988 resultados para MEMBRANE ATTACK COMPLEX


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A number of tight urinary epithelia, as exemplified by the turtle bladder, acidify the luminal solution by active transport of H+ across the luminal cell membrane. The rate of active H+ transport (JH) decreases as the electrochemical potential difference for H+ [delta mu H = mu H(lumen) - mu H(serosa)] across the epithelium is increased. The luminal cell membrane has a low permeability for H+ equivalents and a high electrical resistance compared with the basolateral cell membrane. Changes in JH thus reflect changes in active H+ transport across the luminal membrane. To examine the control of JH by delta mu H in the turtle bladder, transepithelial electrical potential differences (delta psi) were imposed at constant acid-base conditions or the luminal pH was varied at delta psi = 0 and constant serosal PCO2 and pH. When the luminal compartment was acidified from pH 7 to 4 or was made electrically positive, JH decreased as a linear function of delta mu H as previously described. When the luminal compartment was made alkaline from pH 7 to 9 or was made electrically negative, JH reached a maximal value, which was the same whether the delta mu H was imposed as a delta pH or a delta psi. The nonlinear JH vs. delta mu H relation does not result from changes in the number of pumps in the luminal membrane or from changes in the intracellular pH, but is a characteristic of the H+ pumps themselves. We propose a general scheme, which, because of its structural features, can account for the nonlinearity of the JH vs. delta mu H relations and, more specifically, for the kinetic equivalence of the effects of the chemical and electrical components of delta mu H. According to this model, the pump complex consists of two components: a catalytic unit at the cytoplasmic side of the luminal membrane, which mediates the ATP-driven H+ translocation, and a transmembrane channel, which mediates the transfer of H+ from the catalytic unit to the luminal solution. These two components may be linked through a buffer compartment for H+ (an antechamber).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Membranes are essential for the integrity and function of the cell. The collective property of the lipid bilayer is critical in providing an optimal functioning environment for membrane proteins. The simple yet well-characterized bacterium Escherichia coli serves an ideal model system to study the function of specific lipids since its lipid content can be easily manipulated. The most abundant lipid in E. coli membrane is phosphatidylethanolamine (PE, 70-80%). A PE-lacking E. coli mutant displays a complex mixture of deficient phenotypes, suggesting a profound role for PE in different aspects of cell function. A novel role of PE as a topological and functional determinant for membrane proteins has been established using lactose permease (LacY) as a model protein. PE is found to be required for energy-dependent uphill transport process of LacY. In PE-lacking membranes, LacY undergoes a dramatic conformational change, and the first half of the protein adopts an inverted topology with respect to the bilayer plane. ^ The work reported here was initiated to understand the molecular properties of lipids that enable their function as topological and functional determinants for membrane proteins. A glycolipid, monoglucosyldiacylglycerol (MGlcDAG) which shares physicochemical similarities with PE, was introduced to PE-lacking E. coli membranes. The introduction of MGlcDAG suppresses many of the PE-deficient phenotypes, and in particular supports the function and native topology of LacY. ^ The lipid-sensitive topogenic signals encoded in the amino acid sequence of LacY were also identified. Native LacY adopts an inverted topology when synthesized without PE, but mutation of specific acidic residues in the cytoplasmic extra-membrane domains can prevent this inversion and supports a native topological organization of LacY in PE-lacking membranes. These results suggest that it is the interplay between the collective charge properties of the lipid bilayer and extra-membrane loops of protein that determines the final orientation of transmembrane domains. By comparing the similarities as well as differences between these two lipids, we established how specific physical and chemical properties of lipids influence various cell functions and elucidated the molecular basis for the novel role of lipids in determining membrane protein topology. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The impact of ocean acidification (OA) on coral calcification, a subject of intense current interest, is poorly understood in part because of the presence of symbionts in adult corals. Early life history stages of Acropora spp. provide an opportunity to study the effects of elevated CO(2) on coral calcification without the complication of symbiont metabolism. Therefore, we used the Illumina RNAseq approach to study the effects of acute exposure to elevated CO(2) on gene expression in primary polyps of Acropora millepora, using as reference a novel comprehensive transcriptome assembly developed for this study. Gene ontology analysis of this whole transcriptome data set indicated that CO(2) -driven acidification strongly suppressed metabolism but enhanced extracellular organic matrix synthesis, whereas targeted analyses revealed complex effects on genes implicated in calcification. Unexpectedly, expression of most ion transport proteins was unaffected, while many membrane-associated or secreted carbonic anhydrases were expressed at lower levels. The most dramatic effect of CO(2) -driven acidification, however, was on genes encoding candidate and known components of the skeletal organic matrix that controls CaCO(3) deposition. The skeletal organic matrix effects included elevated expression of adult-type galaxins and some secreted acidic proteins, but down-regulation of other galaxins, secreted acidic proteins, SCRiPs and other coral-specific genes, suggesting specialized roles for the members of these protein families and complex impacts of OA on mineral deposition. This study is the first exhaustive exploration of the transcriptomic response of a scleractinian coral to acidification and provides an unbiased perspective on its effects during the early stages of calcification.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Membrane systems are parallel and bioinspired systems which simulate membranes behavior when processing information. As a part of unconventional computing, P-systems are proven to be effective in solvingcomplexproblems. A software technique is presented here that obtain good results when dealing with such problems. The rules application phase is studied and updated accordingly to obtain the desired results. Certain rules are candidate to be eliminated which can make the model improving in terms of time.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

