hacking,Ian
Fonte: Associação Brasileira de Psicologia Social Publicador: Associação Brasileira de Psicologia Social
Tipo: Artigo de Revista Científica Formato: text/html
Publicado em 01/12/2009 Português
Relevância na Pesquisa
27.01372%

The Extent and Consequences of P-Hacking in Science

Head, Megan L.; Holman, Luke; Lanfear, Rob; Kahn, Andrew T.; Jennions, Michael D.
Fonte: Public Library of Science Publicador: Public Library of Science
Tipo: Artigo de Revista Científica
Publicado em 13/03/2015 Português
Relevância na Pesquisa
27.684963%
A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as “p-hacking,” occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses.

The Extent and Consequences of P-Hacking in Science

Head, Megan L.; Holman, Luke; Lanfear, Rob; Kahn, Andrew T.; Jennions, Michael D.
Fonte: Public Library of Science Publicador: Public Library of Science
Tipo: Artigo de Revista Científica Formato: 15 pages
Português
Relevância na Pesquisa
27.684963%
A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as "p-hacking," occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses.; Funding for this research was provided by Australian Research Council Grants awarded to MDJ, RL and LH.

Hacking social networks examining the viability of using computer network attack against social networks

Schuhart, Russell G.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
27.01372%
Social Network Analysis (SNA) has been proposed as a tool to defeat transnational terrorist groups such as Al Qaeda. However, SNA is an descriptive tool that is a product of sociology and not an offensive tool used to attack a social network. SNA was not designed to destabilize covert networks that are difficult to observe and penetrate. This work presents a possible way to improve SNAâ s performance against a covert social network by employing the Computer Network Attack (CNA) model. The CNA model is used by computer network security to represent the traditional approach to hacking a computer network. Although not tested in this paper, it is argued that the CNA model should be able to improve the accuracy of SNA when applied to a covert social network by standardizing the destabilization process and allowing for frequent challenges of operating assumptions. A history and overview of both computer networks and social networks is covered to allow for a comparison of the two networks. The networks have enough similarities to allow the application of the CNA model without major modification from its original form. Assumptions about the security of computer and social networks are examined to clarify how the CNA model can attack a social network. The model is examined for validity and the conclusion is that the CNA model can incorporate SNA into a more methodical approach to achieve better results that using SNA alone. The final portion of the paper details a possible implementation of the CNA model and how it can be used as part of an offensive effort to destabilize a covert social network.

Chris Eagle: Ripples in the Gene Pool - Creating Genetic: Mutations to Survive the Vulnerability Window [video]

Eagle, Chris
Fonte: Escola de Pós-Graduação Naval Publicador: Escola de Pós-Graduação Naval
Tipo: Vídeo
Português
Relevância na Pesquisa
27.478428%
Reverse engineers often like to argue that a prime motivator for their activities is the desire to discover and patch vulnerabilities in closed-source binary software. Given the veritable plethora.. nay, Katrina-like flood of vulnerabilities being discovered on a near daily basis, one has to wonder where all these binary patches are hiding. Clearly this argument is a sham to make reverse engineers feel better about their DMCA violating activities. Now, just to be clear, there have been one or two third party binary patches released in the past year, but why haven't there been more? Is it truly a difficult task to develop such a patch or are our sights simply set too high? Is a true fix to the problem a requirement or is it sufficient to modify the vulnerable program just enough to make it immune to scripted attacks, the goal being to provide sufficient protection to survive until a vendor supplied patch can truly fix the problem. Dan Geer argued that a software monoculture is a dangerous thing leading to the rapid spread of malicious code in the event of a public vulnerability disclosure. The goal of this talk is to discuss simple yet effective measures to introduce sufficient genetic diversity into an inbred piece of software to allow it to survive in the wild until a vendor supplied update becomes available. Bio: Chris Eagle is a Defcon Black Badge holder...

