-
SoK: Leveraging Transformers for Malware Analysis
Authors:
Pradip Kunwar,
Kshitiz Aryal,
Maanak Gupta,
Mahmoud Abdelsalam,
Elisa Bertino
Abstract:
The introduction of transformers has been an important breakthrough for AI research and application as transformers are the foundation behind Generative AI. A promising application domain for transformers is cybersecurity, in particular the malware domain analysis. The reason is the flexibility of the transformer models in handling long sequential features and understanding contextual relationship…
▽ More
The introduction of transformers has been an important breakthrough for AI research and application as transformers are the foundation behind Generative AI. A promising application domain for transformers is cybersecurity, in particular the malware domain analysis. The reason is the flexibility of the transformer models in handling long sequential features and understanding contextual relationships. However, as the use of transformers for malware analysis is still in the infancy stage, it is critical to evaluate, systematize, and contextualize existing literature to foster future research. This Systematization of Knowledge (SoK) paper aims to provide a comprehensive analysis of transformer-based approaches designed for malware analysis. Based on our systematic analysis of existing knowledge, we structure and propose taxonomies based on: (a) how different transformers are adapted, organized, and modified across various use cases; and (b) how diverse feature types and their representation capabilities are reflected. We also provide an inventory of datasets used to explore multiple research avenues in the use of transformers for malware analysis and discuss open challenges with future research directions. We believe that this SoK paper will assist the research community in gaining detailed insights from existing work and will serve as a foundational resource for implementing novel research using transformers for malware analysis.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Explainability-Informed Targeted Malware Misclassification
Authors:
Quincy Card,
Kshitiz Aryal,
Maanak Gupta
Abstract:
In recent years, there has been a surge in malware attacks across critical infrastructures, requiring further research and development of appropriate response and remediation strategies in malware detection and classification. Several works have used machine learning models for malware classification into categories, and deep neural networks have shown promising results. However, these models have…
▽ More
In recent years, there has been a surge in malware attacks across critical infrastructures, requiring further research and development of appropriate response and remediation strategies in malware detection and classification. Several works have used machine learning models for malware classification into categories, and deep neural networks have shown promising results. However, these models have shown its vulnerabilities against intentionally crafted adversarial attacks, which yields misclassification of a malicious file. Our paper explores such adversarial vulnerabilities of neural network based malware classification system in the dynamic and online analysis environments. To evaluate our approach, we trained Feed Forward Neural Networks (FFNN) to classify malware categories based on features obtained from dynamic and online analysis environments. We use the state-of-the-art method, SHapley Additive exPlanations (SHAP), for the feature attribution for malware classification, to inform the adversarial attackers about the features with significant importance on classification decision. Using the explainability-informed features, we perform targeted misclassification adversarial white-box evasion attacks using the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD) attacks against the trained classifier. Our results demonstrated high evasion rate for some instances of attacks, showing a clear vulnerability of a malware classifier for such attacks. We offer recommendations for a balanced approach and a benchmark for much-needed future research into evasion attacks against malware classifiers, and develop more robust and trustworthy solutions.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Explainability Guided Adversarial Evasion Attacks on Malware Detectors
Authors:
Kshitiz Aryal,
Maanak Gupta,
Mahmoud Abdelsalam,
Moustafa Saleh
Abstract:
As the focus on security of Artificial Intelligence (AI) is becoming paramount, research on crafting and inserting optimal adversarial perturbations has become increasingly critical. In the malware domain, this adversarial sample generation relies heavily on the accuracy and placement of crafted perturbation with the goal of evading a trained classifier. This work focuses on applying explainabilit…
▽ More
