Sample records for unauthenticated remote attacker

  1. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  2. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  3. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  4. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  5. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  6. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia...

  7. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  8. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    : Security, Vulnerabilities, Cyber Attack, Critical Infrastructure Protection, Electric Power Management present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

  9. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  10. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  11. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  12. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  13. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  14. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  15. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    or logical Layer-2 network as the affected system to gain an unauthenticated root shell. REFERENCE LINKS: SecurityTracker Alert ID: 1028682 Secunia Advisory SA53730 Cisco...

  16. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    Against Data Injection Attacks on Power Grids”, IEEER. Thomas, and L. Tong, “Malicious Data Attacks on SmartState Estimation: Attack Strategies and Countermeasures,”

  17. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    Data Injection Attacks on Power Grids”, IEEE Transactionson Smart Grid, vol. 2, no. 2, June [21] O. Kosut, L.Data Attacks on Smart Grid State Estimation: Attack

  18. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  19. Attack Graphs for Sensor Placement, Alert Prioritization, and Attack Response

    E-Print Network [OSTI]

    Noel, Steven

    1 Attack Graphs for Sensor Placement, Alert Prioritization, and Attack Response Steven Noel of IDS alarms, using attack graph analysis. Our attack graphs predict the various possible ways and attacker exploits provides an attack graph showing all possible paths to critical assets. We then place IDS

  20. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks. A remote user...

  1. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  2. Attack Diagnosis: Throttling Distributed Denial-of-Service Attacks Close to the Attack Sources

    E-Print Network [OSTI]

    Park, Jung-Min

    Attack Diagnosis: Throttling Distributed Denial- of-Service Attacks Close to the Attack Sources Polytechnic Institute and State University Blacksburg, VA 24061 {rlchen, jungmin}@vt.edu Abstract-- Attack mitigation schemes actively throttle attack traffic generated in Distributed Denial-of-Service (DDoS) attacks

  3. Quantum-Space Attacks

    E-Print Network [OSTI]

    Ran Gelles; Tal Mor

    2007-11-25T23:59:59.000Z

    Theoretical quantum key distribution (QKD) protocols commonly rely on the use of qubits (quantum bits). In reality, however, due to practical limitations, the legitimate users are forced to employ a larger quantum (Hilbert) space, say a quhexit (quantum six-dimensional) space, or even a much larger quantum Hilbert space. Various specific attacks exploit of these limitations. Although security can still be proved in some very special cases, a general framework that considers such realistic QKD protocols, as well as} attacks on such protocols, is still missing. We describe a general method of attacking realistic QKD protocols, which we call the `quantum-space attack'. The description is based on assessing the enlarged quantum space actually used by a protocol, the `quantum space of the protocol'. We demonstrate these new methods by classifying various (known) recent attacks against several QKD schemes, and by analyzing a novel attack on interferometry-based QKD.

  4. Building Computer Network Attacks

    E-Print Network [OSTI]

    Futoransky, Ariel; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01T23:59:59.000Z

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

  5. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    E-Print Network [OSTI]

    Ou, Xinming "Simon"

    Improving Attack Graph Visualization through Data Reduction and Attack Grouping John Homer1 Laboratory, USA Abstract. Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often

  6. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01T23:59:59.000Z

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  7. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in...

  8. Microarchitectural Attacks and Countermeasures

    E-Print Network [OSTI]

    Chapter 18 Microarchitectural Attacks and Countermeasures Onur Aciic¸mez and C¸ etin Kaya Koc¸ 18+Business Media, LLC 2009 475 #12;476 Onur Aciic¸mez and C¸ etin Kaya Koc¸ attention on analysis of computer

  9. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  10. Insects Attacking Vegetable Crops.

    E-Print Network [OSTI]

    Newton, Weldon H.; Deer, James A.; Hamman, Philip J.; Wolfenbarger, Dan A.; Harding, James A.; Schuster, Michael F.

    1964-01-01T23:59:59.000Z

    of economic importance. Worms cause consider- able damage to grain sorghum heads, but they are cannibalistic and usually only one larva reaches full growth in each head as well as in each corn ear. BLACK CUTWORM, Agrotis ipsilon (Hufnagel) Cutworms.... They frequently do considerable damage to corn ears, similar to that caused by corn ear- worms. These worms also feed as "budworms" in grain sorghum and corn whorls. Unfolding leaves from whorls of such attacked crops are per- forated with holes. Like...

  11. Insects Attacking Vegetable Crops. 

    E-Print Network [OSTI]

    Newton, Weldon H.; Deer, James A.; Hamman, Philip J.; Wolfenbarger, Dan A.; Harding, James A.; Schuster, Michael F.

    1964-01-01T23:59:59.000Z

    THAT SUCK THE JUICES FROM FOLIAGE, FRUITS, STEMS AND ROOTS, CAUSING DISCOLORATION, STUNTING AND OTHER DAMAGE APHIDS Aphids are small, sluggish, soft-bodied insects often called plant lice. A number of species attack various crops, sucking plant sap..., peppers or dark brown with black leg joints, eyes and and tomatoes. cornicles. Aphids build up very rapidly and leave copious quantities of honeydew on leaves. Adults POPLAR PETIOLE GALL APHID, Pemphigus and nymphs suck juices from leaves, sapping...

  12. Remote File Access 2010

    E-Print Network [OSTI]

    University of Technology, Sydney

    Remote File Access 2010 Mac Users Guide #12;Remote File Access: MAC Users Guide 2010 2 Table Remote File Access 11 Part IV: Using Remote File Access 15 Part V: FAQ 24 #12;Remote File Access: MAC Users Guide 2010 3 1. What is Remote File Access? UTS Remote File Access service is provided to enable

  13. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect (OSTI)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01T23:59:59.000Z

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  14. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  15. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Broader source: Energy.gov (indexed) [DOE]

    A remote user on the local network with the ability to conduct a man-in-the-middle attack can impersonate the kdump SSH server to potentially access information in vmcore dumps...

  16. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Environmental Management (EM)

    This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) attack and e.g. disclose potentially sensitive information. IMPACT: A remote user can spoof...

  17. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Energy Savers [EERE]

    Service Pack 1 ABSTRACT: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS sessions. reference LINKS: Microsoft Security Advisory (2588513)...

  18. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were...

  19. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks PLATFORM: Google Chrome prior to 27.0.1453.116 ABSTRACT: A vulnerability was reported in Google Chrome....

  20. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  1. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  2. Sulfate attack expansion mechanisms

    SciTech Connect (OSTI)

    Müllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15T23:59:59.000Z

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  3. Remote Method Invocation Remote Method Invocation

    E-Print Network [OSTI]

    Hao, Jin-Kao

    Remote Method Invocation Remote Method Invocation Jean-Michel Richer jean-michel.richer@univ-angers.fr http://www.info.univ-angers.fr/pub/richer M2 Informatique 2010-2011 1 / 22 #12;Remote Method Invocation Plan Plan 1 Introduction 2 RMI en d´etails 3 Exemple 4 Application 2 / 22 #12;Remote Method Invocation

  4. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  5. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  6. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12T23:59:59.000Z

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  7. Modeling modern network attacks and countermeasures using attack graphs

    E-Print Network [OSTI]

    Ingols, Kyle W.

    By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements ...

  8. Handleiding Remote Desktop Service

    E-Print Network [OSTI]

    Galis, Frietson

    Handleiding Remote Desktop Service Versie: 1.3 Remote Desktop Datum: 29-08-2013 #12;2 Configureren Remote Desktop Connection 1) Type in de zoekbalk van Windows 7: "remote" of "mstsc" en start de applicatie "Remote Desktop Connection" zoals in onderstaand voorbeeld wordt getoond. 2) Selecteer "Show

  9. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements Recently ApprovedReliability Technology earnsRemembering 9-11'sRemote

  10. Genetic attack on neural cryptography

    SciTech Connect (OSTI)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido [Institut fuer Theoretische Physik, Universitaet Wuerzburg, Am Hubland, 97074 Wuerzburg (Germany); Minerva Center and Department of Physics, Bar Ilan University, Ramat Gan 52900 (Israel)

    2006-03-15T23:59:59.000Z

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Framework and Roadmap for Smart Grid Interoperability Stan-

  12. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  13. Another Generalization of Wiener's Attack on RSA

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

  14. Sandia National Laboratories: REMOTE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    REMOTE Sandia to Partner with MOgene Green Chemicals on ARPA-E REMOTE Project On October 2, 2013, in Energy, News, News & Events, Partnership, Research & Capabilities,...

  15. Multiple node remote messaging

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Steinmacher-Burow, Burkhard (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-08-31T23:59:59.000Z

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  16. Abstract--By penetrating the SCADA system, an intruder may remotely operate a power system using supervisory control

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    1 Abstract-- By penetrating the SCADA system, an intruder may remotely operate a power system using vulnerability using attack trees. The attack tree formulation based on power system control networks is used to evaluate the system, scenario, and leaf vulnerabilities. The measure of vulnerabilities in the power system

  17. HAN Attack Surface and the Open Smart Energy Gateway Project

    E-Print Network [OSTI]

    Searle, Justin

    2014-01-01T23:59:59.000Z

    HAN  Attack  Surface  and  the  Open  Smart   Energy  of  California.   HAN  Attack  Surface  and  the  Open  vulnerable  to  cyber   attacks  (i.e.  “hacking”)  and  

  18. The Attack on Planned Parenthood: A Historical Analysis

    E-Print Network [OSTI]

    Primrose, Sarah

    2012-01-01T23:59:59.000Z

    Party Republicans' Latest Attack on Women's Health and Birthtea-party-republicans-latest-attack-womens-health- birth-ARTICLES THE ATTACK ON PLANNED PARENTHOOD: A HISTORICAL

  19. attack synthetic polymers: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  20. attacks draft resolution: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  1. armed attacks draft: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  2. amyloid oxidative attack: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  3. A "Poisoning" Attack Against Online Anomaly Detection

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    A "Poisoning" Attack Against Online Anomaly Detection Marius Kloft Department of Computer Science it is robust against targeted "poisoning" attacks. The latter have been first investigated by Nelson et al. [1 of all data points observed so far. The key idea of a poisoning attack is to insert specially crafted

  4. The Sybil Attack John R. Douceur

    E-Print Network [OSTI]

    Keinan, Alon

    1 The Sybil Attack John R. Douceur Microsoft Research johndo@microsoft.com "One can have, some undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks

  5. The GHS Attack Revisited Computer Science Department,

    E-Print Network [OSTI]

    Hess, Florian

    The GHS Attack Revisited F. Hess Computer Science Department, Woodland Road, University of Bristol the number of elliptic curves which succumb to the basic GHS attack, thereby weakening curves over F2155 further. We also discuss other possible extensions or variations of the GHS attack and conclude

  6. Vulnerability Discovery with Attack IEEE Transactions on Software Engineering (2010)

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    2010-01-01T23:59:59.000Z

    : Monitor target system's state while executing attacks in 3 ways Overview of tool AJECT #12;Attack generate attacks in 4 ways Injection phase: Execute previously generated test cases(attacks) Monitoring

  7. ENGO 435 Remote Sensing LAB 1: INTRODUCTION TO REMOTE SENSING

    E-Print Network [OSTI]

    Habib, Ayman

    ENGO 435 ­ Remote Sensing Fall 2003 LAB 1: INTRODUCTION TO REMOTE SENSING Due: By 4:30 pm on September 30th Objectives: To familiarize you with: Remote sensing resources on the Internet. Some remote (Metadata). Part A: Remote Sensing Resources There is a wealth of remote sensing information and data

  8. Remote Desktop | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Desktop Use a remote desktop connection to access your work computer from home. Using Remote Desktop to Connect to Your Work Computer With Remote Desktop, you can have...

  9. T-686: IBM Tivoli Integrated Portal Java Double Literal Denial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    August 8, 2011 - 3:00pm Addthis PROBLEM: A vulnerability in the Java Runtime Environment allows unauthenticated network attacks ( i.e. it may be exploited over a...

  10. The Cost of Attack in Competing Networks

    E-Print Network [OSTI]

    Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

    2015-01-01T23:59:59.000Z

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

  11. Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple

    E-Print Network [OSTI]

    Zincir-Heywood, Nur

    Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating weaknesses of detectors. In this work, we

  12. Remote File PC Users Guide

    E-Print Network [OSTI]

    University of Technology, Sydney

    UTS: ITD Remote File Access 2010 PC Users Guide V3.0 #12;UTS:ITD Remote File Access: PC Users Guide Part III: Accessing Remote File Access 8 Part IV: Using Remote File Access 14 Part V: FAQ 25 #12;UTS:ITD Remote File Access: PC Users Guide v3.0 2010 3 1. What is Remote File Access? UTS Remote File Access

  13. Remote Sensing ENGO 435 Introduction to Remote Sensing

    E-Print Network [OSTI]

    Habib, Ayman

    1 Remote Sensing ENGO 435 Introduction to Remote Sensing Fall 2003 #12;2 Remote Sensing ENGO 435://www.geomatics.ucalgar.ca/~habib/courses.html #12;3 Remote Sensing ENGO 435 Grading Scheme · Lab Assignments (5 labs): (25% of Total Grade will be reduced by 10% per day for each day overdue. #12;4 Remote Sensing ENGO 435 Programming & Software

  14. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, Russell E. (West Melbourne, FL)

    1987-01-01T23:59:59.000Z

    A remote reset circuit acts as a stand-alone monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients.

  15. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  16. Remote Systems Design & Deployment

    SciTech Connect (OSTI)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28T23:59:59.000Z

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  17. Remote Belief: Preserving Volition 2 Remote Belief: Preserving Volition 3

    E-Print Network [OSTI]

    Sivilotti, Paul

    1 ! " Remote Belief: Preserving Volition 2 # $ % & # ' # (& #) & $ $ $ $ $ & $ * # # $ $ * # * # $ $ # $ & # * & & %+ $ ' # & $ Remote Belief: Preserving Volition 3 , $ (- ). / $ / $ / 0 1/ / & $ / 0 $ $ & (1 - & ) 2 & # & $ & / 3 & / * # $ / 4 & Remote Belief: Preserving Volition 4 ! All possible scenarios Equivalence classes of scenarios

  18. The Zombie Attack on the Computational Conception of Mind

    E-Print Network [OSTI]

    Bringsjord, Selmer

    The Zombie Attack on the Computational Conception of Mind Selmer Bringsjord Department defense of the zombie attack against computationalism. Dennett, more than any other thinker, says, rigorous attack on computationalism -- the zombie attack. If this attack is sound, it will follow not only

  19. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  20. Remote USB Ports

    E-Print Network [OSTI]

    Roshan, Rakesh

    2013-10-01T23:59:59.000Z

    or actuator placed in fields can be accessed by a system remotely and securely. In this thesis, we propose a remote USB port, which is an abstraction of a USB port. In the USB core driver of the server machine, with the hub information, port status of all...

  1. Remote actuated valve implant

    DOE Patents [OSTI]

    McKnight, Timothy E; Johnson, Anthony; Moise, Jr., Kenneth J; Ericson, Milton Nance; Baba, Justin S; Wilgen, John B; Evans, III, Boyd McCutchen

    2014-02-25T23:59:59.000Z

    Valve implant systems positionable within a flow passage, the systems having an inlet, an outlet, and a remotely activatable valve between the inlet and outlet, with the valves being operable to provide intermittent occlusion of the flow path. A remote field is applied to provide thermal or magnetic activation of the valves.

  2. Managing Attack Graph Complexity Through Visual Hierarchical Aggregation

    E-Print Network [OSTI]

    Noel, Steven

    Managing Attack Graph Complexity Through Visual Hierarchical Aggregation Steven Noel Center a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation collapses non-overlapping subgraphs of the attack graph

  3. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  4. The GHS Attack in odd Characteristic Claus Diem

    E-Print Network [OSTI]

    Diem, Claus

    The GHS Attack in odd Characteristic Claus Diem March 24, 2003 Abstract The GHS attack is originally an approach to attack the discrete- logarithm problem (DLP) in the group of rational points

  5. GARNET : a Graphical Attack graph and Reachability Network Evaluation Tool

    E-Print Network [OSTI]

    Williams, Leevar (Leevar Christoff)

    2008-01-01T23:59:59.000Z

    Attack graphs are valuable tools in the assessment of network security, revealing potential attack paths an adversary could use to gain control of network assets. Creating an effective visualization for attack graphs is ...

  6. Jaguar Attack on a Child: Case Report and Literature Review

    E-Print Network [OSTI]

    Iserson, Kenneth V.; Francis, Adama M.

    2015-01-01T23:59:59.000Z

    Harlan G. Fatal Big Cat Attacks. Am J Forensic Med Pathol.Iserson et al. Jaguar Attack on a Child 18. Rabinowitz AR,SM, Mills A, Shoff WH. Human attacks by large 25. Bahram R,

  7. Evaluation of Profile Injection Attacks In Collaborative Recommender Systems

    E-Print Network [OSTI]

    Schaefer, Marcus

    Evaluation of Profile Injection Attacks In Collaborative Recommender Systems Chad Williams, Runa recommender systems. The open nature of collaborative filtering allows attackers to inject biased profile data identified attack profiles. Second, we analyze the effectiveness of a supervised classification approach

  8. Modeling Attacks on Physical Unclonable Functions Ulrich Rhrmair

    E-Print Network [OSTI]

    against these problems, but they all rest on the concept of a secret binary key. Classical cryp- tography, semi-invasive, or side-channel attacks, as well as software attacks like API- attacks and viruses, can

  9. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01T23:59:59.000Z

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  10. A Scalable Framework for Cyber Attack Discovery and Situational...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

  11. Center for Remote Sensing Remote Sensing Seminar Series 2009

    E-Print Network [OSTI]

    Firestone, Jeremy

    Feili Li Center for Remote Sensing 10-20-2009 Remote Sensing Seminar Series 2009 #12;Outline for Meteorological Satellite Studies · University of South Florida - Institute for Marine Remote Sensing · Rutgers MODIS Today Real-Time Polar Remote Sensing Products #12;Software Visualization FlAniS AniS is still

  12. REMOTE SENSING OF THE ENVIRONMENT

    E-Print Network [OSTI]

    Gilbes, Fernando

    1 CHAPTER 1: REMOTE SENSING OF THE ENVIRONMENT REFERENCE: Remote Sensing of the Environment John R. Jensen (2007) Second Edition Pearson Prentice Hall What is Remote Sensing? #12;2 Photogrammetry ­ the art of identifying objects and judging their significance (Colwell, 1966). Remote Sensing ­ the measurement

  13. On traffic analysis attacks and countermeasures

    E-Print Network [OSTI]

    Fu, Xinwen

    2007-04-25T23:59:59.000Z

    . This is true even if some commonly used countermeasures (e.g., link padding) have been deployed. We proposed an alternative effective countermeasure to counter this passive traffic analysis attack. Our extensive experimental results indicated...

