Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Dartmouth College

2011

Discipline
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 95

Full-Text Articles in Physical Sciences and Mathematics

Correlation Of Inflation-Produced Magnetic Fields With Scalar Fluctuations, Robert R. Caldwell, Leonardo Motta, Marc Kamionkowski Dec 2011

Correlation Of Inflation-Produced Magnetic Fields With Scalar Fluctuations, Robert R. Caldwell, Leonardo Motta, Marc Kamionkowski

Dartmouth Scholarship

If the conformal invariance of electromagnetism is broken during inflation, then primordial magnetic fields may be produced. If this symmetry breaking is generated by the coupling between electromagnetism and a scalar field—e.g. the inflaton, curvaton, or Ricci scalar—then these magnetic fields may be correlated with primordial density perturbations, opening a new window to the study of non-Gaussianity in cosmology. In order to illustrate, we couple electromagnetism to an auxiliary scalar field in a de Sitter background. We calculate the power spectra for scalar-field perturbations and magnetic fields, showing how a scale-free magnetic-field spectrum with rms amplitude of ∼nG at Mpc …


The Sn 393-Snr Rx J1713.7-3946 (G347.3-0.5) Connection, Robert A. Fesen, Richard Kremer, Daniel Patnaude, Dan Milisavljevic Dec 2011

The Sn 393-Snr Rx J1713.7-3946 (G347.3-0.5) Connection, Robert A. Fesen, Richard Kremer, Daniel Patnaude, Dan Milisavljevic

Dartmouth Scholarship

Although the connection of the Chinese "guest" star of 393 AD with the Galactic supernova remnant RX J1713.7-3946 (G347.3-0.5) made by Wang et al. in 1997 is consistent with the remnant's relatively young properties and the guest star's projected position within the "tail" of the constellation Scorpius, there are difficulties with such an association. The brief Chinese texts concerning the 393 AD guest star make no comment about its apparent brightness, stating only that it disappeared after eight months. However, at the remnant's current estimated 1-1.3 kpc distance and A V 3, its supernova (SN) should have been a visually …


A Perceptual Metric For Photo Retouching, Eric Kee, Hany Farid Dec 2011

A Perceptual Metric For Photo Retouching, Eric Kee, Hany Farid

Dartmouth Scholarship

In recent years, advertisers and magazine editors have been widely criticized for taking digital photo retouching to an extreme. Impossibly thin, tall, and wrinkle- and blemish-free models are routinely splashed onto billboards, advertisements, and magazine covers. The ubiquity of these unrealistic and highly idealized images has been linked to eating disorders and body image dissatisfaction in men, women, and children. In response, several countries have considered legislating the labeling of retouched photos. We describe a quantitative and perceptually meaningful metric of photo retouching. Photographs are rated on the degree to which they have been digitally altered by explicitly modeling and …


Second-Order Weak Lensing From Modified Gravity, R. Ali Vanderveld, Robert R. Caldwell, Jason Rhodes Dec 2011

Second-Order Weak Lensing From Modified Gravity, R. Ali Vanderveld, Robert R. Caldwell, Jason Rhodes

Dartmouth Scholarship

We explore the sensitivity of weak gravitational lensing to second-order corrections to the spacetime metric within a cosmological adaptation of the parametrized post-Newtonian framework. Whereas one might expect nonlinearities of the gravitational field to introduce non-Gaussianity into the statistics of the lensing convergence field, we show that such corrections are actually always small within a broad class of scalar-tensor theories of gravity. We show this by first computing the weak lensing convergence within our parametrized framework to second order in the gravitational potential, and then computing the relevant post-Newtonian parameters for scalar-tensor gravity theories. In doing so we show that …


The Acs Survey Of Galactic Globular Clusters. Xi. The Three-Dimensional Orientation Of The Sagittarius Dwarf Spheroidal Galaxy And Its Globular Clusters, Michael H. H. Siegel, Steven R. Majewski, David R. Law, Ata Sarajedini, Aaron Dotter, A Marín-Franch, Brian Chaboyer Dec 2011

The Acs Survey Of Galactic Globular Clusters. Xi. The Three-Dimensional Orientation Of The Sagittarius Dwarf Spheroidal Galaxy And Its Globular Clusters, Michael H. H. Siegel, Steven R. Majewski, David R. Law, Ata Sarajedini, Aaron Dotter, A Marín-Franch, Brian Chaboyer

