National Library of Energy BETA

Sample records for url redirection attacks

  1. OutageMapURL Phases Energy Services

    Open Energy Info (EERE)

    OutageMapURL Phases Energy Services County Electric Power Assn http outages county org A N Electric Coop Virginia AEP Generating Company https www aepaccount com zipr...

  2. Light Redirective Display Panel And A Method Of Making A Light Redirective Display Panel

    DOE Patents [OSTI]

    Veligdan, James T. (Manorville, NY)

    2005-07-26

    An optical display panel which provides improved light intensity at a viewing angle by redirecting light emitting from the viewing screen, and a method of making a light redirective display panel, are disclosed. The panel includes an inlet face at one end for receiving light, and an outlet screen at an opposite end for displaying the light. The inlet face is defined at one end of a transparent body, which body may be formed by a plurality of waveguides, and the outlet screen is defined at an opposite end of the body. The screen includes light redirective elements at the outlet screen for re-directing light emitting from the outlet screen. The method includes stacking a plurality of glass sheets, with a layer of adhesive or epoxy between each sheet, curing the adhesive to form a stack, placing the stack against a saw and cutting the stack at two opposite ends to form a wedge-shaped panel having an inlet face and an outlet face, and forming at the outlet face a plurality of light redirective elements which direct light incident on the outlet face into a controlled light cone.

  3. Light redirective display panel and a method of making a light redirective display panel

    DOE Patents [OSTI]

    Veligdan, James T. (Manorville, NY)

    2002-01-01

    An optical display panel which provides improved light intensity at a viewing angle by redirecting light emitting from the viewing screen, and a method of making a light redirective display panel, are disclosed. The panel includes an inlet face at one end for receiving light, and an outlet screen at an opposite end for displaying the light. The inlet face is defined at one end of a transparent body, which body may be formed by a plurality of waveguides, and the outlet screen is defined at an opposite end of the body. The screen includes light redirective elements at the outlet screen for re-directing light emitting from the outlet screen. The method includes stacking a plurality of glass sheets, with a layer of adhesive or epoxy between each sheet, curing the adhesive to form a stack, placing the stack against a saw and cutting the stack at two opposite ends to form a wedge-shaped panel having an inlet face and an outlet face, and forming at the outlet face a plurality of light redirective elements which direct light incident on the outlet face into a controlled light cone.

  4. Widget:DatasetsRedirect | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJThinWarsaw,What Is a SmallAnchorTextDatasetsRedirect Jump to:

  5. Help:Redirects | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavy ElectricalsFTLTechnology Srl Jump to:sourceMathRedirects Jump

  6. Property:NEPA Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS Report Url Jump to: navigation, searchEISFederalRegisterDateUrl Jump

  7. Active Wake Redirection Control to Improve Energy Yield (Poster)

    SciTech Connect (OSTI)

    Churchfield, M. J.; Fleming, P.; DeGeorge, E.; Bulder, B; White, S. M.

    2014-10-01

    Wake effects can dramatically reduce the efficiency of waked turbines relative to the unwaked turbines. Wakes can be deflected, or 'redirected,' by applying yaw misalignment to the turbines. Yaw misalignment causes part of the rotor thrust vector to be pointed in the cross-stream direction, deflecting the flow and the wake. Yaw misalignment reduces power production, but the global increase in wind plant power due to decreased wake effect creates a net increase in power production. It is also a fairly simple control idea to implement at existing or new wind plants. We performed high-fidelity computational fluid dynamics simulations of the wake flow of the proposed Fishermen's Atlantic City Windfarm (FACW) that predict that under certain waking conditions, wake redirection can increase plant efficiency by 10%. This means that by applying wake redirection control, for a given watersheet area, a wind plant can either produce more power, or the same amount of power can be produced with a smaller watersheet area. With the power increase may come increased loads, though, due to the yaw misalignment. If misalignment is applied properly, or if layered with individual blade pitch control, though, the load increase can be mitigated. In this talk we will discuss the concept of wake redirection through yaw misalignment and present our CFD results of the FACW project. We will also discuss the implications of wake redirection control on annual energy production, and finally we will discuss plans to implement wake redirection control at FACW when it is operational.

  8. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

  9. OutageMapURL Phases Energy Services

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio Program | OpenWisconsin:New York:PolicyTailEnergyOpenOutageMapURL

  10. Property:HPBD/URL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to: navigation,PropertyPartner7Website Jump to:TypeGrossProdCapacityURL Jump

  11. Property:KML URL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to: navigation,PropertyPartner7WebsiteCertReqs JumpResCode JumpInd salesKML URL

  12. Property:NEPA FONSI Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS Report Url Jump to: navigation, search Property Name NEPA EAFONSI Url

  13. Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options -New York Times January 22, 2008

    E-Print Network [OSTI]

    Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options - New York Times January 22, 2008 Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options By ELISABETH for biofuels, acknowledging that the environmental benefits of these fuels have often been overstated

  14. Modeling Momentum Transfer from Kinetic Impacts: Implications for Redirecting Asteroids

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Stickle, A. M.; Atchison, J. A.; Barnouin, O. S.; Cheng, A. F.; Crawford, D. A.; Ernst, C. M.; Fletcher, Z.; Rivkin, A. S.

    2015-05-19

    Kinetic impactors are one way to deflect a potentially hazardous object headed for Earth. The Asteroid Impact and Deflection Assessment (AIDA) mission is designed to test the effectiveness of this approach and is a joint effort between NASA and ESA. The NASA-led portion is the Double Asteroid Redirect Test (DART) and is composed of a ~300-kg spacecraft designed to impact the moon of the binary system 65803 Didymos. The deflection of the moon will be measured by the ESA-led Asteroid Impact Mission (AIM) (which will characterize the moon) and from ground-based observations. Because the material properties and internal structure ofmore »the target are poorly constrained, however, analytical models and numerical simulations must be used to understand the range of potential outcomes. Here, we describe a modeling effort combining analytical models and CTH simulations to determine possible outcomes of the DART impact. We examine a wide parameter space and provide predictions for crater size, ejecta mass, and momentum transfer following the impact into the moon of the Didymos system. For impacts into “realistic” asteroid types, these models produce craters with diameters on the order of 10 m, an imparted ?v of 0.5–2 mm/s and a momentum enhancement of 1.07 to 5 for a highly porous aggregate to a fully dense rock.« less

  15. Property:NEPA EA EIS Report Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS Report Url Jump to: navigation, search Property Name NEPA EA EIS

  16. Property:NEPA Extraordinary Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS Report Url Jump to: navigation, search Property Name NEPA EA

  17. Property:OutageMapURL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS Report Url Jump to: navigation,News/LinkUtility Jump

  18. Property:Buildings/PublicationURL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsourceIIInformationEnergy InformationInformationModelXmlFilePublicationURL

  19. Property:File/SourceURL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to: navigation,Property EditMimeType Jump to: navigation, searchSourceURL Jump

  20. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  1. Pointright: a system to redirect mouse and keyboard control among multiple machines

    DOE Patents [OSTI]

    Johanson, Bradley E. (Palo Alto, CA); Winograd, Terry A. (Stanford, CA); Hutchins, Gregory M. (Mountain View, CA)

    2008-09-30

    The present invention provides a software system, PointRight, that allows for smooth and effortless control of pointing and input devices among multiple displays. With PointRight, a single free-floating mouse and keyboard can be used to control multiple screens. When the cursor reaches the edge of a screen it seamlessly moves to the adjacent screen and keyboard control is simultaneously redirected to the appropriate machine. Laptops may also redirect their keyboard and pointing device, and multiple pointers are supported simultaneously. The system automatically reconfigures itself as displays go on, go off, or change the machine they display.

  2. Combining Passive Haptics with Redirected Walking luv@cs.unc.edu

    E-Print Network [OSTI]

    Pollefeys, Marc

    Combining Passive Haptics with Redirected Walking Luv Kohli luv@cs.unc.edu Eric Burns burns of haptic feedback and constraints imposed by limited tracker space. Passive haptic feedback has been used introduce a method by which they can be combined to address both problems simultaneously. Key words: passive

  3. URL To Story: http://press.arrivenet.com/technology/article.php/993701.html RFID Innovation in Healthcare

    E-Print Network [OSTI]

    Chiao, Jung-Chih

    URL To Story: http://press.arrivenet.com/technology/article.php/993701.html RFID Innovation as an engine for ideas, people and capital. http://www.rfidtribe.org ArriveNet Press Releases : RFID Innovation in Healthcare URL: http://press.arrivenet.com/technology/print.php?url=http://press

  4. Send to Printer Back to Story This page has been printed from the following URL

    E-Print Network [OSTI]

    Menzel, Suzanne

    Send to Printer Back to Story This page has been printed from the following URL: http at the basics of computer programming at a Game Programming for Girls event held this month at the Seacoast

  5. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  6. Redirecting science

    SciTech Connect (OSTI)

    Aaserud, F.

    1990-01-01

    This book contains the following chapters. Science policy and fund-raising up to 1934; The Copenhagen spirit at work, late 1920's to mid-1930s; The refugee problem, 1933 to 1935; Experimental biology, late 1920s to 1935; and Consolidation of the transition, 1935 to 1940.

  7. Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures Guillaume Barbu1. Until 2009, Java Cards have been mainly threatened by Log- ical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code

  8. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Grids”, IEEE Transactions on Smart Grid, vol. 2, no. 2,Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  9. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  10. Redirection of the spherical expanding shock wave on the interface with plasma

    SciTech Connect (OSTI)

    Markhotok, A.; Popovic, S.

    2014-02-15

    We study a strong spherical expanding shock wave interacting with the finite-gradient interface between neutral cold gas and weakly ionized plasma. We want to see how the interaction with the interface can alter the shock structure compared to the case of its free propagation through the media with the exponentially varying density. From our comparative calculations based on the 2D model, we found substantial difference in the shock structure including strong deformation of the shock front followed with its gradual flattening and the redirection in its propagation. There are a number of factors that can be used to control this phenomenon in order to strengthen or lessen the effect. The calculations can be made on any scale, limited with the requirement for the shock wave to be strong. The study points at the possibility in certain applications to avoid the shock wave with its redirection rather than attenuation. The results can be applicable to optimization of the energy deposition into the supersonic flux, the drag reduction in hypersonic flight, in the detonation theory, and combustion through the control of the ignition conditions, and for environmental improvements through sonic boom reduction. Cartesian coordinates were used in order to visualize the phenomenon.

  11. Columbia University Press 2009.06.15 e-e-e-e-ISBN URL

    E-Print Network [OSTI]

    Wu, Yih-Min

    Columbia University Press 2009.06.15 e-e-e-e-ISBN URL Art & Humanities 9780231512732 Changing Clothes in China: Fashion, History, Nation 1 Finnane, Antonia Columbia Press University 2008 http Rotem Columbia Press University 2008 http://www.igpublish.com/columbia- ebooks

  12. Program Sponsor Abstract Deadline Amount Allowable Costs Eligibility URL Notes MARC Undergraduate

    E-Print Network [OSTI]

    Hammack, Richard

    Program Sponsor Abstract Deadline Amount Allowable Costs Eligibility URL Notes NIH MARC Expenses; F&A; Supplements An eligible institution may apply for and hold only one MARC U- STAR academic for another MARC under this FOA. John Ryan was awarded a MARC in FY11 that will not be completed until 2015

  13. Paper Title: Interactive URL Correction for Proxy Request Kai-Hsiang Yang and Chi-Chien Pan and Tzao-Lin Lee

    E-Print Network [OSTI]

    Yang, Kai-Hsiang

    or just guess one URL for the product or company name. For example, we often enter the URL ("www.starbucks.com") for the company "starbucks". But when we enter the word w

  14. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  15. Retargeting Attacks from Windows to Android With Limited Data Extraction

    E-Print Network [OSTI]

    Ng, Cary G.

    2014-01-01

    Retargeting the Attack to Android . . . . . . . . . .The Popularity of Android Devices . . . . . . . . . . .3 Android Attack . . . . .

  16. Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512 Takanori.Isobe,Taizo.Shirai}@jp.sony.com Abstract. This paper studies two types of attacks on the hash function Shabal. The first attack is a low on a low-weight pseudo collision attack. It means that only low-weight difference in a chaining value

  17. name SRSCRO description url http www srscro org namespaces oembed authentication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopmentatabout Who Works for NIFYuccaPagesSRSCRO description url

  18. Quantum attacks against iterated block ciphers

    E-Print Network [OSTI]

    Marc Kaplan

    2015-04-26

    We study the amplification of security against quantum attacks provided by iteration of block ciphers. In the classical case, the Meet-in-the-middle attack is a generic attack against those constructions. This attack reduces the time required to break double iterations to only twice the time it takes to attack a single block cipher, given that the attacker has access to a large amount of memory. More abstractly, it shows that security by composition does not achieve exact multiplicative amplification. We present a quantized version of this attack based on an optimal quantum algorithm for the Element Distinctness problem. We then use the generalized adversary method to prove the optimality of the attack. An interesting corollary is that the time-space tradeoff for quantum attacks is very different from what classical attacks allow. This first result seems to indicate that composition resists better to quantum attacks than to classical ones because it prevents the quadratic speedup achieved by quantizing an exhaustive search. We investigate security amplification by composition further by examining the case of four iterations. We quantize a recent technique called the dissection attack using the framework of quantum walks. Surprisingly, this leads to better gains over classical attacks than for double iterations, which seems to indicate that when the number of iterations grows, the resistance against quantum attacks decreases.

  19. The boomerang attack David Wagner

    E-Print Network [OSTI]

    Wagner, David

    . Second, we show how to break COCONUT98, a cipher designed using decorrelation techniques to en- sure (Rounds) Our Attack Data Complexity Time Complexity COCONUT98 (8) 2 16 CP 2 38 Khufu (16) 2 18 CP 2 18{5 below, where we show how to break COCONUT98 [V98] with just 2 16 chosen texts and 2 38 work, despite

  20. Secure routing in wireless sensor networks: attacks and countermeasures

    E-Print Network [OSTI]

    Xu, Wenyuan

    against sensor networks, introduce two classes of novel attacks against sensor networks­­sinkholes two novel classes of previously undocumented attacks against sensor net- works 1 ­­sinkhole attacks

  1. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    E-Print Network [OSTI]

    California at Berkeley, University of

    sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO two novel classes of previously undoc­ umented attacks against sensor networks 1 -- sinkhole attacks

  2. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

    E-Print Network [OSTI]

    Wagner, David

    sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO­ umented attacks against sensor networks 1 -- sinkhole attacks and HELLO floods. #15; We show

  3. A Novel Attack against Android Phones

    E-Print Network [OSTI]

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  4. A "Poisoning" Attack Against Online Anomaly Detection

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    A "Poisoning" Attack Against Online Anomaly Detection Marius Kloft Department of Computer Science it is robust against targeted "poisoning" attacks. The latter have been first investigated by Nelson et al. [1 of all data points observed so far. The key idea of a poisoning attack is to insert specially crafted

  5. Vulnerability Discovery with Attack IEEE Transactions on Software Engineering (2010)

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    2010-01-01

    : Monitor target system's state while executing attacks in 3 ways Overview of tool AJECT #12;Attack generate attacks in 4 ways Injection phase: Execute previously generated test cases(attacks) Monitoring

  6. Neural Networks in press URL ftp://iserv.iki.kfki.hu/pub/papers/new/szepes.cc.ps.Z

    E-Print Network [OSTI]

    Szepesvari, Csaba

    Neural Networks in press URL ftp://iserv.iki.kfki.hu/pub/papers/new/szepes.cc.ps.Z WWW http. Keywords: Neural network control, compensating perturbations, stability, feedback control, feedforward March 1997 #12; method. 1 Introduction A vast amount of work has dealt with neural networks

  7. URL: http://www.elsevier.nl/locate/entcs/volume68.html 18 pages Timed CSP = Closed Timed Automata 1

    E-Print Network [OSTI]

    Ouaknine, Joël

    URL: http://www.elsevier.nl/locate/entcs/volume68.html 18 pages Timed CSP = Closed Timed Automata 1 70118, USA Abstract We study the expressive power of an augmented version of Timed CSP and show constraints. We also show that this new version of Timed CSP is expressive enough to capture the most widely

  8. The Cost of Attack in Competing Networks

    E-Print Network [OSTI]

    Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

    2015-01-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

  9. Attacks on Java Card 3.0 Combining Fault and Logical Attacks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Attacks on Java Card 3.0 Combining Fault and Logical Attacks Guillaume Barbu1,2 , Hugues Thiebeauld://www.telecom-paristech.fr/ guillaume.barbu@telecom-paristech.fr Abstract. Java Cards have been threatened so far by attacks using ill it can no longer be applied to the Java Card 3 Connected Edition context where the bytecode verification

  10. Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed

    SciTech Connect (OSTI)

    Thanachareonkit, Anothai; Lee, Eleanor S.; McNeil, Andrew

    2013-08-31

    Daylight redirecting systems with vertical windows have the potential to offset lighting energy use in deep perimeter zones. Microstructured prismatic window films can be manufactured using low-cost, roll-to-roll fabrication methods and adhered to the inside surface of existing windows as a retrofit measure or installed as a replacement insulating glass unit in the clerestory portion of the window wall. A clear film patterned with linear, 50-250 micrometer high, four-sided asymmetrical prisms was fabricated and installed in the south-facing, clerestory low-e, clear glazed windows of a full-scale testbed facility. Views through the film were distorted. The film was evaluated in a sunny climate over a two-year period to gauge daylighting and visual comfort performance. The daylighting aperture was small (window-towall ratio of 0.18) and the lower windows were blocked off to isolate the evaluation to the window film. Workplane illuminance measurements were made in the 4.6 m (15 ft) deep room furnished as a private office. Analysis of discomfort glare was conducted using high dynamic range imaging coupled with the evalglare software tool, which computes the daylight glare probability and other metrics used to evaluate visual discomfort. The window film was found to result in perceptible levels of discomfort glare on clear sunny days from the most conservative view point in the rear of the room looking toward the window. Daylight illuminance levels at the rear of the room were significantly increased above the reference window condition, which was defined as the same glazed clerestory window but with an interior Venetian blind (slat angle set to the cut-off angle), for the equinox to winter solstice period on clear sunny days. For partly cloudy and overcast sky conditions, daylight levels were improved slightly. To reduce glare, the daylighting film was coupled with a diffusing film in an insulating glazing unit. The diffusing film retained the directionality of the redirected light spreading it within a small range of outgoing angles. This solution was found to reduce glare to imperceptible levels while retaining for the most part the illuminance levels achieved solely by the daylighting film.

  11. Machine Learning Attacks Against the ASIRRA CAPTCHA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Machine Learning Attacks Against the ASIRRA CAPTCHA Draft, February 28, 2008 Philippe Golle Palo of cats and dogs used in ASIRRA. This classifier is a combination of support-vector machine classifiers higher than the estimate given in [6] for machine vision attacks. The weakness we expose in the current

  12. Low-Density Attack Revisited Tetsuya Izu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Low-Density Attack Revisited Tetsuya Izu Jun Kogure Takeshi Koshiba Takeshi Shimoyama Secure The low-density attack proposed by Lagarias and Odlyzko is a powerful algorithm against the subset sum, densities of the subset sum problems should be higher than 0.9408... in order to avoid the low

  13. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  14. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  15. Improved Side Channel Attacks on Pairing Based Cryptography

    E-Print Network [OSTI]

    to passive attacks as well as to active attacks [12,8,21,11,22,13]. asdf This work was funded by the German

  16. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  17. Analysis and Defense of Emerging Malware Attacks 

    E-Print Network [OSTI]

    Xu, Zhaoyan

    2014-05-28

    to perform effectively and efficiently targeted malware analysis. Second, this dissertation studies a new trend of massive malware intrusion and proposes a new protection scheme to proactively defend malware attack. Lastly, our focus is new P2P malware. We...