  14. Thermal Infrared Remote Sensing

    E-Print Network [OSTI]

    Thermal Infrared Remote Sensing Thermal Infrared Remote Sensing #12;0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4 and x-ray Ultraviolet Infrared Microwave and radio waves Wavelength in meters (m) Electromagnetic.77 700 red limit 30k0.041 2.48 green500 near-infrared far infrared ultraviolet Thermal Infrare refers

  15. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, Joseph (Las Cruces, NM); Olsen, Khris (Richland, WA); Larson, David (Las Cruces, NM)

    1997-01-01T23:59:59.000Z

    An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

  16. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31T23:59:59.000Z

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  17. Practical Electromagnetic Template Attack on Pierre-Alain Fouque1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals and can configure it, the attack recovers the secret key by monitoring a single execution of HMAC- SHA-1

  18. Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices

    E-Print Network [OSTI]

    Noel, Steven

    Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices Steven Noel}@gmu.edu Abstract We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show attacker reachability across

  19. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect (OSTI)

    Peng Liu

    2005-11-28T23:59:59.000Z

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  20. Towards Attack-Agnostic Defenses David Brumley and Dawn Song

    E-Print Network [OSTI]

    Brumley, David

    Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract Internet attackers control hundreds of thousands to per- haps millions of computers, which they can use for a va- riety of different attacks. Common attacks include spam delivery, phishing, and DDo

  1. A Probabilistic Routing Disruption Attack on DSR and Its Analysis

    E-Print Network [OSTI]

    Levi, Albert

    A Probabilistic Routing Disruption Attack on DSR and Its Analysis Ă?zleyi Ocakolu, Burak Bayolu}@sabanciuniv.edu Abstract -- In this paper, we propose an attack model against DSR ad hoc network routing protocol and analyze the effects of this attack model on DSR route discovery mechanism. The analysis of the attack

  2. The GHS Attack in odd Characteristic March 24, 2003

    E-Print Network [OSTI]

    Diem, Claus

    The GHS Attack in odd Characteristic Claus Diem March 24, 2003 Abstract The GHS attack is originally an approach to attack the discrete- logarithm problem (DLP) in the group of rational points. In this article we give a generalization of the attack to degree 0 class groups of (hyper-)elliptic curves over

  3. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

  4. Attack Containment Framework for Large-Scale Critical Infrastructures

    E-Print Network [OSTI]

    Nahrstedt, Klara

    Attack Containment Framework for Large-Scale Critical Infrastructures Hoang Nguyen Department-- We present an attack containment framework against value-changing attacks in large-scale critical structure, called attack container, which captures the trust behavior of a group of nodes and assists

  5. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

    1991-03-12T23:59:59.000Z

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

  6. Lessons Learned From Previous SSL/TLS Attacks A Brief Chronology Of Attacks And Weaknesses

    E-Print Network [OSTI]

    Lessons Learned From Previous SSL/TLS Attacks A Brief Chronology Of Attacks And Weaknesses in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data

  7. Remote connector development study

    SciTech Connect (OSTI)

    Parazin, R.J.

    1995-05-01T23:59:59.000Z

    Plutonium-uranium extraction (PUREX) connectors, the most common connectors used at the Hanford site, offer a certain level of flexibility in pipe routing, process system configuration, and remote equipment/instrument replacement. However, these desirable features have inherent shortcomings like leakage, high pressure drop through the right angle bends, and a limited range of available pipe diameters that can be connect by them. Costs for construction, maintenance, and operation of PUREX connectors seem to be very high. The PUREX connector designs include a 90{degree} bend in each connector. This increases the pressure drop and erosion effects. Thus, each jumper requires at least two 90{degree} bends. PUREX connectors have not been practically used beyond 100 (4 in.) inner diameter. This study represents the results of a survey on the use of remote pipe-connection systems in US and foreign plants. This study also describes the interdependence between connectors, remote handling equipment, and the necessary skills of the operators.

  8. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, J.; Olsen, K.; Larson, D.

    1997-10-14T23:59:59.000Z

    An electrochemical sensor is described for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis. 21 figs.

  9. rfs Remote File System Softwarepraktikum fur Fortgeschrittene

    E-Print Network [OSTI]

    rfs ­ Remote File System Softwarepraktikum f¨ur Fortgeschrittene Parallele und Verteilte Systeme. Overview 5 2.1. Remote File System Daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2. Remote File System Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3. Global Remote

  10. Interpreting Remote Sensing NOx Measurements

    E-Print Network [OSTI]

    Denver, University of

    Interpreting Remote Sensing NOx Measurements Robert Slott, Consultant, Donald Stedman and Saj tailpipe emissions (HC, CO, NOx) are changing with time hUse remote sensing hMeasurements in at least 4 of the year at each location hUniform QC/QA and data reporting Paper # 2001-01-3640 #12;Remote Sensing

  11. Remote Implementation of Quantum Operations

    E-Print Network [OSTI]

    Susana F. Huelga; Martin B. Plenio; Guo-Yong Xiang; Jian Li}and Guang-Can Guo

    2005-09-08T23:59:59.000Z

    Shared entanglement allows, under certain conditions, the remote implementation of quantum operations. We revise and extend recent theoretical results on the remote control of quantum systems as well as experimental results on the remote manipulation of photonic qubits via linear optical elements.

  12. Vacuum Vessel Remote Handling

    E-Print Network [OSTI]

    and Remote Handling 4 Vacuum vessel functions · Plasma vacuum environment · Primary tritium confinement, incl ports 65 tonnes - Weight of torus shielding 100 tonnes · Coolant - Normal Operation Water, Handling 12 Vessel octant subassembly fab. (3) · Octant-to-octant splice joint requires double wall weld

  13. Remote Sensing Ayman F. Habib Introduction

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 1 Introduction #12;Remote Sensing Ayman F. Habib 2 Overview · Remote sensing: definition. · Remote sensing versus photogrammetry. · Elements of remote sensing. · Key;Remote Sensing Ayman F. Habib 3 Overview · Acquisition platforms: ­ Historical overview. ­ Terrestrial

  14. How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack

    E-Print Network [OSTI]

    Duan, Yitao; Canny, J

    2006-01-01T23:59:59.000Z

    adaptive chosen ciphertext attack. In: CRYPTO 1998. Volumeagainst chosen cipher- text attack. J. Cryptology 15 (2002)against chosen- ciphertext attacks. In: ASIACRYPT 2001.

  15. The Procedural Attack on Civil Rights: The Empirical Reality of Buckhannon for the Private Attorney General

    E-Print Network [OSTI]

    Albiston, Catherine R.; Nielsen, Laura Beth

    2006-01-01T23:59:59.000Z

    emphasis added). Procedural Attack on Civil Rights contraryat 1 (1976). Procedural Attack on Civil Rights plaintiffs357, 367 & Procedural Attack on Civil Rights fee recovery

  16. Predicting the effect of climate change on wildfire behavior and initial attack success

    E-Print Network [OSTI]

    Fried, Jeremy S.

    2008-01-01T23:59:59.000Z

    wildfire behavior and initial attack success Van Rheenen, N.2006a. “Analysing initial attack on wildland fires usingwildfire behavior and initial attack success Fried, J.S. ,

  17. Responding to the Risk of White Shark Attack Updated Statistics, Prevention, Control

    E-Print Network [OSTI]

    Klimley, A. Peter

    477 CHAPTER 31 Responding to the Risk of White Shark Attack Updated Statistics, Prevention, Control ................................................................................................................................... 478 White Shark Attack Statistics........................................................................................................ 479 Definition of Shark Attack

  18. Heart Disease and Early Heart Attack Care

    E-Print Network [OSTI]

    Ohta, Shigemi

    Heart Disease and Early Heart Attack Care Pamela Kostic, RN, CCCC, Chest Pain Coordinator, Stony Risk Factors · EHAC & Prevention #12;Heart disease includes a number of problems affecting the heart and the blood vessels in the heart. #12;Types of heart disease include: · Coronary artery disease (CAD) · Angina

  19. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber...

  20. On attack correlation and the benefits of sharing IDS data

    E-Print Network [OSTI]

    Katti, Sachin (Katti Rajsekhar)

    2005-01-01T23:59:59.000Z

    This thesis presents the first wide-scale study of correlated attacks, i.e., attacks mounted by the same source IP against different networks. Using a large dataset from 1700 intrusion detection systems (IDSs), this thesis ...

  1. Remote Sensing Laboratory - RSL

    ScienceCinema (OSTI)

    None

    2015-01-09T23:59:59.000Z

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  2. Remote Sensing Laboratory - RSL

    SciTech Connect (OSTI)

    None

    2014-11-06T23:59:59.000Z

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  3. Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    1 Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs Steven Noel and Sushil optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph. The set of all such paths through the network constitutes an attack graph, which we aggregate according

  4. A FOUNDATION FOR INITIAL ATTACK SIMULATION: THE FRIED AND FRIED

    E-Print Network [OSTI]

    Fried, Jeremy S.

    A FOUNDATION FOR INITIAL ATTACK SIMULATION: THE FRIED AND FRIED FIRE CONTAINMENT MODEL Jeremy S, contemporary initial attack models, such as the California Fire Economics Simulator (CFES) ver- sion 2 simulation of any mathematically representable fire shape, provides for "head" and "tail" attack tactics

  5. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

    E-Print Network [OSTI]

    Zenner, Erik

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack Gregor Leander, Mohamed Ahmed PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1] that breaks less than half of the rounds. In this paper, we

  6. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

  7. Attack Detection and Identification in Cyber-Physical Systems

    E-Print Network [OSTI]

    Bullo, Francesco

    Attack Detection and Identification in Cyber-Physical Systems Fabio Pasqualetti, Florian D of unforeseen failures and external malicious attacks. In this paper (i) we propose a mathematical framework for cyber- physical systems, attacks, and monitors; (ii) we characterize fundamental monitoring limitations

  8. A Fast Eavesdropping Attack Against Touchscreens Federico Maggi

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Fast Eavesdropping Attack Against Touchscreens Federico Maggi Alberto Volpatto Politecnico di, we arise this concern by presenting an automatic attack against mod- ern touchscreen keyboards. We demonstrate the attack against the Apple iPhone--2010's most popular touchscreen device-- although it can

  9. Attack-Resilient Time Synchronization for Wireless Sensor Networks

    E-Print Network [OSTI]

    Yener, Aylin

    Attack-Resilient Time Synchronization for Wireless Sensor Networks Hui Song, Sencun Zhu in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effective to several representative time

  10. Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda Symantec Research Labs In its most general form, an attack signature is a program that can correctly determine if an input network packet se- quence can successfully attack a protected network appli- cation. Filter rules used

  11. Architectural Support for Automated Software Attack Detection, Recovery, and Prevention

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Architectural Support for Automated Software Attack Detection, Recovery, and Prevention Jesse University Ames, IA 50011, USA Email: {jsathre, abaumgar, zambreno}@iastate.edu Abstract--Attacks on software systems architecture aimed at attack detection. Traditional techniques ignore the arguably more important

  12. Efficient DHT attack mitigation through peers' ID distribution

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Efficient DHT attack mitigation through peers' ID distribution Thibault Cholez, Isabelle Chrisment.festor}@loria.fr Abstract--We present a new solution to protect the widely deployed KAD DHT against localized attacks which DHT attacks by comparing real peers' ID distributions to the theoretical one thanks to the Kullback

  13. Extending the GHS Weil Descent Attack No Author Given

    E-Print Network [OSTI]

    Hess, Florian

    Extending the GHS Weil Descent Attack No Author Given No Institute Given Abstract. In this paper we extend the Weil descent attack due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack applies to elds of composite degree over F2 . The principle behind

  14. ICMP: an Attack Vector against IPsec Gateways Ludovic Jacquin

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ICMP: an Attack Vector against IPsec Gateways Ludovic Jacquin Inria, France ludovic Protocol (ICMP) can be used as an attack vector against IPsec gateways. The main contribution of this work is to demonstrate that an attacker having eavesdropping and traffic injection capabilities in the black untrusted

  15. Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek

    E-Print Network [OSTI]

    Smith, Sean W.

    Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek Dartmouth College Hanover, NH College Hanover, NH 03755 sws@cs.dartmouth.edu ABSTRACT Currently, work on malware attack and defense become the launching point for many attacks on the enterprise network in which the embedded devices

  16. On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks

    E-Print Network [OSTI]

    Bremler-Barr, Anat

    results as well. Keywords: DDoS, Network Hardware, Hash , Peacock, Cuckoo. 1 Introduction Modern high. Such network hardware elements are highly preferable targets for DDoS (Distributed Denial of Service) attacks with knowledge about how the system works, an attacker can perform a low-bandwidth sophisticated DDoS attack

  17. Remote switch actuator

    DOE Patents [OSTI]

    Haas, Edwin Gerard; Beauman, Ronald; Palo, Jr., Stefan

    2013-01-29T23:59:59.000Z

    The invention provides a device and method for actuating electrical switches remotely. The device is removably attached to the switch and is actuated through the transfer of a user's force. The user is able to remain physically removed from the switch site obviating need for protective equipment. The device and method allow rapid, safe actuation of high-voltage or high-current carrying electrical switches or circuit breakers.

  18. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

    1997-12-16T23:59:59.000Z

    A remote appliance for supporting a tool for performing work at a work site on a substantially circular bore of a work piece and for providing video signals of the work site to a remote monitor comprises: a base plate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the base plate and positioned to roll against the bore of the work piece when the base plate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the base plate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the base plate such that the working end of the tool is positioned on the inner face side of the base plate; a camera for providing video signals of the work site to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the base plate, the camera holding means being adjustably attached to the outer face of the base plate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris. 5 figs.

  19. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, Frederick K. (Ballston Spa, NY); Wilkinson, Jay C. (Ballston Spa, NY); Wooding, David R. (Saratoga Springs, NY)

    1997-01-01T23:59:59.000Z

    A remote appliance for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

  20. Mitigation of Malicious Attacks on Networks

    E-Print Network [OSTI]

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01T23:59:59.000Z

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  1. Satellite Threat Warning and Attack Reporting

    SciTech Connect (OSTI)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31T23:59:59.000Z

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  2. Third Party CNOT Attack on MDI QKD

    E-Print Network [OSTI]

    Arpita Maitra

    2012-09-06T23:59:59.000Z

    In this letter, we concentrate on the very recently proposed Measurement Device Independent Quantum Key Distribution (MDI QKD) protocol by Lo, Curty and Qi (PRL, 2012). We study how one can suitably present an eavesdropping strategy on MDI QKD, that is in the direction of the fundamental CNOT attack on BB84 protocol, though our approach is quite different. In this strategy, Eve will be able to know expected half of the secret bits communicated between Alice and Bob with certainty (probability 1) without introducing any error. Further, for the remaining bits, where Eve will only be able to predict the bit values as in random guess (with probability 1/2), she will certainly find out whether her interaction induced an error in the secret bits between the communicating parties. Given the asymmetric nature of the CNOT attack, we also introduce Hadamard gates to present a symmetric version. Though our analysis does not refute the security claims in MDI QKD, adapting the CNOT attack in this scenario requires nontrivial approach using entanglement swapping.

  3. Remote state preparation: arbitrary remote control of photon polarization Nicholas A. Peters,1

    E-Print Network [OSTI]

    Kwiat, Paul

    Remote state preparation: arbitrary remote control of photon polarization Nicholas A. Peters,1 University, Kirksville, MO 63501 (Dated: October 22, 2004) We experimentally demonstrate the first remote, we remotely prepare arbitrary states at two wavelengths. Further, we derive theoretical bounds

  4. Sequential Defense Against Random and Intentional Attacks in Complex Networks

    E-Print Network [OSTI]

    Chen, Pin-Yu

    2015-01-01T23:59:59.000Z

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is firstly proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and valida...

  5. ICC 2006 SUBMISSION 1 On the Impact of Low-Rate Attacks

    E-Print Network [OSTI]

    Guirguis, Mina S. - Department of Computer Science, Texas State University

    -Rate Attacks; I. INTRODUCTION Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks study the impact of these new breeds of attacks and the extent to which defense mechanisms are capable potentially have high attack potency per attack burst. Our analysis is focused towards worst-case scenarios

  6. REMOTE AND RURAL ENTERPRISE (RARE)

    E-Print Network [OSTI]

    Viglas, Anastasios

    in remote central Australia is establishing a commercial aquaponics enterprise, a social entrepreneur, hospitality and horticulture. The current focus is on a commercial aquaponics enterprise and a cultural

  7. Remote Sensor Placement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote AccessSpectrum

  8. Remote-State Prparation eines einzelnen Atoms

    E-Print Network [OSTI]

    Weinfurter, Harald

    Remote-State Präparation eines einzelnen Atoms Diplomarbeit am Department für Physik der Ludwig . . . . . . . . . . . . . . . . . . . . . 8 1.3.3 Remote-State-Präparation . . . . . . . . . . . . . . . . . . . . . 11 1.3.4 Zusammenfassung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3 Remote-State-Präparation 31 3.1 Einleitung

  9. Remotely operated pipe connector

    DOE Patents [OSTI]

    Josefiak, Leonard J. (Scotia, NY); Cramer, Charles E. (Guilderford, NY)

    1988-01-01T23:59:59.000Z

    An apparatus for remotely assembling and disassembling a Graylock type coctor between a pipe and a closure for the pipe includes a base and a receptacle on the base for the closure. The pipe is moved into position vertically above the closure by a suitable positioning device such that the flange on the pipe is immediately adjacent and concentric with the flange on the closure. A moving device then moves two semicircular collars from a position free of the closure to a position such that the interior cam groove of each collar contacts the two flanges. Finally, a tensioning device automatically allows remote tightening and loosening of a nut and bolt assembly on each side of the collar to cause a seal ring located between the flanges to be compressed and to seal the closure. Release of the pipe and the connector is accomplished in the reverse order. Preferably, the nut and bolt assembly includes an elongate shaft portion on which a removable sleeve is located.

