Helioid Preview

Thursday, February 24, 2011

A couple months ago we opened up the Helioid development version to the public, but have not yet announced it. We have recently migrated servers and tweaked algorithms and have significantly improved the performance.  There is still a lot of work to be done but we believe this reflects a healthy starting point.

The graphic below illustrates how you can use Helioid to go from a question or idea to a organized lists of results that helps you build better search queries.

Helioid infographic

This version of Helioid is a meta-search engine offering category based personalization. Below is screenshot of the results after querying Helioid:

Helioid screenshot

By interacting with the categories on the left you can choose the results to be shown on the right.  Please let us know if you have any suggestions, comments, criticisms, complaints; anything. Try out the Helioid preview now.

Thanks to Ben de Jesus for helping with site design and user experience.


Improving Result Diversity using PLSA at DIR2011

Monday, February 07, 2011

Katja and I presented a poster regarding our paper entitled "Improving Result Diversity using PLSA" at DIR 2011 on Friday.  The poster is below:

DIR 2011 Diversity with PLSA Poster

The abstract is included below. The full paper is available for download as well.

IA-SELECT is a recently developed algorithm for increasing the diversity of a search result set by reordering an original document list based on manually generated clusters. In this paper we extend this approach to create a diversification framework in which arbitrary clustering methods can be used, and where the influence of clusters can be balanced against the original rank of documents. We study whether clusters that are automatically generated using probabilistic latent semantic analysis (PLSA) can compete with manually created clusters, and investigate how balancing the influence of clusters and original document rank affects diversity scores. As there are currently few datasets for evaluating diversity, we develop a new dataset, which is released with this paper. Our results show that diversification using PLSA can improve diversity, but that there is a large gap in performance between automatically and manually created clusters.

A P2P Telecom

Monday, November 09, 2009

Update 02/2011: I just became aware of The Serval Project which addresses the same idea:

Communicate anywhere, any time … without infrastructure, without mobile towers, without satellites, without wifi hotspots, and without carriers. Use existing off-the-shelf mobile cell phone handsets. Use your existing mobile phone number wherever you go, and never pay roaming charges again.
They have code for their phone app and their distributed naming system available.

Below I present the idea for a P2P Telecom. That is, a telecom in which traffic is routed from sender to receiver through peers. Not through a central hub controlled by a company.

Cons against this implementation.

  1. You will only benefit from a P2P telecom if the people you're communicating with are using the P2P telecom.

Pros in favor of a P2P Telecom.

  1. Since users will be controlling the network, users will be setting the prices and it will benefit all users for prices to be as low as possible. This is a stark contrast to the current system where prices are set by a handful of powerful companies with little worry of losing subscribers.
  2. No additional infrastructure will need to be put in place. In fact, towers, antennas, relays, etc. can be removed from densely populated areas because they are unnecessary for a P2P Telecom to function.
  3. A P2P Telecom will have more privacy because you will trust no one but yourself and encryption levels you control. If you want to use a theoretically unbreakable but data intensive encryption protocol that's up to you and no one will know your data but you and the other user you are communicating with. Like any communications system, the privacy of a P2P Telecom is not perfect but, as any cryptographer worthy of their title will tell you, the system is open and this is leaps and bounds more secure than the closed systems of big industry telecoms.
  4. There is no centralized control. This helps to enable better data security and increased privacy, among other things. Without centralized control no one will be able to shut off the network and there will be no data overloads in case of an emergency (such as happened in New York City during September 11, 2001).
  5. There will be increased capacity. This lack of centralized control enables increased capacity and redundancy in populated areas beyond anything approachable by current industry telecoms.
  6. A P2P Telecom can transfer any form of data. Because of their popularity phone calls are the most obvious forms of data to be transferred but if desired the network can transfer anything else such as video or raw data.

It is clear to me that the pros of a P2P Telecom definitively outweigh the cons and it is time we start building this network, which turns out to be rather simple.

P2P Telecom

The Implementation of a P2P Telecom

The implementation is based on modifying the functionality of existing cell phones be they GSM, CDMA, or some other unheard of system.

Cell phones must be retrofit so they can act as peers with one another. At their core cell phones send and receive signals, these phones must be modified so that they can receive and send signals directly from and to other phones.

