Create an Account
username: password:
 
  MemeStreams Logo

Post Haste

search

possibly noteworthy
Picture of possibly noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

possibly noteworthy's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
Current Events
  War on Terrorism
Recreation
Local Information
  Food
Science
Society
  International Relations
  Politics and Law
   Intellectual Property
  Military
Sports
(Technology)
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Automated Whitebox Fuzz Testing
Topic: Technology 11:11 am EST, Feb  9, 2008

Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs and test the program on the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in symbolic execution and dynamic test generation. Our approach records an actual run of a program under test on a well-formed input, symbolically evaluates the recorded trace, and generates constraints capturing how the program uses its inputs. The generated constraints are used to produce new inputs which cause the program to follow different control paths. This process is repeated with the help of a code-coverage maximizing heuristic designed to find defects as fast as possible. We have implemented this algorithm in SAGE Scalable, Automated, Guided Execution, a new tool employing x86 instruction-level tracing and emulation for whitebox fuzzing of arbitrary file-reading Windows applications. We describe key optimizations needed to make dynamic test generation scale to large input files and long execution traces with hundreds of millions of instructions. We then present detailed experiments with several Windows applications. Notably, without any format-specific knowledge, SAGE detects the MS07-017 ANI vulnerability, which was missed by extensive blackbox fuzzing and static analysis tools. Furthermore, while still in an early stage of development, SAGE has already discovered 20 new bugs in large shipped Windows applications including image processors, media players, and file decoders. Several of these bugs are potentially exploitable memory access violations.

Work by Patrice Godefroid; Michael Y. Levin; David Molnar.

Automated Whitebox Fuzz Testing


Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture
Topic: Technology 7:07 am EST, Feb  7, 2008

Ronald Arkin, Georgia Tech:

This article provides the basis, motivation, theory, and design recommendations for the implementation of an ethical control and reasoning system potentially suitable for constraining lethal actions in an autonomous robotic system so that they fall within the bounds prescribed by the Laws of War and Rules of Engagement. It is based upon extensions to existing deliberative/reactive autonomous robotic architectures, and includes recommendations for (1) post facto suppression of unethical behavior, (2) behavioral design that incorporates ethical constraints from the onset, (3) the use of affective functions as an adaptive component in the event of unethical action, and (4) a mechanism in support of identifying and advising operators regarding the ultimate responsibility for the deployment of such a system.

Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture


Born Digital: Understanding the First Generation of Digital Natives
Topic: Technology 7:07 am EST, Feb  7, 2008

Due out in August.

Two leading experts explain the brave new world inhabited by "digital natives"--the first generation born and raised completely wired.

The most enduring change wrought by the digital revolution is neither the new business models nor the new search algorithms, but rather the massive generation gap between those who were born digital and those who were not. The first generation of "digital natives"--children who were born into and raised in the digital world--is now coming of age, and soon our world will be reshaped in their image. Our economy, our cultural life, even the shape of our family life will be forever transformed.

But who are these digital natives? How are they different from older generations, and what is the world they're creating going to look like? In Born Digital, leading Internet and technology experts John Palfrey and Urs Gasser offer a sociological portrait of this exotic tribe of young people who can seem, even to those merely a generation older, both extraordinarily sophisticated and strangely narrow.

Based on original research and advancing new theories, Born Digital explores a broad range of issues, from the highly philosophical to the purely practical: What does identity mean for young people who have dozens of online profiles and avatars? Should we worry about privacy issues? Or is privacy even a relevant value for digital natives? How does the concept of safety translate into an increasingly virtual world? Is "stranger-danger" a real problem, or a red herring?

A smart, practical guide to a brave new world and its complex inhabitants, Born Digital will be essential reading for parents, teachers, and the myriad of confused adults who want to understand the digital present--and shape the digital future.

