-
Scalable Language Agnostic Taint Tracking using Explicit Data Dependencies
Authors:
Sedick David Baker Effendi,
Xavier Pinho,
Andrei Michael Dreyer,
Fabian Yamaguchi
Abstract:
Taint analysis using explicit whole-program data-dependence graphs is powerful for vulnerability discovery but faces two major challenges. First, accurately modeling taint propagation through calls to external library procedures requires extensive manual annotations, which becomes impractical for large ecosystems. Second, the sheer size of whole-program graph representations leads to serious scala…
▽ More
Taint analysis using explicit whole-program data-dependence graphs is powerful for vulnerability discovery but faces two major challenges. First, accurately modeling taint propagation through calls to external library procedures requires extensive manual annotations, which becomes impractical for large ecosystems. Second, the sheer size of whole-program graph representations leads to serious scalability and performance issues, particularly when quick analysis is needed in continuous development pipelines.
This paper presents the design and implementation of a system for a language-agnostic data-dependence representation. The system accommodates missing annotations describing the behavior of library procedures by over-approximating data flows, allowing annotations to be added later without recalculation. We contribute this data-flow analysis system to the open-source code analysis platform Joern making it available to the community.
△ Less
Submitted 6 June, 2025;
originally announced June 2025.
-
Learning Type Inference for Enhanced Dataflow Analysis
Authors:
Lukas Seidel,
Sedick David Baker Effendi,
Xavier Pinho,
Konrad Rieck,
Brink van der Merwe,
Fabian Yamaguchi
Abstract:
Statically analyzing dynamically-typed code is a challenging endeavor, as even seemingly trivial tasks such as determining the targets of procedure calls are non-trivial without knowing the types of objects at compile time. Addressing this challenge, gradual typing is increasingly added to dynamically-typed languages, a prominent example being TypeScript that introduces static typing to JavaScript…
▽ More
Statically analyzing dynamically-typed code is a challenging endeavor, as even seemingly trivial tasks such as determining the targets of procedure calls are non-trivial without knowing the types of objects at compile time. Addressing this challenge, gradual typing is increasingly added to dynamically-typed languages, a prominent example being TypeScript that introduces static typing to JavaScript. Gradual typing improves the developer's ability to verify program behavior, contributing to robust, secure and debuggable programs. In practice, however, users only sparsely annotate types directly. At the same time, conventional type inference faces performance-related challenges as program size grows. Statistical techniques based on machine learning offer faster inference, but although recent approaches demonstrate overall improved accuracy, they still perform significantly worse on user-defined types than on the most common built-in types. Limiting their real-world usefulness even more, they rarely integrate with user-facing applications. We propose CodeTIDAL5, a Transformer-based model trained to reliably predict type annotations. For effective result retrieval and re-integration, we extract usage slices from a program's code property graph. Comparing our approach against recent neural type inference systems, our model outperforms the current state-of-the-art by 7.85% on the ManyTypes4TypeScript benchmark, achieving 71.27% accuracy overall. Furthermore, we present JoernTI, an integration of our approach into Joern, an open source static analysis tool, and demonstrate that the analysis benefits from the additional type information. As our model allows for fast inference times even on commodity CPUs, making our system available through Joern leads to high accessibility and facilitates security research.
△ Less
Submitted 4 October, 2023; v1 submitted 1 October, 2023;
originally announced October 2023.
-
Hibikino-Musashi@Home 2018 Team Description Paper
Authors:
Yutaro Ishida,
Sansei Hori,
Yuichiro Tanaka,
Yuma Yoshimoto,
Kouhei Hashimoto,
Gouki Iwamoto,
Yoshiya Aratani,
Kenya Yamashita,
Shinya Ishimoto,
Kyosuke Hitaka,
Fumiaki Yamaguchi,
Ryuhei Miyoshi,
Kentaro Honda,
Yushi Abe,
Yoshitaka Kato,
Takashi Morie,
Hakaru Tamukoh
Abstract:
Our team, Hibikino-Musashi@Home (the shortened name is HMA), was founded in 2010. It is based in the Kitakyushu Science and Research Park, Japan. We have participated in the RoboCup@Home Japan open competition open platform league every year since 2010. Moreover, we participated in the RoboCup 2017 Nagoya as open platform league and domestic standard platform league teams. Currently, the Hibikino-…
▽ More
Our team, Hibikino-Musashi@Home (the shortened name is HMA), was founded in 2010. It is based in the Kitakyushu Science and Research Park, Japan. We have participated in the RoboCup@Home Japan open competition open platform league every year since 2010. Moreover, we participated in the RoboCup 2017 Nagoya as open platform league and domestic standard platform league teams. Currently, the Hibikino-Musashi@Home team has 20 members from seven different laboratories based in the Kyushu Institute of Technology. In this paper, we introduce the activities of our team and the technologies.
