The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from ...The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from the victim and 2) exfiltrate data from compromised machines. Attack strategies of this nature on the greater power grid and building infrastructure levels have been shown to be a serious threat. This project further explores this concept of a novel attack vector by creating a new type of penetration testing tool: an USB power adapter capable of remote monitoring of device power consumption and communicating through powerline communications.展开更多
BACKGROUND: Recent researches demonstrate that damage of executive function is an early manifestation of vascular cognitive disorder. OBJECTIVE: To investigate the executive functions of patients with transient isch...BACKGROUND: Recent researches demonstrate that damage of executive function is an early manifestation of vascular cognitive disorder. OBJECTIVE: To investigate the executive functions of patients with transient ischemic attack (TIA). DESIGN: Case control. SETTING: Department of Neurology, the First Affiliated Hospital of Xinxiang Medical College. PARTICIPANTS: A total of 83 TIA patients (46 males and 37 females, aged 32 - 74 years) were selected from Department of Neurology, the First Affiliated Hospital of Xinxiang Medical College from July 2005 to December 2006. The diagnosis of TIA was established by the criteria of cerebrovascular diseases made by the Fourth National Cerebrovascular Disease Meeting. In these cases, forty-five patients (54%) were involved in internal carotid artery, and thirty-eight patients (46%) were involved in vertebral basilar system. Fifty healthy adults (Control group: 28 males and 22 females, aged 32 - 74 years) were chosen from retiree in community and family of patients. All of them were right-handedness, without cerebrovascular disease, cerebral trauma, inborn oligophrenia, and heating and visual disorders; also they had no anxiety and depression nearly one week. In addition, all the subjects cooperated with examination. METHODS: After TIA diagnosis, all patients received neuropsychological examination, including attention and inhibition, working memory, flexibility, planning and diversion, based on Stroop tests (C and CW) and the Wisconsin card sorting tests (WCST). ① WCST test: The edition revised by Nelson was used. We would take the times of sorting, incorrect response, persistent incorrect response, and randomly incorrect response as the index of evaluation.② Stroop tests: The edition revised by Trenarry was used and this test had two types: form color and form color-word. Their incorrect response and response time were recorded for data analysis in the end. MAIN OUTCOME MEASURES: Results of WCST test and Stroop tests. RESULTS: A total of 83 TIA patients and 50 healthy subjects were involved in the final analysis. Items of Stroop tests, including response time of Stroop-C test, incorrect response of Stroop-C test, response time of Stroop-CW test and incorrect response of Stroop-CW test, and items of WCST, including incorrect response, persistent incorrect response and random incorrect response, between internal carotid artery system and vertebral basilar artery system were (93.87±24.39) s, 3.16±3.97, (228.46±68.13) s, 12.91 ± 10.56, 55.42± 20.38, 26.58± 10.41, 28.62±11.22; (96.76±24.75) s, 3.89±4.77, (223.46±72.54) s, 18.71 ± 13.80, 52.47 ±22.25, 28.82± 16.20, 23.39±9.72, respectively; this was higher than those in the control group [(52.10± 12.18) s, 1.68± 1.97, (134.86±34.15) s, 4.22±4.21, 32.46± 17.97, 14.42±8.47, 18.24± 10.24, P 〈 0.05 - 0.01]. Times of sorting of WCST between internal carotid artery system and vertebral basilar artery system were obviously lower than those in the control group (8.27±2.73, 8.66±2.77, 11.22±2.41, P 〈 0.01). However, there were no significant differences between internal carotid artery system and vertebral basilar artery system (P 〉 0.05). CONCLUSION: Patients with TIA have executive dysfunctions, and the dysfunctions have no difference between internal carotid artery system and vertebral basilar artery system.展开更多
