-
Behind the (Digital Crime) Scenes: An MSC Model
Authors:
Mario Raciti,
Giampaolo Bella
Abstract:
Criminal investigations are inherently complex as they typically involve interactions among various actors like investigators, prosecutors, and defendants. The pervasive integration of technology in daily life adds an extra layer of complexity, especially in crimes that involve a digital element. The establishment of digital forensics as a foundational discipline for extracting digital evidence fu…
▽ More
Criminal investigations are inherently complex as they typically involve interactions among various actors like investigators, prosecutors, and defendants. The pervasive integration of technology in daily life adds an extra layer of complexity, especially in crimes that involve a digital element. The establishment of digital forensics as a foundational discipline for extracting digital evidence further exacerbates the complex nature of criminal investigations, leading to the proliferation of multiple scenarios. Recognising the need to structure standard operating procedures for the handling of digital evidence, the representation of digital forensics as a protocol emerges as a valuable opportunity to identify security and privacy threats. In this paper, we delineate the protocols that compose digital forensics within a criminal case, formalise them as message sequence charts (MSCs), and identify their functional requirements.
△ Less
Submitted 24 March, 2024;
originally announced March 2024.
-
Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes
Authors:
Mario Raciti
Abstract:
The widespread integration of Internet of Things (IoT) devices in households generates extensive digital footprints, notably within Smart Home ecosystems. These IoT devices, brimming with data about residents, inadvertently offer insights into human activities, potentially embodying even criminal acts, such as a murder. As technology advances, so does the concern for criminals seeking to exploit v…
▽ More
The widespread integration of Internet of Things (IoT) devices in households generates extensive digital footprints, notably within Smart Home ecosystems. These IoT devices, brimming with data about residents, inadvertently offer insights into human activities, potentially embodying even criminal acts, such as a murder. As technology advances, so does the concern for criminals seeking to exploit various techniques to conceal evidence and evade investigations. This paper delineates the application of Anti-Digital Forensics (ADF) in Smart Home scenarios and recognises its potential to disrupt (digital) investigations. It does so by elucidating the current challenges and gaps and by arguing, in response, the conceptualisation of an ADF Kill Chain tailored to Smart Home ecosystems. While seemingly arming criminals, the Kill Chain will allow a better understanding of the distinctive peculiarities of Anti-Digital Forensics in Smart Home scenario. This understanding is essential for fortifying the Digital Forensics process and, in turn, develo** robust countermeasures against malicious activities.
△ Less
Submitted 23 December, 2023;
originally announced December 2023.
-
Up-to-date Threat Modelling for Soft Privacy on Smart Cars
Authors:
Mario Raciti,
Giampaolo Bella
Abstract:
Physical persons playing the role of car drivers consume data that is sourced from the Internet and, at the same time, themselves act as sources of relevant data. It follows that citizens' privacy is potentially at risk while they drive, hence the need to model privacy threats in this application domain. This paper addresses the privacy threats by updating a recent threat-modelling methodology and…
▽ More
Physical persons playing the role of car drivers consume data that is sourced from the Internet and, at the same time, themselves act as sources of relevant data. It follows that citizens' privacy is potentially at risk while they drive, hence the need to model privacy threats in this application domain. This paper addresses the privacy threats by updating a recent threat-modelling methodology and by tailoring it specifically to the soft privacy target property, which ensures citizens' full control on their personal data. The methodology now features the sources of documentation as an explicit variable that is to be considered. It is demonstrated by including a new version of the de-facto standard LINDDUN methodology as well as an additional source by ENISA which is found to be relevant to soft privacy. The main findings are a set of 23 domain-independent threats, 43 domain-specific assets and 525 domain-dependent threats for the target property in the automotive domain. While these exceed their previous versions, their main value is to offer self-evident support to at least two arguments. One is that LINDDUN has evolved much the way our original methodology already advocated because a few of our previously suggested extensions are no longer outstanding. The other one is that ENISA's treatment of privacy aboard smart cars should be extended considerably because our 525 threats fall in the same scope.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
A Threat Model for Soft Privacy on Smart Cars
Authors:
Mario Raciti,
Giampaolo Bella
Abstract:
Modern cars are getting so computerised that ENISA's phrase "smart cars" is a perfect fit. The amount of personal data that they process is very large and, yet, increasing. Hence, the need to address citizens' privacy while they drive and, correspondingly, the importance of privacy threat modelling (in support of a respective risk assessment, such as through a Data Protection Impact Assessment). T…
▽ More
Modern cars are getting so computerised that ENISA's phrase "smart cars" is a perfect fit. The amount of personal data that they process is very large and, yet, increasing. Hence, the need to address citizens' privacy while they drive and, correspondingly, the importance of privacy threat modelling (in support of a respective risk assessment, such as through a Data Protection Impact Assessment). This paper addresses privacy threats by advancing a general modelling methodology and by demonstrating it specifically on soft privacy, which ensures citizens' full control on their personal data. By considering all relevant threat agents, the paper applies the methodology to the specific automotive domain while kee** threats at the same level of detail as ENISA's. The main result beside the modelling methodology consists of both domain-independent and automotive domain-dependent soft privacy threats. While cybersecurity has been vastly threat-modelled so far, this paper extends the literature with a threat model for soft privacy on smart cars, producing 17 domain-independent threats that, associated with 41 domain-specific assets, shape a novel set of domain-dependent threats in automotive.
