-
EDoG: Adversarial Edge Detection For Graph Neural Networks
Authors:
Xiaojun Xu,
Yue Yu,
Hanzhang Wang,
Alok Lal,
Carl A. Gunter,
Bo Li
Abstract:
Graph Neural Networks (GNNs) have been widely applied to different tasks such as bioinformatics, drug design, and social networks. However, recent studies have shown that GNNs are vulnerable to adversarial attacks which aim to mislead the node or subgraph classification prediction by adding subtle perturbations. Detecting these attacks is challenging due to the small magnitude of perturbation and…
▽ More
Graph Neural Networks (GNNs) have been widely applied to different tasks such as bioinformatics, drug design, and social networks. However, recent studies have shown that GNNs are vulnerable to adversarial attacks which aim to mislead the node or subgraph classification prediction by adding subtle perturbations. Detecting these attacks is challenging due to the small magnitude of perturbation and the discrete nature of graph data. In this paper, we propose a general adversarial edge detection pipeline EDoG without requiring knowledge of the attack strategies based on graph generation. Specifically, we propose a novel graph generation approach combined with link prediction to detect suspicious adversarial edges. To effectively train the graph generative model, we sample several sub-graphs from the given graph data. We show that since the number of adversarial edges is usually low in practice, with low probability the sampled sub-graphs will contain adversarial edges based on the union bound. In addition, considering the strong attacks which perturb a large number of edges, we propose a set of novel features to perform outlier detection as the preprocessing for our detection. Extensive experimental results on three real-world graph datasets including a private transaction rule dataset from a major company and two types of synthetic graphs with controlled properties show that EDoG can achieve above 0.8 AUC against four state-of-the-art unseen attack strategies without requiring any knowledge about the attack type; and around 0.85 with knowledge of the attack type. EDoG significantly outperforms traditional malicious edge detection baselines. We also show that an adaptive attack with full knowledge of our detection pipeline is difficult to bypass it.
△ Less
Submitted 27 December, 2022;
originally announced December 2022.
-
Coordinated Science Laboratory 70th Anniversary Symposium: The Future of Computing
Authors:
Klara Nahrstedt,
Naresh Shanbhag,
Vikram Adve,
Nancy Amato,
Romit Roy Choudhury,
Carl Gunter,
Nam Sung Kim,
Olgica Milenkovic,
Sayan Mitra,
Lav Varshney,
Yurii Vlasov,
Sarita Adve,
Rashid Bashir,
Andreas Cangellaris,
James DiCarlo,
Katie Driggs-Campbell,
Nick Feamster,
Mattia Gazzola,
Karrie Karahalios,
Sanmi Koyejo,
Paul Kwiat,
Bo Li,
Negar Mehr,
Ravish Mehra,
Andrew Miller
, et al. (3 additional authors not shown)
Abstract:
In 2021, the Coordinated Science Laboratory CSL, an Interdisciplinary Research Unit at the University of Illinois Urbana-Champaign, hosted the Future of Computing Symposium to celebrate its 70th anniversary. CSL's research covers the full computing stack, computing's impact on society and the resulting need for social responsibility. In this white paper, we summarize the major technological points…
▽ More
In 2021, the Coordinated Science Laboratory CSL, an Interdisciplinary Research Unit at the University of Illinois Urbana-Champaign, hosted the Future of Computing Symposium to celebrate its 70th anniversary. CSL's research covers the full computing stack, computing's impact on society and the resulting need for social responsibility. In this white paper, we summarize the major technological points, insights, and directions that speakers brought forward during the Future of Computing Symposium.
Participants discussed topics related to new computing paradigms, technologies, algorithms, behaviors, and research challenges to be expected in the future. The symposium focused on new computing paradigms that are going beyond traditional computing and the research needed to support their realization. These needs included stressing security and privacy, the end to end human cyber physical systems and with them the analysis of the end to end artificial intelligence needs. Furthermore, advances that enable immersive environments for users, the boundaries between humans and machines will blur and become seamless. Particular integration challenges were made clear in the final discussion on the integration of autonomous driving, robo taxis, pedestrians, and future cities. Innovative approaches were outlined to motivate the next generation of researchers to work on these challenges.
The discussion brought out the importance of considering not just individual research areas, but innovations at the intersections between computing research efforts and relevant application domains, such as health care, transportation, energy systems, and manufacturing.
△ Less
Submitted 4 October, 2022;
originally announced October 2022.
-
A Tagging Solution to Discover IoT Devices in Apartments
Authors:
Berkay Kaplan,
**gyu Qian,
Israel J Lopez-Toledo,
Carl A. Gunter
Abstract:
The number of IoT devices in smart homes is increasing. This broad adoption facilitates users' lives, but it also brings problems. One such issue is that some IoT devices may invade users' privacy. Some reasons for this invasion can stem from obscure data collection practices or hidden devices. Specific IoT devices can exist out of sight and still collect user data to send to third parties via the…
▽ More
The number of IoT devices in smart homes is increasing. This broad adoption facilitates users' lives, but it also brings problems. One such issue is that some IoT devices may invade users' privacy. Some reasons for this invasion can stem from obscure data collection practices or hidden devices. Specific IoT devices can exist out of sight and still collect user data to send to third parties via the Internet. Owners can easily forget the location or even the existence of these devices, especially if the owner is a landlord who manages several properties. The landlord-owner scenario creates multi-user problems as designers build machines for single users. We developed tags that use wireless protocols, buzzers, and LED lighting to lead users to solve the issue of device discovery in shared spaces and accommodate multi-user scenarios. They are attached to IoT devices inside a unit during their installation to be later discovered by a tenant. These tags have similar functionalities as the popular Tile models or Airtag, but our tags have different features based on our privacy use case. Our tags do not require pairing; multiple users can interact with them through our Android application. Although researchers developed several other tools, such as thermal cameras or virtual reality (VR), for discovering devices in environments, they have not used wireless protocols as a solution. We measured specific performance metrics of our tags to analyze their feasibility for this problem. We also conducted a user study to measure the participants' comfort levels while finding objects with our tags attached. Our results indicate that wireless tags can be viable for device tracking in residential properties.
△ Less
Submitted 20 September, 2023; v1 submitted 12 October, 2022;
originally announced October 2022.
-
Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection
Authors:
George Gunter,
Huichen Li,
Avesta Hojjati,
Matthew Nice,
Matthew Bunting,
Carl A. Gunter,
Bo Li,
Jonathan Sprinkle,
Daniel Work
Abstract:
We demonstrate that a supply-chain level compromise of the adaptive cruise control (ACC) capability on equipped vehicles can be used to significantly degrade system level performance of current day mixed-autonomy freeway networks. Via a simple threat model which causes random deceleration attacks (RDAs), compromised vehicles create congestion waves in the traffic that decrease average speed and ne…
▽ More
We demonstrate that a supply-chain level compromise of the adaptive cruise control (ACC) capability on equipped vehicles can be used to significantly degrade system level performance of current day mixed-autonomy freeway networks. Via a simple threat model which causes random deceleration attacks (RDAs), compromised vehicles create congestion waves in the traffic that decrease average speed and network throughput. We use a detailed and realistic traffic simulation environment to quantify the impacts of the attack on a model of a real high-volume freeway in the United States. We find that the effect of the attack depends both on the level of underlying traffic congestion, and what percentage of ACC vehicles can be compromised. In moderate congestion regimes the attack can degrade mean commuter speed by over 7%. In high density regimes overall network throughput can be reduced by up to 3%. And, in moderate to high congestion regimes, it can cost commuters on the network over 300 USD/km hr. All of these results motivate that the proposed attack is able to significantly degrade performance of the traffic network.
