Skip to main content

Showing 1–34 of 34 results for author: Gunter, C

.
  1. arXiv:2212.13607  [pdf, other

    cs.LG cs.AI

    EDoG: Adversarial Edge Detection For Graph Neural Networks

    Authors: Xiaojun Xu, Yue Yu, Hanzhang Wang, Alok Lal, Carl A. Gunter, Bo Li

    Abstract: Graph Neural Networks (GNNs) have been widely applied to different tasks such as bioinformatics, drug design, and social networks. However, recent studies have shown that GNNs are vulnerable to adversarial attacks which aim to mislead the node or subgraph classification prediction by adding subtle perturbations. Detecting these attacks is challenging due to the small magnitude of perturbation and… ▽ More

    Submitted 27 December, 2022; originally announced December 2022.

    Comments: Accepted by IEEE Conference on Secure and Trustworthy Machine Learning 2023

  2. arXiv:2210.08974  [pdf

    cs.CY

    Coordinated Science Laboratory 70th Anniversary Symposium: The Future of Computing

    Authors: Klara Nahrstedt, Naresh Shanbhag, Vikram Adve, Nancy Amato, Romit Roy Choudhury, Carl Gunter, Nam Sung Kim, Olgica Milenkovic, Sayan Mitra, Lav Varshney, Yurii Vlasov, Sarita Adve, Rashid Bashir, Andreas Cangellaris, James DiCarlo, Katie Driggs-Campbell, Nick Feamster, Mattia Gazzola, Karrie Karahalios, Sanmi Koyejo, Paul Kwiat, Bo Li, Negar Mehr, Ravish Mehra, Andrew Miller , et al. (3 additional authors not shown)

    Abstract: In 2021, the Coordinated Science Laboratory CSL, an Interdisciplinary Research Unit at the University of Illinois Urbana-Champaign, hosted the Future of Computing Symposium to celebrate its 70th anniversary. CSL's research covers the full computing stack, computing's impact on society and the resulting need for social responsibility. In this white paper, we summarize the major technological points… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

  3. arXiv:2210.06676  [pdf, other

    cs.CR

    A Tagging Solution to Discover IoT Devices in Apartments

    Authors: Berkay Kaplan, **gyu Qian, Israel J Lopez-Toledo, Carl A. Gunter

    Abstract: The number of IoT devices in smart homes is increasing. This broad adoption facilitates users' lives, but it also brings problems. One such issue is that some IoT devices may invade users' privacy. Some reasons for this invasion can stem from obscure data collection practices or hidden devices. Specific IoT devices can exist out of sight and still collect user data to send to third parties via the… ▽ More

    Submitted 20 September, 2023; v1 submitted 12 October, 2022; originally announced October 2022.

  4. arXiv:2112.11986  [pdf, other

    cs.CR cs.MA eess.SY

    Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection

    Authors: George Gunter, Huichen Li, Avesta Hojjati, Matthew Nice, Matthew Bunting, Carl A. Gunter, Bo Li, Jonathan Sprinkle, Daniel Work

    Abstract: We demonstrate that a supply-chain level compromise of the adaptive cruise control (ACC) capability on equipped vehicles can be used to significantly degrade system level performance of current day mixed-autonomy freeway networks. Via a simple threat model which causes random deceleration attacks (RDAs), compromised vehicles create congestion waves in the traffic that decrease average speed and ne… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

  5. arXiv:2102.05195  [pdf, other

    cs.CR

    DOVE: A Data-Oblivious Virtual Environment

    Authors: Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter

    Abstract: Users can improve the security of remote communications by using Trusted Execution Environments (TEEs) to protect against direct introspection and tampering of sensitive data. This can even be done with applications coded in high-level languages with complex programming stacks such as R, Python, and Ruby. However, this creates a trade-off between programming convenience versus the risk of attacks… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: Appears in the proceedings of the 28th Network and Distributed System Security Symposium (NDSS), 2021