△ Less
Submitted 7 June, 2023;
originally announced June 2023.
-
How to Model Privacy Threats in the Automotive Domain
Authors:
Mario Raciti,
Giampaolo Bella
Abstract:
This paper questions how to approach threat modelling in the automotive domain at both an abstract level that features no domain-specific entities such as the CAN bus and, separately, at a detailed level. It addresses such questions by contributing a systematic method that is currently affected by the analyst's subjectivity because most of its inner operations are only defined informally. However,…
▽ More
This paper questions how to approach threat modelling in the automotive domain at both an abstract level that features no domain-specific entities such as the CAN bus and, separately, at a detailed level. It addresses such questions by contributing a systematic method that is currently affected by the analyst's subjectivity because most of its inner operations are only defined informally. However, this potential limitation is overcome when candidate threats are identified and left to everyone's scrutiny. The systematic method is demonstrated on the established LINDDUN threat modelling methodology with respect to 4 pivotal works on privacy threat modelling in automotive. As a result, 8 threats that the authors deem not representable in LINDDUN are identified and suggested as possible candidate extensions to LINDDUN. Also, 56 threats are identified providing a detailed, automotive-specific model of threats.
△ Less
Submitted 18 March, 2023;
originally announced March 2023.
-
AGN feedback in an infant galaxy cluster: the LOFAR-Chandra view of the giant FRII radio galaxy J103025+052430 at z=1.7
Authors:
M. Brienza,
R. Gilli,
I. Prandoni,
Q. D'Amato,
K. Rajpurohit,
F. Calura,
M. Chiaberge,
A. Comastri,
K. Iwasawa,
G. Lanzuisi,
E. Liuzzo,
S. Marchesi,
M. Mignoli,
G. Miley,
C. Norman,
A. Peca,
M. Raciti,
T. Shimwell,
P. Tozzi,
C. Vignali,
F. Vitello,
F. Vito
Abstract:
In the nearby universe jets from AGN are observed to have a dramatic impact on their surrounding extragalactic environment. Their effect at the `cosmic noon' (z>1.5), the epoch when star formation and AGN activity peak, is instead much less constrained. Here we present a study of the giant (750 kpc) radio galaxy 103025+052430 located at the centre of a protocluster at redshift z=1.7, with a focus…
▽ More
In the nearby universe jets from AGN are observed to have a dramatic impact on their surrounding extragalactic environment. Their effect at the `cosmic noon' (z>1.5), the epoch when star formation and AGN activity peak, is instead much less constrained. Here we present a study of the giant (750 kpc) radio galaxy 103025+052430 located at the centre of a protocluster at redshift z=1.7, with a focus on its interaction with the external medium. We present new LOFAR observations at 144 MHz, which we combine with VLA 1.4 GHz and 0.5-7 keV Chandra archival data. The new map at 144 MHz confirms that the source has a complex morphology, possibly consistent with the `hybrid morphology' classification. The large size of the source gave us the possibility to perform a resolved radio spectral index analysis, a very unique opportunity for a source at such high redshift. This reveals a tentative flattening of the radio spectral index at the edge of the backflow in the Western lobe, which might be indicating plasma compression. The spatial coincidence between this region and the thermal X-ray bubble C suggests a causal connection between the two. Contrary to previous estimates for the bright X-ray component A, we find that inverse Compton scattering between the radio-emitting plasma of the Eastern lobe and the CMB photons can account for a large fraction (~45%-80%) of its total 0.5-7 keV measured flux. Finally, the X-ray bubble C, which is consistent with a thermal origin, is found to be significantly overpressurised with respect to the ambient medium. This suggests that it will tend to expand and release its energy in the surroundings, contributing to the overall intracluster medium heating. Overall, 103025+052430 gives us the chance to investigate the interaction between AGN jets and the surrounding gas in a system that is likely the predecessor of the rich galaxy clusters we all well know at z=0.
