-
Puppy: A Publicly Verifiable Watermarking Protocol
Authors:
Devriş İşler,
Seoyeon Hwang,
Yoshimichi Nakatsuka,
Nikolaos Laoutaris,
Gene Tsudik
Abstract:
In this paper, we propose Puppy, the first formally defined framework for converting any symmetric watermarking into a publicly verifiable one. Puppy allows anyone to verify a watermark any number of times with the help of an untrusted third party, without requiring owner presence during detection. We formally define and prove security of Puppy using the ideal/real-world simulation paradigm and co…
▽ More
In this paper, we propose Puppy, the first formally defined framework for converting any symmetric watermarking into a publicly verifiable one. Puppy allows anyone to verify a watermark any number of times with the help of an untrusted third party, without requiring owner presence during detection. We formally define and prove security of Puppy using the ideal/real-world simulation paradigm and construct two practical and secure instances: (1) Puppy-TEE that uses Trusted Execution Environments (TEEs), and (2) Puppy-2PC that relies on two-party computation (2PC) based on garbled circuits. We then convert four current symmetric watermarking schemes into publicly verifiable ones and run extensive experiments using Puppy-TEE and Puppy-2PC. Evaluation results show that, while Puppy-TEE incurs some overhead, its total latency is on the order of milliseconds for three out of four watermarking schemes. Although the overhead of Puppy-2PC is higher (on the order of seconds), it is viable for settings that lack a TEE or where strong trust assumptions about a TEE need to be avoided. We further optimize the solution to increase its scalability and resilience to denial of service attacks via memoization.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
Scrappy: SeCure Rate Assuring Protocol with PrivacY
Authors:
Kosei Akama,
Yoshimichi Nakatsuka,
Masaaki Sato,
Keisuke Uehara
Abstract:
Preventing abusive activities caused by adversaries accessing online services at a rate exceeding that expected by websites has become an ever-increasing problem. CAPTCHAs and SMS authentication are widely used to provide a solution by implementing rate limiting, although they are becoming less effective, and some are considered privacy-invasive. In light of this, many studies have proposed better…
▽ More
Preventing abusive activities caused by adversaries accessing online services at a rate exceeding that expected by websites has become an ever-increasing problem. CAPTCHAs and SMS authentication are widely used to provide a solution by implementing rate limiting, although they are becoming less effective, and some are considered privacy-invasive. In light of this, many studies have proposed better rate-limiting systems that protect the privacy of legitimate users while blocking malicious actors. However, they suffer from one or more shortcomings: (1) assume trust in the underlying hardware and (2) are vulnerable to side-channel attacks. Motivated by the aforementioned issues, this paper proposes Scrappy: SeCure Rate Assuring Protocol with PrivacY. Scrappy allows clients to generate unforgeable yet unlinkable rate-assuring proofs, which provides the server with cryptographic guarantees that the client is not misbehaving. We design Scrappy using a combination of DAA and hardware security devices. Scrappy is implemented over three types of devices, including one that can immediately be deployed in the real world. Our baseline evaluation shows that the end-to-end latency of Scrappy is minimal, taking only 0.32 seconds, and uses only 679 bytes of bandwidth when transferring necessary data. We also conduct an extensive security evaluation, showing that the rate-limiting capability of Scrappy is unaffected even if the hardware security device is compromised.
△ Less
Submitted 1 December, 2023;
originally announced December 2023.
-
An Empirical Study & Evaluation of Modern CAPTCHAs
Authors:
Andrew Searles,
Yoshimichi Nakatsuka,
Ercan Ozturk,
Andrew Paverd,
Gene Tsudik,
Ai Enkoji
Abstract:
For nearly two decades, CAPTCHAs have been widely used as a means of protection against bots. Throughout the years, as their use grew, techniques to defeat or bypass CAPTCHAs have continued to improve. Meanwhile, CAPTCHAs have also evolved in terms of sophistication and diversity, becoming increasingly difficult to solve for both bots (machines) and humans. Given this long-standing and still-ongoi…
▽ More
For nearly two decades, CAPTCHAs have been widely used as a means of protection against bots. Throughout the years, as their use grew, techniques to defeat or bypass CAPTCHAs have continued to improve. Meanwhile, CAPTCHAs have also evolved in terms of sophistication and diversity, becoming increasingly difficult to solve for both bots (machines) and humans. Given this long-standing and still-ongoing arms race, it is critical to investigate how long it takes legitimate users to solve modern CAPTCHAs, and how they are perceived by those users.
In this work, we explore CAPTCHAs in the wild by evaluating users' solving performance and perceptions of unmodified currently-deployed CAPTCHAs. We obtain this data through manual inspection of popular websites and user studies in which 1,400 participants collectively solved 14,000 CAPTCHAs. Results show significant differences between the most popular types of CAPTCHAs: surprisingly, solving time and user perception are not always correlated. We performed a comparative study to investigate the effect of experimental context -- specifically the difference between solving CAPTCHAs directly versus solving them as part of a more natural task, such as account creation. Whilst there were several potential confounding factors, our results show that experimental context could have an impact on this task, and must be taken into account in future CAPTCHA studies. Finally, we investigate CAPTCHA-induced user task abandonment by analyzing participants who start and do not complete the task.
