2,938 research outputs found
Linking Light Scalar Modes with A Small Positive Cosmological Constant in String Theory
Based on the studies in Type IIB string theory phenomenology, we conjecture
that a good fraction of the meta-stable de Sitter vacua in the cosmic stringy
landscape tend to have a very small cosmological constant when
compared to either the string scale or the Planck scale , i.e.,
. These low lying de Sitter vacua tend to be
accompanied by very light scalar bosons/axions. Here we illustrate this
phenomenon with the bosonic mass spectra in a set of Type IIB string theory
flux compactification models. We conjecture that small with light
bosons is generic among de Sitter solutions in string theory; that is, the
smallness of and the existence of very light bosons (may be even the
Higgs boson) are results of the statistical preference for such vacua in the
landscape. We also discuss a scalar field model to illustrate
how this statistical preference for a small remains when quantum loop
corrections are included, thus bypassing the radiative instability problem.Comment: 35 pages, 7 figures; added subsection: Finite Temperature and Phase
Transitio
Man-in-the-Middle Attacks on MQTT based IoT networks
“The use of Internet-of-Things (IoT) devices has increased a considerable amount in recent years due to decreasing cost and increasing availability of transistors, semiconductor, and other components. Examples can be found in daily life through smart cities, consumer security cameras, agriculture sensors, and more. However, Cyber Security in these IoT devices are often an afterthought making these devices susceptible to easy attacks. This can be due to multiple factors. An IoT device is often in a smaller form factor and must be affordable to buy in large quantities; as a result, IoT devices have less resources than a typical computer. This includes less processing power, battery power, and random access memory (RAM). This limits the possibilities of traditional security in IoT devices.
To help evaluate the state of IoT devices and further enforce them, we present an easy to use program that requires little to no prior knowledge of the target infrastructure. The process is a Man-in-the-Middle (MITM) attack that hijacks packets sent between IoT devices using the popular MQTT protocol. We do this by using a WiFi Pineapple from Hak5, in the device’s raw form, is a WiFi access point with specific offensive capabilities installed as software. We then pass these packets into a custom General Adversarial Network (GAN) that utilizes a Natural Language Processing (NLP) model to generate a malicious message. Once malicious messages are generated, the messages are passed back to the WiFI Pineapple and sent as a legitimate packet among the network.
We then look at the efficiency of these malicious messages through different NLP algorithms. In this particular work, we analyze an array of BERT variants and GPT-2”--Abstract, page iv
Atomic ionization by sterile-to-active neutrino conversion and constraints on dark matter sterile neutrinos with germanium detectors
The transition magnetic moment of a sterile-to-active neutrino conversion
gives rise to not only radiative decay of a sterile neutrino, but also its
non-standard interaction (NSI) with matter. For sterile neutrinos of keV-mass
as dark matter candidates, their decay signals are actively searched for in
cosmic X-ray spectra. In this work, we consider the NSI that leads to atomic
ionization, which can be detected by direct dark matter experiments. It is
found that this inelastic scattering process for a nonrelativistic sterile
neutrino has a pronounced enhancement in the differential cross section at
energy transfer about half of its mass, manifesting experimentally as peaks in
the measurable energy spectra. The enhancement effects gradually smear out as
the sterile neutrino becomes relativistic. Using data taken with germanium
detectors that have fine energy resolution in keV and sub-keV regimes,
constraints on sterile neutrino mass and its transition magnetic moment are
derived and compared with those from astrophysical observations
- …