FUTURE is a recently proposed lightweight block cipher that achieved a remarkable hardware performance due to careful design decisions.FUTURE is an Advanced Encryption Standard(AES)-like Substitution-Permutation Netwo...FUTURE is a recently proposed lightweight block cipher that achieved a remarkable hardware performance due to careful design decisions.FUTURE is an Advanced Encryption Standard(AES)-like Substitution-Permutation Network(SPN)with 10 rounds,whose round function consists of four components,i.e.,SubCell,MixColumn,ShiftRow,and AddRoundKey.Unlike AES,it is a 64-bit-size block cipher with a 128-bit secret key,and the state can be arranged into 16 cells.Therefore,the operations of FUTURE including its S-box is defined over F24.The previous studies have shown that the integral properties of 4-bit S-boxes are usually weaker than larger-size S-boxes,thus the number of rounds of FUTURE,i.e.,10 rounds only,might be too aggressive to provide enough resistance against integral cryptanalysis.In this paper,we mount the integral cryptanalysis on FUTURE.With state-of-the-art detection techniques,we identify several integral distinguishers of 7 rounds of FUTURE.By extending this 7-round distinguisher by 3 forward rounds,we manage to recover all the 128 bits secret keys from the full FUTURE cipher without the full codebook for the first time.To further achieve better time complexity,we also present a key recovery attack on full FUTURE with full codebook.Both attacks have better time complexity than existing results.展开更多
Objective:Skin wound exposed to complex external environment for a long time is highly susceptible to bacterial infection.Impact Statement:This work designs a Janus adhesive dual-layer hydrogel containing in situ silv...Objective:Skin wound exposed to complex external environment for a long time is highly susceptible to bacterial infection.Impact Statement:This work designs a Janus adhesive dual-layer hydrogel containing in situ silver nanoparticles(named PSAP/DXP@AgNPs)with integrated attack and defense to simultaneously kill the existing bacteria and prevent foreign bacterial contamination.Introduction:The current gauze dressing fixed by tape fails to well fit at skin wound and lacks intrinsic antibacterial property,making it highly prone to causing secondary infection.Moreover,foreign bacteria may contaminate the wound dressing during use,further increasing the risk of secondary infection.Methods:In this work,a Janus adhesive dual-layer PSAP/DXP@AgNPs hydrogel is prepared by sequentially building the PSAP gel layer containing zwitterionic poly(sulfobetaine methacrylamide)(PSBMA)on the DXP@AgNPs gel layer containing in situ catechol-reduced AgNPs.Results:The flexible PSAP/DXP@AgNPs can adapt shape change of skin and adhere to skin tissue with interfacial toughness of 153.38 J m^(−2) relying on its DXP@AgNPs layer,which is beneficial to build favorable fit.The in situ reduced AgNPs released from the DXP@AgNPs layer of PSAP/DXP@AgNPs exhibit obvious antibacterial effects against Escherichia coli and Staphylococcus aureus,with antibacterial rates of 99%and 88%,respectively.Meanwhile,the hydrated PSAP layer of PSAP/DXP@AgNPs containing PSBMA is able to prevent the bacterial contamination,decreasing the risk of secondary infection.Besides,cell experiments demonstrate that PSAP/DXP@AgNPs is biocompatible.Conclusion:The PSAP/DXP@AgNPs hydrogel with integrated attack and defense simultaneously possessing bacteria-killing and bacteria-antifouling properties is a potential alternative in treating infected skin wound.展开更多
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyberphysical systems subject to process disturbances and measurement noise.A stealthy intermittent integri...This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyberphysical systems subject to process disturbances and measurement noise.A stealthy intermittent integrity attack strategy is first proposed by modifying a zero-dynamics attack model.The stealthiness of the generated attacks is rigorously investigated under the condition that the adversary does not know precisely the system state values.In order to help detect such attacks,a backward-in-time detection residual is proposed based on an equivalent quantity of the system state change,due to the attack,at a time prior to the attack occurrence time.A key characteristic of this residual is that its magnitude increases every time a new attack occurs.To estimate this unknown residual,an optimal fixed-point smoother is proposed by minimizing a piece-wise linear quadratic cost function with a set of specifically designed weighting matrices.The smoother design guarantees robustness with respect to process disturbances and measurement noise,and is also able to maintain sensitivity as time progresses to intermittent integrity attack by resetting the covariance matrix based on the weighting matrices.The adaptive threshold is designed based on the estimated backward-in-time residual,and the attack detectability analysis is rigorously investigated to characterize quantitatively the class of attacks that can be detected by the proposed methodology.Finally,a simulation example is used to demonstrate the effectiveness of the developed methodology.展开更多
