Visitors

Sunday, December 31, 2017

New depth sensors could be sensitive enough for self-driving cars

Computational method improves the resolution of time-of-flight depth sensors 1,000-fold.

For the past 10 years, the Camera Culture group at MIT’s Media Lab has been developing innovative imaging systems — from a camera that can see around corners to one that can read text in closed books — by using “time of flight,” an approach that gauges distance by measuring the time it takes light projected into a scene to bounce back to a sensor.
In a new paper appearing in IEEE Access, members of the Camera Culture group present a new approach to time-of-flight imaging that increases its depth resolution 1,000-fold. That’s the type of resolution that could make self-driving cars practical.
The new approach could also enable accurate distance measurements through fog, which has proven to be a major obstacle to the development of self-driving cars.
At a range of 2 meters, existing time-of-flight systems have a depth resolution of about a centimeter. That’s good enough for the assisted-parking and collision-detection systems on today’s cars.
But as Achuta Kadambi, a  joint PhD student in electrical engineering and computer science and media arts and sciences and first author on the paper, explains, “As you increase the range, your resolution goes down exponentially. Let’s say you have a long-range scenario, and you want your car to detect an object further away so it can make a fast update decision. You may have started at 1 centimeter, but now you’re back down to [a resolution of] a foot or even 5 feet. And if you make a mistake, it could lead to loss of life.”
At distances of 2 meters, the MIT researchers’ system, by contrast, has a depth resolution of 3 micrometers. Kadambi also conducted tests in which he sent a light signal through 500 meters of optical fiber with regularly spaced filters along its length, to simulate the power falloff incurred over longer distances, before feeding it to his system. Those tests suggest that at a range of 500 meters, the MIT system should still achieve a depth resolution of only a centimeter.
Kadambi is joined on the paper by his thesis advisor, Ramesh Raskar, an associate professor of media arts and sciences and head of the Camera Culture group.
Slow uptake
With time-of-flight imaging, a short burst of light is fired into a scene, and a camera measures the time it takes to return, which indicates the distance of the object that reflected it. The longer the light burst, the more ambiguous the measurement of how far it’s traveled. So light-burst length is one of the factors that determines system resolution.
The other factor, however, is detection rate. Modulators, which turn a light beam off and on, can switch a billion times a second, but today’s detectors can make only about 100 million measurements a second. Detection rate is what limits existing time-of-flight systems to centimeter-scale resolution.
There is, however, another imaging technique that enables higher resolution, Kadambi says. That technique is interferometry, in which a light beam is split in two, and half of it is kept circulating locally while the other half — the “sample beam” — is fired into a visual scene. The reflected sample beam is recombined with the locally circulated light, and the difference in phase between the two beams — the relative alignment of the troughs and crests of their electromagnetic waves — yields a very precise measure of the distance the sample beam has traveled.
But interferometry requires careful synchronization of the two light beams. “You could never put interferometry on a car because it’s so sensitive to vibrations,” Kadambi says. “We’re using some ideas from interferometry and some of the ideas from LIDAR, and we’re really combining the two here.”
On the beat
They’re also, he explains, using some ideas from acoustics. Anyone who’s performed in a musical ensemble is familiar with the phenomenon of “beating.” If two singers, say, are slightly out of tune — one producing a pitch at 440 hertz and the other at 437 hertz — the interplay of their voices will produce another tone, whose frequency is the difference between those of the notes they’re singing — in this case, 3 hertz.
The same is true with light pulses. If a time-of-flight imaging system is firing light into a scene at the rate of a billion pulses a second, and the returning light is combined with light pulsing 999,999,999 times a second, the result will be a light signal pulsing once a second — a rate easily detectable with a commodity video camera. And that slow “beat” will contain all the phase information necessary to gauge distance.
But rather than try to synchronize two high-frequency light signals — as interferometry systems must — Kadambi and Raskar simply modulate the returning signal, using the same technology that produced it in the first place. That is, they pulse the already pulsed light. The result is the same, but the approach is much more practical for automotive systems.
“The fusion of the optical coherence and electronic coherence is very unique,” Raskar says. “We’re modulating the light at a few gigahertz, so it’s like turning a flashlight on and off millions of times per second. But we’re changing that electronically, not optically. The combination of the two is really where you get the power for this system.”
Through the fog
Gigahertz optical systems are naturally better at compensating for fog than lower-frequency systems. Fog is problematic for time-of-flight systems because it scatters light: It deflects the returning light signals so that they arrive late and at odd angles. Trying to isolate a true signal in all that noise is too computationally challenging to do on the fly.
With low-frequency systems, scattering causes a slight shift in phase, one that simply muddies the signal that reaches the detector. But with high-frequency systems, the phase shift is much larger relative to the frequency of the signal. Scattered light signals arriving over different paths will actually cancel each other out: The troughs of one wave will align with the crests of another. Theoretical analyses performed at the University of Wisconsin and Columbia University suggest that this cancellation will be widespread enough to make identifying a true signal much easier.
“I am excited about medical applications of this technique,” says Rajiv Gupta, director of the Advanced X-ray Imaging Sciences Center at Massachusetts General Hospital and an associate professor at Harvard Medical School. “I was so impressed by the potential of this work to transform medical imaging that we took the rare step of recruiting a graduate student directly to the faculty in our department to continue this work.”
“I think it is a significant milestone in development of time-of-flight techniques because it removes the most stringent requirement in mass deployment of cameras and devices that use time-of-flight principles for light, namely, [the need for] a very fast camera,” he adds. “The beauty of Achuta and Ramesh’s work is that by creating beats between lights of two different frequencies, they are able to use ordinary cameras to record time of flight.”

