211 research outputs found

    Enforcing Programming Guidelines with Region Types and Effects

    Full text link
    We present in this paper a new type and effect system for Java which can be used to ensure adherence to guidelines for secure web programming. The system is based on the region and effect system by Beringer, Grabowski, and Hofmann. It improves upon it by being parametrized over an arbitrary guideline supplied in the form of a finite monoid or automaton and a type annotation or mockup code for external methods. Furthermore, we add a powerful type inference based on precise interprocedural analysis and provide an implementation in the Soot framework which has been tested on a number of benchmarks including large parts of the Stanford SecuriBench.Comment: long version of APLAS'17 pape

    Algebras for parameterised monads

    Get PDF
    Parameterised monads have the same relationship to adjunctions with parameters as monads do to adjunctions. In this paper, we investigate algebras for parameterised monads. We identify the Eilenberg-Moore category of algebras for parameterised monads and prove a generalisation of Beck’s theorem characterising this category. We demonstrate an application of this theory to the semantics of type and effect systems

    Safer in the Clouds (Extended Abstract)

    Full text link
    We outline the design of a framework for modelling cloud computing systems.The approach is based on a declarative programming model which takes the form of a lambda-calculus enriched with suitable mechanisms to express and enforce application-level security policies governing usages of resources available in the clouds. We will focus on the server side of cloud systems, by adopting a pro-active approach, where explicit security policies regulate server's behaviour.Comment: In Proceedings ICE 2010, arXiv:1010.530

    The PER model of abstract non-interference

    Get PDF
    Abstract. In this paper, we study the relationship between two models of secure information flow: the PER model (which uses equivalence relations) and the abstract non-interference model (which uses upper closure operators). We embed the lattice of equivalence relations into the lattice of closures, re-interpreting abstract non-interference over the lattice of equivalence relations. For narrow abstract non-interference, we show non-interference it is strictly less general. The relational presentation of abstract non-interference leads to a simplified construction of the most concrete harmless attacker. Moreover, the PER model of abstract noninterference allows us to derive unconstrained attacker models, which do not necessarily either observe all public information or ignore all private information. Finally, we show how abstract domain completeness can be used for enforcing the PER model of abstract non-interference

    Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services

    Get PDF
    Web services are distributed software components, that are decoupled from each other using interfaces with specified functional behaviors. However, such behavioral specifications are insufficient to demonstrate compliance with certain temporal non-functional policies. An example is demonstrating that a patient’s health-related query sent to a health care service is answered only by a doctor (and not by a secretary). Demonstrating compliance with such policies is important for satisfying governmental privacy regulations. It is often necessary to expose the internals of the web service implementation for demonstrating such compliance, which may compromise modularity. In this work, we provide a language design that enables such demonstrations, while hiding majority of the service’s source code. The key idea is to use greybox specifications to allow service providers to selectively hide and expose parts of their implementation. The overall problem of showing compliance is then reduced to two subproblems: whether the desired properties are satisfied by the service’s greybox specification, and whether this greybox specification is satisfied by the service’s implementation. We specify policies using LTL and solve the first problem by model checking. We solve the second problem by refinement techniques

    Bayesian modeling of recombination events in bacterial populations

    Get PDF
    Background: We consider the discovery of recombinant segments jointly with their origins within multilocus DNA sequences from bacteria representing heterogeneous populations of fairly closely related species. The currently available methods for recombination detection capable of probabilistic characterization of uncertainty have a limited applicability in practice as the number of strains in a data set increases. Results: We introduce a Bayesian spatial structural model representing the continuum of origins over sites within the observed sequences, including a probabilistic characterization of uncertainty related to the origin of any particular site. To enable a statistically accurate and practically feasible approach to the analysis of large-scale data sets representing a single genus, we have developed a novel software tool (BRAT, Bayesian Recombination Tracker) implementing the model and the corresponding learning algorithm, which is capable of identifying the posterior optimal structure and to estimate the marginal posterior probabilities of putative origins over the sites. Conclusion: A multitude of challenging simulation scenarios and an analysis of real data from seven housekeeping genes of 120 strains of genus Burkholderia are used to illustrate the possibilities offered by our approach. The software is freely available for download at URL http://web.abo.fi/fak/ mnf//mate/jc/software/brat.html

    Una pretensión desmedida, pero necesaria

    Get PDF
    Presentación del número 11 de la revista Renglones con el tema de Cultura. La cultura como concepto ha sido estudiada desde diferentes enfoques, ramas del saber o tradiciones científicas, todas contribuyendo con su propia versión de lo que es cultura. Se revisan algunas definiciones realizadas por Edward Burnet Tylor, Antonio Gramsci, Gilberto Giménez y Pierre Bourdieu. Se enfatiza en la importancia de la producción y del estudio de la cultura desde la universidad y se da una introducción a los textos presentados en esta edición

    Intasome architecture and chromatin density modulate retroviral integration into nucleosome

