918 resultados para Algebraic attack
Resumo:
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermarking schemes. We consider vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked %(medical or other digital) images, where they could still be verified as authentic, though they are actually not. Experimental results successfully demonstrate the practicability and consequences of the proposed attacks for some relevant schemes. The development of the proposed attack models can be used as a means to systematically examine the security levels of similar watermarking schemes.
Resumo:
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.
Resumo:
This thesis investigates and develops techniques for accurately detecting Internet-based Distributed Denial-of-Service (DDoS) Attacks where an adversary harnesses the power of thousands of compromised machines to disrupt the normal operations of a Web-service provider, resulting in significant down-time and financial losses. This thesis also develops methods to differentiate these attacks from similar-looking benign surges in web-traffic known as Flash Events (FEs). This thesis also addresses an intrinsic challenge in research associated with DDoS attacks, namely, the extreme scarcity of public domain datasets (due to legal and privacy issues) by developing techniques to realistically emulate DDoS attack and FE traffic.
Resumo:
This paper reports on current research work with children and young people on the importance of public and private space for good health, wellbeing, social, educational and developmental outcomes. In many urban locations in Australia and elsewhere, public space is under attack from developers and attempts by authorities to control public space (Watson 2006). Private space in the home and garden-backyard is also under attack from development densification and trends towards bigger houses on smaller plots of land where gardens disappear altogether or a postage stamp remains (Gleeson and Sipe 2006). At the same time public policy advocates the benefits of outdoor exercise, set alongside fears about using public space exacerbated by notions of ‘stranger danger’ and control measures such as child and youth ‘curfews’. In this increasingly complex context, it is important to discover what children and young people value and need most in using private (home) and public space. In conjunction with the University of Otago, New Zealand, children and young people are consulted to discover how they use public space in parks and shopping centres and home space and the issues encountered and their proposals for improvement, to better inform policy debate, planning and formulation (ARACY 2009).
Resumo:
Sequences with optimal correlation properties are much sought after for applications in communication systems. In 1980, Alltop (\emph{IEEE Trans. Inf. Theory} 26(3):350-354, 1980) described a set of sequences based on a cubic function and showed that these sequences were optimal with respect to the known bounds on auto and crosscorrelation. Subsequently these sequences were used to construct mutually unbiased bases (MUBs), a structure of importance in quantum information theory. The key feature of this cubic function is that its difference function is a planar function. Functions with planar difference functions have been called \emph{Alltop functions}. This paper provides a new family of Alltop functions and establishes the use of Alltop functions for construction of sequence sets and MUBs.
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
Migraine is a common neurological disease with a genetic basis affecting approximately 12% of the population. Pain during a migraine attack is associated with activation of the trigeminal nerve system, which carries pain signals from the meninges and the blood vessels infusing the meninges to the trigeminal nucleus in the brain stem. The release of inflammatory mediators following cortical spreading depression (CSD) may further promote and sustain the activation and sensitization of meningeal nociceptors, inducing the persistent throbbing headache characterised in migraine. Lymphotoxin α (LTA) is a cytokine secreted by lymphocytes and is a member of the tumour necrosis factor (TNF) family. Genetic variation with the TNF and LTA genes may contribute to threshold brain excitability, propagation of neuronal hyperexcitability and thus initiation and maintenance of a migraine attack. Three LTA variants rs2009658, rs2844482 and rs2229094 were identified in a recent pGWAS study conducted in the Norfolk Island population as being potentially implicated in migraine with nominally significant p values of p = 0.0093, p = 0.0088 and p = 0.033 respectively. To determine whether these SNPs played a role in migraine in a general outbred population these SNPs were gentoyped in a large case control Australian Caucasian population and tested for association with migraine. All three SNPs showed no association in our cohort (p > 0.05). Validation of GWAS data in independent case-controls cohorts is essential to establish risk validity within specific population groups. The importance of cytokines in modulating neural inflammation and pain threshold in addition to other studies showing associations between TNF-α and SNPs in the LTA gene with migraine, suggests that LTA could be an important factor contributing to migraine. Although the present study did not support a role for the tested LTA variants in migraine, investigation of other variants within the LTA gene is still warranted.