Thursday, November 30, 2017

Cybersecurity Role

Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.


Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services.


Combating Cyber Crime

 Today’s world is more interconnected than ever before. Yet, for all its advantages, increased connectivity brings increased risk of theft, fraud, and abuse. As Americans become more reliant on modern technology, we also become more vulnerable to cyberattacks such as corporate security breaches, spear phishing, and social media fraud. Complementary cybersecurity and law enforcement capabilities are critical to safeguarding and securing cyberspace. Law enforcement performs an essential role in achieving our nation’s cybersecurity objectives by investigating a wide range of cyber crimes, from theft and fraud to child exploitation, and apprehending and prosecuting those responsible. The Department of Homeland Security (DHS) works with other federal agencies to conduct high-impact criminal investigations to disrupt and defeat cyber criminals, prioritize the recruitment and training of technical experts, develop standardized methods, and broadly share cyber response best practices and tools. Criminal investigators and network security experts with deep understanding of the technologies malicious actors are using and the specific vulnerabilities they are targeting work to effectively respond to and investigate cyber incidents.

Wednesday, November 29, 2017

How Facebook’s Annual “Hacktober” Campaign Promotes Cybersecurity to Employees

While the word “cybersecurity” may evoke thoughts of highly sophisticated attacks that require fancy computing equipment and skilled hackers, the reality is that most attacks — especially in a corporate environment — involve simpler strategies that depend upon one thing: exploiting human behavior.


Most companies are hard at work building technology to better protect themselves and their users or customers. But technology can only get us so far. People are the most important factor in any company’s cybersecurity strategy, and investing in security engagement goes a long way in helping companies reduce the probability of a breach.


Facebook runs security engagement programs year-round, but the most important tool in our arsenal is Hacktober, an annual, monthlong tradition each October designed to build and maintain a security-conscious culture. It’s our version of National Cyber Security Awareness Month, a campaign to get people involved in cyber security and play their part in making the internet safer and more secure for everyone.


Hacktober has a number of different elements, from phishing tests and marketing campaigns to contests, workshops, and expert talks. Participation is not mandatory, but we find that about one-third of employees participate in at least one activity over the course of the month. Everything is designed to remind our employees how to protect themselves, our company, and the millions of people who use Facebook every day.


