[Cialug] Interesting NTP article in ACM TechNews
Andrew Denner
linux-list at upeke.com
Fri Oct 23 11:12:10 CDT 2015
Since we were just talking about NTP, I thought this was good timing from
the ACM...
*Researchers Warn Computer Clocks Can Be Easily Scrambled*
*IDG News Service (10/21/15) Jeremy Kirk*
The Network Time Protocol (NTP) has exploitable flaws that could undermine
encrypted messages, according to Boston University researchers. They cite
NTP's rate-limiting mechanism, which can stop a computer from repeatedly
checking the time in the event of a technical hitch. The researchers
discovered the possibility of hackers spoofing such a packet so it appears
to originate from a system in trouble when it actually is not. "We
discovered the...vulnerability by just reading the specifications of the
[NTP] protocol," notes Boston University professor Sharon Goldberg. The
researchers say all a hacker would need to conduct the spoofing attack is
one computer that finds NTP clients using network scanners such as nmap and
zmap. Goldberg says the attack is partly enabled by the fact that most NTP
servers talk to clients without encrypting their communications, due to the
lack of a key exchange protocol. Sinister implications of a computer clock
being rolled back include accepting an expired SSL/TLS certificate for
which the hacker has the encryption key. Other flaws the researchers
exposed include one that could allow a denial-of-service attack, and
another that permits attackers to shift a computer's clock backwards or
forwards on reboot.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d5ffx025184&>
---------- Forwarded message ----------
From: ACM TechNews <technews at hq.acm.org>
Date: Fri, Oct 23, 2015 at 10:55 AM
Subject: ACM TechNews, Friday, October 23, 2015
To: denner at gmail.com
[image: Association for Computing Machinery] <http://technews.acm.org/>
| About <http://technews.acm.org/about.cfm> | Current Issue
<http://technews.acm.org/> | TechNews Archive
<http://technews.acm.org/archives.cfm> | TechNews Apps Support
<http://technews.acm.org/app_faq.cfm> | MemberNet
<http://membernet.acm.org/> | CareerNews
<http://acm.org/membership/careernews/> | Contact Us <technews at hq.acm.org>
| Welcome to the October 23, 2015 edition of ACM TechNews, providing timely
information for IT professionals three times a week.
Updated versions of the ACM TechNews mobile apps are available for Android
phones and tablets (click here
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3acd6x025184&>)
and for iPhones (click here
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3aba5x025184&>)
and iPads (click here
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3aba6x025184&>
).
*HEADLINES AT A GLANCE*
- Sorry, Einstein. Quantum Study Suggests 'Spooky Action' Is Real.
<#1509570c4579e147_822094>
- Faster Optimization <#1509570c4579e147_822349>
- White House National Strategic Computing Initiative Workshop
<#1509570c4579e147_822387>
- These Researchers Have Discovered the Perfect Password That's Also
Easy to Remember <#1509570c4579e147_822331>
- Self-Driving Car Makes 1,500-Mile Mexican Road Trip
<#1509570c4579e147_822179>
- Researchers Warn Computer Clocks Can Be Easily Scrambled
<#1509570c4579e147_822115>
- Quality Boost for User-Generated Sound <#1509570c4579e147_822174>
- Introducing MARTY, Stanford's Self-Driving, Electric, Drifting DeLorean
<#1509570c4579e147_821910>
- Building a Better Network for Connected Cars <#1509570c4579e147_821903>
- Researchers Prove Connected Cars Can Be Tracked
<#1509570c4579e147_822396>
- Researchers Aim to Make Privacy Second Nature for Software Developers
<#1509570c4579e147_822162>
- Yale Quantum Institute to Launch Oct. 23 <#1509570c4579e147_821634>
- Settling the Controversy Over Photo of Lee Harvey Oswald
<#1509570c4579e147_821625>
*Sorry, Einstein. Quantum Study Suggests 'Spooky Action' Is Real.*
*The New York Times (10/22/15) John Markoff*
Delft University of Technology scientists report validating quantum
theory's fundamental claim of the phenomenon of spooky action, in which
objects separated by great distance can instantaneously affect each other.
