3,139 research outputs found
A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)
Web applications require access to the file-system for many different tasks.
When analyzing the security of a web application, secu- rity analysts should
thus consider the impact that file-system operations have on the security of
the whole application. Moreover, the analysis should take into consideration
how file-system vulnerabilities might in- teract with other vulnerabilities
leading an attacker to breach into the web application. In this paper, we first
propose a classification of file- system vulnerabilities, and then, based on
this classification, we present a formal approach that allows one to exploit
file-system vulnerabilities. We give a formal representation of web
applications, databases and file- systems, and show how to reason about
file-system vulnerabilities. We also show how to combine file-system
vulnerabilities and SQL-Injection vulnerabilities for the identification of
complex, multi-stage attacks. We have developed an automatic tool that
implements our approach and we show its efficiency by discussing several
real-world case studies, which are witness to the fact that our tool can
generate, and exploit, complex attacks that, to the best of our knowledge, no
other state-of-the-art-tool for the security of web applications can find
Orchestrating Forest Policy in Italy: Mission Impossible?
In the Italian political and economic agenda the forest sector occupies a marginal role. The forest sector in Italy is characterized by a high institutional fragmentation and centralized decision-making processes dominated by Public Forest Administrations. Public participation in forest policy processes has been implemented since the 1990s at national, regional and local levels in several cases. However, today no significant changes have been observed in the overall governance of the forest sector and stakeholders' involvement in Italian forest policy decision-making is still rather limited. The aims of this paper are to describe the state of forest-related participatory processes in Italy at various levels (national, regional and local) and identify which factors and actors hinder or support the establishment and implementation of participatory forest-related processes in the country. The forest-related participatory processes are analyzed adopting a qualitative-based approach and interpreting interactive, complex and non-linear participatory processes through the lens of panarchy theory
A Fast and Efficient Incremental Approach toward Dynamic Community Detection
Community detection is a discovery tool used by network scientists to analyze
the structure of real-world networks. It seeks to identify natural divisions
that may exist in the input networks that partition the vertices into coherent
modules (or communities). While this problem space is rich with efficient
algorithms and software, most of this literature caters to the static use-case
where the underlying network does not change. However, many emerging real-world
use-cases give rise to a need to incorporate dynamic graphs as inputs.
In this paper, we present a fast and efficient incremental approach toward
dynamic community detection. The key contribution is a generic technique called
, which examines the most recent batch of changes made to an
input graph and selects a subset of vertices to reevaluate for potential
community (re)assignment. This technique can be incorporated into any of the
community detection methods that use modularity as its objective function for
clustering. For demonstration purposes, we incorporated the technique into two
well-known community detection tools. Our experiments demonstrate that our new
incremental approach is able to generate performance speedups without
compromising on the output quality (despite its heuristic nature). For
instance, on a real-world network with 63M temporal edges (over 12 time steps),
our approach was able to complete in 1056 seconds, yielding a 3x speedup over a
baseline implementation. In addition to demonstrating the performance benefits,
we also show how to use our approach to delineate appropriate intervals of
temporal resolutions at which to analyze an input network
Transformação dos principais usos da floresta no municĂpio de Moju, nordeste paraense.
As reflexĂ”es aqui apresentadas foram resultantes de uma pesquisa realizada na comunidade Santa Maria, uma das comunidades componentes do Assentamento Olho D?Ăgua II, municĂpio de Moju, estado do ParĂĄ. O objetivo do artigo Ă© analisar as transformaçÔes vivenciadas por um grupo de agricultores quanto ao uso da floresta, mais especificamente as associadas Ă obtenção de caças e Ă realização das roças, apĂłs a mudança da condição de uso comum (posseiros) para o uso privado (assentados) a partir da implantação do assentamento em 2002. Os resultados apontam que ocorreram transformaçÔes nas dinĂąmicas de uso dos recursos com a intensificação do cultivo de roças e a diminuição da obtenção de caças devido Ă grande dificuldade em obtĂȘ-las, em decorrĂȘncia das novas condiçÔes de acesso privado Ă terra e ao aumento demogrĂĄfico cuja demanda por caça supera em muito a oferta dos animais
Can body mass index influence the fracture zone in the fifth metatarsal base? A retrospective review
Fifth metatarsal base fracture are common in routine orthopaedic practice [1â6]. Lawrence and Botte [7] pro- posed a classification based upon the position of the fracture line (zone 1: tuberosity, zone 2: meta-diaphyseal junction, zone 3: proximal diaphysis). Pathomechani- cally, injury patterns develop in different ways: in zone 1, a traction injury caused by peroneus brevis tendon and the lateral band of the plantar fascia determine an avul- sion fracture of the tuberosity, also called âpseudo-Jonesâ âfracture; in zone 2, forced foot adduction and excessive plantar flexion determine a fracture in the metaphyseal- diaphyseal junction, also called Jonesâ fracture [8, 9]; in zone 3, acute over-bearing onto the area or chronic overload determine a fracture in the proximal portion of the diaphysis, distal to the intermetatarsal joint [10, 11].
To the best of the Authorsâ knowledge, no study has been published to date on the relationship between the value of Body Mass Index (BMI) and the prevalence of fractures in a specific portion of the fifth metatarsal base. The aim of this study was to define the impact of BMI on fifth metatarsal base fractures location according to Lawrence and Botte classification [7]
Magnetic resonance imaging landmarks for preoperative localization of inferior medial genicular artery: a proof of concept analysis
The joint line is a useful landmark to identify IMGAcourse during knee surgery. The IMGA course is closerto the joint line and to the border of the medial tibialplateau in females than in males. Although the interindi-vidual variability these results should be taken into ac-count when performing all surgical procedures involvingthe medial aspect of the knee. Similar interindividualdistances were observed between IMGA and semimem-branosus tendon insertion regardless of gender. How-ever, the proximity to this tendon should be consideredespecially during specific cases of ligamentous balancingin TKA procedure
The three-dimensional Ising model: A paradigm of liquid-vapor coexistence in nuclear multifragmentation
Clusters in the three-dimensional Ising model rigorously obey reducibility
and thermal scaling up to the critical temperature. The barriers extracted from
Arrhenius plots depend on the cluster size as where
is a critical exponent relating the cluster size to the cluster
surface. All the Arrhenius plots collapse into a single Fisher-like scaling
function indicating liquid-vapor-like phase coexistence and the univariant
equilibrium between percolating clusters and finite clusters. The compelling
similarity with nuclear multifragmentation is discussed.Comment: (4 pages, 4 figures
- âŠ