As the focus on security of Artificial Intelligence (AI) is becoming paramount, research on crafting and inserting optimal adversarial perturbations has become increasingly critical. In the malware domain, this adversarial sample generation relies heavily on the accuracy and placement of crafted perturbation with the goal of evading a trained classifier. This work focuses on applying explainability techniques to enhance the adversarial evasion attack on a machine-learning-based Windows PE malware detector. The explainable tool identifies the regions of PE malware files that have the most significant impact on the decision-making process of a given malware detector, and therefore, the same regions can be leveraged to inject the adversarial perturbation for maximum efficiency. Profiling all the PE malware file regions based on their impact on the malware detector's decision enables the derivation of an efficient strategy for identifying the optimal location for perturbation injection. The strategy should incorporate the region's significance in influencing the malware detector's decision and the sensitivity of the PE malware file's integrity towards modifying that region. To assess the utility of explainable AI in crafting an adversarial sample of Windows PE malware, we utilize the DeepExplainer module of SHAP for determining the contribution of each region of PE malware to its detection by a CNN-based malware detector, MalConv. Furthermore, we analyzed the significance of SHAP values at a more granular level by subdividing each section of Windows PE into small subsections. We then performed an adversarial evasion attack on the subsections based on the corresponding SHAP values of the byte sequences.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Explainable Deep Learning Models for Dynamic and Online Malware Classification
Authors:
Quincy Card,
Daniel Simpson,
Kshitiz Aryal,
Maanak Gupta,
Sheikh Rabiul Islam
Abstract:
In recent years, there has been a significant surge in malware attacks, necessitating more advanced preventive measures and remedial strategies. While several successful AI-based malware classification approaches exist categorized into static, dynamic, or online analysis, most successful AI models lack easily interpretable decisions and explanations for their processes. Our paper aims to delve int…
▽ More
In recent years, there has been a significant surge in malware attacks, necessitating more advanced preventive measures and remedial strategies. While several successful AI-based malware classification approaches exist categorized into static, dynamic, or online analysis, most successful AI models lack easily interpretable decisions and explanations for their processes. Our paper aims to delve into explainable malware classification across various execution environments (such as dynamic and online), thoroughly analyzing their respective strengths, weaknesses, and commonalities. To evaluate our approach, we train Feed Forward Neural Networks (FFNN) and Convolutional Neural Networks (CNN) to classify malware based on features obtained from dynamic and online analysis environments. The feature attribution for malware classification is performed by explainability tools, SHAP, LIME and Permutation Importance. We perform a detailed evaluation of the calculated global and local explanations from the experiments, discuss limitations and, ultimately, offer recommendations for achieving a balanced approach.
△ Less
Submitted 18 April, 2024;
originally announced April 2024.
-
Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File
Authors:
Kshitiz Aryal,
Maanak Gupta,
Mahmoud Abdelsalam,
Moustafa Saleh
Abstract:
Windows malware is predominantly available in cyberspace and is a prime target for deliberate adversarial evasion attacks. Although researchers have investigated the adversarial malware attack problem, a multitude of important questions remain unanswered, including (a) Are the existing techniques to inject adversarial perturbations in Windows Portable Executable (PE) malware files effective enough…
▽ More
Windows malware is predominantly available in cyberspace and is a prime target for deliberate adversarial evasion attacks. Although researchers have investigated the adversarial malware attack problem, a multitude of important questions remain unanswered, including (a) Are the existing techniques to inject adversarial perturbations in Windows Portable Executable (PE) malware files effective enough for evasion purposes?; (b) Does the attack process preserve the original behavior of malware?; (c) Are there unexplored approaches/locations that can be used to carry out adversarial evasion attacks on Windows PE malware?; and (d) What are the optimal locations and sizes of adversarial perturbations required to evade an ML-based malware detector without significant structural change in the PE file? To answer some of these questions, this work proposes a novel approach that injects a code cave within the section (i.e., intra-section) of Windows PE malware files to make space for adversarial perturbations. In addition, a code loader is also injected inside the PE file, which reverts adversarial malware to its original form during the execution, preserving the malware's functionality and executability. To understand the effectiveness of our approach, we injected adversarial perturbations inside the .text, .data and .rdata sections, generated using the gradient descent and Fast Gradient Sign Method (FGSM), to target the two popular CNN-based malware detectors, MalConv and MalConv2. Our experiments yielded notable results, achieving a 92.31% evasion rate with gradient descent and 96.26% with FGSM against MalConv, compared to the 16.17% evasion rate for append attacks. Similarly, when targeting MalConv2, our approach achieved a remarkable maximum evasion rate of 97.93% with gradient descent and 94.34% with FGSM, significantly surpassing the 4.01% evasion rate observed with append attacks.
△ Less
Submitted 11 March, 2024;
originally announced March 2024.