  18. Inoculating Multivariate Schemes Against Differential Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding and Jason E. Gower scheme the Perturbed Matsumoto-Imai-Plus (PMI+) cryptosystem. Keywords: multivariate, public key resources. Multivariate public key cryptography provides one alternative since computations in small finite

  19. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  20. Sector4 redirect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r ecmswL,NISACSector

  1. Power Analysis Attacks against FPGA Implementations Shaohua Tang1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Power Analysis Attacks against FPGA Implementations of KLEIN Shaohua Tang1 , Jianhao Wu1 , Weijian not consider the potential attacks by power analysis methods. This paper presents power analysis attacks and complexity of our attacks via power analysis against KLEIN are discussed in detail. Besides

  2. Defining Code-injection Attacks Donald Ray Jay Ligatti

    E-Print Network [OSTI]

    Ligatti, Jay

    of mechanisms for mitigating such attacks. Categories and Subject Descriptors C.2.0 [Computer Communi- cation definitions of code-injection attacks (e.g., SQL-injection attacks) are flawed. The flaws make it possible these flaws in conventional definitions of code-injection attacks, this paper proposes a new definition, which

  3. Taxonomy for Description of Cross-Domain Attacks on CPS

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    . This attack has reportedly damaged over 1000 centrifuges at an Iranian uranium enrichment plant [1]. Multiple

  4. 10/19/10 8:28 PM38320 -Create an ArcGIS.com Web map using URL parameters Page 1 of 2http://resources.arcgis.com/content/kbase?fa=articleShow&d=38320

    E-Print Network [OSTI]

    Wright, Dawn Jeannine

    10/19/10 8:28 PM38320 - Create an ArcGIS.com Web map using URL parameters Page 1 of 2http:28 PM38320 - Create an ArcGIS.com Web map using URL parameters Page 2 of 2http://resources.arcgis.com/content/kbase?fa=articleShow&d=38320 HowTo: Create an ArcGIS.com Web map using URL parameters Article ID: 38320 Software: ArcGIS Online

  5. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  6. Protecting Mobile Devices From TCP Flooding Attacks

    E-Print Network [OSTI]

    Fu, Xiaoming

    against these kinds of attack · Waking up the device by sending random SYN packets will exhaust-holes for server ports doesn't prevent against battery exhaustion and spectrum waste · Some P2P applications (e.g., Skype) have mechanism built into protocol to traverse such firewalls, but not all of them do. · Our Goal

  7. Cyber Security Basic Defenses and Attack Trends

    E-Print Network [OSTI]

    Sastry, S. Shankar

    37 38 39 40 41 4273 MTC 4 Cyber Security Basic Defenses and Attack Trends Alvaro A. Cárdenas, Tanya for a successful defense. Cyber security is the branch of security dealing with digital or information technology.1 This chapter presents a selected overview on topics in cyber security. 1. Throughout the chapter, we use

  8. Supplemental Note 1. Access to datasets.................................................................pg. 5 Table S1: Accession IDs and internet URLs for access to datasets

    E-Print Network [OSTI]

    Lonardi, Stefano

    SI Guide Supplemental Note 1. Access to datasets.................................................................pg. 5 Table S1: Accession IDs and internet URLs for access to datasets Supplemental Note 2. Physical map statistics of barley HICF map S2.2 Selection of "gene-bearing" BAC clones Supplemental Note 3. Genomic

  9. ESAIM: Control, Optimisation and Calculus of Variations June 2002, Vol. 8, 130 URL: http://www.emath.fr/cocv/ DOI: 10.1051/cocv:2002016

    E-Print Network [OSTI]

    Bal, Guillaume

    mechanism such as, for instance, neutrons in nuclear reactors. The physical coefficients of the domain as the period . In nuclear reactor physics, equation (1) is known as the criticality problem for neutronESAIM: Control, Optimisation and Calculus of Variations June 2002, Vol. 8, 1­30 URL: http

  10. Defending against side-channel attacks : DynamoREA

    E-Print Network [OSTI]

    Wen, David, M. Eng. (David Y.). Massachusetts Institute of Technology

    2011-01-01

    Modern computer architectures are prone to leak information about their applications through side-channels caused by micro-architectural side-effects. Through these side-channels, attackers can launch timing attacks by ...

  11. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection...

  12. Attacking and Repairing the Improved ModOnions Protocol

    E-Print Network [OSTI]

    Borisov, Nikita

    Attacking and Repairing the Improved ModOnions Protocol Nikita Borisov1 , Marek Klonowski2 presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoid replay attacks. How- ever, ModOnions allowed the detour attack

  13. A Classification of SQL Injection Attacks and Countermeasures

    E-Print Network [OSTI]

    Orso, Alessandro "Alex"

    A Classification of SQL Injection Attacks and Countermeasures William G.J. Halfond, Jeremy Viegas|jeremyv|orso}@cc.gatech.edu ABSTRACT SQL injection attacks pose a serious security threat to Web appli- cations: they allow attackers methods to address the SQL injection problem, current approaches either fail to address the full scope

  14. A Routing Table Insertion (RTI) Attack Technical Report

    E-Print Network [OSTI]

    Dong, Yingfei

    1 A Routing Table Insertion (RTI) Attack on Freenet Technical Report University of Hawaii at Manoa.2.6 Data Retrieval versus Data Insert Routing 2.3. Routing Algorithm Pseudo-Code 3. RTI Attack 3 Experiment 8.2.2. Experiment Results 8.3. General Anonymous P2P Properties 8.4. RTI Attack 8.4.1. Manual RTI

  15. Efficient Template Attacks Omar Choudary and Markus G. Kuhn

    E-Print Network [OSTI]

    Kuhn, Markus

    Side-channel attacks are powerful tools for inferring secret algorithms or data (passwords a specific cipher, could be implemented on top of that, but are outside the scope of this paper. We show to as the profiling and the attacked device. We wish to infer some secret value k S, processed by the attacked device

  16. Mitigation of Malicious Attacks on Networks

    E-Print Network [OSTI]

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  17. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    learning and security: training-set attacks on machine learners. In such attacks an attacker contaminates-set attacks to increase in the future as more intelligent systems (e.g. wearable devices, cars, smart houses

  18. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    and security: training-set attacks on machine learners. In such attacks an attacker contaminates the training.g. wearable devices, cars, smart houses and robots) include a "life long learning" com- ponent. The attacker

  19. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    - Best Practice DesignConfiguration Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan...

  20. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  1. URL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowa (Utility Company) Jump to:TucsonLLC JumpUNFCCC/UNEP-Risoe CDMUPL USLView

  2. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we precisely define corrupted packets in inter-session pollution based

  3. Preventing Pollution Attacks in MultiSource Network Coding

    E-Print Network [OSTI]

    Boneh, Dan

    Preventing Pollution Attacks in Multi­Source Network Coding Shweta Agrawal 1# , Dan Boneh 2 that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks. A particularly important instance of this is the pollution problem: if some routers in the network are malicious

  4. Preventing Pollution Attacks in Multi-Source Network Coding

    E-Print Network [OSTI]

    Boneh, Dan

    Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal 1 , Dan Boneh 2 , Xavier combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious important instance of this is the pollution problem: if some routers in the network are malicious

  5. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we first define precisely corrupted packets in inter-session pollution based

  6. Improved Side Channel Attacks on Pairing Based Cryptography

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ], and anonymous group signatures [BS04] make use of pairings as their building blocks. The adoption of pairings that analyze the vulnerability of pairings to passive attacks as well as to active attacks [PV04, KTH+ 06, WS06, WS07, PV06]. There is a variety of pairings that can be used for PBC, e.g., the Weil pairing

  7. Energy Attacks and Defense Techniques for Wireless Systems

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Energy Attacks and Defense Techniques for Wireless Systems Sheng Wei Jong Hoon Ahnn Miodrag {shengwei, jhahnn, miodrag}@cs.ucla.edu ABSTRACT This paper addresses the energy attacks towards wireless in the wireless systems and trigger ultra-high energy increases at runtime. Then, we develop a non-destructive HT

  8. Tornado Attack on RC4 Applications to WEP & WPA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    several tools for building and manipulating pools of biases in the analysis of RC4. We report extremely fast and optimized active and passive attacks against IEEE 802.11 wireless commu- nication protocol WEP of packets, Aicrack-ng yields around 3% success rate. Furthermore, we describe very fast passive only attacks

  9. Stealthy Poisoning Attacks on PCA-based Anomaly Detectors

    E-Print Network [OSTI]

    Tygar, Doug

    Stealthy Poisoning Attacks on PCA-based Anomaly Detectors Benjamin I. P. Rubinstein1 Blaine Nelson1 detection, we present and evaluate short-term and long-term data poison- ing schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boil- ing Frog attacks

  10. Efficient Template Attacks Omar Choudary and Markus G. Kuhn

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Side-channel attacks are powerful tools for inferring secret algorithms or data (passwords values, e.g. to recover keys from a specific cipher, could be implemented on top of that, but are outside devices, which we refer to as the profiling and the attacked device. We wish to infer some secret value k

  11. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  12. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  13. Fault and Side-Channel Attacks on Pairing Based Cryptography ?

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

  14. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  15. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect (OSTI)

    Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  16. Detection attacks on cryptographic protocols and bound randomness

    E-Print Network [OSTI]

    Antonio Acín; Daniel Cavalcanti; Elsa Passaro; Stefano Pironio; Paul Skrzypczyk

    2015-04-30

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. The derived critical detection efficiencies for security imply that the implementation of most partly device independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely non-local correlations in which a non-signalling eavesdropper can find out a posteriori the result of any implemented measurement.

  17. Coordinated Variable Structure Switching Attacks for Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11

    attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one...

  18. The Middle East under Malware Attack Dissecting Cyber Weapons

    E-Print Network [OSTI]

    Almulhem, Ahmad

    the middle east was the Shamoon attack on Saudi Aramco [10]. Shamoon malware [11] is less sophisticated than destruction of the content of around 30,000 workstations in Saudi Aramco [12], [10]. Given the amount

  19. Single-block collision attack on MD5 Marc Stevens

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands marc@marc-stevens.nl January 29, 2012 Abstract In 2010, Tao Xie and Dengguo Feng

  20. Maximum Damage Malware Attack in Mobile Wireless Networks

    E-Print Network [OSTI]

    such as those in relaying data and establishing end-to-end routes (e.g., sinkhole attacks [1]), or even alter such as the wormhole [7], sinkhole [1], and Sybil [8], that utilize vulnerabilities in the routing protocols

  1. Maximum Damage Battery Depletion Attack in Mobile Sensor Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    functions such as relaying and establishing end-to-end routes (e.g., sinkhole attacks [2]), or even such as the wormhole [6], sinkhole [2], and Sybil [7], that utilize vulner- abilities in the routing protocols

  2. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  3. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique

  4. Identification of Repeated Attacks Using Network Traffic Alefiya Hussain John Heidemann Christos Papadopoulos

    E-Print Network [OSTI]

    Papadopoulos, Christos

    designed a multi-dimensional maximum-likelihood classifier to identify re- peated attack scenarios, by inference, the same attacker, much as ballistics studies of firearms can trace multiple uses of a weapon to the same gun. Such evidence of repeated attacks would help establish the maliciousness of a given attacker

  5. Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    SFINKS [8], the simple attack would require only about 42 2 operations and 32Kb of keystream higher order nonlinearity. Introduction Algebraic attacks are an attractive field for investigation, a number of papers were written which investigated, extended and improved algebraic attacks. These attacks

  6. A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    availability. Replication in it­ self, however, is not enough against malicious attacks that are specifically be distinguished: bandwidth consumption at­ tacks and resource consumption attacks. In a bandwidth con­ sumption accept requests from legitimate clients anymore. In a resource consumption attack, the attacker sends

  7. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  8. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.

  9. Integrity Under Attack: The State of Scholarly Publishing

    E-Print Network [OSTI]

    Arnold, Douglas N.

    Integrity Under Attack: The State of Scholarly Publishing By Douglas N. Arnold Scientific journals depend. Publications are used by universities, funding agencies, and others as a primary measure, and in the ranking of departments, institutions, even nations. With big rewards tied to publication

  10. Practical Attacks on Digital Signatures Using MD5 Message Digest

    E-Print Network [OSTI]

    Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department schemes based on MD5 message digest on an example using GPG. Keywords: collision, hash function, MD5 1 used for file integrity checking and as a message digest in digital signature schemes. During CRYPTO

  11. Congestion Attacks to Autonomous Cars Using Vehicular Botnets

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Congestion Attacks to Autonomous Cars Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre of the cars in the targeted area by orders of magnitude. After 5 minutes, the targeted road becomes completely prevent collisions. In a VANET, cars communicate with each other over a wireless channel. They can send

  12. Rootkits on Smart Phones: Attacks, Implications and Opportunities

    E-Print Network [OSTI]

    Iftode, Liviu

    Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford Ryan O Smart phones are increasingly being equipped with operating sys- tems that compare in complexity with those on desktop comput- ers. This trend makes smart phone operating systems vulnerable to many

  13. Smart-Phone Attacks and Defenses Chuanxiong Guo

    E-Print Network [OSTI]

    Wang, Bing

    Smart-Phone Attacks and Defenses Chuanxiong Guo xguo@ieee.org Microsoft Research Helen J. Wang smart-phones), and our environment (e.g., through the use of sensors, actuators, and RFIDs). While is becoming a reality: Smart-phones, interoperable between the telecom networks and the Inter- net

  14. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    E-Print Network [OSTI]

    Johnson, Aaron

    }@informatik.hu-berlin.de Abstract--Tor is a distributed onion-routing network used for achieving anonymity and resisting censorship and transferring roughly 3 GiB/s in aggregate [8]. Tor uses onion routing [25] to route clients' traffic throughThe Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen Florian

  15. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    E-Print Network [OSTI]

    }@informatik.hu-berlin.de Abstract--Tor is a distributed onion-routing network used for achieving anonymity and resisting censorshipB/s in aggregate [4]. Tor uses onion routing [5] to route clients' traffic through a circuit of geo- graphicallyThe Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen Florian

  16. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  17. Anti-discrimination Analysis Using Privacy Attack Strategies

    E-Print Network [OSTI]

    Ruggieri, Salvatore

    Anti-discrimination Analysis Using Privacy Attack Strategies Salvatore Ruggieri1 , Sara Hajian2 and Technology, Saudi Arabia Abstract. Social discrimination discovery from data is an important task to identify deploy privacy at- tack strategies as tools for discrimination discovery under hard assump- tions which

  18. Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins

    E-Print Network [OSTI]

    Perrig, Adrian

    Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins ¡ Adrian Perrig Ion hosts is denial- of-service (DoS) caused by IP packet floods. Hosts in the Internet are unable to stop ­ not the net- work ­ should be given control to respond to packet floods and overload. Ideally, hosts should

  19. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern systems are mon- itored and controlled by Supervisory Control and Data Ac- quisition (SCADA) systems

  20. Fighting Coordinated Attackers with Cross-Organizational Information Sharing

    E-Print Network [OSTI]

    Paxson, Vern

    Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman, Ethan upon real-world crime fighting. While society employs highly trained crime- fighters ("detectives of fighting crime, their value is in their numbers and prevalence. Detectives are charged with detecting

  1. Defending Synchrophasor Data Networks Against Traffic Analysis Attacks

    E-Print Network [OSTI]

    Sikdar, Biplab

    - tem. PMU data serves to facilitate a number of applications while enhancing others, such as real generation and distribution system, monitoring and manipulation of PMU data are particularly attractive of the PMU data measurement and collection network against a class of passive attacks and develops defense

  2. A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data

    E-Print Network [OSTI]

    Sikdar, Biplab

    in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number in the maintenance and control of the power generation and distribution system, monitoring and manipulation of PMU. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks

  3. Attacks based on Conditional Correlations against the Nonlinear Filter Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ­based keystream generator which could be used as a basic building block in a synchronous stream cipher system of a keystream generator (i.e. NLFG) in a synchronous secret key encryption and decryption system. 2 #12Attacks based on Conditional Correlations against the Nonlinear Filter Generator Bernhard L

  4. Combating Time Synchronization Attack: A Cross Layer Defense Mechanism

    E-Print Network [OSTI]

    Li, Husheng

    and Protection]: Physical Security 1. INTRODUCTION The security of smart grid has become an important research synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified re- cently. A cross the eectiveness of the pro- posed TSA detection algorithm. Categories and Subject Descriptors K.6.5 [Security

  5. How to help people who have heart attacks

    E-Print Network [OSTI]

    Lega, Joceline

    How to help people who have heart attacks Meghan McGovern Monday, December 03, 2012 #12;5 Heart-Lung Machine Extracorporeal Membrane Oxygenation #12;6 Electrocardiograph (ECG) #12;7 Artificial Hearts #12;8 Tissue Engineering O Researchers Rebuild Beating Heart with Cardiac Derived Cells! O January

  6. Reducing Attack Surfaces for Intra-Application Communication in Android

    E-Print Network [OSTI]

    Wagner, David

    Reducing Attack Surfaces for Intra-Application Communication in Android David Kantola, Erika Chin,emc,-w,daw}@berkeley.edu ABSTRACT The complexity of Android's message-passing system has led to numerous vulnerabilities in third-application communication mechanisms. Consequently, we propose modifications to the Android platform to detect and protect

  7. Attacks on Android Clipboard Xiao Zhang and Wenliang Du

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Attacks on Android Clipboard Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer perform a thorough study on the risks im- posed by the globally accessible Android Clipboard. Based briefly discuss some potential solutions. 1 Introduction Android was developed by Google in 2008

  8. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute without the contraint of special hardware and dependency on physical medium of wireless network. BAAP and router at the same time. Most of the previous research has focused on problems of routing

  9. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect (OSTI)

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  10. THE BLIND PATTERN MATCHING ATTACK ON WATERMARK SYSTEMS

    E-Print Network [OSTI]

    Petitcolas, Fabien A.P.

    complex- ity to reverse the permutations as a preprocessing step for watermark detection. In this paper, we describe the logistics of the attack and a recipe for its implementation against an audio be shown that any WM detector is facing a task of exponential complexity to reverse the permutations

  11. Insects and Related Pests Attacking Lawns and Ornamental Plants. 

    E-Print Network [OSTI]

    Almand, Lyndon K.; Thomas, John G.

    1968-01-01

    Lawns and 0 rnamental Plants i* - .* " TEXAS AIM UNIVERSITY ,I TEXAS AGRICULTURAL EXTENSION SERVIC ' ' 1. E. Hutchison. Director. College Station, Vixtis Photographs in this publication have two numbering series . Any figure number followed by a... small "a" refers to a colored illustration . All colored illustrations appear on pages 12 through 15 . PESTS ATTACKING LAWNS Sucking Pests Southern Chinch Bugs .................................................................................. 2...

  12. New Collision attacks Against Up To 24step SHA2 Somitra Kumar Sanadhya # and Palash Sarkar

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Applied Statistics Unit, Indian Statistical Institute, 203, B.T. Road, Kolkata, India 700108. somitra r. of India. #12; . The complexity of 24­step SHA­512 attack is improved in comparison to the existing attack

  13. Identification of Repeated Attacks Using Network Traffic Alefiya Hussain John Heidemann Christos Papadopoulos

    E-Print Network [OSTI]

    Heidemann, John

    trace multiple uses of a weapon to the same gun. Such evidence of repeated attacks would help establish only by reducing attack effectiveness. We designed a multi-dimensional maximum-likelihood classifier

  14. Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans

    E-Print Network [OSTI]

    Gurumurthi, Sudhanva

    Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans University thermal management alternative. Keywords: storage systems, security, thermal management, denial shut-down. Our new thermal attack on future storage systems is unrecognized by current Intrusion

  15. Automatic Creation of SQL Injection and Cross-Site Scripting Attacks

    E-Print Network [OSTI]

    Kiezun, Adam

    2008-09-10

    We present a technique for finding security vulnerabilitiesin Web applications. SQL Injection (SQLI) and cross-sitescripting (XSS) attacks are widespread forms of attackin which the attacker crafts the input to the application ...

  16. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    that the open nature of web browsers provides a feasible \\point of entry" for this attack via a corrupted plug of web-browser plug-ins could easily provide a \\point of entry" for chosen-plaintext attacks

  17. A spillway infrastructure for defense against Distributed Denial of Service attacks 

    E-Print Network [OSTI]

    Barkley, Andrew Holman

    2000-01-01

    Distributed Denial of Service (DDoS) attacks have proven to be disruptive forces on the Internet. There is currently no means of defense from such attacks, as they are exploitations of mechanisms that are critical for normal operation...

