21 research outputs found

    Cytotoxicity and Radiosensitising Activity of Synthesized Dinitrophenyl Derivatives of 5-Fluorouracil

    Get PDF
    Background and the purpose of the study: Dual functional agents in which nitroaromatic or nitroheterocyclic compounds are attached through a linker unit to mustards and aziridines have shown higher cytotoxicities than the corresponding counterparts to both aerobic and hypoxic cells and enhanced radiosensitizing activity. In thepresent investigation cytotoxicity and radiosensitizing activity of 2,4-dinitrobenzyl, 2,4-dinitrobenzoyl, and 2,4-dinitrophenacetyl derivatives of 5-fluorouracil which was assumed to release cytotoxic active quinone methidide,and 5-fluorouracil under hypoxic conditions on HT-29 cell line under both aerobic and hypoxic conditions wasinvestigated.Methods: 5-fluorouracil derivative X-XIII were prepared by the reaction of the corresponding di-nitro substitutedbenzyl, benzoyl and phenacetyl halides with 5-fluorouracil protected at N-1 with di-t-butoxydicarbonate (BOC) in dimethyl formamide (DMF) in the presence of the potassium carbonate followed by hydrolysis of the blocking,group by potassium carbonate in methanol. Cytotoxicity of fluorouracil VIII and tested compounds X-XIII against HT-29cell line under both aerobic and hypoxic conditions after 48 hrs incubation were measured by determination of the percent of the survival cells using 3-(4,5-Dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) assay and percent of the dead cells using propidium iodide(PI)-digitonine assay and results were used to calculate the corresponding IC50 values. Radiosensitization experiments were carried out by irradiation of the incubations with a 60Co source and clonogenic assay was performed to determine the cell viabilities following treatment with the tested compounds and/or radiation. Sensitization Enhancement Ratio (SER) of each tested compound was obtained from the radiation survival curves in the absence and presence of each sensitizer for 37% survival respectively.Results and major conclusion: Findings of the present study showed that alkylation or acylation of 5-fluorouracilresult in compounds which have little or no cytotoxicity and radiosensitizing activity under aerobic conditions, buthave high cytotoxicity and radiosensitizing effects under hypoxic conditions. Furthermore radiosensitizing activities ofcompounds under hypoxic conditions increased by increase in their concentrations and SER of the tested 5-FU derivatives at concentrations higher than 50 μmol were equal or higher than 1.6 which is the minimum effective SER of a radiosensitizer in an in vitro assay

    Single-Layer versus Double-Layer Laparoscopic Intracorporeally Sutured Gastrointestinal Anastomoses in the Canine Model

    Get PDF
    This study shows that the 1-layer gastrointestinal suture technique is feasible, safe and has fewer complications compared with a 2-layer suture technique

    HyperDbg: Reinventing Hardware-Assisted Debugging (Extended Version)

    Full text link
    Software analysis, debugging, and reverse engineering have a crucial impact in today's software industry. Efficient and stealthy debuggers are especially relevant for malware analysis. However, existing debugging platforms fail to address a transparent, effective, and high-performance low-level debugger due to their detectable fingerprints, complexity, and implementation restrictions. In this paper, we present HyperDbg, a new hypervisor-assisted debugger for high-performance and stealthy debugging of user and kernel applications. To accomplish this, HyperDbg relies on state-of-the-art hardware features available in today's CPUs, such as VT-x and extended page tables. In contrast to other widely used existing debuggers, we design HyperDbg using a custom hypervisor, making it independent of OS functionality or API. We propose hardware-based instruction-level emulation and OS-level API hooking via extended page tables to increase the stealthiness. Our results of the dynamic analysis of 10,853 malware samples show that HyperDbg's stealthiness allows debugging on average 22% and 26% more samples than WinDbg and x64dbg, respectively. Moreover, in contrast to existing debuggers, HyperDbg is not detected by any of the 13 tested packers and protectors. We improve the performance over other debuggers by deploying a VMX-compatible script engine, eliminating unnecessary context switches. Our experiment on three concrete debugging scenarios shows that compared to WinDbg as the only kernel debugger, HyperDbg performs step-in, conditional breaks, and syscall recording, 2.98x, 1319x, and 2018x faster, respectively. We finally show real-world applications, such as a 0-day analysis, structure reconstruction for reverse engineering, software performance analysis, and code-coverage analysis

    HyperDbg: Reinventing Hardware-Assisted Debugging

    Get PDF
    Software analysis, debugging, and reverse engineering have a crucial impact in today's software industry. Efficient and stealthy debuggers are especially relevant for malware analysis. However, existing debugging platforms fail to address a transparent, effective, and high-performance low-level debugger due to their detectable fingerprints, complexity, and implementation restrictions. In this paper, we present StealthDbg, a new hypervisor-assisted debugger for high-performance and stealthy debugging of user and kernel applications. To accomplish this, StealthDbg relies on state-of-the-art hardware features available in today's CPUs, such as VT-x and extended page tables. In contrast to other widely used existing debuggers, we design StealthDbg using a custom hypervisor, making it independent of OS functionality or API. We propose hardware-based instruction-level emulation and OS-level API hooking via extended page tables to increase the stealthiness. Our results of the dynamic analysis of 10,853 malware samples show that StealthDbg's stealthiness allows debugging on average 22% and 26% more samples than WinDbg and x64dbg, respectively. Moreover, in contrast to existing debuggers, StealthDbg is not detected by any of the 13 tested packers and protectors. We improve the performance over other debuggers by deploying a VMX-compatible script engine, eliminating unnecessary context switches. Our experiment on three concrete debugging scenarios shows that compared to WinDbg as the only kernel debugger, StealthDbg performs step-in, conditional breaks, and syscall recording, 2.98x, 1319x, and 2018x faster, respectively. We finally show real-world applications, such as a 0-day analysis, structure reconstruction for reverse engineering, software performance analysis, and code-coverage analysis

    Sequences Type Analysis of Candida Albicans Isolates from Iranian Human Immunodeficiency Virus Infected Patients with Oral Candidiasis

    No full text
    The growing number of immunocompromised individuals has increased the incidence of infections caused by Candida species during the recent decades. Typing of C. albicans on the basis of DNA sequences at multiple loci has greatly advanced our knowledge about the epidemiology and phylogeny of candidiasis. The aim of this study was to evaluate the diversity, and genetic relationships among C. albicans isolates obtained from HIV patients in Iran. using multilocus sequence typing (MLST) method. We analyzed 25 C. albicans isolates obtained from HIV positive patients referred to Iranian Research Center for HIV/AIDS. After diagnostic test and DNA extraction C. albicans isolates were typed using the original MLST scheme explained previously include of six loci: ACC1, VPS13, GLN4, ADP1, RPN2, and SYA1. Fifty one (2.17%) nucleotide sites were found to be polymorphic; all were found to be heterozygous in at least one isolate. For the 25 clinical isolates, 22 diploid sequence types were defined by the genotypes identified from the six loci. The MLST data suggest a relatively high level of divergence in the population structure of C. albicans isolated from HIV infected patients. These findings indicate that in these patients there is a favorable context for the growth of potential pathogenic C. albicans. We found no association between fluconazole resistance, highly active antiretroviral therapy (HAART) receiving and either sequence type or group
    corecore