National Library of Energy BETA

Sample records for information disclosure attacks

  1. U-181: IBM WebSphere Application Server Information Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM WebSphere Application Server Information Disclosure Vulnerability U-181: IBM WebSphere Application Server Information Disclosure Vulnerability June 1, 2012 - 7:00am Addthis...

  2. The informational feedback effect of stock prices on corporate disclosure

    E-Print Network [OSTI]

    Zuo, Luo, Ph. D. Massachusetts Institute of Technology

    2013-01-01

    This paper studies whether managers use investor information they learn from the stock market when making forward-looking disclosures. Using annual management earnings forecasts from 1996 to 2010, I find that the association ...

  3. GAINFUL EMPLOYMENT DISCLOSURE SCHOOL OF LIBRARY AND INFORMATION SCIENCE

    E-Print Network [OSTI]

    Cinabro, David

    GAINFUL EMPLOYMENT DISCLOSURE SCHOOL OF LIBRARY AND INFORMATION SCIENCE GRADUATE CERTIFICATE information: http://slis.wayne.edu/certificates/information-management.php Classification of Instructional://nces.ed.gov/ipeds/cipcode/cipdetail.aspx?y=55&cipid=89431 STANDARDIZED OCCUPATIONAL CLASSIFICATION (SOC) CODES · 11-9199.07 Security Managers

  4. GAINFUL EMPLOYMENT DISCLOSURE SCHOOL OF LIBRARY AND INFORMATION SCIENCE

    E-Print Network [OSTI]

    Cinabro, David

    GAINFUL EMPLOYMENT DISCLOSURE SCHOOL OF LIBRARY AND INFORMATION SCIENCE GRADUATE CERTIFICATE. · For additional program information: http://slis.wayne.edu/certificates/archival-administration.php Classification://nces.ed.gov/ipeds/cipcode/cipdetail.aspx?y=55&cipid=89431 STANDARDIZED OCCUPATIONAL CLASSIFICATION (SOC) CODES · 25-4013.00 Museum Technicians

  5. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information...

  6. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information...

  7. Fighting Coordinated Attackers with Cross-Organizational Information Sharing

    E-Print Network [OSTI]

    Paxson, Vern

    Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman, Ethan upon real-world crime fighting. While society employs highly trained crime- fighters ("detectives of fighting crime, their value is in their numbers and prevalence. Detectives are charged with detecting

  8. TITLE: AUTHORIZATION TO DISCLOSE PATIENT INFORMATION PATIENT ACCESS USE AND DISCLOSURE OF MEDICAL

    E-Print Network [OSTI]

    Columbia University

    TITLE: AUTHORIZATION TO DISCLOSE PATIENT INFORMATION PATIENT ACCESS ­ USE AND DISCLOSURE OF MEDICAL INFORMATION POLICY: All information contained within a patient's medical record will be maintained in a confidential manner to protect the patient's right to confidentiality and comply with City, State and Federal

  9. False Data Injection Attacks with Incomplete Information Against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    False Data Injection Attacks with Incomplete Information Against Smart Power Grids Md. Ashfaqur introduced as an important class of cyber attacks against smart grid's wide area measurement and monitoring Injection Attack, Smart Grid Security, Incomplete Information, Transmission Line Admittance Uncer- tainty

  10. TITLE: USES AND DISCLOSURES OF GENETIC INFORMATION Columbia University Medical Center will use and disclose genetic information in accordance

    E-Print Network [OSTI]

    Columbia University

    TITLE: USES AND DISCLOSURES OF GENETIC INFORMATION POLICY: Columbia University Medical Center will use and disclose genetic information in accordance with its extremely confidential nature, but also and Accountability Act of 1996 (HIPAA). PURPOSE : Genetic information is Protected Health Information (PHI) and

  11. 29.01.03.M1.24 Information Resources Notification of Unauthorized Access, Use or Disclosure of Sensitive Personal Information Page 1 of 3

    E-Print Network [OSTI]

    29.01.03.M1.24 Information Resources ­ Notification of Unauthorized Access, Use or Disclosure of Sensitive Personal Information Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.24 Information Resources ­ Notification of Unauthorized Access, Use, or Disclosure of Sensitive Personal Information

  12. TITLE: SANCTIONS FOR UNAUTHORIZED ACCESS, USE OR DISCLOSURE OF PROTECTED HEALTH INFORMATION

    E-Print Network [OSTI]

    Columbia University

    TITLE: SANCTIONS FOR UNAUTHORIZED ACCESS, USE OR DISCLOSURE OF PROTECTED HEALTH INFORMATION POLICY PURPOSE: The purpose of this policy is to describe the sanctions that can be imposed against workforce with the Columbia University Medical Center policies or procedures may result in corrective action. a. Sanctions

  13. University of Connecticut Authorization for Disclosure and Release of Medical Information Form

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Authorization for Disclosure and Release of Medical Information Form Revised 10/13 As required by Connecticut law, the Office of Diversity and Equity may not use or disclose of Connecticut 241 Glenbrook Road - Unit 4175 Storrs, CT 06269-4175 Telephone - (860) 486-2943 Facsimile - (860

  14. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  15. U-200: Red Hat Directory Server Information Disclosure Security...

    Broader source: Energy.gov (indexed) [DOE]

    A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat...

  16. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  17. U-200: Red Hat Directory Server Information Disclosure Security Issue and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCodeVulnerability

  18. Advanced Topics for the Portfolio Manager Initiative: Energy Disclosure Policy Implementation

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on the Energy Disclosure Policy Implementation

  19. It is the policy of Saint Michael's College, in accordance with the Family Educational Rights and Privacy Act (FERPA), to withhold disclosure of personally identifiable information from educational records except when the

    E-Print Network [OSTI]

    Weaver, Adam Lee

    It is the policy of Saint Michael's College, in accordance with the Family Educational Rights and Privacy Act (FERPA), to withhold disclosure of personally identifiable information from educational. There is information about FERPA on the college Website (at the Registrar's Office pages) and in the college catalogue

  20. Form filed with the School of Medicine Registrar's Office; 4610 X Street, Ste 1208; Sacramento, CA 95817 or fax to: 916-734-2178 PersonalInformationDisclosureForm

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    Form filed with the School of Medicine Registrar's Office; 4610 X Street, Ste 1208; Sacramento, CA of Medicine, Registrar's Office Personal Information Disclosure form 4610 X Street, Suite 1208, Sacramento CA to the School of Medicine Registrar's Office, Medical Education Building, 4610 X Street, Suite 1208, Sacramento

  1. Student Consent Basic -Form A -NO TRANSFER June 20, 2011 Consent Form for Use and Disclosure of Student Information

    E-Print Network [OSTI]

    Saskatchewan, University of

    have the right to request that we restrict how we use and/or disclose your personal information of Student Information Student Number: Educational Program:_______ First Name Student Related Personal Information and Personal Health Information By signing this consent, you

  2. Office of Technology Development Invention Disclosure Form

    E-Print Network [OSTI]

    Maryland, Baltimore County, University of

    ;Commercial Interest Inventor Data / Primary Contact Person Inventor Data Inventor Data Inventor Data Inventor be signed and dated by all inventors. I/we, the Inventors, hereby certify that the information set forth in this Invention Disclosure Form is true and complete to the best of my/our knowledge. I/we, the Inventors who

  3. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  4. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  5. Defending against side-channel attacks : DynamoREA

    E-Print Network [OSTI]

    Wen, David, M. Eng. (David Y.). Massachusetts Institute of Technology

    2011-01-01

    Modern computer architectures are prone to leak information about their applications through side-channels caused by micro-architectural side-effects. Through these side-channels, attackers can launch timing attacks by ...

  6. Effective Date: April 14, 2003 Request for an Accounting of Disclosures

    E-Print Network [OSTI]

    Columbia University

    Effective Date: April 14, 2003 Request for an Accounting of Disclosures As a patient of a Columbia University Medical Center provider you may receive an accounting of disclosures of your health information such an accounting, you must complete this form and return it to: Privacy Officer, Columbia University Medical Center

  7. Generation Disclosure | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePowerEdistoWhiskeyFootprintGEXAGemini Solar DevelopmentPackageGeneration

  8. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  9. New Mexico State University Information & Communication Technologies

    E-Print Network [OSTI]

    Johnson, Eric E.

    New Mexico State University Information & Communication Technologies Computer Systems Access Page 1 Only Fiscal Monitor Access Reset #12;New Mexico State University Information & Communication Technologies New Mexico State University Non-Disclosure Statement This Non-Disclosure Agreement is intended

  10. Essays on the Mobile App Platform Choice and Firm Innovation Disclosure

    E-Print Network [OSTI]

    Liu, Yongdong

    2015-01-01

    Summary Statistics of IBM Disclosures and Patents . .Citation of IBM Disclosures . . . . . . .Patents Citing IBM Patents or IBM Disclosures . . . .

  11. PROTECT YOURSELF AGAINST PHISHING ATTACKS Phishing is a cunning attempt by hackers to solicit, steal and mishandle users' personal information (e.g.

    E-Print Network [OSTI]

    Johnson Jr.,, Ray

    PROTECT YOURSELF AGAINST PHISHING ATTACKS Phishing is a cunning attempt by hackers to solicit willingly supply the requested data, hackers gain access to their accounts and then engage in malicious

  12. Criminal History Check Disclosure Notice and Release Authorization

    E-Print Network [OSTI]

    Escher, Christine

    background information may include, but are not limited to: address history; criminal records and historyCriminal History Check Disclosure Notice and Release Authorization *Please attach a copy of your% for National criminal history checks. Hiring Department Index Number: __________________ Activity Code

  13. Value Creation with Dye's Disclosure Option: Optimal Risk-Shielding with an Upper Tailed Disclosure Strategy

    E-Print Network [OSTI]

    Haase, Markus

    Value Creation with Dye's Disclosure Option: Optimal Risk-Shielding with an Upper Tailed Disclosure) 040 0286 e-mail: m.b.gietzmann@city.ac.uk (May 2006) This version October 2007 DisclosureRiskShielding put' which o¤ers a shield against risk of disclosure of low value. The strategic analysis is further

  14. Nonresidential Building Energy Use Disclosure Program

    E-Print Network [OSTI]

    · ·/ Nonresidential Building Energy Use Disclosure Program California Code of Regulations Title Commission Chapter 4. Energy Conservation Article 9. Nonresidential Building Benchmarking and Disclosure Manager that summarizes the space and energy usage of a building and compares a building's energy use

  15. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-01

    This Notice addresses Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees.

  16. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-10-01

    This Notice addresses Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees.

  17. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-01

    This Notice addresses the Executive Branch confidential disclosure requirements. These requirements apply to career GS (GM) employees.

  18. Fault and Side-Channel Attacks on Pairing Based Cryptography ?

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

  19. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  20. THE INVO PROCESS FOR INVENTORS POST-DISCLOSURE/PROVISIONAL

    E-Print Network [OSTI]

    Ottino, Julio M.

    THE INVO PROCESS FOR INVENTORS POST-DISCLOSURE/PROVISIONAL · Within 2-3 days of your disclosure INVO invo@northwestern.edu (847) 467-2097 As an inventor, an invention disclosure is just the beginning

  1. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  2. Cyber Security Basic Defenses and Attack Trends

    E-Print Network [OSTI]

    Sastry, S. Shankar

    37 38 39 40 41 4273 MTC 4 Cyber Security Basic Defenses and Attack Trends Alvaro A. Cárdenas, Tanya for a successful defense. Cyber security is the branch of security dealing with digital or information technology.1 This chapter presents a selected overview on topics in cyber security. 1. Throughout the chapter, we use

  3. Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures Guillaume Barbu1. Until 2009, Java Cards have been mainly threatened by Log- ical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code

  4. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Grids”, IEEE Transactions on Smart Grid, vol. 2, no. 2,Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  5. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  6. Carbon Disclosure Project Webinar: Climate Change: A Challenge...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Carbon Disclosure Project Webinar: Climate Change: A Challenge for Bond Analysts Carbon Disclosure Project Webinar: Climate Change: A Challenge for Bond Analysts April 8, 2015...

  7. Disclosure of Permitted Communication Concerning Regional Standards...

    Broader source: Energy.gov (indexed) [DOE]

    furnacestdwaiverpolicy.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major...

  8. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-10-01

    This Notice addresses the Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees. (Replaces DOE N 326.7).

  9. Annual Confidential Financial Disclosure Report (SF 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-10-13

    This Notice addresses the Executive Branch confidential financial disclosure requirements. These requirements apply to persons employed at the GS-15 level and below, except for Schedule C appointees.

  10. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  11. Confidential Business Information

    Energy Savers [EERE]

    Confidential Business Information Pursuant to 10 CFR 1004.11, any person submitting information that he or she believes to be confidential and exempt by law from public disclosure...

  12. Disclosure of Permitted Communication Concerning Fossil Fuel...

    Energy Savers [EERE]

    Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted...

  13. Confidential Financial Disclosure Reports (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-09

    The directive establishes requirements and responsibilities for Departmental elements and employees regarding filing Confidential Financial Disclosure Reports (OGE Form 450) in accordance with the Ethics in Government Act of 1978, as amended.

  14. Confidential Financial Disclosure Report (OGE Form 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-09-20

    This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM employees as well as employees serving in excepted service positions designated EJ, EK, and EN.

  15. SECTION A: STUDENT INFORMATION ______________________________________________________________________ 93#____________________________________

    E-Print Network [OSTI]

    Lewis, Robert Michael

    , as Amended, you have the right to withhold the disclosure of "Directory Information." a. Student's name bSECTION A: STUDENT INFORMATION # __________________@_________________________ (______)______________ ________/________/_________ Email Address Phone # Effective Date of this Request SECTION B: ADDITIONAL INFORMATION The items listed

  16. University of Washington | Human Resources BACKGROUND REPORT DISCLOSURE AND AUTHORIZATION FORM

    E-Print Network [OSTI]

    Matrajt, Graciela

    University of Washington | Human Resources BACKGROUND REPORT DISCLOSURE AND AUTHORIZATION FORM this the information on this form carefully. It describes your rights as a consumer. The University of Washington uses Reporting Agency" (CRA) covered by the FCRA. The University of Washington uses the background reports

  17. Supplier Disclosure of Conflict of Interest -2/2015 MSU Supplier Disclosure of Conflict of Interest

    E-Print Network [OSTI]

    Supplier Disclosure of Conflict of Interest - 2/2015 MSU Supplier Disclosure of Conflict of Interest As a supplier to Michigan State University (MSU), a state university and public institution, any to place either the supplier or employee in jeopardy. Purchasing will advise the employee and/or supplier

  18. Environmental Information Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n cEnergyNatural GasDepartmentApril2014Federalintended toState New Jersey

  19. Carbon Disclosure Project | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButte County,Camilla, Georgia: Energy ResourcesRanch Jump to:CapitalDome

  20. COST ACCOUNTING STANDARDS BOARD DISCLOSURE STATEMENT FOR EDUCATIONAL INSTITUTIONS

    E-Print Network [OSTI]

    COST ACCOUNTING STANDARDS BOARD DISCLOSURE STATEMENT FOR EDUCATIONAL INSTITUTIONS CASB DS-2 #12;COST ACCOUNTING STANDARDS BOARD DISCLOSURE STATEMENT REQUIRED BY PUBLIC LAW 100-679 EDUCATIONAL INSTITUTIONS INDEX GENERAL INSTRUCTIONS -- Continuation Sheet

  1. Situational correlates of disclosure of child sexual abuse 

    E-Print Network [OSTI]

    Wiley, Elizabeth Stirling

    2005-02-17

    Often, a sexually abused child?s disclosure is the only evidence of the abuse. However, most victims do not disclose until adulthood, if ever. This study explores situational correlates of child sexual abuse disclosure. ...

  2. Retargeting Attacks from Windows to Android With Limited Data Extraction

    E-Print Network [OSTI]

    Ng, Cary G.

    2014-01-01

    Retargeting the Attack to Android . . . . . . . . . .The Popularity of Android Devices . . . . . . . . . . .3 Android Attack . . . . .

  3. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  4. Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512 Takanori.Isobe,Taizo.Shirai}@jp.sony.com Abstract. This paper studies two types of attacks on the hash function Shabal. The first attack is a low on a low-weight pseudo collision attack. It means that only low-weight difference in a chaining value

  5. American Health Information Management Association Code of Ethics

    E-Print Network [OSTI]

    Zhou, Yaoqi

    1 American Health Information Management Association Code of Ethics Preamble The ethical obligations of the health information management (HIM) professional include the protection of patient privacy and confidential information; disclosure of information; development, use, and maintenance of health information

  6. Quantum attacks against iterated block ciphers

    E-Print Network [OSTI]

    Marc Kaplan

    2015-04-26

    We study the amplification of security against quantum attacks provided by iteration of block ciphers. In the classical case, the Meet-in-the-middle attack is a generic attack against those constructions. This attack reduces the time required to break double iterations to only twice the time it takes to attack a single block cipher, given that the attacker has access to a large amount of memory. More abstractly, it shows that security by composition does not achieve exact multiplicative amplification. We present a quantized version of this attack based on an optimal quantum algorithm for the Element Distinctness problem. We then use the generalized adversary method to prove the optimality of the attack. An interesting corollary is that the time-space tradeoff for quantum attacks is very different from what classical attacks allow. This first result seems to indicate that composition resists better to quantum attacks than to classical ones because it prevents the quadratic speedup achieved by quantizing an exhaustive search. We investigate security amplification by composition further by examining the case of four iterations. We quantize a recent technique called the dissection attack using the framework of quantum walks. Surprisingly, this leads to better gains over classical attacks than for double iterations, which seems to indicate that when the number of iterations grows, the resistance against quantum attacks decreases.

