The thesis summarizes bell hooks' stand and viewpoints as expressed in her book Outlaw Culture:Resisting Representations.In this collection,hooks argues that the outlaw culture,a culture of the marginalized groups...The thesis summarizes bell hooks' stand and viewpoints as expressed in her book Outlaw Culture:Resisting Representations.In this collection,hooks argues that the outlaw culture,a culture of the marginalized groups including black people and women,is either distorted or misinterpreted by the mainstream culture which is a white supremacist patriarchal one.Therefore,she calls for a resistance against the mainstream culture's misrepresentations of the outlaw culture.展开更多
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge,...Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%.展开更多
Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in t...Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead.展开更多
According to the boot process of modern computer systems,whoever boots first will gain control first.Taking advantage of this feature,a malicious code called bootkit can hijack the control before the OS bootloader and...According to the boot process of modern computer systems,whoever boots first will gain control first.Taking advantage of this feature,a malicious code called bootkit can hijack the control before the OS bootloader and bypass security mechanisms in boot process.That makes bootkits difficult to detect or clean up thoroughly.With the improvement of security mechanisms and the emergence of UEFI,the attack and defense techniques for bootkits have constantly been evolving.We first introduce two boot modes of modern computer systems and present an attack model of bootkits by some sophistical samples.Then we discuss some classic attack techniques used by bootkits from their initial appearance to the present on two axes,including boot mode axis and attack phase axis.Next,we evaluate the race to the bottom of the system and the evolution process between bootkits and security mechanisms.At last,we present the possible future direction for bootkits in the context of continuous improvement of OS and firmware security mechanisms.展开更多
OBJECTIVE The inhibitory effect of active ingredients of Tripterygium wilfordii Hook.F.(TWHF)(celastrol,triptolide,triptonide,wilforlide A,wilforgine and wilforine)on human carboxylester⁃ase 1(CES1)and CES2 was detect...OBJECTIVE The inhibitory effect of active ingredients of Tripterygium wilfordii Hook.F.(TWHF)(celastrol,triptolide,triptonide,wilforlide A,wilforgine and wilforine)on human carboxylester⁃ase 1(CES1)and CES2 was detected to investigate the herb-drug interactions(HDIs)of TWHF.METHODS Human liver microsomes catalysed hydrolysis of 2-(2-benzoyl-3-methoxyphenyl)benzothi⁃azole(BMBT)and fluorescein diacetate(FD)were used as the probe reaction to phenotype the activity of CES1 and CES2,respectively.The residual activities of CES1 and CES2 were detected by ultrahigh performance liquid chromatography(UPLC)after intervention with celastrol,triptolide,triptonide,wilforlide A,wilforgine and wilforine(100μmol·L^(-1)).Kinetics analysis,involving half inhibitory concentra⁃tion(IC_(50)),inhibition type and kinetic parameter(Ki),and in vitro-in vivo extrapolation(IVIVE),was carried out to predict the HDIs between these compounds and CES-metabolizing drugs.Molecular docking was performed to analyze the ligand-enzyme interaction.RESULTS Out of the six main con⁃stituents of TWHF,only celastrol exhibited strong inhibition towards both CES1 and CES2,with the inhibitory rates of 97.45%(P<0.05)and 95.62%(P<0.05),respectively.The IC_(50)was 9.95 and 4.02 mol·L^(-1),respectively,and the types of inhibition were all non-competitive inhibition.Based on the kinetics analysis,the Ki values were calculated to be 5.10 and 10.55μmol·L^(-1)for the inhibition of celastrol on CES1 and CES2,respectively.IVIVE indicated that celastrol might disturb the metabolic hydrolysis of clinical drugs in vivo by inhibiting CES1.Molecular docking results showed that hydrogen bonds and hydrophobic contacts contributed to the interaction of celastrol and CESs.CONCLUSION The inhibitory effect of celastrol on CES1 and CES2 might cause HDIs with clinical drugs hydrolysed by CESs.展开更多
In recent years,a new trend has emerged where an interest in museums and archaeology has hooked young people,allowing them to appreciate China’s rich history and be culturally enlightened,while simultaneously contrib...In recent years,a new trend has emerged where an interest in museums and archaeology has hooked young people,allowing them to appreciate China’s rich history and be culturally enlightened,while simultaneously contributing to the spread of Chinese culture.展开更多
