Learn More
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that only user-approved code can execute in kernel mode over the entire system lifetime. This protects the kernel against code injection attacks, such as kernel rootkits. SecVisor can achieve this propertyeven against an attacker who(More)
An important security challenge is to protect the execution of security-sensitive code on legacy systems from malware that may infect the OS, applications, or system devices. Prior work experienced a tradeoff between the level of security achieved and efficiency. In this work, we leverage the features of modern processors from AMD and Intel to overcome the(More)
Using next-generation sequencing technology alone, we have successfully generated and assembled a draft sequence of the giant panda genome. The assembled contigs (2.25 gigabases (Gb)) cover approximately 94% of the whole genome, and the remaining gaps (0.05 Gb) seem to contain carnivore-specific repeats and tandem repeats. Comparisons with the dog and human(More)
BACKGROUND Orthodontic treatment induces a distortion of the extracellular matrix of the periodontium, resulting in alterations in cytoskeletal configuration. Cytokines are known to facilitate this process by inducing cellular proliferation, differentiation, and stimulation of periodontal remodeling. The aim of the present study was to measure a panel of(More)
T-helper 17 (Th17) cells are characterized by producing interleukin-17 (IL-17, also called IL-17A), IL-17F, IL-21, and IL-22 and potentially TNF- α and IL-6 upon certain stimulation. IL-23, which promotes Th17 cell development, as well as IL-17 and IL-22 produced by the Th17 cells plays essential roles in various inflammatory diseases, such as experimental(More)
We develop a special-purpose hypervisor called TrustVisor that facilitates the execution of security-sensitive code in isolation from commodity OSes and applications. TrustVisor provides code and execution integrity as well as data secrecy and integrity for protected code, even in the presence of a compromised OS. These strong properties can be attested to(More)
AIM To determine the biochemical effect of di-(2-ethylhexyl) phthalate (DEHP) on testes, liver, kidneys and pancreas on day 10 in the process of degeneration of the seminiferous epithelium. METHODS Diets containing 2% DEHP were given to male Crlj:CD1(ICR) mice for 10 days. The dose of DEHP was 0.90 +/- 0.52 mg/mouse/day. Their testes, livers, kidneys and(More)
Duchenne and Becker muscular dystrophies (DMD/BMD) are the most commonly inherited neuromuscular disease. However, accurate and convenient molecular diagnosis cannot be achieved easily because of the enormous size of the dystrophin gene and complex causative mutation spectrum. Such traditional methods as multiplex ligation-dependent probe amplification plus(More)
SecVisor is a hypervisor designed to guarantee that only code approved by the user of a system executes at the privilege level of the OS kernel [17]. We employ a model checker to verify the design properties of SecVisor and identify two design-level attacks that violate SecVisor’s security requirements. Despite SecVisor’s narrow interface and tiny code(More)
We describe, build, and evaluate Lockdown, a system that significantly increases the level of security for online transactions, even on a platform infested with malicious code. Lockdown provides the user with a highly-protected, yet also highly-constrained trusted environment for performing online transactions, as well as a high-performance, general-purpose(More)