251 research outputs found
Scanning Tunneling Microscopy and Tunneling Luminescence of the Surface of GaN Films Grown by Vapor Phase Epitaxy
We report scanning tunneling microscopy (STM) images of surfaces of GaN films
and the observation of luminescence from those films induced by highly
spatially localized injection of electrons or holes using STM. This combination
of scanning tunneling luminescence (STL) with STM for GaN surfaces and the
ability to observe both morphology and luminescence in GaN is the first step to
investigate possible correlations between surface morphology and optical
properties.Comment: 12 pages, Revtex 3.0, submitted to Appl. Phys. Lett., three figures
available from Jian Ma at [email protected]
Error-Tolerant Algebraic Side-Channel Attacks Using BEE
Algebraic side-channel attacks are a type of side-channel analysis which can recover the secret information with a small number of samples (e.g., power traces). However, this type of side-channel analysis is sensitive to measurement errors which may make the attacks fail.
In this paper, we propose a new method of algebraic side-channel attacks which considers noisy leakages as integers restricted to intervls and finds out the secret information with a constraint programming solver named BEE. To demonstrate the efficiency of this new method in algebraic side-channel attacks, we analyze some popular implementations of block ciphers---PRESENT, AES, and SIMON under the Hamming weight or Hamming distance leakage model. For AES, our method requires the least leakages compared with existing works under the same error model. For both PRESENT and SIMON, we provide the first analytical results of them under algebraic side-channel attacks in the presence of errors. To further demonstrate the wide applicability of this new method, we also extend it to cold boot attacks. In the cold boot attacks against AES, our method increases the success rate by over than previous works
The role of multiple marks in epigenetic silencing and the emergence of a stable bivalent chromatin state
We introduce and analyze a minimal model of epigenetic silencing in budding
yeast, built upon known biomolecular interactions in the system. Doing so, we
identify the epigenetic marks essential for the bistability of epigenetic
states. The model explicitly incorporates two key chromatin marks, namely H4K16
acetylation and H3K79 methylation, and explores whether the presence of
multiple marks lead to a qualitatively different systems behavior. We find that
having both modifications is important for the robustness of epigenetic
silencing. Besides the silenced and transcriptionally active fate of chromatin,
our model leads to a novel state with bivalent (i.e., both active and
silencing) marks under certain perturbations (knock-out mutations, inhibition
or enhancement of enzymatic activity). The bivalent state appears under several
perturbations and is shown to result in patchy silencing. We also show that the
titration effect, owing to a limited supply of silencing proteins, can result
in counter-intuitive responses. The design principles of the silencing system
is systematically investigated and disparate experimental observations are
assessed within a single theoretical framework. Specifically, we discuss the
behavior of Sir protein recruitment, spreading and stability of silenced
regions in commonly-studied mutants (e.g., sas2, dot1) illuminating the
controversial role of Dot1 in the systems biology of yeast silencing.Comment: Supplementary Material, 14 page
Making Masking Security Proofs Concrete - Or How to Evaluate the Security of any Leaking Device
We investigate the relationships between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks. Our contributions are in four parts. First, we connect the formal analysis of the masking countermeasure proposed by Duc et al. (Eurocrypt 2014) with the Eurocrypt 2009 evaluation framework for side-channel key recovery attacks. In particular, we re-state their main proof for the masking countermeasure based on a mutual information metric, which is frequently used in concrete physical security evaluations. Second, we discuss the tightness of the Eurocrypt 2014 bounds based on experimental case studies. This allows us to conjecture a simplified link between the mutual information metric and the success rate of a side-channel adversary, ignoring technical parameters and proof artifacts. Third, we introduce heuristic (yet well-motivated) tools for the evaluation of the masking countermeasure when its independent leakage assumption is not perfectly fulfilled, as it is frequently encountered in practice. Thanks to these tools, we argue that masking with non-independent leakages may provide improved security levels in certain scenarios. Eventually, we consider the tradeoff between measurement complexity and key enumeration in divide-and-conquer side-channel attacks, and show that it can be predicted based on the mutual information metric, by solving a non-linear integer programming problem for which efficient solutions exist. The combination of these observations enables significant reductions of the evaluation costs for certification bodies
Crossing borders to bind proteins—a new concept in protein recognition based on the conjugation of small organic molecules or short peptides to polypeptides from a designed set
A new concept for protein recognition and binding is highlighted. The conjugation of small organic molecules or short peptides to polypeptides from a designed set provides binder molecules that bind proteins with high affinities, and with selectivities that are equal to those of antibodies. The small organic molecules or peptides need to bind the protein targets but only with modest affinities and selectivities, because conjugation to the polypeptides results in molecules with dramatically improved binder performance. The polypeptides are selected from a set of only sixteen sequences designed to bind, in principle, any protein. The small number of polypeptides used to prepare high-affinity binders contrasts sharply with the huge libraries used in binder technologies based on selection or immunization. Also, unlike antibodies and engineered proteins, the polypeptides have unordered three-dimensional structures and adapt to the proteins to which they bind. Binder molecules for the C-reactive protein, human carbonic anhydrase II, acetylcholine esterase, thymidine kinase 1, phosphorylated proteins, the D-dimer, and a number of antibodies are used as examples to demonstrate that affinities are achieved that are higher than those of the small molecules or peptides by as much as four orders of magnitude. Evaluation by pull-down experiments and ELISA-based tests in human serum show selectivities to be equal to those of antibodies. Small organic molecules and peptides are readily available from pools of endogenous ligands, enzyme substrates, inhibitors or products, from screened small molecule libraries, from phage display, and from mRNA display. The technology is an alternative to established binder concepts for applications in drug development, diagnostics, medical imaging, and protein separation
- …