National Library of Energy BETA

Sample records for lifecycle attack protection

  1. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |

  2. Protecting Mobile Devices From TCP Flooding Attacks

    E-Print Network [OSTI]

    Fu, Xiaoming

    against these kinds of attack · Waking up the device by sending random SYN packets will exhaust-holes for server ports doesn't prevent against battery exhaustion and spectrum waste · Some P2P applications (e.g., Skype) have mechanism built into protocol to traverse such firewalls, but not all of them do. · Our Goal

  3. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  4. Lifecycle Model

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-05-21

    This chapter describes the lifecycle model used for the Departmental software engineering methodology.

  5. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of Technology and Economics (BME) Abstract. Smart grids consist of suppliers, consumers, and other parts effort to protect these devices. This behavior was motivated by the special requirements in control

  6. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-Print Network [OSTI]

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  7. HANFORD RIVER PROTECTION PROJECT ENHANCED MISSION PLANNING THROUGH INNOVATIVE TOOLS LIFECYCLE COST MODELING AND AQUEOUS THERMODYNAMIC MODELING - 12134

    SciTech Connect (OSTI)

    PIERSON KL; MEINERT FL

    2012-01-26

    Two notable modeling efforts within the Hanford Tank Waste Operations Simulator (HTWOS) are currently underway to (1) increase the robustness of the underlying chemistry approximations through the development and implementation of an aqueous thermodynamic model, and (2) add enhanced planning capabilities to the HTWOS model through development and incorporation of the lifecycle cost model (LCM). Since even seemingly small changes in apparent waste composition or treatment parameters can result in large changes in quantities of high-level waste (HLW) and low-activity waste (LAW) glass, mission duration or lifecycle cost, a solubility model that more accurately depicts the phases and concentrations of constituents in tank waste is required. The LCM enables evaluation of the interactions of proposed changes on lifecycle mission costs, which is critical for decision makers.

  8. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01

    08 Lifecycle Analyses of Biofuels Draft Report (May be citedLIFECYCLE ANALYSES OF BIOFUELS Draft manuscript (may belifecycle analysis (LCA) of biofuels for transportation has

  9. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasil’nikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors – from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelial–mesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK – the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the level of AMPK phosphorylation may be considered as predictors of the tumor sensitivity to anti-angiogenic drugs. - Highlights: • Snail1 protects breast cancer cells from hypoxia. • Protective effect of Snail1 is mediated via ?-catenin/HIF-1 pathway. • Snail/?-catenin signaling is negatively controlled by the energy sensor – AMPK. • The failure in AMPK phosphorylation drives cells to the hypoxia-tolerant state.

  10. PROTECT YOURSELF AGAINST PHISHING ATTACKS Phishing is a cunning attempt by hackers to solicit, steal and mishandle users' personal information (e.g.

    E-Print Network [OSTI]

    Johnson Jr.,, Ray

    PROTECT YOURSELF AGAINST PHISHING ATTACKS Phishing is a cunning attempt by hackers to solicit willingly supply the requested data, hackers gain access to their accounts and then engage in malicious

  11. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  12. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    SciTech Connect (OSTI)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  13. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01

    Balances for a Range of Biofuel Options, Project Number8. F UELCYCLE EMISSIONS FOR BIOFUEL VEHICLES IN DIFFERENTch. and LEM % ch. For a few biofuel lifecycles there can be

  14. Life-cycle Assessment of Semiconductors

    E-Print Network [OSTI]

    Boyd, Sarah B.

    2009-01-01

    4 Life-cycle Assessment of CMOS Logic5 Life-cycle Assessment of Flash Memory6 Life-cycle Assessment of Dynamic Random Access Memory

  15. Convective Cloud Lifecycles Lunchtime seminar

    E-Print Network [OSTI]

    Plant, Robert

    Convective Cloud Lifecycles Lunchtime seminar 19th May 2009 Bob Plant Department of Meteorology, University of Reading, UK #12;Introduction Obtain life cycle statistics for clouds in CRM simulations Why Conclusions Convective Cloud Lifecycles ­ p.1/3 #12;Why bother? Convective Cloud Lifecycles ­ p.2/3 #12;Some

  16. Vehicle Manufacturing Futures in Transportation Life-cycle Assessment

    E-Print Network [OSTI]

    Chester, Mikhail; Horvath, Arpad

    2011-01-01

    2006)] SimaPro Life-Cycle Assessment Software by Productin Transportation Life-cycle Assessment Mikhail Chester andin Transportation Life-cycle Assessment Mikhail Chester

  17. Geographically Differentiated Life-cycle Impact Assessment of Human Health

    E-Print Network [OSTI]

    Humbert, Sebastien

    2009-01-01

    schemes adopted in life-cycle assessment, such as archetypeshealth response in life-cycle assessment using ED10s andmanagement: Life-cycle assessment: Principles and framework.

  18. The maturity of Product Lifecycle Management in Dutch organizations

    E-Print Network [OSTI]

    Utrecht, Universiteit

    The maturity of Product Lifecycle Management in Dutch organizations A strategic alignment MANAGEMENT IN DUTCH ORGANIZATIONS A STRATEGIC ALIGNMENT PERSPECTIVE Abstract Product Lifecycle Management: product lifecycle management (PLM), strategic alignment, capability maturity, benchmarking, competitive

  19. Geographically Differentiated Life-cycle Impact Assessment of Human Health

    E-Print Network [OSTI]

    Humbert, Sebastien

    2009-01-01

    schemes adopted in life-cycle assessment, such as archetypeshealth response in life-cycle assessment using ED10s andglobal warming in life-cycle assessment based on damages to

  20. Expeditious Data Center Sustainability, Flow, and Temperature Modeling: Life-Cycle Exergy Consumption Combined with a Potential Flow Based, Rankine Vortex Superposed, Predictive Method

    E-Print Network [OSTI]

    Lettieri, David

    2012-01-01

    Life-cycle assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .life-cycle assessment . . . . . . . . . . . . . . . . . . . . . . . . . .28 Exergetic life-cycle assessment . . . . . . . .

  1. Expeditious Data Center Sustainability, Flow, and Temperature Modeling: Life-Cycle Exergy Consumption Combined with a Potential Flow Based, Rankine Vortex Superposed, Predictive Method

    E-Print Network [OSTI]

    Lettieri, David

    2012-01-01

    Life-cycle assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Methodology iii Life-Cycle Assessment (LCA) . . . . . . .life-cycle assessment . . . . . . . . . . . . . . . . . . . . . . . . . .

  2. Protecting Free and Open Communications on the Internet Against Man-in-the-middle Attacks on Third-party Software: We're FOCI'd

    E-Print Network [OSTI]

    Crandall, Jedidiah R.

    -party Software: We're FOCI'd Jeffrey Knockel Dept. of Computer Science University of New Mexico jeffk@cs.unm.edu Jedidiah R. Crandall Dept. of Computer Science University of New Mexico crandall@cs.unm.edu Abstract corruption attacks. In the context of free and open communications on the Internet (FOCI), it is important

  3. Analysis and Defense of Emerging Malware Attacks 

    E-Print Network [OSTI]

    Xu, Zhaoyan

    2014-05-28

    to perform effectively and efficiently targeted malware analysis. Second, this dissertation studies a new trend of massive malware intrusion and proposes a new protection scheme to proactively defend malware attack. Lastly, our focus is new P2P malware. We...

  4. GREET Life-Cycle Analysis of Biofuels

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    J Han, MQ Wang. "Life-cycle energy use and greenhouse gas emissions of production of bioethanol from sorghum in the United States." 2013. Biotechnology for Biofuels, 6:141. * Z...

  5. On environmental lifecycle assessment for policy selection

    E-Print Network [OSTI]

    Rajagopal, Deepak

    2010-01-01

    environ- mental life-cycle assessment. Environmental ScienceTime and scale in Life Cycle Assessment: the case of fuelK.G. Cassman. Life cycle assessment of biofuel greenhouse

  6. Life-Cycle Analysis of Geothermal Technologies

    Broader source: Energy.gov [DOE]

    The results and tools from this project will help GTP and stakeholders determine and communicate GT energy and GHG benefits and water impacts. The life-cycle analysis (LCA) approach is taken to address these effects.

  7. On environmental lifecycle assessment for policy selection

    E-Print Network [OSTI]

    Rajagopal, Deepak

    2010-01-01

    environ- mental life-cycle assessment. Environmental ScienceK.G. Cassman. Life cycle assessment of biofuel greenhouseSpath and M.K. Mann. Life cycle assessment of a natural gas

  8. Life-Cycle Analysis Results of Geothermal Systems in Comparison...

    Office of Environmental Management (EM)

    Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems A...

  9. Life-Cycle Analysis Results of Geothermal Systems in Comparison...

    Broader source: Energy.gov (indexed) [DOE]

    hydrothermal flash, and hydrothermal binary technologies. lifecycleanalysisofgeothermalsystemsdraft.pdf More Documents & Publications Life-Cycle Analysis Results of...

  10. Life-Cycle Analysis Results of Geothermal Systems in Comparison...

    Broader source: Energy.gov (indexed) [DOE]

    hydrothermal flash, and hydrothermal binary technologies. lifecycleanalysisofgeothermalsystems.pdf More Documents & Publications Life-Cycle Analysis Results of...

  11. Automating Threat Modeling through the Software Development Life-Cycle

    E-Print Network [OSTI]

    Miller, Barton P.

    in the development life-cycle reduces its cost dramati- cally. Companies doing software development know this realityAutomating Threat Modeling through the Software Development Life-Cycle Guifr´e Ruiz1 , Elisa process through the development life-cycle. It does not require developers to have any security training

  12. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  13. Poster: Measuring the Lifecycles of Malicious Domains

    E-Print Network [OSTI]

    Li, Kang

    the lifecycles of malicious domain names will provide insight into the many classes of criminal networks- measures such as blacklisting. Fast-flux is characterized by domain name records with low (time other types of criminal networks abuse the DNS and leverage domain names to provide agility

  14. Electric Vehicle Lifecycle Cost Assessment for Hawaii

    E-Print Network [OSTI]

    to residential solar photovoltaic (PV) power to reducing EV ownership costs. In this work, extensions are made substantially brings down the cost of EV ownership, even considering the capital expenditure for PV panelsElectric Vehicle Lifecycle Cost Assessment for Hawaii Dr. Makena Coffman Dr. Paul Bernstein

  15. LIFECYCLE ASSESSMENT AND ECONOMIC EVALUATION OF RECYCLING

    E-Print Network [OSTI]

    Bateman, Ian J.

    entails significant environmental impacts. This study compares the relative environmental impacts is then extended to incorporate an economic evaluation of the environmental impacts. This combination of lifecycle and evaluates the environmental impacts of a product from the acquisition of raw materials, through manufacture

  16. A LIFECYCLE ASSESSMENT AND EVALUATION OF

    E-Print Network [OSTI]

    Bateman, Ian J.

    A LIFECYCLE ASSESSMENT AND EVALUATION OF CONSTRUCTION AND DEMOLITION WASTE by Amelia Craighill, social and economic impacts of alternative methods of managing construction and demolition waste. Seventy million tonnes per year of the total UK waste arises from the construction industry, and whilst some

  17. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  18. Lifecycle Cost Analysis of Hydrogen Versus Other Technologies...

    Energy Savers [EERE]

    storage applications compared with three other storage technologies: batteries, pumped hydro, and compressed air energy storage (CAES). PDF icon Lifecycle Cost Analysis of...

  19. Divergence and Lifecycle Offsets in Product Families with Commonality

    E-Print Network [OSTI]

    de Weck, Olivier L.

    of seven complex product families that span the aerospace, automotive, semiconductor capital equipment: commonality; platform strategy; platform management; product development; divergence; lifecycle offsets 1

  20. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Ning, Peng

    the measurements of meters at physically protected locations such as substations, such attacks can introduce of about 50 million people. The estimated total cost

  1. Lifecycle Analysis of Air Quality Impacts of Hydrogen and Gasoline Transportation Fuel Pathways

    E-Print Network [OSTI]

    Wang, Guihua

    2008-01-01

    ITS-RR-08-28 Lifecycle Analysis of Air Quality Impacts ofEngineering Lifecycle Analysis of Air Quality Impacts ofa regional lifecycle analysis of air quality impacts is

  2. Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures Guillaume Barbu1. Until 2009, Java Cards have been mainly threatened by Log- ical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code

  3. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Grids”, IEEE Transactions on Smart Grid, vol. 2, no. 2,Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  4. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  5. Life-cycle assessment of NAND flash memory

    E-Print Network [OSTI]

    Boyd, Sarah; Horvath, A; Dornfeld, David

    2010-01-01

    information for life cycle assessment,” Journal of ChemicalInternational Journal of Life Cycle Assessment, vol. 11, no.to final publication. LIFE-CYCLE ASSESSMENT OF NAND FLASH

  6. Paper Number Whole Lifecycle Electrical Design Analysis in Foresight

    E-Print Network [OSTI]

    Snooke, Neal

    and Effects Analysis (FMEA) or Sneak Circuit Analysis (SCA) is typically carried out once in the lifecycle techniques have been developed. FMEA. Failure mode and effects analysis considers the effect on an overall

  7. Parallel Processing for Business Artifacts with Declarative Lifecycles

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    Research Center, USA Abstract. The business artifact (a.k.a. business entity) approach to modeling artifacts (a.k.a. business entities with lifecycles) are emerging as an important conceptual basis

  8. Lifecycle-analysis for heavy vehicles.

    SciTech Connect (OSTI)

    Gaines, L.

    1998-04-16

    Various alternative fuels and improved engine and vehicle systems have been proposed in order to reduce emissions and energy use associated with heavy vehicles (predominantly trucks). For example, oil companies have proposed improved methods for converting natural gas to zero-aromatics, zero-sulfur diesel fuel via the Fischer-Tropsch process. Major heavy-duty diesel engine companies are working on ways to simultaneously reduce particulate-matter and NOX emissions. The trend in heavy vehicles is toward use of lightweight materials, tires with lower rolling resistance, and treatments to reduce aerodynamic drag. In this paper, we compare the Mecycle energy use and emissions from trucks using selected alternatives, such as Fisher-Tropsch diesel fuel and advanced fuel-efficient engines. We consider heavy-duty, Class 8 tractor-semitrailer combinations for this analysis. The total life cycle includes production and recycling of the vehicle itself, extraction, processing, and transportation of the fuel itself, and vehicle operation and maintenance. Energy use is considered in toto, as well as those portions that are imported, domestic, and renewable. Emissions of interest include greenhouse gases and criteria pollutants. Angonne's Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model is used to generate per-vehicle fuel cycle impacts. Energy use and emissions for materials manufacturing and vehicle disposal are estimated by means of materials information from Argonne studies. We conclude that there are trade-offs among impacts. For example, the lowest fossil energy use does not necessarily result in lowest total energy use, and lower tailpipe emissions may not necessarily result in lower lifecycle emissions of all criteria pollutants.

  9. A Life-Cycle Assessment Comparing Select Gas-to-Liquid Fuels...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A Life-Cycle Assessment Comparing Select Gas-to-Liquid Fuels with Conventional Fuels in the Transportation Sector A Life-Cycle Assessment Comparing Select Gas-to-Liquid Fuels with...

  10. Guidance on Life-Cycle Cost Analysis Required by Executive Order...

    Energy Savers [EERE]

    Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123 Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123 Guide describes the clarification of...

  11. Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current,...

  12. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Handbook describes the annual...

  13. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Environmental Management (EM)

    2 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Report provides tables of present-value factors for use in the life-cycle cost analysis of capital...

  14. Life-Cycle Water Impacts of U.S. Transportation Fuels

    E-Print Network [OSTI]

    Scown, Corinne Donahue

    2010-01-01

    in Minnesota, Life Cycle Assessment IX, Boston, MA, 2009;Eatmon, T. D. A Life-Cycle Assessment of Portland CementAssessment, and Life-Cycle Assessment. Proceedings of the

  15. Lifecycle Assessment of Beijing-Area Building Energy Use and Emissions: Summary Findings and Policy Applications

    E-Print Network [OSTI]

    Aden, Nathaniel

    2010-01-01

    IZ, et al. 2009. “Life cycle assessment in buildings: State-S, et al. 2006. "Life-cycle Assessment of Office BuildingsA. (2006) "Life-cycle Assessment of Office Buildings in

  16. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions...

  17. Commissioning tools for life-cycle building performance assurance

    SciTech Connect (OSTI)

    Piette, M.A.

    1996-05-01

    This paper discusses information systems for building life-cycle performance analysis and the use of computer-based commissioning tools within this context. There are many reasons why buildings do not perform in practice as well as intended at the design stage. One reason is the lack of commissioning. A second reason is that design intent is not well documented, and performance targets for building components and systems are not well specified. Thus, criteria for defining verification and functional tests is unclear. A third reason is that critical information is often lost throughout the building life-cycle, which causes problems such as misunderstanding of operational characteristics and sequences and reduced overall performance. The life-cycle building performance analysis tools project discussed in this paper are focused on chillers and cooling systems.

  18. Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123

    Office of Energy Efficiency and Renewable Energy (EERE)

    Guide describes the clarification of how agencies determine the life-cycle cost for investments required by Executive Order 13123.

  19. Distributed Internet-based Load Altering Attacks against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    management, cost-efficient load protection. I. INTRODUCTION The recent advancements in smart grid systemsDistributed Internet-based Load Altering Attacks against Smart Power Grids Amir-Hamed Mohsenian distribution system. Keywords: Smart grid security, Internet-based load altering attacks, demand side

  20. Combating Time Synchronization Attack: A Cross Layer Defense Mechanism

    E-Print Network [OSTI]

    Li, Husheng

    and Protection]: Physical Security 1. INTRODUCTION The security of smart grid has become an important research synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified re- cently. A cross the eectiveness of the pro- posed TSA detection algorithm. Categories and Subject Descriptors K.6.5 [Security

  1. Reducing Attack Surfaces for Intra-Application Communication in Android

    E-Print Network [OSTI]

    Wagner, David

    Reducing Attack Surfaces for Intra-Application Communication in Android David Kantola, Erika Chin,emc,-w,daw}@berkeley.edu ABSTRACT The complexity of Android's message-passing system has led to numerous vulnerabilities in third-application communication mechanisms. Consequently, we propose modifications to the Android platform to detect and protect

  2. Safety Criteria and Safety Lifecycle for Artificial Neural Networks

    E-Print Network [OSTI]

    Kelly, Tim

    Safety Criteria and Safety Lifecycle for Artificial Neural Networks Zeshan Kurd, Tim Kelly and Jim performance based techniques that aim to improve the safety of neural networks for safety critical for safety assurance. As a result, neural networks are typically restricted to advisory roles in safety

  3. Safety Lifecycle for Developing Safety Critical Artificial Neural Networks

    E-Print Network [OSTI]

    Kelly, Tim

    Safety Lifecycle for Developing Safety Critical Artificial Neural Networks Zeshan Kurd, Tim Kelly.kelly}@cs.york.ac.uk Abstract. Artificial neural networks are employed in many areas of industry such as medicine and defence. There are many techniques that aim to improve the performance of neural networks for safety-critical systems

  4. Longevity, Life-cycle Behavior and Pension Reform , Victoria Prowse

    E-Print Network [OSTI]

    Alexandrova, Ivana

    Longevity, Life-cycle Behavior and Pension Reform Peter Haan , Victoria Prowse July 4, 2011 Abstract How can public pension systems be reformed to ensure fiscal stability in the face of increasing and retirement behavior. Keywords: Life Expectancy; Public Pension Reform; Retirement; Employment; Life

  5. Comparative Life-Cycle Air Emissions of Coal, Domestic Natural

    E-Print Network [OSTI]

    Jaramillo, Paulina

    near projected levels, the average wellhead price of natural gas peaked at $11/Mcf in October 2005 (6Comparative Life-Cycle Air Emissions of Coal, Domestic Natural Gas, LNG, and SNG for Electricity States' natural gas (NG) demand for electricity generation will increase. Estimates also suggest that NG

  6. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  7. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect (OSTI)

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  8. Market disruption, cascading effects, and economic recovery:a life-cycle hypothesis model.

    SciTech Connect (OSTI)

    Sprigg, James A.

    2004-11-01

    This paper builds upon previous work [Sprigg and Ehlen, 2004] by introducing a bond market into a model of production and employment. The previous paper described an economy in which households choose whether to enter the labor and product markets based on wages and prices. Firms experiment with prices and employment levels to maximize their profits. We developed agent-based simulations using Aspen, a powerful economic modeling tool developed at Sandia, to demonstrate that multiple-firm economies converge toward the competitive equilibria typified by lower prices and higher output and employment, but also suffer from market noise stemming from consumer churn. In this paper we introduce a bond market as a mechanism for household savings. We simulate an economy of continuous overlapping generations in which each household grows older in the course of the simulation and continually revises its target level of savings according to a life-cycle hypothesis. Households can seek employment, earn income, purchase goods, and contribute to savings until they reach the mandatory retirement age; upon retirement households must draw from savings in order to purchase goods. This paper demonstrates the simultaneous convergence of product, labor, and savings markets to their calculated equilibria, and simulates how a disruption to a productive sector will create cascading effects in all markets. Subsequent work will use similar models to simulate how disruptions, such as terrorist attacks, would interplay with consumer confidence to affect financial markets and the broader economy.

  9. Retargeting Attacks from Windows to Android With Limited Data Extraction

    E-Print Network [OSTI]

    Ng, Cary G.

    2014-01-01

    Retargeting the Attack to Android . . . . . . . . . .The Popularity of Android Devices . . . . . . . . . . .3 Android Attack . . . . .

  10. Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512 Takanori.Isobe,Taizo.Shirai}@jp.sony.com Abstract. This paper studies two types of attacks on the hash function Shabal. The first attack is a low on a low-weight pseudo collision attack. It means that only low-weight difference in a chaining value

  11. Life-Cycle Assessment of Pyrolysis Bio-Oil Production

    SciTech Connect (OSTI)

    Steele, Philp; Puettmann, Maureen E.; Penmetsa, Venkata Kanthi; Cooper, Jerome E.

    2012-02-01

    As part ofthe Consortium for Research on Renewable Industrial Materials' Phase I life-cycle assessments ofbiofuels, lifecycle inventory burdens from the production of bio-oil were developed and compared with measures for residual fuel oil. Bio-oil feedstock was produced using whole southern pine (Pinus taeda) trees, chipped, and converted into bio-oil by fast pyrolysis. Input parameters and mass and energy balances were derived with Aspen. Mass and energy balances were input to SimaPro to determine the environmental performance of bio-oil compared with residual fuel oil as a heating fuel. Equivalent functional units of 1 MJ were used for demonstrating environmental preference in impact categories, such as fossil fuel use and global warming potential. Results showed near carbon neutrality of the bio-oil. Substituting bio-oil for residual fuel oil, based on the relative carbon emissions of the two fuels, estimated a reduction in CO2 emissions by 0.075 kg CO2 per MJ of fuel combustion or a 70 percent reduction in emission over residual fuel oil. The bio-oil production life-cycle stage consumed 92 percent of the total cradle-to-grave energy requirements, while feedstock collection, preparation, and transportation consumed 4 percent each. This model provides a framework to better understand the major factors affecting greenhouse gas emissions related to bio-oil production and conversion to boiler fuel during fast pyrolysis.

  12. Life-cycle analysis of shale gas and natural gas.

    SciTech Connect (OSTI)

    Clark, C.E.; Han, J.; Burnham, A.; Dunn, J.B.; Wang, M.