  18. Chosen Ciphertext Attack on SSS Joan Daemen1, Joseph Lano2 , and Bart Preneel2

    E-Print Network [OSTI]

    Bernstein, Daniel

    - cryption with DES in CFB mode was analyzed with respect to chosen ciphertext attacks in [7]. The stream

  19. Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy

    E-Print Network [OSTI]

    Boyd, Colin

    testbed. The testbed simulated actuators and sensors of a hydro-power system. The attacks using DNP3 were

  20. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  1. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris and Start (PKES) systems used in modern cars. We build two efficient and inexpensive attack realizations, wired and wireless physical-layer relays, that allow the attacker to en- ter and start a car by relaying

  2. An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato Entrust, Inc.mister,robert.zuccherato}@entrust.com Abstract. This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode for each block. Standard CFB mode encryption does not appear to be affected by this attack. It applies

  3. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses

    E-Print Network [OSTI]

    Saxena, Nitesh

    The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

  4. Pollution Attack Defense for Coding Based Sensor Levente Buttyan, Laszlo Czap, Istvan Vajda

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    Pollution Attack Defense for Coding Based Sensor Storage Levente Butty´an, L´aszl´o Czap, Istv to make network coding based storage secure against pollution attacks in sensor networks. The approach], [12], [13]. We present a scheme that resists pollution attacks, meaning that our scheme makes possible

  5. Dynamic Load Altering Attacks in Smart Grid Sajjad Amini, Hamed Mohsenian-Rad, and Fabio Pasqualetti

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    response and demand side management programs. It attempts to control and change certain unsecured is on attacks against demand re- sponse (DR) and demand side management (DSM) programs. DR programs are used}@ece.ucr.edu and fabiopas@engr.ucr.edu Abstract--A load altering attack (LAA) is a cyber-physical attack against demand

  6. Impacts of Bad Data and Cyber Attacks on Electricity Market Operations

    E-Print Network [OSTI]

    operations. In particular, we investigated the problem from perspectives of an attacker and the controlImpacts of Bad Data and Cyber Attacks on Electricity Market Operations Final Project Report Power;#12;Impacts of Bad Data and Cyber Attacks on Electricity Market Operations Final Project Report Project Team

  7. On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack Mohammad Reza Sohizadeh against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) pro- tocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive attacks proposed

  8. Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

    E-Print Network [OSTI]

    Nita-Rotaru, Cristina

    1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

  9. Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis Song Sun was publicly intro- duced, power analysis attacks on cryptographic systems have be- come an increasingly of power analysis attacks and preventative techniques on both software (e.g. smartcard, DSP) and hardware

  10. Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks

    E-Print Network [OSTI]

    Nam, Seung Yeob

    1 Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks Seung Yeob Nam, Member- tion Protocol (ARP) is proposed to prevent ARP poisoning-based Man-in-the-Middle (MITM) attacks deployable. Index Terms--ARP cache poisoning, Man-in-the-Middle attack, ARP poisoning prevention, voting. I

  11. Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ives, Zachary G.

    Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor in improving resilience against sinkhole attacks, even in the presence of some collusion. I. INTRODUCTION

  12. Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks

    E-Print Network [OSTI]

    Le Fessant, Fabrice - Institut national de recherche en informatique et en automatique, Centre de recherche INRIA Saclay

    Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor are effective in improving resilience against sinkhole attacks, even in the presence of some collusion. I

  13. Automatic Search of Attacks on round-reduced AES and Applications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Search of Attacks on round-reduced AES and Applications Charles Bouillaguet, Patrick of these tools, we show that they allow to automatically discover new attacks on round-reduced AES with very low to find better attacks, new automatic tools have been designed to automatically search either related

  14. False Data Injection Attacks with Incomplete Information Against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    False Data Injection Attacks with Incomplete Information Against Smart Power Grids Md. Ashfaqur introduced as an important class of cyber attacks against smart grid's wide area measurement and monitoring Injection Attack, Smart Grid Security, Incomplete Information, Transmission Line Admittance Uncer- tainty

  15. Examples of the Generalized Quantum Permanent Compromise Attack to the Blum-Micali Construction

    E-Print Network [OSTI]

    Guedes, Elloá B; Lula, Bernardo

    2010-01-01

    This paper presents examples of the quantum permanent compromise attack to the Blum-Micali construction. Such attacks illustrate how a previous attack to the Blum-Micali generator can be extended to the whole Blum-Micali construction, including the Blum-Blum-Shub and Kaliski generators.

  16. Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Patrick Derbez and Léo cipher they designed, PRINCE. Instead of trying to attack as many rounds as possible using attacks which on round-reduced PRINCE includ- ing the ones which won the challenge in the 6 and 8-round categories

  17. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  18. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  19. Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non-Repudiation Protocol

    E-Print Network [OSTI]

    Chen, Yu

    1 Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non security issues in cloud storage: repudiation, fairness, and roll-back attacks. We proposed a novel fair and is capable of preventing roll-back attacks. Keywords: Cloud Storage, Non-repudiation, Roll-back Attack. 1

  20. A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. LaPorta

    E-Print Network [OSTI]

    Yener, Aylin

    1 A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of Cross Infrastructure Cyber Attacks in addition to the standard Single

  1. Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks

    E-Print Network [OSTI]

    Ruj, Sushmita

    2015-01-01

    We model smart grids as complex interdependent networks, and study targeted attacks on smart grids for the first time. A smart grid consists of two networks: the power network and the communication network, interconnected by edges. Occurrence of failures (attacks) in one network triggers failures in the other network, and propagates in cascades across the networks. Such cascading failures can result in disintegration of either (or both) of the networks. Earlier works considered only random failures. In practical situations, an attacker is more likely to compromise nodes selectively. We study cascading failures in smart grids, where an attacker selectively compromises the nodes with probabilities proportional to their degrees; high degree nodes are compromised with higher probability. We mathematically analyze the sizes of the giant components of the networks under targeted attacks, and compare the results with the corresponding sizes under random attacks. We show that networks disintegrate faster for targeted...

  2. Time Stamp Attack on Wide Area Monitoring System in Smart Grid

    E-Print Network [OSTI]

    Zhang, Zhenghao; Li, Husheng; Pei, Changxing

    2011-01-01

    Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

  3. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks 

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22

    were killed and more than 1,200 were injured by deadly terrorist attacks on commuter trains and stations in Madrid. These attacks had an enormous impact on the citizens of Spain, as well as the entire international community. The Madrid bombings... in its ?War on Terror? may carry additional costs. One unanticipated effect of these attacks was the victory of the Socialists over the ruling Partido Popular party in Spain in the next election. More importantly, this occurrence led to a sharp...

  4. Practical realisation and elimination of an ECC-related software bug attack

    E-Print Network [OSTI]

    in modern e-business work-flows, are as follows: 1. Nguyen [28] described an attack on GPG version 1

  5. Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production

    E-Print Network [OSTI]

    Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production spasms, and other problems in the communities in which fracking occurs

  6. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  7. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Ning, Peng

    the measurements of meters at physically protected locations such as substations, such attacks can introduce of about 50 million people. The estimated total cost

  8. Complex networks vulnerability to module-based attacks

    E-Print Network [OSTI]

    da Cunha, Bruno Requião; Gonçalves, Sebastián

    2015-01-01

    In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaking complex networks is attracting much attention from practical points of view. In this contribution we present a module-based method to efficiently break complex networks. The procedure first identifies the communities in which the network can be represented, then it deletes the nodes (edges) that connect different modules by its order in the betweenness centrality ranking list. We illustrate the method by applying it to various well known examples of social, infrastructure, and biological networks. We show that the proposed method always outperforms vertex (edge) attacks which are based on the ranking of node (edge) degree or centrality, with a huge gain in efficiency for some examples. Remarkably, for the US power grid, the present method breaks the original network of 4941 nodes to many fragments smaller than 197 nodes (4% of the original size) by removing mere 164 nodes (~3%) identified by the procedure. B...

  9. Detecting SYN Flooding Attacks Haining Wang Danlu Zhang Kang G. Shin

    E-Print Network [OSTI]

    Wang, Haining

    Detecting SYN Flooding Attacks Haining Wang Danlu Zhang Kang G. Shin EECS Department a simple and robust mechanism for de- tecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding

  10. The Effect of Mountain Pine Beetle Attack and Salvage Harvesting On Streamflows

    E-Print Network [OSTI]

    Northern British Columbia, University of

    The Effect of Mountain Pine Beetle Attack and Salvage Harvesting On Streamflows Special ....................................................................................................................4 FRPA requirements for Water Management in MPB-attacked watersheds ..........5 The Baker Creek. These disturbances have potential effects on water yield (the total amount of water flowing out of a watershed

  11. Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon McCoy, Brian Kantor,

    E-Print Network [OSTI]

    Hu, Fei

    Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon Mc discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics, we discuss the structural characteristics of the automotive ecosystem that give rise to such problems

  12. On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack

    E-Print Network [OSTI]

    Wang, Xinyuan "Frank"

    ], Onion Routing [24], Tor [10], Hordes [28], Web Mixes [6], Tarzan [13]) have been proposed to disguise conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer measurements and timing attack results show that the circuit rotation in Tor network could significantly

  13. Distributed Internet-based Load Altering Attacks against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    management, cost-efficient load protection. I. INTRODUCTION The recent advancements in smart grid systemsDistributed Internet-based Load Altering Attacks against Smart Power Grids Amir-Hamed Mohsenian distribution system. Keywords: Smart grid security, Internet-based load altering attacks, demand side

  14. Integral Cryptanalysis on reduced-round A way to extend the attack?

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Integral Cryptanalysis on reduced-round Safer++ ­ A way to extend the attack? ­ Gilles Piret an integral distinguisher over 2 rounds of Safer++. It allows a practical attack against 3 rounds of Safer for further research in order to extend integral cryptanalysis. 1 Introduction The integral cryptanalysis (or

  15. CellFlood: Attacking Tor Onion Routers on the Cheap Marco V. Barbera1

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    . As a way to mitigate the effect of this attack, we propose to use a client puzzle-based technique the design and implementation of an effective solution to the problem that relies on cryptographic client]. Such an attack could be used to either significantly degrade the users' perceived quality of service, which would

  16. Practical Limitations of Sliding-Mode Switching Attacks on Smart Grid Systems

    E-Print Network [OSTI]

    Kundur, Deepa

    Practical Limitations of Sliding-Mode Switching Attacks on Smart Grid Systems Abdallah K. Farraj}@comm.utoronto.ca, klbutler@tamu.edu Abstract--Switching attacks in smart grid systems have gained some recent attention practical limitations. I. INTRODUCTION Smart grid systems have enjoyed a recent interest from both

  17. Friend or Flood? Social prevention of flooding attacks in mobile opportunistic networks

    E-Print Network [OSTI]

    Henderson, Tristan

    Friend or Flood? Social prevention of flooding attacks in mobile opportunistic networks Iain Parris. In this paper we define a simple flooding attack that can deny service in an opportunistic network. We simulate untraceably flood the network with spoofed messages. As the available resources of participating devices (e

  18. Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal University of Texas combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious important instance of this is the pollution problem: if some routers in the network are malicious

  19. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks

    E-Print Network [OSTI]

    Lui, John C.S.

    Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li: cslui@cse.cuhk.edu.hk Abstract--Pollution attack is a severe security problem in network-coding enabled spreading of polluted packets to deplete network resources. We address this security problem even when

  20. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA Yong Wang1 to the Supervisory Con- trol And Data Acquisition (SCADA) system. Several intrusion detection schemes have been-graph-based detection scheme to defeat false data injec- tion attacks at the SCADA system, even when injected data may

  1. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying. The defense taxonomy classifies the body of existing DDoS de- fenses based on their design decisions

  2. Static Fault Attack on Hardware DES Registers Philippe Loubet-Moundi, Francis Olivier, and David Vigilant

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Static Fault Attack on Hardware DES Registers Philippe Loubet-Moundi, Francis Olivier, and David deals with static faults which lie in between. A static fault modifies a value loaded in a volatile], quickly became a privileged target for DFA. #12;2 Static Fault Attacks on Hardware DES Registers Indeed

  3. On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong

    E-Print Network [OSTI]

    Youssef, Amr M.

    On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong Center for Applied attack, nite elds, Ga- lois Field Fourier Transform 1 Introduction Gong and Golomb 7 introduced a new the later by decimation d. Gong and Golomb showed that the distance of DES S-boxes approximated

  4. 2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks on a smart grid. Keywords: smart grid cyber security; cyber attack impact analysis; graph-based dynamical systems; smart and Computer Engineering at Texas A&M University. Her research interests include cyber security of the smart

  5. DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

    E-Print Network [OSTI]

    California at Davis, University of

    DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks Lihua Yuan ECE, UC Davis lyuan cache poisoning, which causes the DNS to return false name-to-IP mappings and can be used as a foothold inaccurate DNS records caused by cache poisoning attacks. DoX also helps DNS servers to improve cache

  6. Adaptive Network Defense Management for Countering Smart Attack and Selective Capture

    E-Print Network [OSTI]

    Cao, Yong

    , humidity, tempera- ture, electrical characteristics, and radiation. · Smart City [46]: A query-based WSN1 Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless network defense management for countering smart attack and se- lective capture which aim to cripple

  7. Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao and Gregory G. Rose Abstract At IEEE GLOBECOM 2008, a lightweight cipher based on a Multiple Recursive Generator (MRG plaintext attack is proposed to construct the cipher's current state and generate subkeys used for all

  8. Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao and Gregory G. Rose Abstract At IEEE GLOBECOM 2008, a lightweight cipher based on a Multiple Recursive Generator (MRG attack is proposed to construct the cipher's current state and generate subkeys used for all subsequent

  9. Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices

    E-Print Network [OSTI]

    Kundur, Deepa

    vehicles, and energy storage devices, and providing advanced load management strategies. To meet attack may cause device restoration delays. Data integrity attacks were also performed on a load management system in [6], in which a graph based dynamic system model was used to analyze the impact

  10. A new key recovery attack on the ANSI retail MAC Chris J. Mitchell

    E-Print Network [OSTI]

    Mitchell, Chris

    A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

  11. Differential Fault Attack on the PRINCE Block Ling Song, Lei Hu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Differential Fault Attack on the PRINCE Block Cipher Ling Song, Lei Hu State Key Laboratory {lsong,hu}@is.ac.cn Abstract. PRINCE is a new lightweight block cipher proposed at the ASIACRYPT'2012. Key words: lightweight cipher, PRINCE block cipher, differential fault attack 1 Introduction The idea

  12. Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework Zheng@mail.tsinghua.edu.cn Abstract. A new distinguishing attack on HMAC and NMAC based on a dedicated compression function framework. In ChinaCrypt2008, a new dedicated compression function framework (i.e. hash function H) and two

  13. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  14. Rate of H2S and CO2 attack on pozzolan-amended Class H well cement...

    Office of Scientific and Technical Information (OSTI)

    Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Citation Details In-Document Search Title: Rate of H2S and CO2 attack on...

  15. Property Rights, Taxpayer Rights, and the Multiscalar Attack on the State: Consequences for Regionalism in the United States

    E-Print Network [OSTI]

    Christopher Niedt; Margaret Weir

    2007-01-01

    G.M. (2005) The Rights of Taxpayers and the Rights of AllProperty Rights, Taxpayer Rights, and the Multiscalar AttackProperty rights, taxpayer rights, and the multiscalar attack

  16. Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha, Jayan Krishnaswami

    E-Print Network [OSTI]

    Ha, Dong S.

    Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where

  17. Redirection of metabolism for hydrogen production

    SciTech Connect (OSTI)

    Harwood, Caroline S.

    2011-11-28

    This project is to develop and apply techniques in metabolic engineering to improve the biocatalytic potential of the bacterium Rhodopseudomonas palustris for nitrogenase-catalyzed hydrogen gas production. R. palustris, is an ideal platform to develop as a biocatalyst for hydrogen gas production because it is an extremely versatile microbe that produces copious amounts of hydrogen by drawing on abundant natural resources of sunlight and biomass. Anoxygenic photosynthetic bacteria, such as R. palustris, generate hydrogen and ammonia during a process known as biological nitrogen fixation. This reaction is catalyzed by the enzyme nitrogenase and normally consumes nitrogen gas, ATP and electrons. The applied use of nitrogenase for hydrogen production is attractive because hydrogen is an obligatory product of this enzyme and is formed as the only product when nitrogen gas is not supplied. Our challenge is to understand the systems biology of R. palustris sufficiently well to be able to engineer cells to produce hydrogen continuously, as fast as possible and with as high a conversion efficiency as possible of light and electron donating substrates. For many experiments we started with a strain of R. palustris that produces hydrogen constitutively under all growth conditions. We then identified metabolic pathways and enzymes important for removal of electrons from electron-donating organic compounds and for their delivery to nitrogenase in whole R. palustris cells. For this we developed and applied improved techniques in 13C metabolic flux analysis. We identified reactions that are important for generating electrons for nitrogenase and that are yield-limiting for hydrogen production. We then increased hydrogen production by blocking alternative electron-utilizing metabolic pathways by mutagenesis. In addition we found that use of non-growing cells as biocatalysts for hydrogen gas production is an attractive option, because cells divert all resources away from growth and to hydrogen. Also R. palustris cells remain viable in a non-growing state for long periods of time.

  18. Widget:GeneralRedirect | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJThinWarsaw,What Is aDisqusHelper JumpFlashDetectGasMap Jump

  19. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  20. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  1. Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis

    E-Print Network [OSTI]

    Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

  2. Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

  3. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  4. New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram DA-IICT Near Indroda Circle Gandhinagar-382007 INDIA anish mathuria@daiict.ac.in, g.sriram.248@gmail.com July 29, 2008

  5. Networked Control Systems under Cyber Attacks with Applications to Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    acquisition (SCADA) systems. Several cyber attacks on SCADA systems operating power networks have been reported [3], and major blackouts are due to the misuse of the SCADA systems [4]. Power networks, being

  6. Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks the Wheatstone bridge measurement setup. Here we propose to in- dividualize the electrical circuit of devices with individualized electrical circuit are individualized while providing the same functionality

  7. On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks

    E-Print Network [OSTI]

    Medard, Muriel

    Random linear network coding can be used in peer-to- peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We ...

  8. The Recent Attack of Nie et al On TTM is Faulty Nov 19.2006

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Recent Attack of Nie et al On TTM is Faulty T. Moh #3; Nov 19.2006 Abstract Recently there is a paper entitled "Breaking a New Instance of TTM Cryptosystem" by Xuyun Nie, Lei Hu, Jianyu Li, Crystal

  9. IEEE TRANSACTIONS ON SIGNAL PROCESSING: SPECIAL ISSUE ON DATA HIDING 1 Blind Pattern Matching Attack on

    E-Print Network [OSTI]

    Petitcolas, Fabien A.P.

    detector is facing a task of exponential complexity to reverse the permutations as a pre-processing step for watermark detection. In this paper, we describe the logistics of the attack and an implementation against

  10. gore: Routing-Assisted Defense Against DDoS Attacks Stephen T. Chou1

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    attackers identify "pinch points" in the communications infrastructure and render them inoperable of effective anti-DDoS technology by Internet Service Providers. An important one is the lack of financial

  11. An Experimentally Veried Attack on Full Grain-128 Using Dedicated Recongurable

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Experimentally Veried Attack on Full Grain-128 Using Dedicated Recongurable Hardware Itai Dinur-purpose hardware, i. e., computing machines dedicated to cryptana- lytical problems, have a long tradition in code

  12. Modeling experiments that simulate fragment attacks on cased munitions

    SciTech Connect (OSTI)

    Kerrisk, J.F.

    1996-01-01

    Roberts and Field (1993) have conducted experiments to observe the behavior of a cased high explosive (HE) charge subject to fragment attack at impact velocities below those needed for shock initiation. Two and three-dimensional hydrodynamic calculations have been done to model these experiments. Questions about the degree of confinement of the HE and about the condition of the HE during the impact were addressed. The calculations indicate that the HE was not strongly confined in this experiment, primarily due to the lateral expansion of polycarbonate blocks on the sides of the target during the impact. HE was not ejected from the hole in the casing made by the projectile up to 30 {micro}s after the impact. There are hints from these calculations of how initiation of a homogeneous sample of HE might occur in the experiment. The first involves the reshock of a small amount of HE at {approximately} 20 {micro}s as a result of the impact of the sabot on the target. The second involves the heating of the HE from plastic work during the impact. The maximum temperature rise of the HE (exclusive of the small region that was reshocked) was {approximately} 80 k. However, this is the average temperature of a region the size of a computational cell, and phenomena such as shear bands or cracks could result in higher temperatures on a smaller scale than the cell size. The third involves heating of the HE from contact with the casing material. The maximum temperature rise of the casing material from plastic work is {approximately} 870 k. This temperature occurs at the edge of a plug of casing material sheared off by the projectile. Other parts of the casing are shock heated to higher energies but may not contact the HE.

  13. THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER Mohammad Sadegh Nemati Nia1 University of Technology, Tehran, Iran (m_s_nemati; payandeh)@mut.ac.ir ABSTRACT SNOW 2.0 is a word oriented. The results of HGD attack on TIPSY, SNOW 1.0 and SNOW 2.0 stream ciphers led to less complexity rather than

  14. Secure estimation and control for cyber-physical systems under adversarial attacks

    E-Print Network [OSTI]

    Fawzi, Hamza; Diggavi, Suhas

    2012-01-01

    The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with the estimation and control of linear systems when some of the sensors or actuators are corrupted by an attacker. In the first part we look at the estimation problem where we characterize the resilience of a system to attacks and study the possibility of increasing its resilience by a change of parameters. We then propose an efficient algorithm to estimate the state despite the attacks and we characterize its performance. Our approach is inspired from the areas of error-correction over the reals and compressed sensing. In the second part we consider the problem of designing output-feedback controllers that stabilize the system despite attacks. We show that a principle of separation betwee...

