119,119 research outputs found
Weighing the universe with accelerators and detectors
Suppose the lightest superpartner (LSP) is observed at colliders, and WIMPs
are detected in explicit experiments. We point out that one cannot immediately
conclude that cold dark matter (CDM) of the universe has been observed, and we
determine what measurements are necessary before such a conclusion is
meaningful. We discuss the analogous situation for neutrinos and axions; in the
axion case we have not found a way to conclude axions are the CDM even if
axions are detected.Comment: 15 pages, 3 figures; minor changes included and typos fixe
Phase diagram and magnetic collective excitations of the Hubbard model in graphene sheets and layers
We discuss the magnetic phases of the Hubbard model for the honeycomb lattice
both in two and three spatial dimensions. A ground state phase diagram is
obtained depending on the interaction strength
U and electronic density n. We find a first order phase transition between
ferromagnetic regions where the spin is maximally polarized (Nagaoka
ferromagnetism) and regions with smaller magnetization (weak ferromagnetism).
When taking into account the possibility of spiral states, we find that the
lowest critical U is obtained for an ordering momentum different from zero. The
evolution of the ordering momentum with doping is discussed. The magnetic
excitations (spin waves) in the antiferromagnetic insulating phase are
calculated from the random-phase-approximation for the spin susceptibility. We
also compute the spin fluctuation correction to the mean field magnetization by
virtual emission/absorpion of spin waves. In the large limit, the
renormalized magnetization agrees qualitatively with the Holstein-Primakoff
theory of the Heisenberg antiferromagnet, although the latter approach produces
a larger renormalization
On the Reverse Engineering of the Citadel Botnet
Citadel is an advanced information-stealing malware which targets financial
information. This malware poses a real threat against the confidentiality and
integrity of personal and business data. A joint operation was recently
conducted by the FBI and the Microsoft Digital Crimes Unit in order to take
down Citadel command-and-control servers. The operation caused some disruption
in the botnet but has not stopped it completely. Due to the complex structure
and advanced anti-reverse engineering techniques, the Citadel malware analysis
process is both challenging and time-consuming. This allows cyber criminals to
carry on with their attacks while the analysis is still in progress. In this
paper, we present the results of the Citadel reverse engineering and provide
additional insight into the functionality, inner workings, and open source
components of the malware. In order to accelerate the reverse engineering
process, we propose a clone-based analysis methodology. Citadel is an offspring
of a previously analyzed malware called Zeus; thus, using the former as a
reference, we can measure and quantify the similarities and differences of the
new variant. Two types of code analysis techniques are provided in the
methodology, namely assembly to source code matching and binary clone
detection. The methodology can help reduce the number of functions requiring
manual analysis. The analysis results prove that the approach is promising in
Citadel malware analysis. Furthermore, the same approach is applicable to
similar malware analysis scenarios.Comment: 10 pages, 17 figures. This is an updated / edited version of a paper
appeared in FPS 201
- …