Objective:To investigate the hook effect in the detection of beta2-microglobulin(β2-MG)with different reagents as well as on two fully automated biochemical analyzers and their solutions.Methods:Using immunoturbidime...Objective:To investigate the hook effect in the detection of beta2-microglobulin(β2-MG)with different reagents as well as on two fully automated biochemical analyzers and their solutions.Methods:Using immunoturbidimetric assay forβ2-MG as the research object,β2-MG levels were detected by different concentration gradients ofβ2-microglobulin samples in Liedemann,Mack,and Myriad reagents of three manufacturers on two automatic biochemical analyzers,and the difference of the hook effect was comparatively analyzed.Results:Leadman reagent showed the hook effect on the Beckman AU5800 automated biochemistry analyzer,while both Maccura and Mindray reagents did not show the hook effect.After the experiments,we found the limit value of the pre-zone check of Leadman reagent,and changed the parameters of the instrument,when the limit value of the pre-zone check was reached,the instrument automatically diluted the specimen five times and then detected it again.After changing the parameters of the instrument,the correlation between the three methods of detecting samples of different concentrations was r>0.99.Conclusion:Before selecting the application of immunoturbidimetric reagents,we have to carry out the risk assessment of the hook effect and selectively set the parameters of the pre-zone check based on the highest concentration that may occur in the clinic;for the items that may have the hook effect,we have to selectively set the parameters of the pre-zone check when the ratio of average reaction rate and the immediate reaction rate is at the limit value,and the phenomenon of antigen excess may occur,the instrument will carry out automatic dilution before detection,so as to avoid the issuance of erroneous results of high-value samples due to the hook effect.展开更多
Combined bodies of rock-like material and rock are widely encountered in geotechnical engineering,such as tunnels and mines.The existing theoretical models describing the stress-strain relationship of a combined body ...Combined bodies of rock-like material and rock are widely encountered in geotechnical engineering,such as tunnels and mines.The existing theoretical models describing the stress-strain relationship of a combined body lack a binary feature.Based on effective medium theory,this paper presents the governing equation of the“elastic modulus”for combined and single bodies under triaxial compressive tests.A binary effective medium model is then established.Based on the compressive experiment of concretegranite combined bodies,the feasibility of determining the stress threshold based on crack axial strain is discussed,and the model is verified.The model is further extended to coal-rock combined bodies of more diverse types,and the variation laws of the compressive mechanical parameters are then discussed.The results show that the fitting accuracy of the model with the experimental curves of the concretegranite combined bodies and various types of coal-rock combined bodies are over 95%.The crack axial strain method can replace the crack volumetric strain method,which clarifies the physical meanings of the model parameters.The variation laws of matrix parameters and crack parameters are discussed in depth and are expected to be more widely used in geotechnical engineering.展开更多
·AIM: To introduce a new technique for iridoschisis management during phacoemulsification: “capsule drape wrap”.·METHODS: “Capsule drape wrap” technique was used for an 80-year-old man with idiopathic ir...·AIM: To introduce a new technique for iridoschisis management during phacoemulsification: “capsule drape wrap”.·METHODS: “Capsule drape wrap” technique was used for an 80-year-old man with idiopathic iridoschisis in the right eye during phacoemulsification. The inserted flexible nylon iris hooks to hold anterior capsule in place, the margin of the anterior capsule could act as drape wrap, tracking the fibrillary iris strands firmly from free floating and stabilizing the capsular bags simultaneously. ·RESULTS: The eye with iridoschisis was successfully treated. Iris fibrils remained immobile during the procedure, and despite the severity of iridoschisis, there were no intraoperative complications such as tear of the iris, hyphema, iris prolapse, loss of mydriasis, or rupture of the posterior lens capsule during phacoemulsification. The bestcorrected visual acuity was increased by 0.1(log MAR) 6mo after the surgery.·CONCLUSION: “Capsule drape wrap” for iridoschisis is easily manageable, prevents further disruption to the loose iris fibers and ensures the stability of capsule–iris complex simultaneously, consequently minimizing the risk of surgical complications in phacoemulsification.展开更多
文摘The thesis summarizes bell hooks' stand and viewpoints as expressed in her book Outlaw Culture:Resisting Representations.In this collection,hooks argues that the outlaw culture,a culture of the marginalized groups including black people and women,is either distorted or misinterpreted by the mainstream culture which is a white supremacist patriarchal one.Therefore,she calls for a resistance against the mainstream culture's misrepresentations of the outlaw culture.
