16 research outputs found
Effect of Airborne Hydrocarbons on the Wettability of Phase Change Nanoparticle Decorated Surfaces
We present here a detailed study of the wettability of surfaces nanostructured with amorphous and crystalline nanoparticles (NPs) derived from the phase-change material Ge2Sb2Te5 (GST). Particular attention was devoted to the effect of airborne surface hydrocarbons on surface wetting. Our analysis illustrates that a reversible hydrophilic-hydrophobic wettability switch is revealed by combined ultraviolet-ozone (UV-O-3) treatments and exposure to hydrocarbon atmospheres. Indeed, the as prepared surfaces exhibited a hydrophilic state after thermal annealing or UV-O-3 treatment which can partially remove hydrocarbon contaminants, while a hydrophobic state was realized after exposure to hydrocarbon atmosphere. Using high-angle annular dark-field scanning transmission electron microscopy for the specially designed GST NP decorated graphene substrates, a network of hydrocarbon connecting GST NPs was observed. Our findings indicate that airborne hydrocarbons can significantly enhance the hydrophobicity of nanostructured surfaces. Finally, the experiments reveal that previously defined hydrophilic materials can be used for the design of hydrophobic surfaces even if the meniscus is highly adhered to a solid surface, which is in agreement with our qualitative model involving the contribution of the nanomeniscus formed between the substrate and a decorating NP
Off-Path TCP Exploits of the Mixed IPID Assignment
In this paper, we uncover a new off-path TCP hijacking attack that can be
used to terminate victim TCP connections or inject forged data into victim TCP
connections by manipulating the new mixed IPID assignment method, which is
widely used in Linux kernel version 4.18 and beyond to help defend against TCP
hijacking attacks. The attack has three steps. First, an off-path attacker can
downgrade the IPID assignment for TCP packets from the more secure
per-socket-based policy to the less secure hash-based policy, building a shared
IPID counter that forms a side channel on the victim. Second, the attacker
detects the presence of TCP connections by observing the shared IPID counter on
the victim. Third, the attacker infers the sequence number and the
acknowledgment number of the detected connection by observing the side channel
of the shared IPID counter. Consequently, the attacker can completely hijack
the connection, i.e., resetting the connection or poisoning the data stream.
We evaluate the impacts of this off-path TCP attack in the real world. Our
case studies of SSH DoS, manipulating web traffic, and poisoning BGP routing
tables show its threat on a wide range of applications. Our experimental
results show that our off-path TCP attack can be constructed within 215 seconds
and the success rate is over 88%. Finally, we analyze the root cause of the
exploit and develop a new IPID assignment method to defeat this attack. We
prototype our defense in Linux 4.18 and confirm its effectiveness through
extensive evaluation over real applications on the Internet
Recommended from our members
Fighting Vulnerabilities in OS Kernels: From Practice to Automation
The monolithic nature of modern OS kernels leads to a constant stream of bugs being discovered automatically by various techniques, among which fuzzing is most commonly used in both academia and industry due to its effectiveness. According to syzbot, Google’s continuous kernel fuzzing platform, it has unveiled 4640 vulnerabilities in Linux kernels. Despite its tremendous success, we identified two steps in the process that remain relying on manual labor. More specifically, 1) maintainers are overwhelmed by the excessive amount of bugs, but only a subset of them are serious enough to lead to security takeovers (i.e., privilege escalations) and demand immediate fixes. Thus, the automated bug triaging process is one key missing piece to securing OS kernels in a timely manner. 2) The key to the success of kernel fuzzing hinges on a fuzzer’s ability to generate diverse and interesting testcases that exercise various corner cases relatively deep in the kernel. This is largely accomplished through syscall specifications that are typically manually crafted by security experts. However, the development of syscall specifications is a time-consuming and tedious process, especially for those closed-source drivers. In this dissertation, we aim at addressing the two aforementioned issues by proposing automated approaches based on the insights gained from practice.In the second chapter of this dissertation, we investigated one common type of vulnerability in Linux kernel -- Out-of-bounds (OOB) memory write from heap and designed KOOBE to assess the severity of a bug by directly generating an IP-hijacking exploit based on two observations: 1) different OOB vulnerability instances exhibit a wide range of capabilities; 2) Kernel exploits are multi-interaction in nature (i.e., multiple syscalls are involved in an exploit) which allows the exploit crafting process to be modular.