  1. Accomplishing this may or may not require hardware modification. If hardware modification is required we must determine how this can be done. One simple method would be the use of a modified SIM chip. If the change needed is more fundamental a systematic approach to performing it can be developed.
  2. Software modification will be required. We must:
    1. Change what type of signals the phone looks for so that it can find signals from other phones
    2. Change how the phone interprets the signals it finds so that it can interpret them as:
      • Data passing. The phone must know how to move data from itself to other peers. This will require an algorithm informing the phone of the priorities for where to forward data it receives. This algorithm will benefit from, but not require, partial location awareness of peers and unique identification of peers. This can all be done while maintaining anonymity.
      • Data receiving. The phone must know that this data is destined for it and know how to handle decoding of the data.
      • Data sending. The phone must be able to uniquely encoded it's data so it is only decodable by the receiver.

The Long Distance Uplinks in a P2P Telecom

A problem with the described P2P telecom is that if you want to call someone outside of your peer neighborhoods range or someone who doesn't use the P2P system you'll have to place the call over the existing industry telecom network. A solution to this problem is to give every P2P neighborhood an internet uplink and connect multiple neighborhoods with a VoIP services. In this manner, if either of the above situations occur, the call can be placed using VoIP technologies.

The number of peers with access to the uplink and therefore the bandwidth of the circuit between the peers and the uplink will depend on the volume of calls going out of the local neighborhood.

The Algorithms for a P2P Telecom

  1. Finding a peer and establishing a circuit
  2. Sending data through a circuit - Encrypt data using public/private key system
  3. Throttling of uplink bandwidth - Better to deny calls that increase latency on calls
  4. Location anonymnity

Information Security Bookmarks

Saturday, November 07, 2009

Below is a list of bookmarks dealing with information security. The list has not been thoroughly reviewed so please let me know if something is out of date and should be removed. One of the most helpful sites to me when I began researching info sec was a blog post with a bunch of bookmarks, hopefully this will be similarly helpful to you.