Side channel attack may result in user key leakage as scan test techniques are applied for crypto-graphic chips. Many secure scan designs have been proposed to protect the user key. This paper meticulously selects thr...Side channel attack may result in user key leakage as scan test techniques are applied for crypto-graphic chips. Many secure scan designs have been proposed to protect the user key. This paper meticulously selects three current scan test techniques, analyses their advantages and disadvantages and also compares them in security and area overhead. Users can choose one of them according to the requirements and further combination can be implemented to achieve better performance.展开更多
The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing new techniques for analyzing network traffic. If efficient analysis tools ...The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing new techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks and to take action to weaken those attacks appropriately before they have had time to propagate across the network. In this paper, we propose an SNMP MIB oriented approach for detecting attacks, which is based on two-tier GCT by analyzing causal relationship between attacking variable at the attacker and abnormal variable at the target. According to the abnormal behavior at the target, GCT is executed initially to determine preliminary attacking variable, which has whole causality with abnormal variable in network behavior. Depending on behavior feature extracted from abnormal behavior, we can recognize attacking variable by using GCT again, which has local causality with abnormal variable in local behavior. Proactive detecting rules can be constructed with the causality between attacking variable and abnormal variable, which can be used to give alarms in network management system. The results of experiment showed that the approach with two-tier GCT was proved to detect attacks early, with which attack propagation could be slowed through early detection.展开更多
支持等式测试的标识加密(identity-based encryption with equality test, IBEET)体制解决了传统等式测试方案中证书管理的问题,得到了广泛的关注.但现有的IBEET体制难以抵抗渗透攻击,且都是基于国外密码算法设计,不具有自主知识产权....支持等式测试的标识加密(identity-based encryption with equality test, IBEET)体制解决了传统等式测试方案中证书管理的问题,得到了广泛的关注.但现有的IBEET体制难以抵抗渗透攻击,且都是基于国外密码算法设计,不具有自主知识产权.基于此,提出一种支持等式测试并具有密码逆向防火墙的SM9标识加密方案(SM9 identity-based encryption scheme with equality test and cryptographic reverse firewalls, SM9-IBEET-CRF).该方案在用户与云服务器的上行信道间部署密码逆向防火墙(cryptographic reverse firewalls,CRF),对用户发出的信息执行重随机化以达到抵抗渗透攻击的作用.该方案拓展国密算法SM9至IBEET领域中,提升其运行效率并丰富国密算法在云计算领域的研究.给出了SM9-IBEET-CRF的形式化定义和安全模型,并在随机预言机模型中考虑2种不同的敌手将此方案在选择密文攻击下的不可区分性与单向性分别形式化地规约到BDH困难假设上.同时,该方案通过考虑第3种敌手证明CRF的部署为其带来维持功能性、保留安全性以及抵抗渗透性.实验仿真和分析结果展示了该方案的有效性.展开更多
文摘The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from the victim and 2) exfiltrate data from compromised machines. Attack strategies of this nature on the greater power grid and building infrastructure levels have been shown to be a serious threat. This project further explores this concept of a novel attack vector by creating a new type of penetration testing tool: an USB power adapter capable of remote monitoring of device power consumption and communicating through powerline communications.
基金High-educational Talents Starting Foundation of Xinxiang Medical College
文摘BACKGROUND: Recent researches demonstrate that damage of executive function is an early manifestation of vascular cognitive disorder. OBJECTIVE: To investigate the executive functions of patients with transient ischemic attack (TIA). DESIGN: Case control. SETTING: Department of Neurology, the First Affiliated Hospital of Xinxiang Medical College. PARTICIPANTS: A total of 83 TIA patients (46 males and 37 females, aged 32 - 74 years) were selected from Department of Neurology, the First Affiliated Hospital of Xinxiang Medical College from July 2005 to December 2006. The diagnosis of TIA was established by the criteria of cerebrovascular diseases made by the Fourth National Cerebrovascular Disease Meeting. In these cases, forty-five patients (54%) were involved in internal carotid artery, and thirty-eight patients (46%) were involved in vertebral basilar system. Fifty healthy adults (Control group: 28 males and 22 females, aged 32 - 74 years) were chosen from retiree in community and family of patients. All of them were right-handedness, without cerebrovascular disease, cerebral trauma, inborn oligophrenia, and heating and visual disorders; also they had no anxiety and depression nearly one week. In addition, all the subjects cooperated with examination. METHODS: After TIA diagnosis, all patients received neuropsychological examination, including attention and inhibition, working memory, flexibility, planning and diversion, based on Stroop tests (C and CW) and the Wisconsin card sorting tests (WCST). ① WCST test: The edition revised by Nelson was used. We would take the times of sorting, incorrect response, persistent incorrect response, and randomly incorrect response as the index of evaluation.