909 resultados para privilege escalation attack
Resumo:
Bushfires are regular occurrences in the Australian landscape which can, under adverse weather conditions, give rise to losses of life, property, infrastructure, environmental and cultural values. Where property loss is involved, historical surveys of house losses have focussed on ember, radiant heat and flame contact as key bushfire attack mechanisms. Although often noted, little work has been done to quantify the impact of fire generated or fire enhanced wind and pyro-convective events on house loss and to improve construction practice within Australia. It is well known that strong winds are always associated with bushfire events. It is less well known, although increasingly shown through anecdotal evidence, that bushfires are not a passive companion of wind, but indeed they interact with winds and can together cause significant damages to exposed buildings and ecological structures. Previous studies have revealed the effects of wind, fire and structure interactions with the result of increased pressure coefficient distributions on the windward side of a building downstream of a fire front. This paper presents a further analysis of the result in relations to the relevant standards and fire weather conditions. A review of wind code and bushfire code was conducted. Based on the result of the current study, the authors believe it is necessary to consider wind as an attack mechanism in bushfire events. The results of the study will also have implications on bushfire emergency management, design of emergency shelters, perception of danger, emergency evacuation and on risk assessment.
Resumo:
NLS is a stream cipher which was submitted to the eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called Crossword Puzzle (CP) attack. NLSv2 is a tweak version of NLS which aims mainly at avoiding the CP attack. In this paper, a new distinguishing attack against NLSv2 is presented. The attack exploits high correlation amongst neighboring bits of the cipher. The paper first shows that the modular addition preserves pairwise correlations as demonstrated by existence of linear approximations with large biases. Next, it shows how to combine these results with the existence of high correlation between bits 29 and 30 of the S-box to obtain a distinguisher whose bias is around 2^−37. Consequently, we claim that NLSv2 is distinguishable from a random cipher after observing around 2^74 keystream words.
Resumo:
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.
Resumo:
Swietenia macrophylla King (Meliaceae: Swietenioideae) provides one of the premier timbers of the world. The mahogany shoot borer Hypsipyla robusta Moore (Lepidoptera: Pyralidae) is an economically important pest of S. macrophylla throughout Asia, Africa and the Pacific. No viable method of controlling this pest is known. Previous observations have suggested that the presence of overhead shade may reduce attack by H. robusta, but this has not been investigated experimentally. This research was therefore designed to assess the influence of light availability on shoot-borer attack on S. macrophylla, by establishing seedlings under three different artificial shade regimes, then using these seedlings to test oviposition preference of adult moths, neonate larval survival and growth and development of shoot borer larvae. Oviposition preference of shoot borer moths was tested on leaves from seedlings grown under artificial shade for 63 weeks. A significant difference in choice was recorded between treatments, with 27.4 ± 1.5 eggs laid under high shade and 87.1 ± 1.8 under low shade. Neonate larval survival on early flushing leaflets of S. macrophylla did not differ significantly between shade treatments. Larval growth rate, estimated by measuring daily frass width, was significantly higher for those larvae fed on seedlings from the high and medium shade treatments (0.1 mm/day), than the low shade treatment (0.06 mm/day). In laboratory-reared larvae, the total mass of frass produced was significantly higher in the high shade treatment (0.4 g) than under the low shade treatment (0.2 g). Longer tunnel lengths were bored by larvae in plants grown under high shade (12.0 ± 2.4 cm) than under low shade (7.07 ± 1.9 cm). However, pupal mass under low shade was 48% higher than that under the high shade treatment, suggesting that plants grown under high shade were of lower nutritional quality for shoot borer larvae. These results indicate that shading of mahogany seedlings may reduce the incidence of shoot borer attack, by influencing both oviposition and larval development. The establishment of mahogany under suitable shade regimes may therefore provide a basis for controlling shoot borer attack using silvicultural approaches.