△ Less
Submitted 9 November, 2022;
originally announced November 2022.
-
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
Authors:
Bhargava Shastry,
Federico Maggi,
Fabian Yamaguchi,
Konrad Rieck,
Jean-Pierre Seifert
Abstract:
Taint-style vulnerabilities comprise a majority of fuzzer discovered program faults. These vulnerabilities usually manifest as memory access violations caused by tainted program input. Although fuzzers have helped uncover a majority of taint-style vulnerabilities in software to date, they are limited by (i) extent of test coverage; and (ii) the availability of fuzzable test cases. Therefore, fuzzi…
▽ More
Taint-style vulnerabilities comprise a majority of fuzzer discovered program faults. These vulnerabilities usually manifest as memory access violations caused by tainted program input. Although fuzzers have helped uncover a majority of taint-style vulnerabilities in software to date, they are limited by (i) extent of test coverage; and (ii) the availability of fuzzable test cases. Therefore, fuzzing alone cannot provide a high assurance that all taint-style vulnerabilities have been uncovered. In this paper, we use static template matching to find recurrences of fuzzer-discovered vulnerabilities. To compensate for the inherent incompleteness of template matching, we implement a simple yet effective match-ranking algorithm that uses test coverage data to focus attention on those matches that comprise untested code. We prototype our approach using the Clang/LLVM compiler toolchain and use it in conjunction with afl-fuzz, a modern coverage-guided fuzzer. Using a case study carried out on the Open vSwitch codebase, we show that our prototype uncovers corner cases in modules that lack a fuzzable test harness. Our work demonstrates that static analysis can effectively complement fuzz testing, and is a useful addition to the security assessment tool-set. Furthermore, our techniques hold promise for increasing the effectiveness of program analysis and testing, and serve as a building block for a hybrid vulnerability discovery framework.
△ Less
Submitted 1 June, 2017;
originally announced June 2017.
-
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery
Authors:
Tommi Unruh,
Bhargava Shastry,
Malte Skoruppa,
Federico Maggi,
Konrad Rieck,
Jean-Pierre Seifert,
Fabian Yamaguchi
Abstract:
The Web is replete with tutorial-style content on how to accomplish programming tasks. Unfortunately, even top-ranked tutorials suffer from severe security vulnerabilities, such as cross-site scripting (XSS), and SQL injection (SQLi). Assuming that these tutorials influence real-world software development, we hypothesize that code snippets from popular tutorials can be used to bootstrap vulnerabil…
▽ More
The Web is replete with tutorial-style content on how to accomplish programming tasks. Unfortunately, even top-ranked tutorials suffer from severe security vulnerabilities, such as cross-site scripting (XSS), and SQL injection (SQLi). Assuming that these tutorials influence real-world software development, we hypothesize that code snippets from popular tutorials can be used to bootstrap vulnerability discovery at scale. To validate our hypothesis, we propose a semi-automated approach to find recurring vulnerabilities starting from a handful of top-ranked tutorials that contain vulnerable code snippets. We evaluate our approach by performing an analysis of tens of thousands of open-source web applications to check if vulnerabilities originating in the selected tutorials recur. Our analysis framework has been running on a standard PC, analyzed 64,415 PHP codebases hosted on GitHub thus far, and found a total of 117 vulnerabilities that have a strong syntactic similarity to vulnerable code snippets present in popular tutorials. In addition to shedding light on the anecdotal belief that programmers reuse web tutorial code in an ad hoc manner, our study finds disconcerting evidence of insufficiently reviewed tutorials compromising the security of open-source projects. Moreover, our findings testify to the feasibility of large-scale vulnerability discovery using poorly written tutorials as a starting point.
△ Less
Submitted 10 April, 2017;
originally announced April 2017.