  15. 10/3/08 7:42 PMThe Scientist : NewsBlog : Red fish, blue fish, speciation? [2nd October 2008] Page 1 of 2http://www.the-scientist.com/templates/trackable/display/blog.jsp?type=blog&o_url=blog/display/55065&id=55065

    E-Print Network [OSTI]

    Carleton, Karen L.

    10/3/08 7:42 PMThe Scientist : NewsBlog : Red fish, blue fish, speciation? [2nd October 2008] Page 1 of 2http://www.the-scientist.com/templates/trackable/display/blog.jsp?type=blog&o_url=blog and Video Awards Survey Series Science headlines delivered daily. Register today. The Scientist Daily NewsBlog

  16. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  17. Blocking Objectionable Web Content by Leveraging Multiple Information Sources Nitin Agarwal

    E-Print Network [OSTI]

    Liu, Huan

    that has very little tex- tual content), URL redirection to some websites, or directly typing (porn websites). Second, the number of positive instances (say, porn websites) is often sig- nificantly less than

  18. Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    E-Print Network [OSTI]

    Gupta, B B; Misra, Manoj

    2012-01-01

    Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. This paper reports the design principles and evaluation results of our proposed framework that autonomously detects and accurately characterizes a wide range of flooding DDoS attacks in ISP network. Attacks are detected by the constant monitoring of propagation of abrupt traffic changes inside ISP network. For this, a newly designed flow-volume based approach (FVBA) is used to construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic goes out of profile. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and a...

  19. Practical Attacks on Decoy State Quantum Key Distribution Systems with Detector Efficiency Mismatch

    E-Print Network [OSTI]

    Fei Yangyang; Gao Ming; Wang Weilong; Li Chaobo; Ma Zhi

    2015-07-23

    To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy state quantum key distribution systems. The eavesdropper may get some information ab out the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum key distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy state quantum key distribution systems.

  20. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  1. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  2. Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack

    E-Print Network [OSTI]

    Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2013-07-24

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

  3. Attack of fragmented-core debris on concrete in the presence of water. [PWR; BWR

    SciTech Connect (OSTI)

    Tarbell, W.W.; Bradley, D.R.

    1982-01-01

    In the unlikely event that core debris escapes the reactor pressure vessel, the interactions of the debris with concrete, structural materials, and coolant become the driving force for severe accident phenomena. The Ex-Vessel Core Debris Interactions Program at Sandia National Laboratories is an experimental research effort to characterize these interactions and the magnitude of safety-related phenomena such as flammable gas generation, aerosol production, fission product release, and concrete attack. Major areas of study within the program include molten core simultants in contact with concrete, high pressure melt streaming into scaled reactor cavities, the addition of coolant to high-temperature melt/concrete interactions, and the attack of hot, solid core debris on concrete. This paper describes results from the last of these efforts, i.e., hot, but not molten debris attacking concrete.

  4. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  5. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  6. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    E-Print Network [OSTI]

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  7. Ravaging the wine dark sea: attacks on Crete by sea raiders during the Bronze Age 

    E-Print Network [OSTI]

    Stewart, David James

    1997-01-01

    RAVAGING THK WINK DARK SEA: ATTACKS ON CRETE BY SEA RAIDERS DIJRING THE BRONZE AGE A Thesis by DAVID JAMES STEWART Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF ARTS May 1997 Major Subject: Anthropology RAVAGING THE WINE DARK SEA: ATTACKS ON CRETE BY SEA RAIDERS DURING THE BRONZE AGE A Thesis by DAVID JAMES STEWART Submitted to Texas A&M University in partial fulfillment of the requirements...

  8. Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    E-Print Network [OSTI]

    Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

    2011-04-01

    Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

  9. Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG

    E-Print Network [OSTI]

    Altug, Yucel

    2008-01-01

    A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized. Consequently, under some mild assumptions, which are common in cryptanalysis, the tight lower bounds on the algorithmic complexity of successful Query-Based Key-Recovery attacks are derived for two different setups of practical interest. The proofs rely on the concept of ``typicality'' of information theory.

  10. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications

    E-Print Network [OSTI]

    Yin, Heng

    Hijacking Attacks in Android Applications Mu Zhang Department of EECS Syracuse University muzhang of vulnerabilities commonly appearing in Android applications. When these vul- nerabilities are triggered on Android devices, on behalf of the attackers. It is often unrealis- tic to purely rely on developers to fix

  11. Extending the GHS Weil Descent Attack S.D. Galbraith, F. Hess and N.P. Smart

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Extending the GHS Weil Descent Attack S.D. Galbraith, F. Hess and N.P. Smart Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB, United due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack

  12. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 2, MARCH 2003 431 Some Attacks Against Vehicles' Passive Entry

    E-Print Network [OSTI]

    Mahmud, Syed Masud

    Terms--Passive entry systems, playback attack, remote keyless entry, two-thief attack, vehicle security of an automobile. The user was required to enter a unique digital code through the keypad to unlock or lock- hances user convenience, it still does not provide the full com- fort level. The user still has to search

  13. Islamists claim deadly attack on UN building in Nigeria 26 August 2011

    E-Print Network [OSTI]

    Islamists claim deadly attack on UN building in Nigeria 26 August 2011 Boko Haram says/AFP/Getty Images A car loaded with explosives crashed into the main United Nations' building in Nigeria's capital for the bombing, a major escalation of its sectarian fight against Nigeria's weak central government. The brazen

  14. Taming IP Packet Flooding Attacks Karthik Lakshminarayanan Daniel Adkins y Adrian Perrig Ion Stoica

    E-Print Network [OSTI]

    Perrig, Adrian

    Taming IP Packet Flooding Attacks #3; Karthik Lakshminarayanan Daniel Adkins y Adrian Perrig Ion hosts is denial­ of­service (DoS) caused by IP packet floods. Hosts in the Internet are unable to stop -- not the net­ work -- should be given control to respond to packet floods and overload. Ideally, hosts should

  15. Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash Adi by John Nash in the early 1950's but whose design was declassified by the NSA only in 2012. The main, John Nash. 1 Introduction John Nash is known today mostly for his seminal contributions to the field

  16. Touchjacking Attacks on Web in Android, iOS, and Windows Phone

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Touchjacking Attacks on Web in Android, iOS, and Windows Phone Tongbo Luo, Xing Jin, Ajai to interact with the Web, most mobile platforms, including Android, iOS, and Windows Phone, provide is called WebView in Android (it is called different names in other platforms). WebView im- plements

  17. A Data-Centric Approach to Insider Attack Detection in Database Systems

    E-Print Network [OSTI]

    Petropoulos, Michalis

    A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis the query expressions in prior approaches. Our data-centric approach is based on the key observation.): RAID 2010, LNCS 6307, pp. 382­401, 2010. c Springer-Verlag Berlin Heidelberg 2010 #12;A Data-Centric

  18. Evaluating Risk of Terrorist Attack on a Cable Stayed Bridge: A Probabilistic Structural

    E-Print Network [OSTI]

    Bhattacharya, Baidurya

    Evaluating Risk of Terrorist Attack on a Cable Stayed Bridge: A Probabilistic Structural Analysis and administrators are able to evaluate risks to infrastructure in their jurisdiction in a rational manner. This will enable them to take optimal actions to manage these risks given budgetary constraints. This paper

  19. Adaptive Flow Aggregation -A New Solution for Robust Flow Monitoring under Security Attacks

    E-Print Network [OSTI]

    Lui, John C.S.

    Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu.S. Lui Dept. of CSE Chinese University of Hong Kong Email: cslui@cse.cuhk.edu.hk Abstract-- Flow the resources (memory, export bandwidth or CPU) of the flow monitor. A standard solution is to do sampling (look

  20. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of Technology and Economics (BME) Abstract. Smart grids consist of suppliers, consumers, and other parts effort to protect these devices. This behavior was motivated by the special requirements in control

  1. Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang

    E-Print Network [OSTI]

    Wang, Haining

    Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang Department of Computer of servers being deployed in data centers, the data center power distribution systems have already approached peak capacities. Since the upgrades of the power systems are extremely expensive, power

  2. Robust Detection in the Presence of Integrity Attacks Yilin Mo, Jo~ao Hespanha, Bruno Sinopoli

    E-Print Network [OSTI]

    Hespanha, João Pedro

    Acquisition (SCADA) sys- tems, for example, implement the distributed control systems that run a wide range, facility control and power grids. A successful attack to SCADA systems may significantly hamper the economy, the environment, and may even lead to the loss of human life. The first-ever SCADA system malware (called Stuxnet

  3. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  4. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Young, R. Michael

    @cs.unc.edu Abstract--A power grid is a complex system connecting electric power generators to consumers through power estimate the power grid state through analysis of meter measure- ments and power system models. Various malicious attacks. I. INTRODUCTION A power grid is a complex system connecting a variety of electric power

  5. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-Print Network [OSTI]

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  6. TorScan: Tracing Long-lived Connections and Differential Scanning Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    successor of the original Onion Routing Project. The Tor network is a low-latency anonymity network whichTorScan: Tracing Long-lived Connections and Differential Scanning Attacks Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann University of Luxembourg Abstract. Tor is a widely used anonymity network

  7. Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier Gemplus Card in a state that leaks secret information. Nicely enough, evaluating the entropy loss due to the chemical spectroscopic analysis can reveal with accuracy the mixture of chemical compounds generated by the user, we show

  8. Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel-correlation distinguishers as well as between zero-correlation and integral distinguishers, we analyze in this paper some of the round function, we show that we can not only find impossible, integral and multidimensional zero

  9. A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia

    E-Print Network [OSTI]

    Bullo, Francesco

    and biomedicine, telecommu- nications, and energy management. Due to their importance, cyber-physical systems, and monitoring systems. For instance, in [1, 5, 6, 7, 8] it is shown how attackers with access to sufficiently limited resources and full knowledge of the system dynamics and state. Conversely, if the monitoring re

  10. Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid Deepa Kundur analysis of a smart grid. We focus on the model synthesis stage in which both cyber and physical grid-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems. I

  11. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  12. Sensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks

    E-Print Network [OSTI]

    Levi, Albert

    network are discussed in [7]. Security, network bandwidth and power consumption in sensor networksSensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks Serdar Sancak@sabanciuniv.edu Abstract--Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets

  13. Passive faraday mirror attack in practical two-way quantum key distribution system

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2012-03-04

    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

  14. Securing Cloud Data in the New Attacker Model Ghassan O. Karame1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Securing Cloud Data in the New Attacker Model Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof to the ciphertext. This may be achieved, for example, using multi-cloud storage systems. These systems spread data tolerance. If the adversary can only compromise a subset of these domains, multi-cloud storage systems may

  15. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  16. Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    with great opportunities for raising the target facility energy consumption and consequently its green house green, energy- sustainable computing paradigms has gained a lot of attention in both the researchEvaluating Network-Based DoS Attacks Under the Energy Consumption Perspective New security issues

  17. Cyber Attack Detection in PMU Measurements via the Expectation-Maximization Algorithm

    E-Print Network [OSTI]

    Kundur, Deepa

    Cyber Attack Detection in PMU Measurements via the Expectation-Maximization Algorithm Dongchan Lee in phasor measurement unit (PMU) data using the expectation-maximization algorithm. Power systems today, such as solving the optimal power flow and system estimation problem. The availability of PMU data real-time has

  18. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    False Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu, Peng Ning@cs.unc.edu Abstract--A power grid is a complex system connecting electric power generators to consumers through power to ensure the reliable operation of power grids, and state estimation is used in system monitoring to best

  19. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  20. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  1. Towards Synthesis of Platform-aware Attack-Resilient Control Systems

    E-Print Network [OSTI]

    Pappas, George J.

    Towards Synthesis of Platform-aware Attack-Resilient Control Systems Extended Abstract Miroslav Over the past decade, the design process in the automotive indus- try has gone through a period, there is a current shift in vehicle architectures, from isolated control systems to more open automotive

  2. Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design

    E-Print Network [OSTI]

    Bhunia, Swarup

    Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design Xinmu Wang1 , Wen Yueh on the operating frequency due to RLC structure of a power grid. In this paper, we analyze the ef- fect of power grid on SCA and provide quantitative results to demonstrate the frequency-dependent SCA resistance due

  3. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in the confidentiality and integrity algorithms of the 3GPP (3rd Generation Partnership Project) mobile communications and integrity algo- rithms of the 3GPP (3rd Generation Partnership Project) [20] mobile communi- cations practical, and the authors could simulate the efficiency of their attack using a personal computer. Both

  4. Revisiting the BGE Attack on a White-Box AES Implementation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . White-box cryptography aims to protect the secret key of a cipher in an environment in which-box implementation of AES [5]. White-box cryptography aims to protect the confidentiality of the secret key device, or a set-top box. #12;In 2004, Billet et al. [3] presented an attack on the white-box AES

  5. Reaction Attacks on Public Key Cryptosystems Based on the Word Problem

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Mar#19;#16;a Isabel Gonz#19 for public key cryptosystems based on the hardness of the word problem for #12;nitely presented groups. In particular, the evidenced hardness of the classical problems for #12;nitely presented groups (the word

  6. A known plaintext attack on the ISAAC keystream generator Marina Pudovkina

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 A known plaintext attack on the ISAAC keystream generator Marina Pudovkina maripa are a requirement. The ISAAC keystream generator is a fast software-oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known

  7. A known plaintext attack on the ISAAC keystream generator Marina Pudovkina

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 A known plaintext attack on the ISAAC keystream generator Marina Pudovkina maripa are a requirement. The ISAAC keystream generator is a fast software­oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known

  8. A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

    E-Print Network [OSTI]

    Levente, Buttyán

    can be used to ensure availability. Replication in it- self, however, is not enough against malicious server can be distinguished: bandwidth consumption at- tacks and resource consumption attacks overloaded and cannot accept requests from legitimate clients anymore. In a resource consumption at- tack

  9. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA

  10. TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

  11. "How many zombies do you know?" Using indirect survey methods to measure alien attacks and outbreaks

    E-Print Network [OSTI]

    Gelman, Andrew

    "How many zombies do you know?" Using indirect survey methods to measure alien attacks applicable to zombies or, for that matter, ghosts, aliens, angels, and other hard-to-reach entities; for example, what if your wife2 is actually a zombie or an alien and you are not aware of the fact. This 2

  12. Security Games with Surveillance Cost and Optimal Timing of Attack Execution

    E-Print Network [OSTI]

    Vorobeychik, Eugene

    of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Appears inSecurity Games with Surveillance Cost and Optimal Timing of Attack Execution Bo An1 , Matthew Brown Terms Algorithm, Security Keywords Game Theory, Security, Optimization, Stackelberg Games 1

  13. Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki1,2 1 Institute of Computer Science Abstract. The PRINCE cipher is the result of a cooperation between the Technical University of Denmark (DTU-latency encryption and instant response time. PRINCE has already gained a lot of attention from the academic

  14. Combating False Data Injection Attacks in Smart Grid Using Kalman Filter

    E-Print Network [OSTI]

    Cao, Xiaojun (Matt)

    Combating False Data Injection Attacks in Smart Grid Using Kalman Filter Kebina Manandhar Dept of South Florida Email: yliu@cse.usf.edu Abstract--The security of Smart Grid, being one of the very important aspects of the Smart Grid system, is studied in this paper. We first discuss different pitfalls

  15. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

    E-Print Network [OSTI]

    Shihan Sajeed; Igor Radchenko; Sarah Kaiser; Jean-Philippe Bourgoin; Anna Pappa; Laurent Monat; Matthieu Legre; Vadim Makarov

    2015-03-30

    The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD, we model both a strong attack using technology possible in principle, and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems, and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.

  16. On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in which the round keys are introduced by addition, to thwart single-bit or multi-bit DPA attacks- tion about twice slower). We prove lower bounds on the transparency order of highly nonlinear S

  17. Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee

    E-Print Network [OSTI]

    Snoeren, Alex

    Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan against three popular Web services, we high- light a new class of vulnerability that allows an attacker a pollution attack, that allows third parties to alter the customized content the services return to users who

  18. Widget:DocumentURL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJThinWarsaw,What Is aDisqusHelper Jump to: navigation,

  19. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  20. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-06-05

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization of reflectivity and transmission of the optical components most relevant to security.

  1. Comparing three models of attack and failure tolerance in electric power networks

    E-Print Network [OSTI]

    Hines, P; Blumsack, S

    2010-01-01

    In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in power systems, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss and blackout sizes. The first two are purely topological measures, following the procedure described by Albert et al. (2004). The blackout size calculation results from a simplified model of cascading failure in power networks. Tests with randomly selected sections of the Eastern US power grid indicate that in topological dynamics power grids are similar to random graphs, which is to be expected given the observed exponential degree distribution. However the connectivity loss model and the cascading failure model indicate that power grids behave more like scale free networks, in that they are acutely more vulnerable to directed attacks than random failures. These results suggest caution in drawing conclusi...

  2. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-08-03

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security.

  3. Biology and control of thrips attacking cotton in the vicinity of College Station, Texas 

    E-Print Network [OSTI]

    Pfrimmer, Theodore Roscoe

    1953-01-01

    Advisor) May 1953 BIOLOGY AND CONTROL OF THRIE3 ATTACKING COTTON IK THE VICINITY OF COLIEGE STATION, TEXAS By THEODORE ROSCCE P iE M fR t \\ \\ A Dissertation Submitted, to the Graduate School of the Agricultural and Mechanical College of Texas... cages during 1950 . . . . . . . . . 69 3. Comparison of the dosage-mortality curves for the toxicities of several compounds, applied as dusts, against Frankliniella tritici and F. exigua in large cages during 1950 ............................ 70 4...

  4. Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    bogus messages, which will incur extra costs, thus exhaust the energy of the honest nodes. In additionS attacks, in which the goal of the adversary is to exhaust the energy of the sensor nodes and to increase or to redistribute to lists, requires prior specific permission and/or a fee. MobiHoc'07, September 9­14, 2007, Montr´eal

  5. Comparative toxicity studies of sulphur acaricides on two species of spider mites attacking cotton 

    E-Print Network [OSTI]

    Hallmark, Kenzy Donovan

    1954-01-01

    CONPARATIVE TOXICITY STUDIES OF SULFUH ACAHICIDES ON TWO SPECIE OF SPIDEH NITES ATTACKING COTTON KENZY DONOVAN HALLI&AHK A Thesis Submitted to the Graduate School oi' the Agricultural and 14echanlcal College of Texas in partial fulfillment... Ovotran- 13 Procedure Culturing technique- Dusting apparatus 1B 18 19 Spraying appsratus- Treatment procedure ?- Determination ef results ? - ? --- ? ? ? -?- hesults Conclusions- Literature Cited- 47 50 1 Results of laboratortJ' toxicity...

  6. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ã?Â?Ã?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  7. The ignition hazard to urban interiors during nuclear attack due to burning curtain fragments transported by blast 

    E-Print Network [OSTI]

    Goodale, Thomas

    There exists some uncertainty at present, in the formulation of civil defense doctrine, as to whether it is advisable for window curtains to be closed or open during nuclear attack. Closed curtains would be in position to ...

  8. Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro and Evangelos Kranakis

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks Gimer Cervera, Michel (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes affect the topol- ogy map acquisition process by interrupting the flooding of control information

  9. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 645 Malicious Data Attacks on the Smart Grid

    E-Print Network [OSTI]

    Tong, Lang

    -time electricity markets. Also considered in this paper are countermeasures to mali- cious data attack widely reported that the U.S. electrical grid has been penetrated by cyber spies [1]. We consider

  10. Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't

    E-Print Network [OSTI]

    Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

    2008-01-01

    This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

  11. Attacking the Asokan-Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL 

    E-Print Network [OSTI]

    Steel, G.; Maidl, M.; Bundy, Alan

    We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols ...

  12. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM:...

