National Library of Energy BETA

Sample records for attack detection toolkit

  1. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    - Best Practice DesignConfiguration Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan...

  2. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection...

  3. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  4. A toolkit for detecting technical surprise.

    SciTech Connect (OSTI)

    Trahan, Michael Wayne; Foehse, Mark C.

    2010-10-01

    The detection of a scientific or technological surprise within a secretive country or institute is very difficult. The ability to detect such surprises would allow analysts to identify the capabilities that could be a military or economic threat to national security. Sandia's current approach utilizing ThreatView has been successful in revealing potential technological surprises. However, as data sets become larger, it becomes critical to use algorithms as filters along with the visualization environments. Our two-year LDRD had two primary goals. First, we developed a tool, a Self-Organizing Map (SOM), to extend ThreatView and improve our understanding of the issues involved in working with textual data sets. Second, we developed a toolkit for detecting indicators of technical surprise in textual data sets. Our toolkit has been successfully used to perform technology assessments for the Science & Technology Intelligence (S&TI) program.

  5. A "Poisoning" Attack Against Online Anomaly Detection

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    A "Poisoning" Attack Against Online Anomaly Detection Marius Kloft Department of Computer Science it is robust against targeted "poisoning" attacks. The latter have been first investigated by Nelson et al. [1 of all data points observed so far. The key idea of a poisoning attack is to insert specially crafted

  6. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  7. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p aDepartmentEnergyEveryCustomer Service Handbook Marchby ISA -

  8. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111,FY 2007TrafficDepartmentinof EnergyofAudit

  9. An Energy-Harvesting Sensor Architecture and Toolkit for Building Monitoring and Event Detection

    E-Print Network [OSTI]

    Dutta, Prabal

    --Miscellaneous General Terms Architecture, Design, Experimentation, Performance Keywords Building monitoring, EnergyAn Energy-Harvesting Sensor Architecture and Toolkit for Building Monitoring and Event Detection a new architecture for design- ing building-monitoring focused energy-harvesting sensors. The key

  10. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we precisely define corrupted packets in inter-session pollution based

  11. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we first define precisely corrupted packets in inter-session pollution based

  12. Detection attacks on cryptographic protocols and bound randomness

    E-Print Network [OSTI]

    Antonio Acín; Daniel Cavalcanti; Elsa Passaro; Stefano Pironio; Paul Skrzypczyk

    2015-04-30

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. The derived critical detection efficiencies for security imply that the implementation of most partly device independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely non-local correlations in which a non-signalling eavesdropper can find out a posteriori the result of any implemented measurement.

  13. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA Yong Wang1 to the Supervisory Con- trol And Data Acquisition (SCADA) system. Several intrusion detection schemes have been-graph-based detection scheme to defeat false data injec- tion attacks at the SCADA system, even when injected data may

  14. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-in electric vehicle (PEV)Day-June2012environment 3D31,paper describesMay 2008

  15. Detecting SYN Flooding Attacks Haining Wang Danlu Zhang Kang G. Shin

    E-Print Network [OSTI]

    Wang, Haining

    Detecting SYN Flooding Attacks Haining Wang Danlu Zhang Kang G. Shin EECS Department a simple and robust mechanism for de- tecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding

  16. A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data

    E-Print Network [OSTI]

    Sikdar, Biplab

    in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number in the maintenance and control of the power generation and distribution system, monitoring and manipulation of PMU. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks

  17. Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    E-Print Network [OSTI]

    Gupta, B B; Misra, Manoj

    2012-01-01

    Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. This paper reports the design principles and evaluation results of our proposed framework that autonomously detects and accurately characterizes a wide range of flooding DDoS attacks in ISP network. Attacks are detected by the constant monitoring of propagation of abrupt traffic changes inside ISP network. For this, a newly designed flow-volume based approach (FVBA) is used to construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic goes out of profile. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and a...

  18. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  19. A Data-Centric Approach to Insider Attack Detection in Database Systems

    E-Print Network [OSTI]

    Petropoulos, Michalis

    A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis the query expressions in prior approaches. Our data-centric approach is based on the key observation.): RAID 2010, LNCS 6307, pp. 382­401, 2010. c Springer-Verlag Berlin Heidelberg 2010 #12;A Data-Centric

  20. Sensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks

    E-Print Network [OSTI]

    Levi, Albert

    network are discussed in [7]. Security, network bandwidth and power consumption in sensor networksSensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks Serdar Sancak@sabanciuniv.edu Abstract--Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets

  1. Cyber Attack Detection in PMU Measurements via the Expectation-Maximization Algorithm

    E-Print Network [OSTI]

    Kundur, Deepa

    Cyber Attack Detection in PMU Measurements via the Expectation-Maximization Algorithm Dongchan Lee in phasor measurement unit (PMU) data using the expectation-maximization algorithm. Power systems today, such as solving the optimal power flow and system estimation problem. The availability of PMU data real-time has

  2. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank's server farms cannot safely omit a subset of the traffic from analysis. In this environment, Shunting cannot realize its main performance benefits, and the monitoring task likely calls for using custom hardware instead. However, in many other environments we find Shunting holds promise for delivering major performance gains. This arises due to the the widely documented 'heavy tail' nature of most forms of network traffic, which we might express as 'a few of the connections carry just about all the bytes.' The key additional insight is '... and very often for these few large connections, the very beginning of the connection contains nearly all the information of interest from a security analysis perspective.' We argue that this second claim holds because it is at the beginning of connections that authentication exchanges occur, data or file names and types are specified, request and reply status codes conveyed, and encryption is negotiated. Once these occur, we have seen most of the interesting facets of the dialog. Certainly the remainder of the connection might also yield some grist for analysis, but this is generally less likely, and thus if we want to lower analysis load at as small a loss as possible of information relevant to security analysis, we might best do so by skipping the bulk of large connections. In a different context, the 'Time Machine' work by Kornexl and colleagues likewise shows that in some environments we can realize major reductions in the volume of network traffic processed, by limiting the processing to the first 10-20 KB of each connection. As a concrete example, consider an IPS that monitors SSH traffic. When a new SSH connection arrives and the Shunt fails to find an entry for it in any of its tables (per-address, per-port, per-connection), it executes the default action of diverting the connection through the IPS. The IPS analyzes the beginning of the connection in this fashion. As long as it is satisified with the dialog, it reinjects the packets forwarded to it so that the connection can continue. If the connection successfully

  3. Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01

    A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified in the first part of this paper. A cross layer detection mechanism is proposed to combat TSA in part II of this paper. In the physical layer, we propose a GPS carrier signal noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

  4. Alternative energy design toolkit

    E-Print Network [OSTI]

    Sukkasi, Sittha

    2004-01-01

    This thesis concerns the concepts, structure, and applications of the Alternative Energy Design Toolkit. The toolkit is aimed to provide a widely accessible, easy to use, flexible, yet powerful modeling environment for ...

  5. The average detection probability of the quantum dialogue protocol under the disturbance attack is 3/4

    E-Print Network [OSTI]

    Nguyen Ba An

    2004-06-24

    We prove explicitly that the detection probability of the disturbance attack in the recently proposed quantum dialogue protocol is 3/4 in average. The purpose is not only to reply a comment but also to provide a deeper understanding of a kind of tampering in an unauthorized communication.

  6. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  7. Spring 2015 Virtual Toolkit | Department of Energy

    Energy Savers [EERE]

    Virtual Toolkit Spring 2015 Virtual Toolkit Virtual Toolkit for the Spring 2015 BioenergizeME Infographic Challenge. bioenergizemetoolkit2015.pdf More Documents & Publications...

  8. Robust Detection in the Presence of Integrity Attacks Yilin Mo, Jo~ao Hespanha, Bruno Sinopoli

    E-Print Network [OSTI]

    Hespanha, João Pedro

    Acquisition (SCADA) sys- tems, for example, implement the distributed control systems that run a wide range, facility control and power grids. A successful attack to SCADA systems may significantly hamper the economy, the environment, and may even lead to the loss of human life. The first-ever SCADA system malware (called Stuxnet

  9. A Stateful Web Augmentation Toolkit

    E-Print Network [OSTI]

    Webber, Matthew J. (Matthew James)

    2010-01-01

    This thesis introduces the Stateful Web Augmentation Toolkit (SWAT), a toolkit that gives users control over the presentation and functionality of web content. SWAT extends Chickenfoot, a Firefox browser scripting environment ...

  10. The model coupling toolkit.

    SciTech Connect (OSTI)

    Larson, J. W.; Jacob, R. L.; Foster, I.; Guo, J.

    2001-04-13

    The advent of coupled earth system models has raised an important question in parallel computing: What is the most effective method for coupling many parallel models to form a high-performance coupled modeling system? We present our solution to this problem--The Model Coupling Toolkit (MCT). We explain how our effort to construct the Next-Generation Coupler for NCAR Community Climate System Model motivated us to create this toolkit. We describe in detail the conceptual design of the MCT and explain its usage in constructing parallel coupled models. We present preliminary performance results for the toolkit's parallel data transfer facilities. Finally, we outline an agenda for future development of the MCT.

  11. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Grids”, IEEE Transactions on Smart Grid, vol. 2, no. 2,Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  12. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  13. Stochastic Game Approach for Replay Attack Detection Fei Miao Miroslav Pajic George J. Pappas.

    E-Print Network [OSTI]

    Pappas, George J.

    . Abstract-- The existing tradeoff between control system performance and the detection rate for replay, controller design and utilized statistical detector. We show that the optimal strategy for the system exists with multiple finite cost, time-invariant linear controllers/estimators/intrusion detectors. I. INTRODUCTION

  14. Commercial Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit the following comments response NAESBCommercial-Marketing-Toolkit Sign In

  15. Application experiences with the Globus toolkit.

    SciTech Connect (OSTI)

    Brunett, S.

    1998-06-09

    The Globus grid toolkit is a collection of software components designed to support the development of applications for high-performance distributed computing environments, or ''computational grids'' [14]. The Globus toolkit is an implementation of a ''bag of services'' architecture, which provides application and tool developers not with a monolithic system but rather with a set of stand-alone services. Each Globus component provides a basic service, such as authentication, resource allocation, information, communication, fault detection, and remote data access. Different applications and tools can combine these services in different ways to construct ''grid-enabled'' systems. The Globus toolkit has been used to construct the Globus Ubiquitous Supercomputing Testbed, or GUSTO: a large-scale testbed spanning 20 sites and included over 4000 compute nodes for a total compute power of over 2 TFLOPS. Over the past six months, we and others have used this testbed to conduct a variety of application experiments, including multi-user collaborative environments (tele-immersion), computational steering, distributed supercomputing, and high throughput computing. The goal of this paper is to review what has been learned from these experiments regarding the effectiveness of the toolkit approach. To this end, we describe two of the application experiments in detail, noting what worked well and what worked less well. The two applications are a distributed supercomputing application, SF-Express, in which multiple supercomputers are harnessed to perform large distributed interactive simulations; and a tele-immersion application, CAVERNsoft, in which the focus is on connecting multiple people to a distributed simulated world.

  16. Detection and Identification of Data Attacks in Power System Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    the attacked transmission lines. I. INTRODUCTION A. SCADA System and State Estimation A modern society relies is supervised and control through the Supervisory Control And Data Acquisition (SCADA) systems. SCADA systems on State Estimation SCADA systems measure data through remote terminal units (RTUs) all over the grid

  17. NREL: International Activities - Geospatial Toolkits

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines lightGeospatial Toolkit The Geospatial Toolkit is an NREL-developed

  18. WPN 10-3: Procurement Toolkit CD

    Office of Energy Efficiency and Renewable Energy (EERE)

    To issue the Procurement Toolkit CD to all Grantees, to share with their local agencies, for use in the Weatherization Assistance Program.

  19. Review: Focus on Educating for Sustainability: Toolkit for Academic Libraries

    E-Print Network [OSTI]

    LoweWincentsen, Dawn

    2015-01-01

    Focus on Educating for Sustainability: Toolkit for AcademicFocus on Educating for Sustainability: Toolkit for Academicof chapters on sustainability in academic libraries, from

  20. Guidelines and Toolkits for Urban Transport Development in Medium...

    Open Energy Info (EERE)

    Guidelines and Toolkits for Urban Transport Development in Medium Sized Cities in India Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Guidelines and Toolkits for Urban...

  1. LBNL: Architecture 2030 District Toolkit - 2015 Peer Review ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Architecture 2030 District Toolkit - 2015 Peer Review LBNL: Architecture 2030 District Toolkit - 2015 Peer Review Presenter: Cindy Regnier, LBNL View the Presentation LBNL:...

  2. Architecture 2030 District Toolkit - 2014 BTO Peer Review | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Architecture 2030 District Toolkit - 2014 BTO Peer Review Architecture 2030 District Toolkit - 2014 BTO Peer Review Presenter: Cindy Regnier, Lawrence Berkeley National Laboratory...

  3. Sustainable Design and Green Building Toolkit

    E-Print Network [OSTI]

    Sustainable Design and Green Building Toolkit F O R L O C A L G O V E R N M E N T S EPA 904B10001 | June 2010 #12;Disclaimer The Sustainable Design and Green Building Toolkit for Local Governments presented at non-EPA Web sites, or guarantee the validity of the information provided. iSustainable Design

  4. Campus Toolkit What goes around comes around

    E-Print Network [OSTI]

    compostable items such as paper plates and food ware that is approved by Cedar Grove Composting or Biode2 ZERO WASTE Campus Toolkit What goes around comes around #12;11 Zero Waste Campus Toolkit created Campus Zero Waste Program. Graphics and formatting by Charles Taylor-Love and Alex Fallenstedt

  5. Advanced Network Toolkit for Assessments

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p u t y A sCOLONY PROJECTRecord ForDepartmentPike,Toolkit for

  6. TECA: A Parallel Toolkit for Extreme Climate Analysis

    SciTech Connect (OSTI)

    Prabhat, Mr; Ruebel, Oliver; Byna, Surendra; Wu, Kesheng; Li, Fuyu; Wehner, Michael; Bethel, E. Wes

    2012-03-12

    We present TECA, a parallel toolkit for detecting extreme events in large climate datasets. Modern climate datasets expose parallelism across a number of dimensions: spatial locations, timesteps and ensemble members. We design TECA to exploit these modes of parallelism and demonstrate a prototype implementation for detecting and tracking three classes of extreme events: tropical cyclones, extra-tropical cyclones and atmospheric rivers. We process a modern TB-sized CAM5 simulation dataset with TECA, and demonstrate good runtime performance for the three case studies.

  7. Abstract--Intrusion detection is a mechanism used to detect various attacks on a wired or wireless network. Port scanning is

    E-Print Network [OSTI]

    Aloul, Fadi

    precedence. Because, it is not feasible to build a secure system with no vulnerabilities, intrusion detection becomes an important area of research. An intrusion detection system (IDS) is an automated system designed Systems (IDS) is to protect the availability, confidentiality and integrity of critical networked

  8. Toolkits and interface creativity Saul Greenberg

    E-Print Network [OSTI]

    Greenberg, Saul

    Science + Business Media, LLC 2006 Abstract Interface toolkits in ordinary application areas let average undone or it becomes a poorly functioning hack. Because programmers lack appropriate training and only

  9. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  10. Comparison of open source visual analytics toolkits.

    SciTech Connect (OSTI)

    Crossno, Patricia Joyce; Harger, John R.

    2010-11-01

    We present the results of the first stage of a two-stage evaluation of open source visual analytics packages. This stage is a broad feature comparison over a range of open source toolkits. Although we had originally intended to restrict ourselves to comparing visual analytics toolkits, we quickly found that very few were available. So we expanded our study to include information visualization, graph analysis, and statistical packages. We examine three aspects of each toolkit: visualization functions, analysis capabilities, and development environments. With respect to development environments, we look at platforms, language bindings, multi-threading/parallelism, user interface frameworks, ease of installation, documentation, and whether the package is still being actively developed.

  11. Link to Change Management Toolkit: www.shef.ac.uk/hr/guidance/change/toolkit WITH EFFECT FROM 1 MAY 2013

    E-Print Network [OSTI]

    Dixon, Peter

    Human Resources. 1 Link to Change Management Toolkit: www.shef.ac.uk/hr/guidance/change with the Change Management Policy and suite of documents. 1.7 It is recognised that all change, on an individual to Change Management Toolkit: www.shef.ac.uk/hr/guidance/change/toolkit 2.1.3. All necessary and relevant

  12. A toolkit for building earth system models

    SciTech Connect (OSTI)

    Foster, I.

    1993-03-01

    An earth system model is a computer code designed to simulate the interrelated processes that determine the earth's weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

  13. A toolkit for building earth system models

    SciTech Connect (OSTI)

    Foster, I.

    1993-03-01

    An earth system model is a computer code designed to simulate the interrelated processes that determine the earth`s weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

  14. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  15. Recent advances in the development of MOST: an open-source, vendor and technology independent toolkit for building monitoring, data preprocessing and visualization 

    E-Print Network [OSTI]

    Glawischnig, S.; Appel, R.; Zach, R.; Mahdavi, A.

    2012-01-01

    ?Loss/?never used What we want ? Continuous Reports ? Live Performance? Visualization ? Fault?Detection ? Reccomendations for Operation ? Personal?Feedback Monitoring?System?Toolkit Framework ? Google?Web?Toolkit ? Plain Java??>?converted to platform... optimized JavaScript ? User?Interface?Library ? No dedicated user interface ? Reusable components ? Drag?and Drop ? Primary interaction method ? Highlighting of droppable areas ? Modular ? Use?cases 3D?Viewer ? Use?cases ? Lead?user?within?3D...

  16. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  17. Knowledge information management toolkit and method

    DOE Patents [OSTI]

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  18. Integrated: Geospatial Toolkit GIS data for Oaxaca from NREL...

    Open Energy Info (EERE)

    show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

  19. Integrated: Geospatial Toolkit GIS data for India from NREL ...

    Open Energy Info (EERE)

    show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

  20. Regulatory and Permitting Information Desktop Toolkit (Fact Sheet)

    SciTech Connect (OSTI)

    Young, K.

    2014-04-01

    Overview of DOE's Regulatory and Permitting Information Desktop (RAPID) Toolkit project, providing information on where to go to view documents and who to contact to get involved.

  1. Integrated: Geospatial Toolkit GIS data for Nicaragua from NREL...

    Open Energy Info (EERE)

    Nicaragua from NREL (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy...

  2. Integrated: Geospatial Toolkit GIS data for Cuba from NREL -...

    Open Energy Info (EERE)

    Cuba from NREL (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy...

  3. Link to Change Management Toolkit: www.shef.ac.uk/hr/guidance/change/toolkit WITH EFFECT FROM 1 MAY 2013

    E-Print Network [OSTI]

    Dixon, Peter

    Human Resources. 1 Link to Change Management Toolkit: www.shef.ac.uk/hr/guidance/change/toolkit WITH EFFECT FROM 1 MAY 2013 CHANGE MANAGEMENT POLICY INTRODUCTION Change, and the need for change of staff. The purpose of the Change Management policy and its related procedures (for Restructuring

  4. Transportation Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavyAgencyTendo New EnergyWind Power Co Ltd JumpAssessment Toolkit

  5. TransportToolkit Prototype | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJThin Film SolarTown ofTransportToolkit Prototype Jump to:

  6. Building Energy Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin:PontiacInformationAssessment Toolkit Jump to: navigation,

  7. Impact Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavy ElectricalsFTLTechnologySA Jump to:Impact Assessment Toolkit

  8. Safety Meeting Toolkits - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cold and Flu Prevention Hand Washing Healthy Sleep Heat Stress Radon Signs of a Heart Attack Signs of a Stroke Coping with Stress & Change Skin Cancer Awareness Choose My...

  9. WAP Memorandum 015: Weatherization Financial Toolkit – 2 CFR 200 Regulations and Procurement Procedures

    Office of Energy Efficiency and Renewable Energy (EERE)

    This Memorandum serves to update and supersede the Financial Toolkit, previously issued in Weatherization Program Notice (WPN) 12-4, Weatherization Assistance Program Financial Management Training Toolkit dated December 9, 2011, and the Procurement Toolkit previously issued in WPN 10-3, Procurement Toolkit CD, dated October 30, 2009.

  10. Stealthy Poisoning Attacks on PCA-based Anomaly Detectors

    E-Print Network [OSTI]

    Tygar, Doug

    Stealthy Poisoning Attacks on PCA-based Anomaly Detectors Benjamin I. P. Rubinstein1 Blaine Nelson1 detection, we present and evaluate short-term and long-term data poison- ing schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boil- ing Frog attacks

  11. Monitoring Extreme-scale Lustre Toolkit

    SciTech Connect (OSTI)

    Brim, Michael J; Lothian, Josh

    2015-01-01

    We discuss the design and ongoing development of the Monitoring Extreme-scale Lustre Toolkit (MELT), a unified Lustre performance monitoring and analysis infrastructure that provides continuous, low-overhead summary information on the health and performance of Lustre, as well as on-demand, in-depth problem diagnosis and root-cause analysis. The MELT infrastructure leverages a distributed overlay network to enable monitoring of center-wide Lustre filesystems where clients are located across many network domains. We preview interactive command-line utilities that help administrators and users to observe Lustre performance at various levels of resolution, from individual servers or clients to whole filesystems, including job-level reporting. Finally, we discuss our future plans for automating the root-cause analysis of common Lustre performance problems.

  12. Data Exploration Toolkit for serial diffraction experiments

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zeldin, Oliver B.; Brewster, Aaron S.; Hattne, Johan; Uervirojnangkoorn, Monarin; Lyubimov, Artem Y.; Zhou, Qiangjun; Zhao, Minglei; Weis, William I.; Sauter, Nicholas K.; Brunger, Axel T.

