37 research outputs found

    Development of passive bistatic radars based on orthogonal frequency-division multiplexing modulated signals for short and medium range surveillance

    Get PDF
    The main activity conducted during the research activity is the development of PBR systems based on OFDM signals of opportunity. In particular, a DAB based PBR for air traffic control (ATC) applications and a DVB-T based PBR for maritime surveillance have been objects of study

    Disturbance removal in passive radar via sliding extensive cancellation algorithm (ECA-S)

    Get PDF
    In this paper an advanced version of the Extensive Cancellation Algorithm (ECA) is proposed for robust disturbance cancellation and target detection in passive radar. Firstly some specific limitations of previous ECA versions are identified when dealing with a highly time-varying disturbance scenario in the presence of slowly moving targets. Specifically, the need to rapidly adapt the filter coefficients is shown to yield undesired effects on low Doppler target echoes, along with the expected partial cancellation. Therefore a sliding version of the ECA is presented which operates on partially overlapped signals batches. The proposed modification to the original ECA is shown to appropriately counteract the limitations above by taking advantage of a smooth estimate of the filter coefficients. The benefits of the proposed approach are demonstrated against experimental data sets accounting for quite different passive radar applications

    Lung adenocarcinoma originates from retrovirus infection of proliferating type 2 pneumocytes during pulmonary post-natal development or tissue repair

    Get PDF
    Jaagsiekte sheep retrovirus (JSRV) is a unique oncogenic virus with distinctive biological properties. JSRV is the only virus causing a naturally occurring lung cancer (ovine pulmonary adenocarcinoma, OPA) and possessing a major structural protein that functions as a dominant oncoprotein. Lung cancer is the major cause of death among cancer patients. OPA can be an extremely useful animal model in order to identify the cells originating lung adenocarcinoma and to study the early events of pulmonary carcinogenesis. In this study, we demonstrated that lung adenocarcinoma in sheep originates from infection and transformation of proliferating type 2 pneumocytes (termed here lung alveolar proliferating cells, LAPCs). We excluded that OPA originates from a bronchioalveolar stem cell, or from mature post-mitotic type 2 pneumocytes or from either proliferating or non-proliferating Clara cells. We show that young animals possess abundant LAPCs and are highly susceptible to JSRV infection and transformation. On the contrary, healthy adult sheep, which are normally resistant to experimental OPA induction, exhibit a relatively low number of LAPCs and are resistant to JSRV infection of the respiratory epithelium. Importantly, induction of lung injury increased dramatically the number of LAPCs in adult sheep and rendered these animals fully susceptible to JSRV infection and transformation. Furthermore, we show that JSRV preferentially infects actively dividing cell in vitro. Overall, our study provides unique insights into pulmonary biology and carcinogenesis and suggests that JSRV and its host have reached an evolutionary equilibrium in which productive infection (and transformation) can occur only in cells that are scarce for most of the lifespan of the sheep. Our data also indicate that, at least in this model, inflammation can predispose to retroviral infection and cancer

    Schmallenberg virus pathogenesis, tropism and interaction with the innate immune system of the host

    Get PDF
    Schmallenberg virus (SBV) is an emerging orthobunyavirus of ruminants associated with outbreaks of congenital malformations in aborted and stillborn animals. Since its discovery in November 2011, SBV has spread very rapidly to many European countries. Here, we developed molecular and serological tools, and an experimental in vivo model as a platform to study SBV pathogenesis, tropism and virus-host cell interactions. Using a synthetic biology approach, we developed a reverse genetics system for the rapid rescue and genetic manipulation of SBV. We showed that SBV has a wide tropism in cell culture and “synthetic” SBV replicates in vitro as efficiently as wild type virus. We developed an experimental mouse model to study SBV infection and showed that this virus replicates abundantly in neurons where it causes cerebral malacia and vacuolation of the cerebral cortex. These virus-induced acute lesions are useful in understanding the progression from vacuolation to porencephaly and extensive tissue destruction, often observed in aborted lambs and calves in naturally occurring Schmallenberg cases. Indeed, we detected high levels of SBV antigens in the neurons of the gray matter of brain and spinal cord of naturally affected lambs and calves, suggesting that muscular hypoplasia observed in SBV-infected lambs is mostly secondary to central nervous system damage. Finally, we investigated the molecular determinants of SBV virulence. Interestingly, we found a biological SBV clone that after passage in cell culture displays increased virulence in mice. We also found that a SBV deletion mutant of the non-structural NSs protein (SBVΔNSs) is less virulent in mice than wild type SBV. Attenuation of SBV virulence depends on the inability of SBVΔNSs to block IFN synthesis in virus infected cells. In conclusion, this work provides a useful experimental framework to study the biology and pathogenesis of SBV

    COVID-19 symptoms at hospital admission vary with age and sex: results from the ISARIC prospective multinational observational study

