-
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers
Authors:
Tzvika Shapira,
David Berend,
Ishai Rosenberg,
Yang Liu,
Asaf Shabtai,
Yuval Elovici
Abstract:
The performance of a machine learning-based malware classifier depends on the large and updated training set used to induce its model. In order to maintain an up-to-date training set, there is a need to continuously collect benign and malicious files from a wide range of sources, providing an exploitable target to attackers. In this study, we show how an attacker can launch a sophisticated and eff…
▽ More
The performance of a machine learning-based malware classifier depends on the large and updated training set used to induce its model. In order to maintain an up-to-date training set, there is a need to continuously collect benign and malicious files from a wide range of sources, providing an exploitable target to attackers. In this study, we show how an attacker can launch a sophisticated and efficient poisoning attack targeting the dataset used to train a malware classifier. The attacker's ultimate goal is to ensure that the model induced by the poisoned dataset will be unable to detect the attacker's malware yet capable of detecting other malware. As opposed to other poisoning attacks in the malware detection domain, our attack does not focus on malware families but rather on specific malware instances that contain an implanted trigger, reducing the detection rate from 99.23% to 0% depending on the amount of poisoning. We evaluate our attack on the EMBER dataset with a state-of-the-art classifier and malware samples from VirusTotal for end-to-end validation of our work. We propose a comprehensive detection approach that could serve as a future sophisticated defense against this newly discovered severe threat.
△ Less
Submitted 30 October, 2020;
originally announced October 2020.
-
Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability
Authors:
Ishai Rosenberg,
Shai Meir,
Jonathan Berrebi,
Ilay Gordon,
Guillaume Sicard,
Eli David
Abstract:
In recent years, the topic of explainable machine learning (ML) has been extensively researched. Up until now, this research focused on regular ML users use-cases such as debugging a ML model. This paper takes a different posture and show that adversaries can leverage explainable ML to bypass multi-feature types malware classifiers. Previous adversarial attacks against such classifiers only add ne…
▽ More
In recent years, the topic of explainable machine learning (ML) has been extensively researched. Up until now, this research focused on regular ML users use-cases such as debugging a ML model. This paper takes a different posture and show that adversaries can leverage explainable ML to bypass multi-feature types malware classifiers. Previous adversarial attacks against such classifiers only add new features and not modify existing ones to avoid harming the modified malware executable's functionality. Current attacks use a single algorithm that both selects which features to modify and modifies them blindly, treating all features the same. In this paper, we present a different approach. We split the adversarial example generation task into two parts: First we find the importance of all features for a specific sample using explainability algorithms, and then we conduct a feature-specific modification, feature-by-feature. In order to apply our attack in black-box scenarios, we introduce the concept of transferability of explainability, that is, applying explainability algorithms to different classifiers using different features subsets and trained on different datasets still result in a similar subset of important features. We conclude that explainability algorithms can be leveraged by adversaries and thus the advocates of training more interpretable classifiers should consider the trade-off of higher vulnerability of those classifiers to adversarial attacks.
△ Less
Submitted 1 June, 2022; v1 submitted 28 September, 2020;
originally announced September 2020.
-
FOOD: Fast Out-Of-Distribution Detector
Authors:
Guy Amit,
Moshe Levy,
Ishai Rosenberg,
Asaf Shabtai,
Yuval Elovici
Abstract:
Deep neural networks (DNNs) perform well at classifying inputs associated with the classes they have been trained on, which are known as in distribution inputs. However, out-of-distribution (OOD) inputs pose a great challenge to DNNs and consequently represent a major risk when DNNs are implemented in safety-critical systems. Extensive research has been performed in the domain of OOD detection. Ho…
▽ More
Deep neural networks (DNNs) perform well at classifying inputs associated with the classes they have been trained on, which are known as in distribution inputs. However, out-of-distribution (OOD) inputs pose a great challenge to DNNs and consequently represent a major risk when DNNs are implemented in safety-critical systems. Extensive research has been performed in the domain of OOD detection. However, current state-of-the-art methods for OOD detection suffer from at least one of the following limitations: (1) increased inference time - this limits existing methods' applicability to many real-world applications, and (2) the need for OOD training data - such data can be difficult to acquire and may not be representative enough, thus limiting the ability of the OOD detector to generalize. In this paper, we propose FOOD -- Fast Out-Of-Distribution detector -- an extended DNN classifier capable of efficiently detecting OOD samples with minimal inference time overhead. Our architecture features a DNN with a final Gaussian layer combined with the log likelihood ratio statistical test and an additional output neuron for OOD detection. Instead of using real OOD data, we use a novel method to craft artificial OOD samples from in-distribution data, which are used to train our OOD detector neuron. We evaluate FOOD's detection performance on the SVHN, CIFAR-10, and CIFAR-100 datasets. Our results demonstrate that in addition to achieving state-of-the-art performance, FOOD is fast and applicable to real-world applications.
△ Less
Submitted 23 February, 2021; v1 submitted 16 August, 2020;
originally announced August 2020.
-
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
Authors:
Ihai Rosenberg,
Asaf Shabtai,
Yuval Elovici,
Lior Rokach
Abstract:
In recent years machine learning algorithms, and more specifically deep learning algorithms, have been widely used in many fields, including cyber security. However, machine learning systems are vulnerable to adversarial attacks, and this limits the application of machine learning, especially in non-stationary, adversarial environments, such as the cyber security domain, where actual adversaries (…
▽ More
In recent years machine learning algorithms, and more specifically deep learning algorithms, have been widely used in many fields, including cyber security. However, machine learning systems are vulnerable to adversarial attacks, and this limits the application of machine learning, especially in non-stationary, adversarial environments, such as the cyber security domain, where actual adversaries (e.g., malware developers) exist. This paper comprehensively summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques and illuminates the risks they pose. First, the adversarial attack methods are characterized based on their stage of occurrence, and the attacker's goals and capabilities. Then, we categorize the applications of adversarial attack and defense methods in the cyber security domain. Finally, we highlight some characteristics identified in recent research and discuss the impact of recent advancements in other adversarial learning domains on future research directions in the cyber security domain. This paper is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain, map them in a unified taxonomy, and use the taxonomy to highlight future research directions.