    2012-01-27

    The technologies and practices that have enabled the recent boom in shale gas production have also brought attention to the environmental impacts of its use. Using the current state of knowledge of the recovery, processing, and distribution of shale gas and conventional natural gas, we have estimated up-to-date, life-cycle greenhouse gas emissions. In addition, we have developed distribution functions for key parameters in each pathway to examine uncertainty and identify data gaps - such as methane emissions from shale gas well completions and conventional natural gas liquid unloadings - that need to be addressed further. Our base case results show that shale gas life-cycle emissions are 6% lower than those of conventional natural gas. However, the range in values for shale and conventional gas overlap, so there is a statistical uncertainty regarding whether shale gas emissions are indeed lower than conventional gas emissions. This life-cycle analysis provides insight into the critical stages in the natural gas industry where emissions occur and where opportunities exist to reduce the greenhouse gas footprint of natural gas.

  13. Quantum attacks against iterated block ciphers

    E-Print Network [OSTI]

    Marc Kaplan

    2015-04-26

    We study the amplification of security against quantum attacks provided by iteration of block ciphers. In the classical case, the Meet-in-the-middle attack is a generic attack against those constructions. This attack reduces the time required to break double iterations to only twice the time it takes to attack a single block cipher, given that the attacker has access to a large amount of memory. More abstractly, it shows that security by composition does not achieve exact multiplicative amplification. We present a quantized version of this attack based on an optimal quantum algorithm for the Element Distinctness problem. We then use the generalized adversary method to prove the optimality of the attack. An interesting corollary is that the time-space tradeoff for quantum attacks is very different from what classical attacks allow. This first result seems to indicate that composition resists better to quantum attacks than to classical ones because it prevents the quadratic speedup achieved by quantizing an exhaustive search. We investigate security amplification by composition further by examining the case of four iterations. We quantize a recent technique called the dissection attack using the framework of quantum walks. Surprisingly, this leads to better gains over classical attacks than for double iterations, which seems to indicate that when the number of iterations grows, the resistance against quantum attacks decreases.

  14. Life-Cycle Water Impacts of U.S. Transportation Fuels

    E-Print Network [OSTI]

    Scown, Corinne Donahue

    2010-01-01

    in Minnesota, Life Cycle Assessment IX, Boston, MA, 2009;for Environmental Life-Cycle Assessment. EnvironmentalInput-Output Life Cycle Assessment (EIO-LCA) US 2002 (428)

  15. Approximate life-cycle assessment of product concepts using learning systems

    E-Print Network [OSTI]

    Sousa, Inęs (Maria Inęs Silva Sousa), 1972-

    2002-01-01

    This thesis develops an approximate, analytically based environmental assessment method that provides fast evaluations of product concepts. Traditional life-cycle assessment (LCA) studies and their streamlined analytical ...

  16. Life-Cycle Assessment of Concrete: Decision-Support Tool and Case Study Application

    E-Print Network [OSTI]

    Gursel, Aysegul Petek

    2014-01-01

    Example of a Hybrid Life-Cycle Assessment of ConstructionD.W. Pennington, Life cycle assessment: Part 1: Framework,management - Life Cycle Assessment: Principles and

  17. Lifecycle impacts of natural gas to hydrogen pathways on urban air quality

    E-Print Network [OSTI]

    Wang, Guihua; Ogden, Joan M; Nicholas, Michael A

    2007-01-01

    Lifecycle impacts of natural gas to hydrogen pathways onThe following three natural gas to hydrogen supply pathwaysmethane reforming (SMR) of natural gas to produce hydrogen.

  18. Text Alternative Version: Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products

    Office of Energy Efficiency and Renewable Energy (EERE)

    Below is the text-alternative version of the "Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products" webcast, held March 28, 2013.

  19. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Environmental Management (EM)

    0 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Report describes the 2010 edition of energy price indices and discount factors for performing...

  20. Revisiting the BGE Attack on a White-Box AES Implementation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . White-box cryptography aims to protect the secret key of a cipher in an environment in which-box implementation of AES [5]. White-box cryptography aims to protect the confidentiality of the secret key device, or a set-top box. #12;In 2004, Billet et al. [3] presented an attack on the white-box AES

  1. Environmental Life-cycle Assessment of Passenger Transportation: A Detailed Methodology for Energy, Greenhouse Gas and Criteria Pollutant Inventories of Automobiles, Buses, Light Rail, Heavy Rail and Air

    E-Print Network [OSTI]

    Chester, Mikhail; Horvath, Arpad

    2007-01-01

    Consulting, Inc. , 9/2002 Life-cycle Assessment of PassengerChronicle, 11/24/2006 Life-cycle Assessment of PassengerLarge Large Large Large Life-cycle Assessment of Passenger

  2. Environmental Life-cycle Assessment of Passenger Transportation: A Detailed Methodology for Energy, Greenhouse Gas and Criteria Pollutant Inventories of Automobiles, Buses, Light Rail, Heavy Rail and Air

    E-Print Network [OSTI]

    Chester, Mikhail; Horvath, Arpad

    2007-01-01

    Consulting, Inc. , 9/2002 Life-cycle Assessment of PassengerLarge Large Large Large Life-cycle Assessment of PassengerChronicle, 11/24/2006 Life-cycle Assessment of Passenger

  3. Life-Cycle Energy Demand of Computational Logic: From High-Performance 32nm CPU to Ultra-Low-Power 130nm MCU

    E-Print Network [OSTI]

    Bol, David; Boyd, Sarah; Dornfeld, David

    2011-01-01

    4] S. Boyd et al. : “Life-cycle assessment of computationalS. Boyd et al. : “Life-cycle assessment of semiconductors”,S. Boyd et al. : “Life-cycle assessment of NAND Flash”, in

  4. Life-Cycle Energy Demand of Computational Logic: From High-Performance 32nm CPU to Ultra-Low-Power 130nm MCU

    E-Print Network [OSTI]

    Bol, David; Boyd, Sarah; Dornfeld, David

    2011-01-01

    4] S. Boyd et al. : “Life-cycle assessment of computationalS. Boyd et al. : “Life-cycle assessment of semiconductors”,S. Boyd et al. : “Life-cycle assessment of NAND Flash”, in

  5. TriBITS lifecycle model. Version 1.0, a lean/agile software lifecycle model for research-based computational science and engineering and applied mathematical software.

    SciTech Connect (OSTI)

    Willenbring, James M.; Bartlett, Roscoe Ainsworth; Heroux, Michael Allen

    2012-01-01

    Software lifecycles are becoming an increasingly important issue for computational science and engineering (CSE) software. The process by which a piece of CSE software begins life as a set of research requirements and then matures into a trusted high-quality capability is both commonplace and extremely challenging. Although an implicit lifecycle is obviously being used in any effort, the challenges of this process - respecting the competing needs of research vs. production - cannot be overstated. Here we describe a proposal for a well-defined software lifecycle process based on modern Lean/Agile software engineering principles. What we propose is appropriate for many CSE software projects that are initially heavily focused on research but also are expected to eventually produce usable high-quality capabilities. The model is related to TriBITS, a build, integration and testing system, which serves as a strong foundation for this lifecycle model, and aspects of this lifecycle model are ingrained in the TriBITS system. Here, we advocate three to four phases or maturity levels that address the appropriate handling of many issues associated with the transition from research to production software. The goals of this lifecycle model are to better communicate maturity levels with customers and to help to identify and promote Software Engineering (SE) practices that will help to improve productivity and produce better software. An important collection of software in this domain is Trilinos, which is used as the motivation and the initial target for this lifecycle model. However, many other related and similar CSE (and non-CSE) software projects can also make good use of this lifecycle model, especially those that use the TriBITS system. Indeed this lifecycle process, if followed, will enable large-scale sustainable integration of many complex CSE software efforts across several institutions.

  6. The boomerang attack David Wagner

    E-Print Network [OSTI]

    Wagner, David

    . Second, we show how to break COCONUT98, a cipher designed using decorrelation techniques to en- sure (Rounds) Our Attack Data Complexity Time Complexity COCONUT98 (8) 2 16 CP 2 38 Khufu (16) 2 18 CP 2 18{5 below, where we show how to break COCONUT98 [V98] with just 2 16 chosen texts and 2 38 work, despite

  7. Secure routing in wireless sensor networks: attacks and countermeasures

    E-Print Network [OSTI]

    Xu, Wenyuan

    against sensor networks, introduce two classes of novel attacks against sensor networks­­sinkholes two novel classes of previously undocumented attacks against sensor net- works 1 ­­sinkhole attacks

  8. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    E-Print Network [OSTI]

    California at Berkeley, University of

    sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO two novel classes of previously undoc­ umented attacks against sensor networks 1 -- sinkhole attacks

  9. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    E-Print Network [OSTI]

    Wagner, David

    sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO­ umented attacks against sensor networks 1 -- sinkhole attacks and HELLO floods. #15; We show

  10. Environmental Life-cycle Assessment of Passenger Transportation An Energy, Greenhouse Gas, and Criteria Pollutant Inventory of Rail and Air Transportation

    E-Print Network [OSTI]

    Horvath, Arpad; Chester, Mikhail

    2008-01-01

    A. , Environmental Life-cycle Assessment of PassengerAnalysis-Based Life-cycle Assessment. Software. Carnegieframework for life cycle assessments, 1991, SETAC. [Fritz

  11. Strategic capacity in post devolution government in the UK: A comparative analysis of the lifecycle of central strategy units 

    E-Print Network [OSTI]

    MacDougall, Audrey

    2007-06-27

    This thesis analyses the changing role of central government strategy units in the devolved UK polity using a lifecycle model. At each stage of the lifecycle the units develop a different aim, undertake different tasks and ...

  12. A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    430 A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS if the discovery is made by a black-hat finder. Here, a framework for software risk evaluation with respect to the vulnerability lifecycle is proposed. Risk can be evaluated using the likelihood of a security breach

  13. URBAN FORM AND LIFE-CYCLE ENERGY CONSUMPTION:1 CASE STUDIES AT THE CITY SCALE2

    E-Print Network [OSTI]

    Kockelman, Kara M.

    1 URBAN FORM AND LIFE-CYCLE ENERGY CONSUMPTION:1 CASE STUDIES AT THE CITY SCALE2 3 Brice G. Nichols it should31 be included in planning analyses. Overall, average life-cycle per-capita energy use ranges from residential and commercial sectors are affected by density.37 38 Keywords: urban energy use, city-level scale

  14. U.S. Geological Survey Energy and Minerals Science Strategy--A Resource Lifecycle Approach

    E-Print Network [OSTI]

    of Agriculture National Agricultural Imagery Program. Wind turbines. Photograph by Don Becker, USGS. The BlueU.S. Geological Survey Energy and Minerals Science Strategy--A Resource Lifecycle Approach Circular and Minerals Science Strategy--A Resource Lifecycle Approach By Richard C. Ferrero, Jonathan J. Kolak, Donald J

  15. A Cyberinfrastructure for Integrated Monitoring and Life-Cycle Management of Wind Turbines

    E-Print Network [OSTI]

    Stanford University

    A Cyberinfrastructure for Integrated Monitoring and Life-Cycle Management of Wind Turbines Kay Abstract. Integrating structural health monitoring into life-cycle management strategies for wind turbines data) can effectively be used to capture the operational and structural behavior of wind turbines

  16. Detector LifeCycle Costs and Considerations Mobility Measurement in Urban Transportation Pooled Fund Study

    E-Print Network [OSTI]

    Detector LifeCycle Costs and Considerations Mobility Measurement in Urban Transportation tool of typical data collection devices along with estimated lifecycle costs. The objectives of the costestimating detector tool are: 1. Provide an overview of the key issues and cost elements one needs

  17. A Novel Attack against Android Phones

    E-Print Network [OSTI]

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  18. A "Poisoning" Attack Against Online Anomaly Detection

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    A "Poisoning" Attack Against Online Anomaly Detection Marius Kloft Department of Computer Science it is robust against targeted "poisoning" attacks. The latter have been first investigated by Nelson et al. [1 of all data points observed so far. The key idea of a poisoning attack is to insert specially crafted

  19. Vulnerability Discovery with Attack IEEE Transactions on Software Engineering (2010)

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    2010-01-01

    : Monitor target system's state while executing attacks in 3 ways Overview of tool AJECT #12;Attack generate attacks in 4 ways Injection phase: Execute previously generated test cases(attacks) Monitoring

  20. The Cost of Attack in Competing Networks

    E-Print Network [OSTI]

    Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

    2015-01-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

  1. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111,FY 2007TrafficDepartmentinofDNV

  2. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget || Department of EnergyNo. 154 -

  3. Emergency Operating Records Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1991-10-23

    To establish the policy, responsibilities, and requirements for a Departmental Emergency Operating Records Protection Program to safeguard that core or records deemed necessary to assure continuity of essential Governmental activities during and following disaster and attack-related emergency conditions. Cancels DOE 5500.7A. Chanceled by DOE O 151.1 of 9-25-1995.

  4. Life-Cycle Water Impacts of U.S. Transportation Fuels

    E-Print Network [OSTI]

    Scown, Corinne Donahue

    2010-01-01

    144 Figure 63: Impact of Hydroelectricity on the Life-Cycle157 Figure 64: Impact of Hydroelectricity on the Water68 Table 14: Hydroelectricity-Related FWSE (Data Source: (

  5. Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products

    Broader source: Energy.gov [DOE]

    This March 28, 2013 webcast reviewed DOE's recently completed three-part study of the life-cycle energy and environmental impacts of LED lighting products relative to incandescent and CFL...

  6. Electric and Gasoline Vehicle Lifecycle Cost and Energy-Use Model

    E-Print Network [OSTI]

    Delucchi, Mark; Burke, Andy; Lipman, Timothy; Miller, Marshall

    2000-01-01

    147 Lifecycle cost (break-even gasoline price): base-casegrease. 37B part: Fuel Gasoline, for the conventional ICEVs.BTU-from-battery to mi/BTU-gasoline. C OST SUMMARY (F ORD T

  7. Life-Cycle Impacts From Novel Thorium–Uranium-Fuelled Nuclear Energy Systems

    E-Print Network [OSTI]

    Ashley, S. F.; Fenner, R. A.; Nuttall, W. J.; Parks, Geoffrey T.

    2015-06-02

    is performed that considers the con- struction, operation, and decommissioning of each of the reactor technologies and all of the other associated facilities in the open nuclear fuel cycle. This includes the development of life-cycle analysis models...

  8. Inventory optimization model for NIKE's long lifecycle highly seasonal replenishment products

    E-Print Network [OSTI]

    Kang, John H. (John Hyun-June)

    2015-01-01

    Currently, demand and inventory planners at NIKE Always Available (NIKE's replenishment business) experience difficulty in managing long-lifecycle highly-seasonal products like soccer equipment and fleece apparel. Very ...

  9. Evaluation of Life-Cycle Assessment Studies of Chinese Cement Production: Challenges and Opportunities

    E-Print Network [OSTI]

    Lu, Hongyou

    2010-01-01

    10. Wang, H. , 2008. “LCI/LCA Management in China: summaryof life-cycle assessment (LCA) to understand the embodiedThis paper reviews recent LCA studies in the cement industry

  10. Life-Cycle Greenhouse Gas and Energy Analyses of Algae Biofuels Production

    E-Print Network [OSTI]

    Life-Cycle Greenhouse Gas and Energy Analyses of Algae Biofuels Production Transportation Energy The Issue Algae biofuels directly address the Energy Commission's Public Interest Energy Research fuels more carbonintensive than conventional biofuels. Critics of this study argue that alternative

  11. Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis- 2010

    Broader source: Energy.gov [DOE]

    Report describes the 2010 edition of energy price indices and discount factors for performing life-cycle cost analyses of energy and water conservation and renewable energy projects in federal facilities.

  12. Life-Cycle Cost Analysis Highlights Hydrogen's Potential for Electrical Energy Storage (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2010-11-01

    This fact sheet describes NREL's accomplishments in analyzing life-cycle costs for hydrogen storage in comparison with other energy storage technologies. Work was performed by the Hydrogen Technologies and Systems Center.

  13. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NISTIR 85-3273-30 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Annual Supplement to NIST Handbook 135 Priya D. Lavappa Joshua D. Kneifel This...

  14. Labour's Record on Cash Transfers, Poverty, Inequality and the Lifecycle 1997 -2010

    E-Print Network [OSTI]

    Banaji,. Murad

    Labour's Record on Cash Transfers, Poverty, Inequality and the Lifecycle 1997 - 2010 John Hills ...................................................................................................................20 6. Outcomes: Poverty rates on the distribution of wealth, poverty, income inequality and spatial difference. The full programme of analysis

  15. Attacks on Java Card 3.0 Combining Fault and Logical Attacks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Attacks on Java Card 3.0 Combining Fault and Logical Attacks Guillaume Barbu1,2 , Hugues Thiebeauld://www.telecom-paristech.fr/ guillaume.barbu@telecom-paristech.fr Abstract. Java Cards have been threatened so far by attacks using ill it can no longer be applied to the Java Card 3 Connected Edition context where the bytecode verification

  16. Machine Learning Attacks Against the ASIRRA CAPTCHA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Machine Learning Attacks Against the ASIRRA CAPTCHA Draft, February 28, 2008 Philippe Golle Palo of cats and dogs used in ASIRRA. This classifier is a combination of support-vector machine classifiers higher than the estimate given in [6] for machine vision attacks. The weakness we expose in the current

  17. Low-Density Attack Revisited Tetsuya Izu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Low-Density Attack Revisited Tetsuya Izu Jun Kogure Takeshi Koshiba Takeshi Shimoyama Secure The low-density attack proposed by Lagarias and Odlyzko is a powerful algorithm against the subset sum, densities of the subset sum problems should be higher than 0.9408... in order to avoid the low

  18. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  19. Closing the Gap: Using the Clean Air Act to Control Lifecycle Greenhouse Gas Emissions from Energy Facilities

    E-Print Network [OSTI]

    Hagan, Colin R.

    2012-01-01

    out that EPA used an emissions trading program to controlsuggested that an emissions trading system could qualify asTO MANAGE LIFECYCLE GHG emissions trading system would also

  20. Closing the Gap: Using the Clean Air Act to Control Lifecycle Greenhouse Gas Emissions from Energy Facilities

    E-Print Network [OSTI]

    Hagan, Colin R.

    2012-01-01

    is particularly true for liquefied natural gas. LifecycleLiquefied, synthetic, and shale-derived natural gas undergofrom liquefied, synthetic, or shale-derived natural gas

  1. Integrated Life-cycle Assessment for Semiconductor Manufacturing Processes using the Environmental Value Systems Analysis and EIOLCA

    E-Print Network [OSTI]

    Ayyagary, Uday; Krishnan, Nikhil; Rosales, Joaquin; Dornfeld, David A

    2003-01-01

    Integrated Life-cycle Assessment for semiconductormanufacturers alike. 2. Life cycle Assessment using EnV-Sa move towards Life Cycle Assessment (LCA), which is the

  2. Closing the Gap: Using the Clean Air Act to Control Lifecycle Greenhouse Gas Emissions from Energy Facilities

    E-Print Network [OSTI]

    Hagan, Colin R.

    2012-01-01

    Proposed Regulation, Renewable Energy Portfolio Standard,from More Than 140 Renewable Energy and Public Health Advo-could subject renewable energy projects to lifecycle

  3. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  4. Improved Side Channel Attacks on Pairing Based Cryptography

    E-Print Network [OSTI]

    to passive attacks as well as to active attacks [12,8,21,11,22,13]. asdf This work was funded by the German

  5. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  6. Life-cycle analysis of alternative aviation fuels in GREET

    SciTech Connect (OSTI)

    Elgowainy, A.; Han, J.; Wang, M.; Carter, N.; Stratton, R.; Hileman, J.; Malwitz, A.; Balasubramanian, S.

    2012-07-23

    The Greenhouse gases, Regulated Emissions, and Energy use in Transportation (GREET) model, developed at Argonne National Laboratory, has been expanded to include well-to-wake (WTWa) analysis of aviation fuels and aircraft. This report documents the key WTWa stages and assumptions for fuels that represent alternatives to petroleum jet fuel. The aviation module in GREET consists of three spreadsheets that present detailed characterizations of well-to-pump and pump-to-wake parameters and WTWa results. By using the expanded GREET version (GREET1{_}2011), we estimate WTWa results for energy use (total, fossil, and petroleum energy) and greenhouse gas (GHG) emissions (carbon dioxide, methane, and nitrous oxide) for (1) each unit of energy (lower heating value) consumed by the aircraft or (2) each unit of distance traveled/ payload carried by the aircraft. The fuel pathways considered in this analysis include petroleum-based jet fuel from conventional and unconventional sources (i.e., oil sands); Fisher-Tropsch (FT) jet fuel from natural gas, coal, and biomass; bio-jet fuel from fast pyrolysis of cellulosic biomass; and bio-jet fuel from vegetable and algal oils, which falls under the American Society for Testing and Materials category of hydroprocessed esters and fatty acids. For aircraft operation, we considered six passenger aircraft classes and four freight aircraft classes in this analysis. Our analysis revealed that, depending on the feedstock source, the fuel conversion technology, and the allocation or displacement credit methodology applied to co-products, alternative bio-jet fuel pathways have the potential to reduce life-cycle GHG emissions by 55-85 percent compared with conventional (petroleum-based) jet fuel. Although producing FT jet fuel from fossil feedstock sources - such as natural gas and coal - could greatly reduce dependence on crude oil, production from such sources (especially coal) produces greater WTWa GHG emissions compared with petroleum jet fuel production unless carbon management practices, such as carbon capture and storage, are used.

  7. Inoculating Multivariate Schemes Against Differential Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding and Jason E. Gower scheme the Perturbed Matsumoto-Imai-Plus (PMI+) cryptosystem. Keywords: multivariate, public key resources. Multivariate public key cryptography provides one alternative since computations in small finite

  8. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  9. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    E-Print Network [OSTI]

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  10. World Conference on Photovoltaic Conversion, Hawaii, May 8-12, 2006 QUANTIFYING THE LIFE-CYCLE ENVIRONMENTAL PROFILE OF PHOTOVOLTAICS

    E-Print Network [OSTI]

    IEEE 4 th World Conference on Photovoltaic Conversion, Hawaii, May 8-12, 2006 QUANTIFYING THE LIFE-CYCLE ENVIRONMENTAL PROFILE OF PHOTOVOLTAICS AND COMPARISONS WITH OTHER ELECTRICITY-GENERATING TECHNOLOGIES V and Australian studies portrayed photovoltaic systems as causing significant life-cycle environmental and health

  11. Power Analysis Attacks against FPGA Implementations Shaohua Tang1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Power Analysis Attacks against FPGA Implementations of KLEIN Shaohua Tang1 , Jianhao Wu1 , Weijian not consider the potential attacks by power analysis methods. This paper presents power analysis attacks and complexity of our attacks via power analysis against KLEIN are discussed in detail. Besides

  12. Defining Code-injection Attacks Donald Ray Jay Ligatti

    E-Print Network [OSTI]

    Ligatti, Jay

    of mechanisms for mitigating such attacks. Categories and Subject Descriptors C.2.0 [Computer Communi- cation definitions of code-injection attacks (e.g., SQL-injection attacks) are flawed. The flaws make it possible these flaws in conventional definitions of code-injection attacks, this paper proposes a new definition, which

  13. Taxonomy for Description of Cross-Domain Attacks on CPS

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    . This attack has reportedly damaged over 1000 centrifuges at an Iranian uranium enrichment plant [1]. Multiple

  14. Hold-On: Protecting Against On-Path DNS Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Li and Vern Paxson

    E-Print Network [OSTI]

    Li, Kang

    ranging from blind packet injection to active man-in-the-middle attacks. One attack of concern regards DNSHold-On: Protecting Against On-Path DNS Poisoning Haixin Duan, Nicholas Weaver¶, Zongxu Zhao, Meng. INTRODUCTION The Domain Name System (DNS) provides a critical net- work service, and faces a variety of attacks

  15. A review of battery life-cycle analysis : state of knowledge and critical needs.

    SciTech Connect (OSTI)

    Sullivan, J. L.; Gaines, L.; Energy Systems

    2010-12-22

    A literature review and evaluation has been conducted on cradle-to-gate life-cycle inventory studies of lead-acid, nickel-cadmium, nickel-metal hydride, sodium-sulfur, and lithium-ion battery technologies. Data were sought that represent the production of battery constituent materials and battery manufacture and assembly. Life-cycle production data for many battery materials are available and usable, though some need updating. For the remaining battery materials, lifecycle data either are nonexistent or, in some cases, in need of updating. Although battery manufacturing processes have occasionally been well described, detailed quantitative information on energy and material flows is missing. For all but the lithium-ion batteries, enough constituent material production energy data are available to approximate material production energies for the batteries, though improved input data for some materials are needed. Due to the potential benefit of battery recycling and a scarcity of associated data, there is a critical need for life-cycle data on battery material recycling. Either on a per kilogram or per watt-hour capacity basis, lead-acid batteries have the lowest production energy, carbon dioxide emissions, and criteria pollutant emissions. Some process-related emissions are also reviewed in this report.

