Tesi sul tema "Auxiliary channels"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-41 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Auxiliary channels".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Yasuda, Takahiro. "Modulation of calcium channel function and toxin sensitivity by auxiliary subunits /". [St. Lucia, Qld.], 2004. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18052.pdf.
Molinarolo, Steven. "Biochemical techniques for the study of voltage-gated sodium channel auxiliary subunits". Diss., University of Iowa, 2018. https://ir.uiowa.edu/etd/6217.
Robinson, Philip. "Targeting of voltage-gated calcium channels to lipid rafts : the role of auxiliary alpha2/delta-1 subunits". Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/targeting-of-voltagegated-calcium-channels-to-lipid-rafts-the-role-of-auxiliary-alpha2delta1-subunits(db84049c-1445-4486-9e31-34fa4110daf6).html.
Zhao, Juan. "Biophysical characterization of neuronal and skeletal muscle sodium channels, and their regulation by auxiliary beta subunits". Thesis, Université Laval, 2012. http://www.theses.ulaval.ca/2012/28793/28793.pdf.
Voltage-gated Na channels are responsible for the rising phase of action potentials, and consist of a pore-forming α subunit and one or more auxiliary β subunits. The α subunit alone is sufficient for the functional expression of Na channels, however, β subunits modulate the location, expression and functional properties of α subunits. My thesis will focus on three neuronal Na channels (Nav1.6, Nav1.7 and Nav1.8) and one skeletal muscle Na channel (Nav1.4). Neuronal Na channel are key players in the impulse propagation along axon. Nav1.7 and Nav1.8 are the main Na channels expressed in DRG neurons, and their altered expression and modulation following injury and inflammation play a major role in nociception and chronic pain. Nav1.6 is highly concentrated at nodes of Ranvier, and has a critical role not only in saltatory conduction but also in high-frequency repetitive firing. Skeletal muscle Na channel Nav1.4 is the initiator of muscle contraction. Mutations in Nav1.4 cause skeletal muscle channelopathies. Guiding questions for our investigations were: 1) How do auxiliary β subunits regulate peripheral nerve Na channel Nav1.6 and Nav1.8? 2) What is the underlying biophysical defect of M1476I, a novel founder SCN4A mutation associated with painful cold-induced myotonia in French Canadians? 3) What is the biophysical characterization of the Nav1.6 persistent current? 4) What is the expression pattern of auxiliary subunits, and how do β subunits regulate Nav1.7 in DRG neurons? We addressed these questions by multiple approaches including patch clamp techniques for whole-cell and single-channel recordings in heterologous expression systems; immunohistochemistry, single-cell RT-PCR and immunoprecipitation in DRG neurons. Firstly, we employed single-cell RT-PCR of acutely dissociated DRG neurons to identify the expression of β1-4 subunits in small-diameter sensory neurons. Our results indicated that small-diameter DRG neurons widely expressed Nav1.6 and Nav1.8 channels and β1-β3 subunits. Co-expression studies were used to assess the regulation of Nav1.6 and Nav1.8 by β subunits. The β1 subunit induced a significant increase in the current density of Nav1.8 when co-expressed in HEK293 cells, but had no effect on that of Nav1.6. In addition, the C-terminal domain of β1 was involved in the modulation of Nav1.8 channel based on the results of experiments with β1/β2 chimeras harboring various regions of the strongly regulating β1 together with the weakly regulating β2 subunit. Secondly, we investigated the biophysical defects of M1476I mutation in Nav1.4 channels using whole-cell patch-clamp technique in tsA201 cells. M1476I mutant channel exhibited similar biophysical defects compared with other PAM-causing mutations, including an increased persistent current of Nav1.4, a slower current decay, a positive shift of fast inactivation, and an accelerated recovery from fast inactivation. Lowering the temperature slowed the kinetics for both wide-type and mutant channels, and worsened the defective fast inactivation of M1476I channels by further increasing the amplitude of the persistent current. Mexiletine helps relieve myotonia in M1476I carriers by effectively suppressing the increased persistent current, except for the use-dependent block. However, mexiletine had a reduced effectiveness on the use-dependent block of M1476I channels, and that was associated with a faster recovery from mexiletine block of mutant channels. Thirdly, we characterized the whole-cell and single-channel properties of Nav1.6 persistent currents expressed in HEK293 cells. We noted that Nav1.6 persistent current was highly sensitive to the composition of the internal solution, and persistent current was rarely detectable when CsF instead of CsCl was used. By substituting CsF for CsCl in the intracellular solution, we showed that Nav1.6 persistent current in the whole-cell configuration was 3–5% of the peak transient current. This amplitude of persistent current was similar to the ratio between peak and persistent open probability observed in the single-channel recording, indicating that the occurrence of late channel reopenings accounts for the persistent macroscopic Na current typical of Nav1.6. Finally, we employed a combination of single-cell RT-PCR, immunocytochemistry and immunoprecipitation to investigate subunit expression in subpopulations of sensory neurons. subunits were differentially expressed in small (2, 3) and large (1, 2) DRG neurons. Nav1.7 mRNA was significantly co-expressed with the 2 and 3 subunits in the same population of small-diameter DRG neurons. They formed stable protein-protein interactions and co-localized within the plasma membranes of neurons.When co-expressed in HEK293 cells, 3 and 1 subunits shifted activation and inactivation curves respectively and induced a marked increase in Nav1.7 window current. Our data indicated a preferential expression of subunits in small and large DRG neurons and a subunit-specific Nav1.7 regulation in these subpopulations of sensory neurons.
