-
Real AI Agents with Fake Memories: Fatal Context Manipulation Attacks on Web3 Agents
Authors:
Atharv Singh Patlan,
Peiyao Sheng,
S. Ashwin Hebbar,
Prateek Mittal,
Pramod Viswanath
Abstract:
The integration of AI agents with Web3 ecosystems harnesses their complementary potential for autonomy and openness yet also introduces underexplored security risks, as these agents dynamically interact with financial protocols and immutable smart contracts. This paper investigates the vulnerabilities of AI agents within blockchain-based financial ecosystems when exposed to adversarial threats in…
▽ More
The integration of AI agents with Web3 ecosystems harnesses their complementary potential for autonomy and openness yet also introduces underexplored security risks, as these agents dynamically interact with financial protocols and immutable smart contracts. This paper investigates the vulnerabilities of AI agents within blockchain-based financial ecosystems when exposed to adversarial threats in real-world scenarios. We introduce the concept of context manipulation, a comprehensive attack vector that exploits unprotected context surfaces, including input channels, memory modules, and external data feeds.
Through empirical analysis of ElizaOS, a decentralized AI agent framework for automated Web3 operations, we demonstrate how adversaries can manipulate context by injecting malicious instructions into prompts or historical interaction records, leading to unintended asset transfers and protocol violations which could be financially devastating.
To quantify these vulnerabilities, we design CrAIBench, a Web3 domain-specific benchmark that evaluates the robustness of AI agents against context manipulation attacks across 150+ realistic blockchain tasks, including token transfers, trading, bridges and cross-chain interactions and 500+ attack test cases using context manipulation. We systematically assess attack and defense strategies, analyzing factors like the influence of security prompts, reasoning models, and the effectiveness of alignment techniques.
Our findings show that prompt-based defenses are insufficient when adversaries corrupt stored context, achieving significant attack success rates despite these defenses. Fine-tuning-based defenses offer a more robust alternative, substantially reducing attack success rates while preserving utility on single-step tasks. This research highlights the urgent need to develop AI agents that are both secure and fiduciarily responsible.
△ Less
Submitted 30 April, 2025; v1 submitted 20 March, 2025;
originally announced March 2025.
-
Humanity's Last Exam
Authors:
Long Phan,
Alice Gatti,
Ziwen Han,
Nathaniel Li,
Josephina Hu,
Hugh Zhang,
Chen Bo Calvin Zhang,
Mohamed Shaaban,
John Ling,
Sean Shi,
Michael Choi,
Anish Agrawal,
Arnav Chopra,
Adam Khoja,
Ryan Kim,
Richard Ren,
Jason Hausenloy,
Oliver Zhang,
Mantas Mazeika,
Dmitry Dodonov,
Tung Nguyen,
Jaeho Lee,
Daron Anderson,
Mikhail Doroshenko,
Alun Cennyth Stokes
, et al. (1084 additional authors not shown)
Abstract:
Benchmarks are important tools for tracking the rapid advancements in large language model (LLM) capabilities. However, benchmarks are not keeping pace in difficulty: LLMs now achieve over 90\% accuracy on popular benchmarks like MMLU, limiting informed measurement of state-of-the-art LLM capabilities. In response, we introduce Humanity's Last Exam (HLE), a multi-modal benchmark at the frontier of…
▽ More
Benchmarks are important tools for tracking the rapid advancements in large language model (LLM) capabilities. However, benchmarks are not keeping pace in difficulty: LLMs now achieve over 90\% accuracy on popular benchmarks like MMLU, limiting informed measurement of state-of-the-art LLM capabilities. In response, we introduce Humanity's Last Exam (HLE), a multi-modal benchmark at the frontier of human knowledge, designed to be the final closed-ended academic benchmark of its kind with broad subject coverage. HLE consists of 2,500 questions across dozens of subjects, including mathematics, humanities, and the natural sciences. HLE is developed globally by subject-matter experts and consists of multiple-choice and short-answer questions suitable for automated grading. Each question has a known solution that is unambiguous and easily verifiable, but cannot be quickly answered via internet retrieval. State-of-the-art LLMs demonstrate low accuracy and calibration on HLE, highlighting a significant gap between current LLM capabilities and the expert human frontier on closed-ended academic questions. To inform research and policymaking upon a clear understanding of model capabilities, we publicly release HLE at https://lastexam.ai.
