National Library of Energy BETA

Sample records for request forgery attacks

  1. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  2. V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery...

    Broader source: Energy.gov (indexed) [DOE]

    Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability PLATFORM: Cisco Wireless LAN Controller (WLC) ABSTRACT: A vulnerability was reported in Cisco Wireless LAN...

  3. U-151: Bugzilla Cross-Site Request Forgery Vulnerability

    Broader source: Energy.gov [DOE]

    The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.

  4. U-109: Bugzilla Cross-Site Request Forgery Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Bugzilla. PLATFORM: Bugzilla 4.x ABSTRACT: The application's web interface allows users to perform certain actions via HTTP requests without performing...

  5. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  6. Exposing Digital Forgeries in Complex Lighting Environments

    E-Print Network [OSTI]

    Bucci, David J.

    1 Exposing Digital Forgeries in Complex Lighting Environments Micah K. Johnson, Student Member describe a technique for exposing such fakes by detecting inconsistencies in lighting. We show how to approximate complex lighting environments with a low-dimensional model and, further, how to estimate the model

  7. Exposing Digital Forgeries by Detecting Inconsistencies in Lighting

    E-Print Network [OSTI]

    Bucci, David J.

    Exposing Digital Forgeries by Detecting Inconsistencies in Lighting Micah K. Johnson Department the lighting conditions from the individual photographs. Light- ing inconsistencies can therefore be a useful of computer vision, we describe how the di- rection of a point light source can be estimated from only

  8. Exposing Digital Forgeries From 3-D Lighting Environments

    E-Print Network [OSTI]

    Bucci, David J.

    Exposing Digital Forgeries From 3-D Lighting Environments Eric Kee 1 , Hany Farid 2 Department@cs.dartmouth.edu Abstract--When creating a photographic composite, it can be difficult to match lighting conditions. We describe a technique for measuring lighting conditions in an image, and describe its use in detecting

  9. Commentary to "The So-Called Velasco Map: A Case of Forgery?" 

    E-Print Network [OSTI]

    Seaver, Kirsten A.

    2006-02-14

    This article discusses David Y. Allen, "The So-Called Velasco Map: A Case of Forgery?" (Coordinates, Series A, no. 5)....

  10. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and...

    Broader source: Energy.gov (indexed) [DOE]

    is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an...

  11. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |VulnerabilitiesUsers

  12. V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeployment |Energyand

  13. A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    availability. Replication in it­ self, however, is not enough against malicious attacks that are specifically be distinguished: bandwidth consumption at­ tacks and resource consumption attacks. In a bandwidth con­ sumption accept requests from legitimate clients anymore. In a resource consumption attack, the attacker sends

  14. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability...

  15. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  16. Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha, Jayan Krishnaswami

    E-Print Network [OSTI]

    Ha, Dong S.

    Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where

  17. Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures Guillaume Barbu1. Until 2009, Java Cards have been mainly threatened by Log- ical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code

  18. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Grids”, IEEE Transactions on Smart Grid, vol. 2, no. 2,Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  19. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  20. PROTECT YOURSELF AGAINST PHISHING ATTACKS Phishing is a cunning attempt by hackers to solicit, steal and mishandle users' personal information (e.g.

    E-Print Network [OSTI]

    Johnson Jr.,, Ray

    PROTECT YOURSELF AGAINST PHISHING ATTACKS Phishing is a cunning attempt by hackers to solicit willingly supply the requested data, hackers gain access to their accounts and then engage in malicious

  1. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  2. A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    E-Print Network [OSTI]

    Levente, Buttyán

    can be used to ensure availability. Replication in it- self, however, is not enough against malicious server can be distinguished: bandwidth consumption at- tacks and resource consumption attacks overloaded and cannot accept requests from legitimate clients anymore. In a resource consumption at- tack

  3. Retargeting Attacks from Windows to Android With Limited Data Extraction

    E-Print Network [OSTI]

    Ng, Cary G.

    2014-01-01

    Retargeting the Attack to Android . . . . . . . . . .The Popularity of Android Devices . . . . . . . . . . .3 Android Attack . . . . .

  4. Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512 Takanori.Isobe,Taizo.Shirai}@jp.sony.com Abstract. This paper studies two types of attacks on the hash function Shabal. The first attack is a low on a low-weight pseudo collision attack. It means that only low-weight difference in a chaining value

  5. Quantum attacks against iterated block ciphers

    E-Print Network [OSTI]

    Marc Kaplan

    2015-04-26

    We study the amplification of security against quantum attacks provided by iteration of block ciphers. In the classical case, the Meet-in-the-middle attack is a generic attack against those constructions. This attack reduces the time required to break double iterations to only twice the time it takes to attack a single block cipher, given that the attacker has access to a large amount of memory. More abstractly, it shows that security by composition does not achieve exact multiplicative amplification. We present a quantized version of this attack based on an optimal quantum algorithm for the Element Distinctness problem. We then use the generalized adversary method to prove the optimality of the attack. An interesting corollary is that the time-space tradeoff for quantum attacks is very different from what classical attacks allow. This first result seems to indicate that composition resists better to quantum attacks than to classical ones because it prevents the quadratic speedup achieved by quantizing an exhaustive search. We investigate security amplification by composition further by examining the case of four iterations. We quantize a recent technique called the dissection attack using the framework of quantum walks. Surprisingly, this leads to better gains over classical attacks than for double iterations, which seems to indicate that when the number of iterations grows, the resistance against quantum attacks decreases.

  6. The boomerang attack David Wagner

    E-Print Network [OSTI]

    Wagner, David

    . Second, we show how to break COCONUT98, a cipher designed using decorrelation techniques to en- sure (Rounds) Our Attack Data Complexity Time Complexity COCONUT98 (8) 2 16 CP 2 38 Khufu (16) 2 18 CP 2 18{5 below, where we show how to break COCONUT98 [V98] with just 2 16 chosen texts and 2 38 work, despite

  7. Secure routing in wireless sensor networks: attacks and countermeasures

    E-Print Network [OSTI]

    Xu, Wenyuan

    against sensor networks, introduce two classes of novel attacks against sensor networks­­sinkholes two novel classes of previously undocumented attacks against sensor net- works 1 ­­sinkhole attacks

  8. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    E-Print Network [OSTI]

    California at Berkeley, University of

    sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO two novel classes of previously undoc­ umented attacks against sensor networks 1 -- sinkhole attacks

  9. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    E-Print Network [OSTI]

    Wagner, David

    sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO­ umented attacks against sensor networks 1 -- sinkhole attacks and HELLO floods. #15; We show

  10. A Novel Attack against Android Phones

    E-Print Network [OSTI]

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  11. A "Poisoning" Attack Against Online Anomaly Detection

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    A "Poisoning" Attack Against Online Anomaly Detection Marius Kloft Department of Computer Science it is robust against targeted "poisoning" attacks. The latter have been first investigated by Nelson et al. [1 of all data points observed so far. The key idea of a poisoning attack is to insert specially crafted

  12. Vulnerability Discovery with Attack IEEE Transactions on Software Engineering (2010)

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    2010-01-01

    : Monitor target system's state while executing attacks in 3 ways Overview of tool AJECT #12;Attack generate attacks in 4 ways Injection phase: Execute previously generated test cases(attacks) Monitoring

  13. The Cost of Attack in Competing Networks

    E-Print Network [OSTI]

    Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

    2015-01-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

  14. Personal Information Request Request for Personal Information

    E-Print Network [OSTI]

    deYoung, Brad

    Personal Information Request Request for Personal Information Request for Correction of Personal Information Personal information on this form is collected under Newfoundland and Labrador's Access to Information and Protection of Privacy (ATIPP) Act and will be used to respond to a request for, or correction

  15. Attacks on Java Card 3.0 Combining Fault and Logical Attacks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Attacks on Java Card 3.0 Combining Fault and Logical Attacks Guillaume Barbu1,2 , Hugues Thiebeauld://www.telecom-paristech.fr/ guillaume.barbu@telecom-paristech.fr Abstract. Java Cards have been threatened so far by attacks using ill it can no longer be applied to the Java Card 3 Connected Edition context where the bytecode verification

  16. Machine Learning Attacks Against the ASIRRA CAPTCHA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Machine Learning Attacks Against the ASIRRA CAPTCHA Draft, February 28, 2008 Philippe Golle Palo of cats and dogs used in ASIRRA. This classifier is a combination of support-vector machine classifiers higher than the estimate given in [6] for machine vision attacks. The weakness we expose in the current

  17. Low-Density Attack Revisited Tetsuya Izu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Low-Density Attack Revisited Tetsuya Izu Jun Kogure Takeshi Koshiba Takeshi Shimoyama Secure The low-density attack proposed by Lagarias and Odlyzko is a powerful algorithm against the subset sum, densities of the subset sum problems should be higher than 0.9408... in order to avoid the low

  18. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  19. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  20. Improved Side Channel Attacks on Pairing Based Cryptography

    E-Print Network [OSTI]

    to passive attacks as well as to active attacks [12,8,21,11,22,13]. asdf This work was funded by the German

  1. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  2. Request for Salary Action Requesting action

    E-Print Network [OSTI]

    Arnold, Jonathan

    Request for Salary Action Requesting action: Above "annual entry maximum" Mid-year increase Promotional salary increase exception Counter offer Salary supplement Other Jan. 28 2015 Tracking number Date

  3. ENERGY EXCEPTION REQUEST Energy Exception Request Questionnaire

    E-Print Network [OSTI]

    Rock, Chris

    ENERGY EXCEPTION REQUEST Energy Exception Request Questionnaire rev AA.01 2013/04/02 GUIDELINES which exceed the normal schedule by completing this Energy Exception Request and submitting it to the Office of Energy Management. Energy Management will prepare a cost analysis and return

  4. Request Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAboutNuclear NonproliferationRequestForm Sign In

  5. Request Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAboutNuclear NonproliferationRequestForm Sign

  6. Analysis and Defense of Emerging Malware Attacks 

    E-Print Network [OSTI]

    Xu, Zhaoyan

    2014-05-28

    to perform effectively and efficiently targeted malware analysis. Second, this dissertation studies a new trend of massive malware intrusion and proposes a new protection scheme to proactively defend malware attack. Lastly, our focus is new P2P malware. We...

  7. Inoculating Multivariate Schemes Against Differential Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding and Jason E. Gower scheme the Perturbed Matsumoto-Imai-Plus (PMI+) cryptosystem. Keywords: multivariate, public key resources. Multivariate public key cryptography provides one alternative since computations in small finite

  8. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  9. Power Analysis Attacks against FPGA Implementations Shaohua Tang1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Power Analysis Attacks against FPGA Implementations of KLEIN Shaohua Tang1 , Jianhao Wu1 , Weijian not consider the potential attacks by power analysis methods. This paper presents power analysis attacks and complexity of our attacks via power analysis against KLEIN are discussed in detail. Besides

  10. Defining Code-injection Attacks Donald Ray Jay Ligatti

    E-Print Network [OSTI]

    Ligatti, Jay

    of mechanisms for mitigating such attacks. Categories and Subject Descriptors C.2.0 [Computer Communi- cation definitions of code-injection attacks (e.g., SQL-injection attacks) are flawed. The flaws make it possible these flaws in conventional definitions of code-injection attacks, this paper proposes a new definition, which

  11. Taxonomy for Description of Cross-Domain Attacks on CPS

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    . This attack has reportedly damaged over 1000 centrifuges at an Iranian uranium enrichment plant [1]. Multiple

  12. Green Event Request Name: _______________________________________________________________________

    E-Print Network [OSTI]

    Lawrence, Rick L.

    Green Event Request Name fill out the following completely and have it emailed to our recycling coordinator, Logun Norris

  13. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  14. Protecting Mobile Devices From TCP Flooding Attacks

    E-Print Network [OSTI]

    Fu, Xiaoming

    against these kinds of attack · Waking up the device by sending random SYN packets will exhaust-holes for server ports doesn't prevent against battery exhaustion and spectrum waste · Some P2P applications (e.g., Skype) have mechanism built into protocol to traverse such firewalls, but not all of them do. · Our Goal

  15. Cyber Security Basic Defenses and Attack Trends

    E-Print Network [OSTI]

    Sastry, S. Shankar

    37 38 39 40 41 4273 MTC 4 Cyber Security Basic Defenses and Attack Trends Alvaro A. Cárdenas, Tanya for a successful defense. Cyber security is the branch of security dealing with digital or information technology.1 This chapter presents a selected overview on topics in cyber security. 1. Throughout the chapter, we use

  16. Defending against side-channel attacks : DynamoREA

    E-Print Network [OSTI]

    Wen, David, M. Eng. (David Y.). Massachusetts Institute of Technology

    2011-01-01

    Modern computer architectures are prone to leak information about their applications through side-channels caused by micro-architectural side-effects. Through these side-channels, attackers can launch timing attacks by ...

  17. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection...

  18. Attacking and Repairing the Improved ModOnions Protocol

    E-Print Network [OSTI]

    Borisov, Nikita

    Attacking and Repairing the Improved ModOnions Protocol Nikita Borisov1 , Marek Klonowski2 presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoid replay attacks. How- ever, ModOnions allowed the detour attack

  19. A Classification of SQL Injection Attacks and Countermeasures

    E-Print Network [OSTI]

    Orso, Alessandro "Alex"

    A Classification of SQL Injection Attacks and Countermeasures William G.J. Halfond, Jeremy Viegas|jeremyv|orso}@cc.gatech.edu ABSTRACT SQL injection attacks pose a serious security threat to Web appli- cations: they allow attackers methods to address the SQL injection problem, current approaches either fail to address the full scope

  20. A Routing Table Insertion (RTI) Attack Technical Report

    E-Print Network [OSTI]

    Dong, Yingfei

    1 A Routing Table Insertion (RTI) Attack on Freenet Technical Report University of Hawaii at Manoa.2.6 Data Retrieval versus Data Insert Routing 2.3. Routing Algorithm Pseudo-Code 3. RTI Attack 3 Experiment 8.2.2. Experiment Results 8.3. General Anonymous P2P Properties 8.4. RTI Attack 8.4.1. Manual RTI

  1. Efficient Template Attacks Omar Choudary and Markus G. Kuhn

    E-Print Network [OSTI]

    Kuhn, Markus

    Side-channel attacks are powerful tools for inferring secret algorithms or data (passwords a specific cipher, could be implemented on top of that, but are outside the scope of this paper. We show to as the profiling and the attacked device. We wish to infer some secret value k S, processed by the attacked device

  2. Mitigation of Malicious Attacks on Networks

    E-Print Network [OSTI]

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  3. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    learning and security: training-set attacks on machine learners. In such attacks an attacker contaminates-set attacks to increase in the future as more intelligent systems (e.g. wearable devices, cars, smart houses

  4. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    and security: training-set attacks on machine learners. In such attacks an attacker contaminates the training.g. wearable devices, cars, smart houses and robots) include a "life long learning" com- ponent. The attacker

  5. Food Exemption Request Organization Information

    E-Print Network [OSTI]

    Food Exemption Request Organization Information Organization Received ______ Organizations are permitted one food exemption per semester. Requests must be submitted and Regulations Your group has requested a food exemption for an event. The rules and regulations for use

  6. Freedom of Information Request -Flow Chart Request Received

    E-Print Network [OSTI]

    Zernicka-Goetz, Magdalena

    Freedom of Information Request - Flow Chart ! Request Received Do not leave it ­ read it ! Date stamp request Consult with your departmental FOI Officer if required ! ! ! Release information Forward to the University's Freedom Forward to relevant department or of Information Officer write to requester directing

  7. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    - Best Practice DesignConfiguration Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan...

  8. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  9. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we precisely define corrupted packets in inter-session pollution based

  10. Preventing Pollution Attacks in MultiSource Network Coding

    E-Print Network [OSTI]

    Boneh, Dan

    Preventing Pollution Attacks in Multi­Source Network Coding Shweta Agrawal 1# , Dan Boneh 2 that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks. A particularly important instance of this is the pollution problem: if some routers in the network are malicious

  11. Preventing Pollution Attacks in Multi-Source Network Coding

    E-Print Network [OSTI]

    Boneh, Dan

    Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal 1 , Dan Boneh 2 , Xavier combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious important instance of this is the pollution problem: if some routers in the network are malicious

  12. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we first define precisely corrupted packets in inter-session pollution based

  13. Improved Side Channel Attacks on Pairing Based Cryptography

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ], and anonymous group signatures [BS04] make use of pairings as their building blocks. The adoption of pairings that analyze the vulnerability of pairings to passive attacks as well as to active attacks [PV04, KTH+ 06, WS06, WS07, PV06]. There is a variety of pairings that can be used for PBC, e.g., the Weil pairing

  14. Energy Attacks and Defense Techniques for Wireless Systems

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Energy Attacks and Defense Techniques for Wireless Systems Sheng Wei Jong Hoon Ahnn Miodrag {shengwei, jhahnn, miodrag}@cs.ucla.edu ABSTRACT This paper addresses the energy attacks towards wireless in the wireless systems and trigger ultra-high energy increases at runtime. Then, we develop a non-destructive HT

  15. Tornado Attack on RC4 Applications to WEP & WPA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    several tools for building and manipulating pools of biases in the analysis of RC4. We report extremely fast and optimized active and passive attacks against IEEE 802.11 wireless commu- nication protocol WEP of packets, Aicrack-ng yields around 3% success rate. Furthermore, we describe very fast passive only attacks

  16. Stealthy Poisoning Attacks on PCA-based Anomaly Detectors

    E-Print Network [OSTI]

    Tygar, Doug

    Stealthy Poisoning Attacks on PCA-based Anomaly Detectors Benjamin I. P. Rubinstein1 Blaine Nelson1 detection, we present and evaluate short-term and long-term data poison- ing schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boil- ing Frog attacks

  17. Efficient Template Attacks Omar Choudary and Markus G. Kuhn

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Side-channel attacks are powerful tools for inferring secret algorithms or data (passwords values, e.g. to recover keys from a specific cipher, could be implemented on top of that, but are outside devices, which we refer to as the profiling and the attacked device. We wish to infer some secret value k

  18. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  19. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  20. Fault and Side-Channel Attacks on Pairing Based Cryptography ?