Security awareness can be engaging rather than scary — or worse, boring. If we create an interactive and fun environment around security, people will learn important security lessons and retain them throughout the year.


At Facebook, we take a “hacker” approach to security awareness because that ethos is a core part of our culture, which means it resonates with our employees. One of the best examples of this is our Capture the Flag (CTF) competitions.


Monday, November 27, 2017

Bitcoin nears $10,000 mark as hedge funds plough in

Bitcoin has hit a record high after passing $9,000 (£6,700) and is close to reaching five figures as investors in the cryptocurrency shrug off warnings of a bubble.
The cryptocurrency rose to an all-time high of $9,721 on Monday. It is now worth more than seven times an ounce of gold, which is seen as a haven in times of turmoil.
In a remarkable rally, bitcoin started the year at $1,000 and smashed through $5,000 in October.

Analysts said the decision by the Chicago Mercantile Exchange (CME) to launch bitcoin futures in December had fuelled buying, but also warned of the dangers of a speculative bubble building. The digital currency has gained more than 50% since the CME announced its decision on 31 October.
Neil Wilson, senior market analyst at ETX Capital, said: “The legitimacy this gives bitcoin as a tradeable asset is very important. The market cap of bitcoin now exceeds that of IBM, Disney [or] McDonald’s.”
The value of the 16.7m bitcoin units in circulation has exceeded $160bn.

Kali Linux 2017.3 Brings New Hacking Tools — Download ISO And Torrent Files Here

Kali Linux, the leading ethical hacking operating system, is distributed and developed by Offensive Security. In 2016, the developers decided to make a switch to the rolling release model to make sure that Kali Linux is updated at regular intervals.
Combining all the latest updates, patches, fixes, and improvements released in past few months, latest Kali Linux 2017.3 snapshot has been released. Before this release, Kali Linux 2017.2 was shipped in September.

 Changes and new tools in Kali Linux 2017.3

The latest ISO is powered by the updated Linux kernel 4.13.10. As a result of this, some of the significant changes are:
  • EXT4 directories can now contain 2 billion entries
  • TLS support built into the kernel
  • CIFS now uses SMB 3.0 by default
Before telling you about the new hacking tools included in 2017.3, let me tell you the existing packages that have been updated. These packages include Veil 3.0, Reaver v1.6.3, Social Engineering Toolkit v7.7.4, O-Saft 17.04.17, cuckoo 2.0.4, Burpsuite v1.7.27, Pixiewps v1.3, and Ethtool. Existing bugs in packages like Metasploit, Openvas 9, Setoolkit, Nmap, Hydra, etc., have been resolved as well.
The newly added Kali tools are:
  • InSpy: Performs enumeration on LinkedIn and finds people on the basis of required criteria
  • CherryTree: A often-requested note-taking tool
  • Sublist3r: Enumerates subdomains across multiple sources at once. Thanks to integration with SubBrute, one can brute-force subdomains using a wordlist.
  • OSRFramework: A collection of scripts to enumerate users, domains, etc.
  • Massive Maltego Metamorphosis: A combination of Maltego and Casefile

Download Kali 2017.3 ISO and Torrent files

Just like all the previous releases, Kali Linux 2017.3’s 32-bit and 64-bit versions are available in the form of standard ISO images, VirtualBox and VMware images, ARM images, and cloud instances. You can download the HTTP downloads and torrent files on Kali downloads page.
Are you going to upgrade your existing Kali installation? Don’t forget to share your views and experiences with us.
 

Putting the “AI” in ThAInksgiving

It’s true that AI and machine learning are changing the world, and in a few years, it will be embedded in all of the technology in our lives.
So maybe it makes sense to help folks at home better understand machine learning. After all, without deep knowledge of current tech, autonomous vehicles seem dangerous, Skynet is coming, and the (spoiler warning!) AI-controlled human heat farms of The Matrix are a real possibility.
This stems from a conflation of the very real and exciting concept of machine learning and the very not real concept of “general artificial intelligence,” which is basically as far off today as it was when science fiction writers first explored the idea a hundred years ago.
That said, you may find yourself in a discussion on this topic during the holidays this year, either of your own volition or by accident. And you’ll want to be prepared to argue for AI, against it, or simply inject facts as you moderate the inevitably heated conversation.
But before you dive headlong into argument mode, it’s important that you both know what AI is (which, of course, you do!) and that you know how to explain it.