Resumo:
BACKGROUND: Transcatheter closure of patent foramen ovale (PFO) has rapidly evolved as the preferred management strategy for the prevention of recurrent cerebrovascular events in patients with cryptogenic stroke and presumed paradoxical embolus. There is limited outcome data in patients treated with this therapy particularly for the newer devices. METHODS: Data from medical records, catheter, and echocardiography databases on 70 PFO procedures performed was collected prospectively. RESULTS: The cohort consisted of 70 patients (mean age 43.6 years, range 19 to 77 years), of whom 51% were male. The indications for closure were cryptogenic cerebrovascular accident (CVA) or transient ischemic attack (TIA) in 64 (91%) and peripheral emboli in two (2.8%) patients and cryptogenic ST-elevation myocardial infarction in one (1.4%), refractory migraine in one (1.4%), decompression sickness in one (1.4%), and orthodeoxia in one (1.4%) patient, respectively. All patients had demonstrated right-to-left shunting on bubble study. The procedures were guided by intracardiac echocardiography in 53%, transesophageal echocardiography in 39%, and the remainder by transthoracic echo alone. Devices used were the Amplatzer PFO Occluder (AGA Medical) (sizes 18-35 mm) in 49 (70%) and the Premere device (St. Jude Medical) in 21 (30%). In-hospital complications consisted of one significant groin hematoma with skin infection. Echocardiographic follow-up at 6 months revealed that most patients had no or trivial residual shunt (98.6%), while one patient (1.4%) had a mild residual shunt. At a median of 11 months' follow-up (range 1 month to 4.3 years), no patients (0%) experienced further CVA/TIAs or paradoxical embolic events during follow-up. CONCLUSION: PFO causing presumed paradoxical embolism can be closed percutaneously with a low rate of significant residual shunting and very few complications. Recurrent index events are uncommon at medium-term (up to 4 years) follow-up.
Resumo:
Introduction Gene expression profiling has enabled us to demonstrate the heterogeneity of breast cancers. The potential of a tumour to grow and metastasise is partly dependant on its ability to initiate angiogenesis or growth and remodelling of new blood vessels, usually from a pre-existing vascular network, to ensure delivery of oxygen, nutrients, and growth factors to rapidly dividing transformed cells along with access to the systemic circulation. Cell–cell signalling of semaphorin ligands through interaction with their plexin receptors is important for the homeostasis and morphogenesis of many tissues and has been widely studied for a role in neural connectivity, cancer, cell migration and immune responses. This study investigated the role of four semaphorin/plexin signalling genes in human breast cancers in vivo and in vitro. Materials and methods mRNA was extracted from formalin fixed paraffin embedded archival breast invasive ductal carcinoma tissue samples of progressive grades (grades I–III) and compared to tissue from benign tumours. Gene expression profiles were determined by microarray using the Affymetrix GeneChip® Human Genome U133 Plus 2.0 Arrays and validated by Q-PCR using a Corbett RotorGene 6000. Following validation, the gene expression profile of the identified targets was correlated with those of the human breast cancer cell lines MCF-7 and MDA-MD-231. Results The array data revealed that 888 genes were found to be significantly (p ≤ 0.05) differentially expressed between grades I and II tumours and 563 genes between grade III and benign tumours. From these genes, we identified four genes involved in semaphorin–plexin signalling including SEMA4D which has previously been identified as being involved in increased angiogenesis in breast cancers, and three other genes, SEMA4F, PLXNA2 and PLXNA3, which in the literature were associated with tumourigenesis, but not directly in breast tumourigenesis. The microarray analysis revealed that SEMA4D was significantly (P = 0.0347) down-regulated in the grade III tumours compared to benign tumours; SEMA4F, was significantly (P = 0.0159) down-regulated between grades I and II tumours; PLXNA2 was significantly (P = 0.036) down-regulated between grade III and benign tumours and PLXNA3 significantly (P = 0.042) up-regulated between grades I and II tumours. Gene expression of SEMA4D was validated using Q-PCR, demonstrating the same expression profile in both data sets. When the sample set was increased to incorporate more cases, SEMA4D continued to follow the same expression profile, including statistical significance for the differences observed and small standard deviations. In vitro the same pattern was present where expression for SEMA4D was significantly higher in MDA-MB-231 cells when compared to MCF-7 cells. The expression of SEMA4F, PLXNA2 and PLXNA3 could not be validated using Q-PCR, however in vitro analysis of these three genes revealed that both SEMA4F and PLXNA3 followed the microarray trend in expression, although they did not reach significance. In contrast, PLXNA2 demonstrated statistical significance and was in concordance with the literature. Discussion We, and others, have proposed SEMA4D to be a gene with a potentially protective effect in benign tumours that contributes to tumour growth and metastatic suppression. Previous data supports a role for SEMA4F as a tumour suppressor in the peripheral nervous system but our data seems to indicate that the gene is involved in tumour progression in breast cancer. Our in vitro analysis of PLXNA2 revealed that the gene has higher expression in more aggressive breast cancer cell types. Finally, our in vitro analysis on PLXNA3 also suggest that this gene may have some form of growth suppressive role in breast cancer, in addition to a similar role for the gene previously reported in ovarian cancer. From the data obtained in this study, SEMA4D may have a role in more aggressive and potentially metastatic breast tumours. Conclusions Semaphorins and their receptors, the plexins, have been implicated in numerous aspects of neural development, however their expression in many other epithelial tissues suggests that the semaphorin–plexin signalling system also contributes to blood vessel growth and development. These findings warrant further investigation of the role of semaphorins and plexins and their role in normal and tumour-induced angiogenesis in vivo and in vitro. This may represent a new front of attack in anti-angiogenic therapies of breast and other cancers.