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

  1. REQUESTS FOR RETIREMENT ESTIMATE

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget ||Department ofRequest for Records DispositionREQUEST

  2. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  3. PIA - Human Resources - Personal Information Change Request ...

    Energy Savers [EERE]

    Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory PIA - Human Resources - Personal Information Change Request - Idaho National...

  4. PIA - Human Resources - Personal Information Change Request ...

    Energy Savers [EERE]

    - Personal Information Change Request - Idaho National Engineering Laboratory PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory...

  5. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect (OSTI)

    Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  6. PERSONAL REFUND REQUEST Conference Housing

    E-Print Network [OSTI]

    Yoo, S. J. Ben

    PERSONAL REFUND REQUEST Conference Housing Please print the following information: First Name: Last/Mastercard # Amount of refund requested: If you did not make your payment directly to Conference Housing, you must). This is mandatory to receive a refund. Your request will be reviewed by the Conference Housing Manager for approval

  7. Detection attacks on cryptographic protocols and bound randomness

    E-Print Network [OSTI]

    Antonio Acín; Daniel Cavalcanti; Elsa Passaro; Stefano Pironio; Paul Skrzypczyk

    2015-04-30

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. The derived critical detection efficiencies for security imply that the implementation of most partly device independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely non-local correlations in which a non-signalling eavesdropper can find out a posteriori the result of any implemented measurement.

  8. Coordinated Variable Structure Switching Attacks for Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11

    attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one...

  9. The Middle East under Malware Attack Dissecting Cyber Weapons

    E-Print Network [OSTI]

    Almulhem, Ahmad

    the middle east was the Shamoon attack on Saudi Aramco [10]. Shamoon malware [11] is less sophisticated than destruction of the content of around 30,000 workstations in Saudi Aramco [12], [10]. Given the amount

  10. Single-block collision attack on MD5 Marc Stevens

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands marc@marc-stevens.nl January 29, 2012 Abstract In 2010, Tao Xie and Dengguo Feng

  11. Maximum Damage Malware Attack in Mobile Wireless Networks

    E-Print Network [OSTI]

    such as those in relaying data and establishing end-to-end routes (e.g., sinkhole attacks [1]), or even alter such as the wormhole [7], sinkhole [1], and Sybil [8], that utilize vulnerabilities in the routing protocols

  12. Maximum Damage Battery Depletion Attack in Mobile Sensor Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    functions such as relaying and establishing end-to-end routes (e.g., sinkhole attacks [2]), or even such as the wormhole [6], sinkhole [2], and Sybil [7], that utilize vulner- abilities in the routing protocols

  13. Request a Reprint

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAboutNuclear NonproliferationRequestFormTO REQUEST A

  14. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  15. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique

  16. Identification of Repeated Attacks Using Network Traffic Alefiya Hussain John Heidemann Christos Papadopoulos

    E-Print Network [OSTI]

    Papadopoulos, Christos

    designed a multi-dimensional maximum-likelihood classifier to identify re- peated attack scenarios, by inference, the same attacker, much as ballistics studies of firearms can trace multiple uses of a weapon to the same gun. Such evidence of repeated attacks would help establish the maliciousness of a given attacker

  17. Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    SFINKS [8], the simple attack would require only about 42 2 operations and 32Kb of keystream higher order nonlinearity. Introduction Algebraic attacks are an attractive field for investigation, a number of papers were written which investigated, extended and improved algebraic attacks. These attacks

  18. CIVIL ENGINEERING LAB ACCESS REQUEST FORM Instructions

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    CIVIL ENGINEERING LAB ACCESS REQUEST FORM Instructions: 1) Fill out request 2) A request may Estimated Key Return Date/When does job terminate? Section C: Approval Signatures (for Civil Engineering use

  19. Social media request | Department of Energy

    Energy Savers [EERE]

    Web Policies Social Media Social media request Social media request Please fill out the information below in order to request access to a social media application or to have...

  20. EERE FY 2016 Budget Request

    Energy Savers [EERE]

    FY 2016 Budget Request Dr. David T. Danielson Assistant Secretary, Office of Energy Efficiency and Renewable Energy February 2, 2015 eere.energy.gov 2 Major Administration Energy...

  1. 2014 NERSC allocation requests due September 22

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    requests due September 22 2014 NERSC allocation requests due September 22 August 13, 2013 by Francesca Verdier (0 Comments) NERSC's allocation submission system is now open for...

  2. 2015 NERSC allocation requests due September 22

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5 NERSC allocation requests due September 22 2015 NERSC allocation requests due September 22 August 13, 2014 by Francesca Verdier (0 Comments) The NERSC allocation submission...

  3. Felix Storch: Data Request (2010-SCE-0111)

    Broader source: Energy.gov [DOE]

    DOE requested additional test data from Felix Storch regarding various models of refrigerators and freezers after examining Storch's response to DOE's December 2010 Request for Test Data.

  4. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.

  5. Integrity Under Attack: The State of Scholarly Publishing

    E-Print Network [OSTI]

    Arnold, Douglas N.

    Integrity Under Attack: The State of Scholarly Publishing By Douglas N. Arnold Scientific journals depend. Publications are used by universities, funding agencies, and others as a primary measure, and in the ranking of departments, institutions, even nations. With big rewards tied to publication

  6. Practical Attacks on Digital Signatures Using MD5 Message Digest

    E-Print Network [OSTI]

    Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department schemes based on MD5 message digest on an example using GPG. Keywords: collision, hash function, MD5 1 used for file integrity checking and as a message digest in digital signature schemes. During CRYPTO

  7. Congestion Attacks to Autonomous Cars Using Vehicular Botnets

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Congestion Attacks to Autonomous Cars Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre of the cars in the targeted area by orders of magnitude. After 5 minutes, the targeted road becomes completely prevent collisions. In a VANET, cars communicate with each other over a wireless channel. They can send

  8. Rootkits on Smart Phones: Attacks, Implications and Opportunities

    E-Print Network [OSTI]

    Iftode, Liviu

    Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford Ryan O Smart phones are increasingly being equipped with operating sys- tems that compare in complexity with those on desktop comput- ers. This trend makes smart phone operating systems vulnerable to many

  9. Smart-Phone Attacks and Defenses Chuanxiong Guo

    E-Print Network [OSTI]

    Wang, Bing

    Smart-Phone Attacks and Defenses Chuanxiong Guo xguo@ieee.org Microsoft Research Helen J. Wang smart-phones), and our environment (e.g., through the use of sensors, actuators, and RFIDs). While is becoming a reality: Smart-phones, interoperable between the telecom networks and the Inter- net

  10. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    E-Print Network [OSTI]

    Johnson, Aaron

    }@informatik.hu-berlin.de Abstract--Tor is a distributed onion-routing network used for achieving anonymity and resisting censorship and transferring roughly 3 GiB/s in aggregate [8]. Tor uses onion routing [25] to route clients' traffic throughThe Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen Florian

  11. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    E-Print Network [OSTI]

    }@informatik.hu-berlin.de Abstract--Tor is a distributed onion-routing network used for achieving anonymity and resisting censorshipB/s in aggregate [4]. Tor uses onion routing [5] to route clients' traffic through a circuit of geo- graphicallyThe Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen Florian

  12. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  13. Anti-discrimination Analysis Using Privacy Attack Strategies

    E-Print Network [OSTI]

    Ruggieri, Salvatore

    Anti-discrimination Analysis Using Privacy Attack Strategies Salvatore Ruggieri1 , Sara Hajian2 and Technology, Saudi Arabia Abstract. Social discrimination discovery from data is an important task to identify deploy privacy at- tack strategies as tools for discrimination discovery under hard assump- tions which

  14. Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins

    E-Print Network [OSTI]

    Perrig, Adrian

    Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins ˇ Adrian Perrig Ion hosts is denial- of-service (DoS) caused by IP packet floods. Hosts in the Internet are unable to stop ­ not the net- work ­ should be given control to respond to packet floods and overload. Ideally, hosts should

  15. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern systems are mon- itored and controlled by Supervisory Control and Data Ac- quisition (SCADA) systems

  16. Fighting Coordinated Attackers with Cross-Organizational Information Sharing

    E-Print Network [OSTI]

    Paxson, Vern

    Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman, Ethan upon real-world crime fighting. While society employs highly trained crime- fighters ("detectives of fighting crime, their value is in their numbers and prevalence. Detectives are charged with detecting

  17. Defending Synchrophasor Data Networks Against Traffic Analysis Attacks

    E-Print Network [OSTI]

    Sikdar, Biplab

    - tem. PMU data serves to facilitate a number of applications while enhancing others, such as real generation and distribution system, monitoring and manipulation of PMU data are particularly attractive of the PMU data measurement and collection network against a class of passive attacks and develops defense

  18. A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data

    E-Print Network [OSTI]

    Sikdar, Biplab

    in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number in the maintenance and control of the power generation and distribution system, monitoring and manipulation of PMU. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks

  19. Attacks based on Conditional Correlations against the Nonlinear Filter Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ­based keystream generator which could be used as a basic building block in a synchronous stream cipher system of a keystream generator (i.e. NLFG) in a synchronous secret key encryption and decryption system. 2 #12Attacks based on Conditional Correlations against the Nonlinear Filter Generator Bernhard L

  20. Combating Time Synchronization Attack: A Cross Layer Defense Mechanism

    E-Print Network [OSTI]

    Li, Husheng

    and Protection]: Physical Security 1. INTRODUCTION The security of smart grid has become an important research synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified re- cently. A cross the eectiveness of the pro- posed TSA detection algorithm. Categories and Subject Descriptors K.6.5 [Security

  1. How to help people who have heart attacks

    E-Print Network [OSTI]

    Lega, Joceline

    How to help people who have heart attacks Meghan McGovern Monday, December 03, 2012 #12;5 Heart-Lung Machine Extracorporeal Membrane Oxygenation #12;6 Electrocardiograph (ECG) #12;7 Artificial Hearts #12;8 Tissue Engineering O Researchers Rebuild Beating Heart with Cardiac Derived Cells! O January

  2. Reducing Attack Surfaces for Intra-Application Communication in Android

    E-Print Network [OSTI]

    Wagner, David

    Reducing Attack Surfaces for Intra-Application Communication in Android David Kantola, Erika Chin,emc,-w,daw}@berkeley.edu ABSTRACT The complexity of Android's message-passing system has led to numerous vulnerabilities in third-application communication mechanisms. Consequently, we propose modifications to the Android platform to detect and protect

  3. Attacks on Android Clipboard Xiao Zhang and Wenliang Du

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Attacks on Android Clipboard Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer perform a thorough study on the risks im- posed by the globally accessible Android Clipboard. Based briefly discuss some potential solutions. 1 Introduction Android was developed by Google in 2008

  4. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute without the contraint of special hardware and dependency on physical medium of wireless network. BAAP and router at the same time. Most of the previous research has focused on problems of routing

  5. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect (OSTI)

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  6. THE BLIND PATTERN MATCHING ATTACK ON WATERMARK SYSTEMS

    E-Print Network [OSTI]

    Petitcolas, Fabien A.P.

    complex- ity to reverse the permutations as a preprocessing step for watermark detection. In this paper, we describe the logistics of the attack and a recipe for its implementation against an audio be shown that any WM detector is facing a task of exponential complexity to reverse the permutations

  7. Insects and Related Pests Attacking Lawns and Ornamental Plants. 

    E-Print Network [OSTI]

    Almand, Lyndon K.; Thomas, John G.

    1968-01-01

    Lawns and 0 rnamental Plants i* - .* " TEXAS AIM UNIVERSITY ,I TEXAS AGRICULTURAL EXTENSION SERVIC ' ' 1. E. Hutchison. Director. College Station, Vixtis Photographs in this publication have two numbering series . Any figure number followed by a... small "a" refers to a colored illustration . All colored illustrations appear on pages 12 through 15 . PESTS ATTACKING LAWNS Sucking Pests Southern Chinch Bugs .................................................................................. 2...

  8. Online Test Proctoring Request Procedures

    E-Print Network [OSTI]

    Stuart, Steven J.

    Online Test Proctoring Request Procedures #12;Documentation last updated: Friday, January 17, 2014 Page | 2 of 10 Online Test Proctoring Request Form Procedures Contents Test Proctoring Center (TPC............................................................................................................................... 10 #12;Documentation last updated: Friday, January 17, 2014 Page | 3 of 10 Test Proctoring Center

  9. SALARY ADVANCE REQUEST HUMAN RESOURCES

    E-Print Network [OSTI]

    Su, Xiao

    SALARY ADVANCE REQUEST HUMAN RESOURCES Employee Support Services | One Washington Square | San José, CA 95192-0046 | 408-924-2250 408-924-1701 (fax) Instructions: A request for a salary advance should: Department: Division/College: Campus Phone #: Employee Status: (check one) Faculty Staff REASON FOR SALARY

  10. Requests for Proposals

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAboutNuclear NonproliferationRequestFormTO8Complex

  11. SSRL Web Requests

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The2/01/12 Page 1NEWSSupport Request To use this

  12. New Collision attacks Against Up To 24step SHA2 Somitra Kumar Sanadhya # and Palash Sarkar

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Applied Statistics Unit, Indian Statistical Institute, 203, B.T. Road, Kolkata, India 700108. somitra r. of India. #12; . The complexity of 24­step SHA­512 attack is improved in comparison to the existing attack

  13. Identification of Repeated Attacks Using Network Traffic Alefiya Hussain John Heidemann Christos Papadopoulos

    E-Print Network [OSTI]

    Heidemann, John

    trace multiple uses of a weapon to the same gun. Such evidence of repeated attacks would help establish only by reducing attack effectiveness. We designed a multi-dimensional maximum-likelihood classifier

  14. Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans

    E-Print Network [OSTI]

    Gurumurthi, Sudhanva

    Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans University thermal management alternative. Keywords: storage systems, security, thermal management, denial shut-down. Our new thermal attack on future storage systems is unrecognized by current Intrusion

  15. Automatic Creation of SQL Injection and Cross-Site Scripting Attacks

    E-Print Network [OSTI]

    Kiezun, Adam

    2008-09-10

    We present a technique for finding security vulnerabilitiesin Web applications. SQL Injection (SQLI) and cross-sitescripting (XSS) attacks are widespread forms of attackin which the attacker crafts the input to the application ...

  16. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    that the open nature of web browsers provides a feasible \\point of entry" for this attack via a corrupted plug of web-browser plug-ins could easily provide a \\point of entry" for chosen-plaintext attacks

  17. A spillway infrastructure for defense against Distributed Denial of Service attacks 

    E-Print Network [OSTI]

    Barkley, Andrew Holman

    2000-01-01

    Distributed Denial of Service (DDoS) attacks have proven to be disruptive forces on the Internet. There is currently no means of defense from such attacks, as they are exploitations of mechanisms that are critical for normal operation...

  18. Chosen Ciphertext Attack on SSS Joan Daemen1, Joseph Lano2 , and Bart Preneel2

    E-Print Network [OSTI]

    Bernstein, Daniel

    - cryption with DES in CFB mode was analyzed with respect to chosen ciphertext attacks in [7]. The stream

  19. Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy

    E-Print Network [OSTI]

    Boyd, Colin

    testbed. The testbed simulated actuators and sensors of a hydro-power system. The attacks using DNP3 were

  20. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  1. Response to several FOIA requests - Renewable Energy. | Department...

    Energy Savers [EERE]

    Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy, SCHEDULE FOR CHIEF...

  2. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris and Start (PKES) systems used in modern cars. We build two efficient and inexpensive attack realizations, wired and wireless physical-layer relays, that allow the attacker to en- ter and start a car by relaying

  3. An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato Entrust, Inc.mister,robert.zuccherato}@entrust.com Abstract. This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode for each block. Standard CFB mode encryption does not appear to be affected by this attack. It applies

  4. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses

    E-Print Network [OSTI]

    Saxena, Nitesh

    The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

  5. Pollution Attack Defense for Coding Based Sensor Levente Buttyan, Laszlo Czap, Istvan Vajda

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    Pollution Attack Defense for Coding Based Sensor Storage Levente Butty´an, L´aszl´o Czap, Istv to make network coding based storage secure against pollution attacks in sensor networks. The approach], [12], [13]. We present a scheme that resists pollution attacks, meaning that our scheme makes possible

  6. Dynamic Load Altering Attacks in Smart Grid Sajjad Amini, Hamed Mohsenian-Rad, and Fabio Pasqualetti

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    response and demand side management programs. It attempts to control and change certain unsecured is on attacks against demand re- sponse (DR) and demand side management (DSM) programs. DR programs are used}@ece.ucr.edu and fabiopas@engr.ucr.edu Abstract--A load altering attack (LAA) is a cyber-physical attack against demand

  7. Impacts of Bad Data and Cyber Attacks on Electricity Market Operations

    E-Print Network [OSTI]

    operations. In particular, we investigated the problem from perspectives of an attacker and the controlImpacts of Bad Data and Cyber Attacks on Electricity Market Operations Final Project Report Power;#12;Impacts of Bad Data and Cyber Attacks on Electricity Market Operations Final Project Report Project Team

  8. On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack Mohammad Reza Sohizadeh against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) pro- tocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive attacks proposed

  9. Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

    E-Print Network [OSTI]

    Nita-Rotaru, Cristina

    1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

  10. Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis Song Sun was publicly intro- duced, power analysis attacks on cryptographic systems have be- come an increasingly of power analysis attacks and preventative techniques on both software (e.g. smartcard, DSP) and hardware

  11. Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks

    E-Print Network [OSTI]

    Nam, Seung Yeob

    1 Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks Seung Yeob Nam, Member- tion Protocol (ARP) is proposed to prevent ARP poisoning-based Man-in-the-Middle (MITM) attacks deployable. Index Terms--ARP cache poisoning, Man-in-the-Middle attack, ARP poisoning prevention, voting. I

  12. Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ives, Zachary G.

    Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor in improving resilience against sinkhole attacks, even in the presence of some collusion. I. INTRODUCTION

  13. Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks

    E-Print Network [OSTI]

    Le Fessant, Fabrice - Institut national de recherche en informatique et en automatique, Centre de recherche INRIA Saclay

    Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor are effective in improving resilience against sinkhole attacks, even in the presence of some collusion. I

  14. Automatic Search of Attacks on round-reduced AES and Applications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Search of Attacks on round-reduced AES and Applications Charles Bouillaguet, Patrick of these tools, we show that they allow to automatically discover new attacks on round-reduced AES with very low to find better attacks, new automatic tools have been designed to automatically search either related

  15. False Data Injection Attacks with Incomplete Information Against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    False Data Injection Attacks with Incomplete Information Against Smart Power Grids Md. Ashfaqur introduced as an important class of cyber attacks against smart grid's wide area measurement and monitoring Injection Attack, Smart Grid Security, Incomplete Information, Transmission Line Admittance Uncer- tainty

  16. Examples of the Generalized Quantum Permanent Compromise Attack to the Blum-Micali Construction

    E-Print Network [OSTI]

    Guedes, Elloá B; Lula, Bernardo

    2010-01-01

    This paper presents examples of the quantum permanent compromise attack to the Blum-Micali construction. Such attacks illustrate how a previous attack to the Blum-Micali generator can be extended to the whole Blum-Micali construction, including the Blum-Blum-Shub and Kaliski generators.

  17. Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Patrick Derbez and Léo cipher they designed, PRINCE. Instead of trying to attack as many rounds as possible using attacks which on round-reduced PRINCE includ- ing the ones which won the challenge in the 6 and 8-round categories

  18. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  19. SSRL Computer Account Request Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SSRLLCLS Computer Account Request Form August 2009 Fill in this form and sign the security statement mentioned at the bottom of this page to obtain an account. Your Name:...

  20. Wireless Device Request Form Department

    E-Print Network [OSTI]

    Wireless Device Request Form Department: Employee ID #: St. Francis Xavier University TSG Contact Date: Part II - Employee Agreement I agree and acknowledge that I have read the Wireless Communications

  1. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  2. Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non-Repudiation Protocol

    E-Print Network [OSTI]

    Chen, Yu

    1 Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non security issues in cloud storage: repudiation, fairness, and roll-back attacks. We proposed a novel fair and is capable of preventing roll-back attacks. Keywords: Cloud Storage, Non-repudiation, Roll-back Attack. 1

  3. A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. LaPorta

    E-Print Network [OSTI]

    Yener, Aylin

    1 A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of Cross Infrastructure Cyber Attacks in addition to the standard Single

  4. Radiological Research Accelerator Facility Service Request Form

    E-Print Network [OSTI]

    Radiological Research Accelerator Facility Service Request Form National Institute of Biomedical Imaging and Bioengineering Radiological Research Accelerator Facility Service request form Estimate when(s) to control for this experiment (if more than one, please prioritize): Radiological Research Accelerator

  5. PERMISSION REQUEST FORM Permissions Coordinator, Journals Division

    E-Print Network [OSTI]

    Mateo, Jill M.

    . Rights requested (check all that apply) __ I am requesting renewal of a previous grant from is to be adapted, please provide description and attach copy of adaptation to this form

  6. Delta Faucet: Data Request (2010-SW-1603)

    Broader source: Energy.gov [DOE]

    DOE requested test data from Delta Faucet Corporation for Delta Faucet's showerhead model "In2ition 75582".

  7. Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks

    E-Print Network [OSTI]

    Ruj, Sushmita

    2015-01-01

    We model smart grids as complex interdependent networks, and study targeted attacks on smart grids for the first time. A smart grid consists of two networks: the power network and the communication network, interconnected by edges. Occurrence of failures (attacks) in one network triggers failures in the other network, and propagates in cascades across the networks. Such cascading failures can result in disintegration of either (or both) of the networks. Earlier works considered only random failures. In practical situations, an attacker is more likely to compromise nodes selectively. We study cascading failures in smart grids, where an attacker selectively compromises the nodes with probabilities proportional to their degrees; high degree nodes are compromised with higher probability. We mathematically analyze the sizes of the giant components of the networks under targeted attacks, and compare the results with the corresponding sizes under random attacks. We show that networks disintegrate faster for targeted...

  8. Time Stamp Attack on Wide Area Monitoring System in Smart Grid

    E-Print Network [OSTI]

    Zhang, Zhenghao; Li, Husheng; Pei, Changxing

    2011-01-01

    Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

  9. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks 

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22

    were killed and more than 1,200 were injured by deadly terrorist attacks on commuter trains and stations in Madrid. These attacks had an enormous impact on the citizens of Spain, as well as the entire international community. The Madrid bombings... in its ?War on Terror? may carry additional costs. One unanticipated effect of these attacks was the victory of the Socialists over the ruling Partido Popular party in Spain in the next election. More importantly, this occurrence led to a sharp...

  10. Practical realisation and elimination of an ECC-related software bug attack

    E-Print Network [OSTI]

    in modern e-business work-flows, are as follows: 1. Nguyen [28] described an attack on GPG version 1

  11. Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production

    E-Print Network [OSTI]

    Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production spasms, and other problems in the communities in which fracking occurs

  12. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  13. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Ning, Peng

    the measurements of meters at physically protected locations such as substations, such attacks can introduce of about 50 million people. The estimated total cost

  14. Banner Advancement Account Request Form

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner Advancement Account Request Form ETSU Office of Information Technology 424 Roy Nicks Hall, Box 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu This section for use ______________________________________________________________________________________ [last] [first] [middle] ETSU Domain Name _____________________@etsu.edu School / College

  15. Complex networks vulnerability to module-based attacks

    E-Print Network [OSTI]

    da Cunha, Bruno Requiăo; Gonçalves, Sebastián

    2015-01-01

    In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaking complex networks is attracting much attention from practical points of view. In this contribution we present a module-based method to efficiently break complex networks. The procedure first identifies the communities in which the network can be represented, then it deletes the nodes (edges) that connect different modules by its order in the betweenness centrality ranking list. We illustrate the method by applying it to various well known examples of social, infrastructure, and biological networks. We show that the proposed method always outperforms vertex (edge) attacks which are based on the ranking of node (edge) degree or centrality, with a huge gain in efficiency for some examples. Remarkably, for the US power grid, the present method breaks the original network of 4941 nodes to many fragments smaller than 197 nodes (4% of the original size) by removing mere 164 nodes (~3%) identified by the procedure. B...

  16. Detecting SYN Flooding Attacks Haining Wang Danlu Zhang Kang G. Shin

    E-Print Network [OSTI]

    Wang, Haining

    Detecting SYN Flooding Attacks Haining Wang Danlu Zhang Kang G. Shin EECS Department a simple and robust mechanism for de- tecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding

  17. The Effect of Mountain Pine Beetle Attack and Salvage Harvesting On Streamflows

    E-Print Network [OSTI]

    Northern British Columbia, University of

    The Effect of Mountain Pine Beetle Attack and Salvage Harvesting On Streamflows Special ....................................................................................................................4 FRPA requirements for Water Management in MPB-attacked watersheds ..........5 The Baker Creek. These disturbances have potential effects on water yield (the total amount of water flowing out of a watershed

  18. Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon McCoy, Brian Kantor,

    E-Print Network [OSTI]

    Hu, Fei

    Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon Mc discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics, we discuss the structural characteristics of the automotive ecosystem that give rise to such problems

  19. On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack

    E-Print Network [OSTI]

    Wang, Xinyuan "Frank"

    ], Onion Routing [24], Tor [10], Hordes [28], Web Mixes [6], Tarzan [13]) have been proposed to disguise conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer measurements and timing attack results show that the circuit rotation in Tor network could significantly

  20. Distributed Internet-based Load Altering Attacks against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    management, cost-efficient load protection. I. INTRODUCTION The recent advancements in smart grid systemsDistributed Internet-based Load Altering Attacks against Smart Power Grids Amir-Hamed Mohsenian distribution system. Keywords: Smart grid security, Internet-based load altering attacks, demand side

  1. Integral Cryptanalysis on reduced-round A way to extend the attack?

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Integral Cryptanalysis on reduced-round Safer++ ­ A way to extend the attack? ­ Gilles Piret an integral distinguisher over 2 rounds of Safer++. It allows a practical attack against 3 rounds of Safer for further research in order to extend integral cryptanalysis. 1 Introduction The integral cryptanalysis (or

  2. CellFlood: Attacking Tor Onion Routers on the Cheap Marco V. Barbera1

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    . As a way to mitigate the effect of this attack, we propose to use a client puzzle-based technique the design and implementation of an effective solution to the problem that relies on cryptographic client]. Such an attack could be used to either significantly degrade the users' perceived quality of service, which would

  3. Practical Limitations of Sliding-Mode Switching Attacks on Smart Grid Systems

    E-Print Network [OSTI]

    Kundur, Deepa

    Practical Limitations of Sliding-Mode Switching Attacks on Smart Grid Systems Abdallah K. Farraj}@comm.utoronto.ca, klbutler@tamu.edu Abstract--Switching attacks in smart grid systems have gained some recent attention practical limitations. I. INTRODUCTION Smart grid systems have enjoyed a recent interest from both

  4. Friend or Flood? Social prevention of flooding attacks in mobile opportunistic networks

    E-Print Network [OSTI]

    Henderson, Tristan

    Friend or Flood? Social prevention of flooding attacks in mobile opportunistic networks Iain Parris. In this paper we define a simple flooding attack that can deny service in an opportunistic network. We simulate untraceably flood the network with spoofed messages. As the available resources of participating devices (e

  5. Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal University of Texas combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious important instance of this is the pollution problem: if some routers in the network are malicious

  6. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks

    E-Print Network [OSTI]

    Lui, John C.S.

    Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li: cslui@cse.cuhk.edu.hk Abstract--Pollution attack is a severe security problem in network-coding enabled spreading of polluted packets to deplete network resources. We address this security problem even when

  7. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA Yong Wang1 to the Supervisory Con- trol And Data Acquisition (SCADA) system. Several intrusion detection schemes have been-graph-based detection scheme to defeat false data injec- tion attacks at the SCADA system, even when injected data may

  8. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying. The defense taxonomy classifies the body of existing DDoS de- fenses based on their design decisions

  9. Static Fault Attack on Hardware DES Registers Philippe Loubet-Moundi, Francis Olivier, and David Vigilant

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Static Fault Attack on Hardware DES Registers Philippe Loubet-Moundi, Francis Olivier, and David deals with static faults which lie in between. A static fault modifies a value loaded in a volatile], quickly became a privileged target for DFA. #12;2 Static Fault Attacks on Hardware DES Registers Indeed

  10. On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong

    E-Print Network [OSTI]

    Youssef, Amr M.

    On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong Center for Applied attack, nite elds, Ga- lois Field Fourier Transform 1 Introduction Gong and Golomb 7 introduced a new the later by decimation d. Gong and Golomb showed that the distance of DES S-boxes approximated

  11. 2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks on a smart grid. Keywords: smart grid cyber security; cyber attack impact analysis; graph-based dynamical systems; smart and Computer Engineering at Texas A&M University. Her research interests include cyber security of the smart

  12. DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

    E-Print Network [OSTI]

    California at Davis, University of

    DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks Lihua Yuan ECE, UC Davis lyuan cache poisoning, which causes the DNS to return false name-to-IP mappings and can be used as a foothold inaccurate DNS records caused by cache poisoning attacks. DoX also helps DNS servers to improve cache

  13. Adaptive Network Defense Management for Countering Smart Attack and Selective Capture

    E-Print Network [OSTI]

    Cao, Yong

    , humidity, tempera- ture, electrical characteristics, and radiation. · Smart City [46]: A query-based WSN1 Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless network defense management for countering smart attack and se- lective capture which aim to cripple

  14. Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao and Gregory G. Rose Abstract At IEEE GLOBECOM 2008, a lightweight cipher based on a Multiple Recursive Generator (MRG plaintext attack is proposed to construct the cipher's current state and generate subkeys used for all

  15. Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao and Gregory G. Rose Abstract At IEEE GLOBECOM 2008, a lightweight cipher based on a Multiple Recursive Generator (MRG attack is proposed to construct the cipher's current state and generate subkeys used for all subsequent

  16. Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices

    E-Print Network [OSTI]

    Kundur, Deepa

    vehicles, and energy storage devices, and providing advanced load management strategies. To meet attack may cause device restoration delays. Data integrity attacks were also performed on a load management system in [6], in which a graph based dynamic system model was used to analyze the impact

  17. A new key recovery attack on the ANSI retail MAC Chris J. Mitchell

    E-Print Network [OSTI]

    Mitchell, Chris

    A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

  18. Differential Fault Attack on the PRINCE Block Ling Song, Lei Hu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Differential Fault Attack on the PRINCE Block Cipher Ling Song, Lei Hu State Key Laboratory {lsong,hu}@is.ac.cn Abstract. PRINCE is a new lightweight block cipher proposed at the ASIACRYPT'2012. Key words: lightweight cipher, PRINCE block cipher, differential fault attack 1 Introduction The idea

  19. Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework Zheng@mail.tsinghua.edu.cn Abstract. A new distinguishing attack on HMAC and NMAC based on a dedicated compression function framework. In ChinaCrypt2008, a new dedicated compression function framework (i.e. hash function H) and two

  20. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  1. ETSU Appworx Job Request Form 1.2 May 14, 2008 Appworx Job Request Form

    E-Print Network [OSTI]

    Karsai, Istvan

    ETSU Appworx Job Request Form 1.2 May 14, 2008 Appworx Job Request Form Office of Information Technology 424 Roy S. Nicks Hall, Box 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu

  2. IIT CDR Disability Housing Accommodations Request Form Page 1 of 3 DISABILITY HOUSING ACCOMMODATIONS REQUEST FORM

    E-Print Network [OSTI]

    Heller, Barbara

    IIT CDR ­ Disability Housing Accommodations Request Form Page 1 of 3 DISABILITY HOUSING's housing resources. Please refer to the Disability Housing Accommodations Procedures & Guidelines for the complete process for requesting disability-related housing accommodations, including deadlines. Students

  3. University of Connecticut, Office of the Registrar, Transcript Request Form Transcript Request Form -University of Connecticut

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut, Office of the Registrar, Transcript Request Form Transcript Request Form - University of Connecticut Office of the Registrar, Unit 4077T, Storrs, CT 06269-4077T Forms of Connecticut under other names, please indicate them here

  4. VENDOR CONFERENCE ROOM REQUEST FORM Only One Event Per Form

    E-Print Network [OSTI]

    Brent, Roger

    VENDOR CONFERENCE ROOM REQUEST FORM Only One Event Per Form CONTACT INFORMATION Contact Name Signature ______________________________________________ (Required) REQUESTED CONFERENCE ROOM Date request for a conference room is not confirmed until you receive a confirmation from Meeting & Event

  5. Rate of H2S and CO2 attack on pozzolan-amended Class H well cement...

    Office of Scientific and Technical Information (OSTI)

    Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Citation Details In-Document Search Title: Rate of H2S and CO2 attack on...

  6. Property Rights, Taxpayer Rights, and the Multiscalar Attack on the State: Consequences for Regionalism in the United States

    E-Print Network [OSTI]

    Christopher Niedt; Margaret Weir

    2007-01-01

    G.M. (2005) The Rights of Taxpayers and the Rights of AllProperty Rights, Taxpayer Rights, and the Multiscalar AttackProperty rights, taxpayer rights, and the multiscalar attack

  7. The FY 2005 Budget Request

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report15 MeetingDevelopmentDepartment ofTestimony5 Budget Request

  8. The FY 2006 Budget Request

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report15 MeetingDevelopmentDepartment ofTestimony5 Budget Request6

  9. UNIVERSITY OF WASHINGTON DIPLOMA CERTIFICATION REQUEST FORM

    E-Print Network [OSTI]

    Eberhard, Marc O.

    UNIVERSITY OF WASHINGTON DIPLOMA CERTIFICATION REQUEST FORM GRADUATION AND ACADEMIC RECORDS OFFICE: _________________ Notes: Please return this form to: University of Washington, Graduation & Academic Records Box 355850

  10. High Impact Technology - Request for Information | Department...

    Broader source: Energy.gov (indexed) [DOE]

    View the Request for Information DE-FOA-0001226, "High Impact Commercial Building Technology." BTO has developed the High Impact Technology (HIT) Catalyst, a framework for...

