Sample records for url redirection attacks

  1. A client oriented, IP level redirection mechanism

    E-Print Network [OSTI]

    Gupta, Sumita

    1998-01-01T23:59:59.000Z

    . Latency for Supporting Clients 2. Latency for Legacy Clients C. Bulk Transfer Time Measurements 10 10 13 13 18 25 27 27 28 29 30 32 36 42 42 46 46 VII APPLICATIONS A. Applications . l. VIobile IP Implementations 2. Relial...- allel Redirected Connections (P. R. C. ), Hash Space Size ? 15 . 15 IP Output Processing Time for s. Non-Redircctcd Session. with Parallel Redirected Connections (P. R. C. ) . 16 IP Processing Time for Single Redirected Session 41 17 TCP Connection...

  2. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Energy Savers [EERE]

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September...

  3. Active Wake Redirection Control to Improve Energy Yield (Poster)

    SciTech Connect (OSTI)

    Churchfield, M. J.; Fleming, P.; DeGeorge, E.; Bulder, B; White, S. M.

    2014-10-01T23:59:59.000Z

    Wake effects can dramatically reduce the efficiency of waked turbines relative to the unwaked turbines. Wakes can be deflected, or 'redirected,' by applying yaw misalignment to the turbines. Yaw misalignment causes part of the rotor thrust vector to be pointed in the cross-stream direction, deflecting the flow and the wake. Yaw misalignment reduces power production, but the global increase in wind plant power due to decreased wake effect creates a net increase in power production. It is also a fairly simple control idea to implement at existing or new wind plants. We performed high-fidelity computational fluid dynamics simulations of the wake flow of the proposed Fishermen's Atlantic City Windfarm (FACW) that predict that under certain waking conditions, wake redirection can increase plant efficiency by 10%. This means that by applying wake redirection control, for a given watersheet area, a wind plant can either produce more power, or the same amount of power can be produced with a smaller watersheet area. With the power increase may come increased loads, though, due to the yaw misalignment. If misalignment is applied properly, or if layered with individual blade pitch control, though, the load increase can be mitigated. In this talk we will discuss the concept of wake redirection through yaw misalignment and present our CFD results of the FACW project. We will also discuss the implications of wake redirection control on annual energy production, and finally we will discuss plans to implement wake redirection control at FACW when it is operational.

  4. Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office

    E-Print Network [OSTI]

    LBNL-6496E Empirical assessment of a prismatic daylight- redirecting window film in a full in Leukos, the journal of the IESNA. Empirical assessment of a prismatic daylight- redirecting window film Laboratory, Mailstop 90-3111, 1 Cyclotron Road, Berkeley, CA 94720 USA Abstract Daylight redirecting systems

  5. Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed

    E-Print Network [OSTI]

    Thanachareonkit, Anothai

    2014-01-01T23:59:59.000Z

    of a microstructured prismatic window film in deep open plandaylight- redirecting window film in a full-scale officedaylight- redirecting window film in a full-scale office

  6. Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options -New York Times January 22, 2008

    E-Print Network [OSTI]

    Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options - New York Times January 22, 2008 Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options By ELISABETH for biofuels, acknowledging that the environmental benefits of these fuels have often been overstated

  7. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01T23:59:59.000Z

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  8. A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia

    E-Print Network [OSTI]

    Bullo, Francesco

    @seas.ucla.edu (Florian D¨orfler), bullo@engineering.ucsb.edu (Francesco Bullo) URL: http://www.fabiopas.it (Fabio Pasqualetti), http://www.seas.ucla.edu/~dorfler/ (Florian D¨orfler), http://motion.mee.ucsb.edu/ (FrancescoA Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia , Florian D

  9. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  10. Widget:DocumentURL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: SaltTroyer &AnchorText JumpDisplayForGroupDocumentURL Jump

  11. Property:NEPA Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration Jump to:FieldProceduresFY Description URLs to any other relevant

  12. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    Against Data Injection Attacks on Power Grids, IEEER. Thomas, and L. Tong, Malicious Data Attacks on SmartState Estimation: Attack Strategies and Countermeasures,

  13. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    Data Injection Attacks on Power Grids, IEEE Transactionson Smart Grid, vol. 2, no. 2, June [21] O. Kosut, L.Data Attacks on Smart Grid State Estimation: Attack

  14. Twenty Years of Underground Research at Canada's URL

    SciTech Connect (OSTI)

    Chandler, N. A.

    2003-02-27T23:59:59.000Z

    Construction of Atomic Energy of Canada Limited's (AECL's) Underground Research Laboratory (URL) began in 1982. The URL was designed to address the needs of the Canadian nuclear fuel waste management program. Over the years, a comprehensive program of geologic characterization and underground hydrogeologic, geotechnical and geomechanical projects have been performed, many of which are ongoing. The scientific work at the URL has evolved through a number of different phases to meet the changing needs of Canada's waste management program. The various phases of the URL have included siting, site evaluation, construction and operation. Collaboration with international organizations is encouraged at the URL, with the facility being a centre of excellence in an International Atomic Energy Agency (IAEA) network of underground facilities. One of AECL's major achievements of the past 20 year program has been the preparation and public defense of a ten-volume Environmental Impact Statement (EIS) for a conceptual deep geologic repository. Completion of this dissertation on the characterization, construction and performance modeling of a conceptual repository in the granite rock of the Canadian Shield was largely based on work conducted at the URL. Work conducted over the seven years since public defense of the EIS has been directed towards developing those engineering and performance assessment tools that would be required for implementation of a deep geologic repository. The URL continues to be a very active facility with ongoing experiments and demonstrations performed for a variety of Canadian and international radioactive waste management organizations.

  15. Attack Graphs for Sensor Placement, Alert Prioritization, and Attack Response

    E-Print Network [OSTI]

    Noel, Steven

    1 Attack Graphs for Sensor Placement, Alert Prioritization, and Attack Response Steven Noel of IDS alarms, using attack graph analysis. Our attack graphs predict the various possible ways and attacker exploits provides an attack graph showing all possible paths to critical assets. We then place IDS

  16. Pointright: a system to redirect mouse and keyboard control among multiple machines

    DOE Patents [OSTI]

    Johanson, Bradley E. (Palo Alto, CA); Winograd, Terry A. (Stanford, CA); Hutchins, Gregory M. (Mountain View, CA)

    2008-09-30T23:59:59.000Z

    The present invention provides a software system, PointRight, that allows for smooth and effortless control of pointing and input devices among multiple displays. With PointRight, a single free-floating mouse and keyboard can be used to control multiple screens. When the cursor reaches the edge of a screen it seamlessly moves to the adjacent screen and keyboard control is simultaneously redirected to the appropriate machine. Laptops may also redirect their keyboard and pointing device, and multiple pointers are supported simultaneously. The system automatically reconfigures itself as displays go on, go off, or change the machine they display.

  17. Attack Diagnosis: Throttling Distributed Denial-of-Service Attacks Close to the Attack Sources

    E-Print Network [OSTI]

    Park, Jung-Min

    Attack Diagnosis: Throttling Distributed Denial- of-Service Attacks Close to the Attack Sources Polytechnic Institute and State University Blacksburg, VA 24061 {rlchen, jungmin}@vt.edu Abstract-- Attack mitigation schemes actively throttle attack traffic generated in Distributed Denial-of-Service (DDoS) attacks

  18. Quantum-Space Attacks

    E-Print Network [OSTI]

    Ran Gelles; Tal Mor

    2007-11-25T23:59:59.000Z

    Theoretical quantum key distribution (QKD) protocols commonly rely on the use of qubits (quantum bits). In reality, however, due to practical limitations, the legitimate users are forced to employ a larger quantum (Hilbert) space, say a quhexit (quantum six-dimensional) space, or even a much larger quantum Hilbert space. Various specific attacks exploit of these limitations. Although security can still be proved in some very special cases, a general framework that considers such realistic QKD protocols, as well as} attacks on such protocols, is still missing. We describe a general method of attacking realistic QKD protocols, which we call the `quantum-space attack'. The description is based on assessing the enlarged quantum space actually used by a protocol, the `quantum space of the protocol'. We demonstrate these new methods by classifying various (known) recent attacks against several QKD schemes, and by analyzing a novel attack on interferometry-based QKD.

  19. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    E-Print Network [OSTI]

    Ou, Xinming "Simon"

    Improving Attack Graph Visualization through Data Reduction and Attack Grouping John Homer1 Laboratory, USA Abstract. Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often

  20. Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Overcoming tunnel vision: Redirecting the U.S. high-level nuclear waste program

    E-Print Network [OSTI]

    Kammen, Daniel M.

    permission. Overcoming tunnel vision: Redirecting the U.S. high-level nuclear waste program James Flynn

  1. Modeling of Damage, Permeability Changes and Pressure Responses during Excavation of the TSX Tunnel in Granitic Rock at URL, Canada

    E-Print Network [OSTI]

    Rutqvist, Jonny

    2009-01-01T23:59:59.000Z

    in Granitic Rock at URL, Canada Jonny Rutqvist 1* , LennartSafety Commission, Ottawa, Canada * Corresponding author.laboratory (URL) in Canada. Four different numerical models

  2. V-200: Apache Struts DefaultActionMapper Redirection and OGNL...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Struts 2.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions REFERENCE LINKS:...

  3. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid, to appear in IEEE

  4. Redirection of the spherical expanding shock wave on the interface with plasma

    SciTech Connect (OSTI)

    Markhotok, A.; Popovic, S. [Physics Department, Old Dominion University, Norfolk, Virginia 23529 (United States)] [Physics Department, Old Dominion University, Norfolk, Virginia 23529 (United States)

    2014-02-15T23:59:59.000Z

    We study a strong spherical expanding shock wave interacting with the finite-gradient interface between neutral cold gas and weakly ionized plasma. We want to see how the interaction with the interface can alter the shock structure compared to the case of its free propagation through the media with the exponentially varying density. From our comparative calculations based on the 2D model, we found substantial difference in the shock structure including strong deformation of the shock front followed with its gradual flattening and the redirection in its propagation. There are a number of factors that can be used to control this phenomenon in order to strengthen or lessen the effect. The calculations can be made on any scale, limited with the requirement for the shock wave to be strong. The study points at the possibility in certain applications to avoid the shock wave with its redirection rather than attenuation. The results can be applicable to optimization of the energy deposition into the supersonic flux, the drag reduction in hypersonic flight, in the detonation theory, and combustion through the control of the ignition conditions, and for environmental improvements through sonic boom reduction. Cartesian coordinates were used in order to visualize the phenomenon.

  5. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect (OSTI)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01T23:59:59.000Z

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  6. Insects Attacking Forage Crops.

    E-Print Network [OSTI]

    Randolph, N. M.; Garner, C. F.

    1961-01-01T23:59:59.000Z

    on alfalfa leaves within web. Also attacks young corn ant1 soqhllm plants near ground. Have three dark spots in triangular shape on sides of most segments. GARDEN WEBWORM. Paqe II. 12. Foliage devoured by very hairy or wooly caterpillars up to 2 inches long... with irregular holes with ragged edges. Dark green worm up to nearly 2 inches long; light-coloretl line down middle of back and on each side of this line is a greenish-brown to black band. General feeder on all fora: ARMYWORM. Page 7. 3. Holes eaten in leaves...

  7. Property:NEPA Application Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration Jump to:FieldProceduresFY JumpThisModification date Jump to:Url Property

  8. Property:NEPA Decision Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration Jump to:FieldProceduresFY JumpThisModification date Jump Jump to:Url Jump

  9. Property:NEPA EA EIS Report Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration Jump to:FieldProceduresFY JumpThisModification date Jump Jump to:UrlEA EIS

  10. Property:NEPA Extraordinary Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration Jump to:FieldProceduresFY JumpThisModification date Jump Jump to:UrlEA

  11. Property:GeoNames URL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddressDataFormat JumpNercMroURL. Pages using the

  12. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    attacks that compromise PMU data are much less likely thanPMUs are networked on the newer NASPInet architecture which has been designed for secure data

  13. Sulfate attack expansion mechanisms

    SciTech Connect (OSTI)

    Mllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15T23:59:59.000Z

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (1050 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  14. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12T23:59:59.000Z

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  15. Modeling modern network attacks and countermeasures using attack graphs

    E-Print Network [OSTI]

    Ingols, Kyle W.

    By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements ...

  16. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Framework and Roadmap for Smart Grid Interoperability Stan-

  17. Genetic attack on neural cryptography

    SciTech Connect (OSTI)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido [Institut fuer Theoretische Physik, Universitaet Wuerzburg, Am Hubland, 97074 Wuerzburg (Germany); Minerva Center and Department of Physics, Bar Ilan University, Ramat Gan 52900 (Israel)

    2006-03-15T23:59:59.000Z

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  18. Another Generalization of Wiener's Attack on RSA

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

  19. From Manual Cyber Attacks Forensic to

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

  20. V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThereDepartment ofFlaw

  1. Correspondence: Email: korpela@ssl.berkeley.edu; Telephone: (510) 643-6538; URL: http://setiathome.ssl.berkeley.edu/~korpela

    E-Print Network [OSTI]

    Korpela, Eric J.

    ___________________ Correspondence: Email: korpela@ssl.berkeley.edu; Telephone: (510) 643-6538; URL: http://setiathome.ssl.berkeley.edu/~korpela The SPEAR Science Payload Eric J. Korpelaa , Jerry

  2. attack synthetic polymers: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  3. attacks draft resolution: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  4. armed attacks draft: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  5. HAN Attack Surface and the Open Smart Energy Gateway Project

    E-Print Network [OSTI]

    Searle, Justin

    2014-01-01T23:59:59.000Z

    HAN Attack Surface and the Open Smart Energy of California. HAN Attack Surface and the Open vulnerable to cyber attacks (i.e. hacking) and

  6. The Attack on Planned Parenthood: A Historical Analysis

    E-Print Network [OSTI]

    Primrose, Sarah

    2012-01-01T23:59:59.000Z

    Party Republicans' Latest Attack on Women's Health and Birthtea-party-republicans-latest-attack-womens-health- birth-ARTICLES THE ATTACK ON PLANNED PARENTHOOD: A HISTORICAL

  7. Membrane degradation Accelerated Stress Test | OSTI, US Dept...

    Office of Scientific and Technical Information (OSTI)

    Membrane degradation Accelerated Stress Test Re-direct Destination: Abstract Not Provided times redirected to final destination ShortURL Code Published Current state Most recent...

  8. Lotic Water Hydodynamic Model | OSTI, US Dept of Energy, Office...

    Office of Scientific and Technical Information (OSTI)

    Lotic Water Hydodynamic Model Re-direct Destination: Abstract Not Provided times redirected to final destination ShortURL Code Published Current state Most recent view Today Week...

  9. The Sybil Attack John R. Douceur

    E-Print Network [OSTI]

    Keinan, Alon

    1 The Sybil Attack John R. Douceur Microsoft Research johndo@microsoft.com "One can have, some undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks

  10. The GHS Attack Revisited Computer Science Department,

    E-Print Network [OSTI]

    Hess, Florian

    The GHS Attack Revisited F. Hess Computer Science Department, Woodland Road, University of Bristol the number of elliptic curves which succumb to the basic GHS attack, thereby weakening curves over F2155 further. We also discuss other possible extensions or variations of the GHS attack and conclude

  11. URL To Story: http://press.arrivenet.com/technology/article.php/993701.html RFID Innovation in Healthcare

    E-Print Network [OSTI]

    Chiao, Jung-Chih

    URL To Story: http://press.arrivenet.com/technology/article.php/993701.html RFID Innovation on the RFID Tribe websit http://www.rfidtribe.com/home/index.php?option=com_events&Itemid=67 About RFID Tribe in Healthcare URL: http://press.arrivenet.com/technology/print.php

  12. The Cost of Attack in Competing Networks

    E-Print Network [OSTI]

    Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

    2015-01-01T23:59:59.000Z

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

  13. Columbia University Press 2009.06.15 e-e-e-e-ISBN URL

    E-Print Network [OSTI]

    Wu, Yih-Min

    Columbia University Press 2009.06.15 e-e-e-e-ISBN URL Art & Humanities 9780231512732 Changing Clothes in China: Fashion, History, Nation 1 Finnane, Antonia Columbia Press University 2008 http://www.igpublish.com/columbia Rotem Columbia Press University 2008 http://www.igpublish.com/columbia- ebooks

  14. Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple

    E-Print Network [OSTI]

    Zincir-Heywood, Nur

    Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating weaknesses of detectors. In this work, we

  15. Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed

    SciTech Connect (OSTI)

    Thanachareonkit, Anothai; Lee, Eleanor S.; McNeil, Andrew

    2013-08-31T23:59:59.000Z

    Daylight redirecting systems with vertical windows have the potential to offset lighting energy use in deep perimeter zones. Microstructured prismatic window films can be manufactured using low-cost, roll-to-roll fabrication methods and adhered to the inside surface of existing windows as a retrofit measure or installed as a replacement insulating glass unit in the clerestory portion of the window wall. A clear film patterned with linear, 50-250 micrometer high, four-sided asymmetrical prisms was fabricated and installed in the south-facing, clerestory low-e, clear glazed windows of a full-scale testbed facility. Views through the film were distorted. The film was evaluated in a sunny climate over a two-year period to gauge daylighting and visual comfort performance. The daylighting aperture was small (window-towall ratio of 0.18) and the lower windows were blocked off to isolate the evaluation to the window film. Workplane illuminance measurements were made in the 4.6 m (15 ft) deep room furnished as a private office. Analysis of discomfort glare was conducted using high dynamic range imaging coupled with the evalglare software tool, which computes the daylight glare probability and other metrics used to evaluate visual discomfort. The window film was found to result in perceptible levels of discomfort glare on clear sunny days from the most conservative view point in the rear of the room looking toward the window. Daylight illuminance levels at the rear of the room were significantly increased above the reference window condition, which was defined as the same glazed clerestory window but with an interior Venetian blind (slat angle set to the cut-off angle), for the equinox to winter solstice period on clear sunny days. For partly cloudy and overcast sky conditions, daylight levels were improved slightly. To reduce glare, the daylighting film was coupled with a diffusing film in an insulating glazing unit. The diffusing film retained the directionality of the redirected light spreading it within a small range of outgoing angles. This solution was found to reduce glare to imperceptible levels while retaining for the most part the illuminance levels achieved solely by the daylighting film.

  16. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  17. The Zombie Attack on the Computational Conception of Mind

    E-Print Network [OSTI]

    Bringsjord, Selmer

    The Zombie Attack on the Computational Conception of Mind Selmer Bringsjord Department defense of the zombie attack against computationalism. Dennett, more than any other thinker, says, rigorous attack on computationalism -- the zombie attack. If this attack is sound, it will follow not only

  18. ESAIM: Control, Optimisation and Calculus of Variations URL: http://www.emath.fr/cocv/

    E-Print Network [OSTI]

    Agrachev, Andrei

    ESAIM: Control, Optimisation and Calculus of Variations URL: http://www.emath.fr/cocv/ December(fl(t))nf0g for almost every t: Let (; ) be the scalar product defined by g: The length of an admissible curve is: L(fl) = Z T 0 ( ?? fl(t); ?? fl(t)) 1 2 dt and the energy of fl is: E(fl) = Z T 0 ( ?? fl

  19. Managing Attack Graph Complexity Through Visual Hierarchical Aggregation

    E-Print Network [OSTI]

    Noel, Steven

    Managing Attack Graph Complexity Through Visual Hierarchical Aggregation Steven Noel Center a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation collapses non-overlapping subgraphs of the attack graph

  20. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  1. The GHS Attack in odd Characteristic Claus Diem

    E-Print Network [OSTI]

    Diem, Claus

    The GHS Attack in odd Characteristic Claus Diem March 24, 2003 Abstract The GHS attack is originally an approach to attack the discrete- logarithm problem (DLP) in the group of rational points

  2. GARNET : a Graphical Attack graph and Reachability Network Evaluation Tool

    E-Print Network [OSTI]

    Williams, Leevar (Leevar Christoff)

    2008-01-01T23:59:59.000Z

    Attack graphs are valuable tools in the assessment of network security, revealing potential attack paths an adversary could use to gain control of network assets. Creating an effective visualization for attack graphs is ...

  3. Jaguar Attack on a Child: Case Report and Literature Review

    E-Print Network [OSTI]

    Iserson, Kenneth V.; Francis, Adama M.