Their experiment, described as a "loophole-free Bell test," eliminates all
possible hidden variables by entangling a pair of diamond-entrapped
electrons 1.3 kilometers apart and then sharing information between them,
using detectors on opposite sides of the Delft campus to ensure no
conventional information exchange is possible. Pulses of microwave and
laser energy are then applied to entangle the electrons and measure their
spin. Massachusetts Institute of Technology physicist David Kaiser says
only two out of three major quantum loopholes have been closed by the Delft
experiment. He notes the electronic system the researchers used to add
randomness to their measurement may actually be subtly predetermined,
meaning the outcome also might still be predetermined. The U.S. National
Science Foundation is funding work by Kaiser and others to close the final
loophole via an experiment to measure light from distant objects on
different sides of the galaxy. Such work is seen as a step toward a
"quantum Internet" composed of entangled particles that offers absolute
security.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d5fax025184&>
- May Require Free Registration | Return to Headlines
<#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DSorry%252C%252BEinstein%252E%252BQuantum%252BStudy%252BSuggests%252B%2527Spooky%252BAction%2527%252BIs%252BReal%252E%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23822094>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822094&title=Sorry%2C%20Einstein%2E%20Quantum%20Study%20Suggests%20%27Spooky%20Action%27%20Is%20Real%2E&summary=Delft%20University%20of%20Technology%20scientists%20report%20validating%20quantum%20theory%27s%20fundamental%20claim%20of%20the%20phenomenon%20of%20spooky%20action%2C%20in%20which%20objects%20separated%20by%20great%20distance%20can%20instantaneously%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Sorry%2C%20Einstein%2E%20Quantum%20Study%20Suggests%20%27Spooky%20Action%27%20Is%20Real%2E&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822094>
*Faster Optimization*
*MIT News (10/23/15) Larry Hardesty*
Former and current Massachusetts Institute of Technology (MIT) students won
a best student paper award at this week's IEEE Symposium on Foundations of
Computer Science (FOCS) for a general-purpose "cutting-plane" algorithm
that addresses optimization problems. Cutting-plane techniques converge on
the optimal values of a mathematical function by repeatedly cutting out
regions of a much bigger range of possibilities. The researchers say the
algorithm not only upgrades the running time of its most efficient
precursor, but also offers a new method for applying the algorithm to
specific problems that delivers order-of-magnitude efficiency gains. "If
for many problems, you have one algorithm, then, in practice, we can try to
optimize over one algorithm instead of many algorithms, and we may have a
better chance to get faster algorithms for many problems," says MIT
graduate student Yin-Tat Lee. Algorithm running times are typically
measured in the number of required operations, relative to the number of
elements being manipulated. Cutting-plane methods make the number of
elements the number of variables in the cost function. The researchers say
they applied cutting-plane techniques to problems such as submodular
minimization, submodular flow, matroid intersection, and semidefinite
programming. In many instances, they reported drastic efficiency
improvements, from running times that scale with the fifth or sixth power
of the number of variables down to the second or third power.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d5fbx025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DFaster%252BOptimization%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23822349>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822349&title=Faster%20Optimization&summary=Former%20and%20current%20Massachusetts%20Institute%20of%20Technology%20%28MIT%29%20students%20won%20a%20best%20student%20paper%20award%20at%20this%20week%27s%20IEEE%20Symposium%20on%20Foundations%20of%20Computer%20Science%20%28FOCS%29%20for%20a%20general%2Dpurpose%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Faster%20Optimization&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822349>
*White House National Strategic Computing Initiative Workshop*
*CCC Blog (10/22/15) Helen Wright*
The White House this week held a workshop for its National Strategic
Computing Initiative (NSCI). At the meeting, Tom Kalil, deputy director for
policy for the White House Office of Science and Technology Policy,
described a new nanotechnology-inspired Grand Challenge, and asked the
audience about what actions could be taken to better carry out the mission
of the NSCI. The three main themes of the workshop were the convergence of
data-intensive and numerically intensive computing, potential hardware
technology for future high-performance computing (HPC) systems, and
improving the productivity of HPC application development and deployment.