-
Effects of hyperon potentials and symmetry energy in quark deconfinement
Authors:
Rajesh Kumar,
Krishna Aryal,
Alexander Clevinger,
Veronica Dexheimer
Abstract:
In this letter we discuss how the results of recent nuclear experiments that correspond to measurements at low densities can affect the equation of state at large densities and temperatures, changing the particle composition and ultimately influencing deconfinement to quark matter. In particular, saturation values of the hyperon potentials affect the hyperon content, while the symmetry energy at s…
▽ More
In this letter we discuss how the results of recent nuclear experiments that correspond to measurements at low densities can affect the equation of state at large densities and temperatures, changing the particle composition and ultimately influencing deconfinement to quark matter. In particular, saturation values of the hyperon potentials affect the hyperon content, while the symmetry energy at saturation directly regulates how the stiffness of the equation of state changes with isospin. We make use of a chiral model that describes nucleons, hyperons, and quarks to show how astrophysical conditions, such as the ones in neutron stars, present the ideal ground to study the effects of these two quantities in dense matter. In this case, for small charge fraction/ large isospin asymmetry, the couplings that reproduce different symmetry energy slopes can significantly modify deconfinement, with quantitative changes in the critical chemical potential depending on the deconfining potential. On the other hand, different values of the parameter that controls the hyperon potentials (kept within a range close to experimental data) do not affect deconfinement significantly.
△ Less
Submitted 12 February, 2024; v1 submitted 27 November, 2023;
originally announced November 2023.
-
Sentiment Analysis Across Multiple African Languages: A Current Benchmark
Authors:
Saurav K. Aryal,
Howard Prioleau,
Surakshya Aryal
Abstract:
Sentiment analysis is a fundamental and valuable task in NLP. However, due to limitations in data and technological availability, research into sentiment analysis of African languages has been fragmented and lacking. With the recent release of the AfriSenti-SemEval Shared Task 12, hosted as a part of The 17th International Workshop on Semantic Evaluation, an annotated sentiment analysis of 14 Afri…
▽ More
Sentiment analysis is a fundamental and valuable task in NLP. However, due to limitations in data and technological availability, research into sentiment analysis of African languages has been fragmented and lacking. With the recent release of the AfriSenti-SemEval Shared Task 12, hosted as a part of The 17th International Workshop on Semantic Evaluation, an annotated sentiment analysis of 14 African languages was made available. We benchmarked and compared current state-of-art transformer models across 12 languages and compared the performance of training one-model-per-language versus single-model-all-languages. We also evaluated the performance of standard multilingual models and their ability to learn and transfer cross-lingual representation from non-African to African languages. Our results show that despite work in low resource modeling, more data still produces better models on a per-language basis. Models explicitly developed for African languages outperform other models on all tasks. Additionally, no one-model-fits-all solution exists for a per-language evaluation of the models evaluated. Moreover, for some languages with a smaller sample size, a larger multilingual model may perform better than a dedicated per-language model for sentiment classification.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
Krylov Complexity of Fermionic and Bosonic Gaussian States
Authors:
Kiran Adhikari,
Adwait Rijal,
Ashok Kumar Aryal,
Mausam Ghimire,
Rajeev Singh,
Christian Deppe
Abstract:
The concept of \emph{complexity} has become pivotal in multiple disciplines, including quantum information, where it serves as an alternative metric for gauging the chaotic evolution of a quantum state. This paper focuses on \emph{Krylov complexity}, a specialized form of quantum complexity that offers an unambiguous and intrinsically meaningful assessment of the spread of a quantum state over all…
▽ More
The concept of \emph{complexity} has become pivotal in multiple disciplines, including quantum information, where it serves as an alternative metric for gauging the chaotic evolution of a quantum state. This paper focuses on \emph{Krylov complexity}, a specialized form of quantum complexity that offers an unambiguous and intrinsically meaningful assessment of the spread of a quantum state over all possible orthogonal bases. Our study is situated in the context of Gaussian quantum states, which are fundamental to both Bosonic and Fermionic systems and can be fully described by a covariance matrix. We show that while the covariance matrix is essential, it is insufficient alone for calculating Krylov complexity due to its lack of relative phase information. Our findings suggest that the relative covariance matrix can provide an upper bound for Krylov complexity for Gaussian quantum states. We also explore the implications of Krylov complexity for theories proposing complexity as a candidate for holographic duality by computing Krylov complexity for the thermofield double States (TFD) and Dirac field.
