11 research outputs found
SoC It to EM:ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip
Increased complexity in modern embedded systems has presented various important challenges with regard to side-channel attacks. In particular, it is common to deploy SoC-based target devices with high clock frequencies in security-critical scenarios; understanding how such features align with techniques more often deployed against simpler devices is vital from both destructive (i.e., attack) and constructive (i.e., evaluation and/or countermeasure) perspectives. In this paper, we investigate electromagnetic-based leakage from three different means of executing cryptographic workloads (including the general purpose ARM core, an on-chip co-processor, and the NEON core) on the AM335x SoC. Our conclusion is that addressing challenges of the type above {\em is} feasible, and that key recovery attacks can be conducted with modest resources
How low can you go? Using side-channel data to enhance brute-force key recovery
Side-channel analysis techniques can be used to construct key recovery attacks by observing a side-channel medium such as the power consumption or electromagnetic radiation of a device while is it performing cryptographic operations. These attack results can be used as auxiliary information in an enhanced brute-force key recovery attack, enabling the adversary to \emph{enumerate} the most likely keys first.
We use algorithmic and implementation techniques to implement a time- and memory-efficient key \emph{enumeration} algorithm, and in tandem identify how to optimise throughput when bulk-verifying quantities of candidate AES-128 keys. We then explore how to best distribute the workload so that it can be deployed across a significant number of CPU cores and executed in parallel, giving an adversary the capability to enumerate a very large number of candidate keys.
We introduce the tool \textsc{labynkyr}, developed in C++11, that can be deployed across any number of CPUs and workstations to enumerate keys in parallel. We conclude by demonstrating the effectiveness of our tool by successfully enumerating AES-128 keys in approximately 30 hours using a modest number of CPU cores, at an expected cost of only 700 USD using a popular cloud provider
Robust estimation of bacterial cell count from optical density
Optical density (OD) is widely used to estimate the density of cells in liquid culture, but cannot be compared between instruments without a standardized calibration protocol and is challenging to relate to actual cell count. We address this with an interlaboratory study comparing three simple, low-cost, and highly accessible OD calibration protocols across 244 laboratories, applied to eight strains of constitutive GFP-expressing E. coli. Based on our results, we recommend calibrating OD to estimated cell count using serial dilution of silica microspheres, which produces highly precise calibration (95.5% of residuals <1.2-fold), is easily assessed for quality control, also assesses instrument effective linear range, and can be combined with fluorescence calibration to obtain units of Molecules of Equivalent Fluorescein (MEFL) per cell, allowing direct comparison and data fusion with flow cytometry measurements: in our study, fluorescence per cell measurements showed only a 1.07-fold mean difference between plate reader and flow cytometry data
Genetic and multiâomic risk assessment of Alzheimer's disease implicates core associated biological domains
Abstract INTRODUCTION Alzheimer's disease (AD) is the predominant dementia globally, with heterogeneous presentation and penetrance of clinical symptoms, variable presence of mixed pathologies, potential disease subtypes, and numerous associated endophenotypes. Beyond the difficulty of designing treatments that address the core pathological characteristics of the disease, therapeutic development is challenged by the uncertainty of which endophenotypic areas and specific targets implicated by those endophenotypes to prioritize for further translational research. However, publicly funded consortia driving largeâscale open science efforts have produced multiple omic analyses that address both disease risk relevance and biological process involvement of genes across the genome. METHODS Here we report the development of an informatic pipeline that draws from genetic association studies, predicted variant impact, and linkage with dementia associated phenotypes to create a genetic risk score. This is paired with a multiâomic risk score utilizing extensive sets of both transcriptomic and proteomic studies to identify systemâlevel changes in expression associated with AD. These two elements combined constitute our target risk score that ranks AD risk genomeâwide. The ranked genes are organized into endophenotypic space through the development of 19 biological domains associated with AD in the described genetics and genomics studies and accompanying literature. The biological domains are constructed from exhaustive Gene Ontology (GO) term compilations, allowing automated assignment of genes into objectively defined diseaseâassociated biology. This rankâandâorganize approach, performed genomeâwide, allows the characterization of aggregations of AD risk across biological domains. RESULTS The top ADâriskâassociated biological domains are Synapse, Immune Response, Lipid Metabolism, Mitochondrial Metabolism, Structural Stabilization, and Proteostasis, with slightly lower levels of risk enrichment present within the other 13 biological domains. DISCUSSION This provides an objective methodology to localize risk within specific biological endophenotypes and drill down into the most significantly associated sets of GO terms and annotated genes for potential therapeutic targets
Measurement of the lifetime at Belle II
We report on a measurement of the lifetime using decays reconstructed in data collected by the Belle II experiment and corresponding to of integrated luminosity. The result, , agrees with recent measurements indicating that the is not the shortest-lived weakly decaying charmed baryon
Measurement of the lifetime at Belle II
We report on a measurement of the lifetime using decays reconstructed in data collected by the Belle II experiment and corresponding to of integrated luminosity. The result, , agrees with recent measurements indicating that the is not the shortest-lived weakly decaying charmed baryon
Measurement of the lifetime at Belle II
We report on a measurement of the lifetime using decays reconstructed in data collected by the Belle II experiment and corresponding to of integrated luminosity. The result, , agrees with recent measurements indicating that the is not the shortest-lived weakly decaying charmed baryon