△ Less
Submitted 13 March, 2021; v1 submitted 5 July, 2020;
originally announced July 2020.
-
GIM: Gaussian Isolation Machines
Authors:
Guy Amit,
Ishai Rosenberg,
Moshe Levy,
Ron Bitton,
Asaf Shabtai,
Yuval Elovici
Abstract:
In many cases, neural network classifiers are likely to be exposed to input data that is outside of their training distribution data. Samples from outside the distribution may be classified as an existing class with high probability by softmax-based classifiers; such incorrect classifications affect the performance of the classifiers and the applications/systems that depend on them. Previous resea…
▽ More
In many cases, neural network classifiers are likely to be exposed to input data that is outside of their training distribution data. Samples from outside the distribution may be classified as an existing class with high probability by softmax-based classifiers; such incorrect classifications affect the performance of the classifiers and the applications/systems that depend on them. Previous research aimed at distinguishing training distribution data from out-of-distribution data (OOD) has proposed detectors that are external to the classification method. We present Gaussian isolation machine (GIM), a novel hybrid (generative-discriminative) classifier aimed at solving the problem arising when OOD data is encountered. The GIM is based on a neural network and utilizes a new loss function that imposes a distribution on each of the trained classes in the neural network's output space, which can be approximated by a Gaussian. The proposed GIM's novelty lies in its discriminative performance and generative capabilities, a combination of characteristics not usually seen in a single classifier. The GIM achieves state-of-the-art classification results on image recognition and sentiment analysis benchmarking datasets and can also deal with OOD inputs.
△ Less
Submitted 21 March, 2020; v1 submitted 6 February, 2020;
originally announced February 2020.
-
End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware
Authors:
Ishai Rosenberg,
Guillaume Sicard,
Eli David
Abstract:
Malware allegedly developed by nation-states, also known as advanced persistent threats (APT), are becoming more common. The task of attributing an APT to a specific nation-state or classifying it to the correct APT family is challenging for several reasons. First, each nation-state has more than a single cyber unit that develops such malware, rendering traditional authorship attribution algorithm…
▽ More
Malware allegedly developed by nation-states, also known as advanced persistent threats (APT), are becoming more common. The task of attributing an APT to a specific nation-state or classifying it to the correct APT family is challenging for several reasons. First, each nation-state has more than a single cyber unit that develops such malware, rendering traditional authorship attribution algorithms useless. Furthermore, the dataset of such available APTs is still extremely small. Finally, those APTs use state-of-the-art evasion techniques, making feature extraction challenging. In this paper, we use a deep neural network (DNN) as a classifier for nation-state APT attribution. We record the dynamic behavior of the APT when run in a sandbox and use it as raw input for the neural network, allowing the DNN to learn high level feature abstractions of the APTs itself. We also use the same raw features for APT family classification. Finally, we use the feature abstractions learned by the APT family classifier to solve the attribution problem. Using a test set of 1000 Chinese and Russian developed APTs, we achieved an accuracy rate of 98.6%.
△ Less
Submitted 29 November, 2019;
originally announced December 2019.
-
Defense Methods Against Adversarial Examples for Recurrent Neural Networks
Authors:
Ishai Rosenberg,
Asaf Shabtai,
Yuval Elovici,
Lior Rokach
Abstract:
Adversarial examples are known to mislead deep learning models to incorrectly classify them, even in domains where such models achieve state-of-the-art performance. Until recently, research on both attack and defense methods focused on image recognition, primarily using convolutional neural networks (CNNs). In recent years, adversarial example generation methods for recurrent neural networks (RNNs…
▽ More
Adversarial examples are known to mislead deep learning models to incorrectly classify them, even in domains where such models achieve state-of-the-art performance. Until recently, research on both attack and defense methods focused on image recognition, primarily using convolutional neural networks (CNNs). In recent years, adversarial example generation methods for recurrent neural networks (RNNs) have been published, demonstrating that RNN classifiers are also vulnerable to such attacks. In this paper, we present a novel defense method, termed sequence squeezing, to make RNN classifiers more robust against such attacks. Our method differs from previous defense methods which were designed only for non-sequence based models. We also implement four additional RNN defense methods inspired by recently published CNN defense methods. We evaluate our methods against state-of-the-art attacks in the cyber security domain where real adversaries (malware developers) exist, but our methods can be applied against other discrete sequence based adversarial attacks, e.g., in the NLP domain. Using our methods we were able to decrease the effectiveness of such attack from 99.9% to 15%.
△ Less
Submitted 20 November, 2019; v1 submitted 28 January, 2019;
originally announced January 2019.
-
DeepOrigin: End-to-End Deep Learning for Detection of New Malware Families
Authors:
Ilay Cordonsky,
Ishai Rosenberg,
Guillaume Sicard,
Eli David
Abstract:
In this paper, we present a novel method of differentiating known from previously unseen malware families. We utilize transfer learning by learning compact file representations that are used for a new classification task between previously seen malware families and novel ones. The learned file representations are composed of static and dynamic features of malware and are invariant to small modific…
▽ More
In this paper, we present a novel method of differentiating known from previously unseen malware families. We utilize transfer learning by learning compact file representations that are used for a new classification task between previously seen malware families and novel ones. The learned file representations are composed of static and dynamic features of malware and are invariant to small modifications that do not change their malicious functionality. Using an extensive dataset that consists of thousands of variants of malicious files, we were able to achieve 97.7% accuracy when classifying between seen and unseen malware families. Our method provides an important focalizing tool for cybersecurity researchers and greatly improves the overall ability to adapt to the fast-moving pace of the current threat landscape.
