Filename
stringlengths
22
64
Paragraph
stringlengths
8
5.57k
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
In nature, there are less than three hundred stable or long-lived nuclides which are along the valley of stability in the nuclear chart. When those unstable nuclei, the number is now close to three thousand [1], are explored, many exotic nuclear phenomena have been observed. The most famous exotic nucleus is 11Li in which the halo structure was identified [2]. Theoretically, many more nuclei are predicted to be bound. In Fig. 1 is shown the prediction from the Weiszacker-Skyrme (WS4) mass model [3] which is one of the best nuclear mass models on the market. Many other models, e.g., non-relativistic [4] and relativistic density functional theories [5, 6, 7] have also been used to explore the border of nuclear chart. Nowadays, the study of the properties of these exotic nuclei is at the forefront of nuclear physics research because it can not only reveal new physics but also lead to new insights on the nucleosynthesis.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
Figure 1: (Color online) Nuclear chart consisting of stable or long-lived nuclides, known and unstable ones produced in laboratories [including superheavy nuclei (SHN)] [8, 9, 10] and those predicted by the Weiszacker-Skyrme (WS4) mass model [3]. Courtesy of Ning Wang.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
In this contribution, I will first discuss the physics connected with exotic nuclear phenomena in Section 2. According to my personal point of view, six features will be illustrated concerning exotic nuclear structure. Then I’ll highlight some recent progresses corresponding to each of these features in Section 3. Finally I will discuss perspectives in Section 4.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
Figure 2: (Color online) Physics in exotic nuclear structure. (a), (b), (c), (d), (g), (h), (i) and (j) are taken from Refs. [11, 14, 15, 16, 13, 17, 18, 19], respectively. (f): Courtesy of Junchen Pei.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
Halo nuclei are characterized by a large spatial extension, see Fig. 2(c) for an example for 11Li [15]. In neutron halo nuclei, there appears pure neutron matter with a very low density, surrounding a dense core [11, 12, 15, 20]. Similar to what happens in low density infinite nuclear matter or neutron matter [21, 22, 23], pair condensate or strong di-neutron correlations may occur in finite nuclei with halo structure [Fig. 2(d)] [16, 24]. In addition, the oscillation between the core and the low density neutron matter leads to some soft dipole modes, also known as pygmy dipole resonances, which have been discussed a lot in INPC2016. Experimentally these features have been explored in, e.g., Refs. [25, 26].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
Most known nuclei are deformed [27]. What kind of new features can deformation effects bring to exotic nuclei, in particular, to halo nuclei? Note that in recent years, more candidates of deformed halo nuclei have been identified; examples are 31Ne [28] and 37Mg [29]. For deformation effects in halo nuclei, I will focus on theoretical predictions on the shape decoupling [Fig. 2(e) & (f)] [30, 31, 32, 33].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
can be hinted from, e.g., separation energies [34]. Certainly the shell evolution is also the result of many other important factors, like the tensor force [35, 36, 37, 38, 39]. It should be emphasized that shape evolution and shape coexistence are also related physical topics of exotic nuclei, which were discussed in a dedicated session in INPC2016.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
Beyond the drip lines, nuclei are unbound with respect to nucleon(s) emission. This feature implies some new radioactivities of which mostly discussed are one- or two-proton radioactivities, thanks to the Coulomb interaction which leads to a Coulomb barrier hindering the escape of pro- ton(s) from the parent nucleus [Fig. 2(h)] [17, 40, 41, 42, 43, 44]. Beyond the neutron drip line, there may be the two-neutron radioactivity; one example of recent interests is 26O [45, 46, 47].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
It is well known that clustering effects are important in atomic nuclei and cluster structure appears in some stable ones if they are excited to be close to some thresholds [48]. In exotic nuclei, clustering effects can also emerge in low-lying excited states and even in ground states. For exotic nuclei with much more neutrons, a cluster configuration is energetically more favored because it permits a more even distribution of valence neutrons as shown in Fig. 2(i) [18]. In one recent experimental study of 12Be, a 0+ resonant state with a large cluster decay branching ratio was observed [49]. This observation supports strong clustering effects in 12Be. In addition, in some halo nuclei, there appears the so called “Borromean” structure, which is shown in Fig. 2(j) [19]—a bound three-body system with any two-body subsystems unbound.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
Next I will highlight some recent progresses on theoretical study of exotic nuclear structure. There are indeed many interesting and important works, but I can only choose some of them due to the limitation of pages. More extensive discussions can be found in Ref. [50].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
Many models have been developed to take into account the contribution of continua and res- onances, see, e.g., Refs. [12, 24, 51, 52, 53] for recent reviews. There are many ways to lo- cate single particle resonances. Besides the conventional scattering phase shift method [54], sev- eral bound-state-like approaches [55, 56], such as the analytical continuation in coupling constant [57, 58, 59, 60, 61, 62], the real stabilization method [63, 64, 65] and the complex scaling method (CSM) [66, 67, 68, 69], are often used to study single particle resonances in atomic nuclei. Sev- eral other methods, e.g., the Jost function method [70, 71], the Green’s function method [72, 73], the Green’s function + CSM [69, 74], and solving Schrödinger or Dirac equations in the complex momentum representation [75, 76], have also been implemented in nuclear models.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
