71,438 research outputs found

    Model Uncertainty and Liquidity

    Get PDF
    Extreme market outcomes are often followed by a lack of liquidity and a lack of trade. This market collapse seems particularly acute for markets where traders rely heavily on a specific empirical model such as in derivative markets. Asset pricing and trading, in these cases, are intrinsically model dependent. Moreover, the observed behavior of traders and institutions that places a large emphasis on 'worst-case scenarios'' through the use of 'stress testing'' and 'value-at-risk'' seems different than Savage rationality (expected utility) would suggest. In this paper we capture model-uncertainty explicitly using an Epstein-Wang (1994) uncertainty-averse utility function with an ambiguous underlying asset-returns distribution. To explore the connection of uncertainty with liquidity, we specify a simple market where a monopolist financial intermediary makes a market for a propriety derivative security. The market-maker chooses bid and ask prices for the derivative, then, conditional on trade in this market, chooses an optimal portfolio and consumption. We explore how uncertainty can increase the bid-ask spread and, hence, reduces liquidity. In addition, 'hedge portfolios'' for the market-maker, an important component to understanding spreads, can look very different from those implied by a model without Knightian uncertainty. Our infinite-horizon example produces short, dramatic decreases in liquidity even though the underlying environment is stationary.

    Architecture-centric testing for security

    Get PDF
    This thesis presents a novel architecture-centric approach, which uses Implied Scenarios (IS) to detect design-vulnerabilities in the software architecture. It reviews security testing approaches, and draws on their limitations in addressing unpredictable behaviour in the face of evolution. The thesis introduces the concept of Security ISs as unanticipated (possibly malicious) behaviours that indicate potential insecurities in the architecture. The IS approach uses the architecture as the appropriate level of abstraction to tackle the complexity of testing. It provides potential for scalability to test large scale complex applications. It proposes a three-phased method for security testing: (1) Detecting design-level vulnerabilities in the architecture in an incremental manner by composing functionalities as they evolve. (2) Classifying the impact of detected ISs on the security of the architecture. (3) Using the detected ISs and their impact to guide the refinement of the architecture. The refinement is test-driven and incremental, where refinements are tested before they are committed. The thesis also presents SecArch, an extension to the IS approach to enhance its search-space to detect hidden race conditions. The thesis reports on the applications of the proposed approach and its extension to three case studies for testing the security of distributed and cloud architectures in the presence of uncertainty in the operating environment, unpredictability of interaction and possible security IS

    The role of market-implied severity modeling for credit VaR

    Get PDF
    En este trabajo proponemos el uso de mixturas de distribciones beta para modelizar la severidad impícita en el mercado. En nuestro análisis extraemos las tasas de recuperación de la cotización de los credit default swaps (CDS) en lugar de utilizar bonos que han impagado. La principal ventaja de obtener la estructura temporal implícita de tasas de recuperación de los CDS en lugar de utilizar los bonos impagados es que nos permite identificar tasas de recuperación para empresas con baja probabilidad de impago. Del análisis empírico se obtienen resultados que no permiten aceptar que una única distribución beta sea capaz de representar las tasas de recuperación implícitas mientras que la propuesta basada en mixturas de distribuciones beta si que es aceptada. Además, hay que destacar la importancia de utilizar esta metodología de ajuste por su importancia para una correcta estimación del Valor en Riesgo de crédito.In this paper we propose to use beta-component mixtures to model the market-implied severity. In our analysis we extract and identify recovery rates from credit default swaps instead of using defaulted bonds. The main advantage of extracting implied, endogenous and dynamic functions of recovery rates from credit default swaps versus using defaulted bonds is that it allows to identify recovery rates of low probability of default companies. We carry out an empirical analysis and our results show that a single beta distribution is rejected as a correct specification for implied recovery rates while a beta-component mixture is accepted. Futhermore, we highlight the importance of this modeling approach by focusing on its role for credit VaR

    Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems

    Full text link
    Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing and experimentation of cyber defense solutions requires the availability of separate, test environments that best emulate the complexity of a real system. Such environments support the deployment and monitoring of complex mission-driven network scenarios, thus enabling the study of cyber defense strategies under real and controllable traffic and attack scenarios. In this paper, we propose a methodology that makes use of a combination of techniques of network and security assessment, and the use of cloud technologies to build an emulation environment with adjustable degree of affinity with respect to actual reference networks or planned systems. As a byproduct, starting from a specific study case, we collected a dataset consisting of complete network traces comprising benign and malicious traffic, which is feature-rich and publicly available

