57 research outputs found

    Optical Detection of Preneoplastic Lesions of the Central Airways

    Get PDF
    Current routine diagnosis of premalignant lesions of the central airways is hampered due to a limited sensitivity (white light bronchoscopy) and resolution (computer tomography (CT), positron emission tomography (PET)) of currently used techniques. To improve the detection of these subtle mucosal abnormalities, novel optical imaging bronchoscopic techniques have been developed over the past decade. In this review we highlight the technological developments in the field of endoscopic imaging, and describe their advantages and disadvantages in clinical use

    Greater Expectations?

    Get PDF
    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verifier is resource-constrained (and holds a PUF), while the prover is resource-rich (and holds a CRP-database). We construct the first and efficient PUF-based authentication protocol for this setting, which we call converse PUF-based authentication. We provide an extensive security analysis against passive adversaries, show that a minor modification also allows for authenticated key exchange and propose a concrete instantiation using controlled Arbiter PUFs

    TAO: Techniques for algorithm-level obfuscation during high-level synthesis

    Get PDF
    Intellectual Property (IP) theft costs semiconductor design companies billions of dollars every year. Unauthorized IP copies start from reverse engineering the given chip. Existing techniques to protect against IP theft aim to hide the IC's functionality, but focus on manipulating the HDL descriptions. We propose TAO as a comprehensive solution based on high-level synthesis to raise the abstraction level and apply algorithmic obfuscation automatically. TAO includes several transformations that make the component hard to reverse engineer during chip fabrication, while a key is later inserted to unlock the functionality. Finally, this is a promising approach to obfuscate large-scale designs despite the hardware overhead needed to implement the obfuscation

    Exploring the impact of patient-specific clinical features on osimertinib effectiveness in a real-world cohort of patients with EGFR mutated non-small cell lung cancer

    Get PDF
    Osimertinib is prescribed to patients with metastatic non-small cell lung cancer (NSCLC) and a sensitizing EGFR mutation. Limited data exists on the impact of patient characteristics or osimertinib exposure on effectiveness outcomes. This was a Dutch, multicenter cohort study. Eligible patients were ≥18 years, with metastatic EGFRm+ NSCLC, receiving osimertinib. Primary endpoint was progression-free survival (PFS). Secondary endpoints included overall survival (OS) and safety. Kaplan-Meier analyses and multivariate Cox proportional hazard models were performed. In total, 294 patients were included. Primary EGFR-mutations were mainly exon 19 deletions (54%) and p.L858R point mutations (30%). Osimertinib was given in first-line (40%), second-line (46%) or beyond (14%), with median PFS 14.4 (95% CI: 9.4-19.3), 13.9 (95% CI: 11.3-16.1) and 8.7 months (95% CI: 4.6-12.7), respectively. Patients with low BMI (&lt;20.0 kg/m2) had significantly shorter PFS/OS compared to all other subgroups. Patients with a high plasma trough concentration in steady state (Cmin,SS; &gt;271 ng/mL) had shorter PFS compared to a low Cmin,SS (&lt;163 ng/mL; aHR 2.29; 95% CI: 1.13-4.63). A significant longer PFS was seen in females (aHR = 0.61, 95% CI: 0.45-0.82) and patients with the exon 19 deletion (aHR = 0.58, 95% CI: 0.36-0.92). A trend towards longer PFS was seen for TP53 wild-type patients, while age did not impact PFS. Patients with a primary EGFR exon 19 deletion had longer PFS, while a low BMI, male sex and a high Cmin,SS were indicative for shorter PFS and/or OS. Age was not associated with effectiveness outcomes of osimertinib.</p

    Secure Code Updates for Smart Embedded Devices based on PUFs

    Get PDF
    Code update is a very useful tool commonly used in low-end embedded devices to improve the existing functionalities or patch discovered bugs or vulnerabilities. If the update protocol itself is not secure, it will only bring new threats to embedded systems. Thus, a secure code update mechanism is required. However, existing solutions either rely on strong security assumptions, or result in considerable storage and computation consumption, which are not practical for resource-constrained embedded devices (e.g., in the context of Internet of Things). In this work, we propose to use intrinsic device characteristics (i.e., Physically Unclonable Functions or PUF) to design a practical and lightweight secure code update scheme. Our scheme can not only ensure the freshness, integrity, confidentiality and authenticity of code update, but also verify that the update is installed correctly on a specific device without any malicious software. Cloned or counterfeit devices can be excluded as the code update is bound to the unpredictable physical properties of underlying hardware. Legitimate devices in an untrustworthy software state can be restored by filling suspect memory with PUF-derived random numbers. After update installation, the initiator of the code update is able to obtain the verifiable software state from device, and the device can maintain a sustainable post-update secure check by enforcing a secure call sequence. To demonstrate the practicality and feasibility, we also implement the proposed scheme on a low-end MCU platform (TI MSP430) by using onboard SRAM and Flash resources

    Life-prolonging treatment restrictions and outcomes in patients with cancer and COVID-19:an update from the Dutch Oncology COVID-19 Consortium