  10. The Impact of Imperfect Information on Network Attack

    E-Print Network [OSTI]

    Melchionna, Andrew; Squires, Shane; Antonsen, Thomas M; Ott, Edward; Girvan, Michelle

    2014-01-01T23:59:59.000Z

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erd\\H{o}s-R\\'enyi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erd\\H{o}os-R\\'enyi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links.

  11. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  12. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28T23:59:59.000Z

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  13. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F. (Schenectady, NY); Buono, Donald P. (Schenectady, NY)

    1983-01-01T23:59:59.000Z

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  14. active attack tegutsevad: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    traffic. Although it is difficult to detect shrew DDo Chen, Yu 83 Timing analysis in low-latency mix networks: attacks and defenses Computer Technologies and Information Sciences...

  15. attack detection system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is presented Autonoma de Madrid, Universidad 51 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  16. attack model development: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    than the traditional alert correlations. Wei Yan 89 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  17. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL

    2014-01-01T23:59:59.000Z

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  18. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection...

  19. Remote Method Invocations 13.1 Introduction

    E-Print Network [OSTI]

    Garg, Vijay

    Chapter 13 Remote Method Invocations 13.1 Introduction A popular way of developing distributed applications is based on the concept of remote procedure calls (RPC's) or remote method invocations (RMI's). Here the main idea is that a process can make calls to methods of a remote object as if it were

  20. Remote Sensing Ayman F. Habib Image Classification

    E-Print Network [OSTI]

    Habib, Ayman

    1 Remote Sensing Ayman F. Habib 1 Chapter 6 Image Classification Remote Sensing Ayman F. Habib 2. ­ Unsupervised classification. · Accuracy assessment. #12;2 Remote Sensing Ayman F. Habib 3 Image Classification of image pixels is based on their digital numbers/grey values in one or more spectral bands. Remote Sensing

  1. Remote Sensing Ayman F. Habib Radiometric Processing of Remote Sensing Data

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 4 Radiometric Processing of Remote Sensing Data #12;Remote. · Noise removal. · Point and edge detection. ­ Frequency domain. #12;Remote Sensing Ayman F. Habib 3 Radiometric Calibration #12;Remote Sensing Ayman F. Habib 4 Recorded Digital Numbers (DN) · Recorded grey

  2. Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways Ludovic Jacquin Inria the "Packet Too Big"-"Packet Too Small" ICMP based attack against IPsec gateways. We explain how an attacker in use, the attack either creates a Denial of Service or major performance penalties. This attack

  3. Chit-based Remote Storage

    E-Print Network [OSTI]

    Paluska, Justin Mazzola

    We propose a model for reliable remote storage founded on contract law. Consumers submit their bits to storage providers in exchange for a chit. A chit is a cryptographically secure, verifiable contract between a consumer ...

  4. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  5. Defending Systems Against Application-Level Denial of Service Attacks

    E-Print Network [OSTI]

    Keidar, Idit

    Systems Against Application-Level Denial of Service Attacks Research Thesis Submitted in Partial of the Technion -- Israel Institute of Technology HESHVAN 5768 HAIFA NOVEMBER 2007 #12;#12;The Research Thesis with a Single Port . . . . . . . . . . . 66 5.3.1 Blind Attack

  6. Stealthy Poisoning Attacks on PCA-based Anomaly Detectors

    E-Print Network [OSTI]

    Tygar, Doug

    Stealthy Poisoning Attacks on PCA-based Anomaly Detectors Benjamin I. P. Rubinstein1 Blaine Nelson1 detection, we present and evaluate short-term and long-term data poison- ing schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boil- ing Frog attacks

  7. Forging Attacks on two Authenticated Encryptions COBRA and POET

    E-Print Network [OSTI]

    Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

  8. Avoiding the Detector Blinding Attack on Quantum Cryptography

    E-Print Network [OSTI]

    Z L Yuan; J F Dynes; A J Shields

    2010-09-30T23:59:59.000Z

    We show the detector blinding attack by Lydersen et al [1] will be ineffective on most single photon avalanche photodiodes (APDs) and certainly ineffective on any detectors that are operated correctly. The attack is only successful if a redundant resistor is included in series with the APD, or if the detector discrimination levels are set inappropriately.

  9. Combined Modeling and Side Channel Attacks on Strong PUFs

    E-Print Network [OSTI]

    , unknown to the adversary. This requirement can be difficult to uphold in practice: Physical attacks like- tacks on PUF core properties have been reported. They con- cern their physical and digital unclonability, for example, we report successful attacks for bitlengths of 64, 128 and 256, and for up to nine single Arbiter

  10. Thomas E. Hinds Although many diseases attack aspen, relatively few

    E-Print Network [OSTI]

    DISEASES Thomas E. Hinds Although many diseases attack aspen, relatively few kill or seriously of aspen, whereas there are subtle differ- ences in distribution between the important decay fungi. Foliage Diseases Fungus Diseases Many fungi are capable of attacking aspen leaves, from juvenile growth

  11. Energy Attacks and Defense Techniques for Wireless Systems

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    propose a hardware- based energy attack, namely energy hardware Trojans (HTs), which can be well hidden of these applications, security and integrity of the devices have become a critical concern. Due to the mobile and wire the phone. We target on the energy attacks on wireless systems caused by hardware Trojans (HTs), which

  12. Heart Attack Survival Plan Information To Share With

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

  13. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we precisely define corrupted packets in inter-session pollution based

  14. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we first define precisely corrupted packets in inter-session pollution based

  15. Energy-Based Attack Detection in Networked Control Emeka Eyisi

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    systems includ- ing medical devices [13] and waste water treatment plants [1]. In securing CPSEnergy-Based Attack Detection in Networked Control Systems Emeka Eyisi United Technologies Research.koutsoukos@vanderbilt.edu ABSTRACT The increased prevalence of attacks on Cyber-Physical Systems (CPS) as well as the safety

  16. Cardiologists from CU testing revolutionary heart-attack treatment

    E-Print Network [OSTI]

    Cerveny, Vlastislav

    Cardiologists from CU testing revolutionary heart-attack treatment Compiled 4.12.2013 23 of the biologically degradable stent in the treatment of myocardial infarctions (heart-attacks). The results with a metal stent in their heart for the rest of their life; instead, the stent does its work then disappears

  17. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  18. Fault and Side-Channel Attacks on Pairing Based Cryptography ?

    E-Print Network [OSTI]

    such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

  19. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11T23:59:59.000Z

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  20. Property Rights, Taxpayer Rights, and the Multiscalar Attack on the State: Consequences for Regionalism in the United States

    E-Print Network [OSTI]

    Christopher Niedt; Margaret Weir

    2007-01-01T23:59:59.000Z

    and the Multiscalar Attack on the State: Consequences forand the multiscalar attack on the state: Consequences forand the multiscalar attack on the state: Consequences for

  1. Network attack detection and defense – Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008

    E-Print Network [OSTI]

    Carle, Georg; Dressler, Falko; Kemmerer, Richard A.; Koenig, Hartmut; Kruegel, Christopher; Laskov, Pavel

    2009-01-01T23:59:59.000Z

    y REGULÄRE BEITRÄGE Network attack detection and defense –Perspective Workshop Network Attack Detection and Defensefor the detection of network attacks, should more strongly

  2. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  3. Remote monitoring for international safeguards

    SciTech Connect (OSTI)

    Dupree, S.A. [Sandia National Labs., Albuquerque, NM (United States); Sonnier, C.S. [Jupiter Corp., Albuquerque, NM (United States)

    1997-09-01T23:59:59.000Z

    Remote monitoring is not a new technology, and its application to safeguards relevant activities has been examined for a number of years. On behalf of the US Department of Energy and international partners, remote monitoring systems have been emplaced in nuclear facilities and laboratories in various parts of the world. The experience gained from these field trials of remote monitoring systems has shown the viability of the concept of using integrated monitoring systems. Although a wide variety of sensors has been used in the remote monitoring field trials conducted to date, the possible range of instrumentation that might be used has scarcely been touched. As the technology becomes widespread, large amounts of data will become available to inspectors responsible for safeguards activities at the sites. Effective use of remote monitoring will require processing, archiving, presenting, and assessing of these data. To provide reasonable efficiency in the application of this technology, data processing should be done in a careful and organized manner. The problem will be not an issue of poring over scant records but of surviving under a deluge of information made possible by modern technology. Fortunately, modern technology, which created the problem of the data glut, is available to come to the assistance of those inundated by data. Apart from the technological problems, one of the most important aspects of remote monitoring is the potential constraint related to the transmission of data out of a facility or beyond national borders. Remote monitoring across national borders can be seriously considered only in the context of a comprehensive, transparent, and open implementation regime.

  4. Vol. 48 No. SIG 0(PRO 35) 2007 Java Remote GluonJ Remote GluonJ

    E-Print Network [OSTI]

    Chiba, Shigeru

    Vol. 48 No. SIG 0(PRO 35) 2007 Java Remote GluonJ Remote GluonJ Remote GluonJ Remote GluonJ Java Remote GluonJ Remote GluonJ An AOP based Agile Development Environment for Distributed Software Muga/from the existing program easily. To support software development for Java with our method, we developed Remote

  5. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  6. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z. (Mathematics and Computer Science); (FNAL); (Univ. of Wisconsin at Madison)

    2011-01-01T23:59:59.000Z

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  7. E-Print Network 3.0 - abdool karim attacking Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    . We further describe specific attacks on two existing proposals, namely SWATT and ICE-based schemes... , and ar- gue about the difficulty of fixing them. All attacks...

  8. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect (OSTI)

    Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

    2010-10-26T23:59:59.000Z

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  9. Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan Act in Time to Heart Attack Signs Why Your Patients Need To Act in Time to Heart Attack Signs Coronary heart disease a heart attack. About 460,000 of those heart attacks are fatal. Disability and death from heart attack can

  10. Remote Store Programming: Mechanisms and Performance

    E-Print Network [OSTI]

    Wentzlaff, David

    2009-05-05T23:59:59.000Z

    This paper presents remote store programming (RSP). This paradigm combines usability and efficiency through the exploitation of a simple hardware mechanism, the remote store, which can easily be added to existing ...

  11. On the Complexity of Matsui's Attack Pascal Junod

    E-Print Network [OSTI]

    On the Complexity of Matsui's Attack Pascal Junod Security and Cryptography Laboratory Swiss at random and where depends on the key value. Given some plaintext bits Pi1 , . . . , Pir , ciphertext bits

  12. Guessing Attacks and the Computational Soundness of Static Equivalence

    E-Print Network [OSTI]

    Warinschi, Bogdan

    Guessing Attacks and the Computational Soundness of Static Equivalence Martin Abadi1 , Mathieu static equivalence. Static equivalence depends on an underlying equa- tional theory. The choice, fundamental cryp- tographic operations. This equational theory yields a notion of static equivalence

  13. On countermeasures of worm attacks over the Internet 

    E-Print Network [OSTI]

    Yu, Wei

    2009-05-15T23:59:59.000Z

    Worm attacks have always been considered dangerous threats to the Internet since they can infect a large number of computers and consequently cause large-scale service disruptions and damage. Thus, research on modeling ...

  14. Practical Attacks on Digital Signatures Using MD5 Message Digest

    E-Print Network [OSTI]

    schemes based on MD5 message digest on an example using GPG. Keywords: collision, hash function, MD5 1 on digital signatures on an example using GPG (section 5) and finally an exam- ple of real-world attack

  15. After-gate attack on a quantum cryptosystem

    E-Print Network [OSTI]

    Carlos Wiechers; Lars Lydersen; Christoffer Wittmann; Dominique Elser; Johannes Skaar; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2010-09-14T23:59:59.000Z

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  16. Time-shift attack in practical quantum cryptosystems

    E-Print Network [OSTI]

    Bing Qi; Chi-Hang Fred Fung; Hoi-Kwong Lo; Xiongfeng Ma

    2006-05-11T23:59:59.000Z

    Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another "time-shift" attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0" and bit "1" with the same SPD, Eve, in principle, could acquire full information on the final key without introducing any error. Finally, we discuss some counter measures against our and earlier attacks.

  17. Active Attacks Against Modulation-based Radiometric Identification

    E-Print Network [OSTI]

    Bystroff, Chris

    ) may become compromised via physical attacks. In light of these difficulties, researchers have started Science Technical Report 09-02 Matthew Edman and B¨ulent Yener Rensselaer Polytechnic Institute Department

  18. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Hay, David

    Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks Pankaj K. Agarwal, swami}@cs.arizona.edu Electrical Engineering, Columbia University. {hdavid, gil}@ee.columbia.edu Abstract--Telecommunications networks heavily rely on the physical infrastructure and, are therefore

  19. Coordinated Variable Structure Switching Attacks for Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11T23:59:59.000Z

    The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem from the need to develop ...

  20. Real-world Polymorphic Attack Detection Michalis Polychronakis,1

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    proposed network-level emulation, a heuristic detection method that scans network traffic to detect, sophisticated obfuscation schemes. Keywords Polymorphism, intrusion detection, code emulation 1. Introduction them under control for as long as possible. As detection mechanisms improve, attackers employ

  1. Remote Food Shopping Robot System in a Supermarket Realization of the shopping task from remote places

    E-Print Network [OSTI]

    Ohya, Akihisa

    Remote Food Shopping Robot System in a Supermarket ­Realization of the shopping task from remote- ulating remote objects. This system attempts to answer the challenge of extending mobile robot potentials in a supermarket from a remote location using the Internet. We built the prototype system by integrating custom

  2. Remote State Preparation: Arbitrary remote control of photon polarizations for quantum communication

    E-Print Network [OSTI]

    Kwiat, Paul

    Remote State Preparation: Arbitrary remote control of photon polarizations for quantum measurement to one photon of a polarization- entangled pair, we remotely prepare single photons in arbitrary. Finally, we discuss the states remotely preparable given a particular two-qubit resource state. Keywords

  3. Remote Sens. 2011, 3, 2529-2551; doi:10.3390/rs3112529 Remote Sensing

    E-Print Network [OSTI]

    Remote Sens. 2011, 3, 2529-2551; doi:10.3390/rs3112529 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Article Multispectral Remote Sensing from Unmanned Aircraft: Image Processing Workflows and Applications Abstract: Using unmanned aircraft systems (UAS) as remote sensing platforms offers the unique ability

  4. Remote Sens. 2009, 1, 519-533; doi:10.3390/rs1030519 Remote Sensing

    E-Print Network [OSTI]

    MacDonald, Lee

    Remote Sens. 2009, 1, 519-533; doi:10.3390/rs1030519 Remote Sensing ISSN 2072-4292 www of Remotely Sensed Data Paul H. Evangelista 1, *, Thomas J. Stohlgren 2 , Jeffrey T. Morisette 2 and Sunil model (Maxent) for its application and performance in remotely sensing invasive Tamarix sp. Six Landsat

  5. 10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Sensing

    E-Print Network [OSTI]

    Plaza, Antonio J.

    10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Book ReviewBook Review High Performance Computing in Remote Sensing introduces the most recent advances in the incorporation of the high-performance computing (HPC) paradigm in remote sensing missions. Eighteen well

  6. Remote Laboratory Towards an integrated training system

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Remote Laboratory Towards an integrated training system Arnaud LELEVE, Hcene BENMOHAMED, Patrick.Meyer@ictt.ec-lyon.fr Abstract ­ Remote laboratories are essential to e-learning platforms in scientific and technical with the aim of giving means to instructors to build generic remote laboratory environments, homogeneously melt

  7. Remote Sensing for Water Quality Applications

    E-Print Network [OSTI]

    Remote Sensing for Water Quality Applications #12;Objective Give a brief update on GEO Inland and Nearshore Coastal Water Quality Remote Sensing Workshop (GEO Work Task WA-06-01)) Held in Geneva and Nearshore Coastal Water Quality Remote Sensing Workshop (GEO Work Task WA-06-01)) Organizing committee

  8. Remote Batch Invocation for Compositional Object Services

    E-Print Network [OSTI]

    Ryder, Barbara G.

