The profusion of wireless communications in homes, in coffee shops and even on battlefields presents us with fantastic new conveniences -- but also new security problems. Indiana University computer scientist Markus Jakobsson will discuss "stealth" attacks over wireless networks, which can disrupt communications and endanger personal information. One such attack is "denial of service," in which devices are overloaded with so much incoming information they cease functioning properly.
Jakobsson will also discuss "man in the middle" attacks, in which a miscreant invisibly inserts himself into the communication path of two wireless devices, such as cell phones, PDAs, or wireless-enabled laptop computers.
By manipulating software protocols, a man-in-the-middle attacker can silently pass information between two legitimate points while listening in to the wireless conversation, gleaning sensitive personal information or just plain sabotaging the connection. Stealth attacks over wireless networks threaten the security of personal information, online banking and purchasing. Such attacks may also endanger military personnel, who increasingly rely on wireless communications for maneuvering orders and reconnaissance. Defending against stealth attacks in the civilian sector, Jakobsson argues, will require a concerted effort to develop and distribute new software.
Supercomputing the emergence of material behavior
18.05.2018 | University of Texas at Austin, Texas Advanced Computing Center
Keeping a Close Eye on Ice Loss
18.05.2018 | Alfred-Wegener-Institut, Helmholtz-Zentrum für Polar- und Meeresforschung
A research team led by physicists at the Technical University of Munich (TUM) has developed molecular nanoswitches that can be toggled between two structurally different states using an applied voltage. They can serve as the basis for a pioneering class of devices that could replace silicon-based components with organic molecules.
The development of new electronic technologies drives the incessant reduction of functional component sizes. In the context of an international collaborative...
At the LASYS 2018, from June 5th to 7th, the Laser Zentrum Hannover e.V. (LZH) will be showcasing processes for the laser material processing of tomorrow in hall 4 at stand 4E75. With blown bomb shells the LZH will present first results of a research project on civil security.
At this year's LASYS, the LZH will exhibit light-based processes such as cutting, welding, ablation and structuring as well as additive manufacturing for...
There are videos on the internet that can make one marvel at technology. For example, a smartphone is casually bent around the arm or a thin-film display is rolled in all directions and with almost every diameter. From the user's point of view, this looks fantastic. From a professional point of view, however, the question arises: Is that already possible?
At Display Week 2018, scientists from the Fraunhofer Institute for Applied Polymer Research IAP will be demonstrating today’s technological possibilities and...
So-called quantum many-body scars allow quantum systems to stay out of equilibrium much longer, explaining experiment | Study published in Nature Physics
Recently, researchers from Harvard and MIT succeeded in trapping a record 53 atoms and individually controlling their quantum state, realizing what is called a...
The historic first detection of gravitational waves from colliding black holes far outside our galaxy opened a new window to understanding the universe. A...
02.05.2018 | Event News
13.04.2018 | Event News
12.04.2018 | Event News
24.05.2018 | Ecology, The Environment and Conservation
24.05.2018 | Medical Engineering
24.05.2018 | Physics and Astronomy