Information Security Companies
Antivirus, anti-spyware, anti-spam, firewall. Protect yourself with Panda Security
Beyond Security - Automated Vulnerability Assessment and Management
CSC: Consulting, Systems Integration and Outsourcing
Damballa > - The Front Line Against Bot Armies
Digital Armaments for Intelligence
Dreamlab Technologies
eEye Digital Security » Internet Security | Vulnerability Assessment | Computer Network Security | Vulnerability Management<BR>
esentire online security
FindNot - Anonymous Surfing, Anonymous Email & Anonymous Internet
Flylogic Engineering
FYRM Associates, Inc. - Tools
GFI - Fax server, Exchange anti-virus, anti-spam, vulnerability management and email archiving software
HBGary
Linux Internet/Network Security Software, Hardware, & Services | Guardian Digital, Inc.
MainNerve.com - Securing Critical Systems
Marshal :: Threat Research and Content Engineering (TRACE)
News and Events - [WhiteHat Security, Inc.] (Web Application Security)
SCRT - Information Security - Home
Securify. Monitor and Verify Who, What & Where on Your Network.
Security Intelligence Technology Group : Cellular Intercept Systems and Equipment
Security-Assessment.com: Advise - Assess - Assure
SolarWinds: Network Management Software – Designed by Network Engineers for Network Engineers
Sûnnet Beskerming - Commentary & Insight From Sûnnet Beskerming
Sysdream / Sécurité Informatique :: Home
Welcome to U0vd Security Corporation
Home - RSA, The Security Division of EMC
ID QUANTIQUE
Information Security Research
Authentication
Kerberos
Kerberos: The Network Authentication Protocol
Radius
An Analysis of the RADIUS Authentication Protocol
FreeRADIUS: The world&#39;s most popular RADIUS Server
Blogs
A surreptitious look over the work of an innovative startup — Subreption blog
Aviv Raff On .NET
Black Security | Main
Blog - Research - SecureWorks
Chris Shiflett: PHP and Web Application Security
Computer Security Research - McAfee Avert Labs Blog
call dwerd ptr [6c756973]
Darknet - The Darkside | Ethical Hacking, Penetration Testing & Computer Security
Determina Security Blog
Devels playground
DShield; Cooperative Network Security Community - Internet Security - dshield
F-Secure Weblog : News from the Lab
Google Online Security Blog
Hack a Day
Hackszine.com
Home
ha.ckers.org web application security lab
hiredhacker.com - relevant ramblings of an ethical hacker
invisiblethings&#39; blog
Jeremiah Grossman
Linux Security, Single Packet Authorization, Intrusion Detection, iptables Log Analysis
Liquidmatrix Security Digest
leetupload.com
Matasano Chargen
Over The Wire - PullThePlug
Panda Research Blog, leading the way in proactive malware detection
PaulDotCom&#39;s Web Site: Security Archives
PLDsoft ::: IT-Security, Coding,Programming, Security Videos, HackITs, Web Security Challenge System - Home
Prevx Blog
RETURN $ecure;
Security Vulnerability Research & Defense
System Advancements at the Monastery
Tenable Network Security
The Art of Software Security Assessment
The Turkey Curse
TrendLabs | Malware Blog - by Trend Micro
tssci security
Uninformed
ush.it - a beautiful place
Websense Security Labs Blog
Silent noise | - about spam, trojans and other nasty stuff
Network Security Research and AI
33 Bits of Entropy
Silviocesare’s Weblog
Renesys Blog
Cards
Proximity Cards
Home - PCI Security Standards Council
CD & DVD
SlySoft Forum
Communities
.:[ packet storm ]:. - http://packetstormsecurity.org/
Electronic Frontier Foundation | Defending Freedom in the Digital World
Expert Tips to Deal with Hacking
Hack In The Box :: Keeping Knowledge Free
Home - The Community&#39;s Center for Security
johnny.ihackstuff.com - Home
Network security articles and hacking prevention resources for the government and general public. Covering all aspects of Computer Hacking, including tutorials and exploit downloads.
NIST.gov - Computer Security Division - Computer Security Resource Center
Ryan1918 DOT COM :: Index
Thwack
totse.com | Technology
SecDev.org
Grand Idea Studio
Welcome to Cryptography Research
h4cky0u • The #1 hacking, security and infosec forum
Security Xploded by Nagareshwar Talekar
NCHOVY 인터넷 스톰 센터 : 홈
SecurityTube - Watch, Learn and Contribute Computer Security Videos
Malware Forge
darklab.org
Darklab consists of a number of people, that have formed a group to share knowledge and interesting informations about computer security and IT in general.
Remote Exploit Forums - Home of BackTrack
Backtrack Remote-Exploit Forums
Sécurité informatique et veille en sécurité informatique
Site de veille en sécurité informatique: derniers bulletins de sécurité informatique traduits en français, tutoriaux sur la sécurité informatique et le hacking, logiciels de sécurité internet...
Denial of Service
Denial of Service Attacks - DDOS, SMURF, FRAGGLE, TRINOO DoS, DDoS, denial of service, distributed denial of service attack, icmp, smurf, http flood, dos attack, ddos attack