Born Digital: Understanding the First Generation of Digital Natives


Movement (Schulze & Webb)
Topic: Technology 7:07 am EST, Feb  7, 2008

Two metaphors have been used successfully in designing for and thinking about the Web: the Web as a physical space, and websites as extensions of the body. The synthesis of these is what we could call Web 2.0. But now we have to contend with the importance of experience, in addition to utility, and the increasing demands on the attention of our users. A third metaphor may be reached by regarding users as trajectories, flowing through our websites. By considering the Web in motion, an approach which uses a ‘motivations flowchart’ is demonstrated, where the states of a user are used to derive features regardless of the interaction medium. And an interaction pattern is demonstrated: Snap is syndicated interactions, bringing choices users have to make away from websites and together on their desktop. Finally some challenges for the Web in 2008 are posed: other devices; groups; the future—how does Web design itself become open to amateur creativity, and what new tools should be built?

Movement (Schulze & Webb)


Risking Communications Security: Potential Hazards of the Protect America Act
Topic: Technology 8:23 pm EST, Feb  6, 2008

Architecture matters a lot, and in subtle ways.

Risking Communications Security: Potential Hazards of the Protect America Act


DNI McConnell on 'The Cyber Threat'
Topic: Technology 12:43 pm EST, Feb  6, 2008

We assess that nations, including Russia and China, have the technical capabilities to target and disrupt elements of the US information infrastructure and for intelligence collection. Nation states and criminals target our government and private sector information networks to gain competitive advantage in the commercial sector. Terrorist groups—including al-Qa’ida, HAMAS, and Hizballah—have expressed the desire to use cyber means to target the United States. Criminal elements continue to show growing sophistication in technical capability and targeting, and today operate a pervasive, mature on-line service economy in illicit cyber capabilities and services available to anyone willing to pay.

Each of these actors has different levels of skill and different intentions; therefore, we must develop flexible capabilities to counter each. It is no longer sufficient for the US Government to discover cyber intrusions in its networks, clean up the damage, and take legal or political steps to deter further intrusions. We must take proactive measures to detect and prevent intrusions from whatever source, as they happen, and before they can do significant damage.

At the President’s direction, an interagency group reviewed the cyber threat to the US and identified options regarding how best to integrate US Government defensive cyber capabilities; how best to optimize, coordinate and de-conflict cyber activities; and how to better employ cyber resources to maximize performance. This tasking was fulfilled with the January 2008 issuance of NSPD-54/HSPD-23, which directs a comprehensive national cybersecurity initiative. These actions will help to deter hostile action in cyber space by making it harder to penetrate our networks.

DNI McConnell on 'The Cyber Threat'


A taxonomy of web search
Topic: Technology 7:06 am EST, Feb  6, 2008

A 2002 paper by Andrei Broder, now at Yahoo Research, then at AltaVista.

Classic IR (information retrieval) is inherently predicated on users searching for information, the so-called "information need". But the need behind a web search is often not informational -- it might be navigational (give me the url of the site I want to reach) or transactional (show me sites where I can perform a certain transaction, e.g. shop, download a file, or find a map). We explore this taxonomy of web searches and discuss how global search engines evolved to deal with web-specific needs.

A taxonomy of web search


The History of Visual Communication
Topic: Technology 8:21 pm EST, Feb  4, 2008

This website attempts to walk you through the long and diverse history of a particular aspect of human endeavour: The translation of ideas, stories and concepts that are largely textual and/or word based into a visual format, i.e., visual communication.

The History of Visual Communication


Mother Earth Mother Board
Topic: Technology 11:54 am EST, Feb  2, 2008

In the aftermath of the cable cuts this week, it's worth revisiting a Wired classic.

The hacker tourist ventures forth across the wide and wondrous meatspace of three continents, chronicling the laying of the longest wire on Earth.

Mother Earth Mother Board


RFCVision: A tool for visualizing RFC relationships
Topic: Technology 11:41 am EST, Feb  2, 2008

Potentially useful.

RFCVision: A tool for visualizing RFC relationships


(Last) Newer << 9 ++ 19 - 20 - 21 - 22 - 23 - 24 - 25 - 26 - 27 ++ 37 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0