△ Less
Submitted 19 April, 2025; v1 submitted 24 January, 2025;
originally announced January 2025.
-
DeepPolar: Inventing Nonlinear Large-Kernel Polar Codes via Deep Learning
Authors:
S Ashwin Hebbar,
Sravan Kumar Ankireddy,
Hyeji Kim,
Sewoong Oh,
Pramod Viswanath
Abstract:
Progress in designing channel codes has been driven by human ingenuity and, fittingly, has been sporadic. Polar codes, developed on the foundation of Arikan's polarization kernel, represent the latest breakthrough in coding theory and have emerged as the state-of-the-art error-correction code for short-to-medium block length regimes. In an effort to automate the invention of good channel codes, es…
▽ More
Progress in designing channel codes has been driven by human ingenuity and, fittingly, has been sporadic. Polar codes, developed on the foundation of Arikan's polarization kernel, represent the latest breakthrough in coding theory and have emerged as the state-of-the-art error-correction code for short-to-medium block length regimes. In an effort to automate the invention of good channel codes, especially in this regime, we explore a novel, non-linear generalization of Polar codes, which we call DeepPolar codes. DeepPolar codes extend the conventional Polar coding framework by utilizing a larger kernel size and parameterizing these kernels and matched decoders through neural networks. Our results demonstrate that these data-driven codes effectively leverage the benefits of a larger kernel size, resulting in enhanced reliability when compared to both existing neural codes and conventional Polar codes.
△ Less
Submitted 4 June, 2024; v1 submitted 13 February, 2024;
originally announced February 2024.
-
Nested Construction of Polar Codes via Transformers
Authors:
Sravan Kumar Ankireddy,
S Ashwin Hebbar,
Heping Wan,
Joonyoung Cho,
Charlie Zhang
Abstract:
Tailoring polar code construction for decoding algorithms beyond successive cancellation has remained a topic of significant interest in the field. However, despite the inherent nested structure of polar codes, the use of sequence models in polar code construction is understudied. In this work, we propose using a sequence modeling framework to iteratively construct a polar code for any given lengt…
▽ More
Tailoring polar code construction for decoding algorithms beyond successive cancellation has remained a topic of significant interest in the field. However, despite the inherent nested structure of polar codes, the use of sequence models in polar code construction is understudied. In this work, we propose using a sequence modeling framework to iteratively construct a polar code for any given length and rate under various channel conditions. Simulations show that polar codes designed via sequential modeling using transformers outperform both 5G-NR sequence and Density Evolution based approaches for both AWGN and Rayleigh fading channels.
△ Less
Submitted 30 January, 2024;
originally announced January 2024.
-
Bin Packing under Random-Order: Breaking the Barrier of 3/2
Authors:
Anish Hebbar,
Arindam Khan,
K. V. N. Sreenivas
Abstract:
Best-Fit is one of the most prominent and practically used algorithms for the bin packing problem, where a set of items with associated sizes needs to be packed in the minimum number of unit-capacity bins. Kenyon [SODA '96] studied online bin packing under random-order arrival, where the adversary chooses the list of items, but the items arrive one by one according to an arrival order drawn unifor…
▽ More
Best-Fit is one of the most prominent and practically used algorithms for the bin packing problem, where a set of items with associated sizes needs to be packed in the minimum number of unit-capacity bins. Kenyon [SODA '96] studied online bin packing under random-order arrival, where the adversary chooses the list of items, but the items arrive one by one according to an arrival order drawn uniformly randomly from the set of all permutations of the items. Kenyon's seminal result established an upper bound of $1.5$ and a lower bound of $1.08$ on the random-order ratio of Best-Fit, and it was conjectured that the true ratio is $\approx 1.15$. The conjecture, if true, will also imply that Best-Fit (on randomly permuted input) has the best performance guarantee among all the widely-used simple algorithms for (offline) bin packing. This conjecture has remained one of the major open problems in the area, as highlighted in the recent survey on random-order models by Gupta and Singla [Beyond the Worst-Case Analysis of Algorithms '20]. Recently, Albers et al. [Algorithmica '21] improved the upper bound to $1.25$ for the special case when all the item sizes are greater than $1/3$, and they improve the lower bound to $1.1$. Ayyadevara et al. [ICALP '22] obtained an improved result for the special case when all the item sizes lie in $(1/4, 1/2]$, which corresponds to the $3$-partition problem. The upper bound of $3/2$ for the general case, however, has remained unimproved.