  16. Aerosol Lifecycle IOP at BNL A. J. Sedlacek, L. Kleinmen, E. Lewis,Y. -N. Lee,

    E-Print Network [OSTI]

    of `research grade' instruments (MAOS) · Maiden foreign deployment of MAOS will be GVAX, requiring the training to the GVAX Aerosol Lifecycle IOP: Infrastructure Motivation #12;· MAOS will be deployed at Lucknow (India (pollution alerts) can be expected · Good chance of catching an intense but distant biomass burning event

  17. Lifecycle Verification of the NASA Ames K9 Rover Executive Dimitra Giannakopoulou1, 3

    E-Print Network [OSTI]

    Pasareanu, Corina

    Lifecycle Verification of the NASA Ames K9 Rover Executive Dimitra Giannakopoulou1, 3 Corina S. Pasareanu2, 3 Michael Lowry3 and Rich Washington4 (1) USRA/RIACS (2) Kestrel Technology LLC (3) NASA Ames Research Center, Moffett Field, CA 94035-1000, USA {dimitra, pcorina, lowry}@email.arc.nasa.gov (4) Google

  18. A Computational Framework for Life-Cycle Management of Wind Turbines incorporating Structural Health Monitoring

    E-Print Network [OSTI]

    Stanford University

    , the worldwide clean energy investments, having more than doubled in the past five years, have reached a new portion is due to maintenance and operation of wind energy systems. Cost-efficient maintenance of wind turbines and reducing the life-cycle costs significantly. This paper presents a life

  19. Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis- 2012

    Broader source: Energy.gov [DOE]

    Report provides tables of present-value factors for use in the life-cycle cost analysis of capital investment projects for federal facilities. It also provides energy price indices based on the U.S. Department of Energy (DOE) forecasts from 2012 to 2042.

  20. Electric and Gasoline Vehicle Lifecycle Cost and Energy-Use Model

    E-Print Network [OSTI]

    Delucchi, Mark; Burke, Andy; Lipman, Timothy; Miller, Marshall

    2000-01-01

    Cost and Energy-Use Model Report for the California AirCalifornia INTRODUCTION As part of the calculation of the lifecycle cost, the energy-Costs , Mail-out #94-11, El Monte, California, March 2 (1994). California Energy

  1. Project Information Form Project Title The Development of Lifecycle Data for Hydrogen Fuel Production and

    E-Print Network [OSTI]

    California at Davis, University of

    Project Information Form Project Title The Development of Lifecycle Data for Hydrogen Fuel or organization) ARB $250,000 Total Project Cost $250,000 Agency ID or Contract Number DTRT13-G-UTC29 Start and End Dates October 1, 2014 ­ September 30, 2016 Brief Description of Research Project Climate change

  2. Labour's Record on Cash Transfers, Poverty, Inequality and the Lifecycle 1997 -2010

    E-Print Network [OSTI]

    Banaji,. Murad

    Labour's Record on Cash Transfers, Poverty, Inequality and the Lifecycle 1997 - 2010 John Hills changes in the UK since 2007, particularly their impact on the distribution of wealth, poverty, income, charting their approach and assessing their impact on the distribution of outcomes and on poverty

  3. Risk and Machine Protection for Stored Magnetic and Beam Energies

    E-Print Network [OSTI]

    Todd, B

    2015-01-01

    Risk is a fundamental consideration when designing electronic systems. For most systems a view of risk can assist in setting design objectives, whereas both a qualitative and quantitative understanding of risk is mandatory when considering protection systems. This paper gives an overview of the risks due to stored magnetic and beam energies in high-energy physics, and shows how a risk-based approach can be used to design new systems mitigating these risks, using a lifecycle inspired by IEC 61508. Designing new systems in high-energy physics can be challenging as new and novel techniques are difficult to quantify and predict. This paper shows how the same lifecycle approach can be used in reverse to analyse existing systems, following their operation and first experiences.

  4. material protection

    National Nuclear Security Administration (NNSA)

    %2A en Office of Weapons Material Protection http:www.nnsa.energy.govaboutusourprogramsnonproliferationprogramofficesinternationalmaterialprotectionandcooperation-1

  5. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems

    E-Print Network [OSTI]

    Sekar, R.

    such as those due to worms, these protection mechanisms lead to re- peated restarts of the victim application- ploit the same vulnerability. An important benefit of self-healing is that it avoids system resources]. Although these techniques can de- tect attacks before vital system resources (such as files

  6. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  7. Cyber Security Basic Defenses and Attack Trends

    E-Print Network [OSTI]

    Sastry, S. Shankar

    37 38 39 40 41 4273 MTC 4 Cyber Security Basic Defenses and Attack Trends Alvaro A. Cárdenas, Tanya for a successful defense. Cyber security is the branch of security dealing with digital or information technology.1 This chapter presents a selected overview on topics in cyber security. 1. Throughout the chapter, we use

  8. Defending against side-channel attacks : DynamoREA

    E-Print Network [OSTI]

    Wen, David, M. Eng. (David Y.). Massachusetts Institute of Technology

    2011-01-01

    Modern computer architectures are prone to leak information about their applications through side-channels caused by micro-architectural side-effects. Through these side-channels, attackers can launch timing attacks by ...

  9. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection...

  10. A Comparative Approach to the Protection of Fashion Innovations

    E-Print Network [OSTI]

    Wulf, Alexander

    2007-01-01

    or the ‘level of innovation’ of a product, the second asContent: High Innovation Factor: High Product Lifecycle:Content: Low Innovation Factor: Low Product Lifecycle: Long

  11. Int. J. Product Lifecycle Management, Vol. X, No. Y, xxxx 1 Copyright 200x Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Sandborn, Peter

    technology roadmap requirements, obsolescence management realities, logistics limitations, budget limitations and management policy. Keywords: component obsolescence; product lifecycle management; diminishing manufacturing) and is caused by the unavailability of technologies or components that are needed to manufacture or sustain

  12. The Role of Distribution Infrastructure and Equipment in the Life-cycle Air Emissions of Liquid Transportation Fuels

    E-Print Network [OSTI]

    Strogen, Bret

    2012-01-01

    analysis-based life-cycle assessment. ” Doctoral Thesis,International Journal of Life Cycle Assessment, 9(3), 161–International Journal of Life Cycle Assessment, 6(3), 127–

  13. Redesigning the design process through interactive simulation: A case study of life-cycle engineering in jet engine conceptual design

    E-Print Network [OSTI]

    Kerley, Warren; Wynn, David C.; Eckert, Claudia M.; Clarkson, P. John

    -Royce, Civil Aerospace, this paper demonstrates how an interactive approach to process simulation can be used to support the redesign of existing design processes in order to incorporate life-cycle engineering (LCE) considerations. The case study provides...

  14. Attacking and Repairing the Improved ModOnions Protocol

    E-Print Network [OSTI]

    Borisov, Nikita

    Attacking and Repairing the Improved ModOnions Protocol Nikita Borisov1 , Marek Klonowski2 presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoid replay attacks. How- ever, ModOnions allowed the detour attack

  15. A Classification of SQL Injection Attacks and Countermeasures

    E-Print Network [OSTI]

    Orso, Alessandro "Alex"

    A Classification of SQL Injection Attacks and Countermeasures William G.J. Halfond, Jeremy Viegas|jeremyv|orso}@cc.gatech.edu ABSTRACT SQL injection attacks pose a serious security threat to Web appli- cations: they allow attackers methods to address the SQL injection problem, current approaches either fail to address the full scope

  16. A Routing Table Insertion (RTI) Attack Technical Report

    E-Print Network [OSTI]

    Dong, Yingfei

    1 A Routing Table Insertion (RTI) Attack on Freenet Technical Report University of Hawaii at Manoa.2.6 Data Retrieval versus Data Insert Routing 2.3. Routing Algorithm Pseudo-Code 3. RTI Attack 3 Experiment 8.2.2. Experiment Results 8.3. General Anonymous P2P Properties 8.4. RTI Attack 8.4.1. Manual RTI

  17. Efficient Template Attacks Omar Choudary and Markus G. Kuhn

    E-Print Network [OSTI]

    Kuhn, Markus

    Side-channel attacks are powerful tools for inferring secret algorithms or data (passwords a specific cipher, could be implemented on top of that, but are outside the scope of this paper. We show to as the profiling and the attacked device. We wish to infer some secret value k S, processed by the attacked device

  18. Mitigation of Malicious Attacks on Networks

    E-Print Network [OSTI]

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  19. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    learning and security: training-set attacks on machine learners. In such attacks an attacker contaminates-set attacks to increase in the future as more intelligent systems (e.g. wearable devices, cars, smart houses

  20. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    and security: training-set attacks on machine learners. In such attacks an attacker contaminates the training.g. wearable devices, cars, smart houses and robots) include a "life long learning" com- ponent. The attacker

  1. Alternative water sources: Desalination model provides life-cycle costs of facility 

    E-Print Network [OSTI]

    Supercinski, Danielle

    2009-01-01

    -1 Story by Danielle Supercinski tx H2O | pg. 8 Alternative water sourcees Desalination model provides life-cycle costs of facility platform and design standards as DESAL ECONOMICS?, but created to analyze con- ventional surface water treatment... facilities. The models allow experts to analyze which technology and/or facility design and asset configuration provides the lowest long-term cost of potable water supplies. Using these newly developed models, the team conducted case studies...

  2. POPCYCLE: a computer code for calculating nuclear and fossil plant levelized life-cycle power costs

    SciTech Connect (OSTI)

    Hardie, R.W.

    1982-02-01

    POPCYCLE, a computer code designed to calculate levelized life-cycle power costs for nuclear and fossil electrical generating plants is described. Included are (1) derivations of the equations and a discussion of the methodology used by POPCYCLE, (2) a description of the input required by the code, (3) a listing of the input for a sample case, and (4) the output for a sample case.

  3. Life-Cycle Evaluation of Concrete Building Construction as a Strategy for Sustainable Cities

    SciTech Connect (OSTI)

    Stadel, Alexander; Gursel, Petek; Masanet, Eric

    2012-01-18

    Structural materials in commercial buildings in the United States account for a significant fraction of national energy use, resource consumption, and greenhouse gas (GHG) emissions. Robust decisions for balancing and minimizing these various environmental effects require that structural materials selections follow a life-cycle, systems modeling approach. This report provides a concise overview of the development and use of a new life-cycle assessment (LCA) model for structural materials in U.S. commercial buildings?the Berkeley Lab Building Materials Pathways (B-PATH) model. B-PATH aims to enhance environmental decision-making in the commercial building LCA, design, and planning communities through the following key features: (1) Modeling of discrete technology options in the production, transportation, construction, and end of life processes associated U.S. structural building materials; (2) Modeling of energy supply options for electricity provision and directly combusted fuels across the building life cycle; (3) Comprehensiveness of relevant building mass and energy flows and environmental indicators; (4) Ability to estimate modeling uncertainties through easy creation of different life-cycle technology and energy supply pathways for structural materials; and (5) Encapsulation of the above features in a transparent public use model. The report summarizes literature review findings, methods development, model use, and recommendations for future work in the area of LCA for commercial buildings.

  4. Expeditious Data Center Sustainability, Flow, and Temperature Modeling: Life-Cycle Exergy Consumption Combined with a Potential Flow Based, Rankine Vortex Superposed, Predictive Method

    E-Print Network [OSTI]

    Lettieri, David

    2012-01-01

    Methodology iii Life-Cycle Assessment (LCA) . . . . . . .Values altered in LCA sensitivity1 xi ISO IT KE LCA LCEA MIPS PDU PG&E SCOPE UPS

  5. ADVANCED WORKER PROTECTION SYSTEM

    SciTech Connect (OSTI)

    Judson Hedgehock

    2001-03-16

    From 1993 to 2000, OSS worked under a cost share contract from the Department of Energy (DOE) to develop an Advanced Worker Protection System (AWPS). The AWPS is a protective ensemble that provides the user with both breathing air and cooling for a NIOSH-rated duration of two hours. The ensemble consists of a liquid air based backpack, a Liquid Cooling Garment (LCG), and an outer protective garment. The AWPS project was divided into two phases. During Phase 1, OSS developed and tested a full-scale prototype AWPS. The testing showed that workers using the AWPS could work twice as long as workers using a standard SCBA. The testing also provided performance data on the AWPS in different environments that was used during Phase 2 to optimize the design. During Phase 1, OSS also performed a life-cycle cost analysis on a representative clean up effort. The analysis indicated that the AWPS could save the DOE millions of dollars on D and D activities and improve the health and safety of their workers. During Phase 2, OSS worked to optimize the AWPS design to increase system reliability, to improve system performance and comfort, and to reduce the backpack weight and manufacturing costs. To support this design effort, OSS developed and tested several different generations of prototype units. Two separate successful evaluations of the ensemble were performed by the International Union of Operation Engineers (IUOE). The results of these evaluations were used to drive the design. During Phase 2, OSS also pursued certifying the AWPS with the applicable government agencies. The initial intent during Phase 2 was to finalize the design and then to certify the system. OSS and Scott Health and Safety Products teamed to optimize the AWPS design and then certify the system with the National Institute of Occupational Health and Safety (NIOSH). Unfortunately, technical and programmatic difficulties prevented us from obtaining NIOSH certification. Despite the inability of NIOSH to certify the design, OSS was able to develop and successfully test, in both the lab and in the field, a prototype AWPS. They clearly demonstrated that a system which provides cooling can significantly increase worker productivity by extending the time they can function in a protective garment. They were also able to develop mature outer garment and LCG designs that provide considerable benefits over current protective equipment, such as self donning and doffing, better visibility, and machine washable. A thorough discussion of the activities performed during Phase 1 and Phase 2 is presented in the AWPS Final Report. The report also describes the current system design, outlines the steps needed to certify the AWPS, discusses the technical and programmatic issues that prevented the system from being certified, and presents conclusions and recommendations based upon the seven year effort.

  6. Fire Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-05

    This Standard was developed to provide acceptable methods and approaches for meeting DOE fire protection program and design requirements and to address special or unique fire protection issues at DOE facilities that are not comprehensively or adequately addressed in national consensus standards or other design criteria.

  7. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    - Best Practice DesignConfiguration Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan...

  8. Environmental Life-cycle Assessment of Passenger Transportation: A Detailed Methodology for Energy, Greenhouse Gas and Criteria Pollutant Inventories of Automobiles, Buses, Light Rail, Heavy Rail and Air v.2

    E-Print Network [OSTI]

    Chester, Mikhail; Horvath, Arpad

    2008-01-01

    H. , Pranzeck, J. , Life Cycle Assessment of a Complete Car:Nordic Guidelines on Life-Cycle Assessment, Nordic CouncilH. , Lave, L. , Life-Cycle Assessment of Automobile/Fuel

  9. Molasses for ethanol: the economic and environmental impacts of a new pathway for the lifecycle greenhouse gas analysis of sugarcane ethanol

    E-Print Network [OSTI]

    Kammen, Daniel M.

    Molasses for ethanol: the economic and environmental impacts of a new pathway for the lifecycle greenhouse gas analysis of sugarcane ethanol This article has been downloaded from IOPscience. Please scroll for ethanol: the economic and environmental impacts of a new pathway for the lifecycle greenhouse gas analysis

  10. LIFE-CYCLE COST AND ENERGY-USE ANALYSIS OF SUN-CONTROL AND DAYLIGHTING OPTIONS IN A HIGH-RISE OFFICE BUILDING

    E-Print Network [OSTI]

    Winkelmann, Frederick C.

    2014-01-01

    LIFE-CYCLE COST AND ENERGY-USE ANALYSIS OF SUN-CONTROL AND4 LIFE-CYCLE COST AND ENERGY-USE ANALYSIS OF SUN-CONTROL ANDLIFE-CYCLE COST AND ENERGY-USE ANALYSIS OF SUN-CONTROL AND

  11. Fire Protection 

    E-Print Network [OSTI]

    Bird, Eric L.; Studd, S. D.

    1958-11-25

    The first object of fire protection is to ensure safety of life; the second is to preserve from damage, resulting from the occasional outbreak, the activities (or occupancies) housed in buildings. Occupancies are usually ...

  12. Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes requirements for management and operation of the DOE Protective Force (PF), establishes requirements for firearms operations and defines the firearms courses of fire. Cancels: DOE M 473.2-1A DOE M 473.2-2

  13. Comprehensive Lifecycle Planning and Management System For Addressing Water Issues Associated With Shale Gas Development In New York, Pennsylvania, And West Virginia

    SciTech Connect (OSTI)

    J. Daniel Arthur

    2012-03-31

    The objective of this project is to develop a modeling system to allow operators and regulators to plan all aspects of water management activities associated with shale gas development in the target project area of New York, Pennsylvania, and West Virginia (â??target areaâ?ť), including water supply, transport, storage, use, recycling, and disposal and which can be used for planning, managing, forecasting, permit tracking, and compliance monitoring. The proposed project is a breakthrough approach to represent the entire shale gas water lifecycle in one comprehensive system with the capability to analyze impacts and options for operational efficiency and regulatory tracking and compliance, and to plan for future water use and disposition. It will address all of the major water-related issues of concern associated with shale gas development in the target area, including water withdrawal, transport, storage, use, treatment, recycling, and disposal. It will analyze the costs, water use, and wastes associated with the available options, and incorporate constraints presented by permit requirements, agreements, local and state regulations, equipment and material availability, etc. By using the system to examine the water lifecycle from withdrawals through disposal, users will be able to perform scenario analysis to answer "what if" questions for various situations. The system will include regulatory requirements of the appropriate state and regional agencies and facilitate reporting and permit applications and tracking. These features will allow operators to plan for more cost effective resource production. Regulators will be able to analyze impacts of development over an entire area. Regulators can then make informed decisions about the protections and practices that should be required as development proceeds. This modeling system will have myriad benefits for industry, government, and the public. For industry, it will allow planning all water management operations for a project or an area as one entity to optimize water use and minimize costs subject to regulatory and other constraints. It will facilitate analysis of options and tradeoffs, and will also simplify permitting and reporting to regulatory agencies. The system will help regulators study cumulative impacts of development, conserve water resources, and manage disposal options across a region. It will also allow them to track permits and monitor compliance. The public will benefit from water conservation, improved environmental performance as better system wide decisions are made, and greater supply of natural gas, with attendant lower prices, as costs are reduced and development is assisted through better planning and scheduling. Altogether, better economics and fewer barriers will facilitate recovery of the more than 300 trillion cubic feet of estimated recoverable natural gas resource in the Marcellus Shale in a manner that protects the environment.

  14. Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-03-07

    The manual establishes requirements for management and operation of the DOE Protective Force, establishes requirements for firearms operations and defines the firearms courses of fire. Chg 1 dated 3/7/06. DOE M 470.4-3A cancels DOE M 470.4-3, Chg 1, Protective Force, dated 3-7-06, Attachment 2, Contractor Requirement Document (CRD) only (except for Section C). Chg 1, dated 3-7-06, cancels DOE M 470.4-3

  15. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes requirements for the physical protection of safeguards and security interests. Copies of Section B, Safeguards and Security Alarm Management System, which contains Unclassified Controlled Nuclear Information, and Appendix 1, Security Badge Specifications, which contains Official Use Only information, are only available, by request, from the program manager, Protection Program Operations, 301-903-6209. Chg 1, dated 3/7/06. Cancels: DOE M 473.1-1 and DOE M 471.2-1B

  16. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes requirements for the physical protection of safeguards and security interests. Copies of Section B, Safeguards and Security Alarm Management System, which contains Unclassified Controlled Nuclear Information, and Appendix 1, Security Badge Specifications, which contains Official Use Only information, are only available, by request, from the program manager, Protection Program Operations, 301-903-6209. Cancels: DOE M 473.1-1 and DOE M 471.2-1B.

  17. Molecular assemblies as protective barriers and adhesion promotion interlayer

    DOE Patents [OSTI]

    King, David E. (Lakewood, CO); Czanderna, Alvin W. (Denver, CO); Kennedy, Cheryl E. (Lafayette, CO)

    1996-01-01

    A protective diffusion barrier having adhesive qualifies for metalized surfaces is provided by a passivating agent having the formula HS--(CH.sub.2).sub.11 --COOH Which forms a very dense, transparent organized molecular assembly or layer that is impervious to water, alkali, and other impurities and corrosive substances that typically attack metal surfaces.

  18. Molecular assemblies as protective barriers and adhesion promotion interlayer

    DOE Patents [OSTI]

    King, D.E.; Czanderna, A.W.; Kennedy, C.E.

    1996-01-30

    A protective diffusion barrier having adhesive qualities for metalized surfaces is provided by a passivating agent having the formula HS--(CH{sub 2}){sub 11}--COOH which forms a very dense, transparent organized molecular assembly or layer that is impervious to water, alkali, and other impurities and corrosive substances that typically attack metal surfaces. 8 figs.

  19. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we precisely define corrupted packets in inter-session pollution based

  20. Preventing Pollution Attacks in MultiSource Network Coding

    E-Print Network [OSTI]

    Boneh, Dan

    Preventing Pollution Attacks in Multi­Source Network Coding Shweta Agrawal 1# , Dan Boneh 2 that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks. A particularly important instance of this is the pollution problem: if some routers in the network are malicious

  1. Preventing Pollution Attacks in Multi-Source Network Coding

    E-Print Network [OSTI]

    Boneh, Dan

    Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal 1 , Dan Boneh 2 , Xavier combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious important instance of this is the pollution problem: if some routers in the network are malicious

  2. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we first define precisely corrupted packets in inter-session pollution based

  3. Improved Side Channel Attacks on Pairing Based Cryptography

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ], and anonymous group signatures [BS04] make use of pairings as their building blocks. The adoption of pairings that analyze the vulnerability of pairings to passive attacks as well as to active attacks [PV04, KTH+ 06, WS06, WS07, PV06]. There is a variety of pairings that can be used for PBC, e.g., the Weil pairing

  4. Energy Attacks and Defense Techniques for Wireless Systems

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Energy Attacks and Defense Techniques for Wireless Systems Sheng Wei Jong Hoon Ahnn Miodrag {shengwei, jhahnn, miodrag}@cs.ucla.edu ABSTRACT This paper addresses the energy attacks towards wireless in the wireless systems and trigger ultra-high energy increases at runtime. Then, we develop a non-destructive HT

  5. Tornado Attack on RC4 Applications to WEP & WPA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    several tools for building and manipulating pools of biases in the analysis of RC4. We report extremely fast and optimized active and passive attacks against IEEE 802.11 wireless commu- nication protocol WEP of packets, Aicrack-ng yields around 3% success rate. Furthermore, we describe very fast passive only attacks

  6. Stealthy Poisoning Attacks on PCA-based Anomaly Detectors

    E-Print Network [OSTI]

    Tygar, Doug

    Stealthy Poisoning Attacks on PCA-based Anomaly Detectors Benjamin I. P. Rubinstein1 Blaine Nelson1 detection, we present and evaluate short-term and long-term data poison- ing schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boil- ing Frog attacks

  7. Efficient Template Attacks Omar Choudary and Markus G. Kuhn

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Side-channel attacks are powerful tools for inferring secret algorithms or data (passwords values, e.g. to recover keys from a specific cipher, could be implemented on top of that, but are outside devices, which we refer to as the profiling and the attacked device. We wish to infer some secret value k

  8. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  9. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  10. Fault and Side-Channel Attacks on Pairing Based Cryptography ?