Normalización del proceso de ejecución de Ethical Hacking y notificación de recomendaciones de seguridad de la información de la Universidad Autónoma de occidente: Definición de seguridad operacional

Fonte: Universidad Autónoma de Occidente; Ingeniería Informática Publicador: Universidad Autónoma de Occidente; Ingeniería Informática
Tipo: Bachelor Thesis; Pasantía Formato: PDF
Português
Relevância na Pesquisa
27.478428%
Con el ánimo de proporcionar ambientes seguros por parte de este proceso en el proyecto se analizan las metodologías de Ethical hacking, OSSTMM 3.0 e ISO 27001:2005 y 27002:2005 , para proponer cambios a este proceso tendientes a mejorar la seguridad de la institución. Se propone entonces una metodología enfocada en los servicios de Ethical hacking en donde se analizan las amenazas en forma general de algunos activos y se hace una serie de recomendaciones de ejecución basados en este servicio con la utilización de algunas herramientas ofrecida por el mercado Por otro lado, para hacer un análisis de seguridad y protección del sistema se consideran algunos activos y para ellos, según la OSSTMM, se analiza su porosidad, la cual determina la vulnerabilidad del activo correspondiente. Analizar la porosidad implica hacer un análisis de la interacciones que pueden llegar a convertirse en un problema del sistema, y por lo tanto se analizan también los controles que sobre ella se deben poner para evitar accesos no permitidos; de otro lado se hace un análisis de las limitaciones de los activos enfocadas en los posibles errores categorizadas en amenazas, debilidades, afectaciones, anomalías y exposiciones. Finalmente se hace una propuesta metodológica para el mejoramiento del sistema de gestión de la información de la universidad autónoma de occidente basada en los conceptos de Ethical hacking...

Análisis comparativo de las principales técnicas de hacking empresarial; Comparative analysis of the main business hacking techniques

Silva Castro, Larry Andrés; Rentería Córdoba, Edys Daliza; Duque Blandón, Jhon Freddy
Fonte: Universidad Tecnológica de Pereira; Facultad de Ingenierías Eléctrica, Electrónica y Ciencias de la Computación Publicador: Universidad Tecnológica de Pereira; Facultad de Ingenierías Eléctrica, Electrónica y Ciencias de la Computación
Tipo: Tese de Doutorado Formato: PDF
Português
Relevância na Pesquisa
27.598352%
se presenta el problema del acceso al conocimiento de las fuentes de riesgo empresarial frente al concepto del hacking y sus posibilidades de solución, partiendo de los inconvenientes en materia de seguridad y la incidencia de estos en todo el entorno organizacional. Se abordan los conceptos de hacking y empresa y la relación existente entre ellos junto con las políticas de seguridad para la protección de la información. Así mismo se toman en cuenta los riesgos y análisis de estos riesgos como punto de partida para conocer las probabilidades de que las amenazas se concreten, y el impacto que generan. Seguidamente se muestran los pasos a seguir por la organización para implementar la seguridad informática de acuerdo a los riesgos que se presenten. Por último se dan a conocer las técnicas de Hacking más importantes, con sus objetivos de ataque, sus consecuencias y la manera más acertada de prevenirlas y/ó detectarlas.

The Need for Specific Penalties for Hacking in Criminal Law

Oh, Sangkyo; Lee, Kyungho
Fonte: Hindawi Publishing Corporation Publicador: Hindawi Publishing Corporation
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
27.478428%
In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment.

