7,457 research outputs found

    Groundbased near-IR observations of the surface of Venus

    Get PDF
    We present images of the nightside of Venus taken in the near-infrared windows at 1.0, 1.1, 1.18, 1.28, 1.31, and 2.3 microns with the new infrared camera/spectrometer IRIS on the Anglo-Australian Telescope. These data were taken in spectral-mapping mode. This technique involves scanning the telescope perpendicular to the slit, while collecting spectra at successive slit positions across the planet. We produce data cubes with one spectral and two spatial dimensions. Images can be extracted over any wavelength regions. Each image has square pixels of 0.8 inch resolution. We reduced the scattered light from the sunlit crescent in images extracted from each window by subtracting images taken on either side of the window, where the Venus atmosphere is opaque. Unlike the short wavelength windows, which reveal thermal contrasts that originate primarily from the surface and deep atmosphere, the emission in the 2.3 microns window is produced at much higher altitudes (30-40 km). Emission contrasts seen near 2.3 microns are associated with horizontal variations in the cloud optical depths, and have rotation periods of about six days. We detect large contrasts in infrared emission (20-40 percent) across the disc of Venus in the 1.0-, 1.1-, 1.18-, 1.28-, and 1.31-micron images. Contrasts at these wavelengths may be due to a combination of variations in the optical depths of the overlying sulfuric acid clouds and differences in surface emission. Comparison with the 2.3-micron images show that the patterns seen in the 1.28- and 1.31-micron windows are consistent with cloud optical depth variations alone and require no contribution from the surface. However, images at 1.0, 1.1, and 1.8 microns from July 1991 show a dark feature having a contrast that increases with decreasing wavelength. This behavior is contrary to that expected of cloud absorption. Images taken on three successive days in October show another dark feature that is stationary with respect to the surface. These regions of lower emission correspond closely to the high-altitude surface regions of Beta Regio and Aphrodite Terra. The images can potentially reveal the near-infrared emissiveity of the surface of Venus, thereby complementing Magellan radar reflectivity and ground based radio emissivity measurements. The contrast ratio between highlands and plains is much smaller than would be expected for blackbody radiation from the surface along. Unlike at radio wavelengths, where the atmosphere is essentially transparent, at near-infrared wavelengths the atmosphere emits, absorbs, and scatters radiation, and can modify the observed topographically induced contrasts. The additional radiation from the atmosphere reduces the contrast, and further modification would be expected if terrain at different altitudes has different emissivities. A fit to our data therefore requires, and may constrain, a model of the lowest scale height of the atmosphere

    Effects of Extreme Obliquity Variations on the Habitability of Exoplanets

    Get PDF
    We explore the impact of obliquity variations on planetary habitability in hypothetical systems with high mutual inclination. We show that large amplitude, high frequency obliquity oscillations on Earth-like exoplanets can suppress the ice-albedo feedback, increasing the outer edge of the habitable zone. We restrict our exploration to hypothetical systems consisting of a solar-mass star, an Earth-mass planet at 1 AU, and 1 or 2 larger planets. We verify that these systems are stable for 10810^8 years with N-body simulations, and calculate the obliquity variations induced by the orbital evolution of the Earth-mass planet and a torque from the host star. We run a simplified energy balance model on the terrestrial planet to assess surface temperature and ice coverage on the planet's surface, and we calculate differences in the outer edge of the habitable zone for planets with rapid obliquity variations. For each hypothetical system, we calculate the outer edge of habitability for two conditions: 1) the full evolution of the planetary spin and orbit, and 2) the eccentricity and obliquity fixed at their average values. We recover previous results that higher values of fixed obliquity and eccentricity expand the habitable zone, but also find that obliquity oscillations further expand habitable orbits in all cases. Terrestrial planets near the outer edge of the habitable zone may be more likely to support life in systems that induce rapid obliquity oscillations as opposed to fixed-spin planets. Such planets may be the easiest to directly characterize with space-borne telescopes.Comment: 46 pages, 12 Figures, 5 Table