△ Less
Submitted 24 February, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
The Gaia AVU-GSR parallel solver: preliminary studies of a LSQR-based application in perspective of exascale systems
Authors:
Valentina Cesare,
Ugo Becciani,
Alberto Vecchiato,
Mario Gilberto Lattanzi,
Fabio Pitari,
Mario Raciti,
Giuseppe Tudisco,
Marco Aldinucci,
Beatrice Bucciarelli
Abstract:
The Gaia Astrometric Verification Unit-Global Sphere Reconstruction (AVU-GSR) Parallel Solver aims to find the astrometric parameters for $\sim$10$^8$ stars in the Milky Way, the attitude and the instrumental specifications of the Gaia satellite, and the global parameter $γ$ of the post Newtonian formalism. The code iteratively solves a system of linear equations,…
▽ More
The Gaia Astrometric Verification Unit-Global Sphere Reconstruction (AVU-GSR) Parallel Solver aims to find the astrometric parameters for $\sim$10$^8$ stars in the Milky Way, the attitude and the instrumental specifications of the Gaia satellite, and the global parameter $γ$ of the post Newtonian formalism. The code iteratively solves a system of linear equations, $\mathbf{A} \times \vec{x} = \vec{b}$, where the coefficient matrix $\mathbf{A}$ is large ($\sim$$10^{11} \times 10^8$ elements) and sparse. To solve this system of equations, the code exploits a hybrid implementation of the iterative PC-LSQR algorithm, where the computation related to different horizontal portions of the coefficient matrix is assigned to separate MPI processes. In the original code, each matrix portion is further parallelized over the OpenMP threads. To further improve the code performance, we ported the application to the GPU, replacing the OpenMP parallelization language with OpenACC. In this port, $\sim$95% of the data is copied from the host to the device at the beginning of the entire cycle of iterations, making the code $compute$ $bound$ rather than $data$$-$$transfer$ $bound$. The OpenACC code presents a speedup of $\sim$1.5 over the OpenMP version but further optimizations are in progress to obtain higher gains. The code runs on multiple GPUs and it was tested on the CINECA supercomputer Marconi100, in anticipation of a port to the pre-exascale system Leonardo, that will be installed at CINECA in 2022.
△ Less
Submitted 22 December, 2022;
originally announced December 2022.
-
Astronomical source finding services for the CIRASA visual analytic platform
Authors:
S. Riggi,
C. Bordiu,
F. Vitello,
G. Tudisco,
E. Sciacca,
D. Magro,
R. Sortino,
C. Pino,
M. Molinaro,
M. Benedettini,
S. Leurini,
F. Bufano,
M. Raciti,
U. Becciani
Abstract:
Innovative developments in data processing, archiving, analysis, and visualization are nowadays unavoidable to deal with the data deluge expected in next-generation facilities for radio astronomy, such as the Square Kilometre Array (SKA) and its precursors. In this context, the integration of source extraction and analysis algorithms into data visualization tools could significantly improve and sp…
▽ More
Innovative developments in data processing, archiving, analysis, and visualization are nowadays unavoidable to deal with the data deluge expected in next-generation facilities for radio astronomy, such as the Square Kilometre Array (SKA) and its precursors. In this context, the integration of source extraction and analysis algorithms into data visualization tools could significantly improve and speed up the cataloguing process of large area surveys, boosting astronomer productivity and shortening publication time. To this aim, we are develo** a visual analytic platform (CIRASA) for advanced source finding and classification, integrating state-of-the-art tools, such as the CAESAR source finder, the ViaLactea Visual Analytic (VLVA) and Knowledge Base (VLKB). In this work, we present the project objectives and the platform architecture, focusing on the implemented source finding services.