△ Less
Submitted 22 July, 2023;
originally announced July 2023.
-
CTR: Checkpoint, Transfer, and Restore for Secure Enclaves
Authors:
Yoshimichi Nakatsuka,
Ercan Ozturk,
Alex Shamis,
Andrew Paverd,
Peter Pietzuch
Abstract:
Hardware-based Trusted Execution Environments (TEEs) are becoming increasingly prevalent in cloud computing, forming the basis for confidential computing. However, the security goals of TEEs sometimes conflict with existing cloud functionality, such as VM or process migration, because TEE memory cannot be read by the hypervisor, OS, or other software on the platform. Whilst some newer TEE architec…
▽ More
Hardware-based Trusted Execution Environments (TEEs) are becoming increasingly prevalent in cloud computing, forming the basis for confidential computing. However, the security goals of TEEs sometimes conflict with existing cloud functionality, such as VM or process migration, because TEE memory cannot be read by the hypervisor, OS, or other software on the platform. Whilst some newer TEE architectures support migration of entire protected VMs, there is currently no practical solution for migrating individual processes containing in-process TEEs. The inability to migrate such processes leads to operational inefficiencies or even data loss if the host platform must be urgently restarted.
We present CTR, a software-only design to retrofit migration functionality into existing TEE architectures, whilst maintaining their expected security guarantees. Our design allows TEEs to be interrupted and migrated at arbitrary points in their execution, thus maintaining compatibility with existing VM and process migration techniques. By cooperatively involving the TEE in the migration process, our design also allows application developers to specify stateful migration-related policies, such as limiting the number of times a particular TEE may be migrated. Our prototype implementation for Intel SGX demonstrates that migration latency increases linearly with the size of the TEE memory and is dominated by TEE system operations.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
Vronicle: A System for Producing Videos with Verifiable Provenance
Authors:
Yuxin,
Liu,
Yoshimichi Nakatsuka,
Ardalan Amiri Sani,
Sharad Agarwal,
Gene Tsudik
Abstract:
Demonstrating the veracity of videos is a longstanding problem that has recently become more urgent and acute. It is extremely hard to accurately detect manipulated videos using content analysis, especially in the face of subtle, yet effective, manipulations, such as frame rate changes or skin tone adjustments. One prominent alternative to content analysis is to securely embed provenance informati…
▽ More
Demonstrating the veracity of videos is a longstanding problem that has recently become more urgent and acute. It is extremely hard to accurately detect manipulated videos using content analysis, especially in the face of subtle, yet effective, manipulations, such as frame rate changes or skin tone adjustments. One prominent alternative to content analysis is to securely embed provenance information into videos. However, prior approaches have poor performance and/or granularity that is too coarse. To this end, we construct Vronicle -- a video provenance system that offers fine-grained provenance information and substantially better performance. It allows a video consumer to authenticate the camera that originated the video and the exact sequence of video filters that were subsequently applied to it. Vronicle exploits the increasing popularity and availability of Trusted Execution Environments (TEEs) on many types of computing platforms.
One contribution of Vronicle is the design of provenance information that allows the consumer to verify various aspects of the video, thereby defeating numerous fake-video creation methods. Vronicle's adversarial model allows for a powerful adversary that can manipulate the video (e.g., in transit) and the software state outside the TEE. Another contribution is the use of fixed-function Intel SGX enclaves to post-process videos. This design facilitates verification of provenance information.
We present a prototype implementation of Vronicle (to be open sourced), which relies on current technologies, making it readily deployable. Our evaluation demonstrates that Vronicle's performance is well-suited for offline use-cases.
△ Less
Submitted 26 September, 2021;
originally announced September 2021.
-
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests
Authors:
Scott Jordan,
Yoshimichi Nakatsuka,
Ercan Ozturk,
Andrew Paverd,
Gene Tsudik
Abstract:
Recent data protection regulations (such as GDPR and CCPA) grant consumers various rights, including the right to access, modify or delete any personal information collected about them (and retained) by a service provider. To exercise these rights, one must submit a verifiable consumer request proving that the collected data indeed pertains to them. This action is straightforward for consumers wit…
▽ More
Recent data protection regulations (such as GDPR and CCPA) grant consumers various rights, including the right to access, modify or delete any personal information collected about them (and retained) by a service provider. To exercise these rights, one must submit a verifiable consumer request proving that the collected data indeed pertains to them. This action is straightforward for consumers with active accounts with a service provider at the time of data collection, since they can use standard (e.g., password-based) means of authentication to validate their requests. However, a major conundrum arises from the need to support consumers without accounts to exercise their rights. To this end, some service providers began requiring such accountless consumers to reveal and prove their identities (e.g., using government-issued documents, utility bills, or credit card numbers) as part of issuing a verifiable consumer request. While understandable as a short-term cure, this approach is cumbersome and expensive for service providers as well as privacy-invasive for consumers. Consequently, there is a strong need to provide better means of authenticating requests from accountless consumers. To achieve this, we propose VICEROY, a privacy-preserving and scalable framework for producing proofs of data ownership, which form a basis for verifiable consumer requests. Building upon existing web techniques and features, VICEROY allows accountless consumers to interact with service providers, and later prove that they are the same person in a privacy-preserving manner, while requiring minimal changes for both parties. We design and implement VICEROY with emphasis on security/privacy, deployability and usability. We also thoroughly assess its practicality via extensive experiments.