  11. Zoe Industries: Data Request (2010-SW-1602)

    Broader source: Energy.gov [DOE]

    DOE requested test data from Zoe Industries, Inc., to permit the Department to evaluate whether a particular model of showerhead meets the applicable water conservation standard.

  12. Request for Investigation or Inspection of Safety or Classified...

    Energy Savers [EERE]

    Request for Investigation or Inspection of Safety or Classified Information Security Violations Request for Investigation or Inspection of Safety or Classified Information Security...

  13. SEP Request for Approval Form 7 - Other Situations for Consumption...

    Broader source: Energy.gov (indexed) [DOE]

    7Other-Situations-for-Consumption-Adjustment.docx More Documents & Publications SEP Request for Approval Form 6 - Non-Routine Adjustments SEP Request for Approval Form 5 - Model...

  14. Response to several FOIA requests - Renewable Energy. Demand...

    Energy Savers [EERE]

    Response to several FOIA requests - Renewable Energy. Demand for Fossil Fuels Response to several FOIA requests - Renewable Energy. Demand for Fossil Fuels Response to several FOIA...

  15. Fuel Cell Technologies Program FY 2013 Budget Request Rollout...

    Broader source: Energy.gov (indexed) [DOE]

    Satyapal at the FY 2013 Budget Request Rollout on February 14, 2012, in Washington, D.C. Fuel Cell Technologies Program FY 2013 Budget Request More Documents & Publications...

  16. Response to several FOIA requests - Renewable Energy | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    electricity assessment + NEP, nepdg95019750.pdf Response to several FOIA requests - Renewable Energy More Documents & Publications Response to several FOIA requests - Renewable...

  17. ID BUC$ EQUIPMENT REQUEST FORM CAMPUS EVENT PAYMENT OPTION

    E-Print Network [OSTI]

    Karsai, Istvan

    ID BUC$ EQUIPMENT REQUEST FORM CAMPUS EVENT PAYMENT OPTION FOR ETSU ORGANIZATIONS Name ID BUC$. ETSU account transfer or a check requested? o ETSU Account

  18. DOE Issues Request for Information on Fuel Cells for Continuous...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Request for Information on Fuel Cells for Continuous On-Board Recharging for Battery Electric Light-Duty Vehicles DOE Issues Request for Information on Fuel Cells for...

  19. Building America Technology-to-Market Roadmaps - Request for...

    Energy Savers [EERE]

    Building America Technology-to-Market Roadmaps - Request for Information Building America Technology-to-Market Roadmaps - Request for Information April 3, 2015 - 4:22pm Addthis...

  20. PIA - Savannah River Nuclear Solutions Badge Request and Site...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Badge Request and Site Personnel Roster Systems PIA - Savannah River Nuclear Solutions Badge Request and Site Personnel Roster Systems PIA - Savannah River Nuclear Solutions Badge...

  1. Request for Information: GSA Seeks Innovative Building Technologies...

    Energy Savers [EERE]

    September 26, 2014 - 10:50am Addthis This request for information is closed. GSA's Green Proving Ground has opened its 2015 Request for Information (RFI) seeking information...

  2. Request Access to the PARSIIe Project Management Lessons Learned...

    Energy Savers [EERE]

    Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository PURPOSE...

  3. DOE Releases Request for Information/Sources Sought for Savannah...

    Energy Savers [EERE]

    Request for InformationSources Sought for Savannah River Site Liquid Waste Services DOE Releases Request for InformationSources Sought for Savannah River Site Liquid Waste...

  4. Energy Department Issues Request For Proposal for Nuclear Regulatory...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Request For Proposal for Nuclear Regulatory Commission Licensed Facilities Procurement Energy Department Issues Request For Proposal for Nuclear Regulatory Commission Licensed...

  5. DOE's Idaho National Lab Issues Request for Proposals for Engineering...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE's Idaho National Lab Issues Request for Proposals for Engineering and Design on NGNP DOE's Idaho National Lab Issues Request for Proposals for Engineering and Design on NGNP...

  6. DOE Issues Final Request for Proposal for Portsmouth Gaseous...

    Energy Savers [EERE]

    DOE Issues Final Request for Proposal for Portsmouth Gaseous Diffusion Plant Support Services DOE Issues Final Request for Proposal for Portsmouth Gaseous Diffusion Plant Support...

  7. US Nuclear Regulatory Commission Input to DOE Request for Information...

    Office of Environmental Management (EM)

    US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input US Nuclear Regulatory Commission Input to DOE Request for Information Smart...

  8. Department of Energy Issues Requests for Applications for Nuclear...

    Office of Environmental Management (EM)

    Requests for Applications for Nuclear-Related Science and Engineering Scholarships and Fellowships Department of Energy Issues Requests for Applications for Nuclear-Related Science...

  9. Comments on Request For Information regarding Reducing Regulatory...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Request For Information regarding Reducing Regulatory Reform issued February 3, 2011 (Federal Register Vol. 76, No. 23 Thursday, February 3, 2011 Notices). Comments on Request...

  10. Request for Information Regarding the Testing of Marine and Hydrokinet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Request for Information Regarding the Testing of Marine and Hydrokinetic Systems Request for Information Regarding the Testing of Marine and Hydrokinetic Systems January 14, 2015 -...

  11. New Request for Information on Strategy to Advance the Marine...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    New Request for Information on Strategy to Advance the Marine and Hydrokinetic Energy Industry New Request for Information on Strategy to Advance the Marine and Hydrokinetic Energy...

  12. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  13. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  14. Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis

    E-Print Network [OSTI]

    Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

  15. Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

  16. Recommendations on frequently encountered relief requests

    SciTech Connect (OSTI)

    Hartley, R.S.; Ransom, C.B.

    1992-09-01

    This paper is based on the review of a large database of requests for relief from enservice testing (1ST) requirements for pumps and valves. From the review, the paper identifies areas where enhancements to either the relief request process or the applicable test codes can improve IST of pumps and valves. Certain types of requests occur frequently. The paper examines some frequent requests and considers possible changes to the requirements to determine if the frequent requests can be eliminated. Recommended changes and their bases will be discussed. IST of safety-related pumps and valves at commercial nuclear power plants is done according to the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code (the Code), Section XI. Because of the design and function of some safety systems in nuclear plants, performing Code testing of certain pumps and valves is impractical or a hardship without a compensating increase in the level of safety. Deviations from the Code are allowed by law, as reviewed and approved by the United States Nuclear Regulatory Commission (NRC), through the relief request process. Because of similarities in plant design and system function, many problems encountered in testing components are similar from plant to plant. Likewise, there are often common problems associated with test methods or equipment. Therefore, many relief requests received by the NRC from various plants are similar. Identifying and addressing the root causes for these common requests will greatly improve IST.

  17. Recommendations on frequently encountered relief requests

    SciTech Connect (OSTI)

    Hartley, R.S.; Ransom, C.B.

    1992-01-01

    This paper is based on the review of a large database of requests for relief from enservice testing (1ST) requirements for pumps and valves. From the review, the paper identifies areas where enhancements to either the relief request process or the applicable test codes can improve IST of pumps and valves. Certain types of requests occur frequently. The paper examines some frequent requests and considers possible changes to the requirements to determine if the frequent requests can be eliminated. Recommended changes and their bases will be discussed. IST of safety-related pumps and valves at commercial nuclear power plants is done according to the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code (the Code), Section XI. Because of the design and function of some safety systems in nuclear plants, performing Code testing of certain pumps and valves is impractical or a hardship without a compensating increase in the level of safety. Deviations from the Code are allowed by law, as reviewed and approved by the United States Nuclear Regulatory Commission (NRC), through the relief request process. Because of similarities in plant design and system function, many problems encountered in testing components are similar from plant to plant. Likewise, there are often common problems associated with test methods or equipment. Therefore, many relief requests received by the NRC from various plants are similar. Identifying and addressing the root causes for these common requests will greatly improve IST.

  18. Information Governance Freedom of Information Request Form

    E-Print Network [OSTI]

    Romano, Daniela

    Information Governance Freedom of Information Request Form foi@salford.ac.uk http://www.infogov.salford.ac.uk Details of the applicant Name: Address: Post code: Tel. No.: Email: Description of information requested Please provide a description of the information you would like to receive, please be as specific

  19. Request for EXEMPTION from College Housing Policy

    E-Print Network [OSTI]

    Wenderholm, Elaine

    5/05 ams Request for EXEMPTION from College Housing Policy BACKGROUND AND INSTRUCTIONS Students who would like to request exemption from the housing policy may do so by following the procedures outlined cases. Housing Policy The College believes that immersion in the educational environment

  20. Give form to the requester. Do not

    E-Print Network [OSTI]

    Thomas, David D.

    Give form to the requester. Do not send to the IRS. Form W-9 Request for Taxpayer Identification. or suite no.) City, state, and ZIP code Printortype SeeSpecificInstructionsonpage2. Taxpayer Identification on whose number to enter. Certification 1. The number shown on this form is my correct taxpayer

  1. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  2. New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram DA-IICT Near Indroda Circle Gandhinagar-382007 INDIA anish mathuria@daiict.ac.in, g.sriram.248@gmail.com July 29, 2008

  3. Networked Control Systems under Cyber Attacks with Applications to Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    acquisition (SCADA) systems. Several cyber attacks on SCADA systems operating power networks have been reported [3], and major blackouts are due to the misuse of the SCADA systems [4]. Power networks, being

  4. Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks the Wheatstone bridge measurement setup. Here we propose to in- dividualize the electrical circuit of devices with individualized electrical circuit are individualized while providing the same functionality

  5. On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks

    E-Print Network [OSTI]

    Medard, Muriel

    Random linear network coding can be used in peer-to- peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We ...

  6. The Recent Attack of Nie et al On TTM is Faulty Nov 19.2006

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Recent Attack of Nie et al On TTM is Faulty T. Moh #3; Nov 19.2006 Abstract Recently there is a paper entitled "Breaking a New Instance of TTM Cryptosystem" by Xuyun Nie, Lei Hu, Jianyu Li, Crystal

  7. IEEE TRANSACTIONS ON SIGNAL PROCESSING: SPECIAL ISSUE ON DATA HIDING 1 Blind Pattern Matching Attack on

    E-Print Network [OSTI]

    Petitcolas, Fabien A.P.

    detector is facing a task of exponential complexity to reverse the permutations as a pre-processing step for watermark detection. In this paper, we describe the logistics of the attack and an implementation against

  8. gore: Routing-Assisted Defense Against DDoS Attacks Stephen T. Chou1

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    attackers identify "pinch points" in the communications infrastructure and render them inoperable of effective anti-DDoS technology by Internet Service Providers. An important one is the lack of financial

  9. An Experimentally Veried Attack on Full Grain-128 Using Dedicated Recongurable

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Experimentally Veried Attack on Full Grain-128 Using Dedicated Recongurable Hardware Itai Dinur-purpose hardware, i. e., computing machines dedicated to cryptana- lytical problems, have a long tradition in code

  10. Modeling experiments that simulate fragment attacks on cased munitions

    SciTech Connect (OSTI)

    Kerrisk, J.F.

    1996-01-01

    Roberts and Field (1993) have conducted experiments to observe the behavior of a cased high explosive (HE) charge subject to fragment attack at impact velocities below those needed for shock initiation. Two and three-dimensional hydrodynamic calculations have been done to model these experiments. Questions about the degree of confinement of the HE and about the condition of the HE during the impact were addressed. The calculations indicate that the HE was not strongly confined in this experiment, primarily due to the lateral expansion of polycarbonate blocks on the sides of the target during the impact. HE was not ejected from the hole in the casing made by the projectile up to 30 {micro}s after the impact. There are hints from these calculations of how initiation of a homogeneous sample of HE might occur in the experiment. The first involves the reshock of a small amount of HE at {approximately} 20 {micro}s as a result of the impact of the sabot on the target. The second involves the heating of the HE from plastic work during the impact. The maximum temperature rise of the HE (exclusive of the small region that was reshocked) was {approximately} 80 k. However, this is the average temperature of a region the size of a computational cell, and phenomena such as shear bands or cracks could result in higher temperatures on a smaller scale than the cell size. The third involves heating of the HE from contact with the casing material. The maximum temperature rise of the casing material from plastic work is {approximately} 870 k. This temperature occurs at the edge of a plug of casing material sheared off by the projectile. Other parts of the casing are shock heated to higher energies but may not contact the HE.

  11. THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER Mohammad Sadegh Nemati Nia1 University of Technology, Tehran, Iran (m_s_nemati; payandeh)@mut.ac.ir ABSTRACT SNOW 2.0 is a word oriented. The results of HGD attack on TIPSY, SNOW 1.0 and SNOW 2.0 stream ciphers led to less complexity rather than

  12. NISE Requests Due Feb. 24

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on771/6/14 Contact: Janet Lambert4NIEHS REPORTNISACNISACNISE Requests

  13. Beam Request - 88-Inch Cyclotron

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecovery ActTools toBadging, Badge OfficeBeam Request To begin:

  14. Requesting an Increase in Allocation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAboutNuclear NonproliferationRequestFormTO8

  15. Sandia Energy - Request for Testing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy Integration Home StationaryRequest for

  16. RPR 1B. REQUEST FOR RADIATION EXPOSURE HISTORY

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    RPR 1B. REQUEST FOR RADIATION EXPOSURE HISTORY (Please type or print legibly) Organization: Address:...

  17. LHCb Computing Resources: 2016 request and 2017 outlook

    E-Print Network [OSTI]

    Bozzi, Concezio

    2015-01-01

    Computing resources requested for LHCb in 2016, and an outlook for the following year, are presented.

  18. Motor Fleet Request/Authorization Page 1 UNCW Travel System

    E-Print Network [OSTI]

    Olszewski Jr., Edward A.

    Motor Fleet Request/Authorization Page 1 UNCW Travel System Motor Fleet Request/Travel Authorization ENTER THE MOTOR FLEET REQUEST IN THE TRANSPORTATION SECTION OF THE TRAVEL AUTHORIZATION. PRESS CLICK TO ADD AND SELECT MOTOR FLEET FROM THE DROP-DOWN BOX. #12;Motor Fleet Request/Authorization Page 2

  19. Material Stock Requests -SH Version Date: June 2013

    E-Print Network [OSTI]

    Material Stock Requests - SH Version Date: June 2013 #12;Training Guide Material Stock Requests injury. If you use this software in dangerous applications, then you shall be responsible to take all Stock Requests - SH Page iii Table of Contents Material Stock Requests - SH

  20. Department of Energy FY 2014 Congressional Budget Request (Wind Program)

    SciTech Connect (OSTI)

    2013-04-01

    This document is the official Congressional Budget Request for fiscal year 2014 for the Wind Program.

  1. Geothermal Technologies Program Fiscal Year 2013 Budget Request Presentation

    SciTech Connect (OSTI)

    DOE

    2012-03-13

    Geothermal Technologies Program fiscal year 2103 budget request presentation by Doug Hollett, Program Manager.

  2. Geothermal Technologies Program FY 2012 Budget Request Briefing

    SciTech Connect (OSTI)

    JoAnn Milliken, GTP

    2011-03-08

    Geothermal Technologies Program fiscal year 2012 budget request PowerPoint presentation, March 8, 2011.

  3. Request for Information: Federal Government Power Purchase Agreements (PPA) Issues

    Broader source: Energy.gov [DOE]

    Document describes the request for information for federal government power purchase agreement (PPA) issues.

  4. Secure estimation and control for cyber-physical systems under adversarial attacks

    E-Print Network [OSTI]

    Fawzi, Hamza; Diggavi, Suhas

    2012-01-01

    The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with the estimation and control of linear systems when some of the sensors or actuators are corrupted by an attacker. In the first part we look at the estimation problem where we characterize the resilience of a system to attacks and study the possibility of increasing its resilience by a change of parameters. We then propose an efficient algorithm to estimate the state despite the attacks and we characterize its performance. Our approach is inspired from the areas of error-correction over the reals and compressed sensing. In the second part we consider the problem of designing output-feedback controllers that stabilize the system despite attacks. We show that a principle of separation betwee...

  5. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  6. Data Request Questionnaire: Name of Requestor: _________________________________

    E-Print Network [OSTI]

    Miami, University of

    Data Request Questionnaire: Name of Requestor: _________________________________ Circle One:_________________________ Telephone: __________________________ Email: _____________________________ What data variables and level?___________________________________________________________________ Describe how will you use the data? By signing this document, you agree to follow the Data Policy outlined

  7. SLAC Dosimeter / ID Request Form A

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Feb 2009 (updated 13 May 2010) SLAC-I-760-0A07J-006-R010 1 of 2 SLAC Dosimeter ID Request Form A (For applicants who have completed SLAC Environment, Safety, and Health Training)...

  8. CHEMISTRY DEPARTMENT REQUEST FOR CAPSTONE RESEARCH ADVISOR

    E-Print Network [OSTI]

    Sanyal, Suman

    CHEMISTRY DEPARTMENT REQUEST FOR CAPSTONE RESEARCH ADVISOR The capstone project should reflect student's ability to integrate chemistry knowledge gained through the coursework, to learn outside the classroom, and to demonstrate independence. An intellectual contribution within the field of chemistry

  9. Leader Electronics: Data Request (2010-SE-2301)

    Broader source: Energy.gov [DOE]

    DOE requested test data from Leader Electronics Inc. for various models of external power supplies after Leader Electronics certified energy values that did not meet federal energy conservation standards.