Tableau d'honneur de la FÉSP
Saponaro, A. C. "THE AUXILIARY SUBUNIT TRIP8B ANTAGONIZES THE BINDING OF CAMP TO HCN2 CHANNELS THROUGH AN ALLOSTERIC MECHANISM". Doctoral thesis, Università degli Studi di Milano, 2014. http://hdl.handle.net/2434/229903.
Zhou, Wei. "Structural and functional studies on the regulation of K+ channels by local anesthetics and intracellular auxiliary subunits /". Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3142460.
Soubrane, Camille Hélène. "Identification of CACHD1 as a novel [alpha]2[delta]-like auxiliary subunit of Cav3 voltage-gated calcium channels". Thesis, University of Reading, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.658003.
Terhag, Jan [Verfasser], Michael [Gutachter] Hollmann e Guiscard Friedrich Aldous [Gutachter] Seebohm. "Auxiliary subunits of voltage-gated Calcium channels as modulators of ionotropic glutamate receptors / Jan Terhag ; Gutachter: Michael Hollmann, Guiscard Friedrich Aldous Seebohm". Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/111670952X/34.
Despang, Patrick Sebastian [Verfasser], Dirk [Akademischer Betreuer] Isbrandt e Markus [Akademischer Betreuer] Plomann. "Autism-related mutations of auxiliary Cavβ-subunits : electrophysiological characterization of effects on the function of voltage-gated calcium channels / Patrick Sebastian Despang ; Akademische Betreuer: Dirk Isbrandt, Markus Plomann". Köln : Deutsche Zentralbibliothek für Medizin, 2020. http://d-nb.info/1215226047/34.
Stephani, Friederike Lene Brigitte [Verfasser]. "α2δ3 is the preferred auxiliary α2δ subunit of Cav2.1 channels in spiral ganglion neurons and is required for development of auditory nerve fiber synapses / Friederike Lene Brigitte Stephani". Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1216877823/34.
Driffort, Virginie. "Rôle du canal sodique NaV1.5 et de la sous-unité auxiliaire β4 dans l’invasivité des cellules cancéreuses mammaires in vitro et in vivo". Thesis, Tours, 2014. http://www.theses.fr/2014TOUR3310.
The abnormal expression of sodium channel Nav1.5 in breast cancer is correlated with metastatic development and an increased mortality. The Nav1.5 channel is located in invadopodia in human breast cancer cells MDA-MB-231, where it increases proteolytic activity by allosteric modulation of exchanger NHE-1 and activation of acidic proteases. In vivo, in a xenograft model in nude NMRI mice, the expression of Nav1.5 potentiates lung colonization by human breast cancer cells. Metastatic colonization is inhibited by treatment with ranolazine, a pharmacological inhibitor of Nav1.5. The β4 subunit, an auxiliary subunit of Nav channels, is expressed at low levels or lost when tumors are more aggressive, and its suppression in vitro increases celI invasiveness. This increase seems to be independent of Nav1.5 and could be associated with the transition of cells to an amoeboid phenotype. In conclusion, Nav1.5 expression and the loss of β4 expression seem to play complementary roles in the invasiveness of cancer cells
Leplus, Gaëtan. "Processeur résistant et résilient aux attaques de fautes et aux attaques par canaux auxiliaires". Electronic Thesis or Diss., Saint-Etienne, 2023. http://www.theses.fr/2023STET0059.
In today's technological landscape, the Internet of Things (IoT) has emerged as a ubiquitous element, yet it brings major security challenges. Fault injection and side-channel attacks are of particular concern, targeting systemic weaknesses and compromising data integrity and confidentiality. Processors, as the cornerstones of computing systems, are crucial in securing the IoT.This thesis focuses on securing the processor pipeline to counter these threats. The significance of this research is highlighted by the need to develop robust security mechanisms at the processor level, the core of all computation and control. Several countermeasures are proposed to enhance the resilience of different parts of the processor against attacks.To secure the data path, an integrity tagging method is proposed. Compatible with traditional masking techniques, this method aims to ensure data integrity throughout the processing pipeline, with minimal overhead.For the instruction path, a mechanism for masking the current instruction is proposed, where a mask is generated based on the previous instruction. This innovative technique enables effective instruction security with very low overhead.Regarding the desynchronization process, it introduces a robust method for inserting dummy instructions more efficiently than current techniques.These countermeasures, by targeting key components of the processor, contribute to a notable improvement in the security of IoT systems. They address the roots of vulnerabilities, thus providing enhanced protection against a wide range of attacks
Coulton, Paul. "Novel synchronisation and channel estimation techniques using auxiliary decoding information". Thesis, Lancaster University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266675.