△ Less
Submitted 21 October, 2022; v1 submitted 14 May, 2021;
originally announced May 2021.
-
CACTI: Captcha Avoidance via Client-side TEE Integration
Authors:
Yoshimichi Nakatsuka,
Ercan Ozturk,
Andrew Paverd,
Gene Tsudik
Abstract:
Preventing abuse of web services by bots is an increasingly important problem, as abusive activities grow in both volume and variety. CAPTCHAs are the most common way for thwarting bot activities. However, they are often ineffective against bots and frustrating for humans. In addition, some recent CAPTCHA techniques diminish user privacy. Meanwhile, client-side Trusted Execution Environments (TEEs…
▽ More
Preventing abuse of web services by bots is an increasingly important problem, as abusive activities grow in both volume and variety. CAPTCHAs are the most common way for thwarting bot activities. However, they are often ineffective against bots and frustrating for humans. In addition, some recent CAPTCHA techniques diminish user privacy. Meanwhile, client-side Trusted Execution Environments (TEEs) are becoming increasingly widespread (notably, ARM TrustZone and Intel SGX), allowing establishment of trust in a small part (trust anchor or TCB) of client-side hardware. This prompts the question: can a TEE help reduce (or remove entirely) user burden of solving CAPTCHAs?
In this paper, we design CACTI: CAPTCHA Avoidance via Client-side TEE Integration. Using client-side TEEs, CACTI allows legitimate clients to generate unforgeable rate-proofs demonstrating how frequently they have performed specific actions. These rate-proofs can be sent to web servers in lieu of solving CAPTCHAs. CACTI provides strong client privacy guarantees, since the information is only sent to the visited website and authenticated using a group signature scheme. Our evaluations show that overall latency of generating and verifying a CACTI rate-proof is less than 0.25 sec, while CACTI's bandwidth overhead is over 98% lower than that of current CAPTCHA systems.
△ Less
Submitted 20 July, 2020;
originally announced July 2020.
-
PDoT: Private DNS-over-TLS with TEE Support
Authors:
Yoshimichi Nakatsuka,
Andrew Paverd,
Gene Tsudik
Abstract:
Security and privacy of the Internet Domain Name System (DNS) have been longstanding concerns. Recently, there is a trend to protect DNS traffic using Transport Layer Security (TLS). However, at least two major issues remain: (1) how do clients authenticate DNS-over-TLS endpoints in a scalable and extensible manner; and (2) how can clients trust endpoints to behave as expected? In this paper, we p…
▽ More
Security and privacy of the Internet Domain Name System (DNS) have been longstanding concerns. Recently, there is a trend to protect DNS traffic using Transport Layer Security (TLS). However, at least two major issues remain: (1) how do clients authenticate DNS-over-TLS endpoints in a scalable and extensible manner; and (2) how can clients trust endpoints to behave as expected? In this paper, we propose a novel Private DNS-over-TLS (PDoT ) architecture. PDoT includes a DNS Recursive Resolver (RecRes) that operates within a Trusted Execution Environment (TEE). Using Remote Attestation, DNS clients can authenticate, and receive strong assurance of trustworthiness of PDoT RecRes. We provide an open-source proof-of-concept implementation of PDoT and use it to experimentally demonstrate that its latency and throughput match that of the popular Unbound DNS-over-TLS resolver.
△ Less
Submitted 25 September, 2019;
originally announced September 2019.
-
First demonstration of emulsion multi-stage shifter for accelerator neutrino experiment in J-PARC T60
Authors:
K. Yamada,
S. Aoki,
S. Cao,
N. Chikuma,
T. Fukuda,
Y. Fukuzawa,
M. Gonin,
T. Hayashino,
Y. Hayato,
A. Hiramoto,
F. Hosomi,
K. Ishiguro,
S. Iori,
T. Inoh,
H. Kawahara,
H. Kim,
N. Kitagawa,
T. Koga,
R. Komatani,
M. Komatsu,
A. Matsushita,
S. Mikado,
A. Minamino,
H. Mizusawa,
K. Morishima
, et al. (25 additional authors not shown)
Abstract:
We describe the first ever implementation of an emulsion multi-stage shifter in an accelerator neutrino experiment. The system was installed in the neutrino monitor building in J-PARC as a part of a test experiment T60 and stable operation was maintained for a total of 126.6 days. By applying time information to emulsion films, various results were obtained. Time resolutions of 5.3 to 14.7 s were…
▽ More
We describe the first ever implementation of an emulsion multi-stage shifter in an accelerator neutrino experiment. The system was installed in the neutrino monitor building in J-PARC as a part of a test experiment T60 and stable operation was maintained for a total of 126.6 days. By applying time information to emulsion films, various results were obtained. Time resolutions of 5.3 to 14.7 s were evaluated in an operation spanning 46.9 days (time resolved numbers of 3.8--1.4$\times10^{5}$). By using timing and spatial information, a reconstruction of coincident events that consisted of high multiplicity events and vertex events, including neutrino events was performed. Emulsion events were matched to events observed by INGRID, one of near detectors of the T2K experiment, with high reliability (98.5\%) and hybrid analysis was established via use of the multi-stage shifter. The results demonstrate that the multi-stage shifter is feasible for use in neutrino experiments.
