Combination therapy with increased efficacy and reduced toxicity plays a crucial role in treating complex diseases, such as stroke, but it remains an insurmountable barrier to elucidate the ...mechanisms of synergistic effects. Here, we present a Driver-induced Modular Screening (DiMS) strategy integrated synergistic module and driver gene identification to elucidate the additive mechanisms of Baicalin (BA) and Jasminoidin (JA) on cerebral ischemia (CI) therapy. Based on anti-ischemia genomic networks BA, JA, and their combination (BJ), we obtained 4, 3, and 9
of BA, JA, and BJ by modular similarity analysis. Compared with the monotherapy groups, four additive modules (
, BJ_Mod-4, 7, 9, and 13), 15 driver genes of BJ were identified by modular similarity and network control methods, and seven driver proteins (PAQR8, RhoA, EMC10, GGA2, VIPR1, FAM120A, and SEMA3F) were validated by animal experiments. The functional analysis found neuroprotective roles of the Add-modules and driver genes, such as the Neurotrophin signaling pathway and FoxO signaling pathway, which may reflect the additive mechanisms of BJ. Moreover, such a DiMS paradigm provides a new angle to explore the synergistic mechanisms of combination therapy and screen multi-targeted drugs for complex diseases.
With the rise of IoT and edge computing, terminal data generated by end devices is also growing explosively. The limited data transmission links between edge data centers and the end devices is ...becoming a performance bottleneck of IoT edge-based architectures. This paper proposes Assembler, a module integrated into network drivers of the gateway to realize high-throughput forwarding in small-packet-intensive scenarios. Motivated by observations that transmitting large packets obtains far more data throughput than transmitting small ones, Assembler assembles small packets received by the driver into large ones before the driver transmits them. Meanwhile, an adaptive assembling size algorithm is introduced to balance data throughput and packet throughput in scenarios with abrupt changes in data traffic. Our evaluation shows that the network driver incorporated with Assembler can achieve 1.75x the data throughput in small-packet-intensive scenarios compared to the state-of-the-art work. Furthermore, the adaptive assembling size algorithm can help the driver adapt to scenarios with changing data traffic and keep steady throughput.
When a client is accessing a wireless AP, many methodologies which prevent from external attack or internal information leakage using only authorized wireless AP after deciding ...authorized/unauthorized have proposed. But there are securities and cost problem in server based authentication, and availability problem in client based authentication. In this paper, we use MAC Address to get an authentication from an AP. It searches the NDIS Intermediate Driver from the wireless network card, and then controls the packets after operating the scope of IP and PORT. We have implemented the proposed model, and it showed no more security and cost problem. It also showed that client based authentication availability is very flexible and has high scalability.
Mobile devices are becoming an indispensable part of work for corporations and governments to store and process sensitive information. Thus, it is important for remote administrators to maintain ...control of these devices via Mobile Device Management (MDM) solutions. ARM TrustZone has been widely regarded as the de facto solution for protecting the security-sensitive software, such as MDM agents, from attacks of a compromised rich OS. However, little attention has been given to protecting the MDM control channel, a fundamental component for a remote administrator to invoke the TrustZone-based MDM agents and perform specific management operations. In this work, we design an ARM TrustZone-based network mechanism, called TZNIC, towards enabling resilient and secure access to TrustZone-based software, even in the presence of a malicious rich OS. TZNIC deploys two NIC drivers, one secure-world driver and one normal-world driver, multiplexing one physical NIC. We utilize the ARM TrustZone-based high privilege to protect the secure-world driver and further resolve several challenges on sharing one set of hardware peripherals between two isolated software environments. TZNIC does not require any changes or collaboration of the rich OS. We implement a prototype of TZNIC, and the evaluation results show that TZNIC can provide a reliable network channel to invoke the security software in the secure world, with minimal system overhead on the rich OS.
Research on Network Driver Based on Embedded Processor Yanwu Zhang; Lei Li; Bin Xue ...
2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC),
2017-July, Letnik:
1
Conference Proceeding
In order to achieve better network communication between embedded devices, we complete a network driver program based on embedded processor platform. In the definition of internal data type, We ...choose little-endian due to our processor and use LwIP build-in error code in arch.h file. Moreover, LwIP provides users with a convenient configuration at the beginning of its design. Additionally, in order to achieve stable data communication and web browser functionality, a no operating system migration is performed on the embedded TCP/IP protocol stack LwIP. In this paper, we present the migration process and function graph. A detailed analysis on the protocol stack internal data management and low-level interface is provided as well. Test results show that LwIP guarantee stable communication with high speed and small memory consumption.
The network technology has found extensive application in various fields and embedded systems are no exception, based on which the development of network driver software also becomes a hotspot. The ...development of network driver for VxWorks6.6 version has a larger improvement than previous. The paper which takes the development process of Gigabit Ethernet driver based on MPC8313E hardware platform for example, depicts the implementation process of END network driver style for new VxBus model of VxWorks in detail, analyses the mechanism of network driver and summarizes some debugging experience through practices.
With the evolution of malware technology, modern malware often hide its malicious behaviour in various methods. One of the popular manners is to conceal the network communication. This concealment ...technique poses obstacles to security mechanisms, which detecting the malicious behaviours. In this paper, we give an overview of the automated blocking malicious code project, a new approach to computer security via malicious software analysis and automatic blocking software. In particular, this project focuses on building a unified executable program analysis platform and using it to provide novel solutions to a broad spectrum of different security problems. We propose a technique for the Network Driver Interface Specification (NDIS) integrate together with a unified malicious software analysis platform. The NDIS model supports hybrid network transport NDIS drivers, called NDIS intermediate drivers. This driver lies between transport driver and NDIS driver. The advantage of using NDIS intermediate drivers is, it can see the entire network traffic taking place on a system as the drivers lie between protocol drivers and network drivers. By intercepting security-related properties from network traffic directly, our project enables a principled, root cause based approach to computer security, offering novel and effective solutions.
Network emulation plays an important role in conducting performance analysis of network protocols and studying various network-related issues, such as Quality of Service of multimedia applications ...and traffic control algorithms. In this paper, we design and implement a Windows-based network emulator, WINPLEM, using the Network Driver Interface Specification technology. The emulator is capable of emulating various network attributes in real-time, including link bandwidth, packet loss, transmission delay and out-of-order packets. We study the performance of the emulator in trace-driven scenarios as well as in a streaming media application scenario. The experimental results indicate that WINPLEM is an effective network emulation tool for the Windows platform.