1,127 research outputs found

    Dynamics and star formation activity of CG J1720-67.8 unveiled through integral field spectroscopy and radio observations

    Full text link
    CG J1720-67.8 is an ultra compact group of several galaxies with a low velocity dispersion, and displaying the hallmarks of mutual interaction and possible tidal dwarf galaxy formation. In hierarchical models, the system is a possible precursor to a massive elliptical galaxy. In this paper, we use new optical integral field spectroscopic and radio observations to investigate the evolutionary status of the group in more detail: global star-formation rates are estimated using Hα\alpha and 1.4 GHz radio continuum measurements; H {\sc i} observations provide an upper limit to the global neutral gas content; optical broadband colours and spectra provide ages and stellar mass estimates for the tidal dwarf candidates; the bidimensional Hα\alpha velocity field is used to trace the kinematics of the group and its members, which are compared with numerical simulations of galaxy encounters. The observations suggest a model in which multiple interactions have occurred, with the latest strong encounter involving at least two major components within the last 200 Myr. Debris from the encounter fuels ongoing star formation at the global level of ∼20\sim20 M⊙_{\odot} yr−1^{-1}, with self-gravity within the tidal tail possibly providing a mechanism to enhance the star formation rate of the tidal dwarf candidates, with bursts of star-formation in clumps of mass ∼2×107\sim2\times 10^7 M⊙_{\odot} appearing within the last 10 Myr. The amount of time required for final merging of all group components remains uncertain.Comment: 22 pages, 16 figures. Accepted for publication in MNRA

    Investigating airplane safety and security against insider threats using logical modeling

    Get PDF
    In this paper we consider the limits of formal modeling of infrastructures and the application of social explanation for the analysis of insider threats in security and safety critical areas. As an area of study for the analysis we take examples from aviation, firstly since incidents are typically well-documented and secondly since it is an important area per se. In March 2015, a Germanwings flight crashed in the French Alps in what is quite firmly believed to have been intentionally caused by the copilot who locked the pilot out of the cockpit and programmed the autopilot on constant descent. We investigate the security controls and policies in airplanes against insider threats using logical modeling in Isabelle

    Freshly ionized matter around the final Helium shell flash object V4334 Sgr (Sakurai's object)

    Get PDF
    We report on the discovery of recently ionized hydrogen-deficient gas in the immediate circumstellar environment of the final helium shell flash star V4334 Sgr (Sakurai's object). On spectra obtained with FORS2 multi-object spectroscopy we have found spatially extended (about 2") emission from [N II], [O I], [O II] and very faint Halpha and [S II]. In the [N II] (ll6548,83) lines we have identified two components located at velocities -350 +/-50 and +200 +/-50 km/s, relative to V4334 Sgr itself. The full width of the [N II] l6583 feature at zero intensity corresponds to a velocity spread of about 1500 km/s. Based on the available data it is not possible to conclusively determine the mechanism of ionization. Both photo-ionization, from a rapidly evolving central star, and shock excitation, as the result of the collision of the fast ouflows with slower circumstellar matter, could account for the observed lines. The central star is still hidden behind strong dust absorption, since only a faint highly reddened continuum is apparent in the spectra. Theory states that it will become hotter and will retrace its post-asymptotic giant branch evolution towards the planetary nebula domain. Our detection of the ionized ejecta from the very late helium shell flash marks the beginning of a new phase in this star's amazingly rapid evolution.Comment: 11 pages, 2 figures. Accepted by ApJ

    Applying the Isabelle insider framework to airplane security

    Get PDF
    Avionics is one of the fields in which verification methods have been pioneered and brought about a new level of reliability to systems used in safety-critical environments. Tragedies, like the 2015 insider attack on a German airplane, in which all 150 people on board died, show that safety and security crucially depend not only on the well-functioning of systems but also on the way humans interact with the systems. Policies are a way to describe how humans should behave in their interactions with technical systems. Formal reasoning about such policies requires integrating the human factor into the verification process. In this paper, we report on our work on using logical modelling and analysis of infrastructure models and policies with actors to scrutinize security policies in the presence of insiders. An insider is a user of a system who behaves like an attacker abusing privileges thereby bypassing security controls. We model insider attacks on airplanes in the Isabelle Insider framework. This application motivates the use of an extension of the framework with Kripke structures and the temporal logic CTL to enable reasoning on dynamic system states. Furthermore, we illustrate that Isabelle modelling and invariant reasoning reveal subtle security assumptions. This results in a methodology for the development of policies that satisfy stated properties. To contrast our approach to model checking, we provide an additional comparative analysis

    Towards formal analysis of insider threats for auctions

    Get PDF
    This paper brings together the world of insider threats and auctions. For online-auction systems, like eBay, but also for high-value one-off auction algorithms as they are used for selling radio wave frequencies, the use of rigorous machine supported modelling and verification techniques is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use the cocaine auction protocol that represents a nice combination of cryptographic techniques, protocols, and privacy goals suitable for highlighting insider threats for auctions

    Insider threats for auctions: formalization, mechanized proof, and code generation

    Get PDF
    This paper applies machine assisted formal methods to explore insider threats for auctions. Auction systems, like eBay, are an important problem domain for formal analysis because they challenge modelling concepts as well as analysis methods. We use machine assisted formal modelling and proof in Isabelle to demonstrate how security and privacy goals of auction protocols can be formally verified. Applying the costly scrutiny of formal methods is justified for auctions since privacy and trust are prominent issues and auctions are sometimes designed for one-off occasions where high bids are at stake. For example, when radio wave frequencies are on sale, auctions are especially created for just one occasion where fair and consistent behaviour is required. Investigating the threats in auctions and insider collusions, we model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. We use the existing example of a fictitious cocaine auction protocol from the literature to develop and illustrate our approach. Combining the Isabelle Insider framework with the inductive approach to verifying security protocols in Isabelle, we formalize the cocaine auction protocol, prove that this formal definition excludes sweetheart deals, and also that collusion attacks cannot generally be excluded. The practical implication of the formalization is demonstrated by code generation. Isabelle allows generating code from constructive specifications into the programming language Scala. We provide constructive test functions for cocaine auction traces, prove within Isabelle that these functions conform to the protocol definition, and apply code generation to produce an implementation of the executable test predicate for cocaine auction traces in Scala

    Decentralized control using compositional analysis techniques

    Get PDF
    Decentralized control strategies aim at achieving a global control target by means of distributed local controllers acting on individual subsystems of the overall plant. In this sense, decentralized control is a dual problem to compositional analysis where a global verification task is decomposed into several local tasks involving components of the overall system. In this paper we apply recently developed compositional reasoning techniques to decentralized control problems for linear systems. We assume the global plant and global specification to be both given as series of feedback interconnections. In this setting compositional and assume-guarantee reasoning schemes can be shown to be valid. Provided the local controllers are such that the locally controlled subsystems of the plant satisfy their respective sub-specifications the network of locally controlled plants is then guaranteed to satisfy the global specification

    Decentralized control using compositional analysis techniques

    Get PDF

    Decentralized control using compositional analysis techniques

    Get PDF
    • …
    corecore