Mercier-François, Aurélie. "Adressage et expression fonctionnelle des canaux sodiques cardiaques Nav1.5 : rôle majeur de la sous-unité régulatrice β1". Thesis, Poitiers, 2013. http://www.theses.fr/2013POIT2272/document.
Brugada syndrome (BrS) is an inherited autosomal dominant cardiac channelopathy characterized by abnormal ECG pattern and an increased risk of sudden cardiac death. Several mutations on the cardiac sodium channel Nav1.5 which are responsible for BrS lead to misfolded proteins that do not traffic properly to the plasma membrane and are instead retained in intracellular compartments. Although pharmacological rescue is commonly used to characterize misfolded mutants, underlying cellular retention mechanisms remain unclear. The aim of this work is to investigate trafficking defective Nav1.5 mutants considering BrS patient heterozygosity and the presence of the regulatory β1-subunit which is largely expressed in cardiac tissue. By combining electrophysiology and biochemical approaches, we show that three distinct mutants, R1432G, L325R and S910L, exert a strong dominant negative effect upon wild-type (WT) sodium current density. Our data indicate that this effect requires the presence of the β1-subunit and is mediated by disruption of membrane trafficking of WT channels. Co-immunoprecipitation experiments demonstrate a physical interaction between mutant and WT α-subunits occurring only when the β1-subunit was present. Furthermore, we investigate the maturation pattern of Na channels. Our data show distinct N-glycosylated states between WT and mutant channels, suggesting that Nav1.5 α-subunits traffic (i) via unconventional secretion pathway as a partially glycosylated product, (ii) through the classical secretory pathway for mature fully-glycosylated form. This work highlights that β1-subunit and N-linked glycosylation process play key roles in modulating Nav1.5 trafficki
Espinoza, Fuenzalida Italo. "Structure-function mapping of the voltage-gated calcium channel alpha2delta-1 subunit". Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/structurefunction-mapping-of-the-voltagegated-calcium-channel-alpha2delta1-subunit(4a7f1b7b-2c6c-4d56-8f0c-4c76f5af43f0).html.
Havard, A. "Studies on the Nav3.1 auxiliary subunit of the voltage gated sodium channel". Thesis, University of Cambridge, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603856.
Shah, Bhaval. "Characterisation of β3, a novel auxiliary subunit for the voltage gated sodium channel". Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621414.
Takarabt, Sofiane. "Évaluation pré-silicium de circuits sécurisés face aux attaques par canal auxiliaire". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT015.
Embedded systems are constantly threatened by various attacks, including side-channel attacks. To guarantee a certain level of security, cryptographic implementations must validate evaluation tests recommended by the certification standards, and thus meet the market needs. For this reason, it is necessary to implement reliable countermeasures to counter this type of attacks. However, once these countermeasures are implemented, verification and validation tests can be very costly in terms of time and money. Thus, optimizing the lifecycle of the circuit, between the design stage and the evaluation stage is paramount. We will explore a very broad class of existing attacks (passive and active), and propose methods of pre-silicon level assessments, allowing on the one hand, to detect the different types of leakages that a given attacker can exploit, and on the other hand, expose different techniques to counter these attacks, while respecting the performance and area aspect. In our analyses, we apply formal and empirical methods to track the impact of each vulnerability on the different abstraction levels of the circuit, and thus propose optimal countermeasures
Casalino, Lorenzo. "(On) The Impact of the Micro-architecture on Countermeasures against Side-Channel Attacks". Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS036.