△ Less
Submitted 18 October, 2021; v1 submitted 15 October, 2021;
originally announced October 2021.
-
The Monitoring, Logging, and Alarm system for the Cherenkov Telescope Array
Authors:
Alessandro Costa,
Kevin Munari,
Federico Incardona,
Pietro Bruno,
Stefano Germani,
Alessandro Grillo,
Igor Oya,
Eva Sciacca,
Ugo Becciani,
Mario Raciti
Abstract:
We present the current development of the Monitoring, Logging and Alarm subsystems in the framework of the Array Control and Data Acquisition System (ACADA) for the Cherenkov Telescope Array (CTA). The Monitoring System (MON) is the subsystem responsible for monitoring and logging the overall array (at each of the CTA sites) through the acquisition of monitoring and logging information from the ar…
▽ More
We present the current development of the Monitoring, Logging and Alarm subsystems in the framework of the Array Control and Data Acquisition System (ACADA) for the Cherenkov Telescope Array (CTA). The Monitoring System (MON) is the subsystem responsible for monitoring and logging the overall array (at each of the CTA sites) through the acquisition of monitoring and logging information from the array elements. The MON allows us to perform a systematic approach to fault detection and diagnosis supporting corrective and predictive maintenance to minimize the downtime of the system. We present a unified tool for monitoring data items from the telescopes and other devices deployed at the CTA array sites. Data are immediately available for the operator interface and quick-look quality checks and stored for later detailed inspection. The Array Alarm System (AAS) is the subsystem that provides the service that gathers, filters, exposes, and persists alarms raised by both the ACADA processes and the array elements supervised by the ACADA system. It collects alarms from the telescopes, the array calibration, the environmental monitoring instruments and the ACADA systems. The AAS sub-system also creates new alarms based on the analysis and correlation of the system software logs and the status of the system hardware providing the filter mechanisms for all the alarms. Data from the alarm system are then sent to the operator via the human-machine interface.
△ Less
Submitted 13 September, 2021;
originally announced September 2021.
-
Toward porting Astrophysics Visual Analytics Services to the European Open Science Cloud
Authors:
Eva Sciacca,
Fabio Vitello,
Ugo Becciani,
Cristobal Bordiu,
Filomena Bufano,
Antonio Calanducci,
Alessandro Costa,
Mario Raciti,
Simone Riggi
Abstract:
The European Open Science Cloud (EOSC) aims to create a federated environment for hosting and processing research data to support science in all disciplines without geographical boundaries, such that data, software, methods and publications can be shared as part of an Open Science community of practice. This work presents the ongoing activities related to the implementation of visual analytics ser…
▽ More
The European Open Science Cloud (EOSC) aims to create a federated environment for hosting and processing research data to support science in all disciplines without geographical boundaries, such that data, software, methods and publications can be shared as part of an Open Science community of practice. This work presents the ongoing activities related to the implementation of visual analytics services, integrated into EOSC, towards addressing the diverse astrophysics user communities needs. These services rely on visualisation to manage the data life cycle process under FAIR principles, integrating data processing for imaging and multidimensional map creation and mosaicing, and applying machine learning techniques for detection of structures in large scale multidimensional maps.
△ Less
Submitted 13 July, 2020;
originally announced July 2020.
-
On effective Chern-Simons Term induced by a Local CPT-Violating Coupling using $γ_5$ in Dimensional Regularization
Authors:
Ruggero Ferrari,
Mario Raciti
Abstract:
We resume a long-standing, yet not forgotten, debate on whether a Chern-Simons birefringence can be generated by a local term $b_μ\barψγ^μγ_5ψ$ in the Lagrangian (where $b_μ$ are constants). In the present paper we implement a new way of managing $γ_5$ in dimensional regularization. Gauge invariance in the underlying theory (QED) is enforced by this choice of defining divergent amplitudes. We inve…
▽ More
We resume a long-standing, yet not forgotten, debate on whether a Chern-Simons birefringence can be generated by a local term $b_μ\barψγ^μγ_5ψ$ in the Lagrangian (where $b_μ$ are constants). In the present paper we implement a new way of managing $γ_5$ in dimensional regularization. Gauge invariance in the underlying theory (QED) is enforced by this choice of defining divergent amplitudes. We investigate the singular behavior of the vector meson two-point-function around the $m^2=0$ and $p^2=0$ point. We find that the coefficient of the effective Chern-Simons can be finite or zero. It depends on how one takes the limits: they cannot be interchanged due to the associate change of symmetry. For $m^2=0$ we evaluate also the self-mass of the photon at the second orderin $b_μ$. We find zero.