Sunday, November 26, 2017

Understanding Onboard Flash Programming

Firmware often is preprogrammed into flash memory devices prior to the printed-circuit board’s (PCB) manufacture to maintain high throughput and avoid slowing the manufacturing beat rate. Yet there are advantages to programming the flash memory after it has been soldered to the PCB. In-circuit test (ICT), the Joint Test Action Group (JTAG) interface, and external connectors all can be used to program flash devices without impacting manufacturing beat rates. Image size, existing manufacturing infrastructure, system capability, and required programming methods also should be considered in choosing an optimal preprogramming solution.

Onboard Programming Advantages


One of the most significant advantages of onboard programming is that it enables design and manufacturing engineers to combine IC testing and programming into a single manufacturing process, which eliminates the need to perform offboard programming of an IC prior to surface-mounting the device.

Flash memory utilization typically depends on the development stage of a product. In many applications, designers use flash memory to develop, store, and eventually execute firmware and application code. Onboard programming is often used during the development of new application code or firmware. Code is written, compiled, and downloaded onto the flash device on the development board and then tested on the target PCB.
When the hardware and software nears production readiness, it is common practice to preprogram flash memory devices prior to starting high-volume PCB manufacturing flows for two principal reasons. First, firmware loaded onto the device can be used to perform basic booting and testing of the PCB during manufacturing to check system/module functionality. Second, loading the final firmware, operating system (OS), and application code on the flash device prior to manufacturing maintains a high-volume manufacturing beat rate. To support these usage models, multiple vendors provide systems for loading firmware and data into flash memory devices prior to the PCB solder flow process

Firmware often is preprogrammed into flash memory devices prior to the printed-circuit board’s (PCB) manufacture to maintain high throughput and avoid slowing the manufacturing beat rate. Yet there are advantages to programming the flash memory after it has been soldered to the PCB. In-circuit test (ICT), the Joint Test Action Group (JTAG) interface, and external connectors all can be used to program flash devices without impacting manufacturing beat rates. Image size, existing manufacturing infrastructure, system capability, and required programming methods also should be considered in choosing an optimal preprogramming solution. 

Onboard Programming Advantages

One of the most significant advantages of onboard programming is that it enables design and manufacturing engineers to combine IC testing and programming into a single manufacturing process, which eliminates the need to perform offboard programming of an IC prior to surface-mounting the device.
Flash memory utilization typically depends on the development stage of a product. In many applications, designers use flash memory to develop, store, and eventually execute firmware and application code. Onboard programming is often used during the development of new application code or firmware. Code is written, compiled, and downloaded onto the flash device on the development board and then tested on the target PCB.
When the hardware and software nears production readiness, it is common practice to preprogram flash memory devices prior to starting high-volume PCB manufacturing flows for two principal reasons. First, firmware loaded onto the device can be used to perform basic booting and testing of the PCB during manufacturing to check system/module functionality. Second, loading the final firmware, operating system (OS), and application code on the flash device prior to manufacturing maintains a high-volume manufacturing beat rate. To support these usage models, multiple vendors provide systems for loading firmware and data into flash memory devices prior to the PCB solder flow process. 
The ability to leverage existing manufacturing systems for testing, coupled with the fast program speeds of flash memory, make onboard programming a viable mainstream solution for programming flash memory. In addition to having no impact on the manufacturing line, other advantages of onboard programming include:  
  •  Faster time-to-market: If a change is made to the flash memory image, the change can be sent directly to the manufacturing line, speeding the delivery time into production. 
  •  Improved quality: Removing the preprogrammed inventory reduces the risk of sending out the wrong version of firmware, OS, or application code as well as the time and resources needed to track units that must be reworked.  
  •  Supply chain simplification: Traditionally, manufacturing operations track both programmed and unprogrammed units, whereas with onboard programming, only unprogrammed flash units need to be monitored.

