736 resultados para forgery attacks, algebraic attacks, collision attacks, sidechannel attacks


Relevância:

50.00% 50.00%

Publicador:

Resumo:

In the recent decade, the request for structural health monitoring expertise increased exponentially in the United States. The aging issues that most of the transportation structures are experiencing can put in serious jeopardy the economic system of a region as well as of a country. At the same time, the monitoring of structures is a central topic of discussion in Europe, where the preservation of historical buildings has been addressed over the last four centuries. More recently, various concerns arose about security performance of civil structures after tragic events such the 9/11 or the 2011 Japan earthquake: engineers looks for a design able to resist exceptional loadings due to earthquakes, hurricanes and terrorist attacks. After events of such a kind, the assessment of the remaining life of the structure is at least as important as the initial performance design. Consequently, it appears very clear that the introduction of reliable and accessible damage assessment techniques is crucial for the localization of issues and for a correct and immediate rehabilitation. The System Identification is a branch of the more general Control Theory. In Civil Engineering, this field addresses the techniques needed to find mechanical characteristics as the stiffness or the mass starting from the signals captured by sensors. The objective of the Dynamic Structural Identification (DSI) is to define, starting from experimental measurements, the modal fundamental parameters of a generic structure in order to characterize, via a mathematical model, the dynamic behavior. The knowledge of these parameters is helpful in the Model Updating procedure, that permits to define corrected theoretical models through experimental validation. The main aim of this technique is to minimize the differences between the theoretical model results and in situ measurements of dynamic data. Therefore, the new model becomes a very effective control practice when it comes to rehabilitation of structures or damage assessment. The instrumentation of a whole structure is an unfeasible procedure sometimes because of the high cost involved or, sometimes, because it’s not possible to physically reach each point of the structure. Therefore, numerous scholars have been trying to address this problem. In general two are the main involved methods. Since the limited number of sensors, in a first case, it’s possible to gather time histories only for some locations, then to move the instruments to another location and replay the procedure. Otherwise, if the number of sensors is enough and the structure does not present a complicate geometry, it’s usually sufficient to detect only the principal first modes. This two problems are well presented in the works of Balsamo [1] for the application to a simple system and Jun [2] for the analysis of system with a limited number of sensors. Once the system identification has been carried, it is possible to access the actual system characteristics. A frequent practice is to create an updated FEM model and assess whether the structure fulfills or not the requested functions. Once again the objective of this work is to present a general methodology to analyze big structure using a limited number of instrumentation and at the same time, obtaining the most information about an identified structure without recalling methodologies of difficult interpretation. A general framework of the state space identification procedure via OKID/ERA algorithm is developed and implemented in Matlab. Then, some simple examples are proposed to highlight the principal characteristics and advantage of this methodology. A new algebraic manipulation for a prolific use of substructuring results is developed and implemented.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Los algoritmos basados en registros de desplazamiento con realimentación (en inglés FSR) se han utilizado como generadores de flujos pseudoaleatorios en aplicaciones con recursos limitados como los sistemas de apertura sin llave. Se considera canal primario a aquel que se utiliza para realizar una transmisión de información. La aparición de los ataques de canal auxiliar (en inglés SCA), que explotan información filtrada inintencionadamente a través de canales laterales como el consumo, las emisiones electromagnéticas o el tiempo empleado, supone una grave amenaza para estas aplicaciones, dado que los dispositivos son accesibles por un atacante. El objetivo de esta tesis es proporcionar un conjunto de protecciones que se puedan aplicar de forma automática y que utilicen recursos ya disponibles, evitando un incremento sustancial en los costes y alargando la vida útil de aplicaciones que puedan estar desplegadas. Explotamos el paralelismo existente en algoritmos FSR, ya que sólo hay 1 bit de diferencia entre estados de rondas consecutivas. Realizamos aportaciones en tres niveles: a nivel de sistema, utilizando un coprocesador reconfigurable, a través del compilador y a nivel de bit, aprovechando los recursos disponibles en el procesador. Proponemos un marco de trabajo que nos permite evaluar implementaciones de un algoritmo incluyendo los efectos introducidos por el compilador considerando que el atacante es experto. En el campo de los ataques, hemos propuesto un nuevo ataque diferencial que se adapta mejor a las condiciones de las implementaciones software de FSR, en las que el consumo entre rondas es muy similar. SORU2 es un co-procesador vectorial reconfigurable propuesto para reducir el consumo energético en aplicaciones con paralelismo y basadas en el uso de bucles. Proponemos el uso de SORU2, además, para ejecutar algoritmos basados en FSR de forma segura. Al ser reconfigurable, no supone un sobrecoste en recursos, ya que no está dedicado en exclusiva al algoritmo de cifrado. Proponemos una configuración que ejecuta múltiples algoritmos de cifrado similares de forma simultánea, con distintas implementaciones y claves. A partir de una implementación sin protecciones, que demostramos que es completamente vulnerable ante SCA, obtenemos una implementación segura a los ataques que hemos realizado. A nivel de compilador, proponemos un mecanismo para evaluar los efectos de las secuencias de optimización del compilador sobre una implementación. El número de posibles secuencias de optimizaciones de compilador es extremadamente alto. El marco de trabajo propuesto incluye un algoritmo para la selección