The workshop's two keynote speakers were the Semiconductor Research
Corporation's Thomas Theis and Computing Community Consortium (CCC) council
member Kathy Yelick from Lawrence Livermore National Laboratory and the
University of California, Berkeley. Theis discussed the importance of
investing in exploratory research and stressed the need for more research
into post-complementary metal-oxide devices. Yelick gave a presentation
titled "More Data, More Science, and Moore's Law." She said increasing
amounts of data are poised to change science and noted the NSCI will help
to enable this change. Yelick said the change will require capable exascale
systems, computer science, statistical machine learning, new mathematical
models, and algorithms.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d5fcx025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DWhite%252BHouse%252BNational%252BStrategic%252BComputing%252BInitiative%252BWorkshop%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23822387>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822387&title=White%20House%20National%20Strategic%20Computing%20Initiative%20Workshop&summary=The%20White%20House%20this%20week%20held%20a%20workshop%20for%20its%20National%20Strategic%20Computing%20Initiative%20%28NSCI%29%2E%20%20At%20the%20meeting%2C%20Tom%20Kalil%2C%20deputy%20director%20for%20policy%20for%20the%20White%20House%20Office%20of%20Science%20and%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=White%20House%20National%20Strategic%20Computing%20Initiative%20Workshop&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822387>
*These Researchers Have Discovered the Perfect Password That's Also Easy to
Remember*
*The Washington Post (10/22/15) Ana Swanson*
University of Southern California researchers Marjan Ghazvininejad and
Kevin Knight say they have developed an approach to creating passwords that
are very difficult to solve while also being easy to remember. The
passwords take the form of randomly generated poems, inspired by a cartoon
that showed a password composed of four random words is much easier for
people to recall and more secure. The researchers produce their poems by
assigning a distinct code to each word in a 327,868-word dictionary.
Software then creates a long random number, breaks it into fragments, and
translates the fragments into two short phrases. The program guarantees the
two lines end in rhyming words, with the entire phrase rendered in iambic
pentameter. Knight calculates cracking these passwords would take
approximately 5 million years at current speeds, and he and Ghazvininejad
have set up a demonstration site for their online poem generator. People
who want their own poetic passwords can send their emails to another
address, and the researchers' program will send them a secure password that
is then deleted from their server.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d5fdx025184&>
- May Require Free Registration | Return to Headlines
<#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DThese%252BResearchers%252BHave%252BDiscovered%252Bthe%252BPerfect%252BPassword%252BThat%2527s%252BAlso%252BEasy%252Bto%252BRemember%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23822331>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822331&title=These%20Researchers%20Have%20Discovered%20the%20Perfect%20Password%20That%27s%20Also%20Easy%20to%20Remember&summary=University%20of%20Southern%20California%20researchers%20Marjan%20Ghazvininejad%20and%20Kevin%20Knight%20say%20they%20have%20developed%20an%20approach%20to%20creating%20passwords%20that%20are%20very%20difficult%20to%20solve%20while%20also%20being%20easy%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=These%20Researchers%20Have%20Discovered%20the%20Perfect%20Password%20That%27s%20Also%20Easy%20to%20Remember&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822331>
*Self-Driving Car Makes 1,500-Mile Mexican Road Trip*
*USA Today (10/21/15) Marco della Cava*
University of Nevada-Reno roboticist Raul Rojas recently traveled 1,500
miles from the U.S. border at Nogales to Mexico City in a self-driving
vehicle. The Autonomos car utilized onboard computer processing data from
seven laser scanners, nine video cameras, seven radars, and a
global-positioning system (GPS) unit. "This is a new challenge, a next step
to learn and develop systems, to learn ways to solve new problems for
driverless cars," Rojas says. "Most of the trip was highway, but there are
many different issues such as construction sites, urban areas in between,
potholes, and so on." Prior to the trip, the research team digitally
plotted out the full 4,000-mile route from Reno to Mexico City, collating
GPS data and incorporating speed limits and other variables into the
software. Rojas' experiment seeks to assess technology that enables
motorists to let the car assume control over certain types of driving
situations. He says evaluating driverless cars under real-world conditions
is essential to the creation of machines that will behave appropriately no
matter what the road or environmental situations is. "One important aspect
to be considered is predicting the behavior of other drivers and
pedestrians," Rojas notes. "This is especially relevant in cities."
