Remove category research-papers
article thumbnail

GhostTouch: how to remotely control touchscreens with EMI

Security Affairs

Security researchers devised a technique, dubbed GhostTouch, to remotely control touchscreens using electromagnetic signals. A team of researchers from Zhejiang University and Technical University of Darmstadt devised a technique, dubbed GhostTouch, to remotely control capacitive touchscreens using electromagnetic signals.

Paper 144
article thumbnail

Using WiFi connection probe requests to track users

Security Affairs

Researchers at the University of Hamburg demonstrated that WiFi connection probe requests expose users to track. The researchers conducted a field experiment in a German city where they captured probe requests of passersby and analyzed their content for three hours, with a focus on SSIDs and identifying information. .

Paper 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PACMAN, a new attack technique against Apple M1 CPUs

Security Affairs

The researchers who devised the attack technique speculate that the principles behind the PACMAN attacks could be used for much more than just PAC. The technique was discovered by researchers at MIT’s Computer Science & Artificial Intelligence Laboratory (CSAIL), Joseph Ravichandran , Weon Taek Na , Jay Lang , and Mengjia Yan.

article thumbnail

Insights about the first five years of Right to be Forgotten requests at Google

Elie

So in January 2016, as a preparation to providing better statistical analysis, our RTBF reviewers started manually annotating each requested URL with additional data, including the site category, the type of page content, and the requesting entity. The result of this study was published in a research paper at. paper table 3.

Privacy 118
article thumbnail

Balancing AI: Do good and avoid harm

IBM Big Data Hub

” Read the “Presidio AI Framework” paper to learn how to address generative AI risks with guardrails across the expanded AI life cycle As generative AI continues to go mainstream, organizations are excited about the potential to transform processes, reduce costs and increase business value.

article thumbnail

Unwrapping the Archives

The Texas Record

TSLAC is also a research hub for many historians writing books concerning famous, infamous, and lesser known Texas figures, places, and events. It is beautiful to watch researchers walk into the archives room not knowing what they will find and walk out with a sense of connection to their past. The records dated from the 1970s-1980s.

Archiving 106
article thumbnail

The Film Frontier: Using Films and Videos in Your National History Day Project

Unwritten Record

For many students, embarking upon archival research may feel like crossing a new frontier, but it’s nothing to be nervous about. Below you will find some ideas for how historical films may be used in the different NHD contest categories. You may choose to use a historical film or video as the subject of an NHD paper.