Hacking on decoy-state quantum key distribution system with partial phase randomization

Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei
Fonte: Nature Publishing Group Publicador: Nature Publishing Group
Tipo: Artigo de Revista Científica
Publicado em 23/04/2014 Português
Relevância na Pesquisa
27.01372%
Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

Hacking, cracking y otras conductas ilícitas cometidas a través de internet

Acosta Patroni, Alejandro
Fonte: Universidad de Chile Publicador: Universidad de Chile
Tipo: Tesis
Português
Relevância na Pesquisa
27.01372%
Memoria (licenciado en ciencias jurídicas y sociales); En las páginas que siguen, intentaremos adentrarnos en este misterioso y desconocido mundo de los hackers y los crackers. En primer lugar realizaremos una aproximación a la caracterización de lo que en doctrina son los delitos informáticos, para luego, una vez despejados los conceptos básicos sobre la materia, entrar de lleno al estudio del fenómeno del hacking y el cracking, exponiendo algo de su historia, sus principales características y en particular el pensamiento que se encuentra detrás de estos comportamientos. Por su parte, en el último apartado de esta memoria expondremos cuál es el tratamiento que jurídicamente se ha dado a esta materia en nuestro país, y el intento por crear una normativa internacional que armonice las diferentes legislaciones en la lucha en contra de estos ilícitos, lo que se ha materializado a través de la llamada Convención del Cibercrimen, de reciente data aunque aún no entra plenamente en vigencia. Debemos advertir al lector de estas líneas, que tal vez en muchos puntos no encontrará planteamientos realmente novedosos sobre la materia, puesto que hemos preferido guiarnos, fundamentalmente en el tratamiento jurídico de los temas...

The thought and talk of individuals with autism: Reflections on Ian Hacking

McGeer, Victoria
Fonte: Blackwell Publishing Ltd Publicador: Blackwell Publishing Ltd
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
27.01372%
Ian Hacking proposes that ways of talking about autistic experience can shape, or even transform, what it is like to be autistic. I explore the grounds for two nonexclusive interpretations of this thesis. The informative interpretation holds that, because

Optimised quantum hacking of superconducting nanowire single-photon detectors

Tanner, Michael G.; Makarov, Vadim; Hadfield, Robert H.
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
27.01372%
We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.; Comment: Various minor corrections, including: consideration of reset mechanism from normal detection and blinded states; alternate active reset circuits; alternate readout circuits, added detail to application to QKD protocols. 15 pages, 5 figures, 1 table

Hacking on decoy-state quantum key distribution system with partial phase randomization

Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 14/07/2014 Português
Relevância na Pesquisa
27.01372%
Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum+weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.; Comment: 12 pages,4 figures

Upconversion based receivers for quantum hacking resistant quantum key distribution

Jain, Nitin; Kanter, Gregory S.
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
27.01372%
We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.; Comment: 16 pages incl. references and 5 figures. Minor revisions for improving clarity

The Ethics of Hacking: Should It Be Taught?

Radziwill, Nicole; Romano, Jessica; Shorter, Diane; Benton, Morgan
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 08/12/2015 Português
Relevância na Pesquisa
27.684963%
Poor software quality can adversely affect application security by increasing the potential for a malicious breach of a system. Because computer security and cybersecurity are becoming such relevant topics for practicing software engineers, the need for educational opportunities in this area is steadily increasing. Universities and colleges have recognized this, and have started to offer programs in cybersecurity. At face value, these new programs may not appear controversial, but developing their curriculum requires answering a complex ethical question: Should programs teach hacking to their students? Even though there are different types of hackers, media reports of cybersecurity incidents tend to reserve the "hacker" label for cyber criminals, which overlooks the value in hacking (and, by extension, teaching students to hack). This article examines the full spectrum of hacking behavior, as well as arguments for and against including hacking in education programs, and recommends that hacking skills be considered an essential component of an education and practice in software quality assurance.