△ Less
Submitted 4 March, 2024; v1 submitted 19 September, 2023;
originally announced September 2023.
-
From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
Authors:
Maanak Gupta,
CharanKumar Akiri,
Kshitiz Aryal,
Eli Parker,
Lopamudra Praharaj
Abstract:
Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital transformation in the year 2022. As the different GenAI models like ChatGPT and Google Bard continue to foster their complexity and capability, it's critical to understand its consequences from a cybersecurity perspective. Several instances recently have demonstrated the use of GenAI tools in both the defe…
▽ More
Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital transformation in the year 2022. As the different GenAI models like ChatGPT and Google Bard continue to foster their complexity and capability, it's critical to understand its consequences from a cybersecurity perspective. Several instances recently have demonstrated the use of GenAI tools in both the defensive and offensive side of cybersecurity, and focusing on the social, ethical and privacy implications this technology possesses. This research paper highlights the limitations, challenges, potential risks, and opportunities of GenAI in the domain of cybersecurity and privacy. The work presents the vulnerabilities of ChatGPT, which can be exploited by malicious users to exfiltrate malicious information bypassing the ethical constraints on the model. This paper demonstrates successful example attacks like Jailbreaks, reverse psychology, and prompt injection attacks on the ChatGPT. The paper also investigates how cyber offenders can use the GenAI tools in develo** cyber attacks, and explore the scenarios where ChatGPT can be used by adversaries to create social engineering attacks, phishing attacks, automated hacking, attack payload generation, malware creation, and polymorphic malware. This paper then examines defense techniques and uses GenAI tools to improve security measures, including cyber defense automation, reporting, threat intelligence, secure code generation and detection, attack identification, develo** ethical guidelines, incidence response plans, and malware detection. We will also discuss the social, legal, and ethical implications of ChatGPT. In conclusion, the paper highlights open challenges and future directions to make this GenAI secure, safe, trustworthy, and ethical as the community understands its cybersecurity impacts.
△ Less
Submitted 2 July, 2023;
originally announced July 2023.
-
Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector
Authors:
Kshitiz Aryal,
Maanak Gupta,
Mahmoud Abdelsalam
Abstract:
With the increase in machine learning (ML) applications in different domains, incentives for deceiving these models have reached more than ever. As data is the core backbone of ML algorithms, attackers shifted their interest toward polluting the training data. Data credibility is at even higher risk with the rise of state-of-art research topics like open design principles, federated learning, and…
▽ More
With the increase in machine learning (ML) applications in different domains, incentives for deceiving these models have reached more than ever. As data is the core backbone of ML algorithms, attackers shifted their interest toward polluting the training data. Data credibility is at even higher risk with the rise of state-of-art research topics like open design principles, federated learning, and crowd-sourcing. Since the machine learning model depends on different stakeholders for obtaining data, there are no reliable automated mechanisms to verify the veracity of data from each source.
Malware detection is arduous due to its malicious nature with the addition of metamorphic and polymorphic ability in the evolving samples. ML has proven to solve the zero-day malware detection problem, which is unresolved by traditional signature-based approaches. The poisoning of malware training data can allow the malware files to go undetected by the ML-based malware detectors, hel** the attackers to fulfill their malicious goals. A feasibility analysis of the data poisoning threat in the malware detection domain is still lacking. Our work will focus on two major sections: training ML-based malware detectors and poisoning the training data using the label-poisoning approach. We will analyze the robustness of different machine learning models against data poisoning with varying volumes of poisoning data.
△ Less
Submitted 3 January, 2023;
originally announced January 2023.