NADPH:protochlorophyllide oxidoreductase is a key enzyme for the light-induced greening of etiolated angiosperm plants. In barley, two POR proteins exist termed PORA and PORB that have previously been proposed to structurally and functionally cooperate in terms of a higher molecular mass light-harvesting complex named LHPP, in the prolamellar body of etioplasts [Nature 397 (1999) 80]. In this study we examined the expression pattern of LHPP during seedling etiolation and de-etiolation under different experimental conditions. Our results show that LHPP is developmentally expressed across the barley leaf gradient. We further provide evidence that LHPP operates both in plants that etiolate completely before being exposed to white light and in plants that etiolate only partially and begin light-harvesting as soon as traces of light become available in the uppermost parts of the soil. As a result of light absorption, in either case LHPP converts Pchlide a to chlorophyllide (Chlide) a and in turn disintegrates. The released Chlide a, as well as Chlide b produced upon LHPP’s light-dependent dissociation, which leads to the activation of the PORA as a Pchlide b-reducing enzyme, then bind to homologs of water-soluble chlorophyll proteins of Brassicaceae. We propose that these proteins transfer Chlide a and Chlide b to the thylakoids, where their esterification with phytol and assembly into the photosynthetic membrane complexes ultimately takes place. Presumably due to the tight coupling of LHPP synthesis and degradation, as well as WSCP formation and photosynthetic membrane assembly, efficient photo-protection is conferred onto the plant.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

La configuración de un cilindro acoplado a una semi-esfera, conocida como ’hemispherecylinder’, se considera como un modelo simplificado para numerosas aplicaciones industriales tales como fuselaje de aviones o submarinos. Por tanto, el estudio y entendimiento de los fenómenos fluidos que ocurren alrededor de dicha geometría presenta gran interés. En esta tesis se muestra la investigación del origen y evolución de los, ya conocidos, patrones de flujo (burbuja de separación, vórtices ’horn’ y vórtices ’leeward’) que se dan en esta geometría bajo condiciones de flujo separado. Para ello se han llevado a cabo simulaciones numéricas (DNS) y ensayos experimentales usando la técnica de Particle Image Velocimetry (PIV), para una variedad de números de Reynolds (Re) y ángulos de ataque (AoA). Se ha aplicado sobre los resultados numéricos la teoría de puntos críticos obteniendo, por primera vez para esta geometría, un diagrama de bifurcaciones que clasifica los diferentes regímenes topológicos en función del número de Reynolds y del ángulo de ataque. Se ha llevado a cabo una caracterización completa sobre el origen y la evolución de los patrones estructurales característicos del cuerpo estudiado. Puntos críticos de superficie y líneas de corriente tridimensionales han ayudado a describir el origen y la evolución de las principales estructuras presentes en el flujo hasta alcanzar un estado de estabilidad desde el punto de vista topológico. Este estado se asocia con el patrón de los vórtices ’horn’, definido por una topología característica que se encuentra en un rango de números de Reynolds muy amplio y en regímenes compresibles e incompresibles. Por otro lado, con el objeto de determinar las estructuras presentes en el flujo y sus frecuencias asociadas, se han usado distintas técnicas de análisis: Proper Orthogonal Decomposition (POD), Dynamic Mode Decomposition (DMD) y análisis de Fourier. Dichas técnicas se han aplicado sobre los datos experimentales y numéricos, demostrándose la buena concordancia entre ambos resultados. Finalmente, se ha encontrado en ambos casos, una frecuencia dominante asociada con una inestabilidad de los vórtices ’leeward’. ABSTRACT The hemisphere-cylinder may be considered as a simplified model for several geometries found in industrial applications such as aircrafts’ fuselages or submarines. Understanding the complex flow phenomena that surrounds this particular geometry is therefore of major industrial interest. This thesis presents an investigation of the origin and evolution of the complex flow pattern; i.e. separation bubbles, horn vortices and leeward vortices, around the hemisphere-cylinder under separated flow conditions. To this aim, threedimensional Direct Numerical Simulations (DNS) and experimental tests, using Particle Image Velocimetry (PIV) techniques, have been performed for a variety of Reynolds numbers (Re) and angles of attack (AoA). Critical point theory has been applied to the numerical simulations to provide, for the first time for this geometry, a bifurcation diagram that classifies the different flow topology regimes as a function of the Reynolds number and the angle of attack. A complete characterization about the origin and evolution of the complex structural patterns of this geometry has been put in evidence. Surface critical points and surface and volume streamlines were able to describe the main flow structures and their strong dependence with the flow conditions up to reach the structurally stable state. This state was associated with the pattern of the horn vortices, found on ranges from low to high Reynolds numbers and from incompressible to compressible regimes. In addition, different structural analysis techniques have been employed: Proper Orthogonal Decomposition (POD), Dynamic Mode Decomposition (DMD) and Fourier analysis. These techniques have been applied to the experimental and numerical data to extract flow structure information (i.e. modes and frequencies). Experimental and numerical modes are shown to be in good agreement. A dominant frequency associated with an instability of the leeward vortices has been identified in both, experimental and numerical results.