753 research outputs found
Evidence for a neutral grain boundary barrier in chalcopyrites
Single grain boundaries in CuGaSe2 have been grown epitaxially. Hall measurements indicate a barrier of 30 40 meV to majority carrier transport. Nevertheless, local surface potential measurements show the absence of space charge around the grain boundary, i.e. it is neutral. Theoretical calculations [Persson and Zunger, Phys. Rev. Lett. 91, 266401 2003 ] have predicted a neutral barrier for the present S3 grain boundary. Thus, we have experimentally shown the existence of a neutral grain boundary barrier, however, smaller than theoretically predicte
Side-channel based intrusion detection for industrial control systems
Industrial Control Systems are under increased scrutiny. Their security is
historically sub-par, and although measures are being taken by the
manufacturers to remedy this, the large installed base of legacy systems cannot
easily be updated with state-of-the-art security measures. We propose a system
that uses electromagnetic side-channel measurements to detect behavioural
changes of the software running on industrial control systems. To demonstrate
the feasibility of this method, we show it is possible to profile and
distinguish between even small changes in programs on Siemens S7-317 PLCs,
using methods from cryptographic side-channel analysis.Comment: 12 pages, 7 figures. For associated code, see
https://polvanaubel.com/research/em-ics/code
Two Single Nucleotide Polymorphisms Identify the Highest-Risk Diabetes HLA Genotype: Potential for Rapid Screening
OBJECTIVEâPeople with the HLA genotype DRB1*0301-DQA1*0501-DQB1*0201/DRB1*04-DQA1*0301-DQB1*0302 (DR3/4-DQ8) are at the highest risk of developing type 1 diabetes. We sought to find an inexpensive, rapid test to identify DR3/4-DQ8 subjects using two single nucleotide polymorphisms (SNPs)
Insulin autoantibodies as determined by competitive radiobinding assay are positively correlated with impaired beta-cell function â The Ulm-Frankfurt population study
Out of a random population of 4208 non-diabetic pupils without a family history of Type I diabetes 44 (1.05%) individuals had islet cell antibody (ICA) levels greater or equal to 5 Juvenile Diabetes Foundation (JDF) units. 39 of these ICA-positives could be repeatedly tested for circulating insulin autoantibodies (CIAA) using a competitive radiobinding assay. The results were compared with the insulin responses in the intravenous glucose tolerance tests (IVGTT) and with HLA types. Six pupils were positive for CIAA. All of them had complement-fixing ICA, and 5 of them were HLA-DR4 positive. Three of the 6 showed a first-phase insulin response below the first percentile of normal controls. Our data indicate that in population-based studies CIAA can be considered as a high risk marker for impaired beta-cell function in non-diabetic ICA-positive individuals
Conclave: ontology-driven measurement of semantic relatedness between source code elements and problem domain concepts
Software maintainers are often challenged with source code changes to improve software systems, or eliminate defects, in unfamiliar programs. To undertake these tasks a sufficient understanding of the system (or at least a small part of it) is required. One of the most time consuming tasks of this process is locating which parts of the code are responsible for some key functionality or feature. Feature (or concept) location techniques address this problem. This paper introduces Conclave, an environment for software analysis, and in particular the Conclave-Mapper tool that provides a feature location facility. This tool explores natural language terms used in programs (e.g. function and variable names), and using textual analysis and a collection of Natural Language Processing techniques, computes synonymous sets of terms. These sets are used to score relatedness between program elements, and search queries or problem domain concepts, producing sorted ranks of program elements that address the search criteria, or concepts. An empirical study is also discussed to evaluate the underlying feature location technique.info:eu-repo/semantics/publishedVersio
Efficient template attacks
This is the accepted manuscript version. The final published version is available from http://link.springer.com/chapter/10.1007/978-3-319-08302-5_17.Template attacks remain a powerful side-channel technique to eavesdrop on tamper-resistant hardware. They model the probability distribution of leaking signals and noise to guide a search for secret data values. In practice, several numerical obstacles can arise when implementing such attacks with multivariate normal distributions. We propose efficient methods to avoid these. We also demonstrate how to achieve significant performance improvements, both in terms of information extracted and computational cost, by pooling covariance estimates across all data values. We provide a detailed and systematic overview of many different options for implementing such attacks. Our experimental evaluation of all these methods based on measuring the supply current of a byte-load instruction executed in an unprotected 8-bit microcontroller leads to practical guidance for choosing an attack algorithm.Omar Choudary is a recipient of the Google Europe Fellowship in
Mobile Security, and this research is supported in part by this Google Fellowship
- âŠ