902 research outputs found

    Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)

    Full text link
    Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest agents to continue to use it until a corrected version is released. Our approach is based on the knowledge of the network topology, which we model as a graph, and on the consequent possibility of creating an interference to an ongoing attack of a Dolev-Yao attacker, by means of non-collaboration actuated by ad-hoc benign attackers that play the role of network guardians. Such guardians, positioned in strategical points of the network, have the task of monitoring the messages in transit and discovering at runtime, through particular types of inference, whether an attack is ongoing, interrupting the run of the protocol in the positive case. We study not only how but also where we can attempt to defend flawed security protocols: we investigate the different network topologies that make security protocol defense feasible and illustrate our approach by means of concrete examples.Comment: 29 page

    Optimistic Non-repudiation Protocol Analysis

    Get PDF
    The original publication is available at www.springerlink.com ; ISBN 978-3-540-72353-0 (Pring) 0302-9743 (Online) 1611-3349International audienceNon-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol

    Co-evolution of male and female reproductive traits across the Bruchidae (Coleoptera)

    Get PDF
    1. Despite the obvious importance of spermatozoa to individual reproductive success a general explanation of variation in spermatozoan form and function is still lacking. In species with internal fertilization, sperm not only have to interact with the physical and biochemical environment of the female reproductive tract, but frequently face competition from the sperm of rival males. Both sperm competition theory and adaptation to the selective environment of the female reproductive tract have been implicated in the evolution of spermatozoan morphological diversity. 2. Using the comparative method, we examine variation in sperm length in relation to (i) sperm competition intensity (as measured by relative testis size) and (ii) female reproductive characters, across 15 species of beetle belonging to the family Bruchidae. 3. Stepwise multiple regression within a phylogenetic framework revealed sperm length to be positively correlated with female spermathecal duct length and negatively related to spermathecal volume, but not testes size, indicating that the female reproductive environment rather than sperm competition per se exerts selection on sperm length in this taxonomic group. 4. A positive association between testes volume and the volume of the female spermatheca was also evident suggesting correlated evolution of these traits. 5. A number of models of sexual selection could lead to the correlated evolution of male and female reproductive characters, although the underlying mechanisms of cause and effect remain elusive. Divergence between species (and populations) in primary reproductive traits is likely to present a significant barrier to hetero-specific fertilization, and thus contribute to reproductive isolation

    Automatic Methods for Analyzing Non-repudiation Protocole with an Active Intruder

    Get PDF
    International audienceNon-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. After discussing the limitations of this method, we define a new one based on the handling of the knowledge of protocol participants. This second method is general and of natural use, as it consists in adding simple annotations in the protocol specification. It is very easy to implement in tools able to handle participants knowledge. We have implemented it in the AVISPA Tool and analyzed the optimistic Cederquist-Corin-Dashti protocol, discovering two attacks. This extension of the AVISPA Tool for handling non-repudiation opens a highway to the specification of many other properties, without any more change in the tool itself

    Clinical outcomes of patients undergoing percutaneous left atrial appendage occlusion in general anaesthesia or conscious sedation: data from the prospective global Amplatzer Amulet Occluder Observational Study

    Get PDF
    Objective To evaluate the safety and efficacy of percutaneous left atrial appendage occlusion (LAAO) using conscious sedation (CS).Background Several percutaneous structural heart disease interventions are safely and efficiently performed using CS instead of general anaesthesia (GA). This concept has not been evaluated in a large multicenter cohort of patients undergoing LAAO.Methods Patients from the prospective, global Amplatzer Amulet Occluder Observational Study were divided into two groups (GA vs CS). Baseline information, periprocedural and postprocedural efficacy and complications, as well as outcomes through 7 days post implant were compared.Results Patients undergoing transesophageal-guided implants were categorised by GA (n=607, 64%) or CS (n=342, 36%) usage. Mean age was 75 years in both groups. LAAO technical success was achieved in 99% of both groups. The procedure duration (GA: 35 +/- 22 min vs CS: 27 +/- 19 min, pConclusions In a large global study, LAAO with the Amplatzer Amulet occluder is safe and feasible using CS. Procedure duration and total amount of contrast were less with CS than GA cases.</p

    Effect of potassium salts in rats adapted to an acidogenic high-sulfur amino acid diet

    Get PDF
    Low-grade metabolic acidosis, consecutive to excessive catabolism of sulfur amino acids and a high dietary Na:K ratio, is a common feature of Western food habits. This metabolic alteration may exert various adverse physiological effects, especially on bone, muscle and kidneys. To assess the actual effects of various K salts, a model of the Westernised diet has been developed in rats: slight protein excess (20 % casein); cations provided as non-alkalinising salts; high Na:K ratio. This diet resulted in acidic urine (pH 5·5) together with a high rate of divalent cation excretion in urine, especially Mg. Compared with controls, K supplementation as KCl accentuated Ca excretion, whereas potassium bicarbonate or malate reduced Mg and Ca excretion and alkalinised urine pH (up to 8). In parallel, citraturia was strongly increased, together with 2-ketoglutarate excretion, by potassium bicarbonate or malate in the diet. Basal sulfate excretion, in the range of 1 mmol/d, was slightly enhanced in rats fed the potassium malate diet. The present model of low-grade metabolic acidosis indicates that potassium malate may be as effective as KHCO3 to counteract urine acidification, to limit divalent cation excretion and to ensure high citrate concentration in urine

    Jet energy measurement with the ATLAS detector in proton-proton collisions at root s=7 TeV

    Get PDF
    The jet energy scale and its systematic uncertainty are determined for jets measured with the ATLAS detector at the LHC in proton-proton collision data at a centre-of-mass energy of √s = 7TeV corresponding to an integrated luminosity of 38 pb-1. Jets are reconstructed with the anti-kt algorithm with distance parameters R=0. 4 or R=0. 6. Jet energy and angle corrections are determined from Monte Carlo simulations to calibrate jets with transverse momenta pT≥20 GeV and pseudorapidities {pipe}η{pipe}<4. 5. The jet energy systematic uncertainty is estimated using the single isolated hadron response measured in situ and in test-beams, exploiting the transverse momentum balance between central and forward jets in events with dijet topologies and studying systematic variations in Monte Carlo simulations. The jet energy uncertainty is less than 2. 5 % in the central calorimeter region ({pipe}η{pipe}<0. 8) for jets with 60≤pT<800 GeV, and is maximally 14 % for pT<30 GeV in the most forward region 3. 2≤{pipe}η{pipe}<4. 5. The jet energy is validated for jet transverse momenta up to 1 TeV to the level of a few percent using several in situ techniques by comparing a well-known reference such as the recoiling photon pT, the sum of the transverse momenta of tracks associated to the jet, or a system of low-pT jets recoiling against a high-pT jet. More sophisticated jet calibration schemes are presented based on calorimeter cell energy density weighting or hadronic properties of jets, aiming for an improved jet energy resolution and a reduced flavour dependence of the jet response. The systematic uncertainty of the jet energy determined from a combination of in situ techniques is consistent with the one derived from single hadron response measurements over a wide kinematic range. The nominal corrections and uncertainties are derived for isolated jets in an inclusive sample of high-pT jets. Special cases such as event topologies with close-by jets, or selections of samples with an enhanced content of jets originating from light quarks, heavy quarks or gluons are also discussed and the corresponding uncertainties are determined. © 2013 CERN for the benefit of the ATLAS collaboration
    • …
    corecore