34 research outputs found
Deduction with XOR Constraints in Security API Modelling
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols
Whole-genome sequencing reveals host factors underlying critical COVID-19
Critical COVID-19 is caused by immune-mediated inflammatory lung injury. Host genetic variation influences the development of illness requiring critical care1 or hospitalization2,3,4 after infection with SARS-CoV-2. The GenOMICC (Genetics of Mortality in Critical Care) study enables the comparison of genomes from individuals who are critically ill with those of population controls to find underlying disease mechanisms. Here we use whole-genome sequencing in 7,491 critically ill individuals compared with 48,400 controls to discover and replicate 23 independent variants that significantly predispose to critical COVID-19. We identify 16 new independent associations, including variants within genes that are involved in interferon signalling (IL10RB and PLSCR1), leucocyte differentiation (BCL11A) and blood-type antigen secretor status (FUT2). Using transcriptome-wide association and colocalization to infer the effect of gene expression on disease severity, we find evidence that implicates multiple genesâincluding reduced expression of a membrane flippase (ATP11A), and increased expression of a mucin (MUC1)âin critical disease. Mendelian randomization provides evidence in support of causal roles for myeloid cell adhesion molecules (SELE, ICAM5 and CD209) and the coagulation factor F8, all of which are potentially druggable targets. Our results are broadly consistent with a multi-component model of COVID-19 pathophysiology, in which at least two distinct mechanisms can predispose to life-threatening disease: failure to control viral replication; or an enhanced tendency towards pulmonary inflammation and intravascular coagulation. We show that comparison between cases of critical illness and population controls is highly efficient for the detection of therapeutically relevant mechanisms of disease
Survivability Measure
nfigurations Services s s s s s 1 1 Figure 1: Service Hierarchy Services were given a survivability ordering: one service is no more survivable than another if every service set that supports the rst, also supports the second. 1.1 A Hierarchical View The earlier view of a system was at. A component was thought of as atomic, and dierent from a service. Taking a deeper view, now, we look at components through a microscope, and we see that a component is (sometimes) a lower-level service with its own components and congurations. A workstation has a keyboard and a display and a CPU, and the CPU depends on software as well as hardware, such as a mail application and an operating system. The hardware is also built on cards, the cards on chips and other components, etc. This hierarchical view is suggested in Figure 1, which illustrates how the service-conguration-component architecture is repeated at lower levels
CAPSL and MuCAPSL
Secure communication generally begins with a connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication or key distribution cryptographic protocol. CAPSL is a formal language for specifying cryptographic protocols. It is also useful for addressing the correctness of the protocols on an abstract level, rather than the strength of the underlying cryptographic algorithms. We outline the design principles of CAPSL and its integrated specification and analysis environment. Protocols for secure group management are essential in applications that are concerned with confidential authenticated communication among coalition members, authenticated group decisions, or the secure administration of group membership and access control. We will also discuss our progress on designing a new extension of CAPSL for multicast protocols, called MuCAPSL
Bounding Messages for Free in Security Protocols
International audienceno abstrac
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions
Colloque avec actes et comité de lecture. internationale.International audienceWe propose a protocol model which integrates two different ways of analyzing cryptographic protocols: i) analysis w.r.t. an unbounded number of sessions and bounded message size, and ii) analysis w.r.t. an a priori bounded number of sessions but with messages of unbounded size. We show that in this model secrecy is DEXPTIME-complete. This result is obtained by extending the Dolev-Yao intruder to simulate unbounded number of sessions