In this paper, we make the first progress towards the conjecture, by showing that Best-Fit achieves a random-order ratio of at most $1.5 - \varepsilon$, for a small constant $\varepsilon>0$. Furthermore, we establish an improved lower bound of $1.144$ on the random-order ratio of Best-Fit, nearly reaching the conjectured ratio.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
Constraining Glueball Couplings
Authors:
Andrea L. Guerrieri,
Aditya Hebbar,
Balt C. van Rees
Abstract:
We set up a numerical S-matrix bootstrap problem to rigorously constrain bound state couplings given by the residues of poles in elastic amplitudes. We extract upper bounds on these couplings that follow purely from unitarity, crossing symmetry, and the Roy equations within their proven domain of validity. First we consider amplitudes with a single spin 0 or spin 2 bound state, both with or withou…
▽ More
We set up a numerical S-matrix bootstrap problem to rigorously constrain bound state couplings given by the residues of poles in elastic amplitudes. We extract upper bounds on these couplings that follow purely from unitarity, crossing symmetry, and the Roy equations within their proven domain of validity. First we consider amplitudes with a single spin 0 or spin 2 bound state, both with or without a self-coupling. Subsequently we investigate amplitudes with the spectrum of bound states corresponding to the estimated glueball masses of pure SU(3) Yang-Mills. In the latter case the 'glue-hedron', the space of allowed couplings, provides a first-principles constraint for future lattice estimates.
△ Less
Submitted 30 November, 2023;
originally announced December 2023.
-
MCTS guided Genetic Algorithm for optimization of neural network weights
Authors:
Akshay Hebbar
Abstract:
In this research, we investigate the possibility of applying a search strategy to genetic algorithms to explore the entire genetic tree structure. Several methods aid in performing tree searches; however, simpler algorithms such as breadth-first, depth-first, and iterative techniques are computation-heavy and often result in a long execution time. Adversarial techniques are often the preferred mec…
▽ More
In this research, we investigate the possibility of applying a search strategy to genetic algorithms to explore the entire genetic tree structure. Several methods aid in performing tree searches; however, simpler algorithms such as breadth-first, depth-first, and iterative techniques are computation-heavy and often result in a long execution time. Adversarial techniques are often the preferred mechanism when performing a probabilistic search, yielding optimal results more quickly. The problem we are trying to tackle in this paper is the optimization of neural networks using genetic algorithms. Genetic algorithms (GA) form a tree of possible states and provide a mechanism for rewards via the fitness function. Monte Carlo Tree Search (MCTS) has proven to be an effective tree search strategy given states and rewards; therefore, we will combine these approaches to optimally search for the best result generated with genetic algorithms.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
SAKSHI: Decentralized AI Platforms
Authors:
Suma Bhat,
Canhui Chen,
Zerui Cheng,
Zhixuan Fang,
Ashwin Hebbar,
Sreeram Kannan,
Ranvir Rana,
Peiyao Sheng,
Himanshu Tyagi,
Pramod Viswanath,
Xuechao Wang
Abstract:
Large AI models (e.g., Dall-E, GPT4) have electrified the scientific, technological and societal landscape through their superhuman capabilities. These services are offered largely in a traditional web2.0 format (e.g., OpenAI's GPT4 service). As more large AI models proliferate (personalizing and specializing to a variety of domains), there is a tremendous need to have a neutral trust-free platfor…
▽ More
Large AI models (e.g., Dall-E, GPT4) have electrified the scientific, technological and societal landscape through their superhuman capabilities. These services are offered largely in a traditional web2.0 format (e.g., OpenAI's GPT4 service). As more large AI models proliferate (personalizing and specializing to a variety of domains), there is a tremendous need to have a neutral trust-free platform that allows the hosting of AI models, clients receiving AI services efficiently, yet in a trust-free, incentive compatible, Byzantine behavior resistant manner. In this paper we propose SAKSHI, a trust-free decentralized platform specifically suited for AI services. The key design principles of SAKSHI are the separation of the data path (where AI query and service is managed) and the control path (where routers and compute and storage hosts are managed) from the transaction path (where the metering and billing of services are managed over a blockchain). This separation is enabled by a "proof of inference" layer which provides cryptographic resistance against a variety of misbehaviors, including poor AI service, nonpayment for service, copying of AI models. This is joint work between multiple universities (Princeton University, University of Illinois at Urbana-Champaign, Tsinghua University, HKUST) and two startup companies (Witness Chain and Eigen Layer).
