164 research outputs found

    Acute hypoxia-reoxygenation and vascular oxygen sensing in the chicken embryo.

    Get PDF
    Fetal/perinatal hypoxia is one of the most common causes of perinatal morbidity and mortality and is frequently accompannied by vascular dysfunction. However, the mechanisms involved have not been fully delineated. We hypothesized that exposure to acute hypoxia-reoxygenation induces alterations in vascular O2 sensing/signaling as well as in endothelial function in the chicken embryo pulmonary artery (PA), mesenteric artery (MA), femoral artery (FA), and ductus arteriosus (DA). Noninternally pipped 19-day embryos were exposed to 10% O2 for 30 min followed by reoxygenation with 21% O2 or 80% O2 Another group was constantly maintained at 21% O2 or at 21% O2 for 30 min and then exposed to 80% O2 Following treatment, responses of isolated blood vessels to hypoxia as well as endothelium-dependent (acetylcholine) and -independent (sodium nitroprusside and forskolin) relaxation were investigated in a wire myograph. Hypoxia increased venous blood lactate from 2.03 ± 0.18 to 15.98 ± 0.73 mmol/L (P < 0.001) and reduced hatchability to 0%. However, ex vivo hypoxic contraction of PA and MA, hypoxic relaxation of FA, and normoxic contraction of DA were not significantly different in any of the experimental groups. Relaxations induced by acetylcholine, sodium nitroprusside, and forskolin in PA, MA, FA, and DA rings were also similar in the four groups. In conclusion, exposure to acute hypoxia-reoxygenation did not affect vascular oxygen sensing or reactivity in the chicken embryo. This suggests that direct effects of acute hypoxia-reoxygenation on vascular function does not play a role in the pathophysiology of hypoxic cardiovascular injury in the perinatal period

    ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel

    Get PDF
    Abstract. We propose a theoretical framework for a network covert channel based on enumerative combinatorics. It offers protocol independence and avoids detection by using a mimicry defense. Using a network monitoring phase, traffic is analyzed to detect which application-layer protocols are allowed through the firewalls. Using these results, a covert channel is built based on permutations of benign network objects, such as FTP commands and HTTP requests to different web servers. Any protocol that offers reliability guarantees can be plugged into the framework. This includes any protocol that is built on top of the TCP protocol. The framework closely mimics the behavioral statistics of the legitimate traffic, making the covert channel very hard to detect

    From systematic to intelligent: assessing AI-empowered optimization techniques for analog building block sizing

    Get PDF
    This paper presents a comprehensive, design-insight-based comparison between an artificial intelligence (AI)-empowered optimization-based analog building block sizing framework and the conventional manual design methodology. Although recent AI-empowered approaches are showing high performance, conventional systematic manual design methods such as the gm/ID-based sizing are still the most widely used methods in the analog IC design community. This raises the necessity of the comprehensive comparative analyses between the two kinds of methods. To fill this gap, this paper compares the optimal designs obtained by a typical method of the former with those obtained by the latter method in the literature/industry. Four case studies, including a comparator, an amplifier (both standard and low power design), and an oscillator, using technology nodes ranging from 0.35 μm to 65 nm, are presented. Detailed performance evaluations and design insights are presented for each case study, with silicon validation provided for three designs. Our findings highlight that AI-empowered sizing not only meets but often surpasses conventional designs in key performance metrics, while still benefiting from designer interaction to align with design intents

    LibSEAL: revealing service integrity violations using trusted execution

    Get PDF
    Users of online services such as messaging, code hosting and collaborative document editing expect the services to uphold the integrity of their data. Despite providers’ best efforts, data corruption still occurs, but at present service integrity violations are excluded from SLAs. For providers to include such violations as part of SLAs, the competing requirements of clients and providers must be satisfied. Clients need the ability to independently identify and prove service integrity violations to claim compensation. At the same time, providers must be able to refute spurious claims. We describe LibSEAL, a SEcure Audit Library for Internet services that creates a non-repudiable audit log of service operations and checks invariants to discover violations of service integrity. LibSEAL is a drop-in replacement for TLS libraries used by services, and thus observes and logs all service requests and responses. It runs inside a trusted execution environment, such as Intel SGX, to protect the integrity of the audit log. Logs are stored using an embedded relational database, permitting service invariant violations to be discovered using simple SQL queries. We evaluate LibSEAL with three popular online services (Git, ownCloud and Dropbox) and demonstrate that it is effective in discovering integrity violations, while reducing throughput by at most 14%

    Intra-Amniotic LPS Induced Region-Specific Changes in Presynaptic Bouton Densities in the Ovine Fetal Brain

    Get PDF
    Rationale. Chorioamnionitis has been associated with increased risk for fetal brain damage. Although, it is now accepted that synaptic dysfunction might be responsible for functional deficits, synaptic densities/numbers after a fetal inflammatory challenge have not been studied in different regions yet. Therefore, we tested in this study the hypothesis that LPS-induced chorioamnionitis caused profound changes in synaptic densities in different regions of the fetal sheep brain. Material and Methods. Chorioamnionitis was induced by a 10 mg intra-amniotic LPS injection at two different exposure intervals. The fetal brain was studied at 125 days of gestation (term = 150 days) either 2 (LPS2D group) or 14 days (LPS14D group) after LPS or saline injection (control group). Synaptophysin immunohistochemistry was used to quantify the presynaptic density in layers 2-3 and 5-6 of the motor cortex, somatosensory cortex, entorhinal cortex, and piriforme cortex, in the nucleus caudatus and putamen and in CA1/2, CA3, and dentate gyrus of the hippocampus. Results. There was a significant reduction in presynaptic bouton densities in layers 2-3 and 5-6 of the motor cortex and in layers 2-3 of the entorhinal and the somatosensory cortex, in the nucleus caudate and putamen and the CA1/2 and CA3 of the hippocampus in the LPS2D compared to control animals. Only in the motor cortex and putamen, the presynaptic density was significantly decreased in the LPS14 D compared to the control group. No changes were found in the dentate gyrus of the hippocampus and the piriforme cortex. Conclusion. We demonstrated that LPS-induced chorioamnionitis caused a decreased density in presynaptic boutons in different areas in the fetal brain. These synaptic changes seemed to be region-specific, with some regions being more affected than others, and seemed to be transient in some regions

    Teechain: a secure payment network with asynchronous blockchain access

    Get PDF
    Blockchains such as Bitcoin and Ethereum execute payment transactions securely, but their performance is limited by the need for global consensus. Payment networks overcome this limitation through off-chain transactions. Instead of writing to the blockchain for each transaction, they only settle the final payment balances with the underlying blockchain. When executing off-chain transactions in current payment networks, parties must access the blockchain within bounded time to detect misbehaving parties that deviate from the protocol. This opens a window for attacks in which a malicious party can steal funds by deliberately delaying other parties' blockchain access and prevents parties from using payment networks when disconnected from the blockchain. We present Teechain, the first layer-two payment network that executes off-chain transactions asynchronously with respect to the underlying blockchain. To prevent parties from misbehaving, Teechain uses treasuries, protected by hardware trusted execution environments (TEEs), to establish off-chain payment channels between parties. Treasuries maintain collateral funds and can exchange transactions efficiently and securely, without interacting with the underlying blockchain. To mitigate against treasury failures and to avoid having to trust all TEEs, Teechain replicates the state of treasuries using committee chains, a new variant of chain replication with threshold secret sharing. Teechain achieves at least a 33X higher transaction throughput than the state-of-the-art Lightning payment network. A 30-machine Teechain deployment can handle over 1 million Bitcoin transactions per second
    corecore