for spherical nuclei with continuum either discretized [78, 82, 83, 84] or treated with scattering boundary conditions [85, 86, 87]. The HFB model was also extended to the study of deformed In parallel, the relativistic Hartree-Bogoliubov (RHB) or relativistic HFB nuclei [32, 33, 88]. models were established for spherical [15, 89, 90, 91] and deformed exotic nuclei including halos [30, 31, 92, 93].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
Based on the deformed RHB model in a Woods-Saxon basis [94], shape decoupling effects have been predicted in 42,44Mg [30, 31]: The core of these nuclei is prolate, but the halo has an oblate shape. The generic conditions for the occurrence of halo in deformed nuclei and shape decoupling effects were given in Ref. [30]. Later, with a non-relativistic HFB model, Pei et al. predicted that 38Ne has a nearly spherical core, but a prolate halo [32, 33]. Similar effects has been investigated in Ref. [95] in which a square well potential was used and the spin-orbit coupling was neglected. These predictions are made for the ground state. It would be interesting to study dynamics and excitations of these deformed halo nuclei [96].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
Concerning di-neutron correlations, progresses in recent years include the study of Cooper pairs [97], di-neutron correlations [98], di-proton correlations [99], neutron-proton correlations [100], and so on. For example, the asymptotic form of a neutron Cooper pair penetrating to the exterior of the nuclear surface was investigated with the Bogoliubov theory in Ref. [97]. It was found that Cooper pairs are spatially correlated in the asymptotic large distance limit, and the penetration length of the pair condensate is universally governed by the two-neutron separation energy.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
There are also lots of theoretical investigations on the soft dipole modes [101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111]. In Ref. [105], a systematic study with canonical basis time dependent HFB theory reveals a number of characteristic features of the low-energy E1 modes, e.g., a universal behavior in the low-energy E1 modes for heavy neutron-rich isotopes, which suggests the emergence of decoupled E1 peaks beyond N = 82.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
It is interesting and instructive to choose the Ca isotope chain as an example to discuss the evolution of shell structure and changes of magicity because there might be five magic numbers in the Ca isotopes. In Ref. [112], from the measured mass of 53,54Ca, a prominent shell closure at N = 32 was established. This shell closure was later confirmed together with a new one at N = 34, indicated by the fact that the energy of the first 2+ state for 52,54Ca rises dramatically [113]. Recently the magicity of N = 32 was shown to persist in Sc isotopes [114]. The appearance of the shell closures at N = 32 and 34 have been attributed to the evolution of neutron f5/2 orbital, which rises due to a weakened proton-neutron interaction when Z decreases to 20 [113].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
terms in relativistic framework on these shell closures was emphasized. However, a recent precise measurement of charge radii in Ca isotopes [119] casts some doubts on the magicity at N = 32. If 52Ca is doubly magic, its charge radius should be smaller than that of its neighbors. But this is not the case [119]. Therefore nuclear magicity in exotic nuclei may be “local” in the sense that it manifests itself in some nuclear properties but not in others, contrast to those traditional magic numbers which are “global” or robust and manifest themselves in “all” nuclear properties, e.g., separation energies, charge radii, Q values of α decays, etc.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
For new radioactivity, without going into details, I’d like to mention that there have been some systematic studies with the HFB model [120] and predictions were also made with the relativistic continuum Hartree-Bogoliubov model [121].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
There have been many interesting results concerning the theoretical study of clustering ef- fects in atomic nuclei. For example, a non-localized or container picture was proposed for cluster structure [122], giant dipole resonances were argued to be a fingerprint of cluster structure [123], one-dimensional α condensation of α-linear-chain states in 12C and 16O were studied [124] and rod-shaped nuclei were explored at extremely high spin and isospin [125].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
One more thing about clustering effects is that from radius-constrained mean field calculations, regardless of non-relativistic [126] or relativistic models [127, 128], one can also obtain the cluster structure. However, in such kind of studies, one has to take a serious care of the truncation of the basis and to ensure a convergence [129].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
To summarize, after introducing the following characteristic features and new physics con- nected with exotic nuclear phenomena: the weakly-bound feature, the large-spatial extension in halo nuclei, deformation effects in halo nuclei, the shell evolution, new radioactivities and cluster- ing effects, I have highlighted some recent progresses corresponding to these features.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
It should be emphasized that to describe the structure of exotic nuclei, one often needs to modify conventional nuclear models or develop new theoretical approaches. Nowadays, there are many attempts to unify nuclear models. For example, with the fast development of supercomputers, ab initio theories can deal with heavier and heavier nuclei, as discussed in Ekström and Bacca’s talks. Besides that, there are also projects to develop density functional theories from first principles [130, 131] (also mentioned in Liang’s plenary talk) or models based on subnucleon degrees of freedom [132].
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
and Beijing Isotope-Separation-On-Line Neutron-Rich Beam Facility (BISOL) [135], more un- stable nuclei would become experimentally accessible, which will for sure challenge as well as provide opportunities for theoretical study of exotic nuclear structure.