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Esta tesis doctoral se centra principalmente en técnicas de ataque y contramedidas relacionadas con ataques de canal lateral (SCA por sus siglas en inglés), que han sido propuestas dentro del campo de investigación académica desde hace 17 años. Las investigaciones relacionadas han experimentado un notable crecimiento en las últimas décadas, mientras que los diseños enfocados en la protección sólida y eficaz contra dichos ataques aún se mantienen como un tema de investigación abierto, en el que se necesitan iniciativas más confiables para la protección de la información persona de empresa y de datos nacionales. El primer uso documentado de codificación secreta se remonta a alrededor de 1700 B.C., cuando los jeroglíficos del antiguo Egipto eran descritos en las inscripciones. La seguridad de la información siempre ha supuesto un factor clave en la transmisión de datos relacionados con inteligencia diplomática o militar. Debido a la evolución rápida de las técnicas modernas de comunicación, soluciones de cifrado se incorporaron por primera vez para garantizar la seguridad, integridad y confidencialidad de los contextos de transmisión a través de cables sin seguridad o medios inalámbricos. Debido a las restricciones de potencia de cálculo antes de la era del ordenador, la técnica de cifrado simple era un método más que suficiente para ocultar la información. Sin embargo, algunas vulnerabilidades algorítmicas pueden ser explotadas para restaurar la regla de codificación sin mucho esfuerzo. Esto ha motivado nuevas investigaciones en el área de la criptografía, con el fin de proteger el sistema de información ante sofisticados algoritmos. Con la invención de los ordenadores se ha acelerado en gran medida la implementación de criptografía segura, que ofrece resistencia eficiente encaminada a obtener mayores capacidades de computación altamente reforzadas. Igualmente, sofisticados cripto-análisis han impulsado las tecnologías de computación. Hoy en día, el mundo de la información ha estado involucrado con el campo de la criptografía, enfocada a proteger cualquier campo a través de diversas soluciones de cifrado. Estos enfoques se han fortalecido debido a la unificación optimizada de teorías matemáticas modernas y prácticas eficaces de hardware, siendo posible su implementación en varias plataformas (microprocesador, ASIC, FPGA, etc.). Las necesidades y requisitos de seguridad en la industria son las principales métricas de conducción en el diseño electrónico, con el objetivo de promover la fabricación de productos de gran alcance sin sacrificar la seguridad de los clientes. Sin embargo, una vulnerabilidad en la implementación práctica encontrada por el Prof. Paul Kocher, et al en 1996 implica que un circuito digital es inherentemente vulnerable a un ataque no convencional, lo cual fue nombrado posteriormente como ataque de canal lateral, debido a su fuente de análisis. Sin embargo, algunas críticas sobre los algoritmos criptográficos teóricamente seguros surgieron casi inmediatamente después de este descubrimiento. En este sentido, los circuitos digitales consisten típicamente en un gran número de celdas lógicas fundamentales (como MOS - Metal Oxide Semiconductor), construido sobre un sustrato de silicio durante la fabricación. La lógica de los circuitos se realiza en función de las innumerables conmutaciones de estas células. Este mecanismo provoca inevitablemente cierta emanación física especial que puede ser medida y correlacionada con el comportamiento interno del circuito. SCA se puede utilizar para revelar datos confidenciales (por ejemplo, la criptografía de claves), analizar la arquitectura lógica, el tiempo e incluso inyectar fallos malintencionados a los circuitos que se implementan en sistemas embebidos, como FPGAs, ASICs, o tarjetas inteligentes. Mediante el uso de la comparación de correlación entre la cantidad de fuga estimada y las fugas medidas de forma real, información confidencial puede ser reconstruida en mucho menos tiempo y computación. Para ser precisos, SCA básicamente cubre una amplia gama de tipos de ataques, como los análisis de consumo de energía y radiación ElectroMagnética (EM). Ambos se basan en análisis estadístico y, por lo tanto, requieren numerosas muestras. Los algoritmos de cifrado no están intrínsecamente preparados para ser resistentes ante SCA. Es por ello que se hace necesario durante la implementación de circuitos integrar medidas que permitan camuflar las fugas a través de "canales laterales". Las medidas contra SCA están evolucionando junto con el desarrollo de nuevas técnicas de ataque, así como la continua mejora de los dispositivos electrónicos. Las características físicas requieren contramedidas sobre la capa física, que generalmente se pueden clasificar en soluciones intrínsecas y extrínsecas. Contramedidas extrínsecas se ejecutan para confundir la fuente de ataque mediante la integración de ruido o mala alineación de la actividad interna. Comparativamente, las contramedidas intrínsecas están integradas en el propio algoritmo, para modificar la aplicación con el fin de minimizar las fugas medibles, o incluso hacer que dichas fugas no puedan ser medibles. Ocultación y Enmascaramiento son dos técnicas típicas incluidas en esta categoría. Concretamente, el enmascaramiento se aplica a nivel algorítmico, para alterar los datos intermedios sensibles con una máscara de manera reversible. A diferencia del enmascaramiento lineal, las operaciones no lineales que ampliamente existen en criptografías modernas son difíciles de enmascarar. Dicho método de ocultación, que ha sido verificado como una solución efectiva, comprende principalmente la codificación en doble carril, que está ideado especialmente para aplanar o eliminar la fuga dependiente de dato en potencia o en EM. En esta tesis doctoral, además de la descripción de las metodologías de ataque, se han dedicado grandes esfuerzos sobre la estructura del prototipo de la lógica propuesta, con el fin de realizar investigaciones enfocadas a la seguridad sobre contramedidas de arquitectura a nivel lógico. Una característica de SCA reside en el formato de las fuentes de fugas. Un típico ataque de canal lateral se refiere al análisis basado en la potencia, donde la capacidad fundamental del transistor MOS y otras capacidades parásitas son las fuentes esenciales de fugas. Por lo tanto, una lógica robusta resistente a SCA debe eliminar o mitigar las fugas de estas micro-unidades, como las puertas lógicas básicas, los puertos I/O y las rutas. Las herramientas EDA proporcionadas por los vendedores manipulan la lógica desde un nivel más alto, en lugar de realizarlo desde el nivel de puerta, donde las fugas de canal lateral se manifiestan. Por lo tanto, las implementaciones clásicas apenas satisfacen estas necesidades e inevitablemente atrofian el prototipo. Por todo ello, la implementación de un esquema de diseño personalizado y flexible ha de ser tomado en cuenta. En esta tesis se presenta el diseño y la implementación de una lógica innovadora para contrarrestar SCA, en la que se abordan 3 aspectos fundamentales: I. Se basa en ocultar la estrategia sobre el circuito en doble carril a nivel de puerta para obtener dinámicamente el equilibrio de las fugas en las capas inferiores; II. Esta lógica explota las características de la arquitectura de las FPGAs, para reducir al mínimo el gasto de recursos en la implementación; III. Se apoya en un conjunto de herramientas asistentes personalizadas, incorporadas al flujo genérico de diseño sobre FPGAs, con el fin de manipular los circuitos de forma automática. El kit de herramientas de diseño automático es compatible con la lógica de doble carril propuesta, para facilitar la aplicación práctica sobre la familia de FPGA del fabricante Xilinx. En este sentido, la metodología y las herramientas son flexibles para ser extendido a una amplia gama de aplicaciones en las que se desean obtener restricciones mucho