We also develop an anomaly detection technique that uses GPS traces on vehicles to identify malicious/compromised vehicles. We employ this technique on data from the simulation experiments and find that it is unable to identify compromised ACCs compared to benign/normal drivers. That is, these attacks are stealthy to detection. Stronger attacks can be accurately labeled as malicious, motivating that there is a limit to how impactful attacks can be before they are no longer stealthy.
Finally, we experimentally execute the attack on a real and commercially available ACC vehicle, demonstrating the possible real world feasibility of an RDA.
△ Less
Submitted 22 December, 2021;
originally announced December 2021.
-
DOVE: A Data-Oblivious Virtual Environment
Authors:
Hyun Bin Lee,
Tushar M. Jois,
Christopher W. Fletcher,
Carl A. Gunter
Abstract:
Users can improve the security of remote communications by using Trusted Execution Environments (TEEs) to protect against direct introspection and tampering of sensitive data. This can even be done with applications coded in high-level languages with complex programming stacks such as R, Python, and Ruby. However, this creates a trade-off between programming convenience versus the risk of attacks…
▽ More
Users can improve the security of remote communications by using Trusted Execution Environments (TEEs) to protect against direct introspection and tampering of sensitive data. This can even be done with applications coded in high-level languages with complex programming stacks such as R, Python, and Ruby. However, this creates a trade-off between programming convenience versus the risk of attacks using microarchitectural side channels.
In this paper, we argue that it is possible to address this problem for important applications by instrumenting a complex programming environment (like R) to produce a Data-Oblivious Transcript (DOT) that is explicitly designed to support computation that excludes side channels. Such a transcript is then evaluated on a Trusted Execution Environment (TEE) containing the sensitive data using a small trusted computing base called the Data-Oblivious Virtual Environment (DOVE).
To motivate the problem, we demonstrate a number of subtle side-channel vulnerabilities in the R language. We then provide an illustrative design and implementation of DOVE for R, creating the first side-channel resistant R programming stack. We demonstrate that the two-phase architecture provided by DOT generation and DOVE evaluation can provide practical support for complex programming languages with usable performance and high security assurances against side channels.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security
Authors:
Hsiao-Ying Huang,
Soteris Demetriou,
Rini Banerjee,
Güliz Seray Tuncay,
Carl A. Gunter,
Masooda Bashir
Abstract:
Despite widespread use of smartphones, there is no measurement standard targeted at smartphone security behaviors. In this paper we translate a well-known cybersecurity behavioral scale into the smartphone domain and show that we can improve on this translation by following an established psychometrics approach surveying 1011 participants. We design a new 14-item Smartphone Security Behavioral Sca…
▽ More
Despite widespread use of smartphones, there is no measurement standard targeted at smartphone security behaviors. In this paper we translate a well-known cybersecurity behavioral scale into the smartphone domain and show that we can improve on this translation by following an established psychometrics approach surveying 1011 participants. We design a new 14-item Smartphone Security Behavioral Scale (SSBS) exhibiting high reliability and good fit to a two-component behavioural model based on technical versus social protection strategies. We then demonstrate how SSBS can be applied to measure the influence of mental health issues on smartphone security behavior intentions. We found significant correlations that predict SSBS profiles from three types of MHIs. Conversely, we are able to predict presence of MHIs using SSBS profiles.We obtain prediction AUCs of 72.1% for Internet addiction,75.8% for depression and 66.2% for insomnia.
△ Less
Submitted 6 July, 2020; v1 submitted 3 July, 2020;
originally announced July 2020.
-
Grand Challenges for Embedded Security Research in a Connected World
Authors:
Wayne Burleson,
Kevin Fu,
Denise Anthony,
Jorge Guajardo,
Carl Gunter,
Kyle Ingols,
Jean-Baptiste Jeannin,
Farinaz Koushanafar,
Carl Landwehr,
Susan Squires
Abstract:
Protecting embedded security is becoming an increasingly challenging research problem for embedded systems due to a number of emerging trends in hardware, software, networks, and applications. Without fundamental advances in, and an understanding of embedded security it will be difficult for future engineers to provide assurance for the Internet of Things (IoT) and Operational Technology (OT) in w…
▽ More
Protecting embedded security is becoming an increasingly challenging research problem for embedded systems due to a number of emerging trends in hardware, software, networks, and applications. Without fundamental advances in, and an understanding of embedded security it will be difficult for future engineers to provide assurance for the Internet of Things (IoT) and Operational Technology (OT) in wide ranging applications, from home automation and autonomous transportation to medical devices and factory floors. Common to such applications are cyberphysical risks and consequences stemming from a lack of embedded security. The Computing Community Consortium (CCC) held a one-day visioning workshop to explore these issues. The workshop focused on five major application areas of embedded systems, namely (1) medical/wearable devices, (2) autonomous systems (drones, vehicles, robots), (3) smart homes, (4) industry and supply chain, and (5) critical infrastructure. This report synthesizes the results of that workshop and develops a list of strategic goals for research and education over the next 5-10 years.
Embedded security in connected devices presents challenges that require a broad look at the overall systems design, including human and societal dimensions as well as technical. Particular issues related to embedded security are a subset of the overall security of the application areas, which must also balance other design criteria such as cost, power, reliability, usability and function. Recent trends are converging to make the security of embedded systems an increasingly important and difficult objective, requiring new trans-disciplinary approaches to solve problems on a 5-10 year horizon.
△ Less
Submitted 13 May, 2020;
originally announced May 2020.
-
Detecting AI Trojans Using Meta Neural Analysis
Authors:
Xiaojun Xu,
Qi Wang,
Huichen Li,
Nikita Borisov,
Carl A. Gunter,
Bo Li
Abstract:
In machine learning Trojan attacks, an adversary trains a corrupted model that obtains good performance on normal data but behaves maliciously on data samples with certain trigger patterns. Several approaches have been proposed to detect such attacks, but they make undesirable assumptions about the attack strategies or require direct access to the trained models, which restricts their utility in p…
▽ More
In machine learning Trojan attacks, an adversary trains a corrupted model that obtains good performance on normal data but behaves maliciously on data samples with certain trigger patterns. Several approaches have been proposed to detect such attacks, but they make undesirable assumptions about the attack strategies or require direct access to the trained models, which restricts their utility in practice.
This paper addresses these challenges by introducing a Meta Neural Trojan Detection (MNTD) pipeline that does not make assumptions on the attack strategies and only needs black-box access to models. The strategy is to train a meta-classifier that predicts whether a given target model is Trojaned. To train the meta-model without knowledge of the attack strategy, we introduce a technique called jumbo learning that samples a set of Trojaned models following a general distribution. We then dynamically optimize a query set together with the meta-classifier to distinguish between Trojaned and benign models.
We evaluate MNTD with experiments on vision, speech, tabular data and natural language text datasets, and against different Trojan attacks such as data poisoning attack, model manipulation attack, and latent attack. We show that MNTD achieves 97% detection AUC score and significantly outperforms existing detection approaches. In addition, MNTD generalizes well and achieves high detection performance against unforeseen attacks. We also propose a robust MNTD pipeline which achieves 90% detection AUC even when the attacker aims to evade the detection with full knowledge of the system.