Processed_Structure_of_Exotic_Nuclei:_A_Theoretical_Review.txt
Collaborations and/or helpful discussions with A. Afanasjev, K. Blaum, Y. Chen, G. Colo, L.S. Geng, N.V. Giai, L.L. Li, H.Z. Liang, W.H. Long, B.N. Lu, H.F. Lü, J. Meng, J. Pei, P. Ring, H. Sagawa, J.R. Stone, X.X. Sun, I. Tanihata, J. Terasaki, A.W. Thomas, H. Toki, D. Vretenar, N. Wang, F. R. Xu, S. Yamaji, J.Y. Zeng, Y.H. Zhang, S.Q. Zhang, E.G. Zhao, J. Zhao and P.W. Zhao are gratefully acknowledged.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
The Fat-Link Irrelevant Clover (FLIC) fermion action provides a new form of nonperturbative O(a) improve- ment and allows efficient access to the light quark-mass regime. FLIC fermions enable the construction of the nonperturbatively O(a)-improved conserved vector current without the difficulties associated with the fine tuning of the improvement coefficients. The simulations are performed with an O(a2) mean-field improved plaquette- plus-rectangle gluon action on a 203 × 40 lattice with a lattice spacing of 0.128 fm, enabling the first simulation of baryon form factors at light quark masses on a large volume lattice. Magnetic moments, electric charge radii and magnetic radii are extracted from these form factors, and show interesting chiral nonanalytic behavior in the light quark mass regime.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
The magnetic moments of baryons have been identified as providing an excellent opportunity for the direct observation of chiral nonanalytic behavior in lattice QCD, even in the quenched approximation [1,2,3]. This paper will present results for baryon electromagnetic structure in which the chiral nonanalytic behaviour predicted by quenched chiral perturbation theory is ob- served in the numerical simulation results.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
The numerical simulations of the electromag- netic form factors presented here are carried out using the Fat Link Irrelevant Clover (FLIC) fermion action [4,5] in which the irrelevant oper- ators introduced to remove fermion doublers and lattice spacing artifacts [6] are constructed with smoothed links. These links are created via APE smearing [7]. On the other hand, the relevant op- erators surviving in the continuum limit are con- structed with the original untouched links gener- ated via standard Monte Carlo techniques.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
is enabled by the improved chiral properties of the lattice fermion action [8]. The O(a)-improved conserved vector current [9] is used. Nonper- turbative improvement is achieved via the FLIC procedure where the terms of the Noether cur- rent having their origin in the irrelevant opera- tors of the fermion action are constructed with mean-field improved APE smeared links. The use of links in which short-distance fluctuations have been removed simplifies the determination of the coefficients of the improvement terms in both the action and its associated conserved vector current. Perturbative renormalizations are small for smeared links and are accurately accounted for by small mean-field improvement corrections. Hence, we are able to determine the form factors of octet and decuplet baryons with unprecedented accuracy.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
with κ = 1/(2m + 8r). We take the standard value r = 1. The γ-matrices are hermitian and σµν = [γµ, γν ]/(2i).
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
For fat links, the mean link u0 ≈ 1, enabling the use of highly improved definitions of the lat- tice field strength tensor, Fµν [6]. In particular, we employ an O(a4)-improved definition of Fµν in which the standard clover-sum of four 1 × 1 Wilson loops lying in the µ, ν plane is combined with 2 × 2 and 3 × 3 Wilson loop clovers. More- over, mean-field improvement of the coefficients of the clover and Wilson terms of the fermion ac- tion is sufficient to accurately match these terms and eliminate O(a) errors from the fermion action [5,8].
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
Previous work [4,12] has shown that the FLIC fermion action has extremely impressive conver- gence rates for matrix inversion, which provides great promise for performing cost effective sim- ulations at quark masses closer to the physical values. Problems with exceptional configurations have prevented such simulations in the past. The ease with which one can invert the fermion matrix using FLIC fermions leads us to attempt simula- tions down to light quark masses corresponding to mπ/mρ = 0.35 in an attempt to reveal chiral non-analytic behaviour in baryon magnetic mo- ments.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
A fixed boundary condition at t = 0 is used for the fermions and gauge-invariant Gaussian smearing [13,14] in the spatial dimensions is ap- plied at the source at t = 8 to increase the over- lap of the interpolating operators with the ground state while suppressing excited state contribu- tions.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
The terms proportional to the Wilson parame- ter r in Eq. (4) and the four-divergence in Eq. (5) have their origin in the irrelevant operators of the fermion action and vanish in the continuum limit. Nonperturbative improvement is achieved by constructing these terms with fat-links. As we have stated, perturbative corrections are small for fat-links and the use of the tree-level value for CCV C = 1 together with small mean-field im- provement corrections ensures that O(a) artifacts are accurately removed from the vector current. This is only possible when the current is con- structed with fat-links. Otherwise, CCV C needs to be appropriately tuned to ensure all O(a) ar- tifacts are removed.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
We simulate at the smallest finite q2 available on our lattice, ~q = 2π x. We insert our improved con- aL served vector current at t1 = 14. Since R is inde- pendent of the baryon sink time slice, we calculate the ratio in Eq. (7) for a range of sink times. Us- ing a covariance-matrix-based χ2/Ndof , we inde- pendently select suitable fitting windows for both electric and magnetic form factors.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
Table 1 shows the contribution from a u quark of unit charge to the proton magnetic form fac- tor in nuclear magnetons (µN ). The uncertainty and the χ2/dof are quoted for various time-fitting windows. The principal value of the fitted param- eter remains fairly constant over different time windows, but the χ2/dof shows a marked de- crease as we move from the time window 16-18 to 17-20. Figure 1 illustrates these lattice simula- tion results obtained from Eq. (7) for one of the lighter quark masses. The horizontal line indi- cates the best fit in the time window 17-20 which provides the most acceptable χ2/dof ∼ 1.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
plotted as a function of m2 π. Simulations at mod- erately heavier quark masses are expected to re- veal a Dirac moment behavior ∝ 1/mq ∼ 1/m2 π. As one approaches the light quark mass regime, we find evidence of non-analytic behaviour in the nucleon magnetic moments as predicted by quenched χPT [1,3]. In fact, if we were to flip the sign of the neutron magnetic moment, we would find that the proton and neutron have a very sim- ilar behaviour as a function of m2 π in the light quark mass regime as predicted by the leading non-analytic contributions of quenched χPT.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
Figures 3 and 4 display results for the proton and neutron charge radii, respectively, obtained from a dipole form factor ansatz. For the proton some curvature is emerging as the chiral limit is approached. The FLIC fermion simulations re- veal a small, negative value for the calculation of the quenched neutron charge radius at large and intermediate quark masses before the signal is lost at the lightest two quark masses. This re- sult confirms the earlier result [15] that the two d quarks have a larger charge radius than the u quark within the neutron. This is also in agree- ment with quark model calculations [17].
