skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Experimental and computational analysis of the injection-induced mechanical changes in the skin microenvironment during subcutaneous injection of biologics
Award ID(s):
2134603
PAR ID:
10440853
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Extreme Mechanics Letters
Volume:
61
Issue:
C
ISSN:
2352-4316
Page Range / eLocation ID:
102025
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Fault attacks on cryptographic software use faulty ciphertext to reverse engineer the secret encryption key. Although modern fault analysis algorithms are quite efficient, their practical implementation is complicated because of the uncertainty that comes with the fault injection process. First, the intended fault effect may not match the actual fault obtained after fault injection. Second, the logic target of the fault attack, the cryptographic software, is above the abstraction level of physical faults. The resulting uncertainty with respect to the fault effects in the software may degrade the efficiency of the fault attack, resulting in many more trial fault injections than the amount predicted by the theoretical fault attack. In this contribution, we highlight the important role played by the processor microarchitecture in the development of a fault attack. We introduce the microprocessor fault sensitivity model to systematically capture the fault response of a microprocessor pipeline. We also propose Microarchitecture-Aware Fault Injection Attack (MAFIA). MAFIA uses the fault sensitivity model to guide the fault injection and to predict the fault response. We describe two applications for MAFIA. First, we demonstrate a biased fault attack on an unprotected Advanced Encryption Standard (AES) software program executing on a seven-stage pipelined Reduced Instruction Set Computer (RISC) processor. The use of the microprocessor fault sensitivity model to guide the attack leads to an order of magnitude fewer fault injections compared to a traditional, blind fault injection method. Second, MAFIA can be used to break known software countermeasures against fault injection. We demonstrate this by systematically breaking a collection of state-of-the-art software fault countermeasures. These two examples lead to the key conclusion of this work, namely that software fault attacks become much more harmful and effective when an appropriate microprocessor fault sensitivity model is used. This, in turn, highlights the need for better fault countermeasures for software. 
    more » « less
  2. Abstract Manipulating the topological properties of spin textures in magnetic materials is of great interest due to the rich physics and promising technological applications of these materials in advanced electronic devices. A spin texture with desired topological properties can be created by magnetic monopole injection, resulting in topological transitions involving changes in the topological charge. Therefore, controlling magnetic monopole injection has paramount importance for obtaining the desired spin textures but has not yet been reported. Here, we report the use of reliably manipulated magnetic monopole injection in the topological transition from stripe domains to skyrmions in an Fe/Gd multilayer. An easily tunable in-plane magnetic field applied to an Fe/Gd multilayer plays a key role in the magnetic monopole injection by modulating the local exchange energy. Our findings facilitate the efficient management of topological transitions by providing an important method for controlling magnetic monopole injection. 
    more » « less