250 resultados para Nucleophilic attack


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Industrial control systems (ICS) have been moving from dedicated communications to switched and routed corporate networks, making it probable that these devices are being exposed to the Internet. Many ICS have been designed with poor or little security features, making them vulnerable to potential attack. Recently, several tools have been developed that can scan the internet, including ZMap, Masscan and Shodan. However, little in-depth analysis has been done to compare these Internet-wide scanning techniques, and few Internet-wide scans have been conducted targeting ICS and protocols. In this paper we present a Taxonomy of Internet-wide scanning with a comparison of three popular network scanning tools, and a framework for conducting Internet-wide scans.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Criminology has long sought to define and understand criminal motivations. There has, however, been less attention paid to the motivations involved in “everyday” thought and behaviour that may place someone in harm’s way. This doesn’t mean that victims are somehow motivated to become victims, but they may behave in such a way that victimisation happens as a matter of course. In the parlance of victimity, victim behaviour has often been referred to as either “victim facilitated” or “victim precipitated”. However, while some use these terms to explain the role of victim behaviour in relation to harm or loss, they actually do little to further our knowledge about the cognitive and behavioural milieu in which victimisation occurs. For example, a victim of homicide may precipitate the attack by violently confronting a partner (in retaliation for real or imagined wrongs). Another victim may facilitate domestic violence by not leaving their partner for financial reasons (“cannot afford to go out on my own”). Far from blaming the victim, understanding the motivational nature of victim behaviour can be accomplished by juxtaposing motivations for offender behaviour. This presentation applies offender motivations to victim behaviours, and presents anecdotal and research support for this approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST’s contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-f[1600] permutation — the main building block of Keccak hash function.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Discussion of censorship and media freedom in the context of The Interview. A few weeks before the murderous attack by Islamic extremists on the satirical journal Charlie Hebdo, the Hollywood dream factory had its own encounter with would-be censors. The Interview (Evan Goldberg and Seth Rogen, 2014), as everyone with an interest in culture and current affairs cannot fail to be aware of by now, is a comedy in the “grossout” tradition exemplified by commercially successful movies such as Ted (Seth MacFarlane, 2012) and Bridesmaids (Paul Feig, 2011). Their humour is a combination of slapstick, physical comedy, and scatological jokes involving body fluids and the like— hence the “gross”. The best of them have been very funny, as well as bordering on the offensive (see Ted’s scene involving prostitutes, a foul-mouthed teddy bear and the entertainment value of someone taking a dump on the living room floor). They have often been controversial, as in the Farrelly brothers’ Me, Myself and Irene (2000), starring Jim Carrey as a schizophrenic police officer. At their most outrageous they have pushed the boundaries of political correctness to the limit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A simple modular strategy for the synthesis of profluorescent nitroxide containing polymers is described. The incorporation of an epoxide as a pendant functionality on a polymer backbone synthesized using ATRP and subsequent nucleophilic ring-opening with sodium azide gave hydroxyl and azide functionality within a 3-bond radius. Orthogonal coupling chemistry then allowed the independent attachment of fluorophore and nitroxide groups in close proximity, giving rise to a profluorescent polymer. Validation of the viability of these materials as fluorescent sensors is demonstrated through efficient fluorescence switch-on observed when the materials are exposed to a model reductant or carbon-centred radical source.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. Under nominal conditions (that is, when there are no attacks), the system always stays inside its safety envelope. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside the safety envelope. We synthesize safety envelopes using a modified machine learning procedure applied on data collected from the system when it is not under attack. We present experimental results that show effectiveness of our approach, and also validate the several novel features that we introduced in our learning procedure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the 21st century city, public space for a range of users, but especially children and young people, has come under threat. Watson proposed that “public space itself has come under attack from several directions-thematisation, enclosure into malls and other controlled spaces, and privatisation, or from urban planning and design interventions to erase its uniqueness”. Largely as a result of these trends, Scott observed that “young urbanites form a marginalised age class movement is restricted, out of fear and distrust, within aims to protect, monitored by city surveillance methods within the security-obsessed fabric”. The use of public space by children and young people is a contentious issue in a number of countries and a range of measures deployed to control public space curtail the rights of children and young people to claim the space for their use through curfews, oppressive camera surveillance and at times, the unwarranted attentions of police and private security personnel.