  10. OFFICIAL TRANSCRIPT REQUEST FORM Biomedical Sciences

    E-Print Network [OSTI]

    Cook, Greg

    OFFICIAL TRANSCRIPT REQUEST FORM Biomedical Sciences Bowman Gray Campus This form, Biomedical Sciences. There is no charge for transcripts; however, the requestor must pay any special fees Graduate School of Arts and Sciences Biomedical Sciences, Bowman Gray Campus Medical Center

  11. The So-Called “Velasco Map”: A Case of Forgery

    E-Print Network [OSTI]

    Allen, David Y.

    2006-02-14

    This article examines a well-known map of the northeastern United States and southeastern Canada allegedly made in or around 1610. The map was uncovered in the Spanish Archives at Simancas in 1887. Supposedly, it is a copy ...

  12. Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    E-Print Network [OSTI]

    Gupta, B B; Misra, Manoj

    2012-01-01

    Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. This paper reports the design principles and evaluation results of our proposed framework that autonomously detects and accurately characterizes a wide range of flooding DDoS attacks in ISP network. Attacks are detected by the constant monitoring of propagation of abrupt traffic changes inside ISP network. For this, a newly designed flow-volume based approach (FVBA) is used to construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic goes out of profile. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and a...

  13. Practical Attacks on Decoy State Quantum Key Distribution Systems with Detector Efficiency Mismatch

    E-Print Network [OSTI]

    Fei Yangyang; Gao Ming; Wang Weilong; Li Chaobo; Ma Zhi

    2015-07-23

    To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy state quantum key distribution systems. The eavesdropper may get some information ab out the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum key distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy state quantum key distribution systems.

  14. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  15. Requesting A Token | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report AppendicesA Token Requesting A Token Requesting A Token Step

  16. Requesting a Digital ID | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report AppendicesA Token Requesting A Token Requesting A Token Stepa

  17. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  18. Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack

    E-Print Network [OSTI]

    Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2013-07-24

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

  19. Attack of fragmented-core debris on concrete in the presence of water. [PWR; BWR

    SciTech Connect (OSTI)

    Tarbell, W.W.; Bradley, D.R.

    1982-01-01

    In the unlikely event that core debris escapes the reactor pressure vessel, the interactions of the debris with concrete, structural materials, and coolant become the driving force for severe accident phenomena. The Ex-Vessel Core Debris Interactions Program at Sandia National Laboratories is an experimental research effort to characterize these interactions and the magnitude of safety-related phenomena such as flammable gas generation, aerosol production, fission product release, and concrete attack. Major areas of study within the program include molten core simultants in contact with concrete, high pressure melt streaming into scaled reactor cavities, the addition of coolant to high-temperature melt/concrete interactions, and the attack of hot, solid core debris on concrete. This paper describes results from the last of these efforts, i.e., hot, but not molten debris attacking concrete.

  20. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  1. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  2. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    E-Print Network [OSTI]

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  3. REQUEST FOR REVIEW OF DECISION / REQUEST FOR READMISSION TERMINATION FROM COURSE NOT ACHIEVING SATISFACTORY COURSE PROGRESS

    E-Print Network [OSTI]

    Mucina, Ladislav

    REQUEST FOR REVIEW OF DECISION / REQUEST FOR READMISSION TERMINATION FROM COURSE NOT ACHIEVING is obliged to report student visa holders who have been Terminated for not achieving satisfactory course of the appeals process. COURSE DETAILS COURSE FROM WHICH I HAVE BEEN TERMINATED Course code Course name STUDY

  4. Ravaging the wine dark sea: attacks on Crete by sea raiders during the Bronze Age 

    E-Print Network [OSTI]

    Stewart, David James

    1997-01-01

    RAVAGING THK WINK DARK SEA: ATTACKS ON CRETE BY SEA RAIDERS DIJRING THE BRONZE AGE A Thesis by DAVID JAMES STEWART Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF ARTS May 1997 Major Subject: Anthropology RAVAGING THE WINE DARK SEA: ATTACKS ON CRETE BY SEA RAIDERS DURING THE BRONZE AGE A Thesis by DAVID JAMES STEWART Submitted to Texas A&M University in partial fulfillment of the requirements...

  5. Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    E-Print Network [OSTI]

    Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

    2011-04-01

    Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

  6. Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG

    E-Print Network [OSTI]

    Altug, Yucel

    2008-01-01

    A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized. Consequently, under some mild assumptions, which are common in cryptanalysis, the tight lower bounds on the algorithmic complexity of successful Query-Based Key-Recovery attacks are derived for two different setups of practical interest. The proofs rely on the concept of ``typicality'' of information theory.

  7. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank's server farms cannot safely omit a subset of the traffic from analysis. In this environment, Shunting cannot realize its main performance benefits, and the monitoring task likely calls for using custom hardware instead. However, in many other environments we find Shunting holds promise for delivering major performance gains. This arises due to the the widely documented 'heavy tail' nature of most forms of network traffic, which we might express as 'a few of the connections carry just about all the bytes.' The key additional insight is '... and very often for these few large connections, the very beginning of the connection contains nearly all the information of interest from a security analysis perspective.' We argue that this second claim holds because it is at the beginning of connections that authentication exchanges occur, data or file names and types are specified, request and reply status codes conveyed, and encryption is negotiated. Once these occur, we have seen most of the interesting facets of the dialog. Certainly the remainder of the connection might also yield some grist for analysis, but this is generally less likely, and thus if we want to lower analysis load at as small a loss as possible of information relevant to security analysis, we might best do so by skipping the bulk of large connections. In a different context, the 'Time Machine' work by Kornexl and colleagues likewise shows that in some environments we can realize major reductions in the volume of network traffic processed, by limiting the processing to the first 10-20 KB of each connection. As a concrete example, consider an IPS that monitors SSH traffic. When a new SSH connection arrives and the Shunt fails to find an entry for it in any of its tables (per-address, per-port, per-connection), it executes the default action of diverting the connection through the IPS. The IPS analyzes the beginning of the connection in this fashion. As long as it is satisified with the dialog, it reinjects the packets forwarded to it so that the connection can continue. If the connection successfully

  8. New Eligibility Guidelines Lead to Increase in LM's EEOICPA Requests...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    New Eligibility Guidelines Lead to Increase in LM's EEOICPA Requests for FY 2014 New Eligibility Guidelines Lead to Increase in LM's EEOICPA Requests for FY 2014 January 14, 2015 -...

  9. Freedom of Information Act (FOIA) and Privacy Act Requests |...

    Broader source: Energy.gov (indexed) [DOE]

    ID. You must either have your request notarized or 1) acknowledge that you understand the criminal penalty in the Privacy Act for requesting or obtaining access to records under...

  10. DOE Issues Request for Proposals for Services at Carlsbad New...

    Energy Savers [EERE]

    DOE Issues Request for Proposals for Services at Carlsbad New Mexico DOE Issues Request for Proposals for Services at Carlsbad New Mexico April 1, 2015 - 3:00pm Addthis Media...

  11. Notice and Request for OMB Review and Comment: Federal Register...

    Office of Environmental Management (EM)

    request to the OMB for extension under the provisions of the Paperwork Reduction Act of 1995. The information collection requests a three-year extension of its Department of Energy...

  12. Information Request, "THE REPORT TO THE PRESIDENT AND THE CONGRESS...

    Energy Savers [EERE]

    Information Request, "THE REPORT TO THE PRESIDENT AND THE CONGRESS BY THE SECRETARY OF ENERGY ON THE NEED FOR A SECOND REPOSITORY" Information Request, "THE REPORT TO THE PRESIDENT...

  13. Alaska Request for SHPO Section 106 Review | Open Energy Information

    Open Energy Info (EERE)

    Alaska Request for SHPO Section 106 Review Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Alaska Request for SHPO Section 106 Review Form Type...

  14. The FY 2008 Budget Request - Twenty in Ten: Strengthening America...

    Broader source: Energy.gov (indexed) [DOE]

    Year 2008 budget presentation. FY08budgetrequest.pdf More Documents & Publications FY 2011 Budget Roll-Out Presentation The FY 2006 Budget Request The FY 2005 Budget Request...

  15. The FY 2008 Budget Request - Twenty in Ten: Strengthening America...

    Energy Savers [EERE]

    Year 2008 budget presentation. FY08budgetrequest.pdf More Documents & Publications FY 2011 Budget Roll-Out Presentation The FY 2005 Budget Request The FY 2006 Budget Request...

  16. SEP Request for Approval Form 2 - Other Derived Energy Sources...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2 - Other Derived Energy Sources SEP Request for Approval Form 2 - Other Derived Energy Sources SEP-Request-for-Approval-Form-2Other-Derived-Energy-Sources.docx More Documents &...

  17. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications

    E-Print Network [OSTI]

    Yin, Heng

    Hijacking Attacks in Android Applications Mu Zhang Department of EECS Syracuse University muzhang of vulnerabilities commonly appearing in Android applications. When these vul- nerabilities are triggered on Android devices, on behalf of the attackers. It is often unrealis- tic to purely rely on developers to fix

  18. Extending the GHS Weil Descent Attack S.D. Galbraith, F. Hess and N.P. Smart

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Extending the GHS Weil Descent Attack S.D. Galbraith, F. Hess and N.P. Smart Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB, United due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack

  19. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 2, MARCH 2003 431 Some Attacks Against Vehicles' Passive Entry

    E-Print Network [OSTI]

    Mahmud, Syed Masud

    Terms--Passive entry systems, playback attack, remote keyless entry, two-thief attack, vehicle security of an automobile. The user was required to enter a unique digital code through the keypad to unlock or lock- hances user convenience, it still does not provide the full com- fort level. The user still has to search

  20. HEALTH PROFESSIONS LETTER OF EVALUATION REQUEST TRUMAN STATE UNIVERSITY

    E-Print Network [OSTI]

    Gering, Jon C.

    HEALTH PROFESSIONS LETTER OF EVALUATION REQUEST TRUMAN STATE UNIVERSITY: Date: I hereby give permission for the Truman Health Professions

  1. DOE Publishes Request for Information for Ceiling Fans

    Broader source: Energy.gov [DOE]

    The Department of Energy has published a request for information regarding energy conservation standards for ceiling fans.

  2. BIA Request for Proposals for Climate Adaptation Grants for Tribes

    Broader source: Energy.gov [DOE]

    Download the Bureau of Indian Affairs Request for Proposals for Climate Adaptation Grants for Tribes, due November 29.

  3. FY 2013 DOE Budget Request to Congress (Wind Program)

    SciTech Connect (OSTI)

    2012-02-01

    This document reflects the Department of Energy's Wind Program Budget Request to Congress for fiscal year 2013.

  4. Islamists claim deadly attack on UN building in Nigeria 26 August 2011

    E-Print Network [OSTI]

    Islamists claim deadly attack on UN building in Nigeria 26 August 2011 Boko Haram says/AFP/Getty Images A car loaded with explosives crashed into the main United Nations' building in Nigeria's capital for the bombing, a major escalation of its sectarian fight against Nigeria's weak central government. The brazen

  5. Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins y Adrian Perrig Ion Stoica

    E-Print Network [OSTI]

    Perrig, Adrian

    Taming IP Packet Flooding Attacks #3; Karthik Lakshminarayanan Daniel Adkins y Adrian Perrig Ion hosts is denial­ of­service (DoS) caused by IP packet floods. Hosts in the Internet are unable to stop -- not the net­ work -- should be given control to respond to packet floods and overload. Ideally, hosts should

  6. Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash Adi by John Nash in the early 1950's but whose design was declassified by the NSA only in 2012. The main, John Nash. 1 Introduction John Nash is known today mostly for his seminal contributions to the field

  7. Touchjacking Attacks on Web in Android, iOS, and Windows Phone

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Touchjacking Attacks on Web in Android, iOS, and Windows Phone Tongbo Luo, Xing Jin, Ajai to interact with the Web, most mobile platforms, including Android, iOS, and Windows Phone, provide is called WebView in Android (it is called different names in other platforms). WebView im- plements

  8. A Data-Centric Approach to Insider Attack Detection in Database Systems

    E-Print Network [OSTI]

    Petropoulos, Michalis

    A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis the query expressions in prior approaches. Our data-centric approach is based on the key observation.): RAID 2010, LNCS 6307, pp. 382­401, 2010. c Springer-Verlag Berlin Heidelberg 2010 #12;A Data-Centric

  9. Evaluating Risk of Terrorist Attack on a Cable Stayed Bridge: A Probabilistic Structural

    E-Print Network [OSTI]

    Bhattacharya, Baidurya

    Evaluating Risk of Terrorist Attack on a Cable Stayed Bridge: A Probabilistic Structural Analysis and administrators are able to evaluate risks to infrastructure in their jurisdiction in a rational manner. This will enable them to take optimal actions to manage these risks given budgetary constraints. This paper

  10. Adaptive Flow Aggregation -A New Solution for Robust Flow Monitoring under Security Attacks

    E-Print Network [OSTI]

    Lui, John C.S.

    Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu.S. Lui Dept. of CSE Chinese University of Hong Kong Email: cslui@cse.cuhk.edu.hk Abstract-- Flow the resources (memory, export bandwidth or CPU) of the flow monitor. A standard solution is to do sampling (look

  11. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of Technology and Economics (BME) Abstract. Smart grids consist of suppliers, consumers, and other parts effort to protect these devices. This behavior was motivated by the special requirements in control

  12. Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang

    E-Print Network [OSTI]

    Wang, Haining

    Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang Department of Computer of servers being deployed in data centers, the data center power distribution systems have already approached peak capacities. Since the upgrades of the power systems are extremely expensive, power

  13. Robust Detection in the Presence of Integrity Attacks Yilin Mo, Jo~ao Hespanha, Bruno Sinopoli

    E-Print Network [OSTI]

    Hespanha, Joăo Pedro

    Acquisition (SCADA) sys- tems, for example, implement the distributed control systems that run a wide range, facility control and power grids. A successful attack to SCADA systems may significantly hamper the economy, the environment, and may even lead to the loss of human life. The first-ever SCADA system malware (called Stuxnet

  14. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  15. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Young, R. Michael

    @cs.unc.edu Abstract--A power grid is a complex system connecting electric power generators to consumers through power estimate the power grid state through analysis of meter measure- ments and power system models. Various malicious attacks. I. INTRODUCTION A power grid is a complex system connecting a variety of electric power

  16. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-Print Network [OSTI]

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  17. TorScan: Tracing Long-lived Connections and Differential Scanning Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    successor of the original Onion Routing Project. The Tor network is a low-latency anonymity network whichTorScan: Tracing Long-lived Connections and Differential Scanning Attacks Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann University of Luxembourg Abstract. Tor is a widely used anonymity network

  18. Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier Gemplus Card in a state that leaks secret information. Nicely enough, evaluating the entropy loss due to the chemical spectroscopic analysis can reveal with accuracy the mixture of chemical compounds generated by the user, we show

  19. Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel-correlation distinguishers as well as between zero-correlation and integral distinguishers, we analyze in this paper some of the round function, we show that we can not only find impossible, integral and multidimensional zero

  20. A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia

    E-Print Network [OSTI]

    Bullo, Francesco

    and biomedicine, telecommu- nications, and energy management. Due to their importance, cyber-physical systems, and monitoring systems. For instance, in [1, 5, 6, 7, 8] it is shown how attackers with access to sufficiently limited resources and full knowledge of the system dynamics and state. Conversely, if the monitoring re

  1. Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid Deepa Kundur analysis of a smart grid. We focus on the model synthesis stage in which both cyber and physical grid-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems. I

  2. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  3. Sensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks

    E-Print Network [OSTI]

    Levi, Albert

    network are discussed in [7]. Security, network bandwidth and power consumption in sensor networksSensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks Serdar Sancak@sabanciuniv.edu Abstract--Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets

  4. Passive faraday mirror attack in practical two-way quantum key distribution system

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2012-03-04

    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

  5. Securing Cloud Data in the New Attacker Model Ghassan O. Karame1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Securing Cloud Data in the New Attacker Model Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof to the ciphertext. This may be achieved, for example, using multi-cloud storage systems. These systems spread data tolerance. If the adversary can only compromise a subset of these domains, multi-cloud storage systems may

  6. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  7. Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective

    E-Print Network [OSTI]

    Politčcnica de Catalunya, Universitat

    with great opportunities for raising the target facility energy consumption and consequently its green house green, energy- sustainable computing paradigms has gained a lot of attention in both the researchEvaluating Network-Based DoS Attacks Under the Energy Consumption Perspective New security issues

  8. Cyber Attack Detection in PMU Measurements via the Expectation-Maximization Algorithm

    E-Print Network [OSTI]

    Kundur, Deepa

    Cyber Attack Detection in PMU Measurements via the Expectation-Maximization Algorithm Dongchan Lee in phasor measurement unit (PMU) data using the expectation-maximization algorithm. Power systems today, such as solving the optimal power flow and system estimation problem. The availability of PMU data real-time has

  9. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    False Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu, Peng Ning@cs.unc.edu Abstract--A power grid is a complex system connecting electric power generators to consumers through power to ensure the reliable operation of power grids, and state estimation is used in system monitoring to best

  10. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  11. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  12. Towards Synthesis of Platform-aware Attack-Resilient Control Systems

    E-Print Network [OSTI]

    Pappas, George J.

