-
Frequency measurements of $5s5p^{3}$P$_{0}\to5s6d^{3}$D$_{1}$ and observation of nonlinearities in King plot with Sr
Authors:
S. Zhang,
B. T. Tiwari,
S. Ganesh,
Y. Singh
Abstract:
We report the first precision measurement of the absolute frequency of $5s5p^{3}$P$_{0}\to5s6d^{3}$D$_{1}$ for all four stable Sr isotopes with an accuracy of $\sim$25 kHz employing repum** induced spectroscopy. By combining the isotope shifts of this transition with the existing measurement data on the intercombination line, the King plot is established which reveals a deviation from the linear…
▽ More
We report the first precision measurement of the absolute frequency of $5s5p^{3}$P$_{0}\to5s6d^{3}$D$_{1}$ for all four stable Sr isotopes with an accuracy of $\sim$25 kHz employing repum** induced spectroscopy. By combining the isotope shifts of this transition with the existing measurement data on the intercombination line, the King plot is established which reveals a deviation from the linearity at the 5.2$σ$ level.
△ Less
Submitted 22 June, 2023; v1 submitted 19 June, 2023;
originally announced June 2023.
-
Information Flow Control in Machine Learning through Modular Model Architecture
Authors:
Trishita Tiwari,
Suchin Gururangan,
Chuan Guo,
Weizhe Hua,
Sanjay Kariyappa,
Udit Gupta,
Wenjie Xiong,
Kiwan Maeng,
Hsien-Hsin S. Lee,
G. Edward Suh
Abstract:
In today's machine learning (ML) models, any part of the training data can affect the model output. This lack of control for information flow from training data to model output is a major obstacle in training models on sensitive data when access control only allows individual users to access a subset of data. To enable secure machine learning for access-controlled data, we propose the notion of in…
▽ More
In today's machine learning (ML) models, any part of the training data can affect the model output. This lack of control for information flow from training data to model output is a major obstacle in training models on sensitive data when access control only allows individual users to access a subset of data. To enable secure machine learning for access-controlled data, we propose the notion of information flow control for machine learning, and develop an extension to the Transformer language model architecture that strictly adheres to the IFC definition we propose. Our architecture controls information flow by limiting the influence of training data from each security domain to a single expert module, and only enables a subset of experts at inference time based on the access control policy.The evaluation using large text and code datasets show that our proposed parametric IFC architecture has minimal (1.9%) performance overhead and can significantly improve model accuracy (by 38% for the text dataset, and between 44%--62% for the code datasets) by enabling training on access-controlled data.
△ Less
Submitted 2 July, 2024; v1 submitted 5 June, 2023;
originally announced June 2023.
-
A modified quasi-classical analysis to capture the effects of strong interaction in open QED lattices
Authors:
Tarush Tiwari,
Kuldeep K Shrivastava,
Dibyendu Roy,
Rajeev Singh
Abstract:
We investigate the role of optical nonlinearity in light propagation through two different one-dimensional open QED lattices, namely a chain of qubits with direct coupling between the nearest neighbors and a chain of connected resonators to each of which a qubit is side-coupled. Using the more accurate truncated Heisenberg-Langevin equations method we show a reduction of light transmission with in…
▽ More
We investigate the role of optical nonlinearity in light propagation through two different one-dimensional open QED lattices, namely a chain of qubits with direct coupling between the nearest neighbors and a chain of connected resonators to each of which a qubit is side-coupled. Using the more accurate truncated Heisenberg-Langevin equations method we show a reduction of light transmission with increasing intensity in these lattices due to effective photon-photon interactions and related photon blockade mediated by nonlinearity in qubits. In contrast to the direct-coupled qubits, we find a revival in the light transmission in the side-coupled qubits at relatively higher intensities due to saturation of qubits by photons. We find that in absence of bulk dissipation the standard quasi-classical analysis fails to capture the reduction in light transmission due to effective photon-photon interaction. We then devise a systemic method to modify the quasi-classical analysis to give much better results.
△ Less
Submitted 21 February, 2024; v1 submitted 28 October, 2020;
originally announced October 2020.
-
Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies
Authors:
Julissa Milligan,
Sarah Scheffler,
Andrew Sellars,
Trishita Tiwari,
Ari Trachtenberg,
Mayank Varia
Abstract:
Recent developments in online tracking make it harder for individuals to detect and block trackers. Some sites have deployed indirect tracking methods, which attempt to uniquely identify a device by asking the browser to perform a seemingly-unrelated task. One type of indirect tracking, Canvas fingerprinting, causes the browser to render a graphic recording rendering statistics as a unique identif…
▽ More
Recent developments in online tracking make it harder for individuals to detect and block trackers. Some sites have deployed indirect tracking methods, which attempt to uniquely identify a device by asking the browser to perform a seemingly-unrelated task. One type of indirect tracking, Canvas fingerprinting, causes the browser to render a graphic recording rendering statistics as a unique identifier. In this work, we observe how indirect device fingerprinting methods are disclosed in privacy policies, and consider whether the disclosures are sufficient to enable website visitors to block the tracking methods. We compare these disclosures to the disclosure of direct fingerprinting methods on the same websites.
