To catch a memory through covert ops

نویسندگان

چکیده

Disrupting reconsolidation of the maladaptive memories underlying post-traumatic stress disorder (PTSD) could be transformative for treatment. However, patients cannot undergo direct re-exposure to trauma-cues used induce in animal studies. Ressler and colleagues report ‘covert’ memory reactivation rats, bolstering hopes translation reconsolidation-based interventions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards SLO Complying SSDs Through OPS Isolation

Virtualization systems should be responsible for satisfying the service level objectives (SLOs) for each VM. Performance SLOs, in particular, are generally achieved by isolating the underlying hardware resources among the VMs. In this paper, we show through empirical evaluation that performance SLOs cannot be satisfied with current commercial SSDs. We show that garbage collection is the source ...

متن کامل

Covert Communication through Executables

This paper explores the potential of executables for covert communication. Three techniques for the embedding of secret information are presented. Possible attacks on the stealthiness of these techniques are identified and countered. The presented concepts are implemented and evaluated for the IA32 architecture, for which we obtain an encoding rate of 1/27 before countermeasures and 1/89 after ...

متن کامل

Covert Channels through External Interference

This paper introduces interference channels, a new kind of covert channel that works by creating external interference on a shared communications medium (such as a wireless network). Unlike previous covert channels, here the covert sender does not need to compromise an authorized sender or require the ability to send messages on the network, but only needs the ability to jam traffic for short i...

متن کامل

Covert Messaging through TCP Timestamps

We present a protocol for sending data over a common class of low-bandwidth covert channels. Covert channels exist in most communications systems and allow individuals to communicate truly undetectably. However, covert channels are seldom used due to their complexity. Our protocol is both practical and secure against attack by powerful adversaries. We implement our protocol on a standard platfo...

متن کامل

Probabilistic Obfuscation through Covert Channels

This paper presents a program obfuscation framework that uses covert channels through the program’s execution environment to obfuscate information flow through the program. Unlike prior works on obfuscation, the use of covert channels removes visible information flows from the computation of the program and reroutes them through the program’s runtime system and/or the operating system. This ren...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature Neuroscience

سال: 2021

ISSN: ['1546-1726', '1097-6256']

DOI: https://doi.org/10.1038/s41593-021-00834-4