de las secuencias de optimización a considerar. Debido a que las optimizaciones del compilador transforman las implementaciones, se pueden generar automáticamente implementaciones diferentes combinamos para incrementar la seguridad ante SCA. Proponemos 2 mecanismos de aplicación de estas contramedidas, que aumentan la seguridad de la implementación original sin poder considerarse seguras. Finalmente hemos propuesto la ejecución paralela a nivel de bit del algoritmo en un procesador. Utilizamos la forma algebraica normal del algoritmo, que automáticamente se paraleliza. La implementación sobre el algoritmo evaluado mejora en rendimiento y evita que se filtre información por una ejecución dependiente de datos. Sin embargo, es más vulnerable ante ataques diferenciales que la implementación original. Proponemos una modificación del algoritmo para obtener una implementación segura, descartando parcialmente ejecuciones del algoritmo, de forma aleatoria. Esta implementación no introduce una sobrecarga en rendimiento comparada con las implementaciones originales. En definitiva, hemos propuesto varios mecanismos originales a distintos niveles para introducir aleatoridad en implementaciones de algoritmos FSR sin incrementar sustancialmente los recursos necesarios. ABSTRACT Feedback Shift Registers (FSR) have been traditionally used to implement pseudorandom sequence generators. These generators are used in Stream ciphers in systems with tight resource constraints, such as Remote Keyless Entry. When communicating electronic devices, the primary channel is the one used to transmit the information. Side-Channel Attack (SCA) use additional information leaking from the actual implementation, including power consumption, electromagnetic emissions or timing information. Side-Channel Attacks (SCA) are a serious threat to FSR-based applications, as an attacker usually has physical access to the devices. The main objective of this Ph.D. thesis is to provide a set of countermeasures that can be applied automatically using the available resources, avoiding a significant cost overhead and extending the useful life of deployed systems. If possible, we propose to take advantage of the inherent parallelism of FSR-based algorithms, as the state of a FSR differs from previous values only in 1-bit. We have contributed in three different levels: architecture (using a reconfigurable co-processor), using compiler optimizations, and at bit level, making the most of the resources available at the processor. We have developed a framework to evaluate implementations of an algorithm including the effects introduced by the compiler. We consider the presence of an expert attacker with great knowledge on the application and the device. Regarding SCA, we have presented a new differential SCA that performs better than traditional SCA on software FSR-based algorithms, where the leaked values are similar between rounds. SORU2 is a reconfigurable vector co-processor. It has been developed to reduce energy consumption in loop-based applications with parallelism. In addition, we propose its use for secure implementations of FSR-based algorithms. The cost overhead is discarded as the co-processor is not exclusively dedicated to the encryption algorithm. We present a co-processor configuration that executes multiple simultaneous encryptions, using different implementations and keys. From a basic implementation, which is proved to be vulnerable to SCA, we obtain an implementation where the SCA applied were unsuccessful. At compiler level, we use the framework to evaluate the effect of sequences of compiler optimization passes on a software implementation. There are many optimization passes available. The optimization sequences are combinations of the available passes. The amount of sequences is extremely high. The framework includes an algorithm for the selection of interesting sequences that require detailed evaluation. As existing compiler optimizations transform the software implementation, using different optimization sequences we can automatically generate different implementations. We propose to randomly switch between the generated implementations to increase the resistance against SCA.We propose two countermeasures. The results show that, although they increase the resistance against SCA, the resulting implementations are not secure. At bit level, we propose to exploit bit level parallelism of FSR-based implementations using pseudo bitslice implementation in a wireless node processor. The bitslice implementation is automatically obtained from the Algebraic Normal Form of the algorithm. The results show a performance improvement, avoiding timing information leakage, but increasing the vulnerability against differential SCA.We provide a secure version of the algorithm by randomly discarding part of the data obtained. The overhead in performance is negligible when compared to the original implementations. To summarize, we have proposed a set of original countermeasures at different levels that introduce randomness in FSR-based algorithms avoiding a heavy overhead on the resources required.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Asthma, laryngitis and chronic cough are atypical symptoms of the gastroesophageal reflux disease. To analyze the efficacy of laparoscopic surgery in the remission of extra-esophageal symptoms in patients with gastroesophageal reflux, related to asthma. Were reviewed the medical records of 400 patients with gastroesophageal reflux disease submitted to laparoscopic Nissen fundoplication from 1994 to 2006, and identified 30 patients with extra-esophageal symptoms related to asthma. The variables considered were: gender, age, gastroesophageal symptoms (heartburn, acid reflux and dysphagia), time of reflux disease, treatment with proton pump inhibitor, use of specific medications, treatment and evolution, number of attacks and degree of esophagitis. Data were subjected to statistical analysis, comparing the pre- and post-surgical findings. The comparative analysis before surgery (T1) and six months after surgery (T2) showed a significant reduction on heartburn and reflux symptoms. Apart from that, there was a significant difference between the patients with daily crises of asthma (T1 versus T2, 45.83% to 16.67%, p=0.0002) and continuous crises (T1, 41.67% versus T2, 8.33%, p=0.0002). Laparoscopic Nissen fundoplication was effective in improving symptoms that are typical of reflux disease and clinical manifestations of asthma.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

