266 research outputs found
Influence of Nanoparticle Shape Factor on Convective Heat Transfer of Water-Based ZnO Nanofluids. Performance Evaluation Criterion
The convective heat transfer of ZnO/water colloidal suspensions is investigated experimentally to appreciate the influence of two shapes of nanoparticles. Pressure drop and heat transfer coefficients have been measured at two different inlet temperatures (20, 50°C) in heating and/or cooling conditions at various flow rates (200 \u3c Re \u3c 15,000). The Reynolds and Nusselt numbers have been determined by using thermal conductivity and viscosity measured in the same conditions as those in tests. The results obtained are compared with classical correlations. An energetic Performance Evaluation Criterion (PEC) has been defined to compare heat transfer rate to pumping power
CacheZoom: How SGX Amplifies The Power of Cache Attacks
In modern computing environments, hardware resources are commonly shared, and
parallel computation is widely used. Parallel tasks can cause privacy and
security problems if proper isolation is not enforced. Intel proposed SGX to
create a trusted execution environment within the processor. SGX relies on the
hardware, and claims runtime protection even if the OS and other software
components are malicious. However, SGX disregards side-channel attacks. We
introduce a powerful cache side-channel attack that provides system adversaries
a high resolution channel. Our attack tool named CacheZoom is able to virtually
track all memory accesses of SGX enclaves with high spatial and temporal
precision. As proof of concept, we demonstrate AES key recovery attacks on
commonly used implementations including those that were believed to be
resistant in previous scenarios. Our results show that SGX cannot protect
critical data sensitive computations, and efficient AES key recovery is
possible in a practical environment. In contrast to previous works which
require hundreds of measurements, this is the first cache side-channel attack
on a real system that can recover AES keys with a minimal number of
measurements. We can successfully recover AES keys from T-Table based
implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems
(CHES '17
The catalytically inactive tyrosine phosphatase HD-PTP/PTPN23 is a novel regulator of SMN complex localization
The survival motor neuron (SMN) complex fulfils essential functions in the assembly of snRNPs, which are key components in the splicing of pre-mRNAs. Little is known about the regulation of SMN complex activity by posttranslational modification despite its complicated phosphorylation pattern. Several phosphatases had been implicated in the regulation of SMN, including the nuclear phosphatases PPM1G and PP1γ. Here we systematically screened all human phosphatase gene products for a regulatory role in the SMN complex. We used the accumulation of SMN in Cajal bodies of intact proliferating cells, which actively assemble snRNPs, as a readout for unperturbed SMN complex function. Knockdown of 29 protein phosphatases interfered with SMN accumulation in Cajal bodies, suggesting impaired SMN complex function, among those the catalytically inactive, non–receptor-type tyrosine phosphatase PTPN23/HD-PTP. Knockdown of PTPN23 also led to changes in the phosphorylation pattern of SMN without affecting the assembly of the SMN complex. We further show interaction between SMN and PTPN23 and document that PTPN23, like SMN, shuttles between nucleus and cytoplasm. Our data provide the first comprehensive screen for SMN complex regulators and establish a novel regulatory function of PTPN23 in maintaining a highly phosphorylated state of SMN, which is important for its proper function in snRNP assembly
Black Holes in Ho\v{r}ava Gravity with Higher Derivative Magnetic Terms
We consider Horava gravity coupled to Maxwell and higher derivative magnetic
terms. We construct static spherically symmetric black hole solutions in the
low-energy approximation. We calculate the horizon locations and temperatures
in the near-extremal limit, for asymptotically flat and (anti-)de Sitter
spaces. We also construct a detailed balanced version of the theory, for which
we find projectable and non-projectable, non-perturbative solutions.Comment: 17 pages. v2: Up to date with published version; some minor remarks
and more reference
Drive-by Key-Extraction Cache Attacks from Portable Code
We show how malicious web content can extract cryptographic secret keys from the user\u27s computer.
The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache resources, and thereby gleans information about the memory accesses of other programs running on the user\u27s computer. We show how this side-channel attack can be realized in both WebAssembly and PNaCl; how to attain very fine-grained measurements; and how to use these to extract ElGamal, ECDH and RSA decryption keys from various cryptographic libraries.
The attack does not rely on bugs in the browser\u27s nominal sandboxing mechanisms, or on fooling users. It applies even to locked-down platforms with strong confinement mechanisms and browser-only functionality, such as Chromebook devices.
Moreover, on browser-based platforms the attacked software too may be written in portable JavaScript; and we show that in this case even implementations of supposedly-secure constant-time algorithms, such as Curve25519\u27s, are vulnerable to our attack
MicroWalk: A Framework for Finding Side Channels in Binaries
Microarchitectural side channels expose unprotected software to information
leakage attacks where a software adversary is able to track runtime behavior of
a benign process and steal secrets such as cryptographic keys. As suggested by
incremental software patches for the RSA algorithm against variants of
side-channel attacks within different versions of cryptographic libraries,
protecting security-critical algorithms against side channels is an intricate
task. Software protections avoid leakages by operating in constant time with a
uniform resource usage pattern independent of the processed secret. In this
respect, automated testing and verification of software binaries for
leakage-free behavior is of importance, particularly when the source code is
not available. In this work, we propose a novel technique based on Dynamic
Binary Instrumentation and Mutual Information Analysis to efficiently locate
and quantify memory based and control-flow based microarchitectural leakages.
We develop a software framework named \tool~for side-channel analysis of
binaries which can be extended to support new classes of leakage. For the first
time, by utilizing \tool, we perform rigorous leakage analysis of two
widely-used closed-source cryptographic libraries: \emph{Intel IPP} and
\emph{Microsoft CNG}. We analyze different cryptographic implementations
consisting of million instructions in about minutes of CPU time. By
locating previously unknown leakages in hardened implementations, our results
suggest that \tool~can efficiently find microarchitectural leakages in software
binaries
Organisation of nucleosomal arrays reconstituted with repetitive African green monkey α-satellite DNA as analysed by atomic force microscopy
Alpha-satellite DNA (AS) is part of centromeric DNA and could be relevant for centromeric chromatin structure: its repetitive character may generate a specifically ordered nucleosomal arrangement and thereby facilitate kinetochore protein binding and chromatin condensation. Although nucleosomal positioning on some satellite sequences had been shown, including AS from African green monkey (AGM), the sequence-dependent nucleosomal organisation of repetitive AS of this species has so far not been analysed. We therefore studied the positioning of reconstituted nucleosomes on AGM AS tandemly repeated DNA. Enzymatic analysis of nucleosome arrays formed on an AS heptamer as well as the localisation of mononucleosomes on an AS dimer by atomic force microscopy (AFM) showed one major positioning frame, in agreement with earlier results. The occupancy of this site was in the range of 45–50%, in quite good agreement with published in vivo observations. AFM measurements of internucleosomal distances formed on the heptamer indicated that the nucleosomal arrangement is governed by sequence-specific DNA-histone interactions yielding defined internucleosomal distances, which, nevertheless, are not compatible with a uniform phasing of the nucleosomes with the AGM AS repeats
Patterns and Mechanisms of Ancestral Histone Protein Inheritance in Budding Yeast
Tracking of ancestral histone proteins over multiple generations of genome
replication in yeast reveals that old histones move along genes from 3′
toward 5′ over time, and that maternal histones move up to around 400 bp
during genomic replication
- …