5,769 research outputs found

    Atmospheric chemistry of bioaerosols: heterogeneous and multiphase reactions with atmospheric oxidants and other trace gases.

    Get PDF
    Advances in analytical techniques and instrumentation have now established methods for detecting, quantifying, and identifying the chemical and microbial constituents of particulate matter in the atmosphere. For example, recent cryo-TEM studies of sea spray have identified whole bacteria and viruses ejected from ocean seawater into air. A focal point of this perspective is directed towards the reactivity of aerosol particles of biological origin with oxidants (OH, NO3, and O3) present in the atmosphere. Complementary information on the reactivity of aerosol particles is obtained from field investigations and laboratory studies. Laboratory studies of different types of biologically-derived particles offer important information related to their impacts on the local and global environment. These studies can also unravel a range of different chemistries and reactivity afforded by the complexity and diversity of the chemical make-up of these particles. Laboratory experiments as the ones reviewed herein can elucidate the chemistry of biological aerosols

    A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

    Full text link
    Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application. Moreover, the analysis should take into consideration how file-system vulnerabilities might in- teract with other vulnerabilities leading an attacker to breach into the web application. In this paper, we first propose a classification of file- system vulnerabilities, and then, based on this classification, we present a formal approach that allows one to exploit file-system vulnerabilities. We give a formal representation of web applications, databases and file- systems, and show how to reason about file-system vulnerabilities. We also show how to combine file-system vulnerabilities and SQL-Injection vulnerabilities for the identification of complex, multi-stage attacks. We have developed an automatic tool that implements our approach and we show its efficiency by discussing several real-world case studies, which are witness to the fact that our tool can generate, and exploit, complex attacks that, to the best of our knowledge, no other state-of-the-art-tool for the security of web applications can find

    Student, Athlete, or Neither at All: A closer look into the experiences of Black basketball players in the NCAA

    Get PDF
    Senior Project submitted to The Division of Social Studies of Bard College

    On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals

    Get PDF
    The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible

    A reduced semantics for deciding trace equivalence using constraint systems

    Full text link
    Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. It has been shown that such properties can be decided for interesting classes of finite processes (i.e., without replication) by means of symbolic execution and constraint solving. However, this does not suffice to obtain practical tools. Current prototypes suffer from a classical combinatorial explosion problem caused by the exploration of many interleavings in the behaviour of processes. M\"odersheim et al. have tackled this problem for reachability properties using partial order reduction techniques. We revisit their work, generalize it and adapt it for equivalence checking. We obtain an optimization in the form of a reduced symbolic semantics that eliminates redundant interleavings on the fly.Comment: Accepted for publication at POST'1

    Two-photon interference from two blinking quantum emitters

    Full text link
    We investigate the effect of blinking on the two-photon interference measurement from two independent quantum emitters. We find that blinking significantly alters the statistics in the second-order intensity correlation function g(2)(τ)^{(2)}(\tau) and the outcome of two-photon interference measurements performed with independent quantum emitters. We theoretically demonstrate that the presence of blinking can be experimentally recognized by a deviation from the gD(2)(0)=0.5^{(2)}_{D}(0)=0.5 value when distinguishable photons impinge on a beam splitter. Our results show that blinking imposes a mandatory cross-check measurement to correctly estimate the degree of indistinguishablility of photons emitted by independent quantum emitters
    corecore