15 research outputs found

    On Renyi Entropies and their Applications to Guessing Attacks in Cryptography

    Get PDF
    We consider single and multiple attacker scenarios in guessing and obtain bounds on various success parameters in terms of Renyi entropies. We also obtain a new derivation of the union bound

    Graph Based Framework for Malicious Insider Threat Detection

    Get PDF
    While most security projects have focused on fending off attacks coming from outside the organizational boundaries, a real threat has arisen from the people who are inside those perimeter protections. \ Insider threats have shown their power by hugely affecting national security, financial stability, and the privacy of many thousands of people. What is in the news is the tip of the iceberg, with much more going on under the radar, and some threats never being detected. We propose a hybrid framework based on graphical analysis and anomaly detection approaches, to combat this severe cyber security threat. Our framework analyzes heterogeneous data in isolating possible malicious users hiding behind others. Empirical results reveal this framework to be effective in distinguishing the majority of users who demonstrate typical behavior from the minority of users who show suspicious behavior.

    Differentiation induction in acute promyelocytic leukemia

    Get PDF
    Hematopoiesis or blood cell formation is a continuous process in which maturing hematopoietic cells with a limited life span are formed. The formation of all different blood cell lineages originates from a small population of pluripotent stem cells that reside in the bone marrow. Progenitor cells that are committed to a certain lineage of differentiation orginate from these pluripotent stem cells. Hematopoiesis is regulated by a network of cytokines and hematopoietic growth factors (HGF). The HGFs are produced locally by stromal cells. mature blood cells, endothelial cells or specialized cells in organs such as lungs, liver and kidney. The levels of HGFs are elevated in response to extracellular stimuli, such as infection or bleeding, when a rapid rise of specific blood cell types is necessary. HGFs exert their effect by binding to their corresponding receptors expressed on the membrane of their target cells. Ligand binding results in the activation of downstream signaling pathways. A cascade of phosphorylation events is involved in signal transduction. In one pathway, the JAK Uanus kinase) family of protein tyrosine kinases are tyrosine phosphorylated and in turn activate a family of latent cytoplasmic transcription factors, called STAT (Signal Transduction and Activation of Transcription) proteins. Following their activation, these STAT proteins are assembled into complexes which then translocate to the nucleus and activate target genes by interaction with specific DNA sequences. Another major HGF receptor signal transduction pathway includes proteins that belong to the Ras family. Signaling molecules like Shc and Grb2 function as adaptor proteins in this pathway by linking phosphorylated receptors to downstream effectors. Grb2 binds to the activated receptor, and to Sos (Son of sevenless) which after translocation to the plasma membrane activates Ras triggering phosphorylation of Rat. The products of Raf, a serine tyrosine kinase and mitogen activated protein kinases (MAPK) transmit signals for futher transmission to the nucleus. In the nucleus, activation of transcription factors by phosphorylation or other mechanisms results in activation of genes involved in cellular proliferation and differentiation. Apart from affecting transcription, activated Ras results in cyclin D1 activation and stimulates p27kip1 degradation via Rho. Both events positively infiuence cell cycle entry (Figure 1.2)

    Insider threat detection through attributed graph clustering

    Full text link

    CDMA over QAM and other Arbitrary Energy Constellations

    No full text
    Welch and Sidelnikov lower bounds on the maximum nontrivial correlations of complex signal sets apply to the constrained case of uniform signal energy and have long been used as a benchmark for testing the merit of signal sets in the design of good CDMA sequence families. Welch's lower bound is generalized here to the arbitrary signal energy case and applied to CDMA over QAM modulation. The generalized lower bound is compared to the original bound and an explicit QAM-CDMA family is constructed.

    Lower Bounds on the Maximum Periodic and Aperiodic Correlation of Signal Sets with Arbitrary Energy Distribution

    No full text
    THIS IS AN UPDATED VERSION OF THE ORIGINAL PAPER Welch and Sidelnikov have obtained lower bounds on the maximum nontrivial correlations of complex signal sets constrained to have uniform signal energy. These results have long been used as a benchmark for testing the merit of signal sets, e.g., in the design of good CDMA sequence families. The Welch lower bound is generalized here to allow for arbitrary signal energy for each member of the signal set, with a view towards considering the application of CDMA to QAM signals. The generalized lower bound is compared to the original bound and a bound on their ratio is also derived. An example of a QAM-CDMA sequence family concludes the paper.

    State cycles, initialization and the Trivium stream cipher

    No full text
    Trivium is a keystream generator for a binary additive synchronous stream cipher. It was selected in the final portfolio for the Profile 2 category of the eSTREAM project. The keystream generator is constructed using bit- based shift registers. In this paper we present an alternate representation of Trivium using word-based shift registers, with a word size of three bits. This representation is useful for determining cycles of internal state values. Under this representation it is clear that the state space can be partitioned into subspaces and that over some of these subspaces the state update function is effectively linear. The role of the initialization process is critical in ensuring the states used for generating keystream are updated nonlinearly at some point, as the state update function alone does not provide this

    Randomness testing and comparison of classical and quantum bit generators

    No full text
    Randomness is crucial to enabling secure and robust communications. Ideally one should harness high entropy physical processes, but this is difficult so pseudorandomness is usually substituted for randomness. We introduce improved complexity randomness tests and use them to judge three pseudorandom bit generators; the AES block cipher (standard, strongly believed to be secure), the Dragon stream cipher (eStream finalist), and the GNU C library function rand(). We also test the output from a quantum random bit generator (QRBG). While the two ciphers can easily be distinguished from the much inferior rand(), the output statistics of the two classical generators are similar to that of the QRBG, and both provide high-quality pseudorandom bits

    Randomized Traitor Tracing Algorithms for Broadcast Security

    No full text
    We introduce and analyze a randomized traitor tracing algorithm for broadcast security
    corecore