65 research outputs found

    Content and popularity analysis of Tor hidden services

    Get PDF
    Tor hidden services allow running Internet services while protecting the location of the servers. Their main purpose is to enable freedom of speech even in situations in which powerful adversaries try to suppress it. However, providing location privacy and client anonymity also makes Tor hidden services an attractive platform for every kind of imaginable shady service. The ease with which Tor hidden services can be set up has spurred a huge growth of anonymously provided Internet services of both types. In this paper we analyse the landscape of Tor hidden services. We have studied Tor hidden services after collecting 39824 hidden service descriptors on 4th of Feb 2013 by exploiting protocol and implementation flaws in Tor: we scanned them for open ports; in the case of HTTP services, we analysed and classified their content. We also estimated the popularity of hidden services by looking at the request rate for hidden service descriptors by clients. We found that while the content of Tor hidden services is rather varied, the most popular hidden services are related to botnets.Comment: 6 pages, 3 figures, 2 table

    Observation of many-body long-range tunneling after a quantum quench

    Get PDF
    Quantum tunneling constitutes one of the most fundamental processes in nature. We observe resonantly-enhanced long-range quantum tunneling in one-dimensional Mott-insulating Hubbard chains that are suddenly quenched into a tilted configuration. Higher-order many-body tunneling processes occur over up to five lattice sites when the tilt per site is tuned to integer fractions of the Mott gap. Starting from a one-atom-per-site Mott state the response of the many-body quantum system is observed as resonances in the number of doubly occupied sites and in the emerging coherence in momentum space. Second- and third-order tunneling shows up in the transient response after the tilt, from which we extract the characteristic scaling in accordance with perturbation theory and numerical simulations.Comment: 22 pages, 7 figure

    Breaking 104 bit WEP in less than 60 seconds

    Get PDF
    We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40.000 frames in 50% of all cases. The IV of these packets can be randomly chosen. This is an improvement in the number of required frames by more than an order of magnitude over the best known key-recovery attacks for WEP. On a IEEE 802.11g network, the number of frames required can be obtained by re-injection in less than a minute. The required computational effort is approximately 2^{20} RC4 key setups, which on current desktop and laptop CPUs is neglegible

    Block ciphers sensitive to Groebner Basis Attacks

    Get PDF
    We construct and analyze Feistel and SPN ciphers that have a sound design strategy against linear and differential attacks but for which the encryption process can be described by very simple polynomial equations. For a block and key size of 128 bits, we present ciphers for which practical Groebner basis attacks can recover the full cipher key requiring only a minimal number of plaintext/ciphertext pairs. We show how Groebner bases for a subset of these ciphers can be constructed with neglegible computational effort. This reduces the key recovery problem to a Groebner basis conversion problem. By bounding the running time of a Groebner basis conversion algorithm, FGLM, we demonstrate the existence of block ciphers resistant against differential and linear cryptanalysis but vulnerable against Groebner basis attacks

    Synthesis of N-heterocycles from diamines via H2-driven NADPH recycling in the presence of O2

    Get PDF
    Herein, we report an enzymatic cascade involving an oxidase, an imine reductase and a hydrogenase for the H2-driven synthesis of N-heterocycles. Variants of putrescine oxidase from Rhodococcus erythropolis with improved activity were identified. Substituted pyrrolidines and piperidines were obtained with up to 97% product formation in a one-pot reaction directly from the corresponding diamine substrates. The formation of up to 93% ee gave insights into the specificity and selectivity of the putrescine oxidase.DFG, 53182490, EXC 314: Unifying Concepts in CatalysisDFG, 284111627, H2-basierende Kaskaden fĂĽr die Biosynthese von N-HeterocyclenTU Berlin, Open-Access-Mittel - 201

    Intraoperative dynamics of workflow disruptions and surgeons' technical performance failures: insights from a simulated operating room