    2015-01-01T23:59:59.000Z

    Harlan G. Fatal Big Cat Attacks. Am J Forensic Med Pathol.Iserson et al. Jaguar Attack on a Child 18. Rabinowitz AR,SM, Mills A, Shoff WH. Human attacks by large 25. Bahram R,

  4. Modeling Attacks on Physical Unclonable Functions Ulrich Rhrmair

    E-Print Network [OSTI]

    against these problems, but they all rest on the concept of a secret binary key. Classical cryp- tography, semi-invasive, or side-channel attacks, as well as software attacks like API- attacks and viruses, can

  5. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01T23:59:59.000Z

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  6. A Scalable Framework for Cyber Attack Discovery and Situational...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

  7. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31T23:59:59.000Z

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  8. Practical Electromagnetic Template Attack on Pierre-Alain Fouque1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals and can configure it, the attack recovers the secret key by monitoring a single execution of HMAC- SHA-1

  9. Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices

    E-Print Network [OSTI]

    Noel, Steven

    Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices Steven Noel}@gmu.edu Abstract We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show attacker reachability across

  10. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect (OSTI)

    Peng Liu

    2005-11-28T23:59:59.000Z

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  11. Towards Attack-Agnostic Defenses David Brumley and Dawn Song

    E-Print Network [OSTI]

    Brumley, David

    Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract Internet attackers control hundreds of thousands to per- haps millions of computers, which they can use for a va- riety of different attacks. Common attacks include spam delivery, phishing, and DDo

  12. A Probabilistic Routing Disruption Attack on DSR and Its Analysis

    E-Print Network [OSTI]

    Levi, Albert

    A Probabilistic Routing Disruption Attack on DSR and Its Analysis ?zleyi Ocakolu, Burak Bayolu}@sabanciuniv.edu Abstract -- In this paper, we propose an attack model against DSR ad hoc network routing protocol and analyze the effects of this attack model on DSR route discovery mechanism. The analysis of the attack

  13. The GHS Attack in odd Characteristic March 24, 2003

    E-Print Network [OSTI]

    Diem, Claus

    The GHS Attack in odd Characteristic Claus Diem March 24, 2003 Abstract The GHS attack is originally an approach to attack the discrete- logarithm problem (DLP) in the group of rational points. In this article we give a generalization of the attack to degree 0 class groups of (hyper-)elliptic curves over

  14. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

  15. Attack Containment Framework for Large-Scale Critical Infrastructures

    E-Print Network [OSTI]

    Nahrstedt, Klara

    Attack Containment Framework for Large-Scale Critical Infrastructures Hoang Nguyen Department-- We present an attack containment framework against value-changing attacks in large-scale critical structure, called attack container, which captures the trust behavior of a group of nodes and assists

  16. Sector4 redirect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP. May,2015Sector 1FAQs

  17. NAESB Redirect Assignment Update

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment SurfacesResourceand Tasha Bryan 11/13/14 B O N N E V I L L E P O W E R A D M I N

  18. Redirect Method Customer Request

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST 800-53 RevisionDivision and

  19. Lessons Learned From Previous SSL/TLS Attacks A Brief Chronology Of Attacks And Weaknesses

    E-Print Network [OSTI]

    Lessons Learned From Previous SSL/TLS Attacks A Brief Chronology Of Attacks And Weaknesses in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data

  20. Heart Disease and Early Heart Attack Care

    E-Print Network [OSTI]

    Ohta, Shigemi

    Heart Disease and Early Heart Attack Care Pamela Kostic, RN, CCCC, Chest Pain Coordinator, Stony Risk Factors · EHAC & Prevention #12;Heart disease includes a number of problems affecting the heart and the blood vessels in the heart. #12;Types of heart disease include: · Coronary artery disease (CAD) · Angina

  1. ESAIM: Control, Optimisation and Calculus of Variations May 2001, Vol. 6, 361386 URL: http://www.emath.fr/cocv/

    E-Print Network [OSTI]

    Tucsnak, Marius - Institut de Mathématiques ?lie Cartan, Université Henri Poincaré

    ESAIM: Control, Optimisation and Calculus of Variations May 2001, Vol. 6, 361­386 URL: http (see Haraux [9]) in the energy space or they are based on non local feed-backs (see for instance. More precisely, let X be a complex Hilbert space with norm and inner product denoted respectively

  2. URL: http://www.elsevier.nl/locate/entcs/volume68.html 18 pages Timed CSP = Closed Timed Automata 1

    E-Print Network [OSTI]

    Ouaknine, Joël

    URL: http://www.elsevier.nl/locate/entcs/volume68.html 18 pages Timed CSP = Closed Timed Automata 1 70118, USA Abstract We study the expressive power of an augmented version of Timed CSP and show constraints. We also show that this new version of Timed CSP is expressive enough to capture the most widely

  3. How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack

    E-Print Network [OSTI]

    Duan, Yitao; Canny, J

    2006-01-01T23:59:59.000Z

    adaptive chosen ciphertext attack. In: CRYPTO 1998. Volumeagainst chosen cipher- text attack. J. Cryptology 15 (2002)against chosen- ciphertext attacks. In: ASIACRYPT 2001.

  4. The Procedural Attack on Civil Rights: The Empirical Reality of Buckhannon for the Private Attorney General

    E-Print Network [OSTI]

    Albiston, Catherine R.; Nielsen, Laura Beth

    2006-01-01T23:59:59.000Z

    emphasis added). Procedural Attack on Civil Rights contraryat 1 (1976). Procedural Attack on Civil Rights plaintiffs357, 367 & Procedural Attack on Civil Rights fee recovery

  5. Predicting the effect of climate change on wildfire behavior and initial attack success

    E-Print Network [OSTI]

    Fried, Jeremy S.

    2008-01-01T23:59:59.000Z

    wildfire behavior and initial attack success Van Rheenen, N.2006a. Analysing initial attack on wildland fires usingwildfire behavior and initial attack success Fried, J.S. ,

  6. Responding to the Risk of White Shark Attack Updated Statistics, Prevention, Control

    E-Print Network [OSTI]

    Klimley, A. Peter

    477 CHAPTER 31 Responding to the Risk of White Shark Attack Updated Statistics, Prevention, Control ................................................................................................................................... 478 White Shark Attack Statistics........................................................................................................ 479 Definition of Shark Attack

  7. A systematic analysis of defenses against code reuse attacks

    E-Print Network [OSTI]

    Casteel, Kelly (Kelly C.)

    2013-01-01T23:59:59.000Z

    In this thesis, we developed a systematic model of the code reuse attack space where facts about attacks and defenses were represented as propositional statements in boolean logic and the possibility of deploying malware ...

  8. Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    1 Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs Steven Noel and Sushil optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph. The set of all such paths through the network constitutes an attack graph, which we aggregate according

  9. A FOUNDATION FOR INITIAL ATTACK SIMULATION: THE FRIED AND FRIED

    E-Print Network [OSTI]

    Fried, Jeremy S.

    A FOUNDATION FOR INITIAL ATTACK SIMULATION: THE FRIED AND FRIED FIRE CONTAINMENT MODEL Jeremy S, contemporary initial attack models, such as the California Fire Economics Simulator (CFES) ver- sion 2 simulation of any mathematically representable fire shape, provides for "head" and "tail" attack tactics

  10. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

    E-Print Network [OSTI]

    Zenner, Erik

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack Gregor Leander, Mohamed Ahmed PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1] that breaks less than half of the rounds. In this paper, we

  11. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

  12. A Fast Eavesdropping Attack Against Touchscreens Federico Maggi

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Fast Eavesdropping Attack Against Touchscreens Federico Maggi Alberto Volpatto Politecnico di, we arise this concern by presenting an automatic attack against mod- ern touchscreen keyboards. We demonstrate the attack against the Apple iPhone--2010's most popular touchscreen device-- although it can

  13. Attack-Resilient Time Synchronization for Wireless Sensor Networks

    E-Print Network [OSTI]

    Yener, Aylin

    Attack-Resilient Time Synchronization for Wireless Sensor Networks Hui Song, Sencun Zhu in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effective to several representative time

  14. Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda Symantec Research Labs In its most general form, an attack signature is a program that can correctly determine if an input network packet se- quence can successfully attack a protected network appli- cation. Filter rules used

  15. Architectural Support for Automated Software Attack Detection, Recovery, and Prevention

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Architectural Support for Automated Software Attack Detection, Recovery, and Prevention Jesse University Ames, IA 50011, USA Email: {jsathre, abaumgar, zambreno}@iastate.edu Abstract--Attacks on software systems architecture aimed at attack detection. Traditional techniques ignore the arguably more important

  16. Efficient DHT attack mitigation through peers' ID distribution

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Efficient DHT attack mitigation through peers' ID distribution Thibault Cholez, Isabelle Chrisment.festor}@loria.fr Abstract--We present a new solution to protect the widely deployed KAD DHT against localized attacks which DHT attacks by comparing real peers' ID distributions to the theoretical one thanks to the Kullback

  17. Extending the GHS Weil Descent Attack No Author Given

    E-Print Network [OSTI]

    Hess, Florian

    Extending the GHS Weil Descent Attack No Author Given No Institute Given Abstract. In this paper we extend the Weil descent attack due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack applies to elds of composite degree over F2 . The principle behind

  18. ICMP: an Attack Vector against IPsec Gateways Ludovic Jacquin

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ICMP: an Attack Vector against IPsec Gateways Ludovic Jacquin Inria, France ludovic Protocol (ICMP) can be used as an attack vector against IPsec gateways. The main contribution of this work is to demonstrate that an attacker having eavesdropping and traffic injection capabilities in the black untrusted

  19. Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek

    E-Print Network [OSTI]

    Smith, Sean W.

    Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek Dartmouth College Hanover, NH College Hanover, NH 03755 sws@cs.dartmouth.edu ABSTRACT Currently, work on malware attack and defense become the launching point for many attacks on the enterprise network in which the embedded devices

  20. ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University

    E-Print Network [OSTI]

    Chen, Thomas M.

    1 Chapter 74 ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University Matthew C. Elder An understanding of electronic attacks is an essential prerequisite to building strong cyber defenses. This chapter gives an overview of the major electronic attacks encountered today, proceeding through the basic steps

  1. Defending Resource Depletion Attacks on Implantable Medical Devices

    E-Print Network [OSTI]

    Wu, Jie

    and storage. In this research, we identify a new kind of attacks on IMDs - Resource Depletion (RD) attacks information. IMD attacks may also be launched by insurance companies. IMD readers may be installed near, and storage. An IMD is implanted in patient's body and expected to run for several years. Typical IMDs

  2. A Network Game with Attackers and a Defender Marios Mavronicolas

    E-Print Network [OSTI]

    Mavronicolas, Marios

    International Symposium on Algorithms and Computation, X. Deng and D. Du eds., pp. 288­297, Vol. 3827, Lecture a probability distribution to choose a node of the network to damage. Opponent to the attackers is a protector]. Typically, an attack exploits the discovery of loopholes in the security mechanisms of the Internet. Attacks

  3. An adaptive attack on Wiesner's quantum money

    E-Print Network [OSTI]

    Aharon Brodutch; Daniel Nagaj; Or Sattath; Dominique Unruh

    2014-09-22T23:59:59.000Z

    Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner's scheme remained appealing because it is both conceptually clean and relatively easy to implement. We show efficient adaptive attacks on Wiesner's quantum money scheme [Wie83] (and its variant by Bennett et al. [BBBW83]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [EV93, KWH+95], while the second is based on the idea of protective measurements [AAV93]. It allows us to break Wiesner's scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit.

  4. Third Party CNOT Attack on MDI QKD

    E-Print Network [OSTI]

    Arpita Maitra

    2012-09-06T23:59:59.000Z

    In this letter, we concentrate on the very recently proposed Measurement Device Independent Quantum Key Distribution (MDI QKD) protocol by Lo, Curty and Qi (PRL, 2012). We study how one can suitably present an eavesdropping strategy on MDI QKD, that is in the direction of the fundamental CNOT attack on BB84 protocol, though our approach is quite different. In this strategy, Eve will be able to know expected half of the secret bits communicated between Alice and Bob with certainty (probability 1) without introducing any error. Further, for the remaining bits, where Eve will only be able to predict the bit values as in random guess (with probability 1/2), she will certainly find out whether her interaction induced an error in the secret bits between the communicating parties. Given the asymmetric nature of the CNOT attack, we also introduce Hadamard gates to present a symmetric version. Though our analysis does not refute the security claims in MDI QKD, adapting the CNOT attack in this scenario requires nontrivial approach using entanglement swapping.

  5. E-Print Network 3.0 - acute migraine attacks Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    with either depression or migraine attack frequency. Conclusion... on migraine phenomenology (attack frequency or comorbid depression), thereby excluding this variant......

  6. The Impact of Imperfect Information on Network Attack

    E-Print Network [OSTI]

    Melchionna, Andrew; Squires, Shane; Antonsen, Thomas M; Ott, Edward; Girvan, Michelle

    2014-01-01T23:59:59.000Z

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erd\\H{o}s-R\\'enyi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erd\\H{o}os-R\\'enyi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links.

  7. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  8. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28T23:59:59.000Z

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  9. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F. (Schenectady, NY); Buono, Donald P. (Schenectady, NY)

    1983-01-01T23:59:59.000Z

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  10. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Broader source: Energy.gov (indexed) [DOE]

    project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event...

  11. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection...

  12. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL

    2014-01-01T23:59:59.000Z

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  13. active attack tegutsevad: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    traffic. Although it is difficult to detect shrew DDo Chen, Yu 83 Timing analysis in low-latency mix networks: attacks and defenses Computer Technologies and Information Sciences...

  14. attack detection system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is presented Autonoma de Madrid, Universidad 51 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  15. attack model development: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    than the traditional alert correlations. Wei Yan 89 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  16. Optimal Power Grid Protection through A Defender-Attacker ...

    E-Print Network [OSTI]

    Wei Yuan

    2013-02-22T23:59:59.000Z

    Feb 22, 2013 ... Optimal Power Grid Protection through A Defender-Attacker-Defender Model. Wei Yuan (weiyuan ***at*** mail.usf.edu) Long Zhao (longzhao...

  17. Optimal Security Response to Attacks on Open Science Grids

    E-Print Network [OSTI]

    Mine Altunay

    2009-03-30T23:59:59.000Z

    Mar 30, 2009 ... Abstract: Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations...

  18. THE SYSTEM THORIUM NITRATE-WATER-NITRIC ACID AT 25 AND THE HYDRATES...

    Office of Scientific and Technical Information (OSTI)

    SYSTEM THORIUM NITRATE-WATER-NITRIC ACID AT 25 AND THE HYDRATES OF THORIUM NITRATE Re-direct Destination: times redirected to final destination ShortURL Code Published Current...

  19. Cardiologists from CU testing revolutionary heart-attack treatment

    E-Print Network [OSTI]

    Cerveny, Vlastislav

    Cardiologists from CU testing revolutionary heart-attack treatment Compiled 4.12.2013 23 of the biologically degradable stent in the treatment of myocardial infarctions (heart-attacks). The results with a metal stent in their heart for the rest of their life; instead, the stent does its work then disappears

  20. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we precisely define corrupted packets in inter-session pollution based

  1. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we first define precisely corrupted packets in inter-session pollution based

  2. Energy-Based Attack Detection in Networked Control Emeka Eyisi

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    systems includ- ing medical devices [13] and waste water treatment plants [1]. In securing CPSEnergy-Based Attack Detection in Networked Control Systems Emeka Eyisi United Technologies Research.koutsoukos@vanderbilt.edu ABSTRACT The increased prevalence of attacks on Cyber-Physical Systems (CPS) as well as the safety

  3. Forging Attacks on two Authenticated Encryptions COBRA and POET

    E-Print Network [OSTI]

    Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

  4. Avoiding the Detector Blinding Attack on Quantum Cryptography

    E-Print Network [OSTI]

    Z L Yuan; J F Dynes; A J Shields

    2010-09-30T23:59:59.000Z

    We show the detector blinding attack by Lydersen et al [1] will be ineffective on most single photon avalanche photodiodes (APDs) and certainly ineffective on any detectors that are operated correctly. The attack is only successful if a redundant resistor is included in series with the APD, or if the detector discrimination levels are set inappropriately.

  5. Combined Modeling and Side Channel Attacks on Strong PUFs

    E-Print Network [OSTI]

    , unknown to the adversary. This requirement can be difficult to uphold in practice: Physical attacks like- tacks on PUF core properties have been reported. They con- cern their physical and digital unclonability, for example, we report successful attacks for bitlengths of 64, 128 and 256, and for up to nine single Arbiter

  6. Unidentifiable Attacks in Electric Power Systems Zhengrui Qin, Qun Li

    E-Print Network [OSTI]

    Li, Qun

    enumerating algorithms and optimization strategy. Keywords-Smart Grid, Unidentifiable Attack, State Estimates the perspective of the control center to deal with an unidentifiable attack. We briefly evaluate and validate our locations of the power grid. The meters take vari- ous measurements, including real and reactive power

  7. Heart Attack Survival Plan Information To Share With

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

  8. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  9. Defending Systems Against Application-Level Denial of Service Attacks

    E-Print Network [OSTI]

    Keidar, Idit

    Systems Against Application-Level Denial of Service Attacks Research Thesis Submitted in Partial of the Technion -- Israel Institute of Technology HESHVAN 5768 HAIFA NOVEMBER 2007 #12;#12;The Research Thesis with a Single Port . . . . . . . . . . . 66 5.3.1 Blind Attack

  10. Fault and Side-Channel Attacks on Pairing Based Cryptography ?

    E-Print Network [OSTI]

    such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

  11. Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways Ludovic Jacquin Inria the "Packet Too Big"-"Packet Too Small" ICMP based attack against IPsec gateways. We explain how an attacker in use, the attack either creates a Denial of Service or major performance penalties. This attack

  12. Future of Distributed Generation and IEEE 1547 (Presentation...

    Office of Scientific and Technical Information (OSTI)

    new boundary issues and requirements, islanding issues, and how it impacts distributed wind. times redirected to final destination ShortURL Code Published Current state Most...

  13. Towards a Molecular Scale Understanding of Surface Chemistry...

    Office of Scientific and Technical Information (OSTI)

    and pollution control; energy production (photoelectrochemical and production of hydrogen); and novel materials synthesis. times redirected to final destination ShortURL...

  14. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01T23:59:59.000Z

    There is an emerging consensus that the nations electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  15. Property Rights, Taxpayer Rights, and the Multiscalar Attack on the State: Consequences for Regionalism in the United States

    E-Print Network [OSTI]

    Christopher Niedt; Margaret Weir

    2007-01-01T23:59:59.000Z

    and the Multiscalar Attack on the State: Consequences forand the multiscalar attack on the state: Consequences forand the multiscalar attack on the state: Consequences for

  16. Network attack detection and defense Manifesto of the Dagstuhl Perspective Workshop, March 2nd6th, 2008

    E-Print Network [OSTI]

    Carle, Georg; Dressler, Falko; Kemmerer, Richard A.; Koenig, Hartmut; Kruegel, Christopher; Laskov, Pavel

    2009-01-01T23:59:59.000Z

    y REGULRE BEITRGE Network attack detection and defense Perspective Workshop Network Attack Detection and Defensefor the detection of network attacks, should more strongly

  17. Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2

    E-Print Network [OSTI]

    Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

    1997-01-01T23:59:59.000Z

    Council. Focus on Heart Attack in Pennsylvania. Researchexperienced an acute heart attack due to coronary arterysample. 18. Focus on Heart Attack in Pennsylvania, Research

  18. Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1

    E-Print Network [OSTI]

    Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

    1997-01-01T23:59:59.000Z

    P S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:This third report on heart attack mortality rates expandsconditions selected were heart attack (acute myocardial

  19. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  20. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z. (Mathematics and Computer Science); (FNAL); (Univ. of Wisconsin at Madison)

    2011-01-01T23:59:59.000Z

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  1. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect (OSTI)

    Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

    2010-10-26T23:59:59.000Z

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  2. After-gate attack on a quantum cryptosystem

    E-Print Network [OSTI]

    Carlos Wiechers; Lars Lydersen; Christoffer Wittmann; Dominique Elser; Johannes Skaar; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2010-09-14T23:59:59.000Z

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  3. Time-shift attack in practical quantum cryptosystems

    E-Print Network [OSTI]

    Bing Qi; Chi-Hang Fred Fung; Hoi-Kwong Lo; Xiongfeng Ma

    2006-05-11T23:59:59.000Z

    Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another "time-shift" attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0" and bit "1" with the same SPD, Eve, in principle, could acquire full information on the final key without introducing any error. Finally, we discuss some counter measures against our and earlier attacks.

  4. Active Attacks Against Modulation-based Radiometric Identification

    E-Print Network [OSTI]

    Bystroff, Chris

    ) may become compromised via physical attacks. In light of these difficulties, researchers have started Science Technical Report 09-02 Matthew Edman and B¨ulent Yener Rensselaer Polytechnic Institute Department

  5. On the Complexity of Matsui's Attack Pascal Junod

    E-Print Network [OSTI]

    On the Complexity of Matsui's Attack Pascal Junod Security and Cryptography Laboratory Swiss at random and where depends on the key value. Given some plaintext bits Pi1 , . . . , Pir , ciphertext bits

  6. Real-world Polymorphic Attack Detection Michalis Polychronakis,1

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    proposed network-level emulation, a heuristic detection method that scans network traffic to detect, sophisticated obfuscation schemes. Keywords Polymorphism, intrusion detection, code emulation 1. Introduction them under control for as long as possible. As detection mechanisms improve, attackers employ

  7. Coordinated Variable Structure Switching Attacks for Smart Grid

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11T23:59:59.000Z

    attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one...