Dartmouth Scholarship

We use observations from the Hubble Space Telescope Advanced Camera for Surveys (HST/ACS) study of Galactic globular clusters to investigate the spatial distribution of the inner regions of the disrupting Sagittarius dwarf spheroidal galaxy (Sgr). We combine previously published analyses of four Sgr member clusters located near or in the Sgr core (M54, Arp 2, Terzan 7, and Terzan 8) with a new analysis of diffuse Sgr material identified in the background of five low-latitude Galactic bulge clusters (NGC 6624, 6637, 6652, 6681, and 6809) observed as part of the ACS survey. By comparing the bulge cluster color-magnitude …


The Laboca Survey Of The Extended Chandra Deep Field-South: Clustering Of Submillimetre Galaxies, Ryan C. Hickox, J. L. Wardlow, Ian Smail, A. D. Myers Dec 2011

The Laboca Survey Of The Extended Chandra Deep Field-South: Clustering Of Submillimetre Galaxies, Ryan C. Hickox, J. L. Wardlow, Ian Smail, A. D. Myers

Dartmouth Scholarship

We present a measurement of the spatial clustering of submillimetre galaxies (SMGs) at z = 1–3. Using data from the 870 μm LABOCA submillimetre survey of the Extended Chandra Deep Field South, we employ a novel technique to measure the cross-correlation between SMGs and galaxies, accounting for the full probability distributions for photometric redshifts of the galaxies. From the observed projected two-point cross-correlation function we derive the linear bias and characteristic dark matter halo masses for the SMGs. We detect clustering in the cross-correlation between SMGs and galaxies at the > 4σ level. Accounting for the clustering of galaxies from their …


Magnetopause Displacements: The Possible Role Of Dust, R. A. Treumann, W. Baumjohann Dec 2011

Magnetopause Displacements: The Possible Role Of Dust, R. A. Treumann, W. Baumjohann

Dartmouth Scholarship

Large compressions of the magnetopause are proposed to occasionally result from temporary encounters of the magnetosphere with dust streams in interplanetary space. Such streams may have their origin in cometary dust tails or asteroids which cross the inner heliosphere or in meteoroids in Earth's vicinity. Dust ejected from such objects when embedding the magnetosphere for their limited transition time should cause substantial global deformations of the magnetopause/magnetosphere due to the very large dust grain mass and momentum which compensates for the low dust density when contributing to the upstream pressure variation.


Security Applications Of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina Nov 2011

Security Applications Of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina

Computer Science Technical Reports

We present an approach to improving the security of complex, composed systems based on formal language theory, and show how this approach leads to advances in input validation, security modeling, attack surface reduction, and ultimately, software design and programming methodology. We cite examples based on real-world security flaws in common protocols representing different classes of protocol complexity. We also introduce a formalization of an exploit development technique, the parse tree differential attack, made possible by our conception of the role of formal grammars in security. These insights make possible future advances in software auditing techniques applicable to static and dynamic …


Flow Dynamics Of An Accumulation Basin: A Case Study Of Upper Kahiltna Glacier, Mount Mckinley, Alaska, Seth Campbell, Karl Kreutz, Erich Osterberg, Steven Arcone Nov 2011

Flow Dynamics Of An Accumulation Basin: A Case Study Of Upper Kahiltna Glacier, Mount Mckinley, Alaska, Seth Campbell, Karl Kreutz, Erich Osterberg, Steven Arcone

Dartmouth Scholarship

We interpreted flow dynamics of the Kahiltna Pass Basin accumulation zone on Mount McKinley, Alaska, USA, using 40, 100 and 900 MHz ground-penetrating radar profiles and GPS surface velocity measurements. We found dipping, englacial surface-conformable strata that experienced vertical thickening as the glacier flowed westward from a steep, higher-velocity (60 m a−1) region into flat terrain associated with a 90° bend in the glacier and lower velocities (15 m a−1) to the south. Stratigraphy near the western side of the basin was surface-conformable to ∼170 m depth and thinned as flow diverged southward, down-glacier. We found complex strata beneath the …


Time Evolution Of The Reverse Shock In Sn 1006, P. Frank Winkler, Andrew J. S. Hamilton, Knox S. Long, Robert A. Fesen Nov 2011

Time Evolution Of The Reverse Shock In Sn 1006, P. Frank Winkler, Andrew J. S. Hamilton, Knox S. Long, Robert A. Fesen

