-
Assessing the Effectiveness of Binary-Level CFI Techniques
Authors:
Ruturaj K. Vaidya,
Prasad A. Kulkarni
Abstract:
Memory corruption is an important class of vulnerability that can be leveraged to craft control flow hijacking attacks. Control Flow Integrity (CFI) provides protection against such attacks. Application of type-based CFI policies requires information regarding the number and type of function arguments. Binary-level type recovery is inherently speculative, which motivates the need for an evaluation…
▽ More
Memory corruption is an important class of vulnerability that can be leveraged to craft control flow hijacking attacks. Control Flow Integrity (CFI) provides protection against such attacks. Application of type-based CFI policies requires information regarding the number and type of function arguments. Binary-level type recovery is inherently speculative, which motivates the need for an evaluation framework to assess the effectiveness of binary-level CFI techniques compared with their source-level counterparts, where such type information is fully and accurately accessible. In this work, we develop a novel, generalized and extensible framework to assess how the program analysis information we get from state-of-the-art binary analysis tools affects the efficacy of type-based CFI techniques. We introduce new and insightful metrics to quantitatively compare source independent CFI policies with their ground truth source aware counterparts. We leverage our framework to evaluate binary-level CFI policies implemented using program analysis information extracted from the IDA Pro binary analyzer and compared with the ground truth information obtained from the LLVM compiler, and present our observations.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
Humans and language models diverge when predicting repeating text
Authors:
Aditya R. Vaidya,
Javier Turek,
Alexander G. Huth
Abstract:
Language models that are trained on the next-word prediction task have been shown to accurately model human behavior in word prediction and reading speed. In contrast with these findings, we present a scenario in which the performance of humans and LMs diverges. We collected a dataset of human next-word predictions for five stimuli that are formed by repeating spans of text. Human and GPT-2 LM pre…
▽ More
Language models that are trained on the next-word prediction task have been shown to accurately model human behavior in word prediction and reading speed. In contrast with these findings, we present a scenario in which the performance of humans and LMs diverges. We collected a dataset of human next-word predictions for five stimuli that are formed by repeating spans of text. Human and GPT-2 LM predictions are strongly aligned in the first presentation of a text span, but their performance quickly diverges when memory (or in-context learning) begins to play a role. We traced the cause of this divergence to specific attention heads in a middle layer. Adding a power-law recency bias to these attention heads yielded a model that performs much more similarly to humans. We hope that this scenario will spur future work in bringing LMs closer to human behavior.
△ Less
Submitted 22 October, 2023; v1 submitted 10 October, 2023;
originally announced October 2023.
-
SHIELD: An Adaptive and Lightweight Defense against the Remote Power Side-Channel Attacks on Multi-tenant FPGAs
Authors:
Mahya Morid Ahmadi,
Faiq Khalid,
Radha Vaidya,
Florian Kriebel,
Andreas Steininger,
Muhammad Shafique
Abstract:
Dynamic partial reconfiguration enables multi-tenancy in cloud-based FPGAs, which presents security challenges for tenants, IPs, and data. Malicious users can exploit FPGAs for remote side-channel attacks (SCAs), and shared on-chip resources can be used for attacks. Logical separation can ensure design integrity, but on-chip resources can still be exploited. Conventional SCA mitigation can help, b…
▽ More
Dynamic partial reconfiguration enables multi-tenancy in cloud-based FPGAs, which presents security challenges for tenants, IPs, and data. Malicious users can exploit FPGAs for remote side-channel attacks (SCAs), and shared on-chip resources can be used for attacks. Logical separation can ensure design integrity, but on-chip resources can still be exploited. Conventional SCA mitigation can help, but it requires significant effort, and bitstream checking techniques are not highly accurate. An active on-chip defense mechanism is needed for tenant confidentiality. Toward this, we propose a lightweight shielding technique utilizing ring oscillators (ROs) to protect applications against remote power SCA. Unlike existing RO-based approaches, in our methodology, an offline pre-processing stage is proposed to carefully configure power monitors and an obfuscating circuit concerning the resource constraints of the board. Detection of power fluctuations due to application execution enables the obfuscating circuit to flatten the power consumption trace. To evaluate the effectiveness of the proposed SHIELD, we implemented it on a Xilinx Zynq-7000 FPGA board executing an RSA encryption algorithm. Due to the SHIELD, the number of traces required to extract the encryption key is increased by 166x, making an attack extremely hard at run-time. Note that the proposed SHIELD does not require any modification in the target application. Our methodology also shows up to 54% less power consumption and up to 26% less area overhead than the state-of-the-art random noise-addition-based defense.