    Remote Batch Invocation for Compositional Object Services Ali Ibrahim2 , Yang Jiao1 , Eli Tilevich1 Remote Procedure Calls do not compose efficiently, design- ers of distributed object systems use Data Transfer and Remote Fac¸ade patterns to create large-granularity interfaces, hard-coded for particular

  9. A REMOTE CONTROLLED UNDERWATER PHOTOGRAPHIC SURVEILLANCE SYSTEM

    E-Print Network [OSTI]

    A REMOTE CONTROLLED UNDERWATER PHOTOGRAPHIC SURVEILLANCE SYSTEM by Paul J. Kruse, Jr. MarineKernan, Director A Remote Controlled Underwater Photographic Surveillance System by Paul J. Kruse, Jr. United. September 1964 #12;#12;CONTENTS Page Introduction 1 Remote controlled photographic system and accessories 1

  10. INTERVAL METHODS IN REMOTE SENSING

    E-Print Network [OSTI]

    Ward, Karen

    INTERVAL METHODS IN REMOTE SENSING: RELIABLE SUB­DIVISION OF GEOLOGICAL AREAS David D. Coblentz, G of the locations which weren't that thoroughly analyzed. 1 #12; 2 The subdivision of a geological zone TOPOGRAPHIC INFORMATION One reason for subjectivity of the geological subdivision is the fact

  11. The Remote Media Immersion (RMI)

    E-Print Network [OSTI]

    Shahabi, Cyrus

    the ultimate digital media delivery platform. Its streaming media server delivers multiple high- bandwidth aspects). The hope is that our advances in digital media delivery will enable new applicationsThe Remote Media Immersion (RMI) system blends multiple cutting- edge media technologies to create

  12. Remote Sensing Ayman F. Habib Electro-Magnetic Radiation

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 2 Electro-Magnetic Radiation #12;Remote Sensing Ayman F. Habib 2 Elements of Remote Sensing #12;Remote Sensing Ayman F. Habib 3 Chapter 2 Radiation: nature & source #12;Remote Sensing Ayman F. Habib 4 Chapter 2 Interaction with the atmosphere #12;Remote Sensing

  13. Remote Sensing Ayman F. Habib Electro-Magnetic Radiation

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 2 Electro-Magnetic Radiation Remote Sensing Ayman F. Habib 2 Elements of Remote Sensing #12;Remote Sensing Ayman F. Habib 3 Chapter 2 Radiation: nature & source Remote Sensing Ayman F. Habib 4 Chapter 2 Interaction with the atmosphere #12;Remote Sensing Ayman

  14. Further Development at JET of Remote Digital Photogrammetry Techniques and Remote Welding Under Conditions of Restricted Access

    E-Print Network [OSTI]

    Further Development at JET of Remote Digital Photogrammetry Techniques and Remote Welding Under Conditions of Restricted Access

  15. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  16. The Remote Photogrammetric Survey and Engineering Analysis of the Divertor Structure during JET’s Remote Tile Exchange

    E-Print Network [OSTI]

    The Remote Photogrammetric Survey and Engineering Analysis of the Divertor Structure during JET’s Remote Tile Exchange

  17. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

  18. Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes Patrick Bas powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies to be able to handle `complex' trellises. Moreover, the ef- ficiency of this attack has been evaluated

  19. New sensitivity analysis attack Maha El Choubassi a and Pierre Moulin b

    E-Print Network [OSTI]

    Moulin, Pierre

    New sensitivity analysis attack Maha El Choubassi a and Pierre Moulin b University of Illinois analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector

  20. Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller

    E-Print Network [OSTI]

    Miller, Barton P.

    Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller January 23, 2004 Abstract A common way to elude a signature-based NIDS is to transform an attack matching between the attack payload and the NIDS signature, attackers split the payload into several TCP

  1. Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack

    E-Print Network [OSTI]

    Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack Jiali Choy, Khoongming Khoo,kkhoongm,lchuanwe@dso.org.sg Abstract. In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits

  2. High-speed Router Filter for Blocking TCP Flooding under DDoS Attack

    E-Print Network [OSTI]

    Chao, Jonathan

    High-speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim',Ju-Yeon Jo', H during the Distributed Denial-oJService (DDoS) attack. By allocating bandwidths separately for TCP.9% of the attack trafic while legitimate traflc showed nearly identical performance as in the non-attacked

  3. CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment

    E-Print Network [OSTI]

    Eustice, Ryan

    CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment Qi Chen, Wenmin Lin-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily, in this paper. Concretely speaking, the method is deployed by two periods, i.e., non-attack period and attack

  4. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks

    E-Print Network [OSTI]

    Krishnamurthy, Srikanth

    TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks Jakob Eriksson attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to this attack use tight clock synchronization

  5. A New Attack on RSA with Two or Three Decryption Exponents

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

  6. Robust Codes for Fault Attack Resistant Cryptographic Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin

    E-Print Network [OSTI]

    Karpovsky, Mark

    Robust Codes for Fault Attack Resistant Cryptographic Hardware Konrad J. Kulikowski, Mark G algorithms are vulner- able to fault analysis attacks. To detect these attacks we propose an architec- ture by an attacker. Architectures based on these codes have fewer undetectable er- rors than linear codes

  7. Analyzing the Security in the GSM Radio Network using Attack Jungles

    E-Print Network [OSTI]

    Abdulla, Parosh Aziz

    Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 introduce the concept of attack jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker

  8. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

  9. Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller

    E-Print Network [OSTI]

    Liblit, Ben

    Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller January 23, 2004 Abstract A common way to elude a signature­based NIDS is to transform an attack matching between the attack payload and the NIDS signature, attackers split the payload into several TCP

  10. Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure to perform advanced attacks. We have experimentally validated the proposed method by attacking a DES

  11. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

  12. Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament

    E-Print Network [OSTI]

    Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament D-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance

  13. Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1

    E-Print Network [OSTI]

    Zhang, Jian

    Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1 , Phillip Porras1 , Johannes- gressive attack sources, as such information can help to proactively defend their networks. For this pur of attacks observed by others. However, the total number of reported attackers is huge in these systems. Thus

  14. Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem, University College Cork Email: {e.popovici}@ucc.ie Abstract-- Side channel attacks such as Simple Power Analy- sis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms

  15. Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament D to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance anal- ysis to information- theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives

  16. From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic

    E-Print Network [OSTI]

    Wang, Wenye

    From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly. In this paper, we aim at modeling and detecting jamming attacks against time-critical traffic. We introduce

  17. Combined Attacks on the AES Key Schedule Francois Dassance and Alexandre Venelli

    E-Print Network [OSTI]

    of physical attack is the Fault Analysis (FA) that evaluates the faulty behavior of a cryptosystem to learn proposed to thwart physical attacks on di#erent cryptosystems. Recently, the principle of combined attacks#erent fault models. We report countermeasures against these attacks on AES in Section 5. We conclude

  18. EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

  19. Combined Attacks on the AES Key Schedule Francois Dassance and Alexandre Venelli

    E-Print Network [OSTI]

    of physical attack is the Fault Analysis (FA) that evaluates the faulty behavior of a cryptosystem to learn proposed to thwart physical attacks on different cryptosystems. Recently, the principle of combined attacks different fault models. We report countermeasures against these attacks on AES in Section 5. We conclude

  20. Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks

    E-Print Network [OSTI]

    Stehr, Mark-Oliver

    Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks is forcibly asked by an attacker to reveal the key. These attacks, known as rubber hose cryptanalysis with conference proceedings. So-called rubber hose attacks have long been the bane of security systems

  1. Learn What a Heart Attack Feels Like--It Could Save Your Life.

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Learn What a Heart Attack Feels Like-- It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do if you are having any of these signs. Take these steps. They could save your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all

  2. Disposable remote zero headspace extractor

    DOE Patents [OSTI]

    Hand, Julie J. (Idaho Falls, ID); Roberts, Mark P. (Arco, ID)

    2006-03-21T23:59:59.000Z

    The remote zero headspace extractor uses a sampling container inside a stainless steel vessel to perform toxicity characteristics leaching procedure to analyze volatile organic compounds. The system uses an in line filter for ease of replacement. This eliminates cleaning and disassembly of the extractor. All connections are made with quick connect fittings which can be easily replaced. After use, the bag can be removed and disposed of, and a new sampling container is inserted for the next extraction.

  3. Remote Sensing R. E. Mcintosh

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote Access

  4. Experience with Remote Job Execution

    SciTech Connect (OSTI)

    Lynch, Vickie E [ORNL; Cobb, John W [ORNL; Green, Mark L [ORNL; Kohl, James Arthur [ORNL; Miller, Stephen D [ORNL; Ren, Shelly [ORNL; Smith, Bradford C [ORNL; Vazhkudai, Sudharshan S [ORNL

    2008-01-01T23:59:59.000Z

    The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

  5. A fundamental threat to quantum cryptography: gravitational attacks

    E-Print Network [OSTI]

    R. Plaga

    2006-03-26T23:59:59.000Z

    An attack on the ``Bennett-Brassard 84''(BB84) quantum key-exchange protocol in which Eve exploits the action of gravitation to infer information about the quantum-mechanical state of the qubit exchanged between Alice and Bob, is described. It is demonstrated that the known laws of physics do not allow to describe the attack. Without making assumptions that are not based on broad consensus, the laws of quantum gravity, unknown up to now, would be needed even for an approximate treatment. Therefore, it is currently not possible to predict with any confidence if information gained in this attack will allow to break BB84. Contrary to previous belief, a proof of the perfect security of BB84 cannot be based on the assumption that the known laws of physics are strictly correct, yet.

  6. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    SciTech Connect (OSTI)

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo'; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10T23:59:59.000Z

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  7. Resilience of Social Networks Under Different Attack Strategies

    E-Print Network [OSTI]

    Latif, Mohammad Ayub; Zaidi, Faraz

    2014-01-01T23:59:59.000Z

    Recent years have seen the world become a closely connected society with the emergence of different types of social networks. Online social networks have provided a way to bridge long distances and establish numerous communication channels which were not possible earlier. These networks exhibit interesting behavior under intentional attacks and random failures where different structural properties influence the resilience in different ways. In this paper, we perform two sets of experiments and draw conclusions from the results pertaining to the resilience of social networks. The first experiment performs a comparative analysis of four different classes of networks namely small world networks, scale free networks, small world-scale free networks and random networks with four semantically different social networks under different attack strategies. The second experiment compares the resilience of these semantically different social networks under different attack strategies. Empirical analysis reveals interesti...

  8. ATTACK BY COLORIZATION OF A GREY-LEVEL IMAGE HIDING ITS COLOR PALETTE Chaumont M. and Puech W.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ATTACK BY COLORIZATION OF A GREY-LEVEL IMAGE HIDING ITS COLOR PALETTE Chaumont M. and Puech W, FRANCE ABSTRACT In this paper, we present a novel attack named colorization attack. This attack of such an attack and thus to take it into account for the future color-hiding watermarking schemes. Index Terms

  9. Remote State Preparation for Quantum Fields

    E-Print Network [OSTI]

    Ran Ber; Erez Zohar

    2015-01-07T23:59:59.000Z

    Remote state preparation is generation of a desired state by a remote observer. In spite of causality, it is well known, according to the Reeh-Schlieder theorem, that it is possible for relativistic quantum field theories, and a "physical" process achieving this task, involving superoscillatory functions, has recently been introduced. In this work we deal with non-relativistic fields, and show that remote state preparation is also possible for them, hence generalizing the Reeh-Schlieder theorem.

  10. Remote Sensing Ayman F. Habib Image Registration & Rectification

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 5 Image Registration & Rectification #12;Remote Sensing: Resampling techniques. #12;Remote Sensing Ayman F. Habib 3 Image Registration #12;Remote Sensing Ayman F be integrated/fused. Object Space Left Image Right Image Image Registration: Objective #12;Remote Sensing Ayman

  11. Remote Sensing Ayman F. Habib Image Registration & Rectification

    E-Print Network [OSTI]

    Habib, Ayman

    1 Remote Sensing Ayman F. Habib 1 Chapter 5 Image Registration & Rectification Remote Sensing Ayman: Resampling techniques. #12;2 Remote Sensing Ayman F. Habib 3 Image Registration Remote Sensing Ayman F. Habib be integrated/fused. Object Space Left Image Right Image Image Registration: Objective #12;3 Remote Sensing

  12. Remote Sensing Ayman F. Habib Data Acquisition Systems

    E-Print Network [OSTI]

    Habib, Ayman

    Remote Sensing Ayman F. Habib 1 Chapter 3 Data Acquisition Systems #12;Remote Sensing Ayman F. ­ Electro-mechanical scanners. #12;Remote Sensing Ayman F. Habib 3 Overview · LIDAR operational principles for recognition and classification purposes. #12;Remote Sensing Ayman F. Habib 4 Remote Sensing Systems Utilized

  13. Sandia National Laboratories: remote sensing devices

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    remote sensing devices Sandia, Endicott Interconnect Technologies, EMCORE, International Micro Industries, NREL, Universal Instruments: Solar Glitter On March 21, 2013, in...

  14. Remote Sens. 2013, 5, 5969-5998; doi:10.3390/rs5115969 Remote Sensing

    E-Print Network [OSTI]

    Crawford, Ian

    Remote Sens. 2013, 5, 5969-5998; doi:10.3390/rs5115969 Remote Sensing ISSN 2072-4292 www, the technique presented in this paper would help them to quantify the impacts of OPEN ACCESS #12;Remote Sens; urban heat island effect; NDVI; artificial neural network; Markov chain; Dhaka 1. Introduction Urban

  15. Remote Sens. 2013, 5, 5173-5192; doi:10.3390/rs5105173 Remote Sensing

    E-Print Network [OSTI]

    Stephens, Scott L.

    Remote Sens. 2013, 5, 5173-5192; doi:10.3390/rs5105173 Remote Sensing ISSN 2072-4292 www for a geosynchronous OPEN ACCESS #12;Remote Sens. 2013, 5 5174 satellite with modern imaging detectors, software, and algorithms able to detect heat from early and small fires, and yield minute-scale detection times. Keywords

  16. Remote Sens. 2013, 5, 1484-1497; doi:10.3390/rs5031484 Remote Sensing

    E-Print Network [OSTI]

    Myneni, Ranga B.

    Remote Sens. 2013, 5, 1484-1497; doi:10.3390/rs5031484 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal and the Community Land Model version 4 (CLM4), we investigated percent changes and controlling factors of global vegetation growth for the period 1982 to 2009. Over that 28-year period, both the remote-sensing estimate

  17. Remote Sens. 2013, 5, 2857-2882; doi:10.3390/rs5062857 Remote Sensing

    E-Print Network [OSTI]

    Myneni, Ranga B.

    Remote Sens. 2013, 5, 2857-2882; doi:10.3390/rs5062857 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Article Evaluation of CLM4 Solar Radiation Partitioning Scheme Using Remote Sensing and Site Level FPAR.e., that of the Community Land Model version 4 (CLM4) with coupled carbon and nitrogen cycles. Taking advantage of a unique

  18. CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of

    E-Print Network [OSTI]

    Gilbes, Fernando

    - and middle-infrared regions, water bodies appear very dark even black becausebodies appear very dark, even and pure and contains little suspended sediment or organic matter. Water Penetration Cozumel Island1 CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of WaterWaterWaterWater REFERENCE: Remote

  19. Remote imaging of concealed objects

    SciTech Connect (OSTI)

    Lev, Aner, E-mail: lev@soreq.gov.il; Sfez, Bruno, E-mail: lev@soreq.gov.il [Soreq NRC, Yavne, 81800 (Israel)

    2014-05-27T23:59:59.000Z

    Optical detection of objects hidden behind opaque screening layers is a challenging problem. We demonstrate an optically detected echographic-like method that combines collimated acoustic and laser beams. The acoustic waves cross the screening layers and their back-reflection from the hidden objects is detected through the analysis of a dynamic laser speckle pattern created at the outer surface of the screening layer. Real-time remote detection of moving targets 15 meters away, with a few mm resolutions is demonstrated using a very sensitive camera detection scheme.

  20. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote Access Ames Laboratory

  1. Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations

    E-Print Network [OSTI]

    Drozdova, Katya; Samoilov, Michael

    2010-01-01T23:59:59.000Z

    early-warning detection of attack signals from terroristtowards detecting terrorist attack precursors. We ?nd thatof impending terrorist attacks. (Such potential practical

  2. Ethnicity and gender in the face of a terrorist attack: A national longitudinal study of immediate responses and outcomes two years after September 11

    E-Print Network [OSTI]

    Chu, T Q; Seery, M D; Ence, W A; Holman, E A; Silver, Roxane Cohen

    2006-01-01T23:59:59.000Z

    reactions to terrorist attacks: Findings from the national11, 2001, terrorist attacks. New England Journal ofthe 9/11/01 terrorist attacks. Journal of Adolescent Health,

  3. Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems

    E-Print Network [OSTI]

    Briesemeister, Linda

    . Modern control systems are increasingly connected to other control systems as well as to corporate.lastname@sri.com Abstract--Digital control systems are essential to the safe and efficient operation of a variety from conventional enterprise systems. These trends can make control systems vulnerable to cyber attack

  4. Guessing Attacks and the Computational Soundness of Static Equivalence

    E-Print Network [OSTI]

    Abadi, MartĂ­n

    Guessing Attacks and the Computational Soundness of Static Equivalence Mart´in Abadi1 , Mathieu static equivalence. Static equivalence depends on an underlying equa- tional theory. The choice, fundamental cryp- tographic operations. This equational theory yields a notion of static equivalence

  5. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect (OSTI)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23T23:59:59.000Z

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  6. Defending against Unidentifiable Attacks in Electric Power Grids

    E-Print Network [OSTI]

    Li, Qun

    Defending against Unidentifiable Attacks in Electric Power Grids Zhengrui Qin, Student Member, IEEE THE electric power grid is a distribution network that connects the electric power generators to customers, Qun Li, Senior Member, IEEE, and Mooi-Choo Chuah, Senior Member, IEEE Abstract--The electric power

  7. Energy Attack on Server Systems Zhenyu Wu, Mengjun Xie

    E-Print Network [OSTI]

    Wang, Haining

    Power management is one of the critical issues for server systems nowadays. To date energy cost hasEnergy Attack on Server Systems Zhenyu Wu, Mengjun Xie , and Haining Wang The College of William server power consump- tion and achieve energy proportional computing. How- ever, the security perspective

  8. A Deception Framework for Survivability Against Next Generation Cyber Attacks

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    to the electronic business domain. According to the asymmetric warfare theory, attack- ers have the advantage- rity, survivability 1. Introduction This is the era of cyber-warfare and it is no longer limited to military domain. Knapp and Boulton [12] have reviewed information warfare literature from 1990 to mid-2005

  9. Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks M.H.R. Khouzani, Saswati Sarkar Abstract Large scale proliferation of wireless technologies are dependent on developing reliable to the spread of self-replicating malicious codes known as malware. The malware can be used to initiate

  10. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect (OSTI)

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01T23:59:59.000Z

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  11. Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures

    E-Print Network [OSTI]

    Caesar, Matthew

    range of sparsely located mobile nodes (e.g., disaster-response networks), and limited energy resources, DTNs are used for scientific, military, and industrial applications that place high demands against spoofing attacks in DTNs. To the best of our knowledge, we are the first to propose

  12. Selective Jamming Attacks in Wireless Networks Alejandro Proa~no

    E-Print Network [OSTI]

    Lazos, Loukas

    for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. I emission of high-power interference signals such as continuous wave tones, or FM modulated noise [15-one transformations [13], with physical-layer parameters. We further study the impact of various selective jamming

  13. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    day irrigation canal systems. This type of monitoring and control infrastructure is also commonStealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern

  14. Attacking Tor through Unpopular Ports Muhammad Aliyu Sulaiman

    E-Print Network [OSTI]

    Almulhem, Ahmad

    of them as entry (first) and exit (last) relays. With the currently large number of relays, this attack and the destination of the traffic: the first (entry) relay knows the source but not the destination, the last (exit and exit relays. Indeed, if the entry and exit relays traffic is observed, a simple traffic analysis can

  15. Offline Dictionary Attack on Password Authentication Schemes using Smart Cards

    E-Print Network [OSTI]

    decades of intensive research in the security community, and the current crux lies in how to achieve truly scenario and gives rise to the strongest adversary model so far (Note that Wang's PSCAV scheme is secure poorly-chosen passwords from the notorious offline dictionary attacks and thus confirms the feasibility

  16. PUF Modeling Attacks on Simulated and Silicon Data

    E-Print Network [OSTI]

    that rest on the Strong PUF's unpredictability and physical unclonability. Our method is less relevant these problems, but they all rest on the concept of a secret binary key: It is assumed that the Ulrich R API-attacks and viruses, can lead to key exposure and full security breaks. The fact that the devices

  17. De-anonymization attack on geolocated data Sebastien Gambs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , inference attack, de- anonymization. I. INTRODUCTION With the recent advent of ubiquitous devices and smart.g., to optimize the placement of cellular towers, to conduct market and sociological studies or to analyze (such as his home and place of work) [5], [6], [7], [8], to predict his past, current and future

  18. MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT

    E-Print Network [OSTI]

    Noel, Steven

    MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects security, Intrusion detection, data mining 1. Introduction The goal of intrusion detection is to discover

  19. On the robustness of network infrastructures to disasters and physical attacks

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    2013-01-01T23:59:59.000Z

    Networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such realworld events happen in specific geographical locations ...