Dartmouth Scholarship

The Schweizer-Middleditch star, located behind the SN 1006 remnant and near its center in projection, provides the opportunity to study cold, expanding ejecta within the SN 1006 shell through UV absorption. Especially notable is an extremely sharp red edge to the Si II 1260 Å feature, which stems from the fastest moving ejecta on the far side of the SN 1006 shell—material that is just encountering the reverse shock. Comparing Hubble Space Telescope far-UV spectra obtained with the Cosmic Origins Spectrograph in 2010 and with the Space Telescope Imaging Spectrograph in 1999, we have measured the change in this feature …


Distance Scale Zero Points From Galactic Rr Lyrae Star Parallaxes, G. Fritz Benedict, Barbara E. Mcarthur, Michael W. Feast, Thomas G. Barnes, Thomas E. Harrison, Jacob L. Bean, John W. Menzies, Brian Chaboyer Nov 2011

Distance Scale Zero Points From Galactic Rr Lyrae Star Parallaxes, G. Fritz Benedict, Barbara E. Mcarthur, Michael W. Feast, Thomas G. Barnes, Thomas E. Harrison, Jacob L. Bean, John W. Menzies, Brian Chaboyer

Dartmouth Scholarship

We present new absolute trigonometric parallaxes and proper motions for seven Population II variable stars—five RR Lyr variables: RZ Cep, XZ Cyg, SU Dra, RR Lyr, and UV Oct; and two type 2 Cepheids: VY Pyx and κ Pav. We obtained these results with astrometric data from Fine Guidance Sensors, white-light interferometers on Hubble Space Telescope. We find absolute parallaxes in milliseconds of arc: RZ Cep, 2.12 ± 0.16 mas; XZ Cyg, 1.67 ± 0.17 mas; SU Dra, 1.42 ± 0.16 mas; RR Lyr, 3.77 ± 0.13 mas; UV Oct, 1.71 ± 0.10 mas; VY Pyx, 6.44 ± 0.23 …


The Good, The Bad, And The Actively Verified, John Williamson Nov 2011

The Good, The Bad, And The Actively Verified, John Williamson

Dartmouth College Master’s Theses

We believe that we can use active probing for compromise recovery. Our intent is to exploit the differences in behavior between compromised and uncompromised systems and use that information to identify those which are not behaving as expected. Those differences may indicate a deviation in either con figuration or implementation from what we expect on the network, either of which suggests that the misbehaving entity might not be trustworthy. In this work, we propose and build a case for a method for using altered behavior directly resulting from or introduced as a side-effect of the compromise of a network service …


A 3-D Lighting And Shadow Analysis Of The Jfk Zapruder Film (Frame 317), Hany Farid Nov 2011

A 3-D Lighting And Shadow Analysis Of The Jfk Zapruder Film (Frame 317), Hany Farid

Computer Science Technical Reports

Claims of a broader conspiracy behind U.S. President John F. Kennedy's assassination have persisted for the past nearly five decades. The Zapruder film is considered to be the most complete recording of JFK's assassination. Many have claimed that this 8mm film was manipulated to conceal evidence of a second shooter, which would invalidate the claim that a lone gunman, Lee Harvey Oswald, was responsible for JFK's assassination. Here we consider the viability of one specific claim of postproduction tampering in the Zapruder film.


Experimental Characterization Of Coherent Magnetization Transport In A One-Dimensional Spin System, Chandrasekhar Ramanathan, Paola Cappellaro, Lorenza Viola, David G. Cory Oct 2011

Experimental Characterization Of Coherent Magnetization Transport In A One-Dimensional Spin System, Chandrasekhar Ramanathan, Paola Cappellaro, Lorenza Viola, David G. Cory

Dartmouth Scholarship

We experimentally characterize the non-equilibrium, room-temperature magnetization dynamics of a spin chain evolving under an effective double-quantum (DQ) Hamiltonian. We show that the Liouville space operators corresponding to the magnetization and the two-spin correlations evolve 90 degrees out of phase with each other, and drive the transport dynamics. For a nearest-neighbor-coupled N-spin chain, the dynamics are found to be restricted to a Liouville operator space whose dimension scales only as N2, leading to a slow growth of multi-spin correlations. Even though long-range couplings are present in the real system, we find excellent agreement between the analytical predictions …


Acurate Low-Mass Stellar Models Of Koi-126, Gregory A. Feiden, Brian Chaboyer, Aaron Dotter Oct 2011

Acurate Low-Mass Stellar Models Of Koi-126, Gregory A. Feiden, Brian Chaboyer, Aaron Dotter