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We provide the first evidence for interspecific warfare in bees, a spectacular natural phenomenon that involves a series of aerial battles and leads to thousands of fatalities from both attacking and defending colonies. Molecular analysis of fights at a hive of the Australian stingless bee Tetragonula carbonaria revealed that the attack was launched by a related species, Tetragonula hockingsi, which has only recently extended its habitat into southeastern Queensland. Following a succession of attacks by the same T. hockingsi colony over a 4-month period, the defending T. carbonaria colony was defeated and the hive usurped, with the invading colony installing a new queen. We complemented our direct observations with a 5-year study of more than 260 Tetragonula hives and found interspecific hive changes, which were likely to be usurpation events, occurring in 46 hives over this period. We discuss how fighting swarms and hive usurpation fit with theoretical predictions on the evolution of fatal fighting and highlight the many unexplained features of these battles that warrant further study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The phosphatidylinositol-3-kinase (PI3K)/Akt/mTOR pathway is one of the most frequently activated signaling pathways in prostate cancer cells, and loss of the tumor suppressor PTEN and amplification of PIK3CA are the two most commonly detected mechanisms for the activation of these pathways. Aberrant activation of PI3K/Akt/mTOR has been implicated not only in the survival and metastasis of prostate cancer cells but also in the development of drug resistance. As such, selective inactivation of this pathway may provide opportunities to attack prostate cancer from all fronts. However, while preclinical studies examining specific inhibitors of PI3K or mTOR have yielded promising results, the evidence from clinical trials is less convincing. Emerging evidence from the analyses of some solid tumors suggests that a class of dual PI3K/mTOR inhibitors, which bind to and inactivate both PI3K and mTOR, may achieve better anti-cancer outcomes. In this review, we will summarize the mechanisms of action of these inhibitors, their effectiveness when used alone or in combination with other chemotherapeutic compounds, and their potential to serve as the next generation therapies for prostate cancer patients, particularly those who are resistant to the frontline chemotherapeutic drugs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Methacrylate-based hydrogels, such as homo- and copolymers of 2-hydroxyethyl methacrylate (HEMA), have demonstrated significant potential for use in biomedical applications. However, many of these hydrogels tend to resist cell attachment and growth at their surfaces, which can be detrimental for certain applications. In this article, glycidyl methacrylate (GMA) was copolymerized with HEMA to generate gels functionalized with epoxide groups. The epoxides were then functionalized by two sequential click reactions, namely, nucleophilic ring opening of epoxides with sodium azide and then coupling of small molecules and peptides via Huisgen's copper catalyzed 1,3-dipolar cycloaddition of azides with alkynes. Using this strategy it was possible to control the degree of functionalization by controlling the feed ratio of monomers during polymerization. In vitro cell culture of human retinal pigment epithelial cell line (ARPE-19) with the hydrogels showed improved cell adhesion, growth and proliferation for hydrogels that were functionalized with a peptide containing the RGD sequence. In addition, the cell attachment progressively decreased with increasing densities of the RGD containing peptide. In summary, a facile methodology has been presented that gives rise to hydrogels with controlled degrees of functionality, such that the cell response is directly related to the levels and nature of that functionality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we analyse two variants of SIMON family of light-weight block ciphers against variants of linear cryptanalysis and present the best linear cryptanalytic results on these variants of reduced-round SIMON to date. We propose a time-memory trade-off method that finds differential/linear trails for any permutation allowing low Hamming weight differential/linear trails. Our method combines low Hamming weight trails found by the correlation matrix representing the target permutation with heavy Hamming weight trails found using a Mixed Integer Programming model representing the target differential/linear trail. Our method enables us to find a 17-round linear approximation for SIMON-48 which is the best current linear approximation for SIMON-48. Using only the correlation matrix method, we are able to find a 14-round linear approximation for SIMON-32 which is also the current best linear approximation for SIMON-32. The presented linear approximations allow us to mount a 23-round key recovery attack on SIMON-32 and a 24-round Key recovery attack on SIMON-48/96 which are the current best results on SIMON-32 and SIMON-48. In addition we have an attack on 24 rounds of SIMON-32 with marginal complexity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Two symposia on “cardiovascular diseases and vulnerable plaques” Cardiovascular disease (CVD) is the leading cause of death worldwide. Huge effort has been made in many disciplines including medical imaging, computational modeling, bio- mechanics, bioengineering, medical devices, animal and clinical studies, population studies as well as genomic, molecular, cellular and organ-level studies seeking improved methods for early detection, diagnosis, prevention and treatment of these diseases [1-14]. However, the mechanisms governing the initiation, progression and the occurrence of final acute clinical CVD events are still poorly understood. A large number of victims of these dis- eases who are apparently healthy die suddenly without prior symptoms. Available screening and diagnostic methods are insufficient to identify the victims before the event occurs [8,9]. Most cardiovascular diseases are associated with vulnerable plaques. A grand challenge here is to develop new imaging techniques, predictive methods and patient screening tools to identify vulnerable plaques and patients who are more vulnerable to plaque rupture and associated clinical events such as stroke and heart attack, and recommend proper treatment plans to prevent those clinical events from happening. Articles in this special issue came from two symposia held recently focusing on “Cardio-vascular Diseases and Vulnerable Plaques: Data, Modeling, Predictions and Clinical Applications.” One was held at Worcester Polytechnic Institute (WPI), Worcester, MA, USA, July 13-14, 2014, right after the 7th World Congress of Biomechanics. This symposium was endorsed by the World Council of Biomechanics, and partially supported by a grant from NIH-National Institute of Biomedical Image and Bioengineering. The other was held at Southeast University (SEU), Nanjing, China, April 18-20, 2014.