266 research outputs found

    Influence of Nanoparticle Shape Factor on Convective Heat Transfer of Water-Based ZnO Nanofluids. Performance Evaluation Criterion

    Get PDF
    The convective heat transfer of ZnO/water colloidal suspensions is investigated experimentally to appreciate the influence of two shapes of nanoparticles. Pressure drop and heat transfer coefficients have been measured at two different inlet temperatures (20, 50°C) in heating and/or cooling conditions at various flow rates (200 \u3c Re \u3c 15,000). The Reynolds and Nusselt numbers have been determined by using thermal conductivity and viscosity measured in the same conditions as those in tests. The results obtained are compared with classical correlations. An energetic Performance Evaluation Criterion (PEC) has been defined to compare heat transfer rate to pumping power

    CacheZoom: How SGX Amplifies The Power of Cache Attacks

    Get PDF
    In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are malicious. However, SGX disregards side-channel attacks. We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. Our attack tool named CacheZoom is able to virtually track all memory accesses of SGX enclaves with high spatial and temporal precision. As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios. Our results show that SGX cannot protect critical data sensitive computations, and efficient AES key recovery is possible in a practical environment. In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements. We can successfully recover AES keys from T-Table based implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17

    The catalytically inactive tyrosine phosphatase HD-PTP/PTPN23 is a novel regulator of SMN complex localization

    Get PDF
    The survival motor neuron (SMN) complex fulfils essential functions in the assembly of snRNPs, which are key components in the splicing of pre-mRNAs. Little is known about the regulation of SMN complex activity by posttranslational modification despite its complicated phosphorylation pattern. Several phosphatases had been implicated in the regulation of SMN, including the nuclear phosphatases PPM1G and PP1γ. Here we systematically screened all human phosphatase gene products for a regulatory role in the SMN complex. We used the accumulation of SMN in Cajal bodies of intact proliferating cells, which actively assemble snRNPs, as a readout for unperturbed SMN complex function. Knockdown of 29 protein phosphatases interfered with SMN accumulation in Cajal bodies, suggesting impaired SMN complex function, among those the catalytically inactive, non–receptor-type tyrosine phosphatase PTPN23/HD-PTP. Knockdown of PTPN23 also led to changes in the phosphorylation pattern of SMN without affecting the assembly of the SMN complex. We further show interaction between SMN and PTPN23 and document that PTPN23, like SMN, shuttles between nucleus and cytoplasm. Our data provide the first comprehensive screen for SMN complex regulators and establish a novel regulatory function of PTPN23 in maintaining a highly phosphorylated state of SMN, which is important for its proper function in snRNP assembly

    Black Holes in Ho\v{r}ava Gravity with Higher Derivative Magnetic Terms

    Full text link
    We consider Horava gravity coupled to Maxwell and higher derivative magnetic terms. We construct static spherically symmetric black hole solutions in the low-energy approximation. We calculate the horizon locations and temperatures in the near-extremal limit, for asymptotically flat and (anti-)de Sitter spaces. We also construct a detailed balanced version of the theory, for which we find projectable and non-projectable, non-perturbative solutions.Comment: 17 pages. v2: Up to date with published version; some minor remarks and more reference

    Drive-by Key-Extraction Cache Attacks from Portable Code

    Get PDF
    We show how malicious web content can extract cryptographic secret keys from the user\u27s computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache resources, and thereby gleans information about the memory accesses of other programs running on the user\u27s computer. We show how this side-channel attack can be realized in both WebAssembly and PNaCl; how to attain very fine-grained measurements; and how to use these to extract ElGamal, ECDH and RSA decryption keys from various cryptographic libraries. The attack does not rely on bugs in the browser\u27s nominal sandboxing mechanisms, or on fooling users. It applies even to locked-down platforms with strong confinement mechanisms and browser-only functionality, such as Chromebook devices. Moreover, on browser-based platforms the attacked software too may be written in portable JavaScript; and we show that in this case even implementations of supposedly-secure constant-time algorithms, such as Curve25519\u27s, are vulnerable to our attack

    MicroWalk: A Framework for Finding Side Channels in Binaries

    Full text link
    Microarchitectural side channels expose unprotected software to information leakage attacks where a software adversary is able to track runtime behavior of a benign process and steal secrets such as cryptographic keys. As suggested by incremental software patches for the RSA algorithm against variants of side-channel attacks within different versions of cryptographic libraries, protecting security-critical algorithms against side channels is an intricate task. Software protections avoid leakages by operating in constant time with a uniform resource usage pattern independent of the processed secret. In this respect, automated testing and verification of software binaries for leakage-free behavior is of importance, particularly when the source code is not available. In this work, we propose a novel technique based on Dynamic Binary Instrumentation and Mutual Information Analysis to efficiently locate and quantify memory based and control-flow based microarchitectural leakages. We develop a software framework named \tool~for side-channel analysis of binaries which can be extended to support new classes of leakage. For the first time, by utilizing \tool, we perform rigorous leakage analysis of two widely-used closed-source cryptographic libraries: \emph{Intel IPP} and \emph{Microsoft CNG}. We analyze 1515 different cryptographic implementations consisting of 112112 million instructions in about 105105 minutes of CPU time. By locating previously unknown leakages in hardened implementations, our results suggest that \tool~can efficiently find microarchitectural leakages in software binaries

    Organisation of nucleosomal arrays reconstituted with repetitive African green monkey α-satellite DNA as analysed by atomic force microscopy

    Get PDF
    Alpha-satellite DNA (AS) is part of centromeric DNA and could be relevant for centromeric chromatin structure: its repetitive character may generate a specifically ordered nucleosomal arrangement and thereby facilitate kinetochore protein binding and chromatin condensation. Although nucleosomal positioning on some satellite sequences had been shown, including AS from African green monkey (AGM), the sequence-dependent nucleosomal organisation of repetitive AS of this species has so far not been analysed. We therefore studied the positioning of reconstituted nucleosomes on AGM AS tandemly repeated DNA. Enzymatic analysis of nucleosome arrays formed on an AS heptamer as well as the localisation of mononucleosomes on an AS dimer by atomic force microscopy (AFM) showed one major positioning frame, in agreement with earlier results. The occupancy of this site was in the range of 45–50%, in quite good agreement with published in vivo observations. AFM measurements of internucleosomal distances formed on the heptamer indicated that the nucleosomal arrangement is governed by sequence-specific DNA-histone interactions yielding defined internucleosomal distances, which, nevertheless, are not compatible with a uniform phasing of the nucleosomes with the AGM AS repeats
    corecore