The effects of methyl jasmonate (MeJA), an elicitor of plant defense mechanisms, on the biosynthesis of diosgenin, a steroidal saponin, were investigated in six fenugreek (Trigonella foenum-graecum) varieties (Gujarat Methi-2, Kasuri-1, Kasuri-2, Pusa Early Branching, Rajasthan Methi and Maharashtra Methi-5). Treatment with 0.01% MeJA increased diosgenin levels, in 12 days old seedlings, from 0.5%–0.9% to 1.1%–1.8%. In addition, MeJA upregulated the expression of two pivotal genes of the mevalonate pathway, the metabolic route leading to diosgenin: 3-hydroxy-3-methylglutaryl-CoA reductase (HMG) and sterol-3-β-glucosyl transferase (STRL). In particular, MeJA increased the expression of HMG and STRL genes by 3.2- and 22.2-fold, respectively, in the Gujarat Methi-2 variety, and by 25.4- and 28.4-fold, respectively, in the Kasuri-2 variety. Therefore, MeJA may be considered a promising elicitor for diosgenin production by fenugreek plants.
This article presents a client-server JavaScript code rewriting-based framework that protects and preserves the privacy of online users against XSS worms on Online Social Network (OSN). The server-side generates an estimation graph which is explored for extracting the JavaScript code and shifts such code in a separate file. This shifting is done for completely isolating the untrusted JavaScript code and data. The client-side performs runtime monitoring of the dynamic JavaScript code to recognize the tainted flow of untrusted JavaScript variables. The context of such dynamic tainted variables is determined, for performing the string analysis to examine whether it may be considered as vulnerable point or not. Finally, decoding operation is performed on the obfuscated malicious JavaScript code and the JavaScript code embedded in the parameter values of HTTP request. If match is found, then XSS attack vector is present. Otherwise, it is not. The authors have developed their prototype on the Java development framework and have estimated the malicious script alleviation capability of this proposed work on tested web applications (Humhub, Elgg, WordPress, Joomla, Drupal). INTRODUCTIONToday, many OSNs have tens of millions of active users. One of the popular OSN is Facebook with greater than 1 billion vigorous users. 1 Social networking is not limited to informal use; however, it is too used for formal purposes. The user on these networks stores the pool of information (personal/professional), therefore, hackers are paying more attention toward these sites. Hackers can make use of this accessible information for their malicious activities. 2-7 To offer online users with enhanced services, the OSNs utilize the capabilities of JavaScript or related contemporary platforms of programming language. The support for such language platforms provides fertile platform for JS worm injection vulnerabilities. The injection of such worms gives rise to Cross-Site Scripting (XSS) attacks on web applications. 8-12 Such vulnerabilities are present in web applications because of the incorrectly validated user input. Furthermore, extenuating all possible JS worm injections is infeasible due to the size and intricacy of modern web application and the various ways that browsers call upon their JS engines. Initially, when XSS was exploited due to the injection of JS worm, it was classified in 2 categories: stored XSS and non-persistent XSS. Later on, a third category of XSS, ie, DOM-based XSS, was defined in 2005. Figure 1 shows the statistics of 2016 by white hat 13 that this attack is a noteworthy concern on each platform of different languages exploited by contemporary platforms of the web.Galán et al 14 proposed a multi-agent system for the scanning of websites in an automated manner to discover the occurrence of XSS vulnerabilities exploitable by stored XSS attack. Likarish et al 15 proposed a method that generates a robust database of scripts (including benign and malicious script code) and extracts the features of web page for classifyi...
Fenugreek (Trigonella foenum-graecum L.) is a medicinal plant used worldwide since ancient times. Its use as smelling agent and spice was documented since 15 th century. The genus Trigonella includes around 260 species diffused worldwide and belonging to Fabaceae family. In the last decades, a number of studies highlighted the biological activities and therapeutic properties of this species mainly attributed to bioactive secondary metabolites such as alkaloids, flavonoids, steroids and saponins. In particular, diosgenin, a steroidal saponin, has been investigated for its medicinal uses and fenugreek has been reported as source of raw material for the production of steroidal hormones. This review article focuses on the cultivation, genetics, ecophysiology and traditional uses of fenugreek, as well as on its medicinal properties, phytochemical and nutrient contents. Extraction procedures and pharmacological activities of diosgenin are also reviewed, as well as methods for its chemical analyses. This review focuses on the medicinal importance of Fenugreek and its important secondary metabolite diosgenin. The review article complies the results of pre-clinical studies conducted to establish the various medicinal applications of diosgenin. This will help researcher to discover fundamental role of diosgenin as a potential product for drug manufacturers and use of fenugreek as a source of diosgenin.
This article presents a cloud-based framework that thwarts the DOM-based XSS vulnerabilities caused due to the injection of advanced HTML5 attack vectors in the HTML5 web applications. Initially, the framework collects the key modules of web application, extracts the suspicious HTML5 strings from the latent injection points and performs the clustering on such strings based on their level of similarity. Further, it detects the injection of malicious HTML5 code in the script nodes of DOM tree by detecting the variation in the HTML5 code embedded in the HTTP response generated. Any variation observed will simply indicate the injection of suspicious script code. The prototype of our framework was developed in Java and installed in the virtual machines of cloud environment on the Google Chrome extension. The experimental evaluation of our framework was performed on the platform of real world HTML5 web applications deployed in the cloud platform.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.