35 research outputs found

    A New Enforcement on Declassification with Reachability Analysis

    Full text link
    Language-based information flow security aims to decide whether an action-observable program can unintentionally leak confidential information if it has the authority to access confidential data. Recent concerns about declassification polices have provided many choices for practical intended information release, but more precise enforcement mechanism for these policies is insufficiently studied. In this paper, we propose a security property on the where-dimension of declassification and present an enforcement based on automated verification. The approach automatically transforms the abstract model with a variant of self-composition, and checks the reachability of illegal-flow state of the model after transformation. The self-composition is equipped with a store-match pattern to reduce the state space and to model the equivalence of declassified expressions in the premise of property. The evaluation shows that our approach is more precise than type-based enforcement.Comment: 7 pages, this is a full version of the work presented on 2011 IEEE INFOCOM Workshop

    Uric acid levels correlate with disease activity in growth hormone-secreting pituitary adenoma patients

    Get PDF
    ObjectiveFew studies reported the effects of growth hormone-secreting pituitary adenoma (GHPA) on uric acid (UA) metabolism and the relationship between growth hormone (GH)/insulin-like growth factor-1 (IGF-1) levels and UA are controversial. This study aimed to evaluate the relationship between IGF-1 and UA in patients with GHPA and to further clarify whether UA levels are associated with GHPA disease activity by follow-up.MethodsA longitudinal study of 424 GHPA patients presenting to Beijing Tiantan Hospital, Capital Medical University between January 2015 and January 2023 was conducted. Spearman’s correlation tests were performed to examine the relationship between IGF-1 and UA at baseline. Univariate and multivariate linear regression analysis was conducted to investigate the independent association between UA and IGF-1. Changes in postoperative IGF-1 and UA levels were followed prospectively, and the differences in UA levels between the biochemical remission and nonremission groups were compared.ResultsAt baseline, male patients, the lower the age, the higher the IGF-1 and body mass index (BMI), and the higher the UA levels. IGF-1 was significantly associated with UA after controlling for sex, age, and BMI (r = 0.122, P = 0.012). In adjusted multiple linear regression analysis, IGF-1 was independently associated with UA, and UA levels increased significantly with increasing IGF-1. During postoperative follow-up, UA decreased gradually as IGF-1 levels decreased. At 12 months postoperatively, UA levels were significantly lower in the biochemical remission group than in the nonremission group (P = 0.038).ConclusionsIn patients with GHPA, UA levels are associated with disease activity. Changes in UA levels should be taken into account in the comprehensive treatment of GHPA, patients presenting with HUA should be given lifestyle guidance and appropriate urate-lowering treatment according to their condition to better improve their prognosis

    Endovascular treatment of acute ischemic stroke with a fully radiopaque retriever: A randomized controlled trial

    Get PDF
    ObjectiveThe Neurohawk retriever is a new fully radiopaque retriever. A randomized controlled non-inferiority trial was conducted to compare the Neurohawk and the Solitaire FR in terms of safety and efficacy. In order to evaluate the efficacy and safety of endovascular treatment in acute ischemic stroke (AIS) caused by intracranial atherosclerotic disease (ICAD) larger vessel occlusion (LVO), a sub-analysis was performed.MethodsAcute ischemic stroke patients aged 18–80 years with LVO in the anterior circulation were randomly assigned to undergo thrombectomy with either the Neurohawk or the Solitaire FR. The primary efficacy endpoint was successful reperfusion (mTICI 2b-3) rate by the allocated retriever. A relevant non-inferiority margin was 12.5%. Safety outcomes were symptomatic intracranial hemorrhage (sICH) and all-cause mortality within 90 days. Secondary endpoints included first-pass effect (FPE), modified FPE, and favorable outcomes at 90 days. In subgroup analysis, the patients were divided into the ICAD group and non-ICAD group according to etiology, and baseline characteristics, angiographic, and clinical outcomes were compared.ResultsA total of 232 patients were involved in this analysis (115 patients in the Neurohawk group and 117 in the Solitaire group). The rates of successful reperfusion with the allocated retriever were 88.70% in the Neurohawk group and 90.60% in the Solitaire group (95%CI of the difference, −9.74% to 5.94%; p = 0.867). There were similar results in FPE and mFPE in both groups. The rate of sICH seemed higher in the Solitaire group (13.16% vs. 7.02%, p = 0.124). All-cause mortality and favorable outcome rates were comparable as well. In subgroup analysis, 58 patients were assigned to the ICAD group and the remaining 174 to the non-ICAD group. The final successful reperfusion and favorable outcome rates showed no statistically significant differences in two groups. Mortality within 90 days was relatively lower in the ICAD group (6.90% vs. 17.24%; p = 0.054).ConclusionThe Neurohawk retriever is non-inferior to the Solitaire FR in the mechanical thrombectomy of large vessel occlusion-acute ischemic stroke (LVO-AIS). The sub-analysis suggested that endovascular treatment including thrombectomy with the retriever and essential rescue angioplasty is effective and safe in AIS patients with intracranial atherosclerotic disease-larger vessel occlusion (ICAD-LVO).Clinical trial registrationhttps://clinicaltrials.gov/ct2/show/NCT04995757, number: NCT04995757