    2015-01-23

    Ultrafast diffraction at X-ray free-electron lasers (XFELs) has the potential to yield new insights into important biological systems that produce radiation-sensitive crystals. An unavoidable feature of the 'diffraction before destruction' nature of these experiments is that images are obtained from many distinct crystals and/or different regions of the same crystal. Combined with other sources of XFEL shot-to-shot variation, this introduces significant heterogeneity into the diffraction data, complicating processing and interpretation. To enable researchers to get the most from their collected data, a toolkit is presented that provides insights into the quality of, and the variation present in, serial crystallography datamore »sets. These tools operate on the unmerged, partial intensity integration results from many individual crystals, and can be used on two levels: firstly to guide the experimental strategy during data collection, and secondly to help users make informed choices during data processing.« less

  13. Vision on tap : an online computer vision toolkit

    E-Print Network [OSTI]

    Chiu, Kevin (Kevin Geeyoung)

    2011-01-01

    In this thesis, we present an online toolkit, based on a combination of a Scratch-based programming environment and computer vision libraries, manifested as blocks within the environment, integrated with a community platform ...

  14. Development of the Potential Energy Savings Estimation (PESE) Toolkit 

    E-Print Network [OSTI]

    Liu, J.; Baltazar, J. C.; Claridge, D. E.

    2010-01-01

    This study has developed a prototype computer tool called the Potential Energy Savings Estimation (PESE) Toolkit. Baltazar’s methodology for potential energy savings estimation from EBCx/retrofit measures has been improved ...

  15. Integrated: Geospatial Toolkit for Honduras from NREL - Datasets...

    Open Energy Info (EERE)

    and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

  16. Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures Guillaume Barbu1. Until 2009, Java Cards have been mainly threatened by Log- ical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code

  17. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  18. Fighting Coordinated Attackers with Cross-Organizational Information Sharing

    E-Print Network [OSTI]

    Paxson, Vern

    Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman, Ethan upon real-world crime fighting. While society employs highly trained crime- fighters ("detectives of fighting crime, their value is in their numbers and prevalence. Detectives are charged with detecting

  19. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  20. The MR Toolkit Peers Package and Experiment Chris Shaw and Mark Green

    E-Print Network [OSTI]

    Shaw, Chris

    The MR Toolkit Peers Package and Experiment Chris Shaw and Mark Green Department of Computing Science University of Alberta Edmonton, Alberta, T6G 2H1, CANADA cdshaw,mark@cs.ualberta.ca November 17, 1994 Abstract The MR Toolkit Peer Package is an extension to the MR Toolkit that allows multiple

  1. Validation of Power Output for the WIND Toolkit

    SciTech Connect (OSTI)

    King, J.; Clifton, A.; Hodge, B. M.

    2014-09-01

    Renewable energy integration studies require wind data sets of high quality with realistic representations of the variability, ramping characteristics, and forecast performance for current wind power plants. The Wind Integration National Data Set (WIND) Toolkit is meant to be an update for and expansion of the original data sets created for the weather years from 2004 through 2006 during the Western Wind and Solar Integration Study and the Eastern Wind Integration Study. The WIND Toolkit expands these data sets to include the entire continental United States, increasing the total number of sites represented, and it includes the weather years from 2007 through 2012. In addition, the WIND Toolkit has a finer resolution for both the temporal and geographic dimensions. Three separate data sets will be created: a meteorological data set, a wind power data set, and a forecast data set. This report describes the validation of the wind power data set.

  2. Geospatial Toolkits and Resource Maps for Selected Countries from the National Renewable Energy Laboratory (NREL)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    NREL developed the Geospatial Toolkit (GsT), a map-based software application that integrates resource data and geographic information systems (GIS) for integrated resource assessment. A variety of agencies within countries, along with global datasets, provided country-specific data. Originally developed in 2005, the Geospatial Toolkit was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. Toolkits are available for 21 countries and each one can be downloaded separately. The source code for the toolkit is also available. [Taken and edited from http://www.nrel.gov/international/geospatial_toolkits.html

  3. Water Security Toolkit User Manual Version 1.2.

    SciTech Connect (OSTI)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William E.; Phillips, Cynthia A.; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License PyYAML MIT License runpy2 Python Software Foundation License setuptools Python Software Foundation License / Zope Public License six MIT License TinyXML zlib License unittest2 BSD License Utilib Revised BSD License virtualenv MIT License Vol Common Public License vpykit Revised BSD License Additionally, some precompiled WST binary distributions might bundle other third-party executables files: Coliny Revised BSD License (part of Acro project) Dakota GNU Lesser General Public License (LGPL) v.2.1 PICO Revised BSD License (part of Acro project) i Revised BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Sandia National Laboratories nor Sandia Corporation nor the names of its con- tributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS %22AS IS%22 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IM- PLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SANDIA CORPORATION BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD- ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ii Acknowledgements This work was supported by the U.S. Environmental Protection Agen

  4. Lead User's theory adapted to services: Towards Service User's Toolkit

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Lead User's theory adapted to services: Towards Service User's Toolkit E. Stevens Prof under the perspective of networks and communities. Lead User's theory (LUT) focused mainly is to adapt lead user's theory and practice to the specific case of the intangible processes and services

  5. A Stochastic Processes Toolkit for Risk Management Damiano Brigo

    E-Print Network [OSTI]

    Brigo, Damiano

    A Stochastic Processes Toolkit for Risk Management Damiano Brigo , Antonio Dalessandro , Matthias Neugebauer§ , Fares Triki¶ 15 November 2007 Abstract In risk management it is desirable to grasp, although for a number of risk management applications the models developed here suffice for the first step

  6. Waste Toolkit A-Z Electrical (non-hazardous)

    E-Print Network [OSTI]

    Melham, Tom

    Waste Toolkit A-Z Electrical (non-hazardous) What are non-hazardous electrical items? Non-hazardous of non-haz WEEE? Departments must make their own arrangements (and pay for) for the collection of non-hazardous not be used for the disposal of non-hazardous waste. What is considered hazardous? If your waste is classified

  7. Capturing and Using Knowledge about the Use of Visualization Toolkits

    SciTech Connect (OSTI)

    Del Rio, Nicholas R.; Pinheiro da Silva, Paulo

    2012-11-02

    When constructing visualization pipelines using toolkits such as Visualization Toolkit (VTK) and Generic Mapping Tools (GMT), developers must understand (1) what toolkit operators will transform their data from its raw state to some required view state and (2) what viewers are available to present the generated view. Traditionally, developers learn about how to construct visualization pipelines by reading documentation and inspecting code examples, which can be costly in terms of the time and effort expended. Once an initial pipeline is constructed, developers may still have to undergo a trial and error process before a satisfactory visualization is generated. This paper presents the Visualization Knowledge Project (VisKo) that is built on a knowledge base of visualization toolkit operators and how they can be piped together to form visualization pipelines. Developers may now rely on VisKo to guide them when constructing visualization pipelines and in some cases, when VisKo has complete knowledge about some set of operators (i.e., sequencing and parameter settings), automatically generate a fully functional visualization pipeline.

  8. University of Oxford Energy Toolkit2011/12

    E-Print Network [OSTI]

    Melham, Tom

    's Carbon Management Strategy go to: www.admin.ox.ac.uk/estates/environment/energy/ carbonmanagementstrategyUniversity of Oxford Energy Toolkit2011/12 www.admin.ox.ac.uk/estates/environment/energy emissions through our carbon management strategy. It is now even more important that the University acts

  9. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect (OSTI)

    Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  10. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  12. Retargeting Attacks from Windows to Android With Limited Data Extraction

    E-Print Network [OSTI]

    Ng, Cary G.

    2014-01-01

    Retargeting the Attack to Android . . . . . . . . . .The Popularity of Android Devices . . . . . . . . . . .3 Android Attack . . . . .

  13. Monitoring the grid with the globus toolkit MDS4.

    SciTech Connect (OSTI)

    Schopf, J. M.; Pearlman, L.; Miller, N.; Kesselman, C.; Foster, I.; D'Arcy, M.; Chervenak, A.; Mathematics and Computer Science; Univ. of Chicago; Univ. of Southern California; Univ. of Edinburgh

    2006-01-01

    The Globus Toolkit Monitoring and Discovery System (MDS4) defines and implements mechanisms for service and resource discovery and monitoring in distributed environments. MDS4 is distinguished from previous similar systems by its extensive use of interfaces and behaviors defined in the WS-Resource Framework and WS-Notification specifications, and by its deep integration into essentially every component of the Globus Toolkit. We describe the MDS4 architecture and the Web service interfaces and behaviors that allow users to discover resources and services, monitor resource and service states, receive updates on current status, and visualize monitoring results. We present two current deployments to provide insights into the functionality that can be achieved via the use of these mechanisms.

  14. LEDSGP/Transportation Toolkit/Tools | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: EnergyKulpsville, Pennsylvania: EnergyContactLEDSGP/Transportation Toolkit/Tools

  15. Guide to Using the WIND Toolkit Validation Code

    SciTech Connect (OSTI)

    Lieberman-Cribbin, W.; Draxl, C.; Clifton, A.

    2014-12-01

    In response to the U.S. Department of Energy's goal of using 20% wind energy by 2030, the Wind Integration National Dataset (WIND) Toolkit was created to provide information on wind speed, wind direction, temperature, surface air pressure, and air density on more than 126,000 locations across the United States from 2007 to 2013. The numerical weather prediction model output, gridded at 2-km and at a 5-minute resolution, was further converted to detail the wind power production time series of existing and potential wind facility sites. For users of the dataset it is important that the information presented in the WIND Toolkit is accurate and that errors are known, as then corrective steps can be taken. Therefore, we provide validation code written in R that will be made public to provide users with tools to validate data of their own locations. Validation is based on statistical analyses of wind speed, using error metrics such as bias, root-mean-square error, centered root-mean-square error, mean absolute error, and percent error. Plots of diurnal cycles, annual cycles, wind roses, histograms of wind speed, and quantile-quantile plots are created to visualize how well observational data compares to model data. Ideally, validation will confirm beneficial locations to utilize wind energy and encourage regional wind integration studies using the WIND Toolkit.

  16. Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512 Takanori.Isobe,Taizo.Shirai}@jp.sony.com Abstract. This paper studies two types of attacks on the hash function Shabal. The first attack is a low on a low-weight pseudo collision attack. It means that only low-weight difference in a chaining value

  17. Combating Time Synchronization Attack: A Cross Layer Defense Mechanism

    E-Print Network [OSTI]

    Li, Husheng

    and Protection]: Physical Security 1. INTRODUCTION The security of smart grid has become an important research synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified re- cently. A cross the eectiveness of the pro- posed TSA detection algorithm. Categories and Subject Descriptors K.6.5 [Security

  18. Reducing Attack Surfaces for Intra-Application Communication in Android

    E-Print Network [OSTI]

    Wagner, David

    Reducing Attack Surfaces for Intra-Application Communication in Android David Kantola, Erika Chin,emc,-w,daw}@berkeley.edu ABSTRACT The complexity of Android's message-passing system has led to numerous vulnerabilities in third-application communication mechanisms. Consequently, we propose modifications to the Android platform to detect and protect

  19. THE BLIND PATTERN MATCHING ATTACK ON WATERMARK SYSTEMS

    E-Print Network [OSTI]

    Petitcolas, Fabien A.P.

    complex- ity to reverse the permutations as a preprocessing step for watermark detection. In this paper, we describe the logistics of the attack and a recipe for its implementation against an audio be shown that any WM detector is facing a task of exponential complexity to reverse the permutations

  20. detection

    National Nuclear Security Administration (NNSA)

    of 25 Million Grant to Improve Technological Capabilities for Detecting Nuclear Proliferation http:www.nnsa.energy.govmediaroompressreleasesncstateconsortium

  1. Quantum attacks against iterated block ciphers

    E-Print Network [OSTI]

    Marc Kaplan

    2015-04-26

    We study the amplification of security against quantum attacks provided by iteration of block ciphers. In the classical case, the Meet-in-the-middle attack is a generic attack against those constructions. This attack reduces the time required to break double iterations to only twice the time it takes to attack a single block cipher, given that the attacker has access to a large amount of memory. More abstractly, it shows that security by composition does not achieve exact multiplicative amplification. We present a quantized version of this attack based on an optimal quantum algorithm for the Element Distinctness problem. We then use the generalized adversary method to prove the optimality of the attack. An interesting corollary is that the time-space tradeoff for quantum attacks is very different from what classical attacks allow. This first result seems to indicate that composition resists better to quantum attacks than to classical ones because it prevents the quadratic speedup achieved by quantizing an exhaustive search. We investigate security amplification by composition further by examining the case of four iterations. We quantize a recent technique called the dissection attack using the framework of quantum walks. Surprisingly, this leads to better gains over classical attacks than for double iterations, which seems to indicate that when the number of iterations grows, the resistance against quantum attacks decreases.

  2. IEEE TRANSACTIONS ON SIGNAL PROCESSING: SPECIAL ISSUE ON DATA HIDING 1 Blind Pattern Matching Attack on

    E-Print Network [OSTI]

    Petitcolas, Fabien A.P.

    detector is facing a task of exponential complexity to reverse the permutations as a pre-processing step for watermark detection. In this paper, we describe the logistics of the attack and an implementation against

  3. 14 Market-Oriented Cloud Computing and the Cloudbus Toolkit Rajkumar Buyya1,2

    E-Print Network [OSTI]

    Buyya, Rajkumar

    1 14 Market-Oriented Cloud Computing and the Cloudbus Toolkit Rajkumar Buyya1,2 , Suraj Pandey1 , and Christian Vecchiola1 1 Cloud Computing and Distributed Systems (CLOUDS) Laboratory, Department of Computing OF CONTENTS 14 Market-Oriented Cloud Computing and the Cloudbus Toolkit

  4. Intel Cluster Toolkit Compiler Edition 3.2 for Linux* OS

    E-Print Network [OSTI]

    Nikolic, Branislav K.

    Intel® Cluster Toolkit Compiler Edition 3.2 for Linux* OS Getting Started Guide Intel Corporation.2 Installation of Intel® Cluster Toolkit Compiler Edition on 32-Bit and 64-Bit Nodes that Share a Common /opt .................................................................24 4.6 Running an MPI Program Using Intel® MPI Library on Linux* ..................25 4

  5. Intel Cluster Toolkit Compiler Edition 3.2 for Linux* OS

    E-Print Network [OSTI]

    Nikolic, Branislav K.

    Intel® Cluster Toolkit Compiler Edition 3.2 for Linux* OS Tutorial Intel Corporation (Revision.2 Installation of Intel® Cluster Toolkit Compiler Edition on 32-Bit and 64-Bit Nodes that Share a Common /opt..................................................................24 4.6 Running an MPI Program Using Intel® MPI Library on Linux....................25 4

  6. The boomerang attack David Wagner

    E-Print Network [OSTI]

    Wagner, David

    . Second, we show how to break COCONUT98, a cipher designed using decorrelation techniques to en- sure (Rounds) Our Attack Data Complexity Time Complexity COCONUT98 (8) 2 16 CP 2 38 Khufu (16) 2 18 CP 2 18{5 below, where we show how to break COCONUT98 [V98] with just 2 16 chosen texts and 2 38 work, despite

  7. Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis

    E-Print Network [OSTI]

    Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

  8. Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

  9. Secure routing in wireless sensor networks: attacks and countermeasures

    E-Print Network [OSTI]

    Xu, Wenyuan

    against sensor networks, introduce two classes of novel attacks against sensor networks­­sinkholes two novel classes of previously undocumented attacks against sensor net- works 1 ­­sinkhole attacks

  10. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    E-Print Network [OSTI]

    California at Berkeley, University of

    sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO two novel classes of previously undoc­ umented attacks against sensor networks 1 -- sinkhole attacks

  11. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    E-Print Network [OSTI]

    Wagner, David

    sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO­ umented attacks against sensor networks 1 -- sinkhole attacks and HELLO floods. #15; We show

  12. USAID Toolkit for Increasing Energy Access | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al.,Turin, New York: EnergyU.S. EPA RegionforUSto Alter USACEEnergyToolkit

  13. The Wind Integration National Dataset (WIND) toolkit (Presentation)

    SciTech Connect (OSTI)

    Caroline Draxl: NREL

    2014-01-01

    Regional wind integration studies require detailed wind power output data at many locations to perform simulations of how the power system will operate under high penetration scenarios. The wind datasets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as being time synchronized with available load profiles.As described in this presentation, the WIND Toolkit fulfills these requirements by providing a state-of-the-art national (US) wind resource, power production and forecast dataset.

  14. Geospatial Toolkit (GsT) Webinar | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlexStock|GenesaGeographic coordinatesHoweToolkit

  15. File:RAPID Toolkit Flyer.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePowerEdisto ElectricMonasterwindCAESRAPID Toolkit Flyer.pdf Jump to:

  16. BioenergizeME Infographic Challenge Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar:I DueBETO Quiz -TechnologiesRubricToolkit BioenergizeME

  17. A Novel Attack against Android Phones

    E-Print Network [OSTI]

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  18. Regulatory and Permitting Information Desktop (RAPID) Toolkit (Poster)

    SciTech Connect (OSTI)

    Young, K. R.; Levine, A.

    2014-09-01

    The Regulatory and Permitting Information Desktop (RAPID) Toolkit combines the former Geothermal Regulatory Roadmap, National Environmental Policy Act (NEPA) Database, and other resources into a Web-based tool that gives the regulatory and utility-scale geothermal developer communities rapid and easy access to permitting information. RAPID currently comprises five tools - Permitting Atlas, Regulatory Roadmap, Resource Library, NEPA Database, and Best Practices. A beta release of an additional tool, the Permitting Wizard, is scheduled for late 2014. Because of the huge amount of information involved, RAPID was developed in a wiki platform to allow industry and regulatory agencies to maintain the content in the future so that it continues to provide relevant and accurate information to users. In 2014, the content was expanded to include regulatory requirements for utility-scale solar and bulk transmission development projects. Going forward, development of the RAPID Toolkit will focus on expanding the capabilities of current tools, developing additional tools, including additional technologies, and continuing to increase stakeholder involvement.

  19. Vulnerability Discovery with Attack IEEE Transactions on Software Engineering (2010)

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    2010-01-01

    : Monitor target system's state while executing attacks in 3 ways Overview of tool AJECT #12;Attack generate attacks in 4 ways Injection phase: Execute previously generated test cases(attacks) Monitoring

  20. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  1. The Cost of Attack in Competing Networks

    E-Print Network [OSTI]

    Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

    2015-01-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

  2. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect (OSTI)

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  3. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.

  4. music21: A Toolkit for Computer-Aided Musicology and Symbolic Music Data

    E-Print Network [OSTI]

    Cuthbert, Michael Scott

    Music21 is an object-oriented toolkit for analyzing, searching, and transforming music in symbolic (score- based) forms. The modular approach of the project allows musicians and researchers to write simple scripts rapidly ...

  5. Developing an interactive social-emotional toolkit for autism spectrum disorders

    E-Print Network [OSTI]

    Madsen, Miriam A

    2010-01-01

    A development process consisting of participatory design and iterative implementation was carried out to create a framework for interactive emotion-learning, the Interactive Social-Emotional Toolkit (iSET). iSET is a novel ...

  6. TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

  7. Real-time analysis of aggregate network traffic for anomaly detection 

    E-Print Network [OSTI]

    Kim, Seong Soo

    2005-08-29

    .........................................................................82 2. Identification of Attackers? and Victims? Entire IP Address..........84 F. Comparison with IDS .............................................................................86 1. Intrusion Detection System and Snort... resources. Attack propagation could be slowed through early detection of attacks. Traditionally, Intrusion detection system (IDS) tools that rely upon operating system logs, process behaviors and firewall logs have been employed to monitor the network...

  8. Attacks on Java Card 3.0 Combining Fault and Logical Attacks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Attacks on Java Card 3.0 Combining Fault and Logical Attacks Guillaume Barbu1,2 , Hugues Thiebeauld://www.telecom-paristech.fr/ guillaume.barbu@telecom-paristech.fr Abstract. Java Cards have been threatened so far by attacks using ill it can no longer be applied to the Java Card 3 Connected Edition context where the bytecode verification

  9. Machine Learning Attacks Against the ASIRRA CAPTCHA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Machine Learning Attacks Against the ASIRRA CAPTCHA Draft, February 28, 2008 Philippe Golle Palo of cats and dogs used in ASIRRA. This classifier is a combination of support-vector machine classifiers higher than the estimate given in [6] for machine vision attacks. The weakness we expose in the current

  10. Low-Density Attack Revisited Tetsuya Izu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Low-Density Attack Revisited Tetsuya Izu Jun Kogure Takeshi Koshiba Takeshi Shimoyama Secure The low-density attack proposed by Lagarias and Odlyzko is a powerful algorithm against the subset sum, densities of the subset sum problems should be higher than 0.9408... in order to avoid the low

  11. Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    E-Print Network [OSTI]

    Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

    2011-04-01

    Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

  12. Improved Side Channel Attacks on Pairing Based Cryptography

    E-Print Network [OSTI]

    to passive attacks as well as to active attacks [12,8,21,11,22,13]. asdf This work was funded by the German

  13. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  14. Analysis and Defense of Emerging Malware Attacks 

    E-Print Network [OSTI]

    Xu, Zhaoyan

    2014-05-28

    to perform effectively and efficiently targeted malware analysis. Second, this dissertation studies a new trend of massive malware intrusion and proposes a new protection scheme to proactively defend malware attack. Lastly, our focus is new P2P malware. We...