△ Less
Submitted 12 March, 2017; v1 submitted 10 March, 2017;
originally announced March 2017.
-
First neutrino event detection with nuclear emulsion at J-PARC neutrino beamline
Authors:
T. Fukuda,
S. Aoki,
S. Cao,
N. Chikuma,
Y. Fukuzawa,
M. Gonin,
T. Hayashino,
Y. Hayato,
A. Hiramoto,
F. Hosomi,
K. Ishiguro,
S. Iori,
T. Inoh,
H. Kawahara,
H. Kim,
N. Kitagawa,
T. Koga,
R. Komatani,
M. Komatsu,
A. Matsushita,
S. Mikado,
A. Minamino,
H. Mizusawa,
K. Morishima,
T. Matsuo
, et al. (25 additional authors not shown)
Abstract:
Precise neutrino--nucleus interaction measurements in the sub-multi GeV region are important to reduce the systematic uncertainty in future neutrino oscillation experiments. Furthermore, the excess of ${ν_e}$ interactions, as a possible interpretation of the existence of a sterile neutrino has been observed in such an energy region. The nuclear emulsion technique can measure all the final state pa…
▽ More
Precise neutrino--nucleus interaction measurements in the sub-multi GeV region are important to reduce the systematic uncertainty in future neutrino oscillation experiments. Furthermore, the excess of ${ν_e}$ interactions, as a possible interpretation of the existence of a sterile neutrino has been observed in such an energy region. The nuclear emulsion technique can measure all the final state particles with low energy threshold for a variety of targets (Fe, C, H${_2}$O, and so on). Its sub-$μ$m position resolution allows measurements of the ${ν_e}$ cross-section with good electron/gamma separation capability. We started a new experiment at J-PARC to study sub-multi GeV neutrino interactions by introducing the nuclear emulsion technique. The J-PARC T60 experiment has been implemented as a first step of such a project. Systematic neutrino event analysis with full scanning data in the nuclear emulsion detector was performed for the first time. The first neutrino event detection and its analysis is described in this paper.
△ Less
Submitted 17 May, 2017; v1 submitted 10 March, 2017;
originally announced March 2017.
-
Discovery of tau neutrino appearance in the CNGS neutrino beam with the OPERA experiment
Authors:
OPERA Collaboration,
N. Agafonova,
A. Aleksandrov,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
D. Bender,
A. Bertolin,
I. Bodnarchuk,
C. Bozza,
R. Brugnera,
A. Buonaura,
S. Buontempo,
B. Büttner,
M. Chernyavsky,
A. Chukanov,
L. Consiglio,
N. D'Ambrosio,
G. De Lellis,
M. De Serio,
P. Del Amo Sanchez,
A. Di Crescenzo,
D. Di Ferdinando,
N. Di Marco
, et al. (117 additional authors not shown)
Abstract:
The OPERA experiment was designed to search for $ν_μ \rightarrow ν_τ$ oscillations in appearance mode, i.e. by detecting the $τ$-leptons produced in charged current $ν_τ$ interactions. The experiment took data from 2008 to 2012 in the CERN Neutrinos to Gran Sasso beam. The observation of $ν_μ \rightarrow ν_τ$ appearance, achieved with four candidate events in a sub-sample of the data, was previous…
▽ More
The OPERA experiment was designed to search for $ν_μ \rightarrow ν_τ$ oscillations in appearance mode, i.e. by detecting the $τ$-leptons produced in charged current $ν_τ$ interactions. The experiment took data from 2008 to 2012 in the CERN Neutrinos to Gran Sasso beam. The observation of $ν_μ \rightarrow ν_τ$ appearance, achieved with four candidate events in a sub-sample of the data, was previously reported. In this paper, a fifth $ν_τ$ candidate event, found in an enlarged data sample, is described. Together with a further reduction of the expected background, the candidate events detected so far allow assessing the discovery of $ν_μ\rightarrow ν_τ$ oscillations in appearance mode with a significance larger than 5 $σ$.
△ Less
Submitted 2 November, 2015; v1 submitted 6 July, 2015;
originally announced July 2015.
