15 research outputs found

    Transition of reversible photodarkening to photobleaching in chalcogenide films

    No full text
    Photodarkening (PD) of chalcogenide glasses and annealed films (i.e., photoinduced shift of the optical absorption edge to lower energies) is accompanied with changes in refractive index and thickness. The current studies of thin Ge-As-S films show that with decreasing the film thickness (d) to ~ 700 nm PD has an unusual dependence on illumination time. In particular, we detected that after reaching a maximal value PD begins to decrease and at long enough time it fully disappears and photobleaching (PB, shift to higher energies) may appear. This new “light annealing effect” is related to the dual action of light, which induces an ordering process predominantly in the near-surface region leading to PB in competition with the disordering process which attends the PD. The PB prevails in thinner films and at d < 100 nm only PB appears. The transition of PD to PB is a nano-sized effect due to the increase of the surface/volume thickness ratio

    Protecting Cloud-Based CIs:Covert Channel Vulnerabilities at the Resource Level

    No full text
    Critical Infrastructures (CIs) increasingly leverage Cloud computing given its benefits of on-demand scalability, high availability and cost efficiency. However, the Cloud is typically characterized by the co-location of users from varied security domains that also use shared computing resources. This introduces a number of resource/architecture-level vulnerabilities. For example, the usage of a basic shared storage component, such as a memory cache, can expose the entire Cloud system to security risks such as covert-channel attacks. The success of these exploits depends on various execution environment properties. Thus, providing means to assess the feasibility of these attacks in a specific execution environment and enabling postmortem analysis is needed. While attacks at the architectural level represent a potent vulnerability to exfiltrate information, the low-level often get neglected with techniques such as intrusion detection focused more on the high-level network/middleware threats. Interestingly, cache-based covert-channel attacks are typically not detectable by traditional intrusion detection systems as covert channels do not obey any access rights or other security policies. This paper focuses on the information provided at the low architectural level to cope with the cache-based covert-channel threat. We propose the usage of feasibility metrics collected at the low level to monitor the core-private cache covert channel and, infer information regarding the probability of a covert-channel exploit happening. We also illustrate the applicability of the proposed feasibility metrics in a use case
    corecore