    Design and baseline characteristics of the finerenone in reducing cardiovascular mortality and morbidity in diabetic kidney disease trial

    Get PDF
    Background: Among people with diabetes, those with kidney disease have exceptionally high rates of cardiovascular (CV) morbidity and mortality and progression of their underlying kidney disease. Finerenone is a novel, nonsteroidal, selective mineralocorticoid receptor antagonist that has shown to reduce albuminuria in type 2 diabetes (T2D) patients with chronic kidney disease (CKD) while revealing only a low risk of hyperkalemia. However, the effect of finerenone on CV and renal outcomes has not yet been investigated in long-term trials. Patients and Methods: The Finerenone in Reducing CV Mortality and Morbidity in Diabetic Kidney Disease (FIGARO-DKD) trial aims to assess the efficacy and safety of finerenone compared to placebo at reducing clinically important CV and renal outcomes in T2D patients with CKD. FIGARO-DKD is a randomized, double-blind, placebo-controlled, parallel-group, event-driven trial running in 47 countries with an expected duration of approximately 6 years. FIGARO-DKD randomized 7,437 patients with an estimated glomerular filtration rate >= 25 mL/min/1.73 m(2) and albuminuria (urinary albumin-to-creatinine ratio >= 30 to <= 5,000 mg/g). The study has at least 90% power to detect a 20% reduction in the risk of the primary outcome (overall two-sided significance level alpha = 0.05), the composite of time to first occurrence of CV death, nonfatal myocardial infarction, nonfatal stroke, or hospitalization for heart failure. Conclusions: FIGARO-DKD will determine whether an optimally treated cohort of T2D patients with CKD at high risk of CV and renal events will experience cardiorenal benefits with the addition of finerenone to their treatment regimen. Trial Registration: EudraCT number: 2015-000950-39; ClinicalTrials.gov identifier: NCT02545049

    Secure Information Flow by Model Checking Pushdown System

    No full text
    We propose an approach on model checking information flow for imperative language with procedures. We characterize our model with pushdown system, which has a stack of unbounded length that naturally models the execution of procedural programs. Because the type-based static analysis is sometimes too conservative and rejects safe program as ill-typed, we take a semantic-based approach by self-composing symbolic pushdown system and specifying noninterference with LTL formula. Then we verify this LTL-expressed property via model checker Moped. Except for overcoming the conservative characteristic of type-based approach, our motivation also includes the insufficient state of arts on precise information flow analysis under interprocedural setting. To remedy the inefficiency of model checking compared with type system, we propose both compact form and contracted form of self-composition. According to experimental results, they can greatly increase the efficiency of realistic verification. Our method provides flexibility on separating program abstraction from noninterference verification, thus could be expected to use on different programming languages. ? 2009 IEEE.EI

    Hybrid Overlay Structure Based on Virtual Node

    No full text
    Current peer-to-peer architectures generally can be grouped into three categories: centralized architectures that utilize central directory servers to process queries, decentralized structured architectures that accurately build an underlying topology to support distributed hash table efficiently, and decentralized unstructured architectures that impose no structure on the topology and typically propagate queries to neighbors for searching. Aiming at integrating the flexibility of unstructured architectures with the regularity of structured architectures, we propose a hybrid overlay structure based on virtual node. Especially the hybrid architecture utilizes virtual nodes to build a distributed ring with random links. We can use the distributed ring to perform short jumps, and apply random links to long jumps. With our hybrid design, keyword searching, even multi-keyword searching, can be performed efficiently; both popular and rare keywords can be quickly located. Furthermore, our architecture is robust to the change of system scale, and it can work well with low maintenance cost in the dynamic environment.Computer Science, Hardware &amp; ArchitectureComputer Science, Information SystemsComputer Science, Theory &amp; MethodsEngineering, Electrical &amp; ElectronicTelecommunicationsEICPCI-S(ISTP)

    An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols

    No full text
    Abstract. Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks ’ intended services and resources. Defense against DoS attacks has been built into the cryptography protocols intended for authentication and establishment of communications. However the cryptography protocols have their own vulnerability to DoS. Consequently it is desirable to provide a methodology to evaluate the cryptography protocols ’ resistance to DoS attacks. In this paper, we propose an economical model for the risk evaluation of Denial of Service vulnerabilities in cryptographical protocols. By characterizing the intruder capability with a probability model, our risk evaluation model specifies the Value at Risk (VaR) for the cryptography protocols. The Value at Risk does the very job answering the question that how much computing resources are expected to lose with a given level of confidence. The proposed model can help the common users to have a better knowledge of the protocols they are using, and in the meantime help designers to examine their designs and get clues to improve them. We validate the applicability and effectiveness of our risk evaluation model by applying it to analyze two related protocols.
    corecore