Side-channels attacks are recognized as a threat for the confidentiality of data, in particular on embedded systems. The masking countermeasure constitutes a provably secure protection approach. Nonetheless, physical non-idealities reduce its proven security guarantees. In particular, in the software implementations, the Instruction Set Architecture (ISA) supported by a processor hides to the masking scheme designer one cause of such physical non-idealities: the micro-architecture. As such, the designer is not aware of the actual micro-architecture-induced side-channel sources and their security impact on a software implementation. Information can leak, for instance, during the state transition of hidden registers, or in the case signals of combinatorial elements exhibit different propagation times. Furthermore, speculative features and the memory subsystems can play a role in such information leakage. Several methodologies allow the mitigation of the impact of the micro-architecture on masked software implementations, but these approaches depend on the detailed knowledge of the micro-architecture, which implies several shortcomings: limited portability of the security guarantees between different micro-architectures, incomplete knowledge of the microarchitecture, complexity of the micro-architecture design. Thus, one might wonder whether there exist approaches less dependent on the underlying micro-architecture. With this thesis, we address, along two axes, the problem of developing practically secure masked software. The first axis targets the automated development of masked software resilient to transition-based leakages. We propose a methodology that takes advantage of optimizing compilers: given in input a software implementation, annotated with sensitive-data-related information, and a description of the target micro-architecture, we show how to exploit the instruction scheduling and register allocation tools to mitigate transition-based leakages in an automated manner. The second axis targets an architecture-independent approach. In literature, most of the works focuses on mitigating the impact of the micro-architecture on software implementations protected with the so-called Boolean masking scheme. Theoretical studies show the better resilience of alternative types masking schemes against transition-based leakages, suggesting their employment against micro-architectural leakage. Yet, their practical resilience has not been explored. Furthermore, the potential exploitation of the information leaked by data parallelism, potentially induced by the micro-architecture, has not been studied for software implementations. As such, we study the practical security offered by first-order Boolean, arithmetic and Inner-Product masking against micro-architecture-induced leakage, encompassing data parallelism as well. We first show that data parallelism can manifest also on simple scalar micro-architectures. Then, we evaluate the impact of transition-based leakage and data parallelism on values masked with the studied masking schemes. Eventually, we evaluate the impact of such information leakages on different masked implementations of the AES-128 cryptosystem. We show that, although their different leakage resilience, none of the studied masking schemes can perfectly mitigate the considered micro-architectural leakages
Rauzy, Pablo. "Méthodes logicielles formelles pour la sécurité des implémentations de systèmes cryptographiques". Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0039/document.
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected against them. Of course, malfunctioning protections are useless. Formal methods help to develop systems while assessing their conformity to a rigorous specification. The first goal of my thesis, and its innovative aspect, is to show that formal methods can be used to prove not only the principle of the countermeasures according to a model, but also their implementations, as it is where the physical vulnerabilities are exploited. My second goal is the proof and the automation of the protection techniques themselves, because handwritten security code is error-prone
Proy, Julien. "Sécurisation systématique d'applications embarquées contre les attaques physiques". Thesis, Paris Sciences et Lettres (ComUE), 2019. http://www.theses.fr/2019PSLEE048.
The security of embedded systems containing sensitive data has become a main concern. These widely deployed devices are subject to physcial attacks, requiring protections both in hardware and software. The race for higher productivity and shorter time to market in the deployment of secure systems pushes for automatic solutions. This thesis studies the integration of software countermeasures against fault attacks in development tools, with a special focus on the compiler. The goal is to enable the automatic application, at compilation time, of a wide range of countermeasures. We propose two protection schemes against these attacks which can be automatically deployed: one scheme dedicated to loop control flow and the second dedicated to the protection of the call graph. These schemes, integrated in the LLVM compiler framework, allow to focus security application on sensitive areas of the targeted code, thus limitating the overhead. Faults that can be exploited are different from a device to another, we thus also provide an ISA-level characterization of fault effects on a superscalar processor representative of mobile phones. This work highlights the need of studying fault effects on more complex platforms, leading to the design of new protection schemes and automating their compilation-time application
Maurice, Clémentine. "Fuites d'information dans les processeurs récents et applications à la virtualisation". Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0070/document.
In a virtualized environment, the hypervisor provides isolation at the software level, but shared infrastructure makes attacks possible at the hardware level. Side and covert channels are well-known issues of shared hardware, and in particular shared processors. However, they rely on microarchitectural features that are changing with the different generations of hardware. The last years have also shown the rise of General-Purpose computing on Graphics Processing Units (GPGPU), coupled to so-called cloud environments. This thesis explores these recent evolutions and their consequences in terms of information leakage in virtualized environments. We first investigate the recent processor microarchitectures. Our first contribution is C5, a cross-core cache covert channel, evaluated between virtual machines. Following this work, our second contribution is the reverse engineering of the complex addressing function of the last-level cache of Intel processors, rendering the class of cache attacks highly practical. In the last part, we investigate the security of GPU virtualization. Our third contribution shows that virtualized environments are susceptible to information leakage from the GPU memory
Chabrier, Thomas. "Arithmetic recodings for ECC cryptoprocessors with protections against side-channel attacks". Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00910879.
Rauzy, Pablo. "Méthodes logicielles formelles pour la sécurité des implémentations de systèmes cryptographiques". Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0039.
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected against them. Of course, malfunctioning protections are useless. Formal methods help to develop systems while assessing their conformity to a rigorous specification. The first goal of my thesis, and its innovative aspect, is to show that formal methods can be used to prove not only the principle of the countermeasures according to a model, but also their implementations, as it is where the physical vulnerabilities are exploited. My second goal is the proof and the automation of the protection techniques themselves, because handwritten security code is error-prone
Bruneau, Nicolas. "Attaque par canaux auxillaires multivariées, multi-cibles et d'ordre élevé". Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0025/document.