  7. Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , we scrutinize its security showing how an passive adversary can retrieve secret parameters of patient for building access or payments with mobile devices [9] to applications in sanitary environments [1]. A typical an passive adversary can retrieve secret parameters of tag in cost of O(216) off-line PRNG evaluations. Hence

  8. Time Stamp Attack on Wide Area Monitoring System in Smart Grid

    E-Print Network [OSTI]

    Zhang, Zhenghao; Li, Husheng; Pei, Changxing

    2011-01-01

    Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

  9. A new key recovery attack on the ANSI retail MAC Chris J. Mitchell

    E-Print Network [OSTI]

    Mitchell, Chris

    A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

  10. CLEMSON UNIVERSITY DISCLOSURE STATEMENT FOR EXTERNAL AFFILIATIONS

    E-Print Network [OSTI]

    Duchowski, Andrew T.

    hereby make all financial disclosures required by it, if any. I will comply with any conditions of interest. 1. Do you, your spouse, any dependent children, (or any children occupying the same residence funding this Sponsored Program, (ii) any organization from which goods or services will be or might

  11. The boomerang attack David Wagner

    E-Print Network [OSTI]

    Wagner, David

    . Second, we show how to break COCONUT98, a cipher designed using decorrelation techniques to en- sure (Rounds) Our Attack Data Complexity Time Complexity COCONUT98 (8) 2 16 CP 2 38 Khufu (16) 2 18 CP 2 18{5 below, where we show how to break COCONUT98 [V98] with just 2 16 chosen texts and 2 38 work, despite

  12. Secure routing in wireless sensor networks: attacks and countermeasures

    E-Print Network [OSTI]

    Xu, Wenyuan

    against sensor networks, introduce two classes of novel attacks against sensor networks­­sinkholes two novel classes of previously undocumented attacks against sensor net- works 1 ­­sinkhole attacks

  13. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    E-Print Network [OSTI]

    California at Berkeley, University of

    sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO two novel classes of previously undoc­ umented attacks against sensor networks 1 -- sinkhole attacks

  14. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    E-Print Network [OSTI]

    Wagner, David

    sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO­ umented attacks against sensor networks 1 -- sinkhole attacks and HELLO floods. #15; We show

  15. The Economic Consequences of Disclosure Regulation: Evidence from Online Disclosure of Corporate Governance Practices in U.S. and Canadian markets

    E-Print Network [OSTI]

    Saskatchewan, University of

    The Economic Consequences of Disclosure Regulation: Evidence from Online Disclosure of Corporate regulation. This study contributes to the debate on the economic consequences of disclosure regulation. JEL Classifications: D82, G14 #12;2 The Economic Consequences of Disclosure Regulation: Evidence from

  16. A Novel Attack against Android Phones

    E-Print Network [OSTI]

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  17. A "Poisoning" Attack Against Online Anomaly Detection

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    A "Poisoning" Attack Against Online Anomaly Detection Marius Kloft Department of Computer Science it is robust against targeted "poisoning" attacks. The latter have been first investigated by Nelson et al. [1 of all data points observed so far. The key idea of a poisoning attack is to insert specially crafted

  18. Vulnerability Discovery with Attack IEEE Transactions on Software Engineering (2010)

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    2010-01-01

    : Monitor target system's state while executing attacks in 3 ways Overview of tool AJECT #12;Attack generate attacks in 4 ways Injection phase: Execute previously generated test cases(attacks) Monitoring

  19. Public Financial Disclosure Reports Filed by the Secretary and...

    Office of Environmental Management (EM)

    Public Financial Disclosure Reports Filed by the Secretary and Deputy Secretary The Stop Trading on Congressional Knowledge (STOCK) Act requires online posting of the Public...

  20. An Embedded Solution: Improving the Advertising Disclosure Rules in Television

    E-Print Network [OSTI]

    Ong, Edward L.

    2011-01-01

    Solution: Improving the Advertising Disclosure Rules inB. Current Embedded Advertising Trends in the TelevisionRules for Commercial Advertising . 127 IV. SUMMARIES AND

  1. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.

  2. The Cost of Attack in Competing Networks

    E-Print Network [OSTI]

    Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

    2015-01-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

  3. Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis

    E-Print Network [OSTI]

    Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

  4. Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

  5. Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro and Evangelos Kranakis

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks Gimer Cervera, Michel (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes affect the topol- ogy map acquisition process by interrupting the flooding of control information

  6. Modeling veterans healthcare administration disclosure processes : CY 2012 summary.

    SciTech Connect (OSTI)

    Beyeler, Walter Eugene; DeMenno, Mercy B.; Finley, Patrick D.

    2013-09-01

    As with other large healthcare organizations, medical adverse events at the Department of Veterans Affairs (VA) facilities can expose patients to unforeseen negative risks. VHA leadership recognizes that properly handled disclosure of adverse events can minimize potential harm to patients and negative consequences for the effective functioning of the organization. The work documented here seeks to help improve the disclosure process by situating it within the broader theoretical framework of issues management, and to identify opportunities for process improvement through modeling disclosure and reactions to disclosure. The computational model will allow a variety of disclosure actions to be tested across a range of incident scenarios. Our conceptual model will be refined in collaboration with domain experts, especially by continuing to draw on insights from VA Study of the Communication of Adverse Large-Scale Events (SCALE) project researchers.

  7. Disclosures | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HAB PacketDiesel pricesCenter atDirectory Searchable directory. A

  8. Attacks on Java Card 3.0 Combining Fault and Logical Attacks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Attacks on Java Card 3.0 Combining Fault and Logical Attacks Guillaume Barbu1,2 , Hugues Thiebeauld://www.telecom-paristech.fr/ guillaume.barbu@telecom-paristech.fr Abstract. Java Cards have been threatened so far by attacks using ill it can no longer be applied to the Java Card 3 Connected Edition context where the bytecode verification

  9. Privacy Act Disclosures | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures | National

  10. Machine Learning Attacks Against the ASIRRA CAPTCHA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Machine Learning Attacks Against the ASIRRA CAPTCHA Draft, February 28, 2008 Philippe Golle Palo of cats and dogs used in ASIRRA. This classifier is a combination of support-vector machine classifiers higher than the estimate given in [6] for machine vision attacks. The weakness we expose in the current

  11. Low-Density Attack Revisited Tetsuya Izu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Low-Density Attack Revisited Tetsuya Izu Jun Kogure Takeshi Koshiba Takeshi Shimoyama Secure The low-density attack proposed by Lagarias and Odlyzko is a powerful algorithm against the subset sum, densities of the subset sum problems should be higher than 0.9408... in order to avoid the low

  12. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  13. V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...

    Broader source: Energy.gov (indexed) [DOE]

    Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS:...

  14. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  15. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  16. Improved Side Channel Attacks on Pairing Based Cryptography

    E-Print Network [OSTI]

    to passive attacks as well as to active attacks [12,8,21,11,22,13]. asdf This work was funded by the German

  17. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  18. Leveraging Portfolio Manager for Disclosure and Green Leasing Practices

    Broader source: Energy.gov [DOE]

    A talk about developing paths and implementing rating and disclosure policies for the commercial building sector, giving a state, local and federal overview of these types of policies and where they’re in play.

  19. Mandatory Disclosure Quality, Inside Ownership, and Cost of Capital

    E-Print Network [OSTI]

    Core, John E.

    This paper examines whether and how inside ownership mediates the relation between disclosure quality and the cost of capital. Both ownership and more transparent reporting have the potential to align incentives between ...

  20. Disclosure of asset valuations in corporate annual reports 

    E-Print Network [OSTI]

    Ponder, Charles Bedford

    1955-01-01

    DISCLOSURE OF ASSET VALUATIONS IN CORPORATE ANNUAL REPORTS A Thesis Charles 3. Ponder Approved as to style and content by: Head of Department and Chairman of Committee January 1955 Ll!3RARY A A M COLLEGE OF TEXAS DISCLOSURE OF ASSET... January 1955 Ma)or Subject: Accounting DISCXDSEm OP A88ET VAWATIONS IN COllPQRATE ANNSAI REPORTS IXI Nature of the Probles Xmnmtories Marbetable Seoarities Xavestseuts PAGE 15 V PixeA Assets VII Iataugible Assets Concise isa Bibliograyhy...

  1. Analysis and Defense of Emerging Malware Attacks 

    E-Print Network [OSTI]

    Xu, Zhaoyan

    2014-05-28

    to perform effectively and efficiently targeted malware analysis. Second, this dissertation studies a new trend of massive malware intrusion and proposes a new protection scheme to proactively defend malware attack. Lastly, our focus is new P2P malware. We...

  2. Inoculating Multivariate Schemes Against Differential Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding and Jason E. Gower scheme the Perturbed Matsumoto-Imai-Plus (PMI+) cryptosystem. Keywords: multivariate, public key resources. Multivariate public key cryptography provides one alternative since computations in small finite

  3. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  4. Power Analysis Attacks against FPGA Implementations Shaohua Tang1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Power Analysis Attacks against FPGA Implementations of KLEIN Shaohua Tang1 , Jianhao Wu1 , Weijian not consider the potential attacks by power analysis methods. This paper presents power analysis attacks and complexity of our attacks via power analysis against KLEIN are discussed in detail. Besides

  5. Defining Code-injection Attacks Donald Ray Jay Ligatti

    E-Print Network [OSTI]

    Ligatti, Jay

    of mechanisms for mitigating such attacks. Categories and Subject Descriptors C.2.0 [Computer Communi- cation definitions of code-injection attacks (e.g., SQL-injection attacks) are flawed. The flaws make it possible these flaws in conventional definitions of code-injection attacks, this paper proposes a new definition, which

  6. Taxonomy for Description of Cross-Domain Attacks on CPS

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    . This attack has reportedly damaged over 1000 centrifuges at an Iranian uranium enrichment plant [1]. Multiple

  7. Market Risks and Oilfield Ownership - Refining SEC Oil and Gas Disclosures 

    E-Print Network [OSTI]

    Kretzschmar, Gavin Lee; Hatherly, David; Misund, Bard

    2006-01-01

    Our paper uses an extensive sample of 292 oilfields to provide evidence that Securities and Exchange Commission (SEC) supplementary disclosures do not capture the price sensitivities of O&G disclosures implicit in the two ...

  8. Of Jordanian BanksExtent of Disclosure in the annual Reports Ahmed Al-Jayousi

    E-Print Network [OSTI]

    1 Abstract Of Jordanian BanksExtent of Disclosure in the annual Reports By Ahmed Al of Disclosure in the Annual Reports of Jordanian Banks for the financial year (2001). A Disclosure Index (DI to appear in banks' annual reports, these items were selected by reviewing the law of Jordanian central bank

  9. Disclosing information about the self is intrinsically rewarding

    E-Print Network [OSTI]

    Mitchell, Jason

    experiences. What drives this propensity for disclosure? Here, we test recent theories that individuals place conversation have documented that 30­40% of everyday speech is used to relay information to others about one

  10. Protecting Mobile Devices From TCP Flooding Attacks

    E-Print Network [OSTI]

    Fu, Xiaoming

    against these kinds of attack · Waking up the device by sending random SYN packets will exhaust-holes for server ports doesn't prevent against battery exhaustion and spectrum waste · Some P2P applications (e.g., Skype) have mechanism built into protocol to traverse such firewalls, but not all of them do. · Our Goal

  11. Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier Gemplus Card in a state that leaks secret information. Nicely enough, evaluating the entropy loss due to the chemical spectroscopic analysis can reveal with accuracy the mixture of chemical compounds generated by the user, we show

  12. Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG

    E-Print Network [OSTI]

    Altug, Yucel

    2008-01-01

    A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized. Consequently, under some mild assumptions, which are common in cryptanalysis, the tight lower bounds on the algorithmic complexity of successful Query-Based Key-Recovery attacks are derived for two different setups of practical interest. The proofs rely on the concept of ``typicality'' of information theory.

  13. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection...

  14. Information Disclosure Policies: Evidence from the Electricity Industry

    E-Print Network [OSTI]

    Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

    2007-01-01

    thank seminar participants at the AERE Sessions at the AEAResource Economists, the AERE sessions at the AAEA meetings,thank seminar participants at the AERE Sessions at the AEA

  15. Information Disclosure Policies: Evidence from the Electricity Industry

    E-Print Network [OSTI]

    Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

    2007-01-01

    Renewable Energy Council (IREC)’s Database of While expandedinformation comes directly from IREC’s Database. Since it isother program data from the IREC database. The Sample Our

  16. Information Disclosure Policies: Evidence from the Electricity Industry

    E-Print Network [OSTI]

    Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

    2007-01-01

    average proportion of fossil fuels decreases and the averageusage attributable to fossil fuels substantially decreasesresidential customers. Firms’ fossil fuel program responses

  17. HIPAA Policy 5040 Uses and Disclosures of Genetic Information for

    E-Print Network [OSTI]

    Post, David M.

    , or policy (including discounts, rebates, payments in kind, or other premium differential mechanisms

  18. Information Disclosure Policies: Evidence from the Electricity Industry

    E-Print Network [OSTI]

    Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

    2007-01-01

    utilities currently offer green power options to theirutilities currently offer green power pricing programs wherehas direct access to green power options from their own

  19. Information Disclosure Policies: Evidence from the Electricity Industry

    E-Print Network [OSTI]

    Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

    2007-01-01

    fuels (renewables, hydroelectric) represent approximately 9for clean sources like hydroelectric and renewables. As theuse of renewable and hydroelectric generation. Results also

  20. Information Disclosure Policies: Evidence from the Electricity Industry

    E-Print Network [OSTI]

    Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

    2007-01-01

    CA, NY, ME, and VT, had green energy generation proportionsand exemptions for green energy generation are becominggreen power pricing programs where consumers can support cleaner energy

  1. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35:Department of

  2. U-181: IBM WebSphere Application Server Information Disclosure

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands

  3. Self-Disclosure of Criminal Convictions Policy 4.17

    E-Print Network [OSTI]

    Clark, Bunny

    Self-Disclosure of Criminal Convictions Policy 4.17 Office of Human Resources Applies to: Faculty Process of acquiring records regarding a final candidate that are used to determine suitability or involuntarily for any period of time. Criminal conviction Being found guilty, entering a guilty plea

  4. Achieving Differential Privacy of Data Disclosure in the Smart Grid

    E-Print Network [OSTI]

    Li, Xiang-Yang

    Achieving Differential Privacy of Data Disclosure in the Smart Grid Jing Zhao Taeho Jung Yu Wang-- The smart grid introduces new privacy implications to individuals and their family due to the fine of the proposed method over existing BLH methods. Index Terms--Smart Grid, Smart Meter, Privacy, Differential

  5. Annual Confidential Financial Disclosure Report (OGE Form 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-12-20

    The Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN. Cancels DOE N 326.13.

  6. New Jersey Institute of Technology Invention Disclosure Report

    E-Print Network [OSTI]

    NJIT New Jersey Institute of Technology Invention Disclosure Report -Confidential- Docket Number technology. Answering the below questions as completely as possible will enable the Office of Intellectual, and will help in assessing commercialization options. TYPE OF TECHNOLOGY, PROTECTION & TITLE 1. Please indicate

  7. Statistical Disclosure Control: Methods and Software Development in

    E-Print Network [OSTI]

    Jureckova, Jana

    language and runs under all platforms. Turn your ideas into software easily. #12;Using R for SDC Some and statistical computing. ­ is a modern object-oriented high-level programming language and runs under allStatistical Disclosure Control: Methods and Software Development in Matthias Templ Vienna

  8. Completing the FCOI Significant Financial Interest Disclosures Accessing the Portal

    E-Print Network [OSTI]

    Raina, Ramesh

    the Annual Conflict of Interest and Significant Financial Interest disclosures, login to MySlice and use the links in the Employee Services section. · Please begin by completing the University Conflict of Interest (COI) form, by clicking on the Conflict of Interest link. Once your COI is complete, you

  9. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  10. Practical Attacks on Decoy State Quantum Key Distribution Systems with Detector Efficiency Mismatch

    E-Print Network [OSTI]

    Fei Yangyang; Gao Ming; Wang Weilong; Li Chaobo; Ma Zhi

    2015-07-23

    To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy state quantum key distribution systems. The eavesdropper may get some information ab out the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum key distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy state quantum key distribution systems.