  8. Tag Second-preimage Attack against -cipher Gaetan Leurent

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The generalized birthday attack of Wagner is an attack against the m-sum problem: given m lists L1, L2, . . . , Lm of n-bit words, one find values l1 L1, . . . , lm Lm such that m i=1 lm = 0. If each list contains the sums of elements in L1, ...Lm/2 and Lm/2+1, ...Lm respectively, then sort LA and LB, and look

  9. Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan Act in Time to Heart Attack Signs Why Your Patients Need To Act in Time to Heart Attack Signs Coronary heart disease a heart attack. About 460,000 of those heart attacks are fatal. Disability and death from heart attack can

  10. Book Title Author(s) URL A Complete Guide to Quality in Small-Scale Wine MakingConsidine, John http://www.sciencedirect.com/science/book/9780124080812

    E-Print Network [OSTI]

    Book Title Author(s) URL A Complete Guide to Quality in Small-Scale Wine MakingConsidine, John http://www.sciencedirect.com/science/book/9780124080812 A Pharmacology Primer Kenakin, Terry http://www.sciencedirect.com/science/book/9780124076631 A Practical Guide to SysML Friedenthal, Sanford http://www.sciencedirect.com/science/book/14_NO_ISBN_101

  11. The image database stores metadata and URL addresses to JPEG images stored on a web server.Each image on the web

    E-Print Network [OSTI]

    Hall, Sharon J.

    The image database stores metadata and URL addresses to JPEG images stored on a web server. This database integration would allow for the production of guides that could carry titles such as Flora for the production of both custom keys and natural language descriptions.This database structure was initially based

  12. To link to this article: URL : https://www.jstage.jst.go.jp/article/isijinternational/51/2/51_2_242/_article

    E-Print Network [OSTI]

    Mailhes, Corinne

    To link to this article: URL : https://www.jstage.jst.go.jp/article/isijinternational/51/2/51 with chunky graphite. (2010) ISIJ International, vol. 51 (n° 2). pp. 242-249. ISSN 0915-1559 Open Archive-defined transition from the outer unaffected area and the inner affected one. All previous works that looked

  13. To link to this article: DOI:10.1109/TPS.2012.2190303 URL : http://dx.doi.org/10.1109/TPS.2012.2190303

    E-Print Network [OSTI]

    Mailhes, Corinne

    observed toward high-temperature range of the collagen denaturation and 2) the stiffening of the chainsTo link to this article: DOI:10.1109/TPS.2012.2190303 URL : http://dx.doi.org/10.1109/TPS.2012, Florian and Dandurand, Jany and Lacabanne, Colette Effect of Low-Temperature Plasma Jet on Thermal

  14. The Daily Tar Heel URL: http://www.dailytarheel.com/index.php/article/2010/09/grant_money_to_help_scholars

    E-Print Network [OSTI]

    Sekelsky, Jeff

    The Daily Tar Heel URL: http://www.dailytarheel.com/index.php/article/2010/09/grant_money_to_help_scholars Current Date: Sun, 26 Sep 2010 13:05:26 -0400 Grant money to help scholars To benefit biomedical students in biology, physics and chemistry, as well as high-level math and applied sciences courses. The grant money

  15. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

  16. Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes Patrick Bas powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies to be able to handle `complex' trellises. Moreover, the ef- ficiency of this attack has been evaluated

  17. New sensitivity analysis attack Maha El Choubassi a and Pierre Moulin b

    E-Print Network [OSTI]

    Moulin, Pierre

    New sensitivity analysis attack Maha El Choubassi a and Pierre Moulin b University of Illinois analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector

  18. Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller

    E-Print Network [OSTI]

    Miller, Barton P.

    Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller January 23, 2004 Abstract A common way to elude a signature-based NIDS is to transform an attack matching between the attack payload and the NIDS signature, attackers split the payload into several TCP

  19. Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack

    E-Print Network [OSTI]

    Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack Jiali Choy, Khoongming Khoo,kkhoongm,lchuanwe@dso.org.sg Abstract. In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits

  20. High-speed Router Filter for Blocking TCP Flooding under DDoS Attack

    E-Print Network [OSTI]

    Chao, Jonathan

    High-speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim',Ju-Yeon Jo', H during the Distributed Denial-oJService (DDoS) attack. By allocating bandwidths separately for TCP.9% of the attack trafic while legitimate traflc showed nearly identical performance as in the non-attacked

  1. CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment

    E-Print Network [OSTI]

    Eustice, Ryan

    CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment Qi Chen, Wenmin Lin-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily, in this paper. Concretely speaking, the method is deployed by two periods, i.e., non-attack period and attack

  2. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks

    E-Print Network [OSTI]

    Krishnamurthy, Srikanth

    TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks Jakob Eriksson attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to this attack use tight clock synchronization

  3. A New Attack on RSA with Two or Three Decryption Exponents

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

  4. Robust Codes for Fault Attack Resistant Cryptographic Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin

    E-Print Network [OSTI]

    Karpovsky, Mark

    Robust Codes for Fault Attack Resistant Cryptographic Hardware Konrad J. Kulikowski, Mark G algorithms are vulner- able to fault analysis attacks. To detect these attacks we propose an architec- ture by an attacker. Architectures based on these codes have fewer undetectable er- rors than linear codes

  5. Analyzing the Security in the GSM Radio Network using Attack Jungles

    E-Print Network [OSTI]

    Abdulla, Parosh Aziz

    Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 introduce the concept of attack jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker

  6. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

  7. Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller

    E-Print Network [OSTI]

    Liblit, Ben

    Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller January 23, 2004 Abstract A common way to elude a signature­based NIDS is to transform an attack matching between the attack payload and the NIDS signature, attackers split the payload into several TCP

  8. Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure to perform advanced attacks. We have experimentally validated the proposed method by attacking a DES

  9. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

  10. Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament

    E-Print Network [OSTI]

    Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament D-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance

  11. Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1

    E-Print Network [OSTI]

    Zhang, Jian

    Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1 , Phillip Porras1 , Johannes- gressive attack sources, as such information can help to proactively defend their networks. For this pur of attacks observed by others. However, the total number of reported attackers is huge in these systems. Thus

  12. Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem, University College Cork Email: {e.popovici}@ucc.ie Abstract-- Side channel attacks such as Simple Power Analy- sis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms

  13. Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament D to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance anal- ysis to information- theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives

  14. From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic

    E-Print Network [OSTI]

    Wang, Wenye

    From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly. In this paper, we aim at modeling and detecting jamming attacks against time-critical traffic. We introduce

  15. Combined Attacks on the AES Key Schedule Francois Dassance and Alexandre Venelli

    E-Print Network [OSTI]

    of physical attack is the Fault Analysis (FA) that evaluates the faulty behavior of a cryptosystem to learn proposed to thwart physical attacks on di#erent cryptosystems. Recently, the principle of combined attacks#erent fault models. We report countermeasures against these attacks on AES in Section 5. We conclude

  16. EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

  17. Combined Attacks on the AES Key Schedule Francois Dassance and Alexandre Venelli

    E-Print Network [OSTI]

    of physical attack is the Fault Analysis (FA) that evaluates the faulty behavior of a cryptosystem to learn proposed to thwart physical attacks on different cryptosystems. Recently, the principle of combined attacks different fault models. We report countermeasures against these attacks on AES in Section 5. We conclude

  18. Learn What a Heart Attack Feels Like--It Could Save Your Life.

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Learn What a Heart Attack Feels Like-- It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do if you are having any of these signs. Take these steps. They could save your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all

  19. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  20. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    SciTech Connect (OSTI)

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo'; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10T23:59:59.000Z

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  1. Resilience of Social Networks Under Different Attack Strategies

    E-Print Network [OSTI]

    Latif, Mohammad Ayub; Zaidi, Faraz

    2014-01-01T23:59:59.000Z

    Recent years have seen the world become a closely connected society with the emergence of different types of social networks. Online social networks have provided a way to bridge long distances and establish numerous communication channels which were not possible earlier. These networks exhibit interesting behavior under intentional attacks and random failures where different structural properties influence the resilience in different ways. In this paper, we perform two sets of experiments and draw conclusions from the results pertaining to the resilience of social networks. The first experiment performs a comparative analysis of four different classes of networks namely small world networks, scale free networks, small world-scale free networks and random networks with four semantically different social networks under different attack strategies. The second experiment compares the resilience of these semantically different social networks under different attack strategies. Empirical analysis reveals interesti...

  2. Citation: K. Nakamura et al. (Particle Data Group), JP G 37, 075021 (2010) and 2011 partial update for the 2012 edition (URL: http://pdg.lbl.gov) Heavy Bosons Other Than

    E-Print Network [OSTI]

    for the 2012 edition (URL: http://pdg.lbl.gov) Heavy Bosons Other Than Higgs Bosons, Searches for We list here (other than Higgs bosons), vector or scalar leptoquarks, and axigluons. A REVIEW GOES HERE ­ Check our

  3. ATTACK BY COLORIZATION OF A GREY-LEVEL IMAGE HIDING ITS COLOR PALETTE Chaumont M. and Puech W.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ATTACK BY COLORIZATION OF A GREY-LEVEL IMAGE HIDING ITS COLOR PALETTE Chaumont M. and Puech W, FRANCE ABSTRACT In this paper, we present a novel attack named colorization attack. This attack of such an attack and thus to take it into account for the future color-hiding watermarking schemes. Index Terms

  4. Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks M.H.R. Khouzani, Saswati Sarkar Abstract Large scale proliferation of wireless technologies are dependent on developing reliable to the spread of self-replicating malicious codes known as malware. The malware can be used to initiate

  5. Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures

    E-Print Network [OSTI]

    Caesar, Matthew

    range of sparsely located mobile nodes (e.g., disaster-response networks), and limited energy resources, DTNs are used for scientific, military, and industrial applications that place high demands against spoofing attacks in DTNs. To the best of our knowledge, we are the first to propose

  6. Attack Detection and Identification in Cyber-Physical Systems

    E-Print Network [OSTI]

    Bullo, Francesco

    Attack Detection and Identification in Cyber-Physical Systems Fabio Pasqualetti, Florian D¨orfler, Florian D¨orfler, and Francesco Bullo are with the Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, {fabiopas,dorfler,bullo}@engineering.ucsb.edu. #12;appropriate

  7. A Bound on Attacks on Payment Protocols Scott D. Stoller

    E-Print Network [OSTI]

    Stoller, Scott

    hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

  8. A Bound on Attacks on Payment Protocols Scott D. Stoller

    E-Print Network [OSTI]

    Stoller, Scott

    hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

  9. Selective Jamming Attacks in Wireless Networks Alejandro Proa~no

    E-Print Network [OSTI]

    Lazos, Loukas

    for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. I emission of high-power interference signals such as continuous wave tones, or FM modulated noise [15-one transformations [13], with physical-layer parameters. We further study the impact of various selective jamming

  10. Attacks on Physical-layer Identification Boris Danev

    E-Print Network [OSTI]

    Capkun, Srdjan

    Attacks on Physical-layer Identification Boris Danev Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland bdanev@inf.ethz.ch Heinrich Luecken Comm. Tech. Laboratory ETH Zurich 8092 Zurich, Switzerland lueckenh@nari.ee.ethz.ch Srdjan Capkun Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland capkuns

  11. Offline Dictionary Attack on Password Authentication Schemes using Smart Cards

    E-Print Network [OSTI]

    decades of intensive research in the security community, and the current crux lies in how to achieve truly scenario and gives rise to the strongest adversary model so far (Note that Wang's PSCAV scheme is secure poorly-chosen passwords from the notorious offline dictionary attacks and thus confirms the feasibility

  12. A Network Game with Attackers and a Defender Marios Mavronicolas

    E-Print Network [OSTI]

    Mavronicolas, Marios

    International Symposium on Algorithms and Computation, X. Deng and D. Du eds., pp. 288­297, Vol. 3827, Lecture distribution to choose a node of the network to damage. Opponent to the attackers is a protector entity called the discovery of loopholes in the security mechanisms of the Internet; the latter are also known as defenses

  13. PUF Modeling Attacks on Simulated and Silicon Data

    E-Print Network [OSTI]

    that rest on the Strong PUF's unpredictability and physical unclonability. Our method is less relevant these problems, but they all rest on the concept of a secret binary key: It is assumed that the Ulrich R API-attacks and viruses, can lead to key exposure and full security breaks. The fact that the devices

  14. A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data

    E-Print Network [OSTI]

    Sikdar, Biplab

    in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks in the network on PMU data can easily lead to the loss of observability of the system and render useless a number

  15. Defending Synchrophasor Data Networks Against Traffic Analysis Attacks

    E-Print Network [OSTI]

    Sikdar, Biplab

    - tem. PMU data serves to facilitate a number of applications while enhancing others, such as real generation and distribution system, monitoring and manipulation of PMU data are particularly attractive of the PMU data measurement and collection network against a class of passive attacks and develops defense

  16. Combating Time Synchronization Attack: A Cross Layer Defense Mechanism

    E-Print Network [OSTI]

    Li, Husheng

    is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms- munication infrastructure [8]. Nowadays most researches on cyber physical system security focus on false data- ply enhancing the firmware of the monitoring devices. In addition, unlike a malicious data attack [10

  17. A Deception Framework for Survivability Against Next Generation Cyber Attacks

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    to the electronic business domain. According to the asymmetric warfare theory, attack- ers have the advantage- rity, survivability 1. Introduction This is the era of cyber-warfare and it is no longer limited to military domain. Knapp and Boulton [12] have reviewed information warfare literature from 1990 to mid-2005

  18. Intrusion Detection in the Large: Distributed Detection of Distributed Attacks

    E-Print Network [OSTI]

    California at Davis, University of

    Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

  19. MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT

    E-Print Network [OSTI]

    Noel, Steven

    MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects security, Intrusion detection, data mining 1. Introduction The goal of intrusion detection is to discover

  20. Your Online Interests Pwned! A Pollution Attack Against Targeted Advertising

    E-Print Network [OSTI]

    Lee, Wenke

    Your Online Interests ­ Pwned! A Pollution Attack Against Targeted Advertising Wei Meng Georgia in biasing ads towards the desired higher-paying advertisers; the polluter can influence up to 74% and 12; Profile Pollution; Ad Measurement 1. INTRODUCTION Online targeted advertising is one of the primary

  1. Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations

    E-Print Network [OSTI]

    Drozdova, Katya; Samoilov, Michael

    2010-01-01T23:59:59.000Z

    early-warning detection of attack signals from terroristtowards detecting terrorist attack precursors. We ?nd thatof impending terrorist attacks. (Such potential practical

  2. Ethnicity and gender in the face of a terrorist attack: A national longitudinal study of immediate responses and outcomes two years after September 11

    E-Print Network [OSTI]

    Chu, T Q; Seery, M D; Ence, W A; Holman, E A; Silver, Roxane Cohen

    2006-01-01T23:59:59.000Z

    reactions to terrorist attacks: Findings from the national11, 2001, terrorist attacks. New England Journal ofthe 9/11/01 terrorist attacks. Journal of Adolescent Health,

  3. On the robustness of network infrastructures to disasters and physical attacks

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    2013-01-01T23:59:59.000Z

    Networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such realworld events happen in specific geographical locations ...

  4. T-702: Apache web servers that allows a DOS attack | Department...

    Broader source: Energy.gov (indexed) [DOE]

    2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has...

  5. Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3

    E-Print Network [OSTI]

    Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

    1997-01-01T23:59:59.000Z

    18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,age, sex, type of heart attack, and chronic diseases were

  6. Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1

    E-Print Network [OSTI]

    Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

    1997-01-01T23:59:59.000Z

    age, sex, type of heart attack, and chronic diseases wereand location of the heart attack, and the specific chronicP S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:

  7. Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2

    E-Print Network [OSTI]

    Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

    1997-01-01T23:59:59.000Z

    age, sex, type of heart attack, and chronic diseases wereJA, Zach AP. Report on Heart Attack 1991-1993, Volume 2:California, Santa Barbara Heart Attack Clinical Panel Melvin

  8. Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3

    E-Print Network [OSTI]

    Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

    1997-01-01T23:59:59.000Z

    18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,HS, Romano PS. Report on Heart Attack, 1991-1993, Volume 3:

  9. Robustness of two-way quantum communication protocols against Trojan horse attack

    E-Print Network [OSTI]

    Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

    2005-08-23T23:59:59.000Z

    We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

  10. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  11. 1. Introduction A man is rushed to a hospital in the throes of a heart attack.

    E-Print Network [OSTI]

    Cottrell, Garrison W.

    1. Introduction A man is rushed to a hospital in the throes of a heart attack. The doctor needs when a heart attack patient is admitted, rank them accord- ing to their importance, and combine them heart attack patients according to risk using only a maxi- mum of three variables. If a patient has had

  12. WORKING PAPER N 2008 -12 Regional disparities in mortality by heart attack

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    WORKING PAPER N° 2008 - 12 Regional disparities in mortality by heart attack: Evidence from France disparities in mortality by heart attack: evidence from France Laurent Gobillony Carine Milcentz February 21 of patients treated in a hospital for a heart attack in France. These determinants can be some di

  13. Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY

    E-Print Network [OSTI]

    Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY Introduction Research has shown more effective in reducing incidence of fatal heart attacks in heart patients than were any other can act to reduce blood platelet aggregation and thereby reduce the risk of heart attack. This ef

  14. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses

    E-Print Network [OSTI]

    Saxena, Nitesh

    The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

  15. Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

    E-Print Network [OSTI]

    Curtmola, Reza

    1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

  16. Hearing is Believing: Detecting Wireless Microphone Emulation Attack in White Space

    E-Print Network [OSTI]

    California at Davis, University of

    users from transmitting. Such an attack is called primary user emulation (PUE) attack. TV towers and their transmission power is low. These properties introduce great challenges on PUE detection and existing meth- ods]. However, all of them focus on the attackers that emulate stationary primary users (TV towers

  17. Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

    E-Print Network [OSTI]

    Kasera, Sneha Kumar

    Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality at strategic locations in the ad hoc network. We first show that, given the locations of attackers and victims

  18. False Data Injection Attacks with Incomplete Information Against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    False Data Injection Attacks with Incomplete Information Against Smart Power Grids Md. Ashfaqur introduced as an important class of cyber attacks against smart grid's wide area measurement and monitoring Injection Attack, Smart Grid Security, Incomplete Information, Transmission Line Admittance Uncer- tainty

  19. Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator as random masks generators in some side channel attacks countermeasures. As such, they must have good statistical properties, be unpredictable and robust against attacks. This paper presents a contact- less

  20. A Formal Method for Attack Modeling and Seyit Ahmet C amtepe and Bulent Yener

    E-Print Network [OSTI]

    Bystroff, Chris

    1 A Formal Method for Attack Modeling and Detection Seyit Ahmet C¸ amtepe and B¨ulent Yener,yener}@cs.rpi.edu TR-06-01 Abstract This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach [1] to capture (i

  1. Allocating Capacity in Parallel Queues to Improve Their Resilience to Deliberate Attack

    E-Print Network [OSTI]

    Henderson, Shane

    Allocating Capacity in Parallel Queues to Improve Their Resilience to Deliberate Attack W. Matthew will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well-informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service

  2. An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing

    E-Print Network [OSTI]

    Wing, Jeannette M.

    An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing Carnegie Mellon University's security? We propose to use the measure of a system's attack surface as an indication of the system, prior work has shown that a system's attack surface measurement serves as a reliable proxy for security

  3. What about vulnerability to a fault attack of the Miller algorithm during an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

  4. An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten Institut f¨ur Experimentelle a novel attack on this primitive. We show that the DLP in the trace-zero group can always be transferred methods than by attacking it directly via generic methods. The speed-up one obtains corresponds

  5. Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems

    E-Print Network [OSTI]

    Dreibholz, Thomas

    Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems attacks has not been intensively ad- dressed yet. In particular, there have not been any analyses for real the attack bandwidth which is necessary for a significant impact on RSerPool-based services. This analysis

  6. On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack

    E-Print Network [OSTI]

    On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack Jing Jin.e. anonymity) of all anonymous networks in the presence of timing attack. Our metric is based on a novel conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer

  7. An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper cryptographic primitive of the DLP in elliptic curves over prime fields. We present a novel attack calculus methods than by attacking it directly via generic methods. The speed-up one obtains

  8. What About Vulnerability to a Fault Attack of the Miller's Algorithm During an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

  9. Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem

    E-Print Network [OSTI]

    Hess, Florian

    Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem F. Hess Technical succumb to the basic GHS attack, thereby weakening curves over F2155 further. We also discuss other possible extensions or variations of the GHS attack and conclude that they are not likely to yield further

  10. Characteristics of subalpine fir susceptible to attack by western balsam bark beetle (Coleoptera

    E-Print Network [OSTI]

    Lindgren, Staffan

    Characteristics of subalpine fir susceptible to attack by western balsam bark beetle (Coleoptera beetle (Dryocoetes confusus Swaine) predominately attacked trees from the three to four largest diameter classes at each site. However, the mean diameter of attacked trees was significantly different among sites

  11. Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key

    E-Print Network [OSTI]

    Myasnikov, Aleksey

    Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol of Technology, Hoboken, New Jersey, USA, 07030 {amyasnik,aushakov}@stevens.edu Abstract. The length based attack and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced

  12. Extracting Attack Knowledge Using Principal-subordinate Consequence Tagging Case Grammar and Alerts Semantic Networks

    E-Print Network [OSTI]

    Ansari, Nirwan

    Extracting Attack Knowledge Using Principal-subordinate Consequence Tagging Case Grammar and Alerts networks from Distributed Denial of Service (DDoS) attacks has become a critical issue that must be tackled, the overwhelming volume of alerts makes it difficult for security administrators to analyze and extract the attack

  13. Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth- jack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can--by supplying of code of her choosing. In this paper, we propose to protect code from this common form of attack using

  14. A Formal Model for A System's Attack Surface Pratyusa K. Manadhata Dilsun K. Kaynar

    E-Print Network [OSTI]

    Wing, Jeannette M.