    Get PDF
    INTRODUCTION Flow disruptions (FD) in the operating room (OR) have been found to adversely affect the levels of stress and cognitive workload of the surgical team. It has been concluded that frequent disruptions also lead to impaired technical performance and subsequently pose a risk to patient safety. However, respective studies are scarce. We therefore aimed to determine if surgical performance failures increase after disruptive events during a complete surgical intervention. METHODS We set up a mixed-reality-based OR simulation study within a full-team scenario. Eleven orthopaedic surgeons performed a vertebroplasty procedure from incision to closure. Simulations were audio- and videotaped and key surgical instrument movements were automatically tracked to determine performance failures, i.e. injury of critical tissue. Flow disruptions were identified through retrospective video observation and evaluated according to duration, severity, source, and initiation. We applied a multilevel binary logistic regression model to determine the relationship between FDs and technical performance failures. For this purpose, we compared FDs in one-minute intervals before performance failures with intervals without subsequent performance failures. RESULTS Average simulation duration was 30:02~min (SD = 10:48~min). In 11 simulated cases, 114 flow disruption events were observed with a mean hourly rate of 20.4 (SD = 5.6) and substantial variation across FD sources. Overall, 53 performance failures were recorded. We observed no relationship between FDs and likelihood of immediate performance failures: Adjusted odds ratio = 1.03 (95% CI 0.46-2.30). Likewise, no evidence could be found for different source types of FDs. CONCLUSION Our study advances previous methodological approaches through the utilisation of a mixed-reality simulation environment, automated surgical performance assessments, and expert-rated observations of FD events. Our data do not support the common assumption that FDs adversely affect technical performance. Yet, future studies should focus on the determining factors, mechanisms, and dynamics underlying our findings

    Desire to Receive More Pain Treatment: A Relevant Patient-Reported Outcome Measure to Assess Quality of Post-Operative Pain Management? Results From 79,996 Patients Enrolled in the Pain Registry QUIPS from 2016 to 2019

    Get PDF
    Acute postoperative pain is frequently evaluated by pain intensity scores. However, interpretation of the results is difficult and thresholds requiring treatment are notwell defined. Additional patientreported outcome measures (PROMs) might be helpful to better understand individual pain experience and quality of pain management after surgery.We used data from the QUIPS pain registry for a cross-sectional study in order to investigate associations between the desire to receive more pain treatment (D2RMPT) with pain intensity ratings and other PROMs. Responses from 79,996 patientswere analyzed, of whom 10.7% reported D2RMPT. A generalized estimating equation Poisson model showed that women had a lower risk ratio (RR) to answer this question with “yes” (RR: .92, P < .001). Factors that increased the risk most were “maximal pain intensity ≥ 6/10 on a numerical rating scale” (RR: 2.48, P < .001) and “any pain interference” (RR: 2.48, P < .001). The largest reduction in risk was observed if patients were “allowed to participate in pain treatment decisions” (RR: .41, P < .001) and if they felt that they “received sufficient treatment information” (RR: .58, P < .001). Our results indicate that the (easily assessed) question D2RMPT gives additional information to other PROMs like pain intensity. The small proportion of patients with D2RMPT (even for high pain scores) opens the discussion about clinicians’ understanding of over- und under-treatment and questions the exclusive use of pain intensity as quality indicator. Future studies need to investigatewhether asking about D2RMPT in clinical routine can improve postoperative pain outcome. Perspective: This article presents characteristics of the patient-reported outcome measure “Desire to receive more pain treatment.” This measure could be used to apply pain treatment in a more individualized way and lead to improved treatment strategies and quality

    D.STVL.7 - Algebraic cryptanalysis of symmetric primitives

    Get PDF
    The recent development of algebraic attacks can be considered an important breakthrough in the analysis of symmetric primitives; these are powerful techniques that apply to both block and stream ciphers (and potentially hash functions). The basic principle of these techniques goes back to Shannon's work: they consist in expressing the whole cryptographic algorithm as a large system of multivariate algebraic equations (typically over F2), which can be solved to recover the secret key. Efficient algorithms for solving such algebraic systems are therefore the essential ingredients of algebraic attacks. Algebraic cryptanalysis against symmetric primitives has recently received much attention from the cryptographic community, particularly after it was proposed against some LFSR- based stream ciphers and against the AES and Serpent block ciphers. This is currently a very active area of research. In this report we discuss the basic principles of algebraic cryptanalysis of stream ciphers and block ciphers, and review the latest developments in the field. We give an overview of the construction of such attacks against both types of primitives, and recall the main algorithms for solving algebraic systems. Finally we discuss future research directions
    • …
    corecore