Resumo:
This study aims to examine the severe consequences of traffic crashes related to a special group of drivers in China, which is called the “Second Rich & Powerful Generation” (SRPG). The unique driving behaviors and attitudes of this special group are intertwined with the general cultural and social environment in China. To investigate the difference of traffic crash consequences between drivers who belong to SRPG and general driver population, injuries and fatalities in 2009, 2010, 2011 and 2012 were compared. Results consistently showed that while no significant difference was detected between these two groups in terms of injuries, fatalities per crash caused by SRPG were significantly larger than that caused by general driver population. Findings from our study clearly demonstrate the complexity of road safety issues in developing countries, and can also be used to develop road safety improvement strategies tailored to SRPG.
Resumo:
The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.
Resumo:
In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and integrity checks change and the target address will not be computed correctly. In this paper, we present an attack based on tracking stack pointer modifications to break the scheme and provide implementation details. The key element of the attack is to remove the fingerprint and integrity check generating code from the program after disassociating the target address from the fingerprint and integrity value. Using the debugging tools that give vast control to the attacker to track stack pointer operations, we perform both subtractive and watermark replacement attacks. The major steps in the attack are automated resulting in a fast and low-cost attack.
Resumo:
This chapter examines the personal reflections and experiences of several pre-service and newly graduated teachers, including Kristie, who were involved in the NETDS program. Their documented professional journeys, which include descriptions of struggling when their privileged, taken-for-granted ways of being were destabilized, and grappling with tensions related to their own predispositions and values, are investigated in the context of Whiteness and privilege theory.
Resumo:
Brain cells control everything we do - from speaking to walking to breathing. The brain needs a steady supply of blood and oxygen to function properly. Without this vital steady supply of blood, brain cells don't get enough nutrients and oxygen to do their job, and a stroke or 'brain attack' occurs. The human brain is divided into regions that control various motor (movement) and sensory (the senses) functions. Damage from stroke to a specific region may affect the functions it controls. This causes symptoms such as paralysis (loss of movement), difficulty speaking, or loss of coordination. The left side of the brain controls motor and sensory functions on the right side of the body. The left side is also responsible for scientific functions, understanding written and spoken language, number skills and reasoning. The right side of the brain controls motor and sensory functions on the left side of the body. It also controls artistic functions, such as music, art awareness, and insight. If an artery inside the brain or leading to the brain becomes temporarily blocked, the flow of blood to an area of the brain slows or stops. The lack of blood can cause temporary symptoms such as weakness, numbness, problems with speech, dizziness, or loss of vision.
Resumo:
Before tissue plasminogen activator (tPA) was licensed for use in Canada, in February 1999, the Calgary Regional Stroke Program spearheaded the development and organization of local resources to use thrombolytic therapy in patients who had experienced acute ischemic stroke. In 1996 special permission was obtained from the Calgary Regional Health Authority to use intravenously administered tPA for acute ischemic stroke, and ethical and scientific review boards approved the protocols. After 3 years our efforts have resulted in improved patient outcomes, shorter times from symptom onset to treatment and acceptable adverse event rates. Areas for continued improvement include the door-to-needle time and broader education of the public about the symptoms of acute ischemic stroke.
Resumo:
This article considers the integral role played by patent law in respect of stem cell research. It highlights concerns about commercialization, access to essential medicines and bioethics. The article maintains that there is a fundamental ambiguity in the Patents Act 1990 (Cth) as to whether stem cell research is patentable subject matter. There is a need to revise the legislation in light of the establishment of the National Stem Cell Centre and the passing of the Research Involving Embryos Act 2002 (Cth). The article raises concerns about the strong patent protection secured by the Wisconsin Alumni Research Foundation and Geron Corporation in respect of stem cell research in the United States. It contends that a number of legal reforms could safeguard access to stem cell lines, and resulting drugs and therapies. Finally, this article explores how ethical concerns are addressed within the framework of the European Biotechnology Directive. It examines the decision of the European Patent Office in relation to the so-called Edinburgh patent, and the inquiry of the European Group on Ethics in Science and New Technologies into The Ethical Aspects of Patenting Involving Human Stem Cells.