Side Channel Attacks are a classical threat against cryptographic algorithms in embedded systems. They aim at exploiting the physical leakages unintentionally emitted by the devices during the execution of their embedded programs to recover sensitive data. As such attacks represent a real threat against embedded systems different countermeasures have been developed. In thesis we investigate their security in presence of multiple leakages. Indeed there often are in the leakage measurements several variables which can be exploited to mount Side Channel Attacks. In particular we show in this thesis the optimal way to exploit multiple leakages of a unique variable. This dimensionality reduction comes with no loss on the overall exploitable information. Based on this result we investigate further how such dimensionality reduction methodscan be applied in the case of protected implementations. We show that the impact of such methods increases with the security “level” of the implementation. We also investigate how to exploit the leakages of multiplevariables in order to improve the results of Side Channel Analysis. We start by improving the attacks against masking schemes, with a precomputed table recomputation step. Some protections have been developed to protect such schemes. As a consequence we investigate the security provided by these protections. In this context we present results which show that the main parameter to evaluate the security of the masking schemes is not sufficient to estimate the global security of the implementation. Finally we show that in the context of masking scheme with shuffling the optimal attack is not computable. As a consequence we present a truncated version of this attack with a better effectiveness
Maurice, Clémentine. "Fuites d'information dans les processeurs récents et applications à la virtualisation". Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0070.
In a virtualized environment, the hypervisor provides isolation at the software level, but shared infrastructure makes attacks possible at the hardware level. Side and covert channels are well-known issues of shared hardware, and in particular shared processors. However, they rely on microarchitectural features that are changing with the different generations of hardware. The last years have also shown the rise of General-Purpose computing on Graphics Processing Units (GPGPU), coupled to so-called cloud environments. This thesis explores these recent evolutions and their consequences in terms of information leakage in virtualized environments. We first investigate the recent processor microarchitectures. Our first contribution is C5, a cross-core cache covert channel, evaluated between virtual machines. Following this work, our second contribution is the reverse engineering of the complex addressing function of the last-level cache of Intel processors, rendering the class of cache attacks highly practical. In the last part, we investigate the security of GPU virtualization. Our third contribution shows that virtualized environments are susceptible to information leakage from the GPU memory
Carré, Sébastien. "Attaques exploitant le temps de calcul : modélisation et protections". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT045.
A particularly efficient attack class is the class of cache timing attacks, that exploit the difference of time between cache memories and main memory, and are considered in this thesis with a cryptographic point of view. One aim of this thesis is to understand better such attacks.In other hand, the Rowhammer attack that induces perturbations in the capacitors of the DRAM modules in order to create an error called a fault that are also considered in this thesis with a cryptographic point of view.This thesis explores different microarchitectures features before exploring cache timing attacks and fault attack with the Rowhammer attack in mind. Based on the knowledge about these features, the thesis is split in two parts.The first part is about cache timing attacks. It gathers useful hardware and software features that should be considered to perform precise timing measurements. Those considerations were used to improve an existing attack on ECDSA on a known vulnerability.One result of this thesis will fill the gap between the general techniques used for the attacks and the exploitation of a vulnerability by searching such vulnerability in a binary by using dynamic analysis.In the second part of this thesis, fault attacks closed of the Rowhammer attack are considered. Like the first part, a way to perform software analysis is given.Eventually, in the second part a result about a so called persistent fault attack is improved.This thesis mainly focuses on improving existing attacks and on new ways to perform software analysis of cache timing attacks and attacks related to the Rowhammer attack in order to fill the needs of manufacturers to protect theirs products against those attacks
Bruneau, Nicolas. "Attaque par canaux auxillaires multivariées, multi-cibles et d'ordre élevé". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0025.
Side Channel Attacks are a classical threat against cryptographic algorithms in embedded systems. They aim at exploiting the physical leakages unintentionally emitted by the devices during the execution of their embedded programs to recover sensitive data. As such attacks represent a real threat against embedded systems different countermeasures have been developed. In thesis we investigate their security in presence of multiple leakages. Indeed there often are in the leakage measurements several variables which can be exploited to mount Side Channel Attacks. In particular we show in this thesis the optimal way to exploit multiple leakages of a unique variable. This dimensionality reduction comes with no loss on the overall exploitable information. Based on this result we investigate further how such dimensionality reduction methodscan be applied in the case of protected implementations. We show that the impact of such methods increases with the security “level” of the implementation. We also investigate how to exploit the leakages of multiplevariables in order to improve the results of Side Channel Analysis. We start by improving the attacks against masking schemes, with a precomputed table recomputation step. Some protections have been developed to protect such schemes. As a consequence we investigate the security provided by these protections. In this context we present results which show that the main parameter to evaluate the security of the masking schemes is not sufficient to estimate the global security of the implementation. Finally we show that in the context of masking scheme with shuffling the optimal attack is not computable. As a consequence we present a truncated version of this attack with a better effectiveness
Qin, Hao. "Sécurité pratique de systèmes de cryptographie quantique : étude d'attaques et développement de contre-mesures". Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0040.