Crónica de dos encuentros científicos: La conferencia internacional «Perspectives on Quine» y el simposio «Hermeneutics and the Tradition»

Peña, Lorenzo
Fonte: Conselho Superior de Investigações Científicas Publicador: Conselho Superior de Investigações Científicas
Tipo: Artículo Formato: 378789 bytes; application/pdf
Português
Relevância na Pesquisa
27.01372%
Crónica de dos encuentros filosóficos; Estos dos encuentros han versado, el uno, sobre la obra filosófica de Quine, reuniendo a un destacado elenco de especialistas, como Burton Dreben, Jerrold Katz, Strawson, Hao Wang, Ruth Barcan-Marcus, D. Davidson, Susan Haack, J. Hintikka, G. Harman, I. Hacking, J. Ullian, etc; y, el otro, sobre la relación entre la hermenéutica y la tradición de la philosophia perennis, con participación de varios filósofos católicos pero también abordando temas sobre el lenguaje, Saussure y Quine; Peer reviewed

En torno a la construcción social de la locura: Ian Hacking y la historia cultural de la psiquiatría

Huertas,Rafael
Fonte: Revista de la Asociación Española de Neuropsiquiatría Publicador: Revista de la Asociación Española de Neuropsiquiatría
Tipo: info:eu-repo/semantics/article; journal article; info:eu-repo/semantics/publishedVersion Formato: text/html; application/pdf
Publicado em 01/09/2011 Português
Relevância na Pesquisa
37.478428%
El objetivo de este trabajo es analizar la contribución del filósofo de la ciencia Ian Hacking a la historia cultural de la psiquiatría. Partiendo de conceptos propuestos por el autor, como "enfermedad mental transitoria" o "inventar/construir gente", se reflexiona en torno a la construcción socio-cultural de la enfermedad mental. Se examinan y discuten los dos estudios de caso propuestos por Hacking: la fuga disociativa y la personalidad múltiple, identificando las fortalezas y debilidades de sus planteamientos y la posible aplicación de los mismos a la historia y a la teoría psicopatológica.

Um modo de fazer filosofia: A Ontologia Histórica de Ian Hacking

Mendes,João Ribeiro
Fonte: Centro de Estudos Humanísticos da Universidade do Minho Publicador: Centro de Estudos Humanísticos da Universidade do Minho
Tipo: Artigo de Revista Científica Formato: text/html
Publicado em 01/01/2012 Português
Relevância na Pesquisa
37.478428%
Como expressou o filósofo canadiano Ian Hacking, «There are many ways to do philosophy.» (Hacking, 2002: 25). Neste ensaio de cunho mais descritivo-reconstrutivo que argumentativo procuro: (a) retratar a sua Ontologia Histórica como um método filosófico sui generis que faz significativo uso da história; (b) mostrar a especificidade da sua proposta, nomeadamente em relação à proposta homónima de Michel Foucault e ao denominado programa de investigação da Epistemologia Histórica; (c) evidenciar como a sua aplicação pode servir para renovar a compreensão de temáticas filosóficas clássicas, nomeadamente do muito debatido problema da natureza da racionalidade científica.

Classificações interativas: o caso do transtorno de déficit de atenção com hiperatividade infantil

Jerzy,Fabíola Stolf Brzozowski; Brzozowski,André; Caponi,Sandra
Fonte: Interface - Comunicação, Saúde, Educação Publicador: Interface - Comunicação, Saúde, Educação
Tipo: Artigo de Revista Científica Formato: text/html
Publicado em 01/01/2010 Português
Relevância na Pesquisa
27.301396%
O filósofo da ciência Ian Hacking diz que nosso mundo é um mundo de classificações e que essas classificações têm efeitos particulares quando se referem a comportamentos de pessoas. Neste trabalho, pretende-se discutir como o diagnóstico do Transtorno de Déficit de Atenção com Hiperatividade (TDAH) infantil pode funcionar como uma classificação e, assim, afetar o comportamento das crianças diagnosticadas. Inicialmente, é realizada uma discussão sobre a função das classificações na ciência. A partir dessas considerações, um modelo mais geral sobre a interação entre classificações e classificados é proposto, tendo como base a distinção de Ian Hacking entre tipos indiferentes e tipos interativos, e também a noção de efeito de arco proposta por esse autor. Por fim, o modelo é aplicado ao TDAH, onde são realizadas considerações relacionadas às noções de controle social de Peter Conrad.