  20. Anthem Cyber Attack: Information and Call-in Phone Number | Jefferson...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Anthem Cyber Attack: Information and Call-in Phone Number Colleagues, As you may have heard by now, Anthem was the latest victim of a cyber attack. Anthem reports that they were...

  1. T-702: Apache web servers that allows a DOS attack | Department...

    Broader source: Energy.gov (indexed) [DOE]

    2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has...

  2. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

  3. User Guide Remote Workplace to VDI Using RSA | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Guide Remote Workplace to VDI Using RSA User Guide Remote Workplace to VDI Using RSA Last updated on March 17, 2015 This document provides instructions for logging onto Remote...

  4. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, Albert (Santa Fe, NM); Swift, Gregory W. (Los Alamos, NM); Garrett, Steven L. (Pebble Beach, CA)

    1986-01-01T23:59:59.000Z

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  5. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, A.; Swift, G.W.; Garrett, S.L.

    1985-04-30T23:59:59.000Z

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  6. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  7. Robustness of two-way quantum communication protocols against Trojan horse attack

    E-Print Network [OSTI]

    Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

    2005-08-23T23:59:59.000Z

    We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

  8. A 2nd-Preimage Attack on AURORA-512 NTT Information Sharing Platform Laboratories, NTT Corporation

    E-Print Network [OSTI]

    A 2nd-Preimage Attack on AURORA-512 Yu Sasaki NTT Information Sharing Platform Laboratories, NTT. In this note, we present a 2nd-preimage attack on AURORA- 512, which is one of the candidates for SHA-3. Our is approximately 2290 AURORA-512 operations, which is less than the brute force attack on AURORA-512, namely, 2512

  9. Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks

    E-Print Network [OSTI]

    Nam, Seung Yeob

    1 Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks Seung Yeob Nam, Member- tion Protocol (ARP) is proposed to prevent ARP poisoning-based Man-in-the-Middle (MITM) attacks deployable. Index Terms--ARP cache poisoning, Man-in-the-Middle attack, ARP poisoning prevention, voting. I

  10. DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

    E-Print Network [OSTI]

    California at Davis, University of

    DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks Lihua Yuan ECE, UC Davis lyuan for more insidious attacks. This paper proposes DoX, a peer-to-peer based scheme, to detect and correct inaccurate DNS records caused by cache poisoning attacks. DoX also helps DNS servers to improve cache

  11. Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator as random masks generators in some side channel attacks countermeasures. As such, they must have good statistical properties, be unpredictable and robust against attacks. This paper presents a contact- less

  12. A Formal Method for Attack Modeling and Seyit Ahmet C amtepe and Bulent Yener

    E-Print Network [OSTI]

    Bystroff, Chris

    1 A Formal Method for Attack Modeling and Detection Seyit Ahmet C¸ amtepe and B¨ulent Yener,yener}@cs.rpi.edu TR-06-01 Abstract This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach [1] to capture (i

  13. A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia

    E-Print Network [OSTI]

    Bullo, Francesco

    A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia , Florian D, University of California, Santa Barbara Abstract Identifying attacks is key to ensure security in cyber-physical systems. In this note we remark upon the computational complexity of the attack identification problem

  14. Allocating Capacity in Parallel Queues to Improve Their Resilience to Deliberate Attack

    E-Print Network [OSTI]

    Henderson, Shane

    Allocating Capacity in Parallel Queues to Improve Their Resilience to Deliberate Attack W. Matthew will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well-informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service

  15. An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing

    E-Print Network [OSTI]

    Wing, Jeannette M.

    An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing Carnegie Mellon University's security? We propose to use the measure of a system's attack surface as an indication of the system, prior work has shown that a system's attack surface measurement serves as a reliable proxy for security

  16. What about vulnerability to a fault attack of the Miller algorithm during an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

  17. An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten Institut f¨ur Experimentelle a novel attack on this primitive. We show that the DLP in the trace-zero group can always be transferred methods than by attacking it directly via generic methods. The speed-up one obtains corresponds

  18. Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems

    E-Print Network [OSTI]

    Dreibholz, Thomas

    Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems attacks has not been intensively ad- dressed yet. In particular, there have not been any analyses for real the attack bandwidth which is necessary for a significant impact on RSerPool-based services. This analysis

  19. On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack

    E-Print Network [OSTI]

    On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack Jing Jin.e. anonymity) of all anonymous networks in the presence of timing attack. Our metric is based on a novel conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer

  20. An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper cryptographic primitive of the DLP in elliptic curves over prime fields. We present a novel attack calculus methods than by attacking it directly via generic methods. The speed-up one obtains

  1. What About Vulnerability to a Fault Attack of the Miller's Algorithm During an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

  2. Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem

    E-Print Network [OSTI]

    Hess, Florian

    Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem F. Hess Technical succumb to the basic GHS attack, thereby weakening curves over F2155 further. We also discuss other possible extensions or variations of the GHS attack and conclude that they are not likely to yield further

  3. Characteristics of subalpine fir susceptible to attack by western balsam bark beetle (Coleoptera

    E-Print Network [OSTI]

    Lindgren, Staffan

    Characteristics of subalpine fir susceptible to attack by western balsam bark beetle (Coleoptera beetle (Dryocoetes confusus Swaine) predominately attacked trees from the three to four largest diameter classes at each site. However, the mean diameter of attacked trees was significantly different among sites

  4. Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key

    E-Print Network [OSTI]

    Myasnikov, Aleksey

    Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol of Technology, Hoboken, New Jersey, USA, 07030 {amyasnik,aushakov}@stevens.edu Abstract. The length based attack and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced

  5. Extracting Attack Knowledge Using Principal-subordinate Consequence Tagging Case Grammar and Alerts Semantic Networks

    E-Print Network [OSTI]

    Ansari, Nirwan

    Extracting Attack Knowledge Using Principal-subordinate Consequence Tagging Case Grammar and Alerts networks from Distributed Denial of Service (DDoS) attacks has become a critical issue that must be tackled, the overwhelming volume of alerts makes it difficult for security administrators to analyze and extract the attack

  6. Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth- jack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can--by supplying of code of her choosing. In this paper, we propose to protect code from this common form of attack using

  7. A Formal Model for A System's Attack Surface Pratyusa K. Manadhata Dilsun K. Kaynar

    E-Print Network [OSTI]

    Wing, Jeannette M.

    A Formal Model for A System's Attack Surface Pratyusa K. Manadhata Dilsun K. Kaynar Jeannette M software [18]. In this paper, we propose to use a software system's attack surface measurement as an indicator of the system's security; the larger the attack surface, the more insecure the system. We

  8. Multiple Coordinated Views for Network Attack Graphs Steven Noel Michael Jacobs Pramod Kalapa Sushil Jajodia

    E-Print Network [OSTI]

    Noel, Steven

    Multiple Coordinated Views for Network Attack Graphs Steven Noel Michael Jacobs Pramod Kalapa graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective techniques for visualizing such attack graphs

  9. On the Completeness of Attack Mutation Algorithms Shai Rubin, Somesh Jha, and Barton P. Miller

    E-Print Network [OSTI]

    Liblit, Ben

    On the Completeness of Attack Mutation Algorithms Shai Rubin, Somesh Jha, and Barton P. Miller University of Wisconsin, Madison Computer Sciences Department {shai,jha,bart}@cs.wisc.edu Abstract An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances

  10. Discovering Novel Attack Strategies from INFOSEC Xinzhou Qin and Wenke Lee

    E-Print Network [OSTI]

    Lee, Wenke

    Discovering Novel Attack Strategies from INFOSEC Alerts Xinzhou Qin and Wenke Lee College. Correlating security alerts and discovering attack strategies are impor- tant and challenging tasks for security analysts. Recently, there have been several proposed techniques to analyze attack scenarios from

  11. Attack on Private Signature Keys of the OpenPGP format, PGPTM

    E-Print Network [OSTI]

    - 1 - Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications Prague, t.rosa@decros.cz Abstract. The article describes an attack on OpenPGP format, which leads these applications must undergo the same revision as the actual program PGPTM . The success of the attack

  12. An Attack on a TraceZero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace­Zero Cryptosystem Claus Diem and Jasper Scholten Institut fË?ur Experimentelle a novel attack on this primitive. We show that the DLP in the trace­zero group can always be transferred methods than by attacking it directly via generic methods. The speed­up one obtains corresponds

  13. CAT A Practical SDL Based Attack Attribution Toolkit for 3G Networks

    E-Print Network [OSTI]

    Yener, Aylin

    CAT ­ A Practical SDL Based Attack Attribution Toolkit for 3G Networks Kameswari Kotapati Peng Liu University University Park, PA 16802 Abstract-- This paper presents the Cross Infrastructure Attack telecommunication specifications. CAT analyzes vulnerabilities by generating attack graphs, which show the global

  14. High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack

    E-Print Network [OSTI]

    Merat, Francis L.

    1 High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim1 , Ju-Yeon Jo1 Polytechnic University, Brooklyn, NY 11201 ABSTRACT Protection from Distributed Denial-of-Service attacks has been of a great interest recently and substantial progress has been made for preventing some attack

  15. On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services

    E-Print Network [OSTI]

    Chang, Rocky Kow-Chuen

    On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services Yajuan Tang, Xiapu Luo,csrchang}@comp.polyu.edu.hk, qing.hui@ttu.edu Abstract--Low-rate Denial of Quality (DoQ) attacks, by send- ing intermittent bursts generalize the previous results by considering arbitrary attack intervals. We obtain two sets of new results

  16. Facility Location under Demand Uncertainty: Response to a Large-scale Bioterror Attack

    E-Print Network [OSTI]

    Dessouky, Maged

    Facility Location under Demand Uncertainty: Response to a Large-scale Bioterror Attack Abstract In the event of a catastrophic bio-terror attack, major urban centers need to effi- ciently distribute large of a hypothetical anthrax attack in Los Angeles County. Keywords: Capacitated facility location, distance

  17. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem

  18. Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu

    E-Print Network [OSTI]

    Ning, Peng

    Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu Cyber Defense Laboratory@csc.ncsu.edu, dxu@unity.ncsu.edu Abstract Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks

  19. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

  20. Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun ECE research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily restrict themselves within the boundaries

  1. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Reiter, Michael

    the measurements of meters at physically protected locations such as substations, such attacks can introduce13 False Data Injection Attacks against State Estimation in Electric Power Grids YAO LIU and PENG also defeat malicious measurements injected by attackers. In this article, we expose an unknown

  2. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Ning, Peng

    the measurements of meters at physically protected locations such as substations, such attacks can introduceFalse Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu and Peng Ning also defeat malicious measurements injected by attackers. In this paper, we expose an unknown

  3. Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach

    E-Print Network [OSTI]

    Bullo, Francesco

    Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach to operate safely and reliably against cyber-physical attacks. The large dimensionality and the difficulty system and cyber- physical attacks as unknown inputs. This modeling framework captures, for instance

  4. Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation

    E-Print Network [OSTI]

    Kundur, Deepa

    Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation Shan Liu the need to develop intelligent models of cyber-physical attacks that produce salient disruptions. In this paper, we present a foundation for the development of a class of intelligent cyber-physical attacks

  5. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses

    E-Print Network [OSTI]

    Saxena, Nitesh

    The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

  6. Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

    E-Print Network [OSTI]

    Curtmola, Reza

    1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

  7. Hearing is Believing: Detecting Wireless Microphone Emulation Attack in White Space

    E-Print Network [OSTI]

    California at Davis, University of

    users from transmitting. Such an attack is called primary user emulation (PUE) attack. TV towers and their transmission power is low. These properties introduce great challenges on PUE detection and existing meth- ods]. However, all of them focus on the attackers that emulate stationary primary users (TV towers

  8. A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses

    E-Print Network [OSTI]

    Sundaram, Ravi

    , a common form of distributed denial of service (DDoS) attacks. In particular, our traffic injection game statistical methods for creating defense mechanisms that can detect a DDoS attack and that even when--changing the source address of IP packets-- has been used in DDoS attacks on popular websites (Ya- hoo!) and root DNS

  9. Sustaining Availability of Web Services under Distributed Denial of Service Attacks

    E-Print Network [OSTI]

    Vigoda, Eric

    adequate service to a large percentage of clients during DDoS attacks. The worst-case performance adversarial relationship between a DDoS adversary and the proposed system. We also conduct a simulation study (DDoS) attacks against high-pro#12;le web sites demonstrate how devastating DDoS attacks are, and how

  10. Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts

    E-Print Network [OSTI]

    Tsigas, Philippas

    S attack themselves. Here we study the case where the communicating parties have clocks with rate drift. The situa- tion is even worse with distributed denial of service(DDoS) attacks, where multiple compromised in order to make the service unavail- able [7]. Common methods to protect systems from DoS and DDoS attacks

  11. On the Effectiveness of DDoS Attacks on Statistical Temasek Laboratories

    E-Print Network [OSTI]

    Chang, Ee-Chien

    by the filter that guards the victim network. We study the effectiveness of DDoS attacks on such statistical first study the effectiveness of DDoS attacks on statistical-based filtering in a general context whereOn the Effectiveness of DDoS Attacks on Statistical Filtering Qiming Li Temasek Laboratories

  12. Non-Control-Data Attacks Are Realistic Threats , Emre C. Sezer

    E-Print Network [OSTI]

    Zhang, Xiangyu

    make systems susceptible to Internet worms and distributed denial of service (DDoS) attacks. Recipe, including FTP, SSH, Telnet, and HTTP servers, are vulnerable to such attacks. In each case, the generated them down, they have incentives to study and employ non-control-data attacks. This paper emphasizes

  13. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

  14. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary...

  15. Equitable Access: Remote and Rural Communities 'Transport Needs...

    Open Energy Info (EERE)

    Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

  16. automated remote plant: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Siegel, Mel 15 Use of remote sensing data to enhance the performance of a hydrodynamic simulation of a partially frozen power plant Engineering Websites Summary: Use of remote...

  17. U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

  18. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

  19. availiable remote sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote SensingThermal Infrared Remote Sensing Thermal infrared) and thermal infrared energy (3.0 - 14 m). However, thermal infrared sensors allow humans to sense 2 Thermal...

  20. atmospheric remote sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrared Remote SensingThermal Infrared Remote Sensing Thermal infrared) and thermal infrared energy (3.0 - 14 m). However, thermal infrared sensors allow humans to...

  1. aerospace remote sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote SensingThermal Infrared Remote Sensing Thermal infrared) and thermal infrared energy (3.0 - 14 m). However, thermal infrared sensors allow humans to sense 2 Thermal...

  2. Double blinding-attack on entanglement-based quantum key distribution protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-06-14T23:59:59.000Z

    We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

  3. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

    1989-08-08T23:59:59.000Z

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  4. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01T23:59:59.000Z

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  5. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design

    E-Print Network [OSTI]

    Pasqualetti, Fabio; Bullo, Francesco

    2012-01-01T23:59:59.000Z

    Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustr...

  6. Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    Toyohiro Tsurumaru

    2006-12-25T23:59:59.000Z

    In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the "discretized gaussian" intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100km reported by Diamanti et al. turns out to be insecure. Moreover it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95km.

  7. Method for remote detection of trace contaminants

    DOE Patents [OSTI]

    Simonson, Robert J.; Hance, Bradley G.

    2003-09-09T23:59:59.000Z

    A method for remote detection of trace contaminants in a target area comprises applying sensor particles that preconcentrate the trace contaminant to the target area and detecting the contaminant-sensitive fluorescence from the sensor particles. The sensor particles can have contaminant-sensitive and contaminant-insensitive fluorescent compounds to enable the determination of the amount of trace contaminant present in the target are by relative comparison of the emission of the fluorescent compounds by a local or remote fluorescence detector. The method can be used to remotely detect buried minefields.

