2,526 research outputs found

    A two-component transport model for solar wind fluctuations: Waves plus quasi-2D turbulence

    Get PDF
    We present a model for the transport of solar wind fluctuations, based on the assumption that they can be well-represented using two distinct components: a quasi-2D turbulence piece and a wave-like piece. For each component, coupled transport equations for its energy, cross helicity, and characteristic lengthscale(s) are derived, along with an equation for the proton temperature. This energy-containing “two-component” model includes the effects of solar wind expansion and advection, driving by stream shear and pickup ions, and nonlinear cascades. Nonlinear effects are modeled using a recently developed one-point phenomenology for such a two-component model of homogeneous MHD turbulence [1]. Heating due to these nonlinear effects is included in the temperature equation. Numerical solutions are discussed and compared with observation

    Solar wind turbulent heating by interstellar pickup protons: 2-component model

    Get PDF
    We apply a recently developed 2-component phenomenology to the turbulent heating of the core solar wind protons as seen at the Voyager 2 spacecraft. We find that this new description improves the model predictions of core temperature and correlation scale of the fluctuations, yielding excellent agreement with the Voyager measurements. However, the model fluctuation intensity substantially exceeds the Voyager measurements in the outer heliosphere, indicating that this picture needs further refinement

    Turbulence, spatial transport, and heating of the solar wind

    Get PDF
    A phenomenological theory describes radial evolution of plasma turbulence in the solar wind from 1 to 50 astronomical units. The theory includes a simple closure for local anisotropic magnetohydrodynamic turbulence, spatial transport, and driving by large-scale shear and pickup ions. Results compare well to plasma and magnetic field data from the Voyager 2 spacecraft, providing a basis for a concise, tractable description of turbulent energy transport in a variety of astrophysical plasmas

    On Session Languages

    Get PDF
    The LangSec approach defends against crafted input attacks by defining a formal language specifying correct inputs and building a parser that decides that language. However, each successive input is not necessarily in the same basic language---e.g., most communication protocols use formats that depend on values previously received, or on some other additional context. When we try to use LangSec in these real-world scenarios, most parsers we write need additional mechanisms to change the recognized language as the execution progresses. This paper discusses approaches researchers have previously taken to build parsers for such protocols and provides formal descriptions of new sets of languages that could be considered to be a sequence of languages, instead of a single language describing an entire protocol---thus bringing LangSec theory closer to practice

    17 Days in Beijing: Screen of Consciousness on the Micropolitical

    Get PDF

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    Get PDF
    We construct a bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide the necessary security within timing constraints; the previous solution that does provide the necessary security is not BITW. At a comparable hardware cost, our BITW solution provides sufficient security, and yet incurs minimal end-to-end communication latency. A microcontroller prototype of our solution is under development

    Distributed IoT Attestation via Blockchain (Extended Version)

    Get PDF
    The growing number and nature of Internet of Things (IoT) devices makes these resource-constrained appliances particularly vulnerable and increasingly impactful in their exploitation. Current estimates for the number of connected things commonly reach the tens of billions. The low-cost and limited computational strength of these devices can preclude security features. Additionally, economic forces and a lack of industry expertise in security often contribute to a rush to market with minimal consideration for security implications. It is essential that users of these emerging technologies, from consumers to IT professionals, be able to establish and retain trust in the multitude of diverse and pervasive compute devices that are ever more responsible for our critical infrastructure and personal information. Remote attestation is a well-known technique for building such trust between devices. In standard implementations, a potentially untrustworthy prover attests, using public key infrastructure, to a verifier about its configuration or properties of its current state. Attestation is often performed on an ad hoc basis with little concern for historicity. However, controls and sensors manufactured for the Industrial IoT (IIoT) may be expected to operate for decades. Even in the consumer market, so-called smart things can be expected to outlive their manufacturers. This longevity combined with limited software or firmware patching creates an ideal environment for long-lived zero-day vulnerabilities. Knowing both if a device is vulnerable and if so when it became vulnerable is a management nightmare as IoT deployments scale. For network connected machines, with access to sensitive information and real-world physical controls, maintaining some sense of a device\u27s lifecycle would be insightful. In this paper, we propose a novel attestation architecture, DAN: a distributed attestation network, utilizing blockchain to store and share device information. We present the design of this new attestation architecture, and describe a virtualized simulation, as well as a prototype system chosen to emulate an IoT deployment with a network of Raspberry Pi, Infineon TPMs, and a Hyperledger Fabric blockchain. We discuss the implications and potential challenges of such a network for various applications such as identity management, intrusion detection, forensic audits, and regulatory certification

    BGrep and BDiff: UNIX Tools for High-Level Languages

    Get PDF
    The rise in high-level languages for system administrators requires us to rethink traditional UNIX tools designed for these older data formats. We propose new block-oriented tools, bgrep and bdiff, operating on syntactic blocks of code rather than the line, the traditional information container of UNIX. Transcending the line number allows us to introduce longitudinal diff, a mode of bdiff that lets us track changes across arbitrary blocks of code. We present a detailed implementation roadmap and evaluation framework for the full version of this paper. In addition we demonstrate how the design of our tools already addresses several real-wold problems faced by network administrators to maintain security policy

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)

    Get PDF
    We construct a bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in legacy Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical infrastructures such as the electric power grid rely. Previous BITW solutions do not provide the necessary security within timing constraints; the previous solution that does is not BITW. At a hardware cost comparable to existing solutions, our BITW solution provides sufficient security, and yet incurs minimal end-to-end communication latency

    The 230 V CBEMA curve - Preliminary studies

    Get PDF
    The ITI, formerly CBEMA, curve was developed by the Information Technology Industry Council of the United States of America. The curve describes an AC input voltage envelope which typically can be tolerated by most Information Technology (IT) Equipment. Although the curve ostensibly applies only to IT equipment it is often used throughout the electricity supply industry to provide an indication of the input voltage tolerance of a wide range of equipment. In spite of the fact that the curve was designed to apply to equipment supplied at 120 V 60 Hz nominal voltages it is widely used in Australia which has a 230 V 50 Hz system. This paper details a preliminary study aimed at developing a CBEMA style curve to suit Australian conditions. A range of domestic equipment has been tested to determine sag susceptibility. The types of equipment tested are not limited to IT equipment and represent a cross section of appliances likely to be found in most homes. Overall, results for domestic appliances show that equipment connected to the Australian 230 V network has sag immunity considerably greater than that defined by the ITI Curve. As such, the applicability of the curve for individual pieces of equipment connected to Australian 230 V electricity networks is highly questionable and the need for further work in this area is apparent
    corecore