4,639 research outputs found
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy). Infinite sets of possible traces are symbolically represented using deducibility constraints. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence
Formal Verification of Security Protocol Implementations: A Survey
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages. Recently, some researchers have started investigating techniques that bring automated formal proofs closer to real implementations. This paper surveys these attempts, focusing on approaches that target the application code that implements protocol logic, rather than the libraries that implement cryptography. According to these approaches, libraries are assumed to correctly implement some models. The aim is to derive formal proofs that, under this assumption, give assurance about the application code that implements the protocol logic. The two main approaches of model extraction and code generation are presented, along with the main techniques adopted for each approac
Kodaikanal Digitized White-light Data Archive (1921-2011): Analysis of various solar cycle features
Long-term sunspot observations are key to understand and predict the solar
activities and its effects on the space weather.Consistent observations which
are crucial for long-term variations studies,are generally not available due to
upgradation/modifications of observatories over the course of time. We present
the data for a period of 90 years acquired from persistent observation at the
Kodaikanal observatory in India. We use an advanced semi-automated algorithm to
detect the sunspots form each calibrated white-light image. Area, longitude and
latitude of each of the detected sunspots are derived. Implementation of a
semi-automated method is very necessary in such studies as it minimizes the
human bias in the detection procedure. Daily, monthly and yearly sunspot area
variations obtained from the Kodaikanal, compared well with the Greenwich
sunspot area data. We find an exponentially decaying distribution for the
individual sunspot area for each of the solar cycles. Analyzing the histograms
of the latitudinal distribution of the detected sunspots, we find Gaussian
distributions, in both the hemispheres, with the centers at 15
latitude. The height of the Gaussian distributions are different for the two
hemispheres for a particular cycle. Using our data, we show clear presence of
Waldmeier effect which correlates the rise time with the cycle amplitude. Using
the wavelet analysis, we explored different periodicities of different time
scales present in the sunspot area times series.Comment: Accepted for Publication in A&
Verifying privacy by little interaction and no process equivalence
While machine-assisted verification of classical security goals such as confidentiality and authentication is
well-established, it is less mature for recent ones. Electronic voting protocols claim properties such as voter
privacy. The most common modelling involves indistinguishability, and is specified via trace equivalence in cryptographic extensions of process calculi. However, it has shown restrictions. We describe a novel model, based on unlinkability between two pieces of information. Specifying it as an extension to the Inductive Method allows us to establish voter privacy without the need for approximation or session bounding. The two
models and their latest specifications are contrasted
Peculiar objects towards 3FGL J0133.3+5930: an eclipsing Be star and an active galactic nucleus
Aims. We aim to contribute to the identification of unassociated gamma-ray
sources in the galactic plane in order to enlarge the currently known
population of gamma-ray binaries and related systems, such as radio emitting
X-ray binaries and microquasars. These objects are currently regarded as
excellent test beds for the understanding of high energy phenomena in stellar
systems. Methods. Potential targets of study are selected based on
cross-identification of the 3rd Fermi Large Area Telescope catalogue with
historical catalogues of luminous stars often found as optical counterparts in
known cases. Follow-up observations and analysis of multi-wavelength archival
data are later used to seek further proofs of association beyond the simple
positional agreement. Results. Current results enable us to present here the
case of the Fermi source 3FGL J0133.3+5930 where two peculiar objects have been
discovered inside its region of uncertainty. One of them is the star TYC
3683-985-1 (LS I +59 79) whose eclipsing binary nature is reported in this
work. The other one is the X-ray source SWIFT J0132.9+5932, that we found to be
a likely low-power Active Galactic Nucleus at z = 0:1143 \pm 0:0002. If this
second object is of blazar type, it could easily account for the observed
gamma-ray photon flux. However, this is not confirmed at present, thus
rendering still open the star system TYC 3683-985-1 as an alternative
counterpart candidate to the Fermi source.Comment: 8 pages; 10 figures; accepted for publication in Astronomy &
Astrophysic
Where are compact groups in the local Universe?
The purpose of this work is to perform a statistical analysis of the location
of compact groups in the Universe from observational and semi-analytical points
of view. We used the velocity-filtered compact group sample extracted from the
Two Micron All Sky Survey for our analysis. We also used a new sample of galaxy
groups identified in the 2M++ galaxy redshift catalogue as tracers of the
large-scale structure. We defined a procedure to search in redshift space for
compact groups that can be considered embedded in other overdense systems and
applied this criterion to several possible combinations of different compact
and galaxy group subsamples. We also performed similar analyses for simulated
compact and galaxy groups identified in a 2M++ mock galaxy catalogue
constructed from the Millennium Run Simulation I plus a semi-analytical model
of galaxy formation. We observed that only of the compact groups can
be considered to be embedded in larger overdense systems, that is, most of the
compact groups are more likely to be isolated systems. The embedded compact
groups show statistically smaller sizes and brighter surface brightnesses than
non-embedded systems. No evidence was found that embedded compact groups are
more likely to inhabit galaxy groups with a given virial mass or with a
particular dynamical state. We found very similar results when the analysis was
performed using mock compact and galaxy groups. Based on the semi-analytical
studies, we predict that of the embedded compact groups probably are 3D
physically dense systems. Finally, real space information allowed us to reveal
the bimodal behaviour of the distribution of 3D minimum distances between
compact and galaxy groups. The location of compact groups should be carefully
taken into account when comparing properties of galaxies in environments that
are a priori different.Comment: 14 pages, 5 figures, 8 tables. Accepted for publication in Astronomy
& Astrophysics. Tables B1 and B2 will only be available in electronic form at
the CDS via anonymous ftp to cdsarc.u-strasbg.fr (130.79.128.5) or via
http://cdsweb.u-strasbg.fr/cgi-bin/qcat?J/A+A
- …