△ Less
Submitted 11 March, 2023;
originally announced March 2023.
-
Self-supervised models of audio effectively explain human cortical responses to speech
Authors:
Aditya R. Vaidya,
Shailee Jain,
Alexander G. Huth
Abstract:
Self-supervised language models are very effective at predicting high-level cortical responses during language comprehension. However, the best current models of lower-level auditory processing in the human brain rely on either hand-constructed acoustic filters or representations from supervised audio neural networks. In this work, we capitalize on the progress of self-supervised speech representa…
▽ More
Self-supervised language models are very effective at predicting high-level cortical responses during language comprehension. However, the best current models of lower-level auditory processing in the human brain rely on either hand-constructed acoustic filters or representations from supervised audio neural networks. In this work, we capitalize on the progress of self-supervised speech representation learning (SSL) to create new state-of-the-art models of the human auditory system. Compared against acoustic baselines, phonemic features, and supervised models, representations from the middle layers of self-supervised models (APC, wav2vec, wav2vec 2.0, and HuBERT) consistently yield the best prediction performance for fMRI recordings within the auditory cortex (AC). Brain areas involved in low-level auditory processing exhibit a preference for earlier SSL model layers, whereas higher-level semantic areas prefer later layers. We show that these trends are due to the models' ability to encode information at multiple linguistic levels (acoustic, phonetic, and lexical) along their representation depth. Overall, these results show that self-supervised models effectively capture the hierarchy of information relevant to different stages of speech processing in human cortex.
△ Less
Submitted 27 May, 2022;
originally announced May 2022.
-
Physically Plausible Pose Refinement using Fully Differentiable Forces
Authors:
Akarsh Kumar,
Aditya R. Vaidya,
Alexander G. Huth
Abstract:
All hand-object interaction is controlled by forces that the two bodies exert on each other, but little work has been done in modeling these underlying forces when doing pose and contact estimation from RGB/RGB-D data. Given the pose of the hand and object from any pose estimation system, we propose an end-to-end differentiable model that refines pose estimates by learning the forces experienced b…
▽ More
All hand-object interaction is controlled by forces that the two bodies exert on each other, but little work has been done in modeling these underlying forces when doing pose and contact estimation from RGB/RGB-D data. Given the pose of the hand and object from any pose estimation system, we propose an end-to-end differentiable model that refines pose estimates by learning the forces experienced by the object at each vertex in its mesh. By matching the learned net force to an estimate of net force based on finite differences of position, this model is able to find forces that accurately describe the movement of the object, while resolving issues like mesh interpenetration and lack of contact. Evaluating on the ContactPose dataset, we show this model successfully corrects poses and finds contact maps that better match the ground truth, despite not using any RGB or depth image data.
△ Less
Submitted 25 August, 2021; v1 submitted 17 May, 2021;
originally announced May 2021.