  6. arXiv:2007.01721  [pdf, other

    cs.CR cs.HC

    Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security

    Authors: Hsiao-Ying Huang, Soteris Demetriou, Rini Banerjee, Güliz Seray Tuncay, Carl A. Gunter, Masooda Bashir

    Abstract: Despite widespread use of smartphones, there is no measurement standard targeted at smartphone security behaviors. In this paper we translate a well-known cybersecurity behavioral scale into the smartphone domain and show that we can improve on this translation by following an established psychometrics approach surveying 1011 participants. We design a new 14-item Smartphone Security Behavioral Sca… ▽ More

    Submitted 6 July, 2020; v1 submitted 3 July, 2020; originally announced July 2020.

  7. arXiv:2005.06585  [pdf

    cs.CY

    Grand Challenges for Embedded Security Research in a Connected World

    Authors: Wayne Burleson, Kevin Fu, Denise Anthony, Jorge Guajardo, Carl Gunter, Kyle Ingols, Jean-Baptiste Jeannin, Farinaz Koushanafar, Carl Landwehr, Susan Squires

    Abstract: Protecting embedded security is becoming an increasingly challenging research problem for embedded systems due to a number of emerging trends in hardware, software, networks, and applications. Without fundamental advances in, and an understanding of embedded security it will be difficult for future engineers to provide assurance for the Internet of Things (IoT) and Operational Technology (OT) in w… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

    Comments: A Computing Community Consortium (CCC) workshop report, 24 pages

    Report number: ccc2020report_1

  8. arXiv:1910.03137  [pdf, other

    cs.AI cs.CR cs.LG

    Detecting AI Trojans Using Meta Neural Analysis

    Authors: Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li

    Abstract: In machine learning Trojan attacks, an adversary trains a corrupted model that obtains good performance on normal data but behaves maliciously on data samples with certain trigger patterns. Several approaches have been proposed to detect such attacks, but they make undesirable assumptions about the attack strategies or require direct access to the trained models, which restricts their utility in p… ▽ More

    Submitted 1 October, 2020; v1 submitted 7 October, 2019; originally announced October 2019.

    Comments: Accepted by IEEE S&P 2021

  9. arXiv:1908.02108  [pdf, other

    cs.NI cs.CR cs.SE

    WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services

    Authors: Michael J. May, Kevin D. Lux, Carl A. Gunter

    Abstract: Web services offer an opportunity to redesign a variety of older systems to exploit the advantages of a flexible, extensible, secure set of standards. In this work we revisit WSEmail, a system proposed over ten years ago to improve email by redesigning it as a family of web services. WSEmail offers an alternative vision of how instant messaging and email services could have evolved, offering secur… ▽ More

    Submitted 12 December, 2019; v1 submitted 6 August, 2019; originally announced August 2019.

    Comments: 18 pages, 17 figures, followup work to WSEmail: Secure Internet Messaging Based on Web Services in IEEE International Conference on Web Services (ICWS) 2005. Extended version of article to appear in Service Oriented Computing and Applications

  10. arXiv:1906.09338  [pdf, other

    cs.LG stat.ML

    G-PATE: Scalable Differentially Private Data Generator via Private Aggregation of Teacher Discriminators

    Authors: Yunhui Long, Boxin Wang, Zhuolin Yang, Bhavya Kailkhura, Aston Zhang, Carl A. Gunter, Bo Li

    Abstract: Recent advances in machine learning have largely benefited from the massive accessible training data. However, large-scale data sharing has raised great privacy concerns. In this work, we propose a novel privacy-preserving data Generative model based on the PATE framework (G-PATE), aiming to train a scalable differentially private data generator that preserves high generated data utility. Our appr… ▽ More

    Submitted 30 December, 2021; v1 submitted 21 June, 2019; originally announced June 2019.