Documentation
Magazines
.:: Phrack Magazine ::.
0x000000 - THE HACKER WEBZINE
2600: The Hacker Quarterly
7A69XG
: b4b0.org - zine :
:: The Bug! Magazine - Information wants to be free ::
Binary Revolution - The Revolution will be Digitized!
bUTCHERED fR0M iNSiDE - Security Magazine
Die Datenschleuder
Magazine MISC - Edition française
Black Hat : Archives Index
Black Hat Multimedia - Presentation, Audio and Video Archives
bitsavers.org
Computer System and Network Security
Home page
HydraFlux - DeepRants
INFO-SEC dot EU - Information Security, Tools, Programming and Papers
Index of /e-books
L0T3K, Digital Girlie Juice
Main Page - DocDroppers
Wiretapped - Computer Security Software etc.
Filtering
Advisories : Bypassing content filtering - security vulnerabilities database
Firewalls
ipfw howto
Forensics
Forensic Acquisition Utilities
Forensic Analysis of a Live Linux System, Pt. 1
NIST Computer Forensic Tool Testing Program
Secure Deletion of Data from Magnetic and Solid-State Memory
JDAFTS
Forums
sla.ckers.org web application security forum
Blackhat-forums- Hacking / IT Security Community
Iran Hackerz Security Team
[Habo] | Startseite
Hardening
BASTILLE-LINUX
code jmorris
Security-Enhanced Linux
Hardware
cq.cx
OpenCiphers
The Hardware Book - HwB
limor
Wii Menu 4.2: a lack of imagination
Infrastructure
Critical Infrastructure Protection
Locks
Security.Org - Investigative Law Offices January 22, 2008
TOOOL
Waag Society - TOOOL Lockpick workshops
Mac OS
Mac OS X Hacks
MrDehbuga Home
Technical Note TN2124: Mac OS X Debugging Magic
Mac Security Hacking Apple OSX
SYMWorkshop - Metalab
The Mac Security Blog
Malware
Botnets
BotHunter Free Internet Distribution Page
TrustedSource - Storm Tracker
Lowkeysoft Publications: Proxy Botnet Analysis
Shadowserver Foundation - Main - HomePage
Rootkits
Anti Rootkit Software, News, Articles and Forums
bluepillproject.org
chkrootkit -- locally checks for signs of a rootkit
invisiblethings.org
rootkit.com
Stealth MBR rootkit
Virus
29A Labs
Above the Haze-Clouds
Cryptovirology
Viruslist.com - Information About Viruses, Hackers and Spam
VirusTotal - Free Online Virus and Malware Scan
Welcome! (VX heavens)
News
Rootsecure.net | Home
SecurityFocus
Zone-H.org - IT Security Information Network
TorrentFreak | The Latest Torrent News and Filesharing Info
...And you will know me by the trail of bits
Security Absurdity
sudosecure.net
Malware Database
Operations
Legal
Summary of the Provisions of the Sarbanes-Oxley Act of 2002
COSO
Standards
ISO27k infosec management standards
ISF The Standard Of Good Practice
ITIL ®- IT Infrastructure Library
Organizations
Italia
+Ma&#39;s Reversing - main page
A/I :: Home
ALCEI
Codex Alpe Adria 2007 (0xAA.org) - Digital Culture between Alps and Beaches
FreakNet Medialab, Catania
HackIt 0x0B - 26-27-28 settembre - Palermo
Home - UIC
Horde Demoparty
IKKISOFT - Ethical Hacking, Web Application Security, Digital Freedom
Isole nella Rete
kill-9.it
Metro Olografix
s0ftpr0ject
spaghettiphreakers.tk
Winnie lives here / Winnie vive qui
www.sikurezza.org - Italian Security Mailing List | Main / Home
Antifork Research, Inc.
Big Brother Is Watching You
CPNI
Cutting-edge Think tank | GNUCITIZEN
cDc -+- COWFEED -+- cDc
DoxPara Research
Droids Corporation
eicar - Home
Grand Idea Studio
grsecurity
Hacker Factor: Computer Consulting, Solutions, and Security
Hackers For Charity.ORG
Hackers Profiling Project
Hacking Truths
Hacktivismo: News
Horst Görtz Institute for IT-Security
http://www.devhell.org/
Intruders Tiger Team Security
Irongeek.com
KD-Team - Home
LASEC
New York City 2600
Ninja Strike Force
NoWires Research Group
nologin --
o0o.nu security research [ news ]
PHENOELIT
Recurity Labs
RedTeam
Remote-Exploit.org - Supplying offensive security products to the world
Roothack.org
Rstack.org
rezen.org
SecuObs.com - L&#39;observatoire de la sécurité internet
Security Practices and Research Student Association
Security-Protocols :: Computer Security Research
Shadowserver Foundation - Main - HomePage
SRI Malware Threat Center
trifinite.org - the home of the trifinite.group
Wehnus
Welcome to DEFCON®, the Largest Underground Hacking Convention in the World
Wisec - The WIse SECurity
[FM] == FelineMenace
[ISR] Infobyte Security Research
Homepage of PaX
Remote-Exploit.org - Supplying offensive security products to the world
Remote Exploit Security Group. Offensive Security Training. Home of BackTrack, a Live CD for Security Penetration Testing.
Reconnaissance
American Civil Liberties Union
httprecon project
Internet Archive
Recurity Labs PortBunny
SITE Intelligence Group
The Art of Electronic Deduction - DocDroppers
Unicornscan
[DP] - Default DB Ports, Computer Ports, TCP/UDP Ports, Services, Protocols
[the new p0f]
Satellite
Feedhunter Rini
dvbsnoop - DVB Stream Analyzer, MPEG Analyzer
dvbsnoop - dvbsnoop is a dvb stream analyzer and monitoring tool for DVB data transmission streams and related data streams. MPEG, MHP, DSM-CC, TS, PES
