4,168 research outputs found

    Ensemble of Example-Dependent Cost-Sensitive Decision Trees

    Get PDF
    Several real-world classification problems are example-dependent cost-sensitive in nature, where the costs due to misclassification vary between examples and not only within classes. However, standard classification methods do not take these costs into account, and assume a constant cost of misclassification errors. In previous works, some methods that take into account the financial costs into the training of different algorithms have been proposed, with the example-dependent cost-sensitive decision tree algorithm being the one that gives the highest savings. In this paper we propose a new framework of ensembles of example-dependent cost-sensitive decision-trees. The framework consists in creating different example-dependent cost-sensitive decision trees on random subsamples of the training set, and then combining them using three different combination approaches. Moreover, we propose two new cost-sensitive combination approaches; cost-sensitive weighted voting and cost-sensitive stacking, the latter being based on the cost-sensitive logistic regression method. Finally, using five different databases, from four real-world applications: credit card fraud detection, churn modeling, credit scoring and direct marketing, we evaluate the proposed method against state-of-the-art example-dependent cost-sensitive techniques, namely, cost-proportionate sampling, Bayes minimum risk and cost-sensitive decision trees. The results show that the proposed algorithms have better results for all databases, in the sense of higher savings.Comment: 13 pages, 6 figures, Submitted for possible publicatio

    Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

    Full text link
    Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure. Moreover, many embedded systems rely on web interfaces for user interaction or administration. Unfortunately, web security is known to be difficult, and therefore the web interfaces of embedded systems represent a considerable attack surface. In this paper, we present the first fully automated framework that applies dynamic firmware analysis techniques to achieve, in a scalable manner, automated vulnerability discovery within embedded firmware images. We apply our framework to study the security of embedded web interfaces running in Commercial Off-The-Shelf (COTS) embedded devices, such as routers, DSL/cable modems, VoIP phones, IP/CCTV cameras. We introduce a methodology and implement a scalable framework for discovery of vulnerabilities in embedded web interfaces regardless of the vendor, device, or architecture. To achieve this goal, our framework performs full system emulation to achieve the execution of firmware images in a software-only environment, i.e., without involving any physical embedded devices. Then, we analyze the web interfaces within the firmware using both static and dynamic tools. We also present some interesting case-studies, and discuss the main challenges associated with the dynamic analysis of firmware images and their web interfaces and network services. The observations we make in this paper shed light on an important aspect of embedded devices which was not previously studied at a large scale. We validate our framework by testing it on 1925 firmware images from 54 different vendors. We discover important vulnerabilities in 185 firmware images, affecting nearly a quarter of vendors in our dataset. These experimental results demonstrate the effectiveness of our approach

    Evaluation of open pit slope stability using various slope angles and element types