  11. arXiv:1811.10296  [pdf, other

    cs.CR

    Distributed and Secure ML with Self-tallying Multi-party Aggregation

    Authors: Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl Gunter

    Abstract: Privacy preserving multi-party computation has many applications in areas such as medicine and online advertisements. In this work, we propose a framework for distributed, secure machine learning among untrusted individuals. The framework consists of two parts: a two-step training protocol based on homomorphic addition and a zero knowledge proof for data validity. By combining these two techniques… ▽ More

    Submitted 26 November, 2018; originally announced November 2018.

    Comments: NeurIPS 2018 Workshop on PPML

  12. arXiv:1802.04889  [pdf, other

    cs.CR cs.LG stat.ML

    Understanding Membership Inferences on Well-Generalized Learning Models

    Authors: Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen

    Abstract: Membership Inference Attack (MIA) determines the presence of a record in a machine learning model's training data by querying the model. Prior work has shown that the attack is feasible when the model is overfitted to its training data or when the adversary controls the training algorithm. However, when the model is not overfitted and the adversary does not control the training algorithm, the thre… ▽ More

    Submitted 13 February, 2018; originally announced February 2018.

  13. arXiv:1801.08535  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

    Authors: Xue**g Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter

    Abstract: The popularity of ASR (automatic speech recognition) systems, like Google Voice, Cortana, brings in security concerns, as demonstrated by recent attacks. The impacts of such threats, however, are less clear, since they are either less stealthy (producing noise-like voice commands) or requiring the physical presence of an attack device (using ultrasound). In this paper, we demonstrate that not only… ▽ More

    Submitted 1 July, 2018; v1 submitted 24 January, 2018; originally announced January 2018.

    Comments: Accepted by USENIX Security 2018

  14. arXiv:1712.09136  [pdf, other

    cs.CR

    Towards Measuring Membership Privacy

    Authors: Yunhui Long, Vincent Bindschaedler, Carl A. Gunter

    Abstract: Machine learning models are increasingly made available to the masses through public query interfaces. Recent academic work has demonstrated that malicious users who can query such models are able to infer sensitive information about records within the training data. Differential privacy can thwart such attacks, but not all models can be readily trained to achieve this guarantee or to achieve it w… ▽ More

    Submitted 25 December, 2017; originally announced December 2017.

  15. arXiv:1708.07975  [pdf, ps, other

    cs.CR cs.DB cs.LG stat.ML

    Plausible Deniability for Privacy-Preserving Data Synthesis

    Authors: Vincent Bindschaedler, Reza Shokri, Carl A. Gunter

    Abstract: Releasing full data records is one of the most challenging problems in data privacy. On the one hand, many of the popular techniques such as data de-identification are problematic because of their dependence on the background knowledge of adversaries. On the other hand, rigorous methods such as the exponential mechanism for differential privacy are often computationally impractical to use for rele… ▽ More

    Submitted 26 August, 2017; originally announced August 2017.

    Comments: In PVLDB 2017

  16. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX

    Authors: Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter

    Abstract: Side-channel risks of Intel's SGX have recently attracted great attention. Under the spotlight is the newly discovered page-fault attack, in which an OS-level adversary induces page faults to observe the page-level access patterns of a protected process running in an SGX enclave. With almost all proposed defense focusing on this attack, little is known about whether such efforts indeed raise the b… ▽ More

    Submitted 30 August, 2017; v1 submitted 20 May, 2017; originally announced May 2017.

    Comments: Accepted to ACM CCS 2017

  17. arXiv:1703.09809  [pdf, other

    cs.CR

    Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be

    Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin

    Abstract: Inspired by the boom of the consumer IoT market, many device manufacturers, start-up companies and technology giants have jumped into the space. Unfortunately, the exciting utility and rapid marketization of IoT, come at the expense of privacy and security. Industry reports and academic work have revealed many attacks on IoT systems, resulting in privacy leakage, property loss and large-scale avai… ▽ More

    Submitted 28 March, 2017; originally announced March 2017.