    A Formal Model for A System's Attack Surface Pratyusa K. Manadhata Dilsun K. Kaynar Jeannette M software [18]. In this paper, we propose to use a software system's attack surface measurement as an indicator of the system's security; the larger the attack surface, the more insecure the system. We

  15. Multiple Coordinated Views for Network Attack Graphs Steven Noel Michael Jacobs Pramod Kalapa Sushil Jajodia

    E-Print Network [OSTI]

    Noel, Steven

    Multiple Coordinated Views for Network Attack Graphs Steven Noel Michael Jacobs Pramod Kalapa graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective techniques for visualizing such attack graphs

  16. On the Completeness of Attack Mutation Algorithms Shai Rubin, Somesh Jha, and Barton P. Miller

    E-Print Network [OSTI]

    Liblit, Ben

    On the Completeness of Attack Mutation Algorithms Shai Rubin, Somesh Jha, and Barton P. Miller University of Wisconsin, Madison Computer Sciences Department {shai,jha,bart}@cs.wisc.edu Abstract An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances

  17. Discovering Novel Attack Strategies from INFOSEC Xinzhou Qin and Wenke Lee

    E-Print Network [OSTI]

    Lee, Wenke

    Discovering Novel Attack Strategies from INFOSEC Alerts Xinzhou Qin and Wenke Lee College. Correlating security alerts and discovering attack strategies are impor- tant and challenging tasks for security analysts. Recently, there have been several proposed techniques to analyze attack scenarios from

  18. Attack on Private Signature Keys of the OpenPGP format, PGPTM

    E-Print Network [OSTI]

    - 1 - Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications Prague, t.rosa@decros.cz Abstract. The article describes an attack on OpenPGP format, which leads these applications must undergo the same revision as the actual program PGPTM . The success of the attack

  19. An Attack on a TraceZero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace­Zero Cryptosystem Claus Diem and Jasper Scholten Institut f?ur Experimentelle a novel attack on this primitive. We show that the DLP in the trace­zero group can always be transferred methods than by attacking it directly via generic methods. The speed­up one obtains corresponds

  20. CAT A Practical SDL Based Attack Attribution Toolkit for 3G Networks

    E-Print Network [OSTI]

    Yener, Aylin

    CAT ­ A Practical SDL Based Attack Attribution Toolkit for 3G Networks Kameswari Kotapati Peng Liu University University Park, PA 16802 Abstract-- This paper presents the Cross Infrastructure Attack telecommunication specifications. CAT analyzes vulnerabilities by generating attack graphs, which show the global

  1. High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack

    E-Print Network [OSTI]

    Merat, Francis L.

    1 High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim1 , Ju-Yeon Jo1 Polytechnic University, Brooklyn, NY 11201 ABSTRACT Protection from Distributed Denial-of-Service attacks has been of a great interest recently and substantial progress has been made for preventing some attack

  2. On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services

    E-Print Network [OSTI]

    Chang, Rocky Kow-Chuen

    On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services Yajuan Tang, Xiapu Luo,csrchang}@comp.polyu.edu.hk, qing.hui@ttu.edu Abstract--Low-rate Denial of Quality (DoQ) attacks, by send- ing intermittent bursts generalize the previous results by considering arbitrary attack intervals. We obtain two sets of new results

  3. Facility Location under Demand Uncertainty: Response to a Large-scale Bioterror Attack

    E-Print Network [OSTI]

    Dessouky, Maged

    Facility Location under Demand Uncertainty: Response to a Large-scale Bioterror Attack Abstract In the event of a catastrophic bio-terror attack, major urban centers need to effi- ciently distribute large of a hypothetical anthrax attack in Los Angeles County. Keywords: Capacitated facility location, distance

  4. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem

  5. Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu

    E-Print Network [OSTI]

    Ning, Peng

    Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu Cyber Defense Laboratory@csc.ncsu.edu, dxu@unity.ncsu.edu Abstract Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks

  6. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

  7. Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun ECE research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily restrict themselves within the boundaries

  8. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Reiter, Michael

    the measurements of meters at physically protected locations such as substations, such attacks can introduce13 False Data Injection Attacks against State Estimation in Electric Power Grids YAO LIU and PENG also defeat malicious measurements injected by attackers. In this article, we expose an unknown

  9. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Ning, Peng

    the measurements of meters at physically protected locations such as substations, such attacks can introduceFalse Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu and Peng Ning also defeat malicious measurements injected by attackers. In this paper, we expose an unknown

  10. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

  11. Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation

    E-Print Network [OSTI]

    Kundur, Deepa

    Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation Shan Liu the need to develop intelligent models of cyber-physical attacks that produce salient disruptions. In this paper, we present a foundation for the development of a class of intelligent cyber-physical attacks

  12. Dynamic Load Altering Attacks in Smart Grid Sajjad Amini, Hamed Mohsenian-Rad, and Fabio Pasqualetti

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    response and demand side management programs. It attempts to control and change certain unsecured is on attacks against demand re- sponse (DR) and demand side management (DSM) programs. DR programs are used}@ece.ucr.edu and fabiopas@engr.ucr.edu Abstract--A load altering attack (LAA) is a cyber-physical attack against demand

  13. A 2nd-Preimage Attack on AURORA-512 NTT Information Sharing Platform Laboratories, NTT Corporation

    E-Print Network [OSTI]

    A 2nd-Preimage Attack on AURORA-512 Yu Sasaki NTT Information Sharing Platform Laboratories, NTT. In this note, we present a 2nd-preimage attack on AURORA- 512, which is one of the candidates for SHA-3. Our is approximately 2290 AURORA-512 operations, which is less than the brute force attack on AURORA-512, namely, 2512

  14. PAKE-based mutual HTTP authentication for preventing phishing attacks

    E-Print Network [OSTI]

    Oiwa, Yutaka; Takagi, Hiromitsu

    2009-01-01T23:59:59.000Z

    This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

  15. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

    1989-08-08T23:59:59.000Z

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  16. Double blinding-attack on entanglement-based quantum key distribution protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-06-14T23:59:59.000Z

    We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

  17. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01T23:59:59.000Z

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  18. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design

    E-Print Network [OSTI]

    Pasqualetti, Fabio; Bullo, Francesco

    2012-01-01T23:59:59.000Z

    Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustr...

  19. Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    Toyohiro Tsurumaru

    2006-12-25T23:59:59.000Z

    In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the "discretized gaussian" intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100km reported by Diamanti et al. turns out to be insecure. Moreover it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95km.

  20. Preventing detector blinding attack and other random number generator attacks on quantum cryptography by use of an explicit random number generator

    E-Print Network [OSTI]

    Mario Stip?evi?

    2014-07-10T23:59:59.000Z

    A particularly successful detector blinding attack has been recently demonstrated on various quantum key distribution (QKD) systems, performing for the first time an undetectable and complete recovery of the key. In this paper two original contributions are given to understanding and prevention of this attack.

  1. This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.

    E-Print Network [OSTI]

    Bandettini, Peter A.

    #12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

  2. PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow, your

    E-Print Network [OSTI]

    Kasman, Alex

    PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow you feel you may go crazy, pass out, or die. What's wrong? Heart attacks? You've fallen in love? Well, maybe. But what you may be experiencing is a panic attack. What is a panic attack? You may have had

  3. 546 IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 7, JULY 2009 Is It Congestion or a DDoS Attack?

    E-Print Network [OSTI]

    Ansari, Nirwan

    546 IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 7, JULY 2009 Is It Congestion or a DDoS Attack? Amey Shevtekar and Nirwan Ansari, Fellow, IEEE Abstract--We propose a new stealthy DDoS attack model referred to as the "quiet" attack. The attack traffic consists of TCP traffic only. Widely used botnets in today's various

  4. Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks

    E-Print Network [OSTI]

    Ruj, Sushmita

    2015-01-01T23:59:59.000Z

    We model smart grids as complex interdependent networks, and study targeted attacks on smart grids for the first time. A smart grid consists of two networks: the power network and the communication network, interconnected by edges. Occurrence of failures (attacks) in one network triggers failures in the other network, and propagates in cascades across the networks. Such cascading failures can result in disintegration of either (or both) of the networks. Earlier works considered only random failures. In practical situations, an attacker is more likely to compromise nodes selectively. We study cascading failures in smart grids, where an attacker selectively compromises the nodes with probabilities proportional to their degrees; high degree nodes are compromised with higher probability. We mathematically analyze the sizes of the giant components of the networks under targeted attacks, and compare the results with the corresponding sizes under random attacks. We show that networks disintegrate faster for targeted...

  5. Time Stamp Attack on Wide Area Monitoring System in Smart Grid

    E-Print Network [OSTI]

    Zhang, Zhenghao; Li, Husheng; Pei, Changxing

    2011-01-01T23:59:59.000Z

    Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

  6. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  7. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22T23:59:59.000Z

    were killed and more than 1,200 were injured by deadly terrorist attacks on commuter trains and stations in Madrid. These attacks had an enormous impact on the citizens of Spain, as well as the entire international community. The Madrid bombings... in its ?War on Terror? may carry additional costs. One unanticipated effect of these attacks was the victory of the Socialists over the ruling Partido Popular party in Spain in the next election. More importantly, this occurrence led to a sharp...

  8. Eavesdropping Attack with Hong-Ou-Mandel Interferometer and Random Basis Shuffling in Quantum Key Distribution

    E-Print Network [OSTI]

    Chil-Min Kim; Yun Jin Choi; Young-Jai Park

    2006-03-02T23:59:59.000Z

    We introduce new sophisticated attacks with a Hong-Ou-Mandel interferometer against quantum key distribution (QKD) and propose a new QKD protocol grafted with random basis shuffling to block up those attacks. When the polarization basis is randomly and independently shuffled by sender and receiver, the new protocol can overcome the attacks even for not-so-weak coherent pulses. We estimate the number of photons to guarantee the security of the protocol.

  9. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks

    SciTech Connect (OSTI)

    Lin Song [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Wen Qiaoyan; Gao Fei [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P.O. Box 810, Chengdu 610041 (China)

    2009-05-15T23:59:59.000Z

    A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

  10. A new attack on RSA and CRT-RSA Abderrahmane Nitaj

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

  11. E-Print Network 3.0 - angioedema hae attacks Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is associated with Angioedema. ACE inhibitors... also be prescribed to patients after a heart attack or to patients with certain kind of kidney problems... inhibitors. Class a...

  12. Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography

    E-Print Network [OSTI]

    Z. L. Yuan; J. F. Dynes; A. J. Shields

    2011-06-14T23:59:59.000Z

    Semiconductor avalanche photodiodes (APDs) are commonly used for single photon detection in quantum key distribution. Recently, many attacks using bright illumination have been proposed to manipulate gated InGaAs APDs. In order to devise effective counter-measures, careful analysis of these attacks must be carried out to distinguish between incorrect operation and genuine loopholes. Here, we show that correctly-operated, gated APDs are immune to continuous-wave illumination attacks, while monitoring the photocurrent for anomalously high values is a straightforward counter-measure against attacks using temporally tailored light.

  13. E-Print Network 3.0 - attacks security mechanisms Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Information Sciences 8 The Hierarchical Threat Model of Routing Security for wireless Ad hoc Networks College of Electrical and Summary: the real capability of the attacker and...

  14. Breaking into a computer : attack techniques and tools used by cyber-criminals

    SciTech Connect (OSTI)

    None

    2010-06-24T23:59:59.000Z

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  15. The phenomenology of anger attacks and their association with past trauma.

    E-Print Network [OSTI]

    Susljik, Ina

    2010-01-01T23:59:59.000Z

    ??Anger attacks have been defined as acute episodes of intense anger that involve activation of autonomic arousal similar to that experienced in anxiety. The experience (more)

  16. E-Print Network 3.0 - attack wastewater utilities Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wastewater utilities Search Powered by Explorit Topic List Advanced Search Sample search results for: attack wastewater utilities Page: << < 1 2 3 4 5 > >> 1 Treated domestic...

  17. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06T23:59:59.000Z

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  18. Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin

    E-Print Network [OSTI]

    Austin, Todd M.

    a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

  19. High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.

    E-Print Network [OSTI]

    Kleiman, Elizabeth

    2010-01-01T23:59:59.000Z

    ??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key (more)

  20. E-Print Network 3.0 - attack cellular handling Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information for use in a later attack. Lastly, ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 30 Breaking Up Is Hard To...

  1. Perceived Threat of a Heart Attack among Mexican Americans with Cardiovascular Disease Risk.

    E-Print Network [OSTI]

    Florez, Elizabeth

    2013-01-01T23:59:59.000Z

    ??Compared to the general population, Mexican Americans are at greater risk for cardiovascular disease (CVD) events, such as heart attack, due to the high prevalence (more)

  2. THE WILLINGNESS TO PAY FOR THE DETECTION AND TREATMENT OF VULNERABLE PLAQUE RELATED TO HEART ATTACKS.

    E-Print Network [OSTI]

    Ryan, Patricia L.

    2007-01-01T23:59:59.000Z

    ??Recent medical studies have led cardiologists to revise theories regarding the cause of heart attacks. Rather than a gradual clogging of the arteries, eruption of (more)

  3. E-Print Network 3.0 - attack host aphids Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    with generalist predators including Harmonia axyridis... beetle (Harmonia axyridis Pallas) attacking soybean aphid (Aphis glycines Matsumura) (Photo: D. A. Landis... of the...

  4. E-Print Network 3.0 - angle of attack Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Information Sciences 58 NAVIERSTOKES ANALYSIS OF SUBSONIC FLOWFIELDS OVER A MISSILE CONFIGURATION Summary: configuration are computed at high angles of attack ranging...

  5. An Adaptive Selective Defense for Application Layer DDoS Attacks

    E-Print Network [OSTI]

    Nigam, Vivek

    , Capital One, Fifth29 Third Bank, BB&T, and HSBC. They have still been suffering attacks from a30 a foreign

  6. URL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectric Coop,Save Energy Now Jump to:Development ReportsAssessments

  7. To link to this article: DOI: 10.1016/j.powtec.2010.08.046 URL : :http://dx.doi.org/10.1016/j.powtec.2010.08.046

    E-Print Network [OSTI]

    Mailhes, Corinne

    , laser thermal diffusivity and high- temperature dilatometry measurements were performed on samplesTo link to this article: DOI: 10.1016/j.powtec.2010.08.046 URL : :http://dx.doi.org/10.1016/j of thinner particles when the doping amount increases. In order to determine the specific heat, the thermal

  8. Citation: K. Nakamura et al. (Particle Data Group), JP G 37, 075021 (2010) and 2011 partial update for the 2012 edition (URL: http://pdg.lbl.gov) Higgs Bosons --H0

    E-Print Network [OSTI]

    for the 2012 edition (URL: http://pdg.lbl.gov) Higgs Bosons -- H0 and H± , Searches for A REVIEW GOES HERE ­ Check our WWW List of Reviews STANDARD MODEL H0 (Higgs Boson) MASS LIMITSSTANDARD MODEL H0 (Higgs Boson) MASS LIMITSSTANDARD MODEL H0 (Higgs Boson) MASS LIMITSSTANDARD MODEL H0 (Higgs Boson) MASS LIMITS

  9. Islamists claim deadly attack on UN building in Nigeria 26 August 2011

    E-Print Network [OSTI]

    in a decade. A radical Muslim sect blamed for a series of attacks in the country claimed responsibility the targeting of the U.N. at an open meeting on U.N. peacekeeping. U.S. President Barack Obama called the attack on which the U.N. was founded _ dignity, freedom, security, and peace," Obama said in a statement. "An

  10. Rough Set Dependency Analysis in Evaluation Studies An Application in the Study of Repeated Heart Attacks

    E-Print Network [OSTI]

    Düntsch, Ivo

    of repeated heart attacks. 1 Introduction In many cases it is not possible to obtain complete ­ or certain analysis can be applied to an investi- gation into the causes of repeated heart attacks con- ductedRough Set Dependency Analysis in Evaluation Studies ­ An Application in the Study of Repeated Heart

  11. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks

    E-Print Network [OSTI]

    Lui, John C.S.

    Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li: cslui@cse.cuhk.edu.hk Abstract--Pollution attack is a severe security problem in network-coding enabled spreading of polluted packets to deplete network resources. We address this security problem even when

  12. Hearing is Believing: Detecting Mobile Primary User Emulation Attack in White Space

    E-Print Network [OSTI]

    California at Davis, University of

    users in white space: TV towers and wireless microphones. Existing work on PUE attack detection focused on the first category. However, for the latter category, primary users are mobile and their transmission power on the attackers that emulate stationary primary users (TV towers). They are based on the fact that the locations

  13. A new key recovery attack on the ANSI retail MAC Chris J. Mitchell

    E-Print Network [OSTI]

    Mitchell, Chris

    A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

  14. Cyber-Physical Systems under Attack Models, Fundamental limitations, and Monitor Design

    E-Print Network [OSTI]

    Hu, Fei

    Pasqualetti Florian D¨orfler Francesco Bullo Center for Control, Dynamical systems and Computation University, FL, Dec 11, 2011 F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security-efficient buildings (heat transfer) F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security

  15. AnKLe: Detecting Attacks in Large Scale Systems via Information Emmanuelle Anceaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback- Leibler divergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

  16. AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence

    E-Print Network [OSTI]

    Boyer, Edmond

    AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback-Leibler di- vergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

  17. Phase-remapping attack in practical quantum-key-distribution systems

    SciTech Connect (OSTI)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

    2007-03-15T23:59:59.000Z

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

  18. Source Location Privacy against Laptop-Class Attacks in Sensor Networks

    E-Print Network [OSTI]

    Liu, Donggang

    it is then possible for them to interfere with the phenomena being sensed or even mount physical attacks on the mon- sages sent periodically to hide real event reports. The global and greedy solutions improve the naive towards a base station to report this event. Note that an attacker can easily detect the transmission

  19. A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL

    E-Print Network [OSTI]

    A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL Gregory V. Bard.bard@ieee.org Keywords: Blockwise Adaptive, Chosen Plaintext Attack (CPA), Secure Sockets Layer (SSL), Transport Layer). Abstract: This paper introduces a chosen-plaintext vulnerability in the Secure Sockets Layer (SSL

  20. Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3

    E-Print Network [OSTI]

    Jagannatham, Aditya K.

    #12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

  1. A Generalization of the Rainbow Band Separation Attack and its Applications to

    E-Print Network [OSTI]

    Recovery Attack, Rainbow, Enhanced STS, Enhanced TTS, MFE, Diophantine Equations, MQQ-Enc, MQQ-Sig 1-trivial generaliza- tion of the well known Unbalanced Oil and Vinegar (UOV) signature scheme (Eurocrypt '99) minimizing the length of the signatures. By now the Rainbow Band Separation attack is the best key recovery

  2. Impact Analysis of Transient Stability Due to Cyber Attack on FACTS Devices

    E-Print Network [OSTI]

    Kundur, Deepa

    and distribution systems [2]. There- fore, cyber security is becoming an important R&D concern for smart grid. Many attack, cyber security, smart grids, SVC, STATCOM, FACTS, transient stability, voltage support device I are not designed to be adequately protected from cyber attack, these applications introduce numerous cyber security

  3. THE ANALYSYS OF INFORMATION IMPACTS IN COORDINATING DEFENCE AGAINST MALICIOUS ATTACKS FOR INTERCONNECTED

    E-Print Network [OSTI]

    Gross, George

    FOR INTERCONNECTED POWER SYSTEMS Ettore Bompard George Gross Roberto Napoli Fei Xue Politecnico di Torino University) in an interconnected power system to counteract such attacks has become an important problem. This paper presents to the interconnected system operators on the outcomes of the decision making process under attack. A 34-buses test

  4. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines

    E-Print Network [OSTI]

    Shilton, Alistair

    concerning energy . In this article, we propose a centralized intrusion detection scheme based on SupportDetecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines Vector Machines (SVMs) and sliding windows. We find that our system can detect black hole attacks

  5. Real-Time Detection of Packet Drop Attacks on Synchrophasor Data

    E-Print Network [OSTI]

    Sikdar, Biplab

    , NY, 12180 Abstract--The importance of phasor measurement unit (PMU) or synchrophasor data towardsReal-Time Detection of Packet Drop Attacks on Synchrophasor Data Seemita Pal, Biplab Sikdar and Joe attack, where the adversary arbitrarily drops packets with synchrophasor data. This paper develops a real

  6. Sustaining Availability of Web Services under Distributed Denial of Service Attacks

    E-Print Network [OSTI]

    Vigoda, Eric

    ;ective and practical countermeasure that allows a victim system or network to sustain high availabilitySustaining Availability of Web Services under Distributed Denial of Service Attacks #3; Jun Xu defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect

  7. RISK MANAGEMENT AND RISK ANALYSIS-BASED DECISION TOOLS FOR ATTACKS ON

    E-Print Network [OSTI]

    Wang, Hai

    RISK MANAGEMENT AND RISK ANALYSIS- BASED DECISION TOOLS FOR ATTACKS ON ELECTRIC POWER Simonoff, J.usc.edu/create Report #04-004DRAFT #12;Risk Management and Risk Analysis-Based Decision Tools for Attacks on Electric for Risk and Economic Analysis of Terrorism Events University of Southern California Los Angeles

  8. Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices

    E-Print Network [OSTI]

    Kundur, Deepa

    Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices Bo Chen--Cyber security is becoming a major concern of smart grids, as the functionality of a smart grid is highly on smart grids. This paper discusses several types of cyber attacks. Then, it presents results of studies

  9. THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS

    E-Print Network [OSTI]

    Wang, Hai

    THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES-LONG BEACH Gordon, P.usc.edu/create Report #05-012DRAFT #12;THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES International Airport (LAX), downtown high-rises, its theme parks, its freeways, and its ports, among many

  10. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of control system elements, such as PLCs. In this paper, we design and implement the Crysys PLC honeypot (CryPLH) system to detect targeted attacks against industrial control systems. This PLC honeypot can

  11. Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design

    E-Print Network [OSTI]

    Pasqualetti, Fabio; Bullo, Francesco

    2011-01-01T23:59:59.000Z

    Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and advanced monitoring procedures to detect and identify network components malfunction or measurements corruption caused by an omniscient adversary. We model a power system under cyber-physical attack as a linear time-invariant descriptor system with unknown inputs. Our attack model generalizes the prototypical stealth, (dynamic) false-data injection and replay attacks. We characterize the fundamental limitations of both static and dynamic procedures for attack detection and identification. Additionally, we design provably-correct (dynamic) detection and identification procedures based on tools from geometric control theory. Finally, we illustrate the effectiveness of our method through a comparison with existing (static) detection algorithms, and through a numerical study.