  15. Inoculating Multivariate Schemes Against Differential Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding and Jason E. Gower scheme the Perturbed Matsumoto-Imai-Plus (PMI+) cryptosystem. Keywords: multivariate, public key resources. Multivariate public key cryptography provides one alternative since computations in small finite

  16. Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack

    E-Print Network [OSTI]

    Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2013-07-24

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

  17. Power Analysis Attacks against FPGA Implementations Shaohua Tang1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Power Analysis Attacks against FPGA Implementations of KLEIN Shaohua Tang1 , Jianhao Wu1 , Weijian not consider the potential attacks by power analysis methods. This paper presents power analysis attacks and complexity of our attacks via power analysis against KLEIN are discussed in detail. Besides

  18. Defining Code-injection Attacks Donald Ray Jay Ligatti

    E-Print Network [OSTI]

    Ligatti, Jay

    of mechanisms for mitigating such attacks. Categories and Subject Descriptors C.2.0 [Computer Communi- cation definitions of code-injection attacks (e.g., SQL-injection attacks) are flawed. The flaws make it possible these flaws in conventional definitions of code-injection attacks, this paper proposes a new definition, which

  19. Taxonomy for Description of Cross-Domain Attacks on CPS

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    . This attack has reportedly damaged over 1000 centrifuges at an Iranian uranium enrichment plant [1]. Multiple

  20. ResGrid: A Grid-Aware Toolkit for Reservoir Uncertainty Analysis

    E-Print Network [OSTI]

    Allen, Gabrielle

    Anisotropical Ratio (SGSIM) Reservoir Uncertainty Analysis · Responses to factors are obtained by modelsResGrid: A Grid-Aware Toolkit for Reservoir Uncertainty Analysis Z. Lei, D. Huang, A. Kulshrestha & performance prediction ­ Sensitivity analysis & uncertainty assessment ­ History matching (model verification

  1. Publishing, Interpreting and Negotiating Scholarly Hypertexts: Evolution of an Approach and Toolkit

    E-Print Network [OSTI]

    Publishing, Interpreting and Negotiating Scholarly Hypertexts: Evolution of an Approach and Toolkit Simon Buckingham Shum & Tamara Sumner KMI-TR-57 December, 1997 Submitted for publication [http://kmi.open.ac.uk/kmi-abstracts/kmi-tr-57-abstract.html]. #12;Publishing, Interpreting and Negotiating Scholarly Hypertexts: Evolution

  2. A Toolkit for Managing Enterprise Privacy Policies Michael Backes, Birgit Pfitzmann, and Matthias Schunter

    E-Print Network [OSTI]

    Backes, Michael

    A Toolkit for Managing Enterprise Privacy Policies Michael Backes, Birgit Pfitzmann, and Matthias proposed by IBM. The basic definition is refinement, i.e., the question whether fulfilling one policy been #12;102 Michael Backes, Birgit Pfitzmann, and Matthias Schunter collected has to govern the use

  3. Development of an Online Toolkit for Measuring Commercial Building Energy Efficiency Performance -- Scoping Study

    SciTech Connect (OSTI)

    Wang, Na

    2013-03-13

    This study analyzes the market needs for building performance evaluation tools. It identifies the existing gaps and provides a roadmap for the U.S. Department of Energy (DOE) to develop a toolkit with which to optimize energy performance of a commercial building over its life cycle.

  4. A Wavelet Toolkit for Visualization and Analysis of Large Data Sets In Earthquake Research

    E-Print Network [OSTI]

    Erlebacher, Gordon

    A Wavelet Toolkit for Visualization and Analysis of Large Data Sets In Earthquake Research G in earthquake physics and other nonlinear problems in the solid earth geosciences. Keywords: wavelets, visualization, grid computing, collaboration, web-based maps, earthquakes 1 Introduction As in many other fields

  5. Development of a Measurement and Verification (M&V) Costing Toolkit 

    E-Print Network [OSTI]

    Haberl, J. S.; Lewis, T.; Im, P.; Carlson, K. A.; Underwood, D.

    2004-01-01

    This paper discusses the development of a M&V Costing Toolkit that has been developed to assist the U.S. Army with the standardization of costing procedures for measuring and verifying energy savings from Energy Service Performance Contracts (ESPC...

  6. THE GEORGE MASON UNIVERSITY TALENT ACQUISITION TOOLKIT A guide to the search and onboarding process

    E-Print Network [OSTI]

    ) BEFORE THE SEARCH, determine the opportunities that exist within your department/unit and review job opportunities and determine who chooses to begin or continue their career at Mason. Please spend time reviewing this hiring toolkit and use it to strengthen your skills and commitment in hiring the best and brightest

  7. The Gridbus Toolkit for Service Oriented Grid and Utility Computing: An Overview and Status Report

    E-Print Network [OSTI]

    Buyya, Rajkumar

    , and (3) motivates the grid service consumers to trade-off between deadline, budget, and the required1 The Gridbus Toolkit for Service Oriented Grid and Utility Computing: An Overview and Status Report Rajkumar Buyya and Srikumar Venugopal Grid Computing and Distributed Systems Laboratory Department

  8. U. S. Army Measurement and Verification (M&V) Costing Toolkit 

    E-Print Network [OSTI]

    Haberl, J. S.; Powell, T.; Carlson, K. A.; Im, P.; Turner, W. D.

    2003-01-01

    This is the 2003 final report for the U.S. Army Monitoring and Verification (M&V) costs project. The purpose of this project is to develop a M&V Costing Toolkit to be used by the government or third party planners to design ...

  9. Protovis: A Graphical Toolkit for Visualization Michael Bostock and Jeffrey Heer

    E-Print Network [OSTI]

    Heer, Jeffrey

    the final graphic. Modern charting software may support a dozen or more chart types, such as pie and line, toolkits, 2D graphics. 1 INTRODUCTION A popular approach to visualization is to import data into charting soft- ware, specify a desired chart type, and then tweak visual parameters as needed to produce

  10. Building Replicated Internet Services Using TACT: A Toolkit for Tunable Availability and Consistency Tradeoffs

    E-Print Network [OSTI]

    Vahdat, Amin

    Building Replicated Internet Services Using TACT: A Toolkit for Tunable Availability of scalable, high-performance, highly-available and fault-tolerant systems. Replication is an important ap in lower system availability in the presence of network partitions. Thus, there is a fundamen- tal tradeoff

  11. The Cloud Adoption Toolkit: Supporting Cloud Adoption Decisions in the Enterprise

    E-Print Network [OSTI]

    Sommerville, Ian

    1 The Cloud Adoption Toolkit: Supporting Cloud Adoption Decisions in the Enterprise Ali Khajeh-Hosseini, David Greenwood, James W. Smith, Ian Sommerville Cloud Computing Co-laboratory, School of Computer Science University of St Andrews, UK {akh, dsg22, jws7, ifs}@cs.st-andrews.ac.uk Abstract Cloud computing

  12. Attacks Against Process Control Systems: Risk Assessment, Detection, and Response

    E-Print Network [OSTI]

    Hu, Fei

    In the last years there has been an increasing interest in the secu- rity of process control and SCADA systems-1-4503-0564-8/11/03 ...$10.00. General Terms Security Keywords SCADA, security, IDS, control systems, critical infrastructure are also called Process Control Systems (PCS), Supervi- sory Control and Data Aquisition (SCADA) systems

  13. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    synchronised clock and the protocol is also independent of physical medium of wireless network. After the route. Typically, the nodes act as both host and router at the same time i.e each node participates in routing like a flood, tornado, hurricane or earth- quake. However, the open nature of the wireless communica

  14. Phase 1 Development Report for the SESSA Toolkit.

    SciTech Connect (OSTI)

    Knowlton, Robert G.; Melton, Brad J; Anderson, Robert J.

    2014-09-01

    The Site Exploitation System for Situational Awareness ( SESSA ) tool kit , developed by Sandia National Laboratories (SNL) , is a comprehensive de cision support system for crime scene data acquisition and Sensitive Site Exploitation (SSE). SESSA is an outgrowth of another SNL developed decision support system , the Building R estoration Operations Optimization Model (BROOM), a hardware/software solution for data acquisition, data management, and data analysis. SESSA was designed to meet forensic crime scene needs as defined by the DoD's Military Criminal Investigation Organiza tion (MCIO) . SESSA is a very comprehensive toolki t with a considerable amount of database information managed through a Microsoft SQL (Structured Query Language) database engine, a Geographical Information System (GIS) engine that provides comprehensive m apping capabilities, as well as a an intuitive Graphical User Interface (GUI) . An electronic sketch pad module is included. The system also has the ability to efficiently generate necessary forms for forensic crime scene investigations (e.g., evidence submittal, laboratory requests, and scene notes). SESSA allows the user to capture photos on site, and can read and generate ba rcode labels that limit transcription errors. SESSA runs on PC computers running Windows 7, but is optimized for touch - screen tablet computers running Windows for ease of use at crime scenes and on SSE deployments. A prototype system for 3 - dimensional (3 D) mapping and measur e ments was also developed to complement the SESSA software. The mapping system employs a visual/ depth sensor that captures data to create 3D visualizations of an interior space and to make distance measurements with centimeter - level a ccuracy. Output of this 3D Model Builder module provides a virtual 3D %22walk - through%22 of a crime scene. The 3D mapping system is much less expensive and easier to use than competitive systems. This document covers the basic installation and operation of th e SESSA tool kit in order to give the user enough information to start using the tool kit . SESSA is currently a prototype system and this documentation covers the initial release of the tool kit . Funding for SESSA was provided by the Department of Defense (D oD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL) . ACKNOWLEDGEMENTS The authors wish to acknowledge the funding support for the development of the Site Exploitation System for Situational Awareness (SESSA) toolkit from the Department of Defense (DoD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL). Special thanks to Mr. Garold Warner, of DFSC, who served as the Project Manager. Individuals that worked on the design, functional attributes, algorithm development, system arc hitecture, and software programming include: Robert Knowlton, Brad Melton, Robert Anderson, and Wendy Amai.

  15. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  16. Protecting Mobile Devices From TCP Flooding Attacks

    E-Print Network [OSTI]

    Fu, Xiaoming

    against these kinds of attack · Waking up the device by sending random SYN packets will exhaust-holes for server ports doesn't prevent against battery exhaustion and spectrum waste · Some P2P applications (e.g., Skype) have mechanism built into protocol to traverse such firewalls, but not all of them do. · Our Goal

  17. Cyber Security Basic Defenses and Attack Trends

    E-Print Network [OSTI]

    Sastry, S. Shankar

    37 38 39 40 41 4273 MTC 4 Cyber Security Basic Defenses and Attack Trends Alvaro A. Cárdenas, Tanya for a successful defense. Cyber security is the branch of security dealing with digital or information technology.1 This chapter presents a selected overview on topics in cyber security. 1. Throughout the chapter, we use

  18. Defending against side-channel attacks : DynamoREA

    E-Print Network [OSTI]

    Wen, David, M. Eng. (David Y.). Massachusetts Institute of Technology

    2011-01-01

    Modern computer architectures are prone to leak information about their applications through side-channels caused by micro-architectural side-effects. Through these side-channels, attackers can launch timing attacks by ...

  19. Attacking and Repairing the Improved ModOnions Protocol

    E-Print Network [OSTI]

    Borisov, Nikita

    Attacking and Repairing the Improved ModOnions Protocol Nikita Borisov1 , Marek Klonowski2 presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoid replay attacks. How- ever, ModOnions allowed the detour attack

  20. A Classification of SQL Injection Attacks and Countermeasures

    E-Print Network [OSTI]

    Orso, Alessandro "Alex"

    A Classification of SQL Injection Attacks and Countermeasures William G.J. Halfond, Jeremy Viegas|jeremyv|orso}@cc.gatech.edu ABSTRACT SQL injection attacks pose a serious security threat to Web appli- cations: they allow attackers methods to address the SQL injection problem, current approaches either fail to address the full scope

  1. A Routing Table Insertion (RTI) Attack Technical Report

    E-Print Network [OSTI]

    Dong, Yingfei

    1 A Routing Table Insertion (RTI) Attack on Freenet Technical Report University of Hawaii at Manoa.2.6 Data Retrieval versus Data Insert Routing 2.3. Routing Algorithm Pseudo-Code 3. RTI Attack 3 Experiment 8.2.2. Experiment Results 8.3. General Anonymous P2P Properties 8.4. RTI Attack 8.4.1. Manual RTI

  2. Efficient Template Attacks Omar Choudary and Markus G. Kuhn

    E-Print Network [OSTI]

    Kuhn, Markus

    Side-channel attacks are powerful tools for inferring secret algorithms or data (passwords a specific cipher, could be implemented on top of that, but are outside the scope of this paper. We show to as the profiling and the attacked device. We wish to infer some secret value k S, processed by the attacked device

  3. Mitigation of Malicious Attacks on Networks

    E-Print Network [OSTI]

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  4. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    learning and security: training-set attacks on machine learners. In such attacks an attacker contaminates-set attacks to increase in the future as more intelligent systems (e.g. wearable devices, cars, smart houses

  5. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    and security: training-set attacks on machine learners. In such attacks an attacker contaminates the training.g. wearable devices, cars, smart houses and robots) include a "life long learning" com- ponent. The attacker

  6. Federated Access Control and Intrusion Detection for Grid Computing Li Zhou Clifford Neuman

    E-Print Network [OSTI]

    Hwang, Kai

    , the management of access control and provision of intrusion detection is critical for grid services. Security a virtual #12;organization. Version 3 of Globus Toolkit (GT3) [8] and its accompanying Grid Security incorporate multiple grid security mechanisms and local security mechanisms together. The interrelation (AND

  7. Design and Evaluation of Opal2: A Toolkit for Scientific Software as a Service Sriram Krishnan, Luca Clementi, Jingyuan Ren, Philip Papadopoulos and Wilfred Li

    E-Print Network [OSTI]

    Krishnan, Sriram

    Design and Evaluation of Opal2: A Toolkit for Scientific Software as a Service Sriram Krishnan. Opal2 is a toolkit for wrapping scientific applications as Web services on Grid and cloud computing machine images. In this paper, we describe the overall philosophy and architecture of the Opal2 framework

  8. LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History ViewInformation Actions(Redirected from Transportation Toolkit/Key

  9. LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios |

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History ViewInformation Actions(Redirected from Transportation Toolkit/KeyOpen

  10. Toolkit Model for SN-03 Final Proposal (ratecases/sn03)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S.Week DayDr.Theories81 to 1990BeToo Crowded to ToolKit Model

  11. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    E-Print Network [OSTI]

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  12. A toolkit for integrated deterministic and probabilistic assessment for hydrogen infrastructure.

    SciTech Connect (OSTI)

    Groth, Katrina; Tchouvelev, Andrei V.

    2014-03-01

    There has been increasing interest in using Quantitative Risk Assessment [QRA] to help improve the safety of hydrogen infrastructure and applications. Hydrogen infrastructure for transportation (e.g. fueling fuel cell vehicles) or stationary (e.g. back-up power) applications is a relatively new area for application of QRA vs. traditional industrial production and use, and as a result there are few tools designed to enable QRA for this emerging sector. There are few existing QRA tools containing models that have been developed and validated for use in small-scale hydrogen applications. However, in the past several years, there has been significant progress in developing and validating deterministic physical and engineering models for hydrogen dispersion, ignition, and flame behavior. In parallel, there has been progress in developing defensible probabilistic models for the occurrence of events such as hydrogen release and ignition. While models and data are available, using this information is difficult due to a lack of readily available tools for integrating deterministic and probabilistic components into a single analysis framework. This paper discusses the first steps in building an integrated toolkit for performing QRA on hydrogen transportation technologies and suggests directions for extending the toolkit.

  13. An expanded framework for the advanced computational testing and simulation toolkit

    SciTech Connect (OSTI)

    Marques, Osni A.; Drummond, Leroy A.

    2003-11-09

    The Advanced Computational Testing and Simulation (ACTS) Toolkit is a set of computational tools developed primarily at DOE laboratories and is aimed at simplifying the solution of common and important computational problems. The use of the tools reduces the development time for new codes and the tools provide functionality that might not otherwise be available. This document outlines an agenda for expanding the scope of the ACTS Project based on lessons learned from current activities. Highlights of this agenda include peer-reviewed certification of new tools; finding tools to solve problems that are not currently addressed by the Toolkit; working in collaboration with other software initiatives and DOE computer facilities; expanding outreach efforts; promoting interoperability, further development of the tools; and improving functionality of the ACTS Information Center, among other tasks. The ultimate goal is to make the ACTS tools more widely used and more effective in solving DOE's and the nation's scientific problems through the creation of a reliable software infrastructure for scientific computing.

  14. Modeling of a Flooding Induced Station Blackout for a Pressurized Water Reactor Using the RISMC Toolkit

    SciTech Connect (OSTI)

    Mandelli, Diego; Prescott, Steven R; Smith, Curtis L; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua J; Kinoshita, Robert A

    2011-07-01

    In the Risk Informed Safety Margin Characterization (RISMC) approach we want to understand not just the frequency of an event like core damage, but how close we are (or are not) to key safety-related events and how might we increase our safety margins. The RISMC Pathway uses the probabilistic margin approach to quantify impacts to reliability and safety by coupling both probabilistic (via stochastic simulation) and mechanistic (via physics models) approaches. This coupling takes place through the interchange of physical parameters and operational or accident scenarios. In this paper we apply the RISMC approach to evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., system activation) and to perform statistical analyses (e.g., run multiple RELAP-7 simulations where sequencing/timing of events have been changed according to a set of stochastic distributions). By using the RISMC toolkit, we can evaluate how power uprate affects the system recovery measures needed to avoid core damage after the PWR lost all available AC power by a tsunami induced flooding. The simulation of the actual flooding is performed by using a smooth particle hydrodynamics code: NEUTRINO.

  15. Preventing Pollution Attacks in MultiSource Network Coding

    E-Print Network [OSTI]

    Boneh, Dan

    Preventing Pollution Attacks in Multi­Source Network Coding Shweta Agrawal 1# , Dan Boneh 2 that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks. A particularly important instance of this is the pollution problem: if some routers in the network are malicious

  16. Preventing Pollution Attacks in Multi-Source Network Coding

    E-Print Network [OSTI]

    Boneh, Dan

    Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal 1 , Dan Boneh 2 , Xavier combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious important instance of this is the pollution problem: if some routers in the network are malicious

  17. Improved Side Channel Attacks on Pairing Based Cryptography

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ], and anonymous group signatures [BS04] make use of pairings as their building blocks. The adoption of pairings that analyze the vulnerability of pairings to passive attacks as well as to active attacks [PV04, KTH+ 06, WS06, WS07, PV06]. There is a variety of pairings that can be used for PBC, e.g., the Weil pairing

  18. Energy Attacks and Defense Techniques for Wireless Systems

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Energy Attacks and Defense Techniques for Wireless Systems Sheng Wei Jong Hoon Ahnn Miodrag {shengwei, jhahnn, miodrag}@cs.ucla.edu ABSTRACT This paper addresses the energy attacks towards wireless in the wireless systems and trigger ultra-high energy increases at runtime. Then, we develop a non-destructive HT

  19. Tornado Attack on RC4 Applications to WEP & WPA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    several tools for building and manipulating pools of biases in the analysis of RC4. We report extremely fast and optimized active and passive attacks against IEEE 802.11 wireless commu- nication protocol WEP of packets, Aicrack-ng yields around 3% success rate. Furthermore, we describe very fast passive only attacks

  20. Efficient Template Attacks Omar Choudary and Markus G. Kuhn

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Side-channel attacks are powerful tools for inferring secret algorithms or data (passwords values, e.g. to recover keys from a specific cipher, could be implemented on top of that, but are outside devices, which we refer to as the profiling and the attacked device. We wish to infer some secret value k

  1. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  2. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  3. Fault and Side-Channel Attacks on Pairing Based Cryptography ?

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

  4. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M. (Sandia National Laboratories, Albuquerque, NM); Ehlen, Mark Andrew (Sandia National Laboratories, Albuquerque, NM); Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  5. Literature Review of Uncertainty of Analysis Methods (Inverse Model Toolkit), Report to the Texas Commission on Environmental Quality 

    E-Print Network [OSTI]

    Haberl, J. S.; Cho, S.

    2004-01-01

    This report reviews the reported uncertainty of ASHRAE’s Inverse Model Toolkit (IMT) analysis method and the linear, and change-point linear algorithms that it uses by reviewing the published literature on the related accuracy of IMT and its...

  6. Advancements in Wind Integration Study Data Modeling: The Wind Integration National Dataset (WIND) Toolkit; Preprint

    SciTech Connect (OSTI)

    Draxl, C.; Hodge, B. M.; Orwig, K.; Jones, W.; Searight, K.; Getman, D.; Harrold, S.; McCaa, J.; Cline, J.; Clark, C.

    2013-10-01

    Regional wind integration studies in the United States require detailed wind power output data at many locations to perform simulations of how the power system will operate under high-penetration scenarios. The wind data sets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as be time synchronized with available load profiles. The Wind Integration National Dataset (WIND) Toolkit described in this paper fulfills these requirements. A wind resource dataset, wind power production time series, and simulated forecasts from a numerical weather prediction model run on a nationwide 2-km grid at 5-min resolution will be made publicly available for more than 110,000 onshore and offshore wind power production sites.

  7. A flooding induced station blackout analysis for a pressurized water reactor using the RISMC toolkit

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Mandelli, Diego; Prescott, Steven; Smith, Curtis; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua; Kinoshita, Robert

    2015-05-17

    In this paper we evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: the RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., component/system activation) and to perform statistical analyses. In our case, the simulation of the flooding is performed by using an advanced smooth particle hydrodynamics code calledmore »NEUTRINO. The obtained results allow the user to investigate and quantify the impact of timing and sequencing of events on system safety. The impact of power uprate is determined in terms of both core damage probability and safety margins.« less

  8. Development of a Toolkit for Calculating Linear, Change-Point Linear and Multiple-Linear Inverse Building Energy Analysis Models, ASHRAE Research Project 1050-RP, Final Report 

    E-Print Network [OSTI]

    Kissock, J. K.; Haberl, J. S.; Claridge, D. E.

    2002-11-01

    This report summarizes the results of ASHRAE Research Project 1050: Development of a Toolkit for Calculating Linear, Change-Point Linear and Multiple Linear Inverse Building Energy Analysis Models. The Inverse Modeling ...

  9. NetCooperate User Manual NetCooperate is a toolkit for calculating host-microbe and microbe-microbe cooperation, available as an

    E-Print Network [OSTI]

    Borenstein, Elhanan

    NetCooperate User Manual NetCooperate is a toolkit for calculating host-microbe and microbe-microbe To determine the BSS between a host and endosymbiont or the MCI between a pair of microbes, the user simply

  10. Coordinated Variable Structure Switching Attacks for Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11

    attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one...

