Strong Protection of Sensitive Textual Content of Mobile Applications

Total Page:16

File Type:pdf, Size:1020Kb

Strong Protection of Sensitive Textual Content of Mobile Applications SchrodinText: Strong Protection of Sensitive Textual Content of Mobile Applications Ardalan Amiri Sani Computer Science Department University of California, Irvine [email protected] Abstract Keywords Many mobile applications deliver and show sensitive and Text protection; Mobile devices; UI safety; TrustZone; Vir- private textual content to users including messages, social tualization network posts, account information, and verification codes. All such textual content must only be displayed to the user 1. INTRODUCTION but must be strongly protected from unauthorized access There are millions of mobile applications today. The tex- in the device. Unfortunately, this is not the case in mobile tual content that many of these applications show to the devices today: malware that can compromise the operating user in their UI can contain extremely sensitive and pri- system, e.g., gain root or kernel privileges, can easily access vate information, such as social security number, bank ac- textual content of other applications. count information, private messages, passwords (in a pass- In this paper, we present SchrodinText, a system solution word vault), and verification codes used for two-factor au- for strongly protecting the confidentiality of application's se- thentication. Such content must only be displayed to the user lected UI textual content from a fully compromised operat- but must be otherwise protected against unauthorized access ing system. SchrodinText leverages a novel security monitor by malware. Indeed, Zhou et al. found 644 malware samples based on two hardware features on modern ARM processors: (in 27 families) that harvest \user's information, including virtualization hardware and TrustZone. Our key contribu- user accounts and short messages stored on the phones" [54]. tion is a set of novel techniques that allow the operating Application developers attempt to defeat this by encrypting system to perform the text rendering without needing access the raw text in their backend server and send the ciphertext to the text itself, hence minimizing the Trusted Computing to the mobile application. However, the application needs Base (TCB). These techniques, collectively called oblivious to decrypt the ciphertext before passing it to the operating rendering, enable the operating system to rasterize and lay system for rendering and showing to the user. Therefore, out all the characters without access to the text; the monitor malware that compromises the operating system (or even only resolves the right character glyphs onto the framebuffer just its graphics stack) can access the content. observed by the user and protects them from the operating This is a growing concern as mobile operating systems are system, e.g., against DMA attacks. We present our proto- increasingly large and unreliable. Malware hiding inside or- type using an ARM Juno development board and Android dinary unprivileged applications can easily compromise the operating system. We show that SchrodinText incurs no- operating system and gain root or kernel privileges [50, 53]. ticeable overhead but that its performance is usable. Such malware can then attempt to extract sensitive content \If one has left this entire system to itself for an hour, from other applications using various methods. For exam- one would say that the cat still lives if meanwhile no atom ple on Android, these methods include but are not limited has decayed. The first atomic decay would have poisoned it. The psi-function of the entire system would express to the following. Malware with root privilege can (i) take a this by having in it the living and dead cat (pardon the screenshot of the device UI, which might contain the afore- expression) mixed or smeared out in equal parts. It is mentioned sensitive text or (ii) replace Android's UI ren- typical of these cases that an indeterminacy originally dering libraries; the compromised library can then leak the restricted to the atomic domain becomes transformed into textual content of victim applications. Or malware with macroscopic indeterminacy, which can then be resolved kernel privileges can (i) access the application's memory in by direct observation." - Erwin Schr¨odinger1 order to read the plaintext after decryption or (ii) read the 1https://en.wikipedia.org/wiki/Schrodingers cat texture buffers allocated by the graphics stack to hold the character glyphs used in the text. Permission to make digital or hard copies of all or part of this work for personal or Unfortunately, as noted by Checkoway et al. [23], it is ex- classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation tremely difficult to fully protect an application from a com- on the first page. Copyrights for components of this work owned by others than the