-
From Malware Signatures to Anti-Virus Assisted Attacks
Authors:
Christian Wressnegger,
Kevin Freeman,
Fabian Yamaguchi,
Konrad Rieck
Abstract:
Although anti-virus software has significantly evolved over the last decade, classic signature matching based on byte patterns is still a prevalent concept for identifying security threats. Anti-virus signatures are a simple and fast detection mechanism that can complement more sophisticated analysis strategies. However, if signatures are not designed with care, they can turn from a defensive mech…
▽ More
Although anti-virus software has significantly evolved over the last decade, classic signature matching based on byte patterns is still a prevalent concept for identifying security threats. Anti-virus signatures are a simple and fast detection mechanism that can complement more sophisticated analysis strategies. However, if signatures are not designed with care, they can turn from a defensive mechanism into an instrument of attack. In this paper, we present a novel method for automatically deriving signatures from anti-virus software and demonstrate how the extracted signatures can be used to attack sensible data with the aid of the virus scanner itself. We study the practicability of our approach using four commercial products and exemplarily discuss a novel attack vector made possible by insufficiently designed signatures. Our research indicates that there is an urgent need to improve pattern-based signatures if used in anti-virus software and to pursue alternative detection approaches in such products.
△ Less
Submitted 19 October, 2016;
originally announced October 2016.
-
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
Authors:
Aylin Caliskan,
Fabian Yamaguchi,
Edwin Dauber,
Richard Harang,
Konrad Rieck,
Rachel Greenstadt,
Arvind Narayanan
Abstract:
The ability to identify authors of computer programs based on their coding style is a direct threat to the privacy and anonymity of programmers. While recent work found that source code can be attributed to authors with high accuracy, attribution of executable binaries appears to be much more difficult. Many distinguishing features present in source code, e.g. variable names, are removed in the co…
▽ More
The ability to identify authors of computer programs based on their coding style is a direct threat to the privacy and anonymity of programmers. While recent work found that source code can be attributed to authors with high accuracy, attribution of executable binaries appears to be much more difficult. Many distinguishing features present in source code, e.g. variable names, are removed in the compilation process, and compiler optimization may alter the structure of a program, further obscuring features that are known to be useful in determining authorship. We examine programmer de-anonymization from the standpoint of machine learning, using a novel set of features that include ones obtained by decompiling the executable binary to source code. We adapt a powerful set of techniques from the domain of source code authorship attribution along with stylistic representations embedded in assembly, resulting in successful de-anonymization of a large set of programmers.
We evaluate our approach on data from the Google Code Jam, obtaining attribution accuracy of up to 96% with 100 and 83% with 600 candidate programmers. We present an executable binary authorship attribution approach, for the first time, that is robust to basic obfuscations, a range of compiler optimization settings, and binaries that have been stripped of their symbol tables. We perform programmer de-anonymization using both obfuscated binaries, and real-world code found "in the wild" in single-author GitHub repositories and the recently leaked Nulled.IO hacker forum. We show that programmers who would like to remain anonymous need to take extreme countermeasures to protect their privacy.
△ Less
Submitted 17 December, 2017; v1 submitted 28 December, 2015;
originally announced December 2015.
-
Towards Vulnerability Discovery Using Staged Program Analysis
Authors:
Bhargava Shastry,
Fabian Yamaguchi,
Konrad Rieck,
Jean-Pierre Seifert
Abstract:
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write. But, it presents multiple challenges not the least of which is understanding what makes a bug exploitable and conveying this information to the developer. In this paper, we pres…
▽ More
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write. But, it presents multiple challenges not the least of which is understanding what makes a bug exploitable and conveying this information to the developer. In this paper, we present the design and implementation of a practical vulnerability assessment framework, called Melange. Melange performs data and control flow analysis to diagnose potential security bugs, and outputs well-formatted bug reports that help developers understand and fix security bugs. Based on the intuition that real-world vulnerabilities manifest themselves across multiple parts of a program, Melange performs both local and global analyses. To scale up to large programs, global analysis is demand-driven. Our prototype detects multiple vulnerability classes in C and C++ code including type confusion, and garbage memory reads. We have evaluated Melange extensively. Our case studies show that Melange scales up to large codebases such as Chromium, is easy-to-use, and most importantly, capable of discovering vulnerabilities in real-world code. Our findings indicate that static analysis is a viable reinforcement to the software testing tool set.
△ Less
Submitted 6 April, 2016; v1 submitted 19 August, 2015;
originally announced August 2015.