  11. The Middle East under Malware Attack Dissecting Cyber Weapons

    E-Print Network [OSTI]

    Almulhem, Ahmad

    the middle east was the Shamoon attack on Saudi Aramco [10]. Shamoon malware [11] is less sophisticated than destruction of the content of around 30,000 workstations in Saudi Aramco [12], [10]. Given the amount

  12. Single-block collision attack on MD5 Marc Stevens

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands marc@marc-stevens.nl January 29, 2012 Abstract In 2010, Tao Xie and Dengguo Feng

  13. Maximum Damage Malware Attack in Mobile Wireless Networks

    E-Print Network [OSTI]

    such as those in relaying data and establishing end-to-end routes (e.g., sinkhole attacks [1]), or even alter such as the wormhole [7], sinkhole [1], and Sybil [8], that utilize vulnerabilities in the routing protocols

  14. Maximum Damage Battery Depletion Attack in Mobile Sensor Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    functions such as relaying and establishing end-to-end routes (e.g., sinkhole attacks [2]), or even such as the wormhole [6], sinkhole [2], and Sybil [7], that utilize vulner- abilities in the routing protocols

  15. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  16. Post-Processing Free Spatio-Temporal Optical Random Number Generator Resilient to Hardware Failure and Signal Injection Attacks

    E-Print Network [OSTI]

    Mario Stip?evi?; John Bowers

    2014-10-09

    We present a random number generator based on quantum effects in photonic emission and detection. It is unique in simultaneous use of both spatial and temporal quantum information contained in the system which makes it resilient to hardware failure and signal injection attacks. We show that its deviation from randomness cam be estimated based on simple measurements. Generated numbers pass NIST Statistical test suite without post-processing.

  17. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique

  18. Identification of Repeated Attacks Using Network Traffic Alefiya Hussain John Heidemann Christos Papadopoulos

    E-Print Network [OSTI]

    Papadopoulos, Christos

    designed a multi-dimensional maximum-likelihood classifier to identify re- peated attack scenarios, by inference, the same attacker, much as ballistics studies of firearms can trace multiple uses of a weapon to the same gun. Such evidence of repeated attacks would help establish the maliciousness of a given attacker

  19. Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    SFINKS [8], the simple attack would require only about 42 2 operations and 32Kb of keystream higher order nonlinearity. Introduction Algebraic attacks are an attractive field for investigation, a number of papers were written which investigated, extended and improved algebraic attacks. These attacks

  20. A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    availability. Replication in it­ self, however, is not enough against malicious attacks that are specifically be distinguished: bandwidth consumption at­ tacks and resource consumption attacks. In a bandwidth con­ sumption accept requests from legitimate clients anymore. In a resource consumption attack, the attacker sends

  1. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  2. Secure Proximity Detection for NFC Devices based on Ambient Sensor Data

    E-Print Network [OSTI]

    Saxena, Nitesh

    relay attack against such systems. In this paper, we develop secure proximity detection techniques based sensors. Keywords: NFC, RFID, relay attacks, context awareness, sensors 1 Introduction Radio Frequency launching test programs of NFC based payment system in the US [8]. It is predicted that mobile payments

  3. Image Watermarking for Tamper Detection Jiri Fridrich

    E-Print Network [OSTI]

    Fridrich, Jessica

    Image Watermarking for Tamper Detection Jiri Fridrich Center for Intelligent Systems, SUNY 87501 fridrich@binghamton.edu Abstract We propose an oblivious watermarking technique for tamper could probably reveal some cases of tampering, but a capable attacker with enough expertise can always

  4. Integrity Under Attack: The State of Scholarly Publishing

    E-Print Network [OSTI]

    Arnold, Douglas N.

    Integrity Under Attack: The State of Scholarly Publishing By Douglas N. Arnold Scientific journals depend. Publications are used by universities, funding agencies, and others as a primary measure, and in the ranking of departments, institutions, even nations. With big rewards tied to publication

  5. Practical Attacks on Digital Signatures Using MD5 Message Digest

    E-Print Network [OSTI]

    Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department schemes based on MD5 message digest on an example using GPG. Keywords: collision, hash function, MD5 1 used for file integrity checking and as a message digest in digital signature schemes. During CRYPTO

  6. Congestion Attacks to Autonomous Cars Using Vehicular Botnets

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Congestion Attacks to Autonomous Cars Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre of the cars in the targeted area by orders of magnitude. After 5 minutes, the targeted road becomes completely prevent collisions. In a VANET, cars communicate with each other over a wireless channel. They can send

  7. Rootkits on Smart Phones: Attacks, Implications and Opportunities

    E-Print Network [OSTI]

    Iftode, Liviu

    Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford Ryan O Smart phones are increasingly being equipped with operating sys- tems that compare in complexity with those on desktop comput- ers. This trend makes smart phone operating systems vulnerable to many

  8. Smart-Phone Attacks and Defenses Chuanxiong Guo

    E-Print Network [OSTI]

    Wang, Bing

    Smart-Phone Attacks and Defenses Chuanxiong Guo xguo@ieee.org Microsoft Research Helen J. Wang smart-phones), and our environment (e.g., through the use of sensors, actuators, and RFIDs). While is becoming a reality: Smart-phones, interoperable between the telecom networks and the Inter- net

  9. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    E-Print Network [OSTI]

    Johnson, Aaron

    }@informatik.hu-berlin.de Abstract--Tor is a distributed onion-routing network used for achieving anonymity and resisting censorship and transferring roughly 3 GiB/s in aggregate [8]. Tor uses onion routing [25] to route clients' traffic throughThe Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen Florian

  10. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    E-Print Network [OSTI]

    }@informatik.hu-berlin.de Abstract--Tor is a distributed onion-routing network used for achieving anonymity and resisting censorshipB/s in aggregate [4]. Tor uses onion routing [5] to route clients' traffic through a circuit of geo- graphicallyThe Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen Florian

  11. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  12. Anti-discrimination Analysis Using Privacy Attack Strategies

    E-Print Network [OSTI]

    Ruggieri, Salvatore

    Anti-discrimination Analysis Using Privacy Attack Strategies Salvatore Ruggieri1 , Sara Hajian2 and Technology, Saudi Arabia Abstract. Social discrimination discovery from data is an important task to identify deploy privacy at- tack strategies as tools for discrimination discovery under hard assump- tions which

  13. Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins

    E-Print Network [OSTI]

    Perrig, Adrian

    Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins ¡ Adrian Perrig Ion hosts is denial- of-service (DoS) caused by IP packet floods. Hosts in the Internet are unable to stop ­ not the net- work ­ should be given control to respond to packet floods and overload. Ideally, hosts should

  14. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern systems are mon- itored and controlled by Supervisory Control and Data Ac- quisition (SCADA) systems

  15. Defending Synchrophasor Data Networks Against Traffic Analysis Attacks

    E-Print Network [OSTI]

    Sikdar, Biplab

    - tem. PMU data serves to facilitate a number of applications while enhancing others, such as real generation and distribution system, monitoring and manipulation of PMU data are particularly attractive of the PMU data measurement and collection network against a class of passive attacks and develops defense

  16. Attacks based on Conditional Correlations against the Nonlinear Filter Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ­based keystream generator which could be used as a basic building block in a synchronous stream cipher system of a keystream generator (i.e. NLFG) in a synchronous secret key encryption and decryption system. 2 #12Attacks based on Conditional Correlations against the Nonlinear Filter Generator Bernhard L

  17. How to help people who have heart attacks

    E-Print Network [OSTI]

    Lega, Joceline

    How to help people who have heart attacks Meghan McGovern Monday, December 03, 2012 #12;5 Heart-Lung Machine Extracorporeal Membrane Oxygenation #12;6 Electrocardiograph (ECG) #12;7 Artificial Hearts #12;8 Tissue Engineering O Researchers Rebuild Beating Heart with Cardiac Derived Cells! O January

  18. Attacks on Android Clipboard Xiao Zhang and Wenliang Du

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Attacks on Android Clipboard Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer perform a thorough study on the risks im- posed by the globally accessible Android Clipboard. Based briefly discuss some potential solutions. 1 Introduction Android was developed by Google in 2008

  19. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute without the contraint of special hardware and dependency on physical medium of wireless network. BAAP and router at the same time. Most of the previous research has focused on problems of routing

  20. Insects and Related Pests Attacking Lawns and Ornamental Plants. 

    E-Print Network [OSTI]

    Almand, Lyndon K.; Thomas, John G.

    1968-01-01

    Lawns and 0 rnamental Plants i* - .* " TEXAS AIM UNIVERSITY ,I TEXAS AGRICULTURAL EXTENSION SERVIC ' ' 1. E. Hutchison. Director. College Station, Vixtis Photographs in this publication have two numbering series . Any figure number followed by a... small "a" refers to a colored illustration . All colored illustrations appear on pages 12 through 15 . PESTS ATTACKING LAWNS Sucking Pests Southern Chinch Bugs .................................................................................. 2...

  1. New Collision attacks Against Up To 24step SHA2 Somitra Kumar Sanadhya # and Palash Sarkar

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Applied Statistics Unit, Indian Statistical Institute, 203, B.T. Road, Kolkata, India 700108. somitra r. of India. #12; . The complexity of 24­step SHA­512 attack is improved in comparison to the existing attack

  2. Identification of Repeated Attacks Using Network Traffic Alefiya Hussain John Heidemann Christos Papadopoulos

    E-Print Network [OSTI]

    Heidemann, John

    trace multiple uses of a weapon to the same gun. Such evidence of repeated attacks would help establish only by reducing attack effectiveness. We designed a multi-dimensional maximum-likelihood classifier

  3. Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans

    E-Print Network [OSTI]

    Gurumurthi, Sudhanva

    Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans University thermal management alternative. Keywords: storage systems, security, thermal management, denial shut-down. Our new thermal attack on future storage systems is unrecognized by current Intrusion

  4. Automatic Creation of SQL Injection and Cross-Site Scripting Attacks

    E-Print Network [OSTI]

    Kiezun, Adam

    2008-09-10

    We present a technique for finding security vulnerabilitiesin Web applications. SQL Injection (SQLI) and cross-sitescripting (XSS) attacks are widespread forms of attackin which the attacker crafts the input to the application ...

  5. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    that the open nature of web browsers provides a feasible \\point of entry" for this attack via a corrupted plug of web-browser plug-ins could easily provide a \\point of entry" for chosen-plaintext attacks

  6. A spillway infrastructure for defense against Distributed Denial of Service attacks 

    E-Print Network [OSTI]

    Barkley, Andrew Holman

    2000-01-01

    Distributed Denial of Service (DDoS) attacks have proven to be disruptive forces on the Internet. There is currently no means of defense from such attacks, as they are exploitations of mechanisms that are critical for normal operation...

  7. Chosen Ciphertext Attack on SSS Joan Daemen1, Joseph Lano2 , and Bart Preneel2

    E-Print Network [OSTI]

    Bernstein, Daniel

    - cryption with DES in CFB mode was analyzed with respect to chosen ciphertext attacks in [7]. The stream

  8. Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy

    E-Print Network [OSTI]

    Boyd, Colin

    testbed. The testbed simulated actuators and sensors of a hydro-power system. The attacks using DNP3 were

  9. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  10. Detection of Explosives Using a Micro-cantilever Array Nano-Calorimeter System 

    E-Print Network [OSTI]

    Lane, Matthew

    2011-08-08

    Over the past few decades, the likeliness of an attack from explosives has increased dramatically. Hence, the need to find a reliable device with the ability to detect explosives has increased even more. Sensing schemes ...

  11. WIND: Workload-aware INtrusion Detection Sushant Sinha, Farnam Jahanian, and Jignesh M. Patel

    E-Print Network [OSTI]

    Jahanian, Farnam

    WIND: Workload-aware INtrusion Detection Sushant Sinha, Farnam Jahanian, and Jignesh M. Patel an adaptive algorithm that systematically profiles attack signatures and network traffic to generate a high

  12. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris and Start (PKES) systems used in modern cars. We build two efficient and inexpensive attack realizations, wired and wireless physical-layer relays, that allow the attacker to en- ter and start a car by relaying

  13. An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato Entrust, Inc.mister,robert.zuccherato}@entrust.com Abstract. This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode for each block. Standard CFB mode encryption does not appear to be affected by this attack. It applies

  14. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses

    E-Print Network [OSTI]

    Saxena, Nitesh

    The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

  15. Pollution Attack Defense for Coding Based Sensor Levente Buttyan, Laszlo Czap, Istvan Vajda

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    Pollution Attack Defense for Coding Based Sensor Storage Levente Butty´an, L´aszl´o Czap, Istv to make network coding based storage secure against pollution attacks in sensor networks. The approach], [12], [13]. We present a scheme that resists pollution attacks, meaning that our scheme makes possible

  16. Dynamic Load Altering Attacks in Smart Grid Sajjad Amini, Hamed Mohsenian-Rad, and Fabio Pasqualetti

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    response and demand side management programs. It attempts to control and change certain unsecured is on attacks against demand re- sponse (DR) and demand side management (DSM) programs. DR programs are used}@ece.ucr.edu and fabiopas@engr.ucr.edu Abstract--A load altering attack (LAA) is a cyber-physical attack against demand

  17. Impacts of Bad Data and Cyber Attacks on Electricity Market Operations

    E-Print Network [OSTI]

    operations. In particular, we investigated the problem from perspectives of an attacker and the controlImpacts of Bad Data and Cyber Attacks on Electricity Market Operations Final Project Report Power;#12;Impacts of Bad Data and Cyber Attacks on Electricity Market Operations Final Project Report Project Team

  18. On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack Mohammad Reza Sohizadeh against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) pro- tocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive attacks proposed

  19. Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

    E-Print Network [OSTI]

    Nita-Rotaru, Cristina

    1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

  20. Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis Song Sun was publicly intro- duced, power analysis attacks on cryptographic systems have be- come an increasingly of power analysis attacks and preventative techniques on both software (e.g. smartcard, DSP) and hardware

  1. Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks

    E-Print Network [OSTI]

    Nam, Seung Yeob

    1 Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks Seung Yeob Nam, Member- tion Protocol (ARP) is proposed to prevent ARP poisoning-based Man-in-the-Middle (MITM) attacks deployable. Index Terms--ARP cache poisoning, Man-in-the-Middle attack, ARP poisoning prevention, voting. I

  2. Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ives, Zachary G.

    Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor in improving resilience against sinkhole attacks, even in the presence of some collusion. I. INTRODUCTION

  3. Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks

    E-Print Network [OSTI]

    Le Fessant, Fabrice - Institut national de recherche en informatique et en automatique, Centre de recherche INRIA Saclay

    Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor are effective in improving resilience against sinkhole attacks, even in the presence of some collusion. I

  4. Automatic Search of Attacks on round-reduced AES and Applications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Search of Attacks on round-reduced AES and Applications Charles Bouillaguet, Patrick of these tools, we show that they allow to automatically discover new attacks on round-reduced AES with very low to find better attacks, new automatic tools have been designed to automatically search either related

  5. False Data Injection Attacks with Incomplete Information Against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    False Data Injection Attacks with Incomplete Information Against Smart Power Grids Md. Ashfaqur introduced as an important class of cyber attacks against smart grid's wide area measurement and monitoring Injection Attack, Smart Grid Security, Incomplete Information, Transmission Line Admittance Uncer- tainty

  6. Examples of the Generalized Quantum Permanent Compromise Attack to the Blum-Micali Construction

    E-Print Network [OSTI]

    Guedes, Elloá B; Lula, Bernardo

    2010-01-01

    This paper presents examples of the quantum permanent compromise attack to the Blum-Micali construction. Such attacks illustrate how a previous attack to the Blum-Micali generator can be extended to the whole Blum-Micali construction, including the Blum-Blum-Shub and Kaliski generators.

  7. Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Patrick Derbez and Léo cipher they designed, PRINCE. Instead of trying to attack as many rounds as possible using attacks which on round-reduced PRINCE includ- ing the ones which won the challenge in the 6 and 8-round categories

  8. Parameter Sweep and Optimization of Loosely Coupled Simulations Using the DAKOTA Toolkit

    SciTech Connect (OSTI)

    Elwasif, Wael R [ORNL; Bernholdt, David E [ORNL; Pannala, Sreekanth [ORNL; Allu, Srikanth [ORNL; Foley, Samantha S [ORNL

    2012-01-01

    The increasing availability of large scale computing capabilities has accelerated the development of high-fidelity coupled simulations. Such simulations typically involve the integration of models that implement various aspects of the complex phenomena under investigation. Coupled simulations are playing an integral role in fields such as climate modeling, earth systems modeling, rocket simulations, computational chemistry, fusion research, and many other computational fields. Model coupling provides scientists with systematic ways to virtually explore the physical, mathematical, and computational aspects of the problem. Such exploration is rarely done using a single execution of a simulation, but rather by aggregating the results from many simulation runs that, together, serve to bring to light novel knowledge about the system under investigation. Furthermore, it is often the case (particularly in engineering disciplines) that the study of the underlying system takes the form of an optimization regime, where the control parameter space is explored to optimize an objective functions that captures system realizability, cost, performance, or a combination thereof. Novel and flexible frameworks that facilitate the integration of the disparate models into a holistic simulation are used to perform this research, while making efficient use of the available computational resources. In this paper, we describe the integration of the DAKOTA optimization and parameter sweep toolkit with the Integrated Plasma Simulator (IPS), a component-based framework for loosely coupled simulations. The integration allows DAKOTA to exploit the internal task and resource management of the IPS to dynamically instantiate simulation instances within a single IPS instance, allowing for greater control over the trade-off between efficiency of resource utilization and time to completion. We present a case study showing the use of the combined DAKOTA-IPS system to aid in the design of a lithium ion battery (LIB) cell, by studying a coupled system involving the electrochemistry and ion transport at the lower length scales and thermal energy transport at the device scales. The DAKOTA-IPS system provides a flexible tool for use in optimization and parameter sweep studies involving loosely coupled simulations that is suitable for use in situations where changes to the constituent components in the coupled simulation are impractical due to intellectual property or code heritage issues.

  9. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  10. Florida Conference on Recent Advances in Robotics, FCRAR 2009 -Boca Raton, Florida, May 21-22, 2009 1 RSARSim: A Toolkit for Evaluating

    E-Print Network [OSTI]

    Sukthankar, Gita Reese

    Florida Conference on Recent Advances in Robotics, FCRAR 2009 - Boca Raton, Florida, May 21-22, 2009 1 RSARSim: A Toolkit for Evaluating HRI in Robotic Search and Rescue Tasks Bennie Lewis and Gita 32816-2362 BennieLewis@knights.ucf.edu, gitars@eecs.ucf.edu ABSTRACT A well-designed human-robot

  11. Design and Fabrication of Cherenkov Counters for the Detection of SNM

    SciTech Connect (OSTI)

    Erickson, Anna S.; Lanza, Richard; Galaitsis, Anthony; Hynes, Michael; Blackburn, Brandon; Bernstein, Adam

    2011-12-13

    The need for large-size detectors for long-range active interrogation (AI) detection of SNM has generated interest in water-based detector technologies. Water Cherenkov Detectors (WCD) were selected for this research because of their transportability, scalability, and an inherent energy threshold. The detector design and analysis was completed using the Geant4 toolkit. It was demonstrated both computationally and experimentally that it is possible to use WCD to detect and characterize gamma rays. Absolute efficiency of the detector (with no energy cuts applied) was determined to be around 30% for a {sup 60}Co source.

  12. Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non-Repudiation Protocol

    E-Print Network [OSTI]

    Chen, Yu

    1 Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non security issues in cloud storage: repudiation, fairness, and roll-back attacks. We proposed a novel fair and is capable of preventing roll-back attacks. Keywords: Cloud Storage, Non-repudiation, Roll-back Attack. 1

  13. A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. LaPorta

    E-Print Network [OSTI]

    Yener, Aylin

    1 A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of Cross Infrastructure Cyber Attacks in addition to the standard Single

  14. Scalable Techniques for Anomaly Detection 

    E-Print Network [OSTI]

    Yadav, Sandeep 1985-

    2012-08-20

    Computer networks are constantly being attacked by malicious entities for various reasons. Network based attacks include but are not limited to, Distributed Denial of Service (DDoS), DNS based attacks, Cross-site Scripting ...

  15. Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks

    E-Print Network [OSTI]

    Ruj, Sushmita

    2015-01-01

    We model smart grids as complex interdependent networks, and study targeted attacks on smart grids for the first time. A smart grid consists of two networks: the power network and the communication network, interconnected by edges. Occurrence of failures (attacks) in one network triggers failures in the other network, and propagates in cascades across the networks. Such cascading failures can result in disintegration of either (or both) of the networks. Earlier works considered only random failures. In practical situations, an attacker is more likely to compromise nodes selectively. We study cascading failures in smart grids, where an attacker selectively compromises the nodes with probabilities proportional to their degrees; high degree nodes are compromised with higher probability. We mathematically analyze the sizes of the giant components of the networks under targeted attacks, and compare the results with the corresponding sizes under random attacks. We show that networks disintegrate faster for targeted...

  16. Time Stamp Attack on Wide Area Monitoring System in Smart Grid

    E-Print Network [OSTI]

    Zhang, Zhenghao; Li, Husheng; Pei, Changxing

    2011-01-01

    Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

  17. Resilient Detection in the Presence of Integrity Attacks Yilin Mo, Jo~ao Hespanha, Bruno Sinopoli

    E-Print Network [OSTI]

    Hespanha, João Pedro

    measurements. Supervisory Control And Data Acquisition (SCADA) systems, for example, run a wide range of safety the economy, the environment, and may even lead to the loss of human life. The first-ever SCADA system malware (called Stuxnet) was found in July 2010 and rose significant concern about SCADA system security [1], [2

  18. Paint for detection of corrosion and warning of chemical and radiological attack

    DOE Patents [OSTI]

    Farmer, Joseph C. (Tracy, CA)

    2010-08-24

    A system for warning of corrosion, chemical, or radiological substances. The system comprises painting a surface with a paint or coating that includes an indicator material and monitoring the surface for indications of the corrosion, chemical, or radiological substances.

  19. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks 

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22

    were killed and more than 1,200 were injured by deadly terrorist attacks on commuter trains and stations in Madrid. These attacks had an enormous impact on the citizens of Spain, as well as the entire international community. The Madrid bombings... in its ?War on Terror? may carry additional costs. One unanticipated effect of these attacks was the victory of the Socialists over the ruling Partido Popular party in Spain in the next election. More importantly, this occurrence led to a sharp...

