-
That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications
Authors:
Carter Slocum,
Yicheng Zhang,
Erfan Shayegani,
Pedram Zaree,
Nael Abu-Ghazaleh,
Jiasi Chen
Abstract:
Augmented Reality (AR) is expected to become a pervasive component in enabling shared virtual experiences. In order to facilitate collaboration among multiple users, it is crucial for multi-user AR applications to establish a consensus on the "shared state" of the virtual world and its augmentations, through which they interact within augmented reality spaces. Current methods to create and access…
▽ More
Augmented Reality (AR) is expected to become a pervasive component in enabling shared virtual experiences. In order to facilitate collaboration among multiple users, it is crucial for multi-user AR applications to establish a consensus on the "shared state" of the virtual world and its augmentations, through which they interact within augmented reality spaces. Current methods to create and access shared state collect sensor data from devices (e.g., camera images), process them, and integrate them into the shared state. However, this process introduces new vulnerabilities and opportunities for attacks. Maliciously writing false data to "poison" the shared state is a major concern for the security of the downstream victims that depend on it. Another type of vulnerability arises when reading the shared state; by providing false inputs, an attacker can view hologram augmentations at locations they are not allowed to access. In this work, we demonstrate a series of novel attacks on multiple AR frameworks with shared states, focusing on three publicly-accessible frameworks. We show that these frameworks, while using different underlying implementations, scopes, and mechanisms to read from and write to the shared state, have shared vulnerability to a unified threat model. Our evaluation of these state-of-art AR applications demonstrates reliable attacks both on updating and accessing shared state across the different systems. To defend against such threats, we discuss a number of potential mitigation strategies that can help enhance the security of multi-user AR applications.
△ Less
Submitted 8 March, 2024; v1 submitted 17 August, 2023;
originally announced August 2023.
-
The James Webb Space Telescope Mission
Authors:
Jonathan P. Gardner,
John C. Mather,
Randy Abbott,
James S. Abell,
Mark Abernathy,
Faith E. Abney,
John G. Abraham,
Roberto Abraham,
Yasin M. Abul-Huda,
Scott Acton,
Cynthia K. Adams,
Evan Adams,
David S. Adler,
Maarten Adriaensen,
Jonathan Albert Aguilar,
Mansoor Ahmed,
Nasif S. Ahmed,
Tanjira Ahmed,
Rüdeger Albat,
Loïc Albert,
Stacey Alberts,
David Aldridge,
Mary Marsha Allen,
Shaune S. Allen,
Martin Altenburg
, et al. (983 additional authors not shown)
Abstract:
Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least $4m$. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the $6.5m$ James Webb Space Telescope. A generation of astrono…
▽ More
Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least $4m$. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the $6.5m$ James Webb Space Telescope. A generation of astronomers will celebrate their accomplishments for the life of the mission, potentially as long as 20 years, and beyond. This report and the scientific discoveries that follow are extended thank-you notes to the 20,000 team members. The telescope is working perfectly, with much better image quality than expected. In this and accompanying papers, we give a brief history, describe the observatory, outline its objectives and current observing program, and discuss the inventions and people who made it possible. We cite detailed reports on the design and the measured performance on orbit.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
The Science Performance of JWST as Characterized in Commissioning
Authors:
Jane Rigby,
Marshall Perrin,
Michael McElwain,
Randy Kimble,
Scott Friedman,
Matt Lallo,
René Doyon,
Lee Feinberg,
Pierre Ferruit,
Alistair Glasse,
Marcia Rieke,
George Rieke,
Gillian Wright,
Chris Willott,
Knicole Colon,
Stefanie Milam,
Susan Neff,
Christopher Stark,
Jeff Valenti,
Jim Abell,
Faith Abney,
Yasin Abul-Huda,
D. Scott Acton,
Evan Adams,
David Adler
, et al. (601 additional authors not shown)
Abstract:
This paper characterizes the actual science performance of the James Webb Space Telescope (JWST), as determined from the six month commissioning period. We summarize the performance of the spacecraft, telescope, science instruments, and ground system, with an emphasis on differences from pre-launch expectations. Commissioning has made clear that JWST is fully capable of achieving the discoveries f…
▽ More
This paper characterizes the actual science performance of the James Webb Space Telescope (JWST), as determined from the six month commissioning period. We summarize the performance of the spacecraft, telescope, science instruments, and ground system, with an emphasis on differences from pre-launch expectations. Commissioning has made clear that JWST is fully capable of achieving the discoveries for which it was built. Moreover, almost across the board, the science performance of JWST is better than expected; in most cases, JWST will go deeper faster than expected. The telescope and instrument suite have demonstrated the sensitivity, stability, image quality, and spectral range that are necessary to transform our understanding of the cosmos through observations spanning from near-earth asteroids to the most distant galaxies.
△ Less
Submitted 10 April, 2023; v1 submitted 12 July, 2022;
originally announced July 2022.