-
A naturally error suppressing quantum memory
Authors:
Fumiko Yamaguchi,
Yoshihisa Yamamoto
Abstract:
We propose a method to construct quantum storage wherein the phase error due to decoherence is naturally suppressed without constant error detection and correction. As an example, we describe a quantum memory made of two physical qubits encoded in the ground state of a two-qubit phase-error detecting code. Such a system can be simulated by introducing a coupling between the two physical qubits.…
▽ More
We propose a method to construct quantum storage wherein the phase error due to decoherence is naturally suppressed without constant error detection and correction. As an example, we describe a quantum memory made of two physical qubits encoded in the ground state of a two-qubit phase-error detecting code. Such a system can be simulated by introducing a coupling between the two physical qubits. This method is effective for physical systems in which the $T_1$ decay process is negligible but coherence is limited by the $T_2$ decay process. We take trapped ions as a possible example to apply the natural suppression method and show that the $T_2$ decay time due to slow ambient fluctuating fields at the physical qubits can be lengthened as much as $10^4$.
△ Less
Submitted 17 March, 2006;
originally announced March 2006.
-
Quantum error correction via robust probe modes
Authors:
Fumiko Yamaguchi,
Kae Nemoto,
William J. Munro
Abstract:
We propose a new scheme for quantum error correction using robust continuous variable probe modes, rather than fragile ancilla qubits, to detect errors without destroying data qubits. The use of such probe modes reduces the required number of expensive qubits in error correction and allows efficient encoding, error detection and error correction. Moreover, the elimination of the need for direct…
▽ More
We propose a new scheme for quantum error correction using robust continuous variable probe modes, rather than fragile ancilla qubits, to detect errors without destroying data qubits. The use of such probe modes reduces the required number of expensive qubits in error correction and allows efficient encoding, error detection and error correction. Moreover, the elimination of the need for direct qubit interactions significantly simplifies the construction of quantum circuits. We will illustrate how the approach implements three existing quantum error correcting codes: the 3-qubit bit-flip (phase-flip) code, the Shor code, and an erasure code.
△ Less
Submitted 3 May, 2006; v1 submitted 9 November, 2005;
originally announced November 2005.
-
Hybrid quantum repeater using bright coherent light
Authors:
P. van Loock,
T. D. Ladd,
K. Sanaka,
F. Yamaguchi,
Kae Nemoto,
W. J. Munro,
Y. Yamamoto
Abstract:
We describe a quantum repeater protocol for long-distance quantum communication. In this scheme, entanglement is created between qubits at intermediate stations of the channel by using a weak dispersive light-matter interaction and distributing the outgoing bright coherent light pulses among the stations. Noisy entangled pairs of electronic spin are then prepared with high success probability vi…
▽ More
We describe a quantum repeater protocol for long-distance quantum communication. In this scheme, entanglement is created between qubits at intermediate stations of the channel by using a weak dispersive light-matter interaction and distributing the outgoing bright coherent light pulses among the stations. Noisy entangled pairs of electronic spin are then prepared with high success probability via homodyne detection and postselection. The local gates for entanglement purification and swapping are deterministic and measurement-free, based upon the same coherent-light resources and weak interactions as for the initial entanglement distribution. Finally, the entanglement is stored in a nuclear-spin-based quantum memory. With our system, qubit-communication rates approaching 100 Hz over 1280 km with fidelities near 99% are possible for reasonable local gate errors.
△ Less
Submitted 22 June, 2006; v1 submitted 26 October, 2005;
originally announced October 2005.
-
Efficient decoupling and recoupling in solid state NMR for quantum computation
Authors:
Fumiko Yamaguchi,
Thaddeus D. Ladd,
Cyrus P. Master,
Yoshihisa Yamamoto,
Navin Khaneja
Abstract:
A scheme for decoupling and selectively recoupling large networks of dipolar-coupled spins is proposed. The scheme relies on a combination of broadband, decoupling pulse sequences applied to all the nuclear spins with a band-selective pulse sequence for single spin rotations or recoupling. The evolution-time overhead required for selective coupling is independent of the number of spins, subject…
▽ More
A scheme for decoupling and selectively recoupling large networks of dipolar-coupled spins is proposed. The scheme relies on a combination of broadband, decoupling pulse sequences applied to all the nuclear spins with a band-selective pulse sequence for single spin rotations or recoupling. The evolution-time overhead required for selective coupling is independent of the number of spins, subject to time-scale constraints, for which we discuss the feasibility. This scheme may improve the scalability of solid-state-NMR quantum computing architectures.