Dartmouth Scholarship

The recent discovery of an eclipsing hierarchical triple system with two low-mass stars in a close orbit (KOI-126) by Carter et al. (2011) appeared to reinforce the evidence that theoretical stellar evolution models are not able to reproduce the observational mass-radius relation for low-mass stars. We present a set of stellar models for the three stars in the KOI-126 system that show excellent agreement with the observed radii. This agreement appears to be due to the equation of state implemented by our code. A significant dispersion in the observed mass-radius relation for fully convective stars is demonstrated; indicative of the …


Approach To Accurately Measuring The Speed Of Optical Precursors, Chuan-Feng Li, Zong-Quan Zhou, Heejeong Jeong, Guang-Can Guo Oct 2011

Approach To Accurately Measuring The Speed Of Optical Precursors, Chuan-Feng Li, Zong-Quan Zhou, Heejeong Jeong, Guang-Can Guo

Dartmouth Scholarship

Precursors can serve as a bound on the speed of information with dispersive medium. We propose a method to identify the speed of optical wavefronts using polarization-based interference in a solid-state device, which can bound the accuracy of the speed of wavefronts to less than 10−4 with conventional experimental conditions. Our proposal may have important implications for optical communications and fast information processing.


Adapt-Lite: Privacy-Aware, Secure, And Efficient Mhealth Sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz Oct 2011

Adapt-Lite: Privacy-Aware, Secure, And Efficient Mhealth Sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz

Dartmouth Scholarship

As healthcare in many countries faces an aging population and rising costs, mobile sensing technologies promise a new opportunity. Using mobile health (mHealth) sensing, which uses medical sensors to collect data about the patients, and mobile phones to act as a gateway between sensors and electronic health record systems, caregivers can continuously monitor the patients and deliver better care. Although some work on mHealth sensing has addressed security, achieving strong security and privacy for low-power sensors remains a challenge. \par We make three contributions. First, we propose Adapt-lite, a set of two techniques that can be applied to existing wireless …


A Model Of So-Called "Zebra" Emissions In Solar Flare Radio Burst Continua, R. A. Treumann, R. Nakamura, W. Baumjohann Sep 2011

A Model Of So-Called "Zebra" Emissions In Solar Flare Radio Burst Continua, R. A. Treumann, R. Nakamura, W. Baumjohann

Dartmouth Scholarship

A simple mechanism for the generation of elec- tromagnetic “Zebra” pattern emissions is proposed. “Zebra” bursts are regularly spaced narrow-band radio emissions on the otherwise broadband radio continuum emitted by the ac- tive solar corona. The mechanism is based on the generation of an ion-ring distribution in a magnetic mirror geometry in the presence of a properly directed field-aligned electric po- tential field. Such ion-rings or ion-conics are well known from magnetospheric observations. Under coronal condi- tions they may become weakly relativistic. In this case the ion-cyclotron maser generates a number of electromagnetic ion-cyclotron harmonics which modulate the electron maser …


Reducing Sequencing Complexity In Dynamical Quantum Error Suppression By Walsh Modulation, David Hayes, Kaveh Khodjasteh, Lorenza Viola, Michael J. Biercuk Sep 2011

Reducing Sequencing Complexity In Dynamical Quantum Error Suppression By Walsh Modulation, David Hayes, Kaveh Khodjasteh, Lorenza Viola, Michael J. Biercuk

Dartmouth Scholarship

We study dynamical error suppression from the perspective of reducing sequencing complexity, with an eye toward facilitating the development of efficient semiautonomous quantum-coherent systems. To this end, we focus on digital sequences where all interpulse time periods are integer multiples of a minimum clock period and compatibility with digital classical control circuitry is intrinsic. We use so-called Walsh functions as a unifying mathematical framework; the Walsh functions are an orthonormal set of basis functions which may be associated directly with the control propagator for a digital modulation scheme. Using this insight, we characterize the suite of resulting Walsh dynamical decoupling …


Hide-N-Sense: Privacy-Aware Secure Mhealth Sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz Sep 2011

Hide-N-Sense: Privacy-Aware Secure Mhealth Sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz

Computer Science Technical Reports

As healthcare in many countries faces an aging population and rising costs, mobile sensing technologies promise a new opportunity. Using mobile health (mHealth) sensing, which uses medical sensors to collect data about the patients, and mobile phones to act as a gateway between sensors and electronic health record systems, caregivers can continuously monitor the patients and deliver better care. Furthermore, individuals can become better engaged in monitoring and managing their own health. Although some work on mHealth sensing has addressed security, achieving strong privacy for low-power sensors remains a challenge.