  18. arXiv:1703.01537  [pdf, other

    cs.CR cs.NI

    Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness

    Authors: Soteris Demetriou, Nan Zhang, Yeonjoon Lee, Xiaofeng Wang, Carl Gunter, Xiaoyong Zhou, Michael Grace

    Abstract: A new development of smart-home systems is to use mobile apps to control IoT devices across a Home Area Network (HAN). Those systems tend to rely on the Wi-Fi router to authenticate other devices; as verified in our study, IoT vendors tend to trust all devices connected to the HAN. This treatment exposes them to the attack from malicious apps, particularly those running on authorized phones, which… ▽ More

    Submitted 6 March, 2017; v1 submitted 4 March, 2017; originally announced March 2017.

    ACM Class: C.2.0; D.4.6

  19. arXiv:1604.04550  [pdf, other

    physics.ins-det hep-ex

    Resistive Plate Chamber Digitization in a Hadronic Shower Environment

    Authors: Z. Deng, Y. Li, Y. Wang, Q. Yue, Z. Yang, J. Apostolakis, G. Folger, C. Grefe, V. Ivantchenko, A. Ribon, V. Uzhinskiy, D. Boumediene, C. Carloganu, V. Français, G. Cho, D-W. Kim, S. C. Lee, W. Park, S. Vallecorsa, S. Cauwenbergh, M. Tytgat, A. **ault, N. Zaganidis, E. Brianne, A. Ebrahimi , et al. (103 additional authors not shown)

    Abstract: The CALICE Semi-Digital Hadron Calorimeter (SDHCAL) technological prototype is a sampling calorimeter using Glass Resistive Plate Chamber detectors with a three-threshold readout as the active medium. This technology is one of the two options proposed for the hadron calorimeter of the International Large Detector for the International Linear Collider. The prototype was exposed to beams of muons, e… ▽ More

    Submitted 15 April, 2016; originally announced April 2016.

  20. DHCAL with Minimal Absorber: Measurements with Positrons

    Authors: The CALICE Collaboration, B. Freund, C. Neubüser, J. Repond, J. Schlereth, L. Xia, A. Dotti, C. Grefe, V. Ivantchenko, J. Berenguer Antequera, E. Calvo Alamillo, M. -C. Fouz, J. Marin, J. Puerta-Pelayo, A. Verdugo, E. Brianne, A. Ebrahimi, K. Gadow, P. Göttlicher, C. Günter, O. Hartbrich, B. Hermberg, A. Irles, F. Krivan, K. Krüger , et al. (78 additional authors not shown)

    Abstract: In special tests, the active layers of the CALICE Digital Hadron Calorimeter prototype, the DHCAL, were exposed to low energy particle beams, without being interleaved by absorber plates. The thickness of each layer corresponded approximately to 0.29 radiation lengths or 0.034 nuclear interaction lengths, defined mostly by the copper and steel skins of the detector cassettes. This paper reports on… ▽ More

    Submitted 4 March, 2016; originally announced March 2016.

  21. Hadron shower decomposition in the highly granular CALICE analogue hadron calorimeter

    Authors: The CALICE Collaboration, G. Eigen, T. Price, N. K. Watson, J. S. Marshall, M. A. Thomson, D. R. Ward, D. Benchekroun, A. Hoummada, Y. Khoulaki, J. Apostolakis, A. Dotti, G. Folger, V. Ivantchenko, A. Ribon, V. Uzhinskiy, J. -Y. Hostachy, L. Morin, E. Brianne, A. Ebrahimi, K. Gadow, P. Göttlicher, C. Günter, O. Hartbrich, B. Hermberg , et al. (135 additional authors not shown)

    Abstract: The spatial development of hadronic showers in the CALICE scintillator-steel analogue hadron calorimeter is studied using test beam data collected at CERN and FNAL for single positive pions and protons with initial momenta in the range from 10 to 80 GeV/c. Both longitudinal and radial development of hadron showers are parametrised with two-component functions. The parametrisation is fit to test be… ▽ More

    Submitted 15 March, 2016; v1 submitted 27 February, 2016; originally announced February 2016.