    Risky Swaps

    Get PDF
    In [10] we presented a reduced form of risky bond pricing. At default date, a bond seller fails to continue fulfilling his obligation and the price of the bond sharply drops. For nodefault scenarios, if the face value of the defaulted bond is $1 then the bond price just after the default is its’ recovery rate (RR). Rating agencies and theoretical models are trying to predict RR for companies or sovereign countries. The main theoretical problem with a risky bond or with the general debt problems is presenting the price, knowing the RR. The problem of a credit default swap (CDS) pricing is somewhat an adjacent problem. Recall that the corporate bond price inversely depends on interest rate. In case of a default, the credit risk on a debt investment is related to the loss. There is a possibility for a risky bond buyer to reduce his credit risk. This can be achieved through buying a protection from a protection seller. The bondholder would pay a fixed premium up to maturity or default, which ever one comes first. If default comes before maturity, the protection buyer will receive the difference between the initial face value of the bond and RR. This difference is called ‘loss given default’. This contract represents CDS. The counterparty that pays a fixed premium is called CDS buyer or protection buyer; the opposite party is the CDS seller. Note, that in contrast to corporate bond, CDS contract does not assume that the buyer of the CDS is the holder of underlying bond. Also note that underlying to the swap can be any asset. It is called a reference asset or a reference entity. Thus, CDS is a credit instrument that separates credit risk from corresponding underlying entity. The formal type of the CDS can be described as follows. The buyer of the credit swap pays fixed rate or coupon until maturity or default in case it occurs before the maturity. If default does occur, protection buyer delivers cash or a default asset in exchange with the face value of the defaulted debt. These are known as cash or physical settlements

    Formally based semi-automatic implementation of an open security protocol

    Get PDF
    International audienceThis paper presents an experiment in which an implementation of the client side of the SSH Transport Layer Protocol (SSH-TLP) was semi-automatically derived according to a model-driven development paradigm that leverages formal methods in order to obtain high correctness assurance. The approach used in the experiment starts with the formalization of the protocol at an abstract level. This model is then formally proved to fulfill the desired secrecy and authentication properties by using the ProVerif prover. Finally, a sound Java implementation is semi-automatically derived from the verified model using an enhanced version of the Spi2Java framework. The resulting implementation correctly interoperates with third party servers, and its execution time is comparable with that of other manually developed Java SSH-TLP client implementations. This case study demonstrates that the adopted model-driven approach is viable even for a real security protocol, despite the complexity of the models needed in order to achieve an interoperable implementation

    Saving in an ageing society with public pensions: implications from lifecycle analysis

    Get PDF
    This paper studies saving in an economy where decline in fertility to a permanently lower level and increasing longevity are changing the age structure permanently and where the public pension system helps to smooth consumption over a lifetime of working and retirement. A simple overlapping generations (OLG) model is used for simulations, with the emphasis on the transition path. It is shown that, under plausible assumptions, the effect of population ageing on the capital to income ratio is positive and also that the saving rate increases in the first two to three decades. This first positive effect on the saving rate is highlighted and contrasted with results in previous literature. It is also shown that moving from a pure PAYG pension system to partial funding of mandatory pensions affects saving positively and has implications for intergenerational equity.Saving in an ageing society with public pensions: implications from lifestyle analysis, population ageing, public pensions, private and public saving, Oksanen

    CNN-based fast source device identification

    Full text link
    Source identification is an important topic in image forensics, since it allows to trace back the origin of an image. This represents a precious information to claim intellectual property but also to reveal the authors of illicit materials. In this paper we address the problem of device identification based on sensor noise and propose a fast and accurate solution using convolutional neural networks (CNNs). Specifically, we propose a 2-channel-based CNN that learns a way of comparing camera fingerprint and image noise at patch level. The proposed solution turns out to be much faster than the conventional approach and to ensure an increased accuracy. This makes the approach particularly suitable in scenarios where large databases of images are analyzed, like over social networks. In this vein, since images uploaded on social media usually undergo at least two compression stages, we include investigations on double JPEG compressed images, always reporting higher accuracy than standard approaches
    corecore