We make three contributions. First, we propose an mHealth sensing …


Bgrep And Bdiff: Unix Tools For High-Level Languages, Gabriel A. Weaver, Sean W. Smith Sep 2011

Bgrep And Bdiff: Unix Tools For High-Level Languages, Gabriel A. Weaver, Sean W. Smith

Computer Science Technical Reports

The rise in high-level languages for system administrators requires us to rethink traditional UNIX tools designed for these older data formats. We propose new block-oriented tools, bgrep and bdiff, operating on syntactic blocks of code rather than the line, the traditional information container of UNIX. Transcending the line number allows us to introduce longitudinal diff, a mode of bdiff that lets us track changes across arbitrary blocks of code. We present a detailed implementation roadmap and evaluation framework for the full version of this paper. In addition we demonstrate how the design of our tools already addresses several real-wold problems …


Melt Regimes, Stratigraphy, Flow Dynamics And Glaciochemistry Of Three Glaciers In The Alaska Range, Seth Campbell, Karl Kreutz, Erich Osterberg, Steven Arcone Sep 2011

Melt Regimes, Stratigraphy, Flow Dynamics And Glaciochemistry Of Three Glaciers In The Alaska Range, Seth Campbell, Karl Kreutz, Erich Osterberg, Steven Arcone

Dartmouth Scholarship

We used ground-penetrating radar (GPR), GPS and glaciochemistry to evaluate melt regimes and ice depths, important variables for mass-balance and ice-volume studies, of Upper Yentna Glacier, Upper Kahiltna Glacier and the Mount Hunter ice divide, Alaska. We show the wet, percolation and dry snow zones located below 2700ma.s.l., at 2700 to 3900ma.s.l. and above 3900ma.s.l., respectively. We successfully imaged glacier ice depths upwards of 480m using 40–100MHz GPR frequencies. This depth is nearly double previous depth measurements reached using mid-frequency GPR systems on temperate glaciers. Few Holocene-length climate records are available in Alaska, hence we also assess stratigraphy and flow …


Using Borehole Logging And Electron Backscatter Diffraction To Orient An Ice Core From Upper Fremont Glacier, Wyoming, Usa, R. W. Obbard, T. Cassano, K. Aho, G. Troderman, I. Baker Sep 2011

Using Borehole Logging And Electron Backscatter Diffraction To Orient An Ice Core From Upper Fremont Glacier, Wyoming, Usa, R. W. Obbard, T. Cassano, K. Aho, G. Troderman, I. Baker

Dartmouth Scholarship

While glacier fabric reflects the accumulated strain, detailed azimuthal information is required to link the microstructure to the flow, and this is not easily gathered at depth. Borehole logging provides a way to obtain a log of azimuthal orientation of tilted stratigraphic features that can be used to orient the core with respect to glacier flow. We demonstrate this using acoustic borehole logs and the ice core from a 162 m borehole in Upper Fremont Glacier, Wind River Range, Wyoming, USA. We measured the dip of tilted dust and bubble layers in the actual ice core, identified them on the …


Tackling Latency Using Fg, Priya Natarajan Sep 2011

Tackling Latency Using Fg, Priya Natarajan

Dartmouth College Ph.D Dissertations

Applications that operate on datasets which are too big to fit in main memory, known in the literature as external-memory or out-of-core applications, store their data on one or more disks. Several of these applications make multiple passes over the data, where each pass reads data from disk, operates on it, and writes data back to disk. Compared with an in-memory operation, a disk-I/O operation takes orders of magnitude (approx. 100,000 times) longer; that is, disk-I/O is a high-latency operation. Out-of-core algorithms often run on a distributed-memory cluster to take advantage of a cluster's computing power, memory, disk space, and …


Anomaly Detection In Network Streams Through A Distributional Lens, Chrisil Arackaparambil Sep 2011

Anomaly Detection In Network Streams Through A Distributional Lens, Chrisil Arackaparambil

Dartmouth College Ph.D Dissertations

Anomaly detection in computer networks yields valuable information on events relating to the components of a network, their states, the users in a network and their activities. This thesis provides a unified distribution-based methodology for online detection of anomalies in network traffic streams. The methodology is distribution-based in that it regards the traffic stream as a time series of distributions (histograms), and monitors metrics of distributions in the time series. The effectiveness of the methodology is demonstrated in three application scenarios. First, in 802.11 wireless traffic, we show the ability to detect certain classes of attacks using the methodology. Second, …