In this thesis, I study a cryptographic primitive called quantum key distribution which allows two remote parties to share a secret key, in the presence of an eavesdropper, whose power is only limited by the laws of quantum physics. I focus my study on the implementation and the practical security of continuousvariable protocols. For the first time, I have proposed and studied a detector-based side channel attack on a continuous-variable system : saturation attack. This attack opens a new security loophole that we have characterized experimentally in our laboratory, on a real continuous-variable system. Finally, we have demonstrated experimentally for the first time the feasibility of a continuous-variable system deployment in a Dense Wavelength Division Multiplexing network, where quantum signals coexist with intense classical signals in a same fiber
Richmond, Tania. "Implantation sécurisée de protocoles cryptographiques basés sur les codes correcteurs d'erreurs". Thesis, Lyon, 2016. http://www.theses.fr/2016LYSES048/document.
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEliece. Cryptography based on codes is called post-quantum because until now, no algorithm able to attack this kind of protocols in polynomial time, even using a quantum computer, has been proposed. This is in contrast with protocols based on number theory problems like factorization of large numbers, for which efficient Shor's algorithm can be used on quantum computers. Nevertheless, the McEliece cryptosystem security is based not only on mathematical problems. Implementation (in software or hardware) is also very important for its security. Study of side-channel attacks against the McEliece cryptosystem have begun in 2008. Improvements can still be done. In this thesis, we propose new attacks against decryption in the McEliece cryptosystem, used with classical Goppa codes, including corresponding countermeasures. Proposed attacks are based on evaluation of execution time of the algorithm or its power consumption analysis. Associate countermeasures are based on mathematical and algorithmic properties of the underlying algorithm. We show that it is necessary to secure the decryption algorithm by considering it as a whole and not only step by step
Benhani, El mehdi. "Sécurité des systèmes sur puce complexes hétérogènes". Thesis, Lyon, 2020. http://www.theses.fr/2020LYSES016.
The thesis studies the security of the ARM TrustZone technology in the context of complex heterogeneous SoCs. The thesis presents hardware attacks that affect elements of the SoCs architecture and it also presents countermeasure strategies
Hasan, Mohammad Khalad. "A-Coord input: augmented pen-based interactions by combining auxiliary input channels". 2012. http://hdl.handle.net/1993/5286.
Sun, Yeh-Liang, e 孫也喨. "Adaptive Power Control Mechanisms based on Auxiliary Channels in Carrier-sensing Wireless Environments". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3n8vu2.
Barbosa, Nuñez Cindy Marie. "Resurgent sodicum current modulation by auxiliary subunits in dorsal root ganglia neurons and potential implications in pain pathologies". Diss., 2016. http://hdl.handle.net/1805/10475.
Increased electrical activity in peripheral sensory neurons contributes to pain. A unique type of sodium current, fast resurgent current, is proposed to increase nerve activity and has been associated with pain pathologies. While sodium channel isoform Nav1.6 has been identified as the main carrier of fast resurgent currents, our understanding of how resurgent currents are modulated in sensory neurons is fairly limited. Thus the goal of this dissertation was to identify resurgent current modulators. In particular, we focused on sodium channel beta subunits (Navβs) and fibroblast growth factor homologous factors (FHFs) in dorsal root ganglion (DRG) neurons. We hypothesized that Navβ4 and FHF2B act as positive regulators by mediating resurgent currents and modulating Nav1.6 inactivation, respectively. In contrast, we hypothesized FHF2A negatively regulates resurgent current by increasing the probability of channels in inactivated states. Thus, the aims of this dissertation were to 1) determine if Navβ4 regulates fast resurgent currents in DRG neurons, 2) examine the effects of Navβ4 knockdown on resurgent currents, firing frequency and pain associated behavior in an inflammatory pain model and 3) determine if FHF2A and FHF2B functionally regulate Nav1.6 currents, including resurgent currents in DRG neurons. To examine the aims, we used biochemical, electrophysiological and behavioral assays. Our results suggest that Navβ4 is a positive regulator of resurgent currents: in particular, the C-terminus likely mediates these currents. Localized knockdown of Navβ4 decreased inflammation-induced enhancement of resurgent currents and neuronal excitability, and prevented the development of persistent pain associated behavior in an inflammatory pain model. FHF2B increased resurgent currents and delayed inactivation. In contrast, FHF2A limited resurgent currents; an effect that is mainly contributed by FHF2A's N-terminus activity that increased accumulation of channels in inactivated states. Interestingly, in an inflammatory pain model FHF2B was upregulated and FHFA isoforms were downregulated. Together these results suggest that FHF2A/B modulation might contribute to enhanced resurgent currents and increased neuronal excitability observed in the inflammatory pain model. Overall, our work has identified three resurgent current modulators FHF2A, FHF2B and Navβ4. Manipulation of these proteins or their activity might result in novel strategies for the study and treatment of pain.
Steccanella, Federica. "The relevance of L-type calcium channel gating properties to cardiac arrhythmia and differential modulation of L-type CaV channels by the α2δ-1 auxiliary subunit". Doctoral thesis, 2019. http://hdl.handle.net/11562/998380.
