-
Target Privacy Threat Modeling for COVID-19 Exposure Notification Systems
Authors:
Ananya Gangavarapu,
Ellie Daw,
Abhishek Singh,
Rohan Iyer,
Gabriel Harp,
Sam Zimmerman,
Ramesh Raskar
Abstract:
The adoption of digital contact tracing (DCT) technology during the COVID-19pandemic has shown multiple benefits, including hel** to slow the spread of infectious disease and to improve the dissemination of accurate information. However, to support both ethical technology deployment and user adoption, privacy must be at the forefront. With the loss of privacy being a critical threat, thorough th…
▽ More
The adoption of digital contact tracing (DCT) technology during the COVID-19pandemic has shown multiple benefits, including hel** to slow the spread of infectious disease and to improve the dissemination of accurate information. However, to support both ethical technology deployment and user adoption, privacy must be at the forefront. With the loss of privacy being a critical threat, thorough threat modeling will help us to strategize and protect privacy as digital contact tracing technologies advance. Various threat modeling frameworks exist today, such as LINDDUN, STRIDE, PASTA, and NIST, which focus on software system privacy, system security, application security, and data-centric risk, respectively. When applied to the exposure notification system (ENS) context, these models provide a thorough view of the software side but fall short in addressing the integrated nature of hardware, humans, regulations, and software involved in such systems. Our approach addresses ENSsas a whole and provides a model that addresses the privacy complexities of a multi-faceted solution. We define privacy principles, privacy threats, attacker capabilities, and a comprehensive threat model. Finally, we outline threat mitigation strategies that address the various threats defined in our model
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
COVID-19 Contact-Tracing Mobile Apps: Evaluation and Assessment for Decision Makers
Authors:
Ramesh Raskar,
Greg Nadeau,
John Werner,
Rachel Barbar,
Ashley Mehra,
Gabriel Harp,
Markus Leopoldseder,
Bryan Wilson,
Derrick Flakoll,
Praneeth Vepakomma,
Deepti Pahwa,
Robson Beaudry,
Emelin Flores,
Maciej Popielarz,
Akanksha Bhatia,
Andrea Nuzzo,
Matt Gee,
Jay Summet,
Rajeev Surati,
Bikram Khastgir,
Francesco Maria Benedetti,
Kristen Vilcans,
Sienna Leis,
Khahlil Louisy
Abstract:
A number of groups, from governments to non-profits, have quickly acted to innovate the contact-tracing process: they are designing, building, and launching contact-tracing apps in response to the COVID-19 crisis. A diverse range of approaches exist, creating challenging choices for officials looking to implement contact-tracing technology in their community and raising concerns about these choice…
▽ More
A number of groups, from governments to non-profits, have quickly acted to innovate the contact-tracing process: they are designing, building, and launching contact-tracing apps in response to the COVID-19 crisis. A diverse range of approaches exist, creating challenging choices for officials looking to implement contact-tracing technology in their community and raising concerns about these choices among citizens asked to participate in contact tracing. We are frequently asked how to evaluate and differentiate between the options for contact-tracing applications. Here, we share the questions we ask about app features and plans when reviewing the many contact-tracing apps appearing on the global stage.
△ Less
Submitted 3 June, 2020;
originally announced June 2020.
-
Classification of simulated radio signals using Wide Residual Networks for use in the search for extra-terrestrial intelligence
Authors:
G. A. Cox,
S. Egly,
G. R. Harp,
J. Richards,
S. Vinodababu,
J. Voien
Abstract:
We describe a new approach and algorithm for the detection of artificial signals and their classification in the search for extraterrestrial intelligence (SETI). The characteristics of radio signals observed during SETI research are often most apparent when those signals are represented as spectrograms. Additionally, many observed signals tend to share the same characteristics, allowing for sortin…
▽ More
We describe a new approach and algorithm for the detection of artificial signals and their classification in the search for extraterrestrial intelligence (SETI). The characteristics of radio signals observed during SETI research are often most apparent when those signals are represented as spectrograms. Additionally, many observed signals tend to share the same characteristics, allowing for sorting of the signals into different classes. For this work, complex-valued time-series data were simulated to produce a corpus of 140,000 signals from seven different signal classes. A wide residual neural network was then trained to classify these signal types using the gray-scale 2D spectrogram representation of those signals. An average $F_1$ score of 95.11\% was attained when tested on previously unobserved simulated signals. We also report on the performance of the model across a range of signal amplitudes.
△ Less
Submitted 22 March, 2018;
originally announced March 2018.
-
A new class of SETI beacons that contain information (22-aug-2010)
Authors:
G. R. Harp,
R. F. Ackermann,
Samantha K. Blair,
J. Arbunich,
P. R. Backus,
J. C. Tarter,
the ATA Team
Abstract:
In the cm-wavelength range, an extraterrestrial electromagnetic narrow band (sine wave) beacon is an excellent choice to get alien attention across interstellar distances because 1) it is not strongly affected by interstellar / interplanetary dispersion or scattering, and 2) searching for narrowband signals is computationally efficient (scales as Ns log(Ns) where Ns = number of voltage samples). H…
▽ More
In the cm-wavelength range, an extraterrestrial electromagnetic narrow band (sine wave) beacon is an excellent choice to get alien attention across interstellar distances because 1) it is not strongly affected by interstellar / interplanetary dispersion or scattering, and 2) searching for narrowband signals is computationally efficient (scales as Ns log(Ns) where Ns = number of voltage samples). Here we consider a special case wideband signal where two or more delayed copies of the same signal are transmitted over the same frequency and bandwidth, with the result that ISM dispersion and scattering cancel out during the detection stage. Such a signal is both a good beacon (easy to find) and carries arbitrarily large information rate (limited only by the atmospheric transparency to about 10 GHz). The discovery process uses an autocorrelation algorithm, and we outline a compute scheme where the beacon discovery search can be accomplished with only 2x the processing of a conventional sine wave search, and discuss signal to background response for sighting the beacon. Once the beacon is discovered, the focus turns to information extraction. Information extraction requires similar processing as for generic wideband signal searches, but since we have already identified the beacon, the efficiency of information extraction is negligible.
△ Less
Submitted 16 March, 2014; v1 submitted 27 November, 2012;
originally announced November 2012.