481 research outputs found
Stealthy Deception Attacks Against SCADA Systems
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to
network attacks such as session hijacking. Hence, research focuses on network
anomaly detection based on meta--data (message sizes, timing, command
sequence), or on the state values of the physical process. In this work we
present a class of semantic network-based attacks against SCADA systems that
are undetectable by the above mentioned anomaly detection. After hijacking the
communication channels between the Human Machine Interface (HMI) and
Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a
fake view of the industrial process, deceiving the human operator into taking
manual actions. Our most advanced attack also manipulates the messages
generated by the operator's actions, reversing their semantic meaning while
causing the HMI to present a view that is consistent with the attempted human
actions. The attacks are totaly stealthy because the message sizes and timing,
the command sequences, and the data values of the ICS's state all remain
legitimate.
We implemented and tested several attack scenarios in the test lab of our
local electric company, against a real HMI and real PLCs, separated by a
commercial-grade firewall. We developed a real-time security assessment tool,
that can simultaneously manipulate the communication to multiple PLCs and cause
the HMI to display a coherent system--wide fake view. Our tool is configured
with message-manipulating rules written in an ICS Attack Markup Language (IAML)
we designed, which may be of independent interest. Our semantic attacks all
successfully fooled the operator and brought the system to states of blackout
and possible equipment damage
Ureteroscopic treatment of larger renal calculi (\u3e2 cm).
OBJECTIVES: To evaluate the current status of ureteroscopic lithotripsy (UL) for treating renal calculi of \u3e2 cm, as advances in flexible ureteroscope design, accessory instrumentation and lithotrites have revolutionised the treatment of urinary calculi. While previously reserved for ureteric and small renal calculi, UL has gained an increasing role in the selective management of larger renal stone burdens.
METHODS: We searched the available databases, including PubMed, Google Scholar, and Scopus, for relevant reports in English, and the article bibliographies to identify additional relevant articles. Keywords included ureteroscopy, lithotripsy, renal calculi, and calculi \u3e2 cm. Retrieved articles were reviewed to consider the number of patients, mean stone size, success rates, indications and complications.
RESULTS: In all, nine studies (417 patients) were eligible for inclusion. After one, two or three procedures the mean (range) success rates were 68.2 (23-84)%, 87.1 (79-91)% and 94.4 (90.1-96.7)%, respectively. Overall, the success rate was \u3e90% with a mean of 1.2-2.3 procedures per patient. The overall complication rate was 10.3%, including six (1.4%) intraoperative and 37 (8.9%) postoperative complications, most of which were minor. The most common indications for UL were a failed previous treatment (46%), comorbidities (18.2%), and technical and anatomical factors (12.3%).
CONCLUSIONS: UL is safe and effective for treating large renal calculi. While several procedures might be required for total stone clearance, UL should be considered a standard approach in the urologist\u27s options treating renal calculi of \u3e2 cm
On the generalization of quantum state comparison
We investigate the unambiguous comparison of quantum states in a scenario
that is more general than the one that was originally suggested by Barnett et
al. First, we find the optimal solution for the comparison of two states taken
from a set of two pure states with arbitrary a priori probabilities. We show
that the optimal coherent measurement is always superior to the optimal
incoherent measurement. Second, we develop a strategy for the comparison of two
states from a set of N pure states, and find an optimal solution for some
parameter range when N=3. In both cases we use the reduction method for the
corresponding problem of mixed state discrimination, as introduced by Raynal et
al., which reduces the problem to the discrimination of two pure states only
for N=2. Finally, we provide a necessary and sufficient condition for
unambiguous comparison of mixed states to be possible.Comment: 8 pages, 4 figures, Proposition 1 corrected, appendix adde
Purifying and Reversible Physical Processes
Starting from the observation that reversible processes cannot increase the
purity of any input state, we study deterministic physical processes, which map
a set of states to a set of pure states. Such a process must map any state to
the same pure output, if purity is demanded for the input set of all states.
But otherwise, when the input set is restricted, it is possible to find
non-trivial purifying processes. For the most restricted case of only two input
states, we completely characterize the output of any such map. We furthermore
consider maps, which combine the property of purity and reversibility on a set
of states, and we derive necessary and sufficient conditions on sets, which
permit such processes.Comment: 5 pages, no figures, v2: only minimal change
Physical Purification of Quantum States
We introduce the concept of a physical process that purifies a mixed quantum
state, taken from a set of states, and investigate the conditions under which
such a purification map exists. Here, a purification of a mixed quantum state
is a pure state in a higher-dimensional Hilbert space, the reduced density
matrix of which is identical to the original state. We characterize all sets of
mixed quantum states, for which perfect purification is possible. Surprisingly,
some sets of two non-commuting states are among them. Furthermore, we
investigate the possibility of performing an imperfect purification.Comment: 5 pages, 1 figure; published versio
Temporal Phase Shifts in SCADA Networks
In Industrial Control Systems (ICS/SCADA), machine to machine data traffic is
highly periodic. Previous work showed that in many cases, it is possible to
create an automata-based model of the traffic between each individual
Programmable Logic Controller (PLC) and the SCADA server, and to use the model
to detect anomalies in the traffic. When testing the validity of previous
models, we noticed that overall, the models have difficulty in dealing with
communication patterns that change over time. In this paper we show that in
many cases the traffic exhibits phases in time, where each phase has a unique
pattern, and the transition between the different phases is rather sharp. We
suggest a method to automatically detect traffic phase shifts, and a new
anomaly detection model that incorporates multiple phases of the traffic.
Furthermore we present a new sampling mechanism for training set assembly,
which enables the model to learn all phases during the training stage with
lower complexity. The model presented has similar accuracy and much less
permissiveness compared to the previous general DFA model. Moreover, the model
can provide the operator with information about the state of the controlled
process at any given time, as seen in the traffic phases.Comment: Full version of CPS-SPC'18 short pape
Histochemistry and anatomy of phylloxera (Daktulosphaira vitifoliae) nodosities on young roots of grapevine (Vitis spp).
Phylloxera (Daktulosphaira vitifoliae FITCH) induce galls (nodosities) on young grapevine roots. Histological and histochemical methods were applied to study the gall's morphology and enzyme activities (peroxidases, leucine aminopeptidases and acidic phosphatases). Susceptible V. vinifera cv. Cabernet Sauvignon was compared to the resistant rootstock 5 BB (V. berlandieri x V. riparia) using aseptic dual culture conditions. The gall induction phase was analyzed before visible signs of potential resistance responses were detected. Elevated metabolic activity has been found in nodosities compared to uninfected roots. Starch granule incorporation was detected in young galls and was highest at the feeding site. As galls mature, the starch density decreased at the feeding site and increased towards the periphery of the gall. Peroxidase, acidic phosphatase and leucine aminopeptidase activities were highest at the incision. No differences in enzyme activities could be detected between the two cultivars tested.
Finite key analysis for symmetric attacks in quantum key distribution
We introduce a constructive method to calculate the achievable secret key
rate for a generic class of quantum key distribution protocols, when only a
finite number n of signals is given. Our approach is applicable to all
scenarios in which the quantum state shared by Alice and Bob is known. In
particular, we consider the six state protocol with symmetric eavesdropping
attacks, and show that for a small number of signals, i.e. below the order of
10^4, the finite key rate differs significantly from the asymptotic value for n
approaching infinity. However, for larger n, a good approximation of the
asymptotic value is found. We also study secret key rates for protocols using
higher-dimensional quantum systems.Comment: 9 pages, 5 figure
- …