  12. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19T23:59:59.000Z

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  13. Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol

    SciTech Connect (OSTI)

    Tsurumaru, Toyohiro [Mitsubishi Electric Corporation, Information Technology R and D Center, 5-1-1 Ofuna, Kamakura-shi, Kanagawa, 247-8501 (Japan)

    2007-06-15T23:59:59.000Z

    In this paper, we discuss the security of the differential-phase-shift quantum-key-distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. [Phys. Rev. A 73, 012344 (2006)]. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the 'discretized Gaussian' intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100 km reported by Diamanti et al. [Opt. Express 14, 13073 (2006)] turns out to be insecure. Moreover, it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95 km.

  14. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31T23:59:59.000Z

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  15. Abstract Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and

    E-Print Network [OSTI]

    Abstract Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus

  16. 4698 Biochemistry 1993, 32, 4698-4701 Sequence-Specific Cleavage of DNA via Nucleophilic Attack of Hydrogen

    E-Print Network [OSTI]

    Tullius, Thomas D.

    4698 Biochemistry 1993, 32, 4698-4701 Sequence-Specific Cleavage of DNA via Nucleophilic Attack by oxidative damage of the DNA backbone but instead is the result of nucleophilic attack by peroxide. A singleSaccharomyces cerevisae, whichactivatesthephosphodiester for attack by thediffusible smallnucleophile. While Flp

  17. Gas-Phase Electrophilic Attack of a Double Bond Exhibits Stereoselectivity Philip S. Mayer and Thomas Hellman Morton*

    E-Print Network [OSTI]

    Morton, Thomas Hellman

    Gas-Phase Electrophilic Attack of a Double Bond Exhibits Stereoselectivity Philip S. Mayer alkoxycarbenium ions in solution, which then attack allylsilanes (X ) CH2,Y ) CH3),3 followed by departure ethers via internal attack by oxygen.4 In other instances (cf. the Mukaiyama aldol condensation,5 where X

  18. New side-channel attack against scan chains Jean Da Rolt, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    New side-channel attack against scan chains Jean Da Rolt, Giorgio Di Natale, Marie-Lise Flottes jeopardize the overall security. Several scan-based attacks on cryptographic functions have been described and shown the need for secure scan implementations. These attacks assume a single scan chain. However

  19. A Scan-based Attack on Elliptic Curve Cryptosystems in presence of Industrial Design-for-Testability Structures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Scan-based Attack on Elliptic Curve Cryptosystems in presence of Industrial Design-based attack on hardware implementations of Elliptic Curve Cryptosystems (ECC). Several up-to-date Design aspects of the proposed scan-based attack are described, namely timing and leakage analysis that allows

  20. A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs and Ingrid Verbauwhede1,2

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs Kris Tiri1 and Ingrid Verbauwhede1 VLSI design flow to create secure, side-channel attack (SCA) resistant integrated circuits. The design standard cell design flow. We discuss the basis for side-channel attack resistance and adjust the library

  1. Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree

    E-Print Network [OSTI]

    Teske, Edlyn

    Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields, we analyze the Gaudry-Hess-Smart (GHS) Weil descent attack on the elliptic curve discrete logarithm with these parameters; and (ii) the GHS attack is more e?cient for solving the ECDLP in E(F 2 N ) than for solving

  2. State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures

    E-Print Network [OSTI]

    Schaumont, Patrick

    , USA Abstract--Implementations of cryptographic primitives are vulnerable to physical attacks. While and up-to-date table of physical attacks and countermeasures is of paramount importance to system designers. This paper summarizes known physical attacks and counter- measures on Elliptic Curve

  3. Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01T23:59:59.000Z

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

  4. Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis

    E-Print Network [OSTI]

    Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

    2012-01-01T23:59:59.000Z

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

  5. Blocking Objectionable Web Content by Leveraging Multiple Information Sources Nitin Agarwal

    E-Print Network [OSTI]

    Liu, Huan

    that has very little tex- tual content), URL redirection to some websites, or directly typing (porn websites). Second, the number of positive instances (say, porn websites) is often sig- nificantly less than

  6. STRESS WAVE EMISSION AND FRACTURE OF PRESTRESSED CONCRETE REACTOR...

    Office of Scientific and Technical Information (OSTI)

    PRESTRESSED CONCRETE REACTOR VESSEL MATERIALS. Re-direct Destination: Temp Data Fields Green, A.T. Temp Data Storage 3: Aerojet-General Corp., Sacramento, Calif. Short URL for...

  7. RECOVERY OF URANIUM FROM ORE CONCENTRATES | OSTI, US Dept of...

    Office of Scientific and Technical Information (OSTI)

    Re-direct Destination: Temp Data Fields Sheft, I.; Hyman, H.H.; Katz, J.J. Temp Data Storage 3: Argonne National Lab., Lemont, Ill' Short URL for this Page http:t.osti.gov3r7...

  8. EIGEN COUPLING FACTORS AND PRINCIPAL COMPONENTS, THE THERMODYNAMIC...

    Office of Scientific and Technical Information (OSTI)

    OF PIEZOELECTRICITY Re-direct Destination: Temp Data Fields Baerwald, H G Temp Data Storage 3: Sandia Corp., Albuquerque, N. Mex. Short URL for this Page http:t.osti.gov3rv...

  9. THE MELTING OF HIGH PURITY URANIUM | OSTI, US Dept of Energy...

    Office of Scientific and Technical Information (OSTI)

    OF HIGH PURITY URANIUM Re-direct Destination: Temp Data Fields Blumenthal, B. Temp Data Storage 3: Argonne National Lab., Lemont, Ill. Short URL for this Page http:t.osti.gov3rL...

  10. A REPORT ON CRITICAL DIMENSIONS OF CYLINDERS | OSTI, US Dept...

    Office of Scientific and Technical Information (OSTI)

    DIMENSIONS OF CYLINDERS Re-direct Destination: Temp Data Fields Keen, R. C. Temp Data Storage 3: Oak Ridge National Lab., TN (US) Short URL for this Page http:t.osti.gov3rH...

  11. HRP-CP: SUMMARY OF DESIGN CRITERIA AND PURPOSES OF LOOP 3-SOLID...

    Office of Scientific and Technical Information (OSTI)

    SEPARATOR LOOP Re-direct Destination: Temp Data Fields Carter, W. L. Temp Data Storage 3: Oak Ridge National Lab., TN (US) Short URL for this Page http:t.osti.gov3r6...

  12. Redirection of metabolism for hydrogen production

    SciTech Connect (OSTI)

    Harwood, Caroline S.

    2011-11-28T23:59:59.000Z

    This project is to develop and apply techniques in metabolic engineering to improve the biocatalytic potential of the bacterium Rhodopseudomonas palustris for nitrogenase-catalyzed hydrogen gas production. R. palustris, is an ideal platform to develop as a biocatalyst for hydrogen gas production because it is an extremely versatile microbe that produces copious amounts of hydrogen by drawing on abundant natural resources of sunlight and biomass. Anoxygenic photosynthetic bacteria, such as R. palustris, generate hydrogen and ammonia during a process known as biological nitrogen fixation. This reaction is catalyzed by the enzyme nitrogenase and normally consumes nitrogen gas, ATP and electrons. The applied use of nitrogenase for hydrogen production is attractive because hydrogen is an obligatory product of this enzyme and is formed as the only product when nitrogen gas is not supplied. Our challenge is to understand the systems biology of R. palustris sufficiently well to be able to engineer cells to produce hydrogen continuously, as fast as possible and with as high a conversion efficiency as possible of light and electron donating substrates. For many experiments we started with a strain of R. palustris that produces hydrogen constitutively under all growth conditions. We then identified metabolic pathways and enzymes important for removal of electrons from electron-donating organic compounds and for their delivery to nitrogenase in whole R. palustris cells. For this we developed and applied improved techniques in 13C metabolic flux analysis. We identified reactions that are important for generating electrons for nitrogenase and that are yield-limiting for hydrogen production. We then increased hydrogen production by blocking alternative electron-utilizing metabolic pathways by mutagenesis. In addition we found that use of non-growing cells as biocatalysts for hydrogen gas production is an attractive option, because cells divert all resources away from growth and to hydrogen. Also R. palustris cells remain viable in a non-growing state for long periods of time.

  13. Small Business Programs Office Home Page - Redirect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System Highlights Success StoriesSiteTransfer

  14. Help:Redirects | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpen EnergyBoard" form.GuizhouCategoriesMagicProtecting

  15. Widget:DatasetsRedirect | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: SaltTroyer &AnchorText Jump to:generates

  16. Widget:GeneralRedirect | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: SaltTroyer

  17. E-Print Network 3.0 - acute asthma attack Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Is there a written, asthma action plan for each child in case of a severe asthma episode (attack)? Does the plan make... NatioNal Heart, luNg aNd Blood iNstitute National Asthma...

  18. Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design

    E-Print Network [OSTI]

    Bullo, Francesco

    the prototypical stealth, (dynamic) false-data injection and replay attacks. We characterize the fundamental]. The development of security This material is based in part upon work supported by NSF grants IIS- 0904501 and CPS

  19. Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2006-02-24T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

  20. An immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol

    E-Print Network [OSTI]

    Osamu Hirota; Kaoru Kurosawa

    2006-04-06T23:59:59.000Z

    This paper presents the security analysis on the quantum stream cipher so called Yuen-2000 protocol (or $\\alpha\\eta$ scheme) against the fast correlation attack, the typical attack on stream ciphers. Although a very simple experimental model of the quantum stream cipher without a random mapper may be decrypted in the information theoretic sense by the fast correlation algorithm, it is not a basic feature of Yuen 2000 protocol. In fact, we clarify that there exists a randomization scheme which attains the perfect correlation immunity against such attacks under an approximation. And in this scheme, the running key correlation from the second randomization that determines the mapping patterns is dismissed also by quantum noise. In such a case, any fast correlation attack does not work on the quantum stream cipher.

  1. Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2005-08-03T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

  2. DEFENDING AGAINST PHYSICAL DESTRUCTION ATTACKS ON WIRELESS SENSOR Chi Zhang, Yanchao Zhang, Yuguang Fang

    E-Print Network [OSTI]

    Zhang, Yanchao

    with stealth by moving across the ROI. Physical attacks are inevitable threats in WSNs: they are relatively, and should be an inseparable complementarity of the report about the observed events in the ROI. Secondly

  3. Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying ...

  4. WADeS: a tool for Distributed Denial of Service Attack detection

    E-Print Network [OSTI]

    Ramanathan, Anu

    2002-01-01T23:59:59.000Z

    The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the network...

  5. E-Print Network 3.0 - attacks cancer cells Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cancer cells Search Powered by Explorit Topic List Advanced Search Sample search results for: attacks cancer cells Page: << < 1 2 3 4 5 > >> 1 Promising new drugs to treat cancer...

  6. Differential-phase-shift quantum key distribution with phase modulation to combat sequential attacks

    SciTech Connect (OSTI)

    Kawahara, Hiroki; Oka, Toru; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

    2011-11-15T23:59:59.000Z

    Phase-modulated differential-phase-shift (DPS) quantum key distribution (QKD) is presented for combating sequential attacks that most severely restrict the DPS-QKD system distance. Slow phase modulation imposed onto the DPS signal obstructs the optimum unambiguous state discrimination measurement conducted in the sequential attack and improves the QKD distance as a result. The condition with which the phase modulation does not degrade the DPS-QKD system performance is also described.

  7. Beamsplitting attack to the revised KKKP protocol and a possible solution

    E-Print Network [OSTI]

    Xiang-Bin Wang; Qiang Zhang; Yu-Ao Chen; Wong-Young Hwang; Myungshik Kim; Jian-Wei Pan

    2006-03-15T23:59:59.000Z

    We show that the revised KKKP protocol proposed by Kye and Kim [Phys. Rev. Lett. 95,040501(2005)] is still insecure with coherent states by a type of beamsplitting attack. We then further revise the KKKP protocol so that it is secure under such type of beamsplitting attack. The revised scheme can be used for not-so-weak coherent state quantum key distribution.

  8. Dissipation attack on Bennett-Brassard 1984 protocol in practical quantum key distribution system

    E-Print Network [OSTI]

    Li Yang; Bing Zhu

    2013-05-24T23:59:59.000Z

    We propose a new kind of individual attack, based on randomly selected dissipation, on Bennett-Brassard 1984 protocol of practical quantum key distribution (QKD) system with lossy and noisy quantum channel. Since an adversary with super quantum channel can disguise loss and errors induced by his attack as that of the system, he can obtain innegligible amount of information for a practical QKD system, without being detected by legal participants.

  9. Efficiency of attack strategies on complex model and real-world networks

    E-Print Network [OSTI]

    Bellingeri, Michele; Vincenzi, Simone

    2013-01-01T23:59:59.000Z

    We investigated the efficiency of attack strategies to network nodes when targeting several complex model and real-world networks. We tested 5 attack strategies, 3 of which were introduced in this work for the first time, to attack 3 model (Erdos and Renyi, Barabasi and Albert preferential attachment network, and scale-free network configuration models) and 3 real networks (Gnutella peer-to-peer network, email network of the University of Rovira i Virgili, and immunoglobulin interaction network). Nodes were removed sequentially according to the importance criterion defined by the attack strategy. We used the size of the largest connected component (LCC) as a measure of network damage. We found that the efficiency of attack strategies (fraction of nodes to be deleted for a given reduction of LCC size) depends on the topology of the network, although attacks based on the number of connections of a node and betweenness centrality were often the most efficient strategies. Sequential deletion of nodes in decreasin...

  10. 898 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 3, MARCH 2012 Most Active Band (MAB) Attack and Countermeasures in a

    E-Print Network [OSTI]

    Yang, Eui-Hyeok

    ) Attack and Countermeasures in a Cognitive Radio Network Nansai Hu, Student Member, IEEE, Yu-Dong Yao, Fellow, IEEE, and Joseph Mitola, Fellow, IEEE Abstract--This paper investigates a type of attacks on a cognitive radio (CR) network, most active band (MAB) attack, where an attacker or a malicious CR node senses

  11. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  12. 31/08/2010 13:44A misguided attack on kin selection Why Evolution Is True Page 1 of 15http://whyevolutionistrue.wordpress.com/2010/08/30/a-misguided-attack-on-kin-selection/

    E-Print Network [OSTI]

    Gardner, Andy

    31/08/2010 13:44A misguided attack on kin selection « Why Evolution Is True Page 1 of 15http://whyevolutionistrue.wordpress.com/2010/08/30/a-misguided-attack-on-kin-selection/ « I swear I was Egyptian! Relevant readings » A misguided attack on kin selection I don't know what's gotten into E. O. Wilson. He's certainly the world

  13. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22T23:59:59.000Z

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  14. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Fei Gao; Su-Juan Qin; Fen-Zhuo Guo; Qiao-Yan Wen

    2011-04-20T23:59:59.000Z

    Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e. the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. At last, the root of this insecurity and a possible way to improve these protocols are discussed.

  15. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  16. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  17. Deterministic quantum-public-key encryption: forward search attack and randomization

    E-Print Network [OSTI]

    Georgios M. Nikolopoulos; Lawrence M. Ioannou

    2009-03-27T23:59:59.000Z

    In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

  18. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles [ORNL; Beaver, Justin M [ORNL; Buckner, Mark A [ORNL; Morris, Thomas [Mississippi State University (MSU); Adhikari, Uttam [ORNL; Pan, Shengyi [Mississippi State University (MSU)

    2014-01-01T23:59:59.000Z

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  19. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08T23:59:59.000Z

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  20. Predicting the effect of climate change on wildfire behavior and initial attack success

    SciTech Connect (OSTI)

    Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

    2007-12-01T23:59:59.000Z

    This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

  1. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  2. An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States

    E-Print Network [OSTI]

    Wang, Hai

    facilities in the United States (U.S.) arises from the opening of the Trinidad LNG liquefaction plant in 1999An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States #12;An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States 3

  3. IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading

    E-Print Network [OSTI]

    Kundur, Deepa

    IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid Shan Liu, Bo Chen, Takis Zourntos, Deepa Kundur, and Karen Butler-Purry Abstract--This paper explores distributed smart grid attack strategies to destabilize power system

  4. Abstract--Network security against possible attacks involves making decisions under uncertainty. Not only may one be

    E-Print Network [OSTI]

    ], security in wireless networks [12], [13] and cyber-security [14], [15], [16]. In [17] the readers can find1 Abstract--Network security against possible attacks involves making decisions under uncertainty for a further DDoS (Distributed Denial of Service) botnet attack on servers). Due to limited defense

  5. Low-Power Side-Channel Attack-Resistant Asynchronous S-Box Design for AES Cryptosystems

    E-Print Network [OSTI]

    Ayers, Joseph

    function with an invertible affine transformation in order to avoid attacks based on mathematics. A block combinational S-Box (substitution box) design for AES (Advanced Encryption Standard) cryptosystems is proposed less in- formation against side-channel attacks such as differential power/noise analysis. Functional

  6. Citation: K. Nakamura et al. (Particle Data Group), JP G 37, 075021 (2010) and 2011 partial update for the 2012 edition (URL: http://pdg.lbl.gov) f1(1285) IG (JPC ) = 0+(1 + +)

    E-Print Network [OSTI]

    1278 ± 2 140 ARMSTRONG 89 OMEG 300 p p K K p p 1278 ± 2 ARMSTRONG 89G OMEG 85 + p 4p, p p 4p p 1280 SPEC 6.6 p p K K X 1285 ± 2 CHUNG 85 SPEC 8 - p N K K 1279 ± 2 604 ARMSTRONG 84 OMEG 85 + p K K p update for the 2012 edition (URL: http://pdg.lbl.gov) 1282 ± 4 ARMSTRONG 93C E760 p p 0 6 1270 ± 6 ±10

  7. The Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC

    E-Print Network [OSTI]

    California at Davis, University of

    Xiaoming Lu, Matt Spear, Karl Levitt and S. Felix Wu Department of Computer Science UC Davis, Davis, CAThe Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC Protocols, many listen- sleep Medium Access Control (MAC) protocols have been pro- posed to reduce energy

  8. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  9. "How many zombies do you know?" Using indirect survey methods to measure alien attacks and outbreaks

    E-Print Network [OSTI]

    Gelman, Andrew

    "How many zombies do you know?" Using indirect survey methods to measure alien attacks applicable to zombies or, for that matter, ghosts, aliens, angels, and other hard-to-reach entities; for example, what if your wife2 is actually a zombie or an alien and you are not aware of the fact. This 2

  10. Thermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans

    E-Print Network [OSTI]

    Gurumurthi, Sudhanva

    temperature, known as the thermal envelope. Exceeding the thermal envelope decreases the drive's reliability relationship between disk RPM and viscous heating. If the drive exceeds the thermal envelope, the drive canThermal Attacks on Storage Systems Nathanael Paul Sudhanva Gurumurthi David Evans University

  11. A Novel Probabilistic Passive Attack on the Protocols HB and HB+ Jose Carrijo

    E-Print Network [OSTI]

    on the BKW algorithm [8]. The problem is attacked by using Gaussian elimination method in samples of sequences with -percent error. However, the computational complexity of BKW and the amount of captured tran method does not have this limitation. It requires much less captured transcripts than BKW

  12. Attack Injection for Performance and Dependability Assessment of Ad hoc Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Attack Injection for Performance and Dependability Assessment of Ad hoc Networks Jes´us Friginal, ddandres, pgil}@disca.upv.es Abstract Ad hoc networks are wireless, self-configuring and self- maintaining in this domain has been based on simulation, thus obviating aspects influencing the behav- ior of real ad hoc

  13. Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon McCoy, Brian Kantor,

    E-Print Network [OSTI]

    Hu, Fei

    -computerized attacks as well (e.g., cutting the brake lines). This situation suggests a significant gap in knowledge distributed com- puter systems comprising millions of lines of code execut- ing on tens of heterogeneous network can circumvent all computer control systems, including safety critical elements such as the brakes

  14. Influence of recycled fine aggregates on the resistance of mortars to magnesium sulfate attack

    SciTech Connect (OSTI)

    Lee, Seung-Tae [Department of Civil Engineering, Kunsan National University, 68 Miryong-dong, Kunsan, Jeonbuk 573-701 (Korea, Republic of)], E-mail: stlee@kunsan.ac.kr

    2009-08-15T23:59:59.000Z

    The influence of recycled fine aggregates, which had been reclaimed from field-demolished concretes, on the resistance of mortar specimens to magnesium sulfate attack was investigated. Mortar specimens were prepared with recycled fine aggregates at different replacement levels (0%, 25%, 50%, 75% and 100% of natural fine aggregate by mass). The mortar specimens were exposed to 4.24% magnesium sulfate solution for about 1 year at ambient temperature, and regularly monitored for visual appearance, compressive strength loss and expansion. Additionally, in order to identify products of magnesium sulfate attack, mortar samples incorporating 0%, 25% and 100% replacement levels of the recycled fine aggregates were examined by X-ray diffraction (XRD) technique. Experimental results confirmed that the use of recycled fine aggregates up to a maximum 50% replacement level is effective under severe magnesium sulfate environment, irrespective of type of recycled fine aggregates. However, the worse performance was observed in mortar specimens incorporating 100% replacement level. It was found that the water absorption of recycled fine aggregates affected deterioration of mortar specimens, especially at a higher replacement level. XRD results indicated that the main cause of deterioration of the mortar specimens was primarily due to the formation of gypsum and thaumasite by magnesium sulfate attack. In addition, it appeared that the conversion of C-S-H into M-S-H by the attack probably influenced mechanical deterioration of mortar specimens with recycled fine aggregates.