△ Less
Submitted 15 November, 2004;
originally announced November 2004.
-
Efficiency of free energy calculations of spin lattices by spectral quantum algorithms
Authors:
Cyrus P. Master,
Fumiko Yamaguchi,
Yoshihisa Yamamoto
Abstract:
Quantum algorithms are well-suited to calculate estimates of the energy spectra for spin lattice systems. These algorithms are based on the efficient calculation of the discrete Fourier components of the density of states. The efficiency of these algorithms in calculating the free energy per spin of general spin lattices to bounded error is examined. We find that the number of Fourier components…
▽ More
Quantum algorithms are well-suited to calculate estimates of the energy spectra for spin lattice systems. These algorithms are based on the efficient calculation of the discrete Fourier components of the density of states. The efficiency of these algorithms in calculating the free energy per spin of general spin lattices to bounded error is examined. We find that the number of Fourier components required to bound the error in the free energy due to the broadening of the density of states scales polynomially with the number of spins in the lattice. However, the precision with which the Fourier components must be calculated is found to be an exponential function of the system size.
△ Less
Submitted 10 July, 2002; v1 submitted 15 June, 2002;
originally announced June 2002.
-
Quantum Search with Two-atom Collisions in Cavity QED
Authors:
F. Yamaguchi,
P. Milman,
M. Brune,
J. M. Raimond,
S. Haroche
Abstract:
We propose a scheme to implement two-qubit Grover's quantum search algorithm using Cavity Quantum Electrodynamics. Circular Rydberg atoms are used as quantum bits (qubits). They interact with the electromagnetic field of a non-resonant cavity . The quantum gate dynamics is provided by a cavity-assisted collision, robust against decoherence processes. We present the detailed procedure and analyze…
▽ More
We propose a scheme to implement two-qubit Grover's quantum search algorithm using Cavity Quantum Electrodynamics. Circular Rydberg atoms are used as quantum bits (qubits). They interact with the electromagnetic field of a non-resonant cavity . The quantum gate dynamics is provided by a cavity-assisted collision, robust against decoherence processes. We present the detailed procedure and analyze the experimental feasibility.
△ Less
Submitted 29 March, 2002;
originally announced March 2002.
-
An all silicon quantum computer
Authors:
T. D. Ladd,
J. R. Goldman,
F. Yamaguchi,
Y. Yamamoto,
E. Abe,
K. M. Itoh
Abstract:
A solid-state implementation of a quantum computer composed entirely of silicon is proposed. Qubits are Si-29 nuclear spins arranged as chains in a Si-28 (spin-0) matrix with Larmor frequencies separated by a large magnetic field gradient. No impurity dopants or electrical contacts are needed. Initialization is accomplished by optical pumping, algorithmic cooling, and pseudo-pure state technique…
▽ More
A solid-state implementation of a quantum computer composed entirely of silicon is proposed. Qubits are Si-29 nuclear spins arranged as chains in a Si-28 (spin-0) matrix with Larmor frequencies separated by a large magnetic field gradient. No impurity dopants or electrical contacts are needed. Initialization is accomplished by optical pumping, algorithmic cooling, and pseudo-pure state techniques. Magnetic resonance force microscopy is used for readout. This proposal takes advantage of many of the successful aspects of solution NMR quantum computation, including ensemble measurement, RF control, and long decoherence times, but it allows for more qubits and improved initialization.
△ Less
Submitted 7 September, 2001;
originally announced September 2001.
-
Electron Entanglement via a Quantum Dot
Authors:
William D. Oliver,
F. Yamaguchi,
Y. Yamamoto
Abstract:
This Letter presents a method of electron entanglement generation. The system under consideration is a single-level quantum dot with one input and two output leads. The leads are arranged such that the dot is empty, single electron tunneling is suppressed by energy conservation, and two-electron virtual co-tunneling is allowed. This yields a pure, non-local spin-singlet state at the output leads…
▽ More
This Letter presents a method of electron entanglement generation. The system under consideration is a single-level quantum dot with one input and two output leads. The leads are arranged such that the dot is empty, single electron tunneling is suppressed by energy conservation, and two-electron virtual co-tunneling is allowed. This yields a pure, non-local spin-singlet state at the output leads. Coulomb interaction is the nonlinearity essential for entanglement generation, and, in its absence, the singlet state vanishes. This type of electron entanglement is a four-wave mixing process analogous to the photon entanglement generated by a Chi-3 parametric amplifier.
