skip to main content

Title: Tumor penetration of Sub-10 nm nanoparticles: Effect of dendrimer properties on their penetration in multicellular tumor spheroids
; ; ; ; ;
Award ID(s):
Publication Date:
Journal Name:
Nanomedicine: Nanotechnology, Biology and Medicine
Page Range or eLocation-ID:
Sponsoring Org:
National Science Foundation
More Like this
  1. Introduction: The lack of an appropriate in vitro model of the tumor microenvironment is one of the largest obstacles in evaluating preclinical cancer drug screenings.1 Cancer cell monolayers do not effectively mimic the limited drug penetration properties of the complex tumor structures found in cancer patients. 3-D multicellular tumor spheroids (MCTS) serve as a more effective model as they better resemble cancer in structure as well as limited drug penetration. In our experiments, we created heterospheroids composed of 4T1 breast tumor cells and 3T3 fibroblasts, as well as homospheroids of each cell type. Tumors feature stromal and extracellular matrix components in addition to cancer cells in ratios that vary between different types of cancer. Fibroblasts are the major component of cancer stroma as well as producers of extracellular matrix. Since heterospheroids feature 3T3 fibroblasts, they may better model the diverse tumor microenvironment.2 We also synthesized fluorescent PLGA nanoparticles that were added to our spheroid cultures. Using confocal microscopy and ImageJ’s fluorescence measuring tools, we qualitatively and quantitatively evaluated the drug penetration properties of our spheroids.
  2. Penetration testing is a key practice toward engineering secure software. Malicious actors have many tactics at their disposal, and software engineers need to know what tactics attackers will prioritize in the first few hours of an attack. Projects like MITRE ATT&CK™ provide knowledge, but how do people actually deploy this knowledge in real situations? A penetration testing competition provides a realistic, controlled environment with which to measure and compare the efficacy of attackers. In this work, we examine the details of vulnerability discovery and attacker behavior with the goal of improving existing vulnerability assessment processes using data from the 2019 Collegiate Penetration Testing Competition (CPTC). We constructed 98 timelines of vulnerability discovery and exploits for 37 unique vulnerabilities discovered by 10 teams of penetration testers. We grouped related vulnerabilities together by mapping to Common Weakness Enumerations and MITRE ATT&CK™. We found that (1) vulnerabilities related to improper resource control (e.g., session fixation) are discovered faster and more often, as well as exploited faster, than vulnerabilities related to improper access control (e.g., weak password requirements), (2) there is a clear process followed by penetration testers of discovery/collection to lateral movement/pre-attack. Our methodology facilitates quicker analysis of vulnerabilities in future CPTC events.