Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, 2015 National Research Nuclear University Moscow Engineering & Physics Institute (NRNU MEPhI), Department of Cryptology and Discrete Mathematics, Russia
Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin
Annual ADFSL Conference on Digital Forensics, Security and Law
Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into modern malware which is rather hard to detect. None of the existing methods is able to efficiently detect a hypervisor in the face of countermeasures such as time cheating, temporary self-uninstalling, memory hiding etc. New hypervisor detection methods which will be described in this paper can detect a hypervisor under these countermeasures and even count several nested ones. These novel approaches rely on the …
Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, 2015 Penn State University
Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden
Rob Frieden
This paper assesses whether and how ISPs can offer quality of service enhancements, at premium prices for full motion video, while still complying with the new rules and regulations established by the Federal Communications Commission (“FCC”) in March, 2015. The paper explains that having made the controversial decision to reclassify all forms of Internet access as a telecommunications service, the FCC increases regulatory uncertainty. In particular, the FCC has failed to identify instances where “retail ISPs,” serving residential broadband subscribers, can offer quality of service enhancements that serve real consumer wants without harming competition and the ability of most content …
The World’S Laboratory: China’S Patent Boom, It Standards And The Implications For The Global Knowledge, 2015 Monterey College of Law
The World’S Laboratory: China’S Patent Boom, It Standards And The Implications For The Global Knowledge, Christopher Mcelwain, Dennis Fernandez
Christopher McElwain
Just as China’s factories disrupted the economics of IT hardware, its research labs have the potential to disrupt the economics of the technology itself. In 2014, China’s patent office received nearly 2.4 million patent applications, 93% from domestic applicants. China has also climbed to third place in terms of international applications, with over 21,000 WIPO PCT applications. Meanwhile, China has taken an assertive role in setting technology standards, both at the national and international levels. In the past, this has included developing and promoting alternatives to important IT standards as a means of challenging perceived monopolies by certain (foreign-dominated) technologies. …
Cloud Computing, Contractibility, And Network Architecture, 2015 University of Pennsylvania Carey Law School
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
All Faculty Scholarship
The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.
What Happens To Your Digital Assets When You Die? Law And Technology Collide In Gray Area, 2015 Nelson Rusche College of Business, Stephen F. Austin State University
What Happens To Your Digital Assets When You Die? Law And Technology Collide In Gray Area, Marsha L. Bayless, J Keaton Grubbs, Kyle Post
Bright Ideas Conference
No abstract provided.
It Takes Time: The Need To Extend The Seal Period For Qui Tam Complaints Filed Under The False Claims Act, 2015 Seattle University School of Law
It Takes Time: The Need To Extend The Seal Period For Qui Tam Complaints Filed Under The False Claims Act, Joel D. Hesch
Seattle University Law Review
Each year, 10% of all federal government spending is lost due to fraud, which adds up to over $350 billion a year. Unfortunately, many well-meaning federal judges are inadvertently making it easier for wrongdoers to retain these ill-gotten gains by unnecessarily cutting short the investigative time for the government to evaluate fraud allegations brought by whistleblowers under the False Claims Act (FCA). The FCA is the federal government’s primary tool to recover funds obtained through the submission of false claims. Because the government is unable to detect most fraud cases absent the help of whistleblowers, Congress included qui tam provisions …
Antitrust Goals In Developing Countries: Policy Alternatives And Normative Choices, 2015 Seattle University School of Law
Antitrust Goals In Developing Countries: Policy Alternatives And Normative Choices, Dina I. Waked
Seattle University Law Review
This Article outlines the different policy alternatives that could guide antitrust enforcement in developing countries. These include efficiency- based goals (allocative, productive, economic, and dynamic efficiency) and non-efficiency-based goals (protecting small businesses; achieving international competitiveness; eradicating poverty; and promoting fairness, equality, and justice). The actual antitrust goals selected by fifty developing countries are then presented. Finally, a proposal is made with regards to what developing countries should aim at achieving with their antitrust law enforcement. This normative take is geared towards realizing dynamic efficiencies or technological progress, coupled with redistribution through antitrust rules, as the accelerators of growth and development. …
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, 2015 University of Wyoming
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Robert Sprague
Future Of Ai And Law, 2015 Cornell Law School
Future Of Ai And Law, Abby Cessna
Cornell Law School J.D. Student Research Papers
Technology has already transformed the way that law is practiced. The use of computers and digital legal resources, such as LexisNexis and Westlaw have been around for decades, but these are just some of the major technological advancements that have transformed law. For instance, it was groundbreaking for a law firm as prestigious as Orrick, Herrington & Sutcliffe to have a website in the late 1990's, which was getting around 5000 visits a week. Now law firms not only have websites but also use a variety of social media services to promote their firm and services. In addition to promoting …
Ninth Circuit Nine-Plus -- Settling The Law In Internet Keyword Advertising And Trademark Use, 2015 Rutgers University - Camden
Ninth Circuit Nine-Plus -- Settling The Law In Internet Keyword Advertising And Trademark Use, Andrew Leahey
Andrew Leahey
No abstract provided.
Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, 2015 Cornell Law School
Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues
Cornell Law School J.D. Student Research Papers
Sharing personal information with a lawyer potentially represents the greatest source of vulnerability for an individual. Since the first major security breach in 2005, law firms have been pressed both by public authorities and clients to take action in order to protect confidential information from potential harmful breaches.
This paper seeks to provide an overview of the challenges faced by lawyers in handling personal information with regard to potential security breaches. The aim is to analyze this issue through the focal of privacy law; statistics on security breaches and tools to prevent this phenomenon, extensively studied in class, are given …
Information Technology And The Law - Copyright In Cyberspace, 2015 Lund University, Faculty of Law
Information Technology And The Law - Copyright In Cyberspace, Ulf Maunsbach
Ulf Maunsbach
No abstract provided.
Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To Eberlein Et Al. Tbgi Analytical Framework, 2015 University of Waikato
Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To Eberlein Et Al. Tbgi Analytical Framework, Nachshon Goltz Mr.
Nachshon Goltz Mr.
This article analyzes the regulation of children’s privacy online, especially in the context of personal information collection as a commodity, in the United States of America and the European Union according to Eberlein et. al. Transnational Business Governance Framework. The article reviews the regulatory structure of this field in these two jurisdictions including global organizations, according to Elberlein et al components and questions. In the analysis, a map of the regulatory interactions within this global realm will be presented and discussed. Finally, conclusions are drawn and suggestions are made.
Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, 2015 SelectedWorks
Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell
Julian Dibbell
When does work become play, and play work? Courts have considered the question in a variety of economic contexts, from student athletes seeking recognition as employees to professional blackjack players seeking to be treated by casinos just like casual players. Here I apply the question to a relatively novel context: that of online gold farming, a gray-market industry in which wage-earning workers, largely based in China, are paid to play online fantasy games (MMOs) that reward them with virtual items their employers sell for profit to the same games’ casual players. Gold farming is clearly a job (and under the …
A Government Of Laws Not Of Precedents 1776-1876: The Google Challenge To Common Law Myth, 2015 University of Baltimore School of Law
A Government Of Laws Not Of Precedents 1776-1876: The Google Challenge To Common Law Myth, James Maxeiner
All Faculty Scholarship
The United States, it is said, is a common law country. The genius of American common law, according to American jurists, is its flexibility in adapting to change and in developing new causes of action. Courts make law even as they apply it. This permits them better to do justice and effectuate public policy in individual cases, say American jurists.
Not all Americans are convinced of the virtues of this American common law method. Many in the public protest, we want judges that apply and do not make law. American jurists discount these protests as criticisms of naive laymen. They …
Introduction: Cyber And The Changing Face Of War, 2015 University of Pennsylvania Carey Law School
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
All Faculty Scholarship
Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, 2015 Loyola Marymount University and Loyola Law School
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, 2015 University of Georgia School of Law
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
Occasional Papers Series
Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …
Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, 2015 Indiana University - Bloomington
Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans
Indiana Law Journal
This Comment analyzes the regulations in place on 3D-printed firearms and proposes a new standard for regulating 3D-printed goods. Part I provides a brief primer on 3D printing and 3D-printed firearms. Part II turns to the events surrounding Defense Distributed’s creation of the world’s first 3D-printed firearm and the subsequent government censorship of the corresponding CAD files. Part III discusses the regulations affecting 3D-printed firearms and why these regulations are ill-suited for CAD files and 3D-printed goods. Part IV analyzes the implications of treating CAD files and 3D-printed goods as equivalents of traditional goods. Finally, Part V offers a proposal …
Small Data Surveillance V. Big Data Cybersurveillance, 2015 William & Mary Law School
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Faculty Publications
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that "collect-it-all" tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …