To catch a memory through covert ops
نویسندگان
چکیده
Disrupting reconsolidation of the maladaptive memories underlying post-traumatic stress disorder (PTSD) could be transformative for treatment. However, patients cannot undergo direct re-exposure to trauma-cues used induce in animal studies. Ressler and colleagues report ‘covert’ memory reactivation rats, bolstering hopes translation reconsolidation-based interventions.
منابع مشابه
Towards SLO Complying SSDs Through OPS Isolation
Virtualization systems should be responsible for satisfying the service level objectives (SLOs) for each VM. Performance SLOs, in particular, are generally achieved by isolating the underlying hardware resources among the VMs. In this paper, we show through empirical evaluation that performance SLOs cannot be satisfied with current commercial SSDs. We show that garbage collection is the source ...
متن کاملCovert Communication through Executables
This paper explores the potential of executables for covert communication. Three techniques for the embedding of secret information are presented. Possible attacks on the stealthiness of these techniques are identified and countered. The presented concepts are implemented and evaluated for the IA32 architecture, for which we obtain an encoding rate of 1/27 before countermeasures and 1/89 after ...
متن کاملCovert Channels through External Interference
This paper introduces interference channels, a new kind of covert channel that works by creating external interference on a shared communications medium (such as a wireless network). Unlike previous covert channels, here the covert sender does not need to compromise an authorized sender or require the ability to send messages on the network, but only needs the ability to jam traffic for short i...
متن کاملCovert Messaging through TCP Timestamps
We present a protocol for sending data over a common class of low-bandwidth covert channels. Covert channels exist in most communications systems and allow individuals to communicate truly undetectably. However, covert channels are seldom used due to their complexity. Our protocol is both practical and secure against attack by powerful adversaries. We implement our protocol on a standard platfo...
متن کاملProbabilistic Obfuscation through Covert Channels
This paper presents a program obfuscation framework that uses covert channels through the program’s execution environment to obfuscate information flow through the program. Unlike prior works on obfuscation, the use of covert channels removes visible information flows from the computation of the program and reroutes them through the program’s runtime system and/or the operating system. This ren...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Neuroscience
سال: 2021
ISSN: ['1546-1726', '1097-6256']
DOI: https://doi.org/10.1038/s41593-021-00834-4