-
Basic Concepts Involved in Tropical Cyclone Boundary Layer Shocks
Authors:
Wayne H. Schubert,
Christopher J. Slocum,
Richard K. Taft
Abstract:
This paper discusses some basic concepts that arise in the study of the tropical cyclone frictional boundary layer. Part I discusses the concepts of asymptotic triangular waves and asymptotic N-waves in the context of the nonlinear advection equation and Burgers' equation. Connections are made between triangular waves and single eyewalls, and between N-waves and double eyewalls. In Part II, analyt…
▽ More
This paper discusses some basic concepts that arise in the study of the tropical cyclone frictional boundary layer. Part I discusses the concepts of asymptotic triangular waves and asymptotic N-waves in the context of the nonlinear advection equation and Burgers' equation. Connections are made between triangular waves and single eyewalls, and between N-waves and double eyewalls. In Part II, analytical solutions of a line-symmetric, $f$-plane, slab model of the atmospheric boundary layer are presented. The boundary layer flow is forced by a specified pressure field and initialized with $u$ and $v$ fields that differ from the steady-state Ekman solution. With certain smooth initial conditions, discontinuities in $u$ and $v$ can be produced during the transient adjustment to the steady-state Ekman solution. Associated with these discontinuities in the horizontal wind components are singularities in the boundary layer pum** and the boundary layer vorticity, which can be either divergence-preferred or vorticity-preferred. These models serve as a prototype for understanding the role of the atmospheric boundary layer in the dynamics of primary and secondary eyewalls in tropical cyclones
△ Less
Submitted 31 August, 2017;
originally announced September 2017.
-
Pandeia: A Multi-mission Exposure Time Calculator for JWST and WFIRST
Authors:
Klaus M. Pontoppidan,
Timothy E. Pickering,
Victoria G. Laidler,
Karoline Gilbert,
Christopher D. Sontag,
Christine Slocum,
Mark J. Sienkiewicz,
Christopher Hanley,
Nicholas M. Earl,
Laurent Pueyo,
Swara Ravindranath,
Diane M. Karakla,
Massimo Robberto,
Alberto Noriega-Crespo,
Elizabeth A. Barker
Abstract:
Pandeia is the exposure time calculator (ETC) system developed for the James Webb Space Telescope (JWST) that will be used for creating JWST proposals. It includes a simulation-hybrid Python engine that calculates the two-dimensional pixel-by-pixel signal and noise properties of the JWST instruments. This allows for appropriate handling of realistic point spread functions, MULTIACCUM detector read…
▽ More
Pandeia is the exposure time calculator (ETC) system developed for the James Webb Space Telescope (JWST) that will be used for creating JWST proposals. It includes a simulation-hybrid Python engine that calculates the two-dimensional pixel-by-pixel signal and noise properties of the JWST instruments. This allows for appropriate handling of realistic point spread functions, MULTIACCUM detector readouts, correlated detector readnoise, and multiple photometric and spectral extraction strategies. Pandeia includes support for all the JWST observing modes, including imaging, slitted/slitless spectroscopy, integral field spectroscopy, and coronagraphy. Its highly modular, data-driven design makes it easily adaptable to other observatories. An implementation for use with WFIRST is also available.
△ Less
Submitted 21 March, 2018; v1 submitted 7 July, 2017;
originally announced July 2017.
-
Tropical cyclone boundary layer shocks
Authors:
Christopher J. Slocum,
Gabriel J. Williams,
Richard K. Taft,
Wayne H. Schubert
Abstract:
This paper presents numerical solutions and idealized analytical solutions of axisymmetric, $f$-plane models of the tropical cyclone boundary layer. In the numerical model, the boundary layer radial and tangential flow is forced by a specified pressure field, which can also be interpreted as a specified gradient balanced tangential wind field $v_{\rm gr}(r)$ or vorticity field $ζ_{\rm gr}(r)$. Whe…
▽ More
This paper presents numerical solutions and idealized analytical solutions of axisymmetric, $f$-plane models of the tropical cyclone boundary layer. In the numerical model, the boundary layer radial and tangential flow is forced by a specified pressure field, which can also be interpreted as a specified gradient balanced tangential wind field $v_{\rm gr}(r)$ or vorticity field $ζ_{\rm gr}(r)$. When the specified $ζ_{\rm gr}(r)$ field is changed from one that is radially concentrated in the inner core to one that is radially spread, the quasi-steady-state boundary layer flow transitions from a single eyewall shock-like structure to a double eyewall shock-like structure. To better understand these structures, analytical solutions are presented for two simplified versions of the model. In the simplified analytical models, which do not include horizontal diffusion, the $u(\partial u/\partial r)$ term in the radial equation of motion and the $u[f+(\partial v/\partial r)+(v/r)]$ term in the tangential equation of motion produce discontinuities in the radial and tangential wind, with associated singularities in the boundary layer pum** and the boundary layer vorticity. In the numerical model, which does include horizontal diffusion, the radial and tangential wind structures are not true discontinuities, but are shock-like, with wind changes of 20 or 30 m s$^{-1}$ over a radial distance of a few kilometers. When double shocks form, the outer shock can control the strength of the inner shock, an effect that likely plays an important role in concentric eyewall cycles.
△ Less
Submitted 30 May, 2014;
originally announced May 2014.