Toggle light / dark theme

(2021). Nuclear Science and Engineering: Vol. 195 No. 9 pp. 977–989.


Earlier work has demonstrated the theoretical development of covert OT defenses and their application to representative control problems in a nuclear reactor. Given their ability to store information in the system nonobservable space using one-time-pad randomization techniques, the new C2 modeling paradigm6 has emerged allowing the system to build memory or self-awareness about its past and current state. The idea is to store information using randomized mathematical operators about one system subcomponent, e.g., the reactor core inlet and exit temperature, into the nonobservable space of another subcomponent, e.g., the water level in a steam generator, creating an incorruptible record of the system state. If the attackers attempt to falsify the sensor data in an attempt to send the system along an undesirable trajectory, they will have to learn all the inserted signatures across the various system subcomponents and the C2 embedding process.

We posit that this is extremely unlikely given the huge size of the nonobservable space for most complex systems, and the use of randomized techniques for signature insertion, rendering a level of security that matches the Vernam-Cipher gold standard. The Vernam Cipher, commonly known as a one-time pad, is a cipher that encrypts a message using a random key (pad) and can only be decrypted using this key. Its strength is derived from Shannon’s notion of perfect secrecy 8 and requires the key to be truly random and nonreusable (one time). To demonstrate this, this paper will validate the implementation of C2 using sophisticated AI tools such as long short-term memory (LSTM) neural networks 9 and the generative adversarial learning [generative adversarial networks (GANs)] framework, 10 both using a supervised learning setting, i.e., by assuming that the AI training phase can distinguish between original data and the data containing the embedded signatures. While this is an unlikely scenario, it is assumed to demonstrate the resilience of the C2 signatures to discovery by AI techniques.

The paper is organized as follows. Section II provides a brief summary of existing passive and active OT defenses against various types of data deception attacks, followed by an overview of the C2 modeling paradigm in Sec. III. Section IV formulates the problem statement of the C2 implementation in a generalized control system and identifies the key criteria of zero impact and zero observability. Section V implements a rendition of the C2 approach in a representative nuclear reactor model and highlights the goal of the paper, i.e., to validate the implementation using sophisticated AI tools. It also provides a rationale behind the chosen AI framework. Last, Sec. VI summarizes the validation results of the C2 implementation and discusses several extensions to the work.

The Zwicky Transient Facility recently announced the detection of an optical transient AT2020blt at redshift $z=2.9$, consistent with the afterglow of a gamma-ray burst. No prompt emission was observed. We analyse AT2020blt with detailed models, showing the data are best explained as the afterglow of an on-axis long gamma-ray burst, ruling out other hypotheses such as a cocoon and a low-Lorentz factor jet. We search \textit{Fermi} data for prompt emission, setting deeper upper limits on the prompt emission than in the original detection paper. Together with \konus{} observations, we show that the gamma-ray efficiency of AT2020blt is $\lesssim 2.8\%$, lower than $98.4\%$ of observed gamma-ray bursts. We speculate that AT2020blt and AT2021any belong to the low-efficiency tail of long gamma-ray burst distributions that are beginning to be readily observed due to the capabilities of new observatories like the Zwicky Transient Facility.

Interview with a very important researcher who gives a reality check on a few things (Sirtuins) and explains how effective Rapamycin has been.


Professor Matt Kaeberlein discusses aspects of aging and proposed interventions to improve health. He gives an in-depth review on sirtuins, resveratrol, fasting, NAD precursors, and rapamycin.

Timestamps.

The central principle of superconductivity is that electrons form pairs. But can they also condense into foursomes? Recent findings have suggested they can, and a physicist at KTH Royal Institute of Technology today published the first experimental evidence of this quadrupling effect and the mechanism by which this state of matter occurs.

Reporting in Nature Physics, Professor Egor Babaev and collaborators presented evidence of fermion quadrupling in a series of experimental measurements on the iron-based material, Ba1−xKxFe2As2. The results follow nearly 20 years after Babaev first predicted this kind of phenomenon, and eight years after he published a paper predicting that it could occur in the material.

The pairing of electrons enables the quantum state of superconductivity, a zero-resistance state of conductivity which is used in MRI scanners and quantum computing. It occurs within a material as a result of two electrons bonding rather than repelling each other, as they would in a vacuum. The phenomenon was first described in a theory by, Leon Cooper, John Bardeen and John Schrieffer, whose work was awarded the Nobel Prize in 1972.

Retail giant Amazon has pioneered the idea of automated shopping, as seen with its Amazon Go store format. The first of these launched in January 2018 in downtown Seattle and nearly 30 others have opened since. The concept is now catching on with other companies – including Tesco, the UK’s biggest supermarket and third-largest retailer in the world measured by gross revenues. It has just launched its own automated store in central London.

The rollout of this technology at Tesco Express High Holborn follows a successful trial in Welwyn Garden City, a town north of London. The High Holborn branch has already been a cashless store since it first opened in 2018 and is now checkout-less too.

The newly developed system – called “GetGo” – offers the same products but with a faster and more convenient shopping experience. A customer simply downloads the mobile app, scans the QR code generated on their screen, picks up the groceries they need and then leaves the store.

SambaNova Systems, a company that builds advanced software, hardware, and services to run AI applications, announced the addition of the Generative Pre-trained Transformer (GPT) language model to its Dataflow-as-a-Service™ offering. This will enable greater enterprise adoption of AI, allowing organizations to launch their customized language model in much less time — less than one month, compared to nine months or a year.

“Customers face many challenges with implementing large language models, including the complexity and cost,” said R “Ray” Wang, founder and principal analyst of Constellation Research. “Leading companies seek to make AI more accessible by bringing unique large language model capabilities and automating out the need for expertise in ML models and infrastructure.”

Cybereason, a Tel Aviv-and Boston, Massachusetts-based cybersecurity company providing endpoint prevention, detection, and response, has secured a $50 million investment from Google Cloud, VentureBeat has learned. It extends the series F round that Cybereason announced in July from $275 million to $325 million, making Cybereason one of the best-funded startups in the cybersecurity industry with over $713 million in the capital.

We reached out to a Google Cloud spokesperson, but they didn’t respond by press time.

The infusion of cash comes after Cybereason and Google Cloud entered into a strategic partnership to bring to market a platform — Cybereason XDR, powered by Chronicle — that can ingest and analyze “petabyte-scale” telemetry from endpoints, networks, containers, apps, profiles, and cloud infrastructure. Combining technology from Cybereason, Google Cloud, and Chronicle, the platform scans more than 23 trillion security-related events per week and applies AI to help reveal, mitigate, and predict cyberattacks correlated across devices, users, apps, and cloud deployments.