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d5fex025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DSelf%252DDriving%252BCar%252BMakes%252B1%252C500%252DMile%252BMexican%252BRoad%252BTrip%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23822179>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822179&title=Self%2DDriving%20Car%20Makes%201%2C500%2DMile%20Mexican%20Road%20Trip&summary=University%20of%20Nevada%2DReno%20roboticist%20Raul%20Rojas%20recently%20traveled%201%2C500%20miles%20from%20the%20U%2ES%2E%20border%20at%20Nogales%20to%20Mexico%20City%20in%20a%20self%2Ddriving%20vehicle%2E%20%C2%A0The%20Autonomos%20car%20utilized%20onboard%20computer%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Self%2DDriving%20Car%20Makes%201%2C500%2DMile%20Mexican%20Road%20Trip&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822179>
*Researchers Warn Computer Clocks Can Be Easily Scrambled*
*IDG News Service (10/21/15) Jeremy Kirk*
The Network Time Protocol (NTP) has exploitable flaws that could undermine
encrypted messages, according to Boston University researchers. They cite
NTP's rate-limiting mechanism, which can stop a computer from repeatedly
checking the time in the event of a technical hitch. The researchers
discovered the possibility of hackers spoofing such a packet so it appears
to originate from a system in trouble when it actually is not. "We
discovered the...vulnerability by just reading the specifications of the
[NTP] protocol," notes Boston University professor Sharon Goldberg. The
researchers say all a hacker would need to conduct the spoofing attack is
one computer that finds NTP clients using network scanners such as nmap and
zmap. Goldberg says the attack is partly enabled by the fact that most NTP
servers talk to clients without encrypting their communications, due to the
lack of a key exchange protocol. Sinister implications of a computer clock
being rolled back include accepting an expired SSL/TLS certificate for
which the hacker has the encryption key. Other flaws the researchers
exposed include one that could allow a denial-of-service attack, and
another that permits attackers to shift a computer's clock backwards or
forwards on reboot.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d5ffx025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DResearchers%252BWarn%252BComputer%252BClocks%252BCan%252BBe%252BEasily%252BScrambled%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23822115>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822115&title=Researchers%20Warn%20Computer%20Clocks%20Can%20Be%20Easily%20Scrambled&summary=The%20Network%20Time%20Protocol%20%28NTP%29%20has%20exploitable%20flaws%20that%20could%20undermine%20encrypted%20messages%2C%20according%20to%20Boston%20University%20researchers%2E%20%20They%20cite%20NTP%27s%20rate%2Dlimiting%20mechanism%2C%20which%20can%20stop%20a%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Researchers%20Warn%20Computer%20Clocks%20Can%20Be%20Easily%20Scrambled&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822115>
*Quality Boost for User-Generated Sound*
*University of Salford Manchester (10/22/15) Gareth Hollyman*
New algorithms could help people better understand sound quality on phones,
video recorders, and dictaphones, according to researchers at the
University of Salford Manchester. A team led by professor Trevor Cox has
developed algorithms that can help people control sound quality. The
algorithms are capable of automatically assessing the relative impact of
sound errors such as microphone handling noise, distortion, wind noise, and
a range of other conditions. An app for assessing wind noise is using the
algorithms to alert users when there is significant risk that sound will be
affected. "We're used to having visual processing improving our photos,
such as the camera that spots faces and changes exposure, but we have not
had the same tools to do the audio equivalent," Cox says. Salford's
three-year Good Recording project is a response to growing demand from
consumers and broadcasters who often use amateur footage, which is
compromised by sound quality. The researchers say the project also should
benefit broadcasters that use amateur footage and need to quickly assess
quality.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d600x025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DQuality%252BBoost%252Bfor%252BUser%252DGenerated%252BSound%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23822174>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822174&title=Quality%20Boost%20for%20User%2DGenerated%20Sound&summary=New%20algorithms%20could%20help%20people%20better%20understand%20sound%20quality%20on%20phones%2C%20video%20recorders%2C%20and%20dictaphones%2C%20according%20to%20researchers%20at%20the%20University%20of%20Salford%20Manchester%2E%20%20A%20team%20led%20by%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Quality%20Boost%20for%20User%2DGenerated%20Sound&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822174>
*Introducing MARTY, Stanford's Self-Driving, Electric, Drifting DeLorean*
