833 research outputs found

    Efficient design and evaluation of countermeasures against fault attacks using formal verification

    Get PDF
    This paper presents a formal verification framework and tool that evaluates the robustness of software countermeasures against fault-injection attacks. By modeling reference assembly code and its protected variant as automata, the framework can generate a set of equations for an SMT solver, the solutions of which represent possible attack paths. Using the tool we developed, we evaluated the robustness of state-of-the-art countermeasures against fault injection attacks. Based on insights gathered from this evaluation, we analyze any remaining weaknesses and propose applications of these countermeasures that are more robust

    Combined effect of local isolate Spodoptera littoralis nucleopolyhedrosis virus and Bacillus thuringiensis on Culex pipiens L. larvae (Culicidae: Diptera)

    Get PDF
    AbstractA local isolate of Spodoptera littoralis nucleopolyhedrosis virus (SlNPV) showed pathogenicity against Culex pipiens larvae, its long incubation period was broken using a combination between SlNPV and Bacillus thuringiensis subsp. kurstaki (Btk). Laboratory bioassay tests revealed that Culex pipiens 3rd larval instars were susceptible to the applied combination. Data revealed that the addition of Btk generally increased the toxic effect of SlNPV since LC50 decreased from 1.3×103PIB/ml (for SlNPV alone) to 3.6×102 mixed polyhedra and spores/ml (SlNPV-Btk combination), indicating a synergistic ratio of 3.6. LC95 was surprisingly 137-folds dropped as well. The addition of SlNPV generally increased the toxic effect of Btk at a low concentration, where the LC50 outstandingly decreased from 2.5×105spores/ml (for Btk) to 3.6×102 mixed polyhedra and spores/ml (for SlNPV-Btk combination), indicating a synergistic ratio of 6.9×102

    CP Violation In Single Top Production And Decay Via p p-bar -> t b-bar +X -> W^+ b b-bar +X Within The MSSM: A Possible Application For Measuring \arg(A_t) At Hadron Colliders

    Full text link
    CP-nonconserving effects in the reaction p p-bar -> t b-bar +X -> W^+ b b-bar +X, driven by the supersymmetric CP-odd phase of the stop trilinear soft breaking term, \arg(A_t), are studied. We discuss the CP-nonconserving effects in both production and the associated decay amplitudes of the top. We find that, within a plausible low energy scenario of the MSSM and keeping the neutron electric dipole moment below its current limit, a CP-violating cross-section asymmetry as large as 2-3% can arise if some of the parameters lie in a favorable range. A partial rate asymmetry originating only in the top decay t -> W^+ b is found to be, in general, below the 0.1% level which is somewhat smaller than previous claims. For a low \tan\beta of order one the decay asymmetry can reach at the most ~0.3%. This (few) percent level overall CP-violating signal in p p-bar -> t b-bar +X -> W^+ b b-bar +X might be within the reach of the future 2(4) TeV pp-bar Tevatron collider that may be able to produce ~10000(~30000) such tb-bar events with an integrated luminosity of 30 fb^{-1}. In particular, it may be used to place an upper bound on \arg(A_t) if indeed \arg(\mu) -> 0, as implied from the present experimental limit on the neutron electric dipole moment. The partial rate asymmetry in the top decay (~few \times 10^{-3}) may also be within the reach of the LHC with ~10^7 pairs of tt-bar produced, provided detector systematics are sufficiently small. We also show that if the GUT-scale universality of the soft breaking trilinear AA terms is relaxed, then the phases associated with \arg A_u and \arg A_d can take values up to ~few \times 10^{-1} even with squarks and gluino masses of several hundred GeV's without contradicting the experimental limit on the neutron electric dipole moment.Comment: 39 pages, plain latex, 20 figures embadded in the text using epsfi

    Strong negative self regulation of Prokaryotic transcription factors increases the intrinsic noise of protein expression

    Get PDF
    Background Many prokaryotic transcription factors repress their own transcription. It is often asserted that such regulation enables a cell to homeostatically maintain protein abundance. We explore the role of negative self regulation of transcription in regulating the variability of protein abundance using a variety of stochastic modeling techniques. Results We undertake a novel analysis of a classic model for negative self regulation. We demonstrate that, with standard approximations, protein variance relative to its mean should be independent of repressor strength in a physiological range. Consequently, in that range, the coefficient of variation would increase with repressor strength. However, stochastic computer simulations demonstrate that there is a greater increase in noise associated with strong repressors than predicted by theory. The discrepancies between the mathematical analysis and computer simulations arise because with strong repressors the approximation that leads to Michaelis-Menten-like hyperbolic repression terms ceases to be valid. Because we observe that strong negative feedback increases variability and so is unlikely to be a mechanism for noise control, we suggest instead that negative feedback is evolutionarily favoured because it allows the cell to minimize mRNA usage. To test this, we used in silico evolution to demonstrate that while negative feedback can achieve only a modest improvement in protein noise reduction compared with the unregulated system, it can achieve good improvement in protein response times and very substantial improvement in reducing mRNA levels. Conclusions Strong negative self regulation of transcription may not always be a mechanism for homeostatic control of protein abundance, but instead might be evolutionarily favoured as a mechanism to limit the use of mRNA. The use of hyperbolic terms derived from quasi-steady-state approximation should also be avoided in the analysis of stochastic models with strong repressors

    Comparing angular and curved shapes in terms of implicit associations and approach/avoidance responses.