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
ments. In Fig. 5 we show results for a calculation in quenched QCD of the ratio of singly to doubly represented quark magnetic contributions in the nucleon for quarks of unit charge. We see that our results deviate significantly from the simple quark model prediction of −1/2.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
Figure 6 shows the results for a calculation of the octet Σ baryons. We note the level order- ing of the three Σ baryons, with the positive and negative charge states both approaching the ex- perimental values at light quark masses. We also see that our quenched lattice calculation of the magnetic moment of the neutral Σ baryon pre- dicts a value in the range 0.5 − 0.7µN , although we first need to take into account the appro- priate chiral extrapolation and quenching effects [18] before an accurate prediction can be made. Our results reveal a significant amount of nonana- lytic behaviour for the Σ+, which is predicted by quenched χPT [3]. QχPT also predicts a small amount of curvature for the Σ0 and Σ− and we confirm this prediction [3].
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
Figure 3. FLIC fermion simulation results for the charge radius of the proton in quenched QCD.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
Figure 4. FLIC fermion simulation results for the charge radius of the neutron in quenched QCD.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
Figure 5. Ratio of singularly to doubly repre- sented quark magnetic contributions in the nu- cleon for quarks of unit charge.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
Figure 6. FLIC fermion simulation results for the magnetic moment of the octet Σ baryons in quenched QCD.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
Figure 7. FLIC fermion simulation results for the magnetic moment of the octet Ξ baryons in quenched QCD.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
We have also performed a calculation of the magnetic moment of the octet Ξ baryons in quenched QCD and these results are shown in Fig. 7. Here we see an improved signal for the magnetic moment of the Ξ compared to the other baryons at light quark masses due to the presence of two strange quarks. We note the splitting be- tween the neutral and negative charged baryons is close to the experimentally observed value, even in the quenched approximation. Predictions from quenched chiral perturbation theory [3] suggest that there should be no nonanalytic behaviour for the Ξ− and a small amount of downward cur- vature for the Ξ0. Our results confirm these pre- dictions.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
Figure 8. FLIC fermion simulation results for the magnetic moments of the proton (◦) and ∆+ res- onance (△) in quenched QCD.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
enhancing the proton and suppressing the ∆+ in accord with the expectations of quenched χPT [19,20]. The quenched artifacts of the ∆ provide an unmistakable signal for the onset of quenched chiral nonanalytic behavior.
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
We have presented the first lattice QCD simu- lation results for the electromagnetic form fac- tors of the nucleon, Σ, Ξ and ∆ baryons at quark masses light enough to reveal unmistakable quenched chiral nonanalytic behavior. The non- linear behaviour observed is in agreement with the predictions of quenched chiral perturbation theory [3,20].
Processed_Electromagnetic_Form_Factors_with_FLIC_fermions.txt
This work paves the way for a study of the indi- vidual quark sector contributions to baryon mag- netic moments and, in particular, the strangeness content of the nucleon [18].