  11. Attacking and Repairing the Improved ModOnions Protocol

    E-Print Network [OSTI]

    Borisov, Nikita

    Attacking and Repairing the Improved ModOnions Protocol Nikita Borisov1 , Marek Klonowski2 presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoid replay attacks. How- ever, ModOnions allowed the detour attack

  12. A Classification of SQL Injection Attacks and Countermeasures

    E-Print Network [OSTI]

    Orso, Alessandro "Alex"

    A Classification of SQL Injection Attacks and Countermeasures William G.J. Halfond, Jeremy Viegas|jeremyv|orso}@cc.gatech.edu ABSTRACT SQL injection attacks pose a serious security threat to Web appli- cations: they allow attackers methods to address the SQL injection problem, current approaches either fail to address the full scope

  13. A Routing Table Insertion (RTI) Attack Technical Report

    E-Print Network [OSTI]

    Dong, Yingfei

    1 A Routing Table Insertion (RTI) Attack on Freenet Technical Report University of Hawaii at Manoa.2.6 Data Retrieval versus Data Insert Routing 2.3. Routing Algorithm Pseudo-Code 3. RTI Attack 3 Experiment 8.2.2. Experiment Results 8.3. General Anonymous P2P Properties 8.4. RTI Attack 8.4.1. Manual RTI

  14. Efficient Template Attacks Omar Choudary and Markus G. Kuhn

    E-Print Network [OSTI]

    Kuhn, Markus

    Side-channel attacks are powerful tools for inferring secret algorithms or data (passwords a specific cipher, could be implemented on top of that, but are outside the scope of this paper. We show to as the profiling and the attacked device. We wish to infer some secret value k S, processed by the attacked device

  15. Mitigation of Malicious Attacks on Networks

    E-Print Network [OSTI]

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  16. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    learning and security: training-set attacks on machine learners. In such attacks an attacker contaminates-set attacks to increase in the future as more intelligent systems (e.g. wearable devices, cars, smart houses

  17. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    and security: training-set attacks on machine learners. In such attacks an attacker contaminates the training.g. wearable devices, cars, smart houses and robots) include a "life long learning" com- ponent. The attacker

  18. Secured Information Flow for Asynchronous Sequential Processes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Secured Information Flow for Asynchronous Sequential Processes Isabelle Attali, Denis Caromel for unauthorized information flows. As a final result, all authorized communication paths are secure: no disclosure a new issue in data confidentiality: authorization of secured information flow transiting (by the mean

  19. Carbon Disclosure Project Webinar: Climate Change: A Challenge for Bond Analysts

    Broader source: Energy.gov [DOE]

    Hosted by the Carbon Disclosure Project, this webinar will cover climate change and how its impacts can present significant risks for municipalities and municipal bond investors.

  20. PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF

    E-Print Network [OSTI]

    Mullins, Dyche

    PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF The Family Educational Rights and Privacy Act (FERPA) and UC policy restrict the disclosure of information from student records. Presume that all student information is confidential, and do not disclose information without a student

  1. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    - Best Practice DesignConfiguration Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan...

  2. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-06-05

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization of reflectivity and transmission of the optical components most relevant to security.

  3. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-08-03

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security.

  4. Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security

    E-Print Network [OSTI]

    Heidemann, John

    Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability is that openness and support for disclosure of future SCADA data can in improved safety, reliability, and security-network processing are needed to make greater openness and data sharing data viable. Today's SCADA systems are often

  5. COST ACCOUNTING STANDARDS BOARD FORM APPROVED OMB NUMBER DISCLOSURE STATEMENT 0348-0055

    E-Print Network [OSTI]

    Alabama in Huntsville, University of

    BY PUBLIC LAW 100-679 INDEX EDUCATIONAL INSTITUTIONS COST ACCOUNTING STANDARDS BOARD FORM APPROVED OMBCOST ACCOUNTING STANDARDS BOARD FORM APPROVED OMB NUMBER DISCLOSURE STATEMENT 0348-0055 REQUIRED # DISCLOSURE STATEMENT REQUIRED BY PUBLIC LAW 100-679 EDUCATIONAL INSTITUTIONS INDEX GENERAL INSTRUCTIONS

  6. University of California, Merced Disclosure of Financial Interests Related to Projects Sponsored by

    E-Print Network [OSTI]

    Oviedo, Néstor J.

    Interests and Management of Conflicts of Interest Related to Sponsored Projects" and federal regulationsUniversity of California, Merced Disclosure of Financial Interests Related to Projects Sponsored regarding disclosure of any financial interests that would reasonably appear to be affected by the conduct

  7. Summary of Joint Affiliate Annual Disclosure Survey Process Flows for Faculty Members

    E-Print Network [OSTI]

    Chisholm, Rex L.

    conflict of interest survey disclosures and their subsequent review, including measures to address subsequent request), not abiding by a conflict of interest ("COI") management plan, or otherwiseSummary of Joint Affiliate Annual Disclosure Survey Process Flows for Faculty Members March 6, 2014

  8. OUTSIDE EMPLOYMENT DISCLOSURE AND ACKNOWLEDGEMENT FORM

    E-Print Network [OSTI]

    Su, Xiao

    of Outside Employment Held Time Commitment Expected Duration 1 2 3 Employee Reviewed by (Employee's Manager Title: Department/Unit: I acknowledge that the information listed below is true and correct, and that my time commitment to these outside employer(s) does not create a conflict of commitment that would

  9. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we precisely define corrupted packets in inter-session pollution based

  10. Preventing Pollution Attacks in MultiSource Network Coding

    E-Print Network [OSTI]

    Boneh, Dan

    Preventing Pollution Attacks in Multi­Source Network Coding Shweta Agrawal 1# , Dan Boneh 2 that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks. A particularly important instance of this is the pollution problem: if some routers in the network are malicious

  11. Preventing Pollution Attacks in Multi-Source Network Coding

    E-Print Network [OSTI]

    Boneh, Dan

    Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal 1 , Dan Boneh 2 , Xavier combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious important instance of this is the pollution problem: if some routers in the network are malicious

  12. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we first define precisely corrupted packets in inter-session pollution based

  13. Improved Side Channel Attacks on Pairing Based Cryptography

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ], and anonymous group signatures [BS04] make use of pairings as their building blocks. The adoption of pairings that analyze the vulnerability of pairings to passive attacks as well as to active attacks [PV04, KTH+ 06, WS06, WS07, PV06]. There is a variety of pairings that can be used for PBC, e.g., the Weil pairing

  14. Energy Attacks and Defense Techniques for Wireless Systems

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Energy Attacks and Defense Techniques for Wireless Systems Sheng Wei Jong Hoon Ahnn Miodrag {shengwei, jhahnn, miodrag}@cs.ucla.edu ABSTRACT This paper addresses the energy attacks towards wireless in the wireless systems and trigger ultra-high energy increases at runtime. Then, we develop a non-destructive HT

  15. Tornado Attack on RC4 Applications to WEP & WPA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    several tools for building and manipulating pools of biases in the analysis of RC4. We report extremely fast and optimized active and passive attacks against IEEE 802.11 wireless commu- nication protocol WEP of packets, Aicrack-ng yields around 3% success rate. Furthermore, we describe very fast passive only attacks

  16. Stealthy Poisoning Attacks on PCA-based Anomaly Detectors

    E-Print Network [OSTI]

    Tygar, Doug

    Stealthy Poisoning Attacks on PCA-based Anomaly Detectors Benjamin I. P. Rubinstein1 Blaine Nelson1 detection, we present and evaluate short-term and long-term data poison- ing schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boil- ing Frog attacks

  17. Efficient Template Attacks Omar Choudary and Markus G. Kuhn

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Side-channel attacks are powerful tools for inferring secret algorithms or data (passwords values, e.g. to recover keys from a specific cipher, could be implemented on top of that, but are outside devices, which we refer to as the profiling and the attacked device. We wish to infer some secret value k

  18. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  19. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  20. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  1. Defending Against Attacks on Main Memory Persistence William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel, and Adam Smith

    E-Print Network [OSTI]

    Lowd, Daniel

    Defending Against Attacks on Main Memory Persistence William Enck, Kevin Butler, Thomas Richardson,butler,trichard,mcdaniel,asmith}@cse.psu.edu Abstract Main memory contains transient information for all res- ident applications. However, if memory and keys can be extracted. Main memory persistence will soon be the norm as recent ad- vancements in MRAM

  2. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M. (Sandia National Laboratories, Albuquerque, NM); Ehlen, Mark Andrew (Sandia National Laboratories, Albuquerque, NM); Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  3. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect (OSTI)

    Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  4. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  5. Detection attacks on cryptographic protocols and bound randomness

    E-Print Network [OSTI]

    Antonio Acín; Daniel Cavalcanti; Elsa Passaro; Stefano Pironio; Paul Skrzypczyk

    2015-04-30

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. The derived critical detection efficiencies for security imply that the implementation of most partly device independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely non-local correlations in which a non-signalling eavesdropper can find out a posteriori the result of any implemented measurement.

  6. Coordinated Variable Structure Switching Attacks for Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11

    attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one...

  7. The Middle East under Malware Attack Dissecting Cyber Weapons

    E-Print Network [OSTI]

    Almulhem, Ahmad

    the middle east was the Shamoon attack on Saudi Aramco [10]. Shamoon malware [11] is less sophisticated than destruction of the content of around 30,000 workstations in Saudi Aramco [12], [10]. Given the amount

  8. Single-block collision attack on MD5 Marc Stevens

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands marc@marc-stevens.nl January 29, 2012 Abstract In 2010, Tao Xie and Dengguo Feng

  9. Maximum Damage Malware Attack in Mobile Wireless Networks

    E-Print Network [OSTI]

    such as those in relaying data and establishing end-to-end routes (e.g., sinkhole attacks [1]), or even alter such as the wormhole [7], sinkhole [1], and Sybil [8], that utilize vulnerabilities in the routing protocols

  10. Maximum Damage Battery Depletion Attack in Mobile Sensor Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    functions such as relaying and establishing end-to-end routes (e.g., sinkhole attacks [2]), or even such as the wormhole [6], sinkhole [2], and Sybil [7], that utilize vulner- abilities in the routing protocols

  11. Determinants of parental satisfaction with a child's disclosure of a gay or lesbian sexual orientation 

    E-Print Network [OSTI]

    Miller, Andrew D

    2006-10-30

    This study was an attempt to begin to understand the phenomenon of coming out from the parental perspective. Specifically, it focused on the factors contained within a child�s disclosure of his or her sexual orientation ...

  12. Effect of board independence on incentive compensation and compensation disclosure : evidence from Europe

    E-Print Network [OSTI]

    Muslu, Volkan

    2005-01-01

    My thesis examines how the lack of board-of-director independence affects the structure and disclosure of executive compensation. I find that European companies with more insiders on their boards grant their executives ...

  13. Benchmarking and Disclosure: State and Local Policy Design Guide and Sample Policy Language

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-16

    Provides sample policy language based on a synthesis of existing state and local policies, and discussion on key provisions, for the design of a commercial benchmarking and disclosure policy.

  14. Reserves Overstatements: History, Enforcement, Identification, and Implications of New SEC Disclosure Requirements 

    E-Print Network [OSTI]

    Olsen, Grant

    2010-07-14

    Despite the need for accurate oil and gas reserves estimates which honor disclosure requirements of the United States Securities and Exchange Commission (SEC), a number of exploration and production companies have allegedly ...

  15. Annual Confidential Financial Disclosure Report (OGE Form 450 or 450-A)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-09-29

    This Notice address the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM employees as well as employees serving in excepted service positions designate EJ, EK, and EN.

  16. Sexual communication in romantic relationships: An investigation into the disclosure of sexual fantasies

    E-Print Network [OSTI]

    Anderson, Michael

    2011-12-31

    This study explored the communication of sexual fantasies in romantic relationships. While self-disclosure of sexual likes and dislikes has been positively associated with sexual satisfaction (Cupach & Metts, 1991), no study has specifically...

  17. START Program for Renewable Energy Project Development Assistance Non-Disclosure Agreement

    Broader source: Energy.gov [DOE]

    Download the Non-Disclosure Agreement to submit along with your application for the DOE Office of Indian Energy Strategic Technical Assistance Response Team (START) Program for Renewable Energy...

  18. Board Independence, Executive Pay Structures, and Pay Disclosure: Evidence from Europe

    E-Print Network [OSTI]

    Muslu, Volkan

    2004-02-06

    Using a broad sample of the largest European companies, I examine whether the two governance mechanisms, namely (i) independent monitoring by a board of directors and (ii) grants and disclosures of incentive-based executive ...

  19. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  20. Bounds on Information and the Security of Quantum Cryptography

    E-Print Network [OSTI]

    E. Biahm; T. Mor

    1997-01-08

    Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed states, and we find bounds on the information leaked to an eavesdropper. Our result suggests that quantum cryptography is ultimately secure.

  1. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique

  2. Identification of Repeated Attacks Using Network Traffic Alefiya Hussain John Heidemann Christos Papadopoulos

    E-Print Network [OSTI]

    Papadopoulos, Christos

    designed a multi-dimensional maximum-likelihood classifier to identify re- peated attack scenarios, by inference, the same attacker, much as ballistics studies of firearms can trace multiple uses of a weapon to the same gun. Such evidence of repeated attacks would help establish the maliciousness of a given attacker

  3. Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    SFINKS [8], the simple attack would require only about 42 2 operations and 32Kb of keystream higher order nonlinearity. Introduction Algebraic attacks are an attractive field for investigation, a number of papers were written which investigated, extended and improved algebraic attacks. These attacks

  4. A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    availability. Replication in it­ self, however, is not enough against malicious attacks that are specifically be distinguished: bandwidth consumption at­ tacks and resource consumption attacks. In a bandwidth con­ sumption accept requests from legitimate clients anymore. In a resource consumption attack, the attacker sends

  5. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  6. PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF

    E-Print Network [OSTI]

    Martin, Gail

    PRIVACY OF STUDENT RECORDS: ESSENTIAL INFORMATION FOR FACULTY & STAFF The Family Educational Rights and Privacy Act (FERPA) and UC policy restrict the disclosure of information from student records, allow students to opt out, create a private blog, or consider using the Collaborative Learning

  7. Post-Processing Free Spatio-Temporal Optical Random Number Generator Resilient to Hardware Failure and Signal Injection Attacks

    E-Print Network [OSTI]

    Mario Stip?evi?; John Bowers

    2014-10-09

    We present a random number generator based on quantum effects in photonic emission and detection. It is unique in simultaneous use of both spatial and temporal quantum information contained in the system which makes it resilient to hardware failure and signal injection attacks. We show that its deviation from randomness cam be estimated based on simple measurements. Generated numbers pass NIST Statistical test suite without post-processing.

  8. Integrity Under Attack: The State of Scholarly Publishing

    E-Print Network [OSTI]

    Arnold, Douglas N.

    Integrity Under Attack: The State of Scholarly Publishing By Douglas N. Arnold Scientific journals depend. Publications are used by universities, funding agencies, and others as a primary measure, and in the ranking of departments, institutions, even nations. With big rewards tied to publication

  9. Practical Attacks on Digital Signatures Using MD5 Message Digest

    E-Print Network [OSTI]

    Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department schemes based on MD5 message digest on an example using GPG. Keywords: collision, hash function, MD5 1 used for file integrity checking and as a message digest in digital signature schemes. During CRYPTO

  10. Congestion Attacks to Autonomous Cars Using Vehicular Botnets

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Congestion Attacks to Autonomous Cars Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre of the cars in the targeted area by orders of magnitude. After 5 minutes, the targeted road becomes completely prevent collisions. In a VANET, cars communicate with each other over a wireless channel. They can send

  11. Rootkits on Smart Phones: Attacks, Implications and Opportunities

    E-Print Network [OSTI]

    Iftode, Liviu

    Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford Ryan O Smart phones are increasingly being equipped with operating sys- tems that compare in complexity with those on desktop comput- ers. This trend makes smart phone operating systems vulnerable to many

  12. Smart-Phone Attacks and Defenses Chuanxiong Guo

    E-Print Network [OSTI]

    Wang, Bing

    Smart-Phone Attacks and Defenses Chuanxiong Guo xguo@ieee.org Microsoft Research Helen J. Wang smart-phones), and our environment (e.g., through the use of sensors, actuators, and RFIDs). While is becoming a reality: Smart-phones, interoperable between the telecom networks and the Inter- net

  13. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    E-Print Network [OSTI]

    Johnson, Aaron

    }@informatik.hu-berlin.de Abstract--Tor is a distributed onion-routing network used for achieving anonymity and resisting censorship and transferring roughly 3 GiB/s in aggregate [8]. Tor uses onion routing [25] to route clients' traffic throughThe Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen Florian

  14. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    E-Print Network [OSTI]

    }@informatik.hu-berlin.de Abstract--Tor is a distributed onion-routing network used for achieving anonymity and resisting censorshipB/s in aggregate [4]. Tor uses onion routing [5] to route clients' traffic through a circuit of geo- graphicallyThe Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen Florian

  15. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  16. Anti-discrimination Analysis Using Privacy Attack Strategies

    E-Print Network [OSTI]

    Ruggieri, Salvatore

    Anti-discrimination Analysis Using Privacy Attack Strategies Salvatore Ruggieri1 , Sara Hajian2 and Technology, Saudi Arabia Abstract. Social discrimination discovery from data is an important task to identify deploy privacy at- tack strategies as tools for discrimination discovery under hard assump- tions which

  17. Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins

    E-Print Network [OSTI]

    Perrig, Adrian

    Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins ¡ Adrian Perrig Ion hosts is denial- of-service (DoS) caused by IP packet floods. Hosts in the Internet are unable to stop ­ not the net- work ­ should be given control to respond to packet floods and overload. Ideally, hosts should

  18. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern systems are mon- itored and controlled by Supervisory Control and Data Ac- quisition (SCADA) systems

  19. Defending Synchrophasor Data Networks Against Traffic Analysis Attacks

    E-Print Network [OSTI]

    Sikdar, Biplab

    - tem. PMU data serves to facilitate a number of applications while enhancing others, such as real generation and distribution system, monitoring and manipulation of PMU data are particularly attractive of the PMU data measurement and collection network against a class of passive attacks and develops defense

  20. A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data

    E-Print Network [OSTI]

    Sikdar, Biplab

    in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number in the maintenance and control of the power generation and distribution system, monitoring and manipulation of PMU. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks

  1. Attacks based on Conditional Correlations against the Nonlinear Filter Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ­based keystream generator which could be used as a basic building block in a synchronous stream cipher system of a keystream generator (i.e. NLFG) in a synchronous secret key encryption and decryption system. 2 #12Attacks based on Conditional Correlations against the Nonlinear Filter Generator Bernhard L

  2. Combating Time Synchronization Attack: A Cross Layer Defense Mechanism

    E-Print Network [OSTI]

    Li, Husheng

    and Protection]: Physical Security 1. INTRODUCTION The security of smart grid has become an important research synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified re- cently. A cross the eectiveness of the pro- posed TSA detection algorithm. Categories and Subject Descriptors K.6.5 [Security

  3. How to help people who have heart attacks

    E-Print Network [OSTI]

    Lega, Joceline

    How to help people who have heart attacks Meghan McGovern Monday, December 03, 2012 #12;5 Heart-Lung Machine Extracorporeal Membrane Oxygenation #12;6 Electrocardiograph (ECG) #12;7 Artificial Hearts #12;8 Tissue Engineering O Researchers Rebuild Beating Heart with Cardiac Derived Cells! O January

  4. Reducing Attack Surfaces for Intra-Application Communication in Android

    E-Print Network [OSTI]

    Wagner, David

    Reducing Attack Surfaces for Intra-Application Communication in Android David Kantola, Erika Chin,emc,-w,daw}@berkeley.edu ABSTRACT The complexity of Android's message-passing system has led to numerous vulnerabilities in third-application communication mechanisms. Consequently, we propose modifications to the Android platform to detect and protect

  5. Attacks on Android Clipboard Xiao Zhang and Wenliang Du

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Attacks on Android Clipboard Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer perform a thorough study on the risks im- posed by the globally accessible Android Clipboard. Based briefly discuss some potential solutions. 1 Introduction Android was developed by Google in 2008

  6. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute without the contraint of special hardware and dependency on physical medium of wireless network. BAAP and router at the same time. Most of the previous research has focused on problems of routing

  7. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect (OSTI)

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  8. THE BLIND PATTERN MATCHING ATTACK ON WATERMARK SYSTEMS

    E-Print Network [OSTI]

    Petitcolas, Fabien A.P.

    complex- ity to reverse the permutations as a preprocessing step for watermark detection. In this paper, we describe the logistics of the attack and a recipe for its implementation against an audio be shown that any WM detector is facing a task of exponential complexity to reverse the permutations

  9. Insects and Related Pests Attacking Lawns and Ornamental Plants. 

    E-Print Network [OSTI]

    Almand, Lyndon K.; Thomas, John G.

