• Title/Summary/Keyword: Two stage approach

Search Result 554, Processing Time 0.028 seconds

Minimize Web Applications Vulnerabilities through the Early Detection of CRLF Injection

  • Md. Mijanur Rahman;Md. Asibul Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.199-202
    • /
    • 2023
  • Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the administrator. Log poisoning and HTTP response splitting are two prominent harmful uses of this technique. Additionally, CRLF injection can be used by an attacker to exploit other vulnerabilities, such as cross-site scripting (XSS). Email injection, also known as email header injection, is another way that can be used to modify the behavior of emails. The Open Web Application Security Project (OWASP) is an organization that studies vulnerabilities and ranks them based on their level of risk. According to OWASP, CRLF vulnerabilities are among the top 10 vulnerabilities and are a type of injection attack. Automated testing can help to quickly identify CRLF vulnerabilities, and is particularly useful for companies to test their applications before releasing them. However, CRLF vulnerabilities can also lead to the discovery of other high-risk vulnerabilities, and it fosters a better approach to mitigate CRLF vulnerabilities in the early stage and help secure applications against known vulnerabilities. Although there has been a significant amount of research on other types of injection attacks, such as Structure Query Language Injection (SQL Injection). There has been less research on CRLF vulnerabilities and how to detect them with automated testing. There is room for further research to be done on this subject matter in order to develop creative solutions to problems. It will also help to reduce false positive alerts by checking the header response of each request. Security automation is an important issue for companies trying to protect themselves against security threats. Automated alerts from security systems can provide a quicker and more accurate understanding of potential vulnerabilities and can help to reduce false positive alerts. Despite the extensive research on various types of vulnerabilities in web applications, CRLF vulnerabilities have only recently been included in the research. Utilizing automated testing as a recurring task can assist companies in receiving consistent updates about their systems and enhance their security.

Estimating a Precautionary Saving Motive under Consumption Uncertainty (소비의 불확실성에 따른 예비적 저축 동기 추정)

  • Hwang, Jin-tae;Kim, Sung-min
    • Economic Analysis
    • /
    • v.26 no.3
    • /
    • pp.48-70
    • /
    • 2020
  • Using data from the Household Income and Expenditure Survey over the period 1994-2016, we estimate the coefficient of relative prudence in order to capture precautionary saving motive. To do this, we adopt a cohort approach, where we transform such microdata into sample cohort means. Together with initial income involving liquidity constraint, we estimate the relative prudence derived from the Euler equation. The two-stage least-squares (2SLS) between estimate of it obtained from the cohort panel data analysis is too small for the existence of precautionary saving motive, as in previous studies, while the 2SLS random effects estimate is so reasonable. Moreover, the liquidity-constrained cohorts tend to be more sensitive to uncertainty, relative to the unconstrained ones.

Origin of Tearing Paths in Transferred Graphene by H2 Bubbling Process and Improved Transfer of Tear-Free Graphene Films U sing a Heat Press

  • Jinsung Kwak
    • Korean Journal of Materials Research
    • /
    • v.32 no.12
    • /
    • pp.522-527
    • /
    • 2022
  • Among efforts to improve techniques for the chemical vapor deposition of large-area and high-quality graphene films on transition metal substrates, being able to reliably transfer these atomistic membranes onto the desired substrate is a critical step for various practical uses, such as graphene-based electronic and photonic devices. However, the most used approach, the wet etching transfer process based on the complete etching of metal substrates, remains a great challenge. This is mainly due to the inevitable damage to the graphene, unintentional contamination of the graphene layer, and increased production cost and time. Here, we report the systematic study of an H2 bubbling-assisted transfer technique for graphene films grown on Cu foils, which is nondestructive not only to the graphene film but also to the Cu substrate. Also, we demonstrate the origin of the graphene film tearing phenomenon induced by this H2 bubbling-assisted transfer process. This study reveals that inherent features are produced by rolling Cu foil, which cause a saw-like corrugation in the poly(methyl methacrylate) (PMMA)/graphene stack when it is transferred onto the target substrate after the Cu foil is dissolved. During the PMMA removal stage, the graphene tearing mainly appears at the apexes of the corrugated PMMA/graphene stack, due to weak adhesion to the target substrate. To address this, we have developed a modified heat-press-assisted transfer technique that has much better control of both tearing and the formation of residues in the transferred graphene films.