In the third chapter, we present SyzGen, a first attempt to automate the generation of syscall specifications for closed-source macOS drivers. We leverage two insights to overcome some challenges of binary analysis: 1) iterative refinement of syscall knowledge and 2) extraction and extrapolation of dependencies from a small number of execution traces. Because different interfaces inside one module typically share common code, we could transfer the knowledge we learn from one interface to another.Because it is non-trivial to collect traces for kernel drivers, we further improve SyzGen to eliminate the reliance on the existing traces based on our observations on how kernel typically implements dependencies in the fourth chapter. Specifically, we define two abstract operations, insertion and lookup on the same data container, which are necessary for any dependencies, and propose a comprehensive suite of technique such as symbolic access paths extraction and matching, a lightweight trial-and-error based dependency verifier, and selective symbolic execution
Assessing the Vulnerability of Marine Fisheries in China: Towards an Inter-Provincial Perspective
China’s marine fisheries are undergoing large-scale environmental changes associated with climate change, marine pollution, and overfishing. The assessment of marine fisheries vulnerability has become extremely necessary for fisheries management and sustainable development. However, studies on China’s marine fisheries vulnerability remains sparse. This study aimed to provide an analysis of the inter-provincial level vulnerability of China’s marine fisheries under multiple disturbances. The vulnerability measure was composed of exposure, sensitivity, and adaptive capacity indicators specific to marine fisheries based on the Intergovernmental Panel on Climate Change (IPCC) definitions. Results showed that Liaoning, Hebei, Fujian, and Hainan provinces appeared to be the most vulnerable; Shanghai appeared to be less vulnerable among China’s 11 coastal provinces; and the key sources of vulnerability differed considerably among coastal regions. The high vulnerability regions could be divided into two different patterns according to the combination of exposure, sensitivity, and adaptive capacity, but they all had one thing in common: relatively low adaptive capacity. While some existing coercive measures to reduce dependence on fisheries were found to be helpful in China, the reality showed that appropriate adaptation measures such as improving fishermen’s education level and increasing vocational training may be helpful in enhancing the existing policy effectiveness
Experimental Research on the Flow and Heat Transfer Characteristics of Subcritical and Supercritical Water in the Vertical Upward Smooth and Rifled Tubes
Experiments were conducted to investigate the heat transfer and flow characteristics of the vertical upward smooth and rifled tubes from subcritical to supercritical pressure. The distributions of wall temperature and heat transfer coefficient (HTC) were obtained, and the HTC correlations and friction resistance coefficient correlations were fitted with experimental data. In addition, the influences of heat flux and type of tube on heat transfer performance were analyzed. The research shows that heat flux has different influences on the heat transfer characteristics under different pressures. The increase in heat flux improves the heat transfer characteristics in the nucleate boiling region, yet it leads to the advance in heat transfer deterioration. However, for supercritical water, the increase in heat flux reduces the heat transfer ability. In addition, using the rifled tube not only improves the heat transfer performance, but also inhibits the occurrence of heat transfer deterioration. The fitted correlations have great predictive ability for the heat transfer coefficient and friction resistance coefficient, and the average relative fitting errors are limited to 20%
Zero Watermarking Algorithm for Vector Geographic Data Based on the Number of Neighboring Features
Zero watermarking is an important part of copyright protection of vector geographic data. However, how to improve the robustness of zero watermarking is still a critical challenge, especially in resisting attacks with significant distortion. We proposed a zero watermarking method for vector geographic data based on the number of neighboring features. The method makes full use of spatial characteristics of vector geographic data, including topological characteristics and statistical characteristics. First, the number of first-order neighboring features (NFNF) and the number of second-order neighboring features (NSNF) of every feature in vector geographic data are counted. Then, the watermark bit is determined by the NFNF value, and the watermark index is determined by the NSNF value. Finally, combine the watermark bits and the watermark indices to construct a watermark. Experiments verify the theoretical achievements and good robustness of this method. Simulation results also demonstrate that the normalized coefficient of the method is always kept at 1.00 under the attacks that distort data significantly, which has the superior performance in comparison to other methods
Zero Watermarking Algorithm for Vector Geographic Data Based on the Number of Neighboring Features
Zero watermarking is an important part of copyright protection of vector geographic data. However, how to improve the robustness of zero watermarking is still a critical challenge, especially in resisting attacks with significant distortion. We proposed a zero watermarking method for vector geographic data based on the number of neighboring features. The method makes full use of spatial characteristics of vector geographic data, including topological characteristics and statistical characteristics. First, the number of first-order neighboring features (NFNF) and the number of second-order neighboring features (NSNF) of every feature in vector geographic data are counted. Then, the watermark bit is determined by the NFNF value, and the watermark index is determined by the NSNF value. Finally, combine the watermark bits and the watermark indices to construct a watermark. Experiments verify the theoretical achievements and good robustness of this method. Simulation results also demonstrate that the normalized coefficient of the method is always kept at 1.00 under the attacks that distort data significantly, which has the superior performance in comparison to other methods