  8. Heating remote rooms in passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1981-01-01T23:59:59.000Z

    Remote rooms can be effectively heated by convection through a connecting doorway. A simple steady-state equation is developed for design purposes. Validation of a dynamic model is achieved using data obtained over a 13-day period. Dynamic effects are investigated using a simulation analysis for three different cases of driving temperature; the effect is to reduce the temperature difference between the driving room and the remote room compared to the steady-state model. For large temperature swings in the driving room a strategy which uses the intervening door in a diode mode is effective. The importance of heat-storing mass in the remote room is investigated.

  9. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  10. Can remote sensing of land cover improve species distribution modelling?

    E-Print Network [OSTI]

    Bradley, Bethany

    COMMENTARY Can remote sensing of land cover improve species distribution modelling? Remote sensing- guish among broad classes of vegetation. However, the applicability of remote sensing to classification like from remote sensing ­ a map of tree species ­ and what can be delivered ­ a map of forest types

  11. applied remote sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Thermal Infrared Remote Sensing Thermal Infrared Remote Sensing 12;0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4 Infrared Remote SensingThermal Infrared Remote SensingThermal Infrared...

  12. Preventing detector blinding attack and other random number generator attacks on quantum cryptography by use of an explicit random number generator

    E-Print Network [OSTI]

    Mario Stip?evi?

    2014-07-10T23:59:59.000Z

    A particularly successful detector blinding attack has been recently demonstrated on various quantum key distribution (QKD) systems, performing for the first time an undetectable and complete recovery of the key. In this paper two original contributions are given to understanding and prevention of this attack.

  13. This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.

    E-Print Network [OSTI]

    Bandettini, Peter A.

    #12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

  14. User Guide Remote PIV to VDI Using ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Click here to view certificate properties. Select the Detail tab. U. S. Department of Energy | Remote PIV to VDI Using a PIV Card 7 a. Select Enhanced Key Usage to display the...

  15. The Remote distractor effect in manual responses 

    E-Print Network [OSTI]

    Ricketts, Katie

    2006-01-01T23:59:59.000Z

    The remote distracter effect (RDE) has previously only been studied in relation to the saccadic system. Given the hypothesis of the premotor theory (Rizzolatti et al, 1987) that a covert shift of attention is a programmed ...

  16. A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. LaPorta

    E-Print Network [OSTI]

    Yener, Aylin

    1 A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of Cross Infrastructure Cyber Attacks in addition to the standard Single

  17. 546 IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 7, JULY 2009 Is It Congestion or a DDoS Attack?

    E-Print Network [OSTI]

    Ansari, Nirwan

    546 IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 7, JULY 2009 Is It Congestion or a DDoS Attack? Amey Shevtekar and Nirwan Ansari, Fellow, IEEE Abstract--We propose a new stealthy DDoS attack model referred to as the "quiet" attack. The attack traffic consists of TCP traffic only. Widely used botnets in today's various

  18. Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non-Repudiation Protocol

    E-Print Network [OSTI]

    Chen, Yu

    1 Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non security issues in cloud storage: repudiation, fairness, and roll-back attacks. We proposed a novel fair and is capable of preventing roll-back attacks. Keywords: Cloud Storage, Non-repudiation, Roll-back Attack. 1

  19. Change-Point Monitoring for Detection of DoS Attacks Haining Wang Danlu Zhang Kang G. Shin

    E-Print Network [OSTI]

    Wang, Haining

    . The statelessness and low computation overhead of CPM make itself immune to any flooding attacks. As a case study of service (DDoS) attack. Briefly, a DDoS attack works as follows. An attacker sends control packets victim servers or link bandwidth from DoS traffic, and block the prorogation of DDoS traffic at routers

  20. Remote sensing, imaging, and signal engineering

    SciTech Connect (OSTI)

    Brase, J.M.

    1993-03-01T23:59:59.000Z

    This report discusses the Remote Sensing, Imaging, and Signal Engineering (RISE) trust area which has been very active in working to define new directions. Signal and image processing have always been important support for existing programs at Lawrence Livermore National Laboratory (LLNL), but now these technologies are becoming central to the formation of new programs. Exciting new applications such as high-resolution telescopes, radar remote sensing, and advanced medical imaging are allowing us to participate in the development of new programs.

  1. REMOTE OPERATION PATTERN Class Structural Enable clients to invoke operations on remote objects as if they were local. This pattern

    E-Print Network [OSTI]

    Keller, Rudolf K.

    1 / 7 REMOTE OPERATION PATTERN Class Structural Intent Enable clients to invoke operations on remote objects as if they were local. This pattern decouples the client from the network calls needed to access the remote object. Also Known As Remote Procedure Call Motivation This pattern applies

  2. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, M.A.

    1992-11-10T23:59:59.000Z

    A fiber optically isolated and remotely stabilized data transmission systems described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber. 3 figs.

  3. Remotely releasable template and dome

    SciTech Connect (OSTI)

    Allen, G.G. Jr.

    1986-12-02T23:59:59.000Z

    This patent describes a remotely releasable template assembly for precision placement of a template of the type having at least one sleeve member for placing about a well casing stub extending from the sea floor, comprising: mating means mounted with the template for demountably coupling the template to a complementary end of a drill string extending from a support structure located above the well casing stub. The mating means is positioned near the template assembly center of balance when the template assembly is demountably coupled to the drill string; the vertical axis of the drill string being essentially parallel to the longitudinal axis of the sleeve member when the drill string is demountably couple to the template assembly; the end of the drill string includes a gyroscopic orientation means for detecting the deviation of the template from a desired bearing; and the mating means maintains the template semi-ridgidly coupled to the drill string until the template is controllably released from the drill string; whereby the rotation of the drill string about the vertical axis of the drill string rotates the template assembly into the desired orientation.

  4. 2007 Urban Remote Sensing Joint Event Application of satellite Remote Sensing for Urban

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    2007 Urban Remote Sensing Joint Event Application of satellite Remote Sensing for Urban Risk Analysis: a case study of the 2003 extreme heat wave in Paris Bénédicte Dousset Hawaii Institute@ogs.trieste.it Abstract ­ Satellite observations are used to monitor the August 2003 heat wave in Paris

  5. Medical Remote Monitoring using sound environment analysis and wearable sensors 1 Medical Remote Monitoring using sound

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Medical Remote Monitoring using sound environment analysis and wearable sensors 1 X Medical Remote Monitoring using sound environment analysis and wearable sensors Dan Istrate1, Jérôme Boudy2, Hamid Medjahed1. In Europe, for example, the life expectancy for men is about 71 years and for women about 79 years

  6. REMOTE LABORATORIES IN AUTOMATION: AIP-PRIMECA RAO ARI PLATFORM Remote Laboratories in Automation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    for thorough trainings in industrial We thank our sponsors : Schneider Electric which provided the automationREMOTE LABORATORIES IN AUTOMATION: AIP-PRIMECA RAO ARI PLATFORM Remote Laboratories in Automation of resources and competencies about industrial topics for many universities in Rhône-Alpes french Region. Due

  7. Time Stamp Attack on Wide Area Monitoring System in Smart Grid

    E-Print Network [OSTI]

    Zhang, Zhenghao; Li, Husheng; Pei, Changxing

    2011-01-01T23:59:59.000Z

    Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

  8. Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks

    E-Print Network [OSTI]

    Ruj, Sushmita

    2015-01-01T23:59:59.000Z

    We model smart grids as complex interdependent networks, and study targeted attacks on smart grids for the first time. A smart grid consists of two networks: the power network and the communication network, interconnected by edges. Occurrence of failures (attacks) in one network triggers failures in the other network, and propagates in cascades across the networks. Such cascading failures can result in disintegration of either (or both) of the networks. Earlier works considered only random failures. In practical situations, an attacker is more likely to compromise nodes selectively. We study cascading failures in smart grids, where an attacker selectively compromises the nodes with probabilities proportional to their degrees; high degree nodes are compromised with higher probability. We mathematically analyze the sizes of the giant components of the networks under targeted attacks, and compare the results with the corresponding sizes under random attacks. We show that networks disintegrate faster for targeted...

  9. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01T23:59:59.000Z

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  10. Eavesdropping Attack with Hong-Ou-Mandel Interferometer and Random Basis Shuffling in Quantum Key Distribution

    E-Print Network [OSTI]

    Chil-Min Kim; Yun Jin Choi; Young-Jai Park

    2006-03-02T23:59:59.000Z

    We introduce new sophisticated attacks with a Hong-Ou-Mandel interferometer against quantum key distribution (QKD) and propose a new QKD protocol grafted with random basis shuffling to block up those attacks. When the polarization basis is randomly and independently shuffled by sender and receiver, the new protocol can overcome the attacks even for not-so-weak coherent pulses. We estimate the number of photons to guarantee the security of the protocol.

  11. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks

    SciTech Connect (OSTI)

    Lin Song [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Wen Qiaoyan; Gao Fei [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P.O. Box 810, Chengdu 610041 (China)

    2009-05-15T23:59:59.000Z

    A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

  12. A new attack on RSA and CRT-RSA Abderrahmane Nitaj

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

  13. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06T23:59:59.000Z

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  14. Practical realisation and elimination of an ECC-related software bug attack

    E-Print Network [OSTI]

    in modern e-business work-flows, are as follows: 1. Nguyen [28] described an attack on GPG version 1

  15. Breaking into a computer : attack techniques and tools used by cyber-criminals

    SciTech Connect (OSTI)

    None

    2010-06-24T23:59:59.000Z

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  16. Valve assembly having remotely replaceable bearings

    DOE Patents [OSTI]

    Johnson, Evan R. (San Diego, CA); Tanner, David E. (Poway, CA)

    1980-01-01T23:59:59.000Z

    A valve assembly having remotely replaceable bearings is disclosed wherein a valve disc is supported within a flow duct for rotation about a pair of axially aligned bearings, one of which is carried by a spindle received within a diametral bore in the valve disc, and the other of which is carried by a bearing support block releasably mounted on the duct circumferentially of an annular collar on the valve disc coaxial with its diametrical bore. The spindle and bearing support block are adapted for remote removal to facilitate servicing or replacement of the valve disc support bearings.

  17. Geothermal Exploration Using Aviris Remote Sensing Data Over...

    Open Energy Info (EERE)

    Aviris Remote Sensing Data Over Fish Lake Valley, Nv Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Geothermal Exploration Using Aviris Remote...

  18. EAST TEXAS FOREST INVENTORY (ETFI) PILOT PROJECT REMOTE SENSING PHASE

    E-Print Network [OSTI]

    Hung, I-Kuai

    EAST TEXAS FOREST INVENTORY (ETFI) PILOT PROJECT REMOTE SENSING PHASE Dr. Daniel R. Unger, Remote) or the United States Forest Service (USFS) via the Southern Forest Inventory and Analysis Program (SFIA

  19. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis...

  20. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up...

  1. Remote sensing of terrestrial tropospheric aerosols from aircraft and satellites

    E-Print Network [OSTI]

    Remote sensing of terrestrial tropospheric aerosols from aircraft and satellites M I Mishchenko1 instruments suitable for aerosol remote sensing and give examples of aerosol retrievals obtained forcing directly by absorbing and reflecting sunlight, thereby cooling or heating the atmosphere

  2. User authentication and remote execution across administrative domains

    E-Print Network [OSTI]

    Kaminsky, Michael, 1976-

    2004-01-01T23:59:59.000Z

    (cont.) selectively delegates authority to processes running on remote machines that need to access other resources. The delegation mechanism lets users incrementally construct trust policies for remote machines. Measurements ...

  3. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  4. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  5. Modeling of Damage in Cement-Based Materials Subjected to External Sulfate Attack. I: Formulation

    E-Print Network [OSTI]

    Mobasher, Barzin

    Modeling of Damage in Cement-Based Materials Subjected to External Sulfate Attack. I: Formulation subject headings: Damage; Models; Sulfates; Cements. Introduction A majority of the durability issues. Portland cement-based materials subjected to attack from external sulfates may suffer from two types of dam

  6. Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks

    E-Print Network [OSTI]

    Bullo, Francesco

    Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks Fabio and extends our results on the security of cyber-physical systems based on geometric control theory: (i) we, and by various industrial security incidents [6], cyber-physical systems are prone to failures and attacks

  7. Cyber-Physical Systems under Attack Models, Fundamental limitations, and Monitor Design

    E-Print Network [OSTI]

    Hu, Fei

    , FL, Dec 11, 2011 F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security are cyber-physical systems: power generation and distribution networks water networks and mass-efficient buildings (heat transfer) F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security

  8. Survey of Event Correlation Techniques for Attack Detection in Early Warning Systems

    E-Print Network [OSTI]

    Breu, Ruth

    Survey of Event Correlation Techniques for Attack Detection in Early Warning Systems Tobias Limmer of early warning systems for detecting Internet worms and other attacks, event correlation techniques on early warning systems. We summarize and clarify the typical terminology used in this context and present

  9. RISK MANAGEMENT AND RISK ANALYSIS-BASED DECISION TOOLS FOR ATTACKS ON

    E-Print Network [OSTI]

    Wang, Hai

    RISK MANAGEMENT AND RISK ANALYSIS- BASED DECISION TOOLS FOR ATTACKS ON ELECTRIC POWER Simonoff, J.usc.edu/create Report #04-004DRAFT #12;Risk Management and Risk Analysis-Based Decision Tools for Attacks on Electric for Risk and Economic Analysis of Terrorism Events University of Southern California Los Angeles

  10. WADeS: a tool for Distributed Denial of Service Attack detection

    E-Print Network [OSTI]

    Ramanathan, Anu

    2002-01-01T23:59:59.000Z

    's resources and denying service to legitimate users. In our research work, we propose WADeS (Wavelet based Attack Detection Signatures), an approach to detect a Distributed Denial of Service Attack using Wavelet methods. We develop a new framework that uses...

  11. ElectroMagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack of a

    E-Print Network [OSTI]

    Boyer, Edmond

    ElectroMagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack, a "root of trust" must be defined, insulated and then carefully protected. Until very recently, this role agencies) have tackled the issue of protecting ASICs from side-channel attacks (SCAs). In the meantime

  12. On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong

    E-Print Network [OSTI]

    Youssef, Amr M.

    On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong Center for Applied attack, nite elds, Ga- lois Field Fourier Transform 1 Introduction Gong and Golomb 7 introduced a new the later by decimation d. Gong and Golomb showed that the distance of DES S-boxes approximated

  13. Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial

    E-Print Network [OSTI]

    Wang, Hai

    Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P Security has determined that external weapon threats due to surface-air missiles, as well as some

  14. Phase-remapping attack in practical quantum-key-distribution systems

    SciTech Connect (OSTI)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

    2007-03-15T23:59:59.000Z

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

  15. Source Location Privacy against Laptop-Class Attacks in Sensor Networks

    E-Print Network [OSTI]

    Liu, Donggang

    it is then possible for them to interfere with the phenomena being sensed or even mount physical attacks on the mon- sages sent periodically to hide real event reports. The global and greedy solutions improve the naive towards a base station to report this event. Note that an attacker can easily detect the transmission

  16. A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL

    E-Print Network [OSTI]

    A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL Gregory V. Bard.bard@ieee.org Keywords: Blockwise Adaptive, Chosen Plaintext Attack (CPA), Secure Sockets Layer (SSL), Transport Layer). Abstract: This paper introduces a chosen-plaintext vulnerability in the Secure Sockets Layer (SSL

  17. Attacks on Singelee and Preneel's protocol Jorge Munilla and Alberto Peinado

    E-Print Network [OSTI]

    establishment protocol in wireless personal area networks. Nevertheless, in this paper we show effective relay- tion) systems, most of them are still vulnerable to relay attacks. This attack is conceptually depicted. Then both rogue parties readily forward each other all the messages. The electronic protection is thus

  18. Islamists claim deadly attack on UN building in Nigeria 26 August 2011

    E-Print Network [OSTI]

    in a decade. A radical Muslim sect blamed for a series of attacks in the country claimed responsibility the targeting of the U.N. at an open meeting on U.N. peacekeeping. U.S. President Barack Obama called the attack on which the U.N. was founded _ dignity, freedom, security, and peace," Obama said in a statement. "An

  19. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  20. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  1. Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3

    E-Print Network [OSTI]

    Jagannatham, Aditya K.

    #12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

  2. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks

    E-Print Network [OSTI]

    Lui, John C.S.

    Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li: cslui@cse.cuhk.edu.hk Abstract--Pollution attack is a severe security problem in network-coding enabled spreading of polluted packets to deplete network resources. We address this security problem even when

  3. Networked Control Systems under Cyber Attacks with Applications to Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Terms-- Networked Control Systems, Fault Detection, Power Systems I. INTRODUCTION Several infrastructure infrastructure systems are vulnerable to cyber attacks [1], [2], which are performed on the information residingNetworked Control Systems under Cyber Attacks with Applications to Power Networks Andr´e Teixeira

  4. Hearing is Believing: Detecting Mobile Primary User Emulation Attack in White Space

    E-Print Network [OSTI]

    California at Davis, University of

    users in white space: TV towers and wireless microphones. Existing work on PUE attack detection focused on the first category. However, for the latter category, primary users are mobile and their transmission power on the attackers that emulate stationary primary users (TV towers). They are based on the fact that the locations

  5. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of control system elements, such as PLCs. In this paper, we design and implement the Crysys PLC honeypot (CryPLH) system to detect targeted attacks against industrial control systems. This PLC honeypot can

  6. ON-LINE DETECTION OF DISTRIBUTED ATTACKS FROM SPACE-TIME NETWORK FLOW PATTERNS

    E-Print Network [OSTI]

    Baras, John S.

