数字微流控生物芯片合成驱动序列的安全性评价

Pushpita Roy, A. Banerjee
{"title":"数字微流控生物芯片合成驱动序列的安全性评价","authors":"Pushpita Roy, A. Banerjee","doi":"10.1109/ISED.2017.8303937","DOIUrl":null,"url":null,"abstract":"In this paper, we address the problem of security in the context of Digital Microfluidic Biochips (DMFB) realizations, more specifically, we take up the concern of security threats on a given actuation sequence. Given a bio-chemical reaction synthesized for actuation on a given DMF architecture, we propose an automated method for verifying whether the synthesized actuation sequence is secure against malicious dispense attacks, using droplets dispensed by an attacker when the desired reaction is in execution. The foundation of our method lies in symbolic encoding. We highlight the benefits of the proposed approach through simulations on some well-known assay benchmarks.","PeriodicalId":147019,"journal":{"name":"2017 7th International Symposium on Embedded Computing and System Design (ISED)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Security assessment of synthesized actuation sequences for digital microfluidic biochips\",\"authors\":\"Pushpita Roy, A. Banerjee\",\"doi\":\"10.1109/ISED.2017.8303937\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we address the problem of security in the context of Digital Microfluidic Biochips (DMFB) realizations, more specifically, we take up the concern of security threats on a given actuation sequence. Given a bio-chemical reaction synthesized for actuation on a given DMF architecture, we propose an automated method for verifying whether the synthesized actuation sequence is secure against malicious dispense attacks, using droplets dispensed by an attacker when the desired reaction is in execution. The foundation of our method lies in symbolic encoding. We highlight the benefits of the proposed approach through simulations on some well-known assay benchmarks.\",\"PeriodicalId\":147019,\"journal\":{\"name\":\"2017 7th International Symposium on Embedded Computing and System Design (ISED)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 7th International Symposium on Embedded Computing and System Design (ISED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISED.2017.8303937\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 7th International Symposium on Embedded Computing and System Design (ISED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISED.2017.8303937","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

在本文中,我们讨论了数字微流控生物芯片(DMFB)实现背景下的安全问题,更具体地说,我们关注给定驱动序列上的安全威胁。给定在给定DMF架构上合成用于驱动的生化反应,我们提出了一种自动化方法,用于验证合成的驱动序列是否安全,免受恶意分发攻击,使用攻击者在执行所需反应时分发的液滴。我们的方法的基础在于符号编码。我们通过对一些著名的分析基准的模拟来强调所提出的方法的好处。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Security assessment of synthesized actuation sequences for digital microfluidic biochips
In this paper, we address the problem of security in the context of Digital Microfluidic Biochips (DMFB) realizations, more specifically, we take up the concern of security threats on a given actuation sequence. Given a bio-chemical reaction synthesized for actuation on a given DMF architecture, we propose an automated method for verifying whether the synthesized actuation sequence is secure against malicious dispense attacks, using droplets dispensed by an attacker when the desired reaction is in execution. The foundation of our method lies in symbolic encoding. We highlight the benefits of the proposed approach through simulations on some well-known assay benchmarks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
OTORNoC: Optical tree of rings network on chip for 1000 core systems A new memory scheduling policy for real time systems All optical design of cost efficient multiplier circuit using terahertz optical asymmetric demultiplexer Application of variational mode decomposition and ABC optimized DAG-SVM in arrhythmia analysis An empirical study on performance of branch predictors with varying storage budgets
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1