△ Less
Submitted 31 July, 2023;
originally announced July 2023.
-
XLDA: Linear Discriminant Analysis for Scaling Continual Learning to Extreme Classification at the Edge
Authors:
Karan Shah,
Vishruth Veerendranath,
Anushka Hebbar,
Raghavendra Bhat
Abstract:
Streaming Linear Discriminant Analysis (LDA) while proven in Class-incremental Learning deployments at the edge with limited classes (upto 1000), has not been proven for deployment in extreme classification scenarios. In this paper, we present: (a) XLDA, a framework for Class-IL in edge deployment where LDA classifier is proven to be equivalent to FC layer including in extreme classification scena…
▽ More
Streaming Linear Discriminant Analysis (LDA) while proven in Class-incremental Learning deployments at the edge with limited classes (upto 1000), has not been proven for deployment in extreme classification scenarios. In this paper, we present: (a) XLDA, a framework for Class-IL in edge deployment where LDA classifier is proven to be equivalent to FC layer including in extreme classification scenarios, and (b) optimizations to enable XLDA-based training and inference for edge deployment where there is a constraint on available compute resources. We show up to 42x speed up using a batched training approach and up to 5x inference speedup with nearest neighbor search on extreme datasets like AliProducts (50k classes) and Google Landmarks V2 (81k classes)
△ Less
Submitted 20 July, 2023;
originally announced July 2023.
-
Compressed Error HARQ: Feedback Communication on Noise-Asymmetric Channels
Authors:
Sravan Kumar Ankireddy,
S. Ashwin Hebbar,
Yihan Jiang,
Hyeji Kim,
Pramod Viswanath
Abstract:
In modern communication systems with feedback, there are increasingly more scenarios where the transmitter has much less power than the receiver (e.g., medical implant devices), which we refer to as noise-asymmetric channels. For such channels, the feedback link is of higher quality than the forward link. However, feedback schemes for cellular communications, such as hybrid ARQ, do not fully utili…
▽ More
In modern communication systems with feedback, there are increasingly more scenarios where the transmitter has much less power than the receiver (e.g., medical implant devices), which we refer to as noise-asymmetric channels. For such channels, the feedback link is of higher quality than the forward link. However, feedback schemes for cellular communications, such as hybrid ARQ, do not fully utilize the high-quality feedback link. To this end, we introduce Compressed Error Hybrid ARQ, a generalization of hybrid ARQ tailored for noise-asymmetric channels; the receiver sends its estimated message to the transmitter, and the transmitter harmoniously switches between hybrid ARQ and compressed error retransmission. We show that our proposed method significantly improves reliability, latency, and spectral efficiency compared to the conventional hybrid ARQ in various practical scenarios where the transmitter is resource-constrained.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
Bounds on photon scattering
Authors:
Kelian Häring,
Aditya Hebbar,
Denis Karateev,
Marco Meineri,
João Penedones
Abstract:
We study 2-to-2 scattering amplitudes of massless spin one particles in $d=4$ space-time dimensions, like real world photons. We define a set of non-perturbative observables (Wilson coefficients) which describe these amplitudes at low energies. We use full non-linear unitarity to construct various novel numerical bounds on these observables. For completeness, we also rederive some bounds using pos…
▽ More
We study 2-to-2 scattering amplitudes of massless spin one particles in $d=4$ space-time dimensions, like real world photons. We define a set of non-perturbative observables (Wilson coefficients) which describe these amplitudes at low energies. We use full non-linear unitarity to construct various novel numerical bounds on these observables. For completeness, we also rederive some bounds using positivity only. We discover and explain why some of these Wilson coefficients cannot be bounded.