② Stroop tests: The edition revised by Trenarry was used and this test had two types: form color and form color-word. Their incorrect response and response time were recorded for data analysis in the end. MAIN OUTCOME MEASURES: Results of WCST test and Stroop tests. RESULTS: A total of 83 TIA patients and 50 healthy subjects were involved in the final analysis. Items of Stroop tests, including response time of Stroop-C test, incorrect response of Stroop-C test, response time of Stroop-CW test and incorrect response of Stroop-CW test, and items of WCST, including incorrect response, persistent incorrect response and random incorrect response, between internal carotid artery system and vertebral basilar artery system were (93.87±24.39) s, 3.16±3.97, (228.46±68.13) s, 12.91 ± 10.56, 55.42± 20.38, 26.58± 10.41, 28.62±11.22; (96.76±24.75) s, 3.89±4.77, (223.46±72.54) s, 18.71 ± 13.80, 52.47 ±22.25, 28.82± 16.20, 23.39±9.72, respectively; this was higher than those in the control group [(52.10± 12.18) s, 1.68± 1.97, (134.86±34.15) s, 4.22±4.21, 32.46± 17.97, 14.42±8.47, 18.24± 10.24, P 〈 0.05 - 0.01]. Times of sorting of WCST between internal carotid artery system and vertebral basilar artery system were obviously lower than those in the control group (8.27±2.73, 8.66±2.77, 11.22±2.41, P 〈 0.01). However, there were no significant differences between internal carotid artery system and vertebral basilar artery system (P 〉 0.05). CONCLUSION: Patients with TIA have executive dysfunctions, and the dysfunctions have no difference between internal carotid artery system and vertebral basilar artery system.
文摘Side channel attack may result in user key leakage as scan test techniques are applied for crypto-graphic chips. Many secure scan designs have been proposed to protect the user key. This paper meticulously selects three current scan test techniques, analyses their advantages and disadvantages and also compares them in security and area overhead. Users can choose one of them according to the requirements and further combination can be implemented to achieve better performance.
文摘The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing new techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks and to take action to weaken those attacks appropriately before they have had time to propagate across the network. In this paper, we propose an SNMP MIB oriented approach for detecting attacks, which is based on two-tier GCT by analyzing causal relationship between attacking variable at the attacker and abnormal variable at the target. According to the abnormal behavior at the target, GCT is executed initially to determine preliminary attacking variable, which has whole causality with abnormal variable in network behavior. Depending on behavior feature extracted from abnormal behavior, we can recognize attacking variable by using GCT again, which has local causality with abnormal variable in local behavior. Proactive detecting rules can be constructed with the causality between attacking variable and abnormal variable, which can be used to give alarms in network management system. The results of experiment showed that the approach with two-tier GCT was proved to detect attacks early, with which attack propagation could be slowed through early detection.
文摘支持等式测试的标识加密(identity-based encryption with equality test, IBEET)体制解决了传统等式测试方案中证书管理的问题,得到了广泛的关注.但现有的IBEET体制难以抵抗渗透攻击,且都是基于国外密码算法设计,不具有自主知识产权.基于此,提出一种支持等式测试并具有密码逆向防火墙的SM9标识加密方案(SM9 identity-based encryption scheme with equality test and cryptographic reverse firewalls, SM9-IBEET-CRF).该方案在用户与云服务器的上行信道间部署密码逆向防火墙(cryptographic reverse firewalls,CRF),对用户发出的信息执行重随机化以达到抵抗渗透攻击的作用.该方案拓展国密算法SM9至IBEET领域中,提升其运行效率并丰富国密算法在云计算领域的研究.给出了SM9-IBEET-CRF的形式化定义和安全模型,并在随机预言机模型中考虑2种不同的敌手将此方案在选择密文攻击下的不可区分性与单向性分别形式化地规约到BDH困难假设上.同时,该方案通过考虑第3种敌手证明CRF的部署为其带来维持功能性、保留安全性以及抵抗渗透性.实验仿真和分析结果展示了该方案的有效性.