It is well known that trichomes protect plant organs, and several studies have investigated their role in the adaptation of plants to harsh environments. Recent studies have shown that the production of hydrophilic substances by glandular trichomes and the deposition of this secretion on young organs may facilitate water retention, thus preventing desiccation and favouring organ growth until the plant develops other protective mechanisms. Lychnophora diamantinana is a species endemic to the Brazilian 'campos rupestres' (rocky fields), a region characterized by intense solar radiation and water deficits. This study sought to investigate trichomes and the origin of the substances observed on the stem apices of L. diamantinana. Samples of stem apices, young and expanded leaves were studied using standard techniques, including light microscopy and scanning and transmission electron microscopy. Histochemical tests were used to identify the major groups of metabolites present in the trichomes and the hyaline material deposited on the apices. Non-glandular trichomes and glandular trichomes were observed. The material deposited on the stem apices was hyaline, highly hydrophilic and viscous. This hyaline material primarily consists of carbohydrates that result from the partial degradation of the cell wall of uniseriate trichomes. This degradation occurs at the same time that glandular trichomes secrete terpenoids, phenolic compounds and proteins. These results suggest that the non-glandular trichomes on the leaves of L. diamantinana help protect the young organ, particularly against desiccation, by deposition of highly hydrated substances on the apices. Furthermore, the secretion of glandular trichomes probably repels herbivore and pathogen attacks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Ammonium nitrate fuel oil (ANFO) is an explosive used in many civil applications. In Brazil, ANFO has unfortunately also been used in criminal attacks, mainly in automated teller machine (ATM) explosions. In this paper, we describe a detailed characterization of the ANFO composition and its two main constituents (diesel and a nitrate explosive) using high resolution and accuracy mass spectrometry performed on an FT-ICR-mass spectrometer with electrospray ionization (ESI(±)-FTMS) in both the positive and negative ion modes. Via ESI(-)-MS, an ion marker for ANFO was characterized. Using a direct and simple ambient desorption/ionization technique, i.e., easy ambient sonic-spray ionization mass spectrometry (EASI-MS), in a simpler, lower accuracy but robust single quadrupole mass spectrometer, the ANFO ion marker was directly detected from the surface of banknotes collected from ATM explosion theft.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Moyamoya is a chronic progressive cerebrovascular disease with characteristic angiographic findings and a clinical picture with episodes of transient ischemic attacks, headache, seizures, hemiparesis, which may resolve after surgical treatment. We describe the case of a girl with the typical findings of the disease, comparing them before and after surgery with the use of neuropsychological tests, neurological examination and laboratory tests.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Multiple endocrine neoplasia type 1 (MEN1) is an autosomal dominant hereditary cancer syndrome characterized mostly by parathyroid, enteropancreatic, and anterior pituitary tumors. We present a case of an 8-year-old boy referred because of hypoglycemic attacks. His diagnosis was pancreatic insulinoma. Paternal grandmother died due to repeated gastroduodenal ulcerations and a paternal aunt presented similar manifestations. At a first evaluation, the father presented only gastric ulceration but subsequently developed hyperparathyroidism and lung carcinoid tumor. During almost 15 years of follow-up, three brothers and the index case presented hyperparathyroidism and hyperprolactinemia. Molecular study showed a G to A substitution in intron 4, at nine nucleotides upstream of the splicing acceptor site, causing a splicing mutation. All affected members of the family have the same mutation. Paternal grandmother and aunt were not studied and the mother does not carry any mutation. MEN1 is a rare condition that requires permanent medical assistance. Early clinical and genetic identification of affected individuals is essential for their own surveillance and also for genetic counseling.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