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
Cyclability, Connectivity and Circumference
Authors:
Niranjan Balachandran,
Anish Hebbar
Abstract:
In a graph $G$, a subset of vertices $S \subseteq V(G)$ is said to be cyclable if there is a cycle containing the vertices in some order. $G$ is said to be $k$-cyclable if any subset of $k \geq 2$ vertices is cyclable. If any $k$ \textit{ordered} vertices are present in a common cycle in that order, then the graph is said to be $k$-ordered. We show that when $k \leq \sqrt{n+3}$, $k$-cyclable graph…
▽ More
In a graph $G$, a subset of vertices $S \subseteq V(G)$ is said to be cyclable if there is a cycle containing the vertices in some order. $G$ is said to be $k$-cyclable if any subset of $k \geq 2$ vertices is cyclable. If any $k$ \textit{ordered} vertices are present in a common cycle in that order, then the graph is said to be $k$-ordered. We show that when $k \leq \sqrt{n+3}$, $k$-cyclable graphs also have circumference $c(G) \geq 2k$, and that this is best possible. Furthermore when $k \leq \frac{3n}{4} -1$, $c(G) \geq k+2$, and for $k$-ordered graphs we show $c(G) \geq \min\{n,2k\}$. We also generalize a result by Byer et al. on the maximum number of edges in nonhamiltonian $k$-connected graphs, and show that if $G$ is a $k$-connected graph of order $n \geq 2(k^2+k)$ with $|E(G)| > \binom{n-k}{2} + k^2$, then the graph is hamiltonian, and moreover the extremal graphs are unique.
△ Less
Submitted 24 November, 2022; v1 submitted 6 November, 2022;
originally announced November 2022.
-
CRISP: Curriculum based Sequential Neural Decoders for Polar Code Family
Authors:
S Ashwin Hebbar,
Viraj Nadkarni,
Ashok Vardhan Makkuva,
Suma Bhat,
Sewoong Oh,
Pramod Viswanath
Abstract:
Polar codes are widely used state-of-the-art codes for reliable communication that have recently been included in the 5th generation wireless standards (5G). However, there remains room for the design of polar decoders that are both efficient and reliable in the short blocklength regime. Motivated by recent successes of data-driven channel decoders, we introduce a novel $\textbf{C}$ur…
▽ More
Polar codes are widely used state-of-the-art codes for reliable communication that have recently been included in the 5th generation wireless standards (5G). However, there remains room for the design of polar decoders that are both efficient and reliable in the short blocklength regime. Motivated by recent successes of data-driven channel decoders, we introduce a novel $\textbf{C}$ur$\textbf{RI}$culum based $\textbf{S}$equential neural decoder for $\textbf{P}$olar codes (CRISP). We design a principled curriculum, guided by information-theoretic insights, to train CRISP and show that it outperforms the successive-cancellation (SC) decoder and attains near-optimal reliability performance on the Polar(32,16) and Polar(64,22) codes. The choice of the proposed curriculum is critical in achieving the accuracy gains of CRISP, as we show by comparing against other curricula. More notably, CRISP can be readily extended to Polarization-Adjusted-Convolutional (PAC) codes, where existing SC decoders are significantly less reliable. To the best of our knowledge, CRISP constructs the first data-driven decoder for PAC codes and attains near-optimal performance on the PAC(32,16) code.
△ Less
Submitted 29 May, 2023; v1 submitted 1 October, 2022;
originally announced October 2022.
-
TinyTurbo: Efficient Turbo Decoders on Edge
Authors:
S Ashwin Hebbar,
Rajesh K Mishra,
Sravan Kumar Ankireddy,
Ashok V Makkuva,
Hyeji Kim,
Pramod Viswanath
Abstract:
In this paper, we introduce a neural-augmented decoder for Turbo codes called TINYTURBO . TINYTURBO has complexity comparable to the classical max-log-MAP algorithm but has much better reliability than the max-log-MAP baseline and performs close to the MAP algorithm. We show that TINYTURBO exhibits strong robustness on a variety of practical channels of interest, such as EPA and EVA channels, whic…
▽ More
In this paper, we introduce a neural-augmented decoder for Turbo codes called TINYTURBO . TINYTURBO has complexity comparable to the classical max-log-MAP algorithm but has much better reliability than the max-log-MAP baseline and performs close to the MAP algorithm. We show that TINYTURBO exhibits strong robustness on a variety of practical channels of interest, such as EPA and EVA channels, which are included in the LTE standards. We also show that TINYTURBO strongly generalizes across different rate, blocklengths, and trellises. We verify the reliability and efficiency of TINYTURBO via over-the-air experiments.
