Skip to main content

Showing 1–8 of 8 results for author: Westbrook, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2002.03885  [pdf, other

    cs.HC cs.CR cs.CY

    Beyond Trolling: Malware-Induced Misperception Attacks on Polarized Facebook Discourse

    Authors: Filipo Sharevski, Paige Treebridge, Peter Jachim, Audrey Li, Adam Babin, Jessica Westbrook

    Abstract: Social media trolling is a powerful tactic to manipulate public opinion on issues with a high moral component. Troll farms, as evidenced in the past, created fabricated content to provoke or silence people to share their opinion on social media during the US presidential election in 2016. In this paper, we introduce an alternate way of provoking or silencing social media discourse by manipulating… ▽ More

    Submitted 10 February, 2020; originally announced February 2020.

  2. arXiv:2002.03466  [pdf, other

    cs.CR cs.CY cs.HC

    Meet Malexa, Alexa's Malicious Twin: Malware-Induced Misperception Through Intelligent Voice Assistants

    Authors: Filipo Sharevski, Paige Treebridge, Peter Jachim, Audrey Li, Adam Babin, Jessica Westbrook

    Abstract: This paper reports the findings of a study where users (N=220) interacted with Malexa, Alexa's malicious twin. Malexa is an intelligent voice assistant with a simple and seemingly harmless third-party skill that delivers news briefings to users. The twist, however, is that Malexa covertly rewords these briefings to intentionally introduce misperception about the reported events. This covert reword… ▽ More

    Submitted 9 February, 2020; originally announced February 2020.

  3. arXiv:1908.11752  [pdf, other

    cs.CR cs.CY cs.HC

    Manipulation of Perceived Politeness in a Web-based Email Discourse Through a Malicious Browser Extension

    Authors: Filipo Sharevski, Paige Treebridge, Jessica Westbrook

    Abstract: This paper presents a specific man-in-the-middle exploit: Ambient Tactical Deception (ATD) in online communication, realized via a malicious web browser extension. Extensions manipulate web content in unobtrusive ways as ambient intermediaries of the overall browsing experience. In our previous work, we demonstrated that it is possible to employ tactical deception by making covert changes in the t… ▽ More

    Submitted 24 December, 2019; v1 submitted 30 August, 2019; originally announced August 2019.

    Journal ref: ACM New Security Paradigms Workshop NSPW 2019

  4. arXiv:1903.10439  [pdf, other

    cs.CE physics.comp-ph physics.geo-ph

    Pressure and flow statistics of Darcy flow from simulated annealing

    Authors: Marise J. E. Westbroek, Peter R. King, Dimitri D. Vvedensky, Ronnie L. Schwede

    Abstract: The pressure and flow statistics of Darcy flow through a random permeable medium are expressed in a form suitable for evaluation by the method of simulated annealing. There are several attractive aspects to using simulated annealing: (i) any probability distribution can be used for the permeability, (ii) there is no need to invert the transmissibility matrix which, while not a factor for single-ph… ▽ More

    Submitted 3 April, 2019; v1 submitted 22 March, 2019; originally announced March 2019.

  5. arXiv:1810.11063  [pdf

    cs.HC cs.CR

    Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering

    Authors: Adam Trowbridge, Jessica Westbrook, Filipo Sharevski

    Abstract: In this paper we argue, drawing from the perspectives of cybersecurity and social psychology, that Internet-based manipulation of an individual or group reality using ambient tactical deception is possible using only software and changing words in a web browser. We call this attack Ambient Tactical Deception (ATD). Ambient, in artificial intelligence, describes software that is "unobtrusive," and… ▽ More

    Submitted 25 October, 2018; originally announced October 2018.

  6. Malicious User Experience Design Research for Cybersecurity

    Authors: Adam Trowbridge, Filipo Sharevski, Jessica Westbrook

    Abstract: This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context. We explore what is known about successful addictive design in the fields of video games and gambling to understand the allure of breaking into a system, and the joy of thwarting the security t… ▽ More

    Submitted 28 June, 2018; originally announced June 2018.

    Journal ref: NSPW 2018

  7. arXiv:1806.01198  [pdf

    cs.CY cs.CR

    Novel Approach for Cybersecurity Workforce Development: A Course in Secure Design

    Authors: Filipo Sharevski, Adam Trowbridge, Jessica Westbrook

    Abstract: Training the future cybersecurity workforce to respond to emerging threats requires introduction of novel educational interventions into the cybersecurity curriculum. To be effective, these interventions have to incorporate trending knowledge from cybersecurity and other related domains while allowing for experiential learning through hands-on experimentation. To date, the traditional interdiscipl… ▽ More

    Submitted 4 June, 2018; originally announced June 2018.

    Comments: The 8th IEEE Integrated STEM Education Conference (ISEC) 2018

  8. arXiv:cs/0207061  [pdf, ps, other

    cs.DS

    Linear-Time Pointer-Machine Algorithms for Path-Evaluation Problems on Trees and Graphs

    Authors: Adam L. Buchsbaum, Loukas Georgiadis, Haim Kaplan, Anne Rogers, Robert E. Tarjan, Jeffery R. Westbrook

    Abstract: We present algorithms that run in linear time on pointer machines for a collection of problems, each of which either directly or indirectly requires the evaluation of a function defined on paths in a tree. These problems previously had linear-time algorithms but only for random-access machines (RAMs); the best pointer-machine algorithms were super-linear by an inverse-Ackermann-function factor.… ▽ More

    Submitted 14 November, 2006; v1 submitted 15 July, 2002; originally announced July 2002.

    Comments: 41 pages; 10 figures; 1 table; 65 references. This work is partially covered by the extended abstracts, ``Linear-Time Pointer-Machine Algorithms for Least Common Ancestors, MST Verification, and Dominators,'' Proc. 30th ACM Symp. on Theory of Computing, pp. 279-888, 1998, and ``Finding Dominators Revisited,'' Proc. 15th ACM-SIAM Symp. on Discrete Algorithms, pp. 862-871, 2004

    ACM Class: D.3.4; E.1; F.1.1; F.2.2; G.2.2