    1968-01-01

    Lawns and 0 rnamental Plants i* - .* " TEXAS AIM UNIVERSITY ,I TEXAS AGRICULTURAL EXTENSION SERVIC ' ' 1. E. Hutchison. Director. College Station, Vixtis Photographs in this publication have two numbering series . Any figure number followed by a... small "a" refers to a colored illustration . All colored illustrations appear on pages 12 through 15 . PESTS ATTACKING LAWNS Sucking Pests Southern Chinch Bugs .................................................................................. 2...

  10. 29.01.03.M1.21 Information Resources -System Development and Acquisition Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.21 Information Resources - System Development and Acquisition Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.21 Information Resources ­ System Development and Acquisition Approved July Confidential Information - Information that must be protected from unauthorized disclosure or public release

  11. New Collision attacks Against Up To 24step SHA2 Somitra Kumar Sanadhya # and Palash Sarkar

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Applied Statistics Unit, Indian Statistical Institute, 203, B.T. Road, Kolkata, India 700108. somitra r. of India. #12; . The complexity of 24­step SHA­512 attack is improved in comparison to the existing attack

  12. Identification of Repeated Attacks Using Network Traffic Alefiya Hussain John Heidemann Christos Papadopoulos

    E-Print Network [OSTI]

    Heidemann, John

    trace multiple uses of a weapon to the same gun. Such evidence of repeated attacks would help establish only by reducing attack effectiveness. We designed a multi-dimensional maximum-likelihood classifier

  13. Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans

    E-Print Network [OSTI]

    Gurumurthi, Sudhanva

    Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans University thermal management alternative. Keywords: storage systems, security, thermal management, denial shut-down. Our new thermal attack on future storage systems is unrecognized by current Intrusion

  14. Automatic Creation of SQL Injection and Cross-Site Scripting Attacks

    E-Print Network [OSTI]

    Kiezun, Adam

    2008-09-10

    We present a technique for finding security vulnerabilitiesin Web applications. SQL Injection (SQLI) and cross-sitescripting (XSS) attacks are widespread forms of attackin which the attacker crafts the input to the application ...

  15. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    that the open nature of web browsers provides a feasible \\point of entry" for this attack via a corrupted plug of web-browser plug-ins could easily provide a \\point of entry" for chosen-plaintext attacks

  16. A spillway infrastructure for defense against Distributed Denial of Service attacks 

    E-Print Network [OSTI]

    Barkley, Andrew Holman

    2000-01-01

    Distributed Denial of Service (DDoS) attacks have proven to be disruptive forces on the Internet. There is currently no means of defense from such attacks, as they are exploitations of mechanisms that are critical for normal operation...

  17. Help Sheet: FERPA Reminders With some exceptions, FERPA prohibits instructors from disclosing academic information about a student contained

    E-Print Network [OSTI]

    Chu, Xi

    or she has waived this right. 7. Don't seek academic information about a student (e.g., student or her right to see it. 11. FERPA allows students to prohibit disclosure of all personal information academic information about a student contained in "educational records" (either deliberately

  18. Chosen Ciphertext Attack on SSS Joan Daemen1, Joseph Lano2 , and Bart Preneel2

    E-Print Network [OSTI]

    Bernstein, Daniel

    - cryption with DES in CFB mode was analyzed with respect to chosen ciphertext attacks in [7]. The stream

  19. Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy

    E-Print Network [OSTI]

    Boyd, Colin

    testbed. The testbed simulated actuators and sensors of a hydro-power system. The attacks using DNP3 were

  20. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  1. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  2. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris and Start (PKES) systems used in modern cars. We build two efficient and inexpensive attack realizations, wired and wireless physical-layer relays, that allow the attacker to en- ter and start a car by relaying

  3. An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato Entrust, Inc.mister,robert.zuccherato}@entrust.com Abstract. This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode for each block. Standard CFB mode encryption does not appear to be affected by this attack. It applies

  4. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses

    E-Print Network [OSTI]

    Saxena, Nitesh

    The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

  5. Pollution Attack Defense for Coding Based Sensor Levente Buttyan, Laszlo Czap, Istvan Vajda

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    Pollution Attack Defense for Coding Based Sensor Storage Levente Butty´an, L´aszl´o Czap, Istv to make network coding based storage secure against pollution attacks in sensor networks. The approach], [12], [13]. We present a scheme that resists pollution attacks, meaning that our scheme makes possible

  6. Dynamic Load Altering Attacks in Smart Grid Sajjad Amini, Hamed Mohsenian-Rad, and Fabio Pasqualetti

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    response and demand side management programs. It attempts to control and change certain unsecured is on attacks against demand re- sponse (DR) and demand side management (DSM) programs. DR programs are used}@ece.ucr.edu and fabiopas@engr.ucr.edu Abstract--A load altering attack (LAA) is a cyber-physical attack against demand

  7. Impacts of Bad Data and Cyber Attacks on Electricity Market Operations

    E-Print Network [OSTI]

    operations. In particular, we investigated the problem from perspectives of an attacker and the controlImpacts of Bad Data and Cyber Attacks on Electricity Market Operations Final Project Report Power;#12;Impacts of Bad Data and Cyber Attacks on Electricity Market Operations Final Project Report Project Team

  8. On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack Mohammad Reza Sohizadeh against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) pro- tocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive attacks proposed

  9. Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

    E-Print Network [OSTI]

    Nita-Rotaru, Cristina

    1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

  10. Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis Song Sun was publicly intro- duced, power analysis attacks on cryptographic systems have be- come an increasingly of power analysis attacks and preventative techniques on both software (e.g. smartcard, DSP) and hardware

  11. Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks

    E-Print Network [OSTI]

    Nam, Seung Yeob

    1 Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks Seung Yeob Nam, Member- tion Protocol (ARP) is proposed to prevent ARP poisoning-based Man-in-the-Middle (MITM) attacks deployable. Index Terms--ARP cache poisoning, Man-in-the-Middle attack, ARP poisoning prevention, voting. I

  12. Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ives, Zachary G.

    Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor in improving resilience against sinkhole attacks, even in the presence of some collusion. I. INTRODUCTION

  13. Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks

    E-Print Network [OSTI]

    Le Fessant, Fabrice - Institut national de recherche en informatique et en automatique, Centre de recherche INRIA Saclay

    Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor are effective in improving resilience against sinkhole attacks, even in the presence of some collusion. I

  14. Automatic Search of Attacks on round-reduced AES and Applications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Search of Attacks on round-reduced AES and Applications Charles Bouillaguet, Patrick of these tools, we show that they allow to automatically discover new attacks on round-reduced AES with very low to find better attacks, new automatic tools have been designed to automatically search either related

  15. Examples of the Generalized Quantum Permanent Compromise Attack to the Blum-Micali Construction

    E-Print Network [OSTI]

    Guedes, Elloá B; Lula, Bernardo

    2010-01-01

    This paper presents examples of the quantum permanent compromise attack to the Blum-Micali construction. Such attacks illustrate how a previous attack to the Blum-Micali generator can be extended to the whole Blum-Micali construction, including the Blum-Blum-Shub and Kaliski generators.

  16. Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Patrick Derbez and Léo cipher they designed, PRINCE. Instead of trying to attack as many rounds as possible using attacks which on round-reduced PRINCE includ- ing the ones which won the challenge in the 6 and 8-round categories

  17. ACADEMIC INFORMATION / COLLEGE POLICIES FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA)

    E-Print Network [OSTI]

    Sun, Yi

    ACADEMIC INFORMATION / COLLEGE POLICIES FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA) Pursuant, as Amended, you have the right to withhold the disclosure of the "Directory Information" listed below. Please to the Family Educational Rights and Privacy Act (FERPA) and the Board of Trustees of The City University of New

  18. Inference from non-disclosure Miles Gietzmann, Faculty of Finance, Cass

    E-Print Network [OSTI]

    Haase, Markus

    Cost of Equity Capital, Journal of Accounting Research, 40, (200), 21-40. Cousin, J.-G. and T. de will lead to a lower cost of capital However a number of seemingly anomalous results eg: Botosan & Plumlee (2002) ...nd ...rms that make more timely disclosures face an increased cost of capital relative

  19. Annual Confidential Financial Disclosure Report (OGE Form 450 or 450A)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-03

    This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN.

  20. Annual Confidential Financial Disclosure Report (OGE Form 450 or 450A)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-09-30

    This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN. (Note: It replaces DOE N 326.11, which expired 9-29-05.)

  1. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  2. Should There Be An Obligation of Disclosure of Origin of Genetic Resources in Patent Applications? Learning Lessons from Developing Countries 

    E-Print Network [OSTI]

    Laurie, Graeme

    2005-01-01

    The article discusses whether there should be an obligation of disclosure of origin of genetic resources in patent applications. In particular, Laurie comments on the evolving relations of the intellectual property world ...

  3. The Public Information Act exas Government Code, Chapter 552, gives you the right to access government records; and an officer for public

    E-Print Network [OSTI]

    The Public Information Act exas Government Code, Chapter 552, gives you the right to access, or information for which an exception to disclosure has not been sought. Rights of Requestors You have the right government records; and an officer for public information and the officer's agent may not ask why you want

  4. Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non-Repudiation Protocol

    E-Print Network [OSTI]

    Chen, Yu

    1 Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non security issues in cloud storage: repudiation, fairness, and roll-back attacks. We proposed a novel fair and is capable of preventing roll-back attacks. Keywords: Cloud Storage, Non-repudiation, Roll-back Attack. 1

  5. A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. LaPorta

    E-Print Network [OSTI]

    Yener, Aylin

    1 A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of Cross Infrastructure Cyber Attacks in addition to the standard Single

  6. Energy Benchmarking, Rating, and Disclosure for State Governments

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-23

    Provides information on how energy use data access can help state governments lead by example through benchmarking and disclosing results and implement benchmarking policies for the private sector.

  7. Energy Benchmarking, Rating, and Disclosure for Local Governments

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-23

    Provides information on how access to energy use data can help local governments create policies for benchmarking and disclosing building energy performance for public and private sector buildings.

  8. PRIVACY AND CONFIDENTIALITY OF PATIENT INFORMATION The University of Connecticut School of Medicine (UConn SOM) and affiliated sites establish

    E-Print Network [OSTI]

    Page 148 ` PRIVACY AND CONFIDENTIALITY OF PATIENT INFORMATION The University of Connecticut School patient information that is protected from disclosure by both Connecticut and federal laws in all respects with both Connecticut and federal laws, such as HIPAA. For the UConn Health's full policy

  9. Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks

    E-Print Network [OSTI]

    Ruj, Sushmita

    2015-01-01

    We model smart grids as complex interdependent networks, and study targeted attacks on smart grids for the first time. A smart grid consists of two networks: the power network and the communication network, interconnected by edges. Occurrence of failures (attacks) in one network triggers failures in the other network, and propagates in cascades across the networks. Such cascading failures can result in disintegration of either (or both) of the networks. Earlier works considered only random failures. In practical situations, an attacker is more likely to compromise nodes selectively. We study cascading failures in smart grids, where an attacker selectively compromises the nodes with probabilities proportional to their degrees; high degree nodes are compromised with higher probability. We mathematically analyze the sizes of the giant components of the networks under targeted attacks, and compare the results with the corresponding sizes under random attacks. We show that networks disintegrate faster for targeted...

  10. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks 

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22

    were killed and more than 1,200 were injured by deadly terrorist attacks on commuter trains and stations in Madrid. These attacks had an enormous impact on the citizens of Spain, as well as the entire international community. The Madrid bombings... in its ?War on Terror? may carry additional costs. One unanticipated effect of these attacks was the victory of the Socialists over the ruling Partido Popular party in Spain in the next election. More importantly, this occurrence led to a sharp...

  11. Practical realisation and elimination of an ECC-related software bug attack

    E-Print Network [OSTI]

    in modern e-business work-flows, are as follows: 1. Nguyen [28] described an attack on GPG version 1

  12. Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production

    E-Print Network [OSTI]

    Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production spasms, and other problems in the communities in which fracking occurs

  13. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  14. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Ning, Peng

    the measurements of meters at physically protected locations such as substations, such attacks can introduce of about 50 million people. The estimated total cost

  15. Annual Confidential Financial Disclosure Report (OGE Form 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-02-25

    This Notice amends DOE N 326.14 to add exemptions for NNSA employees who are now in pay bands. DOE N 326.14 contains information on who must file, when and where to file.

  16. The impact of written emotional disclosure on laboratory induced pain 

    E-Print Network [OSTI]

    Creech, Suzannah K.

    2005-11-01

    . In order to avoid expectancy effects, participants were informed we were interested in physiological reactivity. Participants were asked to sign the informed consent and then complete the Center for Epidemiological Study-Depression Scale (CES-D), Health... distress that may contribute to unwanted group differences. To do so, the Center for Epidemiological Studies-Depression Scale (CES-D; Radloff, 1977), a brief, 20-item questionnaire that taps into depression and 15 anxiety symptoms was filled out prior...

  17. Decentralized Approaches to Environmental Management Voluntary-and Information-Based

    E-Print Network [OSTI]

    Kotchen, Matthew J.

    . Along with the standard instruments of environmental policy--quantity, price, and technology regulations, third-party eco-labeling, and programs that provide "reputation" benefits in exchange for meeting volun- tary environmental standards. Information disclosure programs include the US Environmental Protection

  18. Complex networks vulnerability to module-based attacks

    E-Print Network [OSTI]

    da Cunha, Bruno Requião; Gonçalves, Sebastián

    2015-01-01

    In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaking complex networks is attracting much attention from practical points of view. In this contribution we present a module-based method to efficiently break complex networks. The procedure first identifies the communities in which the network can be represented, then it deletes the nodes (edges) that connect different modules by its order in the betweenness centrality ranking list. We illustrate the method by applying it to various well known examples of social, infrastructure, and biological networks. We show that the proposed method always outperforms vertex (edge) attacks which are based on the ranking of node (edge) degree or centrality, with a huge gain in efficiency for some examples. Remarkably, for the US power grid, the present method breaks the original network of 4941 nodes to many fragments smaller than 197 nodes (4% of the original size) by removing mere 164 nodes (~3%) identified by the procedure. B...