△ Less
Submitted 30 September, 2022;
originally announced September 2022.
-
Using Eye Tracker To Evaluate Cockpit Design -- A Flight Simulation Study
Authors:
Archana Hebbar,
Abhay Pashilkar,
Pradipta Biswas
Abstract:
This paper investigates applications of eye tracking in transport aircraft design evaluations. Piloted simulations were conducted for a complete flight profile including take off, cruise and landing flight scenario using the transport aircraft flight simulator at CSIR National Aerospace Laboratories. Thirty-one simulation experiments were carried out with three pilots and engineers while recording…
▽ More
This paper investigates applications of eye tracking in transport aircraft design evaluations. Piloted simulations were conducted for a complete flight profile including take off, cruise and landing flight scenario using the transport aircraft flight simulator at CSIR National Aerospace Laboratories. Thirty-one simulation experiments were carried out with three pilots and engineers while recording the ocular parameters and the flight data. Simulations were repeated for high workload conditions like flying with degraded visibility and during stall. Pilots visual scan behaviour and workload levels were analysed using ocular parameters; while comparing with the statistical deviations from the desired flight path. Conditions for fatigue were also recreated through long duration simulations and signatures for the same from the ocular parameters were assessed. Results from the study found correlation between the statistical inferences obtained from the ocular parameters with those obtained from the flight path deviations. The paper also demonstrates an evaluators console that assists the designers or evaluators for better understanding of pilots attentional resource allocation.
△ Less
Submitted 9 June, 2021;
originally announced June 2021.
-
CYPUR-NN: Crop Yield Prediction Using Regression and Neural Networks
Authors:
Sandesh Ramesh,
Anirudh Hebbar,
Varun Yadav,
Thulasiram Gunta,
A Balachandra
Abstract:
Our recent study using historic data of paddy yield and associated conditions include humidity, luminescence, and temperature. By incorporating regression models and neural networks (NN), one can produce highly satisfactory forecasting of paddy yield. Simulations indicate that our model can predict paddy yield with high accuracy while concurrently detecting diseases that may exist and are obliviou…
▽ More
Our recent study using historic data of paddy yield and associated conditions include humidity, luminescence, and temperature. By incorporating regression models and neural networks (NN), one can produce highly satisfactory forecasting of paddy yield. Simulations indicate that our model can predict paddy yield with high accuracy while concurrently detecting diseases that may exist and are oblivious to the human eye. Crop Yield Prediction Using Regression and Neural Networks (CYPUR-NN) is developed here as a system that will facilitate agriculturists and farmers to predict yield from a picture or by entering values via a web interface. CYPUR-NN has been tested on stock images and the experimental results are promising.
△ Less
Submitted 26 November, 2020;
originally announced November 2020.
-
Spinning S-matrix Bootstrap in 4d
Authors:
Aditya Hebbar,
Denis Karateev,
Joao Penedones
Abstract:
We review unitarity and crossing constraints on scattering amplitudes for particles with spin in four dimensional quantum field theories. As an application we study two to two scattering of neutral spin 1/2 fermions in detail. Assuming Mandelstam analyticity of its scattering amplitude, we use the numerical S-matrix bootstrap method to estimate various non-perturbative bounds on quartic and cubic…
▽ More
We review unitarity and crossing constraints on scattering amplitudes for particles with spin in four dimensional quantum field theories. As an application we study two to two scattering of neutral spin 1/2 fermions in detail. Assuming Mandelstam analyticity of its scattering amplitude, we use the numerical S-matrix bootstrap method to estimate various non-perturbative bounds on quartic and cubic (Yukawa) couplings.