    Comments: 38 pages, 19 figures, 5 tables; author list changed; submitted to JINST

  22. arXiv:1602.02276  [pdf, other

    physics.ins-det hep-ex

    First results of the CALICE SDHCAL technological prototype

    Authors: V. Buridon, C. Combaret, L. Caponetto, R. Eté, G. Garillot, G. Grenier, R. Han, J. C. Ianigro, R. Kieffer, I. Laktineh, N. Lumb, H. Mathez, L. Mirabito, A. Petrukhin, A. Steen, J. Berenguer Antequera, E. Calvo Alamillo, M. -C. Fouz, J. Marin, J. Puerta-Pelayo, A. Verdugo, E. Cortina Gil, S. Mannai, S. Cauwenbergh, M. Tytgat , et al. (96 additional authors not shown)

    Abstract: The CALICE Semi-Digital Hadronic Calorimeter (SDHCAL) prototype, built in 2011, was exposed to beams of hadrons, electrons and muons in two short periods in 2012 on two different beam lines of the CERN SPS. The prototype with its 48 active layers, made of Glass Resistive Plate Chambers and their embedded readout electronics, was run in triggerless and power-pulsing mode. The performance of the SDH… ▽ More

    Submitted 20 March, 2016; v1 submitted 6 February, 2016; originally announced February 2016.

  23. arXiv:1509.00617  [pdf, other

    physics.ins-det hep-ex

    Shower development of particles with momenta from 15 GeV to 150 GeV in the CALICE scintillator-tungsten hadronic calorimeter

    Authors: The CALICE collaboration, M. Chefdeville, Y. Karyotakis, J. Repond, J. Schlereth, L. Xia, G. Eigen, J. S. Marshall, M. A. Thomson, D. R. Ward, N. Alipour Tehrani, J. Apostolakis, D. Dannheim, K. Elsener, G. Folger, C. Grefe, V. Ivantchenko, M. Killenberg, W. Klempt, E. van der Kraaij, L. Linssen, A. -I. Lucaci-Timoce, A. Münnich, S. Poss, A. Ribon , et al. (158 additional authors not shown)

    Abstract: We present a study of showers initiated by electrons, pions, kaons, and protons with momenta from 15 GeV to 150 GeV in the highly granular CALICE scintillator-tungsten analogue hadronic calorimeter. The data were recorded at the CERN Super Proton Synchrotron in 2011. The analysis includes measurements of the calorimeter response to each particle type as well as measurements of the energy resolutio… ▽ More

    Submitted 11 December, 2015; v1 submitted 2 September, 2015; originally announced September 2015.

    Comments: 35 pages, 21 figures, 8 tables

    Journal ref: 2015 JINST 10 P12006

  24. arXiv:1412.2653  [pdf, other

    physics.ins-det hep-ex

    Pion and proton showers in the CALICE scintillator-steel analogue hadron calorimeter

    Authors: The CALICE Collaboration, B. Bilki, J. Repond, L. Xia, G. Eigen, M. A. Thomson, D. R. Ward, D. Benchekroun, A. Hoummada, Y. Khoulaki, S. Chang, A. Khan, D. H. Kim, D. J. Kong, Y. D. Oh, G. C. Blazey, A. Dyshkant, K. Francis, J. G. R. Lima, R. Salcido, V. Zutshi, F. Salvatore, K. Kawagoe, Y. Miyazaki, Y. Sudo , et al. (147 additional authors not shown)

    Abstract: Showers produced by positive hadrons in the highly granular CALICE scintillator-steel analogue hadron calorimeter were studied. The experimental data were collected at CERN and FNAL for single particles with initial momenta from 10 to 80 GeV/c. The calorimeter response and resolution and spatial characteristics of shower development for proton- and pion-induced showers for test beam data and simul… ▽ More

    Submitted 15 March, 2015; v1 submitted 8 December, 2014; originally announced December 2014.