  19. Detecting SYN Flooding Attacks Haining Wang Danlu Zhang Kang G. Shin

    E-Print Network [OSTI]

    Wang, Haining

    Detecting SYN Flooding Attacks Haining Wang Danlu Zhang Kang G. Shin EECS Department a simple and robust mechanism for de- tecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding

  20. The Effect of Mountain Pine Beetle Attack and Salvage Harvesting On Streamflows

    E-Print Network [OSTI]

    Northern British Columbia, University of

    The Effect of Mountain Pine Beetle Attack and Salvage Harvesting On Streamflows Special ....................................................................................................................4 FRPA requirements for Water Management in MPB-attacked watersheds ..........5 The Baker Creek. These disturbances have potential effects on water yield (the total amount of water flowing out of a watershed

  1. Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon McCoy, Brian Kantor,

    E-Print Network [OSTI]

    Hu, Fei

    Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon Mc discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics, we discuss the structural characteristics of the automotive ecosystem that give rise to such problems

  2. On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack

    E-Print Network [OSTI]

    Wang, Xinyuan "Frank"

    ], Onion Routing [24], Tor [10], Hordes [28], Web Mixes [6], Tarzan [13]) have been proposed to disguise conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer measurements and timing attack results show that the circuit rotation in Tor network could significantly

  3. Distributed Internet-based Load Altering Attacks against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    management, cost-efficient load protection. I. INTRODUCTION The recent advancements in smart grid systemsDistributed Internet-based Load Altering Attacks against Smart Power Grids Amir-Hamed Mohsenian distribution system. Keywords: Smart grid security, Internet-based load altering attacks, demand side

  4. Integral Cryptanalysis on reduced-round A way to extend the attack?

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Integral Cryptanalysis on reduced-round Safer++ ­ A way to extend the attack? ­ Gilles Piret an integral distinguisher over 2 rounds of Safer++. It allows a practical attack against 3 rounds of Safer for further research in order to extend integral cryptanalysis. 1 Introduction The integral cryptanalysis (or

  5. CellFlood: Attacking Tor Onion Routers on the Cheap Marco V. Barbera1

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    . As a way to mitigate the effect of this attack, we propose to use a client puzzle-based technique the design and implementation of an effective solution to the problem that relies on cryptographic client]. Such an attack could be used to either significantly degrade the users' perceived quality of service, which would

  6. Practical Limitations of Sliding-Mode Switching Attacks on Smart Grid Systems

    E-Print Network [OSTI]

    Kundur, Deepa

    Practical Limitations of Sliding-Mode Switching Attacks on Smart Grid Systems Abdallah K. Farraj}@comm.utoronto.ca, klbutler@tamu.edu Abstract--Switching attacks in smart grid systems have gained some recent attention practical limitations. I. INTRODUCTION Smart grid systems have enjoyed a recent interest from both

  7. Friend or Flood? Social prevention of flooding attacks in mobile opportunistic networks

    E-Print Network [OSTI]

    Henderson, Tristan

    Friend or Flood? Social prevention of flooding attacks in mobile opportunistic networks Iain Parris. In this paper we define a simple flooding attack that can deny service in an opportunistic network. We simulate untraceably flood the network with spoofed messages. As the available resources of participating devices (e

  8. Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal University of Texas combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious important instance of this is the pollution problem: if some routers in the network are malicious

  9. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks

    E-Print Network [OSTI]

    Lui, John C.S.

    Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li: cslui@cse.cuhk.edu.hk Abstract--Pollution attack is a severe security problem in network-coding enabled spreading of polluted packets to deplete network resources. We address this security problem even when

  10. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA Yong Wang1 to the Supervisory Con- trol And Data Acquisition (SCADA) system. Several intrusion detection schemes have been-graph-based detection scheme to defeat false data injec- tion attacks at the SCADA system, even when injected data may

  11. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying. The defense taxonomy classifies the body of existing DDoS de- fenses based on their design decisions

  12. Static Fault Attack on Hardware DES Registers Philippe Loubet-Moundi, Francis Olivier, and David Vigilant

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Static Fault Attack on Hardware DES Registers Philippe Loubet-Moundi, Francis Olivier, and David deals with static faults which lie in between. A static fault modifies a value loaded in a volatile], quickly became a privileged target for DFA. #12;2 Static Fault Attacks on Hardware DES Registers Indeed

  13. On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong

    E-Print Network [OSTI]

    Youssef, Amr M.

    On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong Center for Applied attack, nite elds, Ga- lois Field Fourier Transform 1 Introduction Gong and Golomb 7 introduced a new the later by decimation d. Gong and Golomb showed that the distance of DES S-boxes approximated

  14. 2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks on a smart grid. Keywords: smart grid cyber security; cyber attack impact analysis; graph-based dynamical systems; smart and Computer Engineering at Texas A&M University. Her research interests include cyber security of the smart

  15. DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

    E-Print Network [OSTI]

    California at Davis, University of

    DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks Lihua Yuan ECE, UC Davis lyuan cache poisoning, which causes the DNS to return false name-to-IP mappings and can be used as a foothold inaccurate DNS records caused by cache poisoning attacks. DoX also helps DNS servers to improve cache

  16. Adaptive Network Defense Management for Countering Smart Attack and Selective Capture

    E-Print Network [OSTI]

    Cao, Yong

    , humidity, tempera- ture, electrical characteristics, and radiation. · Smart City [46]: A query-based WSN1 Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless network defense management for countering smart attack and se- lective capture which aim to cripple

  17. Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao and Gregory G. Rose Abstract At IEEE GLOBECOM 2008, a lightweight cipher based on a Multiple Recursive Generator (MRG plaintext attack is proposed to construct the cipher's current state and generate subkeys used for all

  18. Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao and Gregory G. Rose Abstract At IEEE GLOBECOM 2008, a lightweight cipher based on a Multiple Recursive Generator (MRG attack is proposed to construct the cipher's current state and generate subkeys used for all subsequent

  19. Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices

    E-Print Network [OSTI]

    Kundur, Deepa

    vehicles, and energy storage devices, and providing advanced load management strategies. To meet attack may cause device restoration delays. Data integrity attacks were also performed on a load management system in [6], in which a graph based dynamic system model was used to analyze the impact

  20. Differential Fault Attack on the PRINCE Block Ling Song, Lei Hu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Differential Fault Attack on the PRINCE Block Cipher Ling Song, Lei Hu State Key Laboratory {lsong,hu}@is.ac.cn Abstract. PRINCE is a new lightweight block cipher proposed at the ASIACRYPT'2012. Key words: lightweight cipher, PRINCE block cipher, differential fault attack 1 Introduction The idea

  1. Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework Zheng@mail.tsinghua.edu.cn Abstract. A new distinguishing attack on HMAC and NMAC based on a dedicated compression function framework. In ChinaCrypt2008, a new dedicated compression function framework (i.e. hash function H) and two

  2. Michigan State University CONSUMER DISCLOSURE AND AUTHORIZATION FORM

    E-Print Network [OSTI]

    , but are not limited to: social security number verifications; address history; credit reports and history; criminal records and history; public court records; driving records; accident history; worker's compensation claims standing. This information may be obtained from private and public record sources, including

  3. Inefficiencies in the Information Thicket: A Case Study of Derivative Disclosures During the Financial Crisis

    E-Print Network [OSTI]

    Bartlett, Robert P. III

    2010-01-01

    case of the California energy crisis, however, neither firmthe growing California energy crisis eventually sparkedinvolve the California energy crisis. None of them discussed

  4. RCW - 90.52 - Pollution Disclosure Act of 1971 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onRAPID/Geothermal/Exploration/Colorado <RAPID/Geothermal/Water Use/NevadaaTools < RAPID JumpControl8.60- 90.48 -2 -

  5. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  6. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  7. Golden Reading Room: FOIA Proactive Disclosures and Contracts | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data CenterFinancial Opportunities FinancialofInformationEnergyof Energy

  8. Rate of H2S and CO2 attack on pozzolan-amended Class H well cement...

    Office of Scientific and Technical Information (OSTI)

    Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Citation Details In-Document Search Title: Rate of H2S and CO2 attack on...

  9. Property Rights, Taxpayer Rights, and the Multiscalar Attack on the State: Consequences for Regionalism in the United States

    E-Print Network [OSTI]

    Christopher Niedt; Margaret Weir

    2007-01-01

    G.M. (2005) The Rights of Taxpayers and the Rights of AllProperty Rights, Taxpayer Rights, and the Multiscalar AttackProperty rights, taxpayer rights, and the multiscalar attack

  10. State and Local Energy Benchmarking and Disclosure Policy | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProjectDataSecretaryDepartment7 Annual2InformationState Energy|Review

  11. Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha, Jayan Krishnaswami

    E-Print Network [OSTI]

    Ha, Dong S.

    Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where

  12. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  13. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  14. Attack-Resistant Location Estimation in Sensor (Revised August 2005)

    E-Print Network [OSTI]

    Ning, Peng

    role in many sensor network applications. Not only do applications such as environment monitoring and target tracking require sensors' location information to fulfill their tasks, but several fundamental

  15. Plain Language Disclosure for Direct Subsidized Loans and Direct Unsubsidized Loans William D. Ford Federal Direct Loan Program

    E-Print Network [OSTI]

    Royer, Dana

    Plain Language Disclosure for Direct Subsidized Loans and Direct Unsubsidized Loans William D. Ford Subsidized Loan and/or Direct Unsubsidized Loan to help cover the costs of your education. This Plain to separate loans made under the MPN depending on whether the loan is subsidized or unsubsidized, when

  16. LEAD PAINT DISCLOSURE Housing built before 1978 may contain lead-based paint. Lead from paint, paint chips, and dust

    E-Print Network [OSTI]

    Royer, Dana

    LEAD PAINT DISCLOSURE Housing built before 1978 may contain lead-based paint. Lead from paint, paint chips, and dust can pose health hazards if not taken care of properly. Lead exposure is especially the presence of known lead-based paint and lead-based paint hazards in the dwelling. Tenants must also receive

  17. New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram DA-IICT Near Indroda Circle Gandhinagar-382007 INDIA anish mathuria@daiict.ac.in, g.sriram.248@gmail.com July 29, 2008

  18. Networked Control Systems under Cyber Attacks with Applications to Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    acquisition (SCADA) systems. Several cyber attacks on SCADA systems operating power networks have been reported [3], and major blackouts are due to the misuse of the SCADA systems [4]. Power networks, being

  19. Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks the Wheatstone bridge measurement setup. Here we propose to in- dividualize the electrical circuit of devices with individualized electrical circuit are individualized while providing the same functionality

  20. On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks

    E-Print Network [OSTI]

    Medard, Muriel

    Random linear network coding can be used in peer-to- peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We ...

  1. The Recent Attack of Nie et al On TTM is Faulty Nov 19.2006

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Recent Attack of Nie et al On TTM is Faulty T. Moh #3; Nov 19.2006 Abstract Recently there is a paper entitled "Breaking a New Instance of TTM Cryptosystem" by Xuyun Nie, Lei Hu, Jianyu Li, Crystal

  2. IEEE TRANSACTIONS ON SIGNAL PROCESSING: SPECIAL ISSUE ON DATA HIDING 1 Blind Pattern Matching Attack on

    E-Print Network [OSTI]

    Petitcolas, Fabien A.P.

    detector is facing a task of exponential complexity to reverse the permutations as a pre-processing step for watermark detection. In this paper, we describe the logistics of the attack and an implementation against

  3. gore: Routing-Assisted Defense Against DDoS Attacks Stephen T. Chou1

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    attackers identify "pinch points" in the communications infrastructure and render them inoperable of effective anti-DDoS technology by Internet Service Providers. An important one is the lack of financial

  4. An Experimentally Veried Attack on Full Grain-128 Using Dedicated Recongurable

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Experimentally Veried Attack on Full Grain-128 Using Dedicated Recongurable Hardware Itai Dinur-purpose hardware, i. e., computing machines dedicated to cryptana- lytical problems, have a long tradition in code

  5. Modeling experiments that simulate fragment attacks on cased munitions

    SciTech Connect (OSTI)

    Kerrisk, J.F.

    1996-01-01

    Roberts and Field (1993) have conducted experiments to observe the behavior of a cased high explosive (HE) charge subject to fragment attack at impact velocities below those needed for shock initiation. Two and three-dimensional hydrodynamic calculations have been done to model these experiments. Questions about the degree of confinement of the HE and about the condition of the HE during the impact were addressed. The calculations indicate that the HE was not strongly confined in this experiment, primarily due to the lateral expansion of polycarbonate blocks on the sides of the target during the impact. HE was not ejected from the hole in the casing made by the projectile up to 30 {micro}s after the impact. There are hints from these calculations of how initiation of a homogeneous sample of HE might occur in the experiment. The first involves the reshock of a small amount of HE at {approximately} 20 {micro}s as a result of the impact of the sabot on the target. The second involves the heating of the HE from plastic work during the impact. The maximum temperature rise of the HE (exclusive of the small region that was reshocked) was {approximately} 80 k. However, this is the average temperature of a region the size of a computational cell, and phenomena such as shear bands or cracks could result in higher temperatures on a smaller scale than the cell size. The third involves heating of the HE from contact with the casing material. The maximum temperature rise of the casing material from plastic work is {approximately} 870 k. This temperature occurs at the edge of a plug of casing material sheared off by the projectile. Other parts of the casing are shock heated to higher energies but may not contact the HE.

  6. THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER Mohammad Sadegh Nemati Nia1 University of Technology, Tehran, Iran (m_s_nemati; payandeh)@mut.ac.ir ABSTRACT SNOW 2.0 is a word oriented. The results of HGD attack on TIPSY, SNOW 1.0 and SNOW 2.0 stream ciphers led to less complexity rather than

  7. Secure estimation and control for cyber-physical systems under adversarial attacks

    E-Print Network [OSTI]

    Fawzi, Hamza; Diggavi, Suhas

    2012-01-01

    The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with the estimation and control of linear systems when some of the sensors or actuators are corrupted by an attacker. In the first part we look at the estimation problem where we characterize the resilience of a system to attacks and study the possibility of increasing its resilience by a change of parameters. We then propose an efficient algorithm to estimate the state despite the attacks and we characterize its performance. Our approach is inspired from the areas of error-correction over the reals and compressed sensing. In the second part we consider the problem of designing output-feedback controllers that stabilize the system despite attacks. We show that a principle of separation betwee...

  8. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  9. Quantifying Cyber-Resilience Against Resource-Exhaustion Attacks

    SciTech Connect (OSTI)

    Fink, Glenn A.; Griswold, Richard L.; Beech, Zachary W.

    2014-07-11

    Resilience in the information sciences is notoriously difficult to define much less to measure. But in mechanical engi- neering, the resilience of a substance is mathematically defined as the area under the stress vs. strain curve. We took inspiration from mechanics in an attempt to define resilience precisely for information systems. We first examine the meaning of resilience in language and engineering terms and then translate these definitions to information sciences. Then we tested our definitions of resilience for a very simple problem in networked queuing systems. We discuss lessons learned and make recommendations for using this approach in future work.

  10. Eavesdropping attacks on computer displays Markus G. Kuhn

    E-Print Network [OSTI]

    Kuhn, Markus

    Electromagnetic information leakage from computer displays was first demonstrated to the general public by van Eck for the return current. Opponents connected earth rods to portable valve amplifiers, in order to make the voltage

  11. Stealthy attacks and defense strategies in competing sensor networks 

    E-Print Network [OSTI]

    Czarlinska, Aleksandra

    2009-05-15

    The fundamental objective of sensor networks underpinning a variety of applications is the collection of reliable information from the surrounding environment. The correctness of the collected data is especially important in applications involving...

  12. Inteum is the database used by CURF to manage the technology transfer process, i.e. confidential invention disclosures, patents, licenses, etc.

    E-Print Network [OSTI]

    Stuart, Steven J.

    Inteum is the database used by CURF to manage the technology transfer process, i.e. confidential to the disclosure. The enhanced capability of Inventor Portal will greatly assist in CURF's technology evaluation

  13. INFORMATION SECURITY ATTACK TREE MODELING An Effective Approach for Enhancing Student Learning

    E-Print Network [OSTI]

    the engineering principle of Failure Mode and Effect Analysis (FMEA). The main goal of this principle, the project plan can be created more realistically. FMEA techniques [1] help to identify failure potential

  14. LUTHERAN THEOLOGICAL SEMINARY ~ Student Handbook ~

    E-Print Network [OSTI]

    Saskatchewan, University of

    ....................................................................................................................8 Academic Integrity ..............................................................................................................9 Disclosure of Student Personal Information

  15. A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS 

    E-Print Network [OSTI]

    Tadi, Krishna C.

    2010-01-16

    information about who administers an AS. The authors of [5] have proposed an algorithm which classifies the relationships with 99% accuracy. More than 90.5% of AS pairs in the Internet have customer-provider relationship, less than 1.5% of AS pairs have... mitigation system. They preselect several ASs and call them lifesaver ASs. In case of a hijack, a detection system notifies these lifesaver ASs with information about the hijacker AS, Victim AS and the victim prefix. All the lifesaver ASs attempt to purge...

  16. Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    E-Print Network [OSTI]

    Gupta, B B; Misra, Manoj

    2012-01-01

    Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. This paper reports the design principles and evaluation results of our proposed framework that autonomously detects and accurately characterizes a wide range of flooding DDoS attacks in ISP network. Attacks are detected by the constant monitoring of propagation of abrupt traffic changes inside ISP network. For this, a newly designed flow-volume based approach (FVBA) is used to construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic goes out of profile. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and a...

  17. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  18. ON THE OPTIMAL STRUCTURE OF WATERMARK DECODERS UNDER DESYNCHRONIZATION ATTACKS

    E-Print Network [OSTI]

    Moulin, Pierre

    for which the theory applies. Keywords: watermarking, data hiding, desynchronization, decod- ing, information theory, image processing. 1. INTRODUCTION One of the main difficulties in designing watermarking to limitations of cur- rent codes, or rather to fundamental limitations on achievable perfor- mance. This paper

  19. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  20. Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack

    E-Print Network [OSTI]

    Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2013-07-24

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

  1. Attack of fragmented-core debris on concrete in the presence of water. [PWR; BWR

    SciTech Connect (OSTI)

    Tarbell, W.W.; Bradley, D.R.

    1982-01-01

    In the unlikely event that core debris escapes the reactor pressure vessel, the interactions of the debris with concrete, structural materials, and coolant become the driving force for severe accident phenomena. The Ex-Vessel Core Debris Interactions Program at Sandia National Laboratories is an experimental research effort to characterize these interactions and the magnitude of safety-related phenomena such as flammable gas generation, aerosol production, fission product release, and concrete attack. Major areas of study within the program include molten core simultants in contact with concrete, high pressure melt streaming into scaled reactor cavities, the addition of coolant to high-temperature melt/concrete interactions, and the attack of hot, solid core debris on concrete. This paper describes results from the last of these efforts, i.e., hot, but not molten debris attacking concrete.