promised operating system. Yet, we ask ourselves: can we author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or at least protect the confidentiality of selected sensitive textual republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. content of the application's UI in such an environment? We MobiSys’17, June 19-23, 2017, Niagara Falls, NY, USA care about protecting selected textual content since most, if not all, sensitive information delivered to the user via apps © 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM. ISBN 978-1-4503-4928-4/17/06. $15.00 is in textual format. DOI: http://dx.doi.org/10.1145/3081333.3081346 In this paper, we present a system solution, called Schrod- inText, designed to meet this goal. Our solution leverages To address this challenge, we choose to limit SchrodinText novel hardware features in ARM processors to create a se- to monospaced fonts, in which all characters have a fixed curity monitor for showing and protecting the text. The width. In addition, we introduce a technique for determin- monitor leverages both virtualization and TrustZone hard- ing the line-breaks without access to the text, called oblivi- ware available on modern ARM processor. The monitor is ous line-breaking. These two techniques allow the operating more privileged than the operating system and is used to system to perform the layout in full, only needing access to protect the selected textual content shown on the display. the number of characters in the text, and not the text itself. In SchrodinText, the application's backend server encrypts Second, once character glyphs are rasterized and their lo- the text with a key only available to the monitor, hence pro- cations are determined, they must be composited on top of tecting it from the operating system. However, this raises other layers in the framebuffer and displayed to the user. an important challenge: the text needs to be rendered by Android on modern mobile devices uses the GPU for com- the graphics stack in the operating system. The final pix- positing. Exposing the resolved glyphs to the GPU makes els displayed to the user depend on the font type, size, and them vulnerable to attacks by the operating system since color chosen by the app developer, all of which are available the GPU is programmed by the operating system. We use and understandable by the operating system, and not the two techniques, namely multi-view pages and two-stage com- monitor. The graphics stack includes several libraries and positing, to securely perform the compositing while protect- frameworks as well as kernel device drivers and is one of ing the resolved glyphs. Collectively, these two techniques the largest and most complicated components of the oper- allow us to use the operating system and GPU for composit- ating system. Therefore, how can the monitor display the ing of non-protected textures and use the monitor (but not textual content to the user given that the graphics stack is the GPU) for compositing the protected text glyphs, all the implemented by the operating system? while protecting them from the operating system and other At first glance, it seems like a feasible solution to this DMA-capable devices. problem is to move the graphics stack to the monitor. How- It is important to note that SchrodinText protects the ever, such an approach would significantly bloat the Trusted output text of the applications but not the input text. That Computing Base (TCB) of the monitor. A large TCB would is, it protects the textual content that is shown to the user, make the monitor vulnerable to attacks itself hence defeating such as received messages, bank account information, health the original purpose. An alternative approach might then be records, and verification codes in two-factor authentication. to support a minimal and simplified version of the graphics It, however, does not protect the text input by the user, in- stack in the monitor, in order to keep the TCB small. Un- cluding outgoing messages and typed passwords. Protecting fortunately, with this approach, the content rendered by the the input text also requires protecting the input stack in the monitor would not be visually well-integrated with the rest operating system, which is out of the scope of this work. of the content, which are rendered by the complete graphics We have designed SchrodinText with ease of use for de- stack in the operating system. Moreover, such a solution velopers in mind. More specifically, we provide a simple would not be able to easily benefit from updates to the op- UI widget, called SchrodinTextView, which is a modified erating system graphics stack, which, for example, might version of TextView used in Android to embed text in appli- introduce new fonts and effects from untrusted sources. cation's UI. The developer can simply embed this widget in In SchrodinText, we introduce an alternative solution that the UI, very similar to existing widgets.