Onboard Programming Techniques

Several onboard programming (or in-system programming [ISP]) techniques are used to load firmware and data onto a flash device after solder reflow. These techniques include ICT, JTAG, and external connections (Table 1).
ICT is a test methodology that checks PCBs for assembly defects such as shorts, opens, resistance, and capacitance directly after devices are mounted in the solder reflow oven. After undergoing a successful test sequence, flash memory devices can be programmed directly by the ICT equipment. The program time must be very short (approximately 1 to 4 seconds) to avoid negatively impacting the manufacturing beat rate. In addition, programming a memory device with ICT typically requires a low-pin-count interface, which limits the number of nails/pins on the test fixture.
JTAG is an IEEE standard (IEEE 1149.1) that uses boundary scan architecture to test for structural integrity between devices on a PCB. The JTAG interface also can perform ISP of flash memory devices. During the boundary scan check, the interface enables direct control over the memory signals, enabling an image to be programmed into a flash device. JTAG programmers typically write software and data to the flash memory using data bus access similar to the access used to update CPU firmware.
ICT and JTAG are typically used for programming small data images (less
than 16 Mbytes) on flash memory devices like NOR due to the low bandwidth required by these processes (low-pin-count bus or slow clock frequencies). Table 2 compares the theoretical write performance of NOR flash lithography nodes and interfaces. 
External connection and new ICT models are the best techniques for transferring larger data images that require a higher bandwidth. These two techniques provide an opportunity for manufacturing tool and support vendors to enable faster transfers of high-density firmware and data to flash memory devices. ICT testers have recently reached program speeds of 20 Mbytes/s.
External-edge connections accomplish onboard programming using two basic methods. With a microprocessor, data is transferred into the flash device with an existing connector (e.g., USB) using the main microprocessor on the PCB for control. Without a microprocessor, data is transferred into the flash device with an existing connector (e.g., UART) using specific control logic on the PCB dedicated to the manufacturing environment. In this case, the onboard microprocessor is not used.
External connection techniques and new ICT models can transfer data at much higher rates. Table 3 shows the bandwidth that can be achieved using single-level cell (SLC) NAND and e∙MMC memory for a given lithography node. In each case, the device rather than the interface limits the programming bandwidth.

Critical Factors For Onboard ProgrammingWhen choosing an onboard programming method to program images on flash devices, memory type, image size, board design, and existing manufacturing capabilities are all critical factors to consider. 

Firmware code, operating systems, and data files can range from tens of kilobytes to hundreds of megabytes. For a smaller image size (less than 8 Mbytes), ICT and JTAG are ideal because of their low bandwidth. Today, many manufacturing lines use JTAG and ICT to test board-level functionality, so additional tools are not needed. With existing hardware in place and NOR flash products that can program between 1 Mbyte/s and 2 Mbytes/s, onboard programming is an ideal solution when the program time does not exceed 4 seconds and does not impact the manufacturing beat rate. 
The program performance of high-density (32 Mbytes to 1 Tbyte) NAND flash enables the use of optimized onboard programming techniques. SLC NAND is the fastest (5 to 60 Mbytes/s) programming flash memory on the market. However, the flash market is transitioning to managed NAND solutions such as e∙MMC embedded memory that have programming speeds ranging from 10 to 35 Mbytes/s. 
Memory devices with high-bandwidth capabilities use two different techniques for transferring large data images: new ICT models and external connections. Recent ICT models can support fast program speeds for high-density memory devices. External-edge connectors can either use the onboard processor or skip the processor and program the flash memory directly. Both of these external connection techniques require either a PCB design to route the data through the processor or logic onboard to handle bus isolation to program the flash memory.