  13. A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan; Mashayekh, Salman; Kundur, Deepa; Zourntos, Takis; Butler-Purry, Karen

    2014-01-02

    - gency response,’’ in Proc. Summer Comput. Simul. Conf., Jul. 2007, pp. 1230–1237. [3] B. Rozel, M. Viziteu, R. Caire, N. Hadjsaid, and J.-P. Rognon, ‘‘Towards a common model for studying critical infrastructure interdependencies,’’ in Proc. IEEE Power.... IEEE Power Syst. Conf. Exposit., Mar. 2009, pp. 1–6. [5] J. Stamp, A. McIntyre, and B. Ricardson, ‘‘Reliability impacts from cyber attack on electric power systems,’’ in Proc. IEEE Power Syst. Conf. Exposit., Mar. 2009, pp. 1–8. [6] S. Sheng, W. L. Chan...

  14. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M. (Sandia National Laboratories, Albuquerque, NM); Ehlen, Mark Andrew (Sandia National Laboratories, Albuquerque, NM); Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  15. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    SciTech Connect (OSTI)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  16. Relevant URL's [URL1] The DESIRE project and course description at Vrije

    E-Print Network [OSTI]

    Treur, Jan

    ., Power Load Management as a Computational Market. Proc. of the Second International Conference on Multi

  17. Design of a high angle of attack robotic sting mount for tests in a low speed wind tunnel 

    E-Print Network [OSTI]

    Kubler, Tommy Jack

    1989-01-01

    DESIGN OF A HIGH ANGLE OF ATTACK ROBOTIC STING MOUNT FOR TESTS IN A LOW SPEED WIND TUNNEL A Thesis by TOMMY JACK KUBLER Submitted to the Oflice of Graduate Studies of Texas AJcM University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE August 1989 Major Subject: Aerospace Engineering DESIGN OF A HIGH ANGLE OF ATTACK ROBOTIC STING MOUNT FOR TESTS IN A IOW SPEED WIND TUNNEL A Thesis bv TOMMY JACK KHBLER Approved as to style and content by: Thomas C...

  18. Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01

    A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified in the first part of this paper. A cross layer detection mechanism is proposed to combat TSA in part II of this paper. In the physical layer, we propose a GPS carrier signal noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

  19. SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    deployed in contexts where #12;side-channel attacks are a threat. For example, smart-phones now house multi constraints such as energy efficiency, market forces will drive increased use of similar components over time. The challenges of evaluation and countermeasure in- strumentation already motivate such work, but are arguably

  20. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems

    E-Print Network [OSTI]

    Sekar, R.

    such as those due to worms, these protection mechanisms lead to re- peated restarts of the victim application- ploit the same vulnerability. An important benefit of self-healing is that it avoids system resources]. Although these techniques can de- tect attacks before vital system resources (such as files

  1. Defending Against Attacks on Main Memory Persistence William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel, and Adam Smith

    E-Print Network [OSTI]

    Lowd, Daniel

    Defending Against Attacks on Main Memory Persistence William Enck, Kevin Butler, Thomas Richardson,butler,trichard,mcdaniel,asmith}@cse.psu.edu Abstract Main memory contains transient information for all res- ident applications. However, if memory and keys can be extracted. Main memory persistence will soon be the norm as recent ad- vancements in MRAM

  2. Detection and Identification of Data Attacks in Power System Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    the attacked transmission lines. I. INTRODUCTION A. SCADA System and State Estimation A modern society relies is supervised and control through the Supervisory Control And Data Acquisition (SCADA) systems. SCADA systems on State Estimation SCADA systems measure data through remote terminal units (RTUs) all over the grid

  3. A Formal Model for Verifying the Impact of Stealthy Attacks on Optimal Power Flow in Power Grids

    E-Print Network [OSTI]

    Wang, Yongge

    - mal Power Flow; Formal Model 1. INTRODUCTION Power system control centers employ a numberA Formal Model for Verifying the Impact of Stealthy Attacks on Optimal Power Flow in Power Grids the integrity of OPF and undermine the economic and secure system operation. We present a formal verification

  4. IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading

    E-Print Network [OSTI]

    Kundur, Deepa

    components using variable structure system theory. Here, an opponent is able to remotely control multiple, sliding mode theory, smart grid attacks, variable structure system modeling. I. INTRODUCTION I T IS WELL commerce, entertainment, and social interac- tions has led to improved functionality and efficiency

  5. The average detection probability of the quantum dialogue protocol under the disturbance attack is 3/4

    E-Print Network [OSTI]

    Nguyen Ba An

    2004-06-24

    We prove explicitly that the detection probability of the disturbance attack in the recently proposed quantum dialogue protocol is 3/4 in average. The purpose is not only to reply a comment but also to provide a deeper understanding of a kind of tampering in an unauthorized communication.

  6. Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 Fangguo Zhang of Wollongong, NSW 2522 Australia {fangguo, rei, wsusilo}@uow.edu.au Abstract. At the fourth ACM conference for construction of ID-based cryptographic schemes. At the fourth ACM conference on electronic commerce (EC'03), S

  7. Proc. 10th ACM Conf. on Principles of Distributed Systems, August 1991 1 How To Withstand Mobile Virus Attacks

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Virus Attacks Extended Abstract Rafail Ostrovsky Moti Yungy Abstract We initiate a study of distributed, analogous to a spread of a virus or a worm. We show how local computations (at each processor) and global in the computation. 1 Introduction Computer viruses pose one of the central problems in distributed computing today

  8. Proc. 10th ACM Conf. on Principles of Distributed Systems, August 1991 1 How To Withstand Mobile Virus Attacks

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Virus Attacks Extended Abstract Rafail Ostrovsky \\Lambda Moti Yung y Abstract We initiate a study the network, analogous to a spread of a virus or a worm. We show how local computations (at each processor redundancy in the computation. 1 Introduction Computer viruses pose one of the central problems

  9. Eclipse Attacks on Bitcoin's Peer-to-Peer Network Ethan Heilman Alison Kendler Aviv Zohar Sharon Goldberg

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , selfish mining, and adversarial forks in the blockchain. We take a detailed look at bitcoin's peer- to-of-work to reach consensus on a distributed public ledger of transactions, aka., the blockchain. Satoshi Nakamoto [52] argues that bitcoin is secure against attackers that seek to shift the blockchain

  10. 372 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 Sybil Attacks and Their Defenses

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    372 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 Sybil Attacks and Their Defenses in the Internet of Things Kuan Zhang, Student Member, IEEE, Xiaohui Liang, Member, IEEE, Rongxing Lu, Member, IEEE, and Xuemin Shen, Fellow, IEEE Abstract--The emerging Internet-of-Things (IoT) are vulnera- ble to Sybil

  11. Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability

    E-Print Network [OSTI]

    Caesar, Matthew

    Department of Computer Science University of Illinois at Urbana-Champaign {ahouman2,nguyen59,caesar,nikita}@illinois the free flow of in- formation and ideas as well as preventing citizens and em- ployees from sharing

  12. Simple modification of Compton polarimeter to redirect synchrotron radiation

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Benesch, Jay F.; Franklin, Gregg B.; Quinn, Brian P.; Paschke, Kent D.

    2015-11-30

    Synchrotron radiation produced as an electron beam passes through a bending magnet is a significant source of background in many experiments. Using modeling, we show that simple modifications of the magnet geometry can reduce this background by orders of magnitude in some circumstances. Specifically, we examine possible modifications of the four dipole magnets used in Jefferson Lab’s Hall A Compton polarimeter chicane. This Compton polarimeter has been a crucial part of experiments with polarized beams and the next generation of experiments will utilize increased beam energies, up to 11 GeV, requiring a corresponding increase in Compton dipole field to 1.5more »T. In consequence, the synchrotron radiation (SR) from the dipole chicane will be greatly increased. Three possible modifications of the chicane dipoles are studied; each design moves about 2% of the integrated bending field to provide a gentle bend in critical regions along the beam trajectory which, in turn, greatly reduces the synchrotron radiation within the acceptance of the Compton polarimeter photon detector. Each of the modifications studied also softens the SR energy spectrum at the detector sufficiently to allow shielding with 5 mm of lead. Simulations show that these designs are each capable of reducing the background signal due to SR by three orders of magnitude. The three designs considered vary in their need for vacuum vessel changes and in their effectiveness.« less

  13. COLLOQUIUM: Dawn, the Asteroid Redirect Mission, and the Future...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The ongoing Dawn mission has as its goal the exploration of the two most massive main-belt asteroids, 4 Vesta and 1 Ceres. This mission is enabled by an on-board, solar powered,...

  14. Widget:5SecondSurveyRedirect | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJThinWarsaw,What Is a Small CommunityWickenburg, Arizona:

  15. Document Splash Screen for Redirecting to Updated Document

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield MunicipalTechnical Report:Speeding accessby aLED Street Lighting Host Site: CityC00/405 1-1 8The

  16. Web Redirect and Bookmark Requirements | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs SearchAMERICA'S FUTURE.Projects atWe Want It&

  17. Document Splash Screen for Redirecting to Updated Document

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalentLaboratory |Sector Full reportTown August 9,5The document you

  18. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  19. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other two. The fate of tritium in the attack depended on its chemistry. Any tritium present in the vicinity of jet-fuel explosion or fire would convert to HTO. The molecular tritium is also known to quickly exchange with water adsorbed on surfaces at ambient temperatures. Therefore, the end product of reacted tritium was HTO. A part of it would disperse into the atmosphere and a part would remain on site. The dynamic aspect of HTO removal was investigated taking into a consideration water flow at ground zero. Most of ground zero is encircled by the Slurry Wall, 70 ft deep underground, called a Bathtub. Approximately three million gallons of water were hosed on site in the fire-fighting efforts, and 1 million gallons fell as rainwater, between 9/11 and 9/21 (the day of the reported measurement). The combined water percolated through the debris down to the bottom of the Bathtub dissolving and removing HTO with it. That water would meet and combine with the estimated 26 million gallons of water that leaked from the Hudson River as well as broken mains, during the same period of 10 days after the attack. The combined water was collecting in the PATH train tunnel and continuously being pumped out to prevent flooding. A %Box model of water flow was developed to describe the above scenario. Considering the uncertainty in the amount of tritium present from sources other than the aircraft, as well as the dynamic character of tritium removal from the site, it is feasible to provide only a qualitative picture of the fate and behavior of tritium at WTC with the limited experimental data available. If the time history of tritium concentration at WTC had been measured, this study could have been a tracer study of water flow at WTC possibly useful to civil engineering.

  20. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    E-Print Network [OSTI]

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  1. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  2. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  3. Post-Processing Free Spatio-Temporal Optical Random Number Generator Resilient to Hardware Failure and Signal Injection Attacks

    E-Print Network [OSTI]

    Mario Stip?evi?; John Bowers

    2014-10-09

    We present a random number generator based on quantum effects in photonic emission and detection. It is unique in simultaneous use of both spatial and temporal quantum information contained in the system which makes it resilient to hardware failure and signal injection attacks. We show that its deviation from randomness cam be estimated based on simple measurements. Generated numbers pass NIST Statistical test suite without post-processing.

  4. Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter Chun-Ying Huang, Kuan-Ta Chen, and Chin-Laung Lei

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    -Ta Chen, and Chin-Laung Lei National Taiwan University Department of Electrical Engineering No.1, Sec. 4 attack is behavior that deliberately scans, probes, or intrudes on certain hosts or networks with mali

  5. PROTECT YOURSELF AGAINST PHISHING ATTACKS Phishing is a cunning attempt by hackers to solicit, steal and mishandle users' personal information (e.g.

    E-Print Network [OSTI]

    Johnson Jr.,, Ray

    PROTECT YOURSELF AGAINST PHISHING ATTACKS Phishing is a cunning attempt by hackers to solicit willingly supply the requested data, hackers gain access to their accounts and then engage in malicious

  6. New J. Phys. 17 (2015) 023049 doi:10.1088/1367-2630/17/2/023049 Percolation of localized attack on complex networks

    E-Print Network [OSTI]

    Stanley, H. Eugene

    2015-01-01

    for Polymer Studies and Department of Physics, Boston University, Boston, MA 02215, USA 2 Department the effects of earthquakes, floods, or military attacks on infrastructure networks and the effects

  7. PROJECTED IMPACT OF SULFATE ATTACK ON THE LONG-TERM PERFORMANCE OF A CONCRETE REPOSITORY

    SciTech Connect (OSTI)

    Flach, G.

    2009-12-11

    Saltstone is a cementitious waste form made by mixing salt solution originating from liquid waste storage tanks at the DOE Savannah River Site with a dry mix containing blast furnace slag, fly ash, and cement or lime. The wet mix is poured into a concrete repository for on-site disposal. Solidified Saltstone is a dense, alkaline, reducing, micro-porous, monolithic, cementitious matrix, containing a solution of salts within its pore structure. Sodium sulfate concentrations in the pore fluid are around 0.15 mol/L, and external sulfate attack on concrete barriers is expected to occur over time. To predict the long-term performance of concrete repositories, the STADIUM{reg_sign} code was used to simulate the reactive transport processes leading to formation of ettringite, an expansive mineral phase often associated with spalling or cracking. STADIUM{reg_sign} is a multi-ionic transport model based on a split operator approach that separates ionic movement and chemical reactions. Ionic transport is described by the extended Nernst-Planck equation for unsaturated media, and accounts for electrical coupling between ionic species, chemical activity, transport due to water content gradient, and temperature effects. STADIUM{reg_sign} does not predict whether physical damage will occur, or the impact on transport properties should fracturing occur. Thus the presence of ettringite was assumed to coincide with physical damage for the purpose of estimating effective transport properties. Effective properties for concrete barriers were estimated assuming complete hydraulic failure behind the ettringite front and unaltered properties ahead of the front. The ettringite front advances at a rate dependent on the diffusion coefficient assumed for the failed zone. A sensitivity study indicates a service life ranging from thousands to tens of thousands of years, depending on the barrier thickness and sulfate exposure conditions among other factors.

  8. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasil’nikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors – from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelial–mesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK – the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the level of AMPK phosphorylation may be considered as predictors of the tumor sensitivity to anti-angiogenic drugs. - Highlights: • Snail1 protects breast cancer cells from hypoxia. • Protective effect of Snail1 is mediated via ?-catenin/HIF-1 pathway. • Snail/?-catenin signaling is negatively controlled by the energy sensor – AMPK. • The failure in AMPK phosphorylation drives cells to the hypoxia-tolerant state.

  9. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Environmental Management (EM)

    EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

  10. Detecting Spam URLs in Social Media via Behavioral Analysis

    E-Print Network [OSTI]

    Caverlee, James

    media systems like Twitter and Facebook. Recent studies find that around 25% of all status messages social systems provide restricted (or even no) access to posts, like Facebook. Second, even for those to assess how these links are actually received by the users of the system via clicks. A. Hanbury et al

  11. Perl ASP Servlet JSP ID cookie encodeURL

    E-Print Network [OSTI]

    Chiba, Shigeru

    14 Servlet 99-2270-6 15 2 28 #12;1 Web Web Perl ASP Servlet JSP HTML Web ID Web ID ID cookie encode Servlet JSP 1.1 1963 70 1991 93 HTML #12;1 9 1.1.1 TCP/IP WWW(World Wide Web) · WWW WWW 1989 CERN(European Particle Physics Laboratory) Http Web / WWW HTML(Hyper Text Markup Language) HTML WWW WWW 1.2 Web · Java

  12. Chris Dwyer URL: http://www.ece.duke.edu/~dwyer

    E-Print Network [OSTI]

    Reif, John H.

    in optical storage density by polychromatic address multiplexing on self-assembled DNA nanostructures and Architecture, Nanoscale System Design & Simulation, Nanoscale Circuit Design, Self-assembling Device-Assembled Architectures and Devices, April 2012. 4. M. Mottaghi, C. Dwyer, "Optical Techniques for FRET-based Address

  13. Property:GeoNames URL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo,AltFuelVehicle2 Jump to: navigation, search This is a propertyGenDelToGrid JumpGeoNames

  14. Property:NEPA Application Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to: navigation,PropertyPartner7WebsiteCertReqs

  15. Property:NEPA Decision Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to: navigation,PropertyPartner7WebsiteCertReqsApplicationAttachmentsDecision

  16. EERE Web Domains and URLs | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based|Department of5 Peer ReviewUse of HeAgenda EERE QualityStyleDepartment

  17. Protecting Free and Open Communications on the Internet Against Man-in-the-middle Attacks on Third-party Software: We're FOCI'd

    E-Print Network [OSTI]

    Crandall, Jedidiah R.

    -party Software: We're FOCI'd Jeffrey Knockel Dept. of Computer Science University of New Mexico jeffk@cs.unm.edu Jedidiah R. Crandall Dept. of Computer Science University of New Mexico crandall@cs.unm.edu Abstract corruption attacks. In the context of free and open communications on the Internet (FOCI), it is important

  18. Attacks and Security Proofs of EAX-Prime Kazuhiko Minematsu1, Stefan Lucks2, Hiraku Morita3, and Tetsu Iwata4

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ) specified by ANSI C12.22 as a standard security function for Smart Grid. EAX is based on EAX proposedAttacks and Security Proofs of EAX-Prime Kazuhiko Minematsu1, Stefan Lucks2, Hiraku Morita3 by Bellare, Rogaway, and Wagner. While EAX has a proof of security based on the pseudorandomness

  19. Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer (Agrilus planipennis Fairmaire) by Don Cipollini, a professor at Wright State University in Ohio

    E-Print Network [OSTI]

    Pittendrigh, Barry

    Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer been collected in areas where the abundance of dead ash trees suggest that local populations of EAB. To date, despite the loss of over 50 million ash trees in areas where lilac, privet and fringe trees

  20. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

  1. Attacks on Emerging Architectures

    E-Print Network [OSTI]

    Hanna, Steven Craig

    2012-01-01

    In International Symposium on Software Testing and Analysis,International symposium on Software testing and analysis,testing of javascript web applications. In Proceedings of the 33rd International Conference on Software

  2. Insects Attacking Vegetable Crops. 

    E-Print Network [OSTI]

    Newton, Weldon H.; Deer, James A.; Hamman, Philip J.; Wolfenbarger, Dan A.; Harding, James A.; Schuster, Michael F.

    1964-01-01

    Confronting the Unknown: Tejanas in the Transformation of Spanish and Mexican Texas, 1735-1836 sheds light on Tejana legal and social roles in this tumultuous period. Despite great strides in the field of Borderlands history ...

  3. Some Fungi Attacking Corn

    E-Print Network [OSTI]

    Haslam, Thomas Powell

    1910-01-01

    . R - raceme - X 96. S - sporophore - X 96. , -43- PLATE X I I . Macor erectus: M - mycelium. K - conidium formation. P L A T E XII -44- Trichoderma lignorium. Trichoderma lignorium has been found occurring abundantly in a few fields in Riley... of the Penioillium and the large amount of filamentous growth between the grains readily distinguish it from Penioillium glaucum. -45- PLATE XIII. Trichoderma lignorium: M - mycelium. C - conidia. P L A T E XIII -46- PLATE 117. Trichoderma lignorium: 36...

  4. Patterns of heart attacks

    E-Print Network [OSTI]

    Shenk, Kimberly N

    2010-01-01

    Myocardial infarction is a derivative of heart disease that is a growing concern in the United States today. With heart disease becoming increasingly predominant, it is important to not only take steps toward preventing ...

  5. Insects Attacking Forage Crops. 

    E-Print Network [OSTI]

    Randolph, N. M.; Garner, C. F.

    1961-01-01

    lropean Corn Borer. ~d Clover ! rer ............ ................... ,talk Bore1 ootstock \\ Borer ....... ....................................................... 17 Veevil ............................................. 17... ........................................................ 17 ........................................................ I7 >sser Corns garcane R over Stem ~twortns ..... . - ................... rer.. ............ 3rm.. ........... ........ Seed-Corn Maggot Sweet Clover Root Bo Sou tllern Corn R...

  6. V-200: Apache Struts DefaultActionMapper Redirection and OGNL...

    Broader source: Energy.gov (indexed) [DOE]

    tcher.mapper.DefaultActionMapper) can be exploited to e.g. inject and execute arbitrary Java code via OGNL (Object-Graph Navigation Language) expressions. IMPACT: Security Bypass...

  7. Inhabiting cycles of maritime obsolescence : redirecting the National Defense Reserve Fleet

    E-Print Network [OSTI]

    Polansky, Nicholas W. (Nicholas Wilkes)

    2014-01-01

    Defense is in a state of obsolescence. The metrics of risk have changed from threat of military invasion to that of weather. Infrastructure is in a state of transition. The Maritime Administration's National Defense Reserve ...