*Stanford Report (10/20/15) Bjorn Carey*
A team of Stanford University engineers led by professor Chris Gerdes have
built an autonomous, drifting DeLorean powered by electricity to research
the physical limits of self-driving systems. The Multiple Actuator Research
Test bed for Yaw control (MARTY) embodies the Dynamic Design Lab's mission
to determine how to leverage all of a car's capabilities to create
autonomous driving systems that will control the vehicle more safely in all
situations. "We want to design automated vehicles that can take any action
necessary to avoid an accident," Gerdes says. "The laws of physics will
limit what the car can do, but we think the software should be capable of
any possible maneuver within those limits." Stanford graduate student
Jonathan Goh says the car will eventually be taught to race around a track
using a drifting method to negotiate tight turns around obstacles when
needed. MARTY already can self-lock into a continuous circular doughnut at
a large drift angle. The car is a joint project between Gerdes' lab, the
Revs Program at Stanford, and Renovo Motors. Renovo made available a new
platform that delivers 4,000 pound-feet from on-motor gearboxes to the rear
wheels in a fraction of a second, enabling precise control of the forces
required to drift.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d601x025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DIntroducing%252BMARTY%252C%252BStanford%2527s%252BSelf%252DDriving%252C%252BElectric%252C%252BDrifting%252BDeLorean%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23821910>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23821910&title=Introducing%20MARTY%2C%20Stanford%27s%20Self%2DDriving%2C%20Electric%2C%20Drifting%20DeLorean&summary=A%20team%20of%20Stanford%20University%20engineers%20led%20by%20professor%20Chris%20Gerdes%20have%20built%20an%20autonomous%2C%20drifting%20DeLorean%20powered%20by%20electricity%20to%20research%20the%20physical%20limits%20of%20self%2Ddriving%20systems%2E%20%C2%A0The%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Introducing%20MARTY%2C%20Stanford%27s%20Self%2DDriving%2C%20Electric%2C%20Drifting%20DeLorean&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23821910>
*Building a Better Network for Connected Cars*
*Government Computer News (10/20/15) Patrick Marshall*
Connected-car networks face a huge, real-world obstacle in the limited
number of vehicles that have the necessary equipment. An integrated network
developed by Clemson University researchers could serve as a bridge until
all vehicles have dedicated short-range communications (DSRC) devices. The
nonprofit tech accelerator U.S. Ignite has provided Clemson professor James
Martin with a two-year, $600,000-grant to enhance DSRC, an ad hoc wireless
network, with Wi-Fi and LTE cellular services. Martin's team will develop
middleware to integrate the network standards and develop apps to run on
it, including one for incident detection and another to provide congestion
warnings. The researchers will deploy hardware along 10 to 20 miles of
South Carolina roadsides. They plan to install devices in South Carolina
Department of Transportation vehicles that regularly traverse the trial
zone and recruit volunteer drivers. An app also will be developed to
interact with the CANBUS microprocessor interface, which has been embedded
in all cars manufactured since 2008.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d602x025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DBuilding%252Ba%252BBetter%252BNetwork%252Bfor%252BConnected%252BCars%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23821903>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23821903&title=Building%20a%20Better%20Network%20for%20Connected%20Cars&summary=Connected%2Dcar%20networks%20face%20a%20huge%2C%20real%2Dworld%20obstacle%20in%20the%20limited%20number%20of%20vehicles%20that%20have%20the%20necessary%20equipment%2E%20%C2%A0An%20integrated%20network%20developed%20by%20Clemson%20University%20researchers%20could%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Building%20a%20Better%20Network%20for%20Connected%20Cars&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23821903>
*Researchers Prove Connected Cars Can Be Tracked*
*IEEE Spectrum (10/21/15) Mark Harris*
Researchers in the Netherlands have demonstrated that vehicle-to-vehicle
(V2V) and vehicle to infrastructure (V2I) communications, together known as
V2X, can be used to track individual vehicles. V2X involves vehicles
broadcasting speed and position data over part of the Wi-Fi spectrum; other
vehicles can detect this data and use it to avoid collisions. Although the
data broadcast by V2X systems does not contain personally identifiable
information, it is digitally signed. The researchers designed their attack
to track these digital signatures. They equipped a campus security vehicle
with a V2X system and set up sniffing stations at two intersections at the
University of Twente. The V2X system broadcast more than 2.7 million
messages over 16 days of normal operation and the sniffers were able to