△ Less
Submitted 23 November, 2019; v1 submitted 22 September, 2018;
originally announced September 2018.
-
From Recommendation Systems to Facility Location Games
Authors:
Omer Ben-Porat,
Gregory Goren,
Itay Rosenberg,
Moshe Tennenholtz
Abstract:
Recommendation systems are extremely popular tools for matching users and contents. However, when content providers are strategic, the basic principle of matching users to the closest content, where both users and contents are modeled as points in some semantic space, may yield low social welfare. This is due to the fact that content providers are strategic and optimize their offered content to be…
▽ More
Recommendation systems are extremely popular tools for matching users and contents. However, when content providers are strategic, the basic principle of matching users to the closest content, where both users and contents are modeled as points in some semantic space, may yield low social welfare. This is due to the fact that content providers are strategic and optimize their offered content to be recommended to as many users as possible. Motivated by modern applications, we propose the widely studied framework of facility location games to study recommendation systems with strategic content providers. Our conceptual contribution is the introduction of a $\textit{mediator}$ to facility location models, in the pursuit of better social welfare. We aim at designing mediators that a) induce a game with high social welfare in equilibrium, and b) intervene as little as possible. In service of the latter, we introduce the notion of $\textit{intervention cost}$, which quantifies how much damage a mediator may cause to the social welfare when an off-equilibrium profile is adopted. As a case study in high-welfare low-intervention mediator design, we consider the one-dimensional segment as the user domain. We propose a mediator that implements the socially optimal strategy profile as the unique equilibrium profile, and show a tight bound on its intervention cost. Ultimately, we consider some extensions, and highlight open questions for the general agenda.
△ Less
Submitted 9 September, 2018;
originally announced September 2018.
-
Fully guided electrically-controlled exciton polaritons
Authors:
Dror Liran,
Itamar Rosenberg,
Kenneth West,
Loren Pfeiffer,
Ronen Rapaport
Abstract:
We demonstrate two types of waveguide structures which optically confine exciton- polaritons in two dimensions and act as polaritonic channels. We show a strong optical confinement in an etched rectangular waveguide, that significantly increases the propa- gation distance of the polaritons and allow to direct them in curved trajectories. Also, we show low-loss optical guiding over a record-high of…
▽ More
We demonstrate two types of waveguide structures which optically confine exciton- polaritons in two dimensions and act as polaritonic channels. We show a strong optical confinement in an etched rectangular waveguide, that significantly increases the propa- gation distance of the polaritons and allow to direct them in curved trajectories. Also, we show low-loss optical guiding over a record-high of hundreds of microns which is com- bined seamlessly with electrical control of the polaritons, in a strip waveguide formed by electrically conductive and optically transparent strips deposited on top of a planar waveguide. Both structures are scalable and easy to fabricate and offer new possibilities for designing complex polaritonic devices.
△ Less
Submitted 4 August, 2018;
originally announced August 2018.
-
Convergence of Learning Dynamics in Information Retrieval Games
Authors:
Omer Ben-Porat,
Itay Rosenberg,
Moshe Tennenholtz
Abstract:
We consider a game-theoretic model of information retrieval with strategic authors. We examine two different utility schemes: authors who aim at maximizing exposure and authors who want to maximize active selection of their content (i.e. the number of clicks). We introduce the study of author learning dynamics in such contexts. We prove that under the probability ranking principle (PRP), which for…
▽ More
We consider a game-theoretic model of information retrieval with strategic authors. We examine two different utility schemes: authors who aim at maximizing exposure and authors who want to maximize active selection of their content (i.e. the number of clicks). We introduce the study of author learning dynamics in such contexts. We prove that under the probability ranking principle (PRP), which forms the basis of the current state of the art ranking methods, any better-response learning dynamics converges to a pure Nash equilibrium. We also show that other ranking methods induce a strategic environment under which such a convergence may not occur.
△ Less
Submitted 20 February, 2019; v1 submitted 14 June, 2018;
originally announced June 2018.
-
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers
Authors:
Ishai Rosenberg,
Asaf Shabtai,
Yuval Elovici,
Lior Rokach
Abstract:
In this paper, we present a generic, query-efficient black-box attack against API call-based machine learning malware classifiers. We generate adversarial examples by modifying the malware's API call sequences and non-sequential features (printable strings), and these adversarial examples will be misclassified by the target malware classifier without affecting the malware's functionality. In contr…
▽ More
In this paper, we present a generic, query-efficient black-box attack against API call-based machine learning malware classifiers. We generate adversarial examples by modifying the malware's API call sequences and non-sequential features (printable strings), and these adversarial examples will be misclassified by the target malware classifier without affecting the malware's functionality. In contrast to previous studies, our attack minimizes the number of malware classifier queries required. In addition, in our attack, the attacker must only know the class predicted by the malware classifier; attacker knowledge of the malware classifier's confidence score is optional. We evaluate the attack effectiveness when attacks are performed against a variety of malware classifier architectures, including recurrent neural network (RNN) variants, deep neural networks, support vector machines, and gradient boosted decision trees. Our attack success rate is around 98% when the classifier's confidence score is known and 64% when just the classifier's predicted class is known. We implement four state-of-the-art query-efficient attacks and show that our attack requires fewer queries and less knowledge about the attacked model's architecture than other existing query-efficient attacks, making it practical for attacking cloud-based malware classifiers at a minimal cost.