    Get PDF
    Background: The ISARIC prospective multinational observational study is the largest cohort of hospitalized patients with COVID-19. We present relationships of age, sex, and nationality to presenting symptoms. Methods: International, prospective observational study of 60 109 hospitalized symptomatic patients with laboratory-confirmed COVID-19 recruited from 43 countries between 30 January and 3 August 2020. Logistic regression was performed to evaluate relationships of age and sex to published COVID-19 case definitions and the most commonly reported symptoms. Results: ‘Typical’ symptoms of fever (69%), cough (68%) and shortness of breath (66%) were the most commonly reported. 92% of patients experienced at least one of these. Prevalence of typical symptoms was greatest in 30- to 60-year-olds (respectively 80, 79, 69%; at least one 95%). They were reported less frequently in children (≀ 18 years: 69, 48, 23; 85%), older adults (≄ 70 years: 61, 62, 65; 90%), and women (66, 66, 64; 90%; vs. men 71, 70, 67; 93%, each P < 0.001). The most common atypical presentations under 60 years of age were nausea and vomiting and abdominal pain, and over 60 years was confusion. Regression models showed significant differences in symptoms with sex, age and country. Interpretation: This international collaboration has allowed us to report reliable symptom data from the largest cohort of patients admitted to hospital with COVID-19. Adults over 60 and children admitted to hospital with COVID-19 are less likely to present with typical symptoms. Nausea and vomiting are common atypical presentations under 30 years. Confusion is a frequent atypical presentation of COVID-19 in adults over 60 years. Women are less likely to experience typical symptoms than men

    Shaping the Glitch: Optimizing Voltage Fault Injection Attacks

    No full text
    Voltage fault injection is a powerful active side channel attack that modifies the execution-flow of a device by creating disturbances on the power supply line. The attack typically aims at skipping security checks or generating side-channels that gradually leak sensitive data, including the firmware code. In this paper we propose a new voltage fault injection technique that generates fully arbitrary voltage glitch waveforms using off-the-shelf and low cost equipment. To show the effectiveness of our setup, we present new, unpublished firmware extraction attacks on six microcontrollers from three major manufacturers: STMicroelectronics, Texas Instruments and Renesas Electronics that, in 2016 declared a market of 1.5billion,1.5 billion, 800 million and $2.5 billion on units sold, respectively. Among the presented attacks, the most challenging ones exploit multiple vulnerabilities and inject over one million glitches, heavily leveraging on the performance and repeatability of the new proposed technique. We perform a thorough evaluation of arbitrary glitch waveforms by comparing the attack performance against two other major V-FI techniques in the literature. Along a responsible disclosure policy, all the vulnerabilities have been timely reported to the manufacturers

    Shaping the Glitch: Optimizing Voltage Fault Injection Attacks

    No full text
    Voltage fault injection is a powerful active side channel attack that modifies the execution-flow of a device by creating disturbances on the power supply line. The attack typically aims at skipping security checks or generating side-channels that gradually leak sensitive data, including the firmware code. In this paper we propose a new voltage fault injection technique that generates fully arbitrary voltage glitch waveforms using off-the-shelf and low cost equipment. To show the effectiveness of our setup, we present new, unpublished firmware extraction attacks on six microcontrollers from three major manufacturers: STMicroelectronics, Texas Instruments and Renesas Electronics that, in 2016 declared a market of 1.5billion,1.5 billion, 800 million and $2.5 billion on units sold, respectively. Among the presented attacks, the most challenging ones exploit multiple vulnerabilities and inject over one million glitches, heavily leveraging on the performance and repeatability of the new proposed technique. We perform a thorough evaluation of arbitrary glitch waveforms by comparing the attack performance against two other major V-FI techniques in the literature. Along a responsible disclosure policy, all the vulnerabilities have been timely reported to the manufacturers

    Sliding extensive cancellation algorithm for disturbance removal in passive radar

    No full text
    In this paper an advanced version of the extensive cancellation algorithm (ECA) is proposed for robust disturbance cancellation and target detection in passive radar. Firstly some specific limitations of previous ECA versions are identified when dealing with a highly time-varying disturbance scenario in the presence of slowly moving targets. Specifically, the need to rapidly adapt the filter coefficients is shown to yield undesired effects on low Doppler target echoes, along with the expected partial cancellation. Therefore a sliding version of the ECA is presented which operates on partially overlapped signal batches. The proposed modification to the original ECA is shown to appropriately counteract the limitations above by taking advantage of a smooth estimate of the filter coefficients. An efficient implementation is also discussed to limit the corresponding computational load. The benefits of the proposed approach are demonstrated against real data sets accounting for quite different passive radar applications

    Block based channelization technique for Delay-Doppler map evaluation in passive radar

    No full text
    In this paper we present a low cost sub-optimum technique for the evaluation of the two-dimensional (Delay-Doppler) Cross-Correlation Function in passive radar. Its performance is characterized both in terms of computational load and expected signal-to-noise ratio (SNR) loss, compared to optimum efficient algorithms and alternative sub-optimum approaches. The comparison is conducted with reference to typical case studies representative of aerial or maritime surveillance applications. The proposed approach is shown to allow a better control of the SNR loss to be accepted that can be more flexibly traded with the computational burden. Therefore it can be regarded as an effective solution for real time operation in computationally intensive scenarios as those expected for passive radar based on digital video broadcast transmissions

    APDU-Level Attacks in PKCS#11 Devices

    No full text
    In this paper we describe attacks on PKCS#11 devices that we successfully mounted by interacting with the low-level APDU protocol, used to communicate with the device. They exploit proprietary implementation weaknesses which allow attackers to bypass the security enforced at the PKCS#11 level. Some of the attacks leak, as cleartext, sensitive cryptographic keys in devices that were previously considered secure. We present a new threat model for the PKCS#11 middleware and we discuss the new attacks with respect to various attackers and application configurations. All the attacks presented in this paper have been timely reported to manufacturers following a responsible disclosure process
    corecore