-
Electron correlation effects in the exchange coupling at the Fe/CoO/Ag(001) ferro-/antiferro-magnetic interface
Authors:
Marco Sbroscia,
Adriano Verna,
Giovanni Stefani,
Shital Ramchandra Vaidya,
Riccardo Moroni,
Francesco Bisio,
Stefano Iacobucci,
Francesco Offi,
Stefano Simonucci,
Alessandro Ruocco,
Roberto Gotter
Abstract:
Angle resolved-Auger-photoelectron coincidence spectroscopy (AR-APECS) has been exploited to investigate the role that electron correlation plays in the exchange-coupling at the ferromagnetic/antiferromagnetic interface of a Fe/CoO bilayer growth on Ag(001). The effective correlation energy U$_{\textrm{eff}}$, usually employed to assess the energy distribution of core-valence-valence Auger spectra…
▽ More
Angle resolved-Auger-photoelectron coincidence spectroscopy (AR-APECS) has been exploited to investigate the role that electron correlation plays in the exchange-coupling at the ferromagnetic/antiferromagnetic interface of a Fe/CoO bilayer growth on Ag(001). The effective correlation energy U$_{\textrm{eff}}$, usually employed to assess the energy distribution of core-valence-valence Auger spectra, has been experimentally determined for each possible combination of the orbital (e$_g$ or t$_{2g}$) and the spin (majority or minority) of the two valence electrons involved in the Auger decay. Coulomb and exchange interactions have been identified and compared with the result obtained on the Fe/Ag system. The presented analysis reveals in the Fe/CoO interface an enhancement of the Coulomb interaction for the e$_g$ orbital and of the exchange interaction for the t$_{2g}$ orbital with respect to the Fe/Ag case that can be associated to the stronger electron confinement and to the exchange coupling between the two layers, respectively.
△ Less
Submitted 14 September, 2020; v1 submitted 18 June, 2020;
originally announced June 2020.
-
Challenges and Thrills of Legal Arguments
Authors:
Anurag Pallaprolu,
Radha Vaidya,
Aditya Swaroop Attawar
Abstract:
State-of-the-art attention based models, mostly centered around the transformer architecture, solve the problem of sequence-to-sequence translation using the so-called scaled dot-product attention. While this technique is highly effective for estimating inter-token attention, it does not answer the question of inter-sequence attention when we deal with conversation-like scenarios. We propose an ex…
▽ More
State-of-the-art attention based models, mostly centered around the transformer architecture, solve the problem of sequence-to-sequence translation using the so-called scaled dot-product attention. While this technique is highly effective for estimating inter-token attention, it does not answer the question of inter-sequence attention when we deal with conversation-like scenarios. We propose an extension, HumBERT, that attempts to perform continuous contextual argument generation using locally trained transformers.
△ Less
Submitted 5 June, 2020;
originally announced June 2020.
-
Unexpectedly large electron correlation measured in Auger spectra of ferromagnetic iron thin films: orbital-selected Coulomb and exchange contributions
Authors:
R. Gotter,
A. Verna,
M. Sbroscia,
R. Moroni,
F. Bisio,
S. Iacobucci,
F. Offi,
S. R. Vaidya,
A. Ruocco,
G. Stefani
Abstract:
A set of electron-correlation energies as large as 10 eV have been measured for a magnetic 2ML Fefilm deposited on Ag(001). By exploiting the spin selectivity in angle-resolved Auger-photoelectroncoincidence spectroscopy and the Cini-Sawatzky theory, the core-valence-valence Auger spectrumof a spin-polarized system have been resolved: correlation energies have been determined for eachindividual co…
▽ More
A set of electron-correlation energies as large as 10 eV have been measured for a magnetic 2ML Fefilm deposited on Ag(001). By exploiting the spin selectivity in angle-resolved Auger-photoelectroncoincidence spectroscopy and the Cini-Sawatzky theory, the core-valence-valence Auger spectrumof a spin-polarized system have been resolved: correlation energies have been determined for eachindividual combination of the two holes created in the four sub-bands involved in the decay: majorityand minority spin, as well asegandt2g. The energy difference between final states with paralleland antiparallel spin of the two emitted electrons is ascribed to the spin-flip energy for the final ionstate, thus disentangling the contributions of Coulomb and exchange interactions.
△ Less
Submitted 13 May, 2020; v1 submitted 12 May, 2020;
originally announced May 2020.
