Preclinical development of kinetin as a safe error-prone SARS-CoV-2 antiviral able to attenuate virus-induced inflammation [PDF]
The search for antivirals against SARS-CoV-2 continue due to the emergence of variants of concerns, able to escape the vaccinal humoral response. In this work, authors pre-clinically explore the potential of kinetin against SARS-CoV-2, which could be ...
Thiago Moreno L. Souza +34 more
doaj +4 more sources
Systematic security evaluation method against C safe-error attacks [PDF]
This paper proposes a systematic security evaluation of cryptographic hardware against C safe-error attacks. Using the graph representation of a design, we provide a simple and efficient method to detect possible C safe-errors. Exposing possible vulnerabilities at an early stage of a design process, this method avoids costly design re-spins and reduces
Dusko Karaklajic +2 more
core +9 more sources
Abstract Orally available antivirals against severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) are still scarce and the emergence of new variants challenging immunized individuals, suggests that mutant viruses might also emerge because of antiviral pressure. Therefore, beyond the recently alleged positive antiviral clinical results
Souza T +27 more
europepmc +2 more sources
Contract-Java: Design by Contract in Java with Safe Error Handling [PDF]
Design by Contract (DbC) is a programming methodology in which the meaning of program entities, such as methods and classes, is made explicit by the use of programming predicates named assertions. A false assertion is always a manifestation of an incorrect program.
Oliveira e Silva, Miguel +1 more
openaire +5 more sources
Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models
Model extraction emerges as a critical security threat with attack vectors exploiting both algorithmic and implementation-based approaches. The main goal of an attacker is to steal as much information as possible about a protected victim model, so that he can mimic it with a substitute model, even with a limited access to similar training data ...
Hector, Kévin +3 more
openaire +4 more sources
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse [PDF]
Radio-Frequency Identification tags are used for several applications requiring authentication mechanisms, which if subverted can lead to dire consequences. Many of these devices are based on low-cost Integrated Circuits which are designed in off-shore fabrication facilities, raising concerns about their trust.
Krishna Bagadia +4 more
openaire +3 more sources
Application of a rapid and accurate safe-margin volume generation method in computer-assisted bone tumor resection surgery [PDF]
Introduction In computer-assisted bone tumor resection, surgeons manually plan cut planes with a safe margin before surgery and follow them using navigation during osteotomy.
Yu Zhang +5 more
doaj +2 more sources
Safe-Error Analysis of Post-Quantum Cryptography Mechanisms [PDF]
The NIST selection process for standardizing Post-Quantum Cryptography Mechanisms is currently running. Many papers already studied their theoretical security, but the resistance in deployed device has not been much investigated so far. In particular, fault attack is a serious threat for algorithms implemented in embedded devices.
Bettale, Luk +2 more
openaire +3 more sources
Research on the error probability distribution of photovoltaic output prediction based on output fluctuation characteristics and Generalized Gaussian Mixture Model [PDF]
Photovoltaic power output forecast error exists objectively and inevitably, and it can provide a guarantee for safe and stable operation of the power system through analyzing its characteristics.
Yan Peng +3 more
doaj +1 more source
Why Do We Make Safe Behaviour So Hard for Drivers? [PDF]
Despite significant improvements in road safety in Australia and developed countries over some decades, the downward trend in fatalities and serious injuries has slowed markedly, and even stalled.
Ann Williamson
doaj +2 more sources