    Get PDF
    Purpose. The objective of this study is to demonstrate a method to select the optimal slope angle related to three principal factors: safety, productivity and mining costs. Also, it aims to investigate the accuracy of numerical analysis using different element types and order. Methods. Series of two-dimensional elasto-plastic finite-element models has been constructed at various slope angles (e.g. 40°, 45°, 50°, 55°, 60°, 65°, and 70°) and different element types (e.g. 3-noded triangle (T3), 6-noded triangle (T6), 4-noded quadrilateral (Q4) and 8-noded quadrilateral (Q8).The results are presented, discussed and compared at various slope angles and element types in terms of critical strength reduction factor (CSRF) or its equivalent factor of safety (FOS), total rock slope displacement, mine production and mining costs. Findings. The results reveal that, the mine productivity increases as slope angle increases, however, slope stability deteriorates. Alternatively, the factor of safety (FOS) decreases as slope angle becomes steeper (e.g. minimum factor of safety is obtained at highest steep angle of 70°). Despite of the increasing in computation time, the analysis shows that, the accuracy of the modelling increases when adopting high-order element types (e.g. 8-noded quadrilateral and 6-noded triangle elements). Originality. This study provides a methodology for the application of the numerical modelling methods on open pit mine. As a result, the mine planners will be able to know ahead of time the optimal slope angle with respect to safety, production and mining costs. Practical implications. This study sheds light on the usefulness of adopting numerical modelling analysis in the feasibility studies to determine and compare mining costs against safety and slope angle.Мета. Розробка методики для підбору оптимального кута нахилу борта кар’єру з видобутку мідно-нікелевих руд з урахуванням трьох головних чинників: безпека, продуктивність та витрати, а також перевірка точності чисельного аналізу при використанні елементів різного типу і порядку. Методика. Побудовано серії двовимірних пружно-пластичних кінцево-елементних моделей (КЕМ) для різних кутів нахилу борта кар’єру (наприклад, 40°, 45°, 50°, 55°, 60°, 65° і 70°) та з елементами різного типу (3-вузловий трикутник (T3), 6-вузловий трикутник (T6), 4-вузловий чотирикутник (Q4) і 8-вузловий чотирикутник (Q8)). Чисельне моделювання виконано у програмному продукті Rock and Soil 2-Dimensional Analysis Program. В якості критерію руйнування прийнято критерій міцності Кулона-Мора. Результати. Дослідження показали, що продуктивність шахти зростає зі збільшенням кута нахилу борта кар’єру; однак при цьому зменшується його стійкість, і навпаки, чим крутіше кут нахилу борта, тим менше коефіцієнт безпеки. Так, мінімальному значенню коефіцієнта безпеки відповідає найбільший кут нахилу 70°. Незважаючи на більш тривалі обчислення, аналіз показав, що точність моделювання зростає при використанні елементів високого порядку (8-вузлового чотирикутника і 6-вузлового трикутника). Наукова новизна. Розроблено новий методичний підхід для застосування чисельного моделювання для оцінки стійкості бортів кар’єрів з точки зору граничного коефіцієнта зниження міцності або його еквівалентного коефіцієнта безпеки, загального зсуву схилів, продуктивності та витрат на видобуток. Практична значимість. Дослідження доводять ефективність застосування чисельного моделювання для визначення доцільності витрат при різних кутах нахилу борта для забезпечення безпеки робіт. В результаті його застосування проектувальники кар’єрів зможуть заздалегідь спланувати оптимальний кут нахилу борта з урахуванням безпеки, продуктивності і витрат.Цель. Разработка методики для подбора оптимального угла наклона борта карьера по добыче медно-никелевых руд с учетом трех главных факторов: безопасность, производительность и затраты, а также проверка точности численного анализа при использовании элементов различного типа и порядка. Методика. Построены серии двумерных упругопластических конечно-элементных моделей (КЭМ) для разных углов наклона борта карьера (например, 40°, 45°, 50°, 55°, 60°, 65° и 70°) и с элементами разного типа (3-узловой треугольник (T3), 6-узловой треугольник (T6), 4-узловой четырехугольник (Q4) и 8-узловой четырехугольник (Q8)). Численное моделирование выполнено в программном продукте Rock and Soil 2-Dimensional Analysis Program. В качестве критерия разрушения принят критерий прочности Кулона-Мора. Результаты. Исследования показали, что производительность шахты растет с увеличением угла наклона борта карьера, однако при этом уменьшается его устойчивость, и наоборот, чем круче угол наклона борта, тем меньше коэффициент безопасности. Так, минимальному значению коэффициента безопасности соответствует самый большой угол наклона 70°. Несмотря на более длительные вычисления, анализ показал, что точность моделирования возрастает при использовании элементов высокого порядка (8-узлового четырехугольника и 6-узлового треугольника). Научная новизна. Разработан новый методический подход для применения численного моделирования для оценки устойчивости бортов карьеров с точки зрения предельного коэффициента снижения прочности или его эквивалентного коэффициента безопасности, общего смещения склонов, производительности и затрат на добычу. Практическая значимость. Исследования доказывают эффективность применения численного моделирования для определения целесообразности затрат при различных углах наклона борта для обеспечения безопасности работ. В результате его применения проектировщики шахт смогут заранее спланировать оптимальный угол наклона борта с учетом безопасности, производительности и затрат.The authors acknowledge the support of Rocscience Inc. for getting a free two-week full-version of RS2D (Rock-Soil two-dimensional finite-element analysis program). The authors are grateful for their support

    Mitigating CSRF attacks on OAuth 2.0 Systems

    Get PDF
    Many millions of users routinely use Google, Facebook and Microsoft to log in to websites supporting OAuth 2.0 and/or OpenID Connect. The security of OAuth 2.0 and OpenID Connect is therefore of critical importance. Unfortunately, as previous studies have shown, real-world implementations of both schemes are often vulnerable to attack, and in particular to crosssite request forgery (CSRF) attacks. In this paper we propose a new and practical technique which can be used to mitigate CSRF attacks against both OAuth 2.0 and OpenID Connect. Index Terms-OAuth 2.0, OpenID Connect, CSRF

    Analysing the Security of Google's implementation of OpenID Connect

    Get PDF
    Many millions of users routinely use their Google accounts to log in to relying party (RP) websites supporting the Google OpenID Connect service. OpenID Connect, a newly standardised single-sign-on protocol, builds an identity layer on top of the OAuth 2.0 protocol, which has itself been widely adopted to support identity management services. It adds identity management functionality to the OAuth 2.0 system and allows an RP to obtain assurances regarding the authenticity of an end user. A number of authors have analysed the security of the OAuth 2.0 protocol, but whether OpenID Connect is secure in practice remains an open question. We report on a large-scale practical study of Google's implementation of OpenID Connect, involving forensic examination of 103 RP websites which support its use for sign-in. Our study reveals serious vulnerabilities of a number of types, all of which allow an attacker to log in to an RP website as a victim user. Further examination suggests that these vulnerabilities are caused by a combination of Google's design of its OpenID Connect service and RP developers making design decisions which sacrifice security for simplicity of implementation. We also give practical recommendations for both RPs and OPs to help improve the security of real world OpenID Connect systems

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Get PDF
    Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0-based single sign on. The security of OAuth 2.0 is therefore of critical importance, and it has been widely examined both in theory and in practice. In this paper we disclose a new class of practical attacks on OAuth 2.0 implementations, which we call Partial Redirection URI Manipulation Attacks. An attack of this type can be used by an attacker to gain a victim user’s OAuth 2.0 code (a token representing a right to access user data) without the user’s knowledge; this code can then be used to impersonate the user to the relevant relying party website. We examined 27 leading OAuth 2.0 identity providers, and found that 19 of them are vulnerable to these attacks
    corecore