13 research outputs found

    Moniteur hybride de flux d'information pour un langage supportant des pointeurs

    Get PDF
    National audienceLes nouvelles approches combinant contrÎle dynamique et statique de flux d'information sont prometteuses puisqu'elles permettent une approche permissive tout en garantissant la correction de l'analyse réalisée vis-à-vis de la non-interférence. Dans ce papier, nous présentons une approche hybride de suivi de flux d'information pour un langage gérant des pointeurs. Nous formalisons la sémantique d'un moniteur sensible aux flux de données qui combine analyse statique et dynamique. Nous prouvons ensuite la correction de notre moniteur vis-à-vis de la non-interférence

    The Cardinal Abstraction for Quantitative Information Flow

    Get PDF
    International audienceQualitative information flow aims at detecting information leaks, whereas the emerging quantitative techniques target the estimation of information leaks. Quantifying information flow in the presence of low inputs is challenging, since the traditional techniques of approximating and counting the reachable states of a program no longer suffice. This paper proposes an automated quantitative information flow analysis for imperative deterministic programs with low inputs. The approach relies on a novel abstract domain, the cardinal abstraction, in order to compute a precise upper-bound over the maximum leakage of batch-job programs. We prove the soundness of the cardinal abstract domain by relying on the framework of abstract interpretation. We also prove its precision with respect to a flow-sensitive type system for the two-point security lattice

    Male Oxidative Stress Infertility (MOSI): Proposed Terminology and Clinical Practice Guidelines for Management of Idiopathic Male Infertility

    Get PDF
    Despite advances in the field of male reproductive health, idiopathic male infertility, in which a man has altered semen characteristics without an identifiable cause and there is no female factor infertility, remains a challenging condition to diagnose and manage. Increasing evidence suggests that oxidative stress (OS) plays an independent role in the etiology of male infertility, with 30% to 80% of infertile men having elevated seminal reactive oxygen species levels. OS can negatively affect fertility via a number of pathways, including interference with capacitation and possible damage to sperm membrane and DNA, which may impair the sperm’s potential to fertilize an egg and develop into a healthy embryo. Adequate evaluation of male reproductive potential should therefore include an assessment of sperm OS. We propose the term Male Oxidative Stress Infertility, or MOSI, as a novel descriptor for infertile men with abnormal semen characteristics and OS, including many patients who were previously classified as having idiopathic male infertility. Oxidation-reduction potential (ORP) can be a useful clinical biomarker for the classification of MOSI, as it takes into account the levels of both oxidants and reductants (antioxidants). Current treatment protocols for OS, including the use of antioxidants, are not evidence-based and have the potential for complications and increased healthcare-related expenditures. Utilizing an easy, reproducible, and cost-effective test to measure ORP may provide a more targeted, reliable approach for administering antioxidant therapy while minimizing the risk of antioxidant overdose. With the increasing awareness and understanding of MOSI as a distinct male infertility diagnosis, future research endeavors can facilitate the development of evidence-based treatments that target its underlying cause

    Approches qualitatives et quantitatives d'analyse de programmes : mise en oeuvre permissive de flux d’information sĂ©curisĂ©s

    No full text
    Computers have become widespread nowadays. All these computers store and process information. Often, some of this information is sensitive; hence the need to confine and control its dissemination. An important field in computer science, that is concerned about analysing programs in order to confine and control the release of sensitive information, is the information flow control field. The contributions of this thesis include program analysis techniques for qualitative and quantitative information flow control. Qualitative techniques aim at detecting and preventing information leaks. Quantitative techniques go beyong the detection of information leaks, by estimating the leakage in order to decide whether it is negligeable.De nos jours, les ordinateurs sont omniprĂ©sents. Tous ces ordinateurs stockent et manipulent de l'information, parfois sensible, d'oĂč l'intĂ©rĂȘt de protĂ©ger et de confiner la dissĂ©mination de cette information. Les mĂ©canismes de contrĂŽle de flux d'information permettent justement d'analyser des programmes manipulant de l'information sensible, afin de prĂ©venir les fuites d'information. Les contributions de cette thĂšse incluent des techniques d'analyse de programmes pour le contrĂŽle de flux d'information tant qualitatif que quantitatif. Les techniques d'analyse qualitatives permettent la dĂ©tection et la prĂ©vention des fuites d'information. Les techniques quantitatives permettent d'estimer ces fuites afin de dĂ©cider si elles sont nĂ©gligeables

    Utilisation de méthodes hybrides pour la détection d'intrusion paramétrée par la politique de sécurité reposant sur le suivi des flux d'information

