193 research outputs found
Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets
The term security ceremony describes a technical system extended with its human users. In this paper, we examine the inspection ceremony for the mobile transport ticket in Denmark. We find several security weaknesses that are ascribable to both human and computer components of the ceremony. The main vulnerabilities are due to the design choices of how the visual inspection ceremony is organised and the lack of information that is stored into the 2D barcode. These vulnerabilities allow a ticket holder to travel up to 8 zones with a 2-zone subscription and enable several people to travel with the same subscription. The attack is significant as it can be automated, and rather modest skills are necessary to break the inspection ceremony. We state four principles that aim at strengthening the security of inspection ceremonies and propose an alternative ceremony whose design is driven by the stated principles
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks
© 2004-2012 IEEE. The medical industry is increasingly digitalized and Internet-connected (e.g., Internet of Medical Things), and when deployed in an Internet of Medical Things environment, software-defined networks (SDNs) allow the decoupling of network control from the data plane. There is no debate among security experts that the security of Internet-enabled medical devices is crucial, and an ongoing threat vector is insider attacks. In this paper, we focus on the identification of insider attacks in healthcare SDNs. Specifically, we survey stakeholders from 12 healthcare organizations (i.e., two hospitals and two clinics in Hong Kong, two hospitals and two clinics in Singapore, and two hospitals and two clinics in China). Based on the survey findings, we develop a trust-based approach based on Bayesian inference to figure out malicious devices in a healthcare environment. Experimental results in either a simulated and a real-world network environment demonstrate the feasibility and effectiveness of our proposed approach regarding the detection of malicious healthcare devices, i.e., our approach could decrease the trust values of malicious devices faster than similar approaches
Understanding How Components of Organisations Contribute to Attacks
Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks on an organisations and the contribution of parts of an organisation to the attack and its impact
Isabelle Modelchecking for insider threats
The Isabelle Insider framework formalises the technique of social explanation for modeling and analysing Insider threats in infrastructures including physical and logical aspects. However, the abstract Isabelle models need some refinement to provide sufficient detail to explore attacks constructively and understand how the attacker proceeds. The introduction of mutable states into the model leads us to use the concepts of Modelchecking within Isabelle. Isabelle can simply accommodate classical CTL type Modelchecking. We integrate CTL Modelchecking into the Isabelle Insider framework. A running example of an IoT attack on privacy motivates the method throughout and illustrates how the enhanced framework fully supports realistic modeling and analysis of IoT Insiders
The restorative role of annexin A1 at the blood–brain barrier
Annexin A1 is a potent anti-inflammatory molecule that has been extensively studied in the peripheral immune
system, but has not as yet been exploited as a therapeutic target/agent. In the last decade, we have undertaken the
study of this molecule in the central nervous system (CNS), focusing particularly on the primary interface between the
peripheral body and CNS: the blood–brain barrier. In this review, we provide an overview of the role of this molecule
in the brain, with a particular emphasis on its functions in the endothelium of the blood–brain barrier, and the protective
actions the molecule may exert in neuroinflammatory, neurovascular and metabolic disease. We focus on the
possible new therapeutic avenues opened up by an increased understanding of the role of annexin A1 in the CNS
vasculature, and its potential for repairing blood–brain barrier damage in disease and aging
Genetic variants in novel pathways influence blood pressure and cardiovascular disease risk.
Blood pressure is a heritable trait influenced by several biological pathways and responsive to environmental stimuli. Over one billion people worldwide have hypertension (≥140 mm Hg systolic blood pressure or ≥90 mm Hg diastolic blood pressure). Even small increments in blood pressure are associated with an increased risk of cardiovascular events. This genome-wide association study of systolic and diastolic blood pressure, which used a multi-stage design in 200,000 individuals of European descent, identified sixteen novel loci: six of these loci contain genes previously known or suspected to regulate blood pressure (GUCY1A3-GUCY1B3, NPR3-C5orf23, ADM, FURIN-FES, GOSR2, GNAS-EDN3); the other ten provide new clues to blood pressure physiology. A genetic risk score based on 29 genome-wide significant variants was associated with hypertension, left ventricular wall thickness, stroke and coronary artery disease, but not kidney disease or kidney function. We also observed associations with blood pressure in East Asian, South Asian and African ancestry individuals. Our findings provide new insights into the genetics and biology of blood pressure, and suggest potential novel therapeutic pathways for cardiovascular disease prevention
JNK Isoforms Differentially Regulate Neurite Growth and Regeneration in Dopaminergic Neurons In Vitro
Parkinson’s disease is characterized by selective and progressive loss of midbrain DAergic neurons (MDN) in the substantia nigra and degeneration of its nigrostriatal projections. Whereas the cellular pathophysiology has been closely linked to an activation of c-Jun N-terminal kinases (JNKs) and c-Jun, the involvement of JNKs in regenerative processes of the nigrostriatal pathway is controversially discussed. In our study, we utilized a mechanical scratch lesion paradigm of midbrain DAergic neurons in vitro and studied regenerative neuritic outgrowth. After a siRNA-mediated knockdown of each of the three JNK isoforms, we found that JNKs differentially regulate neurite regeneration. Knockdown of JNK3 resulted in the most prominent neurite outgrowth impairment. This effect was attenuated again by plasmid overexpression of JNK3. We also evaluated cell survival of the affected neurons at the scratch border. JNK3 was found to be also relevant for survival of MDN which were lesioned by the scratch. Our data suggest that JNK isoforms are involved in differential regulation of cell death and regeneration in MDN depending on their neurite integrity. JNK3 appears to be required for regeneration and survival in the case of an environment permissive for regeneration. Future therapeutic approaches for the DAergic system may thus require isoform specific targeting of these kinases
