41 research outputs found

    Formation of Super-Earths

    Full text link
    Super-Earths are the most abundant planets known to date and are characterized by having sizes between that of Earth and Neptune, typical orbital periods of less than 100 days and gaseous envelopes that are often massive enough to significantly contribute to the planet's overall radius. Furthermore, super-Earths regularly appear in tightly-packed multiple-planet systems, but resonant configurations in such systems are rare. This chapters summarizes current super-Earth formation theories. It starts from the formation of rocky cores and subsequent accretion of gaseous envelopes. We follow the thermal evolution of newly formed super-Earths and discuss their atmospheric mass loss due to disk dispersal, photoevaporation, core-cooling and collisions. We conclude with a comparison of observations and theoretical predictions, highlighting that even super-Earths that appear as barren rocky cores today likely formed with primordial hydrogen and helium envelopes and discuss some paths forward for the future.Comment: Invited review accepted for publication in the 'Handbook of Exoplanets,' Planet Formation section, Springer Reference Works, Juan Antonio Belmonte and Hans Deeg, Ed

    DRIVE : Dynamische IntegritÀtsmessung zur Laufzeit

    No full text
    Cyberattacks have been rapidly gaining ground over the last few years, and there is an escalating conflict between those who develop new security techniques and those who develop new attacks that circumvent these countermeasures. This thesis presents a novel and holistic runtime protection technology that is based on a comparison of the binary code loaded and the memory image found during runtime. This approach rests on information data structures that are present in systems under attack. In particular, this thesis sets forth the background, design, implementation and evaluation of a memory protection concept at runtime and is based on an assessment of memory contents and meta information that are verified using trusted binary sources and policies. The results of this work demonstrate that the developed runtime protection technology is a suitable solution and an appropriate addition to further increase the overall security of systems used today

    Electrical gas discharges and the influence of airborne pollution

    No full text
    SIGLEAvailable from INIST (FR), Document Supply Service, under shelf-number : T 84494 / INIST-CNRS - Institut de l'Information Scientifique et TechniqueFRFranc

    Les campylobacters dans les intoxications alimentaires

    No full text
    STRASBOURG ILLKIRCH-Pharmacie (672182101) / SudocSudocFranceF

    Building Secure Systems Using a Security Engineering Process and Security Building Blocks

    No full text
    In today’s software development process, security related design decisions are rarely made early in the overall process. Even if security is considered early, this means that in most cases a more-or-less encompassing security requirements analysis is made. Based on this analysis best-practices, ad-hoc design decisions or individual expertise is used to integrate security during the development process or after weak-nesses are found after the deployment. This paper explains the SecFutur security en-gineering process with a focus on Security Building Block Models which are used to build security related components, namely Security Building Blocks. These Security Building Blocks represent concrete security solutions and can be accessed via SecFu-tur patterns on the level of domain-specific models for particular application domains. The goal of this approach is to provide already defined and tested security related software components, which can be used early in the overall development process, to support security-design-decision already while modeling the software-system. Secu-rity Building Blocks are discussed in the context of the SecFutur Security Engineering Process with its requirement analysis and definition of security properties.

    Trust establishment in cooperating cyber-physical systems

    No full text
    Cooperating systems are systems of systems that collaborate for a common purpose. Cooperating cyber-physical systems often base important decisions on data gathered from external sensors and use external actuators to enforce safety critical actions. Using the example of a hydroelectric power plant control system, this paper analyzes security threats for networked cooperating systems, where sensors providing decision critical data are placed in non-protected areas and thus are exposed to various kinds of attacks. We propose a concept for trust establishment in cyber-physical cooperating systems. Using trusted event reporting for critical event sources, the authenticity of the security related events can be verified. Based on measurements obtained with a prototypical realisation, we evaluate and analyze the amount of overhead data transmission between event source and data verification system needed for trust establishment. We propose an efficient synchronisation scheme for system integrity data, reducing network traffic as well as verification effort

    Market-driven Code Provisioning to Mobile Secure Hardware

    No full text
    Today, most smartphones feature different kinds of secure hardware such as processor-based security extensions (e.g., TrustZone) and dedicated secure co-processors, e.g., a SIM card or an embedded secure element available on NFC-enabled devices (e.g., as used by Google Wallet). Unfortunately, the available secure hardware is almost never utilized by commercial third party apps, although their usage would drastically improve the security of security critical apps. The reasons are diverse: secure hardware stakeholders such as phone manufacturers and mobile network operators (MNOs) have full control over the corresponding interfaces and expect high financial revenue; and the current code provisioning schemes are inflexible and impractical since they require developers to collaborate with secure hardware stakeholders, which is hardly affordable for typical developers of mobile apps. In this paper we propose a new paradigm for secure hardware code provisioning. Our solution (i) allows developers to distribute security sensitive code (e.g., trusted apps or applets) as a part of the mobile app package; (ii) supports flexible and dynamic assignment of access rights to secure hardware APIs from mobile apps independently from an OS vendor and a stakeholder; (iii) enables stakeholders of secure hardware to obtain revenue for every provisioned piece of code; (iv) allows for automated and transparent installation and deinstallation of applets on demand in order to permit arbitrary number of applets, e.g., in the constraint Java card environment. Our scheme is compatible with Global Platform (GP) specifications and can be easily incorporated into existing standards. We developed a proof of concept prototype based on a Java card secure element on an Android-based smartphone and smartwatch and evaluated it by deploying a security critical application for access control
    corecore