más rígidas y sofisticadas a nivel de puerta o rutado. En esta tesis se realiza un gran esfuerzo para facilitar el proceso de implementación y reparación de lógica de doble carril genérica. La viabilidad de las soluciones propuestas es validada mediante la selección de algoritmos criptográficos ampliamente utilizados, y su evaluación exhaustiva en comparación con soluciones anteriores. Todas las propuestas están respaldadas eficazmente a través de ataques experimentales con el fin de validar las ventajas de seguridad del sistema. El presente trabajo de investigación tiene la intención de cerrar la brecha entre las barreras de implementación y la aplicación efectiva de lógica de doble carril. En esencia, a lo largo de esta tesis se describirá un conjunto de herramientas de implementación para FPGAs que se han desarrollado para trabajar junto con el flujo de diseño genérico de las mismas, con el fin de lograr crear de forma innovadora la lógica de doble carril. Un nuevo enfoque en el ámbito de la seguridad en el cifrado se propone para obtener personalización, automatización y flexibilidad en el prototipo de circuito de bajo nivel con granularidad fina. Las principales contribuciones del presente trabajo de investigación se resumen brevemente a continuación: Lógica de Precharge Absorbed-DPL logic: El uso de la conversión de netlist para reservar LUTs libres para ejecutar la señal de precharge y Ex en una lógica DPL. Posicionamiento entrelazado Row-crossed con pares idénticos de rutado en redes de doble carril, lo que ayuda a aumentar la resistencia frente a la medición EM selectiva y mitigar los impactos de las variaciones de proceso. Ejecución personalizada y herramientas de conversión automática para la generación de redes idénticas para la lógica de doble carril propuesta. (a) Para detectar y reparar conflictos en las conexiones; (b) Detectar y reparar las rutas asimétricas. (c) Para ser utilizado en otras lógicas donde se requiere un control estricto de las interconexiones en aplicaciones basadas en Xilinx. Plataforma CPA de pruebas personalizadas para el análisis de EM y potencia, incluyendo la construcción de dicha plataforma, el método de medición y análisis de los ataques. Análisis de tiempos para cuantificar los niveles de seguridad. División de Seguridad en la conversión parcial de un sistema de cifrado complejo para reducir los costes de la protección. Prueba de concepto de un sistema de calefacción auto-adaptativo para mitigar los impactos eléctricos debido a la variación del proceso de silicio de manera dinámica. La presente tesis doctoral se encuentra organizada tal y como se detalla a continuación: En el capítulo 1 se abordan los fundamentos de los ataques de canal lateral, que abarca desde conceptos básicos de teoría de modelos de análisis, además de la implementación de la plataforma y la ejecución de los ataques. En el capítulo 2 se incluyen las estrategias de resistencia SCA contra los ataques de potencia diferencial y de EM. Además de ello, en este capítulo se propone una lógica en doble carril compacta y segura como contribución de gran relevancia, así como también se presentará la transformación lógica basada en un diseño a nivel de puerta. Por otra parte, en el Capítulo 3 se abordan los desafíos relacionados con la implementación de lógica en doble carril genérica. Así mismo, se describirá un flujo de diseño personalizado para resolver los problemas de aplicación junto con una herramienta de desarrollo automático de aplicaciones propuesta, para mitigar las barreras de diseño y facilitar los procesos. En el capítulo 4 se describe de forma detallada la elaboración e implementación de las herramientas propuestas. Por otra parte, la verificación y validaciones de seguridad de la lógica propuesta, así como un sofisticado experimento de verificación de la seguridad del rutado, se describen en el capítulo 5. Por último, un resumen de las conclusiones de la tesis y las perspectivas como líneas futuras se incluyen en el capítulo 6. Con el fin de profundizar en el contenido de la tesis doctoral, cada capítulo se describe de forma más detallada a continuación: En el capítulo 1 se introduce plataforma de implementación hardware además las teorías básicas de ataque de canal lateral, y contiene principalmente: (a) La arquitectura genérica y las características de la FPGA a utilizar, en particular la Xilinx Virtex-5; (b) El algoritmo de cifrado seleccionado (un módulo comercial Advanced Encryption Standard (AES)); (c) Los elementos esenciales de los métodos de canal lateral, que permiten revelar las fugas de disipación correlacionadas con los comportamientos internos; y el método para recuperar esta relación entre las fluctuaciones físicas en los rastros de canal lateral y los datos internos procesados; (d) Las configuraciones de las plataformas de pruebas de potencia / EM abarcadas dentro de la presente tesis. El contenido de esta tesis se amplia y profundiza a partir del capítulo 2, en el cual se abordan varios aspectos claves. En primer lugar, el principio de protección de la compensación dinámica de la lógica genérica de precarga de doble carril (Dual-rail Precharge Logic-DPL) se explica mediante la descripción de los elementos compensados a nivel de puerta. En segundo lugar, la lógica PA-DPL es propuesta como aportación original, detallando el protocolo de la lógica y un caso de aplicación. En tercer lugar, dos flujos de diseño personalizados se muestran para realizar la conversión de doble carril. Junto con ello, se aclaran las definiciones técnicas relacionadas con la manipulación por encima de la netlist a nivel de LUT. Finalmente, una breve discusión sobre el proceso global se aborda en la parte final del capítulo. El Capítulo 3 estudia los principales retos durante la implementación de DPLs en FPGAs. El nivel de seguridad de las soluciones de resistencia a SCA encontradas en el estado del arte se ha degenerado debido a las barreras de implantación a través de herramientas EDA convencionales. En el escenario de la arquitectura FPGA estudiada, se discuten los problemas de los formatos de doble carril, impactos parásitos, sesgo tecnológico y la viabilidad de implementación. De acuerdo con estas elaboraciones, se plantean dos problemas: Cómo implementar la lógica propuesta sin penalizar los niveles de seguridad, y cómo manipular un gran número de celdas y automatizar el proceso. El PA-DPL propuesto en el capítulo 2 se valida con una serie de iniciativas, desde características estructurales como doble carril entrelazado o redes de rutado clonadas, hasta los métodos de aplicación tales como las herramientas de personalización y automatización de EDA. Por otra parte, un sistema de calefacción auto-adaptativo es representado y aplicado a una lógica de doble núcleo, con el fin de ajustar alternativamente la temperatura local para equilibrar los impactos negativos de la variación del proceso durante la operación en tiempo real. El capítulo 4 se centra en