With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecas...With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.展开更多
The application of clustered regularly interspaced short palindromic repeats(CRISPR)and CRISPR-associated proteins(Cas)can be limited due to a lack of compatible protospacer adjacent motif(PAM)sequences in the DNA reg...The application of clustered regularly interspaced short palindromic repeats(CRISPR)and CRISPR-associated proteins(Cas)can be limited due to a lack of compatible protospacer adjacent motif(PAM)sequences in the DNA regions of interest.Recently,SpRY,a variant of Streptococcus pyogenes Cas9(SpCas9),was reported,which nearly completely fulfils the PAM requirement.Meanwhile,PAMs for Sp RY have not been well addressed.In our previous study,we developed the PAM Definition by Observable Sequence Excision(PAM-DOSE)and green fluorescent protein(GFP)-reporter systems to study PAMs in human cells.Herein,we endeavored to identify the PAMs of SpRY with these two methods.The results indicated that 5’-NRN-3’,5’-NTA-3’,and 5’-NCK-3’could be considered as canonical PAMs.5’-NCA-3’and 5’-NTK-3’may serve as non-priority PAMs.At the same time,PAM of 5’-NYC-3’is not recommended for human cells.These findings provide further insights into the application of SpRY for human genome editing.展开更多
基金Our work is supported by the National Key R&D Program of China(2021YFB2012400).
文摘With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.
基金supported by Lin HE’s Academician Workstation of New Medicine and Clinical Translation(No.18331105)the Program for Basic Science and Technology Cooperation Projects of Wenzhou City(No.H22010011),China。
文摘The application of clustered regularly interspaced short palindromic repeats(CRISPR)and CRISPR-associated proteins(Cas)can be limited due to a lack of compatible protospacer adjacent motif(PAM)sequences in the DNA regions of interest.Recently,SpRY,a variant of Streptococcus pyogenes Cas9(SpCas9),was reported,which nearly completely fulfils the PAM requirement.Meanwhile,PAMs for Sp RY have not been well addressed.In our previous study,we developed the PAM Definition by Observable Sequence Excision(PAM-DOSE)and green fluorescent protein(GFP)-reporter systems to study PAMs in human cells.Herein,we endeavored to identify the PAMs of SpRY with these two methods.The results indicated that 5’-NRN-3’,5’-NTA-3’,and 5’-NCK-3’could be considered as canonical PAMs.5’-NCA-3’and 5’-NTK-3’may serve as non-priority PAMs.At the same time,PAM of 5’-NYC-3’is not recommended for human cells.These findings provide further insights into the application of SpRY for human genome editing.