-
Limits on muon-neutrino to tau-neutrino oscillations induced by a sterile neutrino state obtained by OPERA at the CNGS beam
Authors:
OPERA Collaboration,
N. Agafonova,
A. Aleksandrov,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
D. Bender,
A. Bertolin,
I. Bodnarchuk,
C. Bozza,
R. Brugnera,
A. Buonaura,
S. Buontempo,
B. Büttner,
M. Chernyavsky,
A. Chukanov,
L. Consiglio,
N. D'Ambrosio,
G. De Lellis,
M. De Serio,
P. Del Amo Sanchez,
A. Di Crescenzo,
D. Di Ferdinando,
N. Di Marco
, et al. (106 additional authors not shown)
Abstract:
The OPERA experiment, exposed to the CERN to Gran Sasso $ν_μ$ beam, collected data from 2008 to 2012. Four oscillated $ν_τ$ Charged Current interaction candidates have been detected in appearance mode, which are consistent with $ν_μ\to ν_τ$ oscillations at the atmospheric $Δm^2$ within the "standard" three-neutrino framework. In this paper, the OPERA $ν_τ$ appearance results are used to derive lim…
▽ More
The OPERA experiment, exposed to the CERN to Gran Sasso $ν_μ$ beam, collected data from 2008 to 2012. Four oscillated $ν_τ$ Charged Current interaction candidates have been detected in appearance mode, which are consistent with $ν_μ\to ν_τ$ oscillations at the atmospheric $Δm^2$ within the "standard" three-neutrino framework. In this paper, the OPERA $ν_τ$ appearance results are used to derive limits on the mixing parameters of a massive sterile neutrino.
△ Less
Submitted 14 March, 2015; v1 submitted 6 March, 2015;
originally announced March 2015.
-
Observation of nu_tau appearance in the CNGS beam with the OPERA experiment
Authors:
OPERA Collaboration,
N. Agafonova,
A. Aleksandrov,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
T. Asada,
D. Bender,
A. Bertolin,
C. Bozza,
R. Brugnera,
A. Buonaura,
S. Buontempo,
B. Buttne,
M. Chernyavsky,
A. Chukanov,
L. Consiglio,
N. D'Ambrosio,
G. De Lellis,
M. De Serio,
P. Del Amo Sanchez,
A. Di Crescenzo,
D. Di Ferdinando,
N. Di Marco
, et al. (123 additional authors not shown)
Abstract:
The OPERA experiment is searching for nu_mu -> nu_tau oscillations in appearance mode i.e. via the direct detection of tau leptons in nu_tau charged current interactions. The evidence of nu_mu -> nu_tau appearance has been previously reported with three nu_tau candidate events using a sub-sample of data from the 2008-2012 runs. We report here a fourth nu_tau candidate event, with the tau decaying…
▽ More
The OPERA experiment is searching for nu_mu -> nu_tau oscillations in appearance mode i.e. via the direct detection of tau leptons in nu_tau charged current interactions. The evidence of nu_mu -> nu_tau appearance has been previously reported with three nu_tau candidate events using a sub-sample of data from the 2008-2012 runs. We report here a fourth nu_tau candidate event, with the tau decaying into a hadron, found after adding the 2012 run events without any muon in the final state to the data sample. Given the number of analysed events and the low background, nu_mu -> nu_tau oscillations are established with a significance of 4.2sigma.
△ Less
Submitted 27 August, 2014; v1 submitted 13 July, 2014;
originally announced July 2014.
-
Determination of the muon charge sign with the dipolar spectrometers of the OPERA experiment
Authors:
OPERA Collaboration,
N. Agafonova,
A. Aleksandrov,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
D. Bender,
A. Bertolin,
C. Bozza,
R. Brugnera,
A. Buonaura,
S. Buontempo,
B. Büttner,
M. Chernyavsky,
A. Chukanov,
L. Consiglio,
N. D'Ambrosio,
G. De Lellis,
M. De Serio,
P. Del Amo Sanchez,
A. Di Crescenzo,
D. Di Ferdinando,
N. Di Marco,
S. Dmitrievski
, et al. (119 additional authors not shown)
Abstract:
The OPERA long-baseline neutrino-oscillation experiment has observed the direct appearance of $ν_τ$ in the CNGS $ν_μ$ beam. Two large muon magnetic spectrometers are used to identify muons produced in the $τ$ leptonic decay and in $ν_μ^{CC}$ interactions by measuring their charge and momentum. Besides the kinematic analysis of the $τ$ decays, background resulting from the decay of charmed particle…
▽ More
The OPERA long-baseline neutrino-oscillation experiment has observed the direct appearance of $ν_τ$ in the CNGS $ν_μ$ beam. Two large muon magnetic spectrometers are used to identify muons produced in the $τ$ leptonic decay and in $ν_μ^{CC}$ interactions by measuring their charge and momentum. Besides the kinematic analysis of the $τ$ decays, background resulting from the decay of charmed particles produced in $ν_μ^{CC}$ interactions is reduced by efficiently identifying the muon track. A new method for the charge sign determination has been applied, via a weighted angular matching of the straight track-segments reconstructed in the different parts of the dipole magnets. Results obtained for Monte Carlo and real data are presented. Comparison with a method where no matching is used shows a significant reduction of up to 40\% of the fraction of wrongly determined charges.