The Current State and Legal Issues of Online Crimes Related to Children and Adolescents

  • Hyoung-ryul Kim
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.34 no.4
    • /
    • pp.222-228
    • /
    • 2023
  • There are two categories of online crimes related to children and adolescents: those committed by adolescents and those committed against children and adolescents. While recent trends in criminal law show consensus on strengthening punishment in cases of crimes against children and adolescents, there are mixed stances in cases of juvenile delinquency. One perspective emphasizes strict punishment, whereas the other emphasizes dispositions aligned with human rights. While various forms of online crime share the commonality in that the main part of the criminal act occurs online, they can be categorized into three types: those seeking financial gain, those driven by sexual motives, and those engaged in bullying. Among these, crimes driven by sexual motives are the most serious. Second-hand trading fraud and conditional (sexual) meeting fraud fall under the category of seeking financial gain and occur frequently. Crimes driven by sexual motives include obscenity via telecommunication, filming with discrete cameras, child and adolescent sexual exploitation material, fake video distribution, and blackmail/coercion using intimate images/videos ("sextortion"). These crimes lead to various legal issues such as whether to view vulgar acronyms or body cams that teenagers frequently use as simple subcultures or crimes, what criteria should be applied to judge whether a recorded material induces sexual desire or shame, and at what stage sexual grooming becomes punishable. For example, sniping posts, KakaoTalk prisons, and chat room explosions are tricky issues, as they may or may not be punished depending on the case. Particular caution should be exercised against the indiscriminate application of a strict punishment-oriented approach to the juvenile justice system, which is being discussed in relation to online sexual offenses. In the punishment case of online crime, juvenile offenders with a high potential for future improvement and reform must be treated with special consideration.

Atherectomy in Peripheral Artery Disease: Current and Future (말초동맥질환에서의 죽종절제술: 현재와 미래)

  • Yohan Kwon;Jinoo Kim;Je-Hwan Won;Seong Ho Kim;Jeong-Eun Kim;Sung-Joon Park
    • Journal of the Korean Society of Radiology
    • /
    • v.82 no.3
    • /
    • pp.551-561
    • /
    • 2021
  • Atherectomy has become a promising treatment option for peripheral artery disease caused by diabetes mellitus or end-stage renal disease. Atherectomy refers to the removal of atheromatous tissue by mechanical method, resulting in an enlarged lumen of the treated blood vessel. Based on this method, the term is limited to the percutaneous minimally invasive approach, and there are currently two types of atherectomy devices available in Korea. The increased prevalence of atherectomy has led to the concept of "vascular preparation" and a new treatment concept of "leave nothing behind." Various studies have proven the safety and effectiveness of atherectomy; however, there are some limitations. We need to remain focused on patient selection and subsequent large-scale research.

Feature Extraction and Classification of Multi-temporal SAR Data Using 3D Wavelet Transform (3차원 웨이블렛 변환을 이용한 다중시기 SAR 영상의 특징 추출 및 분류)

  • Yoo, Hee Young;Park, No-Wook;Hong, Sukyoung;Lee, Kyungdo;Kim, Yihyun
    • Korean Journal of Remote Sensing
    • /
    • v.29 no.5
    • /
    • pp.569-579
    • /
    • 2013
  • In this study, land-cover classification was implemented using features extracted from multi-temporal SAR data through 3D wavelet transform and the applicability of the 3D wavelet transform as a feature extraction approach was evaluated. The feature extraction stage based on 3D wavelet transform was first carried out before the classification and the extracted features were used as input for land-cover classification. For a comparison purpose, original image data without the feature extraction stage and Principal Component Analysis (PCA) based features were also classified. Multi-temporal Radarsat-1 data acquired at Dangjin, Korea was used for this experiment and five land-cover classes including paddy fields, dry fields, forest, water, and built up areas were considered for classification. According to the discrimination capability analysis, the characteristics of dry field and forest were similar, so it was very difficult to distinguish these two classes. When using wavelet-based features, classification accuracy was generally improved except built-up class. Especially the improvement of accuracy for dry field and forest classes was achieved. This improvement may be attributed to the wavelet transform procedure decomposing multi-temporal data not only temporally but also spatially. This experiment result shows that 3D wavelet transform would be an effective tool for feature extraction from multi-temporal data although this procedure should be tested to other sensors or other areas through extensive experiments.

The Behavior of Piled Bridge Abutments Subjected to Lateral Soil Movements - A Study on the Centrifuge Model Tests - (측방유동을 받는 교대말뚝기초의 거동분석 (I) - 원심모형실험 연구 -)

  • 서정주;서동희;정상섬;김유석
    • Journal of the Korean Geotechnical Society
    • /
    • v.19 no.1
    • /
    • pp.5-19
    • /
    • 2003
  • A series of centrifuge model tests were conducted to investigate the behavior of piled bridge abutments subjected to lateral soil movements induced by approach embankments. The effect of clay layer depth and the rate of embankment construction on piled bridge abutments are the main focus of this study. Tests were performed for two loading types: (1) incremental loading applied in six lifts to the final embankment height; (2) instant loading corresponding to the final embankment height applied in one lift quickly. A variety of instrumentations such as LVDTs, strain gauges, earth pressure transducers, and pore pressure transducers are installed in designed positions in order to clarify the soil-pile interaction and the short- and long-term behavior for piled bridge abutments adjacent to surcharge loads. Based on the results of a series of centrifuge model tests, the distribution of lateral flow induced by staged embankment construction has trapezoidal distribution. The maximum lateral soil pressure is about 0.75$\gamma$H at surcharge loading stage, and about 0.35 $\gamma$H at over 80% consolidated stage.