los detalles de la implementación del kit de herramientas. Desarrollado sobre una API third-party, el kit de herramientas personalizado es capaz de manipular los elementos de la lógica de circuito post P&R ncd (una versión binaria ilegible del xdl) convertido al formato XDL Xilinx. El mecanismo y razón de ser del conjunto de instrumentos propuestos son cuidadosamente descritos, que cubre la detección de enrutamiento y los enfoques para la reparación. El conjunto de herramientas desarrollado tiene como objetivo lograr redes de enrutamiento estrictamente idénticos para la lógica de doble carril, tanto para posicionamiento separado como para el entrelazado. Este capítulo particularmente especifica las bases técnicas para apoyar las implementaciones en los dispositivos de Xilinx y su flexibilidad para ser utilizado sobre otras aplicaciones. El capítulo 5 se enfoca en la aplicación de los casos de estudio para la validación de los grados de seguridad de la lógica propuesta. Se discuten los problemas técnicos detallados durante la ejecución y algunas nuevas técnicas de implementación. (a) Se discute el impacto en el proceso de posicionamiento de la lógica utilizando el kit de herramientas propuesto. Diferentes esquemas de implementación, tomando en cuenta la optimización global en seguridad y coste, se verifican con los experimentos con el fin de encontrar los planes de posicionamiento y reparación optimizados; (b) las validaciones de seguridad se realizan con los métodos de correlación y análisis de tiempo; (c) Una táctica asintótica se aplica a un núcleo AES sobre BCDL estructurado para validar de forma sofisticada el impacto de enrutamiento sobre métricas de seguridad; (d) Los resultados preliminares utilizando el sistema de calefacción auto-adaptativa sobre la variación del proceso son mostrados; (e) Se introduce una aplicación práctica de las herramientas para un diseño de cifrado completa. Capítulo 6 incluye el resumen general del trabajo presentado dentro de esta tesis doctoral. Por último, una breve perspectiva del trabajo futuro se expone, lo que puede ampliar el potencial de utilización de las contribuciones de esta tesis a un alcance más allá de los dominios de la criptografía en FPGAs. ABSTRACT This PhD thesis mainly concentrates on countermeasure techniques related to the Side Channel Attack (SCA), which has been put forward to academic exploitations since 17 years ago. The related research has seen a remarkable growth in the past decades, while the design of solid and efficient protection still curiously remain as an open research topic where more reliable initiatives are required for personal information privacy, enterprise and national data protections. The earliest documented usage of secret code can be traced back to around 1700 B.C., when the hieroglyphs in ancient Egypt are scribed in inscriptions. Information security always gained serious attention from diplomatic or military intelligence transmission. Due to the rapid evolvement of modern communication technique, crypto solution was first incorporated by electronic signal to ensure the confidentiality, integrity, availability, authenticity and non-repudiation of the transmitted contexts over unsecure cable or wireless channels. Restricted to the computation power before computer era, simple encryption tricks were practically sufficient to conceal information. However, algorithmic vulnerabilities can be excavated to restore the encoding rules with affordable efforts. This fact motivated the development of modern cryptography, aiming at guarding information system by complex and advanced algorithms. The appearance of computers has greatly pushed forward the invention of robust cryptographies, which efficiently offers resistance relying on highly strengthened computing capabilities. Likewise, advanced cryptanalysis has greatly driven the computing technologies in turn. Nowadays, the information world has been involved into a crypto world, protecting any fields by pervasive crypto solutions. These approaches are strong because of the optimized mergence between modern mathematical theories and effective hardware practices, being capable of implement crypto theories into various platforms (microprocessor, ASIC, FPGA, etc). Security needs from industries are actually the major driving metrics in electronic design, aiming at promoting the construction of systems with high performance without sacrificing security. Yet a vulnerability in practical implementation found by Prof. Paul Kocher, et al in 1996 implies that modern digital circuits are inherently vulnerable to an unconventional attack approach, which was named as side-channel attack since then from its analysis source. Critical suspicions to theoretically sound modern crypto algorithms surfaced almost immediately after this discovery. To be specifically, digital circuits typically consist of a great number of essential logic elements (as MOS - Metal Oxide Semiconductor), built upon a silicon substrate during the fabrication. Circuit logic is realized relying on the countless switch actions of these cells. This mechanism inevitably results in featured physical emanation that can be properly measured and correlated with internal circuit behaviors. SCAs can be used to reveal the confidential data (e.g. crypto-key), analyze the logic architecture, timing and even inject malicious faults to the circuits that are implemented in hardware system, like FPGA, ASIC, smart Card. Using various comparison solutions between the predicted leakage quantity and the measured leakage, secrets can be reconstructed at much less expense of time and computation. To be precisely, SCA basically encloses a wide range of attack types, typically as the analyses of power consumption or electromagnetic (EM) radiation. Both of them rely on statistical analyses, and hence require a number of samples. The crypto algorithms are not intrinsically fortified with SCA-resistance. Because of the severity, much attention has to be taken into the implementation so as to assemble countermeasures to camouflage the leakages via "side channels". Countermeasures against SCA are evolving along with the development of attack techniques. The physical characteristics requires countermeasures over physical layer, which can be generally classified into intrinsic and extrinsic vectors. Extrinsic countermeasures are executed to confuse the attacker by integrating noise, misalignment to the intra activities. Comparatively, intrinsic countermeasures are built into the algorithm itself, to modify the implementation for minimizing the measurable leakage, or making them not sensitive any more. Hiding and Masking are two typical techniques in this category. Concretely, masking applies to the algorithmic level, to alter the sensitive intermediate values with a mask in reversible ways. Unlike the linear masking, non-linear operations that widely exist in modern cryptographies are difficult to be masked. Approved