recentpopularlog in

Research

« earlier   
Genome of 40,000-Year-Old "Tianyuan Man" Analyzed - Archaeology Magazine
BEIJING, CHINA—According to a report in Science Magazine, scientists led by Qiaomei Fu of the Molecular Paleontology Lab at the Chinese Academy of Sciences Institute of Vertebrate Paleontology and Paleoanthropology examined genome material extracted from the thighbone of a 40,000-year-old skeleto
research 
yesterday by dougleigh
Offshore wind farms have powerful advantage over land-based turbines, study finds | Science | AAAS
Floating wind turbines at sea could create up to three times as much electricity as turbines on land, increasing the energy potential for a technology that has yet to be proven at scale, a new study suggests. The new study comes at a time of reckoning for terrestrial wind power.
research 
yesterday by dougleigh
Scientists uncover source of Old Faithful’s hot water supply | Science | AAAS
If only humanmade plumbing were as reliable as Old Faithful’s. Every 90 minutes or so, Yellowstone National Park’s iconic geyser (pictured) spews water and steam 40 meters high, on a schedule so precise that tourists know when to gather to watch the show.
research 
yesterday by dougleigh
Was this ancient person from China the offspring of modern humans and Neandertals? | Science | AAAS
When scientists excavated a 40,000-year-old skeleton in China in 2003, they thought they had discovered the offspring of a Neandertal and a modern human.
research 
yesterday by dougleigh
Can you trust that person on the phone? These clues may give them away | Science | AAAS
Most people can tell whether a person is trustworthy simply by the way they say “hello.” Something in their voice just gives them away. Now, scientists have figured out what that something is—an advance that could lead to more realistic electronic speech.
research 
yesterday by dougleigh
Herbivory enables marine communities to resist warming | Science Advances
You are currently viewing the abstract. Climate change can influence ecosystems via both direct effects on individual organisms and indirect effects mediated by species interactions.
research 
yesterday by dougleigh
Attacking a co-hosted VM: A hacker, a hammer and two memory modules - This is Security :: by Stormshield
Row-hammer is hardware bug that can cause bit-flips in physical RAM. Mark Seaborn and Thomas Dullien were the first to exploit the DRAM row-hammer bug to gain kernel privileges. Kaveh Razavi et al. pushed the exploitation of row-hammer bugs to the next level. They abused an OS feature – memory de-duplication – to surgically flip bits in a controlled way. They succeeded in flipping bits in memory loaded sensitive files (e.g. authorized_keys) assuming they know their contents. By weakening RSA moduli in authorized_keys file, they were able to generate corresponding private keys and authenticate on a co-hosted victim VM.

In this post, we aim to showcase a different attack scenario. Instead of corrupting memory loaded files, we chose to corrupt the state of a running program. The libpam is an attractive target since it provides authentication mechanisms on widely deployed *nix systems.

By running an instance of a row-hammer attack on an attacker VM, we were able to successfully authenticate on an adjacent victim VM by corrupting the state of pam_unix.so module.
security  research  memory 
yesterday by Chirael
of Warp and Weft: Weaving broken diamond twill fabric to create a Viking age apron dress
During the Viking age fabric for clothing was woven on a warp-weighted loom and since I have always been interested in wood working, I decided to build one myself. After finishing the loom, I wove a small plain test weave to see if the loom worked and if weaving on one suited me. It did and since my wife has so far made all our garb, I decided it was time to return the favor. With our Viking personas in mind, I decided to setup the loom and weave enough fabric to make her an apron dress.
weaving  history  textiles  ToME  research 
yesterday by Weaverbird
Fraud Scandals Sap China’s Dream of Becoming a Science Superpower - The New York Times
But in its rush to dominance, China has stood out in another, less boastful way. Since 2012, the country has retracted more scientific papers because of faked peer reviews than all other countries and territories put together, according to Retraction Watch, a blog that tracks and seeks to publicize retractions of research papers.
science  research  fraud  review  critique  China  NYTimes  2017 
yesterday by inspiral

Copy this bookmark:





to read