277 research outputs found

    Establishing Dynamic Secure Sessions for ECQV Implicit Certificates in Embedded Systems

    Full text link
    Be it in the IoT or automotive domain, implicit certificates are gaining ever more prominence in constrained embedded devices. They present a resource-efficient security solution against common threat concerns. The computational requirements are not the main issue anymore. The focus is now placed on determining a good balance between the provided security level and the derived threat model. A security aspect that often gets overlooked is the establishment of secure communication sessions, as most design solutions are based only on the use of static key derivation, and therefore, lack the perfect forward secrecy. This leaves the transmitted data open for potential future exposures by having keys tied to the certificates rather than the communication sessions. We aim to patch this gap, by presenting a design that utilizes the Station to Station (STS) protocol with implicit certificates. In addition, we propose potential protocol optimization implementation steps and run a comprehensive study on the performance and security level between the proposed design and the state-of-the-art key derivation protocols. In our comparative study, we show that with a slight computational increase of 20\% compared to a static ECDSA key derivation, we are able to mitigate many session-related security vulnerabilities that would otherwise remain open.Comment: Accepted copy for Publication at the Design, Automation and Test in Europe (DATE) Conference 202

    Lost in folding space? Comparing four variants of the thermodynamic model for RNA secondary structure prediction

    Get PDF
    Janssen S, Schudoma C, Steger G, Giegerich R. Lost in folding space? Comparing four variants of the thermodynamic model for RNA secondary structure prediction. BMC Bioinformatics. 2011;12(1): 429.BACKGROUND:Many bioinformatics tools for RNA secondary structure analysis are based on a thermodynamic model of RNA folding. They predict a single, "optimal" structure by free energy minimization, they enumerate near-optimal structures, they compute base pair probabilities and dot plots, representative structures of different abstract shapes, or Boltzmann probabilities of structures and shapes. Although all programs refer to the same physical model, they implement it with considerable variation for different tasks, and little is known about the effects of heuristic assumptions and model simplifications used by the programs on the outcome of the analysis.RESULTS:We extract four different models of the thermodynamic folding space which underlie the programs RNAfold, RNAshapes, and RNAsubopt. Their differences lie within the details of the energy model and the granularity of the folding space. We implement probabilistic shape analysis for all models, and introduce the shape probability shift as a robust measure of model similarity. Using four data sets derived from experimentally solved structures, we provide a quantitative evaluation of the model differences.CONCLUSIONS:We find that search space granularity affects the computed shape probabilities less than the over- or underapproximation of free energy by a simplified energy model. Still, the approximations perform similar enough to implementations of the full model to justify their continued use in settings where computational constraints call for simpler algorithms. On the side, we observe that the rarely used level 2 shapes, which predict the complete arrangement of helices, multiloops, internal loops and bulges, include the "true" shape in a rather small number of predicted high probability shapes. This calls for an investigation of new strategies to extract high probability members from the (very large) level 2 shape space of an RNA sequence. We provide implementations of all four models, written in a declarative style that makes them easy to be modified. Based on our study, future work on thermodynamic RNA folding may make a choice of model based on our empirical data. It can take our implementations as a starting point for further program development

    The intrinsic and synaptic properties of inverted pyramidal cells within the neocortex

    Full text link
    Within the nervous system, the cortex is the area of the brain where higher order sensory, motor and cognitive processing occurs. The cortex contains a diverse array of cell types which form complicated and intricate circuits which gives rise to higher order sensory, motor and cognitive functions. The majority of neurons found in the cortex are pyramidal cells. While pyramidal cells differ based on soma size, dendrite span and cortical position, almost all share a noticeable defining characteristic: their apical dendrite extends toward the pial surface. However, there also exists a class of pyramidal cell where the apical dendrite extends in the opposite direction, toward the cortical white matter; these pyramidal cells appear to be upside down, or inverted. Utilizing physiological and histological techniques, inverted pyramidal cells (IPCs) within neocortex layer VI of the somatosensory cortex were examined and compared to the more common upright pyramidal cells (UPCs). This research produced a number of key findings: 1) the intrinsic physiology of IPCs differs from UPCs on a number of measures including input resistance, and action potential threshold and half-width; 2) IPCs, beyond the orientation of the apical dendrite, are morphologically dissimilar as compared to UPCs and 3) Stimulation of the underlying cortical white matter revealed IPCs are either integrated into different cortical circuits or process inputs differently. The main conclusions emphasize a need for further examination and classification of cortical neuronal cell types. These data are relevant to models of information processing through micro- and larger neocortical circuits and indicate that different cell types found within similar lamina can have different functional properties

    A Novel Secure NFC-based Approach for BMS Monitoring and Diagnostic Readout

    Full text link
    In modern systems that rely on the use of Battery Management Systems (BMS), longevity and the re-use of battery packs have always been important topics of discussion. These battery packs would be stored inside warehouses where they would need to be properly monitored and configured before their re-integration into the new systems. Traditional use of wired connections can be very cumbersome, and sometimes even impossible, due to the outer layers and packaging. To circumvent these issues, we propose an extension to the conventional BMS design that incorporates the use of Near Field Communication (NFC) for the purpose of wireless battery pack status readout. Additionally, to ensure that these packs are only managed by authenticated devices and that the data that is communicated with is protected against outside eavesdropping and tampering, we present a solution in the form of a lightweight security layer on top of the NFC protocol. To show the feasibility of our design, an accompanying prototype has been implemented and evaluated.Comment: Accepted copy for Publication at the 16th IEEE International Conference on RFID, 202