△ Less
Submitted 1 October, 2020; v1 submitted 7 October, 2019;
originally announced October 2019.
-
WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services
Authors:
Michael J. May,
Kevin D. Lux,
Carl A. Gunter
Abstract:
Web services offer an opportunity to redesign a variety of older systems to exploit the advantages of a flexible, extensible, secure set of standards. In this work we revisit WSEmail, a system proposed over ten years ago to improve email by redesigning it as a family of web services. WSEmail offers an alternative vision of how instant messaging and email services could have evolved, offering secur…
▽ More
Web services offer an opportunity to redesign a variety of older systems to exploit the advantages of a flexible, extensible, secure set of standards. In this work we revisit WSEmail, a system proposed over ten years ago to improve email by redesigning it as a family of web services. WSEmail offers an alternative vision of how instant messaging and email services could have evolved, offering security, extensibility, and openness in a distributed environment instead of the hardened walled gardens that today's rich messaging systems have become. WSEmail's architecture, especially its automatic plug-in download feature allows for rich extensions without changing the base protocol or libraries. We demonstrate WSEmail's flexibility using three business use cases: secure channel instant messaging, business workflows with routed forms, and on-demand attachments. Since increased flexibility often mitigates against security and performance, we designed WSEmail with security in mind and formally proved the security of one of its core protocols (on-demand attachments) using the TulaFale and ProVerif automated proof tools. We provide performance measurements for WSEmail functions in a prototype we implemented using .NET. Our experiments show a latency of about a quarter of a second per transaction under load.
△ Less
Submitted 12 December, 2019; v1 submitted 6 August, 2019;
originally announced August 2019.
-
G-PATE: Scalable Differentially Private Data Generator via Private Aggregation of Teacher Discriminators
Authors:
Yunhui Long,
Boxin Wang,
Zhuolin Yang,
Bhavya Kailkhura,
Aston Zhang,
Carl A. Gunter,
Bo Li
Abstract:
Recent advances in machine learning have largely benefited from the massive accessible training data. However, large-scale data sharing has raised great privacy concerns. In this work, we propose a novel privacy-preserving data Generative model based on the PATE framework (G-PATE), aiming to train a scalable differentially private data generator that preserves high generated data utility. Our appr…
▽ More
Recent advances in machine learning have largely benefited from the massive accessible training data. However, large-scale data sharing has raised great privacy concerns. In this work, we propose a novel privacy-preserving data Generative model based on the PATE framework (G-PATE), aiming to train a scalable differentially private data generator that preserves high generated data utility. Our approach leverages generative adversarial nets to generate data, combined with private aggregation among different discriminators to ensure strong privacy guarantees. Compared to existing approaches, G-PATE significantly improves the use of privacy budgets. In particular, we train a student data generator with an ensemble of teacher discriminators and propose a novel private gradient aggregation mechanism to ensure differential privacy on all information that flows from teacher discriminators to the student generator. In addition, with random projection and gradient discretization, the proposed gradient aggregation mechanism is able to effectively deal with high-dimensional gradient vectors. Theoretically, we prove that G-PATE ensures differential privacy for the data generator. Empirically, we demonstrate the superiority of G-PATE over prior work through extensive experiments. We show that G-PATE is the first work being able to generate high-dimensional image data with high data utility under limited privacy budgets ($ε\le 1$). Our code is available at https://github.com/AI-secure/G-PATE.
△ Less
Submitted 30 December, 2021; v1 submitted 21 June, 2019;
originally announced June 2019.
-
Distributed and Secure ML with Self-tallying Multi-party Aggregation
Authors:
Yunhui Long,
Tanmay Gangwani,
Haris Mughees,
Carl Gunter
Abstract:
Privacy preserving multi-party computation has many applications in areas such as medicine and online advertisements. In this work, we propose a framework for distributed, secure machine learning among untrusted individuals. The framework consists of two parts: a two-step training protocol based on homomorphic addition and a zero knowledge proof for data validity. By combining these two techniques…
▽ More
Privacy preserving multi-party computation has many applications in areas such as medicine and online advertisements. In this work, we propose a framework for distributed, secure machine learning among untrusted individuals. The framework consists of two parts: a two-step training protocol based on homomorphic addition and a zero knowledge proof for data validity. By combining these two techniques, our framework provides privacy of per-user data, prevents against a malicious user contributing corrupted data to the shared pool, enables each user to self-compute the results of the algorithm without relying on external trusted third parties, and requires no private channels between groups of users. We show how different ML algorithms such as Latent Dirichlet Allocation, Naive Bayes, Decision Trees etc. fit our framework for distributed, secure computing.
△ Less
Submitted 26 November, 2018;
originally announced November 2018.
-
Understanding Membership Inferences on Well-Generalized Learning Models
Authors:
Yunhui Long,
Vincent Bindschaedler,
Lei Wang,
Diyue Bu,
Xiaofeng Wang,
Haixu Tang,
Carl A. Gunter,
Kai Chen
Abstract:
Membership Inference Attack (MIA) determines the presence of a record in a machine learning model's training data by querying the model. Prior work has shown that the attack is feasible when the model is overfitted to its training data or when the adversary controls the training algorithm. However, when the model is not overfitted and the adversary does not control the training algorithm, the thre…
▽ More
Membership Inference Attack (MIA) determines the presence of a record in a machine learning model's training data by querying the model. Prior work has shown that the attack is feasible when the model is overfitted to its training data or when the adversary controls the training algorithm. However, when the model is not overfitted and the adversary does not control the training algorithm, the threat is not well understood. In this paper, we report a study that discovers overfitting to be a sufficient but not a necessary condition for an MIA to succeed. More specifically, we demonstrate that even a well-generalized model contains vulnerable instances subject to a new generalized MIA (GMIA). In GMIA, we use novel techniques for selecting vulnerable instances and detecting their subtle influences ignored by overfitting metrics. Specifically, we successfully identify individual records with high precision in real-world datasets by querying black-box machine learning models. Further we show that a vulnerable record can even be indirectly attacked by querying other related records and existing generalization techniques are found to be less effective in protecting the vulnerable instances. Our findings sharpen the understanding of the fundamental cause of the problem: the unique influences the training instance may have on the model.
△ Less
Submitted 13 February, 2018;
originally announced February 2018.
-
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Authors:
Xue**g Yuan,
Yuxuan Chen,
Yue Zhao,
Yunhui Long,
Xiaokang Liu,
Kai Chen,
Shengzhi Zhang,
Heqing Huang,
Xiaofeng Wang,
Carl A. Gunter
Abstract:
The popularity of ASR (automatic speech recognition) systems, like Google Voice, Cortana, brings in security concerns, as demonstrated by recent attacks. The impacts of such threats, however, are less clear, since they are either less stealthy (producing noise-like voice commands) or requiring the physical presence of an attack device (using ultrasound). In this paper, we demonstrate that not only…
▽ More
The popularity of ASR (automatic speech recognition) systems, like Google Voice, Cortana, brings in security concerns, as demonstrated by recent attacks. The impacts of such threats, however, are less clear, since they are either less stealthy (producing noise-like voice commands) or requiring the physical presence of an attack device (using ultrasound). In this paper, we demonstrate that not only are more practical and surreptitious attacks feasible but they can even be automatically constructed. Specifically, we find that the voice commands can be stealthily embedded into songs, which, when played, can effectively control the target system through ASR without being noticed. For this purpose, we developed novel techniques that address a key technical challenge: integrating the commands into a song in a way that can be effectively recognized by ASR through the air, in the presence of background noise, while not being detected by a human listener. Our research shows that this can be done automatically against real world ASR applications. We also demonstrate that such CommanderSongs can be spread through Internet (e.g., YouTube) and radio, potentially affecting millions of ASR users. We further present a new mitigation technique that controls this threat.