Recommended publications
  • The Black Arts Enterprise and the Production of African American Poetry
    0/-*/&4637&: *ODPMMBCPSBUJPOXJUI6OHMVFJU XFIBWFTFUVQBTVSWFZ POMZUFORVFTUJPOT UP MFBSONPSFBCPVUIPXPQFOBDDFTTFCPPLTBSFEJTDPWFSFEBOEVTFE 8FSFBMMZWBMVFZPVSQBSUJDJQBUJPOQMFBTFUBLFQBSU $-*$,)&3& "OFMFDUSPOJDWFSTJPOPGUIJTCPPLJTGSFFMZBWBJMBCMF UIBOLTUP UIFTVQQPSUPGMJCSBSJFTXPSLJOHXJUI,OPXMFEHF6OMBUDIFE ,6JTBDPMMBCPSBUJWFJOJUJBUJWFEFTJHOFEUPNBLFIJHIRVBMJUZ CPPLT0QFO"DDFTTGPSUIFQVCMJDHPPE The Black Arts Enterprise and the Production of African American Poetry The Black Arts Enterprise and the Production of African American Poetry Howard Rambsy II The University of Michigan Press • Ann Arbor First paperback edition 2013 Copyright © by the University of Michigan 2011 All rights reserved Published in the United States of America by The University of Michigan Press Manufactured in the United States of America c Printed on acid-free paper 2016 2015 2014 2013 5432 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the written permission of the publisher. A CIP catalog record for this book is available from the British Library. Library of Congress Cataloging-in-Publication Data Rambsy, Howard. The black arts enterprise and the production of African American poetry / Howard Rambsy, II. p. cm. Includes bibliographical references and index. ISBN 978-0-472-11733-8 (cloth : acid-free paper) 1. American poetry—African American authors—History and criticism. 2. Poetry—Publishing—United States—History—20th century. 3. African Americans—Intellectual life—20th century. 4. African Americans in literature. I. Title. PS310.N4R35 2011 811'.509896073—dc22 2010043190 ISBN 978-0-472-03568-7 (pbk. : alk. paper) ISBN 978-0-472-12005-5 (e-book) Cover illustrations: photos of writers (1) Haki Madhubuti and (2) Askia M. Touré, Mari Evans, and Kalamu ya Salaam by Eugene B. Redmond; other images from Shutterstock.com: jazz player by Ian Tragen; African mask by Michael Wesemann; fist by Brad Collett.
    [Show full text]
  • Complete Issue 40:3 As One
    TUGBOAT Volume 40, Number 3 / 2019 General Delivery 211 From the president / Boris Veytsman 212 Editorial comments / Barbara Beeton TEX Users Group 2019 sponsors; Kerning between lowercase+uppercase; Differential “d”; Bibliographic archives in BibTEX form 213 Ukraine at BachoTEX 2019: Thoughts and impressions / Yevhen Strakhov Publishing 215 An experience of trying to submit a paper in LATEX in an XML-first world / David Walden 217 Studying the histories of computerizing publishing and desktop publishing, 2017–19 / David Walden Resources 229 TEX services at texlive.info / Norbert Preining 231 Providing Docker images for TEX Live and ConTEXt / Island of TEX 232 TEX on the Raspberry Pi / Hans Hagen Software & Tools 234 MuPDF tools / Taco Hoekwater 236 LATEX on the road / Piet van Oostrum Graphics 247 A Brazilian Portuguese work on MetaPost, and how mathematics is embedded in it / Estev˜aoVin´ıcius Candia LATEX 251 LATEX news, issue 30, October 2019 / LATEX Project Team Methods 255 Understanding scientific documents with synthetic analysis on mathematical expressions and natural language / Takuto Asakura Fonts 257 Modern Type 3 fonts / Hans Hagen Multilingual 263 Typesetting the Bangla script in Unicode TEX engines—experiences and insights Document Processing / Md Qutub Uddin Sajib Typography 270 Typographers’ Inn / Peter Flynn Book Reviews 272 Book review: Hermann Zapf and the World He Designed: A Biography by Jerry Kelly / Barbara Beeton 274 Book review: Carol Twombly: Her brief but brilliant career in type design by Nancy Stock-Allen / Karl
    [Show full text]
  • Agda User Manual Release 2.6.3
    Agda User Manual Release 2.6.3 The Agda Team Sep 23, 2021 Contents 1 Overview 3 2 Getting Started 5 2.1 What is Agda?..............................................5 2.2 Installation................................................7 2.3 ‘Hello world’ in Agda.......................................... 13 2.4 A Taste of Agda............................................. 14 2.5 A List of Tutorials............................................ 22 3 Language Reference 25 3.1 Abstract definitions............................................ 25 3.2 Built-ins................................................. 27 3.3 Coinduction............................................... 40 3.4 Copatterns................................................ 42 3.5 Core language.............................................. 45 3.6 Coverage Checking............................................ 48 3.7 Cubical.................................................. 51 3.8 Cumulativity............................................... 65 3.9 Data Types................................................ 66 3.10 Flat Modality............................................... 69 3.11 Foreign Function Interface........................................ 70 3.12 Function Definitions........................................... 75 3.13 Function Types.............................................. 78 3.14 Generalization of Declared Variables.................................. 79 3.15 Guarded Cubical............................................. 84 3.16 Implicit Arguments...........................................
