201 research outputs found

    Consumption patterns and living conditions inside Het Steen, the late medieval prison of Malines (Mechelen, Belgium)

    Get PDF
    Excavations at the Main Square (Grote Markt) of Malines (Mechelen, Belgium) have unearthed the building remains of a tower, arguably identifiable as the former town prison: Het Steen. When this assumption is followed, the contents of the fills of two cesspits dug out in the cellars of the building illustrate aspects of daily life within the early 14th-century prison. An integrated approach of all find categories, together with the historical context available, illuminates aspects of the material culture of the users of the cesspits, their consumption patterns and the living conditions within the building

    Time Protection: the Missing OS Abstraction

    Get PDF
    Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code. Preventing unauthorised information flow is a core duty of the operating system, however, present OSes are unable to prevent timing channels. We argue that OSes must provide time protection in addition to the established memory protection. We examine the requirements of time protection, present a design and its implementation in the seL4 microkernel, and evaluate its efficacy as well as performance overhead on Arm and x86 processors

    ROBO2 is a stroma suppressor gene in the pancreas and acts via TGF-β signalling.

    Full text link
    Whereas genomic aberrations in the SLIT-ROBO pathway are frequent in pancreatic ductal adenocarcinoma (PDAC), their function in the pancreas is unclear. Here we report that in pancreatitis and PDAC mouse models, epithelial Robo2 expression is lost while Robo1 expression becomes most prominent in the stroma. Cell cultures of mice with loss of epithelial Robo2 (Pdx1Cre;Robo2F/F) show increased activation of Robo1+ myofibroblasts and induction of TGF-β and Wnt pathways. During pancreatitis, Pdx1Cre;Robo2F/F mice present enhanced myofibroblast activation, collagen crosslinking, T-cell infiltration and tumorigenic immune markers. The TGF-β inhibitor galunisertib suppresses these effects. In PDAC patients, ROBO2 expression is overall low while ROBO1 is variably expressed in epithelium and high in stroma. ROBO2low;ROBO1high patients present the poorest survival. In conclusion, Robo2 acts non-autonomously as a stroma suppressor gene by restraining myofibroblast activation and T-cell infiltration. ROBO1/2 expression in PDAC patients may guide therapy with TGF-β inhibitors or other stroma /immune modulating agents

    How well do adolescents recall use of mobile telephones? Results of a validation study

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>In the last decade mobile telephone use has become more widespread among children. Concerns expressed about possible health risks have led to epidemiological studies investigating adverse health outcomes associated with mobile telephone use. Most epidemiological studies have relied on self reported questionnaire responses to determine individual exposure. We sought to validate the accuracy of self reported adolescent mobile telephone use.</p> <p>Methods</p> <p>Participants were recruited from year 7 secondary school students in Melbourne, Australia. Adolescent recall of mobile telephone use was assessed using a self administered questionnaire which asked about number and average duration of calls per week. Validation of self reports was undertaken using Software Modified Phones (SMPs) which logged exposure details such as number and duration of calls.</p> <p>Results</p> <p>A total of 59 adolescents participated (39% boys, 61% girls). Overall a modest but significant rank correlation was found between self and validated number of voice calls (ρ = 0.3, P = 0.04) with a sensitivity of 57% and specificity of 66%. Agreement between SMP measured and self reported duration of calls was poorer (ρ = 0.1, P = 0.37). Participants whose parents belonged to the 4<sup>th </sup>socioeconomic stratum recalled mobile phone use better than others (ρ = 0.6, P = 0.01).</p> <p>Conclusion</p> <p>Adolescent recall of mobile telephone use was only modestly accurate. Caution is warranted in interpreting results of epidemiological studies investigating health effects of mobile phone use in this age group.</p

    MicroWalk: A Framework for Finding Side Channels in Binaries

    Full text link
    Microarchitectural side channels expose unprotected software to information leakage attacks where a software adversary is able to track runtime behavior of a benign process and steal secrets such as cryptographic keys. As suggested by incremental software patches for the RSA algorithm against variants of side-channel attacks within different versions of cryptographic libraries, protecting security-critical algorithms against side channels is an intricate task. Software protections avoid leakages by operating in constant time with a uniform resource usage pattern independent of the processed secret. In this respect, automated testing and verification of software binaries for leakage-free behavior is of importance, particularly when the source code is not available. In this work, we propose a novel technique based on Dynamic Binary Instrumentation and Mutual Information Analysis to efficiently locate and quantify memory based and control-flow based microarchitectural leakages. We develop a software framework named \tool~for side-channel analysis of binaries which can be extended to support new classes of leakage. For the first time, by utilizing \tool, we perform rigorous leakage analysis of two widely-used closed-source cryptographic libraries: \emph{Intel IPP} and \emph{Microsoft CNG}. We analyze 1515 different cryptographic implementations consisting of 112112 million instructions in about 105105 minutes of CPU time. By locating previously unknown leakages in hardened implementations, our results suggest that \tool~can efficiently find microarchitectural leakages in software binaries

    Rationale, design and methodology of APPROACH-IS II: International study of patient-reported outcomes and frailty phenotyping in adults with congenital heart disease.