△ Less
Submitted 16 July, 2001;
originally announced July 2001.
-
Quantum computation in a one-dimensional crystal lattice with NMR force microscopy
Authors:
T. D. Ladd,
J. R. Goldman,
A. Dana,
F. Yamaguchi,
Y. Yamamoto
Abstract:
A proposal for a scalable, solid-state implementation of a quantum computer is presented. Qubits are fluorine nuclear spins in a solid crystal of fluorapatite [Ca_5 F(PO_4)_3] with resonant frequencies separated by a large field gradient. Quantum logic is accomplished using nuclear-nuclear dipolar couplings with decoupling and selective recoupling RF pulse sequences. Magnetic resonance force mic…
▽ More
A proposal for a scalable, solid-state implementation of a quantum computer is presented. Qubits are fluorine nuclear spins in a solid crystal of fluorapatite [Ca_5 F(PO_4)_3] with resonant frequencies separated by a large field gradient. Quantum logic is accomplished using nuclear-nuclear dipolar couplings with decoupling and selective recoupling RF pulse sequences. Magnetic resonance force microscopy is used for readout. As many as 300 qubits can be implemented in the laboratory extremes of T=10 mK and B_0=20 T with the existing sensitivity of force microscopy.
△ Less
Submitted 12 June, 2001; v1 submitted 28 September, 2000;
originally announced September 2000.
-
Concurrent Quantum Computation
Authors:
F. Yamaguchi,
C. P. Master,
Y. Yamamoto
Abstract:
A quantum computer is a multi-particle interferometer that comprises beam splitters at both ends and arms, where the n two-level particles undergo the interactions among them. The arms are designed so that relevant functions required to produce a computational result is stored in the phase shifts of the 2^n arms. They can be detected by interferometry that allows us to utilize quantum parallelis…
▽ More
A quantum computer is a multi-particle interferometer that comprises beam splitters at both ends and arms, where the n two-level particles undergo the interactions among them. The arms are designed so that relevant functions required to produce a computational result is stored in the phase shifts of the 2^n arms. They can be detected by interferometry that allows us to utilize quantum parallelism. Quantum algorithms are accountable for what interferometers to be constructed to compute particular problems. A standard formalism for constructing the arms has been developed by the extension of classical reversible gate arrays. By its nature of sequential applications of logic operations, the required number of gates increases exponentially as the problem size grows. This may cause a crucial obstacle to perform a quantum computation within a limited decoherence time. We propose a direct and concurrent construction of the interferometer arms by one-time evolution of a physical system with arbitrary multi-particle interactions. It is inherently quantum mechanical and has no classical analogue. Encoding the functions used in Shor's algorithm for prime factoring, Grover's algorithm and Deutsch-Jozsa algorithm requires only one-time evolution of such a system regardless of the problem size n as opposed to its standard sequential counterpart that takes O(n^3), O(n) and O(n2^n).
△ Less
Submitted 31 May, 2000;
originally announced May 2000.
-
Efficient implementation of selective recoupling in heteronuclear spin systems using Hadamard matrices
Authors:
Debbie W. Leung,
Isaac L. Chuang,
Fumiko Yamaguchi,
Yoshihisa Yamamoto
Abstract:
We present an efficient scheme which couples any designated pair of spins in heteronuclear spin systems. The scheme is based on the existence of Hadamard matrices. For a system of $n$ spins with pairwise coupling, the scheme concatenates $cn$ intervals of system evolution and uses at most $c n^2$ pulses where $c \approx 1$. Our results demonstrate that, in many systems, selective recoupling is p…
▽ More
We present an efficient scheme which couples any designated pair of spins in heteronuclear spin systems. The scheme is based on the existence of Hadamard matrices. For a system of $n$ spins with pairwise coupling, the scheme concatenates $cn$ intervals of system evolution and uses at most $c n^2$ pulses where $c \approx 1$. Our results demonstrate that, in many systems, selective recoupling is possible with linear overhead, contrary to common speculation that exponential effort is always required.
△ Less
Submitted 28 April, 1999;
originally announced April 1999.