  15. Passive faraday mirror attack in practical two-way quantum key distribution system

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2012-03-04T23:59:59.000Z

    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

  16. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol

    E-Print Network [OSTI]

    Xiang-Chun Ma; Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2014-03-04T23:59:59.000Z

    We present the wavelength attack on a practical continuous-variable quantum-key-distribution system with a heterodyne protocol, in which the transmittance of beam splitters at Bob's station is wavelength-dependent. Our strategy is proposed independent of but analogous to that of Huang et al. [arXiv: 1206.6550v1 [quant-ph

  17. Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system

    SciTech Connect (OSTI)

    Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

    2011-06-15T23:59:59.000Z

    The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

  18. Risky Business? Lethal Attack by a Jaguar Sheds Light on the Costs of Predator Mobbing

    E-Print Network [OSTI]

    Bermingham, Eldredge

    mobbing and the functional significance of this behavior remain poorly understood. Here, we report a fatal as mobbing, consists of several patterns of behavior including approaches, loud vocalizations, and physical attacks. Despite the fact that mobbing is known in numerous species of birds and mammals (Curio

  19. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

  20. Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma

    E-Print Network [OSTI]

    Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma , Ondej Pokorn1 and Toms Rosa2, 1 ICZ on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding- secret can decrypt the whole captured SSL/TLS session. We show that incorporating a version number check

  1. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

  2. Distributed Internet-based Load Altering Attacks against Smart Power Grids

    E-Print Network [OSTI]

    Mohsenian-Rad, Hamed

    technology in advanced demand side management and given the growth in power consumption in the computation by compromising direct load control command signals, demand side management price signals, or cloud computation distribution system. Keywords: Smart grid security, Internet-based load altering attacks, demand side

  3. November 5, 2002 Lessons Drawn From Attack on Pentagon May Stay Secret

    E-Print Network [OSTI]

    Hoffmann, Christoph M.

    workers were killed -- contained the blast and fires well enough to allow nearly everyone who survived the initial impact from the hijacked jetliner to escape. Just three days after the crash, a blast expert the attack's effect on the building. At the trade center, it took an investigative team weeks to assemble

  4. On the Capacity Game of Private Fingerprinting Systems under Collusion Attacks

    E-Print Network [OSTI]

    Merhav, Neri

    On the Capacity Game of Private Fingerprinting Systems under Collusion Attacks Anelia Somekh;ngerprints in order not to be detected. Their action is modelled by a multiple access channel (MAC- Capacity, coding with side information, error exponents, information hiding, MMI decoder, private

  5. A Forgery Attack against PANDA-s Yu Sasaki and Lei Wang

    E-Print Network [OSTI]

    A Forgery Attack against PANDA-s Yu Sasaki and Lei Wang NTT Secure Platform Laboratories, Japan claim that PANDA-s, which is one of the designs of the PANDA-family, provides 128-bit security is computed by Ci Pir. Finally, by taking the 7-block state value after the associated data #12

  6. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin

    E-Print Network [OSTI]

    Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O¨urich, Switzerland srdjan.capkun@inf.ethz.ch Abstract Bitcoin is a decentralized payment system that is based on Proof-of-Work. Bitcoin is currently gaining popularity as a digital currency; several businesses

  7. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)

    E-Print Network [OSTI]

    Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack Abstract A widespread security claim of the Bitcoin system, presented in the original Bitcoin white, as the distributed Bitcoin network is ideally supposed to be. Propagation of the at- tacker's block can

  8. A Denial of Service Attack against Fair Computations using Bitcoin Deposits

    E-Print Network [OSTI]

    A Denial of Service Attack against Fair Computations using Bitcoin Deposits Jethro Beekman July 2014 Abstract Bitcoin supports complex transactions where the recipient of a transaction can") and Bentov and Kumaresan [3] (Protocol "BK") describe multi-party computation schemes in which Bitcoin

  9. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  10. RISK-SENSITIVE CONTROL UNDER A MARKOV MODULATED DENIAL-OF-SERVICE ATTACK MODEL

    E-Print Network [OSTI]

    Antsaklis, Panos

    of new IT technology, solutions that ensure security against malicious cyber attacks will gain even more control systems and banking/finance sectors (see references [1]-[6]). The issue of security more interconnected and complex in terms of dynamics, distributed structure with a continued deployment

  11. Modeling and Designing Network Defense against Control Channel Jamming Attacks: A

    E-Print Network [OSTI]

    Poovendran, Radha

    . Keywords: Cyber-physical system, Node capture attacks, Security, Control- channel jamming, Passivity 1, University of Washington, Seattle, WA, 98195, USA {leep3, awclark, lb2, rp3}@uw.edu Abstract. Cyber-physical systems rely on distributed embedded wire- less nodes for sensing, computation, and control, often leaving

  12. Minimax Control For Cyber-Physical Systems under Network Packet Scheduling Attacks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Minimax Control For Cyber-Physical Systems under Network Packet Scheduling Attacks Yasser Shoukry. Unfortunately, this re- liance on networks also brings new security vulnerabilities for con- trol systems. We and distribute reprints for Governmental purposes notwith- standing any copyright notation thereon. The views

  13. Attacks on AURORA-512 and the Double-MIX Merkle-Damgard Transform

    E-Print Network [OSTI]

    Attacks on AURORA-512 and the Double-MIX Merkle-Damg°ard Transform Niels Ferguson1 and Stefan Lucks are able to find 2nd pre-images for AURORA-512 in time 2291 , and collisions in time 2234.4 . A limited-memory variant finds collisions in time 2249 . 1 Introduction and Overview AURORA is a family of cryptographic

  14. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  15. TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

  16. An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems

    E-Print Network [OSTI]

    Sanandaji, Borhan M.

    hardware and software components such as smart meters, Phasor Measurement Units (PMUs), intelligent Borhan dynamics have been traditionally considered as a result of meter aging and malfunctioning, electrical of a designated cyber data attack to the system. In particular, with the emergence of smart grids and its smart

  17. Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen

    E-Print Network [OSTI]

    Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen Department.brumley,jukka.valkonen}@tkk.fi Abstract. Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and lim- ited penetration rate of BitTorrent clients. Key words: BitTorrent, peer-to-peer protocols, stream ciphers, man

  18. Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen

    E-Print Network [OSTI]

    Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen Department.brumley,jukka.valkonen}@tkk.fi Abstract. Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and limited penetration rate of BitTorrent clients. Key words: BitTorrent, peer-to-peer protocols, stream ciphers, man

  19. Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    with great opportunities for raising the target facility energy consumption and consequently its green house green, energy- sustainable computing paradigms has gained a lot of attention in both the researchEvaluating Network-Based DoS Attacks Under the Energy Consumption Perspective New security issues

  20. Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed

    E-Print Network [OSTI]

    Chen, Yu

    detection is an essential to minimize the damage of distributed denial of services (DDoS) attacks. However of the flooding traffic [13, 20]. Unfortunately, damages have already been caused when consequences are observed Experimentation and Test, in conjunction with USENIX Security Symposium, Boston, MA. August 6-7, 2007

  1. Collaborative Change Detection of DDoS Attacks on Community and ISP Networks*

    E-Print Network [OSTI]

    Chen, Yu

    can work cooperatively to raise early warning to avoid catastrophic damages. This paper proposes) mechanism to enable early detection of DDoS attacks on community networks. We want to detect flooding. * Manuscript submitted on March 10, 2006 to the IEEE International Symposium on Collaborative Technologies

  2. An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    scanners and intrusion detection systems. FORTH-ICS, Greece, {mikepo,markatos}@ics.forth.gr I2R, Singapore-- detected over the course of more than 20 months. The attacks were captured by monitoring the traffic as many systems as possible and keep them under control for as long as possible. Code obfuscation

  3. Combating False Data Injection Attacks in Smart Grid Using Kalman Filter

    E-Print Network [OSTI]

    Cao, Xiaojun (Matt)

    Combating False Data Injection Attacks in Smart Grid Using Kalman Filter Kebina Manandhar Dept of South Florida Email: yliu@cse.usf.edu Abstract--The security of Smart Grid, being one of the very important aspects of the Smart Grid system, is studied in this paper. We first discuss different pitfalls

  4. Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid Deepa Kundur analysis of a smart grid. We focus on the model synthesis stage in which both cyber and physical grid-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems. I

  5. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  6. Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks

    E-Print Network [OSTI]

    Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks Keaton Mowery UC to analyze the data. First, we present code recovery re- sults from human review of our test data set lock on an industrial safe, he found that body heat from the user transferred to the individual keys

  7. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    with a real-world power plant simulator. The experiment results show that SRID can detect various false data, College Station, Texas, USA 2 Department of Information Security, Shanghai University of Electric Power. Advanced false data injection attack in targeted malware intrusion is becoming an emerging severe threat

  8. The threat of terrorism and other attacks raises profound dilemmas for the electric power industry.

    E-Print Network [OSTI]

    Amin, S. Massoud

    The threat of terrorism and other attacks raises profound dilemmas for the electric power industry power plant in Oak Harbor, Ohio, and disabled a safety monitoring system for nearly five hours. For&D) on infrastructure security at the Electric Power Research Institute (EPRI). At first, I was faced with many reports

  9. Resilient Detection in the Presence of Integrity Attacks , Jo~ao Hespanha

    E-Print Network [OSTI]

    Hespanha, Joo Pedro

    critical plants and processes, including manufacturing, water and gas treatment and This researchReview Only 2 distribution, facility control and power grids. A successful attack to such kind of systems may infrastructures susceptible to cyber security threats. The research community has acknowledged the importance

  10. Multiple-Photon Absorption Attack on Entanglement-Based Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-02-16T23:59:59.000Z

    In elaborating on the multiple-photon absorption attack on Ekert protocol proposed in arXiv:1011.4740, we show that it can be used in other entanglement-based protocols, in particular the BBM92 protocol. In this attack, the eavesdropper (Eve) is assumed to be in control of the source, and she sends pulses correlated in polarization (but not entangled) containing several photons at frequencies for which only multiple-photon absorptions are possible in Alice's and Bob's detectors. Whenever the photons stemming from one pulse are dispatched in such a way that the number of photons is insufficient to trigger a multiple-photon absorption in either channel, the pulse remains undetected. We show that this simple feature is enough to reproduce the type of statistics on the detected pulses that are considered as indicating a secure quantum key distribution, even though the source is actually a mixture of separable states. The violation of Bell inequalities measured by Alice and Bob increases with the order of the multiple-photon absorption that Eve can drive into their detectors, while the measured quantum bit error rate decreases as a function of the same variable. We show that the attack can be successful even in the simplest case of a two-photon absorption or three-photon absorption attack, and we discuss possible countermeasures, in particular the use of a fair sampling test.

  11. A recent study of meteorological conditions around the Pentagon will support development of a system to protect its 25,000+ occupants from chemical, biological, and radiological attack.

    E-Print Network [OSTI]

    Knievel, Jason Clark

    of a system to protect its 25,000+ occupants from chemical, biological, and radiological attack. I nFEBRUARY 2007AMERICAN METEOROLOGICAL SOCIETY | #12;of the most likely targets for a future terrorist attack

  12. NRT is currently for adults (18 or older) and not approved for use in pregnancy or for persons with active chest pain or a recent heart attack.

    E-Print Network [OSTI]

    MacAdam, Keith

    with active chest pain or a recent heart attack. Nicotine Replacement Therapy What strength do I use? What

  13. 1294 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 7, JULY 2013 On Topology Attack of a Smart Grid

    E-Print Network [OSTI]

    Tong, Lang

    , and their effect on real-time locational marginal pricing is examined. Index Terms--Malicious data attack, cyber

  14. Photon-Number-Splitting versus Cloning Attacks in Practical Implementations of the Bennett-Brassard 1984 protocol for Quantum Cryptography

    E-Print Network [OSTI]

    Armand Niederberger; Valerio Scarani; Nicolas Gisin

    2005-04-15T23:59:59.000Z

    In practical quantum cryptography, the source sometimes produces multi-photon pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Lutkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2->3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2->3 cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2->3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.

  15. International Conference on Dependable Systems & Networks: Florence, Italy, 28 June -01 July 2004 A Defense-Centric Taxonomy Based on Attack Manifestations

    E-Print Network [OSTI]

    Maxion, Roy

    A Defense-Centric Taxonomy Based on Attack Manifestations Kevin S. Killourhy, Roy A. Maxion and Kymie M. C classifications of attacks have been tendered, often in taxonomic form. A common basis of these taxonomies is that they have been framed from the perspective of an at- tacker ­ they organize attacks with respect

  16. Abstract --Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Currently, most ISPs merely rely

    E-Print Network [OSTI]

    Lee, Ruby B.

    Abstract -- Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Currently, most ISPs merely rely on manual detection of DDoS attacks after which offline fine- grain traffic-evolving characteristics of the attacking packets. Recently, we have proposed a DDoS defense architecture that supports

  17. Resistance of fast-and slow-growing subalpine fir to pheromone-induced attack by western balsam bark beetle (Coleoptera

    E-Print Network [OSTI]

    Lindgren, Staffan

    Resistance of fast- and slow-growing subalpine fir to pheromone- induced attack by western balsam the resistance of fast- and slow-growing subalpine fir to pheromone-induced attack by western balsam bark beetle at two sites in the interior of British Columbia, Canada. 2 Attack success by the beetle and subsequent

  18. A Collision Attack on AURORA-512 NTT, 3-9-11 Midori-cho, Musashino-shi, Tokyo, 180-8585 Japan

    E-Print Network [OSTI]

    A Collision Attack on AURORA-512 Yu Sasaki NTT, 3-9-11 Midori-cho, Musashino-shi, Tokyo, 180-8585 Japan Abstract. In this note, we present a collision attack on AURORA-512, which is one of the candidates for SHA-3. The attack complexity is ap- proximately 2236 AURORA-512 operations, which is less than

  19. Investigation of the exfoliation-like attack mechanism in relation to Al?Mg?Si alloy microstructure

    SciTech Connect (OSTI)

    Eckermann, Fabian; Suter, Thomas; Uggowitzer, Peter J.; Afseth, Andreas; Schmutz, Patrik (EMMPA); (ETH Zurich); (Alcan)

    2008-09-17T23:59:59.000Z

    A directed attack, denominated as exfoliation-like attack (ELA), is observed in Al-Mg-Si alloy AA6016 exposed to aggressive electrolyte conditions. This localized corrosion propagates restricted to a specific plane. Immersion experiments combined with in situ microtomography and SEM/EBSD characterization showed that the ELA path does not follow aligned intermetallic phases, texture or grain boundaries. Si concentration variation in solid solution is one factor which correlates with the propagation of this attack. In a model alloy, the influence of Si composition gradients on corrosion susceptibility was demonstrated in mild neutral electrolytes (oxide layer influence) and in aggressive acidic conditions (active dissolution rates).

  20. Effect of aerodynamic uncertainties on unconventional lateral control at high angle of attack

    E-Print Network [OSTI]

    Eller, Bob Gensen

    1987-01-01T23:59:59.000Z

    EFFECT OF AERODYNAMIC UNCERTAINTIES ON UNCONVENTIONAL LATERAL CONTROL AT HIGH ANGLE OF ATTACK A Thesis by BOB GENSEN ELLER Submitted to the Graduate College of Texas ARM University in partial fulfillment of the requirement for the degree... of MASTER OF SCIENCE December 1987 Major Subject: Aerospace Engineering EFFECT OF AERODYNAMIC UNCERTAINTIES ON UNCONVENTIONAL LATEHAI CONTROL AT HIGH ANGI. E (&F A'I'TACK A Thesis by BOB GENSEN ELLER Approved as to style and content by: Donald T...

  1. Seasonal abundance and nature of damage of insects attacking cultivated sunflowers

    E-Print Network [OSTI]

    Phillips, Ronnie Lee

    1972-01-01T23:59:59.000Z

    , the vacuum sampling and whole-plant sampling methods, respectively, were used to collect injurious insect species associated with cultivated sunflowers. Popula- tion data proved that the whole-plant sampling method was more effective for obtaining insects...SEASONAL ABUNDANCE AND NATURE OF DAMAGE OF INSECTS ATTACKING CULTIVATED SUNFLOWERS A Thesis by Ronnie Lee Phillips Submitted to the Graduate College of Texas A&M University in partial fulfillment of the requirement for the degree of MASTER...

  2. Comparative toxicity studies of sulphur acaricides on two species of spider mites attacking cotton

    E-Print Network [OSTI]

    Hallmark, Kenzy Donovan

    1954-01-01T23:59:59.000Z

    CONPARATIVE TOXICITY STUDIES OF SULFUH ACAHICIDES ON TWO SPECIE OF SPIDEH NITES ATTACKING COTTON KENZY DONOVAN HALLI&AHK A Thesis Submitted to the Graduate School oi' the Agricultural and 14echanlcal College of Texas in partial fulfillment... Ovotran- 13 Procedure Culturing technique- Dusting apparatus 1B 18 19 Spraying appsratus- Treatment procedure ?- Determination ef results ? - ? --- ? ? ? -?- hesults Conclusions- Literature Cited- 47 50 1 Results of laboratortJ' toxicity...

  3. Minimum State Awareness for Resilient Control Systems Under Cyber-Attack

    SciTech Connect (OSTI)

    Kisner, Roger [ORNL; Fugate, David L [ORNL; McIntyre, Timothy J [ORNL

    2012-01-01T23:59:59.000Z

    State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assume state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.

  4. The ignition hazard to urban interiors during nuclear attack due to burning curtain fragments transported by blast

    E-Print Network [OSTI]

    Goodale, Thomas

    There exists some uncertainty at present, in the formulation of civil defense doctrine, as to whether it is advisable for window curtains to be closed or open during nuclear attack. Closed curtains would be in position to ...

  5. Optimal individual attack on BB84 quantum key distribution using single-photon two-qubit quantum logic

    E-Print Network [OSTI]

    Garcia-Patron Sanchez, Raul

    We propose the use of single-photon two-qubit quantum logic to physically simulate the optimal individual attack on Bennett-Brassard 1984 quantum key distribution protocol.The experimental setup does not require a quantum ...

  6. Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't

    E-Print Network [OSTI]

    Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

  7. Comment on "A special attack on the multiparty quantum secret sharing of secure direct communication using single photons"

    E-Print Network [OSTI]

    Cheng-An Yen; Shi-Jinn Horng; Hsi-Sheng Goan*; Tzong-Wann Kao

    2010-07-22T23:59:59.000Z

    In this comment, we show that the special attack [S.-J. Qin, F. Gao, Q.-Y. Wen, F.-C. Zhu, Opt. Commun. 281 (2008) 5472.], which claims to be able to obtain all the transmitted secret message bit values of the protocol of the multiparty quantum secret sharing of secure direct communication using single photons with random phase shift operations, fails. Furthermore, a class of similar attacks are also shown to fail to extract the secrete message.

  8. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222:...