-
Evaluating Novel Mask-RCNN Architectures for Ear Mask Segmentation
Authors:
Saurav K. Aryal,
Teanna Barrett,
Gloria Washington
Abstract:
The human ear is generally universal, collectible, distinct, and permanent. Ear-based biometric recognition is a niche and recent approach that is being explored. For any ear-based biometric algorithm to perform well, ear detection and segmentation need to be accurately performed. While significant work has been done in existing literature for bounding boxes, a lack of approaches output a segmenta…
▽ More
The human ear is generally universal, collectible, distinct, and permanent. Ear-based biometric recognition is a niche and recent approach that is being explored. For any ear-based biometric algorithm to perform well, ear detection and segmentation need to be accurately performed. While significant work has been done in existing literature for bounding boxes, a lack of approaches output a segmentation mask for ears. This paper trains and compares three newer models to the state-of-the-art MaskRCNN (ResNet 101 +FPN) model across four different datasets. The Average Precision (AP) scores reported show that the newer models outperform the state-of-the-art but no one model performs the best over multiple datasets.
△ Less
Submitted 4 November, 2022;
originally announced November 2022.
-
Sentiment Classification of Code-Switched Text using Pre-trained Multilingual Embeddings and Segmentation
Authors:
Saurav K. Aryal,
Howard Prioleau,
Gloria Washington
Abstract:
With increasing globalization and immigration, various studies have estimated that about half of the world population is bilingual. Consequently, individuals concurrently use two or more languages or dialects in casual conversational settings. However, most research is natural language processing is focused on monolingual text. To further the work in code-switched sentiment analysis, we propose a…
▽ More
With increasing globalization and immigration, various studies have estimated that about half of the world population is bilingual. Consequently, individuals concurrently use two or more languages or dialects in casual conversational settings. However, most research is natural language processing is focused on monolingual text. To further the work in code-switched sentiment analysis, we propose a multi-step natural language processing algorithm utilizing points of code-switching in mixed text and conduct sentiment analysis around those identified points. The proposed sentiment analysis algorithm uses semantic similarity derived from large pre-trained multilingual models with a handcrafted set of positive and negative words to determine the polarity of code-switched text. The proposed approach outperforms a comparable baseline model by 11.2% for accuracy and 11.64% for F1-score on a Spanish-English dataset. Theoretically, the proposed algorithm can be expanded for sentiment analysis of multiple languages with limited human expertise.
△ Less
Submitted 28 October, 2022;
originally announced October 2022.
-
Acoustic-Linguistic Features for Modeling Neurological Task Score in Alzheimer's
Authors:
Saurav K. Aryal,
Howard Prioleau,
Legand Burge
Abstract:
The average life expectancy is increasing globally due to advancements in medical technology, preventive health care, and a growing emphasis on gerontological health. Therefore, develo** technologies that detect and track aging-associated disease in cognitive function among older adult populations is imperative. In particular, research related to automatic detection and evaluation of Alzheimer's…
▽ More
The average life expectancy is increasing globally due to advancements in medical technology, preventive health care, and a growing emphasis on gerontological health. Therefore, develo** technologies that detect and track aging-associated disease in cognitive function among older adult populations is imperative. In particular, research related to automatic detection and evaluation of Alzheimer's disease (AD) is critical given the disease's prevalence and the cost of current methods. As AD impacts the acoustics of speech and vocabulary, natural language processing and machine learning provide promising techniques for reliably detecting AD. We compare and contrast the performance of ten linear regression models for predicting Mini-Mental Status Exam scores on the ADReSS challenge dataset. We extracted 13000+ handcrafted and learned features that capture linguistic and acoustic phenomena. Using a subset of 54 top features selected by two methods: (1) recursive elimination and (2) correlation scores, we outperform a state-of-the-art baseline for the same task. Upon scoring and evaluating the statistical significance of each of the selected subset of features for each model, we find that, for the given task, handcrafted linguistic features are more significant than acoustic and learned features.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Hybrid Equations of State for Neutron Stars with Hyperons and Deltas
Authors:
A. Clevinger,
J. Corkish,
K. Aryal,
V. Dexheimer
Abstract:
In this contribution, we describe new chemically-equilibrated charge-neutral hybrid equations of state for neutron stars. They present a first-order phase transition to quark matter and differentiate by the particle population considered and how these particles interact. While some equations of state contain just nucleons and up, down-quarks, others also contain hyperons, Delta baryons, and strang…
▽ More
In this contribution, we describe new chemically-equilibrated charge-neutral hybrid equations of state for neutron stars. They present a first-order phase transition to quark matter and differentiate by the particle population considered and how these particles interact. While some equations of state contain just nucleons and up, down-quarks, others also contain hyperons, Delta baryons, and strange quarks. The hybrid equations of state, together with corresponding hadronic ones, are available on the CompOSE repository and can be used for different astrophysical applications.