基金The authors would like to thank the anonymous reviewers for their insightful corrnlents that have helped improve the presentation of this paper. The work was supported partially by the National Natural Science Foundation of China under Grants No. 61070192, No.91018008, No. 61170240 the National High-Tech Research Development Program of China under Grant No. 2007AA01ZA14 the Natural Science Foundation of Beijing un- der Grant No. 4122041.
文摘Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%.
基金supported in part by the National High Technology Research and Development Program of China(863 Program)under Grant No.2009AA01Z433the Project of National Ministry under Grant No.A21201-10006the Open Foundation of State Key Laboratory of Information Security(Institute of Information Engineering,Chinese Academy of Sciences)under Grant No.2013-4-1
文摘Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead.
基金supported by NSFC under Grant 62172308,Grant U1626107,Grant 61972297 and Grant 62172144。
文摘According to the boot process of modern computer systems,whoever boots first will gain control first.Taking advantage of this feature,a malicious code called bootkit can hijack the control before the OS bootloader and bypass security mechanisms in boot process.That makes bootkits difficult to detect or clean up thoroughly.With the improvement of security mechanisms and the emergence of UEFI,the attack and defense techniques for bootkits have constantly been evolving.We first introduce two boot modes of modern computer systems and present an attack model of bootkits by some sophistical samples.Then we discuss some classic attack techniques used by bootkits from their initial appearance to the present on two axes,including boot mode axis and attack phase axis.Next,we evaluate the race to the bottom of the system and the evolution process between bootkits and security mechanisms.At last,we present the possible future direction for bootkits in the context of continuous improvement of OS and firmware security mechanisms.
文摘OBJECTIVE The inhibitory effect of active ingredients of Tripterygium wilfordii Hook.F.(TWHF)(celastrol,triptolide,triptonide,wilforlide A,wilforgine and wilforine)on human carboxylester⁃ase 1(CES1)and CES2 was detected to investigate the herb-drug interactions(HDIs)of TWHF.METHODS Human liver microsomes catalysed hydrolysis of 2-(2-benzoyl-3-methoxyphenyl)benzothi⁃azole(BMBT)and fluorescein diacetate(FD)were used as the probe reaction to phenotype the activity of CES1 and CES2,respectively.The residual activities of CES1 and CES2 were detected by ultrahigh performance liquid chromatography(UPLC)after intervention with celastrol,triptolide,triptonide,wilforlide A,wilforgine and wilforine(100μmol·L^(-1)).Kinetics analysis,involving half inhibitory concentra⁃tion(IC_(50)),inhibition type and kinetic parameter(Ki),and in vitro-in vivo extrapolation(IVIVE),was carried out to predict the HDIs between these compounds and CES-metabolizing drugs.Molecular docking was performed to analyze the ligand-enzyme interaction.RESULTS Out of the six main con⁃stituents of TWHF,only celastrol exhibited strong inhibition towards both CES1 and CES2,with the inhibitory rates of 97.45%(P<0.05)and 95.62%(P<0.05),respectively.The IC_(50)was 9.95 and 4.02 mol·L^(-1),respectively,and the types of inhibition were all non-competitive inhibition.Based on the kinetics analysis,the Ki values were calculated to be 5.10 and 10.55μmol·L^(-1)for the inhibition of celastrol on CES1 and CES2,respectively.IVIVE indicated that celastrol might disturb the metabolic hydrolysis of clinical drugs in vivo by inhibiting CES1.Molecular docking results showed that hydrogen bonds and hydrophobic contacts contributed to the interaction of celastrol and CESs.CONCLUSION The inhibitory effect of celastrol on CES1 and CES2 might cause HDIs with clinical drugs hydrolysed by CESs.
文摘In recent years,a new trend has emerged where an interest in museums and archaeology has hooked young people,allowing them to appreciate China’s rich history and be culturally enlightened,while simultaneously contributing to the spread of Chinese culture.
