Objective: To detect the action of arsenic trioxide (As_2O_3) on theexpression of Tumor drug-resistant molecule. Methods: APL cell line MR_2 resistant to all-transretin-oic acid (ATRA ) was put into research, while AP...Objective: To detect the action of arsenic trioxide (As_2O_3) on theexpression of Tumor drug-resistant molecule. Methods: APL cell line MR_2 resistant to all-transretin-oic acid (ATRA ) was put into research, while APL cell line NB_4 was used for control. Theim-munocytochemical assays were used to detect the expressions of P-glycoprotein (P_(gp)) andGluta-thione S-transferase ( GST) . Results: Not only the expression of P_(gp) in MR_2 cell line(30%-40%) was significantly higher than that in NB4 cell line (10%-20% ) (P < 0.001), but also theexpression of GST in MR_2 cell line (60. 4 +- 4.0 )-( 66.5 +- 4.4) was significantly higher thanthat in NB4 cell line (28.3 +- 5.6)-(31.2 +- 5. l)(P < 0.05). As_2O_3 at the concentration of0.5-2.0 μmol/l could significantly decrease the expression of P_(gp) and GSTπ, but could donothing about the expression of GSTα and GSTμ. Conclusion: The lower expression of P_(gp) andGSTπ might be the sensitive indications of frustrating drug-resistance, while GSTα and GSTμ mightnot be the case. ATRA might be the substrates of P_(gp) transmission and GSTπ catalysis .展开更多
Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security applications.In this paper,we propose a collaborative reversing ...Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security applications.In this paper,we propose a collaborative reversing technique by capturing the mapping relationship between input fields and program data structures.The key insight behind our paper is that program uses corresponding data structures as references to parse and access different input fields,and every field could be identified by reversing its corresponding data structure.In details,we use a finegrained dynamic taint analysis to monitor the propagation of inputs.By identifying base pointers for each input byte,we could reverse data structures and conversely identify fields based on their referencing data structures.We construct several experiments to evaluate the effectiveness.Experiment results show that our approach could effectively reverse precise input formats,and provide unique benefits to two representative security applications,exploit diagnosis and malware analysis.展开更多
In this paper, firstly, we propose several convexification and concavification transformations to convert a strictly monotone function into a convex or concave function, then we propose several convexification and con...In this paper, firstly, we propose several convexification and concavification transformations to convert a strictly monotone function into a convex or concave function, then we propose several convexification and concavification transformations to convert a non-convex and non-concave objective function into a convex or concave function in the programming problems with convex or concave constraint functions, and propose several convexification and concavification transformations to convert a non-monotone objective function into a convex or concave function in some programming problems with strictly monotone constraint functions. Finally, we prove that the original programming problem can be converted into an equivalent concave minimization problem, or reverse convex programming problem or canonical D.C. programming problem. Then the global optimal solution of the original problem can be obtained by solving the converted concave minimization problem, or reverse convex programming problem or canonical D.C. programming problem using the existing algorithms about them.展开更多
文摘Objective: To detect the action of arsenic trioxide (As_2O_3) on theexpression of Tumor drug-resistant molecule. Methods: APL cell line MR_2 resistant to all-transretin-oic acid (ATRA ) was put into research, while APL cell line NB_4 was used for control. Theim-munocytochemical assays were used to detect the expressions of P-glycoprotein (P_(gp)) andGluta-thione S-transferase ( GST) . Results: Not only the expression of P_(gp) in MR_2 cell line(30%-40%) was significantly higher than that in NB4 cell line (10%-20% ) (P < 0.001), but also theexpression of GST in MR_2 cell line (60. 4 +- 4.0 )-( 66.5 +- 4.4) was significantly higher thanthat in NB4 cell line (28.3 +- 5.6)-(31.2 +- 5. l)(P < 0.05). As_2O_3 at the concentration of0.5-2.0 μmol/l could significantly decrease the expression of P_(gp) and GSTπ, but could donothing about the expression of GSTα and GSTμ. Conclusion: The lower expression of P_(gp) andGSTπ might be the sensitive indications of frustrating drug-resistance, while GSTα and GSTμ mightnot be the case. ATRA might be the substrates of P_(gp) transmission and GSTπ catalysis .
基金the National Natural Science Foundation of China,the foundation of State Key Lab.for Novel Software Technology in Nanjing University,the foundation of Key Laboratory of Information Assurance Technology
文摘Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security applications.In this paper,we propose a collaborative reversing technique by capturing the mapping relationship between input fields and program data structures.The key insight behind our paper is that program uses corresponding data structures as references to parse and access different input fields,and every field could be identified by reversing its corresponding data structure.In details,we use a finegrained dynamic taint analysis to monitor the propagation of inputs.By identifying base pointers for each input byte,we could reverse data structures and conversely identify fields based on their referencing data structures.We construct several experiments to evaluate the effectiveness.Experiment results show that our approach could effectively reverse precise input formats,and provide unique benefits to two representative security applications,exploit diagnosis and malware analysis.
基金This research is supported by the National Natural Science Foundation of China(Grant 10271073).
文摘In this paper, firstly, we propose several convexification and concavification transformations to convert a strictly monotone function into a convex or concave function, then we propose several convexification and concavification transformations to convert a non-convex and non-concave objective function into a convex or concave function in the programming problems with convex or concave constraint functions, and propose several convexification and concavification transformations to convert a non-monotone objective function into a convex or concave function in some programming problems with strictly monotone constraint functions. Finally, we prove that the original programming problem can be converted into an equivalent concave minimization problem, or reverse convex programming problem or canonical D.C. programming problem. Then the global optimal solution of the original problem can be obtained by solving the converted concave minimization problem, or reverse convex programming problem or canonical D.C. programming problem using the existing algorithms about them.