detect just 40,000 of the messages. However, the researchers were still
able to use these messages to place the vehicle in one of two areas of the
campus with 78-percent accuracy and were able to locate the vehicle 40
percent of the time. The researchers note even taking steps to randomize
the digital signatures used by the V2X systems only increases the number of
sniffer stations an attacker would need to deploy. In addition, one of the
researchers notes attackers likely could inexpensively build their own
sniffers from off-the-shelf parts.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d603x025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DResearchers%252BProve%252BConnected%252BCars%252BCan%252BBe%252BTracked%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23822396>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822396&title=Researchers%20Prove%20Connected%20Cars%20Can%20Be%20Tracked&summary=Researchers%20in%20the%20Netherlands%20have%20demonstrated%20that%20vehicle%2Dto%2Dvehicle%20%28V2V%29%20and%20vehicle%20to%20infrastructure%20%28V2I%29%20communications%2C%20together%20known%20as%20V2X%2C%20can%20be%20used%20to%20track%20individual%20vehicles%2E%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Researchers%20Prove%20Connected%20Cars%20Can%20Be%20Tracked&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822396>
*Researchers Aim to Make Privacy Second Nature for Software Developers*
*New York University (10/20/15)*
A New York University researcher and colleagues are working to make user
privacy an integral part of the software development process. Professor
Sameer Patil is developing "privacy ideation cards" as a way to educate
software developers on user privacy regulatory requirements. Patil says the
idea is to make U.S. data-protection laws and regulations understandable to
software developers and students so they can take them into account at
every step of the development process. Privacy matters are often treated as
an afterthought, according to Patil, who has been awarded a $175,000
Early-concept Grant for Exploratory Research by the U.S. National Science
Foundation. Patil suggests the language the government uses to regulate
privacy in technology is not accessible to most software professionals.
Moreover, he says developers often lack formal training in the
sociotechnical aspects of privacy. Patil's team also plans to promote the
"Privacy by Design" approach, which holds that privacy must be the default
mode of operation for organizations. The privacy ideation cards, which
Patil thinks should be made freely available online, will enable the
design, development, and deployment of systems that take into account
relevant privacy laws and regulations at every stage of the system-building
process.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d604x025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DResearchers%252BAim%252Bto%252BMake%252BPrivacy%252BSecond%252BNature%252Bfor%252BSoftware%252BDevelopers%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23822162>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822162&title=Researchers%20Aim%20to%20Make%20Privacy%20Second%20Nature%20for%20Software%20Developers&summary=A%20New%20York%20University%20researcher%20and%20colleagues%20are%20working%20to%20make%20user%20privacy%20an%20integral%20part%20of%20the%20software%20development%20process%2E%20%C2%A0Professor%20Sameer%20Patil%20is%20developing%20%22privacy%20ideation%20cards%22%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Researchers%20Aim%20to%20Make%20Privacy%20Second%20Nature%20for%20Software%20Developers&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23822162>
*Yale Quantum Institute to Launch Oct. 23*
*Yale News (10/19/15) Jim Shelton*
Yale University today will open its Quantum Institute, a state-of-the-art
research hub aimed at revolutionizing the way information is stored,
processed, and safeguarded. "Even in an era of technological leaps, the
possibilities for quantum science inspire awe," says Yale president Peter
Salovey. The institute will unite more than 120 Yale researchers, whose
work already has produced major advances in the study of quantum
information science, increasing the understanding of the quantum world, and
making Yale a leader in the field, according to Yale Quantum Institute
director Robert Schoelkopf. "In order to do cutting-edge quantum
information science, you need new kinds of collaboration among engineers,
physicists, computer scientists, materials scientists, and a host of other
disciplines," Schoelkopf says. Yale has a long history of success in
quantum information science, including the development and understanding of
quantum networks that use light particles; the demonstration of new,
topological states of matter; and the invention of a novel, "speckle-free"
laser for medical imaging. "A wonderful feature of this institute is the
opportunity to welcome a mix of physicists, engineers, and mathematicians
from all over the world for an extended period of time," says Yale
professor Michel Devoret.
