2,205 research outputs found
The impact of alkyl chain purity on lipid based nucleic acid delivery systems – is the utilization of lipid components with technical grade justified?
The physicochemical properties and transfection efficacies of two samples of a cationic lipid have been investigated and compared in 2D (monolayers at the air/liquid interface) and 3D (aqueous bulk dispersions) model systems using different techniques. The samples differ only in their chain composition due to the purity of the oleylamine (chain precursor). Lipid 8 (using the oleylamine of technical grade for cost-efficient synthesis) shows lateral phase separation in the Langmuir layers. However, the amount of attached DNA, determined by IRRAS, is for both samples the same. In 3D systems, lipid 8 p forms cubic phases, which disappear after addition of DNA. At physiological temperatures, both lipids (alone and in mixture with cholesterol) assemble to lamellar aggregates and exhibit comparable DNA delivery efficiency. This study demonstrates that non-lamellar structures are not compulsory for high transfection rates. The results legitimate the utilization of oleyl chains of technical grade in the synthesis of cationic transfection lipid
Thermal conductance of thin film YIG determined using Bayesian statistics
Thin film YIG (YFeO) is a prototypical material for
experiments on thermally generated pure spin currents and the spin Seebeck
effect. The 3-omega method is an established technique to measure the
cross-plane thermal conductance of thin films, but can not be used in YIG/GGG
(GaGdO) systems in its standard form. We use two-dimensional
modeling of heat transport and introduce a technique based on Bayesian
statistics to evaluate measurement data taken from the 3-omega method. Our
analysis method allows us to study materials systems that have not been
accessible with the conventionally used 3-omega analysis. Temperature dependent
thermal conductance data of thin film YIG are of major importance for
experiments in the field of spin-caloritronics. Here we show data between room
temperature and 10 K for films covering a wide thickness range as well as the
magnetic field effect on the thermal conductance between 10 K and 50 K
Determination of the spin-flip time in ferromagnetic SrRuO3 from time-resolved Kerr measurements
We report time-resolved Kerr effect measurements of magnetization dynamics in
ferromagnetic SrRuO3. We observe that the demagnetization time slows
substantially at temperatures within 15K of the Curie temperature, which is ~
150K. We analyze the data with a phenomenological model that relates the
demagnetization time to the spin flip time. In agreement with our observations
the model yields a demagnetization time that is inversely proportional to T-Tc.
We also make a direct comparison of the spin flip rate and the Gilbert damping
coefficient showing that their ratio very close to kBTc, indicating a common
origin for these phenomena
CacheZoom: How SGX Amplifies The Power of Cache Attacks
In modern computing environments, hardware resources are commonly shared, and
parallel computation is widely used. Parallel tasks can cause privacy and
security problems if proper isolation is not enforced. Intel proposed SGX to
create a trusted execution environment within the processor. SGX relies on the
hardware, and claims runtime protection even if the OS and other software
components are malicious. However, SGX disregards side-channel attacks. We
introduce a powerful cache side-channel attack that provides system adversaries
a high resolution channel. Our attack tool named CacheZoom is able to virtually
track all memory accesses of SGX enclaves with high spatial and temporal
precision. As proof of concept, we demonstrate AES key recovery attacks on
commonly used implementations including those that were believed to be
resistant in previous scenarios. Our results show that SGX cannot protect
critical data sensitive computations, and efficient AES key recovery is
possible in a practical environment. In contrast to previous works which
require hundreds of measurements, this is the first cache side-channel attack
on a real system that can recover AES keys with a minimal number of
measurements. We can successfully recover AES keys from T-Table based
implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems
(CHES '17
Stealthy Deception Attacks Against SCADA Systems
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to
network attacks such as session hijacking. Hence, research focuses on network
anomaly detection based on meta--data (message sizes, timing, command
sequence), or on the state values of the physical process. In this work we
present a class of semantic network-based attacks against SCADA systems that
are undetectable by the above mentioned anomaly detection. After hijacking the
communication channels between the Human Machine Interface (HMI) and
Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a
fake view of the industrial process, deceiving the human operator into taking
manual actions. Our most advanced attack also manipulates the messages
generated by the operator's actions, reversing their semantic meaning while
causing the HMI to present a view that is consistent with the attempted human
actions. The attacks are totaly stealthy because the message sizes and timing,
the command sequences, and the data values of the ICS's state all remain
legitimate.
We implemented and tested several attack scenarios in the test lab of our
local electric company, against a real HMI and real PLCs, separated by a
commercial-grade firewall. We developed a real-time security assessment tool,
that can simultaneously manipulate the communication to multiple PLCs and cause
the HMI to display a coherent system--wide fake view. Our tool is configured
with message-manipulating rules written in an ICS Attack Markup Language (IAML)
we designed, which may be of independent interest. Our semantic attacks all
successfully fooled the operator and brought the system to states of blackout
and possible equipment damage
C4 olefin conversion on reduced nickel y faujasite. Evidence for C5 olefin formation via C4 olefin disproportionation
Nonlinear Dynamics of the Perceived Pitch of Complex Sounds
We apply results from nonlinear dynamics to an old problem in acoustical
physics: the mechanism of the perception of the pitch of sounds, especially the
sounds known as complex tones that are important for music and speech
intelligibility
Ferromagnetic Enhancement of CE-type Spin Ordering in (Pr,Ca)MnO
We present resonant soft X-ray scattering (RSXS) results from small band
width manganites (Pr,Ca)MnO, which show that the CE-type spin ordering (SO)
at the phase boundary is stabilized only below the canted antiferromagnetic
transition temperature and enhanced by ferromagnetism in the macroscopically
insulating state (FM-I). Our results reveal the fragility of the CE-type
ordering that underpins the colossal magnetoresistance (CMR) effect in this
system, as well as an unexpected cooperative interplay between FM-I and CE-type
SO which is in contrast to the competitive interplay between the ferromagnetic
metallic (FM-M) state and CE-type ordering.Comment: Accepted for publication in Phys. Rev. Let
- …