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Abstract—with the growing of network technology along with the need of human for social interaction, using websites nowadays becomes critically important which leads in the increasing number of websites and servers. One popular solution for managing these large numbers of websites is using shared web hosting servers in order to decrease the overall cost of server maintenance. Despite affordability, this solution is insecure and risky according to high amount of reported defaces and attacks during recent years. In this paper, we introduce top ten most common attacks in shared web hosting servers which can occur because of the nature and bad configuration in these servers. Moreover, we present several simple scenarios that are capable of penetrating these kinds of servers even with the existence of several securing mechanisms. Finally, we provide a comprehensive secure configuration for confronting these attacks.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
this way, an attacker who controls a website hosted on a shared web hosting server is able to attack all other websites hosted on the same server.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In this paper, we focus on the Apache webserver to present the attacks. Apache webserver as mentioned in Netcraft [4], is the most common used webserver among other webservers such as Microsoft IIS. In addition, the focus of this paper is on Linux operating system due to the fact that most countermeasures are developed for the POSIX operating system. Also, we use PHP programming language because of higher popularity, usability and reliability. However, it has to be known that any webserver with certain configuration can be vulnerable to the aforementioned attacks and they are not only for the Linux/Apache/PHP installation.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Keywords—Shared Web Hosting; Data Confidentiality Violation; Data Integrity Violation; Session Poisoning; Session Snooping; Log Poisoning; Log Snooping; Intensive LFI; CSRF Token Poisoning; Fast Brute Force; Convenient Phishing.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
We demonstrate top ten attacks in shared web hosting servers where six of these attacks are novel. • We provide sample codes to clarify the concept of these attacks.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Some companies and organizations use dedicated web the progression of hardware enables servers while multitudes of websites to reside on one server. This solution is commonly known as Shared Web Hosting which has several advantages including affordability and using maximum power of server hardware. Another advantage of this solution is that it is not required for the website owners to be experts of the domain and they can only handle their own website applications.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
The risks and vulnerabilities involved with using shared web hosting can prevent it from always being an excellent solution. As claimed by Zone-H, an unexpected number of successful attacks were fulfilled after accessing a vulnerable website on a shared web hosting server and even secure websites like static pages also being hacked due to residing on shared web hosting servers [1] [2]. Various security challenges in different levels of network come along with these kinds of servers because there is no proper isolation between resources used by websites [3]. Also, having one vulnerable website on the shared server allows the attacker to hack into other websites with no struggle due to improper configuration of shared web hosting servers.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
The remainder of this paper is outlined as follows. In Section II, the overall architecture of shared web hosting servers is portrayed. We describe top ten most common attacks against shared web hosting servers in Section III. In secure Section configuration for shared web hosting servers to defeat these attacks and we conclude in Section V.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In Figure 1 where web1 and web2 are owners of two separate websites, necessary permissions are shown for the Apache webserver in Linux operating system.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
interpreter as a CGI [6] binary The webserver process loads the webserver module or it is compiled into webserver binary, meaning that a binary image of the interpreter exists in the webserver process. In CGI mode, by arrival of each request, the webserver will create a new interpreter process to handle it. In comparison to the CGI mode, using script interpreter as webserver module has advantages like more stability under load and more efficiency in managing requests and resources. However due to the fact that malicious scripts do not affect webserver process, the CGI mode is more secure.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In Section II, we provided an overview of how shared web hosting servers work. The attacks which we are going to present are based on the fact that there is no proper isolation between different websites hosted on the shared web hosting server.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In shared web hosting servers, webserver is run by one individual user account in a default way and the scripts of all websites are executed under that user account. Thus, this user account can access all files and folders and as a result all scripts of a website can access the files and folders of other websites. One attacker can access the files and folders of a website belonging to the victim and exploit the resulted information [5].
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
As mentioned before, in shared web hosting servers users have read access to all files of all websites. But there are some websites like CMS that give the user the ability of uploading files. In this case if database is not used for storing uploaded files, the webserver user account should have permission for creating new files in folders of one individual website. In other words, webserver user account has read/write access. Since in the default mode, scripts of all websites run under webserver user account, by using this method attacker can recognize victim websites and change it in a desired way [5].
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In shared web hosting servers, websites store their session files in temp directory based on their needs and all users can read or modify the files in temp directory. Thus, there is a strong possibility for users to have access to session files of a website in the case we do not use secure mechanisms.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Webservers usually save the information of processed requests in a log file. A log file includes information such as Domain Name, Client IP, Request Time, Request Type (GET or POST), Requested Filename, Size of Transferred File and Return Status Code from webserver [8]. The two attacks presenting are based on the fact that Webserver uses a single file for storing logs of various websites and the log file is accessible by every script executed by the webserver [9]. In the following sections, the details of Log Poisoning and Log Snooping attacks will be presented.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In default configuration of a shared web hosting server, modifying the log file is only allowed by the root user and other users can only read it. Also, permission is required for a webserver to write in the log file regardless of the user account running with it. Therefore, in most webservers like Apache, parent webserver is executed with root privilege and child webservers are run by parent webserver to handle the requests. In Linux and other Linux-like operating systems, child processes inherit file descriptors opened by their parent process. Now by opening a file by a parent process in write mode, child processes are able to write in the already opened file. In this way, although not having log file root privilege, child webservers descriptor and can alter the log file. Scripts of websites are able to modify the log file since they are executed by child webservers.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In Log Poisoning [9], a script is created by the attacker in order to find log file descriptor and open the log file in write mode. In Linux operating system for example, information about opened files of each process exists in /proc/PID/fd, where PID is the process ID. A PHP script is then created by an attacker for finding opened files of child webserver processes and the script is executed and the log file is opened again but with write access. The sample PHP script for Log Poisoning attack is displayed in Figure 2.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In order to be susceptible to this attack, PHP interpreter must be used as an Apache module in Apache webserver because log file descriptor is not inherited by the new CGI interpreter process and as a result the log file cannot be re- opened in write mode by the malicious PHP script. Clearing other websites’ requests for covering track of penetration and adding fake requests to the log file are examples of malicious activities which an attacker can carry out in case of having write access to the log file. We must emphasize that from a general view having write access to log file in shared web hosting will lead to very dangerous situation which attackers can fulfill various attacks on the hosted websites.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In default configuration, all scripts run by the webserver can read the log file because webserver user account has read access to log file. Therefore, scripts of one website are capable of reading logs of other websites located on the same shared web hosting server. In Log Snooping [9] attack, the goal of an attacker is to retrieve critical information by searching the other website’ logs in order to launch other complex attacks. Unlike Log Poisoning, Log Snooping attack is feasible in two modes which webserver runs the script interpreter (Module or CGI).
