24 research outputs found

    mdTLS: How to Make middlebox-aware TLS more efficient?

    Full text link
    The more data transmission over TLS protocol becomes increasingly common in IT Systems, the more middleboxes are deployed in networks. These middleboxes have several advantages, however, they become the target of cyber-attacks. Many researchers proposed revised versions of TLS protocols to make them secure, however, their approaches had some limitations. In this paper, we propose a middlebox-delegated TLS (mdTLS) protocol to improve performance based on the middlebox-aware TLS (maTLS), one of the most secure TLS protocols. We found out that the computational complexity of mdTLS is about twice as low as that of maTLS. Furthermore, we formally verified that our proposal meets newly defined security goals as well as those verified by maTLS. All of the formal models and lemmas are open to the public through following url https://github.com/HackProof/mdTLS.Comment: 22 pages, 3 figures, 9 table

    Who Wrote this Code? Watermarking for Code Generation

    Full text link
    Large language models for code have recently shown remarkable performance in generating executable code. However, this rapid advancement has been accompanied by many legal and ethical concerns, such as code licensing issues, code plagiarism, and malware generation, making watermarking machine-generated code a very timely problem. Despite such imminent needs, we discover that existing watermarking and machine-generated text detection methods for LLMs fail to function with code generation tasks properly. Hence, in this work, we propose a new watermarking method, SWEET, that significantly improves upon previous approaches when watermarking machine-generated code. Our proposed method selectively applies watermarking to the tokens with high enough entropy, surpassing a defined threshold. The experiments on code generation benchmarks show that our watermarked code has superior quality compared to code produced by the previous state-of-the-art LLM watermarking method. Furthermore, our watermark method also outperforms DetectGPT for the task of machine-generated code detection

    Employment Dynamics of Married Women and the Role of Part-time Work: the Case of Korea

    Get PDF
    I examine employment dynamics of married women with a particular focus on the role of part-time work using panel data from South Korea.Using a dynamic multinomial logit model with random effects, I find that a part-time work alternative substantially reduces the probability of being out of the labor market for mothers of young children and that the probability of moving into full-time employment is highest among all transition probabilities for part-time workers.These results suggest that part-time employment may act as a stepping stone toward full-time work for women who have been out of the labor market

    Employment Dynamics of Married Women and the Role of Part-Time Work: Evidence from Korea

    No full text
    I examine employment dynamics of married women with a particular focus on the role of part-time work using panel data from South Korea. Using a dynamic multinomial logit model with random effects, I find that state dependence is overestimated when I ignore unobserved heterogeneity and the endogenous nature of initial states. The estimated results also indicate that a part-time work alternative substantially reduces the probability of being out of the labor market for mothers of young children and that the probability of moving into full-time employment is highest among all transition probabilities for part-time workers. Along with the finding that part-time workers are more likely to have been nonemployed than to have worked full-time in the previous year, these results suggest that part-time employment may act as a stepping stone toward full-time work for women who have been out of the labor market.

    Racial differences in self-employment exits

    No full text
    Self-employment, Entrepreneurship, Minority entrepreneurship, Work history, J23, J63, L26, M13,

    Attitudes toward risk and self-employment of young workers

    No full text
    A high degree of risk tolerance is often regarded as one of the fundamental characteristics of entrepreneurs. Using multiple responses on risky income gambles in the 1979 National Longitudinal Survey of Youth (NLSY79), I investigate the effect of individual risk tolerance on the probability of entry into self-employment. I construct a measure of individual level of risk tolerance that is corrected for reporting error and that varies with age and other covariates that potentially affect self-employment decision. I find that risk tolerance is an important determinant of the decision to enter self-employment. However, I find that the estimated effect of risk tolerance on the probability of entering self-employment is dramatically understated if measurement error is not taken into account. In addition, I find that that accounting for the correlation between risk tolerance and other covariates is important to correctly assess the effects of the other determinants of self-employment while it has a trivial effect on the estimated marginal effect of risk tolerance.Risk tolerance Self-employment Entrepreneurship

    The Employment Dynamics of Less Educated Men in the United States: The Role of Self-Employment

    No full text
    Using data from the 1979 National Longitudinal Survey of Youth, I construct a sample of less educated men, all of whom are observed from age 22 to age 41, and examine the employment dynamics with a particular focus on the role of self-employment. I find that ¡°ever self-employed¡± workers tend to spend less time in nonemployment after they experience self-employment. The results from my dynamic logit model confirm the positive aspects of self-employment by indicating that men who were self-employed in the previous year are less likely than those who were paid workers to be nonemployed in the next year.self-employment; less educated men
    corecore