    Comments: 26 pages, 16 figures, JINST style, changes in the author list, typos corrected, new section added, figures regrouped. Accepted for publication in JINST

  25. arXiv:1411.7215  [pdf, other

    physics.ins-det hep-ex

    Testing Hadronic Interaction Models using a Highly Granular Silicon-Tungsten Calorimeter

    Authors: The CALICE Collaboration, B. Bilki, J. Repond, J. Schlereth, L. Xia, Z. Deng, Y. Li, Y. Wang, Q. Yue, Z. Yang, G. Eigen, Y. Mikami, T. Price, N. K. Watson, M. A. Thomson, D. R. Ward, D. Benchekroun, A. Hoummada, Y. Khoulaki, C. Cârloganu, S. Chang, A. Khan, D. H. Kim, D. J. Kong, Y. D. Oh , et al. (127 additional authors not shown)

    Abstract: A detailed study of hadronic interactions is presented using data recorded with the highly granular CALICE silicon-tungsten electromagnetic calorimeter. Approximately 350,000 selected negatively charged pion events at energies between 2 and 10 GeV have been studied. The predictions of several physics models available within the Geant4 simulation tool kit are compared to this data. A reasonable ove… ▽ More

    Submitted 8 May, 2015; v1 submitted 26 November, 2014; originally announced November 2014.

    Comments: 28 pages, 24 figures, accepted for publication in NIM A

    Journal ref: Nucl. Instrum. Meth. A 794: 240-254, 2015

  26. arXiv:1405.1891  [pdf, other

    cs.CR

    Privacy in the Genomic Era

    Authors: Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang

    Abstract: Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has… ▽ More

    Submitted 17 June, 2015; v1 submitted 8 May, 2014; originally announced May 2014.

    ACM Class: K.6.5

  27. arXiv:1404.6454  [pdf, other

    physics.ins-det hep-ex

    The Time Structure of Hadronic Showers in highly granular Calorimeters with Tungsten and Steel Absorbers

    Authors: C. Adloff, J. -J. Blaising, M. Chefdeville, C. Drancourt, R. Gaglione, N. Geffroy, Y. Karyotakis, I. Koletsou, J. Prast, G. Vouters J. Repond, J. Schlereth, L. Xia E. Baldolemar, J. Li, S. T. Park, M. Sosebee, A. P. White, J. Yu, G. Eigen, M. A. Thomson, D. R. Ward, D. Benchekroun, A. Hoummada, Y. Khoulaki J. Apostolakis, S. Arfaoui, M. Benoit , et al. (188 additional authors not shown)

    Abstract: The intrinsic time structure of hadronic showers influences the timing capability and the required integration time of hadronic calorimeters in particle physics experiments, and depends on the active medium and on the absorber of the calorimeter. With the CALICE T3B experiment, a setup of 15 small plastic scintillator tiles read out with Silicon Photomultipliers, the time structure of showers is m… ▽ More

    Submitted 21 July, 2014; v1 submitted 25 April, 2014; originally announced April 2014.

    Comments: 24 pages including author list, 9 figures, published in JINST

    Report number: MPP-2014-147

    Journal ref: JINST 9 (2014) P07022

  28. Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware

    Authors: Michael LeMay, Carl A. Gunter

    Abstract: Mobile devices are in roles where the integrity and confidentiality of their apps and data are of paramount importance. They usually contain a System-on-Chip (SoC), which integrates microprocessors and peripheral Intellectual Property (IP) connected by a Network-on-Chip (NoC). Malicious IP or software could compromise critical data. Some types of attacks can be blocked by controlling data transfer… ▽ More

    Submitted 16 January, 2017; v1 submitted 14 April, 2014; originally announced April 2014.