Pointer States Via Engineered Dissipation, Kaveh Khodjasteh, Viatcheslav V. V. Dobrovitski, Lorenza Viola Aug 2011

Pointer States Via Engineered Dissipation, Kaveh Khodjasteh, Viatcheslav V. V. Dobrovitski, Lorenza Viola

Dartmouth Scholarship

Pointer states are long-lasting high-fidelity states in open quantum systems. We show how any pure state in a non-Markovian open quantum system can be made to behave as a pointer state by suitably engineering the coupling to the environment via open-loop periodic control. Engineered pointer states are constructed as approximate fixed points of the controlled open-system dynamics, in such a way that they are guaranteed to survive over a long time with a fidelity determined by the relative precision with which the dynamics is engineered. We provide quantitative minimum-fidelity bounds by identifying symmetry and ergodicity conditions that the decoherence-inducing perturbation …


Does The Normal Stress Parallel To The Sliding Plane Affect The Friction Of Ice Upon Ice?, Andrew L. Fortt, Erland M. Schulson Aug 2011

Does The Normal Stress Parallel To The Sliding Plane Affect The Friction Of Ice Upon Ice?, Andrew L. Fortt, Erland M. Schulson

Dartmouth Scholarship

Sliding experiments were performed at –10 degrees C on smooth surfaces of freshwater columnar-grained S2 ice sliding against itself at a velocity of 8X10 –4 ms –1, with the purpose of examining whether normal stress parallel to the sliding plane affects frictional resistance. This component of the stress tensor was varied (0.20–1.83 MPa) using a loading system operated under biaxial compression, by orienting the sliding plane at two different angles, 26 degrees and 64 degrees, with respect to the principal loading direction. Under these conditions, no evidence was found to indicate that the normal stress in the direction of …


Discovery Of A Bright, Extremely Low Mass White Dwarf In A Close Double Degenerate System, S. Vennes, J. R. Thorstensen, A. Kawka, P. Németh, J. N. Skinner Aug 2011

Discovery Of A Bright, Extremely Low Mass White Dwarf In A Close Double Degenerate System, S. Vennes, J. R. Thorstensen, A. Kawka, P. Németh, J. N. Skinner

Dartmouth Scholarship

We report the discovery of a bright (V ~ 13.7), extremely low-mass white dwarf in a close double degenerate system. We originally selected GALEX J171708.5+675712 for spectroscopic follow-up among a group of white dwarf candidates in an ultraviolet-optical reduced proper-motion diagram. The new white dwarf has a mass of 0.18 M_solar and is the primary component of a close double degenerate system (P=0.246137 d, K_1 = 288 km/s) comprising a fainter white dwarf secondary with M_2 ~ 0.9 M_solar. Light curves phased with the orbital ephemeris show evidence of relativistic beaming and weaker ellipsoidal variations. The light curves also reveal …


Autoscopy Jr.: Intrusion Detection For Embedded Control Systems, Jason O. Reeves Aug 2011

Autoscopy Jr.: Intrusion Detection For Embedded Control Systems, Jason O. Reeves

Dartmouth College Master’s Theses

Securing embedded control systems within the power grid presents a unique challenge: on top of the resource restrictions inherent to these devices, SCADA systems must also accommodate strict timing requirements that are non-negotiable, and their massive scale greatly amplifies costs such as power consumption. These constraints make the conventional approach to host intrusion detection--namely, employing virtualization in some manner--too costly or impractical for embedded control systems within critical infrastructure. Instead, we take an in-kernel approach to system protection, building upon the Autoscopy system developed by Ashwin Ramaswamy that places probes on indirectly-called functions and uses them to monitor its host …


Beyond Selinux: The Case For Behavior-Based Policy And Trust Languages, Sergey Bratus, Michael E. Locasto, Boris Otto, Rebecca Shapiro, Sean W. Smith, Gabriel Weaver Aug 2011

Beyond Selinux: The Case For Behavior-Based Policy And Trust Languages, Sergey Bratus, Michael E. Locasto, Boris Otto, Rebecca Shapiro, Sean W. Smith, Gabriel Weaver

Computer Science Technical Reports

Despite the availability of powerful mechanisms for security policy and access control, real-world information security practitioners---both developers and security officers---still find themselves in need of something more. We believe that this is the case because available policy languages do not provide clear and intelligible ways to allow developers to communicate their knowledge and expectations of trustworthy behaviors and actual application requirements to IT administrators. We work to address this policy engineering gap by shifting the focus of policy language design to this communication via behavior-based policies and their motivating scenarios.