    [Show full text]
  • The Effect of Fonts Design Features on OCR for Latin and Arabic
    Avestia Publishing Journal of Multimedia Theory and Application Volume 1, Year 2014 Journal ISSN: 2368-5956 DOI: 10.11159/jmta.2014.006 The Effect of Fonts Design Features on OCR for Latin and Arabic Jehan Janbi1,2, Mrouj Almuhajri2, Ching Y. Suen2 1Department of Computer Science, Taif University Airport Rd, Al Huwaya, Taif, Saudi Arabia [email protected] 2CENPARMI Concordia University, 1515 St. Catherine W. Montréal, QC, Canada [email protected]; [email protected] Abstract - Huge digitized book projects have been launched and handwritten characters. The improvement of recently like Google Book Search Library project and MLibrary. recognition can be effected by modification of OCR They basically depend on optical character recognition systems stages, such as pre-processing, segmentation, features (OCR) to convert scanned books or documents into editable and extraction or recognition stage. Several studies text searchable e-books. Although research on OCR area addressed different features to be extracted in purpose pursued over decades, very few of them focus on the effect of typeface design on the recognition rate. We took a further step of increasing OCR accuracy for Latin and Arabic scripts. by conducting systematically two observational experiments on In [1], a survey has been done on many studies that Latin and Arabic typefaces using OCR tools. A collection of 18 used different features extraction techniques for Latin, Latin and 13 Arabic typefaces have been tested in two sizes such as zoning, calculating moments and number of using six OCR packages in total. In addition, confusion tables holes and points of the character. For Arabic, in [2] have been constructed to show similarities among some more than one feature extraction method has been characters of the alphabet.
    [Show full text]
  • Muuglines the Manitoba UNIX User Group Newsletter
    MUUGLines The Manitoba UNIX User Group Newsletter Volume 27 No. 3, November 2014 Editor: Adam Thompson Next Meeting: October 14th, 2014 !here to Find the Meeting RTFM and presentation: In the RTFM segment this month, Wyatt Zacharias will explore the differences between wget(1) and curl(1). en for this month"s presentation, Brad Vo%ey will gi&e a demonstration o! Li&e(ode) an open so*rce, cross+platform, rapid application de&elop+ ment language. Li&e(ode e&ol&ed from MetaC+ ard (the original Unix Hyper(ard clone/ into be+ coming a tr*e cross+platform I01 capable o! r*n+ ning on i23, Android, O3 X, Windows, and se&+ eral variations o! Unix incl*ding Linux, Solaris, and B30. It can be used to write mobile, des%top and ser&er6(7I applications and is the most widely used Hyper(ard6.yperTal% clone. Meetings are held in the Uni&ersity o! Win+ nipeg's Loc%hart Hall (mar%ed “L” on the map/, at the so*th+east corner o! Spence Street and El+ lice A&enue. We can normally be fo*nd in room :'AB, b*t occasionally get relocated to nearby MUUG Mugs! rooms. I! there is a change, it sho*ld be con+ &eyed via a sign on the door to 1'AB. Par%ing is #ac% by pop*lar demand8 M--7 now has new available on the s*rro*nding streets. Please see coffee m*gs, cobalt bl*e and deep laser+etched http://www.uwinnipeg.ca/maps for f*rther in+ with o*r age old, lo&able logo for sale for $:; !ormation abo*t par%ing and access to the cam+ cash.
    [Show full text]
  • University of Florida Thesis Or Dissertation Formatting
    COLLECTIVITY AND FORM: POLITICS AND AESTHETICS OF COLLECTIVITY IN MICHAEL HARDT AND ANTONIO NEGRI, AMIRI BARAKA, AND THOMAS PYNCHON By JAMES LINER A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2013 1 © 2013 James Liner 2 To Ada, whose dad has been working on this dissertation all her life 3 ACKNOWLEDGMENTS First of all, I would like to thank my doctoral committee for their support, encouragement, and generous criticism throughout this project: my director, Phil Wegner; Susan Hegeman; Eric Kligerman; Barbara Mennel; and my off-campus reader, Tim Murphy. It was under Phil’s guidance that I began my serious study of the work of Fredric Jameson, while I have Tim to thank for introducing me to the thought of Michael Hardt and Antonio Negri as well as the literature of Amiri Baraka, not to mention introducing me to Hardt himself. In addition to thoughtful critiques offered by my committee, this dissertation has also benefited from comments, suggestions, questions, and conversations among several of my colleagues and close friends. Thanks go to Wes Beal, Aaron Cerny, Jordan Dominy, Andrew Gordon, Vince Leitch, Regina Martin, Mike Mayne, Emily McCann, Patrick McHenry, Matt Mingus, and Christina van Houten. I owe special thanks to Aaron and Andrew, who labored with me through a first reading of Thomas Pynchon’s Against the Day and commented on a very early version of what was to become the interpretation of that novel I offer in this dissertation.
