119,119 research outputs found

    A Gorenstein criterion for strongly F-regular and log terminal singularities

    No full text

    Weighing the universe with accelerators and detectors

    Get PDF
    Suppose the lightest superpartner (LSP) is observed at colliders, and WIMPs are detected in explicit experiments. We point out that one cannot immediately conclude that cold dark matter (CDM) of the universe has been observed, and we determine what measurements are necessary before such a conclusion is meaningful. We discuss the analogous situation for neutrinos and axions; in the axion case we have not found a way to conclude axions are the CDM even if axions are detected.Comment: 15 pages, 3 figures; minor changes included and typos fixe

    Phase diagram and magnetic collective excitations of the Hubbard model in graphene sheets and layers

    Full text link
    We discuss the magnetic phases of the Hubbard model for the honeycomb lattice both in two and three spatial dimensions. A ground state phase diagram is obtained depending on the interaction strength U and electronic density n. We find a first order phase transition between ferromagnetic regions where the spin is maximally polarized (Nagaoka ferromagnetism) and regions with smaller magnetization (weak ferromagnetism). When taking into account the possibility of spiral states, we find that the lowest critical U is obtained for an ordering momentum different from zero. The evolution of the ordering momentum with doping is discussed. The magnetic excitations (spin waves) in the antiferromagnetic insulating phase are calculated from the random-phase-approximation for the spin susceptibility. We also compute the spin fluctuation correction to the mean field magnetization by virtual emission/absorpion of spin waves. In the large UU limit, the renormalized magnetization agrees qualitatively with the Holstein-Primakoff theory of the Heisenberg antiferromagnet, although the latter approach produces a larger renormalization

    On the Reverse Engineering of the Citadel Botnet

    Get PDF
    Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the Microsoft Digital Crimes Unit in order to take down Citadel command-and-control servers. The operation caused some disruption in the botnet but has not stopped it completely. Due to the complex structure and advanced anti-reverse engineering techniques, the Citadel malware analysis process is both challenging and time-consuming. This allows cyber criminals to carry on with their attacks while the analysis is still in progress. In this paper, we present the results of the Citadel reverse engineering and provide additional insight into the functionality, inner workings, and open source components of the malware. In order to accelerate the reverse engineering process, we propose a clone-based analysis methodology. Citadel is an offspring of a previously analyzed malware called Zeus; thus, using the former as a reference, we can measure and quantify the similarities and differences of the new variant. Two types of code analysis techniques are provided in the methodology, namely assembly to source code matching and binary clone detection. The methodology can help reduce the number of functions requiring manual analysis. The analysis results prove that the approach is promising in Citadel malware analysis. Furthermore, the same approach is applicable to similar malware analysis scenarios.Comment: 10 pages, 17 figures. This is an updated / edited version of a paper appeared in FPS 201
    corecore