  8. Velocity-Dependent Dynamic Curvature Gain for Redirected Walking Christian T. Neth

    E-Print Network [OSTI]

    and Cognitive Engineering, Korea University Betty J. Mohler Max Planck Institute for Biological Cybernetics 8 m Institute for Biological Cybernetics; Reutlingen University Jan L. Souman Max Planck Institute for Biological Cybernetics David Engel Max Planck Institute for Biological Cybernetics Uwe Kloos Reutlingen

  9. Demonstration of a light-redirecting skylight system at the Palm Springs Chamber of Commerce

    SciTech Connect (OSTI)

    Lee, E.S.; Beltran, L.O.; Selkowitz, S.E. [Lawrence Berkeley National Lab., CA (United States); Lau, H.; Ander, G.D. [Southern California Edison, San Dimas, CA (United States)

    1996-05-01

    As part of a demonstration project to provide a comprehensive energy upgrade to a 294 m{sup 2} (3168 ft{sup 2}) commercial building, an advanced skylight design was developed using optical light control materials and geometry to provide daylight to two adjoining offices. The skylight system was developed using outdoor physical model tests and simulation tools Limited on-site measurements and occupant polls were conducted. Market issues were addressed. The skylight systems were found to improve lighting quality and to control excessive daylight illuminance levels compared to a conventional diffusing bubble skylight. Daylighting principles developed in earlier work for vertical glazing systems (light shelves and light pipes) were shown to be applicable in skylight designs at full-scale.

  10. COLLOQUIUM: Dawn, the Asteroid Redirect Mission, and the Future of Solar

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits &Bradbury ScienceComplexPlasma PhysicsElectric Propulsion |

  11. V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccount PasswordFlawBypass

  12. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar throughVulnerability

  13. GLOSSARY OF INFORMATION SECURITY THREATS Computer any electronic device used for storing, processing and transmitting data according

    E-Print Network [OSTI]

    Sun, Yi

    a computer virus. Can appear to be a legitimate program or system resource. WormGLOSSARY OF INFORMATION SECURITY THREATS Computer · any electronic device used or damage your computer. Pharming ·(aka Vishing) a hacker's attack aiming to redirect

  14. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Williams, “Security issues in SCADA networks,” Computers andA Cyber Security Study of a SCADA Energy Management System,”and transmitted over a SCADA network to the system operator.

  15. An Attack on Centrifugal Costs 

    E-Print Network [OSTI]

    Murray, P. F.

    1985-01-01

    discussed involve the addition of a variable speed turbine drive, the removal of ex cess system pressure drop, motor speed changes and variable drive units, and the matching of pumps to systems. INTRODUCTION The Monsanto Chocolate Bayou plant, a.... These techniques include: 1) Speed control of pump or fan: a) variable turbine governor b) electric motor vari-drive c) motor replacement at different speed d) pulley or sheave replacement e) variable drive speed reducer 2) Trimming of impeller. 3...

  16. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Observability with Minimal PMU Placement,” IEEE Transactions447478 , 2002. [39] H. Wu, “PMU Impact on State Estimation20] also investigate optimal PMU placement problems. Their

  17. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Reliability for Improved Grid Security,” IEEE TransmissionNext Generation Power Grid Security, Syngress, 2010. [12] A.Grids,” 16th ACM Conference on Computer and Communications Security,

  18. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    and S. S. Sastry, “Cyber-security Analysis of StateK. H. Johansson, “A Cyber Security Study of a SCADA Energy

  19. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Study of a SCADA Energy Management System,” ArXiv e- prints,balance and other energy management system [EMS] decisions.major component of Energy Management Systems [1], [29]. This

  20. Research deciphers HIV attack plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultiday Production of SOA inResearch PortfolioResearchResearch

  1. URL: http://www.kasahara.cs.waseda.ac.jp/ , ,,TV, DVD

    E-Print Network [OSTI]

    Kasahara, Hironori

    & Highend Servers IBM Power4,5,5+,6, HPCS 10PFLOP(Power7) Sun Niagara(SparcT1,T2), Rock , 20023, 5120 : 40: ISSCC08 4.5, M.ITO, et al., "An 8640 MIPS SoC with Independent Power- off Control of 8 CPUs and 8 RAMs #12;11 1. 2. DMA 3. #12;0 1 2 3 4 5 6 7 8 9 tomcatv swim su2cor hydro2d mgrid applu

  2. URL: www.swpc.noaa.gov/NOAAscales April 7, 2011 NOAA Space Weather Scales

    E-Print Network [OSTI]

    Schrijver, Karel

    with orientation, uplink/downlink and tracking satellites. Other systems: pipeline currents can reach hundreds: induced pipeline currents affect preventive measures, HF radio propagation sporadic, satellite navigation); passengers and crew in high-flying aircraft at high latitudes may be exposed to radiation risk. *** Satellite

  3. URL: http://www.kasahara.cs.waseda.ac.jp/ , ,,TV, DVD

    E-Print Network [OSTI]

    Kasahara, Hironori

    -core SMP Server Compile Option: (*1) Sequential: -O3 ­qarch=pwr6, XLF: -O3 ­qarch=pwr6 ­qsmp=auto, OSCAR: -O3 ­qarch=pwr6 ­qsmp=noauto (*2) Sequential: -O5 -q64 ­qarch=pwr6, XLF: -O5 ­q64 ­qarch=pwr6 ­qsmp=auto, OSCAR: -O5 ­q64 ­qarch=pwr6 ­qsmp=noauto (Others) Sequential: -O5 ­qarch=pwr6, XLF: -O5

  4. E-books acquis sur ScienceDirect ISBN Titre URL

    E-Print Network [OSTI]

    Arleo, Angelo

    9782294088810 Soins infirmiers et douleur http://www.sciencedirect.com/science/book/9782294088810 9782294094330 9782294094668 Relation d'aide en soins infirmiers http://www.sciencedirect.com/science/book/9782294094668;9782294706738 La consultation avec l'enfant http://www.sciencedirect.com/science/book/9782294706738 9782294706790 L'infirmier

  5. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on

  6. EnergySavers.gov: A New Season, a New URL for the Consumer's Guide |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice ofofWind ProjectsEfficiencyPreparedKY The City ofPrincipals

  7. Seattle, Washington: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS Report UrlNM-bRenewableSMUD WindISaveScrippsSearch(Redirected from

  8. Secret Energy Savings | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS Report UrlNM-bRenewableSMUD WindISaveScrippsSearch(Redirected

  9. Section 28 Trust Wind Farm | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS Report UrlNM-bRenewableSMUD WindISaveScrippsSearch(RedirectedSection

  10. Considering Attack Complexity: Layered Intrusion Tolerance

    E-Print Network [OSTI]

    Krings, Axel W.

    . Ubiquitous access translates to huge increases in the risk of external intrusion. Another factor contributing, design and test efforts are of- ten motivated by the probability of faults, e.g. Probability Risk. Automation: Any solution should re- quire the least amount of human in- tervention. Labor intensive solutions

  11. Hardware Trojan Attacks: Threat Analysis and

    E-Print Network [OSTI]

    Bhunia, Swarup

    . The nomenclature is derived from a mythological incident attributed to the ancient Greeks in the Trojan war, where a wooden horse was gifted to the Trojan army who took it into their city walls without realizing that the enemy (Greek) soldiers were hidden inside the hollow horse. The seemingly trustworthy horse

  12. An Attack Surface Metric Pratyusa K. Manadhata

    E-Print Network [OSTI]

    K. Manadhata This research was sponsored in part by the Defense Advanced Research Project Agency by the National Science Foundation under grants no. CCR-0121547 and CNS-0433540, SAP Labs, LLC under award no metrics has recently become more pressing. In this thesis, we introduce the measure of a software system

  13. On traffic analysis attacks and countermeasures 

    E-Print Network [OSTI]

    Fu, Xinwen

    2007-04-25

    brother vi ACKNOWLEDGMENTS It has been almost six years since I started my graduate studies at Texas A&M University. When I sit back and think about the people who have influenced and helped me to complete this dissertation, I am... overwhelmed! First and foremost, I would like to thank my advisor, Dr. Wei Zhao, for recruiting me as a student from China about six years ago. It was an extraordinary piece of good fortune to have the opportunity to work with him. He has...

  14. Attacks on the DECT authentication mechanisms

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    significant byte in foo. To assign a value in pseudocode, the operator is used. Whenever the oper- ators

  15. Attack, Defense and Contagion in Networks

    E-Print Network [OSTI]

    Goyal, Sanjeev; Vigier, Adrien

    2014-07-30

    maximize value. The presence of contagious threats reinforces this pressure and the empty network remains optimal. There is, however, a range of possible alternatives between concave and convex network value functions. In particular, in some settings...

  16. Bomb tests attack the food chain

    SciTech Connect (OSTI)

    Ruff, T. )

    1990-03-01

    Ciguatera poisoning, the most common type of fish poisoning in the world, has become a major public health problem in some parts of the South Pacific. This area has always been the site of periodic outbreaks, especially after severe storms or natural disasters that damage core reefs. But since World War II it has become evident that military activities and major construction projects that wreak havoc on corals also lead to ciguatera outbreaks. Extraordinarily high rates of ciguatera poisoning have occurred on the small Pacific islands that have been used for nuclear tests and on the islands that host the military infrastructures and activities that accompany the tests. This is true for both the Marshall Islands near Bikini and Eniwetok, where U.S. tests took place, and in French Polynesia, in the area around Moruroa Atoll where the French government continues to test. Ciguatera poisoning has a disastrous effect on people who depend on fishing as a way of life and on fish as the major source of protein. 10 refs.

  17. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcoming ReleaseSecurityPediatricNOAA MAY 2013 VOL 340Early

  18. Modeling of Damage, Permeability Changes and Pressure Responses during Excavation of the TSX Tunnel in Granitic Rock at URL, Canada

    E-Print Network [OSTI]

    Rutqvist, Jonny

    2009-01-01

    the Swedish Nuclear Fuel and Waste Management Company (SKB).the Swedish Nuclear Fuel and Waste Management Company ABAQUS

  19. Modeling of Damage, Permeability Changes and Pressure Responses during Excavation of the TSX Tunnel in Granitic Rock at URL, Canada

    E-Print Network [OSTI]

    Rutqvist, Jonny

    2009-01-01

    Modeling of Damage, Permeability Changes and Pressureof excavation-induced damage, permeability changes, andrange of approaches to model damage and permeability changes

  20. Research Memorandum No.630 Jan. 1997 Email iba@ism.ac.jp, URL http://www.ism.ac.jp/iba/

    E-Print Network [OSTI]

    Iba, Yukito

    .3 ) David Marr [ 87] Marr,D. (1987), | |, , , . ( ) Marr,D. (1982), VISION, A Computational Investigation into the Human Representation and Processing of Visual Information, Freeman. Marr Poggio Marr Poggio Marr ( ) Marr Marr ( ) Marr 35 3 3.1 heat bath global \\ " 10 \\ "( MCMC (MC)2 ) \\Gibbs Sampler" ( heat bath

  1. Date:20/02/2010 URL: http://www.thehindu.com/2010/02/20/stories/2010022062840900.htm

    E-Print Network [OSTI]

    Harinarayana, T.

    the current tsunami warning system." It said that vessels far out in the sea may not notice the waves passing their detection and monitoring a challenge." Present system The current tsunami warning system relies on a global," the release said. The release pointed out that since the 2004 tsunami, the international warning system had

  2. Modeling of Damage, Permeability Changes and Pressure Responses during Excavation of the TSX Tunnel in Granitic Rock at URL, Canada

    E-Print Network [OSTI]

    Rutqvist, Jonny

    2009-01-01

    Kyoto, Japan Canadian Nuclear Safety Commission, Ottawa,JAEA), the Canadian Nuclear Safety Commission (CNSC), andTeam CNSC: Canadian Nuclear Safety Commission Numerical

  3. Advanced Integrated Systems Technology Development: Personal Comfort Systems and Radiant Slab Systems

    E-Print Network [OSTI]

    2015-01-01

    thermal mass, advanced window blinds that redirect solar energythermal mass, advanced window blinds that redirect solar energy

  4. Faculty of Science | January 15, 2015 URL: http://uofa.ualberta.ca/science/aboutus/contours/2014fallcontours/2015/january/martinsharp2014royalsocietyofcanadafellow

    E-Print Network [OSTI]

    Wang, Hao "Howard"

    ," says Sharp. "The intensity of summer melting on these glaciers in the 2000s has been the highest to downstream aquatic ecosystems, and how carbon is cycled in glacial environments. In addressing a global

  5. To link to this article : doi:10.3390/atmos6030380 URL : http://dx.doi.org/10.3390/atmos6030380

    E-Print Network [OSTI]

    Mailhes, Corinne

    , Cu and Sb, and Cd is associated with an anthropogenic source from ore mining and processing the surface of the peatland (in peat layers dated from the 1980s) linked to an increasing trend since the 2000 of leaded gasoline use in China. Emissions from coal and leaded gasoline combustions in northern China

  6. Electronic Notes in Theoretical Computer Science 29 (1999) URL: http://www.elsevier.nl/locate/entcs/volume29.html 18 pages

    E-Print Network [OSTI]

    Bruni, Roberto

    1999-01-01

    , and by the Information Technology Promotion Agency, Japan, as part of the In­ dustrial Science and Technology Frontier Program `New Models for Software Architecture' sponsored by NEDO (New Energy and Industrial Technology in Computer Science, Centre of the Danish National Research Foundation. c fl1999 Published by Elsevier Science

  7. To link to this article : doi:10.1017/jfm.2014.429 URL : http://dx.doi.org/10.1017/jfm.2014.429

    E-Print Network [OSTI]

    Mailhes, Corinne

    or turbulent downward flow: symmetric to asymmetric shape transition. (2014) Journal of Fluid Mechanics, vol rising in a vertical pipe against laminar or turbulent downward flow: symmetric to asymmetric shape , the symmetry-breaking bifurcation occurs in both laminar and turbulent flow at the same vorticity

  8. Available at URL ftp://ftp.cs.dartmouth.edu/TR/TR94-226.ps.Z Disk-directed I/O for MIMD Multiprocessors

    E-Print Network [OSTI]

    on today's multiprocessors, such as weather forecast- ing and seismic analysis, are bottlenecked forecasting, aircraft simulation, seismic exploration, and climate modeling are increasingly being implemented of this text appears in the First Symposium on Operating Systems Design and Implementation (OSDI), November

  9. To link to this article: DOI: 10.1134/S2070205111030051 URL : http://dx.doi.org/10.1134/S2070205111030051

    E-Print Network [OSTI]

    Mailhes, Corinne

    and stationary gas turbines are made of refractory single-crystal nickel alloys. To protect the surfaces2070205111030051 This is an author-deposited version published in: http://oatao.univ-toulouse.fr/ Eprints ID: 5779 of blades from gas corrosion and the impact of high operating temperatures, thermal- protective coatings

  10. To link to this article: DOI: 10.1063/1.3616147 URL : http://dx.doi.org/10.1063/1.3616147

    E-Print Network [OSTI]

    Mailhes, Corinne

    of the 3d electron configurations implies im- portant changes of material properties including magnetic can be exploited as a non-volatile (read-only) memory effect. [doi:10.1063/1.3616147] Certain 3d4 -3d7, structural, optical, and electrical properties. Up to now, this latter property has received much less

  11. To link to this article : DOI:10.1017/jfm.2012.288 URL : http://dx.doi.org/10.1017/jfm.2012.288

    E-Print Network [OSTI]

    Boyer, Edmond

    dynamics of air bubbles crossing a horizontal fluid­fluid interface. (2012) Journal of Fluid Mechanics, vol bubbles crossing a horizontal fluid­fluid interface Romain Bonhomme1,2,3 , Jacques Magnaudet1,2 , Fabien Duval3 and Bruno Piar3 1 Universit´e de Toulouse; INPT, UPS; IMFT (Institut de M´ecanique des Fluides de

  12. Available at URL ftp://ftp.cs.dartmouth.edu/TR/TR96-297.ps.Z Applications of Parallel I/O

    E-Print Network [OSTI]

    Kotz Technical Report PCS-TR96-297 Release 1 Department of Computer Science Dartmouth College Hanover number NCC 2-849. 1 #12;I intend to update this technical report periodically check its web page percentage of their run time on either the CM5 or C90. RHH95] weather simulation code RW93, Rya91] A paper

  13. To link to this article : DOI:10.1016/j.fuel.2011.11.066 URL : http://www.sciencedirect.com/science/article/pii/S0016236111007800#

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , alexandre and Debenest, Gérald Modelling of non-consolidated oil shale semi- coke forward combustion : 10.1016/j.fuel.2011.11.066 #12;Modelling of non-consolidated oil shale semi-coke forward combustion

  14. MAC 5710 -Estruturas de Dados e sua Manipulac~ao URL: http://www.ime.usp.br/song/mac5710.html

    E-Print Network [OSTI]

    Song, Siang Wun

    Efici^encia ou complexidade de algoritmos Siang - 2005 (Daremos aqui um tratamento informal sobre o assunto. Maiores detalhes devem ser obtidos em cursos de An´alise de Algoritmos.) Costuma-se analisar um algoritmo em termos de tempo e espa¸co (ou mem´oria). Para o tempo, diversas medidas s~ao em princ´ipio poss

  15. See AGSO Research Newsletter on the WWW at URL: http://www.agso.gov.au/information/publications/resnews/ May 1999 AGSO Research Newsletter 30

    E-Print Network [OSTI]

    Sandiford, Mike

    has impor- tant implications for generating high geothermal gradient regimes without appealing Australian Proterozoic terrains High-geothermal-gradient processes dominate the geological record of high-geothermal-gradient re- gimes, principally because they are thought to represent significant depar

  16. Electronic Notes in Theoretical Computer Science 67 (2002) URL: http://www.elsevier.nl/locate/entcs/volume67.html 20 pages

    E-Print Network [OSTI]

    Ayala-Rincón, Mauricio

    2002-01-01

    Bras#19;#16;lia D.F., Brasil Fairouz Kamareddine 4 School of Mathematical and Computer Sciences Heriot-Watt

  17. Electronic Notes in Theoretical Computer Science 67 (2002) URL: http://www.elsevier.nl/locate/entcs/volume67.html 20 pages

    E-Print Network [OSTI]

    Ayala-Rincón, Mauricio

    2002-01-01

    Kamareddine 1 School of Mathematical and Computer Sciences, Heriot-Watt University, Edinburgh, Scotland Fran Departamento de Matem#19;atica, Universidade de Bras#19;#16;lia, Bras#19;#16;lia D.F., Brasil Abstract We

  18. Electronic Notes in Theoretical Computer Science 87 (2004) URL: http://www.elsevier.nl/locate/entcs/volume87.html 15 pages

    E-Print Network [OSTI]

    Jung, Achim

    2004-01-01

    Introduction This text contains the notes of a talk given at the Bellairs Research Centre in Barbados in April of stable compactness. 1 Participation in the Barbados workshop was made possible through a travel grant

  19. Electronic Notes in Theoretical Computer Science 45 (2001) URL: http://www.elsevier.nl/locate/entcs/volume45.html 24 pages

    E-Print Network [OSTI]

    Cousot, Patrick

    2001-01-01

    in part by the european FP5 project IST-1999-20527 Daedalus. 2 cousot@ens.fr, www.di.ens.fr/~cousot 3

  20. To link to this article : DOI:10.1063/1.4863724 URL: http://dx.doi.org/10.1063/1.4863724

    E-Print Network [OSTI]

    Mailhes, Corinne

    (bioremediation) or of carbon dioxide (CO2 sequestration). However, they can also have the undesirable effect

  1. To link to this article : URL / http://journals.aps.org/prl/abstract/10.1103/PhysRevLett.114.214

    E-Print Network [OSTI]

    Mailhes, Corinne

    is a traditional topic in fluid mechanics, current understanding and studies are limited to bubble collapse Universit´e de Toulouse, ISAE-Supaero, D´epartement A´erodynamique, ´Energ´etique et Propulsion, 10 avenue Engineering and Mechanics, Virginia Tech, Blacksburg, VA 24061 (Dated: February 27, 2015) Cavitation bubbles

  2. To link to this article : DOI:10.1209/0295-5075/98/34005 URL : http://dx.doi.org/10.1209/0295-5075/98/34005

    E-Print Network [OSTI]

    Mailhes, Corinne

    ] or the underground sequestration of CO2 [2]. Another important field is the protection of buildings and of our of the medium of lower porosity. A simple efflorescence growth model is then used to explain why and modelling of efflorescence formation and growth (as a first (a)E-mail: mprat@imft.fr step toward the still

  3. Electronic Notes in Theoretical Computer Science 67 (2002) URL: http://www.elsevier.nl/locate/entcs/volume67.html 12 pages

    E-Print Network [OSTI]

    Navarro Pérez, Juan Antonio

    2002-01-01

    ´e Arrazola Centro de Investigaci´on en Tecnolog´ias de Informaci´on y Automatizaci´on (CENTIA) Universidad de

