145 research outputs found

    SALT observations of southern post-novae

    Full text link
    We report on recent optical observations of the stellar and the nebular remnants of 22 southern post-novae. In this study, for each of our targets, we obtained and analysed long-slit spectra in the spectral range 3500-6600 A and in Hα\alpha+NII narrow-band images. The changes in the emission lines' equivalent widths with the time since the outburst agree with earlier published results of other authors. We estimated an average value α\alpha=2.37 for the exponent of the power law fitted to the post-novae continua. Our observations clearly show the two-component structure of the V842 Cen expanding nebulae, owing to the different velocities of the ejected matter. We discovered an expanding shell around V382 Vel with an outer diameter of about 12 arcsec.Comment: 24 pages, 19 figures, A&A accepte

    Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs

    Get PDF
    This contribution is concerned with the question whether an adversary can automatically manipulate an unknown FPGA bitstream realizing a cryptographic primitive such that the underlying secret key is revealed. In general, if an attacker has full knowledge about the bitstream structure and can make changes to the target FPGA design, she can alter the bitstream leading to key recovery. However, this requires challenging reverse-engineering steps in practice. We argue that this is a major reason why bitstream fault injection attacks have been largely neglected in the past. In this paper, we show that malicious bitstream modifications are i) much easier to conduct than commonly assumed and ii) surprisingly powerful. We introduce a novel class of bitstream fault injection (BiFI) attacks which does not require any reverse-engineering. Our attacks can be automatically mounted without any detailed knowledge about either the bitstream format of the design or the crypto primitive which is being attacked. Bitstream encryption features do not necessarily prevent our attack if the integrity of the encrypted bitstream is not carefully checked. We have successfully verified the feasibility of our attacks in practice by considering several publicly available AES designs. As target platforms, we have conducted our experiments on Spartan-6 and Virtex-5 Xilinx FPGAs

    Brewing of filter coffee

    Get PDF
    We report progress on mathematical modelling of coffee grounds in a drip filter coffee machine. The report focuses on the evolution of the shape of the bed of coffee grounds during extraction with some work also carried out on the chemistry of extraction. This work was sponsored by Philips who are interested in understanding an observed correlation between the final shape of the coffee grounds and the quality of the coffee. We used experimental data gathered by Philips and ourselves to identify regimes in the coffee brewing process and relevant regions of parameter space. Our work makes it clear that a number of separate processes define the shape of the coffee bed depending on the values of the parameters involved e.g. the size of the grains and the speed of fluid flow during extraction. We began work on constructing mathematical models of the redistribution of the coffee grounds specialised to each region and on a model of extraction. A variety of analytic and numerical tools were used. Furthermore our research has progressed far enough to allow us to begin to exploit connections between this problem and other areas of science, in particular the areas of sedimentology and geomorphology, where the processes we have observed in coffee brewing have been studied
    • …
    corecore