△ Less
Submitted 1 July, 2018; v1 submitted 24 January, 2018;
originally announced January 2018.
-
Towards Measuring Membership Privacy
Authors:
Yunhui Long,
Vincent Bindschaedler,
Carl A. Gunter
Abstract:
Machine learning models are increasingly made available to the masses through public query interfaces. Recent academic work has demonstrated that malicious users who can query such models are able to infer sensitive information about records within the training data. Differential privacy can thwart such attacks, but not all models can be readily trained to achieve this guarantee or to achieve it w…
▽ More
Machine learning models are increasingly made available to the masses through public query interfaces. Recent academic work has demonstrated that malicious users who can query such models are able to infer sensitive information about records within the training data. Differential privacy can thwart such attacks, but not all models can be readily trained to achieve this guarantee or to achieve it with acceptable utility loss. As a result, if a model is trained without differential privacy guarantee, little is known or can be said about the privacy risk of releasing it. In this work, we investigate and analyze membership attacks to understand why and how they succeed. Based on this understanding, we propose Differential Training Privacy (DTP), an empirical metric to estimate the privacy risk of publishing a classier when methods such as differential privacy cannot be applied. DTP is a measure of a classier with respect to its training dataset, and we show that calculating DTP is efficient in many practical cases. We empirically validate DTP using state-of-the-art machine learning models such as neural networks trained on real-world datasets. Our results show that DTP is highly predictive of the success of membership attacks and therefore reducing DTP also reduces the privacy risk. We advocate for DTP to be used as part of the decision-making process when considering publishing a classifier. To this end, we also suggest adopting the DTP-1 hypothesis: if a classifier has a DTP value above 1, it should not be published.
△ Less
Submitted 25 December, 2017;
originally announced December 2017.
-
Plausible Deniability for Privacy-Preserving Data Synthesis
Authors:
Vincent Bindschaedler,
Reza Shokri,
Carl A. Gunter
Abstract:
Releasing full data records is one of the most challenging problems in data privacy. On the one hand, many of the popular techniques such as data de-identification are problematic because of their dependence on the background knowledge of adversaries. On the other hand, rigorous methods such as the exponential mechanism for differential privacy are often computationally impractical to use for rele…
▽ More
Releasing full data records is one of the most challenging problems in data privacy. On the one hand, many of the popular techniques such as data de-identification are problematic because of their dependence on the background knowledge of adversaries. On the other hand, rigorous methods such as the exponential mechanism for differential privacy are often computationally impractical to use for releasing high dimensional data or cannot preserve high utility of original data due to their extensive data perturbation.
This paper presents a criterion called plausible deniability that provides a formal privacy guarantee, notably for releasing sensitive datasets: an output record can be released only if a certain amount of input records are indistinguishable, up to a privacy parameter. This notion does not depend on the background knowledge of an adversary. Also, it can efficiently be checked by privacy tests. We present mechanisms to generate synthetic datasets with similar statistical properties to the input data and the same format. We study this technique both theoretically and experimentally. A key theoretical result shows that, with proper randomization, the plausible deniability mechanism generates differentially private synthetic data. We demonstrate the efficiency of this generative technique on a large dataset; it is shown to preserve the utility of original data with respect to various statistical analysis and machine learning measures.
△ Less
Submitted 26 August, 2017;
originally announced August 2017.
-
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Authors:
Wenhao Wang,
Guoxing Chen,
Xiaorui Pan,
Yinqian Zhang,
XiaoFeng Wang,
Vincent Bindschaedler,
Haixu Tang,
Carl A. Gunter
Abstract:
Side-channel risks of Intel's SGX have recently attracted great attention. Under the spotlight is the newly discovered page-fault attack, in which an OS-level adversary induces page faults to observe the page-level access patterns of a protected process running in an SGX enclave. With almost all proposed defense focusing on this attack, little is known about whether such efforts indeed raise the b…
▽ More
Side-channel risks of Intel's SGX have recently attracted great attention. Under the spotlight is the newly discovered page-fault attack, in which an OS-level adversary induces page faults to observe the page-level access patterns of a protected process running in an SGX enclave. With almost all proposed defense focusing on this attack, little is known about whether such efforts indeed raise the bar for the adversary, whether a simple variation of the attack renders all protection ineffective, not to mention an in-depth understanding of other attack surfaces in the SGX system. In the paper, we report the first step toward systematic analyses of side-channel threats that SGX faces, focusing on the risks associated with its memory management. Our research identifies 8 potential attack vectors, ranging from TLB to DRAM modules. More importantly, we highlight the common misunderstandings about SGX memory side channels, demonstrating that high frequent AEXs can be avoided when recovering EdDSA secret key through a new page channel and fine-grained monitoring of enclave programs (at the level of 64B) can be done through combining both cache and cross-enclave DRAM channels. Our findings reveal the gap between the ongoing security research on SGX and its side-channel weaknesses, redefine the side-channel threat model for secure enclaves, and can provoke a discussion on when to use such a system and how to use it securely.
△ Less
Submitted 30 August, 2017; v1 submitted 20 May, 2017;
originally announced May 2017.
-
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
Authors:
Nan Zhang,
Soteris Demetriou,
Xianghang Mi,
Wenrui Diao,
Kan Yuan,
Peiyuan Zong,
Feng Qian,
XiaoFeng Wang,
Kai Chen,
Yuan Tian,
Carl A. Gunter,
Kehuan Zhang,
Patrick Tague,
Yue-Hsun Lin
Abstract:
Inspired by the boom of the consumer IoT market, many device manufacturers, start-up companies and technology giants have jumped into the space. Unfortunately, the exciting utility and rapid marketization of IoT, come at the expense of privacy and security. Industry reports and academic work have revealed many attacks on IoT systems, resulting in privacy leakage, property loss and large-scale avai…
▽ More
Inspired by the boom of the consumer IoT market, many device manufacturers, start-up companies and technology giants have jumped into the space. Unfortunately, the exciting utility and rapid marketization of IoT, come at the expense of privacy and security. Industry reports and academic work have revealed many attacks on IoT systems, resulting in privacy leakage, property loss and large-scale availability problems. To mitigate such threats, a few solutions have been proposed. However, it is still less clear what are the impacts they can have on the IoT ecosystem. In this work, we aim to perform a comprehensive study on reported attacks and defenses in the realm of IoT aiming to find out what we know, where the current studies fall short and how to move forward. To this end, we first build a toolkit that searches through massive amount of online data using semantic analysis to identify over 3000 IoT-related articles. Further, by clustering such collected data using machine learning technologies, we are able to compare academic views with the findings from industry and other sources, in an attempt to understand the gaps between them, the trend of the IoT security risks and new problems that need further attention. We systemize this process, by proposing a taxonomy for the IoT ecosystem and organizing IoT security into five problem areas. We use this taxonomy as a beacon to assess each IoT work across a number of properties we define. Our assessment reveals that relevant security and privacy problems are far from solved. We discuss how each proposed solution can be applied to a problem area and highlight their strengths, assumptions and constraints. We stress the need for a security framework for IoT vendors and discuss the trend of shifting security liability to external or centralized entities. We also identify open research problems and provide suggestions towards a secure IoT ecosystem.