    Towards Synthesis of Platform-aware Attack-Resilient Control Systems Extended Abstract Miroslav Over the past decade, the design process in the automotive indus- try has gone through a period, there is a current shift in vehicle architectures, from isolated control systems to more open automotive

  13. Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design

    E-Print Network [OSTI]

    Bhunia, Swarup

    Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design Xinmu Wang1 , Wen Yueh on the operating frequency due to RLC structure of a power grid. In this paper, we analyze the ef- fect of power grid on SCA and provide quantitative results to demonstrate the frequency-dependent SCA resistance due

  14. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in the confidentiality and integrity algorithms of the 3GPP (3rd Generation Partnership Project) mobile communications and integrity algo- rithms of the 3GPP (3rd Generation Partnership Project) [20] mobile communi- cations practical, and the authors could simulate the efficiency of their attack using a personal computer. Both

  15. Revisiting the BGE Attack on a White-Box AES Implementation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . White-box cryptography aims to protect the secret key of a cipher in an environment in which-box implementation of AES [5]. White-box cryptography aims to protect the confidentiality of the secret key device, or a set-top box. #12;In 2004, Billet et al. [3] presented an attack on the white-box AES

  16. Reaction Attacks on Public Key Cryptosystems Based on the Word Problem

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Mar#19;#16;a Isabel Gonz#19 for public key cryptosystems based on the hardness of the word problem for #12;nitely presented groups. In particular, the evidenced hardness of the classical problems for #12;nitely presented groups (the word

  17. A known plaintext attack on the ISAAC keystream generator Marina Pudovkina

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 A known plaintext attack on the ISAAC keystream generator Marina Pudovkina maripa are a requirement. The ISAAC keystream generator is a fast software-oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known

  18. A known plaintext attack on the ISAAC keystream generator Marina Pudovkina

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 A known plaintext attack on the ISAAC keystream generator Marina Pudovkina maripa are a requirement. The ISAAC keystream generator is a fast software­oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known

  19. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA

  20. TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

  1. "How many zombies do you know?" Using indirect survey methods to measure alien attacks and outbreaks

    E-Print Network [OSTI]

    Gelman, Andrew

    "How many zombies do you know?" Using indirect survey methods to measure alien attacks applicable to zombies or, for that matter, ghosts, aliens, angels, and other hard-to-reach entities; for example, what if your wife2 is actually a zombie or an alien and you are not aware of the fact. This 2

  2. Security Games with Surveillance Cost and Optimal Timing of Attack Execution

    E-Print Network [OSTI]

    Vorobeychik, Eugene

    of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Appears inSecurity Games with Surveillance Cost and Optimal Timing of Attack Execution Bo An1 , Matthew Brown Terms Algorithm, Security Keywords Game Theory, Security, Optimization, Stackelberg Games 1

  3. Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki1,2 1 Institute of Computer Science Abstract. The PRINCE cipher is the result of a cooperation between the Technical University of Denmark (DTU-latency encryption and instant response time. PRINCE has already gained a lot of attention from the academic

  4. Combating False Data Injection Attacks in Smart Grid Using Kalman Filter

    E-Print Network [OSTI]

    Cao, Xiaojun (Matt)

    Combating False Data Injection Attacks in Smart Grid Using Kalman Filter Kebina Manandhar Dept of South Florida Email: yliu@cse.usf.edu Abstract--The security of Smart Grid, being one of the very important aspects of the Smart Grid system, is studied in this paper. We first discuss different pitfalls

  5. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

    E-Print Network [OSTI]

    Shihan Sajeed; Igor Radchenko; Sarah Kaiser; Jean-Philippe Bourgoin; Anna Pappa; Laurent Monat; Matthieu Legre; Vadim Makarov

    2015-03-30

    The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD, we model both a strong attack using technology possible in principle, and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems, and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.

  6. On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in which the round keys are introduced by addition, to thwart single-bit or multi-bit DPA attacks- tion about twice slower). We prove lower bounds on the transparency order of highly nonlinear S

  7. ITDS tech contacts ip-requests@sfu.ca

    E-Print Network [OSTI]

    Kavanagh, Karen L.

    Desktop printer? ITDS tech contacts ip-requests@sfu.ca for static IP address from NS ITDS tech functionality Y N HCS Printer? N MFD?Y Obtain second static IP from ip-requests@sfu.ca for scanning Y ITDS tech questions such as the following of their clients when they request to purchase a new printer: · Why do you

  8. MODEL REQUEST FOR PROPOSALS TO PROVIDE ENERGY AND OTHER

    E-Print Network [OSTI]

    Firestone, Jeremy

    MODEL REQUEST FOR PROPOSALS TO PROVIDE ENERGY AND OTHER ATTRIBUTES FROM AN OFFSHORE WIND POWER Gallagher for their comments and suggestions. #12;2 Model Request for Proposals to Provide Energy and other..............................................................................................................14 #12;3 Model Request for Proposals to Provide Energy and other Attributes from an Offshore Wind

  9. California State University, Long Beach PURCHASE/CHANGE REQUEST

    E-Print Network [OSTI]

    Sorin, Eric J.

    : LBCMP LBFDN LB49R Request Type: New Request Change Request Change Req/P.O. # Date: Requestor Email: CHARTFIELD & LINE INFORMATION (Split distribution requires online requisition entry) Account* Fund ID Dept ID description page included in total cost Quantity UOM Unit Price Tax (Y/N) Line Total *Optional Fields

  10. Request for Information on Photovoltaic Module Recycling

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy SunShot Initiative requests feedback from industry, academia, research laboratories, government agencies, and other stakeholders on issues related to photovoltaic (PV) module recycling technology. SunShot intends to understand the current state of recycling technology and the areas of research that could lead to impactful recycling technologies to support the developing PV industry. The intent of this request for information is to generate discussion related to planning for the end of life of photovoltaic modules and to create a list of high impact research topics in photovoltaics recycling.

  11. Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee

    E-Print Network [OSTI]

    Snoeren, Alex

    Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan against three popular Web services, we high- light a new class of vulnerability that allows an attacker a pollution attack, that allows third parties to alter the customized content the services return to users who

  12. EXTENDED PARKING REQUEST COLORADO SCHOOL OF MINES

    E-Print Network [OSTI]

    to Parking Services and vehicle must be parked in Lot A. T This option is not available for visitorsEXTENDED PARKING REQUEST COLORADO SCHOOL OF MINES FACILITIES MANAGEMENT DEPT PARKING SERVICES to Parking Services allows a CSM student or employee to leave his/her vehicle within the campus boundaries

  13. UNIVERSITY OF NEW HAMPSHIRE TRANSCRIPT REQUEST

    E-Print Network [OSTI]

    UNIVERSITY OF NEW HAMPSHIRE TRANSCRIPT REQUEST NOTE: A transcript is a complete history of all your being mailed to the wrong address(es). Rev. 11/2013 STUDENT ID# (or last 4 of SSN) University of New Hampshire Office of Registrar Stoke Hall 11 Garrison Avenue Durham, NH 03824-3511 603-862-1587 phone 603

  14. UNCW Police Department Public Record Request

    E-Print Network [OSTI]

    Olszewski Jr., Edward A.

    , the term Police Record is defined as Criminal Investigations; intelligence information records as defined of Police Records, criminal history information and education records, several types of inquiriesUNCW Police Department Public Record Request Copies of Public Records will be released

  15. Request for Curriculum Action Curriculum Deadlines

    E-Print Network [OSTI]

    Barrash, Warren

    Request for Curriculum Action Curriculum Deadlines: November 1 Deadline for submitting changes ONLY) Undergraduate Curriculum Graduate Curriculum Department or Program Chair or Program Coordinator Signature Date Curriculum Change(s) Create new* major/program/minor/emphasis/option/certificate Create new

  16. FERMI NATIONAL ACCELERATOR LABORATORY TUITION ASSISTANCE REQUEST

    E-Print Network [OSTI]

    Quigg, Chris

    FERMI NATIONAL ACCELERATOR LABORATORY TUITION ASSISTANCE REQUEST SECTION 1: EMPLOYEE Employee's Name (as it appears in the Fermilab online directory) ID# Job Title Division/Section/Group Mail Station. __________________________________________________________ ____________________________ Employee's Signature Date SECTION 2: GROUP LEADER AUTHORIZATION Check one: This coursework maintains

  17. APPLY YOURSELF WEBCENTER ACCOUNT REQUEST FORM

    E-Print Network [OSTI]

    :____________________________________________________ Employee ID: ___________________________________________________ Requested AY Security Role (Select One: see Privacy Rights/Student Directory Information (http://registrar.utah.edu/privacy.php) I have read and will comply with the provisions for security and confidentiality of employee records and files as described

  18. Banner Financial Aid Account Request Form

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner Financial Aid Account Request Form ETSU Office of Information Technology 424 Roy Nicks Hall, Box 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu This section for use ______________________________________________________________________________________ [last] [first] [middle] ETSU Domain Name ____________________@etsu.edu School / College

  19. UNIVERSITY OF WASHINGTON DIPLOMA NAME REQUEST FORM

    E-Print Network [OSTI]

    Reh, Thomas A.

    UNIVERSITY OF WASHINGTON DIPLOMA NAME REQUEST FORM GRADUATION AND ACADEMIC RECORDS OFFICE http://www.washington.edu/students/reg/grad.html Email: ugradoff@u.washington.edu Phone: 206-543-1803 FAX: 206-685-3660 Current Students: Complete this form by the last day of the quarter you plan to graduate to: University of Washington Graduation

  20. Approval Request- VPP- April 13, 1994

    Broader source: Energy.gov [DOE]

    The Office of Safety and Quality Assurance (EH-30) is requesting approval for DOE membership in the VPPPA. Attached is the Secretary's authorization of the DOE Voluntary Protection Program (DOE-VPP). The DOE-VPP is designed to formally recognize those contractors which have demonstrated excellence in their health and safety programs.

  1. Neil B. Morley Publications (Available upon Request)

    E-Print Network [OSTI]

    Morley, Neil B.

    Neil B. Morley Publications (Available upon Request) Books and Book Chapters · Neil B. Morley-coplanar magnetic field, Ph.D. Dissertation, University of California, Los Angeles, 1994. (http://www.fusion.ucla.edu/neil/Publications-1084; Vol. 41, Part B, pp. 1-628; Vol. 42, Part C, pp. 1- 592, 1998. Journal Publications Submitted · N

  2. Revised December, 2014 DOSIMETRY TERMINATION REQUEST

    E-Print Network [OSTI]

    Revised December, 2014 DOSIMETRY TERMINATION REQUEST In order to ensure that dosimetry records are accurately maintained we require that persons wishing to terminate personal dosimetry fill out this form attention. Your badge(s) will be terminated upon receipt of this form. PIs may be charged

  3. OFFICIAL TRANSCRIPT REQUEST FORM Biomedical Sciences

    E-Print Network [OSTI]

    Cook, Greg

    OFFICIAL TRANSCRIPT REQUEST FORM Biomedical Sciences Bowman Gray Campus This form is to be used by current students and alumni of the WFU Graduate School of Arts and Sciences, Biomedical Sciences this form to: ATTN: Transcripts Wake Forest University Graduate School of Arts and Sciences Biomedical

  4. Mueller Streamline: Data Request (2011-SW-2802)

    Broader source: Energy.gov [DOE]

    DOE requested water efficiency test data, including complete test reports, from Mueller Streamline Co., for model 120-003NL, a faucet, after DOE received a complaint alleging that testing of this model demonstrated that the faucet exceeds the federal maximum allowable water flow rate.

  5. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  6. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-06-05

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization of reflectivity and transmission of the optical components most relevant to security.

  7. Comparing three models of attack and failure tolerance in electric power networks

    E-Print Network [OSTI]

    Hines, P; Blumsack, S

    2010-01-01

    In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in power systems, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss and blackout sizes. The first two are purely topological measures, following the procedure described by Albert et al. (2004). The blackout size calculation results from a simplified model of cascading failure in power networks. Tests with randomly selected sections of the Eastern US power grid indicate that in topological dynamics power grids are similar to random graphs, which is to be expected given the observed exponential degree distribution. However the connectivity loss model and the cascading failure model indicate that power grids behave more like scale free networks, in that they are acutely more vulnerable to directed attacks than random failures. These results suggest caution in drawing conclusi...

  8. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-08-03

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security.

  9. Biology and control of thrips attacking cotton in the vicinity of College Station, Texas 

    E-Print Network [OSTI]

    Pfrimmer, Theodore Roscoe

    1953-01-01

    Advisor) May 1953 BIOLOGY AND CONTROL OF THRIE3 ATTACKING COTTON IK THE VICINITY OF COLIEGE STATION, TEXAS By THEODORE ROSCCE P iE M fR t \\ \\ A Dissertation Submitted, to the Graduate School of the Agricultural and Mechanical College of Texas... cages during 1950 . . . . . . . . . 69 3. Comparison of the dosage-mortality curves for the toxicities of several compounds, applied as dusts, against Frankliniella tritici and F. exigua in large cages during 1950 ............................ 70 4...

  10. Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    bogus messages, which will incur extra costs, thus exhaust the energy of the honest nodes. In additionS attacks, in which the goal of the adversary is to exhaust the energy of the sensor nodes and to increase or to redistribute to lists, requires prior specific permission and/or a fee. MobiHoc'07, September 9­14, 2007, Montr´eal

  11. Comparative toxicity studies of sulphur acaricides on two species of spider mites attacking cotton 

    E-Print Network [OSTI]

    Hallmark, Kenzy Donovan

    1954-01-01

    CONPARATIVE TOXICITY STUDIES OF SULFUH ACAHICIDES ON TWO SPECIE OF SPIDEH NITES ATTACKING COTTON KENZY DONOVAN HALLI&AHK A Thesis Submitted to the Graduate School oi' the Agricultural and 14echanlcal College of Texas in partial fulfillment... Ovotran- 13 Procedure Culturing technique- Dusting apparatus 1B 18 19 Spraying appsratus- Treatment procedure ?- Determination ef results ? - ? --- ? ? ? -?- hesults Conclusions- Literature Cited- 47 50 1 Results of laboratortJ' toxicity...

  12. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ă?Â?Ă?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  13. The ignition hazard to urban interiors during nuclear attack due to burning curtain fragments transported by blast 

    E-Print Network [OSTI]

    Goodale, Thomas

    There exists some uncertainty at present, in the formulation of civil defense doctrine, as to whether it is advisable for window curtains to be closed or open during nuclear attack. Closed curtains would be in position to ...

  14. Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro and Evangelos Kranakis

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks Gimer Cervera, Michel (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes affect the topol- ogy map acquisition process by interrupting the flooding of control information

  15. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 645 Malicious Data Attacks on the Smart Grid

    E-Print Network [OSTI]

    Tong, Lang

    -time electricity markets. Also considered in this paper are countermeasures to mali- cious data attack widely reported that the U.S. electrical grid has been penetrated by cyber spies [1]. We consider

  16. Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't

    E-Print Network [OSTI]

    Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

    2008-01-01

    This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

  17. Attacking the Asokan-Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL 

    E-Print Network [OSTI]

    Steel, G.; Maidl, M.; Bundy, Alan

    We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols ...

  18. How to file a FOIA request for NASA Agency records A FOIA request for NASA Agency records must include the requester's name and mailing address, a description of

    E-Print Network [OSTI]

    How to file a FOIA request for NASA Agency records A FOIA request for NASA Agency records must is submitted online via the NASA FOIA website, the required information must be completed. Do not include a social security number on any correspondence with the FOIA office. NASA does not have a central location

  19. How to file a FOIA request for NASA Agency records A FOIA request for NASA Agency records must include the requester's name and mailing address, a description of

    E-Print Network [OSTI]

    How to file a FOIA request for NASA Agency records A FOIA request for NASA Agency records must is submitted online via the NASA FOIA website, the required information must be completed. Do not include a social security number on any correspondence with the FOIA office. NASA has a central location

  20. FY 2013 Budget Request for the Office of Energy Efficiency and...

    Office of Environmental Management (EM)

    3 Budget Request for the Office of Energy Efficiency and Renewable Energy FY 2013 Budget Request for the Office of Energy Efficiency and Renewable Energy The budget request for FY...

  1. FY 1996 Congressional budget request: Budget highlights

    SciTech Connect (OSTI)

    Not Available

    1995-02-01

    The FY 1996 budget presentation is organized by the Department`s major business lines. An accompanying chart displays the request for new budget authority. The report compares the budget request for FY 1996 with the appropriated FY 1995 funding levels displayed on a comparable basis. The FY 1996 budget represents the first year of a five year plan in which the Department will reduce its spending by $15.8 billion in budget authority and by $14.1 billion in outlays. FY 1996 is a transition year as the Department embarks on its multiyear effort to do more with less. The Budget Highlights are presented by business line; however, the fifth business line, Economic Productivity, which is described in the Policy Overview section, cuts across multiple organizational missions, funding levels and activities and is therefore included in the discussion of the other four business lines.

  2. Request for Qualifications for Sacramento Landfill

    Office of Energy Efficiency and Renewable Energy (EERE)

    This Request for Qualifications (RFQ) solicits experienced companies to design, permit, finance, build, and operate a solar photovoltaic farm (SPV Farm) on the City of Sacramento’s 28th Street Landfill. Respondents to this RFQ must demonstrate experience and capacity to design, permit, finance, build, and operate a SPV Farm that generates electricity that can be sold for electrical use through a power-purchase agreement. Submittals must be prepared and delivered in accordance with the requirements set forth in this document.