Cyber-physical systems(CPS)have been widely deployed in critical infrastructures and are vulnerable to various attacks.Data integrity attacks manipulate sensor measurements and cause control systems to fail,which are ...Cyber-physical systems(CPS)have been widely deployed in critical infrastructures and are vulnerable to various attacks.Data integrity attacks manipulate sensor measurements and cause control systems to fail,which are one of the prominent threats to CPS.Anomaly detection methods are proposed to secure CPS.However,existing anomaly detection studies usually require expert knowledge(e.g.,system model-based)or are lack of interpretability(e.g.,deep learning-based).In this paper,we present DEEPNOISE,a deep learning-based anomaly detection method for CPS with interpretability.Specifically,we utilize the sensor and process noise to detect data integrity attacks.Such noise represents the intrinsic characteristics of physical devices and the production process in CPS.One key enabler is that we use a robust deep autoencoder to automatically extract the noise from measurement data.Further,an LSTM-based detector is designed to inspect the obtained noise and detect anomalies.Data integrity attacks change noise patterns and thus are identified as the root cause of anomalies by DEEPNOISE.Evaluated on the SWaT testbed,DEEPNOISE achieves higher accuracy and recall compared with state-of-the-art model-based and deep learningbased methods.On average,when detecting direct attacks,the precision is 95.47%,the recall is 96.58%,and F_(1) is 95.98%.When detecting stealthy attacks,precision,recall,and F_(1) scores are between 96% and 99.5%.展开更多
Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent ...Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent protection against malicious hosts.A new security mechanism called Checkpoints has been proposed.Checkpoint Mechanism(CPM)aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks.CPM assumes using a free-roaming mobility mechanism by Mobile agent systems.The main idea behind CPM is to generate multiple versions of Mobile Agent.The multiple version is used to recover Mobile Agent from Capturing and Integrity attacks by untrusted hosts.MA versions are kept in Recovery Host(RH).RH plays a key role in CPM by controlling and monitoring MAs’recovery processes.A prototype method has been used to prove the feasibility of CPM.The p https://dsr.kau.edu.sa/Default-305-ARrototype was implemented by using the.Net framework and C#.full discussion for several scenarios has been done to analyze the feasibility and performance for CPM.As found from this research,CPM has a strong ability to protect Mobile Agents from Capturing and Integrity attacks completely.In addition,there is no negative impact on the overall performance of the mobile agent system.展开更多
To develop an efficient thrombolytic therapy approach that addresses the limitations of current fibrinolytic drugs, such as short half-life, weak thrombus specificity and poor penetration ability, we constructed a NIR...To develop an efficient thrombolytic therapy approach that addresses the limitations of current fibrinolytic drugs, such as short half-life, weak thrombus specificity and poor penetration ability, we constructed a NIR-triggered detachable nanoplatform (PA/UK@IcpLipo) using thin-film hydration method. It was designed to integrate attack and defense mechanisms for thrombolytic therapy. This platform can actively identify thrombi by binding to GPIIb-IIIa receptors overexpressed on activated platelets. Upon NIR laser activation and interaction with thrombin in the thrombotic microenvironment, the thermosensitive liposomes rupture, releasing the PA/UK core for deep penetration into the thrombus. Our results showed that the PA/UK@IcpLipo nanoplatform efficiently promoted rapid thrombolysis under the action of UK (attack), followed by PA exerting an antiplatelet aggregation effect (defense). This dual-action approach significantly improved vascular reperfusion rates. The NIR-triggered detachable nanoplatform offered a promising solution for enhanced thrombolysis efficiency and reduced bleeding risk, addressing critical limitations of current fibrinolytic therapies.展开更多
基金supported by the National Natural Science Foundation of China(No.62032014)the National Key Research and Development Program of China(No.2018YFA0704702)the Major Basic Research Project of Natural Science Foundation of Shandong Province,China(No.ZR202010220025).
