63 research outputs found

    In-Silico Patterning of Vascular Mesenchymal Cells in Three Dimensions

    Get PDF
    Cells organize in complex three-dimensional patterns by interacting with proteins along with the surrounding extracellular matrix. This organization provides the mechanical and chemical cues that ultimately influence a cell's differentiation and function. Here, we computationally investigate the pattern formation process of vascular mesenchymal cells arising from their interaction with Bone Morphogenic Protein-2 (BMP-2) and its inhibitor, Matrix Gla Protein (MGP). Using a first-principles approach, we derive a reaction-diffusion model based on the biochemical interactions of BMP-2, MGP and cells. Simulations of the model exhibit a wide variety of three-dimensional patterns not observed in a two-dimensional analysis. We demonstrate the emergence of three types of patterns: spheres, tubes, and sheets, and show that the patterns can be tuned by modifying parameters in the model such as the degradation rates of proteins and chemotactic coefficient of cells. Our model may be useful for improved engineering of three-dimensional tissue structures as well as for understanding three dimensional microenvironments in developmental processes.National Institutes of Health (U.S.) (GM69811)United States. Dept. of Energy (DOE CSGF fellowship

    Why Your Encrypted Database Is Not Secure

    Get PDF
    Encrypted databases, a popular approach to protecting data from compromised database management systems (DBMS’s), use abstract threat models that capture neither realistic databases, nor realistic attack scenarios. In particular, the “snapshot attacker” model used to support the security claims for many encrypted databases does not reflect the information about past queries available in any snapshot attack on an actual DBMS. We demonstrate how this gap between theory and reality causes encrypted databases to fail to achieve their “provable security” guarantees

    A Virtual Machine Introspection Based Architecture for Intrusion Detection

    No full text
    Today's architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening in that host's software, but is highly susceptible to attack. On the other hand, if the IDS resides in the network, it is more resistant to attack, but has a poor view of what is happening inside the host, making it more susceptible to evasion. In this paper we present an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance. We achieve this through the use of a virtual machine monitor. Using this approach allows us to isolate the IDS from the monitored host but still retain excellent visibility into the host's state. The VMM also offers us the unique ability to completely mediate interactions between the host software and the underlying hardware. We present a detailed study of our architecture, including Livewire, a prototype implementation. We demonstrate Livewire by implementing a suite of simple intrusion detection policies and using them to detect real attacks

    When virtual is harder than real: Security challenges in virtual machine based computing environments

    No full text
    As virtual machines become pervasive users will be able to create, modify and distribute new “machines ” with unprecedented ease. This flexibility provides tremendous benefits for users. Unfortunately, it can also undermine many assumptions that today’s relatively static security architectures rely on about the number of hosts in a system, their mobility, connectivity, patch cycle, etc. We examine a variety of security problems virtual computing environments give rise to. We then discuss potential directions for changing security architectures to adapt to these demands.

    Opportunistic measurement: Extracting insight from spurious traffic

    No full text
    While network measurement techniques are continually improving, representative network measurements are increasingly scarce. The issue is fundamentally one of access: either the points of interest are hidden, are unwilling, or are sufficiently many that representative analysis is daunting if not unattainable. In particular, much of the Internet’s modern growth, in both size and complexity, is “protected” by NAT and firewall technologies that preclude the use of traditional measurement techniques. Thus, while we can see the shrinking visible portion of the Internet with ever-greater fidelity, the majority of the Internet remains invisible. We argue for a new approach to illuminate these hidden regions of the Internet: opportunistic measurement that leverages sources of “spurious ” network traffic such as worms, misconfigurations, spam floods, and malicious automated scans. We identify a number of such sources and demonstrate their potential to provide measurement data at a far greater scale and scope than modern research sources. Most importantly, these sources provide insight into portions of the network unseen using traditional measurement approaches. Finally, we discuss the challenges of bias and noise that accompany any use of spurious network traffic. I
    • …
    corecore