-
SpellBound: Defending Against Package Typosquatting
Authors:
Matthew Taylor,
Ruturaj K. Vaidya,
Drew Davidson,
Lorenzo De Carli,
Vaibhav Rastogi
Abstract:
Package managers for software repositories based on a single programming language are very common. Examples include npm (JavaScript), and PyPI (Python). These tools encourage code reuse, making it trivial for developers to import external packages. Unfortunately, repositories' size and the ease with which packages can be published facilitates the practice of typosquatting: the uploading of a packa…
▽ More
Package managers for software repositories based on a single programming language are very common. Examples include npm (JavaScript), and PyPI (Python). These tools encourage code reuse, making it trivial for developers to import external packages. Unfortunately, repositories' size and the ease with which packages can be published facilitates the practice of typosquatting: the uploading of a package with name similar to that of a highly popular package, typically with the aim of capturing some of the popular package's installs. Typosquatting has serious negative implications, resulting in developers importing malicious packages, or -- as we show -- code clones which do not incorporate recent security updates. In order to tackle this problem, we present SpellBound, a tool for identifying and reporting potentially erroneous imports to developers. SpellBound implements a novel typosquatting detection technique, based on an in-depth analysis of npm and PyPI. Our technique leverages a model of lexical similarity between names, and further incorporates the notion of package popularity. This approach flags cases where unknown/scarcely used packages would be installed in place of popular ones with similar names, before installation occurs. We evaluated SpellBound on both npm and PyPI, with encouraging results: SpellBound flags typosquatting cases while generating limited warnings (0.5% of total package installs), and low overhead (only 2.5% of package install time). Furthermore, SpellBound allowed us to confirm known cases of typosquatting and discover one high-profile, unknown case of typosquatting that resulted in a package takedown by the npm security team.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
Security Issues in Language-based Software Ecosystems
Authors:
Ruturaj K. Vaidya,
Lorenzo De Carli,
Drew Davidson,
Vaibhav Rastogi
Abstract:
Language-based ecosystems (LBE), i.e., software ecosystems based on a single programming language, are very common. Examples include the npm ecosystem for JavaScript, and PyPI for Python. These environments encourage code reuse between packages, and incorporate utilities - package managers - for automatically resolving dependencies. However, the same aspects that make these systems popular - ease…
▽ More
Language-based ecosystems (LBE), i.e., software ecosystems based on a single programming language, are very common. Examples include the npm ecosystem for JavaScript, and PyPI for Python. These environments encourage code reuse between packages, and incorporate utilities - package managers - for automatically resolving dependencies. However, the same aspects that make these systems popular - ease of publishing code and importing external code - also create novel security issues, which have so far seen little study.
We present an a systematic study of security issues that plague LBEs. These issues are inherent to the ways these ecosystems work and cannot be resolved by fixing software vulnerabilities in either the packages or the utilities, e.g., package manager tools, that build these ecosystems. We systematically characterize recent security attacks from various aspects, including attack strategies, vectors, and goals. Our characterization and in-depth analysis of npm and PyPI ecosystems, which represent the largest LBEs, covering nearly one million packages indicates that these ecosystems make an opportune environment for attackers to incorporate stealthy attacks.
Overall, we argue that (i) fully automated detection of malicious packages is likely to be unfeasible; however (ii) tools and metrics that help developers assess the risk of including external dependencies would go a long way toward preventing attacks.
△ Less
Submitted 30 November, 2021; v1 submitted 6 March, 2019;
originally announced March 2019.
-
Quark Loop Contributions to Neutron, Deuteron, and Mercury EDMs from Supersymmetry without R parity
Authors:
Chan-Chi Chiou,
Otto C. W. Kong,
Rishikesh D. Vaidya
Abstract:
We present a detailed analysis of the neutron, deuteron and mercury electric dipole moment from supersymmetry without R parity, focusing on the quark-scalar loop contributions. Being proportional to top Yukawa and top mass, such contributions are often large. Analytical expressions illustrating the explicit role of the R-parity violating parameters are given following perturbative diagonalizatio…
▽ More
We present a detailed analysis of the neutron, deuteron and mercury electric dipole moment from supersymmetry without R parity, focusing on the quark-scalar loop contributions. Being proportional to top Yukawa and top mass, such contributions are often large. Analytical expressions illustrating the explicit role of the R-parity violating parameters are given following perturbative diagonalization of mass-squared matrices for the scalars. Dominant contributions come from the combinations $B_i λ^{\prime}_{ij1}$ for which we obtain robust bounds. It turns out that neutron and deuteron EDMs receive much stronger contributions than mercury EDM and any null result at the future deuteron EDM experiment or Los Alamos neutron EDM experiment can lead to extra-ordinary constraints on RPV parameter space. Even if R-parity violating couplings are real, CKM phase does induce RPV contribution and for some cases such a contribution is as strong as contribution from phases in the R-parity violating couplings.Hence, we have bounds directly on $|B_i λ^{\prime}_{ij1}|$ even if the RPV parameters are all real. Interestingly, even if slepton mass and/or $μ_0$ is as high as 1 TeV, it still leads to neutron EDM that is an order of magnitude larger than the sensitivity at Los Alamos experiment. Since the results are not much sensitive to $\tan β$, our constraints will survive even if other observables tighten the constraints on $\tan β$.
