1,280 research outputs found

    Alternating Control Flow Reconstruction

    Get PDF

    Detecting Malicious Code by Model Checking

    Get PDF
    Abstract. The ease of compiling malicious code from source code in higher programming languages has increased the volatility of malicious programs: The first appearance of a new worm in the wild is usually followed by modified versions in quick succession. As demonstrated by Christodorescu and Jha, however, classical detection software relies on static patterns, and is easily outsmarted. In this paper, we present a flexible method to detect malicious code patterns in executables by model checking. While model checking was originally developed to verify the correctness of systems against specifications, we argue that it lends itself equally well to the specification of malicious code patterns. To this end, we introduce the specification language CTPL (Computation Tree Predicate Logic) which extends the well-known logic CTL, and describe an efficient model checking algorithm. Our practical experiments demonstrate that we are able to detect a large number of worm variants with a single specification. Key words: Model Checking, Malware Detection.

    Use of a Simulation Model to Evaluate the Influence of Reproductive Performance and Management Decisions on Net Income in Beef Production

    Get PDF
    A stochastic dynamic model of reproduction and a deterministic cow-herd economic simulation model were used to evaluate how management decisions and reproductive performance interact to influence net income in a cow-calf operation (1,000 cows) for 1 yr of production. The stochastic model was used to determine herd performance when length of breeding season (45, 70, or 120 d) interacted with three postpartum intervals of an estrus (48, 65, or 90 d) and three conception rates at first service (60, 70, or 80%). Short, moderate, and long postpartum intervals were used to reflect differences in reproductive performance. In addition, replacement heifers were bred beginning either 3 wk ahead of the cow herd or at the same time as the cow herd. Fifty-four simulations were generated. Inputs into the economic model were herd performance, livestock and feed prices, nonfeed costs, and feed requirements for 1 yr of production. Feed requirements were calculated separately for each postpartum interval to reflect three different body condition scores, thin, moderate, and good, to correspond with long, moderate, and short postpartum intervals. Net income was greatest with 704 breeding seasons when the postpartum interval was short or moderate. When the postpartum interval was long, net income was greatest with 1204 breeding seasons because pregnancy rates, as a result of the long breeding season, were highest and feed costs were lowest for thin cows. Overall, net income was greatest when cows were managed to have postpartum intervals of moderate length. Breeding heifers 3 wk before the cows provided the most economic benefit with long postpartum intervals

    Managing the Socially Marginalized: Attitudes Towards Welfare, Punishment and Race

    Get PDF
    Welfare and incarceration policies have converged to form a system of governance over socially marginalized groups, particularly racial minorities. In both of these policy areas, rehabilitative and social support objectives have been replaced with a more punitive and restrictive system. The authors examine the convergence in individual-level attitudes concerning welfare and criminal punishment, using national survey data. The authors\u27 analysis indicates a statistically significant relationship between punitive attitudes toward welfare and punishment. Furthermore, accounting for the respondents\u27 racial attitudes explains the bivariate relationship between welfare and punishment. Thus, racial attitudes seemingly link support for punitive approaches to opposition to welfare expenditures. The authors discuss the implications of this study for welfare and crime control policies by way of the conclusion

    Isotope or mass encoding of combinatorial libraries

    Get PDF
    Background: Combinatorial chemistry using solid-phase synthesis is a rapidly developing technology that can result in a significant reduction in the time required to find and optimize lead compounds. The application of this approach to traditional medicinal chemistry has led to the construction of libraries of small organic molecules on resin beads. A major difficulty in developing large combinatorial libraries is the lack of a facile encoding and decoding methodology to identify active compounds.Results: Several encoding schemes are described which use the ability of mass spectrometry to ascertain isotopic distributions. Molecular tags are attached to resin beads in parallel or on the linker used for chemical library synthesis. The tags are encoded via a controlled ratio of a number of stable isotopes on the tagging molecules, and range from a single to a complex isotopic distribution.Conclusions: A novel coding scheme is described that is useful for the generation of large encoded combinatorial libraries. The code can be cleaved after assay and analyzed by mass spectrometry in an automated fashion. An important element of the combinatorial discovery process is the ability to extract the structure-activity relationship (SAR) information made available by library screening. The speed and sensitivity of the mass-encoding scheme has the potential to determine the full SAR for a given library

    High Temperature Matter and Gamma Ray Spectra from Microscopic Black Holes

    Full text link
    The relativistic viscous fluid equations describing the outflow of high temperature matter created via Hawking radiation from microscopic black holes are solved numerically for a realistic equation of state. We focus on black holes with initial temperatures greater than 100 GeV and lifetimes less than 6 days. The spectra of direct photons and photons from π0\pi^0 decay are calculated for energies greater than 1 GeV. We calculate the diffuse gamma ray spectrum from black holes distributed in our galactic halo. However, the most promising route for their observation is to search for point sources emitting gamma rays of ever-increasing energy.Comment: 33 pages, 13 figures, to be submitted to PR
    corecore