PY2ADN - Ham Radio (Adinei Brochi)
UHF-Satcom.com - The #1 online resource for VHF to EHF satellite reception and monitoring
UHF-Satcom.com - the online place for VHF to EHF satcom monitoring uhf vhf shf ehf ku-band c-band p-band l-band s-band x-band
PY2BBS - Hamradio Page
Side Channel
SCA Lab
Tools
Analysis
NetSA Security Suite
Analysis Manifold
HiPPIE
NetworkMiner - Passive Sniffer & Packet Analysis Tool for Windows | Darknet - The Darkside
Goolag
Wepawet » Home
Anonymnity
https://bridges.torproject.org/
Tor: anonymity online
OnionCat – An IP-Transparent Tor Hidden Service Connector
TorCheck at Xenobite.eu - HTTP-Mode
XROXY.COM - more than just proxy
XROXY.COM - Site offers free access to the frequently updated database of open proxies via flexible user interface allowing selection of proxy properties like its type, port number, connection latency, etc.
Japanese Proxy Server
Feel free to browse the internet at school with YourProxy.com to unblock websites like Myspace, Bebo, Facebook, Friendster, hi5 and more! Designed by FreeProxyTemplates.com
PolySolve will help you with your math related needs with our powerful cgi applications
Captcha
captcha bypass captcha OCR Verification image bypass captcha decoder captcha reader
PWNtcha – caca labs
CAPTCHA bypass. Cheap and easy CAPTCHA solving
desc
CAPTCHA.ru
Open Source
TCPDUMP public repository
websnarf - HTTP Port Listener/Capture Daemon
raWPacket » HeX
packet-o-matic : the real time packet processor
Database
Top 15 free SQL Injection Scanners - Security-Hacks.com
Exploitation
The Metasploit Project
openssl-too-open
ShellForge
Injection
sqlninja - a SQL Server injection & takeover tool
squeeza
iKAT - Interactive Kiosk Attack Tool - paul <at> ha.cked.net
Durzosploit Introduction - Engineering For Fun
Main Page - Engineering For Fun
KON-BOOT - ULTIMATE WINDOWS/LINUX HACKING UTILITY :-)
a little bit of security
Fuzzing
Fuzzing Software Tools // iDefense Labs
AxMan ActiveX Fuzzer
Edge-Security - Wfuzz
IDS
libemu - shellcode detection
Packers
SecureReality
Remote
Poison Ivy RAT
reDuh - TCP Redirection over HTTP
HSC - Tools - Dns2tcp
Trace
Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources
tcptraceroute development
COTSE-Steganography Tools
CryoPID - A Process Freezer for Linux
ettercap
girardin online tools
HT Editor
Index of ftp://ftp.ee.lbl.gov/
Mercurial repositories index
Online malware scan
shimmer
Tools | iSEC Partners
Index of /code/skape
PktAnon - Packet trace anonymization
SecuriTeam™ - ArpON - ARP Management System
Category:Tools - Insurgency Wiki
VoIP
VoIP Hopper...Jumping from one VLAN to the next!
VOIPSA : Resources : VoIP Security Tools
UNIStimpy - esentire online security
TacVoIP: Hardcore VoIP Security
WarVOX: Introduction
Vulnerabilities
Luigi Auriemma
milw0rm - exploits : vulnerabilities : videos : papers : shellcode
National Vulnerability Database Home
NEOHAPSIS - Peace of Mind Through Integrity and Insight
OSVDB: The Open Source Vulnerability Database
TrustedSource - Home
URI Use and Abuse: An Unpatched Vulnerability in Web Browsers and Applications | Project Afterlight. Articles, News, Updates, and Reviews on Technology and Life.
Vulnerability and Virus Information - Secunia
VulnWatch: vulnerability disclosure list
Wabisabilabi
Vulnerabilities
Virtualization
SecuriTeam™ - Path Traversal Vulnerability in VMware&#39;s Shared Folders Implementation
OpenVAS - OpenVAS - Open Vulnerability Assessment System Community Site
War Games
The Happy Hacker -- Computers that you can legally break into!
Web
BrowserFry™
The Spanner - A tool for designers dealing with programmers dealing with designers...
PhishTank | Join the fight against phishing
ncache - Google Code
Brainspl.at
XSSed - XSS (cross-site scripting) information and vulnerable websites archive
TwitPwn
Wireless
Bluetooth
Bluetooth Penetration Testing Framework
Cell Phones
Cell phone jammer, SH066P Handheld mobile phone blocker
Free Nokia Unlock Code Generator by GSM Liberty
Nokiafree unlock phone codes calculator software
UnlockNokia.US: Nokia (GSM) Unlocking.
www.lur.nu - Free mobile content and unlocking. Get your java games and ringtones for free
Welcome to epocsoft
CSI Stick - Cell Phone Data Extraction
blog.iphone-dev.org
NeoPwn Mobile Pentesting - First Ever Network Auditing Distribution for a Mobile Phone Platform
HaRET - Handhelds.org MoinMoin Wiki
GSM
GSM-Forum
gsm - THC Wiki
GSM Interception
RFID
RFIDIOt.org - RFID IO tools
WiFi
KARMA Attacks Radioed Machines Automatically
KisMAC
Projects - fakeAP
rfakeap homepage
Softmac - Trac
kismacng – Trac
XTest:Readme
Main [Aircrack-ng]
Crack-wpa.fr Accueil, Votre portail wifi, réseaux et sécurité. Forum, tutoriels, Backtrack...
Bienvenue sur crack-wpa.fr, pour tout ce qui concerne le crack WEP et le crack WPA c'est ici que ça se passe.
Goatse at Defcon -- brought to you by airpwn
Wave Bubble