△ Less
Submitted 27 May, 2007;
originally announced May 2007.
-
Flavor Changing Higgs Decays in Supersymmetry with Minimal Flavor Violation
Authors:
Abdesslam Arhrib,
Dilip K. Ghosh,
Otto C. W. Kong,
Rishikesh D. Vaidya
Abstract:
We study the flavor changing neutral current decays of the MSSM Higgs bosons into strange and bottom quarks. We focus on a scenario of minimum flavor violation here, namely only that induced by the CKM matrix. Taking into account constraint from $b\to s γ$, $δρ$ as well as experimental constraints on the MSSM spectrum, we show that the branching ratio of $(Φ\to b\bar{s})$ and $(Φ\to \bar{b}s)$ c…
▽ More
We study the flavor changing neutral current decays of the MSSM Higgs bosons into strange and bottom quarks. We focus on a scenario of minimum flavor violation here, namely only that induced by the CKM matrix. Taking into account constraint from $b\to s γ$, $δρ$ as well as experimental constraints on the MSSM spectrum, we show that the branching ratio of $(Φ\to b\bar{s})$ and $(Φ\to \bar{b}s)$ combined, for $Φ$ being either one of the CP even Higgs states, can reach the order $10^{-4}$-$10^{-3}$ for large $\tanβ$, large $μ$, and large $A_t$. The result illustrates the significance of minimal flavor violation scenario which can induce competitive branching fraction for flavor changing Higgs decays. This can be compared with the previous studies where similar branching fraction has been reported, but with additional sources of flavor violations in squark mass matrices. We also discuss some basic features of the flavor violating decays in the generic case.
△ Less
Submitted 9 March, 2007; v1 submitted 5 May, 2006;
originally announced May 2006.
-
Quark Loop Contribution to Neutron EDM from R-parity Violation
Authors:
Chan-Chi Chiou,
Otto C. W. Kong,
Rishikesh D. Vaidya
Abstract:
We present a detailed analysis together with numerical calculations on one-loop contributions to the neutron electric dipole moment from supersymmetry without R parity, focusing on the quark-scalar loop contributions. Complete formulas are given for the various contributions through the quark dipole operators. Analytical expressions illustrating the explicit role of the R-parity violating parame…
▽ More
We present a detailed analysis together with numerical calculations on one-loop contributions to the neutron electric dipole moment from supersymmetry without R parity, focusing on the quark-scalar loop contributions. Complete formulas are given for the various contributions through the quark dipole operators. Analytical expressions illustrating the explicit role of the R-parity violating parameters are given following perturbative diagonalization of mass-squared matrices for the scalars. Dominant contributions come from the combinations $B_i^{\ast} λ^{\prime}_{ij1}$ for which we obtain robust bounds. Even if the R-parity violating couplings are real, CKM phase does induce RPV contribution and for some cases such a contribution is as strong as contribution from phases in the R-parity violating couplings. Hence, we have bounds directly on $|B_i^{\ast} ł^{\prime}_{ij1}|$ even if the parameters are all real.
△ Less
Submitted 24 May, 2005;
originally announced May 2005.
-
B--> X_s + gamma in Supersymmetry without R-parity
Authors:
Otto C. W. Kong,
Rishikesh Vaidya
Abstract:
We present a systematic analysis of the decay B--> X_s + gamma at the leading log within the framework of Supersymmetry without R-parity. We point out some new contributions in the form of bilinear-trilinear combination of R-parity violating (RPV) couplings that are enhanced by large tanbeta. We also improve by a few orders of magnitude, bounds on several combinations of R-parity violating param…
▽ More
We present a systematic analysis of the decay B--> X_s + gamma at the leading log within the framework of Supersymmetry without R-parity. We point out some new contributions in the form of bilinear-trilinear combination of R-parity violating (RPV) couplings that are enhanced by large tanbeta. We also improve by a few orders of magnitude, bounds on several combinations of R-parity violating parameters.