    Comments: 33 pages, 6 figures

    Journal ref: Logic, Rewriting, and Concurrency. Aug. 2015. Springer International Publishing

  29. arXiv:1311.3761  [pdf, ps, other

    physics.ins-det hep-ex

    Performance of the first prototype of the CALICE scintillator strip electromagnetic calorimeter

    Authors: CALICE Collaboration, K. Francis, J. Repond, J. Schlereth, J. Smith, L. Xia, E. Baldolemar, J. Li, S. T. Park, M. Sosebee, A. P. White, J. Yu, G. Eigen, Y. Mikami, N. K. Watson, M. A. Thomson, D. R. Ward, D. Benchekroun, A. Hoummada, Y. Khoulaki, J. Apostolakis, A. Dotti, G. Folger, V. Ivantchenko, A. Ribon , et al. (169 additional authors not shown)

    Abstract: A first prototype of a scintillator strip-based electromagnetic calorimeter was built, consisting of 26 layers of tungsten absorber plates interleaved with planes of 45x10x3 mm3 plastic scintillator strips. Data were collected using a positron test beam at DESY with momenta between 1 and 6 GeV/c. The prototype's performance is presented in terms of the linearity and resolution of the energy measur… ▽ More

    Submitted 11 June, 2014; v1 submitted 15 November, 2013; originally announced November 2013.

    Journal ref: Nuclear Inst. and Methods in Physics Research, A (2014), pp. 278-289

  30. Shower development of particles with momenta from 1 to 10 GeV in the CALICE Scintillator-Tungsten HCAL

    Authors: C. Adloff, J. -J. Blaising, M. Chefdeville, C. Drancourt, R. Gaglione, N. Geffroy, Y. Karyotakis, I. Koletsou, J. Prast, G. Vouters, J. Repond, J. Schlereth, J. Smith, L. Xia, E. Baldolemar, J. Li, S. T. Park, M. Sosebee, A. P. White, J. Yu, G. Eigen, M. A. Thomson, D. R. Ward, D. Benchekroun, A. Hoummada , et al. (194 additional authors not shown)

    Abstract: Lepton colliders are considered as options to complement and to extend the physics programme at the Large Hadron Collider. The Compact Linear Collider (CLIC) is an $e^+e^-$ collider under development aiming at centre-of-mass energies of up to 3 TeV. For experiments at CLIC, a hadron sampling calorimeter with tungsten absorber is proposed. Such a calorimeter provides sufficient depth to contain hig… ▽ More

    Submitted 13 January, 2014; v1 submitted 14 November, 2013; originally announced November 2013.

    Comments: 28 pages, 23 figures, 3 tables

    Journal ref: JINST 9 P01004 January 2014

  31. arXiv:1306.3037  [pdf, ps, other

    physics.ins-det hep-ex

    Validation of GEANT4 Monte Carlo Models with a Highly Granular Scintillator-Steel Hadron Calorimeter

    Authors: C. Adloff, J. Blaha, J. -J. Blaising, C. Drancourt, A. Espargilière, R. Gaglione, N. Geffroy, Y. Karyotakis, J. Prast, G. Vouters, K. Francis, J. Repond, J. Schlereth, J. Smith, L. Xia, E. Baldolemar, J. Li, S. T. Park, M. Sosebee, A. P. White, J. Yu, T. Buanes, G. Eigen, Y. Mikami, N. K. Watson , et al. (148 additional authors not shown)

    Abstract: Calorimeters with a high granularity are a fundamental requirement of the Particle Flow paradigm. This paper focuses on the prototype of a hadron calorimeter with analog readout, consisting of thirty-eight scintillator layers alternating with steel absorber planes. The scintillator plates are finely segmented into tiles individually read out via Silicon Photomultipliers. The presented results are… ▽ More

    Submitted 15 June, 2014; v1 submitted 13 June, 2013; originally announced June 2013.