文摘FUTURE is a recently proposed lightweight block cipher that achieved a remarkable hardware performance due to careful design decisions.FUTURE is an Advanced Encryption Standard(AES)-like Substitution-Permutation Network(SPN)with 10 rounds,whose round function consists of four components,i.e.,SubCell,MixColumn,ShiftRow,and AddRoundKey.Unlike AES,it is a 64-bit-size block cipher with a 128-bit secret key,and the state can be arranged into 16 cells.Therefore,the operations of FUTURE including its S-box is defined over F24.The previous studies have shown that the integral properties of 4-bit S-boxes are usually weaker than larger-size S-boxes,thus the number of rounds of FUTURE,i.e.,10 rounds only,might be too aggressive to provide enough resistance against integral cryptanalysis.In this paper,we mount the integral cryptanalysis on FUTURE.With state-of-the-art detection techniques,we identify several integral distinguishers of 7 rounds of FUTURE.By extending this 7-round distinguisher by 3 forward rounds,we manage to recover all the 128 bits secret keys from the full FUTURE cipher without the full codebook for the first time.To further achieve better time complexity,we also present a key recovery attack on full FUTURE with full codebook.Both attacks have better time complexity than existing results.
基金supported by the National Natural Science Foundation of China(nos.52073191,U22A20158,and 52303194)State Key Laboratory of Polymer Materials Engineering(grant no.sklpme 2023-2-16).
文摘Objective:Skin wound exposed to complex external environment for a long time is highly susceptible to bacterial infection.Impact Statement:This work designs a Janus adhesive dual-layer hydrogel containing in situ silver nanoparticles(named PSAP/DXP@AgNPs)with integrated attack and defense to simultaneously kill the existing bacteria and prevent foreign bacterial contamination.Introduction:The current gauze dressing fixed by tape fails to well fit at skin wound and lacks intrinsic antibacterial property,making it highly prone to causing secondary infection.Moreover,foreign bacteria may contaminate the wound dressing during use,further increasing the risk of secondary infection.Methods:In this work,a Janus adhesive dual-layer PSAP/DXP@AgNPs hydrogel is prepared by sequentially building the PSAP gel layer containing zwitterionic poly(sulfobetaine methacrylamide)(PSBMA)on the DXP@AgNPs gel layer containing in situ catechol-reduced AgNPs.Results:The flexible PSAP/DXP@AgNPs can adapt shape change of skin and adhere to skin tissue with interfacial toughness of 153.38 J m^(−2) relying on its DXP@AgNPs layer,which is beneficial to build favorable fit.The in situ reduced AgNPs released from the DXP@AgNPs layer of PSAP/DXP@AgNPs exhibit obvious antibacterial effects against Escherichia coli and Staphylococcus aureus,with antibacterial rates of 99%and 88%,respectively.Meanwhile,the hydrated PSAP layer of PSAP/DXP@AgNPs containing PSBMA is able to prevent the bacterial contamination,decreasing the risk of secondary infection.Besides,cell experiments demonstrate that PSAP/DXP@AgNPs is biocompatible.Conclusion:The PSAP/DXP@AgNPs hydrogel with integrated attack and defense simultaneously possessing bacteria-killing and bacteria-antifouling properties is a potential alternative in treating infected skin wound.
基金This work was supported by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Skodowska-Curie(101027980(CSPCPS-A-ICA),739551(KIOS CoE-TEAMING))the Italian Ministry for Research in the Framework of the 2017 Program for Research Projects of National Interest(PRIN)(2017YKXYXJ)+3 种基金the National Natural Science Foundation of China(61903188,62073165,62020106003)the Natural Science Foundation of Jiangsu Province(BK20190403)the 111 Project(B20007)the Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyberphysical systems subject to process disturbances and measurement noise.A stealthy intermittent integrity attack strategy is first proposed by modifying a zero-dynamics attack model.The stealthiness of the generated attacks is rigorously investigated under the condition that the adversary does not know precisely the system state values.In order to help detect such attacks,a backward-in-time detection residual is proposed based on an equivalent quantity of the system state change,due to the attack,at a time prior to the attack occurrence time.A key characteristic of this residual is that its magnitude increases every time a new attack occurs.To estimate this unknown residual,an optimal fixed-point smoother is proposed by minimizing a piece-wise linear quadratic cost function with a set of specifically designed weighting matrices.The smoother design guarantees robustness with respect to process disturbances and measurement noise,and is also able to maintain sensitivity as time progresses to intermittent integrity attack by resetting the covariance matrix based on the weighting matrices.The adaptive threshold is designed based on the estimated backward-in-time residual,and the attack detectability analysis is rigorously investigated to characterize quantitatively the class of attacks that can be detected by the proposed methodology.Finally,a simulation example is used to demonstrate the effectiveness of the developed methodology.