△ Less
Submitted 25 November, 2004;
originally announced November 2004.
-
tanbeta enhanced contributions to b--> s gamma in SUSY without R-parity
Authors:
Otto C. W. Kong,
Rishikesh Vaidya
Abstract:
We present a systematic analysis of the decay b --> s gamma at the leading log within the framework of Supersymmetry without R-parity. We point out some new contributions in the form of bilinear-trilinear combination of R-parity violating (RPV) couplings that are enhanced by large tanbeta. We also improve by a few orders of magnitude, bounds on several combinations of RPV parameters.
We present a systematic analysis of the decay b --> s gamma at the leading log within the framework of Supersymmetry without R-parity. We point out some new contributions in the form of bilinear-trilinear combination of R-parity violating (RPV) couplings that are enhanced by large tanbeta. We also improve by a few orders of magnitude, bounds on several combinations of RPV parameters.
△ Less
Submitted 12 November, 2004;
originally announced November 2004.
-
Working Group Report: Neutrino and Astroparticle Physics
Authors:
Srubabati Goswami,
Raghavan Rangarajan,
K. Agashe,
A. Bandyopadhyay,
K. Bhattacharya,
B. Brahmachari,
C. Burgess,
E. J. Chun,
D. Choudhury,
P. K. Das,
A. Dighe,
R. Godbole,
N. Gupta,
M. Kaplinghat,
D. Indumathi,
J. Forshaw,
Y. Y. Keum,
B. Layek,
D. Majumdar,
N. Mahajan,
P. Mehta,
R. N. Mohapatra,
N. Mondal,
S. More,
Y. Nir
, et al. (15 additional authors not shown)
Abstract:
This is the report of neutrino and astroparticle physics working group at WHEPP-8. We present the discussions carried out during the workshop on selected topics in the above fields and also indicate progress made subsequently. The neutrino physics subgroup studied the possibilites of constraining neutrino masses, mixing and CPT violation in lepton sector from future experiments. Neutrino mass mo…
▽ More
This is the report of neutrino and astroparticle physics working group at WHEPP-8. We present the discussions carried out during the workshop on selected topics in the above fields and also indicate progress made subsequently. The neutrino physics subgroup studied the possibilites of constraining neutrino masses, mixing and CPT violation in lepton sector from future experiments. Neutrino mass models in the context of abelian horizontal symmetries, warped extra dimensions and in presence of triplet Higgs were studied. Effect of threshold corrections on radiative magnification of mixing angles was investigated. The astroparticle physics subgroup focused on how various particle physics inputs affect the CMBR fluctuation spectrum, and on brane cosmology. This report also contains an introduction on how to use the publicly available code CMBFAST to calculate the CMBR fluctuations.
△ Less
Submitted 19 September, 2004;
originally announced September 2004.
-
Some Novel Contributions to Radiative B Decay in Supersymmetry without R-parity
Authors:
Otto C. W. Kong,
Rishikesh D. Vaidya
Abstract:
We present a systematic analysis at the leading log order of the influence of combination of bilinear and trilinear R-parity violating couplings on the decay b-->s gamma. Such contributions have never been explored in the context of this decay. We show that influence of charged-slepton-Higgs mixing mediated loops can dominate the SM and MSSM contributions and hence can provide strong bounds on t…
▽ More
We present a systematic analysis at the leading log order of the influence of combination of bilinear and trilinear R-parity violating couplings on the decay b-->s gamma. Such contributions have never been explored in the context of this decay. We show that influence of charged-slepton-Higgs mixing mediated loops can dominate the SM and MSSM contributions and hence can provide strong bounds on the combination of bilinear-trilinear R-parity violating couplings. Such contributions are also enhanced by large tan beta. With substantially extended basis of operators (28 operators), we provide illustrative analytical formulae of the major contributions to complement our complete numerical results which demonstrate the importance of QCD running effects.