    [Show full text]
  • Global Index with Hyperlinks to PDF Files
    Index A allography, 129, 134, 136, 232, 233 alphabet, 89, 144–148, 150, 152, abbreviation, 14, 15, 32, 33, 60–63, 154, 155, 157, 166, 168– 76, 77, 91, 269, 282, 378, 170, 172, 177, 180, 182, 514, 631, 719, 819, 946, 185–187, 218, 223–230, 1078 232, 234–236, 241, 242, marker, 15 244, 429, 432, 463, 473, abjad, 51, 53, 54, 60, 76, 134, 178, 569, 763, 765, 807, 810, 180, 228, 625, 781, 807– 811, 822, 825, 829, 831, 811, 820, 822, 910, 1109 837, 841, 888, 907, 908, Abkhaz, 115 910, 916, 1109, 1112 abstract, 561, 563, 565, 567 a monument to hidebound object, 9 conservatism, 114 abugida, 54, 162, 163, 165, 177, Arabic, 910 180, 184, 228, 625, 807– Aramaic, 166 811, 818–820, 822 Armenian, 166, 185, 186 acrophonic, 208, 232 Bougainvillian, 837 principle, 168, 224, 232 Carian, 181, 182, 232, 233 acrostics, 1109, 1111–1113, 1116 consonantal, 208, 218, 810, Adobe, 441 811 Aegean, 807, 809 Coptic, 184, 775, 776, 778, 780 Aidarus, 980 Cyrillic, 115, 154, 1068, 1070, Ajami, 971 1080 Akkadian, 59, 116, 117, 216, 218, dual, 14 929, 1112 English, 825 al-Busiri, 980 Entlehnungs-, 150 al-Inkishafi, 977 Etruscan, 170, 171, 916 Albanian, 166, 373, 392 Georgian, 793 aleph, 466, 1114, 1115 Gothic, 166, 224 Algerian (typeface), 397 Greek, 115, 167–171, 182, 187, Algernon, 276, 278 225, 226, 230–232, 234, Alice in Wonderland, 350, 351 775–779, 781 alloglottoepy, 790 Hebrew, 231, 497 alloglottography, 790 history, 157 βʹ Index Korean, 807 476, 478, 479, 497, 498, Latin, 147, 151, 154, 171, 176, 530, 564, 568, 580, 622, 182, 300, 305, 443, 445, 625, 760, 810, 835,
    [Show full text]
  • Beyond Trivial Counterfactual Generations with Diverse Valuable Explanations
    Under review as a conference paper at ICLR 2021 BEYOND TRIVIAL COUNTERFACTUAL GENERATIONS WITH DIVERSE VALUABLE EXPLANATIONS Anonymous authors Paper under double-blind review ABSTRACT Explainability of machine learning models has gained considerable attention within our research community given the importance of deploying more reliable machine-learning systems. Explanability can also be helpful for model debugging. In computer vision applications, most methods explain models by displaying the regions in the input image that they focus on for their prediction, but it is dif- ficult to improve models based on these explanations since they do not indicate why the model fail. Counterfactual methods, on the other hand, indicate how to perturb the input to change the model prediction, providing details about the model’s decision-making. Unfortunately, current counterfactual methods make ambiguous interpretations as they combine multiple biases of the model and the data in a single counterfactual interpretation of the model’s decision. Moreover, these methods tend to generate trivial counterfactuals about the model’s decision, as they often suggest to exaggerate or remove the presence of the attribute be- ing classified. Trivial counterfactuals are usually not valuable, since the informa- tion they provide is often already known to the system’s designer. In this work, we propose a counterfactual method that learns a perturbation in a disentangled latent space that is constrained using a diversity-enforcing loss to uncover mul- tiple valuable explanations about the model’s prediction. Further, we introduce a mechanism to prevent the model from producing trivial explanations. Experi- ments on CelebA and Synbols demonstrate that our model improves the success rate of producing high-quality valuable explanations when compared to previous state-of-the-art methods.
