The synthesis of silafluorene derivatives from aminobiphenyl compounds and dihydrosilanes via a double sila-Friedel–Crafts reaction using a borane catalyst has been achieved.
Purpose: To report 2 cases of central retinal artery occlusion (CRAO) who underwent retinal endovascular surgery with injection of tissue plasminogen activator (tPA) into the retinal artery and showed a remarkable improvement in visual acuity and retinal circulation. Methods: Standard 25-G vitrectomy was performed under local anesthesia. Simultaneously, tPA (80,000 units/mL) solution was injected into the retinal artery of the optic disc for 2–3 min using a microneedle. Changes in visual acuity, fundus photography, optical coherence tomography (OCT), fluorescein angiography, and laser speckle flowgraphy (LSFG) results were examined. Results: Both cases could be treated within 12 h after the onset of CRAO. Case 1 was a 47-year-old woman. Her visual acuity improved from counting fingers before operation to 0.08 logMAR 1 month after the surgery. However, thinning of the retina at the macula was observed by OCT. Case 2 was a 70-year-old man. His visual acuity improved from counting fingers to 0.1 logMAR 2 months after the surgery. Both fluorescein angiography and LSFG showed improvement in retinal circulation after the surgery in case 2. Conclusions: Retinal endovascular surgery with injection of tPA into the retinal artery was feasible and may be a way to improve visual acuity and retinal circulation when performed in the acute phase of CRAO.
Security researchers/vendors detect malicious websites based on several website features extracted by honeyclient analysis. However, web-based attacks continue to be more sophisticated along with the development of countermeasure techniques. Attackers detect the honeyclient and evade analysis using sophisticated JavaScript code. The evasive code indirectly identifies vulnerable clients by abusing the differences among JavaScript implementations. Attackers deliver malware only to targeted clients on the basis of the evasion results while avoiding honeyclient analysis. Therefore, we are faced with a problem in that honeyclients cannot analyze malicious websites. Nevertheless, we can observe the evasion nature, i.e., the results in accessing malicious websites by using targeted clients are different from those by using honeyclients. In this paper, we propose a method of extracting evasive code by leveraging the above differences to investigate current evasion techniques. Our method analyzes HTTP transactions of the same website obtained using two types of clients, a real browser as a targeted client and a browser emulator as a honeyclient. As a result of evaluating our method with 8,467 JavaScript samples executed in 20,272 malicious websites, we discovered previously unknown evasion techniques that abuse the differences among JavaScript implementations. These findings will contribute to improving the analysis capabilities of conventional honeyclients.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.