摘要:
The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices. Security/energy tradeoffs for host-based detectors focusing on rootkits are analyzed along two axes: a scanning frequency, and a surface of attack. Experimental results are applied to a hypervisor-based framework, and a sweet spot is identified to minimize both energy consumption and a window of vulnerability for critical operating system objects such as code pages and kernel data.
摘要:
The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices. Security/energy tradeoffs for host-based detectors focusing on rootkits are analyzed along two axes: a scanning frequency, and a surface of attack. Experimental results are applied to a hypervisor-based framework, and a sweet spot is identified to minimize both energy consumption and a window of vulnerability for critical operating system objects such as code pages and kernel data.
摘要:
Remote assistance is provided to a mobile device across a network to enable malware detection. The mobile device transmits potentially infected memory pages to a remote server across a network. The remote server performs analysis, and provides feedback to the mobile device. Based on the received feedback, the mobile device halts a process, or retrieves and transmits additional memory pages to the remote server for more analysis. This process is repeated until a compromised region of memory is identified and/or isolated for further repair to be performed. The feedback from the remote server reduces the processing and storage burden on the mobile device, resulting in a more reliable detection that uses fewer resources. Embodiments including hypervisors and virtual machines are disclosed.
摘要:
Remote assistance is provided to a mobile device across a network to enable malware detection. The mobile device transmits potentially infected memory pages to a remote server across a network. The remote server performs analysis, and provides feedback to the mobile device. Based on the received feedback, the mobile device halts a process, or retrieves and transmits additional memory pages to the remote server for more analysis. This process is repeated until a compromised region of memory is identified and/or isolated for further repair to be performed. The feedback from the remote server reduces the processing and storage burden on the mobile device, resulting in a more reliable detection that uses fewer resources. Embodiments including hypervisors and virtual machines are disclosed.
摘要:
Wireless devices in proximity are securely paired with one another autonomously by generating a common cryptographic key directly from a time-varying wireless environment shared among the wireless devices. The shared key can be used by the wireless devices to authenticate each wireless device's physical proximity and then to facilitate confidential communication between the wireless devices. The algorithm used to create the shared key is secure against a computationally unbounded adversary and its computational complexity is linear in the size of the shared key.
摘要:
Screening assays that allow for the identification of agents that modulate the activity of the arginylation branch of the N-end rule pathway are provided. Also provided are method of using an agent that modulate the activity of the arginylation branch of the N-end rule pathway to increase or decrease protein degradation in a cell, and to modulate physiologic and pathologic associated with N-end rule pathway mediated arginylation.
摘要:
The disclosure relates to a generic class of ubiquitin-specific proteases which specifically cleave at the C-terminus of the ubiquitin moiety in a ubiquitin fusion protein irrespective of the size of the ubiquitin fusion protein. More specifically, the disclosure relates to ubiquitin-specific proteases of this class which have been isolated from a cell. The disclosure also relates to isolated DNA sequences encoding the proteases of this class.
摘要:
Methods of designing or modifying protein structure at the protein or genetic level to produce specified amino-termini in vivo or in vitro are described. The methods can be used to alter the metabolic stability and other properties of the protein or, alternatively, to artificially generate authentic amino-termini in proteins produced through artificial means. The methods are based upon the introduction of the use of artificial ubiquitin-protein fusions, and the discovery that the in vivo half-life of a protein is a function of the amino-terminal amino acid of the protein.
摘要:
Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.
摘要:
Disclosed here is a nucleic acid sequence encoding a recognition component of the N-end rule pathway. This nucleic acid sequence is characterized by the ability to specifically hybridize to the nucleic acid sequence of SEQ ID NO 1 under stringent hybridization conditions. Such conditions are defined below. Also disclosed is a nucleic acid sequence encoding a recognition component of the N-end rule pathway which is characterized by the ability to specifically hybridize to the nucleic acid sequence of SEQ ID NO 2 under stringent hybridization conditions. Also disclosed are DNA expression vectors containing nucleic acid sequences of the type described above, as well as cells transformed with such expression vectors. Further disclosed are applications for the compositions described above.
摘要翻译:这里公开了编码N末端规则途径的识别成分的核酸序列。 该核酸序列的特征在于在严格杂交条件下与SEQ ID NO 1的核酸序列特异性杂交的能力。 这些条件定义如下。 还公开了编码N末端规则通路的识别组分的核酸序列,其特征在于在严格杂交条件下与SEQ ID NO 2的核酸序列特异性杂交的能力。 还公开了含有上述类型的核酸序列的DNA表达载体以及用这种表达载体转化的细胞。 进一步公开的是上述组合物的应用。