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Even when configuring the log file as unreadable for other users, Log Snooping attack can be done using the PHP script shown in Figure 3 and Figure 4. Structure of files and folders of victim websites is one of the most important information that attackers can acquire by Log Snooping attack. Attackers can re-generate tree using requested URLs and find out about names of website files and folders.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Some websites are vulnerable since they allow special code reuse by including files through supplying the values of some parameters in URL. In this case, attackers try to misuse and include some malicious files. One of the most common attacks in this area is known as Local File Inclusion (LFI) [10] which leads in including victim website’s local file. During recent years, several methods like LFI2RCE [11] have been proposed which are able to execute remote code using LFI vulnerability. One method is to inject malicious code into the log file of webserver and include the log file by LFI which leads to execution of malicious code by victim website.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Cross Site Request Forgery (CSRF/XSRF) [12] is a type of vulnerability in a website whereby unauthorized commands are transmitted from a user trusted by the website. In other words, CSRF exploits the trust a website has in the browser of users [13]. An easy and effective solution is to use a secret, user-specific and server-side generated token [12]. In this way, websites generate a token and sends it to the browser of the user. After that, the browser should use the token in all form submissions. When the website receives a request from a user, it checks the received token with the original one and if two tokens match, it will process the request of the user. Whereas attackers are not able to put the right token in their submissions, they cannot launch CSRF attack.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Websites usually generate tokens per-session and save the the corresponding session files. Attackers create some scripts to inspect and modify content of session files belonging to other websites in shared web hosting servers. As a result, attackers are able to modify the value of CSRF tokens which are located in session files. In this way, attackers can bypass CSRF prevention technique and send unauthorized requests to the victim websites.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Nowadays, Brute Force [14] attack is known as a for detecting common attack on web applications passwords, directories, files and session IDs. Bandwidth protection and request controller the main constraints of this type of attacks. In dedicated servers, attackers must follow remote attack in order to detect the password and most of attempts fail because of the low bandwidth.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Phishing is a kind of online identity theft in which confidential information of users such as bank account password or credit card information is stolen by displaying fraudulent web pages. Nowadays Phishing is an important attack on the internet and is accepted as a global criminal activity. In simple words, phishers try to redirect the users to a website where they are asked to enter the personal information. E-mail and online banking websites are the main target of phishing. Fake websites are designed in a way to seem as a legitimate website and afterwards phishers use the private information for malicious tasks [15].
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Currently there are some techniques for protecting users against phishing [16]. But in shared web hosting servers, phishers can bypass many phishing prevention mechanisms because they can access to webservers of victims. For instance, users may use address www.website.com/~attcker/ page.php for login instead of www.website.com/~victim/ page.php. Interestingly, the prevention mechanisms cannot detect the anomaly activity since the domain address is the main domain of website and homographic domains have not been used. In other words, with access to shared web hosting servers, attackers are able to easily bypass many phishing obstacles.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Safe_Mode [18] and Open_Basedir [19] are two methods which PHP developers are studying in order to solve the security problem, although they both carry on some limitations. In other words, PHP is not the right platform for unraveling the security problem [5].
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Safe_Mode. In Safe_Mode, PHP examines the access of running PHP scripts to files based on their owners. PHP checks the owner of those files and if the owner of the file is not the same as the owner of the running script, PHP will not allow that access. However, Safe_Mode has a few limitations. It has to be known that some applications that upload files to server, the owner of them will be Apache user, not the script owner’s user account and those files cannot be accessed by the PHP scripts anymore [5].
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
By precisely seeing the security problem, the cause of the problem will rise as how we run the Apache server. Apache is executed by a unique user who can have access to all files of all websites.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
A new idea is that Apache can serve each website by its owner’s user account. In other words, each script is run with its owner’s user account permissions. suEXEC [20] and suPHP [21] are two well-known methods which use this idea and have been developed as an Apache module.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
suEXEC. The suEXEC includes a wrapper binary file and an Apache module. By the arrival of a HTTP request, the wrapper is run by Apache and the script name and user/group ID under which the script has to be executed is given to the wrapper. The suEXEC can only be used with CGI or FastCGI programs. For using suEXEC, a unique CGI or FastCGI binary file for each website is needed. The user/group ID of the owner must be the website’s owner. By the release of a new PHP version, these binary files must be updated and in case of using PHP in CGI or FastCGI mode, HTTP authentication feature cannot be used. Using suEXEC with CGI has very low performance in a way that Corentin Chary has named suEXEC a performance killer due to tis low performance in use with CGI [5] [22].
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
After the release of Apache 2.0, various MPM [25] methods have been introduced in order to solve the shared hosting security problem [5]. These methods are tested with greater details in the following sections.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
Peruser MPM [26]. Peruser MPM uses processes instead of threads to handle requests. Peruser MPM runs an Apache control process as root privilege. The control process creates several multiplexer processes with Apache user privilege. The multiplexer process listens to port 80 and accepts incoming connections and reads the request to check from which website it is and it passes the connection to related worker process to be handled. The worker processes run under the user/group ID of respective owners of websites. The control process always maintains a pool of idle worker processes to enhance the performance and forks off new worker processes if there are no idle processes to handle new requests. However, one important deficiency of Peruser MPM is too much use of server resources [5].