to be an effective counter solution, hiding method mainly mentions dual-rail logic, which is specially devised for flattening or removing the data-dependent leakage in power or EM signatures. In this thesis, apart from the context describing the attack methodologies, efforts have also been dedicated to logic prototype, to mount extensive security investigations to countermeasures on logic-level. A characteristic of SCA resides on the format of leak sources. Typical side-channel attack concerns the power based analysis, where the fundamental capacitance from MOS transistors and other parasitic capacitances are the essential leak sources. Hence, a robust SCA-resistant logic must eliminate or mitigate the leakages from these micro units, such as basic logic gates, I/O ports and routings. The vendor provided EDA tools manipulate the logic from a higher behavioral-level, rather than the lower gate-level where side-channel leakage is generated. So, the classical implementations barely satisfy these needs and inevitably stunt the prototype. In this case, a customized and flexible design scheme is appealing to be devised. This thesis profiles an innovative logic style to counter SCA, which mainly addresses three major aspects: I. The proposed logic is based on the hiding strategy over gate-level dual-rail style to dynamically overbalance side-channel leakage from lower circuit layer; II. This logic exploits architectural features of modern FPGAs, to minimize the implementation expenses; III. It is supported by a set of assistant custom tools, incorporated by the generic FPGA design flow, to have circuit manipulations in an automatic manner. The automatic design toolkit supports the proposed dual-rail logic, facilitating the practical implementation on Xilinx FPGA families. While the methodologies and the tools are flexible to be expanded to a wide range of applications where rigid and sophisticated gate- or routing- constraints are desired. In this thesis a great effort is done to streamline the implementation workflow of generic dual-rail logic. The feasibility of the proposed solutions is validated by selected and widely used crypto algorithm, for thorough and fair evaluation w.r.t. prior solutions. All the proposals are effectively verified by security experiments. The presented research work attempts to solve the implementation troubles. The essence that will be formalized along this thesis is that a customized execution toolkit for modern FPGA systems is developed to work together with the generic FPGA design flow for creating innovative dual-rail logic. A method in crypto security area is constructed to obtain customization, automation and flexibility in low-level circuit prototype with fine-granularity in intractable routings. Main contributions of the presented work are summarized next: Precharge Absorbed-DPL logic: Using the netlist conversion to reserve free LUT inputs to execute the Precharge and Ex signal in a dual-rail logic style. A row-crossed interleaved placement method with identical routing pairs in dual-rail networks, which helps to increase the resistance against selective EM measurement and mitigate the impacts from process variations. Customized execution and automatic transformation tools for producing identical networks for the proposed dual-rail logic. (a) To detect and repair the conflict nets; (b) To detect and repair the asymmetric nets. (c) To be used in other logics where strict network control is required in Xilinx scenario. Customized correlation analysis testbed for EM and power attacks, including the platform construction, measurement method and attack analysis. A timing analysis based method for quantifying the security grades. A methodology of security partitions of complex crypto systems for reducing the protection cost. A proof-of-concept self-adaptive heating system to mitigate electrical impacts over process variations in dynamic dual-rail compensation manner. The thesis chapters are organized as follows: Chapter 1 discusses the side-channel attack fundamentals, which covers from theoretic basics to analysis models, and further to platform setup and attack execution. Chapter 2 centers to SCA-resistant strategies against generic power and EM attacks. In this chapter, a major contribution, a compact and secure dual-rail logic style, will be originally proposed. The logic transformation based on bottom-layer design will be presented. Chapter 3 is scheduled to elaborate the implementation challenges of generic dual-rail styles. A customized design flow to solve the implementation problems will be described along with a self-developed automatic implementation toolkit, for mitigating the design barriers and facilitating the processes. Chapter 4 will originally elaborate the tool specifics and construction details. The implementation case studies and security validations for the proposed logic style, as well as a sophisticated routing verification experiment, will be described in Chapter 5. Finally, a summary of thesis conclusions and perspectives for future work are included in Chapter 5. To better exhibit the thesis contents, each chapter is further described next: Chapter 1 provides the introduction of hardware implementation testbed and side-channel attack fundamentals, and mainly contains: (a) The FPGA generic architecture and device features, particularly of Virtex-5 FPGA; (b) The selected crypto algorithm - a commercially and extensively used Advanced Encryption Standard (AES) module - is detailed; (c) The essentials of Side-Channel methods are profiled. It reveals the correlated dissipation leakage to the internal behaviors, and the method to recover this relationship between the physical fluctuations in side-channel traces and the intra processed data; (d) The setups of the power/EM testing platforms enclosed inside the thesis work are given. The content of this thesis is expanded and deepened from chapter 2, which is divided into several aspects. First, the protection principle of dynamic compensation of the generic dual-rail precharge logic is explained by describing the compensated gate-level elements. Second, the novel DPL is originally proposed by detailing the logic protocol and an implementation case study. Third, a couple of custom workflows are shown next for realizing the rail conversion. Meanwhile, the technical definitions that are about to be manipulated above LUT-level netlist are clarified. A brief discussion about the batched process is given in the final part. Chapter 3 studies the implementation challenges of DPLs in FPGAs. The security level of state-of-the-art SCA-resistant solutions are decreased due to the implementation barriers using conventional EDA tools. In the studied FPGA scenario, problems are discussed from dual-rail format, parasitic impact, technological bias and implementation feasibility. According to these elaborations, two problems arise: How to implement the proposed logic without