△ Less
Submitted 29 April, 2016; v1 submitted 23 April, 2014;
originally announced April 2014.
-
Procedure for short-lived particle detection in the OPERA experiment and its application to charm decays
Authors:
N. Agafonova,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
D. Bender,
A. Bertolin,
C. Bozza,
R. Brugnera,
A. Buonaura,
S. Buontempo,
B. Buttner,
M. Chernyavsky,
A. Chukanov,
L. Consiglio,
N. D'Ambrosio,
G. De Lellis,
M. De Serio,
P. Del Amo Sanchez,
A. Di Crescenzo,
D. Di Ferdinando,
N. Di Marco,
S. Dmitrievski,
M. Dracos,
D. Duchesneau
, et al. (113 additional authors not shown)
Abstract:
The OPERA experiment, designed to perform the first observation of $ν_μ\rightarrow ν_τ$ oscillations in appearance mode through the detection of the $τ$ leptons produced in $ν_τ$ charged current interactions, has collected data from 2008 to 2012. In the present paper, the procedure developed to detect $τ$ particle decays, occurring over distances of the order of 1 mm from the neutrino interaction…
▽ More
The OPERA experiment, designed to perform the first observation of $ν_μ\rightarrow ν_τ$ oscillations in appearance mode through the detection of the $τ$ leptons produced in $ν_τ$ charged current interactions, has collected data from 2008 to 2012. In the present paper, the procedure developed to detect $τ$ particle decays, occurring over distances of the order of 1 mm from the neutrino interaction point, is described in detail. The results of its application to the search for charmed hadrons are then presented as a validation of the methods for $ν_τ$ appearance detection.
△ Less
Submitted 16 April, 2014;
originally announced April 2014.
-
Measurement of TeV atmospheric muon charge ratio with the full OPERA data
Authors:
N. Agafonova,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
D. Bender,
A. Bertolin,
C. Bozza,
R. Brugnera,
A. Buonaura,
S. Buontempo,
B. Buettner,
M. Chernyavsky,
A. Chukanov,
L. Consiglio,
N. D'Ambrosio,
G. De Lellis,
M. De Serio,
P. Del Amo Sanchez,
A. Di Crescenzo,
D. Di Ferdinando,
N. Di Marco,
S. Dmitrievski,
M. Dracos,
D. Duchesneau
, et al. (112 additional authors not shown)
Abstract:
The OPERA detector, designed to search for $ν_μ \to ν_τ$ oscillations in the CNGS beam, is located in the underground Gran Sasso laboratory, a privileged location to study TeV-scale cosmic rays. For the analysis here presented, the detector was used to measure the atmospheric muon charge ratio in the TeV region. OPERA collected charge-separated cosmic ray data between 2008 and 2012. More than 3 mi…
▽ More
The OPERA detector, designed to search for $ν_μ \to ν_τ$ oscillations in the CNGS beam, is located in the underground Gran Sasso laboratory, a privileged location to study TeV-scale cosmic rays. For the analysis here presented, the detector was used to measure the atmospheric muon charge ratio in the TeV region. OPERA collected charge-separated cosmic ray data between 2008 and 2012. More than 3 million atmospheric muon events were detected and reconstructed, among which about 110000 multiple muon bundles. The charge ratio $R_μ \equiv N_{μ^+}/N_{μ^-}$ was measured separately for single and for multiple muon events. The analysis exploited the inversion of the magnet polarity which was performed on purpose during the 2012 Run. The combination of the two data sets with opposite magnet polarities allowed minimizing systematic uncertainties and reaching an accurate determination of the muon charge ratio. Data were fitted to obtain relevant parameters on the composition of primary cosmic rays and the associated kaon production in the forward fragmentation region. In the surface energy range 1-20 TeV investigated by OPERA, $R_μ$ is well described by a parametric model including only pion and kaon contributions to the muon flux, showing no significant contribution of the prompt component. The energy independence supports the validity of Feynman scaling in the fragmentation region up to $200$ TeV/nucleon primary energy.
△ Less
Submitted 2 March, 2014;
originally announced March 2014.