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
As same as log attacks, the main cause of session attacks is the lack of separation between session storage of different websites [7]. In case of Session Poisoning and Session Snooping attacks, a webserver with default configuration will use a temp directory for storing session files of all websites. Therefore, separating session storage for each website and providing separate directories for each one is necessary for stopping these attacks. In addition, proper permissions must be set on the session directories. Figure 5 shows sample of configuring an Apache webserver for creating separate session directories for each virtual host or website and in Figure 6 the required permissions are depicted.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In shared web hosting servers, the local host is usually trusted and consequently an attacker, who has a website on the shared server, is able to launch attacks such as Fast Brute Force. In order to prevent such attacks it is a good idea to control local traffic. In other words, the local traffic must be gone through security devices like WAFs and NIDPSes before reaching target website.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
V. CONCLUSION Today, shared web hosting is recognized as a popular approach to host thousands of websites but it has multiple serious vulnerabilities which are primarily due to the fact that different resources such as memory, CPU, network and file system are shared between different websites.
Processed_A_Comprehensive_Approach_to_Abusing_Locality_in_Sh.txt
In this paper we addressed common attacks in shared web hosting servers which exploit the lack of proper isolation between different websites resided on a shared server. Then, we presented a comprehensive secure configuration to prevent the risks of these attacks. As a conclusion we can say the mentioned mechanisms prevent the attacks directed towards the shared web hosting servers, but generally this architecture is not advised since it is potentially insecure and new solutions like virtualization are more secure and reliable.
Processed_From_SuperBIT_to_GigaBIT:_Informing_next-generatio.txt
The Super-pressure Balloon-borne Imaging Telescope (SuperBIT) is a near-diffraction-limited 0.5 m telescope that launched via NASA’s super-pressure balloon technology on April 16, 2023. SuperBIT achieved precise pointing control through the use of three nested frames in conjunction with an optical Fine Guidance System (FGS), resulting in an average image stability of 0.055” over 300-second exposures. The SuperBIT FGS includes a tip-tilt fast-steering mirror that corrects for jitter on a pair of focal plane star cameras. In this paper, we leverage the empirical data from SuperBIT’s successful 45-night stratospheric mission to inform the FGS design for the next-generation balloon-borne telescope. The Gigapixel Balloon-borne Imaging Telescope (GigaBIT) is designed to be a 1.35m wide-field, high resolution imaging telescope, with specifications to extend the scale and capabilities beyond those of its predecessor SuperBIT. A description and analysis of the SuperBIT FGS will be presented along with methodologies for extrapolating this data to enhance GigaBIT’s FGS design and fine pointing control algorithm. We employ a systems engineering approach to outline and formalize the design constraints and specifications for GigaBIT’s FGS. GigaBIT, building on the SuperBIT legacy, is set to enhance high-resolution astronomical imaging, marking a significant advancement in the field of balloon-borne telescopes.
Processed_From_SuperBIT_to_GigaBIT:_Informing_next-generatio.txt
The Super-pressure Balloon-borne Imaging Telescope (SuperBIT) is a near-diffraction-limited 0.5 m telescope in use since 2015 that launched via NASA’s super-pressure balloon technology in April 2023. SuperBIT achieved precise pointing control through the use of three nested frames in conjunction with an optical Fine Guidance System (FGS), resulting in an image stability of 0.055” over 300-second exposures. The success of the Super- BIT observatory in its recent science flight has prompted the development of a next-generation balloon-borne telescope, GigaBIT. The Gigapixel Balloon-borne Imaging Telescope (GigaBIT) is designed to be a 1.35m wide- field, high resolution imaging telescope, with specifications to extend the scale and capabilities beyond those of its predecessor SuperBIT. To meet their stringent pointing requirements, SuperBIT and GigaBIT are equipped with a Fine Guidance System (FGS) that employs precision opto-mechanical components, such as a Fast Steering Mirror (FSM), to correct for jitter and achieve sub-arcsecond image stability.
Processed_From_SuperBIT_to_GigaBIT:_Informing_next-generatio.txt
The following focuses on the comprehensive modeling, control, and systems engineering of GigaBIT’s FGS, incorporating insights and lessons learned from SuperBIT. Using FGS data from SuperBIT’s 2023 science flight, feedback sensors are compared and analysed, and assumptions about the operating environment are made to inform the FGS control design. A high-fidelity integrated model of the SuperBIT FGS is developed using line-of-sight (LOS) ray-tracing theory, incorporating the flight data into the simulation framework as a distur- bance. Various control strategies, including Proportional (P), Proportional-Integral-Derivative (PID), and Linear Quadratic Regulator (LQR) controls, are explored and evaluated for their effectiveness in managing jitter using a model-in-the-loop (MIL) approach. Finally, conclusions of this analysis drive the requirements for the FGS of GigaBIT as part of the Phase A model-based systems engineering (MBSE) study.
Processed_From_SuperBIT_to_GigaBIT:_Informing_next-generatio.txt
Figure 1: SuperBIT launch from W¯anaka, New Zealand, in April 2023. Photo credit: NASA/Bill Rodman.
Processed_From_SuperBIT_to_GigaBIT:_Informing_next-generatio.txt
preliminary analysis indicating diffraction-limited pointing. SuperBIT’s 2023 science flight focused on high- resolution observations of 30 galaxy clusters to study the distribution of dark matter in galaxy clusters through weak gravitational lensing.
