481 research outputs found

    Stealthy Deception Attacks Against SCADA Systems

    Full text link
    SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values of the physical process. In this work we present a class of semantic network-based attacks against SCADA systems that are undetectable by the above mentioned anomaly detection. After hijacking the communication channels between the Human Machine Interface (HMI) and Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a fake view of the industrial process, deceiving the human operator into taking manual actions. Our most advanced attack also manipulates the messages generated by the operator's actions, reversing their semantic meaning while causing the HMI to present a view that is consistent with the attempted human actions. The attacks are totaly stealthy because the message sizes and timing, the command sequences, and the data values of the ICS's state all remain legitimate. We implemented and tested several attack scenarios in the test lab of our local electric company, against a real HMI and real PLCs, separated by a commercial-grade firewall. We developed a real-time security assessment tool, that can simultaneously manipulate the communication to multiple PLCs and cause the HMI to display a coherent system--wide fake view. Our tool is configured with message-manipulating rules written in an ICS Attack Markup Language (IAML) we designed, which may be of independent interest. Our semantic attacks all successfully fooled the operator and brought the system to states of blackout and possible equipment damage

    Ureteroscopic treatment of larger renal calculi (\u3e2 cm).

    Get PDF
    OBJECTIVES: To evaluate the current status of ureteroscopic lithotripsy (UL) for treating renal calculi of \u3e2 cm, as advances in flexible ureteroscope design, accessory instrumentation and lithotrites have revolutionised the treatment of urinary calculi. While previously reserved for ureteric and small renal calculi, UL has gained an increasing role in the selective management of larger renal stone burdens. METHODS: We searched the available databases, including PubMed, Google Scholar, and Scopus, for relevant reports in English, and the article bibliographies to identify additional relevant articles. Keywords included ureteroscopy, lithotripsy, renal calculi, and calculi \u3e2 cm. Retrieved articles were reviewed to consider the number of patients, mean stone size, success rates, indications and complications. RESULTS: In all, nine studies (417 patients) were eligible for inclusion. After one, two or three procedures the mean (range) success rates were 68.2 (23-84)%, 87.1 (79-91)% and 94.4 (90.1-96.7)%, respectively. Overall, the success rate was \u3e90% with a mean of 1.2-2.3 procedures per patient. The overall complication rate was 10.3%, including six (1.4%) intraoperative and 37 (8.9%) postoperative complications, most of which were minor. The most common indications for UL were a failed previous treatment (46%), comorbidities (18.2%), and technical and anatomical factors (12.3%). CONCLUSIONS: UL is safe and effective for treating large renal calculi. While several procedures might be required for total stone clearance, UL should be considered a standard approach in the urologist\u27s options treating renal calculi of \u3e2 cm

    On the generalization of quantum state comparison

    Full text link
    We investigate the unambiguous comparison of quantum states in a scenario that is more general than the one that was originally suggested by Barnett et al. First, we find the optimal solution for the comparison of two states taken from a set of two pure states with arbitrary a priori probabilities. We show that the optimal coherent measurement is always superior to the optimal incoherent measurement. Second, we develop a strategy for the comparison of two states from a set of N pure states, and find an optimal solution for some parameter range when N=3. In both cases we use the reduction method for the corresponding problem of mixed state discrimination, as introduced by Raynal et al., which reduces the problem to the discrimination of two pure states only for N=2. Finally, we provide a necessary and sufficient condition for unambiguous comparison of mixed states to be possible.Comment: 8 pages, 4 figures, Proposition 1 corrected, appendix adde

    Purifying and Reversible Physical Processes

    Get PDF
    Starting from the observation that reversible processes cannot increase the purity of any input state, we study deterministic physical processes, which map a set of states to a set of pure states. Such a process must map any state to the same pure output, if purity is demanded for the input set of all states. But otherwise, when the input set is restricted, it is possible to find non-trivial purifying processes. For the most restricted case of only two input states, we completely characterize the output of any such map. We furthermore consider maps, which combine the property of purity and reversibility on a set of states, and we derive necessary and sufficient conditions on sets, which permit such processes.Comment: 5 pages, no figures, v2: only minimal change

    Physical Purification of Quantum States

    Full text link
    We introduce the concept of a physical process that purifies a mixed quantum state, taken from a set of states, and investigate the conditions under which such a purification map exists. Here, a purification of a mixed quantum state is a pure state in a higher-dimensional Hilbert space, the reduced density matrix of which is identical to the original state. We characterize all sets of mixed quantum states, for which perfect purification is possible. Surprisingly, some sets of two non-commuting states are among them. Furthermore, we investigate the possibility of performing an imperfect purification.Comment: 5 pages, 1 figure; published versio

    Temporal Phase Shifts in SCADA Networks

    Full text link
    In Industrial Control Systems (ICS/SCADA), machine to machine data traffic is highly periodic. Previous work showed that in many cases, it is possible to create an automata-based model of the traffic between each individual Programmable Logic Controller (PLC) and the SCADA server, and to use the model to detect anomalies in the traffic. When testing the validity of previous models, we noticed that overall, the models have difficulty in dealing with communication patterns that change over time. In this paper we show that in many cases the traffic exhibits phases in time, where each phase has a unique pattern, and the transition between the different phases is rather sharp. We suggest a method to automatically detect traffic phase shifts, and a new anomaly detection model that incorporates multiple phases of the traffic. Furthermore we present a new sampling mechanism for training set assembly, which enables the model to learn all phases during the training stage with lower complexity. The model presented has similar accuracy and much less permissiveness compared to the previous general DFA model. Moreover, the model can provide the operator with information about the state of the controlled process at any given time, as seen in the traffic phases.Comment: Full version of CPS-SPC'18 short pape

    Histochemistry and anatomy of phylloxera (Daktulosphaira vitifoliae) nodosities on young roots of grapevine (Vitis spp).

    Get PDF
    Phylloxera (Daktulosphaira vitifoliae FITCH) induce galls (nodosities) on young grapevine roots. Histological and histochemical methods were applied to study the gall's morphology and enzyme activities (peroxidases, leucine aminopeptidases and acidic phosphatases). Susceptible V. vinifera cv. Cabernet Sauvignon was compared to the resistant rootstock 5 BB (V. berlandieri x V. riparia) using aseptic dual culture conditions. The gall induction phase was analyzed before visible signs of potential resistance responses were detected. Elevated metabolic activity has been found in nodosities compared to uninfected roots. Starch granule incorporation was detected in young galls and was highest at the feeding site. As galls mature, the starch density decreased at the feeding site and increased towards the periphery of the gall. Peroxidase, acidic phosphatase and leucine aminopeptidase activities were highest at the incision. No differences in enzyme activities could be detected between the two cultivars tested.

    Finite key analysis for symmetric attacks in quantum key distribution

    Get PDF
    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e. below the order of 10^4, the finite key rate differs significantly from the asymptotic value for n approaching infinity. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.Comment: 9 pages, 5 figure
    corecore