  20. Practical realisation and elimination of an ECC-related software bug attack

    E-Print Network [OSTI]

    in modern e-business work-flows, are as follows: 1. Nguyen [28] described an attack on GPG version 1

  1. Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production

    E-Print Network [OSTI]

    Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production spasms, and other problems in the communities in which fracking occurs

  2. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  3. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Ning, Peng

    the measurements of meters at physically protected locations such as substations, such attacks can introduce of about 50 million people. The estimated total cost

  4. Complex networks vulnerability to module-based attacks

    E-Print Network [OSTI]

    da Cunha, Bruno Requião; Gonçalves, Sebastián

    2015-01-01

    In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaking complex networks is attracting much attention from practical points of view. In this contribution we present a module-based method to efficiently break complex networks. The procedure first identifies the communities in which the network can be represented, then it deletes the nodes (edges) that connect different modules by its order in the betweenness centrality ranking list. We illustrate the method by applying it to various well known examples of social, infrastructure, and biological networks. We show that the proposed method always outperforms vertex (edge) attacks which are based on the ranking of node (edge) degree or centrality, with a huge gain in efficiency for some examples. Remarkably, for the US power grid, the present method breaks the original network of 4941 nodes to many fragments smaller than 197 nodes (4% of the original size) by removing mere 164 nodes (~3%) identified by the procedure. B...

  5. Detecting VoIP Floods Using the Hellinger Distance

    E-Print Network [OSTI]

    Wang, Haining

    Detecting VoIP Floods Using the Hellinger Distance Hemant Sengar, Student Member, IEEE, Haining running over the TCP/IP suite, it is susceptible to flooding attacks. If flooded, as a time. Because multiple protocols are involved in a VoIP service and most of them are susceptible to flooding

  6. The Effect of Mountain Pine Beetle Attack and Salvage Harvesting On Streamflows

    E-Print Network [OSTI]

    Northern British Columbia, University of

    The Effect of Mountain Pine Beetle Attack and Salvage Harvesting On Streamflows Special ....................................................................................................................4 FRPA requirements for Water Management in MPB-attacked watersheds ..........5 The Baker Creek. These disturbances have potential effects on water yield (the total amount of water flowing out of a watershed

  7. Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon McCoy, Brian Kantor,

    E-Print Network [OSTI]

    Hu, Fei

    Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon Mc discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics, we discuss the structural characteristics of the automotive ecosystem that give rise to such problems

  8. On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack

    E-Print Network [OSTI]

    Wang, Xinyuan "Frank"

    ], Onion Routing [24], Tor [10], Hordes [28], Web Mixes [6], Tarzan [13]) have been proposed to disguise conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer measurements and timing attack results show that the circuit rotation in Tor network could significantly

  9. Distributed Internet-based Load Altering Attacks against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    management, cost-efficient load protection. I. INTRODUCTION The recent advancements in smart grid systemsDistributed Internet-based Load Altering Attacks against Smart Power Grids Amir-Hamed Mohsenian distribution system. Keywords: Smart grid security, Internet-based load altering attacks, demand side

  10. Integral Cryptanalysis on reduced-round A way to extend the attack?

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Integral Cryptanalysis on reduced-round Safer++ ­ A way to extend the attack? ­ Gilles Piret an integral distinguisher over 2 rounds of Safer++. It allows a practical attack against 3 rounds of Safer for further research in order to extend integral cryptanalysis. 1 Introduction The integral cryptanalysis (or

  11. CellFlood: Attacking Tor Onion Routers on the Cheap Marco V. Barbera1

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    . As a way to mitigate the effect of this attack, we propose to use a client puzzle-based technique the design and implementation of an effective solution to the problem that relies on cryptographic client]. Such an attack could be used to either significantly degrade the users' perceived quality of service, which would

  12. Practical Limitations of Sliding-Mode Switching Attacks on Smart Grid Systems

    E-Print Network [OSTI]

    Kundur, Deepa

    Practical Limitations of Sliding-Mode Switching Attacks on Smart Grid Systems Abdallah K. Farraj}@comm.utoronto.ca, klbutler@tamu.edu Abstract--Switching attacks in smart grid systems have gained some recent attention practical limitations. I. INTRODUCTION Smart grid systems have enjoyed a recent interest from both

  13. Friend or Flood? Social prevention of flooding attacks in mobile opportunistic networks

    E-Print Network [OSTI]

    Henderson, Tristan

    Friend or Flood? Social prevention of flooding attacks in mobile opportunistic networks Iain Parris. In this paper we define a simple flooding attack that can deny service in an opportunistic network. We simulate untraceably flood the network with spoofed messages. As the available resources of participating devices (e

  14. Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal University of Texas combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious important instance of this is the pollution problem: if some routers in the network are malicious

  15. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks

    E-Print Network [OSTI]

    Lui, John C.S.

    Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li: cslui@cse.cuhk.edu.hk Abstract--Pollution attack is a severe security problem in network-coding enabled spreading of polluted packets to deplete network resources. We address this security problem even when

  16. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying. The defense taxonomy classifies the body of existing DDoS de- fenses based on their design decisions

  17. Static Fault Attack on Hardware DES Registers Philippe Loubet-Moundi, Francis Olivier, and David Vigilant

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Static Fault Attack on Hardware DES Registers Philippe Loubet-Moundi, Francis Olivier, and David deals with static faults which lie in between. A static fault modifies a value loaded in a volatile], quickly became a privileged target for DFA. #12;2 Static Fault Attacks on Hardware DES Registers Indeed

  18. On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong

    E-Print Network [OSTI]

    Youssef, Amr M.

    On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong Center for Applied attack, nite elds, Ga- lois Field Fourier Transform 1 Introduction Gong and Golomb 7 introduced a new the later by decimation d. Gong and Golomb showed that the distance of DES S-boxes approximated

  19. 2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks on a smart grid. Keywords: smart grid cyber security; cyber attack impact analysis; graph-based dynamical systems; smart and Computer Engineering at Texas A&M University. Her research interests include cyber security of the smart

  20. DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

    E-Print Network [OSTI]

    California at Davis, University of

    DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks Lihua Yuan ECE, UC Davis lyuan cache poisoning, which causes the DNS to return false name-to-IP mappings and can be used as a foothold inaccurate DNS records caused by cache poisoning attacks. DoX also helps DNS servers to improve cache

  1. Adaptive Network Defense Management for Countering Smart Attack and Selective Capture

    E-Print Network [OSTI]

    Cao, Yong

    , humidity, tempera- ture, electrical characteristics, and radiation. · Smart City [46]: A query-based WSN1 Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless network defense management for countering smart attack and se- lective capture which aim to cripple

  2. Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao and Gregory G. Rose Abstract At IEEE GLOBECOM 2008, a lightweight cipher based on a Multiple Recursive Generator (MRG plaintext attack is proposed to construct the cipher's current state and generate subkeys used for all

  3. Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao and Gregory G. Rose Abstract At IEEE GLOBECOM 2008, a lightweight cipher based on a Multiple Recursive Generator (MRG attack is proposed to construct the cipher's current state and generate subkeys used for all subsequent

  4. Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices

    E-Print Network [OSTI]

    Kundur, Deepa

    vehicles, and energy storage devices, and providing advanced load management strategies. To meet attack may cause device restoration delays. Data integrity attacks were also performed on a load management system in [6], in which a graph based dynamic system model was used to analyze the impact

  5. A new key recovery attack on the ANSI retail MAC Chris J. Mitchell

    E-Print Network [OSTI]

    Mitchell, Chris

    A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

  6. Differential Fault Attack on the PRINCE Block Ling Song, Lei Hu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Differential Fault Attack on the PRINCE Block Cipher Ling Song, Lei Hu State Key Laboratory {lsong,hu}@is.ac.cn Abstract. PRINCE is a new lightweight block cipher proposed at the ASIACRYPT'2012. Key words: lightweight cipher, PRINCE block cipher, differential fault attack 1 Introduction The idea

  7. Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework Zheng@mail.tsinghua.edu.cn Abstract. A new distinguishing attack on HMAC and NMAC based on a dedicated compression function framework. In ChinaCrypt2008, a new dedicated compression function framework (i.e. hash function H) and two

  8. Rate of H2S and CO2 attack on pozzolan-amended Class H well cement...

    Office of Scientific and Technical Information (OSTI)

    Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Citation Details In-Document Search Title: Rate of H2S and CO2 attack on...

  9. Property Rights, Taxpayer Rights, and the Multiscalar Attack on the State: Consequences for Regionalism in the United States

    E-Print Network [OSTI]

    Christopher Niedt; Margaret Weir

    2007-01-01

    G.M. (2005) The Rights of Taxpayers and the Rights of AllProperty Rights, Taxpayer Rights, and the Multiscalar AttackProperty rights, taxpayer rights, and the multiscalar attack

  10. Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha, Jayan Krishnaswami

    E-Print Network [OSTI]

    Ha, Dong S.

    Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where

  11. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  12. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  13. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  14. ASTROMLSKIT: A New Statistical Machine Learning Toolkit: A Platform for Data Analytics in Astronomy

    E-Print Network [OSTI]

    Saha, Snehanshu; R, Manikandan; Bora, Kakoli; Routh, Swati; Narasimhamurthy, Anand

    2015-01-01

    Astroinformatics is a new impact area in the world of astronomy, occasionally called the final frontier, where several astrophysicists, statisticians and computer scientists work together to tackle various data intensive astronomical problems. Exponential growth in the data volume and increased complexity of the data augments difficult questions to the existing challenges. Classical problems in Astronomy are compounded by accumulation of astronomical volume of complex data, rendering the task of classification and interpretation incredibly laborious. The presence of noise in the data makes analysis and interpretation even more arduous. Machine learning algorithms and data analytic techniques provide the right platform for the challenges posed by these problems. A diverse range of open problem like star-galaxy separation, detection and classification of exoplanets, classification of supernovae is discussed. The focus of the paper is the applicability and efficacy of various machine learning algorithms like K N...

  15. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  16. New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram DA-IICT Near Indroda Circle Gandhinagar-382007 INDIA anish mathuria@daiict.ac.in, g.sriram.248@gmail.com July 29, 2008

  17. Networked Control Systems under Cyber Attacks with Applications to Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    acquisition (SCADA) systems. Several cyber attacks on SCADA systems operating power networks have been reported [3], and major blackouts are due to the misuse of the SCADA systems [4]. Power networks, being

  18. Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks the Wheatstone bridge measurement setup. Here we propose to in- dividualize the electrical circuit of devices with individualized electrical circuit are individualized while providing the same functionality

  19. On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks

    E-Print Network [OSTI]

    Medard, Muriel

    Random linear network coding can be used in peer-to- peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We ...

  20. The Recent Attack of Nie et al On TTM is Faulty Nov 19.2006

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Recent Attack of Nie et al On TTM is Faulty T. Moh #3; Nov 19.2006 Abstract Recently there is a paper entitled "Breaking a New Instance of TTM Cryptosystem" by Xuyun Nie, Lei Hu, Jianyu Li, Crystal

  1. gore: Routing-Assisted Defense Against DDoS Attacks Stephen T. Chou1

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    attackers identify "pinch points" in the communications infrastructure and render them inoperable of effective anti-DDoS technology by Internet Service Providers. An important one is the lack of financial

  2. An Experimentally Veried Attack on Full Grain-128 Using Dedicated Recongurable

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Experimentally Veried Attack on Full Grain-128 Using Dedicated Recongurable Hardware Itai Dinur-purpose hardware, i. e., computing machines dedicated to cryptana- lytical problems, have a long tradition in code

  3. Modeling experiments that simulate fragment attacks on cased munitions

    SciTech Connect (OSTI)

    Kerrisk, J.F.

    1996-01-01

    Roberts and Field (1993) have conducted experiments to observe the behavior of a cased high explosive (HE) charge subject to fragment attack at impact velocities below those needed for shock initiation. Two and three-dimensional hydrodynamic calculations have been done to model these experiments. Questions about the degree of confinement of the HE and about the condition of the HE during the impact were addressed. The calculations indicate that the HE was not strongly confined in this experiment, primarily due to the lateral expansion of polycarbonate blocks on the sides of the target during the impact. HE was not ejected from the hole in the casing made by the projectile up to 30 {micro}s after the impact. There are hints from these calculations of how initiation of a homogeneous sample of HE might occur in the experiment. The first involves the reshock of a small amount of HE at {approximately} 20 {micro}s as a result of the impact of the sabot on the target. The second involves the heating of the HE from plastic work during the impact. The maximum temperature rise of the HE (exclusive of the small region that was reshocked) was {approximately} 80 k. However, this is the average temperature of a region the size of a computational cell, and phenomena such as shear bands or cracks could result in higher temperatures on a smaller scale than the cell size. The third involves heating of the HE from contact with the casing material. The maximum temperature rise of the casing material from plastic work is {approximately} 870 k. This temperature occurs at the edge of a plug of casing material sheared off by the projectile. Other parts of the casing are shock heated to higher energies but may not contact the HE.

  4. THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER Mohammad Sadegh Nemati Nia1 University of Technology, Tehran, Iran (m_s_nemati; payandeh)@mut.ac.ir ABSTRACT SNOW 2.0 is a word oriented. The results of HGD attack on TIPSY, SNOW 1.0 and SNOW 2.0 stream ciphers led to less complexity rather than

  5. Secure estimation and control for cyber-physical systems under adversarial attacks

    E-Print Network [OSTI]

    Fawzi, Hamza; Diggavi, Suhas

    2012-01-01

    The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with the estimation and control of linear systems when some of the sensors or actuators are corrupted by an attacker. In the first part we look at the estimation problem where we characterize the resilience of a system to attacks and study the possibility of increasing its resilience by a change of parameters. We then propose an efficient algorithm to estimate the state despite the attacks and we characterize its performance. Our approach is inspired from the areas of error-correction over the reals and compressed sensing. In the second part we consider the problem of designing output-feedback controllers that stabilize the system despite attacks. We show that a principle of separation betwee...

  6. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  7. detonation detection

    National Nuclear Security Administration (NNSA)

    Satellite Carrying NNSA-provided Nuclear Detonation Detection Sensors http:www.nnsa.energy.govmediaroompressreleasesafsatellite

  8. Koon Leai Larry Tan and Kenneth J. Turner. Orchestrating Grid Services using BPEL and Globus Toolkit 4. In Madjid Merabti, Rubem Pereira, Carol Oliver and OmarAbuelma'atti, editors, Proc. 7th PGNet Symposium, pages 31-36,

    E-Print Network [OSTI]

    Turner, Ken

    , Kenneth J. Turner, University of Stirling Abstract--Grid services exploit an emerging distributed has been adapted for this purpose, using ActiveBPEL as the orchestration engine and Globus Toolkit 4 and ActiveBPEL. Manuscript received May 2, 2006. K. L. L. Tan is with the University of Stirling, Stirling FK

  9. Practical Attacks on Decoy State Quantum Key Distribution Systems with Detector Efficiency Mismatch

    E-Print Network [OSTI]

    Fei Yangyang; Gao Ming; Wang Weilong; Li Chaobo; Ma Zhi

    2015-07-23

    To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy state quantum key distribution systems. The eavesdropper may get some information ab out the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum key distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy state quantum key distribution systems.

  10. A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS 

    E-Print Network [OSTI]

    Tadi, Krishna C.

    2010-01-16

    information about who administers an AS. The authors of [5] have proposed an algorithm which classifies the relationships with 99% accuracy. More than 90.5% of AS pairs in the Internet have customer-provider relationship, less than 1.5% of AS pairs have... mitigation system. They preselect several ASs and call them lifesaver ASs. In case of a hijack, a detection system notifies these lifesaver ASs with information about the hijacker AS, Victim AS and the victim prefix. All the lifesaver ASs attempt to purge...

  11. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  12. Attack of fragmented-core debris on concrete in the presence of water. [PWR; BWR

    SciTech Connect (OSTI)

    Tarbell, W.W.; Bradley, D.R.

    1982-01-01

    In the unlikely event that core debris escapes the reactor pressure vessel, the interactions of the debris with concrete, structural materials, and coolant become the driving force for severe accident phenomena. The Ex-Vessel Core Debris Interactions Program at Sandia National Laboratories is an experimental research effort to characterize these interactions and the magnitude of safety-related phenomena such as flammable gas generation, aerosol production, fission product release, and concrete attack. Major areas of study within the program include molten core simultants in contact with concrete, high pressure melt streaming into scaled reactor cavities, the addition of coolant to high-temperature melt/concrete interactions, and the attack of hot, solid core debris on concrete. This paper describes results from the last of these efforts, i.e., hot, but not molten debris attacking concrete.

  13. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  14. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    E-Print Network [OSTI]

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  15. Ravaging the wine dark sea: attacks on Crete by sea raiders during the Bronze Age 

    E-Print Network [OSTI]

    Stewart, David James

    1997-01-01

    RAVAGING THK WINK DARK SEA: ATTACKS ON CRETE BY SEA RAIDERS DIJRING THE BRONZE AGE A Thesis by DAVID JAMES STEWART Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF ARTS May 1997 Major Subject: Anthropology RAVAGING THE WINE DARK SEA: ATTACKS ON CRETE BY SEA RAIDERS DURING THE BRONZE AGE A Thesis by DAVID JAMES STEWART Submitted to Texas A&M University in partial fulfillment of the requirements...

  16. Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG

    E-Print Network [OSTI]

    Altug, Yucel

    2008-01-01

    A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized. Consequently, under some mild assumptions, which are common in cryptanalysis, the tight lower bounds on the algorithmic complexity of successful Query-Based Key-Recovery attacks are derived for two different setups of practical interest. The proofs rely on the concept of ``typicality'' of information theory.

  17. c 2013 David Raymond Grochocki Jr DEPLOYMENT CONSIDERATIONS FOR INTRUSION DETECTION SYSTEMS IN

    E-Print Network [OSTI]

    Sanders, William H.

    detect attacks. Using the information taken from the failure scenarios and knowledge of how encrypted Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security

  18. Topographically-Based Real-Time Traffic Anomaly Detection in a Metropolitan Highway System

    E-Print Network [OSTI]

    Grossman, Robert

    Topographically-Based Real-Time Traffic Anomaly Detection in a Metropolitan Highway System Rajmonda metropolitan area. Our Chicago Alert System (CAS) considers both the spatial and temporal aspects of the data of attack, the need for real-time traffic management is crucial. Real-time traffic management encompasses

  19. Tamper Detection and Continuous Non-Malleable Codes Zahra Jafargholi Daniel Wichs

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Tamper Detection and Continuous Non-Malleable Codes Zahra Jafargholi Daniel Wichs Northeastern be adversarially tampered via a function f F from some "tampering function family" F, resulting in a tampered in this scenario for different families F of tampering attacks. Firstly, we initiate the general study of tamper

  20. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems

    E-Print Network [OSTI]

    Chen, Ing-Ray

    within radio range Na b (t) Attacker strength detected at time t in Beta(, ) in Beta(, ) Number of ranging operations per node per TIDS Et Energy for transmission per node Er Energy for reception per node Ea Energy for analyzing data per node Es Energy for sensing per node Eo Initial system energy TIDS

  1. Solar Site Survey Toolkit

    Broader source: Energy.gov [DOE]

    After a couple outings, a principal technologist at Sandia National Laboratories saw a need for a travel kit that would have the necessary tools to make the task of site surveys more manageable and safer. They have had great success using the kit in the field already.

  2. BioenergizeME Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TECHNOLOGY 1. How do plants capture and store energy from the sun? Describe a process for harvesting energy from plants for sustainable transportation fuels. Include mention of the...

  3. Alternative Fuel Implementation Toolkit

    E-Print Network [OSTI]

    ? Alternative Fuels, the Smart Choice: Alternative fuels ­ biodiesel, electricity, ethanol (E85), natural gas

  4. Agricultural Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TA I N P A T T E R N A

  5. Residential Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100Nationalquestionnaires 0 Averagequestionnaires 7tniLighting Sign

  6. ppt-toolkit.com

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm fpolicy |POSTERSpend by

  7. WeaselBoard : zero-day exploit detection for programmable logic controllers.

    SciTech Connect (OSTI)

    Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Jacob, Joshua A.

    2013-10-01

    Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-day exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.

  8. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications

    E-Print Network [OSTI]

    Yin, Heng

    Hijacking Attacks in Android Applications Mu Zhang Department of EECS Syracuse University muzhang of vulnerabilities commonly appearing in Android applications. When these vul- nerabilities are triggered on Android devices, on behalf of the attackers. It is often unrealis- tic to purely rely on developers to fix

  9. Extending the GHS Weil Descent Attack S.D. Galbraith, F. Hess and N.P. Smart

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Extending the GHS Weil Descent Attack S.D. Galbraith, F. Hess and N.P. Smart Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB, United due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack

  10. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 2, MARCH 2003 431 Some Attacks Against Vehicles' Passive Entry

    E-Print Network [OSTI]

    Mahmud, Syed Masud

    Terms--Passive entry systems, playback attack, remote keyless entry, two-thief attack, vehicle security of an automobile. The user was required to enter a unique digital code through the keypad to unlock or lock- hances user convenience, it still does not provide the full com- fort level. The user still has to search

  11. Islamists claim deadly attack on UN building in Nigeria 26 August 2011

    E-Print Network [OSTI]

    Islamists claim deadly attack on UN building in Nigeria 26 August 2011 Boko Haram says/AFP/Getty Images A car loaded with explosives crashed into the main United Nations' building in Nigeria's capital for the bombing, a major escalation of its sectarian fight against Nigeria's weak central government. The brazen

  12. Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins y Adrian Perrig Ion Stoica

    E-Print Network [OSTI]

    Perrig, Adrian

    Taming IP Packet Flooding Attacks #3; Karthik Lakshminarayanan Daniel Adkins y Adrian Perrig Ion hosts is denial­ of­service (DoS) caused by IP packet floods. Hosts in the Internet are unable to stop -- not the net­ work -- should be given control to respond to packet floods and overload. Ideally, hosts should

  13. Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash Adi by John Nash in the early 1950's but whose design was declassified by the NSA only in 2012. The main, John Nash. 1 Introduction John Nash is known today mostly for his seminal contributions to the field

  14. Touchjacking Attacks on Web in Android, iOS, and Windows Phone

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Touchjacking Attacks on Web in Android, iOS, and Windows Phone Tongbo Luo, Xing Jin, Ajai to interact with the Web, most mobile platforms, including Android, iOS, and Windows Phone, provide is called WebView in Android (it is called different names in other platforms). WebView im- plements

  15. Evaluating Risk of Terrorist Attack on a Cable Stayed Bridge: A Probabilistic Structural

    E-Print Network [OSTI]

    Bhattacharya, Baidurya

    Evaluating Risk of Terrorist Attack on a Cable Stayed Bridge: A Probabilistic Structural Analysis and administrators are able to evaluate risks to infrastructure in their jurisdiction in a rational manner. This will enable them to take optimal actions to manage these risks given budgetary constraints. This paper

  16. Adaptive Flow Aggregation -A New Solution for Robust Flow Monitoring under Security Attacks

    E-Print Network [OSTI]

    Lui, John C.S.

    Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu.S. Lui Dept. of CSE Chinese University of Hong Kong Email: cslui@cse.cuhk.edu.hk Abstract-- Flow the resources (memory, export bandwidth or CPU) of the flow monitor. A standard solution is to do sampling (look

  17. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of Technology and Economics (BME) Abstract. Smart grids consist of suppliers, consumers, and other parts effort to protect these devices. This behavior was motivated by the special requirements in control

  18. Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang

    E-Print Network [OSTI]

    Wang, Haining

    Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang Department of Computer of servers being deployed in data centers, the data center power distribution systems have already approached peak capacities. Since the upgrades of the power systems are extremely expensive, power

  19. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  20. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Young, R. Michael

    @cs.unc.edu Abstract--A power grid is a complex system connecting electric power generators to consumers through power estimate the power grid state through analysis of meter measure- ments and power system models. Various malicious attacks. I. INTRODUCTION A power grid is a complex system connecting a variety of electric power

  1. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-Print Network [OSTI]

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  2. TorScan: Tracing Long-lived Connections and Differential Scanning Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    successor of the original Onion Routing Project. The Tor network is a low-latency anonymity network whichTorScan: Tracing Long-lived Connections and Differential Scanning Attacks Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann University of Luxembourg Abstract. Tor is a widely used anonymity network

  3. Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier Gemplus Card in a state that leaks secret information. Nicely enough, evaluating the entropy loss due to the chemical spectroscopic analysis can reveal with accuracy the mixture of chemical compounds generated by the user, we show

  4. Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel-correlation distinguishers as well as between zero-correlation and integral distinguishers, we analyze in this paper some of the round function, we show that we can not only find impossible, integral and multidimensional zero

  5. A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia

    E-Print Network [OSTI]

    Bullo, Francesco

    and biomedicine, telecommu- nications, and energy management. Due to their importance, cyber-physical systems, and monitoring systems. For instance, in [1, 5, 6, 7, 8] it is shown how attackers with access to sufficiently limited resources and full knowledge of the system dynamics and state. Conversely, if the monitoring re

  6. Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid Deepa Kundur analysis of a smart grid. We focus on the model synthesis stage in which both cyber and physical grid-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems. I

  7. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  8. Passive faraday mirror attack in practical two-way quantum key distribution system

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2012-03-04

    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

  9. Securing Cloud Data in the New Attacker Model Ghassan O. Karame1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Securing Cloud Data in the New Attacker Model Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof to the ciphertext. This may be achieved, for example, using multi-cloud storage systems. These systems spread data tolerance. If the adversary can only compromise a subset of these domains, multi-cloud storage systems may

  10. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  11. Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    with great opportunities for raising the target facility energy consumption and consequently its green house green, energy- sustainable computing paradigms has gained a lot of attention in both the researchEvaluating Network-Based DoS Attacks Under the Energy Consumption Perspective New security issues

  12. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    False Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu, Peng Ning@cs.unc.edu Abstract--A power grid is a complex system connecting electric power generators to consumers through power to ensure the reliable operation of power grids, and state estimation is used in system monitoring to best

  13. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  14. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  15. Towards Synthesis of Platform-aware Attack-Resilient Control Systems

    E-Print Network [OSTI]

    Pappas, George J.

    Towards Synthesis of Platform-aware Attack-Resilient Control Systems Extended Abstract Miroslav Over the past decade, the design process in the automotive indus- try has gone through a period, there is a current shift in vehicle architectures, from isolated control systems to more open automotive

  16. Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design

    E-Print Network [OSTI]

    Bhunia, Swarup

    Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design Xinmu Wang1 , Wen Yueh on the operating frequency due to RLC structure of a power grid. In this paper, we analyze the ef- fect of power grid on SCA and provide quantitative results to demonstrate the frequency-dependent SCA resistance due

  17. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in the confidentiality and integrity algorithms of the 3GPP (3rd Generation Partnership Project) mobile communications and integrity algo- rithms of the 3GPP (3rd Generation Partnership Project) [20] mobile communi- cations practical, and the authors could simulate the efficiency of their attack using a personal computer. Both

  18. Revisiting the BGE Attack on a White-Box AES Implementation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . White-box cryptography aims to protect the secret key of a cipher in an environment in which-box implementation of AES [5]. White-box cryptography aims to protect the confidentiality of the secret key device, or a set-top box. #12;In 2004, Billet et al. [3] presented an attack on the white-box AES

  19. Reaction Attacks on Public Key Cryptosystems Based on the Word Problem

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Mar#19;#16;a Isabel Gonz#19 for public key cryptosystems based on the hardness of the word problem for #12;nitely presented groups. In particular, the evidenced hardness of the classical problems for #12;nitely presented groups (the word

  20. A known plaintext attack on the ISAAC keystream generator Marina Pudovkina

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 A known plaintext attack on the ISAAC keystream generator Marina Pudovkina maripa are a requirement. The ISAAC keystream generator is a fast software-oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known

  1. A known plaintext attack on the ISAAC keystream generator Marina Pudovkina

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 A known plaintext attack on the ISAAC keystream generator Marina Pudovkina maripa are a requirement. The ISAAC keystream generator is a fast software­oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known

  2. A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    E-Print Network [OSTI]

    Levente, Buttyán

    can be used to ensure availability. Replication in it- self, however, is not enough against malicious server can be distinguished: bandwidth consumption at- tacks and resource consumption attacks overloaded and cannot accept requests from legitimate clients anymore. In a resource consumption at- tack

  3. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA

  4. "How many zombies do you know?" Using indirect survey methods to measure alien attacks and outbreaks

    E-Print Network [OSTI]

    Gelman, Andrew

    "How many zombies do you know?" Using indirect survey methods to measure alien attacks applicable to zombies or, for that matter, ghosts, aliens, angels, and other hard-to-reach entities; for example, what if your wife2 is actually a zombie or an alien and you are not aware of the fact. This 2

  5. Security Games with Surveillance Cost and Optimal Timing of Attack Execution

    E-Print Network [OSTI]

    Vorobeychik, Eugene

    of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Appears inSecurity Games with Surveillance Cost and Optimal Timing of Attack Execution Bo An1 , Matthew Brown Terms Algorithm, Security Keywords Game Theory, Security, Optimization, Stackelberg Games 1

  6. Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki1,2 1 Institute of Computer Science Abstract. The PRINCE cipher is the result of a cooperation between the Technical University of Denmark (DTU-latency encryption and instant response time. PRINCE has already gained a lot of attention from the academic

  7. Combating False Data Injection Attacks in Smart Grid Using Kalman Filter

    E-Print Network [OSTI]

    Cao, Xiaojun (Matt)

    Combating False Data Injection Attacks in Smart Grid Using Kalman Filter Kebina Manandhar Dept of South Florida Email: yliu@cse.usf.edu Abstract--The security of Smart Grid, being one of the very important aspects of the Smart Grid system, is studied in this paper. We first discuss different pitfalls

  8. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

    E-Print Network [OSTI]

    Shihan Sajeed; Igor Radchenko; Sarah Kaiser; Jean-Philippe Bourgoin; Anna Pappa; Laurent Monat; Matthieu Legre; Vadim Makarov

    2015-03-30

    The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD, we model both a strong attack using technology possible in principle, and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems, and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.

  9. On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in which the round keys are introduced by addition, to thwart single-bit or multi-bit DPA attacks- tion about twice slower). We prove lower bounds on the transparency order of highly nonlinear S

  10. Sequential Bayesian Detection: A Model-Based Approach

    SciTech Connect (OSTI)

    Candy, J V

    2008-12-08

    Sequential detection theory has been known for a long time evolving in the late 1940's by Wald and followed by Middleton's classic exposition in the 1960's coupled with the concurrent enabling technology of digital computer systems and the development of sequential processors. Its development, when coupled to modern sequential model-based processors, offers a reasonable way to attack physics-based problems. In this chapter, the fundamentals of the sequential detection are reviewed from the Neyman-Pearson theoretical perspective and formulated for both linear and nonlinear (approximate) Gauss-Markov, state-space representations. We review the development of modern sequential detectors and incorporate the sequential model-based processors as an integral part of their solution. Motivated by a wealth of physics-based detection problems, we show how both linear and nonlinear processors can seamlessly be embedded into the sequential detection framework to provide a powerful approach to solving non-stationary detection problems.

  11. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

  12. Fingerprint detection

    DOE Patents [OSTI]

    Saunders, George C. (Rt. 1, Box 428B, Espanola, NM 87532)

    1992-01-01

    A method for detection and visualization of latent fingerprints is provided and includes contacting a substrate containing a latent print thereon with a colloidal metal composition for time sufficient to allow reaction of said colloidal metal composition with said latent print, and preserving or recording the observable print. Further, the method for detection and visualization of latent fingerprints can include contacting the metal composition-latent print reaction product with a secondary metal-containing solution for time sufficient to allow precipitation of said secondary metal thereby enhancing the visibility of the latent print, and preserving or recording the observable print.

  13. Detection device

    DOE Patents [OSTI]

    Smith, Jay E. (Pittsburgh, PA)

    1984-01-01

    The present invention is directed to a detection device comprising: (1) an entrance chamber, (2) a central chamber, and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  14. Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee

    E-Print Network [OSTI]

    Snoeren, Alex

    Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan against three popular Web services, we high- light a new class of vulnerability that allows an attacker a pollution attack, that allows third parties to alter the customized content the services return to users who

  15. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  16. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-06-05

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization of reflectivity and transmission of the optical components most relevant to security.

  17. Comparing three models of attack and failure tolerance in electric power networks

    E-Print Network [OSTI]

    Hines, P; Blumsack, S

    2010-01-01

    In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in power systems, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss and blackout sizes. The first two are purely topological measures, following the procedure described by Albert et al. (2004). The blackout size calculation results from a simplified model of cascading failure in power networks. Tests with randomly selected sections of the Eastern US power grid indicate that in topological dynamics power grids are similar to random graphs, which is to be expected given the observed exponential degree distribution. However the connectivity loss model and the cascading failure model indicate that power grids behave more like scale free networks, in that they are acutely more vulnerable to directed attacks than random failures. These results suggest caution in drawing conclusi...

  18. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-08-03

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security.

  19. Biology and control of thrips attacking cotton in the vicinity of College Station, Texas 

    E-Print Network [OSTI]

    Pfrimmer, Theodore Roscoe

    1953-01-01

    Advisor) May 1953 BIOLOGY AND CONTROL OF THRIE3 ATTACKING COTTON IK THE VICINITY OF COLIEGE STATION, TEXAS By THEODORE ROSCCE P iE M fR t \\ \\ A Dissertation Submitted, to the Graduate School of the Agricultural and Mechanical College of Texas... cages during 1950 . . . . . . . . . 69 3. Comparison of the dosage-mortality curves for the toxicities of several compounds, applied as dusts, against Frankliniella tritici and F. exigua in large cages during 1950 ............................ 70 4...

  20. Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    bogus messages, which will incur extra costs, thus exhaust the energy of the honest nodes. In additionS attacks, in which the goal of the adversary is to exhaust the energy of the sensor nodes and to increase or to redistribute to lists, requires prior specific permission and/or a fee. MobiHoc'07, September 9­14, 2007, Montr´eal

  1. Comparative toxicity studies of sulphur acaricides on two species of spider mites attacking cotton 

    E-Print Network [OSTI]

    Hallmark, Kenzy Donovan

    1954-01-01

    CONPARATIVE TOXICITY STUDIES OF SULFUH ACAHICIDES ON TWO SPECIE OF SPIDEH NITES ATTACKING COTTON KENZY DONOVAN HALLI&AHK A Thesis Submitted to the Graduate School oi' the Agricultural and 14echanlcal College of Texas in partial fulfillment... Ovotran- 13 Procedure Culturing technique- Dusting apparatus 1B 18 19 Spraying appsratus- Treatment procedure ?- Determination ef results ? - ? --- ? ? ? -?- hesults Conclusions- Literature Cited- 47 50 1 Results of laboratortJ' toxicity...

  2. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ã?Â?Ã?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  3. Model-based Thermal Anomaly Detection in Cloud Datacenters Eun Kyung Lee, Hariharasudhan Viswanathan, and Dario Pompili

    E-Print Network [OSTI]

    Pompili, Dario

    Model-based Thermal Anomaly Detection in Cloud Datacenters Eun Kyung Lee, Hariharasudhan datacenters make them prone to strategic attacks, misconfigurations, and failures (cooling as well) and observed thermal maps (obtained using thermal cameras) of datacenters is proposed. In addition, a Thermal

  4. Detection Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent BondingMeeting |Design CompetitionsFuelof 12Detecting

  5. Spectroscopic detection

    DOE Patents [OSTI]

    Woskov, Paul P. (Bedford, MA); Hadidi, Kamal (Cambridge, MA)

    2003-01-01

    In embodiments, spectroscopic monitor monitors modulated light signals to detect low levels of contaminants and other compounds in the presence of background interference. The monitor uses a spectrometer that includes a transmissive modulator capable of causing different frequency ranges to move onto and off of the detector. The different ranges can include those with the desired signal and those selected to subtract background contributions from those with the desired signal. Embodiments of the system are particularly useful for monitoring metal concentrations in combustion effluent.

  6. The ignition hazard to urban interiors during nuclear attack due to burning curtain fragments transported by blast 

    E-Print Network [OSTI]

    Goodale, Thomas

    There exists some uncertainty at present, in the formulation of civil defense doctrine, as to whether it is advisable for window curtains to be closed or open during nuclear attack. Closed curtains would be in position to ...

  7. Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro and Evangelos Kranakis

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks Gimer Cervera, Michel (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes affect the topol- ogy map acquisition process by interrupting the flooding of control information

  8. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 645 Malicious Data Attacks on the Smart Grid

    E-Print Network [OSTI]

    Tong, Lang

    -time electricity markets. Also considered in this paper are countermeasures to mali- cious data attack widely reported that the U.S. electrical grid has been penetrated by cyber spies [1]. We consider

  9. Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't

    E-Print Network [OSTI]

    Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

    2008-01-01

    This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

  10. Attacking the Asokan-Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL 

    E-Print Network [OSTI]

    Steel, G.; Maidl, M.; Bundy, Alan

    We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols ...

  11. Comparison of the CPU and memory performance of StatPatternRecognition (SPR) and Toolkit for MultiVariate Analysis (TMVA)

    E-Print Network [OSTI]

    Palombo, Giulio

    2011-01-01

    High Energy Physics data sets are often characterized by a huge number of events. Therefore, it is extremely important to use statistical packages able to efficiently analyze these unprecedented amounts of data. We compare the performance of the statistical packages StatPatternRecognition (SPR) and Toolkit for MultiVariate Analysis (TMVA). We focus on how CPU time and memory usage of the learning process scale versus data set size. As classifiers, we consider Random Forests, Boosted Decision Trees and Neural Networks. For our tests, we employ a data set widely used in the machine learning community, "Threenorm" data set, as well as data tailored for testing various edge cases. For each data set, we constantly increase its size and check CPU time and memory needed to build the classifiers implemented in SPR and TMVA. We show that SPR is often significantly faster and consumes significantly less memory. For example, the SPR implementation of Random Forest is by an order of magnitude faster and consumes an order...

  12. Comparison of the CPU and memory performance of StatPatternRecognition (SPR) and Toolkit for MultiVariate Analysis (TMVA)

    E-Print Network [OSTI]

    Giulio Palombo

    2011-03-28

    High Energy Physics data sets are often characterized by a huge number of events. Therefore, it is extremely important to use statistical packages able to efficiently analyze these unprecedented amounts of data. We compare the performance of the statistical packages StatPatternRecognition (SPR) and Toolkit for MultiVariate Analysis (TMVA). We focus on how CPU time and memory usage of the learning process scale versus data set size. As classifiers, we consider Random Forests, Boosted Decision Trees and Neural Networks. For our tests, we employ a data set widely used in the machine learning community, "Threenorm" data set, as well as data tailored for testing various edge cases. For each data set, we constantly increase its size and check CPU time and memory needed to build the classifiers implemented in SPR and TMVA. We show that SPR is often significantly faster and consumes significantly less memory. For example, the SPR implementation of Random Forest is by an order of magnitude faster and consumes an order of magnitude less memory than TMVA on Threenorm data.

  13. Smoke detection

    SciTech Connect (OSTI)

    Warmack, Robert J. Bruce; Wolf, Dennis A.; Frank, Steven Shane

    2015-10-27

    Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.

  14. Smoke detection

    SciTech Connect (OSTI)

    Warmack, Robert J Bruce; Wolf, Dennis A.; Frank, Steven Shane

    2015-11-05

    Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.

  15. Radon detection

    DOE Patents [OSTI]

    MacArthur, D.W.; Allander, K.S.; Bounds, J.A.

    1994-01-25

    A detector for atmospheric radon using a long range alpha detector as its sensing element is described. An electrostatic filter removes ions from ambient air, while allowing radon atoms to pass into a decay cavity. Here, radon atoms are allowed to decay, creating air ions. These air ions are drawn by a fan through a second electrostatic filter which can be activated or deactivated, and into the long range alpha detector. With the second electrostatic filter activated, no air ions are allowed to pass, and the signal output from the long range alpha detector consists of only the electronic background. With the second electrostatic filter deactivated, air ions and cosmic rays will be detected. The cosmic ray contribution can be minimized by shielding. 3 figures.

  16. Radon detection

    DOE Patents [OSTI]

    MacArthur, Duncan W. (Los Alamos, NM); Allander, Krag S. (Ojo Caliente, NM); Bounds, John A. (Los Alamos, NM)

    1994-01-01

    A detector for atmospheric radon using a long range alpha detector as its sensing element. An electrostatic filter removes ions from ambient air, while allowing radon atoms to pass into a decay cavity. Here, radon atoms are allowed to decay, creating air ions. These air ions are drawn by a fan through a second electrostatic filter which can be activated or deactivated, and into the long range alpha detector. With the second electrostatic filter activated, no air ions are allowed to pass, and the signal output from the long range alpha detector consists of only the electronic background. With the second electrostatic filter deactivated, air ions and cosmic rays will be detected. The cosmic ray contribution can be minimized by shielding.

  17. A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan; Mashayekh, Salman; Kundur, Deepa; Zourntos, Takis; Butler-Purry, Karen

    2014-01-02

    - gency response,’’ in Proc. Summer Comput. Simul. Conf., Jul. 2007, pp. 1230–1237. [3] B. Rozel, M. Viziteu, R. Caire, N. Hadjsaid, and J.-P. Rognon, ‘‘Towards a common model for studying critical infrastructure interdependencies,’’ in Proc. IEEE Power.... IEEE Power Syst. Conf. Exposit., Mar. 2009, pp. 1–6. [5] J. Stamp, A. McIntyre, and B. Ricardson, ‘‘Reliability impacts from cyber attack on electric power systems,’’ in Proc. IEEE Power Syst. Conf. Exposit., Mar. 2009, pp. 1–8. [6] S. Sheng, W. L. Chan...

  18. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    SciTech Connect (OSTI)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  19. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    SciTech Connect (OSTI)

    Chen, Yan [Northwesten University] [Northwesten University

    2013-12-05

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

  20. Initiative for Explosives Detection

    E-Print Network [OSTI]

    of electromagnetic radiation, or to detect with currently fielded technologies. Approaches to improving detectionInitiative for Explosives Detection Highly Concealed Bulk Explosives Detection This focus area emphasizes the detection of explosives or IEDs hidden in vehicles, buildings or various types of containers

  1. Design of a high angle of attack robotic sting mount for tests in a low speed wind tunnel 

    E-Print Network [OSTI]

    Kubler, Tommy Jack

    1989-01-01

    DESIGN OF A HIGH ANGLE OF ATTACK ROBOTIC STING MOUNT FOR TESTS IN A LOW SPEED WIND TUNNEL A Thesis by TOMMY JACK KUBLER Submitted to the Oflice of Graduate Studies of Texas AJcM University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE August 1989 Major Subject: Aerospace Engineering DESIGN OF A HIGH ANGLE OF ATTACK ROBOTIC STING MOUNT FOR TESTS IN A IOW SPEED WIND TUNNEL A Thesis bv TOMMY JACK KHBLER Approved as to style and content by: Thomas C...

