753 research outputs found

    Evidence for a neutral grain boundary barrier in chalcopyrites

    Get PDF
    Single grain boundaries in CuGaSe2 have been grown epitaxially. Hall measurements indicate a barrier of 30 40 meV to majority carrier transport. Nevertheless, local surface potential measurements show the absence of space charge around the grain boundary, i.e. it is neutral. Theoretical calculations [Persson and Zunger, Phys. Rev. Lett. 91, 266401 2003 ] have predicted a neutral barrier for the present S3 grain boundary. Thus, we have experimentally shown the existence of a neutral grain boundary barrier, however, smaller than theoretically predicte

    Side-channel based intrusion detection for industrial control systems

    Full text link
    Industrial Control Systems are under increased scrutiny. Their security is historically sub-par, and although measures are being taken by the manufacturers to remedy this, the large installed base of legacy systems cannot easily be updated with state-of-the-art security measures. We propose a system that uses electromagnetic side-channel measurements to detect behavioural changes of the software running on industrial control systems. To demonstrate the feasibility of this method, we show it is possible to profile and distinguish between even small changes in programs on Siemens S7-317 PLCs, using methods from cryptographic side-channel analysis.Comment: 12 pages, 7 figures. For associated code, see https://polvanaubel.com/research/em-ics/code

    Two Single Nucleotide Polymorphisms Identify the Highest-Risk Diabetes HLA Genotype: Potential for Rapid Screening

    Get PDF
    OBJECTIVE—People with the HLA genotype DRB1*0301-DQA1*0501-DQB1*0201/DRB1*04-DQA1*0301-DQB1*0302 (DR3/4-DQ8) are at the highest risk of developing type 1 diabetes. We sought to find an inexpensive, rapid test to identify DR3/4-DQ8 subjects using two single nucleotide polymorphisms (SNPs)

    Insulin autoantibodies as determined by competitive radiobinding assay are positively correlated with impaired beta-cell function — The Ulm-Frankfurt population study

    Get PDF
    Out of a random population of 4208 non-diabetic pupils without a family history of Type I diabetes 44 (1.05%) individuals had islet cell antibody (ICA) levels greater or equal to 5 Juvenile Diabetes Foundation (JDF) units. 39 of these ICA-positives could be repeatedly tested for circulating insulin autoantibodies (CIAA) using a competitive radiobinding assay. The results were compared with the insulin responses in the intravenous glucose tolerance tests (IVGTT) and with HLA types. Six pupils were positive for CIAA. All of them had complement-fixing ICA, and 5 of them were HLA-DR4 positive. Three of the 6 showed a first-phase insulin response below the first percentile of normal controls. Our data indicate that in population-based studies CIAA can be considered as a high risk marker for impaired beta-cell function in non-diabetic ICA-positive individuals

    Conclave: ontology-driven measurement of semantic relatedness between source code elements and problem domain concepts

    Get PDF
    Software maintainers are often challenged with source code changes to improve software systems, or eliminate defects, in unfamiliar programs. To undertake these tasks a sufficient understanding of the system (or at least a small part of it) is required. One of the most time consuming tasks of this process is locating which parts of the code are responsible for some key functionality or feature. Feature (or concept) location techniques address this problem. This paper introduces Conclave, an environment for software analysis, and in particular the Conclave-Mapper tool that provides a feature location facility. This tool explores natural language terms used in programs (e.g. function and variable names), and using textual analysis and a collection of Natural Language Processing techniques, computes synonymous sets of terms. These sets are used to score relatedness between program elements, and search queries or problem domain concepts, producing sorted ranks of program elements that address the search criteria, or concepts. An empirical study is also discussed to evaluate the underlying feature location technique.info:eu-repo/semantics/publishedVersio

    Efficient template attacks

    Get PDF
    This is the accepted manuscript version. The final published version is available from http://link.springer.com/chapter/10.1007/978-3-319-08302-5_17.Template attacks remain a powerful side-channel technique to eavesdrop on tamper-resistant hardware. They model the probability distribution of leaking signals and noise to guide a search for secret data values. In practice, several numerical obstacles can arise when implementing such attacks with multivariate normal distributions. We propose efficient methods to avoid these. We also demonstrate how to achieve significant performance improvements, both in terms of information extracted and computational cost, by pooling covariance estimates across all data values. We provide a detailed and systematic overview of many different options for implementing such attacks. Our experimental evaluation of all these methods based on measuring the supply current of a byte-load instruction executed in an unprotected 8-bit microcontroller leads to practical guidance for choosing an attack algorithm.Omar Choudary is a recipient of the Google Europe Fellowship in Mobile Security, and this research is supported in part by this Google Fellowship
    • 

    corecore