  4. Electronic Notes in Theoretical Computer Science 71 (2003) URL: http://www.elsevier.nl/locate/entcs/volume71.html 21 pages

    E-Print Network [OSTI]

    Sen, Koushik

    2003-01-01

    -Champaign {thati,ksen}@cs.uiuc.edu Narciso Mart´i-Oliet Dpto. de Sistemas Inform´aticos y Programaci´on Universidad

  5. Electronic Notes in Theoretical Computer Science 71 (2003) URL: http://www.elsevier.nl/locate/entcs/volume71.html 21 pages

    E-Print Network [OSTI]

    Sen, Koushik

    2003-01-01

    ­Champaign {thati,ksen}@cs.uiuc.edu Narciso Martâ??�­Oliet Dpto. de Sistemas Informâ??aticos y Programaciâ??on Universidad

  6. To link to this article : DOI:10.1098/rsta.2010.0109 URL : http://dx.doi.org/10.1098/rsta.2010.0109

    E-Print Network [OSTI]

    Mailhes, Corinne

    as supercapacitors, are energy storage devices that fill the gap between batteries and dielectric capacitors. Thanks to their unique features, they have a key role to play in energy storage and harvesting, acting as a complement the next generation of high-energy-density supercapacitors. Keywords: energy storage; electrochemical

  7. Electronic Notes in Theoretical Computer Science 25 (1999) URL: http://www.elsevier.nl/locate/entcs/volume25.html 12 pages

    E-Print Network [OSTI]

    Kreinovich, Vladik

    1999-01-01

    processing of concern to the oil industry and to the U.S. Federal Agencies involved in the analysis solutions. 1 The Need for New Language Abstractions Hardware improvements and the general spread

  8. Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) 1(1400) IG (JPC ) = 1-(1 -+)

    E-Print Network [OSTI]

    2010-01-01

    the following data for averages, fits, limits, etc. · · · 1323.1± 4.6 2 AOYAGI 93 BKEI - p - p 1406 ±20 3 ALDE

  9. Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) 1(1400) IG (JPC ) = 1-(1 -+)

    E-Print Network [OSTI]

    2012-01-01

    the following data for averages, fits, limits, etc. · · · 1323.1± 4.6 2 AOYAGI 93 BKEI - p - p 1406 ±20 3 ALDE

  10. URL: http://www.cbc.ca/news/technology/deepearthhasoceansworthofwater10diamondreveals1.2569564 Deep Earth has oceans' worth of water,

    E-Print Network [OSTI]

    Machel, Hans

    .2569564 Deep Earth has oceans' worth of water, $10 diamond reveals University of Alberta researchers find of water stored deep inside the Earth. The diamond formed in the "transition zone" around 410 to 660 is representative of that part of the deep Earth, the amount of water there could be "about the same as the mass

  11. PubMed QUICK GUIDE University of California Berkeley Library Use this URL to access the UCcustomized version of PubMed, with links to UCBsubscribed full text

    E-Print Network [OSTI]

    PubMed searching is easy: just enter terms in the search box and click Search. The Advanced Search link below the search box provides access to additional searching options. Keyword Searching Enter combines (ANDs) significant terms together using automatic term mapping, matching your search terms

  12. Edmonton Journal URL: http://www.edmontonjournal.com/game+changing+sensors+revolutionize+methods+monitoring+climate+science+data/10396523/story.html

    E-Print Network [OSTI]

    Machel, Hans

    the environmental impacts of oilsands development or forestry companies and how to mitigate the impacts, he says the health of forests before oilsands development takes off. "We are finding out what are the conditions

  13. Practical (Second) Preimage Attacks on Gautham Sekar1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Indian Statistical Institute, Chennai Centre, SETS Campus, MGR Knowledge City, CIT Campus, Taramani, Chennai 600113, India. 2 Institute of Mathematical Sciences, CIT Campus, Taramani, Chennai 600113, India goals are not met. Motivation behind this work: The TCS, headquartered in India, is among the largest

  14. Eavesdropping attacks on computer displays Markus G. Kuhn

    E-Print Network [OSTI]

    Kuhn, Markus

    Electromagnetic information leakage from computer displays was first demonstrated to the general public by van Eck for the return current. Opponents connected earth rods to portable valve amplifiers, in order to make the voltage

  15. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Wool School of Electrical Engineering, Tel Aviv University, Ramat Aviv 69978, ISRAEL. kfirziv. [Fin03], [GSA04], [Eco02] and [Yos05]). The usage of RFID systems has grown quickly over the last the energy emitted though the card reader's transmission. Because of this feature, contactless smartcard

  16. Sandia Energy - Study Rebuts Hypothesis That Comet Attacks Ended...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in North America about 13,000 years ago, Sandia lead author Mark Boslough (Discrete Mathematics & Complex Systems Dept.) and researchers from 14 academic institutions assert that...

  17. Attacks in Stream Ciphers: A Survey Gustavo Banegas

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    : ECB(Eletronic codebook, CBC(Cipher-block Chaining), CFB(Cipher feedback) and OFB(Output feedback). We

  18. Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    the true network identity of com- municating parties against eavesdropping adversaries. Tor, acronym for The Onion Router, is an example of such a system. Such systems relay the traffic of their users through an overlay of nodes that are called Onion Routers and are operated by volunteers distributed across the globe

  19. Preventing Active Timing Attacks in Low-Latency Anonymous Communication

    E-Print Network [OSTI]

    Johnson, Aaron

    elsewhere, and it can be quite insufficient. Consider Tor [7], the popular imple- mentation of onion. Low-latency anonymous communication protocols in gen- eral, and the popular onion-routing protocol on the Tor network to estimate the real-world per- formance of our protocol, showing that the added delay

  20. Sustained concrete attack by low-temperature, fragmented core debris

    SciTech Connect (OSTI)

    Tarbell, W.W.; Bradley, D.R.; Blose, R.E.; Ross, J.W.; Gilbert, D.W.

    1987-07-01

    Four experiments were performed to study the interactions between low-temperature core debris and concretes typical of reactor structures. The tests addressed accident situations where the core debris is at elevated temperature, but not molten. Concrete crucibles were formed in right-circular cylinders with 45 kg of steel spheres (approx.3-mm diameter) as the debris simulant. The debris was heated by an inductive power supply to nominal temperatures of 1473 K to 1673 K. Two tests were performed on each of two concrete types using either basalt or limestone aggregate. For each concrete, one test was performed with water atop the debris while the second had no water added. The results show that low-temperature core debris will erode either basalt or limestone-common sand concretes. Downward erosion rates of 3 to 4 cm/hr were recorded for both concrete types. The limestone concrete produced a crust layer within the debris bed that was effective in preventing the downward intrusion of water. The basalt concrete crust was formed above the debris and consisted of numerous, convoluted, thin layers. Carbon dioxide and water release from the decomposition of concrete were partially reduced by the metallic debris to yield carbon monoxide and hydrogen, respectively. The overlying water pool did not effect the reduction reactions.

  1. ON THE OPTIMAL STRUCTURE OF WATERMARK DECODERS UNDER DESYNCHRONIZATION ATTACKS

    E-Print Network [OSTI]

    Moulin, Pierre

    for which the theory applies. Keywords: watermarking, data hiding, desynchronization, decod- ing, information theory, image processing. 1. INTRODUCTION One of the main difficulties in designing watermarking to limitations of cur- rent codes, or rather to fundamental limitations on achievable perfor- mance. This paper

  2. Attack-Resistant Location Estimation in Sensor (Revised August 2005)

    E-Print Network [OSTI]

    Ning, Peng

    role in many sensor network applications. Not only do applications such as environment monitoring and target tracking require sensors' location information to fulfill their tasks, but several fundamental

  3. Attack on Fully Homomorphic Encryption over the Integers Gu Chunsheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of van Dijk, Gentry, Halevi and Vaikuntanathan [DGHV10]. The public key of this scheme is a list and r , and p . Then Dijk et al. discussed that when / ( )t > - , lattice reduction algorithms can not find a 2 - approximate short vectors in ,q rL on the worst-case. Dijk et al. also analyzed a similar

  4. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    approach for securing data in the cloud using offensive decoy technology. We monitor data access security in a Cloud environment. I. INTRODUCTION Businesses, especially startups, small and medium busi. This is considered as one of the top threats to cloud computing by the Cloud Security Alliance [1]. While most Cloud

  5. Stealthy attacks and defense strategies in competing sensor networks 

    E-Print Network [OSTI]

    Czarlinska, Aleksandra

    2009-05-15

    The fundamental objective of sensor networks underpinning a variety of applications is the collection of reliable information from the surrounding environment. The correctness of the collected data is especially important in applications involving...

  6. Attacks Against Process Control Systems: Risk Assessment, Detection, and Response

    E-Print Network [OSTI]

    Hu, Fei

    In the last years there has been an increasing interest in the secu- rity of process control and SCADA systems-1-4503-0564-8/11/03 ...$10.00. General Terms Security Keywords SCADA, security, IDS, control systems, critical infrastructure are also called Process Control Systems (PCS), Supervi- sory Control and Data Aquisition (SCADA) systems

  7. Random polynomialtime attacks and DolevYao models Mathieu Baudet #

    E-Print Network [OSTI]

    Doyen, Laurent

    that under su#cient realistic assump­ tions the extended models are equivalent to standard Dolev­Yao models supported by the the RNTL projects EVA and Prouvâ??e, the ACI Sâ??ecuritâ??e Informatique Rossignol, the ACI Cryptologie Psi­Robuste, and the ACI jeunes chercheurs ``Sâ??ecuritâ??e informatique, protocoles cryptographiques

  8. HAN Attack Surface and the Open Smart Energy Gateway Project

    E-Print Network [OSTI]

    Searle, Justin

    2014-01-01

    Surface  and  the  Open  Smart   Energy  Gateway  Project  Surface  and  the  Open  Smart   Energy  Gateway  Project  home.       The  Open  Smart  Energy  Gateway  (OpenSEG)  

  9. Report: Measuring the Attack Surfaces of Enterprise Software

    E-Print Network [OSTI]

    Wing, Jeannette M.

    risk of their software. Code quality improvement is a tra- ditional approach to mitigate security risk security and quality. 1 Introduction There is a growing demand for secure software as we are increasingly quality for improving software security and quality. The code quality improvement effort aims toward

  10. Survey and Simulation on Malicious Data Attack on Power Market

    E-Print Network [OSTI]

    Lavaei, Javad

    , Power Measurement Unit (PMU) has been applied to monitor power grids. The observability has also been checked for PMU based grid measurement [1] [2] [3]. For a observable system, the state estimation problem

  11. Reducing the Vulnerability of Electric Power Grids to Terrorist Attacks

    SciTech Connect (OSTI)

    Ross Baldick; Thekla Boutsika; Jin Hur; Manho Joung; Yin Wu; Minqi Zhong

    2009-01-31

    This report describes the development of a cascading outage analyzer that, given an initial disturbance on an electric power system, checks for thermal overloads, under-frequency and over-frequency conditions, and under-voltage conditions that would result in removal of elements from the system. The analyzer simulates the successive tripping of elements due to protective actions until a post-event steady state or a system blackout is reached.

  12. A Time-Memory Tradeo Attack Against LILI-128

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    generator [1] is a LFSR-based synchronous stream ci- pher with a 128 bit key. It has been accepted as one; ... ... CLOCK CONTROL DATA GENERATION LFSR LFSR c d f c f d z(t) 2 10 c(t)=1..4 Fig. 1. Overview of the LILI-128 keystream generator. bit. Similarly we use u 0 ; u 1 ; : : : ; u 88 to denote the individual bits of LFSR d

  13. Attacks based on Conditional Correlations against the Nonlinear Filter Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    -based keystream generator which could be used as a basic building block in a synchronous stream cipher system. An example is the use of the nonlinear filter generator as a synchronous secret key encryption and decryption=0 cjst+j Fig. 2. The application of a keystream generator (i.e. NLFG) in a synchronous secret key

  14. Quantifying Cyber-Resilience Against Resource-Exhaustion Attacks

    SciTech Connect (OSTI)

    Fink, Glenn A.; Griswold, Richard L.; Beech, Zachary W.

    2014-07-11

    Resilience in the information sciences is notoriously difficult to define much less to measure. But in mechanical engi- neering, the resilience of a substance is mathematically defined as the area under the stress vs. strain curve. We took inspiration from mechanics in an attempt to define resilience precisely for information systems. We first examine the meaning of resilience in language and engineering terms and then translate these definitions to information sciences. Then we tested our definitions of resilience for a very simple problem in networked queuing systems. We discuss lessons learned and make recommendations for using this approach in future work.

  15. Attacking and fixing Helios: An analysis of ballot secrecy

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    September 25, 2013 Abstract Helios 2.0 is an open-source web-based end-to-end verifiable electronic voting solution satisfies a formal definition of ballot secrecy using the applied pi calculus. Furthermore, we

  16. On countermeasures of worm attacks over the Internet 

    E-Print Network [OSTI]

    Yu, Wei

    2009-05-15

    .................................................................................................................78 2. Background .............................................................................................................80 2.a. Program Analysis .....................................................................................80 2.b. Data... Functions.....................................................................................115 5. Defense Against Static Self-Adaptive Worms......................................................116 5.a. Threshold-Based Scheme...

  17. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    synchronised clock and the protocol is also independent of physical medium of wireless network. After the route. Typically, the nodes act as both host and router at the same time i.e each node participates in routing like a flood, tornado, hurricane or earth- quake. However, the open nature of the wireless communica

  18. A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS 

    E-Print Network [OSTI]

    Tadi, Krishna C.

    2010-01-16

    information about who administers an AS. The authors of [5] have proposed an algorithm which classifies the relationships with 99% accuracy. More than 90.5% of AS pairs in the Internet have customer-provider relationship, less than 1.5% of AS pairs have... mitigation system. They preselect several ASs and call them lifesaver ASs. In case of a hijack, a detection system notifies these lifesaver ASs with information about the hijacker AS, Victim AS and the victim prefix. All the lifesaver ASs attempt to purge...

  19. MITM (man-in-the-middle) attacks ARP spoofing

    E-Print Network [OSTI]

    Crandall, Jedidiah R.

    's) Others? Internet surveillance examples: U.S. (Protect America Act of 2007, FOIA, New Mexico Sunshine Act! (SQL injection examples from http://www.unixwiz.net/techtips/sql-injection.html) Internet censorship

  20. Are Perfect Image Watermarking Schemes Possible? attackI distortion

    E-Print Network [OSTI]

    .T. Abdallah, and Dept of EECE, The University of New Mexico, Albuquerque, NM 87131 cpizanoQeece.unm Computing, The University of New Mexico, Albuquerque, NM, 87131 pattichisbeece.unm.edu w Abetract commonly used perceptual masks. I. INTRODUCTION The global Internet has greatly facilitated the legal

  1. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank's server farms cannot safely omit a subset of the traffic from analysis. In this environment, Shunting cannot realize its main performance benefits, and the monitoring task likely calls for using custom hardware instead. However, in many other environments we find Shunting holds promise for delivering major performance gains. This arises due to the the widely documented 'heavy tail' nature of most forms of network traffic, which we might express as 'a few of the connections carry just about all the bytes.' The key additional insight is '... and very often for these few large connections, the very beginning of the connection contains nearly all the information of interest from a security analysis perspective.' We argue that this second claim holds because it is at the beginning of connections that authentication exchanges occur, data or file names and types are specified, request and reply status codes conveyed, and encryption is negotiated. Once these occur, we have seen most of the interesting facets of the dialog. Certainly the remainder of the connection might also yield some grist for analysis, but this is generally less likely, and thus if we want to lower analysis load at as small a loss as possible of information relevant to security analysis, we might best do so by skipping the bulk of large connections. In a different context, the 'Time Machine' work by Kornexl and colleagues likewise shows that in some environments we can realize major reductions in the volume of network traffic processed, by limiting the processing to the first 10-20 KB of each connection. As a concrete example, consider an IPS that monitors SSH traffic. When a new SSH connection arrives and the Shunt fails to find an entry for it in any of its tables (per-address, per-port, per-connection), it executes the default action of diverting the connection through the IPS. The IPS analyzes the beginning of the connection in this fashion. As long as it is satisified with the dialog, it reinjects the packets forwarded to it so that the connection can continue. If the connection successfully

  2. A variant of Wiener's attack on RSA Andrej Dujella

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the form p q = rpm+1 ± spm rqm+1 ± sqm (3) for some m -1 and nonnegative integers r and s such that rs

  3. Predicting Attack-prone Components Michael Gegick, 2

    E-Print Network [OSTI]

    Young, R. Michael

    in the software life cycle and include security-related static analysis tool warnings, code churn and size to be vulnerable. The model's false positive rate is 47.4% of this top 18.6% or 9.1% of the total system components security- related static analysis tool warnings, code size and churn, and all faults identified by manual

  4. On a Conditional Collision Attack on S. Markovski[1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of Informatics, P. O. Box 162, Skopje, Republic of Macedonia ({smile,vesnap}@ii.edu.mk) [2] University "Goce Delcev" , Faculty of Informatics, Stip, Republic of Macedonia (aleksandra.mileva@ugd.edu.mk) [3] NTNU

  5. Swift's beautiful nymphs: an attack on the pastoral female image 

    E-Print Network [OSTI]

    McClain, Richard Daniel

    1974-01-01

    . HYPOCRISY AKD SNIFT' S 'iiODERi~! LADY' THE PASTORAL Far'IAL IMAGE LAID TO REST BIBLIOGRAPHY VITA 4g 56 61 64 CHAPTER I S'iiIFT S SCATOLOGY AND ITS CRITICISli Jonathan Swift expressed his views concerning his own poetry in a letter to a friend... even amor. ' zcder. . cri ics Bona i e Bz tb in Dean "-wift char:es that hi ooetry lo cks poet'cal imagination and that "", o one can be a oet, with limitation such a Bwift pos essed. " vL he co"mentary in her book is general ard only a few poezs...

  6. 6LoWPAN Fragmentation Attacks and Mitigation Mechanisms

    E-Print Network [OSTI]

    including home automation, industrial control systems, and smart cities [27]. Accordingly, a wide range

  7. Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics

    E-Print Network [OSTI]

    Lenders, Vincent

    .rasmussen@cs.ox.ac.uk Vincent Lenders Armasuisse, Switzerland vincent.lenders@armasuisse.ch Ivan Martinovic University of Oxford

  8. Experimental Analysis of Attacks on Next Generation Air Traffic Communication

    E-Print Network [OSTI]

    Lenders, Vincent

    , Vincent Lenders2 , and Ivan Martinovic3 1 TU Kaiserslautern, Germany schaefer@cs.uni-kl.de 2 armasuisse, Switzerland vincent.lenders@armasuisse.ch 3 University of Oxford, UK ivan.martinovic@cs.ox.ac.uk Abstract

  9. Sandia Energy - Study Rebuts Hypothesis That Comet Attacks Ended

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkhole OfficialsWorkSensorsEnergy(SMART) Final

  10. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p aDepartmentEnergyEveryCustomer Service Handbook Marchby ISA -

  11. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |

  12. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111,FY 2007TrafficDepartmentinof EnergyofAudit

  13. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111,FY 2007TrafficDepartmentinofDNV

  14. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget || Department of EnergyNo. 154 -

  15. CDKN-CARICOM-Trinidad and Tobago-A Regional Implementation Plan...

    Open Energy Info (EERE)

    CDKN-CARICOM-Trinidad and Tobago-A Regional Implementation Plan for CARICOM's Regional Climate Change Resilience Framework Redirect page Jump to: navigation, search REDIRECT...

  16. Transmission/Resource Library/Enviromental Resources and Mitigation...

    Open Energy Info (EERE)

    Enviromental Resources and Mitigation < Transmission | Resource Library(Redirected from TransmissionResource LibraryMitigation) Redirect page Jump to: navigation, search...