△ Less
Submitted 28 March, 2017;
originally announced March 2017.
-
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness
Authors:
Soteris Demetriou,
Nan Zhang,
Yeonjoon Lee,
Xiaofeng Wang,
Carl Gunter,
Xiaoyong Zhou,
Michael Grace
Abstract:
A new development of smart-home systems is to use mobile apps to control IoT devices across a Home Area Network (HAN). Those systems tend to rely on the Wi-Fi router to authenticate other devices; as verified in our study, IoT vendors tend to trust all devices connected to the HAN. This treatment exposes them to the attack from malicious apps, particularly those running on authorized phones, which…
▽ More
A new development of smart-home systems is to use mobile apps to control IoT devices across a Home Area Network (HAN). Those systems tend to rely on the Wi-Fi router to authenticate other devices; as verified in our study, IoT vendors tend to trust all devices connected to the HAN. This treatment exposes them to the attack from malicious apps, particularly those running on authorized phones, which the router does not have information to control, as confirmed in our measurement study. Mitigating this threat cannot solely rely on IoT manufacturers, which may need to change the hardware on the devices to support encryption, increasing the cost of the device, or software developers who we need to trust to implement security correctly.
In this work, we present a new technique to control the communication between the IoT devices and their apps in a unified, backward-compatible way. Our approach, called Hanguard, does not require any changes to the IoT devices themselves, the IoT apps or the OS of the participating phones. Hanguard achieves a fine-grained, per-app protection through bridging the OS-level situation awareness and the router-level per-flow control: each phone runs a non-system userspace Monitor app to identify the party that attempts to access the protected IoT device and inform the router through a control plane of its access decision; the router enforces the decision on the data plane after verifying whether the phone should be allowed to talk to the device. Hanguard uses a role-based access control (RBAC) schema which leverages type enforcement (TE) and multi-category security (MCS) primitives to define highly flexible access control rules. We implemented our design over both Android and iOS (>95% of mobile OS market share) and a popular router. Our study shows that Hanguard is both efficient and effective in practice.
△ Less
Submitted 6 March, 2017; v1 submitted 4 March, 2017;
originally announced March 2017.
-
Resistive Plate Chamber Digitization in a Hadronic Shower Environment
Authors:
Z. Deng,
Y. Li,
Y. Wang,
Q. Yue,
Z. Yang,
J. Apostolakis,
G. Folger,
C. Grefe,
V. Ivantchenko,
A. Ribon,
V. Uzhinskiy,
D. Boumediene,
C. Carloganu,
V. Français,
G. Cho,
D-W. Kim,
S. C. Lee,
W. Park,
S. Vallecorsa,
S. Cauwenbergh,
M. Tytgat,
A. **ault,
N. Zaganidis,
E. Brianne,
A. Ebrahimi
, et al. (103 additional authors not shown)
Abstract:
The CALICE Semi-Digital Hadron Calorimeter (SDHCAL) technological prototype is a sampling calorimeter using Glass Resistive Plate Chamber detectors with a three-threshold readout as the active medium. This technology is one of the two options proposed for the hadron calorimeter of the International Large Detector for the International Linear Collider. The prototype was exposed to beams of muons, e…
▽ More
The CALICE Semi-Digital Hadron Calorimeter (SDHCAL) technological prototype is a sampling calorimeter using Glass Resistive Plate Chamber detectors with a three-threshold readout as the active medium. This technology is one of the two options proposed for the hadron calorimeter of the International Large Detector for the International Linear Collider. The prototype was exposed to beams of muons, electrons and pions of different energies at the CERN Super Proton Synchrotron. To be able to study the performance of such a calorimeter in future experiments it is important to ensure reliable simulation of its response. In this paper we present our prototype simulation performed with GEANT4 and the digitization procedure achieved with an algorithm called SimDigital. A detailed description of this algorithm is given and the methods to determinate its parameters using muon tracks and electromagnetic showers are explained. The comparison with hadronic shower data shows a good agreement up to 50 GeV. Discrepancies are observed at higher energies. The reasons for these differences are investigated.
△ Less
Submitted 15 April, 2016;
originally announced April 2016.
-
DHCAL with Minimal Absorber: Measurements with Positrons
Authors:
The CALICE Collaboration,
B. Freund,
C. Neubüser,
J. Repond,
J. Schlereth,
L. Xia,
A. Dotti,
C. Grefe,
V. Ivantchenko,
J. Berenguer Antequera,
E. Calvo Alamillo,
M. -C. Fouz,
J. Marin,
J. Puerta-Pelayo,
A. Verdugo,
E. Brianne,
A. Ebrahimi,
K. Gadow,
P. Göttlicher,
C. Günter,
O. Hartbrich,
B. Hermberg,
A. Irles,
F. Krivan,
K. Krüger
, et al. (78 additional authors not shown)
Abstract:
In special tests, the active layers of the CALICE Digital Hadron Calorimeter prototype, the DHCAL, were exposed to low energy particle beams, without being interleaved by absorber plates. The thickness of each layer corresponded approximately to 0.29 radiation lengths or 0.034 nuclear interaction lengths, defined mostly by the copper and steel skins of the detector cassettes. This paper reports on…
▽ More
In special tests, the active layers of the CALICE Digital Hadron Calorimeter prototype, the DHCAL, were exposed to low energy particle beams, without being interleaved by absorber plates. The thickness of each layer corresponded approximately to 0.29 radiation lengths or 0.034 nuclear interaction lengths, defined mostly by the copper and steel skins of the detector cassettes. This paper reports on measurements performed with this device in the Fermilab test beam with positrons in the energy range of 1 to 10 GeV. The measurements are compared to simulations based on GEANT4 and a standalone program to emulate the detailed response of the active elements.
△ Less
Submitted 4 March, 2016;
originally announced March 2016.
-
Hadron shower decomposition in the highly granular CALICE analogue hadron calorimeter
Authors:
The CALICE Collaboration,
G. Eigen,
T. Price,
N. K. Watson,
J. S. Marshall,
M. A. Thomson,
D. R. Ward,
D. Benchekroun,
A. Hoummada,
Y. Khoulaki,
J. Apostolakis,
A. Dotti,
G. Folger,
V. Ivantchenko,
A. Ribon,
V. Uzhinskiy,
J. -Y. Hostachy,
L. Morin,
E. Brianne,
A. Ebrahimi,
K. Gadow,
P. Göttlicher,
C. Günter,
O. Hartbrich,
B. Hermberg
, et al. (135 additional authors not shown)
Abstract:
The spatial development of hadronic showers in the CALICE scintillator-steel analogue hadron calorimeter is studied using test beam data collected at CERN and FNAL for single positive pions and protons with initial momenta in the range from 10 to 80 GeV/c. Both longitudinal and radial development of hadron showers are parametrised with two-component functions. The parametrisation is fit to test be…
▽ More
The spatial development of hadronic showers in the CALICE scintillator-steel analogue hadron calorimeter is studied using test beam data collected at CERN and FNAL for single positive pions and protons with initial momenta in the range from 10 to 80 GeV/c. Both longitudinal and radial development of hadron showers are parametrised with two-component functions. The parametrisation is fit to test beam data and simulations using the QGSP_BERT and FTFP_BERT physics lists from Geant4 version 9.6. The parameters extracted from data and simulated samples are compared for the two types of hadrons. The response to pions and the ratio of the non-electromagnetic to the electromagnetic calorimeter response, h/e, are estimated using the extrapolation and decomposition of the longitudinal profiles.