    Get PDF
    BACKGROUND: Retroviral integration depends on the interaction between intasomes, host chromatin and cellular targeting cofactors as LEDGF/p75 or BET proteins. Previous studies indicated that the retroviral integrase, by itself, may play a role in the local integration site selection within nucleosomal target DNA. We focused our study on this local association by analyzing the intrinsic properties of various retroviral intasomes to functionally accommodate different chromatin structures in the lack of other cofactors. RESULTS: Using in vitro conditions allowing the efficient catalysis of full site integration without these cofactors, we show that distinct retroviral integrases are not equally affected by chromatin compactness. Indeed, while PFV and MLV integration reactions are favored into dense and stable nucleosomes, HIV-1 and ASV concerted integration reactions are preferred into poorly dense chromatin regions of our nucleosomal acceptor templates. Predicted nucleosome occupancy around integration sites identified in infected cells suggests the presence of a nucleosome at the MLV and HIV-1 integration sites surrounded by differently dense chromatin. Further analyses of the relationships between the in vitro integration site selectivity and the structure of the inserted DNA indicate that structural constraints within intasomes could account for their ability to accommodate nucleosomal DNA and could dictate their capability to bind nucleosomes functionally in these specific chromatin contexts. CONCLUSIONS: Thus, both intasome architecture and compactness of the chromatin surrounding the targeted nucleosome appear important determinants of the retroviral integration site selectivity. This supports a mechanism involving a global targeting of the intasomes toward suitable chromatin regions followed by a local integration site selection modulated by the intrinsic structural constraints of the intasomes governing the target DNA bending and dictating their sensitivity toward suitable specific nucleosomal structures and density

    Unexpected Inheritance: Multiple Integrations of Ancient Bornavirus and Ebolavirus/Marburgvirus Sequences in Vertebrate Genomes

    Get PDF
    Vertebrate genomes contain numerous copies of retroviral sequences, acquired over the course of evolution. Until recently they were thought to be the only type of RNA viruses to be so represented, because integration of a DNA copy of their genome is required for their replication. In this study, an extensive sequence comparison was conducted in which 5,666 viral genes from all known non-retroviral families with single-stranded RNA genomes were matched against the germline genomes of 48 vertebrate species, to determine if such viruses could also contribute to the vertebrate genetic heritage. In 19 of the tested vertebrate species, we discovered as many as 80 high-confidence examples of genomic DNA sequences that appear to be derived, as long ago as 40 million years, from ancestral members of 4 currently circulating virus families with single strand RNA genomes. Surprisingly, almost all of the sequences are related to only two families in the Order Mononegavirales: the Bornaviruses and the Filoviruses, which cause lethal neurological disease and hemorrhagic fevers, respectively. Based on signature landmarks some, and perhaps all, of the endogenous virus-like DNA sequences appear to be LINE element-facilitated integrations derived from viral mRNAs. The integrations represent genes that encode viral nucleocapsid, RNA-dependent-RNA-polymerase, matrix and, possibly, glycoproteins. Integrations are generally limited to one or very few copies of a related viral gene per species, suggesting that once the initial germline integration was obtained (or selected), later integrations failed or provided little advantage to the host. The conservation of relatively long open reading frames for several of the endogenous sequences, the virus-like protein regions represented, and a potential correlation between their presence and a species' resistance to the diseases caused by these pathogens, are consistent with the notion that their products provide some important biological advantage to the species. In addition, the viruses could also benefit, as some resistant species (e.g. bats) may serve as natural reservoirs for their persistence and transmission. Given the stringent limitations imposed in this informatics search, the examples described here should be considered a low estimate of the number of such integration events that have persisted over evolutionary time scales. Clearly, the sources of genetic information in vertebrate genomes are much more diverse than previously suspected

    The Defective Prophage Pool of Escherichia coli O157: Prophage–Prophage Interactions Potentiate Horizontal Transfer of Virulence Determinants

    Get PDF
    Bacteriophages are major genetic factors promoting horizontal gene transfer (HGT) between bacteria. Their roles in dynamic bacterial genome evolution have been increasingly highlighted by the fact that many sequenced bacterial genomes contain multiple prophages carrying a wide range of genes. Enterohemorrhagic Escherichia coli O157 is the most striking case. A sequenced strain (O157 Sakai) possesses 18 prophages (Sp1–Sp18) that encode numerous genes related to O157 virulence, including those for two potent cytotoxins, Shiga toxins (Stx) 1 and 2. However, most of these prophages appeared to contain multiple genetic defects. To understand whether these defective prophages have the potential to act as mobile genetic elements to spread virulence determinants, we looked closely at the Sp1–Sp18 sequences, defined the genetic defects of each Sp, and then systematically analyzed all Sps for their biological activities. We show that many of the defective prophages, including the Stx1 phage, are inducible and released from O157 cells as particulate DNA. In fact, some prophages can even be transferred to other E. coli strains. We also show that new Stx1 phages are generated by recombination between the Stx1 and Stx2 phage genomes. The results indicate that these defective prophages are not simply genetic remnants generated in the course of O157 evolution, but rather genetic elements with a high potential for disseminating virulence-related genes and other genetic traits to other bacteria. We speculate that recombination and various other types of inter-prophage interactions in the O157 prophage pool potentiate such activities. Our data provide new insights into the potential activities of the defective prophages embedded in bacterial genomes and lead to the formulation of a novel concept of inter-prophage interactions in defective prophage communities
    • …
    corecore