94 research outputs found

    Attack trees in Isabelle

    Get PDF
    In this paper, we present a proof theory for attack trees. Attack trees are a well established and useful model for the construction of attacks on systems since they allow a stepwise exploration of high level attacks in application scenarios. Using the expressiveness of Higher Order Logic in Isabelle, we succeed in developing a generic theory of attack trees with a state-based semantics based on Kripke structures and CTL. The resulting framework allows mechanically supported logic analysis of the meta-theory of the proof calculus of attack trees and at the same time the developed proof theory enables application to case studies. A central correctness and completeness result proved in Isabelle establishes a connection between the notion of attack tree validity and CTL. The application is illustrated on the example of a healthcare IoT system and GDPR compliance verification

    Patterning enhanced tetragonality in BiFeO3 thin films with effective negative pressure by helium implantation

    Get PDF
    Helium implantation in epitaxial thin films is a way to control the out-of-plane deformation independentlyfrom the in-plane strain controlled by epitaxy. In particular, implantation by means of a helium microscopeallows for local implantation and patterning down to the nanometer resolution, which is of interest for deviceapplications. We present here a study of bismuth ferrite (BiFeO3) films where strain was patterned locally byhelium implantation. Our combined Raman, x-ray diffraction, and transmission electron microscopy (TEM)study shows that the implantation causes an elongation of the BiFeO3unit cell and ultimately a transition towardsthe so-called supertetragonal polymorph via states with mixed phases. In addition, TEM reveals the onset ofamorphization at a threshold dose that does not seem to impede the overall increase in tetragonality. The phasetransition from the R-like to T-like BiFeO3appears as first-order in character, with regions of phase coexistenceand abrupt changes in lattice parameters

    Recent Updates on the Melanin-Concentrating Hormone (MCH) and Its Receptor System: Lessons from MCH1R Antagonists

    Get PDF
    Melanin-concentrating hormone (MCH) is a 19-amino-acid cyclic peptide which was originally found to lighten skin color in fish that is highly conserved among many species. MCH interacts with two G-protein-coupled receptors, MCH1R and MCH2R, but only MCH1R is expressed in rodents. MCH is mainly synthesized in the lateral hypothalamus and zona incerta, while MCH1R is widely expressed throughout the brain. Thus, MCH signaling is implicated in the regulation of many physiological functions. The identification of MCH1R has led to the development of small-molecule MCH1R antagonists that can block MCH signaling. MCH1R antagonists are useful not only for their potential therapeutic value, but also for understanding the physiological functions of the endogenous MCH system. Here, we review the physiological functions of the MCH system which have been investigated using MCH1R antagonists such as food intake, anxiety, depression, reward, and sleep. This will help us understand the physiological functions of the MCH system and suggest some of the potential applications of MCH1R antagonists in human disorders

    Computing with bacterial constituents, cells and populations: from bioputing to bactoputing

    Get PDF
    The relevance of biological materials and processes to computing—aliasbioputing—has been explored for decades. These materials include DNA, RNA and proteins, while the processes include transcription, translation, signal transduction and regulation. Recently, the use of bacteria themselves as living computers has been explored but this use generally falls within the classical paradigm of computing. Computer scientists, however, have a variety of problems to which they seek solutions, while microbiologists are having new insights into the problems bacteria are solving and how they are solving them. Here, we envisage that bacteria might be used for new sorts of computing. These could be based on the capacity of bacteria to grow, move and adapt to a myriad different fickle environments both as individuals and as populations of bacteria plus bacteriophage. New principles might be based on the way that bacteria explore phenotype space via hyperstructure dynamics and the fundamental nature of the cell cycle. This computing might even extend to developing a high level language appropriate to using populations of bacteria and bacteriophage. Here, we offer a speculative tour of what we term bactoputing, namely the use of the natural behaviour of bacteria for calculating

    S]Guanosine-5Ј-O-(3-thio)triphosphate Binding as a Measure of Efficacy at Human Recombinant Dopamine D 4.4 Receptors: Actions of Antiparkinsonian and Antipsychotic Agents

    No full text
    ABSTRACT Molecular biology techniques have enabled the cloning and pharmacological characterization of multiple dopamine receptor subtypes belonging to two families. D 1 and D 5 receptors exhibit high structural homology and similar pharmacological profiles . Likewise, D 2 , D 3 and D 4 receptors exhibit similarities in both their pharmacological profiles and their coupling to G proteins and signal transduction pathways (Levesque et al., 1992

    Attack Trees: A Notion of Missing Attacks

    No full text
    International audienceAttack trees are widely used for security modeling and risk analysis. Classically, an attack tree combines possible actions of the attacker into attacks. In most existing approaches, an attack tree represents generic ways of attacking a system, but without taking any specific system or its configuration into account. This means that such a generic attack tree may contain attacks that are not applicable to the analyzed system, and also that a given system could enable some attacks that the attack tree did not capture.To overcome this problem, we extend the attack tree setting with a model of the analyzed system, allowing us to introduce precise path semantics of an attack tree and to define missing attacks. We investigate the missing attack existence problem and show how to solve it by calls to the NP oracle that answers the trace attack tree membership problem; the latter problem has been implemented and is available as an open source prototype
    • 

    corecore