Vijayaragavan, Kausalia. "Biophysical characterization of Nav1.7 and Nav1.8 rat isoforms of the voltage gated sodium channels from dorsal root ganglions : regulation by auxiliary B-subunits and by protein kinase A and C /". 2004. http://proquest.umi.com/pqdweb?did=790267701&sid=39&Fmt=2&clientId=9268&RQT=309&VName=PQD.
Sur la p. de t., les "v" de Nav1.7 et Nav1.8 apparaissent en indice. Le "B" de B-subunits est le bêta de l'alphabet grec. Bibliogr. Publié aussi en version électronique.
Du, Po-Hao, e 杜柏澔. "Down-regulation of Kv4 Potassium Channel Auxiliary Subunits in Nociceptors Induces Pain". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/62016909908303518466.
國立陽明大學
神經科學研究所
103
Kv4 channels evoke subthreshold A-type K+ currents, which play a critical role in regulating neuronal excitability. Native Kv4 channels function in ternary complex comprising Kv4 pore-forming subunits and two types of auxiliary subunits: cytosolic K+ channel interacting proteins (KChIPs) and transmembrane dipeptidyl peptidase like proteins (DPPLs). When coexpressed with KChIP or DPPL in heterologous systems, Kv4-mediated A-type K+ currents increase several to more than 10 folds. Kv4.3 is highly expressed in a subset of pain-sensing neurons (= nociceptors) whose somata are located in the dorsal root ganglion (DRG), and reduced Kv4.3 expression in nociceptors results in mechanical hypersensitivity, a major symptom of pain. Furthermore, KChIP1, KChIP2 and DPP10 are coexpressed with Kv4.3 in the same subset of nociceptors. In this study, we test whether reducing Kv4 auxiliary subunit expression in nociceptors can also induce pain. KChIP1, KChIP2 and DPP10 protein levels in nociceptors were greatly decreased in the ipsilateral lumbar (L)5 DRG of rats after L5/L6 spinal nerve ligation. Intrathecal injections of Kv4.3 antisense oligodeoxynucleotide (ODN) effectively suppressed Kv4.3, KChIP1, KChIP2 and DPP10 protein expression in the nociceptors of bilateral L5 DRGs. Bilateral mechanical hypersensitivity was induced in the hindpaws of naïve rats following intrathecal injections of gene-specific antisense ODN for KChIP1, KChIP2 or DPP10. KChIP1 or KChIP2 antisense ODN effectively suppressed Kv4.3, KChIP1 and KChIP2 but not DPP10 protein expression in the nociceptors. By contrast, DPP10 antisense ODN suppressed Kv4.3 and DPP10 but not KChIP1 and KChIP2 protein expression in the nociceptors. The protein levels of KChIP1, KChIP2 and DPP10 in the spinal cord were not affected by either L5/L6 spinal nerve ligation or antisense ODN injections. Furthermore, DPP10 antibody could coimmunoprecipitate Kv4.3 but not KChIP1 proteins in the rough endoplasmic reticulum (ER) of rat brain. Based on these results, we raise the following hypothesis: Kv4.3 proteins complex with KChIP1 (as a representative of KChIP1 and KChIP2) and DPP10 proteins respectively in the rough ER soon after being synthesized, then Kv4.3/KChIP1 and Kv4.3/DPP10 binary complexes traffic to the plasma membrane separately, and finally Kv4.3/KChIP1/DPP10 ternary complexes are assembled on the cell surface. Together, this study demonstrates that KChIP1, KChIP2 and DPP10 can modulate total Kv4.3 protein level in a subset of nociceptors respectively, suggesting that these Kv4 auxiliary subunits are potential targets for pain therapy.
Morin, Michaël. "Étude numérique de la formation du complexe protéique formé du canal potassique humain Kv4.2 et de sa sous-unité bêta DPP6.2". Thèse, 2018. http://hdl.handle.net/1866/22211.
Wang, Wan-Chen, e 王婉真. "Expression of Kv4 Channel Auxiliary Subunits KChIP1-3 and DPP10 in Rat Nervous System". Thesis, 2014. http://ndltd.ncl.edu.tw/handle/65432965204422145316.