    Journal ref: JINST 8 P07005 2013

  32. arXiv:1305.7027  [pdf, other

    physics.ins-det hep-ex

    Track segments in hadronic showers in a highly granular scintillator-steel hadron calorimeter

    Authors: CALICE Collaboration, C. Adloff, J. -J. Blaising, M. Chefdeville, C. Drancourt, R. Gaglione, N. Geffroy, Y. Karyotakis, I. Koletsou, J. Prast, G. Vouters, K. Francis, J. Repond, J. Schlereth, J. Smith, L. Xia, E. Baldolemar, J. Li, S. T. Park, M. Sosebee, A. P. White, J. Yu, G. Eigen, Y. Mikami, N. K. Watson , et al. (184 additional authors not shown)

    Abstract: We investigate the three dimensional substructure of hadronic showers in the CALICE scintillator-steel hadronic calorimeter. The high granularity of the detector is used to find track segments of minimum ionising particles within hadronic showers, providing sensitivity to the spatial structure and the details of secondary particle production in hadronic cascades. The multiplicity, length and angul… ▽ More

    Submitted 29 July, 2013; v1 submitted 30 May, 2013; originally announced May 2013.

    Comments: 27 pages, 17 figures, accepted for publication in JINST

    Report number: MPP-2013-143

  33. arXiv:1207.4210  [pdf, other

    physics.ins-det hep-ex

    Hadronic energy resolution of a highly granular scintillator-steel hadron calorimeter using software compensation techniques

    Authors: CALICE Collaboration, C. Adloff, J. Blaha, J. -J. Blaising, C. Drancourt, A. Espargilière, R. Gaglione, N. Geffroy, Y. Karyotakis, J. Prast, G. Vouters, K. Francis, J. Repond, J. Smith, L. Xia, E. Baldolemar, J. Li, S. T. Park, M. Sosebee, A. P. White, J. Yu, T. Buanes, G. Eigen, Y. Mikami, N. K. Watson , et al. (142 additional authors not shown)

    Abstract: The energy resolution of a highly granular 1 m3 analogue scintillator-steel hadronic calorimeter is studied using charged pions with energies from 10 GeV to 80 GeV at the CERN SPS. The energy resolution for single hadrons is determined to be approximately 58%/sqrt(E/GeV}. This resolution is improved to approximately 45%/sqrt(E/GeV) with software compensation techniques. These techniques take advan… ▽ More

    Submitted 27 September, 2012; v1 submitted 17 July, 2012; originally announced July 2012.

    Comments: 26 pages, 14 figures

    Report number: MPP-2012-116

    Journal ref: JINST 7 P09017 (2012)

  34. Electromagnetic response of a highly granular hadronic calorimeter

    Authors: C. Adloff, J. Blaha, J. -J. Blaising, C. Drancourt, A. Espargilière, R. Gaglione, N. Geffroy, Y. Karyotakis, J. Prast, G. Vouters, K. Francis, J. Repond, J. Smith, L. Xia, E. Baldolemar, J. Li, S. T. Park, M. Sosebee, A. P. White, J. Yu, Y. Mikami, N. K. Watson T. Goto, G. Mavromanolakis, M. A. Thomson, D. R. Ward W. Yan , et al. (142 additional authors not shown)

    Abstract: The CALICE collaboration is studying the design of high performance electromagnetic and hadronic calorimeters for future International Linear Collider detectors. For the hadronic calorimeter, one option is a highly granular sampling calorimeter with steel as absorber and scintillator layers as active material. High granularity is obtained by segmenting the scintillator into small tiles individuall… ▽ More

    Submitted 8 June, 2011; v1 submitted 20 December, 2010; originally announced December 2010.

    Report number: DESY 10-241

    Journal ref: JINST 6 (2011) P04003