  2. SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    deployed in contexts where #12;side-channel attacks are a threat. For example, smart-phones now house multi constraints such as energy efficiency, market forces will drive increased use of similar components over time. The challenges of evaluation and countermeasure in- strumentation already motivate such work, but are arguably

  3. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems

    E-Print Network [OSTI]

    Sekar, R.

    such as those due to worms, these protection mechanisms lead to re- peated restarts of the victim application- ploit the same vulnerability. An important benefit of self-healing is that it avoids system resources]. Although these techniques can de- tect attacks before vital system resources (such as files

  4. Defending Against Attacks on Main Memory Persistence William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel, and Adam Smith

    E-Print Network [OSTI]

    Lowd, Daniel

    Defending Against Attacks on Main Memory Persistence William Enck, Kevin Butler, Thomas Richardson,butler,trichard,mcdaniel,asmith}@cse.psu.edu Abstract Main memory contains transient information for all res- ident applications. However, if memory and keys can be extracted. Main memory persistence will soon be the norm as recent ad- vancements in MRAM

  5. A Formal Model for Verifying the Impact of Stealthy Attacks on Optimal Power Flow in Power Grids

    E-Print Network [OSTI]

    Wang, Yongge

    - mal Power Flow; Formal Model 1. INTRODUCTION Power system control centers employ a numberA Formal Model for Verifying the Impact of Stealthy Attacks on Optimal Power Flow in Power Grids the integrity of OPF and undermine the economic and secure system operation. We present a formal verification

  6. IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading

    E-Print Network [OSTI]

    Kundur, Deepa

    components using variable structure system theory. Here, an opponent is able to remotely control multiple, sliding mode theory, smart grid attacks, variable structure system modeling. I. INTRODUCTION I T IS WELL commerce, entertainment, and social interac- tions has led to improved functionality and efficiency

  7. Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 Fangguo Zhang of Wollongong, NSW 2522 Australia {fangguo, rei, wsusilo}@uow.edu.au Abstract. At the fourth ACM conference for construction of ID-based cryptographic schemes. At the fourth ACM conference on electronic commerce (EC'03), S

  8. Proc. 10th ACM Conf. on Principles of Distributed Systems, August 1991 1 How To Withstand Mobile Virus Attacks

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Virus Attacks Extended Abstract Rafail Ostrovsky Moti Yungy Abstract We initiate a study of distributed, analogous to a spread of a virus or a worm. We show how local computations (at each processor) and global in the computation. 1 Introduction Computer viruses pose one of the central problems in distributed computing today

  9. Proc. 10th ACM Conf. on Principles of Distributed Systems, August 1991 1 How To Withstand Mobile Virus Attacks

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Virus Attacks Extended Abstract Rafail Ostrovsky \\Lambda Moti Yung y Abstract We initiate a study the network, analogous to a spread of a virus or a worm. We show how local computations (at each processor redundancy in the computation. 1 Introduction Computer viruses pose one of the central problems

  10. Eclipse Attacks on Bitcoin's Peer-to-Peer Network Ethan Heilman Alison Kendler Aviv Zohar Sharon Goldberg

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , selfish mining, and adversarial forks in the blockchain. We take a detailed look at bitcoin's peer- to-of-work to reach consensus on a distributed public ledger of transactions, aka., the blockchain. Satoshi Nakamoto [52] argues that bitcoin is secure against attackers that seek to shift the blockchain

  11. 372 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 Sybil Attacks and Their Defenses

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    372 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 Sybil Attacks and Their Defenses in the Internet of Things Kuan Zhang, Student Member, IEEE, Xiaohui Liang, Member, IEEE, Rongxing Lu, Member, IEEE, and Xuemin Shen, Fellow, IEEE Abstract--The emerging Internet-of-Things (IoT) are vulnera- ble to Sybil

  12. Portable modular detection system

    DOE Patents [OSTI]

    Brennan, James S. (Rodeo, CA); Singh, Anup (Danville, CA); Throckmorton, Daniel J. (Tracy, CA); Stamps, James F. (Livermore, CA)

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  13. Advancing Explosives Detection Capabilities: Vapor Detection

    SciTech Connect (OSTI)

    Atkinson, David

    2012-10-15

    A new, PNNL-developed method provides direct, real-time detection of trace amounts of explosives such as RDX, PETN and C-4. The method selectively ionizes a sample before passing the sample through a mass spectrometer to detect explosive vapors. The method could be used at airports to improve aviation security.

  14. Advancing Explosives Detection Capabilities: Vapor Detection

    ScienceCinema (OSTI)

    Atkinson, David

    2014-07-24

    A new, PNNL-developed method provides direct, real-time detection of trace amounts of explosives such as RDX, PETN and C-4. The method selectively ionizes a sample before passing the sample through a mass spectrometer to detect explosive vapors. The method could be used at airports to improve aviation security.

  15. Bridge Detection By Road Detection Jeff Kaufman

    E-Print Network [OSTI]

    Danner, Andrew

    Bridge Detection By Road Detection Jeff Kaufman cbr@sccs.swarthmore.edu 1 Introduction It is useful, with local min- ima: cells from which there is no direction of descent. A common cause of this is bridges. The area over which a bridge passes shows up in the digital elevation as being of a height greater than

  16. BioenergizeME Virtual Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of biomass; history of bioenergy 6.2 WORKFORCE AND EDUCATION The major resources used for energy production have changed over time depending on ecosystem diversity, abundance,...

  17. Texas Education Agency Graduation Toolkit

    E-Print Network [OSTI]

    Rock, Chris

    Physics & Chemistry or an advanced science course · An advanced science course Social Studies (3 credits.twc.state.tx.us Technical College Credential BR14-130-02 Choices determine options Most of the very best jobs available now

  18. Carleton University Visual Identity Toolkit

    E-Print Network [OSTI]

    Dawson, Jeff W.

    THE LOGO/IDENTITY TREATMENT IN DETAIL FACULTIES, SCHOOLS AND ANCILLARY UNITS FACULTY, SCHOOL AND ANCILLARY UNIT IDENTITIES IN DETAIL NON-ACADEMIC ANCILLARY UNIT IDENTITIES A NOTE ON THE VISUAL IDENTITIES of Carleton's faculties, schools and ancillary units, as well as communications materials such as brochures

  19. Online Toolkit Fosters Bioenergy Innovation

    Broader source: Energy.gov [DOE]

    The construction of this facility that will nearly triple the amount of renewable diesel produced domestically.

  20. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable UrbanKentucky: EnergyGateway1997)Information(EC-LEDS) | Open

  1. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlexStock|GenesaGeographic

  2. REEEP Toolkits | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS Report UrlNM-b < RAPID‎ | RoadmapAK-abFD-aRAcellSocial andREEEP

  3. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View New Pages Recent Changes All Special Pages SemanticLoading map...

  4. Bioenergy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin:Pontiac Biomass Facility Jump to: navigation, searchBioenergy

  5. BioenergizeME Virtual Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL: SOCIAL139

  6. Revolution in Detection Affairs

    SciTech Connect (OSTI)

    Stern W.

    2013-11-02

    The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms.

  7. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other two. The fate of tritium in the attack depended on its chemistry. Any tritium present in the vicinity of jet-fuel explosion or fire would convert to HTO. The molecular tritium is also known to quickly exchange with water adsorbed on surfaces at ambient temperatures. Therefore, the end product of reacted tritium was HTO. A part of it would disperse into the atmosphere and a part would remain on site. The dynamic aspect of HTO removal was investigated taking into a consideration water flow at ground zero. Most of ground zero is encircled by the Slurry Wall, 70 ft deep underground, called a Bathtub. Approximately three million gallons of water were hosed on site in the fire-fighting efforts, and 1 million gallons fell as rainwater, between 9/11 and 9/21 (the day of the reported measurement). The combined water percolated through the debris down to the bottom of the Bathtub dissolving and removing HTO with it. That water would meet and combine with the estimated 26 million gallons of water that leaked from the Hudson River as well as broken mains, during the same period of 10 days after the attack. The combined water was collecting in the PATH train tunnel and continuously being pumped out to prevent flooding. A %Box model of water flow was developed to describe the above scenario. Considering the uncertainty in the amount of tritium present from sources other than the aircraft, as well as the dynamic character of tritium removal from the site, it is feasible to provide only a qualitative picture of the fate and behavior of tritium at WTC with the limited experimental data available. If the time history of tritium concentration at WTC had been measured, this study could have been a tracer study of water flow at WTC possibly useful to civil engineering.

  8. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  9. Interior intrusion detection systems

    SciTech Connect (OSTI)

    Rodriguez, J.R.; Matter, J.C. ); Dry, B. )

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  10. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  11. Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter Chun-Ying Huang, Kuan-Ta Chen, and Chin-Laung Lei

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    -Ta Chen, and Chin-Laung Lei National Taiwan University Department of Electrical Engineering No.1, Sec. 4 attack is behavior that deliberately scans, probes, or intrudes on certain hosts or networks with mali

  12. PROTECT YOURSELF AGAINST PHISHING ATTACKS Phishing is a cunning attempt by hackers to solicit, steal and mishandle users' personal information (e.g.

    E-Print Network [OSTI]

    Johnson Jr.,, Ray

    PROTECT YOURSELF AGAINST PHISHING ATTACKS Phishing is a cunning attempt by hackers to solicit willingly supply the requested data, hackers gain access to their accounts and then engage in malicious

  13. New J. Phys. 17 (2015) 023049 doi:10.1088/1367-2630/17/2/023049 Percolation of localized attack on complex networks

    E-Print Network [OSTI]

    Stanley, H. Eugene

    2015-01-01

    for Polymer Studies and Department of Physics, Boston University, Boston, MA 02215, USA 2 Department the effects of earthquakes, floods, or military attacks on infrastructure networks and the effects

  14. PROJECTED IMPACT OF SULFATE ATTACK ON THE LONG-TERM PERFORMANCE OF A CONCRETE REPOSITORY

    SciTech Connect (OSTI)

    Flach, G.

    2009-12-11

    Saltstone is a cementitious waste form made by mixing salt solution originating from liquid waste storage tanks at the DOE Savannah River Site with a dry mix containing blast furnace slag, fly ash, and cement or lime. The wet mix is poured into a concrete repository for on-site disposal. Solidified Saltstone is a dense, alkaline, reducing, micro-porous, monolithic, cementitious matrix, containing a solution of salts within its pore structure. Sodium sulfate concentrations in the pore fluid are around 0.15 mol/L, and external sulfate attack on concrete barriers is expected to occur over time. To predict the long-term performance of concrete repositories, the STADIUM{reg_sign} code was used to simulate the reactive transport processes leading to formation of ettringite, an expansive mineral phase often associated with spalling or cracking. STADIUM{reg_sign} is a multi-ionic transport model based on a split operator approach that separates ionic movement and chemical reactions. Ionic transport is described by the extended Nernst-Planck equation for unsaturated media, and accounts for electrical coupling between ionic species, chemical activity, transport due to water content gradient, and temperature effects. STADIUM{reg_sign} does not predict whether physical damage will occur, or the impact on transport properties should fracturing occur. Thus the presence of ettringite was assumed to coincide with physical damage for the purpose of estimating effective transport properties. Effective properties for concrete barriers were estimated assuming complete hydraulic failure behind the ettringite front and unaltered properties ahead of the front. The ettringite front advances at a rate dependent on the diffusion coefficient assumed for the failed zone. A sensitivity study indicates a service life ranging from thousands to tens of thousands of years, depending on the barrier thickness and sulfate exposure conditions among other factors.

  15. DETECTION OF PROPENE IN TITAN'S STRATOSPHERE

    SciTech Connect (OSTI)

    Nixon, C. A.; Flasar, F. M.; Jennings, D. E.; Bézard, B.; Vinatier, S.; Coustenis, A.; Teanby, N. A.; Sung, K.; Ansty, T. M.; Irwin, P. G. J.; Gorius, N.; Cottini, V.

    2013-10-10

    The Voyager 1 flyby of Titan in 1980 gave a first glimpse of the chemical complexity of Titan's atmosphere, detecting many new molecules with the infrared interferometer spectrometer (IRIS). These included propane (C{sub 3}H{sub 8}) and propyne (CH{sub 3}C{sub 2}H), while the intermediate-sized C{sub 3}H {sub x} hydrocarbon (C{sub 3}H{sub 6}) was curiously absent. Using spectra from the Composite Infrared Spectrometer on Cassini, we show the first positive detection of propene (C{sub 3}H{sub 6}) in Titan's stratosphere (5? significance), finally filling the three-decade gap in the chemical sequence. We retrieve a vertical abundance profile from 100-250 km, that varies slowly with altitude from 2.0 ± 0.8 ppbv at 125 km, to 4.6 ± 1.5 ppbv at 200 km. The abundance of C{sub 3}H{sub 6} is less than both C{sub 3}H{sub 8} and CH{sub 3}C{sub 2}H, and we remark on an emerging paradigm in Titan's hydrocarbon abundances whereby alkanes > alkynes > alkenes within the C{sub 2}H {sub x} and C{sub 3}H {sub x} chemical families in the lower stratosphere. More generally, there appears to be much greater ubiquity and relative abundance of triple-bonded species than double-bonded, likely due to the greater resistance of triple bonds to photolysis and chemical attack.

  16. On the Duality of Probing and Fault Attacks Berndt M. Gammel and Stefan Mangard

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic on privacy and integrity protection using error detecting codes. Finally, we introduce a new class of linear are electronic ID cards, smart cards for payment purposes, mobile phones, network devices, and personal computers

  17. Fast Neutron Detection Evaluation

    SciTech Connect (OSTI)

    McKigney, Edward A.; Stange, Sy

    2014-03-17

    These slides present a summary of previous work, conclusions, and anticipated schedule for the conclusion of our fast neutron detection evaluation.

  18. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasil’nikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors – from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelial–mesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK – the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the level of AMPK phosphorylation may be considered as predictors of the tumor sensitivity to anti-angiogenic drugs. - Highlights: • Snail1 protects breast cancer cells from hypoxia. • Protective effect of Snail1 is mediated via ?-catenin/HIF-1 pathway. • Snail/?-catenin signaling is negatively controlled by the energy sensor – AMPK. • The failure in AMPK phosphorylation drives cells to the hypoxia-tolerant state.

  19. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect (OSTI)

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  20. Lean blowoff detection sensor

    DOE Patents [OSTI]

    Thornton, Jimmy (Morgantown, WV); Straub, Douglas L. (Morgantown, WV); Chorpening, Benjamin T. (Morgantown, WV); Huckaby, David (Morgantown, WV)

    2007-04-03

    Apparatus and method for detecting incipient lean blowoff conditions in a lean premixed combustion nozzle of a gas turbine. A sensor near the flame detects the concentration of hydrocarbon ions and/or electrons produced by combustion and the concentration monitored as a function of time are used to indicate incipient lean blowoff conditions.

  1. Array for detecting microbes

    DOE Patents [OSTI]

    Andersen, Gary L.; DeSantis, Todd D.

    2014-07-08

    The present embodiments relate to an array system for detecting and identifying biomolecules and organisms. More specifically, the present embodiments relate to an array system comprising a microarray configured to simultaneously detect a plurality of organisms in a sample at a high confidence level.

  2. Composition for detecting uranyl

    DOE Patents [OSTI]

    Baylor, Lewis C. (North Augusta, SC); Stephens, Susan M. (Athens, GA)

    1995-01-01

    A composition for detecting the presence and concentration of a substance such as uranyl, comprising an organohalide covalently bonded to an indicator for said substance. The composition has at least one active OH site for forming a complex with the substance to be detected. The composition is made by reacting equimolar amounts of the indicator and the organohalide in a polar organic solvent. The absorbance spectrum of the composition-uranyl complex is shifted with respect to the absorbance spectrum of the indicator-uranyl complex, to provide better spectral resolution for detecting uranyl.

  3. Leak detection aid

    DOE Patents [OSTI]

    Steeper, T.J.

    1989-12-26

    A leak detection apparatus and method for detecting leaks across an O-ring sealing a flanged surface to a mating surface is an improvement in a flanged surface comprising a shallow groove following O-ring in communication with an entrance and exit port intersecting the shallow groove for injecting and withdrawing, respectively, a leak detection fluid, such as helium. A small quantity of helium injected into the entrance port will flow to the shallow groove, past the O-ring and to the exit port. 2 figs.

  4. Leak detection aid

    DOE Patents [OSTI]

    Steeper, Timothy J. (Graniteville, SC)

    1989-01-01

    A leak detection apparatus and method for detecting leaks across an O-ring sealing a flanged surface to a mating surface is an improvement in a flanged surface comprising a shallow groove following O-ring in communication with an entrance and exit port intersecting the shallow groove for injecting and withdrawing, respectively, a leak detection fluid, such as helium. A small quantity of helium injected into the entrance port will flow to the shallow groove, past the O-ring and to the exit port.

  5. Idaho Explosive Detection System

    ScienceCinema (OSTI)

    Klinger, Jeff

    2013-05-28

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  6. Explosive Detection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-26

    To standardize and accelerate implementation of the Department of Energy (DOE) explosive detection program. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01.

  7. Energy Detectives (3 Activities)

    K-12 Energy Lesson Plans and Activities Web site (EERE)

    Students explore the classroom as they look and feel for signs of energy. They record the ways they use energy throughout a typical day in an energy detective journal.

  8. Temperature differential detection device

    DOE Patents [OSTI]

    Girling, Peter M. (Allentown, PA)

    1986-01-01

    A temperature differential detection device for detecting the temperature differential between predetermined portions of a container wall is disclosed as comprising a Wheatstone bridge circuit for detecting resistance imbalance with a first circuit branch having a first elongated wire element mounted in thermal contact with a predetermined portion of the container wall, a second circuit branch having a second elongated wire element mounted in thermal contact with a second predetermined portion of a container wall with the wire elements having a predetermined temperature-resistant coefficient, an indicator interconnected between the first and second branches remote from the container wall for detecting and indicating resistance imbalance between the first and second wire elements, and connector leads for electrically connecting the wire elements to the remote indicator in order to maintain the respective resistance value relationship between the first and second wire elements. The indicator is calibrated to indicate the detected resistance imbalance in terms of a temperature differential between the first and second wall portions.

  9. Nucleic acid detection kits

    DOE Patents [OSTI]

    Hall, Jeff G.; Lyamichev, Victor I.; Mast, Andrea L.; Brow, Mary Ann; Kwiatkowski, Robert W.; Vavra, Stephanie H.

    2005-03-29

    The present invention relates to means for the detection and characterization of nucleic acid sequences, as well as variations in nucleic acid sequences. The present invention also relates to methods for forming a nucleic acid cleavage structure on a target sequence and cleaving the nucleic acid cleavage structure in a site-specific manner. The structure-specific nuclease activity of a variety of enzymes is used to cleave the target-dependent cleavage structure, thereby indicating the presence of specific nucleic acid sequences or specific variations thereof. The present invention further relates to methods and devices for the separation of nucleic acid molecules based on charge. The present invention also provides methods for the detection of non-target cleavage products via the formation of a complete and activated protein binding region. The invention further provides sensitive and specific methods for the detection of nucleic acid from various viruses in a sample.

  10. Solar system fault detection

    DOE Patents [OSTI]

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  11. Solar system fault detection

    DOE Patents [OSTI]

    Farrington, Robert B. (Wheatridge, CO); Pruett, Jr., James C. (Lakewood, CO)

    1986-01-01

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  12. Error detection method

    DOE Patents [OSTI]

    Olson, Eric J.

    2013-06-11

    An apparatus, program product, and method that run an algorithm on a hardware based processor, generate a hardware error as a result of running the algorithm, generate an algorithm output for the algorithm, compare the algorithm output to another output for the algorithm, and detect the hardware error from the comparison. The algorithm is designed to cause the hardware based processor to heat to a degree that increases the likelihood of hardware errors to manifest, and the hardware error is observable in the algorithm output. As such, electronic components may be sufficiently heated and/or sufficiently stressed to create better conditions for generating hardware errors, and the output of the algorithm may be compared at the end of the run to detect a hardware error that occurred anywhere during the run that may otherwise not be detected by traditional methodologies (e.g., due to cooling, insufficient heat and/or stress, etc.).

  13. Composition for detecting uranyl

    DOE Patents [OSTI]

    Baylor, L.C.; Stephens, S.M.

    1994-01-01

    The present invention relates to an indicator composition for use in spectrophotometric detection of a substance in a solution, and a method for making the composition. Useful indicators are sensitive to the particular substance being measured, but are unaffected by the fluid and other chemical species that may be present in the fluid. Optical indicators are used to measure the uranium concentration of process solutions in facilities for extracting uranium from ores, production of nuclear fuels, and reprocessing of irradiated fuels. The composition comprises an organohalide covalently bonded to an indicator for the substance, in such a manner that the product is itself an indicator that provides increased spectral resolution for detecting the substance. The indicator is preferably arsenazo III and the organohalide is preferably cyanuric chloride. These form a composition that is ideally suited for detecting uranyl.

  14. Relating to ion detection

    DOE Patents [OSTI]

    Orr, Christopher Henry (Calderbridge, GB); Luff, Craig Janson (Calderbridge, GB); Dockray, Thomas (Calderbridge, GB); Macarthur, Duncan Whittemore (Los Alamos, NM)

    2001-01-01

    The apparatus and method provide a technique for improving detection of alpha and/or beta emitting sources on items or in locations using indirect means. The emission forms generate ions in a medium surrounding the item or location and the medium is then moved to a detecting location where the ions are discharged to give a measure of the emission levels. To increase the level of ions generated and render the system particularly applicable for narrow pipes and other forms of conduits, the medium pressure is increased above atmospheric pressure. STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

  15. Detection of solar events

    DOE Patents [OSTI]

    Fischbach, Ephraim; Jenkins, Jere

    2013-08-27

    A flux detection apparatus can include a radioactive sample having a decay rate capable of changing in response to interaction with a first particle or a field, and a detector associated with the radioactive sample. The detector is responsive to a second particle or radiation formed by decay of the radioactive sample. The rate of decay of the radioactive sample can be correlated to flux of the first particle or the field. Detection of the first particle or the field can provide an early warning for an impending solar event.

  16. Detection of neutrinos

    DOE Patents [OSTI]

    Fischbach, Ephraim; Jenkins, Jere

    2014-02-04

    A flux detection apparatus can include a radioactive sample having a decay rate capable of changing in response to interaction with a first particle or a field, and a detector associated with the radioactive sample. The detector is responsive to a second particle or radiation formed by decay of the radioactive sample. The rate of decay of the radioactive sample can be correlated to flux of the first particle or the field. Detection of the first particle or the field can provide an early warning for an impending solar event.

  17. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect (OSTI)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  18. Protecting Free and Open Communications on the Internet Against Man-in-the-middle Attacks on Third-party Software: We're FOCI'd

    E-Print Network [OSTI]

    Crandall, Jedidiah R.

    -party Software: We're FOCI'd Jeffrey Knockel Dept. of Computer Science University of New Mexico jeffk@cs.unm.edu Jedidiah R. Crandall Dept. of Computer Science University of New Mexico crandall@cs.unm.edu Abstract corruption attacks. In the context of free and open communications on the Internet (FOCI), it is important

  19. Attacks and Security Proofs of EAX-Prime Kazuhiko Minematsu1, Stefan Lucks2, Hiraku Morita3, and Tetsu Iwata4

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ) specified by ANSI C12.22 as a standard security function for Smart Grid. EAX is based on EAX proposedAttacks and Security Proofs of EAX-Prime Kazuhiko Minematsu1, Stefan Lucks2, Hiraku Morita3 by Bellare, Rogaway, and Wagner. While EAX has a proof of security based on the pseudorandomness

  20. Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer (Agrilus planipennis Fairmaire) by Don Cipollini, a professor at Wright State University in Ohio

    E-Print Network [OSTI]

    Pittendrigh, Barry

    Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer been collected in areas where the abundance of dead ash trees suggest that local populations of EAB. To date, despite the loss of over 50 million ash trees in areas where lilac, privet and fringe trees

  1. Detection of counterfeit currency

    DOE Patents [OSTI]

    Burns, D.A.