    ON-LINE DETECTION OF DISTRIBUTED ATTACKS FROM SPACE-TIME NETWORK FLOW PATTERNS J.S. Baras* , A in the network. We are interested in the "quickest detection" problem when the attack is distributed is to detect when a distributed denial of service is taking place in one sub-network of a transit (core

  7. A Generalization of the Rainbow Band Separation Attack and its Applications to

    E-Print Network [OSTI]

    Recovery Attack, Rainbow, Enhanced STS, Enhanced TTS, MFE, Diophantine Equations, MQQ-Enc, MQQ-Sig 1-trivial generaliza- tion of the well known Unbalanced Oil and Vinegar (UOV) signature scheme (Eurocrypt '99) minimizing the length of the signatures. By now the Rainbow Band Separation attack is the best key recovery

  8. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines

    E-Print Network [OSTI]

    Shilton, Alistair

    concerning energy . In this article, we propose a centralized intrusion detection scheme based on SupportDetecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines Vector Machines (SVMs) and sliding windows. We find that our system can detect black hole attacks

  9. Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning

    E-Print Network [OSTI]

    Noh, Sanguk

    Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning Sanguk Noh1 of Service (DDoS) flooding at- tacks on TCP-based Web servers. There has been a lot of related work which focuses on analyzing the pattern of the DDoS attacks to protect users from them. However, none

  10. On the Impact of LowRate Attacks + MINA GUIRGUIS AZER BESTAVROS IBRAHIM MATTA

    E-Print Network [OSTI]

    of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks present an ongoing threat to almost TCP flows by flooding an Internet link. In this paper, we study the impact of these new breeds burst. Our analysis is focused towards worst­case scenarios, thus our results should be regarded

  11. On the Impact of Low-Rate Attacks MINA GUIRGUIS AZER BESTAVROS IBRAHIM MATTA

    E-Print Network [OSTI]

    Bestavros, Azer

    S) attacks and Distributed Denial of Service (DDoS) attacks present an ongoing threat to almost ev- ery TCP flows by flooding an Internet link. In this paper, we study the impact of these new breeds burst. Our analysis is focused towards worst-case scenarios, thus our results should be regarded

  12. On the Impact of Low-Rate Attacks MINA GUIRGUIS AZER BESTAVROS IBRAHIM MATTA

    E-Print Network [OSTI]

    of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks present an ongoing threat to almost TCP flows by flooding an Internet link. In this paper, we study the impact of these new breeds burst. Our analysis is focused towards worst-case scenarios, thus our results should be regarded

  13. Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

    E-Print Network [OSTI]

    Kasera, Sneha Kumar

    Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality] simulations. Our results show that our algorithm can find near-optimal solutions. Based on a simple analysis

  14. Virtual Reality to Improve Remote Control in Presence of Delays

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    or domotics. I. VIRTUAL REALITY AND REMOTE CONTROL One of the aims of virtual reality is to reproduce real

  15. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  16. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19T23:59:59.000Z

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  17. Remote Health Monitoring Using Online Social Media Systems

    E-Print Network [OSTI]

    Bhatti, Saleem N.

    Remote Health Monitoring Using Online Social Media Systems Chonlatee Khorakhun University of St@cs.st-andrews.ac.uk Abstract--Remote monitoring is considered an essential part of future eHealth systems to enable the general requirements of a remote monitoring scenario and the process of building and using a Facebook

  18. Remote Sensing Data and Information for Hydrological Monitoring and Modeling

    E-Print Network [OSTI]

    Krakauer, Nir Y.

    1 Remote Sensing Data and Information for Hydrological Monitoring and Modeling Reza Khanbilvardi Springs, MD, USA 1 Introduction Remote sensing data and information are shown great potential in supplying measurements, remote sensing based measurements are spatially averages over the pixels can appropriate

  19. Remote Book Browsing System using a Mobile Manipulator Tetsuo Tomizawa

    E-Print Network [OSTI]

    Ohya, Akihisa

    Remote Book Browsing System using a Mobile Manipulator Tetsuo Tomizawa , Akihisa Ohya and Shin manipu- lator as a teleoperated tool for accessing and manipulating remote objects, in our challenge in this research is to help humans browse books located in a library from a remote location via the Internet

  20. Remote Sensing in Support of Multilateral Environmental Agreements

    E-Print Network [OSTI]

    Columbia University

    Remote Sensing in Support of Multilateral Environmental Agreements Alex de Sherbinin CIESIN, from 172 in 1970 to more than 475 today · the sophistication of remote sensing and geospatial sets · the number of global and regional initiatives attempting to apply remote sensing (RS

  1. Remote Sensing for Biodiversity Conservation of the Albertine Rift

    E-Print Network [OSTI]

    Wang, Y.Q. "Yeqiao"

    183 10 Remote Sensing for Biodiversity Conservation of the Albertine Rift in Eastern Africa Samuel 2003). The rapidly developing field of remote sensing has been invaluable to biodiversity conservation distribution depend (Debinski et al. 1999). The field of remote sens- ing complements traditional field

  2. UAS remote sensing missions for rangeland applications Andrea S. Lalibertea

    E-Print Network [OSTI]

    UAS remote sensing missions for rangeland applications Andrea S. Lalibertea *, Craig Wintersb surface, are in remote areas and have low population densities, all of which provide an ideal opportunity for remote sensing applications from unmanned aircraft systems (UAS). In this article, we describe a proven

  3. Remote Homolog Detection Using Local SequenceStructure Correlations

    E-Print Network [OSTI]

    Bystroff, Chris

    Remote Homolog Detection Using Local Sequence­Structure Correlations Yuna Hou,1* Wynne Hsu,1 Mong 2 Department of Biology, Rensselaer Polytechnic Institute, Troy, New York ABSTRACT Remote homology similarity. In this article, we present a remote homolog detection method called SVM-HMMSTR that overcomes

  4. Remote Sensing Messungen zur on-road Bestimmung der

    E-Print Network [OSTI]

    Denver, University of

    LUBETRAX Remote Sensing Messungen zur on-road Bestimmung der Abgase von schweren Motorfahrzeugen, Chur, Zürich, Brugg Dr. Peter Maly (Projektleitung) Dr. Stefan Scherer Dr. G.A. Bishop (Remote Sensing;Inhaltsverzeichnis Zusammenfassung 1 1. Einleitung und Zielsetzung 3 1.1 Remote Sensing Messungen (FEAT) 4 1

  5. Remote Sensing Applications for Sustainable Aquaculture in Africa

    E-Print Network [OSTI]

    Jiang, Wen

    Remote Sensing Applications for Sustainable Aquaculture in Africa Joseph E. Quansah1 , Gilbert L of the science with respect to remote sensing applications for aquaculture, including site location, aquaculture for multi-sensor remote sensing deployment to support sustainable fish production in these environments

  6. Remote-Spanners: What to Know beyond Neighbors Philippe Jacquet

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Remote-Spanners: What to Know beyond Neighbors Philippe Jacquet INRIA Rocquencourt, France philippe are generally known in practical routing algorithms, we introduce the notion of remote-spanner. Given an unweighted graph G, a sub-graph H with vertex set V (H) = V (G) is an (, )-remote-spanner if for each pair

  7. Remote Control and Receiver-Transceiver Specifications and

    E-Print Network [OSTI]

    Rajamani, Sriram K.

    Remote Control and Receiver- Transceiver Specifications and Requirements for Windows Media Center hardware vendors (IHVs) and PC OEM partners who want to create remote control and receiver device combinations that decode input from the remote control for Windows Media Center. This document provides details

  8. Remote Stabilization via Communication Networks with a Distributed Control Law

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Remote Stabilization via Communication Networks with a Distributed Control Law Emmanuel Witrant the problem of remote stabilization via communication networks involving some time- varying delays of known average dynamics. This problem arises when the control law is remotely implemented and leads

  9. Remote Sensing of Natural Areas: Procedures and Considerations for

    E-Print Network [OSTI]

    1 Remote Sensing of Natural Areas: Procedures and Considerations for Assessing Stress and Pollution Jason Goldberg, James Perry, and John Anderson Coastal Ecosystems and Remote Sensing Program Introduction Remote sensing can be defined as the acquisi- tion and measurement of data/information on some

  10. Remote Sensing of Western-Caribbean Coral Communities

    E-Print Network [OSTI]

    Nebraska-Lincoln, University of

    Remote Sensing of Western-Caribbean Coral Communities Introduction: Despite the fact that coral. Remote sensing has been suggested as a potential tool for monitoring the spatial extent, health the Spectral Reflectance of Corals In-Situ. GIScience and Remote Sensing. Maeder, J., Narumalani, S., Rundquist

  11. Remote Sens. 2013, 5, 927-948; doi:10.3390/rs5020927 Remote Sensing

    E-Print Network [OSTI]

    Myneni, Ranga B.

    Active Radiation absorbed by vegetation (FPAR) are critical to OPEN ACCESS #12;Remote Sens. 2013, 5 928) correlations of dominant modes of interannual variability with large-scale circulation anomalies such as the EI

  12. REFERENCE: Introduction to Remote Sensing. James B.

    E-Print Network [OSTI]

    Gilbes, Fernando

    -viewing Wide Field-of-view Sensor (SeaWiFS) Advance Very High Resolution Radiometer (AVHRR) Synthetic Temperature #12;ACTIVE REMOTE SENSING The sensor illuminates the terrain with its own energy, then records the reflected energy as it has been altered by the earth's surface. #12;SIDE-LOOKING AIRBORNE RADAR SLAR #12

  13. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    . The coupling of the power infrastructure with complex computer networks substantially expand current cyber, that is, threats, vulnerabilities, and attack consequences for current and emerging power grid systems. The substantial attack surface presented by the advanced metering infrastructure (AMI) along

  14. Abstract Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and

    E-Print Network [OSTI]

    Abstract Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus

  15. 4698 Biochemistry 1993, 32, 4698-4701 Sequence-Specific Cleavage of DNA via Nucleophilic Attack of Hydrogen

    E-Print Network [OSTI]

    Tullius, Thomas D.

    4698 Biochemistry 1993, 32, 4698-4701 Sequence-Specific Cleavage of DNA via Nucleophilic Attack by oxidative damage of the DNA backbone but instead is the result of nucleophilic attack by peroxide. A singleSaccharomyces cerevisae, whichactivatesthephosphodiester for attack by thediffusible smallnucleophile. While Flp

  16. Gas-Phase Electrophilic Attack of a Double Bond Exhibits Stereoselectivity Philip S. Mayer and Thomas Hellman Morton*

    E-Print Network [OSTI]

    Morton, Thomas Hellman

    Gas-Phase Electrophilic Attack of a Double Bond Exhibits Stereoselectivity Philip S. Mayer alkoxycarbenium ions in solution, which then attack allylsilanes (X ) CH2,Y ) CH3),3 followed by departure ethers via internal attack by oxygen.4 In other instances (cf. the Mukaiyama aldol condensation,5 where X

  17. New side-channel attack against scan chains Jean Da Rolt, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    New side-channel attack against scan chains Jean Da Rolt, Giorgio Di Natale, Marie-Lise Flottes jeopardize the overall security. Several scan-based attacks on cryptographic functions have been described and shown the need for secure scan implementations. These attacks assume a single scan chain. However

  18. A Scan-based Attack on Elliptic Curve Cryptosystems in presence of Industrial Design-for-Testability Structures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Scan-based Attack on Elliptic Curve Cryptosystems in presence of Industrial Design-based attack on hardware implementations of Elliptic Curve Cryptosystems (ECC). Several up-to-date Design aspects of the proposed scan-based attack are described, namely timing and leakage analysis that allows

  19. A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs and Ingrid Verbauwhede1,2

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs Kris Tiri1 and Ingrid Verbauwhede1 VLSI design flow to create secure, side-channel attack (SCA) resistant integrated circuits. The design standard cell design flow. We discuss the basis for side-channel attack resistance and adjust the library

  20. Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree

    E-Print Network [OSTI]

    Teske, Edlyn

    Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields, we analyze the Gaudry-Hess-Smart (GHS) Weil descent attack on the elliptic curve discrete logarithm with these parameters; and (ii) the GHS attack is more eĂ?cient for solving the ECDLP in E(F 2 N ) than for solving

  1. State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures

    E-Print Network [OSTI]

    Schaumont, Patrick

    , USA Abstract--Implementations of cryptographic primitives are vulnerable to physical attacks. While and up-to-date table of physical attacks and countermeasures is of paramount importance to system designers. This paper summarizes known physical attacks and counter- measures on Elliptic Curve

  2. On the Effectiveness of DDoS Attacks on Statistical Qiming Li Ee-Chien Chang Mun Choon Chan

    E-Print Network [OSTI]

    Chan, Mun Choon

    by the fiiter that guards the victim network. We study the effectiveness of DDoS attacks on such statistical study the effectiveness of DDoS attacks on statistical-based filtering in a general context whereOn the Effectiveness of DDoS Attacks on Statistical Filtering Qiming Li Ee-Chien Chang Mun Choon

  3. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  4. Remote controlled-NOT gate of d-dimension

    E-Print Network [OSTI]

    Gui-Fang Dang; Heng Fan

    2008-01-23T23:59:59.000Z

    Single qubit rotation gate and the controlled-NOT (CNOT) gate constitute a complete set of gates for universal quantum computation. In general the CNOT gate are only for two nearby qubits. For two qubits which are remote from each other, we need a series of swap gates to transfer these two qubits to the nearest neighboring sites, and then after the CNOT gate we should transfer them to their original sites again. However, a series of swap gates are resource for quantum information processing. One economy way which does not consume so much resource is to implement CNOT gate remotely. The remote CNOT gate is to implement the CNOT gate for two remotely separated qubits with the help of one additional maximally entangled state. The original remote CNOT gate is for two qubits, here we will present the d-dimensional remote CNOT gate. The role of quantum teleportation is identified in the process of the remote CNOT gate.

  5. Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol

    SciTech Connect (OSTI)

    Tsurumaru, Toyohiro [Mitsubishi Electric Corporation, Information Technology R and D Center, 5-1-1 Ofuna, Kamakura-shi, Kanagawa, 247-8501 (Japan)

    2007-06-15T23:59:59.000Z

    In this paper, we discuss the security of the differential-phase-shift quantum-key-distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. [Phys. Rev. A 73, 012344 (2006)]. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the 'discretized Gaussian' intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100 km reported by Diamanti et al. [Opt. Express 14, 13073 (2006)] turns out to be insecure. Moreover, it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95 km.

  6. Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis

    E-Print Network [OSTI]

    Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

    2012-01-01T23:59:59.000Z

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

  7. Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01T23:59:59.000Z

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

  8. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31T23:59:59.000Z

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  9. Self-referencing remote optical probe

    DOE Patents [OSTI]

    O'Rourke, P.E.; Prather, W.S.; Livingston, R.R.

    1991-08-13T23:59:59.000Z

    A probe is described for remote spectrometric measurements of fluid samples having a hollow probe body with a sliding reflective plug therein and a lens at one end, ports for admitting and expelling the fluid sample and a means for moving the reflector so that reference measurement can be made with the reflector in a first position near the lens and a sample measurement can be made with the reflector away from the lens and the fluid sample between the reflector and the lens. Comparison of the two measurements will yield the composition of the fluid sample. The probe is preferably used for remote measurements and light is carried to and from the probe via fiber optic cables. 3 figures.

  10. Portsmouth X300 remote assay monitor system

    SciTech Connect (OSTI)

    Smith, D.E.

    1996-07-01T23:59:59.000Z

    Personnel in the Instrumentation and Controls Division at Oak Ridge National Laboratory (ORNL) in association with the United States Enrichment Corporation (USEC) have recently developed a system for monitoring and tracking the assay of enriched uranium from the production facilities at the Portsmouth Gaseous Diffusion Plant (PORTS). This work was sponsored by the USEC and has involved the expansion and improvement of an existing system that was developed by ORNL. The system provides control room operators with real-time information on the withdrawal operations of uranium hexafluoride at the withdrawal stations at PORTS. An additional system was developed to display the real-time information from each of the three withdrawal stations at a remotely located building. This report describes the remote assay monitor and display system that has been developed and installed at PORTS Building X300.

  11. Remote State Preparation of Mental Information

    E-Print Network [OSTI]

    Patrizio E. Tressoldi; Andrei Khrennikov

    2012-07-26T23:59:59.000Z

    The aim of this paper is to define in theoretical terms and summarise the available experimental evidence that physical and mental "objects", if considered "information units", may present similar classical and quantum models of communication beyond their specific characteristics. Starting with the Remote State Preparation protocol, a variant of the Teleportation protocol, for which formal models and experimental evidence are already available in quantum mechanics, we outline a formal model applied to mental information we defined Remote State Preparation of Mental Information (RSPMI), and we summarise the experimental evidence supporting the feasibility of a RSPMI protocol. The available experimental evidence offers strong support to the possibility of real communication at distance of mental information promoting the integration between disciplines that have as their object of knowledge different aspects of reality, both physical and the mental, leading to a significant paradigm shift in cognitive and information science.

  12. Remote quantum gates mediated by spin chains

    E-Print Network [OSTI]

    R. Ronke; I. D'Amico; T. P. Spiller

    2010-03-09T23:59:59.000Z

    There has been much recent study on the application of spin chains to quantum state transfer and communication. Here we demonstrate that spin chains set up for perfect quantum state transfer can be utilised to generate remote quantum gates, between spin qubits injected at the ends of the chain. The natural evolution of the system across different excitation number sectors generates a maximally-entangling and universal gate between the injected qubits, independent of the length of the chain.

  13. Techniques for remotely sensing watershed runoff potential

    E-Print Network [OSTI]

    Walker, Jerry Don

    1978-01-01T23:59:59.000Z

    Techniques for Remotely Sensing Watershed Runoff Potential. (August 1978) Jerry Don Walker, B. S. , Texas ASM University Directed by: Dr. Bruce J. Blanchard The Soil Conservation Service runoff equation is widely used for predicting the watershed runoff... cases, no outflow occurs through the spillway of an overdes1gned structure. Since evaporation losses are high 1n these areas, the salinity of the water stored in the structure gradually increases with time. With insufficient flow through...

  14. Remote/New sites: Many Field

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote

  15. T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).

  16. Remote controlled vacuum joint closure mechanism

    DOE Patents [OSTI]

    Doll, David W. (San Diego, CA); Hager, E. Randolph (La Jolla, CA)

    1986-01-01T23:59:59.000Z

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange.

