Turpig, botnet, Command and Controller uses Mebroot HTTP phishing for injection and control (encrypted HTTP). It could intervene to 29 different applications for launching different kind of security, privacy attacks as well as data and credential thefts on victims. Researchers from UCSB managed to control this unbriddled and sophisticated systems for ten days and gathered data for about 69 GB data, containing 168,000 infections, and 8.7GB Apache log. Here are some interesting facts :-).
Video: http://www.youtube.com/watch?v=2GdqoQJa6r4
PDF: www.cs.ucsb.edu/~kemm/courses/cs177/torpig.pdf
The blog facilitates to share research ideas, paper review, and comments among P2P researchers.
2010/06/10
2010/06/03
Social Barometers and other interesting applications to come
Social Signal Processing is a relatively new field with some interesting points of contact on Mobile (PDAs and smart devices) Social Networking. New mobile (PDA and smart devices) devices are equiped with interesting sensors that allow them to record together with the corresponding heuristics social relationships in everyday situations. For this example, gyroscopes, accelerometers, compasses, temperature sensors, etc. Interesting questions like how to use these devices to build social barometers and services that could influence social life more ubiquitely. For further investigations here are two interesting papers.
* Alessandro Vinciarelli, Maja Pantic, Herve Bourlard "Social Signal Processing: Survey of an Emerging Domain" http://www.idiap.ch/~vincia/papers/sspsurvey.pdf
* Alex Pentland et al.: MIT Media-Lab: Reality Mining Project, 2009 Publications, http://reality.media.mit.edu/publications.php
* Alessandro Vinciarelli, Maja Pantic, Herve Bourlard "Social Signal Processing: Survey of an Emerging Domain" http://www.idiap.ch/~vincia/papers/sspsurvey.pdf
* Alex Pentland et al.: MIT Media-Lab: Reality Mining Project, 2009 Publications, http://reality.media.mit.edu/publications.php
Subscribe to:
Comments (Atom)