Task difficulty modulates brain-behavior correlations in language production and cognitive control: Behavioral and fMRI evidence from a phonological go/no-go picture-naming paradigm
- Award ID(s):
- 1946051
- PAR ID:
- 10167597
- Date Published:
- Journal Name:
- Cognitive, Affective, & Behavioral Neuroscience
- Volume:
- 18
- Issue:
- 5
- ISSN:
- 1530-7026
- Page Range / eLocation ID:
- 964 to 981
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
Rowhammer is an increasingly threatening vulnerability that grants an attacker the ability to flip bits in memory without directly accessing them. Despite efforts to mitigate Rowhammer via software and defenses built directly into DRAM modules, more recent generations of DRAM are actually more susceptible to malicious bit-flips than their predecessors. This phenomenon has spawned numerous exploits, showing how Rowhammer acts as the basis for various vulnerabilities that target sensitive structures, such as Page Table Entries (PTEs) or opcodes, to grant control over a victim machine. However, in this paper, we consider Rowhammer as a more general vulnerability, presenting a novel exploit vector for Rowhammer that targets particular code patterns. We show that if victim code is designed to return benign data to an unprivileged user, and uses nested pointer dereferences, Rowhammer can flip these pointers to gain arbitrary read access in the victim's address space. Furthermore, we identify gadgets present in the Linux kernel, and demonstrate an end-to-end attack that precisely flips a targeted pointer. To do so we developed a number of improved Rowhammer primitives, including kernel memory massaging, Rowhammer synchronization, and testing for kernel flips, which may be of broader interest to the Rowhammer community. Compared to prior works' leakage rate of .3 bits/s, we show that such gadgets can be used to read out kernel data at a rate of 82.6 bits/s. By targeting code gadgets, this work expands the scope and attack surface exposed by Rowhammer. It is no longer sufficient for software defenses to selectively pad previously exploited memory structures in flip-safe memory, as any victim code that follows the pattern in question must be protected.more » « less
-
Precise, stringent, post-translational activation of enzymes is essential for many synthetic biology applications. For example, even a few intracellular molecules of unregulated T7 RNA polymerase can result in growth cessation in a bacterium. We sought to mimic the properties of natural enzymes, where activity is regulated ubiquitously by endogenous metabolites. Here we demonstrate that full-length, single subunit T7-derived RNA polymerases (T7 RNAP) can be activated by physiologically relevant concentrations of indoles. We used rational design and directed evolution to identify T7 RNAP variants with minimal transcriptional activity in the absence of indole, and a 29-fold increase in activity with an EC50 of 344 μM. Indoles control T7-dependent gene expression exogenously, endogenously, and between cells. We also demonstrate indole-dependent bacteriophage viability and propagation in trans. Specificity of different indoles, T7 promoter specificities, and portability to different bacteria are shown. Our ligand activated RNA polymerases (LARPs) represent a new chemically inducible “stop and go” platform immediately deployable for novel synthetic biology applications, including for modulation of synthetic cocultures.more » « less
An official website of the United States government