Processed_From_SuperBIT_to_GigaBIT:_Informing_next-generatio.txt
From an engineering standpoint, SuperBIT is a three-axis stabilized telescope platform engineered to deliver sub-arcsecond pointing stability. A series of three nested frames (inner frame, middle frame and outer frame), actuate yaw, pitch and roll to meet the strict science-driven pointing requirements. The outer frame is controlled in yaw by the reaction wheel and pivot, the middle frame actuates roll about the outer frame, and the inner frame actuates telescope pitch about the middle frame. All three frames act as a three-axis stabilizer for the telescope, designed to stabilize the telescope to within 1 − 2”. In addition, a back-end image stabilization subsystem further improves focal plane output to sub-acrsecond levels.
Processed_From_SuperBIT_to_GigaBIT:_Informing_next-generatio.txt
The SuperBIT FGS, whose main purpose is jitter management, complements the three-axis gimbal system, further enhancing image stability to meet the strict pointing requirements. As schematized in Figure 2, the FGS is composed of a fast-steering mirror (FSM) assembly, two pick-off mirrors and two focal plane star cameras (FSCs) that provide sky-fixed feedback. The FSM, equipped with a flat 3-inch mirror mounted on a piezo- electric tip-tilt (TT) platform with a 2 milli-rad (mrad) throw (PI S-340), addresses the jitter management control problem by minimizing star centroid movement on the FSCs.
Processed_From_SuperBIT_to_GigaBIT:_Informing_next-generatio.txt
The Gigapixel Balloon-borne Imaging Telescope (GigaBIT) is designed to be a 1.35m wide-field, high resolution imaging telescope, with specifications to extend the scale and capabilities beyond those of its predecessor Super- BIT. It will provide 0.1 arc-second resolution imaging over a 0.18 degree squared field of view (FOV) with spectral coverage between 300 and 800 nm in 310 seconds of integration. The current telescope design for GigaBIT is a Three Mirror Anastigmatic (TMA) reflector supported by the gondola, which adopts the same three nested frames architecture from SuperBIT. GigaBIT is currently in its project Phase A, with the GigaBIT Request for Proposal (RFP) issued in 2024.
Processed_From_SuperBIT_to_GigaBIT:_Informing_next-generatio.txt
The substantial increase in size from SuperBIT to GigaBIT — nearly three times larger — poses a practical challenge in scaling the Fine Guidance System (FGS). This necessitates a thorough examination of the require- ments and an initial analysis of the essential opto-mechanical systems for GigaBIT. The FGS control problem is summarized in Figure 3, where the output LOS and wavefront (WFE) error are controlled given system disturbances.
Processed_A_new_search_for_planet_transits_in_NGC_6791.txt
M. Montalto1, G. Piotto1, S. Desidera2, F. De Marchi1, H. Bruntt3,4, P.B. Stetson5 A. Arellano Ferro6, Y. Momany1,2 R.G. Gratton2, E. Poretti7, A. Aparicio8, M. Barbieri2,9, R.U. Claudi2, F. Grundahl3, A. Rosenberg8.
Processed_A_new_search_for_planet_transits_in_NGC_6791.txt
Context. Searching for planets in open clusters allows us to study the effects of dynamical environment on planet formation and evolution. Aims. Considering the strong dependence of planet frequency on stellar metallicity, we studied the metal rich old open cluster NGC 6791 and searched for close-in planets using the transit technique. Methods. A ten-night observational campaign was performed using the Canada-France-Hawaii Telescope (3.6m), the San Pedro M´artir tele- scope (2.1m), and the Loiano telescope (1.5m). To increase the transit detection probability we also made use of the Bruntt et al. (2003) eight-nights observational campaign. Adequate photometric precision for the detection of planetary transits was achieved. Results. Should the frequency and properties of close-in planets in NGC 6791 be similar to those orbiting field stars of similar metallicity, then detailed simulations foresee the presence of 2-3 transiting planets. Instead, we do not confirm the transit candidates proposed by Bruntt et al. (2003). The probability that the null detection is simply due to chance coincidence is estimated to be 3%-10%, depending on the metallicity assumed for the cluster. Conclusions. Possible explanations of the null-detection of transits include: (i) a lower frequency of close-in planets in star clusters; (ii) a smaller planetary radius for planets orbiting super metal rich stars; or (iii) limitations in the basic assumptions. More extensive photometry with 3–4m class telescopes is required to allow conclusive inferences about the frequency of planets in NGC 6791.
Processed_A_new_search_for_planet_transits_in_NGC_6791.txt
During the last decade more than 200 extra-solar planets have been discovered. However, our knowledge of the formation and evolution of planetary systems remains largely incomplete. One crucial consideration is the role played by environment where planetary systems may form and evolve.
Processed_A_new_search_for_planet_transits_in_NGC_6791.txt
the Canada-France-Hawaii Telescope (CFHT) which is operated by the National Research Council of Canada, the Institut National des Sciences de l’Univers of the Centre National de la Recherche Scientifique of France, and the Univesity of Hawaii and on observations obtained at San Pedro M´artir 2.1 m telescope (Mexico), and Loiano 1.5 m telescope (Italy).
Processed_A_new_search_for_planet_transits_in_NGC_6791.txt
to depend on star density, being much stronger for globular clusters (typical current stellar density ∼ 103 stars pc−3) than for the much sparser open clusters (≤ 102 stars pc−3).