crippling the security level; and How to manipulate a large number of cells and automate the transformation. The proposed PA-DPL in chapter 2 is legalized with a series of initiatives, from structures to implementation methods. Furthermore, a self-adaptive heating system is depicted and implemented to a dual-core logic, assumed to alternatively adjust local temperature for balancing the negative impacts from silicon technological biases on real-time. Chapter 4 centers to the toolkit system. Built upon a third-party Application Program Interface (API) library, the customized toolkit is able to manipulate the logic elements from post P&R circuit (an unreadable binary version of the xdl one) converted to Xilinx xdl format. The mechanism and rationale of the proposed toolkit are carefully convoyed, covering the routing detection and repairing approaches. The developed toolkit aims to achieve very strictly identical routing networks for dual-rail logic both for separate and interleaved placement. This chapter particularly specifies the technical essentials to support the implementations in Xilinx devices and the flexibility to be expanded to other applications. Chapter 5 focuses on the implementation of the case studies for validating the security grades of the proposed logic style from the proposed toolkit. Comprehensive implementation techniques are discussed. (a) The placement impacts using the proposed toolkit are discussed. Different execution schemes, considering the global optimization in security and cost, are verified with experiments so as to find the optimized placement and repair schemes; (b) Security validations are realized with correlation, timing methods; (c) A systematic method is applied to a BCDL structured module to validate the routing impact over security metric; (d) The preliminary results using the self-adaptive heating system over process variation is given; (e) A practical implementation of the proposed toolkit to a large design is introduced. Chapter 6 includes the general summary of the complete work presented inside this thesis. Finally, a brief perspective for the future work is drawn which might expand the potential utilization of the thesis contributions to a wider range of implementation domains beyond cryptography on FPGAs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

βarrestins mediate the desensitization of the β2-adrenergic receptor (β2AR) and many other G protein-coupled receptors (GPCRs). Additionally, βarrestins initiate the endocytosis of these receptors via clathrin coated-pits and interact directly with clathrin. Consequently, it has been proposed that βarrestins serve as clathrin adaptors for the GPCR family by linking these receptors to clathrin lattices. AP-2, the heterotetrameric clathrin adaptor protein, has been demonstrated to mediate the internalization of many types of plasma membrane proteins other than GPCRs. AP-2 interacts with the clathrin heavy chain and cytoplasmic domains of receptors such as those for epidermal growth factor and transferrin. In the present study we demonstrate the formation of an agonist-induced multimeric complex containing a GPCR, βarrestin 2, and the β2-adaptin subunit of AP-2. β2-Adaptin binds βarrestin 2 in a yeast two-hybrid assay and coimmunoprecipitates with βarrestins and β2AR in an agonist-dependent manner in HEK-293 cells. Moreover, β2-adaptin translocates from the cytosol to the plasma membrane in response to the β2AR agonist isoproterenol and colocalizes with β2AR in clathrin-coated pits. Finally, expression of βarrestin 2 minigene constructs containing the β2-adaptin interacting region inhibits β2AR endocytosis. These findings point to a role for AP-2 in GPCR endocytosis, and they suggest that AP-2 functions as a clathrin adaptor for the endocytosis of diverse classes of membrane receptors.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The generation of transport vesicles at the endoplasmic reticulum (ER) depends on cytosolic proteins, which, in the form of subcomplexes (Sec23p/Sec24p; Sec13p/Sec31p) are recruited to the ER membrane by GTP-bound Sar1p and form the coat protein complex II (COPII). Using affinity chromatography and two-hybrid analyses, we found that the essential COPII component Sec24p, but not Sec23p, binds to the cis-Golgi syntaxin Sed5p. Sec24p/Sed5p interaction in vitro was not dependent on the presence of [Sar1p⋅GTP]. The binding of Sec24p to Sed5p is specific; none of the other seven yeast syntaxins bound to this COPII component. Whereas the interaction site of Sec23p is within the N-terminal half of the 926-aa-long Sec24p (amino acid residues 56–549), Sed5p binds to the N- and C-terminal halves of the protein. Destruction by mutagenesis of a potential zinc finger within the N-terminal half of Sec24p led to a nonfunctional protein that was still able to bind Sec23p and Sed5p. Sec24p/Sed5p binding might be relevant for cargo selection during transport-vesicle formation and/or for vesicle targeting to the cis-Golgi.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The avian erythroblastosis viral oncogene (v-erbB) encodes a receptor tyrosine kinase that possesses sarcomagenic and leukemogenic potential. We have expressed transforming and nontransforming mutants of v-erbB in fibroblasts to detect transformation-associated signal transduction events. Coimmunoprecipitation and affinity chromatography have been used to identify a transformation-associated, tyrosine phosphorylated, multiprotein complex. This complex consists of Src homologous collagen protein (Shc), growth factor receptor binding protein 2 (Grb2), son of sevenless (Sos), and a novel tyrosine phosphorylated form of the cytoskeletal regulatory protein caldesmon. Immunofluorescence localization studies further reveal that, in contrast to the distribution of caldesmon along actin stress fibers in normal fibroblasts, caldesmon colocalizes with Shc in plasma membrane blebs in transformed fibroblasts. This colocalization of caldesmon and Shc correlates with actin stress fiber disassembly and v-erbB-mediated transformation. The tyrosine phosphorylation of caldesmon, and its association with the Shc–Grb2–Sos signaling complex directly links tyrosine kinase oncogenic signaling events with cytoskeletal regulatory processes, and may define one mechanism regulating actin stress fiber disassembly in transformed cells.