1,647 research outputs found

    Runtime protection via dataflow flattening

    Get PDF
    Software running on an open architecture, such as the PC, is vulnerable to inspection and modification. Since software may process valuable or sensitive information, many defenses against data analysis and modification have been proposed. This paper complements existing work and focuses on hiding data location throughout program execution. To achieve this, we combine three techniques: (i) periodic reordering of the heap, (ii) migrating local variables from the stack to the heap and (iii) pointer scrambling. By essentialy flattening the dataflow graph of the program, the techniques serve to complicate static dataflow analysis and dynamic data tracking. Our methodology can be viewed as a data-oriented analogue of control-flow flattening techniques. Dataflow flattening is useful in practical scenarios like DRM, information-flow protection, and exploit resistance. Our prototype implementation compiles C programs into a binary for which every access to the heap is redirected through a memory management unit. Stack-based variables may be migrated to the heap, while pointer accesses and arithmetic may be scrambled and redirected. We evaluate our approach experimentally on the SPEC CPU2006 benchmark suit

    A review on the clinical implementation of respiratory-gated radiation therapy

    Get PDF
    Respiratory-gated treatment techniques have been introduced into the radiation oncology practice to manage target or organ motions. This paper will review the implementation of this type of gated treatment technique where the respiratory cycle is determined using an external marker. The external marker device is placed on the abdominal region between the xyphoid process and the umbilicus of the patient. An infrared camera tracks the motion of the marker to generate a surrogate for the respiratory cycle. The relationship, if any, between the respiratory cycle and the movement of the target can be complex. The four-dimensional computed tomography (4DCT) scanner is used to identify this motion for those patients that meet three requirements for the successful implementation of respiratory-gated treatment technique for radiation therapy. These requirements are (a) the respiratory cycle must be periodic and maintained during treatment, (b) the movement of the target must be related to the respiratory cycle, and (c) the gating window can be set sufficiently large to minimise the overall treatment time or increase the duty cycle and yet small enough to be within the gate. If the respiratory-gated treatment technique is employed, the end-expiration image set is typically used for treatment planning purposes because this image set represents the phase of the respiratory cycle where the anatomical movement is often the least for the longest time. Contouring should account for tumour residual motion, setup uncertainty, and also allow for deviation from the expected respiratory cycle during treatment. Respiratory-gated intensity-modulated radiation therapy (IMRT) treatment plans must also be validated prior to treatment. Quality assurance should be performed to check for positional changes and the output in association with the motion-gated technique. To avoid potential treatment errors, radiation therapist (radiographer) should be regularly in-serviced and made aware of the need to invoke the gating feature when prescribed for selected patients