OBJETIVO: Estimar a prevalência de sintomas respiratórios e analisar fatores associados, bem como medidas de pico de fluxo expiratório em escolares. MÉTODOS: Estudo descritivo transversal com escolares de dez a 14 anos de Monte Aprazível, SP. Foram aplicados questionários sobre sintomas de asma e de rinite do protocolo International Study of Asthma and Allergies in Childhood, questões sociodemográficas, fatores predisponentes e antecedentes pessoais e familiares. Foram realizadas medidas repetidas do pico de fluxo expiratório nas crianças e dos níveis de concentração de material particulado (MP2,5) e de black carbon. RESULTADOS: A prevalência de sintomas de asma foi de 11% e de 33,2% de rinite; 10,6% apresentaram mais de quatro crises de sibilos nos últimos 12 meses. Antecedentes familiares para bronquite e rinite associaram-se à presença de asma (p = 0,002 e p < 0,001) e de rinite atuais (p < 0,001 e p < 0,001, respectivamente). Para rinite, houve associação com presença de mofo ou rachadura na casa (p = 0,009). Houve maior freqüência de rinite nos meses de junho a outubro, período de safra da cana de açúcar. Prevalência diária de pico de fluxo expiratório abaixo de 20% da mediana de medidas na criança foi maior em dias com maior concentração de MP2,5. CONCLUSÕES: A prevalência de sintomas de asma está abaixo e a de rinite está acima da média nacional. Ainda que dentro dos níveis aceitáveis, a poluição nos períodos de queima da palha da cana-de-açúcar pode contribuir para a exacerbação de episódios de asma e de rinite.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Paracoccidioidomycosis (PCM), endemic in Latin America, is a progressive systemic mycosis caused by Paracoccidioides brasiliensis (P. brasiliensis), which primarily attacks lung tissue. Dendritic cells (DCs) are able to initiate a response in naive T cells, and they also participate in Th-cell education. Furthermore, these cells have been used for therapy in several disease models. Here we transfected DCs with a plasmid (pMAC/PS-scFv) encoding a single chain variable fragment (scFv) of an anti-Id antibody that is capable of mimicking gp43, the main antigenic component of P. brasiliensis. First, Balb/c mice were immunized subcutaneously with pMAC/PS-scFv and, after seven days, scFv protein was presented to the regional lymph nodes cells. Moreover, we showed that the DCs transfected with scFv were capable of efficiently activating proliferation of total lymph node cells and inducing a decrease in lung infection. Therefore, our results suggested that the use of scFv-transfected DCs may be a promising therapy in the paracoccidioidomycosis (PCM) model.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We describe a case of a spontaneously established mixed colony of two species of stingless bees. The host colony of Scaptotrigona depilis, an aggressive bee that forms large colonies, was invaded by workers of Nannotrigona testaceicornis, a smaller bee that forms small colonies. The host colony and the invading species colony were maintained in next boxes about 1.5 m apart. The N. testaceicornis colony had been recently divided. Observations were made daily for 10 min, and every two weeks the colony was opened for observations within the nest. Initially the host colony bees repulsed the invading species, but as their numbers built up, they were no longer able to defend the entrance. An estimated 60-90 N. testaceicornis workers lived integrated into the colony of S. depilis for 58 days. During this period, they reconstructed and maintained the entrance tube, changing it to an entrance typical of N. testaceicornis. They also collected food and building material for the host colony. Nannotrigona testaceicornis tolerated transit of S. depilis through the entrance, but did not allow the host species to remain within the tube, though the attacks never resulted in bee mortality. Aggression was limited to biting the wings; when the bees fell to the ground they immediately separated and flew back. There have been very few reports of spontaneously occurring mixed stingless bee colonies. It is difficult to determine what caused the association that we found; probably workers of N. testaceicornis got lost when we split their colony, and then they invaded the colony of S. depilis.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Objective: In this paper we evaluated the effect of two fluoridated agents and Nd:YAG irradiation separately and in combination on dentine resistance to erosion. Background Data: The morphological changes in dentin induced by laser treatment may reduce the progression of erosive lesions. Due to the possibility of a synergistic effect of laser with fluoride, this study was conducted. Materials and Methods: Eighty bovine dentine samples (4 x 4 mm) were randomly divided into eight groups, according to the following treatments: G1: untreated (control); G2: acidic phosphate fluoride gel (APF 1.23%) for 4 min; G3: fluoride varnish (NaF 2.26%) for 6 h; G4: 0.5 W Nd: YAG laser (250 mu sec pulse, 10 Hz, 35 J/cm(2), 30 sec); G5: 0.75 W Nd: YAG laser (52.5 J/cm(2)); G6: 1.0 W Nd: YAG laser (70 J/cm(2)); G7: APF + 0.75 W Nd: YAG laser; and G8: NaF + 0.75 W Nd: YAG laser. After the treatments, half of each dentine surface was protected with nail varnish. The samples were stored in artificial saliva (30 mL/sample) for 24 h and submitted to four erosive 1-min cycles. Between the erosive attacks, the blocks were maintained in artificial saliva for 59 min. The erosive wear was evaluated by profilometry. Results: The mean wear (+/- SD, mu m) was: G1: 1.20 +/- 0.20; G2: 0.47 +/- 0.06; G3: 0.81 +/- 0.11; G4: 1.47 +/- 0.32; G5: 1.52 +/- 0.24; G6: 1.49 +/- 0.30; G7: 0.49 +/- 0.11; and G8: 1.06 +/- 0.31 (Tukey's test, p < 0.05). Conclusions: Laser irradiation was not able to reduce dentine erosion. However, fluoride application was able to increase the dentine's resistance to erosion, and APF showed better results than fluoride varnish.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Substantial evidence points to melatonin as playing a role in the regulation of circadian rhythms, sleep, and headache disorders. The objective of the study was to assess 6-sulphatoxymelatonin (aMT6s) levels in a large consecutive series of patients with migraine, comparing with controls. A total of 220 subjects were evaluated-146 had migraine and 74 were control subjects. Urinary samples were collected into the same plastic container since 8:00 p.m. to 8:00 a.m. of the next day (12-h period) and aMT6s was measured with quantitative ELISA technique. Among patients with migraine, 53% presented pain on the day of the urine samples collection. Their urinary aMT6s concentration was significantly lower than in the urine of patients without pain [14.0 +/- 7.3 vs. 49.4 +/- 19.0; t(143) = -15.1; 95% CI = -40.0 to -30.8; P<0.001]. There was no significant difference in the aMT6s concentration of patients with migraine without pain on the day of their urine samples collection and controls [49.4 +/- 19.0 vs. 42.5 +/- 27.9; t(140) = 1.7; 95% CI = -1.2 to 14.8; P = 0.094]. To our knowledge, this is the first study to demonstrate reduction in melatonin levels during attacks in episodic and chronic migraine.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