△ Less
Submitted 3 October, 2020; v1 submitted 23 April, 2018;
originally announced April 2018.
-
Strongly interacting dipolar-polaritons
Authors:
Itamar Rosenberg,
Dror Liran,
Yotam Mazuz-Harpaz,
Kenneth West,
Loren Pfeiffer,
Ronen Rapaport
Abstract:
Exciton-polaritons are mutually interacting quantum hybridizations of confined photons and electronic excitations. Here we demonstrate a system of optically guided, electrically polarized exciton-polaritons ('dipolaritons') that displays up to 200-fold enhancement of the polariton-polariton interaction strength compared to unpolarized polaritons. The magnitude of the dipolar interaction enhancemen…
▽ More
Exciton-polaritons are mutually interacting quantum hybridizations of confined photons and electronic excitations. Here we demonstrate a system of optically guided, electrically polarized exciton-polaritons ('dipolaritons') that displays up to 200-fold enhancement of the polariton-polariton interaction strength compared to unpolarized polaritons. The magnitude of the dipolar interaction enhancement can be turned on and off and be easily tuned over a very wide range by varying the applied polarizing electric-field. The very large interaction strengths and the very long propagation distances of these fully-guided dipolaritons open up new opportunities for realizing complex quantum circuitry and quantum simulators, as well as topological states based on exciton-polaritons, for which the interactions between polaritons need to be large and spatially or temporally controlled. The results also raise fundamental questions on the origin of such large enhancements.
△ Less
Submitted 16 April, 2018; v1 submitted 4 February, 2018;
originally announced February 2018.
-
DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks
Authors:
Ishai Rosenberg,
Guillaume Sicard,
Eli David
Abstract:
In recent years numerous advanced malware, aka advanced persistent threats (APT) are allegedly developed by nation-states. The task of attributing an APT to a specific nation-state is extremely challenging for several reasons. Each nation-state has usually more than a single cyber unit that develops such advanced malware, rendering traditional authorship attribution algorithms useless. Furthermore…
▽ More
In recent years numerous advanced malware, aka advanced persistent threats (APT) are allegedly developed by nation-states. The task of attributing an APT to a specific nation-state is extremely challenging for several reasons. Each nation-state has usually more than a single cyber unit that develops such advanced malware, rendering traditional authorship attribution algorithms useless. Furthermore, those APTs use state-of-the-art evasion techniques, making feature extraction challenging. Finally, the dataset of such available APTs is extremely small.
In this paper we describe how deep neural networks (DNN) could be successfully employed for nation-state APT attribution. We use sandbox reports (recording the behavior of the APT when run dynamically) as raw input for the neural network, allowing the DNN to learn high level feature abstractions of the APTs itself. Using a test set of 1,000 Chinese and Russian developed APTs, we achieved an accuracy rate of 94.6%.
△ Less
Submitted 27 November, 2017;
originally announced November 2017.
-
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
Authors:
Ishai Rosenberg,
Asaf Shabtai,
Lior Rokach,
Yuval Elovici
Abstract:
In this paper, we present a black-box attack against API call based machine learning malware classifiers, focusing on generating adversarial sequences combining API calls and static features (e.g., printable strings) that will be misclassified by the classifier without affecting the malware functionality. We show that this attack is effective against many classifiers due to the transferability pri…
▽ More
In this paper, we present a black-box attack against API call based machine learning malware classifiers, focusing on generating adversarial sequences combining API calls and static features (e.g., printable strings) that will be misclassified by the classifier without affecting the malware functionality. We show that this attack is effective against many classifiers due to the transferability principle between RNN variants, feed forward DNNs, and traditional machine learning classifiers such as SVM. We also implement GADGET, a software framework to convert any malware binary to a binary undetected by malware classifiers, using the proposed attack, without access to the malware source code.
△ Less
Submitted 24 June, 2018; v1 submitted 19 July, 2017;
originally announced July 2017.
-
Free monoids and generalized metric spaces
Authors:
Mustapha Kabil,
Maurice Pouzet,
Ivo Rosenberg
Abstract:
Let $A$ be an ordered alphabet, $A^{\ast}$ be the free monoid over $A$ ordered by the Higman ordering, and let $F(A^{\ast})$ be the set of final segments of $A^{\ast}$. With the operation of concatenation, this set is a monoid. We show that the submonoid $F^{\circ}(A^{\ast}):= F(A^{\ast})\setminus \{\emptyset\}$ is free. The MacNeille completion $N(A^{\ast})$ of $A^{\ast}$ is a submonoid of…
▽ More
Let $A$ be an ordered alphabet, $A^{\ast}$ be the free monoid over $A$ ordered by the Higman ordering, and let $F(A^{\ast})$ be the set of final segments of $A^{\ast}$. With the operation of concatenation, this set is a monoid. We show that the submonoid $F^{\circ}(A^{\ast}):= F(A^{\ast})\setminus \{\emptyset\}$ is free. The MacNeille completion $N(A^{\ast})$ of $A^{\ast}$ is a submonoid of $F(A^{\ast})$. As a corollary, we obtain that the monoid $N^{\circ}(A^{\ast}):=N(A^{\ast})\setminus \{\emptyset\}$ is free. We give an interpretation of the freeness of $F^{\circ}(A^{\ast})$ in the category of metric spaces over the Heyting algebra $V:= F(A^{\ast})$, with the non-expansive mappings as morphisms. Each final segment of $A^{\ast}$ yields the injective envelope $\mathcal S_F$ of a two-element metric space over $V$. The uniqueness of the decomposition of $F$ is due to the uniqueness of the block decomposition of the graph $\mathcal {G}_{F}$ associated to this injective envelope.