-
Evidence for $ν_μ\to ν_τ$ appearance in the CNGS neutrino beam with the OPERA experiment
Authors:
N. Agafonova,
A. Aleksandrov,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
T. Asada,
D. Autiero,
A. Ben Dhahbi,
A. Badertscher,
D. Bender,
A. Bertolin,
C. Bozza,
R. Brugnera,
F. Brunet,
G. Brunetti,
A. Buonaura,
S. Buontempo,
B. Buettner,
L. Chaussard,
M. Chernyavsky,
V. Chiarella,
A. Chukanov,
L. Consiglio,
N. D'Ambrosio
, et al. (146 additional authors not shown)
Abstract:
The OPERA experiment is designed to search for $ν_μ \rightarrow ν_τ$ oscillations in appearance mode i.e. through the direct observation of the $τ$ lepton in $ν_τ$ charged current interactions. The experiment has taken data for five years, since 2008, with the CERN Neutrino to Gran Sasso beam. Previously, two $ν_τ$ candidates with a $τ$ decaying into hadrons were observed in a sub-sample of data o…
▽ More
The OPERA experiment is designed to search for $ν_μ \rightarrow ν_τ$ oscillations in appearance mode i.e. through the direct observation of the $τ$ lepton in $ν_τ$ charged current interactions. The experiment has taken data for five years, since 2008, with the CERN Neutrino to Gran Sasso beam. Previously, two $ν_τ$ candidates with a $τ$ decaying into hadrons were observed in a sub-sample of data of the 2008-2011 runs. Here we report the observation of a third $ν_τ$ candidate in the $τ^-\toμ^-$ decay channel coming from the analysis of a sub-sample of the 2012 run. Taking into account the estimated background, the absence of $ν_μ \rightarrow ν_τ$ oscillations is excluded at the 3.4 $σ$ level.
△ Less
Submitted 9 January, 2014;
originally announced January 2014.
-
New results on $ν_μ\to ν_τ$ appearance with the OPERA experiment in the CNGS beam
Authors:
OPERA Collaboration,
N. Agafonova,
A. Aleksandrov,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
T. Asada,
D. Autiero,
A. Badertscher,
A. Ben Dhahbi,
D. Bender,
A. Bertolin,
C. Bozza,
R. Brugnera,
G. Brunetti,
B. Buettner,
S. Buontempo,
L. Chaussard,
M. Chernyavskiy,
V. Chiarella,
A. Chukanov,
L. Consiglio,
N. D'Ambrosio,
P. Del Amo Sanchez
, et al. (145 additional authors not shown)
Abstract:
The OPERA neutrino experiment is designed to perform the first observation of neutrino oscillations in direct appearance mode in the $ν_μ\to ν_τ$ channel, via the detection of the $τ$-leptons created in charged current $ν_τ$ interactions. The detector, located in the underground Gran Sasso Laboratory, consists of an emulsion/lead target with an average mass of about 1.2 kt, complemented by electro…
▽ More
The OPERA neutrino experiment is designed to perform the first observation of neutrino oscillations in direct appearance mode in the $ν_μ\to ν_τ$ channel, via the detection of the $τ$-leptons created in charged current $ν_τ$ interactions. The detector, located in the underground Gran Sasso Laboratory, consists of an emulsion/lead target with an average mass of about 1.2 kt, complemented by electronic detectors. It is exposed to the CERN Neutrinos to Gran Sasso beam, with a baseline of 730 km and a mean energy of 17 GeV. The observation of the first $ν_τ$ candidate event and the analysis of the 2008-2009 neutrino sample have been reported in previous publications. This work describes substantial improvements in the analysis and in the evaluation of the detection efficiencies and backgrounds using new simulation tools. The analysis is extended to a sub-sample of 2010 and 2011 data, resulting from an electronic detector-based pre-selection, in which an additional $ν_τ$ candidate has been observed. The significance of the two events in terms of a $ν_μ\to ν_τ$ oscillation signal is of 2.40 $σ$.
△ Less
Submitted 12 August, 2013;
originally announced August 2013.
-
Search for $ν_μ\rightarrow ν_e$ oscillations with the OPERA experiment in the CNGS beam
Authors:
OPERA collaboration,
N. Agafonova,
A. Aleksandrov,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
D. Autiero,
A. Badertscher,
A. Ben Dhahbi,
A. Bertolin,
C. Bozza,
R. Brugnera,
F. Brunet,
G. Brunetti,
B. Buettner,
S. Buontempo,
L. Chaussard,
M. Chernyavsky,
V. Chiarella,
A. Chukanov,
L. Consiglio,
N. D'Ambrosio,
G. De Lellis,
M. De Serio
, et al. (139 additional authors not shown)
Abstract:
A first result of the search for \numu $\rightarrow$ \nue oscillations in the OPERA experiment, located at the Gran Sasso Underground Laboratory, is presented. The experiment looked for the appearance of \nue in the CNGS neutrino beam using the data collected in 2008 and 2009. Data are compatible with the non-oscillation hypothesis in the three-flavour mixing model. A further analysis of the same…
▽ More
A first result of the search for \numu $\rightarrow$ \nue oscillations in the OPERA experiment, located at the Gran Sasso Underground Laboratory, is presented. The experiment looked for the appearance of \nue in the CNGS neutrino beam using the data collected in 2008 and 2009. Data are compatible with the non-oscillation hypothesis in the three-flavour mixing model. A further analysis of the same data constrains the non-standard oscillation parameters $θ_{new}$ and $Δm^2_{new}$ suggested by the LSND and MiniBooNE experiments. For large $Δm^{2}_{new}$ values ($>$0.1 eV$^{2}$), the OPERA 90% C.L. upper limit on sin$^{2}(2θ_{new})$ based on a Bayesian statistical method reaches the value $7.2 \times 10^{-3}$.