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A novel type I transmembrane protein of COPI-coated vesicles, p23, has been demonstrated to be localized mainly to the Golgi complex. This protein and p24, another member of the p24 family, have been shown to bind coatomer via their short cytoplasmic tails. Here we demonstrate that p23 continuously cycles through the early secretory pathway. The cytoplasmic tail of p23 is shown to act as a functional retrieval signal as it confers endoplasmic reticulum (ER) residence to a CD8–p23 fusion protein. This ER localization is, at least in part, a result of retrieval from post-ER compartments because CD8–p23 fusion proteins receive post-ER modifications. In contrast, the cytoplasmic tail of p24 has been shown not to retrieve a CD8–p24 fusion protein. The coatomer binding motifs FF and KK in the cytoplasmic tail of p23 are reported to influence the steady-state localization of the CD8–p23 fusion protein within the ER–Golgi recycling pathway. It appears that the steady-state Golgi localization of endogenous p23 is maintained by its lumenal domain, as a fusion protein with the lumenal domain of CD8, and the membrane span as well as the cytoplasmic tail of p23 is no longer detected in the Golgi.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Major histocompatibility complex (MHC) class II molecules displayed clustered patterns at the surfaces of T (HUT-102B2) and B (JY) lymphoma cells characterized by interreceptor distances in the micrometer range as detected by scanning force microscopy of immunogold-labeled antigens. Electron microscopy revealed that a fraction of the MHC class II molecules was also heteroclustered with MHC class I antigens at the same hierarchical level as described by the scanning force microscopy data, after specifically and sequentially labeling the antigens with 30- and 15-nm immunogold beads. On JY cells the estimated fraction of co-clustered HLA II was 0.61, whereas that of the HLA I was 0.24. Clusterization of the antigens was detected by the deviation of their spatial distribution from the Poissonian distribution representing the random case. Fluorescence resonance energy transfer measurements also confirmed partial co-clustering of the HLA class I and II molecules at another hierarchical level characterized by the 2- to 10-nm Förster distance range and providing fine details of the molecular organization of receptors. The larger-scale topological organization of the MHC class I and II antigens may reflect underlying membrane lipid domains and may fulfill significant functions in cell-to-cell contacts and signal transduction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Pulmonary neuroepithelial bodies (NEB) are widely distributed throughout the airway mucosa of human and animal lungs. Based on the observation that NEB cells have a candidate oxygen sensor enzyme complex (NADPH oxidase) and an oxygen-sensitive K+ current, it has been suggested that NEB may function as airway chemoreceptors. Here we report that mRNAs for both the hydrogen peroxide sensitive voltage gated potassium channel subunit (KH2O2) KV3.3a and membrane components of NADPH oxidase (gp91phox and p22phox) are coexpressed in the NEB cells of fetal rabbit and neonatal human lungs. Using a microfluorometry and dihydrorhodamine 123 as a probe to assess H2O2 generation, NEB cells exhibited oxidase activity under basal conditions. The oxidase in NEB cells was significantly stimulated by exposure to phorbol esther (0.1 μM) and inhibited by diphenyliodonium (5 μM). Studies using whole-cell voltage clamp showed that the K+ current of cultured fetal rabbit NEB cells exhibited inactivating properties similar to KV3.3a transcripts expressed in Xenopus oocyte model. Exposure of NEB cells to hydrogen peroxide (H2O2, the dismuted by-product of the oxidase) under normoxia resulted in an increase of the outward K+ current indicating that H2O2 could be the transmitter modulating the O2-sensitive K+ channel. Expressed mRNAs or orresponding protein products for the NADPH oxidase membrane cytochrome b as well as mRNA encoding KV3.3a were identified in small cell lung carcinoma cell lines. The studies presented here provide strong evidence for an oxidase-O2 sensitive potassium channel molecular complex operating as an O2 sensor in NEB cells, which function as chemoreceptors in airways and in NEB related tumors. Such a complex may represent an evolutionary conserved biochemical link for a membrane bound O2-signaling mechanism proposed for other cells and life forms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It is shown that restoration of photoinduced electron flow and O2 evolution with Mn2+ in Mn-depleted photosystem II (PSII) membrane fragments isolated from spinach chloroplasts is considerably increased with bicarbonate in the region pH 5.0–8.0 in bicarbonate-depleted medium. In buffered solutions equilibrated with the atmosphere (nondepleted of bicarbonate), the bicarbonate effect is observed only at pH lower than the pK of H2CO3 dissociation (6.4), which indicates that HCO3− is the essential species for the restoration effect. The addition of just 2 Mn2+ atoms per one PSII reaction center is enough for the maximal reactivation when bicarbonate is present in the medium. Analysis of bicarbonate concentration dependence of the restoration effect reveals two binding sites for bicarbonate with apparent dissociation constant (Kd) of ≈2.5 μM and 20–34 μM when 2,6-dichloro-p-benzoquinone is used as electron acceptor, while in the presence of silicomolybdate only the latter one remains. Similar bicarbonate concentration dependence of O2 evolution was obtained in untreated Mn-containing PSII membrane fragments. It is suggested that the Kd of 20–34 μM is associated with the donor side of PSII while the location of the lower Kd binding site is not quite clear. The conclusion is made that bicarbonate is an essential constituent of the water-oxidizing complex of PSII, important for its assembly and maintenance in the functionally active state.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Anionic lipids play a variety of key roles in biomembrane function, including providing the immediate environment for the integral membrane proteins that catalyze photosynthetic and respiratory energy transduction. Little is known about the molecular basis of these lipid–protein interactions. In this study, x-ray crystallography has been used to examine the structural details of an interaction between cardiolipin and the photoreaction center, a key light-driven electron transfer protein complex found in the cytoplasmic membrane of photosynthetic bacteria. X-ray diffraction data collected over the resolution range 30.0–2.1 Å show that binding of the lipid to the protein involves a combination of ionic interactions between the protein and the lipid headgroup and van der Waals interactions between the lipid tails and the electroneutral intramembrane surface of the protein. In the headgroup region, ionic interactions involve polar groups of a number of residues, the protein backbone, and bound water molecules. The lipid tails sit along largely hydrophobic grooves in the irregular surface of the protein. In addition to providing new information on the immediate lipid environment of a key integral membrane protein, this study provides the first, to our knowledge, high-resolution x-ray crystal structure for cardiolipin. The possible significance of this interaction between an integral membrane protein and cardiolipin is considered.