    [Show full text]
  • Adaptive Text Recognition Through Visual Matching Supplementary Material
    Adaptive Text Recognition through Visual Matching Supplementary Material Chuhan Zhang1, Ankush Gupta2, and Andrew Zisserman1 1 Visual Geometry Group,Department of Engineering Science University of Oxford fczhang,[email protected] 2 DeepMind, London [email protected] Contents Evaluation Metrics Section1 Ablation Study Section2 Examples and Visualizations Section3 Implementation of SOTA Models Section4 Performance on Scene Text Section5 Dataset Details Section6 Code, data, and model checkpoints are available at: http://www.robots.ox. ac.uk/~vgg/research/FontAdaptor20/. 1 Evaluation Metrics We measure the character (CER) and word error rates (WER): N EditDist y(i); y(i) 1 X gt pred CER = N (i) i=1 Length ygt (i) (i) th where, ygt and ypred are the i ground-truth and predicted strings respectively in a dataset containing N strings; EditDist is the Levenshtein distance [10]; Length (ygt) is the number of characters in ygt. WER is computed as CER above with words (i.e. contiguous characters separated by whitespace) in place of characters as tokens. 2 C.Zhang et al. 2 Ablation study 2.1 Ablation on modules at a larger scale In section 5.4 of the main paper, we ablated each major component of the pro- posed model architecture to evaluate its relative contribution to the model's performance. However, there the training set was limited to only one FontSynth attribute (regular fonts). Here in table1, we ablate the same model components, but couple it with increasing number of training fonts from the FontSynth dataset (section 5.2 of the main paper), still evaluating on the FontSynth test set.
    [Show full text]
  • Automating the Generation and Typesetting of Arabic Script
    AUTOMATING THE GENERATION AND TYPESETTING OF ARABIC SCRIPT by Sherif Samir Hassan Mansour A Thesis Submitted to the Faculty of Engineering at Cairo University in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE in Electronics and Communications Engineering FACULTY OF ENGINEERING, CAIRO UNIVERSITY GIZA, EGYPT 2015 AUTOMATING THE GENERATION AND TYPESETTING OF ARABIC SCRIPT by Sherif Samir Hassan Mansour A Thesis Submitted to the Faculty of Engineering at Cairo University in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE in Electronics and Communications Engineering Under the Supervision of Dr. Hossam A. H. Fahmy Associate Professor Electronics and Communications Engineering Department Faculty of Engineering, Cairo University FACULTY OF ENGINEERING, CAIRO UNIVERSITY GIZA, EGYPT 2015 AUTOMATING THE GENERATION AND TYPESETTING OF ARABIC SCRIPT by Sherif Samir Hassan Mansour A Thesis Submitted to the Faculty of Engineering at Cairo University in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE in Electronics and Communications Engineering Approved by the Examination Committee Associate Prof. Hossam A. H. Fahmy, Thesis Advisor Prof. Mohsen AbdelRazik Rashwan, Internal Member Prof. El-Sayed Mostafa Saad, External Member (Professor at the Faculty of Engineering, Helwan University) FACULTY OF ENGINEERING, CAIRO UNIVERSITY GIZA, EGYPT 2015 Engineer: Sherif Samir Hassan Mansour Date of Birth: 09/02/1986 Nationality: Egyptian E-mail: [email protected] Phone: +201227120033 Address: Building 16, Group 87, Al-Rehab City, Cairo Registration Date: 1/10/2010 Awarding Date: / / Degree: Master of Science Department: Electronics and Communications Engineering Supervisors: Associate Prof. Hossam A. H. Fahmy Examiners: Associate Prof.