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d605x025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DYale%252BQuantum%252BInstitute%252Bto%252BLaunch%252BOct%252E%252B23%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23821634>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23821634&title=Yale%20Quantum%20Institute%20to%20Launch%20Oct%2E%2023&summary=Yale%20University%20today%20will%20open%20its%20Quantum%20Institute%2C%20a%20state%2Dof%2Dthe%2Dart%20research%20hub%20aimed%20at%20revolutionizing%20the%20way%20information%20is%20stored%2C%20processed%2C%20and%20safeguarded%2E%20%20%22Even%20in%20an%20era%20of%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Yale%20Quantum%20Institute%20to%20Launch%20Oct%2E%2023&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23821634>
*Settling the Controversy Over Photo of Lee Harvey Oswald*
*Dartmouth Now (10/19/15) John Cramer*
Dartmouth College researchers have used three-dimensional (3D) modeling to
confirm the authenticity of the backyard photo of Lee Harvey Oswald holding
the same type of rifle used to assassinate President John F. Kennedy. In
particular, a team led by professor Hany Farid addressed claims Oswald's
pose was physically implausible, as it appears as if he is standing off
balance. The team conducted a 3D stability analysis, which involved
building a physiologically plausible 3D model of Oswald, posing it to match
his appearance in the photo, and adding appropriate mass to each part of
the model. The analysis revealed the pose is stable. Moreover, it shows the
lighting and shadows in the photo are physically plausible and the length
of the rifle is consistent with the one used to kill the president. "Our
analysis refutes purported evidence of manipulation in the Oswald photo,
but more generally we believe that the type of detailed 3D modeling
performed here can be a powerful forensic tool in reasoning about the
physical plausibility of an image," Farid says. "With a simple adjustment
to the height and weight, the 3D human model that we created can be used to
forensically analyze the pose, stability, and shadows in any image of
people."
View Full Article
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d606x025184&>
| Return to Headlines <#1509570c4579e147_top> | Share [image: Facebook]
<http://www.facebook.com/share.php?u=http%3A%2F%2Fwww%2Einfoinc%2Ecom%2FFBShare%2Ecfm%3Ftitle%3DSettling%252Bthe%252BControversy%252BOver%252BPhoto%252Bof%252BLee%252BHarvey%252BOswald%26desc%3D%26loc%3Dhttp%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%26bg%3D%26FBFolderName%3D%26FBLogoName%3D%23821625>
[image: LinkedIn]
<http://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23821625&title=Settling%20the%20Controversy%20Over%20Photo%20of%20Lee%20Harvey%20Oswald&summary=Dartmouth%20College%20researchers%20have%20used%20three%2Ddimensional%20%283D%29%20modeling%20to%20confirm%20the%20authenticity%20of%20the%20backyard%20photo%20of%20Lee%20Harvey%20Oswald%20holding%20the%20same%20type%20of%20rifle%20used%20to%20assassinate%2E%2E%2E&source=ACM%20TechNews>
[image: Twitter]
<https://twitter.com/share?text=Settling%20the%20Controversy%20Over%20Photo%20of%20Lee%20Harvey%20Oswald&url=http%3A%2F%2Ftechnews%2Eacm%2Eorg%2Farchives%2Ecfm%3Ffo%3D2015%2D10%2Doct%2Foct%2D23%2D2015%2Ehtml%23821625>
Abstract News © Copyright 2015 INFORMATION, INC.
<http://www.infoinc.com/copyright.html>
[image: Powered by Information, Inc.] <http://www.infoinc.com>
------------------------------
To submit feedback about ACM TechNews, contact: technews at hq.acm.org
Current ACM Members: Unsubscribe/Change
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3ae2cx025184&>
your email subscription by logging in at myACM.
Non-Members: Unsubscribe
<https://optout.acm.org/listserv_index.cfm?ln=technews>
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d607x025184&>
<http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e3b3x3d608x025184&>
[image: Facebook]
<https://www.facebook.com/pages/ACM-Association-for-Computing-Machinery/17927643151?ref=ts>
[image: LinkdedIn] <http://www.linkedin.com/groups?gid=36836>
[image: TheOfficialACM Twitter] <http://twitter.com/TheOfficialACM>
[image: RSS Button] <http://rss.acm.org/technews/technews.xml>
------------------------------
ACM Media Sales
If you are interested in advertising in ACM TechNews or other ACM
publications, please contact ACM Media Sales at *acmmediasales at acm.org*
<acmmediasales at acm.org> or (212) 626-0686, or visit *ACM Media*
<http://www.acm-media.org> for more information.
------------------------------
Association for Computing Machinery
2 Penn Plaza, Suite 701
New York, NY 10121-0701
Phone: 1-800-342-6626
(U.S./Canada)
More information about the Cialug
mailing list