△ Less
Submitted 15 October, 2015;
originally announced October 2015.
-
On the running coupling constant in QCD
Authors:
G. M. Prosperi,
M. Raciti,
C. Simolo
Abstract:
We try to review the main current ideas and points of view on the running coupling constant in QCD. We begin by recalling briefly the classic analysis based on the Renormalization Group with some emphasis on the exact solutions of the RG equation for a given number of loops, in comparison with the usual approximate expressions. We give particular attention to the problem of eliminating the unphy…
▽ More
We try to review the main current ideas and points of view on the running coupling constant in QCD. We begin by recalling briefly the classic analysis based on the Renormalization Group with some emphasis on the exact solutions of the RG equation for a given number of loops, in comparison with the usual approximate expressions. We give particular attention to the problem of eliminating the unphysical Landau singularities, and of defining a coupling that remains significant at the infrared scales. We consider various proposals of couplings directly related to the quark-antiquark potential or to other physical quantities (effective charges) and discuss optimization in the choice of the scale parameter and of the RS. Our main focus is, however, on dispersive methods, their application, their relation with non-perturbative effects. We try also to summarize the main results obtained by Lattice simulations in various MOM schemes. We conclude briefly recalling the traditional comparison with the experimental data.
△ Less
Submitted 12 October, 2006; v1 submitted 19 July, 2006;
originally announced July 2006.
-
Axial current in QED and semi-naive dimensional renormalization
Authors:
M. Pernici,
M. Raciti
Abstract:
We renormalize at two loops the axial current and $F \tilde{F}$ in massless QED, using the recently proposed semi-naive dimensional renormalization scheme. We show that the results are in agreement with those in the Breitenlohner-Maison-'t Hooft-Veltman scheme, previously obtained indirectly by making a three-loop computation.
We renormalize at two loops the axial current and $F \tilde{F}$ in massless QED, using the recently proposed semi-naive dimensional renormalization scheme. We show that the results are in agreement with those in the Breitenlohner-Maison-'t Hooft-Veltman scheme, previously obtained indirectly by making a three-loop computation.
△ Less
Submitted 20 April, 2000; v1 submitted 8 March, 2000;
originally announced March 2000.
-
Dimensional renormalization of Yukawa theories wia Wilsonian methods
Authors:
M. Pernici,
M. Raciti,
F. Riva
Abstract:
In the 't Hooft-Veltman dimensional regularization scheme it is necessary to introduce finite counterterms to satisfy chiral Ward identities. It is a non-trivial task to evaluate these counterterms even at two loops. We suggest the use of Wilsonian exact renormalization group techniques to reduce the computation of these counterterms to simple master integrals. We illustrate this method by a det…
▽ More
In the 't Hooft-Veltman dimensional regularization scheme it is necessary to introduce finite counterterms to satisfy chiral Ward identities. It is a non-trivial task to evaluate these counterterms even at two loops. We suggest the use of Wilsonian exact renormalization group techniques to reduce the computation of these counterterms to simple master integrals. We illustrate this method by a detailed study of a generic Yukawa model with massless fermions at two loops.
△ Less
Submitted 20 January, 2000; v1 submitted 24 December, 1999;
originally announced December 1999.
-
Hard-soft renormalization of the massless Wess-Zumino model
Authors:
M. Pernici,
M. Raciti,
F. Riva
Abstract:
We show that in a Wilsonian renormalization scheme with zero-momentum subtraction point the massless Wess-Zumino model satisfies the non-renormalization theorem; the finite renormalization of the superpotential appearing in the usual non-zero momentum subtraction schemes is thus avoided. We give an exact expression of the beta and gamma functions in terms of the Wilsonian effective action; we pr…
▽ More
We show that in a Wilsonian renormalization scheme with zero-momentum subtraction point the massless Wess-Zumino model satisfies the non-renormalization theorem; the finite renormalization of the superpotential appearing in the usual non-zero momentum subtraction schemes is thus avoided. We give an exact expression of the beta and gamma functions in terms of the Wilsonian effective action; we prove the expected relation $β= 3gγ$. We compute the beta function at the first two loops, finding agreement with previous results.