    No full text
    Les systĂšmes d'information sont de nos jours de plus en plus confrontĂ©s Ă  de nombreux risques menaçant leur sĂ©curitĂ©. La protection de ces systĂšmes suppose, dans un premier temps, de dĂ©finir une politique de sĂ©curitĂ© exprimant les besoins en terme de confidentialitĂ©, intĂ©gritĂ© et disponibilitĂ© des biens et services puis, dans un second temps, de mettre en oeuvre cette politique. GĂ©nĂ©ralement, des mĂ©canismes d'authentication et de contrĂŽles d'accĂšs sont dĂ©ployĂ©s pour la mise en oeuvre de la politique de sĂ©curitĂ©. Ils vĂ©rifient d'abord l'identitĂ© des utilisateurs puis s'assurent que ces derniers ont bien les autorisations nĂ©cessaires pour accĂ©der aux ressources du systĂšme. Cependant, il est important de noter que ces approches prĂ©ventives ne sont pas toujours suffisantes pour garantir les propriĂ©tĂ©s de sĂ©curitĂ©. Elles nĂ©cessitent la vĂ©rification et le contrĂŽle des actions des utilisateurs afin de s'assurer a posteriori que la politique est bien respectĂ©e. Intervient alors la dĂ©tection d'intrusion qui n'est autre que la dĂ©tection des violations de la politique de sĂ©curitĂ© [And80]. Plusieurs modĂšles de systĂšmes de dĂ©tection d'intrusion (IDS) ont Ă©tĂ© proposĂ©s depuis les travaux sĂ©minaux d'Anderson [FHS97, SCS98, KR02, ZMB03, HMZ+07]. Certaines approches, dites par scĂ©narios, se basent sur une connaissance a priori des attaques contre le systĂšme. D'autres, dites comportementales, dĂ©finissent plutĂŽt le comportement de rĂ©fĂ©rence du systĂšme. Ces approches comportementales ont l'avantage de pouvoir dĂ©tecter mĂȘme des attaques nouvelles contrairement aux approches par scĂ©narios. Dans le cadre de ce stage, nous nous intĂ©ressons en particulier Ă  un modĂšle comportemental de dĂ©tection d'intrusion, paramĂ©trĂ© par la politique de sĂ©curitĂ© et reposant sur le suivi du flux d'information. Ce modĂšle proposĂ© par le laboratoire SSIR, a Ă©tĂ© implĂ©mentĂ© au niveau du systĂšme d'exploitation Linux. Une deuxiĂšme implĂ©mentation a ensuite Ă©tĂ© rĂ©alisĂ©e au niveau de la machine virtuelle Java (JVM). Cette seconde implĂ©mentation (JBlare) s'intĂšgre avec la premiĂšre (Blare) et permet d'assurer un suivi dynamique du flux d'information Ă  diffĂ©rents niveaux selon les applications. L'objectif de ce stage est d'Ă©tudier les techniques d'analyse statique qui pourraient ĂȘtre mises en oeuvre pour le suivi des flux d'information au niveau des programmes Java afin de diminuer l'impact de l'analyse dynamique et amĂ©liorer la prĂ©cision du suivi

    Program Transformation for Non-interference Verification on Programs with Pointers

    Get PDF
    Part 4: Software SecurityInternational audienceNovel approaches for dynamic information flow monitoring are promising since they enable permissive (accepting a large subset of executions) yet sound (rejecting all insecure executions) enforcement of non-interference. In this paper, we present a dynamic information flow monitor for a language supporting pointers. Our flow-sensitive monitor relies on prior static analysis in order to soundly enforce non-interference. We also propose a program transformation that preserves the behavior of initial programs and soundly inlines our security monitor. This program transformation enables both dynamic and static verification of non-interference

    Lupus eritematoso sistĂȘmico associado a miastenia gravis: relato de caso Systemic lupus erythematosus and myasthenia gravis: case report

    No full text
    Os autores descrevem o caso de uma mulher branca de 24 anos de idade admitida com lupus eritematoso sistĂȘmico (com 4 anos de evolução de doença) e inĂ­cio recente de miastenia gravis. SĂŁo discutidos os principais diagnĂłsticos diferenciais para a fraqueza muscular e a fadiga apresentadas por esta paciente. Uma revisĂŁo de literatura abordando a associação de miastenia gravis e lupus eritematoso Ă© feita, com ĂȘnfase Ă s caracterĂ­sticas clĂ­nicas desses pacientes e ao papel do timoma e timectomia no desenvolvimento de lupus eritematoso em pacientes previamente miastĂȘnicos.<br>We report the case of a 24-year-old white woman admitted with a four year diagnosis of systemic lupus erythematosus and the recent onset of myasthenia gravis discussing the main differential diagnosis of weakness and fatigue in this patient. A review of literature approaching the association of myasthenia gravis and systemic lupus erythematosus is also done with emphasis on the clinical characteristics of these patients and the role of thymoma and thymectomy in the development of systemic lupus erythematosus in myasthenic patients
    corecore