  17. Sign up (/users/sign_up) Sign in (/users/sign_in?redirect_to=http%3A%2F%2Ftodayeco.com%2Fpages%2F22037994-these-windmills-are-

    E-Print Network [OSTI]

    Chiao, Jung-Chih

    Fpages%2F22037994-these-windmills-are- so-tiny-you-could-fit-10-of-them-on-a) Follow 972 follow ers18 Tweet 1 0 Archives (/pages/2014-01-13) » These windmills are so tiny, you could fit 10 of them on a grain of rice | Grist (http://todayeco.com/pages/22037994- these-windmills-are-so-tiny-you- could-fit-10

  18. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Design and Implementation of TARF: A

    E-Print Network [OSTI]

    Shi, Weisong

    or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks routing, such as selective forwarding, wormhole attacks, sinkhole attacks and Sybil attacks [4

  19. A tamper-indicating quantum seal

    E-Print Network [OSTI]

    Brian P. Williams; Keith A. Britt; Travis S. Humble

    2015-08-21

    Technical means for identifying when tampering occurs is a critical part of many containment and surveillance technologies. Conventional fiber optic seals provide methods for monitoring enclosed inventories, but they are vulnerable to spoofing attacks based on classical physics. We address these vulnerabilities with the development of a quantum seal that offers the ability to detect the intercept-resend attack using quantum integrity verification. Our approach represents an application of entanglement to provide guarantees in the authenticity of the seal state by verifying it was transmitted coherently. We implement these ideas using polarization-entangled photon pairs that are verified after passing through a fiber-optic channel testbed. Using binary detection theory, we find the probability of detecting inauthentic signals is greater than 0.9999 with a false alarm chance of 10$^{-9}$ for a 10 second sampling interval. In addition, we show how the Hong-Ou-Mandel effect concurrently provides a tight bound on redirection attack, in which tampering modifies the shape of the seal. Our measurements limit the tolerable path length change to sub-millimeter disturbances. These tamper-indicating features of the quantum seal offer unprecedented security for unattended monitoring systems.

  20. A tamper-indicating quantum seal

    E-Print Network [OSTI]

    Brian P. Williams; Keith A. Britt; Travis S. Humble

    2015-10-15

    Technical means for identifying when tampering occurs is a critical part of many containment and surveillance technologies. Conventional fiber optic seals provide methods for monitoring enclosed inventories, but they are vulnerable to spoofing attacks based on classical physics. We address these vulnerabilities with the development of a quantum seal that offers the ability to detect the intercept-resend attack using quantum integrity verification. Our approach represents an application of entanglement to provide guarantees in the authenticity of the seal state by verifying it was transmitted coherently. We implement these ideas using polarization-entangled photon pairs that are verified after passing through a fiber-optic channel testbed. Using binary detection theory, we find the probability of detecting inauthentic signals is greater than 0.9999 with a false alarm chance of $10^{-9}$ for a 10 second sampling interval. In addition, we show how the Hong-Ou-Mandel effect concurrently provides a tight bound on redirection attack, in which tampering modifies the shape of the seal. Our measurements limit the tolerable path length change to sub-millimeter disturbances. These tamper-indicating features of the quantum seal offer unprecedented security for unattended monitoring systems.

  1. Agency for International Development Cambodia Countering Trafficking-in-Persons (CTIP) Program

    E-Print Network [OSTI]

    Azevedo, Ricardo

    , 2015 Nuclear Regulatory Commission Scholarship and Fellowship Education Grant URL: http://www, 2015 · Application deadline: April 17, 2015 Nuclear Regulatory Commission Faculty Development Grant URL

  2. To link to this article: DOI: 10.1016/j.scriptamat.2011.10.022 URL: http://dx.doi.org/10.1016/j.scriptamat.2011.10.022

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    -crystalline turbine blades of helicopter turboshaft engines. After an appropriate heat treatment (3 h at 1300 °C/6 h at the c/c0 interfaces in the MC2 superalloy is investigated. Tensile creep tests were performed under and helicopters. They consist of two phases: a high volume fraction of coherently precipitated c0 cubes (L12

  3. To link to this article: DOI: 10.1016/j.scriptamat.2011.10.022 URL: http://dx.doi.org/10.1016/j.scriptamat.2011.10.022

    E-Print Network [OSTI]

    Mailhes, Corinne

    in Table 1. It was devel- oped by ONERA for single-crystalline turbine blades of helicopter turboshaft is investigated. Tensile creep tests were performed under thermal cycling and isothermal conditions at low stress in the most advanced gas turbine engines for aircraft and helicopters. They consist of two phases: a high

  4. To link to this article: DOI: 10.1016/j.jnoncrysol.2011.06.025 URL: http://dx.doi.org/10.1016/j.jnoncrysol.2011.06.025

    E-Print Network [OSTI]

    Mailhes, Corinne

    for solid oxide fuel cells. (2011) Journal of Non-Crystalline Solids, vol. 357 (n° 19-20). pp. 3490 for solid oxide fuel cells J. Puig a, , F. Ansart a , P. Lenormand a , L. Antoine b , J. Dailly c a CIRIMAT Karlsruhe, Germany a b s t r a c t Keywords: Solid oxide fuel cell (SOFC); Glass-ceramics; Sealants; Sol

  5. To print this page, select File then Print from your browser URL: http://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_6023943,00.html

    E-Print Network [OSTI]

    rain- screen/insulation wall cladding for commercial buildings, a heat-pump water heater, an energy-Content Office Furniture Project FROG Modular Green Classroom Rheem HP-50 Heat-Pump Water Heater Convia Energy for data centers, a mobile solar generator for job-site power, and an advanced modular classroom

  6. To link to this article: DOI: 10.1016/j.compscitech.2011.05.001 URL : : http://dx.doi.org/10.1016/j.compscitech.2011.05.001

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    conductivity and Raman imaging of double wall carbon nanotubes in a polymer matrix. (2011) Composites Science.compscitech.2011.05.001 #12;Electrical conductivity and Raman imaging of double wall carbon nanotubes in a polymer. Carbon nanotubes A. Particle-reinforced composites A. Polymer­matrix composites (PMCs) B. Electrical

  7. To link to this article: DOI: 10.1016/j.compscitech.2011.05.001 URL : : http://dx.doi.org/10.1016/j.compscitech.2011.05.001

    E-Print Network [OSTI]

    Mailhes, Corinne

    conductivity and Raman imaging of double wall carbon nanotubes in a polymer matrix. (2011) Composites Science Toulouse, 31062 Toulouse, France Keywords: A. Carbon nanotubes A. Particle-reinforced composites A. Polymer conducting, the composite can be used in antistatic coatings to remove static charges [2] and can shield

  8. To link to this article : DOI: 10.1016/j.compscitech.2012.08.016 URL : http://dx.doi.org/10.1016/j.compscitech.2012.08.016

    E-Print Network [OSTI]

    Mailhes, Corinne

    Cedex 9, France Keywords: A. Polymer-matrix composites (PMCs) A. Carbon nanotubes B. Electrical potential applications for structural and electrically conductive composites. In the current paper we materials that have potential applications for structural and electrically conductive composites [1

  9. To link to this article : DOI:10.1016/S0009-2614(01)01441-5 URL: http://dx.doi.org/10.1016/S0009-2614(01)01441-5

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    as reinforcing elements in composites. Moreover, they could confer electrical conductivity to other- wise protection. Most of the research on CNTs-containing composites has so far dealt with polymer-matrix materials, the materials show an anisotropy of the electrical conductivity, which could be adjusted by controlling

  10. To link to this article: DOI:10.1016/j.jnoncrysol.2011.09.019 URL: http://dx.doi.org/10.1016/j.jnoncrysol.2011.09.019

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , the objective of conductive polymer composites was focused on the ability to conduct the electrical current to the detri- ment of final weight and mechanical properties. Conductive polymer composites maintaining and to obtain the maximum of conductivity value. These composites were realized with conventional conductive

  11. To link to this article: DOI: 10.1016/j.cep.2012.03.005 URL : http://dx.doi.org/10.1016/j.cep.2012.03.005

    E-Print Network [OSTI]

    Mailhes, Corinne

    properties of renewable PLA-starch composites. (2012) Chemical Engineering and Processing: Process two decades: what to do with tons of non-degradable wastes issued from petrochemical poly- mers which petrochemical polymers and mechan- ical properties (stress and elongation) must be adapted to their application

  12. To link to this article: http://dx.doi.org/10.1016/j.applthermaleng.2011.10.062 URL: http://www.sciencedirect.com/science/article/pii/S1359431111006144

    E-Print Network [OSTI]

    Mailhes, Corinne

    ]. Process industries are among the most important consumers of water in various fields such as petrochemical processes need water with a given quality at a fixed temperature. Hence, huge amounts of energy are also

  13. To link to this article : DOI:10.1016/j.electacta.2012.07.134 URL : http://dx.doi.org/10.1016/j.electacta.2012.07.134

    E-Print Network [OSTI]

    Mailhes, Corinne

    Martin d'Hères Cedex, France Keywords: Solid oxide fuel cell Cathode Mixed ionic and electronic conductor-temperature solid oxide fuel cells (LT-SOFCs) and oxygen separation membranes. In the past fifteen years, several-established pathways deals with the cathode material optimization. The challenge is to obtain high activity

  14. To link to this article: DOI: 10.1016/j.jpowsour.2010.11.087 URL: http://dx.doi.org/10.1016/j.jpowsour.2010.11.087

    E-Print Network [OSTI]

    Mailhes, Corinne

    , 8% Y2O3) used as electrolyte for solid oxide fuel cells. YSZ thick films were coated onto porous Ni-free, thick and adherent films after heat treatment at 1400 C. 1. Introduction Solid oxide fuel cells (SOFCs-YSZ substrates using a suspension with an optimized formulation deposited by either a dip-coating or a spin

  15. To link to this article: DOI: 10.1016/j.surfcoat.2011.06.011 URL: http://dx.doi.org/10.1016/j.surfcoat.2011.06.011

    E-Print Network [OSTI]

    Mailhes, Corinne

    The efficiency of gas turbines is directly related to their temper- ature of use. Thus, a major issue.surfcoat.2011.06.011 This is an author-deposited version published in: http://oatao.univ-toulouse.fr/ Eprints ID is to develop systems withstanding increasingly high temperature. To protect turbines blades from exces- sive

  16. To link to this article : DOI:10.1016/j.ces.2013.08.051 URL : http://dx.doi.org/10.1016/j.ces.2013.08.051

    E-Print Network [OSTI]

    Boyer, Edmond

    transfer fluid for concentrated solar thermal plants: on-sun proof of concept. (2013) Chemical Engineering.08.051 #12;Dense suspension of solid particles as a new heat transfer fluid for concentrated solar thermal a Processes, Materials and Solar Energy laboratory, PROMES-CNRS, 7 rue du Four Solaire, 66120 Font Romeu

  17. To link to this article : DOI:10.1016/j.ces.2013.08.051 URL : http://dx.doi.org/10.1016/j.ces.2013.08.051

    E-Print Network [OSTI]

    Mailhes, Corinne

    transfer fluid for concentrated solar thermal plants: on-sun proof of concept. (2013) Chemical Engineering as a new heat transfer fluid for concentrated solar thermal plants: On-sun proof of concept Gilles Flamant Boissière b,2 , Renaud Ansart b,2 , Mehrdji Hemati b,2 a Processes, Materials and Solar Energy laboratory

  18. To link to this article : doi: 10.1016/j.proci.2014.05.053 URL : http://dx.doi.org/10.1016/j.proci.2014.05.053

    E-Print Network [OSTI]

    Mailhes, Corinne

    modes appearing in annu- lar chambers: (1) Using two different burner types distributed along when the annular cham- ber is weakly coupled to the burners. Results show that symmetry breaking, either by mixing burners types or with a mean azimuthal flow, splits the azimuthal modes into two waves

  19. ScienceDirect Advances in Space Research : The heliospheric hydrog... http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V3... 1 of 12 06/22/2005 04:50 PM

    E-Print Network [OSTI]

    Linsky, Jeffrey L.

    PDF (295 K) Actions Cited By Save as Citation Alert E­mail Article Export Citation Register or Login of Mechanics and Mathematics, Lomonosov Moscow State University, Moscow, 119899, Russia Received 2 December

  20. To link to this article : doi: 10.1016/j.proci.2014.07.021 URL : http://dx.doi.org/10.1016/j.proci.2014.07.021

    E-Print Network [OSTI]

    Mailhes, Corinne

    of the Combustion Institute, vol. 35 (n° 3). pp. 3219-3227. ISSN 1540-7489 Any correspondance concerning.Y.M. Gicquel a , T. Poinsot d a CERFACS, CFD team, 42 Av Coriolis, 31057 Toulouse, France b Socie´te´ Nationale.07.021 Corresponding author. Address: CERFACS, CFD Team, 42 Avenue G. Coriolis, 31057 Toulouse Cedex 01, France. Fax

  1. To link to this article : DOI:10.1016/j.rser.2013.08.042 URL : http://dx.doi.org/10.1016/j.rser.2013.08.042

    E-Print Network [OSTI]

    Mailhes, Corinne

    Integrated optimal design and sensitivity analysis of a stand alone wind turbine system with storage-oatao@listes-diff.inp-toulouse.fr #12;Integrated optimal design and sensitivity analysis of a stand alone wind turbine system Camichel 31071, Toulouse, France Keywords: Passive wind turbine Systemic optimization Integrated Optimal

  2. To link to this article: DOI:10.1016/j.pecs.2012.04.004 URL : http://dx.doi.org/10.1016/j.pecs.2012.04.004

    E-Print Network [OSTI]

    Mailhes, Corinne

    flames in gas turbine combustion chambers. (2012) Progress in Energy and Combustion Science, vol. 38 (n turbine combustion chambers L.Y.M. Gicquel*, G. Staffelbach, T. Poinsot CERFACS, 42 Avenue G. Coriolis combustion Turbulent combustion Gas turbine a b s t r a c t Recent developments in numerical schemes

  3. To print this page, select then from your browserFile Print URL: http://www.knoxnews.com/kns/local_news/article/0,1406,KNS_347_3035209,00.html

    E-Print Network [OSTI]

    laboratory." Nuclear fusion is the same process that fuels the sun and other stars. Unlike nuclear fission, proponents say it would provide an almost unlimited supply of energy, without the amount of waste associated, with funding from the respective governments. The test reactor will be built either at Cadarache, France

  4. Electronic Journal of Differential Equations, Vol. 2009(2009), No. 98, pp. 110. ISSN: 1072-6691. URL: http://ejde.math.txstate.edu or http://ejde.math.unt.edu

    E-Print Network [OSTI]

    Anderson, Douglas R.

    2009-01-01

    such that the left end is clamped and the right end is free with vanishing bending moment and shearing force. Let E be the modulus of elasticity, I(x) the area moment of inertia about the neutral axis and m(x) the mass per unit- tinuous problems we refer to the recent papers [1, 9, 16, 17, 18], and for functional boundary value

  5. ScienceDirect -Nuclear Instruments and Methods in Physics Researc... http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6TJ... 1 of 2 3/10/05 12:12 PM

    E-Print Network [OSTI]

    Ng, Chung-Sang

    By Save as Citation Alert E-mail Article Export Citation Register or Login: Password: Quick Search: within:12 PM This Document Abstract Full Text + Links PDF (135 K) Actions Cited By Save as Citation Alert E

  6. To link to this article: DOI: 10.1016/j.ssi.2010.02.014 URL: http://dx.doi.org/10.1016/j.ssi.2010.02.014

    E-Print Network [OSTI]

    Mailhes, Corinne

    cathode for intermediate temperature solid oxide fuel cells (IT-SOFCs) due to its high oxygen tracer;Development of lanthanum nickelate as a cathode for use in intermediate temperature solid oxide fuel cells R oxide fuel cells. (2011) Solid State Ionics, vol. 192 (n° 1). pp. 531-534. ISSN 0167- 2738 Open Archive

  7. To link to this article : DOI:10.1016/j.wear.2014.04.005 URL: http://dx.doi.org/10.1016/j.wear.2014.04.005

    E-Print Network [OSTI]

    Mailhes, Corinne

    effects Acoustic emission Three-body abrasion a b s t r a c t The tribological behavior of a thermoplastic was proposed to gather the whole tribological results. 1. Introduction Thermoplastic polyurethanes (TPU) and the crossing of TPU glass transition temperature (e.g. increase of friction coefficient). Thermoplastic

  8. To link to this article: DOI: 10.1016/j.corsci.2011.05.013 URL : : http://dx.doi.org/10.1016/j.corsci.2011.05.013

    E-Print Network [OSTI]

    Boyer, Edmond

    . High temperature corrosion C. Oxidation a b s t r a c t Model Fe­Cr alloys were exposed to Ar­CO2­H2O-rich oxide scales upon exposure to CO2 at high temperatures. In addition, carburisa- tion of the underlying equilibrium: a low oxygen potential corresponds to a high pCO=pCO2 ratio, and hence to a high carbon activity

  9. To link to this article: DOI: 10.1016/j.corsci.2011.05.013 URL : : http://dx.doi.org/10.1016/j.corsci.2011.05.013

    E-Print Network [OSTI]

    Mailhes, Corinne

    exposure to CO2 at high temperatures. In addition, carburisa- tion of the underlying substrate has been- burisation. For instance, pure CO2 equilibrated at atmospheric pressure and a temperature of 650 °C simultaneous oxidation and carburisation of Fe­Cr alloys containing 1­15 wt.% Cr in pure CO2 at temperatures

  10. To link to this article: DOI: 10.1016/j.electacta.2011.03.131 URL : http://dx.doi.org/10.1016/j.electacta.2011.03.131

    E-Print Network [OSTI]

    Mailhes, Corinne

    , the two possibilities are the production of carbon dioxide on carbon, as in the Hall for pyrochem- ical reprocessing becomes higher due to their electrochemical properties, high chemical stability

  11. To print this page, select File then Print from your browser URL: http://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_5944661,00.html

    E-Print Network [OSTI]

    ://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_5944661,00.html AIA Praises American Clean Energy and Security Act Passed by House

  12. To print this page, select File then Print from your browser URL: http://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_5944504,00.html

    E-Print Network [OSTI]

    ://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_5944504,00.html AIA Housing Trends Survey Sees Smaller Homes, Greater Energy

  13. To print this page, select File then Print from your browser URL: http://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_5943476,00.html

    E-Print Network [OSTI]

    ://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_5943476,00.html First Remodeled Home Certified to the National Green Building

  14. ISR-Lisboa | Instituto de Sistemas e Robtica Lisboa | [Lisboa e Horta] Av. Rovisco Pais 1049-001 Lisboa, Portugal Tel: (+351) 218 418 289 Fax: (+351) 218 418 291 URL: http://www.isr.ist.utl.pt

    E-Print Network [OSTI]

    Instituto de Sistemas e Robotica

    ://www.isr.ist.utl.pt Directora MARIA ISABEL LOBATO DE FARIA RIBEIRO Linhas temáticas de acção · Tecnologias para a Exploração do Oceano · Monitorização e Vigilância com Agentes Robóticos · Tecnologias Sustentáveis e Sistemas Inovação, Tecnologia e Políticas de Desenvolvimento/IST (IN+) Coordenador: PAULO MANUEL CADETE FERRÃO

  15. To link to this article : doi:10.1016/j.ssi.2014.07.017 URL : http://dx.doi.org/10.1016/j.ssi.2014.07.017

    E-Print Network [OSTI]

    Mailhes, Corinne

    annealing treatment, all coatings exhibit crystalline structures that depend on the La/Ni ratio. Some cracks- corded for ferritic steel interconnect materials (11.0­12.5·10-6 K-1 ) [9] which are essential

  16. To print this page, select File then Print from your browser URL: http://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_5945935,00.html

    E-Print Network [OSTI]

    -efficient building technologies have you seen the most in 2009? (1) Solar Electrical Power (Photovoltaics) (2) Solar://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_5945935,00.html Poll: What Green Building Technology Are You Seeing in Use? With all the talk about climate change and solar power, we started thinking about green building

  17. Citation: K. Nakamura et al. (Particle Data Group), JP G 37, 075021 (2010) and 2011 partial update for the 2012 edition (URL: http://pdg.lbl.gov) 1(1400) IG (JPC ) = 1-(1 -+)

    E-Print Network [OSTI]

    2010-01-01

    do not use the following data for averages, fits, limits, etc. · · · 1323.1± 4.6 2 AOYAGI 93 BKEI - p

  18. In recent, well-publicized attacks, the attackers first broke into many ill protected Internet hosts, and then used these hosts as

    E-Print Network [OSTI]

    Lee, Ruby B.

    incentives upon the users of the Intemet. The machinery and the incentives interlock and must be designed system we must design.. The machinery in the Internet will trace a packet flood as close as possible program. In the long run, we need two things. We need suitable machinery in the Internet and suitable

  19. New Limited Submissions 3-25-2015 Agency for International Development

    E-Print Network [OSTI]

    Azevedo, Ricardo

    deadline: April 12, 2015 Department of Energy Next Generation Electric Machines: Megawatt Class Motors URL

  20. PITRO -project The University library of Dar es

    E-Print Network [OSTI]

    Johansen, Tom Henning

    Information with 700 Journals, 300 pamphlets, Medical reference and Encyclopaedia. · Direct URL for Health