△ Less
Submitted 15 March, 2016; v1 submitted 27 February, 2016;
originally announced February 2016.
-
First results of the CALICE SDHCAL technological prototype
Authors:
V. Buridon,
C. Combaret,
L. Caponetto,
R. Eté,
G. Garillot,
G. Grenier,
R. Han,
J. C. Ianigro,
R. Kieffer,
I. Laktineh,
N. Lumb,
H. Mathez,
L. Mirabito,
A. Petrukhin,
A. Steen,
J. Berenguer Antequera,
E. Calvo Alamillo,
M. -C. Fouz,
J. Marin,
J. Puerta-Pelayo,
A. Verdugo,
E. Cortina Gil,
S. Mannai,
S. Cauwenbergh,
M. Tytgat
, et al. (96 additional authors not shown)
Abstract:
The CALICE Semi-Digital Hadronic Calorimeter (SDHCAL) prototype, built in 2011, was exposed to beams of hadrons, electrons and muons in two short periods in 2012 on two different beam lines of the CERN SPS. The prototype with its 48 active layers, made of Glass Resistive Plate Chambers and their embedded readout electronics, was run in triggerless and power-pulsing mode. The performance of the SDH…
▽ More
The CALICE Semi-Digital Hadronic Calorimeter (SDHCAL) prototype, built in 2011, was exposed to beams of hadrons, electrons and muons in two short periods in 2012 on two different beam lines of the CERN SPS. The prototype with its 48 active layers, made of Glass Resistive Plate Chambers and their embedded readout electronics, was run in triggerless and power-pulsing mode. The performance of the SDHCAL during the test beam was found to be very satisfactory with an efficiency exceeding 90% for almost all of the 48 active layers. A linear response (within 5%) and a good energy resolution are obtained for a large range of hadronic energies (5-80GeV) by applying appropriate calibration coefficients to the collected data for both the Digital (Binary) and the Semi-Digital (Multi-threshold) modes of the SDHCAL prototype. The Semi-Digital mode shows better performance at energies exceeding 30GeV
△ Less
Submitted 20 March, 2016; v1 submitted 6 February, 2016;
originally announced February 2016.
-
Shower development of particles with momenta from 15 GeV to 150 GeV in the CALICE scintillator-tungsten hadronic calorimeter
Authors:
The CALICE collaboration,
M. Chefdeville,
Y. Karyotakis,
J. Repond,
J. Schlereth,
L. Xia,
G. Eigen,
J. S. Marshall,
M. A. Thomson,
D. R. Ward,
N. Alipour Tehrani,
J. Apostolakis,
D. Dannheim,
K. Elsener,
G. Folger,
C. Grefe,
V. Ivantchenko,
M. Killenberg,
W. Klempt,
E. van der Kraaij,
L. Linssen,
A. -I. Lucaci-Timoce,
A. Münnich,
S. Poss,
A. Ribon
, et al. (158 additional authors not shown)
Abstract:
We present a study of showers initiated by electrons, pions, kaons, and protons with momenta from 15 GeV to 150 GeV in the highly granular CALICE scintillator-tungsten analogue hadronic calorimeter. The data were recorded at the CERN Super Proton Synchrotron in 2011. The analysis includes measurements of the calorimeter response to each particle type as well as measurements of the energy resolutio…
▽ More
We present a study of showers initiated by electrons, pions, kaons, and protons with momenta from 15 GeV to 150 GeV in the highly granular CALICE scintillator-tungsten analogue hadronic calorimeter. The data were recorded at the CERN Super Proton Synchrotron in 2011. The analysis includes measurements of the calorimeter response to each particle type as well as measurements of the energy resolution and studies of the longitudinal and radial shower development for selected particles. The results are compared to Geant4 simulations (version 9.6.p02). In the study of the energy resolution we include previously published data with beam momenta from 1 GeV to 10 GeV recorded at the CERN Proton Synchrotron in 2010.
△ Less
Submitted 11 December, 2015; v1 submitted 2 September, 2015;
originally announced September 2015.
-
Pion and proton showers in the CALICE scintillator-steel analogue hadron calorimeter
Authors:
The CALICE Collaboration,
B. Bilki,
J. Repond,
L. Xia,
G. Eigen,
M. A. Thomson,
D. R. Ward,
D. Benchekroun,
A. Hoummada,
Y. Khoulaki,
S. Chang,
A. Khan,
D. H. Kim,
D. J. Kong,
Y. D. Oh,
G. C. Blazey,
A. Dyshkant,
K. Francis,
J. G. R. Lima,
R. Salcido,
V. Zutshi,
F. Salvatore,
K. Kawagoe,
Y. Miyazaki,
Y. Sudo
, et al. (147 additional authors not shown)
Abstract:
Showers produced by positive hadrons in the highly granular CALICE scintillator-steel analogue hadron calorimeter were studied. The experimental data were collected at CERN and FNAL for single particles with initial momenta from 10 to 80 GeV/c. The calorimeter response and resolution and spatial characteristics of shower development for proton- and pion-induced showers for test beam data and simul…
▽ More
Showers produced by positive hadrons in the highly granular CALICE scintillator-steel analogue hadron calorimeter were studied. The experimental data were collected at CERN and FNAL for single particles with initial momenta from 10 to 80 GeV/c. The calorimeter response and resolution and spatial characteristics of shower development for proton- and pion-induced showers for test beam data and simulations using Geant4 version 9.6 are compared.
△ Less
Submitted 15 March, 2015; v1 submitted 8 December, 2014;
originally announced December 2014.
-
Testing Hadronic Interaction Models using a Highly Granular Silicon-Tungsten Calorimeter
Authors:
The CALICE Collaboration,
B. Bilki,
J. Repond,
J. Schlereth,
L. Xia,
Z. Deng,
Y. Li,
Y. Wang,
Q. Yue,
Z. Yang,
G. Eigen,
Y. Mikami,
T. Price,
N. K. Watson,
M. A. Thomson,
D. R. Ward,
D. Benchekroun,
A. Hoummada,
Y. Khoulaki,
C. Cârloganu,
S. Chang,
A. Khan,
D. H. Kim,
D. J. Kong,
Y. D. Oh
, et al. (127 additional authors not shown)
Abstract:
A detailed study of hadronic interactions is presented using data recorded with the highly granular CALICE silicon-tungsten electromagnetic calorimeter. Approximately 350,000 selected negatively charged pion events at energies between 2 and 10 GeV have been studied. The predictions of several physics models available within the Geant4 simulation tool kit are compared to this data. A reasonable ove…
▽ More
A detailed study of hadronic interactions is presented using data recorded with the highly granular CALICE silicon-tungsten electromagnetic calorimeter. Approximately 350,000 selected negatively charged pion events at energies between 2 and 10 GeV have been studied. The predictions of several physics models available within the Geant4 simulation tool kit are compared to this data. A reasonable overall description of the data is observed; the Monte Carlo predictions are within 20% of the data, and for many observables much closer. The largest quantitative discrepancies are found in the longitudinal and transverse distributions of reconstructed energy.