    Getting the Ball Rolling: Learning a Dexterous Policy for a Biomimetic Tendon-Driven Hand with Rolling Contact Joints

    Full text link
    Biomimetic, dexterous robotic hands have the potential to replicate much of the tasks that a human can do, and to achieve status as a general manipulation platform. Recent advances in reinforcement learning (RL) frameworks have achieved remarkable performance in quadrupedal locomotion and dexterous manipulation tasks. Combined with GPU-based highly parallelized simulations capable of simulating thousands of robots in parallel, RL-based controllers have become more scalable and approachable. However, in order to bring RL-trained policies to the real world, we require training frameworks that output policies that can work with physical actuators and sensors as well as a hardware platform that can be manufactured with accessible materials yet is robust enough to run interactive policies. This work introduces the biomimetic tendon-driven Faive Hand and its system architecture, which uses tendon-driven rolling contact joints to achieve a 3D printable, robust high-DoF hand design. We model each element of the hand and integrate it into a GPU simulation environment to train a policy with RL, and achieve zero-shot transfer of a dexterous in-hand sphere rotation skill to the physical robot hand.Comment: for project website, see https://srl-ethz.github.io/get-ball-rolling/ . for video, see https://youtu.be/YahsMhqNU8o . Submitted to the 2023 IEEE-RAS International Conference on Humanoid Robot

    Random initialisations performing above chance and how to find them

    Full text link
    Neural networks trained with stochastic gradient descent (SGD) starting from different random initialisations typically find functionally very similar solutions, raising the question of whether there are meaningful differences between different SGD solutions. Entezari et al.\ recently conjectured that despite different initialisations, the solutions found by SGD lie in the same loss valley after taking into account the permutation invariance of neural networks. Concretely, they hypothesise that any two solutions found by SGD can be permuted such that the linear interpolation between their parameters forms a path without significant increases in loss. Here, we use a simple but powerful algorithm to find such permutations that allows us to obtain direct empirical evidence that the hypothesis is true in fully connected networks. Strikingly, we find that two networks already live in the same loss valley at the time of initialisation and averaging their random, but suitably permuted initialisation performs significantly above chance. In contrast, for convolutional architectures, our evidence suggests that the hypothesis does not hold. Especially in a large learning rate regime, SGD seems to discover diverse modes.Comment: NeurIPS 2022, 14th Annual Workshop on Optimization for Machine Learning (OPT2022

    A p38MAPK/MK2 signaling pathway leading to redox stress, cell death and ischemia/reperfusion injury

    Get PDF
    Background Many diseases and pathological conditions are characterized by transient or constitutive overproduction of reactive oxygen species (ROS). ROS are causal for ischemia/reperfusion (IR)-associated tissue injury (IRI), a major contributor to organ dysfunction or failure. Preventing IRI with antioxidants failed in the clinic, most likely due to the difficulty to timely and efficiently target them to the site of ROS production and action. IR is also characterized by changes in the activity of intracellular signaling molecules including the stress kinase p38MAPK. While ROS can cause the activation of p38MAPK, we recently obtained in vitro evidence that p38MAPK activation is responsible for elevated mitochondrial ROS levels, thus suggesting a role for p38MAPK upstream of ROS and their damaging effects.<p></p> Results Here we identified p38MAPKΞ± as the predominantly expressed isoform in HL-1 cardiomyocytes and siRNA-mediated knockdown demonstrated the pro-oxidant role of p38MAPKΞ± signaling. Moreover, the knockout of the p38MAPK effector MAPKAP kinase 2 (MK2) reproduced the effect of inhibiting or knocking down p38MAPK. To translate these findings into a setting closer to the clinic a stringent kidney clamping model was used. p38MAPK activity increased upon reperfusion and p38MAPK inhibition by the inhibitor BIRB796 almost completely prevented severe functional impairment caused by IR. Histological and molecular analyses showed that protection resulted from decreased redox stress and apoptotic cell death.<p></p> Conclusions These data highlight a novel and important mechanism for p38MAPK to cause IRI and suggest it as a potential therapeutic target for prevention of tissue injury.<p></p&gt

    Sherrill House

    Get PDF
    Prepared by the Fall 2012 Conservation of Historic Building Materials class. This Historic Structure Report contains a historical overview of the Sherrill House, an interior and exterior architectural description, a conditions assessment of the interior and exterior of the structure, recommendations for treatment and future use, and a maintenance plan. The purpose of this report is to provide a current assessment of the condition of the property, recommendations for needed repairs and options for future use of the structure.https://scholarworks.gsu.edu/history_heritagepreservation/1039/thumbnail.jp
    • …
    corecore