    The polarization of the planet-hosting WASP-18 system

    Full text link
    We report observations of the linear polarization of the WASP-18 system, which harbors a very massive ( approx 10 M_J) planet orbiting very close to its star with an orbital period of 0.94 days. We find the WASP-18 system is polarized at about 200 parts-per-million (ppm), likely from the interstellar medium predominantly, with no strong evidence for phase dependent modulation from reflected light from the planet. We set an upper limit of 40 ppm (99% confidence level) on the amplitude of a reflected polarized light planetary signal. We compare the results with models for a number of processes that may produce polarized light in a planetary system to determine if we can rule out any phenomena with this limit. Models of reflected light from thick clouds can approach or exceed this limit, but such clouds are unlikely at the high temperature of the WASP-18b atmosphere. Additionally, we model the expected polarization resulting from the transit of the planet across the star and find this has an amplitude of about 1.6 ppm, which is well below our detection limits. We also model the polarization due to the tidal distortion of the star by the massive planet and find this is also too small to be measured currently.Comment: 23 pages, 10 Figures, 6 Tables, Accepted to A

    Lessons Learned from Radiative Transfer Simulations of the Venus Atmosphere

    Get PDF
    The Venus atmosphere is extremely complex, and because of this the spectrum of Earths sister planet is likewise intricate and a challenge to model accurately. However, accurate modeling of Venus spectrum opens up multiple opportunities to better understand the planet next door, and even for understanding Venus-like planets beyond our solar system. Near-infrared (1-2.5 um, NIR) spectral windows observable on the Venus nigthside present the opportunity to probe beneath the Venusian cloud deck and measure thermal emission from the surface and lower atmosphere remotely from Earth or from orbit. These nigthside spectral windows were discovered by Allen and Crawford (1984) and have since been used measure trace gas abundances in the Venus lower atmosphere (less than 45 km), map surface emissivity varisions, and measure properties of the lower cloud deck. These windows sample radiation from below the cloud base at roughly 45 km, and pressures in this region range from roughly Earthlike (approx. 1 bar) up to 90 bars at the surface. Temperatures in this region are high: they range from about 400 K at the base of the cloud deck up to about 740 K at the surface. This high temperature and pressure presents several challenges to modelers attempting radiative transfer simulations of this region of the atmosphere, which we will review. Venus is also important to spectrally model to predict the remote observables of Venus-like exoplanets in anticipation of data from future observatories. Venus-like planets are likely one of the most common types of terrestrial planets and so simulations of them are valuable for planning observatory and detector properties of future telescopes being designed, as well as predicting the types of observations required to characterize them

    Near-infrared oxygen airglow from the Venus nightside

    Get PDF
    Groundbased imaging and spectroscopic observations of Venus reveal intense near-infrared oxygen airglow emission from the upper atmosphere and provide new constraints on the oxygen photochemistry and dynamics near the mesopause (approximately 100 km). Atomic oxygen is produced by the Photolysis of CO2 on the dayside of Venus. These atoms are transported by the general circulation, and eventually recombine to form molecular oxygen. Because this recombination reaction is exothermic, many of these molecules are created in an excited state known as O2(delta-1). The airglow is produced as these molecules emit a photon and return to their ground state. New imaging and spectroscopic observations acquired during the summer and fall of 1991 show unexpected spatial and temporal variations in the O2(delta-1) airglow. The implications of these observations for the composition and general circulation of the upper venusian atmosphere are not yet understood but they provide important new constraints on comprehensive dynamical and chemical models of the upper mesosphere and lower thermosphere of Venus

    Automating Security Analysis: Symbolic Equivalence of Constraint Systems

    Get PDF
    We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy). Infinite sets of possible traces are symbolically represented using deducibility constraints. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence

    Analysis of the IBM CCA Security API Protocols in Maude-NPA

    Full text link
    Standards for cryptographic protocols have long been attractive candidates for formal verification. It is important that such standards be correct, and cryptographic protocols are tricky to design and subject to non-intuitive attacks even when the underlying cryptosystems are secure. Thus a number of general-purpose cryptographic protocol analysis tools have been developed and applied to protocol standards. However, there is one class of standards, security application programming interfaces (security APIs), to which few of these tools have been applied. Instead, most work has concentrated on developing special-purpose tools and algorithms for specific classes of security APIs. However, there can be much advantage gained from having general-purpose tools that could be applied to a wide class of problems, including security APIs. One particular class of APIs that has proven difficult to analyze using general-purpose tools is that involving exclusive-or. In this paper we analyze the IBM 4758 Common Cryptographic Architecture (CCA) protocol using an advanced automated protocol verification tool with full exclusive-or capabilities, the Maude-NPA tool. This is the first time that API protocols have been satisfactorily specified and analyzed in the Maude-NPA, and the first time XOR-based APIs have been specified and analyzed using a general-purpose unbounded session cryptographic protocol verification tool that provides direct support for AC theories. We describe our results and indicate what further research needs to be done to make such protocol analysis generally effective.Antonio González-Burgueño, Sonia Santiago and Santiago Escobar have been partially supported by the EU (FEDER) and the Spanish MINECO under grants TIN 2010-21062-C02-02 and TIN 2013-45732-C4-1-P, and by Generalitat Valenciana PROMETEO2011/052. José Meseguer has been partially supported by NSF Grant CNS 13-10109.González Burgueño, A.; Santiago Pinazo, S.; Escobar Román, S.; Meadows, C.; Meseguer, J. (2014). Analysis of the IBM CCA Security API Protocols in Maude-NPA. En Security Standardisation Research. Springer International Publishing. 111-130. https://doi.org/10.1007/978-3-319-14054-4_8S111130Abadi, M., Blanchet, B., Fournet, C.: Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3) (2007)Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th IEEE Computer Security Foundations Workshop (CSFW 2014), Cape Breton, Nova Scotia, Canada, June 2001, pp. 82–96. IEEE Computer Society (2014)Bond, M.: Attacks on cryptoprocessor transaction sets. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 220–234. Springer, Heidelberg (2001)Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A.: A formal analysis of some properties of kerberos 5 using msr. In: CSFW, pp. 175–1790. IEEE Computer Society (2002)Cachin, C., Chandran, N.: A secure cryptographic token interface. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, pp. 141–153 (2009)Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: 18th Annual IEEE Symposium on Logic in Computer Science, LICS 2003 (2003)Comon-Lundh, H., Shmatikov, V.: Intruder deductions, constraint solving and insecurity decision in presence of exclusive-or. In: 18th Annual IEEE Symposium on Logic in Computer Science (LICS 2003), pp. 271–280 (2003)Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 148–164. Springer, Heidelberg (2003)Cortier, V., Keighren, G., Steel, G.: Automatic analysis of the aecurity of XOR-based key management schemes. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol. 4424, pp. 538–552. Springer, Heidelberg (2007)Cortier, V., Steel, G.: A generic security API for symmetric key management on cryptographic devices. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 605–620. Springer, Heidelberg (2009)Erbatur, S., et al.: Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 73–90. Springer, Heidelberg (2012)Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009. LNCS, vol. 5705, pp. 1–50. Springer, Heidelberg (2007)Escobar, S., Meadows, C., Meseguer, J., Santiago, S.: Sequential Protocol Composition in Maude-NPA. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 303–318. Springer, Heidelberg (2010)Thayer Fabrega, F.J., Herzog, J., Guttman, J.: Strand Spaces: What Makes a Security Protocol Correct? Journal of Computer Security 7, 191–230 (1999)González-Burgueño, A.: Protocol Analysis Modulo Exclusive-Or Theories: A Case study in Maude-NPA. Master’s thesis, Universitat Politècnica de València (March 2014), https://angonbur.webs.upv.es/Previous_work/Master_Thesis.pdfIBM. Comment on Mike’s Bond paper A Chosen Key Difference Attack on Control Vectors (2001), http://www.cl.cam.ac.uk/~mkb23/research/CVDif-Response.pdfIBM. CCA basic services reference and guide: CCA basic services reference and guide for the IBM 4758 PCI and IBM 4764 (2001), http://www-03.ibm.com/security/cryptocards/pdfs/bs327.pdf.2008Keighren, G.: Model Checking IBM’s Common Cryptographic Architecture API. Technical Report 862, University of Edinburgh (October 2006)Kemmerer, R.A.: Using formal verification techniques to analyze encryption protocols. In: IEEE Symposium on Security and Privacy, pp. 134–139. IEEE Computer Society (1987)Küsters, R., Truderung, T.: Reducing protocol analysis with xor to the xor-free case in the horn theory based approach. J. Autom. Reasoning 46(3-4), 325–352 (2011)Linn, J.: Generic security service application program interface version 2, update 1. IETF RFC 2743 (2000), https://datatracker.ietf.org/doc/rfc2743Longley, D., Rigby, S.: An automatic search for security flaws in key management schemes. Computers & Security 11(1), 75–89 (1992)Meadows, C.: Applying formal methods to the analysis of a key management protocol. Journal of Computer Security 1(1) (1992)Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 113–131 (1996)Meadows, C., Cervesato, I., Syverson, P.: Specification and Analysis of the Group Domain of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. Journal of Computer Security 12(6), 893–932 (2004)Meadows, C.: Analysis of the internet key exchange protocol using the nrl protocol analyzer. In: IEEE Symposium on Security and Privacy, pp. 216–231. IEEE Computer Society (1999)Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic snalysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696–701. Springer, Heidelberg (2013)Mukhamedov, A., Gordon, A.D., Ryan, M.: Towards a verified reference implementation of a trusted platform module. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds.) Security Protocols 2009. LNCS, vol. 7028, pp. 69–81. Springer, Heidelberg (2013)National Institute of Standards and Technology. FIPS PUB 46-3: Data Encryption Standard (DES), supersedes FIPS 46-2 (October 1999)Nieuwenhuis, R. (ed.): CADE 2005. LNCS (LNAI), vol. 3632. Springer, Heidelberg (2005)Steel, G.: Deduction with xor constraints in security api modelling. In: Nieuwenhuis (ed.) [30], pp. 322–336Verma, K.N., Seidl, H., Schwentick, T.: On the complexity of equational horn clauses. In: Nieuwenhuis (ed.) [30], pp. 337–35