Coronary collaterals and risk for restenosis after percutaneous coronary interventions: a meta-analysis
<p>Abstract</p> <p>Background</p> <p>The benefit of the coronary collateral circulation (natural bypass network) on survival is well established. However, data derived from smaller studies indicates that coronary collaterals may increase the risk for restenosis after percutaneous coronary interventions. The purpose of this systematic review and meta-analysis of observational studies was to explore the impact of the collateral circulation on the risk for restenosis.</p> <p>Methods</p> <p>We searched the MEDLINE, EMBASE and ISI Web of Science databases (2001 to 15 July 2011). Random effects models were used to calculate summary risk ratios (RR) for restenosis. The primary endpoint was angiographic restenosis > 50%.</p> <p>Results</p> <p>A total of 7 studies enrolling 1,425 subjects were integrated in this analysis. On average across studies, the presence of a good collateralization was predictive for restenosis (risk ratio (RR) 1.40 (95% CI 1.09 to 1.80); <it>P </it>= 0.009). This risk ratio was consistent in the subgroup analyses where collateralization was assessed with intracoronary pressure measurements (RR 1.37 (95% CI 1.03 to 1.83); <it>P </it>= 0.038) versus visual assessment (RR 1.41 (95% CI 1.00 to 1.99); <it>P </it>= 0.049). For the subgroup of patients with stable coronary artery disease (CAD), the RR for restenosis with 'good collaterals' was 1.64 (95% CI 1.14 to 2.35) compared to 'poor collaterals' (<it>P </it>= 0.008). For patients with acute myocardial infarction, however, the RR for restenosis with 'good collateralization' was only 1.23 (95% CI 0.89 to 1.69); <it>P </it>= 0.212.</p> <p>Conclusions</p> <p>The risk of restenosis after percutaneous coronary intervention (PCI) is increased in patients with good coronary collateralization. Assessment of the coronary collateral circulation before PCI may be useful for risk stratification and for the choice of antiproliferative measures (drug-eluting stent instead bare-metal stent, cilostazol).</p
A polymorphism at the 3'-UTR region of the aromatase gene defines a subgroup of postmenopausal breast cancer patients with poor response to neoadjuvant letrozole
<p>Abstract</p> <p>Background</p> <p>Aromatase (<it>CYP19A1</it>) regulates estrogen biosynthesis. Polymorphisms in <it>CYP19A1 </it>have been related to the pathogenesis of breast cancer (BC). Inhibition of aromatase with letrozole constitutes the best option for treating estrogen-dependent BC in postmenopausal women. We evaluate a series of polymorphisms of <it>CYP19A1 </it>and their effect on response to neoadjuvant letrozole in early BC.</p> <p>Methods</p> <p>We analyzed 95 consecutive postmenopausal women with stage II-III ER/PgR [+] BC treated with neoadjuvant letrozole. Response to treatment was measured by radiology at 4<sup>th </sup>month by World Health Organization (WHO) criteria. Three polymorphisms of <it>CYP19A1</it>, one in exon 7 (rs700519) and two in the 3'-UTR region (rs10046 and rs4646) were evaluated on DNA obtained from peripheral blood.</p> <p>Results</p> <p>Thirty-five women (36.8%) achieved a radiological response to letrozole. The histopathological and immunohistochemical parameters, including hormonal receptor status, were not associated with the response to letrozole. Only the genetic variants (AC/AA) of the rs4646 polymorphism were associated with poor response to letrozole (p = 0.03). Eighteen patients (18.9%) reported a progression of the disease. Those patients carrying the genetic variants (AC/AA) of rs4646 presented a lower progression-free survival than the patients homozygous for the reference variant (p = 0.0686). This effect was especially significant in the group of elderly patients not operated after letrozole induction (p = 0.009).</p> <p>Conclusions</p> <p>Our study reveals that the rs4646 polymorphism identifies a subgroup of stage II-III ER/PgR [+] BC patients with poor response to neoadjuvant letrozole and poor prognosis. Testing for the rs4646 polymorphism could be a useful tool in order to orientate the treatment in elderly BC patients.</p
Arabidopsis Homologs of Retinoblastoma-Associated Protein 46/48 Associate with a Histone Deacetylase to Act Redundantly in Chromatin Silencing
RNA molecules such as small-interfering RNAs (siRNAs) and antisense RNAs (asRNAs) trigger chromatin silencing of target loci. In the model plant Arabidopsis, RNA–triggered chromatin silencing involves repressive histone modifications such as histone deacetylation, histone H3 lysine-9 methylation, and H3 lysine-27 monomethylation. Here, we report that two Arabidopsis homologs of the human histone-binding proteins Retinoblastoma-Associated Protein 46/48 (RbAp46/48), known as MSI4 (or FVE) and MSI5, function in partial redundancy in chromatin silencing of various loci targeted by siRNAs or asRNAs. We show that MSI5 acts in partial redundancy with FVE to silence FLOWERING LOCUS C (FLC), which is a crucial floral repressor subject to asRNA–mediated silencing, FLC homologs, and other loci including transposable and repetitive elements which are targets of siRNA–directed DNA Methylation (RdDM). Both FVE and MSI5 associate with HISTONE DEACETYLASE 6 (HDA6) to form complexes and directly interact with the target loci, leading to histone deacetylation and transcriptional silencing. In addition, these two genes function in de novo CHH (H = A, T, or C) methylation and maintenance of symmetric cytosine methylation (mainly CHG methylation) at endogenous RdDM target loci, and they are also required for establishment of cytosine methylation in the previously unmethylated sequences directed by the RdDM pathway. This reveals an important functional divergence of the plant RbAp46/48 relatives from animal counterparts
- …