  2. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  3. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    E-Print Network [OSTI]

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  4. Ravaging the wine dark sea: attacks on Crete by sea raiders during the Bronze Age 

    E-Print Network [OSTI]

    Stewart, David James

    1997-01-01

    RAVAGING THK WINK DARK SEA: ATTACKS ON CRETE BY SEA RAIDERS DIJRING THE BRONZE AGE A Thesis by DAVID JAMES STEWART Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF ARTS May 1997 Major Subject: Anthropology RAVAGING THE WINE DARK SEA: ATTACKS ON CRETE BY SEA RAIDERS DURING THE BRONZE AGE A Thesis by DAVID JAMES STEWART Submitted to Texas A&M University in partial fulfillment of the requirements...

  5. Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    E-Print Network [OSTI]

    Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

    2011-04-01

    Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

  6. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications

    E-Print Network [OSTI]

    Yin, Heng

    Hijacking Attacks in Android Applications Mu Zhang Department of EECS Syracuse University muzhang of vulnerabilities commonly appearing in Android applications. When these vul- nerabilities are triggered on Android devices, on behalf of the attackers. It is often unrealis- tic to purely rely on developers to fix

  7. Extending the GHS Weil Descent Attack S.D. Galbraith, F. Hess and N.P. Smart

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Extending the GHS Weil Descent Attack S.D. Galbraith, F. Hess and N.P. Smart Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB, United due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack

  8. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 2, MARCH 2003 431 Some Attacks Against Vehicles' Passive Entry

    E-Print Network [OSTI]

    Mahmud, Syed Masud

    Terms--Passive entry systems, playback attack, remote keyless entry, two-thief attack, vehicle security of an automobile. The user was required to enter a unique digital code through the keypad to unlock or lock- hances user convenience, it still does not provide the full com- fort level. The user still has to search

  9. Islamists claim deadly attack on UN building in Nigeria 26 August 2011

    E-Print Network [OSTI]

    Islamists claim deadly attack on UN building in Nigeria 26 August 2011 Boko Haram says/AFP/Getty Images A car loaded with explosives crashed into the main United Nations' building in Nigeria's capital for the bombing, a major escalation of its sectarian fight against Nigeria's weak central government. The brazen

  10. Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins y Adrian Perrig Ion Stoica

    E-Print Network [OSTI]

    Perrig, Adrian

    Taming IP Packet Flooding Attacks #3; Karthik Lakshminarayanan Daniel Adkins y Adrian Perrig Ion hosts is denial­ of­service (DoS) caused by IP packet floods. Hosts in the Internet are unable to stop -- not the net­ work -- should be given control to respond to packet floods and overload. Ideally, hosts should

  11. Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash Adi by John Nash in the early 1950's but whose design was declassified by the NSA only in 2012. The main, John Nash. 1 Introduction John Nash is known today mostly for his seminal contributions to the field

  12. Touchjacking Attacks on Web in Android, iOS, and Windows Phone

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Touchjacking Attacks on Web in Android, iOS, and Windows Phone Tongbo Luo, Xing Jin, Ajai to interact with the Web, most mobile platforms, including Android, iOS, and Windows Phone, provide is called WebView in Android (it is called different names in other platforms). WebView im- plements

  13. A Data-Centric Approach to Insider Attack Detection in Database Systems

    E-Print Network [OSTI]

    Petropoulos, Michalis

    A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis the query expressions in prior approaches. Our data-centric approach is based on the key observation.): RAID 2010, LNCS 6307, pp. 382­401, 2010. c Springer-Verlag Berlin Heidelberg 2010 #12;A Data-Centric

  14. Evaluating Risk of Terrorist Attack on a Cable Stayed Bridge: A Probabilistic Structural

    E-Print Network [OSTI]

    Bhattacharya, Baidurya

    Evaluating Risk of Terrorist Attack on a Cable Stayed Bridge: A Probabilistic Structural Analysis and administrators are able to evaluate risks to infrastructure in their jurisdiction in a rational manner. This will enable them to take optimal actions to manage these risks given budgetary constraints. This paper

  15. Adaptive Flow Aggregation -A New Solution for Robust Flow Monitoring under Security Attacks

    E-Print Network [OSTI]

    Lui, John C.S.

    Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu.S. Lui Dept. of CSE Chinese University of Hong Kong Email: cslui@cse.cuhk.edu.hk Abstract-- Flow the resources (memory, export bandwidth or CPU) of the flow monitor. A standard solution is to do sampling (look

  16. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of Technology and Economics (BME) Abstract. Smart grids consist of suppliers, consumers, and other parts effort to protect these devices. This behavior was motivated by the special requirements in control

  17. Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang

    E-Print Network [OSTI]

    Wang, Haining

    Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang Department of Computer of servers being deployed in data centers, the data center power distribution systems have already approached peak capacities. Since the upgrades of the power systems are extremely expensive, power

  18. Robust Detection in the Presence of Integrity Attacks Yilin Mo, Jo~ao Hespanha, Bruno Sinopoli

    E-Print Network [OSTI]

    Hespanha, João Pedro

    Acquisition (SCADA) sys- tems, for example, implement the distributed control systems that run a wide range, facility control and power grids. A successful attack to SCADA systems may significantly hamper the economy, the environment, and may even lead to the loss of human life. The first-ever SCADA system malware (called Stuxnet

  19. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  20. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Young, R. Michael

    @cs.unc.edu Abstract--A power grid is a complex system connecting electric power generators to consumers through power estimate the power grid state through analysis of meter measure- ments and power system models. Various malicious attacks. I. INTRODUCTION A power grid is a complex system connecting a variety of electric power

  1. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-Print Network [OSTI]

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  2. TorScan: Tracing Long-lived Connections and Differential Scanning Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    successor of the original Onion Routing Project. The Tor network is a low-latency anonymity network whichTorScan: Tracing Long-lived Connections and Differential Scanning Attacks Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann University of Luxembourg Abstract. Tor is a widely used anonymity network

  3. Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel-correlation distinguishers as well as between zero-correlation and integral distinguishers, we analyze in this paper some of the round function, we show that we can not only find impossible, integral and multidimensional zero

  4. A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia

    E-Print Network [OSTI]

    Bullo, Francesco

    and biomedicine, telecommu- nications, and energy management. Due to their importance, cyber-physical systems, and monitoring systems. For instance, in [1, 5, 6, 7, 8] it is shown how attackers with access to sufficiently limited resources and full knowledge of the system dynamics and state. Conversely, if the monitoring re

  5. Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid Deepa Kundur analysis of a smart grid. We focus on the model synthesis stage in which both cyber and physical grid-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems. I

  6. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  7. Sensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks

    E-Print Network [OSTI]

    Levi, Albert

    network are discussed in [7]. Security, network bandwidth and power consumption in sensor networksSensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks Serdar Sancak@sabanciuniv.edu Abstract--Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets

  8. Passive faraday mirror attack in practical two-way quantum key distribution system

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2012-03-04

    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

  9. Securing Cloud Data in the New Attacker Model Ghassan O. Karame1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Securing Cloud Data in the New Attacker Model Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof to the ciphertext. This may be achieved, for example, using multi-cloud storage systems. These systems spread data tolerance. If the adversary can only compromise a subset of these domains, multi-cloud storage systems may

  10. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  11. Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    with great opportunities for raising the target facility energy consumption and consequently its green house green, energy- sustainable computing paradigms has gained a lot of attention in both the researchEvaluating Network-Based DoS Attacks Under the Energy Consumption Perspective New security issues

  12. Cyber Attack Detection in PMU Measurements via the Expectation-Maximization Algorithm

    E-Print Network [OSTI]

    Kundur, Deepa

    Cyber Attack Detection in PMU Measurements via the Expectation-Maximization Algorithm Dongchan Lee in phasor measurement unit (PMU) data using the expectation-maximization algorithm. Power systems today, such as solving the optimal power flow and system estimation problem. The availability of PMU data real-time has

  13. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    False Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu, Peng Ning@cs.unc.edu Abstract--A power grid is a complex system connecting electric power generators to consumers through power to ensure the reliable operation of power grids, and state estimation is used in system monitoring to best

  14. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  15. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  16. Towards Synthesis of Platform-aware Attack-Resilient Control Systems

    E-Print Network [OSTI]

    Pappas, George J.

    Towards Synthesis of Platform-aware Attack-Resilient Control Systems Extended Abstract Miroslav Over the past decade, the design process in the automotive indus- try has gone through a period, there is a current shift in vehicle architectures, from isolated control systems to more open automotive

  17. Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design

    E-Print Network [OSTI]

    Bhunia, Swarup

    Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design Xinmu Wang1 , Wen Yueh on the operating frequency due to RLC structure of a power grid. In this paper, we analyze the ef- fect of power grid on SCA and provide quantitative results to demonstrate the frequency-dependent SCA resistance due

  18. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in the confidentiality and integrity algorithms of the 3GPP (3rd Generation Partnership Project) mobile communications and integrity algo- rithms of the 3GPP (3rd Generation Partnership Project) [20] mobile communi- cations practical, and the authors could simulate the efficiency of their attack using a personal computer. Both

  19. Revisiting the BGE Attack on a White-Box AES Implementation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . White-box cryptography aims to protect the secret key of a cipher in an environment in which-box implementation of AES [5]. White-box cryptography aims to protect the confidentiality of the secret key device, or a set-top box. #12;In 2004, Billet et al. [3] presented an attack on the white-box AES

  20. Reaction Attacks on Public Key Cryptosystems Based on the Word Problem

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Mar#19;#16;a Isabel Gonz#19 for public key cryptosystems based on the hardness of the word problem for #12;nitely presented groups. In particular, the evidenced hardness of the classical problems for #12;nitely presented groups (the word

  1. A known plaintext attack on the ISAAC keystream generator Marina Pudovkina

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 A known plaintext attack on the ISAAC keystream generator Marina Pudovkina maripa are a requirement. The ISAAC keystream generator is a fast software-oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known

  2. A known plaintext attack on the ISAAC keystream generator Marina Pudovkina

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 A known plaintext attack on the ISAAC keystream generator Marina Pudovkina maripa are a requirement. The ISAAC keystream generator is a fast software­oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known

  3. A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    E-Print Network [OSTI]

    Levente, Buttyán

    can be used to ensure availability. Replication in it- self, however, is not enough against malicious server can be distinguished: bandwidth consumption at- tacks and resource consumption attacks overloaded and cannot accept requests from legitimate clients anymore. In a resource consumption at- tack

  4. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA

  5. TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

  6. "How many zombies do you know?" Using indirect survey methods to measure alien attacks and outbreaks

    E-Print Network [OSTI]

    Gelman, Andrew

    "How many zombies do you know?" Using indirect survey methods to measure alien attacks applicable to zombies or, for that matter, ghosts, aliens, angels, and other hard-to-reach entities; for example, what if your wife2 is actually a zombie or an alien and you are not aware of the fact. This 2

  7. Security Games with Surveillance Cost and Optimal Timing of Attack Execution

    E-Print Network [OSTI]

    Vorobeychik, Eugene

    of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Appears inSecurity Games with Surveillance Cost and Optimal Timing of Attack Execution Bo An1 , Matthew Brown Terms Algorithm, Security Keywords Game Theory, Security, Optimization, Stackelberg Games 1

  8. Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki1,2 1 Institute of Computer Science Abstract. The PRINCE cipher is the result of a cooperation between the Technical University of Denmark (DTU-latency encryption and instant response time. PRINCE has already gained a lot of attention from the academic

  9. Combating False Data Injection Attacks in Smart Grid Using Kalman Filter

    E-Print Network [OSTI]

    Cao, Xiaojun (Matt)

    Combating False Data Injection Attacks in Smart Grid Using Kalman Filter Kebina Manandhar Dept of South Florida Email: yliu@cse.usf.edu Abstract--The security of Smart Grid, being one of the very important aspects of the Smart Grid system, is studied in this paper. We first discuss different pitfalls

  10. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

    E-Print Network [OSTI]

    Shihan Sajeed; Igor Radchenko; Sarah Kaiser; Jean-Philippe Bourgoin; Anna Pappa; Laurent Monat; Matthieu Legre; Vadim Makarov

    2015-03-30

    The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD, we model both a strong attack using technology possible in principle, and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems, and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.

  11. On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in which the round keys are introduced by addition, to thwart single-bit or multi-bit DPA attacks- tion about twice slower). We prove lower bounds on the transparency order of highly nonlinear S

  12. Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee

    E-Print Network [OSTI]

    Snoeren, Alex

    Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan against three popular Web services, we high- light a new class of vulnerability that allows an attacker a pollution attack, that allows third parties to alter the customized content the services return to users who

  13. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank's server farms cannot safely omit a subset of the traffic from analysis. In this environment, Shunting cannot realize its main performance benefits, and the monitoring task likely calls for using custom hardware instead. However, in many other environments we find Shunting holds promise for delivering major performance gains. This arises due to the the widely documented 'heavy tail' nature of most forms of network traffic, which we might express as 'a few of the connections carry just about all the bytes.' The key additional insight is '... and very often for these few large connections, the very beginning of the connection contains nearly all the information of interest from a security analysis perspective.' We argue that this second claim holds because it is at the beginning of connections that authentication exchanges occur, data or file names and types are specified, request and reply status codes conveyed, and encryption is negotiated. Once these occur, we have seen most of the interesting facets of the dialog. Certainly the remainder of the connection might also yield some grist for analysis, but this is generally less likely, and thus if we want to lower analysis load at as small a loss as possible of information relevant to security analysis, we might best do so by skipping the bulk of large connections. In a different context, the 'Time Machine' work by Kornexl and colleagues likewise shows that in some environments we can realize major reductions in the volume of network traffic processed, by limiting the processing to the first 10-20 KB of each connection. As a concrete example, consider an IPS that monitors SSH traffic. When a new SSH connection arrives and the Shunt fails to find an entry for it in any of its tables (per-address, per-port, per-connection), it executes the default action of diverting the connection through the IPS. The IPS analyzes the beginning of the connection in this fashion. As long as it is satisified with the dialog, it reinjects the packets forwarded to it so that the connection can continue. If the connection successfully

  14. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  15. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  16. Comparing three models of attack and failure tolerance in electric power networks

    E-Print Network [OSTI]

    Hines, P; Blumsack, S

    2010-01-01

    In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in power systems, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss and blackout sizes. The first two are purely topological measures, following the procedure described by Albert et al. (2004). The blackout size calculation results from a simplified model of cascading failure in power networks. Tests with randomly selected sections of the Eastern US power grid indicate that in topological dynamics power grids are similar to random graphs, which is to be expected given the observed exponential degree distribution. However the connectivity loss model and the cascading failure model indicate that power grids behave more like scale free networks, in that they are acutely more vulnerable to directed attacks than random failures. These results suggest caution in drawing conclusi...

  17. Biology and control of thrips attacking cotton in the vicinity of College Station, Texas 

    E-Print Network [OSTI]

    Pfrimmer, Theodore Roscoe

    1953-01-01

    Advisor) May 1953 BIOLOGY AND CONTROL OF THRIE3 ATTACKING COTTON IK THE VICINITY OF COLIEGE STATION, TEXAS By THEODORE ROSCCE P iE M fR t \\ \\ A Dissertation Submitted, to the Graduate School of the Agricultural and Mechanical College of Texas... cages during 1950 . . . . . . . . . 69 3. Comparison of the dosage-mortality curves for the toxicities of several compounds, applied as dusts, against Frankliniella tritici and F. exigua in large cages during 1950 ............................ 70 4...

  18. Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    bogus messages, which will incur extra costs, thus exhaust the energy of the honest nodes. In additionS attacks, in which the goal of the adversary is to exhaust the energy of the sensor nodes and to increase or to redistribute to lists, requires prior specific permission and/or a fee. MobiHoc'07, September 9­14, 2007, Montr´eal

  19. Comparative toxicity studies of sulphur acaricides on two species of spider mites attacking cotton 

    E-Print Network [OSTI]

    Hallmark, Kenzy Donovan

    1954-01-01

    CONPARATIVE TOXICITY STUDIES OF SULFUH ACAHICIDES ON TWO SPECIE OF SPIDEH NITES ATTACKING COTTON KENZY DONOVAN HALLI&AHK A Thesis Submitted to the Graduate School oi' the Agricultural and 14echanlcal College of Texas in partial fulfillment... Ovotran- 13 Procedure Culturing technique- Dusting apparatus 1B 18 19 Spraying appsratus- Treatment procedure ?- Determination ef results ? - ? --- ? ? ? -?- hesults Conclusions- Literature Cited- 47 50 1 Results of laboratortJ' toxicity...

  20. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ã?Â?Ã?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  1. University of California, Berkeley Employee/Applicant Release and Disclosure Form

    E-Print Network [OSTI]

    California at Irvine, University of

    that position. Your background check may contain the following: Criminal records (fingerprints) Civil records a criminal conviction or other information relevant to that position you may be disqualified from holding this information and may solicit additional information so as to be informed of my previous record and character

  2. The ignition hazard to urban interiors during nuclear attack due to burning curtain fragments transported by blast 

    E-Print Network [OSTI]

    Goodale, Thomas

    There exists some uncertainty at present, in the formulation of civil defense doctrine, as to whether it is advisable for window curtains to be closed or open during nuclear attack. Closed curtains would be in position to ...