Our case study analyzes one indirect fingerprinting technique, Canvas fingerprinting. We use an existing automated detector of this fingerprinting technique to conservatively detect its use on Alexa Top 500 websites that cater to United States consumers, and we examine the privacy policies of the resulting 28 websites. Disclosures of indirect fingerprinting vary in specificity. None described the specific methods with enough granularity to know the website used Canvas fingerprinting. Conversely, many sites did provide enough detail about usage of direct fingerprinting methods to allow a website visitor to reliably detect and block those techniques.
We conclude that indirect fingerprinting methods are often difficult to detect and are not identified with specificity in privacy policies. This makes indirect fingerprinting more difficult to block, and therefore risks disturbing the tentative armistice between individuals and websites currently in place for direct fingerprinting. This paper illustrates differences in fingerprinting approaches, and explains why technologists, technology lawyers, and policymakers need to appreciate the challenges of indirect fingerprinting.
△ Less
Submitted 21 August, 2019;
originally announced August 2019.
-
Page Cache Attacks
Authors:
Daniel Gruss,
Erik Kraft,
Trishita Tiwari,
Michael Schwarz,
Ari Trachtenberg,
Jason Hennessey,
Alex Ionescu,
Anders Fogh
Abstract:
We present a new hardware-agnostic side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache. The page cache is a pure software cache that contains all disk-backed pages, including program binaries, shared libraries, and other files, and our attacks thus work across cores and CPUs. Our side-channel permits unprivileged…
▽ More
We present a new hardware-agnostic side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache. The page cache is a pure software cache that contains all disk-backed pages, including program binaries, shared libraries, and other files, and our attacks thus work across cores and CPUs. Our side-channel permits unprivileged monitoring of some memory accesses of other processes, with a spatial resolution of 4KB and a temporal resolution of 2 microseconds on Linux (restricted to 6.7 measurements per second) and 466 nanoseconds on Windows (restricted to 223 measurements per second); this is roughly the same order of magnitude as the current state-of-the-art cache attacks. We systematically analyze our side channel by demonstrating different local attacks, including a sandbox bypassing high-speed covert channel, timed user-interface redressing attacks, and an attack recovering automatically generated temporary passwords. We further show that we can trade off the side channel's hardware agnostic property for remote exploitability. We demonstrate this via a low profile remote covert channel that uses this page-cache side-channel to exfiltrate information from a malicious sender process through innocuous server requests. Finally, we propose mitigations for some of our attacks, which have been acknowledged by operating system vendors and slated for future security patches.
△ Less
Submitted 4 January, 2019;
originally announced January 2019.
-
Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns
Authors:
Mikhail Andreev,
Avi Klausner,
Trishita Tiwari,
Ari Trachtenberg,
Arkady Yerukhimovich
Abstract:
We evaluate the power of simple networks side-channels to violate user privacy on Android devices. Specifically, we show that, using blackbox network metadata alone (i.e., traffic statistics such as transmission time and size of packets) it is possible to infer several elements of a user's location and also identify their web browsing history (i.e, which sites they visited). We do this with relati…
▽ More
We evaluate the power of simple networks side-channels to violate user privacy on Android devices. Specifically, we show that, using blackbox network metadata alone (i.e., traffic statistics such as transmission time and size of packets) it is possible to infer several elements of a user's location and also identify their web browsing history (i.e, which sites they visited). We do this with relatively simple learning and classification methods and basic network statistics. For most Android phones currently on the market, such process-level traffic statistics are available for any running process, without any permissions control and at fine-grained details, although, as we demonstrate, even device-level statistics are sufficient for some of our attacks. In effect, it may be possible for any application running on these phones to identify privacy-revealing elements of a user's location, for example, correlating travel with places of worship, point-of-care medical establishments, or political activity.
△ Less
Submitted 7 July, 2018;
originally announced July 2018.
-
The Pierre Auger Observatory I: The Cosmic Ray Energy Spectrum and Related Measurements
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Studies of the cosmic ray energy spectrum at the highest energies with the Pierre Auger Observatory
Studies of the cosmic ray energy spectrum at the highest energies with the Pierre Auger Observatory
△ Less
Submitted 24 July, 2011;
originally announced July 2011.
-
The Pierre Auger Observatory V: Enhancements
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Ongoing and planned enhancements of the Pierre Auger Observatory
Ongoing and planned enhancements of the Pierre Auger Observatory
△ Less
Submitted 24 July, 2011;
originally announced July 2011.
-
The Pierre Auger Observatory IV: Operation and Monitoring
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Technical reports on operations and monitoring of the Pierre Auger Observatory
Technical reports on operations and monitoring of the Pierre Auger Observatory
△ Less
Submitted 24 July, 2011;
originally announced July 2011.
-
The Pierre Auger Observatory III: Other Astrophysical Observations
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Astrophysical observations of ultra-high-energy cosmic rays with the Pierre Auger Observatory
Astrophysical observations of ultra-high-energy cosmic rays with the Pierre Auger Observatory
△ Less
Submitted 24 July, 2011;
originally announced July 2011.
-
The Pierre Auger Observatory II: Studies of Cosmic Ray Composition and Hadronic Interaction models
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Studies of the composition of the highest energy cosmic rays with the Pierre Auger Observatory, including examination of hadronic physics effects on the structure of extensive air showers.
Studies of the composition of the highest energy cosmic rays with the Pierre Auger Observatory, including examination of hadronic physics effects on the structure of extensive air showers.
△ Less
Submitted 24 July, 2011;
originally announced July 2011.