1,127 research outputs found
Dynamics and star formation activity of CG J1720-67.8 unveiled through integral field spectroscopy and radio observations
CG J1720-67.8 is an ultra compact group of several galaxies with a low
velocity dispersion, and displaying the hallmarks of mutual interaction and
possible tidal dwarf galaxy formation. In hierarchical models, the system is a
possible precursor to a massive elliptical galaxy. In this paper, we use new
optical integral field spectroscopic and radio observations to investigate the
evolutionary status of the group in more detail: global star-formation rates
are estimated using H and 1.4 GHz radio continuum measurements; H {\sc
i} observations provide an upper limit to the global neutral gas content;
optical broadband colours and spectra provide ages and stellar mass estimates
for the tidal dwarf candidates; the bidimensional H velocity field is
used to trace the kinematics of the group and its members, which are compared
with numerical simulations of galaxy encounters. The observations suggest a
model in which multiple interactions have occurred, with the latest strong
encounter involving at least two major components within the last 200 Myr.
Debris from the encounter fuels ongoing star formation at the global level of
M yr, with self-gravity within the tidal tail
possibly providing a mechanism to enhance the star formation rate of the tidal
dwarf candidates, with bursts of star-formation in clumps of mass M appearing within the last 10 Myr. The amount of time required
for final merging of all group components remains uncertain.Comment: 22 pages, 16 figures. Accepted for publication in MNRA
Investigating airplane safety and security against insider threats using logical modeling
In this paper we consider the limits of formal modeling of infrastructures and the application of social explanation for the analysis of insider threats in security and safety critical areas. As an area of study for the analysis we take examples from aviation, firstly since incidents are typically well-documented and secondly since it is an important area per se. In March 2015, a Germanwings flight crashed in the French Alps in what is quite firmly believed to have been intentionally caused by the copilot who locked the pilot out of the cockpit and programmed the autopilot on constant descent. We investigate the security controls and policies in airplanes against insider threats using logical modeling in Isabelle
Freshly ionized matter around the final Helium shell flash object V4334 Sgr (Sakurai's object)
We report on the discovery of recently ionized hydrogen-deficient gas in the
immediate circumstellar environment of the final helium shell flash star V4334
Sgr (Sakurai's object). On spectra obtained with FORS2 multi-object
spectroscopy we have found spatially extended (about 2") emission from [N II],
[O I], [O II] and very faint Halpha and [S II]. In the [N II] (ll6548,83) lines
we have identified two components located at velocities -350 +/-50 and +200
+/-50 km/s, relative to V4334 Sgr itself. The full width of the [N II] l6583
feature at zero intensity corresponds to a velocity spread of about 1500 km/s.
Based on the available data it is not possible to conclusively determine the
mechanism of ionization. Both photo-ionization, from a rapidly evolving central
star, and shock excitation, as the result of the collision of the fast ouflows
with slower circumstellar matter, could account for the observed lines. The
central star is still hidden behind strong dust absorption, since only a faint
highly reddened continuum is apparent in the spectra. Theory states that it
will become hotter and will retrace its post-asymptotic giant branch evolution
towards the planetary nebula domain. Our detection of the ionized ejecta from
the very late helium shell flash marks the beginning of a new phase in this
star's amazingly rapid evolution.Comment: 11 pages, 2 figures. Accepted by ApJ
Applying the Isabelle insider framework to airplane security
Avionics is one of the fields in which verification methods have been pioneered and brought about a new level of reliability to systems used in safety-critical environments. Tragedies, like the 2015 insider attack on a German airplane, in which all 150 people on board died, show that safety and security crucially depend not only on the well-functioning of systems but also on the way humans interact with the systems. Policies are a way to describe how humans should behave in their interactions with technical systems. Formal reasoning about such policies requires integrating the human factor into the verification process. In this paper, we report on our work on using logical modelling and analysis of infrastructure models and policies with actors to scrutinize security policies in the presence of insiders. An insider is a user of a system who behaves like an attacker abusing privileges thereby bypassing security controls. We model insider attacks on airplanes in the Isabelle Insider framework. This application motivates the use of an extension of the framework with Kripke structures and the temporal logic CTL to enable reasoning on dynamic system states. Furthermore, we illustrate that Isabelle modelling and invariant reasoning reveal subtle security assumptions. This results in a methodology for the development of policies that satisfy stated properties. To contrast our approach to model checking, we provide an additional comparative analysis
Towards formal analysis of insider threats for auctions
This paper brings together the world of insider threats and auctions. For online-auction systems, like eBay, but also for high-value one-off auction algorithms as they are used for selling radio wave frequencies, the use of rigorous machine supported modelling and verification techniques is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use the cocaine auction protocol that represents a nice combination of cryptographic techniques, protocols, and privacy goals suitable for highlighting insider threats for auctions
Insider threats for auctions: formalization, mechanized proof, and code generation
This paper applies machine assisted formal methods to explore insider threats for auctions. Auction systems, like eBay, are an important problem domain for formal analysis because they challenge modelling concepts as well as analysis methods. We use machine assisted formal modelling and proof in Isabelle to demonstrate how security and privacy goals of auction protocols can be formally verified. Applying the costly scrutiny of formal methods is justified for auctions since privacy and trust are prominent issues and auctions are sometimes designed for one-off occasions where high bids are at stake. For example, when radio wave frequencies are on sale, auctions are especially created for just one occasion where fair and consistent behaviour is required. Investigating the threats in auctions and insider collusions, we model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. We use the existing example of a fictitious cocaine auction protocol from the literature to develop and illustrate our approach. Combining the Isabelle Insider framework with the inductive approach to verifying security protocols in Isabelle, we formalize the cocaine auction protocol, prove that this formal definition excludes sweetheart deals, and also that collusion attacks cannot generally be excluded. The practical implication of the formalization is demonstrated by code generation. Isabelle allows generating code from constructive specifications into the programming language Scala. We provide constructive test functions for cocaine auction traces, prove within Isabelle that these functions conform to the protocol definition, and apply code generation to produce an implementation of the executable test predicate for cocaine auction traces in Scala
Decentralized control using compositional analysis techniques
Decentralized control strategies aim at achieving a global control target by means of distributed local controllers acting on individual subsystems of the overall plant. In this sense, decentralized control is a dual problem to compositional analysis where a global verification task is decomposed into several local tasks involving components of the overall system. In this paper we apply recently developed compositional reasoning techniques to decentralized control problems for linear systems. We assume the global plant and global specification to be both given as series of feedback interconnections. In this setting compositional and assume-guarantee reasoning schemes can be shown to be valid. Provided the local controllers are such that the locally controlled subsystems of the plant satisfy their respective sub-specifications the network of locally controlled plants is then guaranteed to satisfy the global specification
- …