  3. Request for Proposal Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProject DevelopsforReporting Occupational Radiation| DepartmentDepartmentRequest

  4. Request For Information Regarding Categorical Exclusions: Guidelines |

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-A Wholesale Power RateEnergy Exclusions Request ForDepartment

  5. REQUEST FOR SERVICES --- DOCUMENT RECEIPT No

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget ||Department ofRequest for Records Disposition

  6. Request for Correction | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data CenterFinancialInvesting inServicesRecovery Act »ReportingRequest for

  7. BONNEVILLE POWER ADMINISTRATION'S REQUEST FOR APPROVAL 1 OF REVISED...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of an expiration date will not stop us from seeking alternatives for managing seasonal electricity oversupply. We will BONNEVILLE POWER ADMINISTRATION'S REQUEST FOR APPROVAL 17...

  8. Request for Information: Operation of Regional Test Center Test...

    Broader source: Energy.gov (indexed) [DOE]

    Contact Us Offices Solicitation Title: Request for Information: Operation of Regional Test Center Test Bed Located at SolarTAC Funding Number: DE-FOA-0001454 Description: The...

  9. Financial Institution Request for Proposals and Selection Process

    Broader source: Energy.gov [DOE]

    A state or local government typically conducts a competitive procurement procedure to award loan loss reserve (LLR) funds to a financial institution partner. The request for proposals (RFP)...

  10. Update Invalid Reservation Points for Transmission Service Requests...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Teams Customer Training Interconnection Notices Rates Standards of Conduct Tariff TF Web Based Training Update: Invalid Reservation Points for Transmission Service Requests on...

  11. COLLEGE OF PHYSICAL AND MATHEMATICAL SCIENCES MARKETING REQUEST FORM

    E-Print Network [OSTI]

    Hart, Gus

    COLLEGE OF PHYSICAL AND MATHEMATICAL SCIENCES MARKETING REQUEST FORM Please complete the marketing Stories Logo Development DVD Creation Market Research (focus grouping, etc.) Other Put an X through

  12. Request for Information Renewable Energy Generation/Production...

    Open Energy Info (EERE)

    Request for Information Renewable Energy GenerationProduction Shreveport Airport Authority - Response Deadline 2 January 2014 Home > Groups > Renewable Energy RFPs Rosborne318's...

  13. DOE's Idaho National Lab Issues Request for Proposals for Engineering...

    Broader source: Energy.gov (indexed) [DOE]

    of Energy's Idaho National Laboratory today issued a Request for Proposals (RFP) for engineering services in support of development of NGNP. This RFP is for pre-conceptual...

  14. Request for Information on the Electric Grid Resilience Self...

    Energy Savers [EERE]

    the Electric Grid Resilience Self-Assessment Tool for Distribution Systems: Federal Register Notice, Volume 80, No. 126 - Jul. 1, 2015 Request for Information on the Electric Grid...

  15. Notice of inquiry and request for Information - Study of the...

    Energy Savers [EERE]

    inquiry and request for Information - Study of the potential benefits of distributed generation: Federal Register Notice Volume 71, No. 19 - Jan. 30, 2005 Notice of inquiry and...

  16. Comments of Avista Corporation on DOE Request forInformation...

    Energy Savers [EERE]

    and the Smart Grid: Data Access, Third Party Use, and Privacy Re: U.S. Department of Energy Request for Information Implementing the National Broadband Plan by Empowering...

  17. NBP RFI: Data Access Honeywell Responses To Request for Information...

    Energy Savers [EERE]

    Data Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart...

  18. DOE Issues Request for Information for Richland Operations Office...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office Richland Acquisitions - Post Fiscal Year 2018 Contract(s) Acquisition Planning DOE Issues Request for Information for Richland Operations Office Richland...

  19. ENERNOC Response to Request for Information from the Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Smart Grid Implementation. More Documents & Publications Response to Request for Information from the Department of Energy: Implementing the National Broadband Plan by...

  20. Regarding Request for Information Published at 75 Fed. Reg. 26...

    Office of Environmental Management (EM)

    by the National Association of State Utility Consumer Advocates Department of Energy Data Access and Privacy Issues Related To Smart Grid Technologies Re: DOE Request for...

  1. Request for Information: Federal Government Power Purchase Agreements...

    Broader source: Energy.gov (indexed) [DOE]

    request for information for federal government power purchase agreement (PPA) issues. pparfi.pdf More Documents & Publications Response Summary: Department of Energy Power...

  2. Request for Information: High Impact Commercial Building Technology...

    Office of Environmental Management (EM)

    High Impact Commercial Building Technology Deployment (DE-FOA-0001086) Request for Information: High Impact Commercial Building Technology Deployment (DE-FOA-0001086) March 6, 2014...

  3. Response to seve.ral FOIA requests - Renewable Energy. | Department...

    Energy Savers [EERE]

    Energy.United States Department of the Interior, nepdg80018250.pdf October 25, 2001 Response to seve.ral FOIA requests - Renewable Energy. More Documents & Publications...

  4. Response to several FOIA requests- Renewable Energy pages 4001- 4250

    Broader source: Energy.gov [DOE]

    Response to several FOIA requests - Renewable Energy. nepdg_4001_4250.pdf R.eport Statement/Recommendation Background Pros/Cons discussion

  5. Hydrogen and Fuel Cell Technologies FY 2014 Budget Request Rollout...

    Broader source: Energy.gov (indexed) [DOE]

    Presentation slides from the Hydrogen and Fuel Cell Technologies FY 2014 Budget Request Rollout webinar presented by Fuel Cell Technologies Office Director Sunita Satyapal on April...

  6. Response to Request for Information titled "Addressing Policy...

    Energy Savers [EERE]

    Report: Impacts of Demand-Side Resources on Electric Transmission Planning Impacts of Demand-Side Resources on Electric Transmission Planning Response to Request for...

  7. DOE Issues Request for Information on Advanced Thermal Insulation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    on advanced thermal insulation for sub-ambient temperature alternative fuel storage systems. This RFI requests information regarding how to maintain vacuum stability of...

  8. DOE Request for Information - Implementing the National Broadband...

    Energy Savers [EERE]

    Information - Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy DOE Request for Information -...

  9. Reply comments to DOE Request for Information-Implementing the...

    Energy Savers [EERE]

    for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Reply comments to DOE Request for...

  10. DOE Issues Final Request for Proposal for Portsmouth Gaseous...

    Office of Environmental Management (EM)

    Portsmouth Gaseous Diffusion Plant Support Services DOE Issues Final Request for Proposal for Portsmouth Gaseous Diffusion Plant Support Services December 9, 2014 - 3:37pm Addthis...

  11. DOE Issues Request for Information for Los Alamos National Laboratory...

    Office of Environmental Management (EM)

    Los Alamos National Laboratory Legacy Completion Cleanup Project Post Fiscal Year 2016 Acquisition Planning DOE Issues Request for Information for Los Alamos National Laboratory...

  12. DOE Issues Final Request for Proposal for Paducah Gaseous Diffusion...

    Energy Savers [EERE]

    Paducah Gaseous Diffusion Plant Support Services DOE Issues Final Request for Proposal for Paducah Gaseous Diffusion Plant Support Services October 6, 2014 - 4:13pm Addthis Media...

  13. Request for Proposals Number RHB-5-52483

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    9 National Renewable Energy Laboratory Managed and Operated by the Alliance for Sustainable Energy, LLC Request for Proposals Number RHB-5-52483 "Subsurface Utility Engineering...

  14. Browning: Email in Response to Smart Grid Request for Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to the Smart Grid Request for Information on Addressing Policy and Logistical Challenges. Smart Gird Policy Memo More Documents & Publications City Utilities of Springfield...

  15. Climate Action Champions Request for Applications Informational Webinar

    Office of Energy Efficiency and Renewable Energy (EERE)

    This Webinar will provide prospective Applicants with an overview of the Climate Actions Champions Request for Applications, the application process and respond to questions posed by attendees.

  16. License Amendment Request for Storing Exelon Sister Nuclear Stations...

    Office of Scientific and Technical Information (OSTI)

    License Amendment Request for Storing Exelon Sister Nuclear Stations Class BC LLRW in the LaSalle Station Interim Radwaste Storage Facility - 13620 Citation Details In-Document...

  17. University of Connecticut Request to Change Undergraduate Requirement Catalog

    E-Print Network [OSTI]

    Lozano-Robledo, Alvaro

    University of Connecticut Request to Change Undergraduate Requirement Catalog University policy the University and then return must meet the requirements as they were when they returned. However, all

  18. Preliminary Comments on Compliance Plan and Request for Clarification...

    Office of Environmental Management (EM)

    Preliminary Comments on Compliance Plan and Request for Clarification or, in the Alternative, Rehearing of the District of Columbia Public Service Commission Docket No....

  19. Presentation on the EERE FY 2014 Budget Request (Wind Program)

    SciTech Connect (OSTI)

    Danielson, David

    2013-04-10

    Fiscal Year 2014 budget request from the Department of Energy’s Office of Energy Efficiency and Renewable Energy (Wind Program).

  20. Felix Storch: Data Request/Warning (2010-SCE-0111)

    Broader source: Energy.gov [DOE]

    DOE requested test data from Felix Storch for several models of refrigerators and freezers and issued a warning of inconsistent information provided in Felix Storch's certification reports.

  1. BETO Announces Request for Information on Landscape Design for...

    Broader source: Energy.gov (indexed) [DOE]

    U.S. Department of Energy's (DOE's) Bioenergy Technologies Office (BETO) invites public comment on its request for information (RFI) regarding landscape design for sustainable...

  2. Request for Information on Permitting of Transmission Lines:...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to...

  3. Request for Information Regarding a Proposed Funding Opportunity...

    Energy Savers [EERE]

    for Information Regarding a Proposed Funding Opportunity for Administration of the Wave Energy Converter Prize Request for Information Regarding a Proposed Funding...

  4. Request for Comments on the Electric Grid Integration Technical...

    Office of Environmental Management (EM)

    Grid Integration Technical Workshops Summaries: Federal Register Notice Volume 78, No. 35 - Feb. 21, 2013 Request for Comments on the Electric Grid Integration Technical...

  5. 10 CFR 850, Request for Information - Docket Number: HS-RM-10...

    Broader source: Energy.gov (indexed) [DOE]

    Commenter: Marc Kolanz 10 CFR 850 - Request for Information Docket Number: HS-RM-10-CBDPP Comment Close Date: 2222011 10 CFR 850, Request for Information - Docket Number:...

  6. Florida Power and Light Comments on Smart Grid Request For Information...

    Office of Environmental Management (EM)

    Florida Power and Light Comments on Smart Grid Request For Information (RFI): Addressing Policy & Logistical Challenges. Florida Power and Light Comments on Smart Grid Request For...

  7. Microsoft PowerPoint - OE_FY_2012_Budget_Request_Green_3.pptx

    Energy Savers [EERE]

    4, 2011 Office of Electricity Office of Electricity Delivery & Energy Reliability Reliability FY 2012 Budget Request FY 2012 Budget Request Patricia A. Hoffman, Assistant Secretary...

  8. A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan; Mashayekh, Salman; Kundur, Deepa; Zourntos, Takis; Butler-Purry, Karen

    2014-01-02

    - gency response,’’ in Proc. Summer Comput. Simul. Conf., Jul. 2007, pp. 1230–1237. [3] B. Rozel, M. Viziteu, R. Caire, N. Hadjsaid, and J.-P. Rognon, ‘‘Towards a common model for studying critical infrastructure interdependencies,’’ in Proc. IEEE Power.... IEEE Power Syst. Conf. Exposit., Mar. 2009, pp. 1–6. [5] J. Stamp, A. McIntyre, and B. Ricardson, ‘‘Reliability impacts from cyber attack on electric power systems,’’ in Proc. IEEE Power Syst. Conf. Exposit., Mar. 2009, pp. 1–8. [6] S. Sheng, W. L. Chan...

  9. Facility Request Form H. Fred Simons African American Cultural Center

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Requested? Yes No Setup Request: Chairs Podium Microphone Round Tables Special Requirements This event has-3180 Phone: (860) 486-3433 Fax (860) 486-1193 Square Tables Page 1 Print Form #12;AACC Facility Usage. Advisor Address Advisor Email Signature Approval Disapproval Date Date Dr. Willena K. Price, Director Page

  10. DDR sends cover letter with accommodation request to

    E-Print Network [OSTI]

    Saffman, Mark

    Approve DDR sends cover letter with accommodation request to employee/applicant; disseminate copies an accommodation. Need help? DDR informs employee of disability accommodation process, rights and responsibilities. Employee completes disability accommodation request form and sends it to DDR. Modify or Deny Consult

  11. Request for Online Payment Site ETSU Bursar Office

    E-Print Network [OSTI]

    Karsai, Istvan

    Request for Online Payment Site ETSU Bursar Office PO Box 70732 Date*: _____________ (*allow Ustore site with inventory a credit card merchant ID will be requested for ETSU's processor, development: The requirements and responsibilities of an Online Site Manager are: 1. The site manager must be a full-time ETSU

  12. ETSU Bursar Office GRANT AND PROGRAM PAYMENT REQUEST

    E-Print Network [OSTI]

    Karsai, Istvan

    1 ETSU Bursar Office GRANT AND PROGRAM PAYMENT REQUEST Upon submission of this form to the Bursar Box: Fax: ETSU Grant #: Funding Period: To EXPENSE TO BE APPLIED Academic Year: Semester: Fall Spring No Total Students: List Students On Next Page #12;ETSU Bursar Office Grant Payment Request Page 2 of 2 2

  13. XRETRIEVE (request, i.a.) (iris.washington.edu)

    E-Print Network [OSTI]

    Laske, Gabi

    XRETRIEVE (request, i.a.) BDSN MEDNET IRIS DMC (iris.washington.edu) GEOSCOPE BREQ_FAST (request) email to BREQ_FAST@sob.iris.washington.edu interactive non-interactive customized pre-assembled customized pre-assembled www.iris.washington.edu (seismiquery/data sources) www.iris.washington.edu (FARM

  14. Handling Requests for Information University of Nottingham Staff Guide

    E-Print Network [OSTI]

    Aickelin, Uwe

    for these categories of information which are exempt from the general right of access. They include information) or a refusal notice. The Freedom of Information Act 2000 gives individuals the right to request access has the right to be informed in writing whether the information requested is held and, where

  15. Material Stock Requests 9.1 BRFHS and BRFHM

    E-Print Network [OSTI]

    Material Stock Requests 9.1 BRFHS and BRFHM Version Date: January 2014 #12;Training Guide BRFHS injury. If you use this software in dangerous applications, then you shall be responsible to take all and BRFHM Page iii Table of Contents Material_Stock_Requests_9_1_BRFHS

  16. Material Stock Requests 9.1 Version Date: April 2013

    E-Print Network [OSTI]

    Material Stock Requests 9.1 HCSD Version Date: April 2013 Revision Date: April 2013 #12;Training be responsible to take all appropriate fail-safe, backup, redundancy and other measures to ensure the safe use Guide HCSD Page iii Table of Contents Material Stock Requests HCSD

  17. REQUEST FOR OFFERING INDIVIDUAL PROBLEMS AND RESTRICTED ENTRY CARD

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    REQUEST FOR OFFERING INDIVIDUAL PROBLEMS AND RESTRICTED ENTRY CARD Montana State University Office of the Registrar The Department/School of __________________________________________ requests permission to offer to the department offering the course for approval. If approved by the department head, the student may

  18. Subject: Request Date: Revised 10/24/2014

    E-Print Network [OSTI]

    Subject: Request Date: Revised 10/24/2014 Page 1 of 3 Texas A&M NetID Account Request Instructions the information corrected at no charge to you. Subject Information: Universal Identification Number (UIN): A UIN is required to create an entry for the Subject in the NetID Identity Management System. 1 Subject already has

  19. Natural Language Access to Data Bases" Interpreting Update Requests 1

    E-Print Network [OSTI]

    Natural Language Access to Data Bases" Interpreting Update Requests 1 James Davidson and S. Jerrold of the domain, which may be a considerable simplification of the actual underlying data base structure. Updates to the underlying data base. Update requests may be impossible (cannot be performed in any way), ambiguous (can

  20. FACULTY GRANT BUYOUT REQUEST College of Arts & Sciences

    E-Print Network [OSTI]

    Deng, Bo

    FACULTY GRANT BUYOUT REQUEST College of Arts & Sciences Grant and Industrial Buyouts: Support from%) of the external money generated by this kind of buyout will be returned to the department in the fiscal year and undertake other activities. Buyout Request: Faculty Name ________________ Personnel Number

  1. Payroll Department Form W-9 Request for Taxpayer

    E-Print Network [OSTI]

    Mateo, Jill M.