△ Less
Submitted 26 May, 2017;
originally announced May 2017.
-
Electrically controlled mutual interactions of flying waveguide dipolaritons
Authors:
Itamar Rosenberg,
Yotam Harpaz,
Kenneth West,
Loren Pffeifer,
Ronen Rapaport
Abstract:
We show that with a system of electrically-gated wide quantum wells embedded inside a simple dielectric waveguide structure, it is possible to excite, control, and observe waveguided exciton polaritons that carry an electric dipole moment. We demonstrate that the energy of the propagating dipolariton can be easily tuned using local electrical gates, that their excitation and extraction can be easi…
▽ More
We show that with a system of electrically-gated wide quantum wells embedded inside a simple dielectric waveguide structure, it is possible to excite, control, and observe waveguided exciton polaritons that carry an electric dipole moment. We demonstrate that the energy of the propagating dipolariton can be easily tuned using local electrical gates, that their excitation and extraction can be easily done using simple evaporated metal gratings, and that the dipolar interactions between polaritons and between polaritons and excitons can also be controlled by the applied electric fields. This system of gated flying dipolaritons thus exhibit the ability to locally control both the single polariton properties as well as the interactions between polaritons, which should open up opportunities for constructing complex polaritonic circuits and for studying strongly-interacting, correlated polariton gases.
△ Less
Submitted 14 June, 2016; v1 submitted 20 April, 2016;
originally announced April 2016.
-
Partial clones containing all Boolean monotone self-dual partial functions
Authors:
Miguel Couceiro,
Lucien Haddad,
Ivo G. Rosenberg
Abstract:
The study of partial clones on $\mathbf{2}:=\{0,1\}$ was initiated by R. V. Freivald. In his fundamental paper published in 1966, Freivald showed, among other things, that the set of all monotone partial functions and the set of all self-dual partial functions are both maximal partial clones on $\mathbf{2}$. Several papers dealing with intersections of maximal partial clones on $\mathbf{2}$ have a…
▽ More
The study of partial clones on $\mathbf{2}:=\{0,1\}$ was initiated by R. V. Freivald. In his fundamental paper published in 1966, Freivald showed, among other things, that the set of all monotone partial functions and the set of all self-dual partial functions are both maximal partial clones on $\mathbf{2}$. Several papers dealing with intersections of maximal partial clones on $\mathbf{2}$ have appeared after Freivald work. It is known that there are infinitely many partial clones that contain the set of all monotone self-dual partial functions on $\mathbf{2}$, and the problem of describing them all was posed by some authors. In this paper we show that the set of partial clones that contain all monotone self-dual partial functions is of continuum cardinality on $\mathbf{2}$.
△ Less
Submitted 5 August, 2015;
originally announced August 2015.
-
Semirigid systems of three equivalence relations
Authors:
Christian Delhommé,
Masahiro Miyakawa,
Maurice Pouzet,
Ivo G. Rosenberg,
Hisayuki Tatsumi
Abstract:
A system $\mathcal M$ of equivalence relations on a set $E$ is \emph{semirigid} if only the identity and constant functions preserve all members of $\mathcal M$. We construct semirigid systems of three equivalence relations. Our construction leads to the examples given by Zádori in 1983 and to many others and also extends to some infinite cardinalities. As a consequence, we show that on every set…
▽ More
A system $\mathcal M$ of equivalence relations on a set $E$ is \emph{semirigid} if only the identity and constant functions preserve all members of $\mathcal M$. We construct semirigid systems of three equivalence relations. Our construction leads to the examples given by Zádori in 1983 and to many others and also extends to some infinite cardinalities. As a consequence, we show that on every set of at most continuum cardinality distinct from $2$ and $4$ there exists a semirigid system of three equivalence relations.
△ Less
Submitted 12 May, 2015;
originally announced May 2015.
-
Purcell-enhanced optical spin readout of Nitrogen-Vacancy centers in diamond
Authors:
Sigal A. Wolf,
Itamar Rosenberg,
Ronen Rapaport,
Nir Bar-Gill
Abstract:
Nitrogen-Vacancy (NV) color centers in diamond have emerged as promising quantum solid-state systems, with applications ranging from quantum information processing to magnetic sensing. One of the most useful properties of NVs is the ability to read their ground-state spin projection optically at room temperature. This work provides a theoretical analysis of Purcell enhanced NV optical coupling, th…
▽ More
Nitrogen-Vacancy (NV) color centers in diamond have emerged as promising quantum solid-state systems, with applications ranging from quantum information processing to magnetic sensing. One of the most useful properties of NVs is the ability to read their ground-state spin projection optically at room temperature. This work provides a theoretical analysis of Purcell enhanced NV optical coupling, through which we find optimal parameters for maximal Signal to Noise Ratio (SNR) of the optical spin-state readout. We conclude that a combined increase in spontaneous emission (through Purcell enhancement) and in optical excitation could significantly increase the readout SNR.
△ Less
Submitted 5 May, 2015;
originally announced May 2015.