△ Less
Submitted 9 August, 2004;
originally announced August 2004.
-
Radiative B decays in Supersymmetry without R-parity
Authors:
Otto C. W. Kong,
Rishikesh Vaidya
Abstract:
We present a systematic analysis of all the contributions at the leading log order to the branching ratio of the inclusive radiative B decay, B --> X_s + gamma in the framework of supersymmetry without R-parity. The relevant set of four-quark operators involved in QCD running are extended from 6 (within SM and MSSM) to 24, with also many new contributions to the Wilson coefficients of (chromo)ma…
▽ More
We present a systematic analysis of all the contributions at the leading log order to the branching ratio of the inclusive radiative B decay, B --> X_s + gamma in the framework of supersymmetry without R-parity. The relevant set of four-quark operators involved in QCD running are extended from 6 (within SM and MSSM) to 24, with also many new contributions to the Wilson coefficients of (chromo)magnetic penguins for either chiral structure. We present complete analytical results here without any a priori assumptions on the form of R-parity violation. Mass eigenstate expressions are given, hence the results are free from the commonly adopted mass-insertion approximation. In the numerical analysis, we focus here only on the influence of the trilinear lambda-prime couplings and report on the possibility of a few orders of magnitude improvement for the bounds on a few combinations of the lambda-prime couplings. Our study shows that the Wilson coefficients of the current-current operators due to R-parity violation dominate over the direct contributions to the penguins. However, the inter-play of various contributions is complicated due to the QCD corrections which we elaborate here.
△ Less
Submitted 15 November, 2004; v1 submitted 14 March, 2004;
originally announced March 2004.
-
Constraining R Violation from Anomalous Abelian Family Symmetry
Authors:
Rishikesh Vaidya
Abstract:
The patterns of R violation resulting from imposition of a gauged U(1) horizontal symmetry, on the minimal supersymmetric standard model are systematically analyzed. We concentrate on a class of models with integer U(1) charges chosen to reproduce the quark masses and mixings as well as charged lepton masses exactly or approximately. The U(1) charges are further restricted from the requirement t…
▽ More
The patterns of R violation resulting from imposition of a gauged U(1) horizontal symmetry, on the minimal supersymmetric standard model are systematically analyzed. We concentrate on a class of models with integer U(1) charges chosen to reproduce the quark masses and mixings as well as charged lepton masses exactly or approximately. The U(1) charges are further restricted from the requirement that very large bilinear lepton number violating terms should not be allowed in the super-potential. It is shown that all the trilinear $λ'_{ijk}$ and all but at most two trilinear $λ_{ijk}$ couplings vanish or are enormously suppressed.
△ Less
Submitted 9 July, 2002; v1 submitted 20 March, 2002;
originally announced March 2002.
-
Bi-maximal mixing and Bilinear R violation
Authors:
Anjan S. Joshipura,
Rishikesh D. Vaidya,
Sudhir K. Vempati
Abstract:
We perform a general analytic study of feasibility of obtaining a combined explanation for the deficits in the solar and the atmospheric neutrino fluxes with two large mixing angles in supersymmetric model with bilinear R parity violations. The required hierarchy among the solar and atmospheric neutrino mass scales follows in this framework in the presence of an approximate Higgs - slepton unive…
▽ More
We perform a general analytic study of feasibility of obtaining a combined explanation for the deficits in the solar and the atmospheric neutrino fluxes with two large mixing angles in supersymmetric model with bilinear R parity violations. The required hierarchy among the solar and atmospheric neutrino mass scales follows in this framework in the presence of an approximate Higgs - slepton universality at the weak scale. The solar mixing angle is shown to be related to non-universality in slepton mass terms specifically to differences in soft parameters of the first two leptonic generations. It is shown that this flavour universality violation should be as strong as the Higgs-slepton universality violation if solar neutrino mixing angle is to be large. The standard supergravity models with universal boundary conditions at a high scale lead to the required Higgs-slepton universality violations but the predicted violation of flavour universality among the first two generations is much smaller than required. This model therefore cannot provide an explanation of large solar neutrino mixing angle unless some universality violations in soft supersymmetry breaking parameters are introduced at a high scale itself.