  9. 24/05/2010 07:18Zoologger: Attack of the self-sacrificing child clones -life -12 May 2010 -New Scientist Page 1 of 3http://www.newscientist.com/article/dn18894-zoologger-attack-of-the-selfsacrificing-child-clones.html

    E-Print Network [OSTI]

    Gardner, Andy

    24/05/2010 07:18Zoologger: Attack of the self-sacrificing child clones - life - 12 May 2010 - New Scientist Page 1 of 3http://www.newscientist.com/article/dn18894-zoologger-attack Zoologger: Attack of the self-sacrificing child clones 16:49 12 May 2010 by Michael Marshall For similar

  10. DailyTech -New Technique Uses Nanoparticles with Honeycomb-like Compartments to Attack Cancer Cells http://www.dailytech.com/article.aspx?newsid=21426[5/2/2011 12:01:56 PM

    E-Print Network [OSTI]

    Brinker, C. Jeffrey

    DailyTech - New Technique Uses Nanoparticles with Honeycomb-like Compartments to Attack Cancer New Technique Uses Nanoparticles with Honeycomb- like Compartments to Attack Cancer Cells Tiffany they are released into the system to attack cancer cells, but end up attacking healthy cells as well since they have

  11. Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking

    E-Print Network [OSTI]

    Dube, Raghav

    2005-02-17T23:59:59.000Z

    and Ramamohanarao [18] propose a marking scheme wherein routers mark the packets with a adjusted probability. The packet marking probability is inversely proportional to the number of hops of the router from the source of the packet. The marking probability..., Peng, Leckie and Ramamohanarao [18] propose a mark- ing probability, pd = 1/d, where d is the distance (number of hops) of the router from the source of the packet. Assume an attack path of length k. By this we mean that there are k routers...

  12. Effects of Sudden Changes in Inflow Conditions on the Angle of Attack on HAWT Blades

    E-Print Network [OSTI]

    Stoevesandt, Bernhard

    2010-01-01T23:59:59.000Z

    In this paper changes in wind speed and wind direction from a measured wind field are being analyzed at high frequencies. This is used to estimate changes in the angle of attack (AOA) on a blade segment over short time periods for different estimated turbine concepts. Here a statistical approach is chosen to grasp the characteristics of the probability distributions to give an over all view of the magnitude and rate of the changes. The main interest is the generation of basic distributions for the calculation of dynamic stall effects and stall flutter due to wind fluctuations.

  13. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    SciTech Connect (OSTI)

    Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

    2009-11-15T23:59:59.000Z

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  14. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M. (Sandia National Laboratories, Albuquerque, NM); Ehlen, Mark Andrew (Sandia National Laboratories, Albuquerque, NM); Boggs, Paul T.; Ray, Jaideep

    2009-10-01T23:59:59.000Z

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  15. Discontinuous phase formation and selective attack of SiC materials exposed to low oxygen partial pressure environments

    SciTech Connect (OSTI)

    Butt, D.P. [Los Alamos National Lab., NM (United States); Tressler, R.E.; Spear, K.E. [Pennsylvania State Univ., University Park, PA (United States). Dept. of Materials Science and Engineering

    1993-09-01T23:59:59.000Z

    Three SiC materials were exposed to gas mixtures containing N{sub 2}, H{sub 2}, and CO at 1000-1300C, 1-740 torr for a few to 1000 h. Kinetic and thermodynamic studies indicate that CO is the predominant oxidizing species. A variety of corrosion processes were observed, including surface and internal pit formation, needle growth, grain boundary attack, and attack of impurities and surrounding material. In the case of a siliconized SiC, impurities such as Ca, Al, and Fe diffused rapidly through the Si matrix forming complex calcium aluminosilicates on the surface, leaving behind internal voids. Evaluation of the mechanical properties, including fractography, revealed a variety of degradative phenomena. Efforts to identify causes of pit formation suggested that the overall process was complex. Pits formed during attack of grain boundaries and regions containing transition metal impurities. Studies of single crystals showed preferential attack near impurities and crystalline defects, indicating that damaged crystals or certain crystal orientations in the polycrystalline materials are susceptible to attack. In addition, under some conditions where pit formation was observed, the strength of certain materials increased apparently due to flaw healing. It is suggested that flaws can heal in the absence of mechanical stress due to their high surface energy. However, second phases observed within partially healed surface cracks suggest impurities also contribute to the flaw healing processes.

  16. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  17. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols

    E-Print Network [OSTI]

    Vadim Makarov; Johannes Skaar

    2007-11-23T23:59:59.000Z

    In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the incoming pulses). It has previously been shown that the Bennett-Brassard 1984 (BB84) protocol is vulnerable to this attack. In this paper, we show that several other protocols and encodings may also be vulnerable. We consider a faked states attack in the case of a partial efficiency mismatch on the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol, and derive the quantum bit error rate as a function of detector efficiencies. Additionally, it is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols.

  18. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources

    SciTech Connect (OSTI)

    Li, Hong-Wei [Key Laboratory of Quantum Information,University of Science and Technology of China, Hefei, 230026 (China); Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004 (China); Wang, Shuang; Huang, Jing-Zheng; Chen, Wei; Yin, Zhen-Qiang; Li, Fang-Yi; Zhou, Zheng; Liu, Dong; Zhang, Yang; Guo, Guang-Can; Han, Zheng-Fu [Key Laboratory of Quantum Information,University of Science and Technology of China, Hefei, 230026 (China); Bao, Wan-Su [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004 (China)

    2011-12-15T23:59:59.000Z

    It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost of only increasing the quantum bit error rate from 1.3 to 1.4%.

  19. Evaporation a key mechanism for the thaumasite form of sulfate attack

    SciTech Connect (OSTI)

    Mittermayr, Florian, E-mail: f.mittermayr@tugraz.at [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstrae 12, 8010 GRAZ (Austria)] [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstrae 12, 8010 GRAZ (Austria); Baldermann, Andre [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstrae 12, 8010 GRAZ (Austria)] [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstrae 12, 8010 GRAZ (Austria); Kurta, Christoph [University of Graz, Institute of Chemistry Analytical Chemistry, Stremayrgasse 16/III, 8010 GRAZ (Austria)] [University of Graz, Institute of Chemistry Analytical Chemistry, Stremayrgasse 16/III, 8010 GRAZ (Austria); Rinder, Thomas [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstrae 12, 8010 GRAZ (Austria) [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstrae 12, 8010 GRAZ (Austria); Observatoire Midi-Pyrnes, Laboratoire Gosciences Environnement Toulouse, 14, avenue Edouard Belin, 31400 TOULOUSE (France); Klammer, Dietmar [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstrae 12, 8010 GRAZ (Austria)] [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstrae 12, 8010 GRAZ (Austria); Leis, Albrecht [Joanneum Research, Resources Institute for Water, Energy and Sustainability, Elisabethstrae 18/2, 8010 GRAZ (Austria)] [Joanneum Research, Resources Institute for Water, Energy and Sustainability, Elisabethstrae 18/2, 8010 GRAZ (Austria); Tritthart, Josef [Graz University of Technology, Institute of Technology and Testing of Building Materials, Inffeldgasse 24, 8010 GRAZ (Austria)] [Graz University of Technology, Institute of Technology and Testing of Building Materials, Inffeldgasse 24, 8010 GRAZ (Austria); Dietzel, Martin [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstrae 12, 8010 GRAZ (Austria)] [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstrae 12, 8010 GRAZ (Austria)

    2013-07-15T23:59:59.000Z

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup ?1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup ?1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wettingdrying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite formation are discussed regarding the development of more sulfate-resistant concrete and concrete structures.

  20. Eavesdropper's Optimal Information in Variations of Bennett-Brassard 1984 Quantum Key Distribution in the Coherent Attacks

    E-Print Network [OSTI]

    W. Y. Hwang; D. Ahn; S. W. Hwang

    2001-02-03T23:59:59.000Z

    We calculate eavesdropper's optimal information on raw bits in Bennett-Brassard 1984 quantum key distribution (BB84 QKD) and six-state scheme in coherent attacks, using a formula by Lo and Chau [Science 283 (1999) 2050] with single photon assumption. We find that eavesdropper's optimal information in QKD without public announcement of bases [Phys. Lett. A 244 (1998) 489] is the same as that of a corresponding QKD WITH it in the coherent attack. We observe a sum-rule concerning each party's information.

  1. Differential-like Chosen Cipher Attack on A Spatiotemporally Chaotic Cryptosystem

    E-Print Network [OSTI]

    Jiantao Zhou; Wenjiang Pei; Jie Huang; Aiguo Song; Zhenya He

    2005-06-11T23:59:59.000Z

    The combinative applications of one-way coupled map lattice (OCML) and some simple algebraic operations have demonstrated to be able to construct the best known chaotic cryptosystem with high practical security, fast encryption speed, and excellent robustness against channel noise. In this paper, we propose a differential-like chosen cipher attack to break the prototypical system cooperating with INT and MOD operations. This cryptographic method exploits the weakness that the high-dimensional cryptosystem degenerates to be one-dimensional under constant driving, therefore, is no more sensitive to the slight perturbation on the driving after convergence. The experimental results show that this method can successfully extract the key within just hundreds of iterations. To the best of our knowledge, it is the first time to present successful cryptanalysis on such a cryptosystem. we also make some suggestions to improve the security in future versions.

  2. Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01T23:59:59.000Z

    A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified in the first part of this paper. A cross layer detection mechanism is proposed to combat TSA in part II of this paper. In the physical layer, we propose a GPS carrier signal noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

  3. The probability of Mark-I containment failure by melt-attack of the liner

    SciTech Connect (OSTI)

    Theofanous, T.G.; Yan, H. [California Univ., Santa Barbara, CA (United States). Dept. of Chemical and Nuclear Engineering; Podowski, M.Z. [Rensselaer Polytechnic Inst., Troy, NY (United States). Dept. of Nuclear Engineering and Engineering Physics] [and others

    1993-11-01T23:59:59.000Z

    This report is a followup to the work presented in NUREG/CR-5423 addressing early failure of a BWR Mark I containment by melt attack of the liner, and it constitutes a part of the implementation of the Risk-Oriented Accident Analysis Methodology (ROAAM) employed therein. In particular, it expands the quantification to include four independent evaluations carried out at Rensselaer Polytechnic Institute, Argonne National Laboratories, Sandia National Laboratories and ANATECH, Inc. on the various portions of the phenomenology involved. These independent evaluations are included here as Parts II through V. The results, and their integration in Part I, demonstrate the substantial synergism and convergence necessary to recognize that the issue has been resolved.

  4. Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer (Agrilus planipennis Fairmaire) by Don Cipollini, a professor at Wright State University in Ohio

    E-Print Network [OSTI]

    Ginzel, Matthew

    Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer been collected in areas where the abundance of dead ash trees suggest that local populations of EAB were high. · Widespread attack of white fringe trees have not been reported. · These findings indicate

  5. Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee

    E-Print Network [OSTI]

    Snoeren, Alex

    Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan Web services depends on advertisement: they charge for prime screen real estate, and focus a great a pollution attack, that allows third parties to alter the customized content the services return to users who

  6. Systemic Hypertension and Transient Ischemic Attack in a 6-Year-Old Girl with Fibromuscular Dysplasia Treated with Percutaneous Angioplasty

    SciTech Connect (OSTI)

    Foa-Torres, Gustavo [National University of Cordoba, Oulton Institute (Argentina); Ganame, Javier, E-mail: javier.ganame@uzleuven.b [University Hospitals Leuven, Cardiology Department (Belgium); Juaneda, Ernesto; Peirone, Alejandro [Hospital Privado (Argentina); Barcudi, Maria Silvina [Hospital Italiano (Argentina); Achaval, Alberto [Hospital Privado (Argentina)

    2010-02-15T23:59:59.000Z

    We describe a 6-year-old girl with arterial hypertension secondary to fibromuscular dysplasia with stenoses of both renal arteries and transient ischemic attack due to extracranial right internal carotid artery subtotal occlusion as well as left internal carotid artery stenosis. She was treated with percutaneous angioplasty of both renal and both carotid arteries.

  7. Final report : impacts analysis for cyber attack on electric power systems (national SCADA test bed FY09).

    SciTech Connect (OSTI)

    Stamp, Jason Edwin; LaViolette, Randall A.; Gardiner, Judith D. (Ohio State University, Columbus, OH)

    2009-09-01T23:59:59.000Z

    The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA) for cyber attack against power grid control systems. Building upon previous work, we successfully demonstrated the addition of Bounded Model Checking (BMC) to the FSA method, which constrains grid conditions to reasonable behavior. The new FSA feature was successfully implemented and tested. FSA is an important part of IA for the power grid, complementing steady-state approaches. It enables the simultaneous evaluation of myriad dynamic trajectories for the system, which in turn facilitates IA for whole ranges of system conditions simultaneously. Given the potentially wide range and subtle nature of potential control system attacks, this is a promising research approach. In this report, we will explain the addition of BMC to the previous FSA work and some testing/simulation upon the implemented code using a two-bus test system. The current FSA approach and code allow the calculation of the acceptability of power grid conditions post-cyber attack (over a given time horizon and for a specific grid topology). Future work will enable analysis spanning various topologies (to account for switching events), as well as an understanding of the cyber attack stimuli that can lead to undesirable grid conditions.

  8. 1460 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 7, JULY 2014 Data Framing Attack on State Estimation

    E-Print Network [OSTI]

    Tong, Lang

    attack, cyber security, smart grid. I. INTRODUCTION AFEATURE of any future smart grid is the promise such that the control center will remove useful measurements that would otherwise be used by the state estimator degree controlling only half of a critical set of measurements that are needed to make a system

  9. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 645 Malicious Data Attacks on the Smart Grid

    E-Print Network [OSTI]

    Tong, Lang

    between users and suppliers. While such integration is essential for a future "smart" grid, it also makesIEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 645 Malicious Data Attacks on the Smart Grid Oliver Kosut, Member, IEEE, Liyan Jia, Robert J. Thomas, Life Fellow, IEEE, and Lang Tong

  10. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS -MANUSCRIPT 1 Taxonomy of Attacks for Agent-based Smart

    E-Print Network [OSTI]

    Pota, Himanshu Roy

    of introducing the structure of space-time and information flow direction, security feature, and cyberIEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS - MANUSCRIPT 1 Taxonomy of Attacks for Agent infrastructure in Cyber-Physical Systems (CPSs), a smart grid exhibits the complicated nature of large scale

  11. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for the Smart Grid Adam Hahn, Student Member, IEEE, and Manimaran Govindarasu, Senior Member, IEEE Abstract--The smart grid's heavy reliance on cyber resources introduces numerous security concerns

  12. COLLOQUIUM: Dawn, the Asteroid Redirect Mission, and the Future...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    them by e-mail regarding any possible speakers or topics for future colloquia. Carol Ann Austin caustin@pppl.gov Dennis Mueller, Chair mueller@pppl.gov Elena Belova,...

  13. Document Splash Screen for Redirecting to Updated Document

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesDataTranslocationDiurnal Cycle ofDo New55 FederalChapter5Sectionhas

  14. Widget:5SecondSurveyRedirect | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: SaltTroyer & AssociatesWestILI WindTexas:

  15. Consideration of Firm Redirect from Original Unconditional Parent Methods

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed New SubstationCleanCommunity2Workshops 2008 To report anU.S.Consideration

  16. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03T23:59:59.000Z

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other two. The fate of tritium in the attack depended on its chemistry. Any tritium present in the vicinity of jet-fuel explosion or fire would convert to HTO. The molecular tritium is also known to quickly exchange with water adsorbed on surfaces at ambient temperatures. Therefore, the end product of reacted tritium was HTO. A part of it would disperse into the atmosphere and a part would remain on site. The dynamic aspect of HTO removal was investigated taking into a consideration water flow at ground zero. Most of ground zero is encircled by the Slurry Wall, 70 ft deep underground, called a Bathtub. Approximately three million gallons of water were hosed on site in the fire-fighting efforts, and 1 million gallons fell as rainwater, between 9/11 and 9/21 (the day of the reported measurement). The combined water percolated through the debris down to the bottom of the Bathtub dissolving and removing HTO with it. That water would meet and combine with the estimated 26 million gallons of water that leaked from the Hudson River as well as broken mains, during the same period of 10 days after the attack. The combined water was collecting in the PATH train tunnel and continuously being pumped out to prevent flooding. A %Box model of water flow was developed to describe the above scenario. Considering the uncertainty in the amount of tritium present from sources other than the aircraft, as well as the dynamic character of tritium removal from the site, it is feasible to provide only a qualitative picture of the fate and behavior of tritium at WTC with the limited experimental data available. If the time history of tritium concentration at WTC had been measured, this study could have been a tracer study of water flow at WTC possibly useful to civil engineering.

  17. A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber Attacks

    SciTech Connect (OSTI)

    Wynne, Adam S.; Gorton, Ian; Almquist, Justin P.; Chatterton, Jack; Thurman, David A.

    2008-02-01T23:59:59.000Z

    The next generation of intrusion detection and cyber defense technologies must be highly flexible so that deployed solutions can be quickly modified to detect new attack scenarios. They must also be able to provide the performance necessary to monitor traffic from high speed networks, and scale to enterprise wide deployments. In this paper we describe our experiences in creating a production application for cyber situational awareness. The application exploits the capabilities of several independently developed components and integrates them using SIFT (Scalable Information Fusion and Triage), a service-oriented architecture (SOA) designed for creating domain-independent, enterprise scale analytical applications. SIFT exploits a common design pattern for composing analytical components, and extends an existing messaging platform with scaling capabilities. We describe the design of the application, and provide a performance analysis that demonstrates the capabilities of the SIFT platform. The paper concludes by discussing the lessons we have learned from this project, and outlines the architecture of the MeDICI, the next generation of our enterprise analytics platforms.

  18. Surface attack on metals in the presence of liquid metals. Final report

    SciTech Connect (OSTI)

    Beal, R.E.

    1986-04-10T23:59:59.000Z

    A study was undertaken to evaluate liquid metals as electrical collectors in contact with solid metal alloys. Surface attack of the liquid metal on the solid metal is expected to be a major challenge to the development of a credible system. Low-melting-temperature metals and alloys of the fusible type are to be utilized for a collector that will operate in the 200-500 F range, with emphasis towards the lower end. Solid metals have been selected for experimental work based on their electrical properties and minimal potential reaction with the candidate liquid-metal alloys. Material properties of both liquid and solid metals were reviewed to identify initial material combinations for evaluation. Thorough literature searches were conducted to obtain as much pertinent physical-property and metallurgical data as possible, prior to actual experimental work. Process and material modelling was adopted to select candidate materials for both solids and liquids. Consideration of practical requirements for the eventual collectors is an integral part of the study. Work effort has concentrated on apparatus construction, evaluation and a program of testing to obtain screening data on materials selected and the chosen test method. Results have identified limitations of the test unit design and maximum current loads under test conditions with experimental current collectors. Candidate electrode materials have been exposed in low-melting fusible alloys for direct-dissolution data.

  19. Kinetics of Hydrolysis of Phenyl Acetates Catalyzed by the Zinc(II) Complex of 1,5,9-Triazacyclododecane. Evidence for Attack of Water or Hydroxide Ion at the

    E-Print Network [OSTI]

    Paik Suh, Myunghyun

    ,5,9-Triazacyclododecane. Evidence for Attack of Water or Hydroxide Ion at the Coordinated Ester Junghun Suh,*, Sang Jun coordinated to the metal center makes a nucleophilic attack at the ester linkage. Instead, the results support a nucleophilic attack at the complexed ester. The kinetic data further indicate that the electrostatic

  20. Proof-of-principle experiment of a modified photon-number-splitting attack against quantum key distribution

    SciTech Connect (OSTI)

    Liu Weitao; Sun Shihai; Liang Linmei; Yuan Jianmin [Department of Physics, College of Science, National University of Defense Technology, Changsha, 410073 (China)

    2011-04-15T23:59:59.000Z

    Any imperfections in a practical quantum key distribution (QKD) system may be exploited by an eavesdropper to collect information about the key without being discovered. We propose a modified photon-number-splitting attack scheme against QKD systems based on weak laser pulses taking advantage of possible multiphoton pulses. Proof-of-principle experiments are demonstrated. The results show that the eavesdropper can get information about the key generated between the legitimate parties without being detected. Since the equivalent attenuation introduced by the eavesdropper for pulses of different average photon numbers are different, the decoy-state method is effective in fighting against this kind of attack. This has also been proven in our experiments.

  1. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Hndchen; Jrg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10T23:59:59.000Z

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  2. Field Guide to Predators, Parasites and Pathogens Attacking Insect and Mite Pests of Cotton: Recognizing the Good Bugs in Cotton

    E-Print Network [OSTI]

    Knutson, Allen E.; Ruberson, John

    2005-07-08T23:59:59.000Z

    and Pathogens Attacking Insect and Mite Pests of Cotton by Allen Knutson and John Ruberson This publication was made possible in part through financial support provided by Cotton Incorporated. Cover photograph by W. Sterling of an immature (nymph) spined soldier.... Special recognition is extended to Winfield Sterling, Professor of Entomology (retired) and Allen Dean, Research Associate at Texas A&M University, for use of their slide set. Others who provided slides included W. Jones, USDA-ARS; D. Steinkraus...

