skip to main content


Title: Tumor penetration of Sub-10 nm nanoparticles: Effect of dendrimer properties on their penetration in multicellular tumor spheroids
Award ID(s):
1808251
NSF-PAR ID:
10107366
Author(s) / Creator(s):
; ; ; ; ;
Date Published:
Journal Name:
Nanomedicine: Nanotechnology, Biology and Medicine
ISSN:
1549-9634
Page Range / eLocation ID:
102059
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Introduction: The lack of an appropriate in vitro model of the tumor microenvironment is one of the largest obstacles in evaluating preclinical cancer drug screenings.1 Cancer cell monolayers do not effectively mimic the limited drug penetration properties of the complex tumor structures found in cancer patients. 3-D multicellular tumor spheroids (MCTS) serve as a more effective model as they better resemble cancer in structure as well as limited drug penetration. In our experiments, we created heterospheroids composed of 4T1 breast tumor cells and 3T3 fibroblasts, as well as homospheroids of each cell type. Tumors feature stromal and extracellular matrix components in addition to cancer cells in ratios that vary between different types of cancer. Fibroblasts are the major component of cancer stroma as well as producers of extracellular matrix. Since heterospheroids feature 3T3 fibroblasts, they may better model the diverse tumor microenvironment.2 We also synthesized fluorescent PLGA nanoparticles that were added to our spheroid cultures. Using confocal microscopy and ImageJ’s fluorescence measuring tools, we qualitatively and quantitatively evaluated the drug penetration properties of our spheroids. 
    more » « less
  2. Penetration testing is a key practice toward engineering secure software. Malicious actors have many tactics at their disposal, and software engineers need to know what tactics attackers will prioritize in the first few hours of an attack. Projects like MITRE ATT&CK™ provide knowledge, but how do people actually deploy this knowledge in real situations? A penetration testing competition provides a realistic, controlled environment with which to measure and compare the efficacy of attackers. In this work, we examine the details of vulnerability discovery and attacker behavior with the goal of improving existing vulnerability assessment processes using data from the 2019 Collegiate Penetration Testing Competition (CPTC). We constructed 98 timelines of vulnerability discovery and exploits for 37 unique vulnerabilities discovered by 10 teams of penetration testers. We grouped related vulnerabilities together by mapping to Common Weakness Enumerations and MITRE ATT&CK™. We found that (1) vulnerabilities related to improper resource control (e.g., session fixation) are discovered faster and more often, as well as exploited faster, than vulnerabilities related to improper access control (e.g., weak password requirements), (2) there is a clear process followed by penetration testers of discovery/collection to lateral movement/pre-attack. Our methodology facilitates quicker analysis of vulnerabilities in future CPTC events. 
    more » « less
  3. Abstract

    Many factors governed the penetration efficacy of prehistoric projectile weaponry. Archaeologists broadly focus their efforts on understanding the effect of stone weapon tips because these specimens are often the only part of the weapon system that survives in the archaeological record. The tip cross‐sectional area (TCSA) and perimeter (TCSP) of stone weapon tips have been shown to correlate with target penetration depth. Here, using results from both static and dynamic penetration testing, we compare TCSA and TCSP against other tip geometry metrics: lateral surface area (LSA) and volume (V). Our analyses broadly show that using a single‐point geometry metric evaluated at multiple locations along the length of the point, or using multiple geometry metrics evaluated at a single location, better predicts required energy than using a single‐point geometry metric evaluated at a single location. Our results also show that in the case where a single geometry metric evaluated at multiple locations is used LSA provided the most robust prediction models. Finally, our results show that for the case where all geometry metrics evaluated at a single location are used the location that provides the most robust prediction model is dependent on how far the point penetrated the target.

     
    more » « less