基金Baoding Science and Technology Bureau(2141ZF313)。
文摘Objective:To investigate the hook effect in the detection of beta2-microglobulin(β2-MG)with different reagents as well as on two fully automated biochemical analyzers and their solutions.Methods:Using immunoturbidimetric assay forβ2-MG as the research object,β2-MG levels were detected by different concentration gradients ofβ2-microglobulin samples in Liedemann,Mack,and Myriad reagents of three manufacturers on two automatic biochemical analyzers,and the difference of the hook effect was comparatively analyzed.Results:Leadman reagent showed the hook effect on the Beckman AU5800 automated biochemistry analyzer,while both Maccura and Mindray reagents did not show the hook effect.After the experiments,we found the limit value of the pre-zone check of Leadman reagent,and changed the parameters of the instrument,when the limit value of the pre-zone check was reached,the instrument automatically diluted the specimen five times and then detected it again.After changing the parameters of the instrument,the correlation between the three methods of detecting samples of different concentrations was r>0.99.Conclusion:Before selecting the application of immunoturbidimetric reagents,we have to carry out the risk assessment of the hook effect and selectively set the parameters of the pre-zone check based on the highest concentration that may occur in the clinic;for the items that may have the hook effect,we have to selectively set the parameters of the pre-zone check when the ratio of average reaction rate and the immediate reaction rate is at the limit value,and the phenomenon of antigen excess may occur,the instrument will carry out automatic dilution before detection,so as to avoid the issuance of erroneous results of high-value samples due to the hook effect.
基金the Major Program of National Natural Science Foundation of China(No.41941019)Shaanxi Province Innovative Talent Promotion Plan-Science and Technology Innovation Team(No.2021TD-55)Central University Natural Science Innovation Team(No.300102262402)。
文摘Combined bodies of rock-like material and rock are widely encountered in geotechnical engineering,such as tunnels and mines.The existing theoretical models describing the stress-strain relationship of a combined body lack a binary feature.Based on effective medium theory,this paper presents the governing equation of the“elastic modulus”for combined and single bodies under triaxial compressive tests.A binary effective medium model is then established.Based on the compressive experiment of concretegranite combined bodies,the feasibility of determining the stress threshold based on crack axial strain is discussed,and the model is verified.The model is further extended to coal-rock combined bodies of more diverse types,and the variation laws of the compressive mechanical parameters are then discussed.The results show that the fitting accuracy of the model with the experimental curves of the concretegranite combined bodies and various types of coal-rock combined bodies are over 95%.The crack axial strain method can replace the crack volumetric strain method,which clarifies the physical meanings of the model parameters.The variation laws of matrix parameters and crack parameters are discussed in depth and are expected to be more widely used in geotechnical engineering.
基金Supported by the National Key R&D Program of China (No.2020YFC2008202)the National Natural Science Foundation of China (No.81970813)+1 种基金the Natural Science Foundation of Guangdong Province (No.2023A1515011198)Guangzhou Municipal Science and Technology Project (No.SL2022A03J00553)。
文摘·AIM: To introduce a new technique for iridoschisis management during phacoemulsification: “capsule drape wrap”.·METHODS: “Capsule drape wrap” technique was used for an 80-year-old man with idiopathic iridoschisis in the right eye during phacoemulsification. The inserted flexible nylon iris hooks to hold anterior capsule in place, the margin of the anterior capsule could act as drape wrap, tracking the fibrillary iris strands firmly from free floating and stabilizing the capsular bags simultaneously. ·RESULTS: The eye with iridoschisis was successfully treated. Iris fibrils remained immobile during the procedure, and despite the severity of iridoschisis, there were no intraoperative complications such as tear of the iris, hyphema, iris prolapse, loss of mydriasis, or rupture of the posterior lens capsule during phacoemulsification. The bestcorrected visual acuity was increased by 0.1(log MAR) 6mo after the surgery.·CONCLUSION: “Capsule drape wrap” for iridoschisis is easily manageable, prevents further disruption to the loose iris fibers and ensures the stability of capsule–iris complex simultaneously, consequently minimizing the risk of surgical complications in phacoemulsification.