4,639 research outputs found

    Automating Security Analysis: Symbolic Equivalence of Constraint Systems

    Get PDF
    We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy). Infinite sets of possible traces are symbolically represented using deducibility constraints. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence

    Formal Verification of Security Protocol Implementations: A Survey

    Get PDF
    Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages. Recently, some researchers have started investigating techniques that bring automated formal proofs closer to real implementations. This paper surveys these attempts, focusing on approaches that target the application code that implements protocol logic, rather than the libraries that implement cryptography. According to these approaches, libraries are assumed to correctly implement some models. The aim is to derive formal proofs that, under this assumption, give assurance about the application code that implements the protocol logic. The two main approaches of model extraction and code generation are presented, along with the main techniques adopted for each approac

    Kodaikanal Digitized White-light Data Archive (1921-2011): Analysis of various solar cycle features

    Full text link
    Long-term sunspot observations are key to understand and predict the solar activities and its effects on the space weather.Consistent observations which are crucial for long-term variations studies,are generally not available due to upgradation/modifications of observatories over the course of time. We present the data for a period of 90 years acquired from persistent observation at the Kodaikanal observatory in India. We use an advanced semi-automated algorithm to detect the sunspots form each calibrated white-light image. Area, longitude and latitude of each of the detected sunspots are derived. Implementation of a semi-automated method is very necessary in such studies as it minimizes the human bias in the detection procedure. Daily, monthly and yearly sunspot area variations obtained from the Kodaikanal, compared well with the Greenwich sunspot area data. We find an exponentially decaying distribution for the individual sunspot area for each of the solar cycles. Analyzing the histograms of the latitudinal distribution of the detected sunspots, we find Gaussian distributions, in both the hemispheres, with the centers at \sim15^{\circ} latitude. The height of the Gaussian distributions are different for the two hemispheres for a particular cycle. Using our data, we show clear presence of Waldmeier effect which correlates the rise time with the cycle amplitude. Using the wavelet analysis, we explored different periodicities of different time scales present in the sunspot area times series.Comment: Accepted for Publication in A&

    Verifying privacy by little interaction and no process equivalence

    Get PDF
    While machine-assisted verification of classical security goals such as confidentiality and authentication is well-established, it is less mature for recent ones. Electronic voting protocols claim properties such as voter privacy. The most common modelling involves indistinguishability, and is specified via trace equivalence in cryptographic extensions of process calculi. However, it has shown restrictions. We describe a novel model, based on unlinkability between two pieces of information. Specifying it as an extension to the Inductive Method allows us to establish voter privacy without the need for approximation or session bounding. The two models and their latest specifications are contrasted

    Peculiar objects towards 3FGL J0133.3+5930: an eclipsing Be star and an active galactic nucleus

    Full text link
    Aims. We aim to contribute to the identification of unassociated gamma-ray sources in the galactic plane in order to enlarge the currently known population of gamma-ray binaries and related systems, such as radio emitting X-ray binaries and microquasars. These objects are currently regarded as excellent test beds for the understanding of high energy phenomena in stellar systems. Methods. Potential targets of study are selected based on cross-identification of the 3rd Fermi Large Area Telescope catalogue with historical catalogues of luminous stars often found as optical counterparts in known cases. Follow-up observations and analysis of multi-wavelength archival data are later used to seek further proofs of association beyond the simple positional agreement. Results. Current results enable us to present here the case of the Fermi source 3FGL J0133.3+5930 where two peculiar objects have been discovered inside its region of uncertainty. One of them is the star TYC 3683-985-1 (LS I +59 79) whose eclipsing binary nature is reported in this work. The other one is the X-ray source SWIFT J0132.9+5932, that we found to be a likely low-power Active Galactic Nucleus at z = 0:1143 \pm 0:0002. If this second object is of blazar type, it could easily account for the observed gamma-ray photon flux. However, this is not confirmed at present, thus rendering still open the star system TYC 3683-985-1 as an alternative counterpart candidate to the Fermi source.Comment: 8 pages; 10 figures; accepted for publication in Astronomy & Astrophysic

    Where are compact groups in the local Universe?

    Get PDF
    The purpose of this work is to perform a statistical analysis of the location of compact groups in the Universe from observational and semi-analytical points of view. We used the velocity-filtered compact group sample extracted from the Two Micron All Sky Survey for our analysis. We also used a new sample of galaxy groups identified in the 2M++ galaxy redshift catalogue as tracers of the large-scale structure. We defined a procedure to search in redshift space for compact groups that can be considered embedded in other overdense systems and applied this criterion to several possible combinations of different compact and galaxy group subsamples. We also performed similar analyses for simulated compact and galaxy groups identified in a 2M++ mock galaxy catalogue constructed from the Millennium Run Simulation I plus a semi-analytical model of galaxy formation. We observed that only 27%\sim27\% of the compact groups can be considered to be embedded in larger overdense systems, that is, most of the compact groups are more likely to be isolated systems. The embedded compact groups show statistically smaller sizes and brighter surface brightnesses than non-embedded systems. No evidence was found that embedded compact groups are more likely to inhabit galaxy groups with a given virial mass or with a particular dynamical state. We found very similar results when the analysis was performed using mock compact and galaxy groups. Based on the semi-analytical studies, we predict that 70%70\% of the embedded compact groups probably are 3D physically dense systems. Finally, real space information allowed us to reveal the bimodal behaviour of the distribution of 3D minimum distances between compact and galaxy groups. The location of compact groups should be carefully taken into account when comparing properties of galaxies in environments that are a priori different.Comment: 14 pages, 5 figures, 8 tables. Accepted for publication in Astronomy & Astrophysics. Tables B1 and B2 will only be available in electronic form at the CDS via anonymous ftp to cdsarc.u-strasbg.fr (130.79.128.5) or via http://cdsweb.u-strasbg.fr/cgi-bin/qcat?J/A+A
    corecore