△ Less
Submitted 15 May, 1998;
originally announced May 1998.
-
Wilsonian Flow and Mass-Independent Renormalization
Authors:
M. Pernici,
M. Raciti
Abstract:
We derive the Gell-Mann and Low renormalization group equation in the Wilsonian approach to renormalization of massless $gφ^4$ in four dimensions, as a particular case of a non-linear equation satisfied at any scale by the Wilsonian effective action.
We give an exact expression for the $β$ and $γ_φ$ functions in terms of the Wilsonian effective action at the Wilsonian renormalization scale…
▽ More
We derive the Gell-Mann and Low renormalization group equation in the Wilsonian approach to renormalization of massless $gφ^4$ in four dimensions, as a particular case of a non-linear equation satisfied at any scale by the Wilsonian effective action.
We give an exact expression for the $β$ and $γ_φ$ functions in terms of the Wilsonian effective action at the Wilsonian renormalization scale $Ł_R$; at the first two loops they are simply related to the gradient of the flow of the relevant couplings and have the standard values; beyond two loops this relation is spoilt by corrections due to irrelevant couplings. We generalize this analysis to the case of massive $gφ^4$, introducing a mass-independent Wilsonian renormalization scheme; using the flow equation technique we prove renormalizability and we show that the limit of vanishing mass parameter exists. We derive the corresponding renormalization group equation, in which $β$ and $γ_φ$ are the same as in the massless case; $γ_m$ is also mass-independent; at one loop it is the gradient of a relevant coupling and it has the expected value.
△ Less
Submitted 25 March, 1998;
originally announced March 1998.
-
Hard-Soft Renormalization and the Exact Renormalization Group
Authors:
M. Pernici,
M. Raciti,
F. Riva
Abstract:
The Wilsonian exact renormalization group gives a natural framework in which ultraviolet and infrared divergences can be treated separately. In massless QED we introduce, as the only mass parameter, a renormalization scale $Ł_R > 0$. We prove, using the flow equation technique, that infrared convergence is a necessary consequence of any zero-momentum renormalization condition at $Ł_R$ compatible…
▽ More
The Wilsonian exact renormalization group gives a natural framework in which ultraviolet and infrared divergences can be treated separately. In massless QED we introduce, as the only mass parameter, a renormalization scale $Ł_R > 0$. We prove, using the flow equation technique, that infrared convergence is a necessary consequence of any zero-momentum renormalization condition at $Ł_R$ compatible with the effective Ward identities and axial symmetry. The same formalism is applied to renormalize gauge-invariant composite operators and to prove their infrared finiteness; in particular we consider the case of the axial current operator and its anomaly.
△ Less
Submitted 6 March, 1998; v1 submitted 17 October, 1997;
originally announced October 1997.
-
Renormalization of Matter Field Theories on the Lattice and the Flow Equation
Authors:
M. Pernici,
M. Raciti,
F. Riva
Abstract:
We give a new proof of the renormalizability of a class of matter field theories on a space-time lattice; in particular we consider $φ^4$ and massive Yukawa theories with Wilson fermions. We use the Polchinski approach to renormalization, which is based on the Wilson flow equation; this approach is substantially simpler than the BPHZ method, applied to the lattice by Reisz. We discuss matter the…
▽ More
We give a new proof of the renormalizability of a class of matter field theories on a space-time lattice; in particular we consider $φ^4$ and massive Yukawa theories with Wilson fermions. We use the Polchinski approach to renormalization, which is based on the Wilson flow equation; this approach is substantially simpler than the BPHZ method, applied to the lattice by Reisz. We discuss matter theories with staggered fermions. In particular we analyse a simple kind of staggered fermions with minimal doubling, using which we prove the renormalizability of a chiral sigma model with exact chiral symmetry on the lattice.
△ Less
Submitted 10 July, 1995;
originally announced July 1995.