A simple approach to preserve keratinized mucosa around implants using a pre-fabricated implant-retained stent: a report of two cases

  • Park, Jung-Chul;Yang, Ki-Bin;Choi, You-Na;Kim, Yong-Tae;Jung, Ui-Won;Kim, Chang-Sung;Cho, Kyoo-Sung;Chai, Jung-Kiu;Kim, Chong-Kwan;Choi, Seong-Ho
    • Journal of Periodontal and Implant Science
    • /
    • v.40 no.4
    • /
    • pp.194-200
    • /
    • 2010
  • Purpose: There is no consensus regarding the relationship between the width of keratinized mucosa and the health of periimplant tissues, but clinicians prefer to provide enough keratinized mucosa around dental implants for long-term implant maintenance. An apically positioned flap during second stage implant surgery is the chosen method of widening the keratinized zone in simple procedures. However, the routine suture techniques used with this method tend to apply tension over the provisional abutments and decrease pre-existing keratinized mucosa. To overcome this shortcoming, a pre-fabricated implant-retained stent was designed to apply vertical pressure on the labial flap and stabilize it in a bucco-apical direction to create a wide keratinized mucous zone. Methods: During second stage implant surgery, an apically displaced, partial thickness flap with a lingualized incision was retracted. A pre-fabricated stent was clipped over the abutments after connecting to the provisional abutment. Vertical pressure was applied to displace the labial flap. No suture was required and the stent was removed after 10 days. Results: A clinically relevant amount of keratinized mucosa was achieved around the dental implants. Buccally displaced keratinized mucosa was firmly attached to the underlying periosteum. A slight shrinkage of the keratinized zone was noted after the healing period in one patient, but no discomfort during oral hygiene was reported. Clinically healthy gingiva with enough keratinized mucosa was achieved in both patients. Conclusions: The proposed technique is a simple and time-effective technique for preserving and providing keratinized tissue around dental implants.

Numerical Modelling of One Dimensional Gas Injection Experiment using Mechanical Damage Model: DECOVALEX-2019 Task A Stage 1A (역학손상모델을 이용한 1차원 기체 주입 시험 모델링: 국제공동연구 DECOVALEX-2019 Task A Stage 1A)

  • Lee, Jaewon;Lee, Changsoo;Kim, Geon Young
    • Tunnel and Underground Space
    • /
    • v.29 no.4
    • /
    • pp.262-279
    • /
    • 2019
  • In the engineering barriers of high-level radioactive waste disposal, gases could be generated through a number of processes. If the gas production rate exceeds the gas diffusion rate, the pressure of the gas increases and gases could migrate through the bentonite buffer. Because people and the environment can be exposed to radioactivity, it is very important to clarify gas migration in terms of long-term integrity of the engineered barrier system. In particular, it is necessary to identify the hydro-mechanical mechanism for the dilation flow, which is a very important gas flow phenomenon only in medium containing large amounts of clay materials such as bentonite buffer, and to develop and validate new numerical approach for the quantitative evaluation of the gas migration phenomenon. Therefore, in this study, we developed a two-phase flow model considering the mechanical damage model in order to simulate the gas migration in the engineered barrier system, and validated with 1D gas flow modelling through saturated bentonite under constant volume boundary conditions. As a result of numerical analysis, the rapid increase in pore water pressure, stress, and gas outflow could be simulated when the dilation flow was occurred.

A Study on Leakage Detection Technique Using Transfer Learning-Based Feature Fusion (전이학습 기반 특징융합을 이용한 누출판별 기법 연구)

  • YuJin Han;Tae-Jin Park;Jonghyuk Lee;Ji-Hoon Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.41-47
    • /
    • 2024
  • When there were disparities in performance between models trained in the time and frequency domains, even after conducting an ensemble, we observed that the performance of the ensemble was compromised due to imbalances in the individual model performances. Therefore, this paper proposes a leakage detection technique to enhance the accuracy of pipeline leakage detection through a step-wise learning approach that extracts features from both the time and frequency domains and integrates them. This method involves a two-step learning process. In the Stage 1, independent model training is conducted in the time and frequency domains to effectively extract crucial features from the provided data in each domain. In Stage 2, the pre-trained models were utilized by removing their respective classifiers. Subsequently, the features from both domains were fused, and a new classifier was added for retraining. The proposed transfer learning-based feature fusion technique in this paper performs model training by integrating features extracted from the time and frequency domains. This integration exploits the complementary nature of features from both domains, allowing the model to leverage diverse information. As a result, it achieved a high accuracy of 99.88%, demonstrating outstanding performance in pipeline leakage detection.