    CRIMINALIZING PRIMARY COPYRIGHT INFRINGEMENT IN SINGAPORE: WHO ARE THE REAL ONLINE CULPRITS

    Get PDF
    It is axiomatic in the international copyright arena for the law to impose criminal liability on secondary acts of copyright infringement. Such acts of infringement (which may also attract civil liability) typically entail the commercial exploitation of infringing copies of copyright material by unlicensed vendors. Take, for example, the ubiquitous street vendor in Bangkok’s hugely-popular Patpong district who, on a daily basis, hawks pirated CDs and DVDs to throngs of foreign tourists. Although street scenes such as these are fairly commonplace and representative of the livelihoods of numerous other unlicensed vendors the world over, the law clearly frowns upon such practices and, for some time now, has imposed penal sanctions on these secondary infringers of copyright.1 The use of the criminal law under such circumstances to aid in the effective enforcement of intellectual property rights is understandable, because the sale of each unauthorised copy of music, film or software will, correspondingly, deprive the relevant copyright owner of the economic benefits of a legitimate transaction. Yet the fact remains that many of these so-called copyright pirates have continued to operate under the present legal environment simply because of high consumer demand; there is, after all, a sizeable global market for illegitimate products of intellectual property. The irony, of course, is this: that whilst it is a criminal offence to trade in illegitimate copies of copyright material, it is – at least under copyright law – not a crime nor an actionable civil wrong to purchase or acquire such copies for private and domestic use.2 However, in light of the rapid advancements in computer, digital and Internet technologies, consumers and other end-users have begun to take things into their own hands. Instead of purchasing illegitimate copies of copyright material from the street vendor, they now discover that it is far more efficient and cost-effective to acquire digital copies for themselves in the privacy of their own rooms from certain Internet websites or through peer-to-peer (P2P) file-sharing networks. They may further decide to share these digital copies with others in the Internet or P2P file-sharing community. In the process, however, they inadvertently expose themselves to civil action for having committed primary acts of copyright infringement, and, in Singapore at least, they may also face criminal prosecution if primary infringers like themselves are found guilty of wilful infringements of copyright. Against this backdrop, the authors will, in this paper, examine the newly introduced criminal provisions in Singapore’s copyright legislation which target primary acts of copyright infringement and will consider, in particular, the consequences of prosecuting offenders pursuant to these provisions in the context of a number of hypothetical scenarios involving acts of infringement committed on the Internet. These Internet-based scenarios are particularly relevant and timely in the present discussion in light of recent reports in the local media concerning – (1) the various measures taken by the Intellectual Property Office of Singapore (and other local agencies) to encourage all companies and businesses to use legal or licensed software in the conduct of their day-to-day business; as well as (2) the recent arrest and prosecution of two individuals in Singapore for allegedly distributing unauthorised music files via an Internet chat program.3 This paper therefore aims to offer an academic perspective of the various types of online activity which, in the authors’ view, will likely attract criminal liability under the new provisions (as well as those which ought not to)

    Functional genomics to identify the factors contributing to successful persistence and global spread of an antibiotic resistance plasmid

    Get PDF
    Background: The spread of bacterial plasmids is an increasing global problem contributing to the widespread dissemination of antibiotic resistance genes including β-lactamases. Our understanding of the details of the biological mechanisms by which these natural plasmids are able to persist in bacterial populations and are able to establish themselves in new hosts via conjugative transfer is very poor. We recently identified and sequenced a globally successful plasmid, pCT, conferring β-lactam resistance. Results: Here, we investigated six plasmid encoded factors (tra and pil loci; rci shufflon recombinase, a putative sigma factor, a putative parB partitioning gene and a pndACB toxin-antitoxin system) hypothesised to contribute to the 'evolutionary success' of plasmid pCT. Using a functional genomics approach, the role of these loci was investigated by systematically inactivating each region and examining the impact on plasmid persistence, conjugation and bacterial host biology. While the tra locus was found to be essential for all pCT conjugative transfer, the second conjugation (pil) locus was found to increase conjugation frequencies in liquid media to particular bacterial host recipients (determined in part by the rci shufflon recombinase). Inactivation of the pCT pndACB system and parB did not reduce the stability of this plasmid. Conclusions: Our findings suggest the success of pCT may be due to a combination of factors including plasmid stability within a range of bacterial hosts, a lack of a fitness burden and efficient transfer rates to new bacterial hosts rather than the presence of a particular gene or phenotype transferred to the host. The methodology used in our study could be applied to other 'successful' globally distributed plasmids to discover the role of currently unknown plasmid backbone genes or to investigate other factors which allow these elements to persist and spread

    Measuring the flow properties of small powder samples using an avalanche tester

    Get PDF
    The feasibility of using a small-scale avalanche tester to measure the flow properties of pharmaceutical lactose powders was examined. The modes of behaviour observed in larger systems were displayed and showed a clear distinction between angular, free-flowing particles and more spherical particles of similar flow characteristics. Angular Lactohale LH100 particles showed slumping behaviour at a rotational frequency of 0.33Hz which disappeared at higher frequencies. Spherical lactose powder with a similar flow function to LH100 only showed rolling behaviour under the same conditions, as did more cohesive powders LH200 and LH300. Further investigation of the LH100 data using Fast Fourier analysis showed that the slumping frequency was 1/10th of the rotational frequency
    corecore