    Get PDF
    Most people prefer smoothly curved shapes over more angular shapes. We investigated the origin of this effect using abstract shapes and implicit measures of semantic association and preference. In Experiment 1 we used a multidimensional Implicit Association Test (IAT) to verify the strength of the association of curved and angular polygons with danger (safe vs. danger words), valence (positive vs. negative words) and gender (female vs. male names). Results showed that curved polygons were associated with safe and positive concepts and with female names, whereas angular polygons were associated with danger and negative concepts and with male names. Experiment 2 used a different implicit measure, which avoided any need to categorise the stimuli. Using a revised version of the Stimulus Response Compatibility (SRC) task we tested with a stick figure (i.e., the manikin) approach and avoidance reactions to curved and angular polygons. We found that RTs for approaching vs. avoiding angular polygons did not differ, even in the condition where the angles were more pronounced. By contrast participants were faster and more accurate when moving the manikin towards curved shapes. Experiment 2 suggests that preference for curvature cannot derive entirely from an association of angles with threat. We conclude that smoothly curved contours make these abstract shapes more pleasant. Further studies are needed to clarify the nature of such a preference

    Networked buffering: a basic mechanism for distributed robustness in complex adaptive systems

    Get PDF
    A generic mechanism - networked buffering - is proposed for the generation of robust traits in complex systems. It requires two basic conditions to be satisfied: 1) agents are versatile enough to perform more than one single functional role within a system and 2) agents are degenerate, i.e. there exists partial overlap in the functional capabilities of agents. Given these prerequisites, degenerate systems can readily produce a distributed systemic response to local perturbations. Reciprocally, excess resources related to a single function can indirectly support multiple unrelated functions within a degenerate system. In models of genome:proteome mappings for which localized decision-making and modularity of genetic functions are assumed, we verify that such distributed compensatory effects cause enhanced robustness of system traits. The conditions needed for networked buffering to occur are neither demanding nor rare, supporting the conjecture that degeneracy may fundamentally underpin distributed robustness within several biotic and abiotic systems. For instance, networked buffering offers new insights into systems engineering and planning activities that occur under high uncertainty. It may also help explain recent developments in understanding the origins of resilience within complex ecosystems. \ud \u

    Single Top Production as a Window to Physics Beyond the Standard Model

    Get PDF
    Production of single top quarks at a high energy hadron collider is studied as a means to identify physics beyond the standard model related to the electroweak symmetry breaking. The sensitivity of the ss-channel WW^* mode, the tt-channel WW-gluon fusion mode, and the \tw mode to various possible forms of new physics is assessed, and it is found that the three modes are sensitive to different forms of new physics, indicating that they provide complimentary information about the properties of the top quark. Polarization observables are also considered, and found to provide potentially useful information about the structure of the interactions of top.Comment: References added and minor discussion improvements; results unchanged; Version to be published in PR

    The bashful and the boastful : prestigious leaders and social change in Mesolithic Societies

    Get PDF
    The creation and maintenance of influential leaders and authorities is one of the key themes of archaeological and historical enquiry. However the social dynamics of authorities and leaders in the Mesolithic remains a largely unexplored area of study. The role and influence of authorities can be remarkably different in different situations yet they exist in all societies and in almost all social contexts from playgrounds to parliaments. Here we explore the literature on the dynamics of authority creation, maintenance and contestation in egalitarian societies, and discuss the implications for our interpretation and understanding of the formation of authorities and leaders and changing social relationships within the Mesolithic

    A Fast and Compact RISC-V Accelerator for Ascon and Friends

    Get PDF
    Ascon-p is the core building block of Ascon, the winner in the lightweight category of the CAESAR competition. With ISAP, another Ascon-p-based AEAD scheme is currently competing in the 2nd round of the NIST lightweight cryptography standardization project. In contrast to Ascon, ISAP focuses on providing hardening/protection against a large class of implementation attacks, such as DPA, DFA, SFA, and SIFA, entirely on mode-level. Consequently, Ascon-p can be used to realize a wide range of cryptographic computations such as authenticated encryption, hashing, pseudorandom number generation, with or without the need for implementation security, which makes it the perfect choice for lightweight cryptography on embedded devices. In this paper, we implement Ascon-p as an instruction extension for RISC-V that is tightly coupled to the processors register file and thus does not require any dedicated registers. This single instruction allows us to realize all cryptographic computations that typically occur on embedded devices with high performance. More concretely, with ISAP and Ascon\u27s family of modes for AEAD and hashing, we can perform cryptographic computations with a performance of about 2 cycles/byte, or about 4 cycles/byte if protection against fault attacks and power analysis is desired. As we show, our instruction extension requires only 4.7 kGE, or about half the area of dedicated Ascon co-processor designs, and is easy to integrate into low-end embedded devices like 32-bit ARM Cortex-M or RISC-V microprocessors. Finally, we analyze the provided implementation security of ISAP, when implemented using our instruction extension
    corecore