Experimental Research on the Flow and Heat Transfer Characteristics of Subcritical and Supercritical Water in the Vertical Upward Smooth and Rifled Tubes
Experiments were conducted to investigate the heat transfer and flow characteristics of the vertical upward smooth and rifled tubes from subcritical to supercritical pressure. The distributions of wall temperature and heat transfer coefficient (HTC) were obtained, and the HTC correlations and friction resistance coefficient correlations were fitted with experimental data. In addition, the influences of heat flux and type of tube on heat transfer performance were analyzed. The research shows that heat flux has different influences on the heat transfer characteristics under different pressures. The increase in heat flux improves the heat transfer characteristics in the nucleate boiling region, yet it leads to the advance in heat transfer deterioration. However, for supercritical water, the increase in heat flux reduces the heat transfer ability. In addition, using the rifled tube not only improves the heat transfer performance, but also inhibits the occurrence of heat transfer deterioration. The fitted correlations have great predictive ability for the heat transfer coefficient and friction resistance coefficient, and the average relative fitting errors are limited to 20%
Metabolic syndrome predicts postoperative complications after gastrectomy in gastric cancer patients: Development of an individualized usable nomogram and rating model
Abstract Background Metabolic syndrome (MetS), a public health problem, is reportedly related to an increased risk of postoperative complications after surgery. However, whether MetS have an effect on complications after gastric cancer (GC) surgery are unknown. This study aimed to investigate the effects of preoperative MetS on complications after gastrectomy. Methods Altogether, 718 gastric cancer patients who planned to receive radical gastrectomy between June 2014 and December 2016 were enrolled, demographic and clinicopathological characteristics were analyzed. Univariate and multivariate analyses were performed to identify potential risk factors for postoperative complications. A predictive model for postoperative complications was constructed in the form of a nomogram, and its clinical usefulness was assessed. Results Of the 628 patients ultimately included in the study (mean age 62.92 years, 450 men and 178 women), 84 were diagnosed with MetS preoperatively. Severe postoperative complications (Clavien‐Dindo grade ≥II) were significantly more common in patients with MetS (41.7% versus 23.7%, P < .001). Predictors of postoperative complications included MetS (odds ratio [OR] = 1.800, P = .023), age (OR = 1.418, P = .050), Charlson score (OR = 1.787, P = .004 for 1‐2 points) and anastomosis type (OR = 1.746, P = .007 for Billroth II reconstruction). The high‐risk rating had a high AUC (ROC I = 0.503, ROC Ib = 0.544, ROC IIa = 0.601, ROC IIb = 0.612, ROC IIc = 0.638, ROC III = 0.735), indicating that the risk‐rating model has good discriminative capacity and clinical usefulness. Conclusions MetS was an independent risk factor for complications after gastrectomy. The nomogram and rating model incorporating MetS, Billroth II anastomosis, age, and Charlson score was useful for individualized prediction of postoperative complications
<i>Coxiella burnetii</i> and <i>Bartonella</i> Endocarditis Diagnosed by Metagenomic Next-Generation Sequencing
(1) Background: Culture-negative endocarditis is challenging to diagnose. Here, we retrospectively identified 23 cases of Coxiella burnetii and Bartonella endocarditis by metagenomic next-generation sequencing. (2) Methods: Twenty-three patients with culture-negative endocarditis were retrospectively enrolled from Guangdong Provincial People’s Hospital (n = 23) between April 2019 and December 2021. Metagenomic next-generation sequencing was performed on blood (n = 22) and excised cardiac valvular tissue samples (n = 22) for etiological identification, and Sanger sequencing was performed for pathogenic diagnostic verification. The demographic and clinical data of the 23 patients were obtained from hospital electronic health records. (3) Results: A total of 23 male patients (median age, 56 years (interquartile range, 16)) with culture-negative endocarditis were diagnosed with Coxiella burnetii (n = 21) or Bartonella (n = 2) species infection by metagenomic next-generation sequencing. All patients underwent cardiac surgery. The resected tissue exhibited both a significantly higher number of unique suspected pathogen read-pairs and more unique pathogen read-pairs than the blood specimens. The results of Sanger sequencing tests on all remaining tissue and blood specimens were positive. Oral doxycycline was added to the antibiotic regimen for at least 1.5 years according to etiology. A total of 21 patients (91%) were discharged, and 20 patients were healthy at the 21-month (interquartile range, 15) follow-up visit. One patient exhibited endocarditis relapse with the same pathogen from inadequate antibiotic administration. The last 2 patients (9%) developed septic shock and multiple organ dysfunction syndrome postoperatively and died shortly after discharge. (4) Conclusions: CNE caused by C. burnetii and Bartonella species is challenging to diagnose and exhibits poor outcome due to delayed treatment. In response, mNGS, characterized by high sensitivity and rapid results, is an effective alternative for the etiological identification of C. burnetii and Bartonella endocarditis