    A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols

    Get PDF
    Catherine Meadows has played an important role in the advancement of formal methods for protocol security verification. Her insights on the use of, for example, narrowing and rewriting logic has made possible the automated discovery of new attacks and the shaping of new protocols. Meadows has also investigated other security aspects, such as, distance-bounding protocols and denial of service attacks. We have been greatly inspired by her work. This paper describes the use of Multiset Rewriting for the specification and verification of timing aspects of protocols, such as network delays, timeouts, timed intruder models and distance-bounding properties. We detail these timed features with a number of examples and describe decidable fragments of related verification problems

    DNA metabarcoding unveils multiscale trophic variation in a widespread coastal opportunist

    Get PDF
    A thorough understanding of ecological networks relies on comprehensive information on trophic relationships among species. Since unpicking the diet of many organisms is unattainable using traditional morphology‐based approaches, the application of high‐throughput sequencing methods represents a rapid and powerful way forward. Here, we assessed the application of DNA metabarcoding with nearly universal primers for the mitochondrial marker cytochrome c oxidase I in defining the trophic ecology of adult brown shrimp, Crangon crangon, in six European estuaries. The exact trophic role of this abundant and widespread coastal benthic species is somewhat controversial, while information on geographical variation remains scant. Results revealed a highly opportunistic behaviour. Shrimp stomach contents contained hundreds of taxa (>1,000 molecular operational taxonomic units), of which 291 were identified as distinct species, belonging to 35 phyla. Only twenty ascertained species had a mean relative abundance of more than 0.5%. Predominant species included other abundant coastal and estuarine taxa, including the shore crab Carcinus maenas and the amphipod Corophium volutator. Jacobs’ selectivity index estimates based on DNA extracted from both shrimp stomachs and sediment samples were used to assess the shrimp's trophic niche indicating a generalist diet, dominated by crustaceans, polychaetes and fish. Spatial variation in diet composition, at regional and local scales, confirmed the highly flexible nature of this trophic opportunist. Furthermore, the detection of a prevalent, possibly endoparasitic fungus (Purpureocillium lilacinum) in the shrimp's stomach demonstrates the wide range of questions that can be addressed using metabarcoding, towards a more robust reconstruction of ecological networks
    corecore