  3. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 645 Malicious Data Attacks on the Smart Grid

    E-Print Network [OSTI]

    Tong, Lang

    -time electricity markets. Also considered in this paper are countermeasures to mali- cious data attack widely reported that the U.S. electrical grid has been penetrated by cyber spies [1]. We consider

  4. Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't

    E-Print Network [OSTI]

    Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

    2008-01-01

    This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

  5. Attacking the Asokan-Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL 

    E-Print Network [OSTI]

    Steel, G.; Maidl, M.; Bundy, Alan

    We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols ...

  6. Compromising Tor Anonymity Exploiting P2P Information Leakage

    E-Print Network [OSTI]

    Castelluccia, Claude

    communications. Whereas the cryptographic foundations of Tor, based on onion- routing [4,5,6,7], are knownCompromising Tor Anonymity Exploiting P2P Information Leakage Pere Manils, Abdelberi Chaabane attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we

  7. China Urban Pollution Information Disclosure Study (CUPIDS) : socioeconomic implications of dirty industry and a guide to national cleandustrialization

    E-Print Network [OSTI]

    Chu, Yang, M.C.P. Massachusetts Institute of Technology

    2013-01-01

    It is now common knowledge that China's data is bad, and China's environment is polluted. In this paper I develop a simple pollution intensity index to test China's existing national and local environmental data, to answer ...

  8. Disclosure Concerning Lender Selection The suggested lenders for the 2014-2015 academic year were selected as a result of a Request for Proposal ("RFP") process

    E-Print Network [OSTI]

    Qian, Ning

    Disclosure Concerning Lender Selection 2014-2015 The suggested lenders for the 2014-2015 academic RFP to review the corresponding lender responses and select which lenders would be included on the University's suggested lender list for each loan type. The University issued each of the RFPs to 11 lenders

  9. Disclosure Concerning Lender Selection The suggested lenders for the 2015-2016 academic year were selected as a result of a Request for Proposal ("RFP") process

    E-Print Network [OSTI]

    Qian, Ning

    Disclosure Concerning Lender Selection 2015-2016 The suggested lenders for the 2015-2016 academic RFP to review the corresponding lender responses and select which lenders would be included on the University's suggested lender list for each loan type. University senior management reviewed the committee

  10. Energy Benchmarking, Rating, and Disclosure for Regulators of Ratepayer-Funded Programs

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-23

    Provides information on how supporting access to building benchmarking data can help utilities increase efficiency and drive down energy demand.

  11. A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan; Mashayekh, Salman; Kundur, Deepa; Zourntos, Takis; Butler-Purry, Karen

    2014-01-02

    - gency response,’’ in Proc. Summer Comput. Simul. Conf., Jul. 2007, pp. 1230–1237. [3] B. Rozel, M. Viziteu, R. Caire, N. Hadjsaid, and J.-P. Rognon, ‘‘Towards a common model for studying critical infrastructure interdependencies,’’ in Proc. IEEE Power.... IEEE Power Syst. Conf. Exposit., Mar. 2009, pp. 1–6. [5] J. Stamp, A. McIntyre, and B. Ricardson, ‘‘Reliability impacts from cyber attack on electric power systems,’’ in Proc. IEEE Power Syst. Conf. Exposit., Mar. 2009, pp. 1–8. [6] S. Sheng, W. L. Chan...

  12. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

  13. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    SciTech Connect (OSTI)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  14. Essays on the Mobile App Platform Choice and Firm Innovation Disclosure

    E-Print Network [OSTI]

    Liu, Yongdong

    2015-01-01

    techniques for big data problems and computationallyburden caused by the big data problem is addressed through arich information of the big data guarantees a very accurate

  15. Design of a high angle of attack robotic sting mount for tests in a low speed wind tunnel 

    E-Print Network [OSTI]

    Kubler, Tommy Jack

    1989-01-01

    DESIGN OF A HIGH ANGLE OF ATTACK ROBOTIC STING MOUNT FOR TESTS IN A LOW SPEED WIND TUNNEL A Thesis by TOMMY JACK KUBLER Submitted to the Oflice of Graduate Studies of Texas AJcM University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE August 1989 Major Subject: Aerospace Engineering DESIGN OF A HIGH ANGLE OF ATTACK ROBOTIC STING MOUNT FOR TESTS IN A IOW SPEED WIND TUNNEL A Thesis bv TOMMY JACK KHBLER Approved as to style and content by: Thomas C...

  16. Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01

    A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified in the first part of this paper. A cross layer detection mechanism is proposed to combat TSA in part II of this paper. In the physical layer, we propose a GPS carrier signal noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

  17. How Credit Market Conditions Impact the Effect of Voluntary Disclosure on Firms' Cost of Debt Capital 

    E-Print Network [OSTI]

    Scott, Bret

    2012-10-19

    Prior literature finds that firms incur a lower cost of debt capital when they voluntarily disclose information. However, the economic literature demonstrates that creditors' lending standards become more stringent (lax) when credit is rationed...

  18. The relative use of form 8-k disclosures: a trading response analysis 

    E-Print Network [OSTI]

    McLelland, Andrew John

    2004-09-30

    Prior research suggests that the use of accounting information differs substantially by investor class. My analysis extends this line of research to the area of SEC Form 8-K filings. Prior research also provides mixed ...

  19. SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    deployed in contexts where #12;side-channel attacks are a threat. For example, smart-phones now house multi constraints such as energy efficiency, market forces will drive increased use of similar components over time. The challenges of evaluation and countermeasure in- strumentation already motivate such work, but are arguably

  20. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems

    E-Print Network [OSTI]

    Sekar, R.

    such as those due to worms, these protection mechanisms lead to re- peated restarts of the victim application- ploit the same vulnerability. An important benefit of self-healing is that it avoids system resources]. Although these techniques can de- tect attacks before vital system resources (such as files

  1. Detection and Identification of Data Attacks in Power System Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    the attacked transmission lines. I. INTRODUCTION A. SCADA System and State Estimation A modern society relies is supervised and control through the Supervisory Control And Data Acquisition (SCADA) systems. SCADA systems on State Estimation SCADA systems measure data through remote terminal units (RTUs) all over the grid

  2. A Formal Model for Verifying the Impact of Stealthy Attacks on Optimal Power Flow in Power Grids

    E-Print Network [OSTI]

    Wang, Yongge

    - mal Power Flow; Formal Model 1. INTRODUCTION Power system control centers employ a numberA Formal Model for Verifying the Impact of Stealthy Attacks on Optimal Power Flow in Power Grids the integrity of OPF and undermine the economic and secure system operation. We present a formal verification

  3. IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading

    E-Print Network [OSTI]

    Kundur, Deepa

    components using variable structure system theory. Here, an opponent is able to remotely control multiple, sliding mode theory, smart grid attacks, variable structure system modeling. I. INTRODUCTION I T IS WELL commerce, entertainment, and social interac- tions has led to improved functionality and efficiency

  4. The average detection probability of the quantum dialogue protocol under the disturbance attack is 3/4

    E-Print Network [OSTI]

    Nguyen Ba An

    2004-06-24

    We prove explicitly that the detection probability of the disturbance attack in the recently proposed quantum dialogue protocol is 3/4 in average. The purpose is not only to reply a comment but also to provide a deeper understanding of a kind of tampering in an unauthorized communication.

  5. Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 Fangguo Zhang of Wollongong, NSW 2522 Australia {fangguo, rei, wsusilo}@uow.edu.au Abstract. At the fourth ACM conference for construction of ID-based cryptographic schemes. At the fourth ACM conference on electronic commerce (EC'03), S

  6. Proc. 10th ACM Conf. on Principles of Distributed Systems, August 1991 1 How To Withstand Mobile Virus Attacks

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Virus Attacks Extended Abstract Rafail Ostrovsky Moti Yungy Abstract We initiate a study of distributed, analogous to a spread of a virus or a worm. We show how local computations (at each processor) and global in the computation. 1 Introduction Computer viruses pose one of the central problems in distributed computing today

  7. Proc. 10th ACM Conf. on Principles of Distributed Systems, August 1991 1 How To Withstand Mobile Virus Attacks

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Virus Attacks Extended Abstract Rafail Ostrovsky \\Lambda Moti Yung y Abstract We initiate a study the network, analogous to a spread of a virus or a worm. We show how local computations (at each processor redundancy in the computation. 1 Introduction Computer viruses pose one of the central problems

  8. Eclipse Attacks on Bitcoin's Peer-to-Peer Network Ethan Heilman Alison Kendler Aviv Zohar Sharon Goldberg

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , selfish mining, and adversarial forks in the blockchain. We take a detailed look at bitcoin's peer- to-of-work to reach consensus on a distributed public ledger of transactions, aka., the blockchain. Satoshi Nakamoto [52] argues that bitcoin is secure against attackers that seek to shift the blockchain

  9. 372 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 Sybil Attacks and Their Defenses

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    372 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 Sybil Attacks and Their Defenses in the Internet of Things Kuan Zhang, Student Member, IEEE, Xiaohui Liang, Member, IEEE, Rongxing Lu, Member, IEEE, and Xuemin Shen, Fellow, IEEE Abstract--The emerging Internet-of-Things (IoT) are vulnera- ble to Sybil

  10. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    SciTech Connect (OSTI)

    Medina, Richard M [ORNL; Siebeneck, Laura K. [University of Utah; Hepner, George F. [University of Utah

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  11. William and Mary Athletics Camp Employee Disclosure and Background Release Form

    E-Print Network [OSTI]

    Lewis, Robert Michael

    _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ Camp employee candidates may be required to disclose requested criminal records, job history and other information and must undergo a background check, including a criminal history or criminal conviction check and consented for the College of William and Mary (W&M) to conduct a criminal background check on you within

  12. On Disclosure Risk Analysis of Anonymized Itemsets in the Presence of Prior Knowledge 1

    E-Print Network [OSTI]

    Ng, Raymond T.

    is the anonymized data". We consider both the scenarios when the hacker has no infor- mation, and more realistically, when the hacker may have partial information about items in the domain. We conduct our analyses are the identities of individual items cracked (i.e. reidentified by the hacker), and (ii) how likely are sets

  13. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other two. The fate of tritium in the attack depended on its chemistry. Any tritium present in the vicinity of jet-fuel explosion or fire would convert to HTO. The molecular tritium is also known to quickly exchange with water adsorbed on surfaces at ambient temperatures. Therefore, the end product of reacted tritium was HTO. A part of it would disperse into the atmosphere and a part would remain on site. The dynamic aspect of HTO removal was investigated taking into a consideration water flow at ground zero. Most of ground zero is encircled by the Slurry Wall, 70 ft deep underground, called a Bathtub. Approximately three million gallons of water were hosed on site in the fire-fighting efforts, and 1 million gallons fell as rainwater, between 9/11 and 9/21 (the day of the reported measurement). The combined water percolated through the debris down to the bottom of the Bathtub dissolving and removing HTO with it. That water would meet and combine with the estimated 26 million gallons of water that leaked from the Hudson River as well as broken mains, during the same period of 10 days after the attack. The combined water was collecting in the PATH train tunnel and continuously being pumped out to prevent flooding. A %Box model of water flow was developed to describe the above scenario. Considering the uncertainty in the amount of tritium present from sources other than the aircraft, as well as the dynamic character of tritium removal from the site, it is feasible to provide only a qualitative picture of the fate and behavior of tritium at WTC with the limited experimental data available. If the time history of tritium concentration at WTC had been measured, this study could have been a tracer study of water flow at WTC possibly useful to civil engineering.

  14. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    E-Print Network [OSTI]

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  15. Information Cartography 1 Information Cartography

    E-Print Network [OSTI]

    Old, L. John

    Information Cartography 1 Information Cartography · The use of Geographic Information Systems (GIS) to visualize non- geographic data · Utilizes Geographic Information Science to develop models and organize information--not an art form · Used to build information maps. Information maps consist of a landscape (base

  16. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  17. Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter Chun-Ying Huang, Kuan-Ta Chen, and Chin-Laung Lei

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    -Ta Chen, and Chin-Laung Lei National Taiwan University Department of Electrical Engineering No.1, Sec. 4 attack is behavior that deliberately scans, probes, or intrudes on certain hosts or networks with mali

  18. New J. Phys. 17 (2015) 023049 doi:10.1088/1367-2630/17/2/023049 Percolation of localized attack on complex networks

    E-Print Network [OSTI]

    Stanley, H. Eugene

    2015-01-01

    for Polymer Studies and Department of Physics, Boston University, Boston, MA 02215, USA 2 Department the effects of earthquakes, floods, or military attacks on infrastructure networks and the effects

  19. PROJECTED IMPACT OF SULFATE ATTACK ON THE LONG-TERM PERFORMANCE OF A CONCRETE REPOSITORY

    SciTech Connect (OSTI)

    Flach, G.

    2009-12-11

    Saltstone is a cementitious waste form made by mixing salt solution originating from liquid waste storage tanks at the DOE Savannah River Site with a dry mix containing blast furnace slag, fly ash, and cement or lime. The wet mix is poured into a concrete repository for on-site disposal. Solidified Saltstone is a dense, alkaline, reducing, micro-porous, monolithic, cementitious matrix, containing a solution of salts within its pore structure. Sodium sulfate concentrations in the pore fluid are around 0.15 mol/L, and external sulfate attack on concrete barriers is expected to occur over time. To predict the long-term performance of concrete repositories, the STADIUM{reg_sign} code was used to simulate the reactive transport processes leading to formation of ettringite, an expansive mineral phase often associated with spalling or cracking. STADIUM{reg_sign} is a multi-ionic transport model based on a split operator approach that separates ionic movement and chemical reactions. Ionic transport is described by the extended Nernst-Planck equation for unsaturated media, and accounts for electrical coupling between ionic species, chemical activity, transport due to water content gradient, and temperature effects. STADIUM{reg_sign} does not predict whether physical damage will occur, or the impact on transport properties should fracturing occur. Thus the presence of ettringite was assumed to coincide with physical damage for the purpose of estimating effective transport properties. Effective properties for concrete barriers were estimated assuming complete hydraulic failure behind the ettringite front and unaltered properties ahead of the front. The ettringite front advances at a rate dependent on the diffusion coefficient assumed for the failed zone. A sensitivity study indicates a service life ranging from thousands to tens of thousands of years, depending on the barrier thickness and sulfate exposure conditions among other factors.

  20. To: SIMON FRASER UNIVERSITY NON-DISCLOSURE AGREEMENT REQUEST Office of Research Services (Fax: 778-782-3477)

    E-Print Network [OSTI]

    Kavanagh, Karen L.

    an ownership interest in the Information or a right to require it be kept confidential? Yes No - Details: __________________________________________________________________________ Any other parties: (attach another page with details if necessary) Nature of Information and Confidentiality Requirements: Information to be shared (e.g. Confidential Information, Trade Secret, Other

  1. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    9 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation In Ubiquitous Environments Mohamed Aymen Chalouf1 make the concerned communications vulnerable to security attacks because of the open medium on which

  2. GLOSSARY OF INFORMATION SECURITY THREATS Computer any electronic device used for storing, processing and transmitting data according

    E-Print Network [OSTI]

    Sun, Yi

    a computer virus. Can appear to be a legitimate program or system resource. WormGLOSSARY OF INFORMATION SECURITY THREATS Computer · any electronic device used or damage your computer. Pharming ·(aka Vishing) a hacker's attack aiming to redirect

  3. FINANCIAL INFORMATION 45 Information

    E-Print Network [OSTI]

    Xie,Jiang (Linda)

    for Tuition Purposes. Copies of the Manual are available for inspection in the Library and the Residency twelve (12) months immediately prior to classification as a resident for tuition purposes. In order meets their needs. Payment plan options and additional information can be found at http

  4. New Collision attacks Against Up To 24-step SHA-2 Somitra Kumar Sanadhya and Palash Sarkar

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Statistics Unit, Indian Statistical Institute, 203, B.T. Road, Kolkata, India 700108. somitra r]. This author is supported by the Ministry of Information Technology, Govt. of India. #12;· The complexity of 24

  5. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasil’nikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors – from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelial–mesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK – the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the level of AMPK phosphorylation may be considered as predictors of the tumor sensitivity to anti-angiogenic drugs. - Highlights: • Snail1 protects breast cancer cells from hypoxia. • Protective effect of Snail1 is mediated via ?-catenin/HIF-1 pathway. • Snail/?-catenin signaling is negatively controlled by the energy sensor – AMPK. • The failure in AMPK phosphorylation drives cells to the hypoxia-tolerant state.

  6. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  7. Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    and 192, 256-bit key AES for TOP SECRET information [19]. In the last ten years AES has been subject 197 [18]. In June 2003 the US government has approved the use of 128, 192, 256 bit key AES for SECRET block. We concatenate four such local collisions together and add another 6-round trail on top in order

  8. Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Heung-Yeung Shum2 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic, and then points out some basic design principles. Two general structures of secure human-computer identification protocol are investigated in detail. Although the usability of the proposed protocol is not yet

  9. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergyInformationVulnerabilities to ClimateEnergy Transformation in

  10. Preinvention disclosure meeting

    E-Print Network [OSTI]

    Yang, Eui-Hyeok

    Committee * Patent Application? No Yes Optional Return to Inventor(s) No SIT interest Return to inventor(s) with recommendation for resubmittal Yes Provisional Application Non Provisional (Utility) Application Inventor prepares "as- is" provisional patent application form OIE Feedback and Review Inventor meets with patent

  11. OMB Burden Disclosure Statement

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -DepartmentAvailable forSite |n t78 I.(NationalOE'sOHAOLEDREDUCEJ

  12. US Equities Disclosures

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979Coal Consumers inYear JanSales Type: Sales120 US ENC

  13. General Information

    National Nuclear Security Administration (NNSA)

    Site Waste Profile Sheet - Revision 0 - February 27, 2012 (Log No. 2012-048) A. Generator Information 1. Company name: ...