△ Less
Submitted 25 July, 2002; v1 submitted 19 March, 2002;
originally announced March 2002.
-
Neutrino Anomalies in Gauge Mediated Model with Trilinear R violation
Authors:
Anjan S. Joshipura,
Rishikesh D. Vaidya,
Sudhir K. Vempati
Abstract:
The structure of neutrino masses and mixing resulting from trilinear $R$ violating interactions is studied in the presence of the gauge mediated supersymmetry breaking. Neutrino masses arise in this model at tree level through the RG-induced vacuum expectation values of the sneutrinos and also through direct contribution at 1-loop. The relative importance of these contributions is determined by…
▽ More
The structure of neutrino masses and mixing resulting from trilinear $R$ violating interactions is studied in the presence of the gauge mediated supersymmetry breaking. Neutrino masses arise in this model at tree level through the RG-induced vacuum expectation values of the sneutrinos and also through direct contribution at 1-loop. The relative importance of these contributions is determined by the values of the strong and weak coupling constants. In case of purely $λ'$ couplings, the tree contribution dominates over the 1-loop diagram. In this case, one simultaneously obtains atmospheric neutrino oscillations and quasi-vacuum oscillations of the solar neutrinos if all the $ł'$ couplings are assumed to be of similar magnitudes. If R parity violation arises from the trilinear $ł$ couplings, then the loop induced contribution dominates over the tree level. One cannot simultaneously explain the solar and atmospheric deficit in this case if all the $ł$ couplings are of similar magnitude. This however becomes possible with hierarchical $ł$ and we give a specific example of this.
△ Less
Submitted 5 November, 2001; v1 submitted 19 July, 2001;
originally announced July 2001.
-
U(1) symmetry and R parity violation
Authors:
Anjan S. Joshipura,
Rishikesh D. Vaidya,
Sudhir K. Vempati
Abstract:
The patterns of $R$ violation resulting from imposition of a gauged U(1) horizontal symmetry on the minimal supersymmetric standard model are systematically analyzed. We concentrate on class of models with integer U(1) charges chosen to reproduce the quark masses and mixings as well as charged lepton masses exactly or approximately. The U(1) charges are further restricted by the requirement that…
▽ More
The patterns of $R$ violation resulting from imposition of a gauged U(1) horizontal symmetry on the minimal supersymmetric standard model are systematically analyzed. We concentrate on class of models with integer U(1) charges chosen to reproduce the quark masses and mixings as well as charged lepton masses exactly or approximately. The U(1) charges are further restricted by the requirement that very large bilinear lepton number violating terms should not be allowed in the superpotential. It is shown that this leads to severely constrained patterns of trilinear interactions. Specifically, only choice compatible with phenomenological restrictions is the one in which all the trilinear $λ'_{ijk}$ and all but at most two trilinear $λ_{ijk}$ couplings vanish or are enormously suppressed. The U(1) symmetry can allow effective generation of bilinear lepton number violating parameters through terms in the Kahler potential. Resulting models are identified and structure of neutrino masses in some of these is briefly discussed.
△ Less
Submitted 13 June, 2000;
originally announced June 2000.
-
CP violation in the mass matrix of heavy neutrinos
Authors:
Utpal Sarkar,
R. Vaidya
Abstract:
We discuss the question of CP-violation in the effective Hamiltonian approach in models of leptogenesis through heavy right handed neutrino decays. We first formulate the problem in four component notation and then point out that before the heavy neutrinos have decayed away, the universe becomes CP-asymmetric in the heavy neutrinos. However, the lepton asymmetry generated after they completely d…
▽ More
We discuss the question of CP-violation in the effective Hamiltonian approach in models of leptogenesis through heavy right handed neutrino decays. We first formulate the problem in four component notation and then point out that before the heavy neutrinos have decayed away, the universe becomes CP-asymmetric in the heavy neutrinos. However, the lepton asymmetry generated after they completely decay are independent of this asymmetry.
△ Less
Submitted 15 October, 1998; v1 submitted 8 September, 1998;
originally announced September 1998.