基金National Natural Science Foundation of China(No.62172308,U1626107,61972297,62172144)。
文摘Cyber-physical systems(CPS)have been widely deployed in critical infrastructures and are vulnerable to various attacks.Data integrity attacks manipulate sensor measurements and cause control systems to fail,which are one of the prominent threats to CPS.Anomaly detection methods are proposed to secure CPS.However,existing anomaly detection studies usually require expert knowledge(e.g.,system model-based)or are lack of interpretability(e.g.,deep learning-based).In this paper,we present DEEPNOISE,a deep learning-based anomaly detection method for CPS with interpretability.Specifically,we utilize the sensor and process noise to detect data integrity attacks.Such noise represents the intrinsic characteristics of physical devices and the production process in CPS.One key enabler is that we use a robust deep autoencoder to automatically extract the noise from measurement data.Further,an LSTM-based detector is designed to inspect the obtained noise and detect anomalies.Data integrity attacks change noise patterns and thus are identified as the root cause of anomalies by DEEPNOISE.Evaluated on the SWaT testbed,DEEPNOISE achieves higher accuracy and recall compared with state-of-the-art model-based and deep learningbased methods.On average,when detecting direct attacks,the precision is 95.47%,the recall is 96.58%,and F_(1) is 95.98%.When detecting stealthy attacks,precision,recall,and F_(1) scores are between 96% and 99.5%.
基金This project funded by the Deanship of Scientific Research(DSR),King Abdulaziz University,Jeddah,under Grant No.D-152-611-1441.
文摘Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent protection against malicious hosts.A new security mechanism called Checkpoints has been proposed.Checkpoint Mechanism(CPM)aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks.CPM assumes using a free-roaming mobility mechanism by Mobile agent systems.The main idea behind CPM is to generate multiple versions of Mobile Agent.The multiple version is used to recover Mobile Agent from Capturing and Integrity attacks by untrusted hosts.MA versions are kept in Recovery Host(RH).RH plays a key role in CPM by controlling and monitoring MAs’recovery processes.A prototype method has been used to prove the feasibility of CPM.The p https://dsr.kau.edu.sa/Default-305-ARrototype was implemented by using the.Net framework and C#.full discussion for several scenarios has been done to analyze the feasibility and performance for CPM.As found from this research,CPM has a strong ability to protect Mobile Agents from Capturing and Integrity attacks completely.In addition,there is no negative impact on the overall performance of the mobile agent system.
基金supported by National Natural Science Foundation of China(No.82102918)。
文摘To develop an efficient thrombolytic therapy approach that addresses the limitations of current fibrinolytic drugs, such as short half-life, weak thrombus specificity and poor penetration ability, we constructed a NIR-triggered detachable nanoplatform (PA/UK@IcpLipo) using thin-film hydration method. It was designed to integrate attack and defense mechanisms for thrombolytic therapy. This platform can actively identify thrombi by binding to GPIIb-IIIa receptors overexpressed on activated platelets. Upon NIR laser activation and interaction with thrombin in the thrombotic microenvironment, the thermosensitive liposomes rupture, releasing the PA/UK core for deep penetration into the thrombus. Our results showed that the PA/UK@IcpLipo nanoplatform efficiently promoted rapid thrombolysis under the action of UK (attack), followed by PA exerting an antiplatelet aggregation effect (defense). This dual-action approach significantly improved vascular reperfusion rates. The NIR-triggered detachable nanoplatform offered a promising solution for enhanced thrombolysis efficiency and reduced bleeding risk, addressing critical limitations of current fibrinolytic therapies.