△ Less
Submitted 8 May, 2015; v1 submitted 26 November, 2014;
originally announced November 2014.
-
Privacy in the Genomic Era
Authors:
Muhammad Naveed,
Erman Ayday,
Ellen W. Clayton,
Jacques Fellay,
Carl A. Gunter,
Jean-Pierre Hubaux,
Bradley A. Malin,
XiaoFeng Wang
Abstract:
Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has…
▽ More
Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.
△ Less
Submitted 17 June, 2015; v1 submitted 8 May, 2014;
originally announced May 2014.
-
The Time Structure of Hadronic Showers in highly granular Calorimeters with Tungsten and Steel Absorbers
Authors:
C. Adloff,
J. -J. Blaising,
M. Chefdeville,
C. Drancourt,
R. Gaglione,
N. Geffroy,
Y. Karyotakis,
I. Koletsou,
J. Prast,
G. Vouters J. Repond,
J. Schlereth,
L. Xia E. Baldolemar,
J. Li,
S. T. Park,
M. Sosebee,
A. P. White,
J. Yu,
G. Eigen,
M. A. Thomson,
D. R. Ward,
D. Benchekroun,
A. Hoummada,
Y. Khoulaki J. Apostolakis,
S. Arfaoui,
M. Benoit
, et al. (188 additional authors not shown)
Abstract:
The intrinsic time structure of hadronic showers influences the timing capability and the required integration time of hadronic calorimeters in particle physics experiments, and depends on the active medium and on the absorber of the calorimeter. With the CALICE T3B experiment, a setup of 15 small plastic scintillator tiles read out with Silicon Photomultipliers, the time structure of showers is m…
▽ More
The intrinsic time structure of hadronic showers influences the timing capability and the required integration time of hadronic calorimeters in particle physics experiments, and depends on the active medium and on the absorber of the calorimeter. With the CALICE T3B experiment, a setup of 15 small plastic scintillator tiles read out with Silicon Photomultipliers, the time structure of showers is measured on a statistical basis with high spatial and temporal resolution in sampling calorimeters with tungsten and steel absorbers. The results are compared to GEANT4 (version 9.4 patch 03) simulations with different hadronic physics models. These comparisons demonstrate the importance of using high precision treatment of low-energy neutrons for tungsten absorbers, while an overall good agreement between data and simulations for all considered models is observed for steel.
△ Less
Submitted 21 July, 2014; v1 submitted 25 April, 2014;
originally announced April 2014.
-
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware
Authors:
Michael LeMay,
Carl A. Gunter
Abstract:
Mobile devices are in roles where the integrity and confidentiality of their apps and data are of paramount importance. They usually contain a System-on-Chip (SoC), which integrates microprocessors and peripheral Intellectual Property (IP) connected by a Network-on-Chip (NoC). Malicious IP or software could compromise critical data. Some types of attacks can be blocked by controlling data transfer…
▽ More
Mobile devices are in roles where the integrity and confidentiality of their apps and data are of paramount importance. They usually contain a System-on-Chip (SoC), which integrates microprocessors and peripheral Intellectual Property (IP) connected by a Network-on-Chip (NoC). Malicious IP or software could compromise critical data. Some types of attacks can be blocked by controlling data transfers on the NoC using Memory Management Units (MMUs) and other access control mechanisms. However, commodity processors do not provide strong assurances regarding the correctness of such mechanisms, and it is challenging to verify that all access control mechanisms in the system are correctly configured. We propose a NoC Firewall (NoCF) that provides a single locus of control and is amenable to formal analysis. We demonstrate an initial analysis of its ability to resist malformed NoC commands, which we believe is the first effort to detect vulnerabilities that arise from NoC protocol violations perpetrated by erroneous or malicious IP.
△ Less
Submitted 16 January, 2017; v1 submitted 14 April, 2014;
originally announced April 2014.
-
Performance of the first prototype of the CALICE scintillator strip electromagnetic calorimeter
Authors:
CALICE Collaboration,
K. Francis,
J. Repond,
J. Schlereth,
J. Smith,
L. Xia,
E. Baldolemar,
J. Li,
S. T. Park,
M. Sosebee,
A. P. White,
J. Yu,
G. Eigen,
Y. Mikami,
N. K. Watson,
M. A. Thomson,
D. R. Ward,
D. Benchekroun,
A. Hoummada,
Y. Khoulaki,
J. Apostolakis,
A. Dotti,
G. Folger,
V. Ivantchenko,
A. Ribon
, et al. (169 additional authors not shown)
Abstract:
A first prototype of a scintillator strip-based electromagnetic calorimeter was built, consisting of 26 layers of tungsten absorber plates interleaved with planes of 45x10x3 mm3 plastic scintillator strips. Data were collected using a positron test beam at DESY with momenta between 1 and 6 GeV/c. The prototype's performance is presented in terms of the linearity and resolution of the energy measur…
▽ More
A first prototype of a scintillator strip-based electromagnetic calorimeter was built, consisting of 26 layers of tungsten absorber plates interleaved with planes of 45x10x3 mm3 plastic scintillator strips. Data were collected using a positron test beam at DESY with momenta between 1 and 6 GeV/c. The prototype's performance is presented in terms of the linearity and resolution of the energy measurement. These results represent an important milestone in the development of highly granular calorimeters using scintillator strip technology. This technology is being developed for a future linear collider experiment, aiming at the precise measurement of jet energies using particle flow techniques.
△ Less
Submitted 11 June, 2014; v1 submitted 15 November, 2013;
originally announced November 2013.
-
Shower development of particles with momenta from 1 to 10 GeV in the CALICE Scintillator-Tungsten HCAL
Authors:
C. Adloff,
J. -J. Blaising,
M. Chefdeville,
C. Drancourt,
R. Gaglione,
N. Geffroy,
Y. Karyotakis,
I. Koletsou,
J. Prast,
G. Vouters,
J. Repond,
J. Schlereth,
J. Smith,
L. Xia,
E. Baldolemar,
J. Li,
S. T. Park,
M. Sosebee,
A. P. White,
J. Yu,
G. Eigen,
M. A. Thomson,
D. R. Ward,
D. Benchekroun,
A. Hoummada
, et al. (194 additional authors not shown)
Abstract:
Lepton colliders are considered as options to complement and to extend the physics programme at the Large Hadron Collider. The Compact Linear Collider (CLIC) is an $e^+e^-$ collider under development aiming at centre-of-mass energies of up to 3 TeV. For experiments at CLIC, a hadron sampling calorimeter with tungsten absorber is proposed. Such a calorimeter provides sufficient depth to contain hig…
▽ More
Lepton colliders are considered as options to complement and to extend the physics programme at the Large Hadron Collider. The Compact Linear Collider (CLIC) is an $e^+e^-$ collider under development aiming at centre-of-mass energies of up to 3 TeV. For experiments at CLIC, a hadron sampling calorimeter with tungsten absorber is proposed. Such a calorimeter provides sufficient depth to contain high-energy showers, while allowing a compact size for the surrounding solenoid.
A fine-grained calorimeter prototype with tungsten absorber plates and scintillator tiles read out by silicon photomultipliers was built and exposed to particle beams at CERN. Results obtained with electrons, pions and protons of momenta up to 10 GeV are presented in terms of energy resolution and shower shape studies. The results are compared with several GEANT4 simulation models in order to assess the reliability of the Monte Carlo predictions relevant for a future experiment at CLIC.