    Route To : Requester Payroll Department Form W-9 Request for Taxpayer Identification Number SeeSpecificInstructions onpage2. Taxpayer Identification Number (TIN) Enter your TIN shown on this form is my correct taxpayer identification number (or I am waiting for a number

  2. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M. (Sandia National Laboratories, Albuquerque, NM); Ehlen, Mark Andrew (Sandia National Laboratories, Albuquerque, NM); Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  3. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    SciTech Connect (OSTI)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  4. Bid Request Sheet 4/1/2015 Request for License Terms Grain Sorghum Variety -13sorg 23

    E-Print Network [OSTI]

    Lawrence, Rick L.

    party will have 14 days to complete a license agreement after notification of award. #12;Bid Request Sheet 4/1/2015 Request for License Terms ­ Grain Sorghum Variety - 13sorg 23 Montana or by calling 406-994-7483. Terms to be addressed Response (use a separate sheet if needed) License fee (One

  5. Request an iPortal Account!

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOA Applicantof Years | DepartmentRelatedSouthern|(PerRequest

  6. NREL: Request for Proposals (limited access)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines lightGeospatial ToolkitSMARTS - Simple Model of theWind ResourceRequests

  7. Request for Proposal | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4)9 Federal Register / Vol. 76,EXAMPLERevision 1*Request

  8. Microsoft Word - beamtime_request_form.dot

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework uses concrete7 Assessment ofLana CoxWhat? CyclotronBEAMTIME REQUEST

  9. Microsoft Word - exposure_request_form.dot

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework uses concrete7 Assessment ofLana CoxWhat?Copper23 atEXPOSURE REQUEST

  10. Request Form for Purchases_CAMD.pub

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAboutNuclear NonproliferationRequestForm SignJ.

  11. Request a Quote | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAboutNuclear NonproliferationRequestForm

  12. ISIS Assistant 9.0 | Official Transcript Request Created: 04.29.13

    E-Print Network [OSTI]

    Capogna, Luca

    ISIS Assistant 9.0 | Official Transcript Request Created: 04.29.13 ISIS Assistant Official Center page and select the direct link to the request page. #12;ISIS Assistant 9.0 | Official Transcript Request Created: 04.29.13 ISIS Assistant Official Transcript Request Student Center 3. From the Official

  13. Training Request Form Administration Training Services, Organizational Effectiveness/OHR 612-626-1373 ULearn

    E-Print Network [OSTI]

    Minnesota, University of

    Training Request Form Administration Training Services, Organizational Effectiveness/OHR · 612-626-1373 ULearn www.umn.edu/ohr/trainingservices 5-17-12 A Training Request Forms are designed to obtain additional information from a learner when requesting training in ULearn. The Training Request Form

  14. Design of a high angle of attack robotic sting mount for tests in a low speed wind tunnel 

    E-Print Network [OSTI]

    Kubler, Tommy Jack

    1989-01-01

    DESIGN OF A HIGH ANGLE OF ATTACK ROBOTIC STING MOUNT FOR TESTS IN A LOW SPEED WIND TUNNEL A Thesis by TOMMY JACK KUBLER Submitted to the Oflice of Graduate Studies of Texas AJcM University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE August 1989 Major Subject: Aerospace Engineering DESIGN OF A HIGH ANGLE OF ATTACK ROBOTIC STING MOUNT FOR TESTS IN A IOW SPEED WIND TUNNEL A Thesis bv TOMMY JACK KHBLER Approved as to style and content by: Thomas C...

  15. Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01

    A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified in the first part of this paper. A cross layer detection mechanism is proposed to combat TSA in part II of this paper. In the physical layer, we propose a GPS carrier signal noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

  16. Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Sophie Y. Qiu, Fabian Monrose, Andreas Terzis, and Patrick D. McDaniel

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    the In- ternet, remains critically vulnerable to a range of prefix forgery attacks. In this paper, we (BGP) controls how In- ternet traffic is routed [1]. However, the protocol is vul- nerable to a range the paths and the prefix origins. This work is con- cerned with the latter: how can the routing system

  17. SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    deployed in contexts where #12;side-channel attacks are a threat. For example, smart-phones now house multi constraints such as energy efficiency, market forces will drive increased use of similar components over time. The challenges of evaluation and countermeasure in- strumentation already motivate such work, but are arguably

  18. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems

    E-Print Network [OSTI]

    Sekar, R.

    such as those due to worms, these protection mechanisms lead to re- peated restarts of the victim application- ploit the same vulnerability. An important benefit of self-healing is that it avoids system resources]. Although these techniques can de- tect attacks before vital system resources (such as files

  19. Defending Against Attacks on Main Memory Persistence William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel, and Adam Smith

    E-Print Network [OSTI]

    Lowd, Daniel

    Defending Against Attacks on Main Memory Persistence William Enck, Kevin Butler, Thomas Richardson,butler,trichard,mcdaniel,asmith}@cse.psu.edu Abstract Main memory contains transient information for all res- ident applications. However, if memory and keys can be extracted. Main memory persistence will soon be the norm as recent ad- vancements in MRAM

  20. Detection and Identification of Data Attacks in Power System Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    the attacked transmission lines. I. INTRODUCTION A. SCADA System and State Estimation A modern society relies is supervised and control through the Supervisory Control And Data Acquisition (SCADA) systems. SCADA systems on State Estimation SCADA systems measure data through remote terminal units (RTUs) all over the grid

  1. A Formal Model for Verifying the Impact of Stealthy Attacks on Optimal Power Flow in Power Grids

    E-Print Network [OSTI]

    Wang, Yongge

    - mal Power Flow; Formal Model 1. INTRODUCTION Power system control centers employ a numberA Formal Model for Verifying the Impact of Stealthy Attacks on Optimal Power Flow in Power Grids the integrity of OPF and undermine the economic and secure system operation. We present a formal verification

  2. IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading

    E-Print Network [OSTI]

    Kundur, Deepa

    components using variable structure system theory. Here, an opponent is able to remotely control multiple, sliding mode theory, smart grid attacks, variable structure system modeling. I. INTRODUCTION I T IS WELL commerce, entertainment, and social interac- tions has led to improved functionality and efficiency

  3. The average detection probability of the quantum dialogue protocol under the disturbance attack is 3/4

    E-Print Network [OSTI]

    Nguyen Ba An

    2004-06-24

    We prove explicitly that the detection probability of the disturbance attack in the recently proposed quantum dialogue protocol is 3/4 in average. The purpose is not only to reply a comment but also to provide a deeper understanding of a kind of tampering in an unauthorized communication.

  4. Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 Fangguo Zhang of Wollongong, NSW 2522 Australia {fangguo, rei, wsusilo}@uow.edu.au Abstract. At the fourth ACM conference for construction of ID-based cryptographic schemes. At the fourth ACM conference on electronic commerce (EC'03), S

  5. Proc. 10th ACM Conf. on Principles of Distributed Systems, August 1991 1 How To Withstand Mobile Virus Attacks

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Virus Attacks Extended Abstract Rafail Ostrovsky Moti Yungy Abstract We initiate a study of distributed, analogous to a spread of a virus or a worm. We show how local computations (at each processor) and global in the computation. 1 Introduction Computer viruses pose one of the central problems in distributed computing today

  6. Proc. 10th ACM Conf. on Principles of Distributed Systems, August 1991 1 How To Withstand Mobile Virus Attacks

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Virus Attacks Extended Abstract Rafail Ostrovsky \\Lambda Moti Yung y Abstract We initiate a study the network, analogous to a spread of a virus or a worm. We show how local computations (at each processor redundancy in the computation. 1 Introduction Computer viruses pose one of the central problems

  7. Eclipse Attacks on Bitcoin's Peer-to-Peer Network Ethan Heilman Alison Kendler Aviv Zohar Sharon Goldberg

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , selfish mining, and adversarial forks in the blockchain. We take a detailed look at bitcoin's peer- to-of-work to reach consensus on a distributed public ledger of transactions, aka., the blockchain. Satoshi Nakamoto [52] argues that bitcoin is secure against attackers that seek to shift the blockchain

  8. 372 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 Sybil Attacks and Their Defenses

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    372 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 Sybil Attacks and Their Defenses in the Internet of Things Kuan Zhang, Student Member, IEEE, Xiaohui Liang, Member, IEEE, Rongxing Lu, Member, IEEE, and Xuemin Shen, Fellow, IEEE Abstract--The emerging Internet-of-Things (IoT) are vulnera- ble to Sybil

  9. FY 1997 congressional budget request: Budget highlights

    SciTech Connect (OSTI)

    NONE

    1996-03-01

    This is an overview of the 1997 budget request for the US DOE. The topics of the overview include a policy overview, the budget by business line, business lines by organization, crosswalk from business line to appropriation, summary by appropriation, energy supply research and development, uranium supply and enrichment activities, uranium enrichment decontamination and decommissioning fund, general science and research, weapons activities, defense environmental restoration and waste management, defense nuclear waste disposal, departmental administration, Office of the Inspector General, power marketing administrations, Federal Energy Regulatory commission, nuclear waste disposal fund, fossil energy research and development, naval petroleum and oil shale reserves, energy conservation, economic regulation, strategic petroleum reserve, energy information administration, clean coal technology and a Department of Energy Field Facilities map.

  10. DOE Requests Information on Potential New or Revised Categorical...

    Energy Savers [EERE]

    22, 2009 - 10:33am Addthis The U.S. Department of Energy intends to update its National Environmental Policy Act (NEPA) categorical exclusions, and has posted a request for...

  11. Legislative Appropriations Request For Fiscal Years 2014 and 2015

    E-Print Network [OSTI]

    Legislative Appropriations Request For Fiscal Years 2014 and 2015 Submitted to the Governor .....................................................................................118 Schedule 9: Special Item Information either has no information to report or the schedule is not applicable. Accordingly, these schedules have

  12. Internet Requests for Comments (RFCs) as Scholarly Publications

    E-Print Network [OSTI]

    Goodman, James R.

    Internet Requests for Comments (RFCs) as Scholarly Publications Brian E. Carpenter Department be considered the equivalent of scholarly publications. Categories and Subject Descriptors A.m [Miscellaneous common scholarly publication system. It

  13. Fire Protection System Account Request Form | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    December 2, 2010 Account request form used to obtain user credentials for the Fire Protection Database To obtain a user id and password to access the Fire Protection system, please...

  14. Idaho Instruction for Filing a Request for Extension of Time...

    Open Energy Info (EERE)

    a Request for Extension of Time to Submit Proof of Beneficial Use Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Instructions:...

  15. Computer Account Request Form ETSU Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Computer Account Request Form ETSU Office of Information Technology 424 Roy S. Nicks Hall, Box 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu This section for use by the Office _____________________________ ETSU Phone Number _____________________________ Department / Office

  16. Request for Proposals for New or Upgraded Transmission Line Projects...

    Office of Environmental Management (EM)

    Proposals for New or Upgraded Transmission Line Projects Under Section 1222 of the Energy Policy Act of 2005: Federal Register Notice Volume 75, No. 111 - Jun 10, 2012 Request for...

  17. Rehabilitation Services Extended Coverage Request Form for Employees Working Outside

    E-Print Network [OSTI]

    Lennard, William N.

    Rehabilitation Services Extended Coverage Request Form for Employees Working Outside Ontario, occupation, and current department. 2. The completed form must be forwarded to Rehabilitation Services, Rm 4159, Support Services Building at least 4 weeks prior to departure. 3. Rehabilitation Services

  18. DOE Issues Request for Information on Fuel Cells for Continuous...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cells for Continuous On-Board Recharging for Battery Electric Light-Duty Vehicles DOE Issues Request for Information on Fuel Cells for Continuous On-Board Recharging for Battery...

  19. REQUEST FOR PROPOSALS Designing Solutions for Poverty Competition (Spring 2015)

    E-Print Network [OSTI]

    Bao, Lichun

    REQUEST FOR PROPOSALS Designing Solutions for Poverty Competition (Spring to a real world, poverty-related problem in areas such as financial inclusion, energy with research and knowledge of poverty- alleviation, development, and the social sciences

  20. Northwest Energy Efficiency Alliance Request for Proposals to Evaluate

    E-Print Network [OSTI]

    Northwest Energy Efficiency Alliance Request for Proposals to Evaluate Existing Consumer Behavioral research, evaluations and behavior change initiatives. The Northwest Energy Efficiency Alliance (NEEA interest groups and energy efficiency industry representatives that operate in the states of Idaho, Montana

  1. LEAVE WITHOUT PAY REQUEST * Name (Last, First, Middle) UID

    E-Print Network [OSTI]

    Zeng, Ning

    FOR THE PERIOD (Month/Day/Year) / / to / / THIS REQUEST IS (Check One): New Partial LWOP to % Extension Change upon termination of the Leave Without Pay. I have been notified of the Consolidated Omnibus Budget

  2. DOE Has Issued Request for Information Regarding Hydrogen Infrastructu...

    Energy Savers [EERE]

    and FCEVs December 18, 2013 - 12:00am Addthis The U.S. Department of Energy's (DOE) Fuel Cell Technologies Office has issued a request for information (RFI) seeking feedback...

  3. DOE Issues Request for Information on Biological Hydrogen Production...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Biological Hydrogen Production DOE Issues Request for Information on Biological Hydrogen Production January 23, 2014 - 12:00am Addthis The U.S. Department of Energy's (DOE's) Fuel...

  4. Health Assessment Requirements Candidate Waiver Request Health Assessment Management System

    E-Print Network [OSTI]

    Sin, Peter

    Health Assessment Requirements Candidate Waiver Request Health Assessment Management System Please: To Position #: Position Title: Environmental Health & Safety Use Only Reviewer Name: ___________________ Effective Date: _______________ Comments: Revised: May 14, 2012 #12;Health Assessment Requirements Candidate

  5. Request for Infertility Treatment Expense Reimbursement Employee Name: ____________________________ Dartmouth ID: ______________

    E-Print Network [OSTI]

    Bucci, David J.

    Request for Infertility Treatment Expense Reimbursement Employee Name-mail #12;Information about the Infertility Treatment Reimbursement Benefit: Description of Benefit of infertility treatments and associated services. This benefit is available to regular benefits

  6. Request for Information for Marine and Hydrokinetic Field Measurements |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo. 195 - Oct.7, 2015Verizon and VerizonCells:|ofRequestRequest

  7. Request an iPortal Account! | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-A Wholesale Power RateEnergy Exclusions RequestRequest an

  8. Request for Comments on the Electric Grid Integration Technical Workshops

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-A Wholesale Power RateEnergy Exclusions RequestRequest

  9. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  10. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other two. The fate of tritium in the attack depended on its chemistry. Any tritium present in the vicinity of jet-fuel explosion or fire would convert to HTO. The molecular tritium is also known to quickly exchange with water adsorbed on surfaces at ambient temperatures. Therefore, the end product of reacted tritium was HTO. A part of it would disperse into the atmosphere and a part would remain on site. The dynamic aspect of HTO removal was investigated taking into a consideration water flow at ground zero. Most of ground zero is encircled by the Slurry Wall, 70 ft deep underground, called a Bathtub. Approximately three million gallons of water were hosed on site in the fire-fighting efforts, and 1 million gallons fell as rainwater, between 9/11 and 9/21 (the day of the reported measurement). The combined water percolated through the debris down to the bottom of the Bathtub dissolving and removing HTO with it. That water would meet and combine with the estimated 26 million gallons of water that leaked from the Hudson River as well as broken mains, during the same period of 10 days after the attack. The combined water was collecting in the PATH train tunnel and continuously being pumped out to prevent flooding. A %Box model of water flow was developed to describe the above scenario. Considering the uncertainty in the amount of tritium present from sources other than the aircraft, as well as the dynamic character of tritium removal from the site, it is feasible to provide only a qualitative picture of the fate and behavior of tritium at WTC with the limited experimental data available. If the time history of tritium concentration at WTC had been measured, this study could have been a tracer study of water flow at WTC possibly useful to civil engineering.

  11. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    E-Print Network [OSTI]

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  12. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  13. The web-based graphic service request system for facility management of apartments 

    E-Print Network [OSTI]

    Lee, Kwang Jun

    2006-10-30

    This research investigates the feasibility of web technology as a means of handling service requests for delivering high quality service in building operation and maintenance. This research proposes a web-based graphic service request (WGSR) system...

  14. How to Submit a Request for a PARS II Account | Department of...

    Energy Savers [EERE]

    How to Submit a Request for a PARS II Account How to Submit a Request for a PARS II Account The account access process for PARS II relies on the Department of Energy's iManage...

  15. DOE Requests $3.2 Billion for Renewable Energy, Efficiency in...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Requests 3.2 Billion for Renewable Energy, Efficiency in FY 2012 DOE Requests 3.2 Billion for Renewable Energy, Efficiency in FY 2012 February 16, 2011 - 4:08pm Addthis Photo of...

  16. SNL Issues Notice of Intent to Release a Request for Quotation...

    Energy Savers [EERE]

    SNL Issues Notice of Intent to Release a Request for Quotation for a Hydrogen Station Test Device SNL Issues Notice of Intent to Release a Request for Quotation for a Hydrogen...

  17. DOE Issues 2 Requests for Information on Low-Cost Hydrogen Production...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2 Requests for Information on Low-Cost Hydrogen Production and Delivery DOE Issues 2 Requests for Information on Low-Cost Hydrogen Production and Delivery October 29, 2014 -...

  18. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  19. Post-Processing Free Spatio-Temporal Optical Random Number Generator Resilient to Hardware Failure and Signal Injection Attacks

    E-Print Network [OSTI]

    Mario Stip?evi?; John Bowers

    2014-10-09

    We present a random number generator based on quantum effects in photonic emission and detection. It is unique in simultaneous use of both spatial and temporal quantum information contained in the system which makes it resilient to hardware failure and signal injection attacks. We show that its deviation from randomness cam be estimated based on simple measurements. Generated numbers pass NIST Statistical test suite without post-processing.

  20. Request for Proposals for Final Energy Service Company Selection from Pre-Qualified Pool Documents

    Broader source: Energy.gov [DOE]

    Information and documents about the Request for Proposals to select an Energy Service Company from a pre-qualified pool.