11 research outputs found

    SoC It to EM:ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip

    Get PDF
    Increased complexity in modern embedded systems has presented various important challenges with regard to side-channel attacks. In particular, it is common to deploy SoC-based target devices with high clock frequencies in security-critical scenarios; understanding how such features align with techniques more often deployed against simpler devices is vital from both destructive (i.e., attack) and constructive (i.e., evaluation and/or countermeasure) perspectives. In this paper, we investigate electromagnetic-based leakage from three different means of executing cryptographic workloads (including the general purpose ARM core, an on-chip co-processor, and the NEON core) on the AM335x SoC. Our conclusion is that addressing challenges of the type above {\em is} feasible, and that key recovery attacks can be conducted with modest resources

    How low can you go? Using side-channel data to enhance brute-force key recovery

    Get PDF
    Side-channel analysis techniques can be used to construct key recovery attacks by observing a side-channel medium such as the power consumption or electromagnetic radiation of a device while is it performing cryptographic operations. These attack results can be used as auxiliary information in an enhanced brute-force key recovery attack, enabling the adversary to \emph{enumerate} the most likely keys first. We use algorithmic and implementation techniques to implement a time- and memory-efficient key \emph{enumeration} algorithm, and in tandem identify how to optimise throughput when bulk-verifying quantities of candidate AES-128 keys. We then explore how to best distribute the workload so that it can be deployed across a significant number of CPU cores and executed in parallel, giving an adversary the capability to enumerate a very large number of candidate keys. We introduce the tool \textsc{labynkyr}, developed in C++11, that can be deployed across any number of CPUs and workstations to enumerate keys in parallel. We conclude by demonstrating the effectiveness of our tool by successfully enumerating 2482^{48} AES-128 keys in approximately 30 hours using a modest number of CPU cores, at an expected cost of only 700 USD using a popular cloud provider

    Robust estimation of bacterial cell count from optical density

    Get PDF
    Optical density (OD) is widely used to estimate the density of cells in liquid culture, but cannot be compared between instruments without a standardized calibration protocol and is challenging to relate to actual cell count. We address this with an interlaboratory study comparing three simple, low-cost, and highly accessible OD calibration protocols across 244 laboratories, applied to eight strains of constitutive GFP-expressing E. coli. Based on our results, we recommend calibrating OD to estimated cell count using serial dilution of silica microspheres, which produces highly precise calibration (95.5% of residuals <1.2-fold), is easily assessed for quality control, also assesses instrument effective linear range, and can be combined with fluorescence calibration to obtain units of Molecules of Equivalent Fluorescein (MEFL) per cell, allowing direct comparison and data fusion with flow cytometry measurements: in our study, fluorescence per cell measurements showed only a 1.07-fold mean difference between plate reader and flow cytometry data

    GMOPST14

    No full text
    Data sets in relation to the publication GMOPST14 at Asiacrypt 201

    Genetic and multi‐omic risk assessment of Alzheimer's disease implicates core associated biological domains

    Get PDF
    Abstract INTRODUCTION Alzheimer's disease (AD) is the predominant dementia globally, with heterogeneous presentation and penetrance of clinical symptoms, variable presence of mixed pathologies, potential disease subtypes, and numerous associated endophenotypes. Beyond the difficulty of designing treatments that address the core pathological characteristics of the disease, therapeutic development is challenged by the uncertainty of which endophenotypic areas and specific targets implicated by those endophenotypes to prioritize for further translational research. However, publicly funded consortia driving large‐scale open science efforts have produced multiple omic analyses that address both disease risk relevance and biological process involvement of genes across the genome. METHODS Here we report the development of an informatic pipeline that draws from genetic association studies, predicted variant impact, and linkage with dementia associated phenotypes to create a genetic risk score. This is paired with a multi‐omic risk score utilizing extensive sets of both transcriptomic and proteomic studies to identify system‐level changes in expression associated with AD. These two elements combined constitute our target risk score that ranks AD risk genome‐wide. The ranked genes are organized into endophenotypic space through the development of 19 biological domains associated with AD in the described genetics and genomics studies and accompanying literature. The biological domains are constructed from exhaustive Gene Ontology (GO) term compilations, allowing automated assignment of genes into objectively defined disease‐associated biology. This rank‐and‐organize approach, performed genome‐wide, allows the characterization of aggregations of AD risk across biological domains. RESULTS The top AD‐risk‐associated biological domains are Synapse, Immune Response, Lipid Metabolism, Mitochondrial Metabolism, Structural Stabilization, and Proteostasis, with slightly lower levels of risk enrichment present within the other 13 biological domains. DISCUSSION This provides an objective methodology to localize risk within specific biological endophenotypes and drill down into the most significantly associated sets of GO terms and annotated genes for potential therapeutic targets

    Measurement of the Ωc0\Omega_c^0 lifetime at Belle II

    No full text
    We report on a measurement of the Ωc0\Omega_c^0 lifetime using Ωc0→Ω−π+\Omega_c^0 \to \Omega^-\pi^+ decays reconstructed in e+e−→ccˉe^+e^-\to c\bar{c} data collected by the Belle II experiment and corresponding to 207 fb−1207~{\rm fb^{-1}} of integrated luminosity. The result, τ(Ωc0)=243±48(stat)±11(syst) fs\rm\tau(\Omega_c^0)=243\pm48( stat)\pm11(syst)~fs, agrees with recent measurements indicating that the Ωc0\Omega_c^0 is not the shortest-lived weakly decaying charmed baryon

    Measurement of the Ωc0\Omega_c^0 lifetime at Belle II

    No full text
    We report on a measurement of the Ωc0\Omega_c^0 lifetime using Ωc0→Ω−π+\Omega_c^0 \to \Omega^-\pi^+ decays reconstructed in e+e−→ccˉe^+e^-\to c\bar{c} data collected by the Belle II experiment and corresponding to 207 fb−1207~{\rm fb^{-1}} of integrated luminosity. The result, τ(Ωc0)=243±48(stat)±11(syst) fs\rm\tau(\Omega_c^0)=243\pm48( stat)\pm11(syst)~fs, agrees with recent measurements indicating that the Ωc0\Omega_c^0 is not the shortest-lived weakly decaying charmed baryon

    Measurement of the Ωc0\Omega_c^0 lifetime at Belle II

    No full text
    We report on a measurement of the Ωc0\Omega_c^0 lifetime using Ωc0→Ω−π+\Omega_c^0 \to \Omega^-\pi^+ decays reconstructed in e+e−→ccˉe^+e^-\to c\bar{c} data collected by the Belle II experiment and corresponding to 207 fb−1207~{\rm fb^{-1}} of integrated luminosity. The result, τ(Ωc0)=243±48(stat)±11(syst) fs\rm\tau(\Omega_c^0)=243\pm48( stat)\pm11(syst)~fs, agrees with recent measurements indicating that the Ωc0\Omega_c^0 is not the shortest-lived weakly decaying charmed baryon
    corecore