    [Show full text]
  • Pilcrows from Google Fonts.Pdf
    True Reversed Pilcrows Arimo Cantarell Cardo EB Garamond Noto Sans Noto Serif ⁋ ⁋ ⁋ ⁋ ⁋ ⁋ Nova Mono Roboto Roboto Condensed Tinos Vollkorn ⁋ ⁋ ⁋ ⁋ ⁋ Mirrored Regular Pilcrows ABeeZee Abel Abhaya Libre Abril Fatface Aclonica Acme ¶ ¶ ¶ ¶ ¶ ¶ Actor Adamina Advent Pro Aguafina Script Akronim Aladin ¶ ¶ ¶ ¶ ¶ ¶ Alata Alatsi Aldrich Alegreya Alegreya Sans Aleo ¶ ¶ ¶ ¶ ¶ ¶ Alex Brush Alfa Slab One Alice Alike Alike Angular Allan ¶ ¶ ¶ ¶ ¶ ¶ Allura Almarai Almendra Almendra Display Almendra SC Amarante ¶ ¶ ¶ ¶ ¶ ¶ Amaranth Amatic SC Amethysta Amiko Amiri Amita ¶ ¶ ¶ ¶ ¶ ¶ Anaheim Andada Andika Annie Use Your Anonymous Pro Antic Telescope ¶ ¶ ¶ ¶ ¶ ¶ Antic Didone Antic Slab Anton Arapey Arbutus Arbutus Slab ¶ ¶ ¶ ¶ ¶ ¶ Architects Daughter Archivo Archivo Black Archivo Narrow Aref Ruqaa Arima Madurai ¶ ¶ ¶ ¶ ¶ ¶ Arizonia Armata Arsenal Artifika Arvo Arya ¶ ¶ ¶ ¶ ¶ ¶ Asap Asar Asset Assistant Astloch Asul ¶ ¶ ¶ ¶ ¶ ¶ Athiti Atma Atomic Age Aubrey Audiowide Autour One ¶ ¶ ¶ ¶ ¶ ¶ Average Average Sans Averia Gruesa Libre Averia Libre Averia Sans Libre Averia Serif Libre ¶ ¶ ¶ ¶ ¶ ¶ B612 B612 Mono Bad Script Bahiana Bahianita Bai Jamjuree ¶ ¶ ¶ ¶ ¶ Baloo Baloo Bhai Baloo Bhaijaan ¶ Baloo Bhaina Baloo Chettan Baloo Da ¶ ¶ ¶ ¶ ¶ ¶ Baloo Paaji Baloo Tamma Baloo Tammudu Baloo Thambi Balthazar Bangers ¶ ¶ ¶ ¶ ¶ Barlow Barlow Condensed Barriecito ¶ Basic Baskervville Baumans ¶ ¶ ¶ ¶ ¶ ¶ Be Vietnam Bebas Neue Belgrano Bellefair Belleza BenchNine ¶ ¶ ¶ ¶ ¶ ¶ Berkshire Swash Bevan Big Shoulders Display Big Shoulders Text Bigelow Rules Bigshot One ¶ ¶ ¶ ¶ ¶
    [Show full text]
  • Generic Text Recognition Using Long Short-Term Memory Networks
    Generic Text Recognition using Long Short-Term Memory Networks by Adnan Ul-Hasan Thesis approved by the Department of Computer Science University of Kaiserslautern for the award of Doctoral Degree Doctor of Engineering (Dr. -Ing) Date of PhD Defense: 11.01.2016 Dean of the Department: Prof. Dr. Klaus Schneider Chairperson of the PhD Committee: Prof. Dr. Paul Lukowicz Thesis Reviewers: Prof. Dr. Andreas Dengel, DFKI Kaiserslautern Associate Prof. Dr. Faisal Shafait, SEECS, NUST Pakistan apl. Prof. Dr. Marcus Liwicki, University of Kaiserslautern D 386 It always seems impossible until it is done. Nelson Mandela Abstract The task of printed Optical Character Recognition (OCR) is considered a “solved” issue by many Pattern Recognition (PR) researchers. The notion, however, partially true, does not represent the whole picture. Although, it is true that state-of-the-art OCR systems for many scripts exist, for example, for Latin, Greek, Han (Chinese), and Kana (Japanese), there is still a need for exhaustive research for many other challeng- ing modern scripts. Example of such scripts are: cursive Nabataean, which include Arabic, Persian, and Urdu; and the Brahamic family of scripts, which contain Devana- gari, Sanskrit, and its derivatives. These scripts present many challenging issues for OCR, for example, change in shape of character within a word depending upon its lo- cation, kerning, and a huge number of ligatures. Moreover, OCR research for histori- cal documents still requires much probing; therefore, efforts are required to develop robust OCR systems to preserve the literary heritage. Likewise, there is a need to address the issue of OCR of multilingual documents.
    [Show full text]