Resumo:
Plaque rupture has been considered to be the result of its structural failure. The aim of this study is to suggest a possible link between higher stresses and rupture sites observed from in vivo magnetic resonance imaging (MRI) of transient ischemic attack (TIA) patients, by using stress analysis methods. Three patients, who had recently suffered a TIA, underwent in vivo multi-spectral MR imaging. Based on plaque geometries reconstructed from the post-rupture status, six pre-rupture plaque models were generated for each patient dataset with different reconstructions of rupture sites to bridge the gap of fibrous cap from original MRI images. Stress analysis by fluid structure interaction simulation was performed on the models, followed by analysis of local stress concentration distribution and plaque rupture sites. Furthermore, the sensitivity of stress analysis to the pre-rupture plaque geometry reconstruction was examined. Local stress concentrations were found to be located at the plaque rupture sites for the three subjects studied. In the total of 18 models created, the locations of the stress concentration regions were similar in 17 models in which rupture sites were always associated with high stresses. The local stress concentration region moved from circumferential center to the shoulder region (slightly away from the rupture site) for a case with a thick fibrous cap. Plaque wall stress level in the rupture locations was found to be much higher than the value in non-rupture locations. The good correlation between local stress concentrations and plaque rupture sites, and generally higher plaque wall stress level in rupture locations in the subjects studied could provide indirect evidence for the extreme stress-induced plaque rupture hypothesis. Local stress concentration in the plaque region could be one of the factors contributing to plaque rupture.
Resumo:
Rupture of atherosclerotic plaque is a major cause of mortality. Plaque stress analysis, based on patient-specific multisequence in vivo MRI, can provide critical information for the understanding of plaque rupture and could eventually lead to plaque rupture prediction. However, the direct link between stress and plaque rupture is not fully understood. In the present study, the plaque from a patient who recently experienced a transient ischaemic attack (TIA) was studied using a fluid-structure interaction method to quantify stress distribution in the plaque region based on in vivo MR images. The results showed that wall shear stress is generally low in the artery with a slight increase at the plaque throat owing to minor luminal narrowing. The oscillatory shear index is much higher in the proximal part of the plaque. Both local wall stress concentrations and the relative stress variation distribution during a cardiac cycle indicate that the actual plaque rupture site is collocated with the highest rupture risk region in the studied patient.
Resumo:
When investigating strategies for Helicoverpa armigera (Hubner) control, it is important to understand oviposition behaviour. Cotton (Gossypium hirsutum) was sown into standing wheat (Triticum astivum L.) stubble in a closed arena to investigate the effect of stubble on H. armigera moth behaviour and oviposition. Infrared cameras were used to track moths and determine whether stubble acted as a physical barrier or provided camouflage to cotton plants, thereby reducing oviposition. Searching activity was observed to peak shortly before dawn (03:00 and 04:00 h) and remained high until just after dawn (4 h window). Moths spent more time resting on cotton plants than spiralling above them, and the least time flying across the arena. While female moths spent more time searching for cotton plants growing in wheat stubble, the difference in oviposition was not significant. As similar numbers of eggs were laid on cotton plants with stubble (3.5/plant SE +/- 0.87) and without stubble (2.5/plant SE +/- 0.91), wheat stubble does not appear to provide camouflage to cotton plants. There was no significant difference in the location of eggs deposited on cotton plants with and without stubble, although more eggs were laid on the tops of cotton leaves in wheat stubble. As the spatial and temporal distribution of eggs laid on the cotton plant is a crucial component of population stability, eggs laid on the upper side of leaves on cotton plants may be more prone to fatalities caused by environmental factors such as wind and rain. Therefore, although stubble did not influence the number of eggs laid, it did affect their distribution on the plant, which may result in increased mortality of eggs on cotton plants sown into standing wheat stubble.