國立陽明大學
神經科學研究所
102
Subthreshold A-type K+ currents (ISAs) have been recorded from the cell bodies of hippocampal and cortical interneurons, cortical pyramidal neurons, spinal lamina II excitatory interneurons and nociceptors. Kv4 channels are responsible for the somatodendritic ISAs. It has been proposed that Kv4 channels in neurons are ternary complexes, including pore forming -subunits of the Kv4 subfamily and two types of auxiliary -subunits: the K+ channel-interacting proteins (KChIPs) and dipeptidyl peptidase-like proteins (DPPLs). However, colocalization evidence was still lacking. The protein distribution of Kv4 -subunits in the rat nervous system has been reported but the expression of Kv4 -subunits remains unclear. To understand the distribution of Kv4 -subunits in the nervous system, we mapped the protein distribution of DPP10 in the rat nervous system as well as KChIP1-3 in the spinal cord and dorsal root ganglion (DRG) by immunohistochemistry, and compared them to the localization of Kv4 -subunits. DPP10 is colocalized with Kv4.3 and KChIP1 in the somata of most somatostatin(+) hippocampal and all cortical interneurons. DPP10 is also colocalized with Kv4.2, Kv4.3, and KChIP3 in the somata of cortical layer 5 pyramidal neurons. In the dorsal spinal cord, DPP10 is present in the projection neurons, whereas KChIP1 and KChIP2 are expressed in the somatodendrtic compartment of a subset of lamina II excitatory interneurons, which also express Kv4.2 and Kv4.3. In the DRG, Kv4.3, KChIP1, KChIP2, and DPP10 are coexpressed in a subset of nonpeptidergic nociceptors, whereas KChIP3 is expressed in some peptidergic nociceptors. These results support that Kv4/KChIP/DPPL form ternary complexes in some ISA-expressing neurons, and these four Kv4 auxiliary subunits may be involved in pain signaling.
Tétreault, Marie-Philippe. "Modifications post-traductionnelles des canaux calciques cardiaques de type L : identification des résidus asparagine qui participent à la glycosylation de la sous-unité auxiliaire CaVα2δ1". Thèse, 2015. http://hdl.handle.net/1866/13897.
L-type CaV1.2 channels play a key role in the excitation-contraction coupling in the heart. They are formed of a pore-forming CaVα1 subunit in complex with the intracellular CaVβ and the disulfur-linked CaVα2δ accessory subunits. CaVα2δ significantly increases peak current densities of CaV1.2. The mechanism underlying this effect is still under study but requires that CaVα2δ be trafficked at the cell surface. CaVα2δ contains 16 putative N-glycosylation sites. A study was carried out to identify the role of N-glycosylation in the trafficking and protein stability of the subunit CaVα2δ. Herein we show that enzymatic removal of N-glycans produced a 50 kDa shift in the mobility of cardiac and recombinant CaVα2δ1 proteins. Simultaneous mutation of the 16 Asn sites was required to fully account for this change in protein mobility. Nonetheless, the mutation of only 6/16 sites was sufficient to 1) significantly reduce the steady-state cell surface fluorescence of CaVα2δ1 as characterized by two-color flow cytometry assays and confocal imaging; 2) accelerate the degradation kinetics estimated from cycloheximide chase assays; and 3) prevent the CaVα2δ1-mediated increase in peak current density and voltage-dependent gating of CaV1.2. Reversing the N348Q and N812Q mutations in the non-operational 6 Asn mutant functionally rescued CaVα2δ1. Single mutation N663Q and double mutations N348Q/ N468Q, N348Q/ N812Q, N468Q/N812Q decreased protein stability/synthesis and abolished steady-state cell surface density as well as upregulation of L-type currents. These results demonstrate that Asn663, and to a lesser extent Asn348, Asn468, and Asn812 contribute to the stability of CaVα2δ1 function and furthermore that N- glycosylation of CaVα2δ1 is essential to produce functional L-type Ca2+ channels.
Sarmento, Miguel da Fonseca Botelho Rodrigues. "Exploration of innovative products in airline services". Master's thesis, 2020. http://hdl.handle.net/10071/21409.
Devido à forte concorrência inerente à indústria da aviação, combinada com baixos lucros e custos operacionais significativos, as companhias aéreas necessitam captar receitas adicionais para serem financeiramente sustentáveis. Este trabalho de pesquisa examina as companhias aéreas procurando perceber as necessidades dos passageiros e as oportunidades que daí surjam. Em colaboração com a TAP Air Portugal, o caminho passa pela inovação na venda de "ancillaries" aumentando a proposta de valor ao cliente e vendendo mais nos canais diretos. Assim, a jornada de viagem do passageiro é analisada tentando perceber as suas preferências ao longo deste processo. A relação do passageiro com as companhias aéreas nomeadamente aos níveis de confiança, fiabilidade e aceitação de novos produtos e serviços são explorados. Por último, foi também analisada a possibilidade de as companhias aéreas revenderem os bilhetes de avião. Através da criação e execução de um inquérito online foram obtidos dados relativamente a 300 passageiros que usualmente viajam de avião de modo a explorar as suas necessidades e potenciais inovações em produtos e serviços. Assim, através de analises estatísticas, foram apuradas as razões que levam os passageiros a não adquirir o seu bilhete de avião diretamente com a companhia aérea. Foi apurado que os passageiros não estão satisfeitos com a informação que obtêm e que sentem a necessidade em serem devidamente aconselhados ao fazerem as suas viagens. Foi também apurado que os passageiros demonstram um nível positivo de aceitação para trocarem o seu bilhete de avião, para uma data próxima, se forem reembolsados para o fazer.