  14. Protecting Free and Open Communications on the Internet Against Man-in-the-middle Attacks on Third-party Software: We're FOCI'd

    E-Print Network [OSTI]

    Crandall, Jedidiah R.

    -party Software: We're FOCI'd Jeffrey Knockel Dept. of Computer Science University of New Mexico jeffk@cs.unm.edu Jedidiah R. Crandall Dept. of Computer Science University of New Mexico crandall@cs.unm.edu Abstract corruption attacks. In the context of free and open communications on the Internet (FOCI), it is important

  15. Attacks and Security Proofs of EAX-Prime Kazuhiko Minematsu1, Stefan Lucks2, Hiraku Morita3, and Tetsu Iwata4

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ) specified by ANSI C12.22 as a standard security function for Smart Grid. EAX is based on EAX proposedAttacks and Security Proofs of EAX-Prime Kazuhiko Minematsu1, Stefan Lucks2, Hiraku Morita3 by Bellare, Rogaway, and Wagner. While EAX has a proof of security based on the pseudorandomness

  16. Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer (Agrilus planipennis Fairmaire) by Don Cipollini, a professor at Wright State University in Ohio

    E-Print Network [OSTI]

    Pittendrigh, Barry

    Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer been collected in areas where the abundance of dead ash trees suggest that local populations of EAB. To date, despite the loss of over 50 million ash trees in areas where lilac, privet and fringe trees

  17. Information Technology: American National Standard for Information

    E-Print Network [OSTI]

    Information Technology: American National Standard for Information Systems-- Data Format 500-275 Information Technology: American National Standard for Information Systems-- Data Format Coleman, and Patrice Yuh, Editors Sponsored by Information Access Division Information Technology

  18. Information Technology: American National Standard for Information

    E-Print Network [OSTI]

    Information Technology: American National Standard for Information Systems-- Data Format-271 Information Technology: American National Standard for Information Systems-- Data Format for the Interchange Sponsored by Information Access Division Information Technology Laboratory National Institute of Standards

  19. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  20. Information Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Science and Technology (ASIS&T) American Society for Indexing (ASI) Digital Library Federation (DLF) National Archives and Records Administration (NARA) Special...

  1. ELECTRICAL & INFORMATION

    E-Print Network [OSTI]

    Wagner, Stephan

    of energy and smarter management of the system. These are called Smart Grids. A number of research projects in the creation of three overarching research thrusts: Energy, Information and Systems. All the activities Engineering Research Group has a number of current research interests. INFORMATION ENERGY SYSTEMS #12

  2. EVALUATION OF SULFATE ATTACK ON SALTSTONE VAULT CONCRETE AND SALTSTONESIMCO TECHNOLOGIES, INC. PART1 FINAL REPORT

    SciTech Connect (OSTI)

    Langton, C

    2008-08-19

    This report summarizes the preliminary results of a durability analysis performed by SIMCO Technologies Inc. to assess the effects of contacting saltstone Vaults 1/4 and Disposal Unit 2 concretes with highly alkaline solutions containing high concentrations of dissolved sulfate. The STADIUM{reg_sign} code and data from two surrogate concretes which are similar to the Vaults 1/4 and Disposal Unit 2 concretes were used in the preliminary durability analysis. Simulation results for these surrogate concrete mixes are provided in this report. The STADIUM{reg_sign} code will be re-run using transport properties measured for the SRS Vaults 1/4 and Disposal Unit 2 concrete samples after SIMCO personnel complete characterization testing on samples of these materials. Simulation results which utilize properties measured for samples of Vaults 1/4 and Disposal Unit 2 concretes will be provided in Revision 1 of this report after property data become available. The modeling performed to date provided the following information on two concrete mixes that will be used to support the Saltstone PA: (1) Relationship between the rate of advancement of the sulfate front (depth of sulfate ion penetration into the concrete) and the rate of change of the concrete permeability and diffusivity. (2) Relationship between the sulfate ion concentration in the corrosive leachate and the rate of the sulfate front progression. (3) Equation describing the change in hydraulic properties (hydraulic conductivity and diffusivity) as a function of sulfate ion concentration in the corrosive leachate. These results have been incorporated into the current Saltstone PA analysis by G. Flach (Flach, 2008). In addition, samples of the Saltstone Vaults 1/4 and Disposal Unit 2 concretes have been prepared by SIMCO Technologies, Inc. Transport and physical properties for these materials are currently being measured and sulfate exposure testing to three high alkaline, high sulfate leachates provided by SRNL is underway to validate the predicted results. Samples of saltstone were also prepared and will be evaluated for durability using the STADIUM{reg_sign} code and SIMCO methodology. Results available as of August 15 are included in this draft report. A complete set of results for saltstone will be available by December 31, 2008.

  3. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  4. Technical Information 

    E-Print Network [OSTI]

    Unknown

    2011-08-17

    Research shows that people have difficulty forgetting inferences they make after reading a passage, even when the information that the inferences are based on is later known to be untrue. This dissertation examined the effects of these inferences...

  5. Applicant Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Assistant Josefina Salazar Email Request more information Email The Los Alamos Space Weather Summer School program is open to U.S. and foreign graduate students enrolled in a PhD...

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  7. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  8. Litigation against public companies that fail to disclose timely information

    E-Print Network [OSTI]

    Leong, Hein Hing

    2014-01-01

    Every year, between 150 and 200 class action lawsuits are filed against public listed companies in the United States. When disclosure of the lawsuits is made to the investing public, the stock prices of these companies ...

  9. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  10. PROTECTING SENSITIVE INFORMATION TRANSMITTED

    E-Print Network [OSTI]

    INFORMATION TRANSMITTED IN PUBLIC NETWORKS Shirley Radack, EditorShirley Radack, Editor Computer Security DivisionComputer Security Division Information Technology LaboratoryInformation Technology Laboratory to the overall security of an organization's information and information systems. The Information Technology

  11. An Information Theoretic Location Verification System for Wireless Networks

    E-Print Network [OSTI]

    Yan, Shihao; Nevat, Ido; Peters, Gareth W

    2012-01-01

    As location-based applications become ubiquitous in emerging wireless networks, Location Verification Systems (LVS) are of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the threshold used in the detection of a spoofed location can be optimized in terms of the mutual information between the input and output data of the LVS. In order to verify the legitimacy of our analytical framework we have carried out detailed numerical simulations. Our simulations mimic the practical scenario where a system deployed using our framework must make a binary Yes/No "malicious decision" to each snapshot of the signal strength values obtained by base stations. The comparison between simulation and analysis shows excellent agreement. Our optimized LVS framework provides a defence against location spoofing attacks in emerging wireless networks such as those envisioned for Intelligent Transport Systems, wh...

  12. Information theoretic security by the laws of classical physics

    E-Print Network [OSTI]

    Mingesz, R; Gingl, Z; Granqvist, C G; Wen, H; Peper, F; Eubank, T; Schmera, G

    2013-01-01

    It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  14. Information Sciences

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR THEVorticesInformation Resources3 Information

  15. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence of Topological Spin0 Information

  16. Attacks on Emerging Architectures

    E-Print Network [OSTI]

    Hanna, Steven Craig

    2012-01-01

    In International Symposium on Software Testing and Analysis,International symposium on Software testing and analysis,testing of javascript web applications. In Proceedings of the 33rd International Conference on Software

  17. Insects Attacking Vegetable Crops. 

    E-Print Network [OSTI]

    Newton, Weldon H.; Deer, James A.; Hamman, Philip J.; Wolfenbarger, Dan A.; Harding, James A.; Schuster, Michael F.

    1964-01-01

    Confronting the Unknown: Tejanas in the Transformation of Spanish and Mexican Texas, 1735-1836 sheds light on Tejana legal and social roles in this tumultuous period. Despite great strides in the field of Borderlands history ...

  18. Some Fungi Attacking Corn

    E-Print Network [OSTI]

    Haslam, Thomas Powell

    1910-01-01

    . R - raceme - X 96. S - sporophore - X 96. , -43- PLATE X I I . Macor erectus: M - mycelium. K - conidium formation. P L A T E XII -44- Trichoderma lignorium. Trichoderma lignorium has been found occurring abundantly in a few fields in Riley... of the Penioillium and the large amount of filamentous growth between the grains readily distinguish it from Penioillium glaucum. -45- PLATE XIII. Trichoderma lignorium: M - mycelium. C - conidia. P L A T E XIII -46- PLATE 117. Trichoderma lignorium: 36...

  19. Patterns of heart attacks

    E-Print Network [OSTI]

    Shenk, Kimberly N

    2010-01-01

    Myocardial infarction is a derivative of heart disease that is a growing concern in the United States today. With heart disease becoming increasingly predominant, it is important to not only take steps toward preventing ...

  20. Insects Attacking Forage Crops. 

    E-Print Network [OSTI]

    Randolph, N. M.; Garner, C. F.

    1961-01-01

    lropean Corn Borer. ~d Clover ! rer ............ ................... ,talk Bore1 ootstock \\ Borer ....... ....................................................... 17 Veevil ............................................. 17... ........................................................ 17 ........................................................ I7 >sser Corns garcane R over Stem ~twortns ..... . - ................... rer.. ............ 3rm.. ........... ........ Seed-Corn Maggot Sweet Clover Root Bo Sou tllern Corn R...

  1. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  2. The Artist's Resale Royalty Right: Overcoming the Information Problem

    E-Print Network [OSTI]

    Turner, Stephanie B.

    2012-01-01

    integrity, and resale royalties, as well as protections against misattribution, excessive criticism, and attacks on the creator's personality."

  3. Networks, Information andNetworks, Information and Information Worker ProductivityInformation Worker Productivity

    E-Print Network [OSTI]

    Reif, Rafael

    Yahoo! - July 28, 2006 © 2006 All Rights Reserved Information and Non-Information Work1 Networks, Information andNetworks, Information and Information Worker ProductivityInformationEmployment Source: Wolff (2005) Information Work Non - Information Work 70% of labor force; 60% of GDP of US (Apte

  4. Approximate Information Theory

    E-Print Network [OSTI]

    Penny, Will

    Approximate Inference Will Penny Information Theory Information Entropy Kullback-Liebler Divergence Approximate Inference Will Penny 31st March 2011 #12;Approximate Inference Will Penny Information Theory Will Penny Information Theory Information Entropy Kullback-Liebler Divergence Gaussians Asymmetry

  5. Mathematics Information

    E-Print Network [OSTI]

    Lyuu, Yuh-Dauh

    Discrete Mathematics Lecture Notes Yuh-Dauh Lyuu Dept. Computer Science & Information Engineering and Combination #15; n! = n #1; (n 1) #1; #1; #1; 1. #15; (Stirling's formula) n! #25; p 2#25;n (n=e) n and n of Approximation to n! 200 400 600 800 1.0002 1.0004 1.0006 1.0008 n! over approximation 7 #12; Proof of Stirling

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  7. General Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journal Article)ForthcomingGENERALProblemsGeneral Information General

  8. Personal Information Request Request for Personal Information

    E-Print Network [OSTI]

    deYoung, Brad

    Personal Information Request Request for Personal Information Request for Correction of Personal Information Personal information on this form is collected under Newfoundland and Labrador's Access to Information and Protection of Privacy (ATIPP) Act and will be used to respond to a request for, or correction

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  11. Computing Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAuditsCluster Compatibilitydefault Changes TheComputeComputingInformation From

  12. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeat Pumps Heat Pumpsfacility doe logoInIndustry @Information

  13. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive HolidayHours UsedFire DepartmentLogistics

  14. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive HolidayHours UsedFire

  15. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence of Topological Spin0

  16. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence of Topological Spin02

  17. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence of Topological Spin023

  18. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence of Topological Spin0234

  19. Local Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResourcelogo and-E CChinaC L S C OLocal Information Local

  20. Update Information

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home PageMonthly","10/2015"4,"Ames5 Tables July 1996 Energy Information Administration Office of Coal,Demand Module of theCubicEstimation Results for PAD Districts

  1. Information science is neither

    E-Print Network [OSTI]

    Furner, J

    2015-01-01

    of library and information sciences, 3rd ed. , edited byAmerican Society for Information Science and Technology 63,Annual Review of Information Science and Technology 41, no.

  2. Information Technology and Libraries

    E-Print Network [OSTI]

    Hubble, Ann; Murphy, Deborah A.; Perry, Susan Chesley

    2011-01-01

    Sue Chesley Perry 196 INFORMATION TECHNOLOGY AND LIBRARIES |LITA - Library & Information Technology Association). ”Two of the 190 INFORMATION TECHNOLOGY AND LIBRARIES |

  3. National Environmental Information Infrastructure

    E-Print Network [OSTI]

    Greenslade, Diana

    National Environmental Information Infrastructure: Reference Architecture Contributing to the Australian Government National Plan for Environmental Information initiative #12;National Environmental Information Infrastructure: Reference Architecture v1.1 Environmental Information Programme Publication Series

  4. Variational Information Theory

    E-Print Network [OSTI]

    Penny, Will

    Variational Inference Will Penny Information Theory Information Entropy Kullback-Liebler Divergence Summary References Variational Inference Will Penny Bayesian Inference Course, WTCN, UCL, March 2013 #12;Variational Inference Will Penny Information Theory Information Entropy Kullback-Liebler Divergence Gaussians

  5. An Information Calculus for Information Retrieval

    E-Print Network [OSTI]

    Jose, Joemon M.

    An Information Calculus for Information Retrieval C.J. van Rijsbergen Computing Science Department not whistle it in mathematics either' Introduction In the beginning there was information, later there was probability, and very much later there was logic. Information is and always has been an elusive concept

  6. Information Governance Freedom of Information Request Form

    E-Print Network [OSTI]

    Romano, Daniela

    Information Governance Freedom of Information Request Form foi@salford.ac.uk http://www.infogov.salford.ac.uk Details of the applicant Name: Address: Post code: Tel. No.: Email: Description of information requested Please provide a description of the information you would like to receive, please be as specific

  7. PUBLIC INFORMATION ANNEX I -PUBLIC INFORMATION

    E-Print Network [OSTI]

    ANNEX I PUBLIC INFORMATION #12;ANNEX I - PUBLIC INFORMATION 11/12/2013 v. 2.0 Page I-1 PROMULGATION STATEMENT Annex I: Public Information, and contents within, is a guide to how the University maintains public information during an incident. The Annex is written in support of the Texas A&M University (TAMU

  8. March 23, 2008 Databases: Information Systems 1 Information Systems

    E-Print Network [OSTI]

    Adam, Salah

    March 23, 2008 Databases: Information Systems 1 Information Systems #12;March 23, 2008 Databases: Information Systems 2 Objectives What is an Information System (IS) + Classification of Information Systems + Evolution of Information Systems + Information System Management + Performance Requirements of ISs + #12

  9. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  10. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Well, what are the manifestations of insecurities?insecurities? Virus/WormsVirus/Worms Denial of serviceIt''s all about the softwares all about the software ""Behind every computer security problem andBehind every computer security problem and malicious attack lies a common enemymalicious attack lies a common

  11. Critical Materials Institute - invention disclosures

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent Bonding in Actinide SandwichCray era Craycourse-inventory en

  12. invention disclosures | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservationBio-Inspired SolarAboutXu Named| PrincetondefaultBuildingsFacilitiesinvention

  13. info disclosure-rocky mts

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p u t y A s s i s t a n t S e c r e t a r y J u l i o F r i

  14. Technical Proposal Disclosure Policy - ITER

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliersmillion coreChallenges inProposal

  15. Introduction to Information Theory

    E-Print Network [OSTI]

    Belohlavek, Radim

    Introduction to Information Theory and Its Applications Radim Belohl´avek Dept. Computer Science providing introduction to Information Theory. Radim Belohl´avek, Introduction to Information Theory and Its Applications 1 #12;Information Theory: What and Why · information: one of key terms in our society

  16. From Signal Information Processing

    E-Print Network [OSTI]

    From Signal to Information Processing Don H. Johnson Computer and Information Technology Institute of signals o Here, all signals are assumed to be stochastic information source information encoder Information extraction systems--determining a from X(a)--fall into two categories h Classification: Which

  17. Developing information-space Confidence Building Measures (CBMs) between India and Pakistan

    SciTech Connect (OSTI)

    Yamin, Tughral

    2014-06-01

    The Internet has changed the world in ways hitherto unknown. The international financial system, air, land and maritime transport systems are all digitally linked. Similarly most militaries are fully or partially networked. This has not only sped up the decision making processes at all levels, it has also rendered these systems vulnerable to cyber-attacks. Cyber-warfare is now recognized as the most potent form of non-kinetic war fighting. In order to prevent large scale network-attacks, cyber-powers are simultaneously spending a lot of time, money and effort to erect redundant cyber-defenses and enhancing their offensive cyber capabilities. Difficulties in creating a stable environment in information-space stem from differing national perceptions regarding the freedom of the Internet, application of international law and problems associated with attribution. This paper discusses a range of Confidence Building Measures that can be created between India and Pakistan in information-space to control malicious cyber behavior and avert an inadvertent war.

  18. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  19. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  20. Emergency Information Desk Reference

    E-Print Network [OSTI]

    Gopalakrishnan, K.

    Emergency Information Desk Reference ECU Police Department ECU Environmental Health & Safety Revised Feb 2012 #12;Emergency Information Desk Reference 2 INTRODUCTION Emergencies, accidents, and injuries can occur at any time and without warning. ECU has designed this emergency information desk