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

  11. Updated Life-Cycle Assessment of Aluminum Production and Semi-fabrication for the GREET Model

    SciTech Connect (OSTI)

    Dai, Qiang; Kelly, Jarod C.; Burnham, Andrew; Elgowainy, Amgad

    2015-09-01

    This report serves as an update for the life-cycle analysis (LCA) of aluminum production based on the most recent data representing the state-of-the-art of the industry in North America. The 2013 Aluminum Association (AA) LCA report on the environmental footprint of semifinished aluminum products in North America provides the basis for the update (The Aluminum Association, 2013). The scope of this study covers primary aluminum production, secondary aluminum production, as well as aluminum semi-fabrication processes including hot rolling, cold rolling, extrusion and shape casting. This report focuses on energy consumptions, material inputs and criteria air pollutant emissions for each process from the cradle-to-gate of aluminum, which starts from bauxite extraction, and ends with manufacturing of semi-fabricated aluminum products. The life-cycle inventory (LCI) tables compiled are to be incorporated into the vehicle cycle model of Argonne National Laboratory’s Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) Model for the release of its 2015 version.

  12. Performance metrics and life-cycle information management for building performance assurance

    SciTech Connect (OSTI)

    Hitchcock, R.J.; Piette, M.A.; Selkowitz, S.E.

    1998-06-01

    Commercial buildings account for over $85 billion per year in energy costs, which is far more energy than technically necessary. One of the primary reasons buildings do not perform as well as intended is that critical information is lost, through ineffective documentation and communication, leading to building systems that are often improperly installed and operated. A life-cycle perspective on the management of building information provides a framework for improving commercial building energy performance. This paper describes a project to develop strategies and techniques to provide decision-makers with information needed to assure the desired building performance across the complete life cycle of a building project. A key element in this effort is the development of explicit performance metrics that quantitatively represent performance objectives of interest to various building stakeholders. The paper begins with a discussion of key problems identified in current building industry practice, and ongoing work to address these problems. The paper then focuses on the concept of performance metrics and their use in improving building performance during design, commissioning, and on-going operations. The design of a Building Life-cycle Information System (BLISS) is presented. BLISS is intended to provide an information infrastructure capable of integrating a variety of building information technologies that support performance assurance. The use of performance metrics in case study building projects is explored to illustrate current best practice. The application of integrated information technology for improving current practice is discussed.

  13. Life-cycle cost analysis 200-West Weather Enclosure: Multi-function Waste Tank Facility

    SciTech Connect (OSTI)

    Umphrey, M.R.

    1995-01-16

    The Multi-Function Waste Tank Facility (MWTF)will provide environmentally safe and acceptable storage capacity for handling wastes resulting from the remediation of existing single-shell and double-shell tanks on the Hanford Site. The MWTF will construct two tank farm facilities at two separate locations. A four-tank complex will be constructed in the 200-East Area of the Hanford Site; a two-tank complex will be constructed in the 200-West Area. This report documents the results of a life-cycle cost analysis performed by ICF Kaiser Hanford Company (ICF KH) for the Weather Enclosure proposed to be constructed over the 200-West tanks. Currently, all tank farm operations on the Hanford Site are conducted in an open environment, with weather often affecting tank farm maintenance activities. The Weather Enclosure is being proposed to allow year-round tank farm operation and maintenance activities unconstrained by weather conditions. Elimination of weather-related delays at the MWTF and associated facilities will reduce operational costs. The life-cycle cost analysis contained in this report analyzes potential cost savings based on historical weather information, operational and maintenance costs, construction cost estimates, and other various assumptions.

  14. Design and life-cycle considerations for unconventional-reservoir wells

    SciTech Connect (OSTI)

    Miskimins, J.L.

    2009-05-15

    This paper provides an overview of design and life-cycle considerations for certain unconventional-reservoir wells. An overview of unconventional-reservoir definitions is provided. Well design and life-cycle considerations are addressed from three aspects: upfront reservoir development, initial well completion, and well-life and long-term considerations. Upfront-reservoir-development issues discussed include well spacing, well orientation, reservoir stress orientations, and tubular metallurgy. Initial-well-completion issues include maximum treatment pressures and rates, treatment diversion, treatment staging, flowback and cleanup, and dewatering needs. Well-life and long-term discussions include liquid loading, corrosion, refracturing and associated fracture reorientation, and the cost of abandonment. These design considerations are evaluated with case studies for five unconventional-reservoir types: shale gas (Barnett shale), tight gas (Jonah feld), tight oil (Bakken play), coalbed methane (CBM) (San Juan basin), and tight heavy oil (Lost Hills field). In evaluating the life cycle and design of unconventional-reservoir wells, 'one size' does not fit all and valuable knowledge and a shortening of the learning curve can be achieved for new developments by studying similar, more-mature fields.

  15. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  16. Advances in Life-Cycle Cost Analysis and Design of Civil Infrastructure Systems LIFE CYCLE COST MODEL FOR EVALUATING THE

    E-Print Network [OSTI]

    Lepech, Michael D.

    ). Cement production accounts for 5% of all global anthropogenic carbon dioxide (CO2) emissions #12;AdvancesAdvances in Life-Cycle Cost Analysis and Design of Civil Infrastructure Systems 143 LIFE CYCLE COST and cost model was developed to evaluate infrastructure sustainability, and compare alternative materials

  17. 5x20 Matrix for Knowledge Management Lifecycle Based on the Five C's Model and a Critical Review

    E-Print Network [OSTI]

    5x20 Matrix for Knowledge Management Lifecycle Based on the Five C's Model and a Critical Review, share, transfer and apply knowledge. This paper concludes by suggesting a matrix in a bid to comparing and processes. The paper concludes with developing a 5x20 matrix that elucidate how the five C's model

  18. Comparative life-cycle air emissions of coal, domestic natural gas, LNG, and SNG for electricity generation

    SciTech Connect (OSTI)

    Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews

    2007-09-15

    The U.S. Department of Energy (DOE) estimates that in the coming decades the United States' natural gas (NG) demand for electricity generation will increase. Estimates also suggest that NG supply will increasingly come from imported liquefied natural gas (LNG). Additional supplies of NG could come domestically from the production of synthetic natural gas (SNG) via coal gasification-methanation. The objective of this study is to compare greenhouse gas (GHG), SOx, and NOx life-cycle emissions of electricity generated with NG/LNG/SNG and coal. This life-cycle comparison of air emissions from different fuels can help us better understand the advantages and disadvantages of using coal versus globally sourced NG for electricity generation. Our estimates suggest that with the current fleet of power plants, a mix of domestic NG, LNG, and SNG would have lower GHG emissions than coal. If advanced technologies with carbon capture and sequestration (CCS) are used, however, coal and a mix of domestic NG, LNG, and SNG would have very similar life-cycle GHG emissions. For SOx and NOx we find there are significant emissions in the upstream stages of the NG/LNG life-cycles, which contribute to a larger range in SOx and NOx emissions for NG/LNG than for coal and SNG. 38 refs., 3 figs., 2 tabs.

  19. 2000-01-1556 Life-Cycle Cost Sensitivity to Battery-Pack Voltage of an HEV

    E-Print Network [OSTI]

    Tolbert, Leon M.

    drive schedules. These life cycle costs include the initial manufacturing cost of components, fuel cost2000-01-1556 Life-Cycle Cost Sensitivity to Battery-Pack Voltage of an HEV John W. McKeever, Sujit defined the peak power ratings for each HEV drive system's electric components: batteries, battery cables

  20. System Evaluation and Life-Cycle Cost Analysis of a Commercial-Scale High-Temperature Electrolysis Hydrogen Production Plant

    SciTech Connect (OSTI)

    Edwin A. Harvego; James E. O'Brien; Michael G. McKellar

    2012-11-01

    Results of a system evaluation and lifecycle cost analysis are presented for a commercial-scale high-temperature electrolysis (HTE) central hydrogen production plant. The plant design relies on grid electricity to power the electrolysis process and system components, and industrial natural gas to provide process heat. The HYSYS process analysis software was used to evaluate the reference central plant design capable of producing 50,000 kg/day of hydrogen. The HYSYS software performs mass and energy balances across all components to allow optimization of the design using a detailed process flow sheet and realistic operating conditions specified by the analyst. The lifecycle cost analysis was performed using the H2A analysis methodology developed by the Department of Energy (DOE) Hydrogen Program. This methodology utilizes Microsoft Excel spreadsheet analysis tools that require detailed plant performance information (obtained from HYSYS), along with financial and cost information to calculate lifecycle costs. The results of the lifecycle analyses indicate that for a 10% internal rate of return, a large central commercial-scale hydrogen production plant can produce 50,000 kg/day of hydrogen at an average cost of $2.68/kg. When the cost of carbon sequestration is taken into account, the average cost of hydrogen production increases by $0.40/kg to $3.08/kg.

  1. FY 1996 solid waste integrated life-cycle forecast characteristics summary. Volumes 1 and 2

    SciTech Connect (OSTI)

    Templeton, K.J.

    1996-05-23

    For the past six years, a waste volume forecast has been collected annually from onsite and offsite generators that currently ship or are planning to ship solid waste to the Westinghouse Hanford Company`s Central Waste Complex (CWC). This document provides a description of the physical waste forms, hazardous waste constituents, and radionuclides of the waste expected to be shipped to the CWC from 1996 through the remaining life cycle of the Hanford Site (assumed to extend to 2070). In previous years, forecast data has been reported for a 30-year time period; however, the life-cycle approach was adopted this year to maintain consistency with FY 1996 Multi-Year Program Plans. This document is a companion report to two previous reports: the more detailed report on waste volumes, WHC-EP-0900, FY1996 Solid Waste Integrated Life-Cycle Forecast Volume Summary and the report on expected containers, WHC-EP-0903, FY1996 Solid Waste Integrated Life-Cycle Forecast Container Summary. All three documents are based on data gathered during the FY 1995 data call and verified as of January, 1996. These documents are intended to be used in conjunction with other solid waste planning documents as references for short and long-term planning of the WHC Solid Waste Disposal Division`s treatment, storage, and disposal activities over the next several decades. This document focuses on two main characteristics: the physical waste forms and hazardous waste constituents of low-level mixed waste (LLMW) and transuranic waste (both non-mixed and mixed) (TRU(M)). The major generators for each waste category and waste characteristic are also discussed. The characteristics of low-level waste (LLW) are described in Appendix A. In addition, information on radionuclides present in the waste is provided in Appendix B. The FY 1996 forecast data indicate that about 100,900 cubic meters of LLMW and TRU(M) waste is expected to be received at the CWC over the remaining life cycle of the site. Based on ranges provided by the waste generators, this baseline volume could fluctuate between a minimum of about 59,720 cubic meters and a maximum of about 152,170 cubic meters. The range is primarily due to uncertainties associated with the Tank Waste Remediation System (TWRS) program, including uncertainties regarding retrieval of long-length equipment, scheduling, and tank retrieval technologies.

  2. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-07-23

    This Manual establishes requirements for the physical protection of interests under the U.S. Department of Energys (DOEs) purview ranging from facilities, buildings, Government property, and employees to national security interests such as classified information, special nuclear material (SNM), and nuclear weapons. Cancels Section A of DOE M 470.4-2 Chg 1. Canceled by DOE O 473.3.

  3. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect (OSTI)

    Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  4. Development and Validation of a Lifecycle-based Prognostics Architecture with Test Bed Validation

    SciTech Connect (OSTI)

    Hines, J. Wesley; Upadhyaya, Belle; Sharp, Michael; Ramuhalli, Pradeep; Jeffries, Brien; Nam, Alan; Strong, Eric; Tong, Matthew; Welz, Zachary; Barbieri, Federico; Langford, Seth; Meinweiser, Gregory; Weeks, Matthew

    2014-11-06

    On-line monitoring and tracking of nuclear plant system and component degradation is being investigated as a method for improving the safety, reliability, and maintainability of aging nuclear power plants. Accurate prediction of the current degradation state of system components and structures is important for accurate estimates of their remaining useful life (RUL). The correct quantification and propagation of both the measurement uncertainty and model uncertainty is necessary for quantifying the uncertainty of the RUL prediction. This research project developed and validated methods to perform RUL estimation throughout the lifecycle of plant components. Prognostic methods should seamlessly operate from beginning of component life (BOL) to end of component life (EOL). We term this "Lifecycle Prognostics." When a component is put into use, the only information available may be past failure times of similar components used in similar conditions, and the predicted failure distribution can be estimated with reliability methods such as Weibull Analysis (Type I Prognostics). As the component operates, it begins to degrade and consume its available life. This life consumption may be a function of system stresses, and the failure distribution should be updated to account for the system operational stress levels (Type II Prognostics). When degradation becomes apparent, this information can be used to again improve the RUL estimate (Type III Prognostics). This research focused on developing prognostics algorithms for the three types of prognostics, developing uncertainty quantification methods for each of the algorithms, and, most importantly, developing a framework using Bayesian methods to transition between prognostic model types and update failure distribution estimates as new information becomes available. The developed methods were then validated on a range of accelerated degradation test beds. The ultimate goal of prognostics is to provide an accurate assessment for RUL predictions, with as little uncertainty as possible. From a reliability and maintenance standpoint, there would be improved safety by avoiding all failures. Calculated risk would decrease, saving money by avoiding unnecessary maintenance. One major bottleneck for data-driven prognostics is the availability of run-to-failure degradation data. Without enough degradation data leading to failure, prognostic models can yield RUL distributions with large uncertainty or mathematically unsound predictions. To address these issues a "Lifecycle Prognostics" method was developed to create RUL distributions from Beginning of Life (BOL) to End of Life (EOL). This employs established Type I, II, and III prognostic methods, and Bayesian transitioning between each Type. Bayesian methods, as opposed to classical frequency statistics, show how an expected value, a priori, changes with new data to form a posterior distribution. For example, when you purchase a component you have a prior belief, or estimation, of how long it will operate before failing. As you operate it, you may collect information related to its condition that will allow you to update your estimated failure time. Bayesian methods are best used when limited data are available. The use of a prior also means that information is conserved when new data are available. The weightings of the prior belief and information contained in the sampled data are dependent on the variance (uncertainty) of the prior, the variance (uncertainty) of the data, and the amount of measured data (number of samples). If the variance of the prior is small compared to the uncertainty of the data, the prior will be weighed more heavily. However, as more data are collected, the data will be weighted more heavily and will eventually swamp out the prior in calculating the posterior distribution of model parameters. Fundamentally Bayesian analysis updates a prior belief with new data to get a posterior belief. The general approach to applying the Bayesian method to lifecycle prognostics consisted of identifying the prior, which is the RUL es

  5. System Evaluations and Life-Cycle Cost Analyses for High-Temperature Electrolysis Hydrogen Production Facilities

    SciTech Connect (OSTI)

    Edwin A. Harvego; James E. O'Brien; Michael G. McKellar

    2012-05-01

    This report presents results of system evaluations and lifecycle cost analyses performed for several different commercial-scale high-temperature electrolysis (HTE) hydrogen production concepts. The concepts presented in this report rely on grid electricity and non-nuclear high-temperature process heat sources for the required energy inputs. The HYSYS process analysis software was used to evaluate both central plant designs for large-scale hydrogen production (50,000 kg/day or larger) and forecourt plant designs for distributed production and delivery at about 1,500 kg/day. The HYSYS software inherently ensures mass and energy balances across all components and it includes thermodynamic data for all chemical species. The optimized designs described in this report are based on analyses of process flow diagrams that included realistic representations of fluid conditions and component efficiencies and operating parameters for each of the HTE hydrogen production configurations analyzed. As with previous HTE system analyses performed at the INL, a custom electrolyzer model was incorporated into the overall process flow sheet. This electrolyzer model allows for the determination of the average Nernst potential, cell operating voltage, gas outlet temperatures, and electrolyzer efficiency for any specified inlet steam, hydrogen, and sweep-gas flow rates, current density, cell active area, and external heat loss or gain. The lifecycle cost analyses were performed using the H2A analysis methodology developed by the Department of Energy (DOE) Hydrogen Program. This methodology utilizes spreadsheet analysis tools that require detailed plant performance information (obtained from HYSYS), along with financial and cost information to calculate lifecycle costs. There are standard default sets of assumptions that the methodology uses to ensure consistency when comparing the cost of different production or plant design options. However, these assumptions may also be varied within the spreadsheets when better information is available or to allow the performance of sensitivity studies. The selected reference plant design for this study was a 1500 kg/day forecourt hydrogen production plant operating in the thermal-neutral mode. The plant utilized industrial natural gas-fired heaters to provide process heat, and grid electricity to supply power to the electrolyzer modules and system components. Modifications to the reference design included replacing the gas-fired heaters with electric resistance heaters, changing the operating mode of the electrolyzer (to operate below the thermal-neutral voltage), and considering a larger 50,000 kg/day central hydrogen production plant design. Total H2A-calculated hydrogen production costs for the reference 1,500 kg/day forecourt hydrogen production plant were $3.42/kg. The all-electric plant design using electric resistance heaters for process heat, and the reference design operating below the thermal-neutral voltage had calculated lifecycle hydrogen productions costs of $3.55/kg and $5.29/kg, respectively. Because of its larger size and associated economies of scale, the 50,000 kg/day central hydrogen production plant was able to produce hydrogen at a cost of only $2.89/kg.

  6. Life-cycle assessment of corn-based butanol as a potential transportation fuel.

    SciTech Connect (OSTI)

    Wu, M.; Wang, M.; Liu, J.; Huo, H.; Energy Systems

    2007-12-31

    Butanol produced from bio-sources (such as corn) could have attractive properties as a transportation fuel. Production of butanol through a fermentation process called acetone-butanol-ethanol (ABE) has been the focus of increasing research and development efforts. Advances in ABE process development in recent years have led to drastic increases in ABE productivity and yields, making butanol production worthy of evaluation for use in motor vehicles. Consequently, chemical/fuel industries have announced their intention to produce butanol from bio-based materials. The purpose of this study is to estimate the potential life-cycle energy and emission effects associated with using bio-butanol as a transportation fuel. The study employs a well-to-wheels analysis tool--the Greenhouse Gases, Regulated Emissions and Energy Use in Transportation (GREET) model developed at Argonne National Laboratory--and the Aspen Plus{reg_sign} model developed by AspenTech. The study describes the butanol production from corn, including grain processing, fermentation, gas stripping, distillation, and adsorption for products separation. The Aspen{reg_sign} results that we obtained for the corn-to-butanol production process provide the basis for GREET modeling to estimate life-cycle energy use and greenhouse gas emissions. The GREET model was expanded to simulate the bio-butanol life cycle, from agricultural chemical production to butanol use in motor vehicles. We then compared the results for bio-butanol with those of conventional gasoline. We also analyzed the bio-acetone that is coproduced with bio-butanol as an alternative to petroleum-based acetone. Our study shows that, while the use of corn-based butanol achieves energy benefits and reduces greenhouse gas emissions, the results are affected by the methods used to treat the acetone that is co-produced in butanol plants.

  7. Life-cycle analysis results of geothermal systems in comparison to other power systems.

    SciTech Connect (OSTI)

    Sullivan, J. L.; Clark, C. E.; Han, J.; Wang, M.; Energy Systems

    2010-10-11

    A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's expanded Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies. As a basis of comparison, a similar analysis has been conducted for other power-generating systems, including coal, natural gas combined cycle, nuclear, hydroelectric, wind, photovoltaic, and biomass by expanding the GREET model to include power plant construction for these latter systems with literature data. In this way, the GREET model has been expanded to include plant construction, as well as the usual fuel production and consumption stages of power plant life cycles. For the plant construction phase, on a per-megawatt (MW) output basis, conventional power plants in general are found to require less steel and concrete than renewable power systems. With the exception of the concrete requirements for gravity dam hydroelectric, enhanced geothermal and hydrothermal binary used more of these materials per MW than other renewable power-generation systems. Energy and greenhouse gas (GHG) ratios for the infrastructure and other life-cycle stages have also been developed in this study per kilowatt-hour (kWh) of electricity output by taking into account both plant capacity and plant lifetime. Generally, energy burdens per energy output associated with plant infrastructure are higher for renewable systems than conventional ones. GHG emissions per kWh of electricity output for plant construction follow a similar trend. Although some of the renewable systems have GHG emissions during plant operation, they are much smaller than those emitted by fossil fuel thermoelectric systems. Binary geothermal systems have virtually insignificant GHG emissions compared to fossil systems. Taking into account plant construction and operation, the GREET model shows that fossil thermal plants have fossil energy use and GHG emissions per kWh of electricity output about one order of magnitude higher than renewable power systems, including geothermal power.

  8. Detection attacks on cryptographic protocols and bound randomness

    E-Print Network [OSTI]

    Antonio Acín; Daniel Cavalcanti; Elsa Passaro; Stefano Pironio; Paul Skrzypczyk

    2015-04-30

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. The derived critical detection efficiencies for security imply that the implementation of most partly device independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely non-local correlations in which a non-signalling eavesdropper can find out a posteriori the result of any implemented measurement.

  9. Coordinated Variable Structure Switching Attacks for Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11

    attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one...

  10. The Middle East under Malware Attack Dissecting Cyber Weapons

    E-Print Network [OSTI]

    Almulhem, Ahmad

    the middle east was the Shamoon attack on Saudi Aramco [10]. Shamoon malware [11] is less sophisticated than destruction of the content of around 30,000 workstations in Saudi Aramco [12], [10]. Given the amount

  11. Single-block collision attack on MD5 Marc Stevens

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands marc@marc-stevens.nl January 29, 2012 Abstract In 2010, Tao Xie and Dengguo Feng

  12. Maximum Damage Malware Attack in Mobile Wireless Networks

    E-Print Network [OSTI]

    such as those in relaying data and establishing end-to-end routes (e.g., sinkhole attacks [1]), or even alter such as the wormhole [7], sinkhole [1], and Sybil [8], that utilize vulnerabilities in the routing protocols

  13. Maximum Damage Battery Depletion Attack in Mobile Sensor Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    functions such as relaying and establishing end-to-end routes (e.g., sinkhole attacks [2]), or even such as the wormhole [6], sinkhole [2], and Sybil [7], that utilize vulner- abilities in the routing protocols

  14. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  15. Life-Cycle Water Impacts of U.S. Transportation Fuels

    E-Print Network [OSTI]

    Scown, Corinne Donahue

    2010-01-01

    Protection in Primary Crude Oil Refining Units. ChemistryCO2 Emissions for Selected Crude Oils in the U.S. RefiningProtection in Primary Crude Oil Refining Units. Chemistry

  16. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique

  17. Identification of Repeated Attacks Using Network Traffic Alefiya Hussain John Heidemann Christos Papadopoulos

    E-Print Network [OSTI]

    Papadopoulos, Christos

    designed a multi-dimensional maximum-likelihood classifier to identify re- peated attack scenarios, by inference, the same attacker, much as ballistics studies of firearms can trace multiple uses of a weapon to the same gun. Such evidence of repeated attacks would help establish the maliciousness of a given attacker

  18. Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    SFINKS [8], the simple attack would require only about 42 2 operations and 32Kb of keystream higher order nonlinearity. Introduction Algebraic attacks are an attractive field for investigation, a number of papers were written which investigated, extended and improved algebraic attacks. These attacks

  19. A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    availability. Replication in it­ self, however, is not enough against malicious attacks that are specifically be distinguished: bandwidth consumption at­ tacks and resource consumption attacks. In a bandwidth con­ sumption accept requests from legitimate clients anymore. In a resource consumption attack, the attacker sends

  20. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  1. Protecting Wildlife

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPressthis siteProspective UsersProtecting

  2. Protections: Sampling

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich MatricesstudentsProjectsProperty -Protected

  3. An assessment of potential for benefit from integrating geographic information systems technology into life-cycle management of infrastructures a focus for infrastructure management practice 

    E-Print Network [OSTI]

    Millegan, Harold Lynn

    1997-01-01

    AN ASSESSMENT OF POTE~ FOR BENEFIT FROM INTEGRATING GEOGRAPHIC INFORMATION SYSTEMS TECHNOLOGY INTO LIFE-CYCLE MANAGEMENT OF INFRASTRUCTURES A FOCUS FOR INFRASTRUCTURE MANAGEMENT PRACTICE A Thesis HAROLD LYNN MILLEGAN Submitted to the OIIIce.... Congress, Office of Technology Assessment 1991), This technology is not presently used to its potential and should be used more extensively by civil engineers. A proper focus is needed to integrate this spatially oriented technology to life-cycle...