△ Less
Submitted 28 March, 2022; v1 submitted 23 November, 2020;
originally announced November 2020.
-
Flux Tube S-matrix Bootstrap
Authors:
Joan Elias Miro,
Andrea L. Guerrieri,
Aditya Hebbar,
Joao Penedones,
Pedro Vieira
Abstract:
We bootstrap the S-matrix of massless particles in unitary, relativistic two dimensional quantum field theories. We find that the low energy expansion of such S-matrices is strongly constrained by the existence of a UV completion. In the context of flux tube physics, this allows us to constrain several terms in the S-matrix low energy expansion or -- equivalently -- on Wilson coefficients of sever…
▽ More
We bootstrap the S-matrix of massless particles in unitary, relativistic two dimensional quantum field theories. We find that the low energy expansion of such S-matrices is strongly constrained by the existence of a UV completion. In the context of flux tube physics, this allows us to constrain several terms in the S-matrix low energy expansion or -- equivalently -- on Wilson coefficients of several irrelevant operators showing up in the flux tube effective action. These bounds have direct implications for other physical quantities; for instance, they allow us to further bound the ground state energy as well as the level splitting of degenerate energy levels of large flux tubes. We find that the S-matrices living at the boundary of the allowed space exhibit an intricate pattern of resonances with one sharper resonance whose quantum numbers, mass and width are precisely those of the world-sheet axion proposed in [1,2]. The general method proposed here should be extendable to massless S-matrices in higher dimensions and should lead to new quantitative bounds on irrelevant operators in theories of Goldstones and also in gauge and gravity theories.
△ Less
Submitted 4 February, 2021; v1 submitted 19 June, 2019;
originally announced June 2019.
-
Light sterile neutrinos, dark matter, and new resonances in a $U(1)$ extension of the MSSM
Authors:
A. Hebbar,
G. Lazarides,
Q. Shafi
Abstract:
We present $ψ'$MSSM, a model based on a $U(1)_{ψ'}$ extension of the minimal supersymmetric standard model. The gauge symmetry $U(1)_{ψ'}$, also known as $U(1)_N$, is a linear combination of the $U(1)_χ$ and $U(1)_ψ$ subgroups of $E_6$. The model predicts the existence of three sterile neutrinos with masses $\lesssim 0.1~{\rm eV}$, if the $U(1)_{ψ'}$ breaking scale is of order 10 TeV. Their contri…
▽ More
We present $ψ'$MSSM, a model based on a $U(1)_{ψ'}$ extension of the minimal supersymmetric standard model. The gauge symmetry $U(1)_{ψ'}$, also known as $U(1)_N$, is a linear combination of the $U(1)_χ$ and $U(1)_ψ$ subgroups of $E_6$. The model predicts the existence of three sterile neutrinos with masses $\lesssim 0.1~{\rm eV}$, if the $U(1)_{ψ'}$ breaking scale is of order 10 TeV. Their contribution to the effective number of neutrinos at nucleosynthesis is $ΔN_ν\simeq 0.29$. The model can provide a variety of possible cold dark matter candidates including the lightest sterile sneutrino. If the $U(1)_{ψ'}$ breaking scale is increased to $10^3~{\rm TeV}$, the sterile neutrinos, which are stable on account of a $Z_2$ symmetry, become viable warm dark matter candidates. The observed value of the standard model Higgs boson mass can be obtained with relatively light stop quarks thanks to the D-term contribution from $U(1)_{ψ'}$. The model predicts diquark and diphoton resonances which may be found at an updated LHC. The well-known $μ$ problem is resolved and the observed baryon asymmetry of the universe can be generated via leptogenesis. The breaking of $U(1)_{ψ'}$ produces superconducting strings that may be present in our galaxy. A $U(1)$ R symmetry plays a key role in keeping the proton stable and providing the light sterile neutrinos.
△ Less
Submitted 31 October, 2017; v1 submitted 29 June, 2017;
originally announced June 2017.
-
Light Higgsinos, Heavy Gluino and $b-τ$ Quasi-Yukawa Unification: Will the LHC find the Gluino?