△ Less
Submitted 1 May, 2022;
originally announced May 2022.
-
Associating eHealth Policies and National Data Privacy Regulations
Authors:
Saurav K. Aryal,
Peter A. Keiller
Abstract:
As electronic data becomes the lifeline of modern society, privacy concerns increase. These concerns are reflected by the European Union's enactment of the General Data Protection Regulation (GDPR), one of the most comprehensive and robust privacy regulations globally. This project aims to evaluate and highlight associations between eHealth systems' policies and personal data privacy regulations.…
▽ More
As electronic data becomes the lifeline of modern society, privacy concerns increase. These concerns are reflected by the European Union's enactment of the General Data Protection Regulation (GDPR), one of the most comprehensive and robust privacy regulations globally. This project aims to evaluate and highlight associations between eHealth systems' policies and personal data privacy regulations. Using bias-corrected Cramer's V and Thiel's U tests, we found weak and zero associations between e-health systems' rules and protections for data privacy. A simple decision tree model is trained, which validates the association scores obtained
△ Less
Submitted 27 February, 2022;
originally announced March 2022.
-
A Survey on Adversarial Attacks for Malware Analysis
Authors:
Kshitiz Aryal,
Maanak Gupta,
Mahmoud Abdelsalam
Abstract:
Machine learning has witnessed tremendous growth in its adoption and advancement in the last decade. The evolution of machine learning from traditional algorithms to modern deep learning architectures has shaped the way today's technology functions. Its unprecedented ability to discover knowledge/patterns from unstructured data and automate the decision-making process led to its application in wid…
▽ More
Machine learning has witnessed tremendous growth in its adoption and advancement in the last decade. The evolution of machine learning from traditional algorithms to modern deep learning architectures has shaped the way today's technology functions. Its unprecedented ability to discover knowledge/patterns from unstructured data and automate the decision-making process led to its application in wide domains. High flying machine learning arena has been recently pegged back by the introduction of adversarial attacks. Adversaries are able to modify data, maximizing the classification error of the models. The discovery of blind spots in machine learning models has been exploited by adversarial attackers by generating subtle intentional perturbations in test samples. Increasing dependency on data has paved the blueprint for ever-high incentives to camouflage machine learning models. To cope with probable catastrophic consequences in the future, continuous research is required to find vulnerabilities in form of adversarial and design remedies in systems. This survey aims at providing the encyclopedic introduction to adversarial attacks that are carried out against malware detection systems. The paper will introduce various machine learning techniques used to generate adversarial and explain the structure of target files. The survey will also model the threat posed by the adversary and followed by brief descriptions of widely accepted adversarial algorithms. Work will provide a taxonomy of adversarial evasion attacks on the basis of attack domain and adversarial generation techniques. Adversarial evasion attacks carried out against malware detectors will be discussed briefly under each taxonomical headings and compared with concomitant researches. Analyzing the current research challenges in an adversarial generation, the survey will conclude by pinpointing the open future research directions.
△ Less
Submitted 5 January, 2022; v1 submitted 15 November, 2021;
originally announced November 2021.
-
The effect of charge, isospin, and strangeness in the QCD phase diagram critical end point
Authors:
Krishna Aryal,
Constantinos Constantinou,
Ricardo L. S. Farias,
Veronica Dexheimer
Abstract:
In this work, we discuss the deconfinement phase transition to quark matter in hot/dense matter. We {examine} the effect that different charge fractions, isospin fractions, net strangeness, and chemical equilibrium with respect to leptons have on the position of the coexistence line between different phases. In particular, we investigate how different sets of conditions that describe matter in neu…
▽ More
In this work, we discuss the deconfinement phase transition to quark matter in hot/dense matter. We {examine} the effect that different charge fractions, isospin fractions, net strangeness, and chemical equilibrium with respect to leptons have on the position of the coexistence line between different phases. In particular, we investigate how different sets of conditions that describe matter in neutron stars and their mergers, or matter created in heavy-ion collisions affect the position of the critical end point, namely where the first-order phase transition becomes a crossover. We also present an introduction to the topic of critical points, including a review of recent {advances} concerning QCD critical points.
