6,400 research outputs found
Local times for solutions of the complex Ginzburg-Landau equation and the inviscid limit
We consider the behaviour of the distribution for stationary solutions of the
complex Ginzburg-Landau equation perturbed by a random force. It was proved
earlier that if the random force is proportional to the square root of the
viscosity, then the family of stationary measures possesses an accumulation
point as the viscosity goes to zero. We show that if is such point, then
the distributions of the L^2 norm and of the energy possess a density with
respect to the Lebesgue measure. The proofs are based on It\^o's formula and
some properties of local time for semimartingales.Comment: 12 page
Quantum ring models and action-angle variables
We suggest to use the action-angle variables for the study of properties of
(quasi)particles in quantum rings. For this purpose we present the action-angle
variables for three two-dimensional singular oscillator systems. The first one
is the usual (Euclidean) singular oscillator, which plays the role of the
confinement potential for the quantum ring. We also propose two singular
spherical oscillator models for the role of the confinement system for the
spherical ring. The first one is based on the standard Higgs oscillator
potential. We show that, in spite of the presence of a hidden symmetry, it is
not convenient for the study of the system's behaviour in a magnetic field. The
second model is based on the so-called CP(1) oscillator potential and respects
the inclusion of a constant magnetic field.Comment: 9 pages, nofigure
Bootbandit: A macOS Bootloader Attack
Full disk encryption (FDE) is used to protect a computer system against data theft by physical access. If a laptop or hard disk drive protected with FDE is stolen or lost, the data remains unreadable without the encryption key. To foil this defense, an intruder can gain physical access to a computer system in a so-called “evil maid” attack, install malware in the boot (pre-operating system) environment, and use the malware to intercept the victim’s password. Such an attack relies on the fact that the system is in a vulnerable state before booting into the operating system. In this paper, we discuss an evil maid type of attack, in which the victim’s password is stolen in the boot environment, passed to the macOS user environment, and then exfiltrated from the system to the attacker’s remote command and control server. On a macOS system, this attack has additional implications due to “password forwarding” technology, in which users’ account passwords also serve as FDE passwords
Dense QCD and phenomenology of compact stars
I discuss three topics in physics of massive (two solar-mass and larger)
neutron stars containing deconfined quark matter: (i) the equation of state of
deconfined dense quark matter and its color superconducting phases, (ii) the
thermal evolution of stars with quark cores, (iii) color-magnetic flux tubes in
type-II superconducting quark matter and their dynamics driven by Aharonov-Bohm
interactions with unpaired fermions.Comment: 8 pages, 3 figures. Contribution to the proceedings of "Xth Quark
Confinement and the Hadron Spectrum", October 8-12, 2012, Munich, German
- …