Authors:
Aditya Hebbar,
Qaisar Shafi,
Cem Salih Un
Abstract:
A wide variety of unified models predict asymptotic relations at $M_{GUT}$ between the b quark and $τ$ lepton Yukawa couplings. Within the framework of supersymmetric SU(4) $\times$ SU(2)$_L \times$ SU(2)$_R$, we explore regions of the parameter space that are compatible with b-$τ$ quasi-Yukawa unification and the higgsinos being the lightest supersymmetric particles ($\lesssim$ 1 TeV). Among the…
▽ More
A wide variety of unified models predict asymptotic relations at $M_{GUT}$ between the b quark and $τ$ lepton Yukawa couplings. Within the framework of supersymmetric SU(4) $\times$ SU(2)$_L \times$ SU(2)$_R$, we explore regions of the parameter space that are compatible with b-$τ$ quasi-Yukawa unification and the higgsinos being the lightest supersymmetric particles ($\lesssim$ 1 TeV). Among the colored sparticles, the stop weighs more than 1.5 TeV or so, whereas the squarks of the first two families are signifcantly heavier, approaching 10 TeV in some cases. The gluino mass is estimated to lie in the 2-4 TeV range which raises the important question: Will the LHC find the gluino?
△ Less
Submitted 17 February, 2017;
originally announced February 2017.
-
An Analytic Approach to Sunset Diagrams in Chiral Perturbation Theory: Theory and Practice
Authors:
B. Ananthanarayan,
Johan Bijnens,
Shayan Ghosh,
Aditya Hebbar
Abstract:
We demonstrate the use of several code implementations of the Mellin-Barnes method available in the public domain to derive analytic expressions for the sunset diagrams that arise in the two-loop contribution to the pion mass and decay constant in three-flavoured chiral perturbation theory. We also provide results for all possible two-mass configurations of the sunset integral, and derive a new on…
▽ More
We demonstrate the use of several code implementations of the Mellin-Barnes method available in the public domain to derive analytic expressions for the sunset diagrams that arise in the two-loop contribution to the pion mass and decay constant in three-flavoured chiral perturbation theory. We also provide results for all possible two-mass configurations of the sunset integral, and derive a new one-dimensional integral representation for the one mass sunset integral with arbitrary external momentum. Thoroughly annotated Mathematica notebooks are provided as ancillary files, which may serve as pedagogical supplements to the methods described in this paper.
△ Less
Submitted 9 January, 2017; v1 submitted 8 August, 2016;
originally announced August 2016.
-
Masses of Third Family Vector-like Quarks and Leptons in Yukawa-Unified $E_6$
Authors:
Aditya Hebbar,
George K. Leontaris,
Qaisar Shafi
Abstract:
In supersymmetric $E_6$ the masses of the third family quarks and charged lepton, $t-b-τ$, as well as the masses of the vector-like quarks and leptons, $D-\bar{D}$ and $ L-\bar{L}$, may arise from the coupling $27_3$ x $27_3$ x $27_H$, where $27_3$ and $27_H$ denote the third family matter and Higgs multiplets respectively. We assume that the SO(10) singlet component in $27_H$ acquires a TeV scale…
▽ More
In supersymmetric $E_6$ the masses of the third family quarks and charged lepton, $t-b-τ$, as well as the masses of the vector-like quarks and leptons, $D-\bar{D}$ and $ L-\bar{L}$, may arise from the coupling $27_3$ x $27_3$ x $27_H$, where $27_3$ and $27_H$ denote the third family matter and Higgs multiplets respectively. We assume that the SO(10) singlet component in $27_H$ acquires a TeV scale VEV which spontaneously breaks U(1)$_ψ$ and provides masses to the vector-like particles in $27_3$, while the MSSM doublets in $27_H$ provide masses to $ t, b$ and $τ$. Imposing Yukawa coupling unification $h_t=h_b=h_τ=h_D=h_L$ at $M_{GUT}$ and employing the ATLAS and CMS constraints on the $Z'_ψ$ boson mass, we estimate the lower bounds on the third family vector-like particles $D-\bar{D}$ and $L-\bar{L}$ masses to be around 5.85 TeV and 2.9 TeV respectively. These bounds apply in the supersymmetric limit.
△ Less
Submitted 28 April, 2016;
originally announced April 2016.