△ Less
Submitted 19 November, 2021; v1 submitted 29 September, 2021;
originally announced September 2021.
-
Strangeness in astrophysics: Theoretical developments
Authors:
Veronica Dexheimer,
Krishna Aryal
Abstract:
In this conference proceeding, we review important theoretical developments related to the production of strangeness in astrophysics. This includes its effects in supernova explosions, neutron stars, and compact-star mergers. We also discuss in detail how the presence of net strangeness affects the deconfinement to quark matter, expected to take place at large densities and/or temperatures. We con…
▽ More
In this conference proceeding, we review important theoretical developments related to the production of strangeness in astrophysics. This includes its effects in supernova explosions, neutron stars, and compact-star mergers. We also discuss in detail how the presence of net strangeness affects the deconfinement to quark matter, expected to take place at large densities and/or temperatures. We conclude that a complete description of dense matter containing hyperons and strange quarks is fundamental for the understanding of modern high-energy astrophysics.
△ Less
Submitted 17 August, 2021;
originally announced August 2021.
-
Deconfinement Phase Transition under Chemical Equilibrium
Authors:
Veronica Dexheimer,
Krishna Aryal,
Madison Wolf,
Constantinos Constantinou,
Ricardo L. S. Farias
Abstract:
In this work, we investigate how the assumption of chemical equilibrium with leptons affects the deconfinement phase transition to quark matter. This is done within the framework of the Chiral Mean Field model (CMF) allowing for non-zero net strangeness, corresponding to the conditions found in astrophysical scenarios. We build 3-dimensional QCD phase diagrams with temperature, baryon chemical pot…
▽ More
In this work, we investigate how the assumption of chemical equilibrium with leptons affects the deconfinement phase transition to quark matter. This is done within the framework of the Chiral Mean Field model (CMF) allowing for non-zero net strangeness, corresponding to the conditions found in astrophysical scenarios. We build 3-dimensional QCD phase diagrams with temperature, baryon chemical potential, and either charge or isospin fraction or chemical potential to show how the deconfinement region collapses to a line in the special case of chemical equilibrium, such as the one established the interior of cold catalyzed neutron stars.
△ Less
Submitted 23 November, 2020;
originally announced November 2020.
-
3-Dimensional QCD Phase Diagrams for Strange Matter
Authors:
V. Dexheimer,
K. Aryal,
C. Constantinou,
J. Peterson
Abstract:
In this work, we examine in detail the difference between constraining the electric charge fraction and isospin fraction when calculating the deconfinement phase transition in the presence of net strangeness. We present relations among charge and isospin fractions and the corresponding chemical potentials and draw 3-dimensional QCD phase diagrams for matter out of weak equilibrium. Finally, we bri…
▽ More
In this work, we examine in detail the difference between constraining the electric charge fraction and isospin fraction when calculating the deconfinement phase transition in the presence of net strangeness. We present relations among charge and isospin fractions and the corresponding chemical potentials and draw 3-dimensional QCD phase diagrams for matter out of weak equilibrium. Finally, we briefly discuss how our results can be applied to comparisons of matter created in heavy ion collisions and binary neutron star mergers.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
High-Energy Phase Diagrams with Charge and Isospin Axes under Heavy-Ion Collision and Stellar Conditions
Authors:
K. Aryal,
C. Constantinou,
R. L. S. Farias,
V. Dexheimer
Abstract:
We investigate the phase transition from hadron to quark matter in the general case without the assumption of chemical equilibrium. The effects of net strangeness on charge and isospin fractions, chemical potentials, and temperature are studied in the context of the Chiral Mean Field (CMF) model that incorporates chiral symmetry restoration and deconfinement. The extent to which these quantities a…
▽ More
We investigate the phase transition from hadron to quark matter in the general case without the assumption of chemical equilibrium. The effects of net strangeness on charge and isospin fractions, chemical potentials, and temperature are studied in the context of the Chiral Mean Field (CMF) model that incorporates chiral symmetry restoration and deconfinement. The extent to which these quantities are probed during deconfinement in conditions expected to exist in protoneutron stars, binary neutron-star mergers, and heavy-ion collisions is analyzed via the construction of 3-dimensional phase diagrams.