Resumo:
Migraine is a debilitating neurovascular disorder, with a substantial genetic component. The exact cause of a migraine attack is unknown; however cortical hyperexcitability is thought to play a role. As Gamma-aminobutyric Acid (GABA) is the major inhibitory neurotransmitter in the brain, malfunctioning of this system may be a cause of the hyperexcitability. To date, there has been limited research examining the gene expression or genetics of GABA receptors in relation to migraine. The aim of our study was to determine if GABA receptors play a role in migraine by investigating their gene expression using profile in migraine affected individuals and non-affected controls by Q-PCR. Gene expression of GABA(A) receptor subunit isoforms (GABRA3, GABRB3, GABRQ) and GABA(B) receptor 2 (GABBR2) was quantified in mRNA obtained from peripheral blood leukocytes from 28 migraine subjects and 22 healthy control subjects. Analysis of results showed that two of the tested genes, GABRA3 and GABBR2, were significantly down regulated in migraineurs (P=0.018; P=0.017), compared to controls. Results from the other tested genes did not show significant gene expression variation. The results indicate that there may be specific GABA receptor gene expression variation in migraine, particularly involving the GABRA3 and GABBR2 genes. This study also identifies GABRA3 and GABBR2 as potential biomarkers to select migraineurs that may be more responsive to GABA agonists with future investigations in this area warranted.
Resumo:
Essential hypertension is a common multifactorial trait that results in a significantly increased risk for heart attack and stroke. The condition has a genetic basis, although at present the number of genes is unknown. In order to identify such genes, we are utilising a linkage scanning approach using microsatellite markers and affected sibships. Here we provide evidence for the location of at least one hypertension susceptibility locus on chromosome 17. Analysis of 177 affected sibpairs gave evidence for significant excess allele sharing to D17S949 (SPLINK: P=0.0029; MAPMAKER SIBS: P=0.0033; ASPEX: P=0.0061; GENEHUNTER: P=0.0096; ANALYZE (SIBPAIR): P=0.0025) on 17q22–24, with significant allele sharing also indicated for an additional marker, D17S799 (SPLINK: P=0.025; MAPMAKER SIBS: P= 0.025) located close to the centromere. Since these two genomic regions are well separated, our results indicate that there may be more than one chromosome 17 locus affecting human blood pressure. Moreover, further investigation of this chromosome, utilizing a polymorphism within the promoter of the iNOS candidate gene, NOS2A, revealed both increased allele sharing among sibpairs (SPLINK: P=0.02; ASPEX: P=0.00004) and positive association (P= 0.034) of NOS2A to essential hypertension. Hence these results indicate that chromosome 17 and, more specifically, the NOS2A gene may play a role in human essential hypertension.
Resumo:
Fruit flies are the insects which cause maggots in your backyard fruit and vegetables. They are not just a nuisance to gardeners, but the single greatest insect threat to commercial and subsistence fruit growers throughout Asia, Australia and the Pacific. Queensland fruit fly, the focus of this PhD, costs Australia an estimated $100million per year. I focused specifically on how Queensland fruit fly uses different commercial citrus varieties. I identified specific plant related mechanisms which increase a fruit’s resistance to fruit fly attack. This information can be used by plant breeders to make fruit less prone to fruit fly damage.
Resumo:
Migraine is classified by the World Health Organization (WHO) as being one of the top 20 most debilitating diseases. According to the neurovascular hypothesis, neuroinflammation may promote the activation and sensitisation of meningeal nociceptors, inducing the persistent throbbing headache characterized in migraine. The tumor necrosis factor (TNF) gene cluster, made up of TNFα, lymphotoxin α (LTA), and lymphotoxin β (LTB), has been implicated to influence the intensity and duration of local inflammation. It is thought that sterile inflammation mediated by LTA, LTB, and TNFα contributes to threshold brain excitability, propagation of neuronal hyperexcitability and thus initiation and maintenance of a migraine attack. Previous studies have investigated variants within the TNF gene cluster region in relation to migraine susceptibility, with largely conflicting results. The aim of this study was to expand on previous research and utilize a large case-control cohort and range of variants within the TNF gene cluster to investigate the role of the TNF gene cluster in migraine. Nine single nucleotide polymorphisms (SNPs) were selected for investigation as follows: rs1800683, rs2229094, rs2009658, rs2071590, rs2239704, rs909253, rs1800630, rs1800629, and rs3093664. No significant association with migraine susceptibility was found for any of the SNPs tested, with further testing according to migraine subtype and gender also showing no association for disease risk. Haplotype analysis showed that none of the tested haplotypes were significantly associated with migraine.
Resumo:
An electropolishing method has been developed for preparing sharp needles from polycrystalline YBa2Cu3O7-δ by modifying a recipe for TEM specimen preparation. The method is characterized by a polishing temperature of below 0°C, a non-acidic electrolyt and an even removal of the constituent phases. An approach was employed of combining I-V measurements for polishing process and microscopical observation of surface morphology in finding optimum polishing conditions. TEM evidenced that no preferential attack appeared to grain boundaries. X-ray diffractometry and electron diffraction implied that no change in oxygen content occurred during electropolishing. The sharpness of the tip was examined by field-ion microscopy.
Resumo:
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.