    1998-05-26

    A method is disclosed of detecting counterfeit currency by contacting the currency to be tested with near infrared beams in the spectrum below 1,250 nanometers, measuring reflectance of the near infrared beams and comparing the reflectance values with those from genuine currency. 18 figs.

  2. Tampering detection system using quantum-mechanical systems

    DOE Patents [OSTI]

    Humble, Travis S. (Knoxville, TN); Bennink, Ryan S. (Knoxville, TN); Grice, Warren P. (Oak Ridge, TN)

    2011-12-13

    The use of quantum-mechanically entangled photons for monitoring the integrity of a physical border or a communication link is described. The no-cloning principle of quantum information science is used as protection against an intruder's ability to spoof a sensor receiver using a `classical` intercept-resend attack. Correlated measurement outcomes from polarization-entangled photons are used to protect against quantum intercept-resend attacks, i.e., attacks using quantum teleportation.

  3. ROBOTIC SYSTEMS for DEPLOYING SENSORS to DETECT CONTRABAND in CARGO

    E-Print Network [OSTI]

    Siegel, Mel

    we are building and evaluating for attacking the problem of inspecting passenger aircraft for pressurization­depressurization induced radial cracks around rivets and corrosion induced delamination of lap

  4. ROBOTIC SYSTEMS for DEPLOYING SENSORS to DETECT CONTRABAND in CARGO

    E-Print Network [OSTI]

    Siegel, Mel

    we are building and evaluating for attacking the problem of inspecting passenger aircraft for pressurization-depressurization induced radial cracks around rivets and corrosion induced delamination of lap

  5. Exoplanet Detection Techniques

    E-Print Network [OSTI]

    Fischer, Debra A; Laughlin, Greg P; Macintosh, Bruce; Mahadevan, Suvrath; Sahlmann, Johannes; Yee, Jennifer C

    2015-01-01

    We are still in the early days of exoplanet discovery. Astronomers are beginning to model the atmospheres and interiors of exoplanets and have developed a deeper understanding of processes of planet formation and evolution. However, we have yet to map out the full complexity of multi-planet architectures or to detect Earth analogues around nearby stars. Reaching these ambitious goals will require further improvements in instrumentation and new analysis tools. In this chapter, we provide an overview of five observational techniques that are currently employed in the detection of exoplanets: optical and IR Doppler measurements, transit photometry, direct imaging, microlensing, and astrometry. We provide a basic description of how each of these techniques works and discuss forefront developments that will result in new discoveries. We also highlight the observational limitations and synergies of each method and their connections to future space missions.

  6. Protein detection system

    DOE Patents [OSTI]

    Fruetel, Julie A. (Livermore, CA); Fiechtner, Gregory J. (Bethesda, MD); Kliner, Dahv A. V. (San Ramon, CA); McIlroy, Andrew (Livermore, CA)

    2009-05-05

    The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

  7. Chlorofluorocarbon leak detection technology

    SciTech Connect (OSTI)

    Munday, E.B.

    1990-12-01

    There are about 590 large coolant systems located at the Portsmouth Gaseous Diffusion Plant (PORTS) and the Paducah Gaseous Diffusion Plant (PGDP) leaking nearly 800,000 lb of R-114 refrigerant annually (1989 estimate). A program is now under way to reduce the leakage to 325,000 lb/year -- an average loss of 551 lb/year (0.063 lb/h) per coolant system, some of which are as large as 800 ft. This report investigates leak detection technologies that can be used to locate leaks in the coolant systems. Included are descriptions, minimum leak detection rate levels, advantages, disadvantages, and vendor information on the following technologies: bubbling solutions; colorimetric leak testing; dyes; halogen leak detectors (coronea discharge detectors; halide torch detectors, and heated anode detectors); laser imaging; mass spectroscopy; organic vapor analyzers; odorants; pressure decay methods; solid-state electrolytic-cell gas sensors; thermal conductivity leak detectors; and ultrasonic leak detectors.

  8. May Gravity detect Tsunami ?

    E-Print Network [OSTI]

    Fargion, D

    2004-01-01

    The present gravitational wave detectors are reaching lowest metric deviation fields able to detect galactic and extra-galactic gravitational waves, related to Supernova explosions up to Virgo cluster. The same gravitational wave detector are nevertheless almost able to reveal near field gravitational perturbations due to fast huge mass displacements as the ones occurring during largest Earth-Quake or Tsunami as the last on 26th December 2004 in Asiatic area. The prompt gravitational near field deformation by the Tsunami may reach the LIGO threshold sensitivity within 3000-10000 km distances. Their eventual discover (in LIGO data or in future on-line detector arrays) may offer the most rapid warning alarm system on earth. Nevertheless the later continental mass rearrangement and their gravitational field assessment on Earth must induce, for Richter Magnitude 9 Tsunami, a different terrestrial inertia momentum and a different rotation axis, as well as a detectable shrinking of the Earth radius of nearly R =1.7...

  9. Solar neutrino detection

    E-Print Network [OSTI]

    Lino Miramonti

    2009-01-22

    More than 40 years ago, neutrinos where conceived as a way to test the validity of the solar models which tell us that stars are powered by nuclear fusion reactions. The first measurement of the neutrino flux, in 1968 in the Homestake mine in South Dakota, detected only one third of the expected value, originating what has been known as the Solar Neutrino Problem. Different experiments were built in order to understand the origin of this discrepancy. Now we know that neutrinos undergo oscillation phenomenon changing their nature traveling from the core of the Sun to our detectors. In the work the 40 year long saga of the neutrino detection is presented; from the first proposals to test the solar models to last real time measurements of the low energy part of the neutrino spectrum.

  10. Cell Phone Detection Techniques

    SciTech Connect (OSTI)

    Pratt, Richard M.; Bunch, Kyle J.; Puzycki, David J.; Slaugh, Ryan W.; Good, Morris S.; McMakin, Douglas L.

    2007-10-01

    A team composed of Rick Pratt, Dave Puczyki, Kyle Bunch, Ryan Slaugh, Morris Good, and Doug McMakin teamed together to attempt to exploit cellular telephone features and detect if a person was carrying a cellular telephone into a Limited Area. The cell phone’s electromagnetic properties were measured, analyzed, and tested in over 10 different ways to determine if an exploitable signature exists. The method that appears to have the most potential for success without adding an external tag is to measure the RF spectrum, not in the cell phone band, but between 240 and 400MHz. Figures 1- 7 show the detected signal levels from cell phones from three different manufacturers.

  11. Termination Detection of Local Computations

    E-Print Network [OSTI]

    Godard, Emmanuel; Tel, Gerard

    2010-01-01

    Contrary to the sequential world, the processes involved in a distributed system do not necessarily know when a computation is globally finished. This paper investigates the problem of the detection of the termination of local computations. We define four types of termination detection: no detection, detection of the local termination, detection by a distributed observer, detection of the global termination. We give a complete characterisation (except in the local termination detection case where a partial one is given) for each of this termination detection and show that they define a strict hierarchy. These results emphasise the difference between computability of a distributed task and termination detection. Furthermore, these characterisations encompass all standard criteria that are usually formulated : topological restriction (tree, rings, or triangu- lated networks ...), topological knowledge (size, diameter ...), and local knowledge to distinguish nodes (identities, sense of direction). These re- sult...

  12. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  13. Method for detecting biomolecules

    DOE Patents [OSTI]

    Huo, Qisheng (Albuquerque, NM); Liu, Jun (Albuquerque, NM)

    2008-08-12

    A method for detecting and measuring the concentration of biomolecules in solution, utilizing a conducting electrode in contact with a solution containing target biomolecules, with a film with controllable pore size distribution characteristics applied to at least one surface of the conducting electrode. The film is functionalized with probe molecules that chemically interact with the target biomolecules at the film surface, blocking indicator molecules present in solution from diffusing from the solution to the electrode, thereby changing the electrochemical response of the electrode

  14. Fraud Detection in Healthcare

    SciTech Connect (OSTI)

    Chandola, Varun; Schryver, Jack C; Sukumar, Sreenivas R

    2015-01-01

    We discuss the problem of fraud detection in healthcare in this chapter. Given the recent scrutiny of the ineciencies in the US healthcare system, identifying fraud has been on the forefront of the eorts towards reducing the healthcare costs. In this chapter we will focus on understanding the issue of healthcare fraud in detail, and review methods that have been proposed in the literature to combat this issue using data driven approach.

  15. Nucleic acid detection methods

    DOE Patents [OSTI]

    Smith, C.L.; Yaar, R.; Szafranski, P.; Cantor, C.R.

    1998-05-19

    The invention relates to methods for rapidly determining the sequence and/or length a target sequence. The target sequence may be a series of known or unknown repeat sequences which are hybridized to an array of probes. The hybridized array is digested with a single-strand nuclease and free 3{prime}-hydroxyl groups extended with a nucleic acid polymerase. Nuclease cleaved heteroduplexes can be easily distinguish from nuclease uncleaved heteroduplexes by differential labeling. Probes and target can be differentially labeled with detectable labels. Matched target can be detected by cleaving resulting loops from the hybridized target and creating free 3-hydroxyl groups. These groups are recognized and extended by polymerases added into the reaction system which also adds or releases one label into solution. Analysis of the resulting products using either solid phase or solution. These methods can be used to detect characteristic nucleic acid sequences, to determine target sequence and to screen for genetic defects and disorders. Assays can be conducted on solid surfaces allowing for multiple reactions to be conducted in parallel and, if desired, automated. 18 figs.

  16. Nucleic Acid Detection Methods

    DOE Patents [OSTI]

    Smith, Cassandra L. (Boston, MA); Yaar, Ron (Brookline, MA); Szafranski, Przemyslaw (Boston, MA); Cantor, Charles R. (Boston, MA)

    1998-05-19

    The invention relates to methods for rapidly determining the sequence and/or length a target sequence. The target sequence may be a series of known or unknown repeat sequences which are hybridized to an array of probes. The hybridized array is digested with a single-strand nuclease and free 3'-hydroxyl groups extended with a nucleic acid polymerase. Nuclease cleaved heteroduplexes can be easily distinguish from nuclease uncleaved heteroduplexes by differential labeling. Probes and target can be differentially labeled with detectable labels. Matched target can be detected by cleaving resulting loops from the hybridized target and creating free 3-hydroxyl groups. These groups are recognized and extended by polymerases added into the reaction system which also adds or releases one label into solution. Analysis of the resulting products using either solid phase or solution. These methods can be used to detect characteristic nucleic acid sequences, to determine target sequence and to screen for genetic defects and disorders. Assays can be conducted on solid surfaces allowing for multiple reactions to be conducted in parallel and, if desired, automated.

  17. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    SciTech Connect (OSTI)

    Kingsley, Mark T

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysis of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, an d analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: (1) to assess the potential terrorist threat to U.S. agricultural crops, (2) to determine whether suitable assays exist to monitor that threat, and (3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.

  18. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    SciTech Connect (OSTI)

    Kingsley, Mark T.

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysis of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, and analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: 1) to assess the potential terrorist threat to U.S. agricultural crops, 2) to determine whether suitable assays exist to monitor that threat, and 3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.

  19. Remote detection of fissile material : Cherenkov counters for gamma detection

    E-Print Network [OSTI]

    Erickson, Anna S

    2011-01-01

    The need for large-size detectors for long-range active interrogation (Al) detection has generated interest in water-based detector technologies. AI is done using external radiation sources to induce fission and to detect, ...

  20. Revolution in nuclear detection affairs

    SciTech Connect (OSTI)

    Stern, Warren M.

    2014-05-09

    The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms.

  1. Nucleic acid detection assays

    DOE Patents [OSTI]

    Prudent, James R.; Hall, Jeff G.; Lyamichev, Victor I.; Brow, Mary Ann; Dahlberg, James E.

    2005-04-05

    The present invention relates to means for the detection and characterization of nucleic acid sequences, as well as variations in nucleic acid sequences. The present invention also relates to methods for forming a nucleic acid cleavage structure on a target sequence and cleaving the nucleic acid cleavage structure in a site-specific manner. The structure-specific nuclease activity of a variety of enzymes is used to cleave the target-dependent cleavage structure, thereby indicating the presence of specific nucleic acid sequences or specific variations thereof.

  2. Nucleic acid detection compositions

    DOE Patents [OSTI]

    Prudent, James R. (Madison, WI); Hall, Jeff G. (Madison, WI); Lyamichev, Victor I. (Madison, WI); Brow, Mary Ann (Madison, WI); Dahlberg, James L. (Madison, WI)

    2008-08-05

    The present invention relates to means for the detection and characterization of nucleic acid sequences, as well as variations in nucleic acid sequences. The present invention also relates to methods for forming a nucleic acid cleavage structure on a target sequence and cleaving the nucleic acid cleavage structure in a site-specific manner. The structure-specific nuclease activity of a variety of enzymes is used to cleave the target-dependent cleavage structure, thereby indicating the presence of specific nucleic acid sequences or specific variations thereof.

  3. Flaw detection and evaluation

    DOE Patents [OSTI]

    Wilks, Robert S. (Plum, PA); Sturges, Jr., Robert H. (Plum, PA)

    1983-01-01

    The invention provides a method of and apparatus for optically inspecting nuclear fuel pellets for surface flaws. The inspection system includes a prism and lens arrangement for scanning the surface of each pellet as the same is rotated. The resulting scan produces data indicative of the extent and shape of each flaw which is employed to generate a flaw quality index for each detected flaw. The flaw quality indexes from all flaws are summed and compared with an acceptable surface quality index. The result of the comparison is utilized to control the acceptance or rejection of the pellet.

  4. Opaque cloud detection

    DOE Patents [OSTI]

    Roskovensky, John K. (Albuquerque, NM)

    2009-01-20

    A method of detecting clouds in a digital image comprising, for an area of the digital image, determining a reflectance value in at least three discrete electromagnetic spectrum bands, computing a first ratio of one reflectance value minus another reflectance value and the same two values added together, computing a second ratio of one reflectance value and another reflectance value, choosing one of the reflectance values, and concluding that an opaque cloud exists in the area if the results of each of the two computing steps and the choosing step fall within three corresponding predetermined ranges.

  5. Design of proximity detecting codes 

    E-Print Network [OSTI]

    Perisetty, Srinivas

    1997-01-01

    class of codes called Proximity Detecting Codes can be used to overcome this problem associated with asynchronous channels. A t-proximity detecting (t-PD) code can detect when a received word is within distance t from the transmitted codeword, when using...

  6. CENDA: Camouflage Event Based Malicious Node Detection Architecture

    E-Print Network [OSTI]

    Liu, Alex X.

    and segregating such compromised nodes while identifying the type of attack with a certain confidence is critical of malicious activity and is flexible to be configured to include other attack types in future. I. INTRODUCTION Sensor network finds application in different disciplines ranging from academic research to practical

  7. ESTIMATION OF OPTIMUM CODING REDUNDANCY AND FREQUENCY DOMAIN ANALYSIS OF ATTACKS FOR YASS -A RANDOMIZED BLOCK BASED HIDING SCHEME

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    at resisting steganalysis, which is the art of detect- ing the existence of the secret communication. Many pop-accumulate code, redundancy factor 1. INTRODUCTION Steganography is the art of secure communication and is aimed

  8. Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems

    SciTech Connect (OSTI)

    Ferragut, Erik M; Laska, Jason A; Melin, Alexander M; Czejdo, Bogdan

    2013-01-01

    The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

  9. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  10. Domain Name System Anomaly Detection and Prevention

    E-Print Network [OSTI]

    Dolev, Danny

    , in order to poison the cache of the DNS server, the hacker must guess the right TID for the request the guessing work much harder. Nevertheless, there might be a situation when the hacker has an access sniff the traffic of the network. In such a case the hacker can generate poison attacks without any

  11. Arc fault detection system

    DOE Patents [OSTI]

    Jha, Kamal N. (Bethel Park, PA)

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  12. Detection of gas leakage

    DOE Patents [OSTI]

    Thornberg, Steven (Peralta, NM); Brown, Jason (Albuquerque, NM)

    2012-06-19

    A method of detecting leaks and measuring volumes as well as an apparatus, the Power-free Pump Module (PPM), that is a self-contained leak test and volume measurement apparatus that requires no external sources of electrical power during leak testing or volume measurement, where the invention is a portable, pneumatically-controlled instrument capable of generating a vacuum, calibrating volumes, and performing quantitative leak tests on a closed test system or device, all without the use of alternating current (AC) power. Capabilities include the ability is to provide a modest vacuum (less than 10 Torr), perform a pressure rise leak test, measure the gas's absolute pressure, and perform volume measurements. All operations are performed through a simple rotary control valve which controls pneumatically-operated manifold valves.

  13. Digital quadrature phase detection

    DOE Patents [OSTI]

    Smith, James A. (Idaho Falls, ID); Johnson, John A. (Idaho Falls, ID)

    1992-01-01

    A system for detecting the phase of a frequency of phase modulated signal that includes digital quadrature sampling of the frequency or phase modulated signal at two times that are one quarter of a cycle of a reference signal apart, determination of the arctangent of the ratio of a first sampling of the frequency or phase modulated signal to the second sampling of the frequency or phase modulated signal, and a determination of quadrant in which the phase determination is increased by 2.pi. when the quadrant changes from the first quadrant to the fourth quadrant and decreased by 2.pi. when the quadrant changes from the fourth quadrant to the first quadrant whereby the absolute phase of the frequency or phase modulated signal can be determined using an arbitrary reference convention.

  14. Digital quadrature phase detection

    DOE Patents [OSTI]

    Smith, J.A.; Johnson, J.A.

    1992-05-26

    A system for detecting the phase of a frequency or phase modulated signal that includes digital quadrature sampling of the frequency or phase modulated signal at two times that are one quarter of a cycle of a reference signal apart, determination of the arctangent of the ratio of a first sampling of the frequency or phase modulated signal to the second sampling of the frequency or phase modulated signal, and a determination of quadrant in which the phase determination is increased by 2[pi] when the quadrant changes from the first quadrant to the fourth quadrant and decreased by 2[pi] when the quadrant changes from the fourth quadrant to the first quadrant whereby the absolute phase of the frequency or phase modulated signal can be determined using an arbitrary reference convention. 6 figs.

  15. Target detection portal

    DOE Patents [OSTI]

    Linker, Kevin L. (Albuquerque, NM); Brusseau, Charles A. (Tijeras, NM)

    2002-01-01

    A portal apparatus for screening persons or objects for the presence of trace amounts of target substances such as explosives, narcotics, radioactive materials, and certain chemical materials. The portal apparatus can have a one-sided exhaust for an exhaust stream, an interior wall configuration with a concave-shape across a horizontal cross-section for each of two facing sides to result in improved airflow and reduced washout relative to a configuration with substantially flat parallel sides; air curtains to reduce washout; ionizing sprays to collect particles bound by static forces, as well as gas jet nozzles to dislodge particles bound by adhesion to the screened person or object. The portal apparatus can be included in a detection system with a preconcentrator and a detector.

  16. Weld failure detection

    DOE Patents [OSTI]

    Pennell, William E. (Unity Township, Westmoreland County, PA); Sutton, Jr., Harry G. (Mt. Lebanon, PA)

    1981-01-01

    Method and apparatus for detecting failure in a welded connection, particrly applicable to not readily accessible welds such as those joining components within the reactor vessel of a nuclear reactor system. A preselected tag gas is sealed within a chamber which extends through selected portions of the base metal and weld deposit. In the event of a failure, such as development of a crack extending from the chamber to an outer surface, the tag gas is released. The environment about the welded area is directed to an analyzer which, in the event of presence of the tag gas, evidences the failure. A trigger gas can be included with the tag gas to actuate the analyzer.

  17. Waveguide disturbance detection method

    DOE Patents [OSTI]

    Korneev, Valeri A. (Albany, CA); Nihei, Kurt T. (Oakland, CA); Myer, Larry R. (Benicia, CA)

    2000-01-01

    A method for detection of a disturbance in a waveguide comprising transmitting a wavefield having symmetric and antisymmetric components from a horizontally and/or vertically polarized source and/or pressure source disposed symmetrically with respect to the longitudinal central axis of the waveguide at one end of the waveguide, recording the horizontal and/or vertical component or a pressure of the wavefield with a vertical array of receivers disposed at the opposite end of the waveguide, separating the wavenumber transform of the wavefield into the symmetric and antisymmetric components, integrating the symmetric and antisymmetric components over a broad frequency range, and comparing the magnitude of the symmetric components and the antisymmetric components to an expected magnitude for the symmetric components and the antisymmetric components for a waveguide of uniform thickness and properties thereby determining whether or not a disturbance is present inside the waveguide.

  18. Arc fault detection system

    DOE Patents [OSTI]

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  19. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

  20. Frequency and patterns of abnormality detected by iodine-123 amine emission CT after cerebral infarction

    SciTech Connect (OSTI)

    Brott, T.G.; Gelfand, M.J.; Williams, C.C.; Spilker, J.A.; Hertzberg, V.S.

    1986-03-01

    Single photon emission computed tomography (SPECT) was performed in 31 patients with cerebral infarction and 13 who had had transient ischemic attacks, using iodine-123-labeled N,N,N'-trimethyl-N'-(2-hydroxyl-3-methyl-5-iodobenzyl)-1,3-propanediamin e (I-123-HIPDM) as the radiopharmaceutical. SPECT scans were compared with computed tomographic (CT) scans. SPECT was as sensitive as CT in detecting cerebral infarction (94% vs. 84%). The abnormalities were larger on the SPECT scans than on the CT scans in 19 cases, equal in seven, and smaller in five (SPECT abnormalities greater than or equal to CT abnormalities in 86% of cases). Fifteen of 30 patients with hemispheric infarction had decreased perfusion (decreased uptake of I-123-HIPDM) to the cerebellar hemisphere contralateral to the cerebral hemisphere involved by the infarction (crossed cerebellar diaschisis). Nine of these 15 patients had major motor deficits, while only one of the 15 without crossed cerebellar diaschisis had a major motor deficit.