1,354 research outputs found

    A reduced semantics for deciding trace equivalence using constraint systems

    Full text link
    Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. It has been shown that such properties can be decided for interesting classes of finite processes (i.e., without replication) by means of symbolic execution and constraint solving. However, this does not suffice to obtain practical tools. Current prototypes suffer from a classical combinatorial explosion problem caused by the exploration of many interleavings in the behaviour of processes. M\"odersheim et al. have tackled this problem for reachability properties using partial order reduction techniques. We revisit their work, generalize it and adapt it for equivalence checking. We obtain an optimization in the form of a reduced symbolic semantics that eliminates redundant interleavings on the fly.Comment: Accepted for publication at POST'1

    Formal Analysis of V2X Revocation Protocols

    Get PDF
    Research on vehicular networking (V2X) security has produced a range of security mechanisms and protocols tailored for this domain, addressing both security and privacy. Typically, the security analysis of these proposals has largely been informal. However, formal analysis can be used to expose flaws and ultimately provide a higher level of assurance in the protocols. This paper focusses on the formal analysis of a particular element of security mechanisms for V2X found in many proposals: the revocation of malicious or misbehaving vehicles from the V2X system by invalidating their credentials. This revocation needs to be performed in an unlinkable way for vehicle privacy even in the context of vehicles regularly changing their pseudonyms. The REWIRE scheme by Forster et al. and its subschemes BASIC and RTOKEN aim to solve this challenge by means of cryptographic solutions and trusted hardware. Formal analysis using the TAMARIN prover identifies two flaws with some of the functional correctness and authentication properties in these schemes. We then propose Obscure Token (OTOKEN), an extension of REWIRE to enable revocation in a privacy preserving manner. Our approach addresses the functional and authentication properties by introducing an additional key-pair, which offers a stronger and verifiable guarantee of successful revocation of vehicles without resolving the long-term identity. Moreover OTOKEN is the first V2X revocation protocol to be co-designed with a formal model.Comment: 16 pages, 4 figure

    Observation of the Cabibbo-suppressed charmed baryon decay Λ_c^+→pφ

    Get PDF
    We report the observation of the Cabibbo-suppressed decays Λ_c^+→pK^-K^+ and Λ_c^+→pφ using data collected with the CLEO II detector at CESR. The latter mode, observed for the first time with significant statistics, is of interest as a test of color suppression in charm decays. We have determined the branching ratios for these modes relative to Λ_c^+→pK^-π^+ and compared our results with theory

    Qualitative Analysis of Partially-observable Markov Decision Processes

    Get PDF
    We study observation-based strategies for partially-observable Markov decision processes (POMDPs) with omega-regular objectives. An observation-based strategy relies on partial information about the history of a play, namely, on the past sequence of observations. We consider the qualitative analysis problem: given a POMDP with an omega-regular objective, whether there is an observation-based strategy to achieve the objective with probability~1 (almost-sure winning), or with positive probability (positive winning). Our main results are twofold. First, we present a complete picture of the computational complexity of the qualitative analysis of POMDP s with parity objectives (a canonical form to express omega-regular objectives) and its subclasses. Our contribution consists in establishing several upper and lower bounds that were not known in literature. Second, we present optimal bounds (matching upper and lower bounds) on the memory required by pure and randomized observation-based strategies for the qualitative analysis of POMDP s with parity objectives and its subclasses

    Cabibbo-suppressed non-leptonic B- and D-decays involving tensor mesons

    Get PDF
    The Cabibbo-suppressed non-leptonic decays of B (and D) mesons to final states involving tensor mesons are computed using the non-relativistic quark model of Isgur-Scora-Grinstein-Wise with the factorization hypothesis. We find that some of these B decay modes, as B --> (K^*, D^*)D^*_2, can have branching ratios as large as 6 x 10^{-5} which seems to be at the reach of future B factories.Comment: Latex, 11 pages, to appear in Phys. Rev.

    Angular-dependent magnetization reversal processes in artificial spin ice

    Full text link

    Safety verification of asynchronous pushdown systems with shaped stacks

    Full text link
    In this paper, we study the program-point reachability problem of concurrent pushdown systems that communicate via unbounded and unordered message buffers. Our goal is to relax the common restriction that messages can only be retrieved by a pushdown process when its stack is empty. We use the notion of partially commutative context-free grammars to describe a new class of asynchronously communicating pushdown systems with a mild shape constraint on the stacks for which the program-point coverability problem remains decidable. Stacks that fit the shape constraint may reach arbitrary heights; further a process may execute any communication action (be it process creation, message send or retrieval) whether or not its stack is empty. This class extends previous computational models studied in the context of asynchronous programs, and enables the safety verification of a large class of message passing programs

    V,W and X in Technicolour Models

    Full text link
    Light techni-fermions and pseudo Goldstone bosons that contribute to the electroweak radiative correction parameters V,W and X may relax the constraints on technicolour models from the experimental values of the parameters S and T. Order of magnitude estimates of the contributions to V,W and X from light techni-leptons are made when the the techni-neutrino has a small Dirac mass or a large Majorana mass. The contributions to V,W and X from pseudo Goldstone bosons are calculated in a gauged chiral Lagrangian. Estimates of V,W and X in one family technicolour models suggest that the upper bounds on S and T should be relaxed by between 0.1 and 1 depending upon the precise particle spectrum.Comment: 19 pages + 2 pages of ps figs, SWAT/1
    • …
    corecore