During the first half of 2006 the city of Sao Paulo suffered three series of violent attacks against the security forces, civilians, and the government. The violent campaign also included a massive rebellion in prisons and culminated in the kidnapping of a journalist and the broadcast of a manifesto from the criminal organization PCC threatening the police and the government. Right after, the main device used to contain organized crime in the prisons was declared unconstitutional. This episode represents a prototypical example of the use of media-focused terrorism by organized crime for projection into the political communication arena.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A phase-only encryption/decryption scheme with the readout based on the zeroth-order phase-contrast technique (ZOPCT), without the use of a phase-changing plate on the Fourier plane of an optical system based on the 4f optical correlator, is proposed. The encryption of a gray-level image is achieved by multiplying the phase distribution obtained directly from the gray-level image by a random phase distribution. The robustness of the encoding is assured by the nonlinearity intrinsic to the proposed phase-contrast method and the random phase distribution used in the encryption process. The experimental system has been implemented with liquid-crystal spatial modulators to generate phase-encrypted masks and a decrypting key. The advantage of this method is the easy scheme to recover the gray-level information from the decrypted phase-only mask applying the ZOPCT. An analysis of this decryption method was performed against brute force attacks. (C) 2009 Society of Photo-Optical Instrumentation Engineers. [DOI: 10.1117/1.3223629]

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of the security against state-of-the-art cryptanalysis methods is also provided. In comparison to the algorithms submitted to the SHA-3 competition, Whirlwind takes recent developments in cryptanalysis into account by design. Even though software performance is not outstanding, it compares favourably with the 512-bit versions of SHA-3 candidates such as LANE or the original CubeHash proposal and is about on par with ECHO and MD6.