VoIP Watermarking Defenses

Wednesday, February 20, 2008

A couple of years ago (2005) the Rome Air Force Base sponsored research [1] into de-anonymizing VoIP traffic. The researchers developed a modification to the Linux Kernel which inserted a watermark into Skype VoIP traffic that is passed through a low-latency anonymizing network. A 24-bit watermark is inserted through the modulation of the inter-packet timing of data packets. This is essentially the establishment of a covert channel through a timing attack.

The attacker reads the probabilistically hidden bits in the traffic to reconstruct and identify of the originating and terminating nodes of a VoIP call. A defense against this would be to scrub your outgoing traffic to remove the covert channel or increase the probability of error in bit recovery beyond the acceptable rate. The attacker is not manipulating packets as they leave the origin, since then they would presumably already know the origin. The suggested implementation is to watermark packets as they transit through a VoIP gateway. Because of this it is necessary to scrub packets beyond the gateway; after they have been marked.

More interesting would be to alter the packet timing in a controlled manner and embed bits of your choosing. If you had enough knowledge as to how bit patterns are assigned to identities you could arbitrarily alter your identity and pose as another. You could also add incorrect watermarks to random VoIP traffic.

To detect a watermark you can exploit the embedding process. The technique relies on existing latency in the VoIP calls and is able to function with around 20ms - 30ms of latency by making a 3ms adjustment to packet arrival times. A suggestion is to make the latency as low as possible therefore making the existence of a watermark more detectable since the latency would need to be adjusted to unexpected levels. It may not be feasible to keep low latency for a long period of time but that would not necessarily be necessary. Latency could intermittently be pushed to the lowest possible levels and a check for embedded bits could be performed. The method uses the existing latency in the first minutes of the call to determine what an acceptable level of latency to add is. Exploiting this, the first minutes (or so) of the call could be made with high, but still believable, latency so the attacker embeds bits with the appropriate higher latency. Once a watermark has been embedded the latency could be significantly reduced and the alteration of packet timing should be noticeable.

Covert channels based on packet timing have many applications, beyond de-anonymization, and could be made very difficult to detect. Steganographic style embedding of traffic is a possibility as well as watermarking for authentication purposes by the originating and terminating parties.

[1] S. Chen, S. Jajodia, and X. Wang. Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet. In CCS '05. ACM, November 2005


Peter
Lubell-Doughtie

about
projects
archive