-
The Physics of the B Factories
Authors:
A. J. Bevan,
B. Golob,
Th. Mannel,
S. Prell,
B. D. Yabsley,
K. Abe,
H. Aihara,
F. Anulli,
N. Arnaud,
T. Aushev,
M. Beneke,
J. Beringer,
F. Bianchi,
I. I. Bigi,
M. Bona,
N. Brambilla,
J. B rodzicka,
P. Chang,
M. J. Charles,
C. H. Cheng,
H. -Y. Cheng,
R. Chistov,
P. Colangelo,
J. P. Coleman,
A. Drutskoy
, et al. (2009 additional authors not shown)
Abstract:
This work is on the Physics of the B Factories. Part A of this book contains a brief description of the SLAC and KEK B Factories as well as their detectors, BaBar and Belle, and data taking related issues. Part B discusses tools and methods used by the experiments in order to obtain results. The results themselves can be found in Part C.
Please note that version 3 on the archive is the auxiliary…
▽ More
This work is on the Physics of the B Factories. Part A of this book contains a brief description of the SLAC and KEK B Factories as well as their detectors, BaBar and Belle, and data taking related issues. Part B discusses tools and methods used by the experiments in order to obtain results. The results themselves can be found in Part C.
Please note that version 3 on the archive is the auxiliary version of the Physics of the B Factories book. This uses the notation alpha, beta, gamma for the angles of the Unitarity Triangle. The nominal version uses the notation phi_1, phi_2 and phi_3. Please cite this work as Eur. Phys. J. C74 (2014) 3026.
△ Less
Submitted 31 October, 2015; v1 submitted 24 June, 2014;
originally announced June 2014.
-
Initial-State Radiation Measurement of the e+e- -> pi+pi-pi+pi- Cross Section
Authors:
J. P. Lees,
V. Poireau,
V. Tisserand,
J. Garra Tico,
E. Grauges,
M. Martinelli,
D. A. Milanes,
A. Palano,
M. Pappagallo,
G. Eigen,
B. Stugu,
D. N. Brown,
L. T. Kerth,
Yu. G. Kolomensky,
G. Lynch,
H. Koch,
T. Schroeder,
D. J. Asgeirsson,
C. Hearty,
T. S. Mattison,
J. A. McKenna,
A. Khan,
V. E. Blinov,
A. R. Buzykaev,
V. P. Druzhinin
, et al. (362 additional authors not shown)
Abstract:
We study the process e+e- -> pi+pi-pi+pi-gamma, with a photon emitted from the initial-state electron or positron, using 454.3 fb^-1 of data collected with the BABAR detector at SLAC, corresponding to approximately 260,000 signal events. We use these data to extract the non-radiative sigma(e+e- ->pi+pi-pi+pi-) cross section in the energy range from 0.6 to 4.5 Gev. The total uncertainty of the cros…
▽ More
We study the process e+e- -> pi+pi-pi+pi-gamma, with a photon emitted from the initial-state electron or positron, using 454.3 fb^-1 of data collected with the BABAR detector at SLAC, corresponding to approximately 260,000 signal events. We use these data to extract the non-radiative sigma(e+e- ->pi+pi-pi+pi-) cross section in the energy range from 0.6 to 4.5 Gev. The total uncertainty of the cross section measurement in the peak region is less than 3%, higher in precision than the corresponding results obtained from energy scan data.
△ Less
Submitted 27 August, 2012; v1 submitted 26 January, 2012;
originally announced January 2012.
-
A Measurement of the Semileptonic Branching Fraction of the B_s Meson
Authors:
The BaBar Collaboration,
J. P. Lees,
V. Poireau,
V. Tisserand,
J. Garra Tico,
E. Grauges,
M. Martinelli,
D. A. Milanes,
A. Palano,
M. Pappagallo,
G. Eigen,
B. Stugu,
D. N. Brown,
L. T. Kerth,
Yu. G. Kolomensky,
G. Lynch,
H. Koch,
T. Schroeder,
D. J. Asgeirsson,
C. Hearty,
T. S. Mattison,
J. A. McKenna,
A. Khan,
V. E. Blinov,
A. R. Buzykaev
, et al. (362 additional authors not shown)
Abstract:
We report a measurement of the inclusive semileptonic branching fraction of the B_s meson using data collected with the BaBar detector in the center-of-mass (CM) energy region above the Upsilon(4S) resonance. We use the inclusive yield of phi mesons and the phi yield in association with a high-momentum lepton to perform a simultaneous measurement of the semileptonic branching fraction and the pr…
▽ More
We report a measurement of the inclusive semileptonic branching fraction of the B_s meson using data collected with the BaBar detector in the center-of-mass (CM) energy region above the Upsilon(4S) resonance. We use the inclusive yield of phi mesons and the phi yield in association with a high-momentum lepton to perform a simultaneous measurement of the semileptonic branching fraction and the production rate of B_s mesons relative to all B mesons as a function of CM energy. The inclusive semileptonic branching fraction of the B_s meson is determined to be B(B_s to l nu X)=9.5 (+2.5/-2.0)(stat)(+1.1/-1.9)(syst)%, where l indicates the average of e and mu.
△ Less
Submitted 10 January, 2012; v1 submitted 25 October, 2011;
originally announced October 2011.