  4. MARVEL: A PC-based interactive software package for life-cycle evaluations of hybrid/electric vehicles

    SciTech Connect (OSTI)

    Marr, W.W.; He, J.

    1995-07-01

    As a life-cycle analysis tool, MARVEL has been developed for the evaluation of hybrid/electric vehicle systems. It can identify the optimal combination of battery and heat engine characteristics for different vehicle types and performance requirements, on the basis of either life-cycle cost or fuel efficiency. Battery models that allow trade-offs between specific power and specific energy, between cycle life and depth of discharge, between peak power and depth of discharge, and between other parameters, are included in the software. A parallel hybrid configuration, using an internal combustion engine and a battery as the power sources, can be simulated with a user-specified energy management strategy. The PC-based software package can also be used for cost or fuel efficiency comparisons among conventional, electric, and hybrid vehicles.

  5. Danish Environmental Protection Agency

    E-Print Network [OSTI]

    Columbia University

    Danish Environmental Protection Agency Waste in Denmark Ministry of Environment and Energy, Denmark Danish Environmental Protection Agency #12;Danish Environmental Protection Agency Waste in Denmark Ministry of Environment and Energy, Denmark Danish Environmental Protection Agency #12;Contents Waste

  6. Collaborative Defense of Transmission and Distribution Protection and Control Devices against Cyber Attacks (CODEF)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based Fuels|Programs |Chart ofClark EnergyClosing GapsClaude R.Combustion

  7. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeployment |Energyand Let Local

  8. Levelized life-cycle costs for four residue-collection systems and four gas-production systems

    SciTech Connect (OSTI)

    Thayer, G.R.; Rood, P.L.; Williamson, K.D. Jr.; Rollett, H.

    1983-01-01

    Technology characterizations and life-cycle costs were obtained for four residue-collection systems and four gas-production systems. All costs are in constant 1981 dollars. The residue-collection systems were cornstover collection, wheat-straw collection, soybean-residue collection, and wood chips from forest residue. The life-cycle costs ranged from $19/ton for cornstover collection to $56/ton for wood chips from forest residues. The gas-production systems were low-Btu gas from a farm-size gasifier, solar flash pyrolysis of biomass, methane from seaweed farms, and hydrogen production from bacteria. Life-cycle costs ranged from $3.3/10/sup 6/ Btu for solar flash pyrolysis of biomass to $9.6/10/sup 6/ Btu for hydrogen from bacteria. Sensitivity studies were also performed for each system. The sensitivity studies indicated that fertilizer replacement costs were the dominate costs for the farm-residue collection, while residue yield was most important for the wood residue. Feedstock costs were most important for the flash pyrolysis. Yields and capital costs are most important for the seaweed farm and the hydrogen from bacteria system.

  9. Life-cycle energy savings potential from aluminum-intensive vehicles

    SciTech Connect (OSTI)

    Stodolsky, F.; Vyas, A.; Cuenca, R.; Gaines, L.

    1995-07-01

    The life-cycle energy and fuel-use impacts of US-produced aluminum-intensive passenger cars and passenger trucks are assessed. The energy analysis includes vehicle fuel consumption, material production energy, and recycling energy. A model that stimulates market dynamics was used to project aluminum-intensive vehicle market shares and national energy savings potential for the period between 2005 and 2030. We conclude that there is a net energy savings with the use of aluminum-intensive vehicles. Manufacturing costs must be reduced to achieve significant market penetration of aluminum-intensive vehicles. The petroleum energy saved from improved fuel efficiency offsets the additional energy needed to manufacture aluminum compared to steel. The energy needed to make aluminum can be reduced further if wrought aluminum is recycled back to wrought aluminum. We find that oil use is displaced by additional use of natural gas and nonfossil energy, but use of coal is lower. Many of the results are not necessarily applicable to vehicles built outside of the United States, but others could be used with caution.

  10. Novel pathways for fuels and lubricants from biomass optimized using life-cycle greenhouse gas assessment

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Balakrishnan, Madhesan; Sacia, Eric R.; Sreekumar, Sanil; Gunbas, Gorkem; Gokhale, Amit A.; Scown, Corinne D.; Toste, F. Dean; Bell, Alexis T.

    2015-06-08

    Decarbonizing the transportation sector is critical to achieving global climate change mitigation. Although biofuels will play an important role in conventional gasoline and diesel applications, bioderived solutions are particularly important in jet fuels and lubricants, for which no other viable renewable alternatives exist. Producing compounds for jet fuel and lubricant base oil applications often requires upgrading fermentation products, such as alcohols and ketones, to reach the appropriate molecular-weight range. Ketones possess both electrophilic and nucleophilic functionality, which allows them to be used as building blocks similar to alkenes and aromatics in a petroleum refining complex. Here, we develop a methodmore »for selectively upgrading biomass-derived alkyl methyl ketones with >95% yields into trimer condensates, which can then be hydrodeoxygenated in near-quantitative yields to give a new class of cycloalkane compounds. The basic chemistry developed here can be tailored for aviation fuels as well as lubricants by changing the production strategy. We demonstrate that a sugarcane biorefinery could use natural synergies between various routes to produce a mixture of lubricant base oils and jet fuels that achieve net life-cycle greenhouse gas savings of up to 80%.« less

  11. Life-cycle analysis results for geothermal systems in comparison to other power systems: Part II.

    SciTech Connect (OSTI)

    Sullivan, J.L.; Clark, C.E.; Yuan, L.; Han, J.; Wang, M.

    2012-02-08

    A study has been conducted on the material demand and life-cycle energy and emissions performance of power-generating technologies in addition to those reported in Part I of this series. The additional technologies included concentrated solar power, integrated gasification combined cycle, and a fossil/renewable (termed hybrid) geothermal technology, more specifically, co-produced gas and electric power plants from geo-pressured gas and electric (GPGE) sites. For the latter, two cases were considered: gas and electricity export and electricity-only export. Also modeled were cement, steel and diesel fuel requirements for drilling geothermal wells as a function of well depth. The impact of the construction activities in the building of plants was also estimated. The results of this study are consistent with previously reported trends found in Part I of this series. Among all the technologies considered, fossil combustion-based power plants have the lowest material demand for their construction and composition. On the other hand, conventional fossil-based power technologies have the highest greenhouse gas (GHG) emissions, followed by the hybrid and then two of the renewable power systems, namely hydrothermal flash power and biomass-based combustion power. GHG emissions from U.S. geothermal flash plants were also discussed, estimates provided, and data needs identified. Of the GPGE scenarios modeled, the all-electric scenario had the highest GHG emissions. Similar trends were found for other combustion emissions.

  12. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.

  13. Physical protection technologies for the reconfigured weapons complex

    SciTech Connect (OSTI)

    Jaeger, C.D.

    1994-08-01

    Sandia National Laboratories was a memtier of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S&S) team providing assistance to the Department of Energy`s (DOE) Office of Weapons Complex Reconfigaration. New and improved S&S concepts, approaches and technologies were needed to support both new and upgraded facilities. Physical protection technologies used in these facilities were to use proven state-of-the-art systems in such areas as image processing, alarm communications and display, entry control, contraband detection, intrusion detection and video assessment, access delay, automation and robotics, and various insider protection systems. Factors considered in the selection of these technologies were protection against the design basis threat, reducing S&S life-cycle costs, automation of S&S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, increasing the amount of delay to an outsider adversary and having reliable and maintainable systems. This paper will discuss the S&S issues, requirements, technology opportunities and needs. Physical protection technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed.

  14. Integrity Under Attack: The State of Scholarly Publishing

    E-Print Network [OSTI]

    Arnold, Douglas N.

    Integrity Under Attack: The State of Scholarly Publishing By Douglas N. Arnold Scientific journals depend. Publications are used by universities, funding agencies, and others as a primary measure, and in the ranking of departments, institutions, even nations. With big rewards tied to publication

  15. Practical Attacks on Digital Signatures Using MD5 Message Digest

    E-Print Network [OSTI]

    Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department schemes based on MD5 message digest on an example using GPG. Keywords: collision, hash function, MD5 1 used for file integrity checking and as a message digest in digital signature schemes. During CRYPTO

  16. Congestion Attacks to Autonomous Cars Using Vehicular Botnets

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Congestion Attacks to Autonomous Cars Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre of the cars in the targeted area by orders of magnitude. After 5 minutes, the targeted road becomes completely prevent collisions. In a VANET, cars communicate with each other over a wireless channel. They can send

  17. Rootkits on Smart Phones: Attacks, Implications and Opportunities

    E-Print Network [OSTI]

    Iftode, Liviu

    Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford Ryan O Smart phones are increasingly being equipped with operating sys- tems that compare in complexity with those on desktop comput- ers. This trend makes smart phone operating systems vulnerable to many

  18. Smart-Phone Attacks and Defenses Chuanxiong Guo

    E-Print Network [OSTI]

    Wang, Bing

    Smart-Phone Attacks and Defenses Chuanxiong Guo xguo@ieee.org Microsoft Research Helen J. Wang smart-phones), and our environment (e.g., through the use of sensors, actuators, and RFIDs). While is becoming a reality: Smart-phones, interoperable between the telecom networks and the Inter- net

  19. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    E-Print Network [OSTI]

    Johnson, Aaron

    }@informatik.hu-berlin.de Abstract--Tor is a distributed onion-routing network used for achieving anonymity and resisting censorship and transferring roughly 3 GiB/s in aggregate [8]. Tor uses onion routing [25] to route clients' traffic throughThe Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen Florian

  20. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    E-Print Network [OSTI]

    }@informatik.hu-berlin.de Abstract--Tor is a distributed onion-routing network used for achieving anonymity and resisting censorshipB/s in aggregate [4]. Tor uses onion routing [5] to route clients' traffic through a circuit of geo- graphicallyThe Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen Florian

  1. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  2. Anti-discrimination Analysis Using Privacy Attack Strategies

    E-Print Network [OSTI]

    Ruggieri, Salvatore

    Anti-discrimination Analysis Using Privacy Attack Strategies Salvatore Ruggieri1 , Sara Hajian2 and Technology, Saudi Arabia Abstract. Social discrimination discovery from data is an important task to identify deploy privacy at- tack strategies as tools for discrimination discovery under hard assump- tions which

  3. Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins

    E-Print Network [OSTI]

    Perrig, Adrian

    Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins ˇ Adrian Perrig Ion hosts is denial- of-service (DoS) caused by IP packet floods. Hosts in the Internet are unable to stop ­ not the net- work ­ should be given control to respond to packet floods and overload. Ideally, hosts should

  4. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern systems are mon- itored and controlled by Supervisory Control and Data Ac- quisition (SCADA) systems

  5. Fighting Coordinated Attackers with Cross-Organizational Information Sharing

    E-Print Network [OSTI]

    Paxson, Vern

    Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman, Ethan upon real-world crime fighting. While society employs highly trained crime- fighters ("detectives of fighting crime, their value is in their numbers and prevalence. Detectives are charged with detecting

  6. Defending Synchrophasor Data Networks Against Traffic Analysis Attacks

    E-Print Network [OSTI]

    Sikdar, Biplab

    - tem. PMU data serves to facilitate a number of applications while enhancing others, such as real generation and distribution system, monitoring and manipulation of PMU data are particularly attractive of the PMU data measurement and collection network against a class of passive attacks and develops defense

  7. A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data

    E-Print Network [OSTI]

    Sikdar, Biplab

    in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number in the maintenance and control of the power generation and distribution system, monitoring and manipulation of PMU. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks

  8. Attacks based on Conditional Correlations against the Nonlinear Filter Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ­based keystream generator which could be used as a basic building block in a synchronous stream cipher system of a keystream generator (i.e. NLFG) in a synchronous secret key encryption and decryption system. 2 #12Attacks based on Conditional Correlations against the Nonlinear Filter Generator Bernhard L

  9. How to help people who have heart attacks

    E-Print Network [OSTI]

    Lega, Joceline

    How to help people who have heart attacks Meghan McGovern Monday, December 03, 2012 #12;5 Heart-Lung Machine Extracorporeal Membrane Oxygenation #12;6 Electrocardiograph (ECG) #12;7 Artificial Hearts #12;8 Tissue Engineering O Researchers Rebuild Beating Heart with Cardiac Derived Cells! O January

  10. Attacks on Android Clipboard Xiao Zhang and Wenliang Du

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Attacks on Android Clipboard Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer perform a thorough study on the risks im- posed by the globally accessible Android Clipboard. Based briefly discuss some potential solutions. 1 Introduction Android was developed by Google in 2008

  11. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute without the contraint of special hardware and dependency on physical medium of wireless network. BAAP and router at the same time. Most of the previous research has focused on problems of routing

  12. THE BLIND PATTERN MATCHING ATTACK ON WATERMARK SYSTEMS

    E-Print Network [OSTI]

    Petitcolas, Fabien A.P.

    complex- ity to reverse the permutations as a preprocessing step for watermark detection. In this paper, we describe the logistics of the attack and a recipe for its implementation against an audio be shown that any WM detector is facing a task of exponential complexity to reverse the permutations

  13. Insects and Related Pests Attacking Lawns and Ornamental Plants. 

    E-Print Network [OSTI]

    Almand, Lyndon K.; Thomas, John G.

    1968-01-01

    Lawns and 0 rnamental Plants i* - .* " TEXAS AIM UNIVERSITY ,I TEXAS AGRICULTURAL EXTENSION SERVIC ' ' 1. E. Hutchison. Director. College Station, Vixtis Photographs in this publication have two numbering series . Any figure number followed by a... small "a" refers to a colored illustration . All colored illustrations appear on pages 12 through 15 . PESTS ATTACKING LAWNS Sucking Pests Southern Chinch Bugs .................................................................................. 2...

  14. Silicon nitride protective coatings for silvered glass mirrors

    DOE Patents [OSTI]

    Tracy, C.E.; Benson, D.K.

    1984-07-20

    A protective diffusion barrier for metalized mirror structures is provided by a layer or coating of silicon nitride which is a very dense, transparent, dielectric material that is impervious to water, alkali, and other impurities and corrosive substances that typically attack the metal layers of mirrors and cause degradation of the mirrors' reflectivity. The silicon nitride layer can be deposited on the substrate prior to metal deposition thereon to stabilize the metal/substrate interface, and it can be deposited over the metal to encapsulate it and protect the metal from corrosion or other degradation. Mirrors coated with silicon nitride according to this invention can also be used as front surface mirrors.

  15. Glass Composition Constraint Recommendations for Use in Life-Cycle Mission Modeling

    SciTech Connect (OSTI)

    McCloy, John S.; Vienna, John D.

    2010-05-03

    The component concentration limits that most influence the predicted Hanford life-cycle HLW glass volume by HTWOS were re-evaluated. It was assumed that additional research and development work in glass formulation and melter testing would be performed to improve the understanding of component effects on the processability and product quality of these HLW glasses. Recommendations were made to better estimate the potential component concentration limits that could be applied today while technology development is underway to best estimate the volume of HLW glass that will eventually be produced at Hanford. The limits for concentrations of P2O5, Bi2O3, and SO3 were evaluated along with the constraint used to avoid nepheline formation in glass. Recommended concentration limits were made based on the current HLW glass property models being used by HTWOS (Vienna et al. 2009). These revised limits are: 1) The current ND should be augmented by the OB limit of OB ? 0.575 so that either the normalized silica (NSi) is less that the 62% limit or the OB is below the 0.575 limit. 2) The mass fraction of P2O5 limit should be revised to allow for up to 4.5 wt%, depending on CaO concentrations. 3) A Bi2O3 concentration limit of 7 wt% should be used. 4) The salt accumulation limit of 0.5 wt% SO3 may be increased to 0.6 wt%. Again, these revised limits do not obviate the need for further testing, but make it possible to more accurately predict the impact of that testing on ultimate HLW glass volumes.

  16. New Collision attacks Against Up To 24step SHA2 Somitra Kumar Sanadhya # and Palash Sarkar

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Applied Statistics Unit, Indian Statistical Institute, 203, B.T. Road, Kolkata, India 700108. somitra r. of India. #12; . The complexity of 24­step SHA­512 attack is improved in comparison to the existing attack

  17. Identification of Repeated Attacks Using Network Traffic Alefiya Hussain John Heidemann Christos Papadopoulos

    E-Print Network [OSTI]

    Heidemann, John

    trace multiple uses of a weapon to the same gun. Such evidence of repeated attacks would help establish only by reducing attack effectiveness. We designed a multi-dimensional maximum-likelihood classifier

  18. Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans

    E-Print Network [OSTI]

    Gurumurthi, Sudhanva

    Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans University thermal management alternative. Keywords: storage systems, security, thermal management, denial shut-down. Our new thermal attack on future storage systems is unrecognized by current Intrusion

  19. Automatic Creation of SQL Injection and Cross-Site Scripting Attacks

    E-Print Network [OSTI]

    Kiezun, Adam

    2008-09-10

    We present a technique for finding security vulnerabilitiesin Web applications. SQL Injection (SQLI) and cross-sitescripting (XSS) attacks are widespread forms of attackin which the attacker crafts the input to the application ...

  20. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    that the open nature of web browsers provides a feasible \\point of entry" for this attack via a corrupted plug of web-browser plug-ins could easily provide a \\point of entry" for chosen-plaintext attacks

  1. A spillway infrastructure for defense against Distributed Denial of Service attacks 

    E-Print Network [OSTI]

    Barkley, Andrew Holman

    2000-01-01

    Distributed Denial of Service (DDoS) attacks have proven to be disruptive forces on the Internet. There is currently no means of defense from such attacks, as they are exploitations of mechanisms that are critical for normal operation...

  2. Protecting Life on Earth

    E-Print Network [OSTI]

    Anderson, Byron P.

    2011-01-01

    Review: Protecting Life on Earth: An Introduction to thePeter B. Protecting Life on Earth: An Introduction to theof Protecting Life on Earth is “to explain to an intelligent

  3. Encapsulants for protecting MEMS devices during post-packaging release etch

    DOE Patents [OSTI]

    Peterson, Kenneth A.

    2005-10-18

    The present invention relates to methods to protect a MEMS or microsensor device through one or more release or activation steps in a "package first, release later" manufacturing scheme: This method of fabrication permits wirebonds, other interconnects, packaging materials, lines, bond pads, and other structures on the die to be protected from physical, chemical, or electrical damage during the release etch(es) or other packaging steps. Metallic structures (e.g., gold, aluminum, copper) on the device are also protected from galvanic attack because they are protected from contact with HF or HCL-bearing solutions.

  4. Chosen Ciphertext Attack on SSS Joan Daemen1, Joseph Lano2 , and Bart Preneel2

    E-Print Network [OSTI]

    Bernstein, Daniel

    - cryption with DES in CFB mode was analyzed with respect to chosen ciphertext attacks in [7]. The stream

  5. Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy

    E-Print Network [OSTI]

    Boyd, Colin

    testbed. The testbed simulated actuators and sensors of a hydro-power system. The attacks using DNP3 were

  6. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  7. Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions

    E-Print Network [OSTI]

    Halgamuge, Malka N.

    Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions Dung V hack tools. However, beside U3 technology, attackers also have another more flexible alternative, portable application or application virtualization, which allows a wide range of hack tools to be compiled

  8. Office of Physical Protection

    Broader source: Energy.gov [DOE]

    The Office of Physical Protection is comprised of a team of security specialists engaged in providing Headquarters-wide physical protection.

  9. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris and Start (PKES) systems used in modern cars. We build two efficient and inexpensive attack realizations, wired and wireless physical-layer relays, that allow the attacker to en- ter and start a car by relaying

  10. An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato Entrust, Inc.mister,robert.zuccherato}@entrust.com Abstract. This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode for each block. Standard CFB mode encryption does not appear to be affected by this attack. It applies

  11. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses

    E-Print Network [OSTI]

    Saxena, Nitesh

    The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

  12. Pollution Attack Defense for Coding Based Sensor Levente Buttyan, Laszlo Czap, Istvan Vajda

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    Pollution Attack Defense for Coding Based Sensor Storage Levente Butty´an, L´aszl´o Czap, Istv to make network coding based storage secure against pollution attacks in sensor networks. The approach], [12], [13]. We present a scheme that resists pollution attacks, meaning that our scheme makes possible

  13. Dynamic Load Altering Attacks in Smart Grid Sajjad Amini, Hamed Mohsenian-Rad, and Fabio Pasqualetti

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    response and demand side management programs. It attempts to control and change certain unsecured is on attacks against demand re- sponse (DR) and demand side management (DSM) programs. DR programs are used}@ece.ucr.edu and fabiopas@engr.ucr.edu Abstract--A load altering attack (LAA) is a cyber-physical attack against demand

  14. Impacts of Bad Data and Cyber Attacks on Electricity Market Operations

    E-Print Network [OSTI]

    operations. In particular, we investigated the problem from perspectives of an attacker and the controlImpacts of Bad Data and Cyber Attacks on Electricity Market Operations Final Project Report Power;#12;Impacts of Bad Data and Cyber Attacks on Electricity Market Operations Final Project Report Project Team

  15. On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack Mohammad Reza Sohizadeh against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) pro- tocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive attacks proposed

  16. Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

    E-Print Network [OSTI]

    Nita-Rotaru, Cristina

    1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

  17. Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis Song Sun was publicly intro- duced, power analysis attacks on cryptographic systems have be- come an increasingly of power analysis attacks and preventative techniques on both software (e.g. smartcard, DSP) and hardware

  18. Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks

    E-Print Network [OSTI]

    Nam, Seung Yeob

    1 Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks Seung Yeob Nam, Member- tion Protocol (ARP) is proposed to prevent ARP poisoning-based Man-in-the-Middle (MITM) attacks deployable. Index Terms--ARP cache poisoning, Man-in-the-Middle attack, ARP poisoning prevention, voting. I

  19. Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ives, Zachary G.

    Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor in improving resilience against sinkhole attacks, even in the presence of some collusion. I. INTRODUCTION

  20. Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks

    E-Print Network [OSTI]

    Le Fessant, Fabrice - Institut national de recherche en informatique et en automatique, Centre de recherche INRIA Saclay

    Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor are effective in improving resilience against sinkhole attacks, even in the presence of some collusion. I

  1. Automatic Search of Attacks on round-reduced AES and Applications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Search of Attacks on round-reduced AES and Applications Charles Bouillaguet, Patrick of these tools, we show that they allow to automatically discover new attacks on round-reduced AES with very low to find better attacks, new automatic tools have been designed to automatically search either related

  2. False Data Injection Attacks with Incomplete Information Against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    False Data Injection Attacks with Incomplete Information Against Smart Power Grids Md. Ashfaqur introduced as an important class of cyber attacks against smart grid's wide area measurement and monitoring Injection Attack, Smart Grid Security, Incomplete Information, Transmission Line Admittance Uncer- tainty

  3. Examples of the Generalized Quantum Permanent Compromise Attack to the Blum-Micali Construction

    E-Print Network [OSTI]

    Guedes, Elloá B; Lula, Bernardo

    2010-01-01

    This paper presents examples of the quantum permanent compromise attack to the Blum-Micali construction. Such attacks illustrate how a previous attack to the Blum-Micali generator can be extended to the whole Blum-Micali construction, including the Blum-Blum-Shub and Kaliski generators.

  4. Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Patrick Derbez and Léo cipher they designed, PRINCE. Instead of trying to attack as many rounds as possible using attacks which on round-reduced PRINCE includ- ing the ones which won the challenge in the 6 and 8-round categories

  5. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  6. Fire Protection Program Metrics

    Broader source: Energy.gov [DOE]

    Presenter: Perry E. D ’Antonio, P.E., Acting Sr. Manager, Fire Protection - Sandia National Laboratories

  7. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  8. In recent, well-publicized attacks, the attackers first broke into many ill protected Internet hosts, and then used these hosts as

    E-Print Network [OSTI]

    Lee, Ruby B.

    incentives upon the users of the Intemet. The machinery and the incentives interlock and must be designed system we must design.. The machinery in the Internet will trace a packet flood as close as possible program. In the long run, we need two things. We need suitable machinery in the Internet and suitable

  9. An Electricity-focused Economic Input-output Model: Life-cycle Assessment and Policy Implications of Future Electricity Generation Scenarios

    E-Print Network [OSTI]

    on the environmental impacts associated with electricity consumption, and that interstate trading tends to makeAn Electricity-focused Economic Input-output Model: Life-cycle Assessment and Policy Implications of Future Electricity Generation Scenarios Joe Marriott Submitted in Partial Fulfillment of the Requirements

  10. A Model for Evaluation of Life-Cycle Energy Savings of Occupancy Sensors for Control of Lighting and Ventilation in Office Buildings 

    E-Print Network [OSTI]

    Degelman, L. O.

    2000-01-01

    and life-cycle costs of the building. When comparing to actual use patterns, the Monte Carlo process was shown to represent an adequate way to represent the on-off patterns. Computer simulations further demonstrate the potential life cycle cost savings from...

  11. Environmental Life-cycle Assessment of Passenger Transportation An Energy, Greenhouse Gas, and Criteria Pollutant Inventory of Rail and Air Transportation

    E-Print Network [OSTI]

    Horvath, Arpad; Chester, Mikhail

    2008-01-01

    Editor, 1996. The history of LCA, McGraw-Hill, New York,CAHSR CAP CO EIOLCA GGE GHG J LCA LTO NO X Pb PMT PM X SO 2is life-cycle assessment. LCA is a systematic method in

  12. WP05 Labour's record on cash transfers, poverty, inequality and the lifecycle 1997-2010 Labour's Record on Neighbourhood Renewal in

    E-Print Network [OSTI]

    Banaji,. Murad

    WP05 Labour's record on cash transfers, poverty, inequality and the lifecycle 1997-2010 Labour of wealth, poverty, income inequality and spatial difference. The full programme of analysis will include and on poverty and inequality particularly. This provides a baseline for analysing and understanding the changes

  13. Accepted for publication in Energy Policy Greenhouse-gas Emissions from Solar Electric-and Nuclear Power: A Life-cycle

    E-Print Network [OSTI]

    Accepted for publication in Energy Policy Greenhouse-gas Emissions from Solar Electric- and Nuclear., 2002). However, all anthropogenic means of energy production, including solar and nuclear, generate Power: A Life-cycle Study Vasilis M. Fthenakis1,2, * and Hyung Chul Kim1 1 Energy Sciences

  14. Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non-Repudiation Protocol

    E-Print Network [OSTI]

    Chen, Yu

    1 Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non security issues in cloud storage: repudiation, fairness, and roll-back attacks. We proposed a novel fair and is capable of preventing roll-back attacks. Keywords: Cloud Storage, Non-repudiation, Roll-back Attack. 1

  15. A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. LaPorta

    E-Print Network [OSTI]

    Yener, Aylin

    1 A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of Cross Infrastructure Cyber Attacks in addition to the standard Single

  16. Protection Program Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-10-14

    This Order establishes requirements for the management and operation of the Department of Energy (DOE) Federal Protective Forces (FPF), Contractor Protective Forces (CPF), and the Physical Security of property and personnel under the cognizance of DOE.

  17. Protective Force Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-30

    Provides detailed requirements to supplement DOE O 473.2, Protective Force Program, which establishes the requirements and responsibilities for management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Does not cancel other directives.

  18. Voluntary Protection Program Announcement

    Broader source: Energy.gov [DOE]

    Secretary O'Leary formally announced a new initiative, "The Department of Energy Voluntary Protection Program (DOEVPP)," which is designed to recognize contractor sites that are providing excellent safety and health protection to their employees.

  19. Interaction, protection and epidemics

    E-Print Network [OSTI]

    Goyal, Sanjeev; Vigier, Adrien

    2015-03-06

    unique equilibrium: individuals who invest in protection choose to interact more relative to those who do not invest in protection. Changes in the contagiousness of the disease have non-monotonic effects: as a result interaction initially falls...

  20. Livestock Risk Protection 

    E-Print Network [OSTI]

    Thompson, Bill; Bennett, Blake; Jones, Diana

    2008-10-21

    Livestock risk protection (LRP) insurance policies protect producers from adverse price changes in the livestock market. This publication explains how LRP works, discusses the advantages and disadvantages of these polices, and gives examples...

  1. Model Fire Protection Program

    Broader source: Energy.gov [DOE]

    To facilitate conformance with its fire safety directives and the implementation of a comprehensive fire protection program, DOE has developed a number of "model" program documents. These include a comprehensive model fire protection program, model fire hazards analyses and assessments, fire protection system inspection and testing procedures, and related material.

  2. RADIONUCLIDE RADIATION PROTECTION

    E-Print Network [OSTI]

    Zakhor, Avideh

    RADIONUCLIDE AND RADIATION PROTECTION DATA HANDBOOK 2002 D. Delacroix* J. P. Guerre** P. Leblanc'Energie Atomique, CEA/Saclay, France ISBN 1 870965 87 6 RADIATION PROTECTION DOSIMETRY Vol. 98 No 1, 2002 Published by Nuclear Technology Publishing #12;RADIONUCLIDE AND RADIATION PROTECTION DATA HANDBOOK 2nd Edition (2002

  3. Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks

    E-Print Network [OSTI]

    Ruj, Sushmita

    2015-01-01

    We model smart grids as complex interdependent networks, and study targeted attacks on smart grids for the first time. A smart grid consists of two networks: the power network and the communication network, interconnected by edges. Occurrence of failures (attacks) in one network triggers failures in the other network, and propagates in cascades across the networks. Such cascading failures can result in disintegration of either (or both) of the networks. Earlier works considered only random failures. In practical situations, an attacker is more likely to compromise nodes selectively. We study cascading failures in smart grids, where an attacker selectively compromises the nodes with probabilities proportional to their degrees; high degree nodes are compromised with higher probability. We mathematically analyze the sizes of the giant components of the networks under targeted attacks, and compare the results with the corresponding sizes under random attacks. We show that networks disintegrate faster for targeted...

  4. Time Stamp Attack on Wide Area Monitoring System in Smart Grid

    E-Print Network [OSTI]

    Zhang, Zhenghao; Li, Husheng; Pei, Changxing

    2011-01-01

    Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

  5. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks 

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22

    were killed and more than 1,200 were injured by deadly terrorist attacks on commuter trains and stations in Madrid. These attacks had an enormous impact on the citizens of Spain, as well as the entire international community. The Madrid bombings... in its ?War on Terror? may carry additional costs. One unanticipated effect of these attacks was the victory of the Socialists over the ruling Partido Popular party in Spain in the next election. More importantly, this occurrence led to a sharp...

  6. Fire Protection Program Manual

    SciTech Connect (OSTI)

    Sharry, J A

    2012-05-18

    This manual documents the Lawrence Livermore National Laboratory (LLNL) Fire Protection Program. Department of Energy (DOE) Orders 420.1B, Facility Safety, requires LLNL to have a comprehensive and effective fire protection program that protects LLNL personnel and property, the public and the environment. The manual provides LLNL and its facilities with general information and guidance for meeting DOE 420.1B requirements. The recommended readers for this manual are: fire protection officers, fire protection engineers, fire fighters, facility managers, directorage assurance managers, facility coordinators, and ES and H team members.

  7. Practical realisation and elimination of an ECC-related software bug attack

    E-Print Network [OSTI]

    in modern e-business work-flows, are as follows: 1. Nguyen [28] described an attack on GPG version 1

  8. Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production

    E-Print Network [OSTI]

    Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production spasms, and other problems in the communities in which fracking occurs

  9. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  10. Protecting FWP Participant Personally Identifiable Information...

    Energy Savers [EERE]

    Protecting FWP Participant Personally Identifiable InformationProtected Health Information Protecting FWP Participant Personally Identifiable InformationProtected Health...

  11. Environmental Life-cycle Assessment of Passenger Transportation: A Detailed Methodology for Energy, Greenhouse Gas and Criteria Pollutant Inventories of Automobiles, Buses, Light Rail, Heavy Rail and Air v.2

    E-Print Network [OSTI]

    Chester, Mikhail; Horvath, Arpad

    2008-01-01

    Bodies Sector: Life Cycle Assessment Using Economic Input-H. , Pranzeck, J. , Life Cycle Assessment of a Complete Car:Nordic Guidelines on Life-Cycle Assessment, Nordic Council

  12. MITM (man-in-the-middle) attacks ARP spoofing

    E-Print Network [OSTI]

    Crandall, Jedidiah R.

    's) Others? Internet surveillance examples: U.S. (Protect America Act of 2007, FOIA, New Mexico Sunshine Act! (SQL injection examples from http://www.unixwiz.net/techtips/sql-injection.html) Internet censorship

  13. Complex networks vulnerability to module-based attacks

    E-Print Network [OSTI]

    da Cunha, Bruno Requiăo; Gonçalves, Sebastián

    2015-01-01

    In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaking complex networks is attracting much attention from practical points of view. In this contribution we present a module-based method to efficiently break complex networks. The procedure first identifies the communities in which the network can be represented, then it deletes the nodes (edges) that connect different modules by its order in the betweenness centrality ranking list. We illustrate the method by applying it to various well known examples of social, infrastructure, and biological networks. We show that the proposed method always outperforms vertex (edge) attacks which are based on the ranking of node (edge) degree or centrality, with a huge gain in efficiency for some examples. Remarkably, for the US power grid, the present method breaks the original network of 4941 nodes to many fragments smaller than 197 nodes (4% of the original size) by removing mere 164 nodes (~3%) identified by the procedure. B...

  14. Protective Actions and Reentry

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-08-21

    This volume defines appropriate protective actions and reentry of a site following an emergency. Canceled by DOE G 151.1-4.

  15. Radiation Protection Act (Pennsylvania)

    Broader source: Energy.gov [DOE]

    This Act combines the radiation safety provisions of The Atomic Energy Development and Radiation Control Act and the Environmental Radiation Protection Act, and empowers the Department of...

  16. Asset Protection Analysis Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-21

    The Guide provides examples of the application of as set protection analysis to several common problems. Canceled by DOE N 251.80.

  17. Physical Protection Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-12-23

    Supplements DOE O 473.1, by establishing requirements for the physical protection of safeguards and security interests. Cancels: DOE M 5632.1C-1

  18. ORISE: Human Subjects Protection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Human Subjects Protection The Oak Ridge Institute for Science and Education (ORISE) performs technical assessments to assist U.S. Department of Energy (DOE) laboratories involved...

  19. Detecting SYN Flooding Attacks Haining Wang Danlu Zhang Kang G. Shin

    E-Print Network [OSTI]

    Wang, Haining

    Detecting SYN Flooding Attacks Haining Wang Danlu Zhang Kang G. Shin EECS Department a simple and robust mechanism for de- tecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding

  20. The Effect of Mountain Pine Beetle Attack and Salvage Harvesting On Streamflows

    E-Print Network [OSTI]

    Northern British Columbia, University of

    The Effect of Mountain Pine Beetle Attack and Salvage Harvesting On Streamflows Special ....................................................................................................................4 FRPA requirements for Water Management in MPB-attacked watersheds ..........5 The Baker Creek. These disturbances have potential effects on water yield (the total amount of water flowing out of a watershed

  1. Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon McCoy, Brian Kantor,

    E-Print Network [OSTI]

    Hu, Fei

    Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon Mc discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics, we discuss the structural characteristics of the automotive ecosystem that give rise to such problems

  2. On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack

    E-Print Network [OSTI]

    Wang, Xinyuan "Frank"

    ], Onion Routing [24], Tor [10], Hordes [28], Web Mixes [6], Tarzan [13]) have been proposed to disguise conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer measurements and timing attack results show that the circuit rotation in Tor network could significantly

  3. Integral Cryptanalysis on reduced-round A way to extend the attack?

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Integral Cryptanalysis on reduced-round Safer++ ­ A way to extend the attack? ­ Gilles Piret an integral distinguisher over 2 rounds of Safer++. It allows a practical attack against 3 rounds of Safer for further research in order to extend integral cryptanalysis. 1 Introduction The integral cryptanalysis (or

  4. CellFlood: Attacking Tor Onion Routers on the Cheap Marco V. Barbera1

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    . As a way to mitigate the effect of this attack, we propose to use a client puzzle-based technique the design and implementation of an effective solution to the problem that relies on cryptographic client]. Such an attack could be used to either significantly degrade the users' perceived quality of service, which would

  5. Practical Limitations of Sliding-Mode Switching Attacks on Smart Grid Systems

    E-Print Network [OSTI]

    Kundur, Deepa

    Practical Limitations of Sliding-Mode Switching Attacks on Smart Grid Systems Abdallah K. Farraj}@comm.utoronto.ca, klbutler@tamu.edu Abstract--Switching attacks in smart grid systems have gained some recent attention practical limitations. I. INTRODUCTION Smart grid systems have enjoyed a recent interest from both

  6. Friend or Flood? Social prevention of flooding attacks in mobile opportunistic networks

    E-Print Network [OSTI]

    Henderson, Tristan

    Friend or Flood? Social prevention of flooding attacks in mobile opportunistic networks Iain Parris. In this paper we define a simple flooding attack that can deny service in an opportunistic network. We simulate untraceably flood the network with spoofed messages. As the available resources of participating devices (e

  7. Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal University of Texas combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious important instance of this is the pollution problem: if some routers in the network are malicious

  8. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks

    E-Print Network [OSTI]

    Lui, John C.S.

    Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li: cslui@cse.cuhk.edu.hk Abstract--Pollution attack is a severe security problem in network-coding enabled spreading of polluted packets to deplete network resources. We address this security problem even when

  9. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA Yong Wang1 to the Supervisory Con- trol And Data Acquisition (SCADA) system. Several intrusion detection schemes have been-graph-based detection scheme to defeat false data injec- tion attacks at the SCADA system, even when injected data may

  10. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying. The defense taxonomy classifies the body of existing DDoS de- fenses based on their design decisions

  11. Static Fault Attack on Hardware DES Registers Philippe Loubet-Moundi, Francis Olivier, and David Vigilant

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Static Fault Attack on Hardware DES Registers Philippe Loubet-Moundi, Francis Olivier, and David deals with static faults which lie in between. A static fault modifies a value loaded in a volatile], quickly became a privileged target for DFA. #12;2 Static Fault Attacks on Hardware DES Registers Indeed

  12. On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong

    E-Print Network [OSTI]

    Youssef, Amr M.

    On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong Center for Applied attack, nite elds, Ga- lois Field Fourier Transform 1 Introduction Gong and Golomb 7 introduced a new the later by decimation d. Gong and Golomb showed that the distance of DES S-boxes approximated

  13. 2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks on a smart grid. Keywords: smart grid cyber security; cyber attack impact analysis; graph-based dynamical systems; smart and Computer Engineering at Texas A&M University. Her research interests include cyber security of the smart

  14. DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

    E-Print Network [OSTI]

    California at Davis, University of

    DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks Lihua Yuan ECE, UC Davis lyuan cache poisoning, which causes the DNS to return false name-to-IP mappings and can be used as a foothold inaccurate DNS records caused by cache poisoning attacks. DoX also helps DNS servers to improve cache

  15. Adaptive Network Defense Management for Countering Smart Attack and Selective Capture

    E-Print Network [OSTI]

    Cao, Yong

    , humidity, tempera- ture, electrical characteristics, and radiation. · Smart City [46]: A query-based WSN1 Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless network defense management for countering smart attack and se- lective capture which aim to cripple

  16. Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao and Gregory G. Rose Abstract At IEEE GLOBECOM 2008, a lightweight cipher based on a Multiple Recursive Generator (MRG plaintext attack is proposed to construct the cipher's current state and generate subkeys used for all

  17. Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao and Gregory G. Rose Abstract At IEEE GLOBECOM 2008, a lightweight cipher based on a Multiple Recursive Generator (MRG attack is proposed to construct the cipher's current state and generate subkeys used for all subsequent

  18. Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices

    E-Print Network [OSTI]

    Kundur, Deepa

    vehicles, and energy storage devices, and providing advanced load management strategies. To meet attack may cause device restoration delays. Data integrity attacks were also performed on a load management system in [6], in which a graph based dynamic system model was used to analyze the impact

  19. A new key recovery attack on the ANSI retail MAC Chris J. Mitchell

    E-Print Network [OSTI]

    Mitchell, Chris

    A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

  20. Differential Fault Attack on the PRINCE Block Ling Song, Lei Hu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Differential Fault Attack on the PRINCE Block Cipher Ling Song, Lei Hu State Key Laboratory {lsong,hu}@is.ac.cn Abstract. PRINCE is a new lightweight block cipher proposed at the ASIACRYPT'2012. Key words: lightweight cipher, PRINCE block cipher, differential fault attack 1 Introduction The idea

  1. Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework Zheng@mail.tsinghua.edu.cn Abstract. A new distinguishing attack on HMAC and NMAC based on a dedicated compression function framework. In ChinaCrypt2008, a new dedicated compression function framework (i.e. hash function H) and two

  2. Risk analysis tools for force protection and infrastructure/asset protection

    SciTech Connect (OSTI)

    Jaeger, C.D.; Duggan, R.A.; Paulus, W.K.

    1998-09-01

    The Security Systems and Technology Center at Sandia National Laboratories has for many years been involved in the development and use of vulnerability assessment and risk analysis tools. In particular, two of these tools, ASSESS and JTS, have been used extensively for Department of Energy facilities. Increasingly, Sandia has been called upon to evaluate critical assets and infrastructures, support DoD force protection activities and assist in the protection of facilities from terrorist attacks using weapons of mass destruction. Sandia is involved in many different activities related to security and force protection and is expanding its capabilities by developing new risk analysis tools to support a variety of users. One tool, in the very early stages of development, is EnSURE, Engineered Surety Using the Risk Equation. EnSURE addresses all of the risk equation and integrates the many components into a single, tool-supported process to help determine the most cost-effective ways to reduce risk. This paper will briefly discuss some of these risk analysis tools within the EnSURE framework.

  3. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  4. Protective Force Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-12-20

    Provides detailed requirements to supplement DOE O 473.2, PROTECTIVE FORCE PROGRAM, which establishes the requirements and responsibilities for management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Change 1 revised pages in Chapters IV and VI on 12/20/2001.

  5. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-12-20

    The order establishes Department of Energy (DOE) procedures and responsibilities for implementing the policy and requirements set forth in 10 Code of Federal Regulations (CFR) Part 745, Protection of Human Subjects; and in DOE P 443.1A, Protection of Human Subjects, dated 12-20-07. Cancels DOE O 443.1. Canceled by DOE O 443.1B.

  6. Safety & Environmental Protection Services

    E-Print Network [OSTI]

    Glasgow, University of

    of care in waste storage and disposal is available on Safety and Environmental Protection Service's (SEPS sustainably and to protect the environment and, in line with this, recycles waste wherever practicable to biological properties). In addition some activities produce radioactive waste. Radioactive waste

  7. Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-01-15

    To implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by the Department of Energy (DOE) operations and by which DOE cost effectively meets or exceeds compliance with applicable environmental; public health; and resource protection laws, regulations, and DOE requirements. Cancels DOE 5400.1 and DOE N 450.4.

  8. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-05-15

    To establish DOE procedures and responsibilities for implementing the policy and requirements set forth in 10 CFR Part 745, Protection of Human Subjects, ad in DOE P 443.1, Policy on the Protection of Human Subjects. Cancels DOE O 1300.3. Canceled by DOE O 443.1A.

  9. Rate of H2S and CO2 attack on pozzolan-amended Class H well cement...

    Office of Scientific and Technical Information (OSTI)

    Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Citation Details In-Document Search Title: Rate of H2S and CO2 attack on...

  10. Property Rights, Taxpayer Rights, and the Multiscalar Attack on the State: Consequences for Regionalism in the United States

    E-Print Network [OSTI]

    Christopher Niedt; Margaret Weir

    2007-01-01

    G.M. (2005) The Rights of Taxpayers and the Rights of AllProperty Rights, Taxpayer Rights, and the Multiscalar AttackProperty rights, taxpayer rights, and the multiscalar attack

  11. Life-cycle energy and GHG emissions of forest biomass harvest and transport for biofuel production in Michigan

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zhang, Fengli; Johnson, Dana M.; Wang, Jinjiang

    2015-04-01

    High dependence on imported oil has increased U.S. strategic vulnerability and prompted more research in the area of renewable energy production. Ethanol production from renewable woody biomass, which could be a substitute for gasoline, has seen increased interest. This study analysed energy use and greenhouse gas emission impacts on the forest biomass supply chain activities within the State of Michigan. A life-cycle assessment of harvesting and transportation stages was completed utilizing peer-reviewed literature. Results for forest-delivered ethanol were compared with those for petroleum gasoline using data specific to the U.S. The analysis from a woody biomass feedstock supply perspective uncoveredmore »that ethanol production is more environmentally friendly (about 62% less greenhouse gas emissions) compared with petroleum based fossil fuel production. Sensitivity analysis was conducted with key inputs associated with harvesting and transportation operations. The results showed that research focused on improving biomass recovery efficiency and truck fuel economy further reduced GHG emissions and energy consumption.« less

  12. Life-cycle energy and GHG emissions of forest biomass harvest and transport for biofuel production in Michigan

    SciTech Connect (OSTI)

    Zhang, Fengli; Johnson, Dana M.; Wang, Jinjiang

    2015-04-01

    High dependence on imported oil has increased U.S. strategic vulnerability and prompted more research in the area of renewable energy production. Ethanol production from renewable woody biomass, which could be a substitute for gasoline, has seen increased interest. This study analysed energy use and greenhouse gas emission impacts on the forest biomass supply chain activities within the State of Michigan. A life-cycle assessment of harvesting and transportation stages was completed utilizing peer-reviewed literature. Results for forest-delivered ethanol were compared with those for petroleum gasoline using data specific to the U.S. The analysis from a woody biomass feedstock supply perspective uncovered that ethanol production is more environmentally friendly (about 62% less greenhouse gas emissions) compared with petroleum based fossil fuel production. Sensitivity analysis was conducted with key inputs associated with harvesting and transportation operations. The results showed that research focused on improving biomass recovery efficiency and truck fuel economy further reduced GHG emissions and energy consumption.

  13. Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha, Jayan Krishnaswami

    E-Print Network [OSTI]

    Ha, Dong S.

    Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where

  14. Environmental Protection, Safety, and Health Protection Program for DOE Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1980-05-05

    This order establishes the Environmental Protection, Safety, and Health Protection Program for Department of Energy (DOE) operations. Cancels Interim Management Directive No. 5001, Safety, Health And Environmental Protection dated 9-29-77.

  15. Fire protection design criteria

    SciTech Connect (OSTI)

    1997-03-01

    This Standard provides supplemental fire protection guidance applicable to the design and construction of DOE facilities and site features (such as water distribution systems) that are also provided for fire protection. It is intended to be used in conjunction with the applicable building code, national Fire Protection Association Codes and Standards, and any other applicable DOE construction criteria. This Standard, along with other delineated criteria, constitutes the basic criteria for satisfying DOE fire and life safety objectives for the design and construction or renovation of DOE facilities.

  16. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  17. Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis

    E-Print Network [OSTI]

    Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

  18. Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

  19. Impermeable thin AI2O3 overlay for TBC protection from sulfate and vanadate attack in gas turbines

    SciTech Connect (OSTI)

    Scott X. Mao

    2005-04-30

    {alpha} - Al{sub 2}O{sub 3} overlay has been deposited on the YSZ surface by the composite-sol-gel route (CSG). Hot corrosion tests were carried out on the TBCs with and without Al{sub 2}O{sub 3} coating in molten salt mixtures (Na{sub 2}SO{sub 4} + 5%V{sub 2}O{sub 5}). The results showed that besides a thin and dense alumina overlay with the thickness of about 100-500 nm formed on the YSZ surface, the microcracks and porous near the surface in YSZ was also occupied by alumina because of penetration of the low viscosity precursor.

  20. IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect (OSTI)

    Scott X. Mao

    2004-08-31

    To improve the hot corrosion resistance of YSZ thermal barrier coatings, a 25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray onto to the surface of YSZ coating. Oxidation at high temperature and hot corrosion tests showed that Al{sub 2}O{sub 3} overlay deposited on the YSZ TBCs surface can not only reduce the hot corrosion rate, but also significantly prevents the bond coat from oxidation.

  1. Impermeable thin AI2O3 overlay for TBC protection from sulfate and vanadate attack in gas turbines

    SciTech Connect (OSTI)

    Scott X. Mao

    2005-01-31

    25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray and by sol-gel coating method, respectively, onto to the surface of YSZ coating. Indenter test was employed to investigate the spalling of YSZ with and without Al{sub 2}O{sub 3} overlay after hot corrosion. The results showed that Al{sub 2}O{sub 3} overlay acted as a barrier against the infiltration of the molten salt into the YSZ coating during exposure, thus significantly reduced the amount of M-phase of ZrO{sub 2} in YSZ coating. Thick Al{sub 2}O{sub 3} overlay will increase compressive stress and failure in TBC. During next reporting time, Al{sub 2}O{sub 3} overlay will be deposited on the YSZ surface by the composite-sol-gel route (CSG). Hot corrosion tests will be carried out on the TBC.

  2. PROTECTION OF PRIVACY POLICY

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 PROTECTION OF PRIVACY POLICY University Policy No: GV0235 Classification: Governance Procedures for the Management of Personal Information University Information Security Classification other mechanism that produces records. 8.00 Surveillance Systems means an analog or digital video

  3. Protective Force Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-02-13

    To prescribe Department of Energy policy, responsibilities, and requirements for the management and operation of the Protective Force Program. Chg 1 dated 2-13-95. Cancels DOE O 5632.7 and DOE O 5632.8.

  4. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-12-20

    The Policy is to establish DOE-specific principles for the protection of human subjects involved in DOE research. Cancels DOE P 443.1. Canceled by DOE O 443.1B

  5. United Sates Environmental Protection

    E-Print Network [OSTI]

    Bowen, James D.

    United Sates Environmental Protection Agency Office of Water (4305) EPA/823/B/95/003 August 1995 QUAL2E Windows Interface User's Guide #12;QUAL2E Windows Interface User's Guide United States

  6. Federal Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-07-15

    This Manual establishes requirements for the management and operation of the Department of Energy (DOE) Federal protective forces (FPFs). Cancels DOE M 470.4-3, Chg 1. Canceled by DOE O 473.3.

  7. Physical Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-12-23

    Establishes Department of Energy management objectives, requirements and responsibilities for the physical protection of safeguards and security interests. Cancels DOE 5632.1C. Canceled by DOE O 470.4.

  8. Protection of Human Subjects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-05-15

    The purpose of this Policy is to establish DOE-specific policy for the protection of human subjects involved in DOE research. Canceled by DOE P 443.1A.

  9. Voluntary Protection Program- Basics

    Broader source: Energy.gov [DOE]

    The Department of Energy Voluntary Protection Program (DOE-VPP) promotes safety and health excellence through cooperative efforts among labor, management, and government at the Department of Energy (DOE) contractor sites. DOE has also formed partnerships with other Federal agencies and the private sector for both advancing and sharing its Voluntary Protection Program (VPP) experiences and preparing for program challenges in the next century. The safety and health of contractor and federal employees are a high priority for the Department.

  10. General Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1990-06-29

    To establish environmental protection program requirements, authorities, and responsibilities for Department of Energy (DOE) Operations for assuring compliance with applicable Federal, State and local environmental protection laws and regulations, Executive Orders, and internal Department policies. Cancels DOE O 5480.1A. Para. 2b, 4b, and 4c of Chap. II and para. 2d and 3b of Chap. III canceled by DOE O 231.1.

  11. Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-01-15

    To implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by the Department of Energy (DOE) operations and by which DOE cost effectively meets or exceeds compliance with applicable environmental; public health; and resource protection laws, regulations, and DOE requirements. Chg 1, dated 1-24-05; Chg 2, dated 12-7-05; Admin Chg 1, dated 1-3-07. Cancels DOE 5400.1 and DOE N 450.4.

  12. Environmental Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-06-04

    The objective is to implement sound stewardship practices that are protective of the air, water, land, and other natural and cultural resources impacted by DOE operations, and meet or exceed compliance with applicable environmental, public health, and resource protection requirements cost effectively. The revision provides specific expectations for implementation of Executive Order 13423, Strengthening Federal Environment, Energy, and Transportation Management. Cancels DOE O 450.1. Canceled by DOE O 436.1.

  13. Reducing the Vulnerability of Electric Power Grids to Terrorist Attacks

    SciTech Connect (OSTI)

    Ross Baldick; Thekla Boutsika; Jin Hur; Manho Joung; Yin Wu; Minqi Zhong

    2009-01-31

    This report describes the development of a cascading outage analyzer that, given an initial disturbance on an electric power system, checks for thermal overloads, under-frequency and over-frequency conditions, and under-voltage conditions that would result in removal of elements from the system. The analyzer simulates the successive tripping of elements due to protective actions until a post-event steady state or a system blackout is reached.

  14. Protection of the Groundwater Resource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protection of the Groundwater Resource Protection of the Groundwater Resource Monitoring wells act as sentinels between suspected LANL contamination and the water supply. August 1,...

  15. Radiation Shielding and Radiological Protection

    E-Print Network [OSTI]

    Shultis, J. Kenneth

    Radiation Shielding and Radiological Protection J. Kenneth Shultis Richard E. Faw Department Shielding and Radiological Protection .. Example Calculations for Distributed Sources

  16. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  17. New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram DA-IICT Near Indroda Circle Gandhinagar-382007 INDIA anish mathuria@daiict.ac.in, g.sriram.248@gmail.com July 29, 2008

  18. Networked Control Systems under Cyber Attacks with Applications to Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    acquisition (SCADA) systems. Several cyber attacks on SCADA systems operating power networks have been reported [3], and major blackouts are due to the misuse of the SCADA systems [4]. Power networks, being

  19. Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks the Wheatstone bridge measurement setup. Here we propose to in- dividualize the electrical circuit of devices with individualized electrical circuit are individualized while providing the same functionality

  20. On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks

    E-Print Network [OSTI]

    Medard, Muriel

    Random linear network coding can be used in peer-to- peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We ...

  1. The Recent Attack of Nie et al On TTM is Faulty Nov 19.2006

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Recent Attack of Nie et al On TTM is Faulty T. Moh #3; Nov 19.2006 Abstract Recently there is a paper entitled "Breaking a New Instance of TTM Cryptosystem" by Xuyun Nie, Lei Hu, Jianyu Li, Crystal

  2. IEEE TRANSACTIONS ON SIGNAL PROCESSING: SPECIAL ISSUE ON DATA HIDING 1 Blind Pattern Matching Attack on

    E-Print Network [OSTI]

    Petitcolas, Fabien A.P.

    detector is facing a task of exponential complexity to reverse the permutations as a pre-processing step for watermark detection. In this paper, we describe the logistics of the attack and an implementation against

  3. gore: Routing-Assisted Defense Against DDoS Attacks Stephen T. Chou1

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    attackers identify "pinch points" in the communications infrastructure and render them inoperable of effective anti-DDoS technology by Internet Service Providers. An important one is the lack of financial

  4. An Experimentally Veried Attack on Full Grain-128 Using Dedicated Recongurable

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Experimentally Veried Attack on Full Grain-128 Using Dedicated Recongurable Hardware Itai Dinur-purpose hardware, i. e., computing machines dedicated to cryptana- lytical problems, have a long tradition in code

  5. Modeling experiments that simulate fragment attacks on cased munitions

    SciTech Connect (OSTI)

    Kerrisk, J.F.

    1996-01-01

    Roberts and Field (1993) have conducted experiments to observe the behavior of a cased high explosive (HE) charge subject to fragment attack at impact velocities below those needed for shock initiation. Two and three-dimensional hydrodynamic calculations have been done to model these experiments. Questions about the degree of confinement of the HE and about the condition of the HE during the impact were addressed. The calculations indicate that the HE was not strongly confined in this experiment, primarily due to the lateral expansion of polycarbonate blocks on the sides of the target during the impact. HE was not ejected from the hole in the casing made by the projectile up to 30 {micro}s after the impact. There are hints from these calculations of how initiation of a homogeneous sample of HE might occur in the experiment. The first involves the reshock of a small amount of HE at {approximately} 20 {micro}s as a result of the impact of the sabot on the target. The second involves the heating of the HE from plastic work during the impact. The maximum temperature rise of the HE (exclusive of the small region that was reshocked) was {approximately} 80 k. However, this is the average temperature of a region the size of a computational cell, and phenomena such as shear bands or cracks could result in higher temperatures on a smaller scale than the cell size. The third involves heating of the HE from contact with the casing material. The maximum temperature rise of the casing material from plastic work is {approximately} 870 k. This temperature occurs at the edge of a plug of casing material sheared off by the projectile. Other parts of the casing are shock heated to higher energies but may not contact the HE.

  6. THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER Mohammad Sadegh Nemati Nia1 University of Technology, Tehran, Iran (m_s_nemati; payandeh)@mut.ac.ir ABSTRACT SNOW 2.0 is a word oriented. The results of HGD attack on TIPSY, SNOW 1.0 and SNOW 2.0 stream ciphers led to less complexity rather than

  7. Data Protection Policy Page 1 DATA PROTECTION POLICY

    E-Print Network [OSTI]

    Jordan, David

    Data Protection Policy Page 1 DATA PROTECTION POLICY POLICY STATEMENT The University intends to fully comply with all requirements of the Data Protection Act 1998 (,,Act) in so far as it affects the Universitys activities. SCOPE This Data Protection Policy: Covers the processing of all personal information

  8. Secure estimation and control for cyber-physical systems under adversarial attacks

    E-Print Network [OSTI]

    Fawzi, Hamza; Diggavi, Suhas

    2012-01-01

    The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with the estimation and control of linear systems when some of the sensors or actuators are corrupted by an attacker. In the first part we look at the estimation problem where we characterize the resilience of a system to attacks and study the possibility of increasing its resilience by a change of parameters. We then propose an efficient algorithm to estimate the state despite the attacks and we characterize its performance. Our approach is inspired from the areas of error-correction over the reals and compressed sensing. In the second part we consider the problem of designing output-feedback controllers that stabilize the system despite attacks. We show that a principle of separation betwee...

  9. Rack protection monitor

    DOE Patents [OSTI]

    Orr, Stanley G. (Wheaton, IL)

    2000-01-01

    A hardwired, fail-safe rack protection monitor utilizes electromechanical relays to respond to the detection by condition sensors of abnormal or alarm conditions (such as smoke, temperature, wind or water) that might adversely affect or damage equipment being protected. When the monitor is reset, the monitor is in a detection mode with first and second alarm relay coils energized. If one of the condition sensors detects an abnormal condition, the first alarm relay coil will be de-energized, but the second alarm relay coil will remain energized. This results in both a visual and an audible alarm being activated. If a second alarm condition is detected by another one of the condition sensors while the first condition sensor is still detecting the first alarm condition, both the first alarm relay coil and the second alarm relay coil will be de-energized. With both the first and second alarm relay coils de-energized, both a visual and an audible alarm will be activated. In addition, power to the protected equipment will be terminated and an alarm signal will be transmitted to an alarm central control. The monitor can be housed in a separate enclosure so as to provide an interface between a power supply for the protected equipment and the protected equipment.

  10. Rack Protection Monitor

    SciTech Connect (OSTI)

    Orr, Stanley G.

    1998-10-21

    A hardwired, fail-safe rack protection monitor utilizes electromechanical relays to respond to the detection by condition sensors of abnormal or alarm conditions (such as smoke, temperature, wind or water) that might adversely affect or damage equipment being protected. When the monitor is reset, the monitor is in a detection mode with first and second alarm relay coils energized. If one of the condition sensors detects an abnormal condition, the first alarm relay coil will be de-energized, but the second alarm relay coil will remain energized. This results in both a visual and an audible alarm being activated. If a second alarm condition is detected by another one of the condition sensors while the first condition sensor is still detecting the first alarm condition, both the first alarm relay coil and the second alarm relay coil will be de-energized. With both the first and second alarm relay coils de-energized, both a visual and an audible alarm will be activated. In addition, power to the protected equipment will be terminated and an alarm signal will be transmitted to an alarm central control. The monitor can be housed in a separate enclosure so as to provide an interface between a power supply for the protected equipment and the protected equipment.

  11. Microscope collision protection apparatus

    DOE Patents [OSTI]

    DeNure, Charles R. (Pocatello, ID)

    2001-10-23

    A microscope collision protection apparatus for a remote control microscope which protects the optical and associated components from damage in the event of an uncontrolled collision with a specimen, regardless of the specimen size or shape. In a preferred embodiment, the apparatus includes a counterbalanced slide for mounting the microscope's optical components. This slide replaces the rigid mounts on conventional upright microscopes with a precision ball bearing slide. As the specimen contacts an optical component, the contacting force will move the slide and the optical components mounted thereon. This movement will protect the optical and associated components from damage as the movement causes a limit switch to be actuated, thereby stopping all motors responsible for the collision.

  12. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  13. Thermal protection apparatus

    DOE Patents [OSTI]

    Bennett, G.A.; Elder, M.G.; Kemme, J.E.

    1984-03-20

    The disclosure is directed to an apparatus for thermally protecting sensitive components in tools used in a geothermal borehole. The apparatus comprises a Dewar within a housing. The Dewar contains heat pipes such as brass heat pipes for thermally conducting heat from heat sensitive components such as electronics to a heat sink such as ice.

  14. Thermal protection apparatus

    DOE Patents [OSTI]

    Bennett, Gloria A. (Los Alamos, NM); Elder, Michael G. (Los Alamos, NM); Kemme, Joseph E. (Albuquerque, NM)

    1985-01-01

    An apparatus which thermally protects sensitive components in tools used in a geothermal borehole. The apparatus comprises a Dewar within a housing. The Dewar contains heat pipes such as brass heat pipes for thermally conducting heat from heat sensitive components to a heat sink such as ice.

  15. Income Protection (IP) Insurance 

    E-Print Network [OSTI]

    Stokes, Kenneth; Barnaby, G. A. Art; Waller, Mark L.; Outlaw, Joe

    1999-06-09

    Kenneth Stokes, G.A. ?Art? Barnaby, Mark Waller and Joe Outlaw* The Income Protection (IP) program insures the producer against lost income from reductions in yield or price. This policy pays when the harvested and appraised production to count, multiplied...

  16. Armored garment for protecting

    DOE Patents [OSTI]

    Purvis, James W. (Albuquerque, NM); Jones, II, Jack F. (Albuquerque, NM); Whinery, Larry D. (Albuquerque, NM); Brazfield, Richard (Albuquerque, NM); Lawrie, Catherine (Tijeras, NM); Lawrie, David (Tijeras, NM); Preece, Dale S. (Watkins, CO)

    2009-08-11

    A lightweight, armored protective garment for protecting an arm or leg from blast superheated gases, blast overpressure shock, shrapnel, and spall from a explosive device, such as a Rocket Propelled Grenade (RPG) or a roadside Improvised Explosive Device (IED). The garment has a ballistic sleeve made of a ballistic fabric, such as an aramid fiber (e.g., KEVLAR.RTM.) cloth, that prevents thermal burns from the blast superheated gases, while providing some protection from fragments. Additionally, the garment has two or more rigid armor inserts that cover the upper and lower arm and protect against high-velocity projectiles, shrapnel and spall. The rigid inserts can be made of multiple plies of a carbon/epoxy composite laminate. The combination of 6 layers of KEVLAR.RTM. fabric and 28 plies of carbon/epoxy laminate inserts (with the inserts being sandwiched in-between the KEVLAR.RTM. layers), can meet the level IIIA fragmentation minimum V.sub.50 requirements for the US Interceptor Outer Tactical Vest.

  17. Protective Force Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-30

    Establishes policy, requirements, responsibilities, and authorities, for the management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE 5632.7A

  18. Contractor Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-11-05

    This Manual establishes requirements for the management and operation of the U.S. Department of Energy contractor protective forces. Cancels: DOE M 470.4-3 Chg 1, CRD (Attachment 2) only, except for Section C. Canceled by DOE O 473.3.

  19. GROUNDWATER QUALITY PROTECTION PRACTICES

    E-Print Network [OSTI]

    #12;GROUNDWATER QUALITY PROTECTION PRACTICES Submitted to: Environment Canada 224 West Esplanade.............................................................................................1 2.0 GROUNDWATER RESOURCES WITHIN THE FRASER BASIN.................3 2.1 Lower Fraser Region..............................................................................5 3.0 COMMON SOURCES OF GROUNDWATER CONTAMINATION ...............6 3.1 Category 1 - Sources Designed

  20. Methods of dealing with co-products of biofuels in life-cycle analysis and consequent results within the U.S. context.

    SciTech Connect (OSTI)

    Wang, M.; Huo, H.; Arora, S. (Energy Systems)

    2011-01-01

    Products other than biofuels are produced in biofuel plants. For example, corn ethanol plants produce distillers grains and solubles. Soybean crushing plants produce soy meal and soy oil, which is used for biodiesel production. Electricity is generated in sugarcane ethanol plants both for internal consumption and export to the electric grid. Future cellulosic ethanol plants could be designed to co-produce electricity with ethanol. It is important to take co-products into account in the life-cycle analysis of biofuels and several methods are available to do so. Although the International Standard Organization's ISO 14040 advocates the system boundary expansion method (also known as the 'displacement method' or the 'substitution method') for life-cycle analyses, application of the method has been limited because of the difficulty in identifying and quantifying potential products to be displaced by biofuel co-products. As a result, some LCA studies and policy-making processes have considered alternative methods. In this paper, we examine the available methods to deal with biofuel co-products, explore the strengths and weaknesses of each method, and present biofuel LCA results with different co-product methods within the U.S. context.

  1. Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    E-Print Network [OSTI]

    Gupta, B B; Misra, Manoj

    2012-01-01

    Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. This paper reports the design principles and evaluation results of our proposed framework that autonomously detects and accurately characterizes a wide range of flooding DDoS attacks in ISP network. Attacks are detected by the constant monitoring of propagation of abrupt traffic changes inside ISP network. For this, a newly designed flow-volume based approach (FVBA) is used to construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic goes out of profile. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and a...

  2. Practical Attacks on Decoy State Quantum Key Distribution Systems with Detector Efficiency Mismatch

    E-Print Network [OSTI]

    Fei Yangyang; Gao Ming; Wang Weilong; Li Chaobo; Ma Zhi

    2015-07-23

    To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy state quantum key distribution systems. The eavesdropper may get some information ab out the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum key distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy state quantum key distribution systems.

  3. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  4. Environmental Protection, Safety, and Health Protection Program for DOE Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1981-08-13

    This Order establishes the Environmental Protection, Safety. and Health Protection Program for Department of Energy (DOE) operations. Cancels DOE 5480.1, dated 5-5-1980, its chapters are not canceled. Canceled by DOE O 5480.1B

  5. Radiation protection at CERN

    E-Print Network [OSTI]

    Forkel-Wirth, Doris; Silari, Marco; Streit-Bianchi, Marilena; Theis, Christian; Vincke, Heinz; Vincke, Helmut

    2013-01-01

    This paper gives a brief overview of the general principles of radiation protection legislation; explains radiological quantities and units, including some basic facts about radioactivity and the biological effects of radiation; and gives an overview of the classification of radiological areas at CERN, radiation fields at high-energy accelerators, and the radiation monitoring system used at CERN. A short section addresses the ALARA approach used at CERN.

  6. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01

    processes (e.g. , oil recovery, coal mining, natural gascoal, or biomass. Based on primary survey data at energy- mining and recovery

  7. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01

    natural gas (CNG) ICEV, LPG (P95/BU5) ICEV, ethanol (corn)Petroleum, Natural Gas, LPG, and Other Fuels for HighwayMethane (CNG, LNG) Propane (LPG) Hydrogen (CH2) (LH2)

  8. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01

    sulfur) ICEV, natural gas (CNG) ICEV, LPG (P95/BU5) ICEV,Methanol Ethanol Methane (CNG, LNG) Propane (LPG) Hydrogen (M85 (wood) Natural gas CNG (wood) Note: percentage changes

  9. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01

    Propane (LPG) Hydrogen (CH2) (LH2) Electric BPEV ICEV FCV ICEV, FCV FCV BPEV BPEV BPEV Notes: ICEV = internal-combustion-

  10. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01

    Propane (LPG) Hydrogen (CH2) (LH2) Electric BPEV ICEV FCV ICEV, FCV FCV BPEV BPEV BPEV Notes: ICEV = internal-combustion-engine

  11. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01

    switchgrass, and wood; biodiesel from soy No model per se;Diesel (crude oil) (g/mi) Biodiesel (SD100 (soy)) Ethanol (switchgrass, and wood; biodiesel from soybeans; methanol,

  12. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01

    The syngas exiting the gasifier is cooled and then quenchedThe equipment downstream of the gasifier for conversion to

  13. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01

    use modeling, including drive cycle LEM CEFs (Table 10). (GM simulator, European Drive Cycle (urban and extra-urbanuse modeling, including drive cycle Vehicle and materials

  14. Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack

    E-Print Network [OSTI]

    Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2013-07-24

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

  15. Attack of fragmented-core debris on concrete in the presence of water. [PWR; BWR

    SciTech Connect (OSTI)

    Tarbell, W.W.; Bradley, D.R.

    1982-01-01

    In the unlikely event that core debris escapes the reactor pressure vessel, the interactions of the debris with concrete, structural materials, and coolant become the driving force for severe accident phenomena. The Ex-Vessel Core Debris Interactions Program at Sandia National Laboratories is an experimental research effort to characterize these interactions and the magnitude of safety-related phenomena such as flammable gas generation, aerosol production, fission product release, and concrete attack. Major areas of study within the program include molten core simultants in contact with concrete, high pressure melt streaming into scaled reactor cavities, the addition of coolant to high-temperature melt/concrete interactions, and the attack of hot, solid core debris on concrete. This paper describes results from the last of these efforts, i.e., hot, but not molten debris attacking concrete.