    Get PDF
    AIM OF THE STUDY: The coronavirus disease 2019 (COVID-19) pandemic significantly impacted cancer care. In this study, clinical patient characteristics related to COVID-19 outcomes and advanced care planning, in terms of non-oncological treatment restrictions (e.g. do-not-resuscitate codes), were studied in patients with cancer and COVID-19. METHODS: The Dutch Oncology COVID-19 Consortium registry was launched in March 2020 in 45 hospitals in the Netherlands, primarily to identify risk factors of a severe COVID-19 outcome in patients with cancer. Here, an updated analysis of the registry was performed, and treatment restrictions (e.g. do-not-intubate codes) were studied in relation to COVID-19 outcomes in patients with cancer. Oncological treatment restrictions were not taken into account. RESULTS: Between 27th March 2020 and 4th February 2021, 1360 patients with cancer and COVID-19 were registered. Follow-up data of 830 patients could be validated for this analysis. Overall, 230 of 830 (27.7%) patients died of COVID-19, and 60% of the remaining 600 patients with resolved COVID-19 were admitted to the hospital. Patients with haematological malignancies or lung cancer had a higher risk of a fatal outcome than other solid tumours. No correlation between anticancer therapies and the risk of a fatal COVID-19 outcome was found. In terms of end-of-life communication, 50% of all patients had restrictions regarding life-prolonging treatment (e.g. do-not-intubate codes). Most identified patients with treatment restrictions had risk factors associated with fatal COVID-19 outcome. CONCLUSION: There was no evidence of a negative impact of anticancer therapies on COVID-19 outcomes. Timely end-of-life communication as part of advanced care planning could save patients from prolonged suffering and decrease burden in intensive care units. Early discussion of treatment restrictions should therefore be part of routine oncological care, especially during the COVID-19 pandemic

    Secure key generation from biased PUFs: extended version

    No full text
    When the applied PUF in a PUF-based key generator does not produce full entropy responses, information about the derived key material is leaked by code-offset helper data. If the PUF’s entropy level is too low, the PUF-derived key is even fully disclosed by the helper data. In this work we analyze this entropy leakage, and provide several solutions for preventing leakage for PUFs suffering from i.i.d. biased bits. Our methods pose no limit on the amount of PUF bias that can be tolerated for achieving secure key generation, with only a moderate increase in the required PUF size. This solves an important open problem in this field. In addition, we also consider the reusability of PUF-based key generators and present a variant of our solution which retains the reusability property. In an exemplary application of these methods, we are able to derive a secure 128-bit key from a 15 %-noisy and 25 %-biased PUF requiring only 4890 PUF bits for the non-reusable variant, or 7392 PUF bits for the reusable variant

    Secure key generation from biased PUFs

    No full text
    PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typically require an error-correcting mechanism (e.g. based on the code-offset method) for dealing with bit errors between the enrollment and reconstruction of keys. When the used PUF does not have full entropy, entropy leakage between the helper data and the device-unique key material can occur. If the entropy level of the PUF becomes too low, the PUF-derived key can be attacked through the publicly available helper data. In this work we provide several solutions for preventing this entropy leakage for PUFs suffering from i.i.d. biased bits. The methods proposed in this work pose no limit on the amount of bias that can be tolerated, which solves an important open problem for PUF-based key generation. Additionally, the solutions are all evaluated based on reliability, efficiency, leakage and reusability showing that depending on requirements for the key generator different solutions are preferable

    Groene criminologie

    No full text
    ARTIKELEN: 1. T. Boekhout van Solinge - Ontbossing en criminologie 2. J. Janssen - Over mensen en andere dieren in de criminologie 3. M. van Huijstee en T. Steinweg - E-waste: de donkere kant van de elektronicaconsumptie 4. V. Ruggiero en N. South - Groene criminologie en vuileboordencriminaliteit 5. W.P.E. van der Leest en G.J. van der Zon - Witwasmethoden bij grensoverschrijdende milieucriminaliteit 6. D.P. van Uhm - De illegale handel in beschermde diersoorten 7. Internetsites. SAMENVATTING: Groene criminologie onderscheidt zich van andere meer legalistisch geörienteerde criminologie door het centraal stellen van een breed opgevat schadebeginsel. Dit betekent dat groene criminologie niet stopt bij de bestudering van milieucriminaliteit. Veel milieuschade is het gevolg van activiteiten die (nog) niet strafbaar zijn gesteld. Een nieuw element in de groene criminologie is dat mensen worden gezien als deel van complexe ecosystemen en niet langer centraal staan. Ook dieren en diersoorten kunnen slachtoffer zijn, evenals ecosystemen. Daarbij geldt als uitgangspunt dat de waarde van de dieren en de natuurlijke omgeving op zichzelf vooropstaat, niet zozeer het nut dat zij al dan niet hebben voor de mens. Naast deze onderwerpen zijn enkele artikelen in dit themanummer gewijd aan vormen van milieuschade en daaraan gelieerde criminele activiteiten
    • …
    corecore