-
Search for hadronic decays of a light Higgs boson in the radiative decay Upsilon --> gamma A0
Authors:
The BABAR Collaboration,
J. P. Lees,
V. Poireau,
V. Tisserand,
J. Garra Tico,
E. Grauges,
M. Martinelli,
D. A. Milanes,
A. Palano,
M. Pappagallo,
G. Eigen,
B. Stugu,
D. N. Brown,
L. T. Kerth,
Yu. G. Kolomensky,
G. Lynch,
H. Koch,
T. Schroeder,
D. J. Asgeirsson,
C. Hearty,
T. S. Mattison,
J. A. McKenna,
R. Y. So,
A. Khan,
V. E. Blinov
, et al. (364 additional authors not shown)
Abstract:
We search for hadronic decays of a light Higgs boson (A0) produced in radiative decays of an Upsilon(2S) or Upsilon(3S) meson, Upsilon --> gamma A0. The data have been recorded by the BABAR experiment at the Upsilon(3S) and Upsilon(2S) center of mass energies, and include (121.3 \pm 1.2) x 10^6 Upsilon(3S) and (98.3 \pm 0.9) x 10^6 Upsilon(2S) mesons. No significant signal is observed. We set 90%…
▽ More
We search for hadronic decays of a light Higgs boson (A0) produced in radiative decays of an Upsilon(2S) or Upsilon(3S) meson, Upsilon --> gamma A0. The data have been recorded by the BABAR experiment at the Upsilon(3S) and Upsilon(2S) center of mass energies, and include (121.3 \pm 1.2) x 10^6 Upsilon(3S) and (98.3 \pm 0.9) x 10^6 Upsilon(2S) mesons. No significant signal is observed. We set 90% confidence level upper limits on the product branching fractions B(Upsilon(nS)-->gamma A0) x B(A0-->hadrons) (n=2 or 3) that range from 1 x 10^{-6} for an A0 mass of 0.3 GeV/c^2 to 8 x 10^{-5} at 7 GeV/c^2.
△ Less
Submitted 17 August, 2011;
originally announced August 2011.
-
Observation of the baryonic B decay B0bar --> Lambda_c^+ anti-Lambda K-
Authors:
The BABAR Collaboration,
J. P. Lees,
V. Poireau,
V. Tisserand,
J. Garra Tico,
E. Grauges,
M. Martinelli,
D. A. Milanes,
A. Palano,
M. Pappagallo,
G. Eigen,
B. Stugu,
L. Sun,
D. N. Brown,
L. T. Kerth,
Yu. G. Kolomensky,
G. Lynch,
H. Koch,
T. Schroeder,
D. J. Asgeirsson,
C. Hearty,
T. S. Mattison,
J. A. McKenna,
A. Khan,
V. E. Blinov
, et al. (363 additional authors not shown)
Abstract:
We report the observation of the baryonic B decay B0bar --> Lambda_c^+ anti-Lambda K- with a significance larger than 7 standard deviations based on 471x10^6$ BBbar pairs collected with the BABAR detector at the PEP-II storage ring at SLAC. We measure the branching fraction for the decay B0bar --> Lambda_c^+ anti-Lambda K- to be (3.8 \pm 0.8_{stat} \pm 0.2_{sys} \pm 1.0_{Lambda_c^+})x10^{-5}. The…
▽ More
We report the observation of the baryonic B decay B0bar --> Lambda_c^+ anti-Lambda K- with a significance larger than 7 standard deviations based on 471x10^6$ BBbar pairs collected with the BABAR detector at the PEP-II storage ring at SLAC. We measure the branching fraction for the decay B0bar --> Lambda_c^+ anti-Lambda K- to be (3.8 \pm 0.8_{stat} \pm 0.2_{sys} \pm 1.0_{Lambda_c^+})x10^{-5}. The uncertainties are statistical, systematic, and due to the uncertainty in the Lambda_c^+ branching fraction. We find that the Lambda_c^+ K^- invariant mass distribution shows an enhancement above 3.5 GeV/c^2.
△ Less
Submitted 16 August, 2011;
originally announced August 2011.
-
Study of radiative bottomonium transitions using converted photons
Authors:
The BABAR Collaboration,
J. P. Lees,
V. Poireau,
E. Prencipe,
V. Tisserand,
J. GarraTico,
E. Grauges,
M. Martinelli,
D. A. Milanes,
A. Palano,
M. Pappagallo,
G. Eigen,
B. Stugu,
L. Sun,
D. N. Brown,
L. T. Kerth,
Yu. G. Kolomensky,
G. Lynch,
H. Koch,
T. Schroeder,
D. J. Asgeirsson,
C. Hearty,
T. S. Mattison,
J. A. McKenna,
A. Khan
, et al. (367 additional authors not shown)
Abstract:
We use 111+/-1 million Upsilon(3S) and 89+/-1 million Upsilon(2S) events recorded by the BaBar detector at the PEP-II B-factory at SLAC to perform a study of radiative transitions between bottomonium states using photons that have been converted to e+e- pairs by the detector material. We observe Upsilon(3S) -> gamma chi_b0,2(1P) decay, make precise measurements of the branching fractions for chi_b…
▽ More
We use 111+/-1 million Upsilon(3S) and 89+/-1 million Upsilon(2S) events recorded by the BaBar detector at the PEP-II B-factory at SLAC to perform a study of radiative transitions between bottomonium states using photons that have been converted to e+e- pairs by the detector material. We observe Upsilon(3S) -> gamma chi_b0,2(1P) decay, make precise measurements of the branching fractions for chi_b1,2(1P,2P) -> gamma Upsilon(1S) and chi_b1,2(2P) -> gamma Upsilon(2S) decays, and search for radiative decay to the eta_b(1S) and eta_b(2S) states.
△ Less
Submitted 21 December, 2011; v1 submitted 27 April, 2011;
originally announced April 2011.