  16. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  17. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  18. Environmental Protection and Natural Resources

    E-Print Network [OSTI]

    Sánchez-Rodríguez, Roberto; Mumme, Stephen

    2010-01-01

    59 Stat. 1219. U.S. Environmental Protection Agency (EPA).1992. Integrated Environmental Plan for the Mexican-U.S.EPA, A92-171.toc. U.S. Environmental Protection Agency (

  19. Ravaging the wine dark sea: attacks on Crete by sea raiders during the Bronze Age 

    E-Print Network [OSTI]

    Stewart, David James

    1997-01-01

    RAVAGING THK WINK DARK SEA: ATTACKS ON CRETE BY SEA RAIDERS DIJRING THE BRONZE AGE A Thesis by DAVID JAMES STEWART Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF ARTS May 1997 Major Subject: Anthropology RAVAGING THE WINE DARK SEA: ATTACKS ON CRETE BY SEA RAIDERS DURING THE BRONZE AGE A Thesis by DAVID JAMES STEWART Submitted to Texas A&M University in partial fulfillment of the requirements...

  20. Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    E-Print Network [OSTI]

    Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

    2011-04-01

    Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

  1. Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG

    E-Print Network [OSTI]

    Altug, Yucel

    2008-01-01

    A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized. Consequently, under some mild assumptions, which are common in cryptanalysis, the tight lower bounds on the algorithmic complexity of successful Query-Based Key-Recovery attacks are derived for two different setups of practical interest. The proofs rely on the concept of ``typicality'' of information theory.

  2. Data Protection Policy 1. Introduction

    E-Print Network [OSTI]

    Daley, Monica A.

    1 Data Protection Policy 1. Introduction 1.1. The College holds and processes information about employees, students, and other data subjects for academic, administrative and commercial purposes. When, must comply with the Data Protection Principles which are set out in the Data Protection Act 1998 (the

  3. Home Landscape Practices to Protect

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    weeds, protects trees from lawn mower wounds, helps reduce erosion, and protects roots near the soil of pollutants washing through the soil and reaching our water supplies. · Mow high and often. Setting your mower. Keep your lawn healthy A properly maintained lawn looks beautiful and also helps protect water quality

  4. Sustainable Stanford Protecting Stanford's assets

    E-Print Network [OSTI]

    Bogyo, Matthew

    ... Benefits Labs Protect your samples ­ During energy and equipment failure ­ Reduce risk of valuable sampleSustainable Stanford Protecting Stanford's assets Sustainable Alternative Sample Storage Pilot Study #12;Protect Stanford's Assets & Save Energy Stanford `s Energy Retrofit Program has since 1993

  5. Protecting your personal information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeedingProgramExemptions |(Conference)ProjectProposedAmerica's FutureProtecting

  6. National Infrastructure Protection Plan

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nAand DOEDepartment ofProgram |(Upstate New York) |Infrastructure Protection

  7. Environmental Radiation Protection Curriculum

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGas SeparationsRelevant to CleanOutreachProtectionERP

  8. ORISE: Protecting Human Subjects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSE TheForensicPerformanceProtecting Human Subjects

  9. Protections = Defenses in Depth

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich MatricesstudentsProjectsProperty -Protected pageAbout

  10. Fire Protection Database | Department of Energy

    Office of Environmental Management (EM)

    Fire Protection Database Fire Protection Database DOE O 231.1, Environment, Safety, And Health Reporting, requires the submission of an Annual Fire Protection Summary. The previous...

  11. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications

    E-Print Network [OSTI]

    Yin, Heng

    Hijacking Attacks in Android Applications Mu Zhang Department of EECS Syracuse University muzhang of vulnerabilities commonly appearing in Android applications. When these vul- nerabilities are triggered on Android devices, on behalf of the attackers. It is often unrealis- tic to purely rely on developers to fix

  12. Extending the GHS Weil Descent Attack S.D. Galbraith, F. Hess and N.P. Smart

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Extending the GHS Weil Descent Attack S.D. Galbraith, F. Hess and N.P. Smart Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB, United due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack

  13. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 2, MARCH 2003 431 Some Attacks Against Vehicles' Passive Entry

    E-Print Network [OSTI]

    Mahmud, Syed Masud

    Terms--Passive entry systems, playback attack, remote keyless entry, two-thief attack, vehicle security of an automobile. The user was required to enter a unique digital code through the keypad to unlock or lock- hances user convenience, it still does not provide the full com- fort level. The user still has to search

  14. Islamists claim deadly attack on UN building in Nigeria 26 August 2011

    E-Print Network [OSTI]

    Islamists claim deadly attack on UN building in Nigeria 26 August 2011 Boko Haram says/AFP/Getty Images A car loaded with explosives crashed into the main United Nations' building in Nigeria's capital for the bombing, a major escalation of its sectarian fight against Nigeria's weak central government. The brazen

  15. Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins y Adrian Perrig Ion Stoica

    E-Print Network [OSTI]

    Perrig, Adrian

    Taming IP Packet Flooding Attacks #3; Karthik Lakshminarayanan Daniel Adkins y Adrian Perrig Ion hosts is denial­ of­service (DoS) caused by IP packet floods. Hosts in the Internet are unable to stop -- not the net­ work -- should be given control to respond to packet floods and overload. Ideally, hosts should

  16. Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash Adi by John Nash in the early 1950's but whose design was declassified by the NSA only in 2012. The main, John Nash. 1 Introduction John Nash is known today mostly for his seminal contributions to the field

  17. Touchjacking Attacks on Web in Android, iOS, and Windows Phone

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Touchjacking Attacks on Web in Android, iOS, and Windows Phone Tongbo Luo, Xing Jin, Ajai to interact with the Web, most mobile platforms, including Android, iOS, and Windows Phone, provide is called WebView in Android (it is called different names in other platforms). WebView im- plements

  18. A Data-Centric Approach to Insider Attack Detection in Database Systems

    E-Print Network [OSTI]

    Petropoulos, Michalis

    A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis the query expressions in prior approaches. Our data-centric approach is based on the key observation.): RAID 2010, LNCS 6307, pp. 382­401, 2010. c Springer-Verlag Berlin Heidelberg 2010 #12;A Data-Centric

  19. Evaluating Risk of Terrorist Attack on a Cable Stayed Bridge: A Probabilistic Structural

    E-Print Network [OSTI]

    Bhattacharya, Baidurya

    Evaluating Risk of Terrorist Attack on a Cable Stayed Bridge: A Probabilistic Structural Analysis and administrators are able to evaluate risks to infrastructure in their jurisdiction in a rational manner. This will enable them to take optimal actions to manage these risks given budgetary constraints. This paper

  20. Adaptive Flow Aggregation -A New Solution for Robust Flow Monitoring under Security Attacks

    E-Print Network [OSTI]

    Lui, John C.S.

    Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu.S. Lui Dept. of CSE Chinese University of Hong Kong Email: cslui@cse.cuhk.edu.hk Abstract-- Flow the resources (memory, export bandwidth or CPU) of the flow monitor. A standard solution is to do sampling (look

  1. Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang

    E-Print Network [OSTI]

    Wang, Haining

    Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang Department of Computer of servers being deployed in data centers, the data center power distribution systems have already approached peak capacities. Since the upgrades of the power systems are extremely expensive, power

  2. Robust Detection in the Presence of Integrity Attacks Yilin Mo, Jo~ao Hespanha, Bruno Sinopoli

    E-Print Network [OSTI]

    Hespanha, Joăo Pedro

    Acquisition (SCADA) sys- tems, for example, implement the distributed control systems that run a wide range, facility control and power grids. A successful attack to SCADA systems may significantly hamper the economy, the environment, and may even lead to the loss of human life. The first-ever SCADA system malware (called Stuxnet

  3. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  4. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Young, R. Michael

    @cs.unc.edu Abstract--A power grid is a complex system connecting electric power generators to consumers through power estimate the power grid state through analysis of meter measure- ments and power system models. Various malicious attacks. I. INTRODUCTION A power grid is a complex system connecting a variety of electric power

  5. TorScan: Tracing Long-lived Connections and Differential Scanning Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    successor of the original Onion Routing Project. The Tor network is a low-latency anonymity network whichTorScan: Tracing Long-lived Connections and Differential Scanning Attacks Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann University of Luxembourg Abstract. Tor is a widely used anonymity network

  6. Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier Gemplus Card in a state that leaks secret information. Nicely enough, evaluating the entropy loss due to the chemical spectroscopic analysis can reveal with accuracy the mixture of chemical compounds generated by the user, we show

  7. Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel-correlation distinguishers as well as between zero-correlation and integral distinguishers, we analyze in this paper some of the round function, we show that we can not only find impossible, integral and multidimensional zero

  8. A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia

    E-Print Network [OSTI]

    Bullo, Francesco

    and biomedicine, telecommu- nications, and energy management. Due to their importance, cyber-physical systems, and monitoring systems. For instance, in [1, 5, 6, 7, 8] it is shown how attackers with access to sufficiently limited resources and full knowledge of the system dynamics and state. Conversely, if the monitoring re

  9. Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid Deepa Kundur analysis of a smart grid. We focus on the model synthesis stage in which both cyber and physical grid-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems. I

  10. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  11. Sensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks

    E-Print Network [OSTI]

    Levi, Albert

    network are discussed in [7]. Security, network bandwidth and power consumption in sensor networksSensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks Serdar Sancak@sabanciuniv.edu Abstract--Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets

  12. Passive faraday mirror attack in practical two-way quantum key distribution system

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2012-03-04

    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

  13. Securing Cloud Data in the New Attacker Model Ghassan O. Karame1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Securing Cloud Data in the New Attacker Model Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof to the ciphertext. This may be achieved, for example, using multi-cloud storage systems. These systems spread data tolerance. If the adversary can only compromise a subset of these domains, multi-cloud storage systems may

  14. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  15. Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective

    E-Print Network [OSTI]

    Politčcnica de Catalunya, Universitat

    with great opportunities for raising the target facility energy consumption and consequently its green house green, energy- sustainable computing paradigms has gained a lot of attention in both the researchEvaluating Network-Based DoS Attacks Under the Energy Consumption Perspective New security issues

  16. Cyber Attack Detection in PMU Measurements via the Expectation-Maximization Algorithm

    E-Print Network [OSTI]

    Kundur, Deepa

    Cyber Attack Detection in PMU Measurements via the Expectation-Maximization Algorithm Dongchan Lee in phasor measurement unit (PMU) data using the expectation-maximization algorithm. Power systems today, such as solving the optimal power flow and system estimation problem. The availability of PMU data real-time has

  17. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    False Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu, Peng Ning@cs.unc.edu Abstract--A power grid is a complex system connecting electric power generators to consumers through power to ensure the reliable operation of power grids, and state estimation is used in system monitoring to best

  18. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  19. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  20. Towards Synthesis of Platform-aware Attack-Resilient Control Systems

    E-Print Network [OSTI]

    Pappas, George J.

    Towards Synthesis of Platform-aware Attack-Resilient Control Systems Extended Abstract Miroslav Over the past decade, the design process in the automotive indus- try has gone through a period, there is a current shift in vehicle architectures, from isolated control systems to more open automotive

  1. Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design

    E-Print Network [OSTI]

    Bhunia, Swarup

    Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design Xinmu Wang1 , Wen Yueh on the operating frequency due to RLC structure of a power grid. In this paper, we analyze the ef- fect of power grid on SCA and provide quantitative results to demonstrate the frequency-dependent SCA resistance due

  2. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in the confidentiality and integrity algorithms of the 3GPP (3rd Generation Partnership Project) mobile communications and integrity algo- rithms of the 3GPP (3rd Generation Partnership Project) [20] mobile communi- cations practical, and the authors could simulate the efficiency of their attack using a personal computer. Both

  3. Reaction Attacks on Public Key Cryptosystems Based on the Word Problem

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Mar#19;#16;a Isabel Gonz#19 for public key cryptosystems based on the hardness of the word problem for #12;nitely presented groups. In particular, the evidenced hardness of the classical problems for #12;nitely presented groups (the word

  4. A known plaintext attack on the ISAAC keystream generator Marina Pudovkina

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 A known plaintext attack on the ISAAC keystream generator Marina Pudovkina maripa are a requirement. The ISAAC keystream generator is a fast software-oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known

  5. A known plaintext attack on the ISAAC keystream generator Marina Pudovkina

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 A known plaintext attack on the ISAAC keystream generator Marina Pudovkina maripa are a requirement. The ISAAC keystream generator is a fast software­oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known

  6. A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    E-Print Network [OSTI]

    Levente, Buttyán

    can be used to ensure availability. Replication in it- self, however, is not enough against malicious server can be distinguished: bandwidth consumption at- tacks and resource consumption attacks overloaded and cannot accept requests from legitimate clients anymore. In a resource consumption at- tack

  7. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA

  8. TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

  9. "How many zombies do you know?" Using indirect survey methods to measure alien attacks and outbreaks

    E-Print Network [OSTI]

    Gelman, Andrew

    "How many zombies do you know?" Using indirect survey methods to measure alien attacks applicable to zombies or, for that matter, ghosts, aliens, angels, and other hard-to-reach entities; for example, what if your wife2 is actually a zombie or an alien and you are not aware of the fact. This 2

  10. Security Games with Surveillance Cost and Optimal Timing of Attack Execution

    E-Print Network [OSTI]

    Vorobeychik, Eugene

    of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Appears inSecurity Games with Surveillance Cost and Optimal Timing of Attack Execution Bo An1 , Matthew Brown Terms Algorithm, Security Keywords Game Theory, Security, Optimization, Stackelberg Games 1

  11. Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki1,2 1 Institute of Computer Science Abstract. The PRINCE cipher is the result of a cooperation between the Technical University of Denmark (DTU-latency encryption and instant response time. PRINCE has already gained a lot of attention from the academic

  12. Combating False Data Injection Attacks in Smart Grid Using Kalman Filter

    E-Print Network [OSTI]

    Cao, Xiaojun (Matt)

    Combating False Data Injection Attacks in Smart Grid Using Kalman Filter Kebina Manandhar Dept of South Florida Email: yliu@cse.usf.edu Abstract--The security of Smart Grid, being one of the very important aspects of the Smart Grid system, is studied in this paper. We first discuss different pitfalls

  13. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

    E-Print Network [OSTI]

    Shihan Sajeed; Igor Radchenko; Sarah Kaiser; Jean-Philippe Bourgoin; Anna Pappa; Laurent Monat; Matthieu Legre; Vadim Makarov

    2015-03-30

    The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD, we model both a strong attack using technology possible in principle, and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems, and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.

  14. On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in which the round keys are introduced by addition, to thwart single-bit or multi-bit DPA attacks- tion about twice slower). We prove lower bounds on the transparency order of highly nonlinear S

  15. Current Committee Membership Radiation Protection, Committee on

    E-Print Network [OSTI]

    Polz, Martin

    Current Committee Membership Radiation Protection, Committee on The Committee on Radiation Protection is responsible for the establishment and continuing review of an adequate radiation protection's compliance with radiation protection regulations promulgated by state, federal, and local agencies

  16. Protected subspace Ramsey spectroscopy

    E-Print Network [OSTI]

    Laurin Ostermann; David Plankensteiner; Helmut Ritsch; Claudiu Genes

    2014-11-27

    We study a modified Ramsey spectroscopy technique employing slowly decaying states for quantum metrology applications using dense ensembles. While closely positioned atoms exhibit superradiant collective decay and dipole-dipole induced frequency shifts, recent results [Ostermann, Ritsch and Genes, Phys. Rev. Lett. \\textbf{111}, 123601 (2013)] suggest the possibility to suppress such detrimental effects and achieve an even better scaling of the frequency sensitivity with interrogation time than for noninteracting particles. Here we present an in-depth analysis of this 'protected subspace Ramsey technique' using improved analytical modeling and numerical simulations including larger 3D samples. Surprisingly we find that using sub-radiant states of $N$ particles to encode the atomic coherence yields a scaling of the optimal sensitivity better than $1/\\sqrt{N}$. Applied to ultracold atoms in 3D optical lattices we predict a precision beyond the single atom linewidth.

  17. Economical wind protection - underground

    SciTech Connect (OSTI)

    Kiesling, E.W.

    1980-01-01

    Earth-sheltered buildings inherently posess near-absolute occupant protection from severe winds. They should sustain no structural damage and only minimal facial damage. Assuming that the lower-hazard risk attendant to this type of construction results in reduced insurance-premium rates, the owner accrues economic benefits from the time of construction. Improvements to aboveground buildings, in contrast, may not yield early economic benefits in spite of a favorable benefit-to-cost ratio. This, in addition to sensitivity to initial costs, traditionalism in residential construction, and lack of professional input to design, impede the widespread use of underground improvements and the subsequent economic losses from severe winds. Going underground could reverse the trend. 7 references.

  18. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  19. Beijing Hualianda Environmental Protection Energy Technology...

    Open Energy Info (EERE)

    Hualianda Environmental Protection Energy Technology Development Co Ltd Jump to: navigation, search Name: Beijing Hualianda Environmental Protection Energy Technology Development...

  20. Office of Environmental Protection, Sustainability Support &...

    Energy Savers [EERE]

    Environmental Protection, Sustainability Support & Corporate Safety Analysis Office of Environmental Protection, Sustainability Support & Corporate Safety Analysis Mission The...

  1. Protective link for superconducting coil

    DOE Patents [OSTI]

    Umans, Stephen D. (Belmont, MA)

    2009-12-08

    A superconducting coil system includes a superconducting coil and a protective link of superconducting material coupled to the superconducting coil. A rotating machine includes first and second coils and a protective link of superconducting material. The second coil is operable to rotate with respect to the first coil. One of the first and second coils is a superconducting coil. The protective link is coupled to the superconducting coil.

  2. CEBAF - environmental protection program plan

    SciTech Connect (OSTI)

    1995-10-01

    An important objective in the successful operation of the Continuous Electron Beam Accelerator Facility (CEBAF) is to ensure protection of the public and the environment. To meet this objective, the Southeastern Universities Research Association, Inc., (SURA) is committed to working with the US Department of Energy (DOE) to develop, implement, and manage a sound and workable environmental protection program at CEBAF. This environmental protection plan includes information on environmental monitoring, long-range monitoring, groundwater protection, waste minimization, and pollution prevention awareness program plan.

  3. Florida Radiation Protection Act (Florida)

    Broader source: Energy.gov [DOE]

    The Department of Public Health is responsible for administering a statewide radiation protection program. The program is designed to permit development and utilization of sources of radiation for...

  4. Classified Matter Protection and Control

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-26

    Provides detailed requirements to supplement DOE O 471.2, which establishes policy for the protection and control of classified and unclassified information. Does not cancel other directives.

  5. ORISE: Protecting Human Subjects Website

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting Human Subjects Website Institutions that engage in human subjects research are required by federal policy to establish an institutional review board (IRB) to ensure that...

  6. International PatentInternational Patent Protection: 1990 -Protection: 1990 -

    E-Print Network [OSTI]

    Lansky, Joshua

    International PatentInternational Patent Protection: 1990 -Protection: 1990 - 20052005 Measurement and TrendsMeasurement and Trends Patent Strength and Stages of EconomicPatent Strength and Stages of Economic DevelopmentDevelopment #12;I. Measurement & TrendsI. Measurement & Trends Patent Rights Index (0

  7. Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee

    E-Print Network [OSTI]

    Snoeren, Alex

    Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan against three popular Web services, we high- light a new class of vulnerability that allows an attacker a pollution attack, that allows third parties to alter the customized content the services return to users who

  8. Combined group ECC protection and subgroup parity protection

    DOE Patents [OSTI]

    Gara, Alan G.; Chen, Dong; Heidelberger, Philip; Ohmacht, Martin

    2013-06-18

    A method and system are disclosed for providing combined error code protection and subgroup parity protection for a given group of n bits. The method comprises the steps of identifying a number, m, of redundant bits for said error protection; and constructing a matrix P, wherein multiplying said given group of n bits with P produces m redundant error correction code (ECC) protection bits, and two columns of P provide parity protection for subgroups of said given group of n bits. In the preferred embodiment of the invention, the matrix P is constructed by generating permutations of m bit wide vectors with three or more, but an odd number of, elements with value one and the other elements with value zero; and assigning said vectors to rows of the matrix P.

  9. Adaptive protection algorithm and system

    DOE Patents [OSTI]

    Hedrick, Paul (Pittsburgh, PA) [Pittsburgh, PA; Toms, Helen L. (Irwin, PA) [Irwin, PA; Miller, Roger M. (Mars, PA) [Mars, PA

    2009-04-28

    An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

  10. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  11. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-06-05

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization of reflectivity and transmission of the optical components most relevant to security.

  12. Comparing three models of attack and failure tolerance in electric power networks

    E-Print Network [OSTI]

    Hines, P; Blumsack, S

    2010-01-01

    In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in power systems, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss and blackout sizes. The first two are purely topological measures, following the procedure described by Albert et al. (2004). The blackout size calculation results from a simplified model of cascading failure in power networks. Tests with randomly selected sections of the Eastern US power grid indicate that in topological dynamics power grids are similar to random graphs, which is to be expected given the observed exponential degree distribution. However the connectivity loss model and the cascading failure model indicate that power grids behave more like scale free networks, in that they are acutely more vulnerable to directed attacks than random failures. These results suggest caution in drawing conclusi...

  13. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-08-03

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security.

  14. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  15. Biology and control of thrips attacking cotton in the vicinity of College Station, Texas 

    E-Print Network [OSTI]

    Pfrimmer, Theodore Roscoe

    1953-01-01

    Advisor) May 1953 BIOLOGY AND CONTROL OF THRIE3 ATTACKING COTTON IK THE VICINITY OF COLIEGE STATION, TEXAS By THEODORE ROSCCE P iE M fR t \\ \\ A Dissertation Submitted, to the Graduate School of the Agricultural and Mechanical College of Texas... cages during 1950 . . . . . . . . . 69 3. Comparison of the dosage-mortality curves for the toxicities of several compounds, applied as dusts, against Frankliniella tritici and F. exigua in large cages during 1950 ............................ 70 4...

  16. Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    bogus messages, which will incur extra costs, thus exhaust the energy of the honest nodes. In additionS attacks, in which the goal of the adversary is to exhaust the energy of the sensor nodes and to increase or to redistribute to lists, requires prior specific permission and/or a fee. MobiHoc'07, September 9­14, 2007, Montr´eal

  17. Comparative toxicity studies of sulphur acaricides on two species of spider mites attacking cotton 

    E-Print Network [OSTI]

    Hallmark, Kenzy Donovan

    1954-01-01

    CONPARATIVE TOXICITY STUDIES OF SULFUH ACAHICIDES ON TWO SPECIE OF SPIDEH NITES ATTACKING COTTON KENZY DONOVAN HALLI&AHK A Thesis Submitted to the Graduate School oi' the Agricultural and 14echanlcal College of Texas in partial fulfillment... Ovotran- 13 Procedure Culturing technique- Dusting apparatus 1B 18 19 Spraying appsratus- Treatment procedure ?- Determination ef results ? - ? --- ? ? ? -?- hesults Conclusions- Literature Cited- 47 50 1 Results of laboratortJ' toxicity...

  18. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ă?Â?Ă?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  19. The ignition hazard to urban interiors during nuclear attack due to burning curtain fragments transported by blast 

    E-Print Network [OSTI]

    Goodale, Thomas

    There exists some uncertainty at present, in the formulation of civil defense doctrine, as to whether it is advisable for window curtains to be closed or open during nuclear attack. Closed curtains would be in position to ...

  20. Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro and Evangelos Kranakis

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks Gimer Cervera, Michel (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes affect the topol- ogy map acquisition process by interrupting the flooding of control information