△ Less
Submitted 26 July, 2013; v1 submitted 16 March, 2013;
originally announced March 2013.
-
Measurement of the neutrino velocity with the OPERA detector in the CNGS beam using the 2012 dedicated data
Authors:
The OPERA Collaboration,
T. Adam,
N. Agafonova,
A. Aleksandrov,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
D. Autiero,
A. Badertscher,
A. Ben Dhahbi,
M. Beretta,
A. Bertolin,
C. Bozza,
T. Brugière,
R. Brugnera,
F. Brunet,
G. Brunetti,
B. Buettner,
S. Buontempo,
B. Carlus,
F. Cavanna,
A. Cazes,
L. Chaussard,
M. Chernyavsky
, et al. (146 additional authors not shown)
Abstract:
In spring 2012 CERN provided two weeks of a short bunch proton beam dedicated to the neutrino velocity measurement over a distance of 730 km. The OPERA neutrino experiment at the underground Gran Sasso Laboratory used an upgraded setup compared to the 2011 measurements, improving the measurement time accuracy. An independent timing system based on the Resistive Plate Chambers was exploited providi…
▽ More
In spring 2012 CERN provided two weeks of a short bunch proton beam dedicated to the neutrino velocity measurement over a distance of 730 km. The OPERA neutrino experiment at the underground Gran Sasso Laboratory used an upgraded setup compared to the 2011 measurements, improving the measurement time accuracy. An independent timing system based on the Resistive Plate Chambers was exploited providing a time accuracy of $\sim$1 ns. Neutrino and anti-neutrino contributions were separated using the information provided by the OPERA magnetic spectrometers. The new analysis profited from the precision geodesy measurements of the neutrino baseline and of the CNGS/LNGS clock synchronization. The neutrino arrival time with respect to the one computed assuming the speed of light in vacuum is found to be $δt_ν\equiv TOF_c - TOF_ν= (0.6 \pm 0.4\ (stat.) \pm 3.0\ (syst.))$ ns and $δt_{\barν} \equiv TOF_c - TOF_{\barν} = (1.7 \pm 1.4\ (stat.) \pm 3.1\ (syst.))$ ns for $ν_μ$ and $\barν_μ$, respectively. This corresponds to a limit on the muon neutrino velocity with respect to the speed of light of $-1.8 \times 10^{-6} < (v_ν-c)/c < 2.3 \times 10^{-6}$ at 90% C.L. This new measurement confirms with higher accuracy the revised OPERA result.
△ Less
Submitted 17 December, 2012; v1 submitted 6 December, 2012;
originally announced December 2012.
-
Measurement of the neutrino velocity with the OPERA detector in the CNGS beam
Authors:
The OPERA Collaboration,
T. Adam,
N. Agafonova,
A. Aleksandrov,
O. Altinok,
P. Alvarez Sanchez,
A. Anokhina,
S. Aoki,
A. Ariga,
T. Ariga,
D. Autiero,
A. Badertscher,
A. Ben Dhahbi,
A. Bertolin,
C. Bozza,
T. Brugiere,
R. Brugnera,
F. Brunet,
G. Brunetti,
S. Buontempo,
B. Carlus,
F. Cavanna,
A. Cazes,
L. Chaussard,
M. Chernyavsky
, et al. (166 additional authors not shown)
Abstract:
The OPERA neutrino experiment at the underground Gran Sasso Laboratory has measured the velocity of neutrinos from the CERN CNGS beam over a baseline of about 730 km. The measurement is based on data taken by OPERA in the years 2009, 2010 and 2011. Dedicated upgrades of the CNGS timing system and of the OPERA detector, as well as a high precision geodesy campaign for the measurement of the neutrin…
▽ More
The OPERA neutrino experiment at the underground Gran Sasso Laboratory has measured the velocity of neutrinos from the CERN CNGS beam over a baseline of about 730 km. The measurement is based on data taken by OPERA in the years 2009, 2010 and 2011. Dedicated upgrades of the CNGS timing system and of the OPERA detector, as well as a high precision geodesy campaign for the measurement of the neutrino baseline, allowed reaching comparable systematic and statistical accuracies. An arrival time of CNGS muon neutrinos with respect to the one computed assuming the speed of light in vacuum of (6.5 +/- 7.4(stat.)((+8.3)(-8.0)sys.))ns was measured corresponding to a relative difference of the muon neutrino velocity with respect to the speed of light (v-c)/c =(2.7 +/-3.1(stat.)((+3.4)(-3.3)(sys.))x10^(-6). The above result, obtained by comparing the time distributions of neutrino interactions and of protons hitting the CNGS target in 10.5 microseconds long extractions, was confirmed by a test performed at the end of 2011 using a short bunch beam allowing to measure the neutrino time of flight at the single interaction level.
△ Less
Submitted 12 July, 2012; v1 submitted 22 September, 2011;
originally announced September 2011.