-
Evidence for the h_b(1P) meson in the decay Upsilon(3S) --> pi0 h_b(1P)
Authors:
The BABAR Collaboration,
J. P. Lees,
V. Poireau,
E. Prencipe,
V. Tisserand,
J. Garra Tico,
E. Grauges,
M. Martinelli,
D. A. Milanes,
A. Palano,
M. Pappagallo,
G. Eigen,
B. Stugu,
L. Sun,
D. N. Brown,
L. T. Kerth,
Yu. G. Kolomensky,
G. Lynch,
I. L. Osipenkov,
H. Koch,
T. Schroeder,
D. J. Asgeirsson,
C. Hearty,
T. S. Mattison,
J. A. McKenna
, et al. (386 additional authors not shown)
Abstract:
Using a sample of 122 million Upsilon(3S) events recorded with the BaBar detector at the PEP-II asymmetric-energy e+e- collider at SLAC, we search for the $h_b(1P)$ spin-singlet partner of the P-wave chi_{bJ}(1P) states in the sequential decay Upsilon(3S) --> pi0 h_b(1P), h_b(1P) --> gamma eta_b(1S). We observe an excess of events above background in the distribution of the recoil mass against the…
▽ More
Using a sample of 122 million Upsilon(3S) events recorded with the BaBar detector at the PEP-II asymmetric-energy e+e- collider at SLAC, we search for the $h_b(1P)$ spin-singlet partner of the P-wave chi_{bJ}(1P) states in the sequential decay Upsilon(3S) --> pi0 h_b(1P), h_b(1P) --> gamma eta_b(1S). We observe an excess of events above background in the distribution of the recoil mass against the pi0 at mass 9902 +/- 4(stat.) +/- 2(syst.) MeV/c^2. The width of the observed signal is consistent with experimental resolution, and its significance is 3.1sigma, including systematic uncertainties. We obtain the value (4.3 +/- 1.1(stat.) +/- 0.9(syst.)) x 10^{-4} for the product branching fraction BF(Upsilon(3S)-->pi0 h_b) x BF(h_b-->gamma eta_b).
△ Less
Submitted 17 October, 2011; v1 submitted 22 February, 2011;
originally announced February 2011.
-
Highly directional emission and photon beaming from nanocrystal quantum dots embedded in metallic nanoslit arrays
Authors:
Nitzan Livneh,
Ayelet Strauss,
Ilai Schwarz,
Itamar Rosenberg,
Adiel Zimran,
Shira Yochelis,
Gang Chen,
Uri Banin,
Yossi Paltiel,
Ronen Rapaport
Abstract:
This paper has been withdrawn by the authors.
This paper has been withdrawn by the authors.
△ Less
Submitted 17 March, 2011; v1 submitted 19 January, 2011;
originally announced January 2011.
-
Expected Performance of the ATLAS Experiment - Detector, Trigger and Physics
Authors:
The ATLAS Collaboration,
G. Aad,
E. Abat,
B. Abbott,
J. Abdallah,
A. A. Abdelalim,
A. Abdesselam,
O. Abdinov,
B. Abi,
M. Abolins,
H. Abramowicz,
B. S. Acharya,
D. L. Adams,
T. N. Addy,
C. Adorisio,
P. Adragna,
T. Adye,
J. A. Aguilar-Saavedra,
M. Aharrouche,
S. P. Ahlen,
F. Ahles,
A. Ahmad,
H. Ahmed,
G. Aielli,
T. Akdogan
, et al. (2587 additional authors not shown)
Abstract:
A detailed study is presented of the expected performance of the ATLAS detector. The reconstruction of tracks, leptons, photons, missing energy and jets is investigated, together with the performance of b-tagging and the trigger. The physics potential for a variety of interesting physics processes, within the Standard Model and beyond, is examined. The study comprises a series of notes based on…
▽ More
A detailed study is presented of the expected performance of the ATLAS detector. The reconstruction of tracks, leptons, photons, missing energy and jets is investigated, together with the performance of b-tagging and the trigger. The physics potential for a variety of interesting physics processes, within the Standard Model and beyond, is examined. The study comprises a series of notes based on simulations of the detector and physics processes, with particular emphasis given to the data expected from the first years of operation of the LHC at CERN.
△ Less
Submitted 14 August, 2009; v1 submitted 28 December, 2008;
originally announced January 2009.
-
Small clones and the projection property
Authors:
Maurice Pouzet,
Ivo G. Rosenberg
Abstract:
In 1986, the second author classified the minimal clones on a finite universe into five types. We extend this classification to infinite universes and to multiclones. We show that every non-trivial clone contains a "small" clone of one of the five types. From it we deduce, in part, an earlier result, namely that if $\mathcal C$ is a clone on a universe $A$ with at least two elements, that contai…
▽ More
In 1986, the second author classified the minimal clones on a finite universe into five types. We extend this classification to infinite universes and to multiclones. We show that every non-trivial clone contains a "small" clone of one of the five types. From it we deduce, in part, an earlier result, namely that if $\mathcal C$ is a clone on a universe $A$ with at least two elements, that contains all constant operations, then all binary idempotent operations are projections and some $m$-ary idempotent operation is not a projection some $m\geq 3$ if and only if there is a Boolean group $G$ on $A$ for which $\mathcal C$ is the set of all operations $f(x_1,..., x_n)$ of the form $a+\sum_{i\in I}x_i$ for $a\in A$ and $I\subseteq \{1,..., n\}$.
△ Less
Submitted 10 May, 2007;
originally announced May 2007.
-
Small cones of m-hemimetrics
Authors:
M. Deza,
I. Rosenberg
Abstract:
We introduce polyhedral cones associated with $m$-hemimetrics on $n$ points, and, in particular, with $m$-hemimetrics coming from partitions of an $n$-set into $m+1$ blocks. We compute generators and facets of the cones for small values of $m,n$ and study their skeleton graphs.
We introduce polyhedral cones associated with $m$-hemimetrics on $n$ points, and, in particular, with $m$-hemimetrics coming from partitions of an $n$-set into $m+1$ blocks. We compute generators and facets of the cones for small values of $m,n$ and study their skeleton graphs.
△ Less
Submitted 25 December, 2001; v1 submitted 27 May, 2000;
originally announced May 2000.