△ Less
Submitted 11 October, 2020; v1 submitted 6 April, 2020;
originally announced April 2020.
-
Long-Baseline Neutrino Facility (LBNF) and Deep Underground Neutrino Experiment (DUNE) Conceptual Design Report Volume 1: The LBNF and DUNE Projects
Authors:
R. Acciarri,
M. A. Acero,
M. Adamowski,
C. Adams,
P. Adamson,
S. Adhikari,
Z. Ahmad,
C. H. Albright,
T. Alion,
E. Amador,
J. Anderson,
K. Anderson,
C. Andreopoulos,
M. Andrews,
R. Andrews,
I. Anghel,
J. d. Anjos,
A. Ankowski,
M. Antonello,
A. ArandaFernandez,
A. Ariga,
T. Ariga,
D. Aristizabal,
E. Arrieta-Diaz,
K. Aryal
, et al. (780 additional authors not shown)
Abstract:
This document presents the Conceptual Design Report (CDR) put forward by an international neutrino community to pursue the Deep Underground Neutrino Experiment at the Long-Baseline Neutrino Facility (LBNF/DUNE), a groundbreaking science experiment for long-baseline neutrino oscillation studies and for neutrino astrophysics and nucleon decay searches. The DUNE far detector will be a very large modu…
▽ More
This document presents the Conceptual Design Report (CDR) put forward by an international neutrino community to pursue the Deep Underground Neutrino Experiment at the Long-Baseline Neutrino Facility (LBNF/DUNE), a groundbreaking science experiment for long-baseline neutrino oscillation studies and for neutrino astrophysics and nucleon decay searches. The DUNE far detector will be a very large modular liquid argon time-projection chamber (LArTPC) located deep underground, coupled to the LBNF multi-megawatt wide-band neutrino beam. DUNE will also have a high-resolution and high-precision near detector.
△ Less
Submitted 20 January, 2016;
originally announced January 2016.
-
Long-Baseline Neutrino Facility (LBNF) and Deep Underground Neutrino Experiment (DUNE) Conceptual Design Report, Volume 4 The DUNE Detectors at LBNF
Authors:
R. Acciarri,
M. A. Acero,
M. Adamowski,
C. Adams,
P. Adamson,
S. Adhikari,
Z. Ahmad,
C. H. Albright,
T. Alion,
E. Amador,
J. Anderson,
K. Anderson,
C. Andreopoulos,
M. Andrews,
R. Andrews,
I. Anghel,
J. d. Anjos,
A. Ankowski,
M. Antonello,
A. ArandaFernandez,
A. Ariga,
T. Ariga,
D. Aristizabal,
E. Arrieta-Diaz,
K. Aryal
, et al. (779 additional authors not shown)
Abstract:
A description of the proposed detector(s) for DUNE at LBNF
A description of the proposed detector(s) for DUNE at LBNF
△ Less
Submitted 12 January, 2016;
originally announced January 2016.
-
Long-Baseline Neutrino Facility (LBNF) and Deep Underground Neutrino Experiment (DUNE) Conceptual Design Report Volume 2: The Physics Program for DUNE at LBNF
Authors:
DUNE Collaboration,
R. Acciarri,
M. A. Acero,
M. Adamowski,
C. Adams,
P. Adamson,
S. Adhikari,
Z. Ahmad,
C. H. Albright,
T. Alion,
E. Amador,
J. Anderson,
K. Anderson,
C. Andreopoulos,
M. Andrews,
R. Andrews,
I. Anghel,
J. d. Anjos,
A. Ankowski,
M. Antonello,
A. ArandaFernandez,
A. Ariga,
T. Ariga,
D. Aristizabal,
E. Arrieta-Diaz
, et al. (780 additional authors not shown)
Abstract:
The Physics Program for the Deep Underground Neutrino Experiment (DUNE) at the Fermilab Long-Baseline Neutrino Facility (LBNF) is described.
The Physics Program for the Deep Underground Neutrino Experiment (DUNE) at the Fermilab Long-Baseline Neutrino Facility (LBNF) is described.
△ Less
Submitted 22 January, 2016; v1 submitted 18 December, 2015;
originally announced December 2015.