△ Less
Submitted 13 January, 2014; v1 submitted 14 November, 2013;
originally announced November 2013.
-
Validation of GEANT4 Monte Carlo Models with a Highly Granular Scintillator-Steel Hadron Calorimeter
Authors:
C. Adloff,
J. Blaha,
J. -J. Blaising,
C. Drancourt,
A. Espargilière,
R. Gaglione,
N. Geffroy,
Y. Karyotakis,
J. Prast,
G. Vouters,
K. Francis,
J. Repond,
J. Schlereth,
J. Smith,
L. Xia,
E. Baldolemar,
J. Li,
S. T. Park,
M. Sosebee,
A. P. White,
J. Yu,
T. Buanes,
G. Eigen,
Y. Mikami,
N. K. Watson
, et al. (148 additional authors not shown)
Abstract:
Calorimeters with a high granularity are a fundamental requirement of the Particle Flow paradigm. This paper focuses on the prototype of a hadron calorimeter with analog readout, consisting of thirty-eight scintillator layers alternating with steel absorber planes. The scintillator plates are finely segmented into tiles individually read out via Silicon Photomultipliers. The presented results are…
▽ More
Calorimeters with a high granularity are a fundamental requirement of the Particle Flow paradigm. This paper focuses on the prototype of a hadron calorimeter with analog readout, consisting of thirty-eight scintillator layers alternating with steel absorber planes. The scintillator plates are finely segmented into tiles individually read out via Silicon Photomultipliers. The presented results are based on data collected with pion beams in the energy range from 8GeV to 100GeV. The fine segmentation of the sensitive layers and the high sampling frequency allow for an excellent reconstruction of the spatial development of hadronic showers. A comparison between data and Monte Carlo simulations is presented, concerning both the longitudinal and lateral development of hadronic showers and the global response of the calorimeter. The performance of several GEANT4 physics lists with respect to these observables is evaluated.
△ Less
Submitted 15 June, 2014; v1 submitted 13 June, 2013;
originally announced June 2013.
-
Track segments in hadronic showers in a highly granular scintillator-steel hadron calorimeter
Authors:
CALICE Collaboration,
C. Adloff,
J. -J. Blaising,
M. Chefdeville,
C. Drancourt,
R. Gaglione,
N. Geffroy,
Y. Karyotakis,
I. Koletsou,
J. Prast,
G. Vouters,
K. Francis,
J. Repond,
J. Schlereth,
J. Smith,
L. Xia,
E. Baldolemar,
J. Li,
S. T. Park,
M. Sosebee,
A. P. White,
J. Yu,
G. Eigen,
Y. Mikami,
N. K. Watson
, et al. (184 additional authors not shown)
Abstract:
We investigate the three dimensional substructure of hadronic showers in the CALICE scintillator-steel hadronic calorimeter. The high granularity of the detector is used to find track segments of minimum ionising particles within hadronic showers, providing sensitivity to the spatial structure and the details of secondary particle production in hadronic cascades. The multiplicity, length and angul…
▽ More
We investigate the three dimensional substructure of hadronic showers in the CALICE scintillator-steel hadronic calorimeter. The high granularity of the detector is used to find track segments of minimum ionising particles within hadronic showers, providing sensitivity to the spatial structure and the details of secondary particle production in hadronic cascades. The multiplicity, length and angular distribution of identified track segments are compared to GEANT4 simulations with several different shower models. Track segments also provide the possibility for in-situ calibration of highly granular calorimeters.
△ Less
Submitted 29 July, 2013; v1 submitted 30 May, 2013;
originally announced May 2013.
-
Hadronic energy resolution of a highly granular scintillator-steel hadron calorimeter using software compensation techniques
Authors:
CALICE Collaboration,
C. Adloff,
J. Blaha,
J. -J. Blaising,
C. Drancourt,
A. Espargilière,
R. Gaglione,
N. Geffroy,
Y. Karyotakis,
J. Prast,
G. Vouters,
K. Francis,
J. Repond,
J. Smith,
L. Xia,
E. Baldolemar,
J. Li,
S. T. Park,
M. Sosebee,
A. P. White,
J. Yu,
T. Buanes,
G. Eigen,
Y. Mikami,
N. K. Watson
, et al. (142 additional authors not shown)
Abstract:
The energy resolution of a highly granular 1 m3 analogue scintillator-steel hadronic calorimeter is studied using charged pions with energies from 10 GeV to 80 GeV at the CERN SPS. The energy resolution for single hadrons is determined to be approximately 58%/sqrt(E/GeV}. This resolution is improved to approximately 45%/sqrt(E/GeV) with software compensation techniques. These techniques take advan…
▽ More
The energy resolution of a highly granular 1 m3 analogue scintillator-steel hadronic calorimeter is studied using charged pions with energies from 10 GeV to 80 GeV at the CERN SPS. The energy resolution for single hadrons is determined to be approximately 58%/sqrt(E/GeV}. This resolution is improved to approximately 45%/sqrt(E/GeV) with software compensation techniques. These techniques take advantage of the event-by-event information about the substructure of hadronic showers which is provided by the imaging capabilities of the calorimeter. The energy reconstruction is improved either with corrections based on the local energy density or by applying a single correction factor to the event energy sum derived from a global measure of the shower energy density. The application of the compensation algorithms to Geant4 simulations yield resolution improvements comparable to those observed for real data.
△ Less
Submitted 27 September, 2012; v1 submitted 17 July, 2012;
originally announced July 2012.
-
Electromagnetic response of a highly granular hadronic calorimeter
Authors:
C. Adloff,
J. Blaha,
J. -J. Blaising,
C. Drancourt,
A. Espargilière,
R. Gaglione,
N. Geffroy,
Y. Karyotakis,
J. Prast,
G. Vouters,
K. Francis,
J. Repond,
J. Smith,
L. Xia,
E. Baldolemar,
J. Li,
S. T. Park,
M. Sosebee,
A. P. White,
J. Yu,
Y. Mikami,
N. K. Watson T. Goto,
G. Mavromanolakis,
M. A. Thomson,
D. R. Ward W. Yan
, et al. (142 additional authors not shown)
Abstract:
The CALICE collaboration is studying the design of high performance electromagnetic and hadronic calorimeters for future International Linear Collider detectors. For the hadronic calorimeter, one option is a highly granular sampling calorimeter with steel as absorber and scintillator layers as active material. High granularity is obtained by segmenting the scintillator into small tiles individuall…
▽ More
The CALICE collaboration is studying the design of high performance electromagnetic and hadronic calorimeters for future International Linear Collider detectors. For the hadronic calorimeter, one option is a highly granular sampling calorimeter with steel as absorber and scintillator layers as active material. High granularity is obtained by segmenting the scintillator into small tiles individually read out via silicon photo-multipliers (SiPM).
A prototype has been built, consisting of thirty-eight sensitive layers, segmented into about eight thousand channels. In 2007 the prototype was exposed to positrons and hadrons using the CERN SPS beam, covering a wide range of beam energies and incidence angles. The challenge of cell equalization and calibration of such a large number of channels is best validated using electromagnetic processes.
The response of the prototype steel-scintillator calorimeter, including linearity and uniformity, to electrons is investigated and described.
△ Less
Submitted 8 June, 2011; v1 submitted 20 December, 2010;
originally announced December 2010.