  17. Remote state preparation of spatial qubits

    E-Print Network [OSTI]

    M. A. Solís-Prosser; L. Neves

    2011-08-17T23:59:59.000Z

    We study the quantum communication protocol of remote state preparation (RSP) for pure states of qubits encoded in single photons transmitted through a double slit, the so-called spatial qubits. Two measurement strategies that one can adopt to remotely prepare the states are discussed. The first strategy is the well-known spatial postselection, where a single-pixel detector measures the transverse position of the photon between the focal and the image plane of a lens. The second strategy, proposed by ourselves, is a generalized measurement divided into two steps: the implementation of a two-outcome positive operator-valued measurement (POVM) followed by the spatial postselection at the focal plane of the lens by a two-pixel detector in each output of the POVM. In both cases we analyze the effects of the finite spatial resolution of the detectors over three figures of merit of the protocol, namely, the probability of preparation, the fidelity and purity of the remotely prepared states. It is shown that our strategy improves these figures compared with spatial postselection, at the expense of increasing the classical communication cost as well as the required experimental resources. In addition, we present a modified version of our strategy for RSP of spatial qudits which is able to prepare arbitrary pure states, unlike spatial postselection alone. We expect that our study may also be extended for RSP of the angular spectrum of a single-photon field as an alternative for quantum teleportation which requires very inefficient nonlinear interactions.

  18. Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs

    E-Print Network [OSTI]

    Matta, Abraham "Ibrahim"

    #0205294, and EIA RI Award #0202067, and by grants from Fortress Technologies. attacks are orchestrated], [12], routing protocols [15], firewalls and traffic shapers [32], [14], HTTP and database server farms

  19. Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2006-02-24T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

  20. An immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol

    E-Print Network [OSTI]

    Osamu Hirota; Kaoru Kurosawa

    2006-04-06T23:59:59.000Z

    This paper presents the security analysis on the quantum stream cipher so called Yuen-2000 protocol (or $\\alpha\\eta$ scheme) against the fast correlation attack, the typical attack on stream ciphers. Although a very simple experimental model of the quantum stream cipher without a random mapper may be decrypted in the information theoretic sense by the fast correlation algorithm, it is not a basic feature of Yuen 2000 protocol. In fact, we clarify that there exists a randomization scheme which attains the perfect correlation immunity against such attacks under an approximation. And in this scheme, the running key correlation from the second randomization that determines the mapping patterns is dismissed also by quantum noise. In such a case, any fast correlation attack does not work on the quantum stream cipher.

  1. Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2005-08-03T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

  2. DEFENDING AGAINST PHYSICAL DESTRUCTION ATTACKS ON WIRELESS SENSOR Chi Zhang, Yanchao Zhang, Yuguang Fang

    E-Print Network [OSTI]

    Zhang, Yanchao

    with stealth by moving across the ROI. Physical attacks are inevitable threats in WSNs: they are relatively, and should be an inseparable complementarity of the report about the observed events in the ROI. Secondly

  3. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  4. Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design

    E-Print Network [OSTI]

    Bullo, Francesco

    the prototypical stealth, (dynamic) false-data injection and replay attacks. We characterize the fundamental]. The development of security This material is based in part upon work supported by NSF grants IIS- 0904501 and CPS

  5. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22T23:59:59.000Z

    Do nations' allies and trading partners affect their vulnerability to transnational terrorist attacks? Prior research has focused on how the attributes of individual nations, such as regime type, economic stability, and international power, affect...

  6. Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying ...

  7. A spillway infrastructure for defense against Distributed Denial of Service attacks

    E-Print Network [OSTI]

    Barkley, Andrew Holman

    2000-01-01T23:59:59.000Z

    to satisfy a balance of the following uncategorized guidelines: ~ Secure communication: the protocol is dilficult to be tricked by malicious mes- sages, and does not have any known flaws or vulnerabilities useful to a new type of attack. Weaknesses...

  8. Differential-phase-shift quantum key distribution with phase modulation to combat sequential attacks

    SciTech Connect (OSTI)

    Kawahara, Hiroki; Oka, Toru; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

    2011-11-15T23:59:59.000Z

    Phase-modulated differential-phase-shift (DPS) quantum key distribution (QKD) is presented for combating sequential attacks that most severely restrict the DPS-QKD system distance. Slow phase modulation imposed onto the DPS signal obstructs the optimum unambiguous state discrimination measurement conducted in the sequential attack and improves the QKD distance as a result. The condition with which the phase modulation does not degrade the DPS-QKD system performance is also described.

  9. Beamsplitting attack to the revised KKKP protocol and a possible solution

    E-Print Network [OSTI]

    Xiang-Bin Wang; Qiang Zhang; Yu-Ao Chen; Wong-Young Hwang; Myungshik Kim; Jian-Wei Pan

    2006-03-15T23:59:59.000Z

    We show that the revised KKKP protocol proposed by Kye and Kim [Phys. Rev. Lett. 95,040501(2005)] is still insecure with coherent states by a type of beamsplitting attack. We then further revise the KKKP protocol so that it is secure under such type of beamsplitting attack. The revised scheme can be used for not-so-weak coherent state quantum key distribution.

  10. Dissipation attack on Bennett-Brassard 1984 protocol in practical quantum key distribution system

    E-Print Network [OSTI]

    Li Yang; Bing Zhu

    2013-05-24T23:59:59.000Z

    We propose a new kind of individual attack, based on randomly selected dissipation, on Bennett-Brassard 1984 protocol of practical quantum key distribution (QKD) system with lossy and noisy quantum channel. Since an adversary with super quantum channel can disguise loss and errors induced by his attack as that of the system, he can obtain innegligible amount of information for a practical QKD system, without being detected by legal participants.

  11. Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking

    E-Print Network [OSTI]

    Dube, Raghav

    2005-02-17T23:59:59.000Z

    DENIAL OF SERVICE ATTACKS: PATH RECONSTRUCTION FOR IP TRACEBACK USING ADJUSTED PROBABILISTIC PACKET MARKING A Thesis by RAGHAV DUBE Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE December 2004 Major Subject: Electrical Engineering DENIAL OF SERVICE ATTACKS: PATH RECONSTRUCTION FOR IP TRACEBACK USING ADJUSTED PROBABILISTIC PACKET MARKING A Thesis by RAGHAV DUBE Submitted to Texas A&M University...

  12. Modeling experiments that simulate fragment attacks on cased munitions

    SciTech Connect (OSTI)

    Kerrisk, J.F.

    1996-01-01T23:59:59.000Z

    Roberts and Field (1993) have conducted experiments to observe the behavior of a cased high explosive (HE) charge subject to fragment attack at impact velocities below those needed for shock initiation. Two and three-dimensional hydrodynamic calculations have been done to model these experiments. Questions about the degree of confinement of the HE and about the condition of the HE during the impact were addressed. The calculations indicate that the HE was not strongly confined in this experiment, primarily due to the lateral expansion of polycarbonate blocks on the sides of the target during the impact. HE was not ejected from the hole in the casing made by the projectile up to 30 {micro}s after the impact. There are hints from these calculations of how initiation of a homogeneous sample of HE might occur in the experiment. The first involves the reshock of a small amount of HE at {approximately} 20 {micro}s as a result of the impact of the sabot on the target. The second involves the heating of the HE from plastic work during the impact. The maximum temperature rise of the HE (exclusive of the small region that was reshocked) was {approximately} 80 k. However, this is the average temperature of a region the size of a computational cell, and phenomena such as shear bands or cracks could result in higher temperatures on a smaller scale than the cell size. The third involves heating of the HE from contact with the casing material. The maximum temperature rise of the casing material from plastic work is {approximately} 870 k. This temperature occurs at the edge of a plug of casing material sheared off by the projectile. Other parts of the casing are shock heated to higher energies but may not contact the HE.

  13. Efficiency of attack strategies on complex model and real-world networks

    E-Print Network [OSTI]

    Bellingeri, Michele; Vincenzi, Simone

    2013-01-01T23:59:59.000Z

    We investigated the efficiency of attack strategies to network nodes when targeting several complex model and real-world networks. We tested 5 attack strategies, 3 of which were introduced in this work for the first time, to attack 3 model (Erdos and Renyi, Barabasi and Albert preferential attachment network, and scale-free network configuration models) and 3 real networks (Gnutella peer-to-peer network, email network of the University of Rovira i Virgili, and immunoglobulin interaction network). Nodes were removed sequentially according to the importance criterion defined by the attack strategy. We used the size of the largest connected component (LCC) as a measure of network damage. We found that the efficiency of attack strategies (fraction of nodes to be deleted for a given reduction of LCC size) depends on the topology of the network, although attacks based on the number of connections of a node and betweenness centrality were often the most efficient strategies. Sequential deletion of nodes in decreasin...

  14. Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista 1. In order to use Remote Desktop and the VPN client, users must first complete the Blackboard Remote

    E-Print Network [OSTI]

    Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista 1. In order to use Remote Desktop and the VPN client, users must first complete the Blackboard Remote Users training course and then download and install the VPN client on the workstation that they will use to remote to their office

  15. Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows XP 1. In order to use Remote Desktop and the VPN client, users must first complete the Blackboard Remote

    E-Print Network [OSTI]

    Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows XP 1. In order to use Remote Desktop and the VPN client, users must first complete the Blackboard Remote Users training course and then download and install the VPN client on the workstation that they will use to remote to their office

  16. 898 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 3, MARCH 2012 Most Active Band (MAB) Attack and Countermeasures in a

    E-Print Network [OSTI]

    Yang, Eui-Hyeok

    ) Attack and Countermeasures in a Cognitive Radio Network Nansai Hu, Student Member, IEEE, Yu-Dong Yao, Fellow, IEEE, and Joseph Mitola, Fellow, IEEE Abstract--This paper investigates a type of attacks on a cognitive radio (CR) network, most active band (MAB) attack, where an attacker or a malicious CR node senses

  17. Use Remote Sensing Data (selected visible and infrared spectrums...

    Broader source: Energy.gov (indexed) [DOE]

    Use Remote Sensing Data (selected visible and infrared spectrums) to locate high temperature ground anomalies in Colorado. Confirm heat flow potential with on-site surveys to drill...

  18. Use Remote Sensing Data (selected visible and infrared spectrums...

    Broader source: Energy.gov (indexed) [DOE]

    City - May 19, 2010 * Project Title - "Use Remote Sensing Data (selected visible and infrared spectrums) to locate high temperature ground anomalies in Colorado. Confirm heat flow...

  19. Method of determining forest production from remotely sensed forest parameters

    DOE Patents [OSTI]

    Corey, J.C.; Mackey, H.E. Jr.

    1987-08-31T23:59:59.000Z

    A method of determining forest production entirely from remotely sensed data in which remotely sensed multispectral scanner (MSS) data on forest 5 composition is combined with remotely sensed radar imaging data on forest stand biophysical parameters to provide a measure of forest production. A high correlation has been found to exist between the remotely sensed radar imaging data and on site measurements of biophysical 10 parameters such as stand height, diameter at breast height, total tree height, mean area per tree, and timber stand volume.

  20. Microsoft Word - GHGT11_Litynski_Remote Sensing.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 Litynski et al. Energy Procedia 00 (2012) 000-000 Keywords: DOE, NETL, Regional Carbon Sequestration Partnerships, Remote Sensing, Surface Displacement, Passive Scanner,...

  1. Alternative Carriers For Remote Renewable Energy Sources Using...

    Open Energy Info (EERE)

    Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal Article: Alternative Carriers For Remote Renewable Energy Sources Using Existing Cng Infrastructure...

  2. JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    boundary layer and will provide invaluable ground truth for satellite and aircraft remote sensor measurements. Analyses from these two UAS tropical cyclone missions will be...

  3. U-051: Skype Discloses IP Addresses to Remote Users | Department...

    Broader source: Energy.gov (indexed) [DOE]

    available at the time of this entry. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

  4. Community Energy Planning A Resource Guide for Remote Communities...

    Open Energy Info (EERE)

    Canada Jump to: navigation, search Name Community Energy Planning A Resource Guide for Remote Communities in Canada AgencyCompany Organization Natural Resources Canada Sector...

  5. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  6. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was...

  7. Remote extraction and destruction of spread qubit information

    E-Print Network [OSTI]

    Yoshiko Ogata; Mio Murao

    2007-11-12T23:59:59.000Z

    Necessary and sufficient conditions for deterministic remote extraction and destruction of qubit information encoded in bipartite states using only local operations and classical communications (LOCC) are presented. The conditions indicate that there is a way to asymmetrically spread qubit information between two parties such that it can be remotely extracted with unit probability at one of the parties but not at the other as long as they are using LOCC. Remote destruction can also be asymmetric between the two parties, but the conditions are incompatible with those for remote extraction.

  8. Structural investigations at the Coso geothermal area using remote...

    Open Energy Info (EERE)

    investigations at the Coso geothermal area using remote sensing information, Inyo County, California Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  9. Remote Detection Of Quaternary Borate Deposits With Aster Satellite...

    Open Energy Info (EERE)

    Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Remote Detection Of Quaternary Borate Deposits With Aster Satellite Imagery As A Geothermal...

  10. U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

  11. Remote controlled vacuum joint closure mechanism

    DOE Patents [OSTI]

    Doll, D.W.; Hager, E.R.

    1984-02-22T23:59:59.000Z

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange and maintain the high vacuum seal established by the displacement of the flange assembly and extension of the bellows without displacing the entire duct.

  12. An advanced unmanned vehicle for remote applications

    SciTech Connect (OSTI)

    Pletta, J.B.; Sackos, J.

    1998-03-01T23:59:59.000Z

    An autonomous mobile robotic capability is critical to developing remote work applications for hazardous environments. A few potential applications include humanitarian demining and ordnance neutralization, extraterrestrial science exploration, and hazardous waste cleanup. The ability of the remote platform to sense and maneuver within its environment is a basic technology requirement which is currently lacking. This enabling technology will open the door for force multiplication and cost effective solutions to remote operations. The ultimate goal of this work is to develop a mobile robotic platform that can identify and avoid local obstacles as it traverses from its current location to a specified destination. This goal directed autonomous navigation scheme uses the Global Positioning System (GPS) to identify the robot`s current coordinates in space and neural network processing of LADAR range images for local obstacle detection and avoidance. The initial year funding provided by this LDRD project has developed a small exterior mobile robotic development platform and a fieldable version of Sandia`s Scannerless Range Imager (SRI) system. The robotic testbed platform is based on the Surveillance And Reconnaissance ground Equipment (SARGE) robotic vehicle design recently developed for the US DoD. Contingent upon follow-on funding, future enhancements will develop neural network processing of the range map data to traverse unstructured exterior terrain while avoiding obstacles. The SRI will provide real-time range images to a neural network for autonomous guidance. Neural network processing of the range map data will allow real-time operation on a Pentium based embedded processor board.

  13. Securing Remote Desktop for Windows XP http://www.mobydisk.com/./techres/securing_remote_desktop.html

    E-Print Network [OSTI]

    Major, Arkady

    an account lockout policy #12;There are already tools that will use brute-force to guess passwords and log-on remotely. You cannot stop this, but it can be minimized by setting an account lockout policy. If someone system. From the same Local Security Policy screen from before, go to Account Policies - Account Lockout

  14. Remote vacuum compaction of compressible hazardous waste

    DOE Patents [OSTI]

    Coyne, M.J.; Fiscus, G.M.; Sammel, A.G.

    1998-10-06T23:59:59.000Z

    A system is described for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut. 8 figs.

  15. High aspect ratio, remote controlled pumping assembly

    DOE Patents [OSTI]

    Brown, Steve B. (Livermore, CA); Milanovich, Fred P. (Lafayette, CA)

    1995-01-01T23:59:59.000Z

    A miniature dual syringe-type pump assembly which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor.

  16. REMOTE AREA RADIATION MONITORING (RARM) ALTERNATIVES ANALYSIS

    SciTech Connect (OSTI)

    NELSON RL

    2008-07-18T23:59:59.000Z

    The Remote Area Radiation Monitoring (RARM) system will be used to provide real-time radiation monitoring information to the operations personnel during tank retrieval and transfer operations. The primary focus of the system is to detect potential anomalous (waste leaks) or transient radiological conditions. This system will provide mobile, real-time radiological monitoring, data logging, and status at pre-selected strategic points along the waste transfer route during tank retrieval operations. The system will provide early detection and response capabilities for the Retrieval and Closure Operations organization and Radiological Control personnel.

  17. Remote vacuum compaction of compressible hazardous waste

    DOE Patents [OSTI]

    Coyne, Martin J. (Pittsburgh, PA); Fiscus, Gregory M. (McMurray, PA); Sammel, Alfred G. (Pittsburgh, PA)

    1998-01-01T23:59:59.000Z

    A system for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut.

  18. PV Charging System for Remote Area Operations

    SciTech Connect (OSTI)

    Ilsemann, Frederick; Thompson, Roger

    2008-07-31T23:59:59.000Z

    The objective of this project is to provide the public with a study of new as well existing technology to recharge batteries used in the field. A new product(s) will also be built based upon the information ascertained. American Electric Vehicles, Inc. (AEV) developed systems and methods suitable for charging state-of-the-art lithium-ion batteries in remote locations under both ideal and cloudy weather conditions. Conceptual designs are described for existing and next generation technology, particularly as regards solar cells, peak power trackers and batteries. Prototype system tests are reported.

  19. High aspect ratio, remote controlled pumping assembly

    DOE Patents [OSTI]

    Brown, S.B.; Milanovich, F.P.

    1995-11-14T23:59:59.000Z

    A miniature dual syringe-type pump assembly is described which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor. 4 figs.

  20. Remote preparation of an atomic quantum memory

    E-Print Network [OSTI]

    Wenjamin Rosenfeld; Stefan Berner; Juergen Volz; Markus Weber; Harald Weinfurter

    2006-08-29T23:59:59.000Z

    Storage and distribution of quantum information are key elements of quantum information processing and quantum communication. Here, using atom-photon entanglement as the main physical resource, we experimentally demonstrate the preparation of a distant atomic quantum memory. Applying a quantum teleportation protocol on a locally prepared state of a photonic qubit, we realized this so-called remote state preparation on a single, optically trapped 87Rb atom. We evaluated the performance of this scheme by the full tomography of the prepared atomic state, reaching an average fidelity of 82%.