    Get PDF
    In recent years, patient-reported outcomes (PROs) have received increasing prominence in cardiovascular research and clinical care. An understanding of the variability and global experience of PROs in adults with congenital heart disease (CHD), however, is still lacking. Moreover, information on epidemiological characteristics and the frailty phenotype of older adults with CHD is minimal. The APPROACH-IS II study was established to address these knowledge gaps. This paper presents the design and methodology of APPROACH-IS II. APPROACH-IS II is a cross-sectional global multicentric study that includes Part 1 (assessing PROs) and Part 2 (investigating the frailty phenotype of older adults). With 53 participating centers, located in 32 countries across six continents, the aim is to enroll 8000 patients with CHD. In Part 1, self-report surveys are used to collect data on PROs (e.g., quality of life, perceived health, depressive symptoms, autonomy support), and explanatory variables (e.g., social support, stigma, illness identity, empowerment). In Part 2, the cognitive functioning and frailty phenotype of older adults are measured using validated assessments. APPROACH-IS II will generate a rich dataset representing the international experience of individuals in adult CHD care. The results of this project will provide a global view of PROs and the frailty phenotype of adults with CHD and will thereby address important knowledge gaps. Undoubtedly, the project will contribute to the overarching aim of improving optimal living and care provision for adults with CHD

    Neuro and hepatic toxicological profile of (S)-2,4-diaminobutanoic acid in embryonic, adolescent and adult zebrafish

    Get PDF
    (S)-2,4-Diaminobutanoic acid (DABA) is a noncanonical amino acid often co-produced by cyanobacteria along with β-N-methylamino-l-alanine (BMAA) in algal blooms. Although BMAA is a well-established neurotoxin, the toxicity of DABA remains unclear. As part of our development of biocompatible materials, we wish to make use of DABA as both a building block and as the end-product of enzymatically-induced depolymerization; however, if it is toxic at very low concentrations, this would not be possible. We examined the toxicity of DABA using both in vivo embryonic and adult zebrafish models. At higher sub-lethal concentrations (700 µM), the fish demonstrated early signs of cardiotoxicity. Adolescent zebrafish were able to tolerate a higher concentration. Post-mortem histological analysis of juvenile zebrafish showed no liver or brain abnormalities associated with hepato- or neurotoxicity. Combined, these results show that DABA exhibits no overt toxicity at concentrations (100-300 µM) within an order of magnitude of those envisioned for its application. This study further highlights the low-cost and ease of using zebrafish as an early-stage toxicological screening tool

    Negative emotions set in motion : the continued relevance of #GamerGate

    Get PDF
    This chapter aims at making sense of the #GamerGate (#GG) online harassment campaign that was particularly active in 2014–2015 but to this day continues to produce hateful speech against certain ideologies and minorities in gaming culture. The campaign was especially successful at building online visibility through harassment, and the affective resonances of the issues it raised have since translated into general online campaigning how-to’s, financial earnings, and even political action outside of the gaming sphere. Although the primary breeding ground for this movement was 4chan (and later, 8chan), it only reached public awareness and visibility – hence, effectiveness – through Twitter and, to a lesser extent, through YouTube. In order to understand the emotional charge and political relevance of this campaign, we rely on both quantitative and qualitative activity analyses of the Twitter users that use the hashtag #GamerGate between 2014 and 2019. In addition to analyzing who were the most active tweeters and what kind of resonance their tweets elicited, we looked into the emotional qualities of their communication. The communication strategies of #GG tweeters took advantage of the language and cultural references of the target demographic to drive a set of topics into public discourse and, further, to political activism. This discourse utilized a combination of affective modes, based mainly on resentment and schadenfreude, that we see echoing in many places on the internet. In the end, we argue that while #GG may have been only one instance of a campaign with harassment elements, the sentiments it cultivated and amplified as well as its operational logics have since been successfully employed in many similar online movements, including the current political campaigning associated with the so-called alt-right.fi=vertaisarvioitu|en=peerReviewed
    corecore