  3. Multi-criteria analysis of the mechanism of degradation of Portland cement based mortars exposed to external sulphate attack

    SciTech Connect (OSTI)

    El-Hachem, R.; Roziere, E.; Grondin, F.; Loukili, A., E-mail: ahmed.loukili@ec-nantes.fr

    2012-10-15T23:59:59.000Z

    This work aims to contribute to the design of durable concrete structures exposed to external sulphate attacks (ESA). Following a preliminary study aimed at designing a representative test, the present paper suggests a study on the effect of the water-to-cement (w/c) ratio and the cement composition in order to understand the degradation mechanisms. Length and mass measurements were registered continuously, leached calcium and hydroxide ions were also quantified. In parallel, scanning electron microscopy observations as well as X-ray microtomography were realised at different times to identify the formed products and the crack morphology. Test results provide information on the basic aspects of the degradation mechanism, such as the main role of leaching and diffusion in the sulphate attack process. The mortar composition with a low w/c ratio leads to a better resistance to sulphate attack because the microstructure is less permeable. Reducing the C{sub 3}A content results in a macro-cracking decrease but it does not prevent expansion, which suggests the contribution of other expansive products, such as gypsum, in damage due to ESA. The observation of the cracks network in the microstructure helps to understand the micro-mechanisms of the degradation process.

  4. PROJECTED IMPACT OF SULFATE ATTACK ON THE LONG-TERM PERFORMANCE OF A CONCRETE REPOSITORY

    SciTech Connect (OSTI)

    Flach, G.

    2009-12-11T23:59:59.000Z

    Saltstone is a cementitious waste form made by mixing salt solution originating from liquid waste storage tanks at the DOE Savannah River Site with a dry mix containing blast furnace slag, fly ash, and cement or lime. The wet mix is poured into a concrete repository for on-site disposal. Solidified Saltstone is a dense, alkaline, reducing, micro-porous, monolithic, cementitious matrix, containing a solution of salts within its pore structure. Sodium sulfate concentrations in the pore fluid are around 0.15 mol/L, and external sulfate attack on concrete barriers is expected to occur over time. To predict the long-term performance of concrete repositories, the STADIUM{reg_sign} code was used to simulate the reactive transport processes leading to formation of ettringite, an expansive mineral phase often associated with spalling or cracking. STADIUM{reg_sign} is a multi-ionic transport model based on a split operator approach that separates ionic movement and chemical reactions. Ionic transport is described by the extended Nernst-Planck equation for unsaturated media, and accounts for electrical coupling between ionic species, chemical activity, transport due to water content gradient, and temperature effects. STADIUM{reg_sign} does not predict whether physical damage will occur, or the impact on transport properties should fracturing occur. Thus the presence of ettringite was assumed to coincide with physical damage for the purpose of estimating effective transport properties. Effective properties for concrete barriers were estimated assuming complete hydraulic failure behind the ettringite front and unaltered properties ahead of the front. The ettringite front advances at a rate dependent on the diffusion coefficient assumed for the failed zone. A sensitivity study indicates a service life ranging from thousands to tens of thousands of years, depending on the barrier thickness and sulfate exposure conditions among other factors.

  5. Delay in accessing healthcare after transient ischaemic attack and minor stroke : the role of primary care in the problem and the solution

    E-Print Network [OSTI]

    Lasserson, Daniel Sascha

    2012-05-10T23:59:59.000Z

    Transient ischaemic attack (TIA) and minor stroke are associated with a high risk of recurrent stroke which can be predicted with a clinical rule and reduced with urgent treatment. Delay in accessing assessment and vascular risk factor modification...

  6. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Broader source: Energy.gov (indexed) [DOE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

  7. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M., E-mail: alex.scherbakov@gmail.com [Laboratory of Clinical Biochemistry, Institute of Clinical Oncology, N.N. Blokhin Cancer Research Centre, Kashirskoye sh. 24, Moscow 115478 (Russian Federation); Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E. [Laboratory of Molecular Endocrinology, Institute of Carcinogenesis, N.N. Blokhin Cancer Research Centre, Kashirskoye sh. 24, Moscow 115478 (Russian Federation); Berstein, Lev M. [Laboratory of Oncoendocrinology, N.N. Petrov Research Institute of Oncology, St. Petersburg 197758 (Russian Federation); Krasilnikov, Mikhail A. [Laboratory of Molecular Endocrinology, Institute of Carcinogenesis, N.N. Blokhin Cancer Research Centre, Kashirskoye sh. 24, Moscow 115478 (Russian Federation)

    2013-12-10T23:59:59.000Z

    The tolerance of cancer cells to hypoxia depends on the combination of different factors from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelialmesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the level of AMPK phosphorylation may be considered as predictors of the tumor sensitivity to anti-angiogenic drugs. - Highlights: Snail1 protects breast cancer cells from hypoxia. Protective effect of Snail1 is mediated via ?-catenin/HIF-1 pathway. Snail/?-catenin signaling is negatively controlled by the energy sensor AMPK. The failure in AMPK phosphorylation drives cells to the hypoxia-tolerant state.

  8. Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security

    E-Print Network [OSTI]

    Laszlo B. Kish

    2006-02-13T23:59:59.000Z

    It is shown that the original Kirchhoff-loop-Johnson(-like)-noise (KLJN) cipher is naturally protected against the man-in-the-middle (MITM) attack, if the eavesdropper is using resistors and noise voltage generators just like the sender and the receiver. The eavesdropper can extract zero bit of information before she is discovered. However, when the eavesdropper is using noise current generators, though the cipher is protected, the eavesdropper may still be able to extract one bit of information while she is discovered. For enhanced security, we expand the KLJN cipher with the comparison of the instantaneous voltages via the public channel. In this way, the sender and receiver has a full control over the security of measurable physical quantities in the Kirchhoff-loop. We show that when the sender and receiver compare not only their instantaneous current data but also their instantaneous voltage data then the zero-bit security holds even for the noise current generator case. We show that the original KLJN scheme is also zero-bit protected against that type of MITM attack when the eavesdropper uses voltage noise generators, only. In conclusion, within the idealized model scheme, the man-in-the-middle-attack does not provide any advantage compared to the regular attack considered earlier. The remaining possibility is the attack by a short, large current pulse, which described in the original paper as the only efficient type of regular attacks, and that yields the one bit security. In conclusion, the KLJN cipher is superior to known quantum communication schemes in every respect, including speed, robustness, maintenance need, price and its natural immunity against the man-in-the-middle attack.

  9. Property:HPBD/URL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration Jump to:FieldProceduresFY JumpThis is a property of type Page.

  10. Property:KML URL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration Jump to:FieldProceduresFY JumpThis isWebsite"InActDtTechMin JumpKML

  11. ret2dir: Rethinking Kernel Isolation Vasileios P. Kemerlis Michalis Polychronakis Angelos D. Keromytis

    E-Print Network [OSTI]

    Yang, Junfeng

    ) attacks redirect corrupted kernel pointers to data residing in user space. In response, sev- eral kernel code in privileged mode, or tamper-with critical kernel data structures, by exploiting a kernel, and are applicable in x86/x86-64, ARM, and other popular architectures. In response to ret2usr attacks, several

  12. Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes

    SciTech Connect (OSTI)

    Watson, Annetta Paule [ORNL; Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hall, Dr. Linda [ENVIRON International Corporation; Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Love, Dr. Adam [Johnson Wright, Inc.

    2011-01-01T23:59:59.000Z

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  13. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01T23:59:59.000Z

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: Decision-making, prioritization, and command and control Public health/medical services Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: Local representation in the Joint Field Office (JFO) JFO transition to the Long-Term Recovery Office Process for prioritization of needs Process for regional coordination Prioritization - process and federal/military intervention Allocation of limited resources Re-entry decision and consistency Importance of maintaining a healthy hospital system Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. Insurance coverage for both private businesses and individuals Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the programs efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

  14. Attacks on Emerging Architectures

    E-Print Network [OSTI]

    Hanna, Steven Craig

    2012-01-01T23:59:59.000Z

    and classification. We develop Kudzu, a system for symbolicdomains. First, we discuss Kudzu a system for symbolican automatic end-to-end tool, Kudzu, and apply it to the

  15. Patterns of heart attacks

    E-Print Network [OSTI]

    Shenk, Kimberly N

    2010-01-01T23:59:59.000Z

    Myocardial infarction is a derivative of heart disease that is a growing concern in the United States today. With heart disease becoming increasingly predominant, it is important to not only take steps toward preventing ...

  16. Attacks on Emerging Architectures

    E-Print Network [OSTI]

    Hanna, Steven Craig

    2012-01-01T23:59:59.000Z

    Application Academia AJAXIm FaceBook Chat ParseUri PlaxoTo support this interaction, Facebook provides a JavaScriptwhich in turn communicate with Facebook. The cross-origin

  17. Cementitious Barriers Partnership (CBP): Using the CBP Software Toolbox to Simulate Sulfate Attack and Carbonation of Concrete Structures - 13481

    SciTech Connect (OSTI)

    Brown, K.G.; Kosson, D.S.; Garrabrants, A.C.; Sarkar, S. [Vanderbilt University, School of Engineering, CRESP, Nashville, TN 37235 (United States)] [Vanderbilt University, School of Engineering, CRESP, Nashville, TN 37235 (United States); Flach, G.; Langton, C.; Smith, F.G.III; Burns, H. [Savannah River National Laboratory, Aiken, SC 29808 (United States)] [Savannah River National Laboratory, Aiken, SC 29808 (United States); Van der Sloot, H. [Hans Van der Sloot Consultancy, Dorpsstraat 216, 1721BV Langedijk (Netherlands)] [Hans Van der Sloot Consultancy, Dorpsstraat 216, 1721BV Langedijk (Netherlands); Meeussen, J.C.L. [Nuclear Research and Consultancy Group, Westerduinweg 3, Petten (Netherlands)] [Nuclear Research and Consultancy Group, Westerduinweg 3, Petten (Netherlands); Seignette, P.F.A.B. [Energy Research Center of The Netherlands, Petten (Netherlands)] [Energy Research Center of The Netherlands, Petten (Netherlands); Samson, E. [SIMCO Technologies, Inc., Quebec (Canada)] [SIMCO Technologies, Inc., Quebec (Canada); Mallick, P.; Suttora, L. [U.S. Department of Energy, Washington, DC (United States)] [U.S. Department of Energy, Washington, DC (United States); Esh, D.; Fuhrmann, M.; Philip, J. [U.S. Nuclear Regulatory Commission, Washington, DC (United States)] [U.S. Nuclear Regulatory Commission, Washington, DC (United States)

    2013-07-01T23:59:59.000Z

    The Cementitious Barriers Partnership (CBP) Project is a multi-disciplinary, multi-institutional collaboration supported by the U.S. Department of Energy Office of Tank Waste Management. The CBP project has developed a set of integrated modeling tools and leaching test methods to help improve understanding and prediction of the long-term hydraulic and chemical performance of cementitious materials used in nuclear applications. State-of-the-art modeling tools, including LeachXS{sup TM}/ORCHESTRA and STADIUM{sup R}, were selected for their demonstrated abilities to simulate reactive transport and degradation in cementitious materials. The new U.S. Environmental Protection Agency leaching test methods based on the Leaching Environmental Assessment Framework (LEAF), now adopted as part of the SW-846 RCRA methods, have been used to help make the link between modeling and experiment. Although each of the CBP tools has demonstrated utility as a standalone product, coupling the models over relevant spatial and temporal solution domains can provide more accurate predictions of cementitious materials behavior over relevant periods of performance. The LeachXS{sup TM}/ORCHESTRA and STADIUM{sup R} models were first linked to the GoldSim Monte Carlo simulator to better and more easily characterize model uncertainties and as a means to coupling the models allowing linking to broader performance assessment evaluations that use CBP results for a source term. Two important degradation scenarios were selected for initial demonstration: sulfate ingress / attack and carbonation of cementitious materials. When sufficient sulfate is present in the pore solution external to a concrete barrier, sulfate can diffuse into the concrete, react with the concrete solid phases, and cause cracking that significantly changes the transport and structural properties of the concrete. The penetration of gaseous carbon dioxide within partially saturated concrete usually initiates a series of carbonation reactions with both dissolved ions and the hydrated cement paste. The carbonation process itself does not have a negative effect, per se, on the paste physical properties and can even result in reduced porosity and can help form a protective layer at the surface of concrete. However, carbonation has been shown to increase leaching of some constituents and can potentially have a detrimental effect on reinforced concrete structures by lowering pH to ca. 9 and de-passivating embedded steel (e.g. rebar) and accelerating corrosion, which are important processes related to high-level waste tank integrity and closure evaluations. The use of the CBP Software Toolbox to simulate these important degradation phenomena for both concrete vaults and high-level waste tanks are demonstrated in this paper. (authors)

  18. Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations

    SciTech Connect (OSTI)

    Watson, Annetta Paule [ORNL; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Hall, Dr. Linda [ENVIRON International Corporation; Love, Dr. Adam [Johnson Wright, Inc.

    2011-01-01T23:59:59.000Z

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  19. Atherosclerosis and cerebral ischemic attacks: intakes of cerebrography with xenon133 inhaled and platelet tests in the diagnosis, clinical and therapeutic monitoring; the preventive role of dipyridamole

    SciTech Connect (OSTI)

    Solvay, H.; Kahn, M.; Selosse, P.; Carlier, J.; Cloarec, M.; Delwiche, J.P.; Fenollar, J.

    1984-11-01T23:59:59.000Z

    A study of patients to develop the significance of the role of the blood platelets in the recurrence of transient cerebral ischemic attacks in patients with cerebral atheromatous, develop the effectiveness of dipyridamole in the prophylactic therapeutic regimen. In the group treated with dipyridamole, a 76.3% clinical improvement was recorded (mean increases of 11.2 ml/min. and 11.4 ml/min. of the cerebral hemispheric flows), 15.8% of cases stabilized (mean increases of 1.7 ml/min. and 1.2 ml/min.) and 7.9% failures (mean decreases of 10.4 ml/min. and 14.3 ml/min.) of these same flows. The cerebrography with xenon133 inhaled as well as the platelet tests used, constitute unfailing means of diagnosing and monitoring the clinical development.

  20. Aerodynamic characteristics of seven symmetrical airfoil sections through 180-degree angle of attack for use in aerodynamic analysis of vertical axis wind turbines

    SciTech Connect (OSTI)

    Sheldahl, R E; Klimas, P C

    1981-03-01T23:59:59.000Z

    When work began on the Darrieus vertical axis wind turbine (VAWT) program at Sandia National Laboratories, it was recognized that there was a paucity of symmetrical airfoil data needed to describe the aerodynamics of turbine blades. Curved-bladed Darrieus turbines operate at local Reynolds numbers (Re) and angles of attack (..cap alpha..) seldom encountered in aeronautical applications. This report describes (1) a wind tunnel test series conducted at moderate values of Re in which 0 less than or equal to ..cap alpha.. less than or equal to 180/sup 0/ force and moment data were obtained for four symmetrical blade-candidate airfoil sections (NACA-0009, -0012, -0012H, and -0015), and (2) how an airfoil property synthesizer code can be used to extend the measured properties to arbitrary values of Re (10/sup 4/ less than or equal to Re less than or equal to 10/sup 7/) and to certain other section profiles (NACA-0018, -0021, -0025).

  1. Coddington, J. and C. Sobrevila. 1987. Web manipulation and two stereotyped attack behaviors in the ogre-faced spider Deinopis spinosus Marx (Araneae, Deinopidae). J. Arachnol.. 15:213-225.

    E-Print Network [OSTI]

    Mathis, Wayne N.

    Coddington, J. and C. Sobrevila. 1987. Web manipulation and two stereotyped attack behaviors in the ogre-faced spider Deinopis spinosus Marx (Araneae, Deinopidae). J. Arachnol.. 15:213-225. WEB" strikes the spider expands the web downward and forward against the substrate; these strikes capture

  2. Service Portability Why http redirect is the model for the future

    E-Print Network [OSTI]

    address of sally@company.com will be de- livered to a mail server controlled by company.com, and if Sally moves to a new company there is no way for this email address to follow her there. Second, despite years. Search services do an amazing job with web pages, but for other services they perfor

  3. Inhabiting cycles of maritime obsolescence : redirecting the National Defense Reserve Fleet

    E-Print Network [OSTI]

    Polansky, Nicholas W. (Nicholas Wilkes)

    2014-01-01T23:59:59.000Z

    Defense is in a state of obsolescence. The metrics of risk have changed from threat of military invasion to that of weather. Infrastructure is in a state of transition. The Maritime Administration's National Defense Reserve ...

  4. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field EmissionFunctionalPortalV > 111 \il3: Red

  5. COLLOQUIUM: Dawn, the Asteroid Redirect Mission, and the Future of Solar

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6Energy, science, andAnalysis15Information Age |

  6. Property:Buildings/PublicationURL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformationInyo County,InformationInformation Pellets JumpModelName

  7. Property:File/SourceURL | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration Jump to:FieldProcedures Jump to: navigation,Jump to: navigation,

  8. Property:NEPA FONSI Url | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration Jump to:FieldProceduresFY JumpThisModification date Jump Jump

  9. Quantum mechanical study of solvent effects in a prototype S{sub N}2 reaction in solution: Cl{sup ?} attack on CH{sub 3}Cl

    SciTech Connect (OSTI)

    Kuechler, Erich R. [BioMaPS Institute and Department of Chemistry and Chemical Biology, Rutgers University, Piscataway, New Jersey 08854-8087 (United States) [BioMaPS Institute and Department of Chemistry and Chemical Biology, Rutgers University, Piscataway, New Jersey 08854-8087 (United States); Department of Chemistry, University of Minnesota, Minneapolis, Minnesota 55455-0431 (United States); York, Darrin M., E-mail: york@biomaps.rutgers.edu [BioMaPS Institute and Department of Chemistry and Chemical Biology, Rutgers University, Piscataway, New Jersey 08854-8087 (United States)

    2014-02-07T23:59:59.000Z

    The nucleophilic attack of a chloride ion on methyl chloride is an important prototype S{sub N}2 reaction in organic chemistry that is known to be sensitive to the effects of the surrounding solvent. Herein, we develop a highly accurate Specific Reaction Parameter (SRP) model based on the Austin Model 1 Hamiltonian for chlorine to study the effects of solvation into an aqueous environment on the reaction mechanism. To accomplish this task, we apply high-level quantum mechanical calculations to study the reaction in the gas phase and combined quantum mechanical/molecular mechanical simulations with TIP3P and TIP4P-ew water models and the resulting free energy profiles are compared with those determined from simulations using other fast semi-empirical quantum models. Both gas phase and solution results with the SRP model agree very well with experiment and provide insight into the specific role of solvent on the reaction coordinate. Overall, the newly parameterized SRP Hamiltonian is able to reproduce both the gas phase and solution phase barriers, suggesting it is an accurate and robust model for simulations in the aqueous phase at greatly reduced computational cost relative to comparably accurate ab initio and density functional models.

  10. On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model M.R. Albrecht1, P. Farshim2, K.G. Paterson2, and G.J. Watson3

    E-Print Network [OSTI]

    On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model M.R. Albrecht1, P. Farshim2, K.G. Paterson2, and G.J. Watson3 1 INRIA, Paris-Rocquencourt Center, SALSA Project UPMC Univ Paris 06, UMR 7606, Canada T2N 1N4 gjwatson@ucalgary.ca Abstract. Bellare and Kohno introduced a formal framework

  11. GPS Software Attacks Tyler Nighswander

    E-Print Network [OSTI]

    Brumley, David

    used for precise timing and frequency calibration. For ex- ample, cell phone towers (e.g., Verizon) use GPS to calibrate the frequency and timing for transmissions, and the power grid uses GPS to coordinate. The time delta, along with the transmission times of each C/A code signal form the distance measurements

  12. Insect Pests Attacking Truck Crops

    E-Print Network [OSTI]

    Mally, Frederick W. (Frederick William)

    1902-01-01T23:59:59.000Z

    or kerosene emulsion, must be used and actually sprayed upon their bodies to be effective. Hence in any proposed insect warfare it is important to first determine the character of the mouth parts, which, therefore, also largely determine the manner... as to keep the end of the fertilizer guide out of the ground. KEROSENE EMULSION. This is perhaps the most generally used of all the contact insecticides of its class. It is best prepared as follows: Take one pound of whale oil soap and boil in a gallon...

  13. A Birthday Attack on Roulette

    E-Print Network [OSTI]

    Ranjan Chaudhuri

    2013-10-02T23:59:59.000Z

    A strategy for playing the game of roulette is presented in this paper. The strategy is based on the same probabilistic argument that leads to the well-known Birthday Paradox in Probability theory. Following the strategy, a player will have a positive expected gain per spin as well as in the long run despite the fact that the pay-off ratios in roulette favor the House.

  14. Research deciphers HIV attack plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromisingStories »Submitter A B C D E F G H I JDefenseand

  15. An Attack on Centrifugal Costs

    E-Print Network [OSTI]

    Murray, P. F.

    550 HP turbine, main tained at a fixed speed by a hydraulic governor. After analyzing this system, facilities were scoped to control the turbine speed by using a variable hydraulic governor. The oxygen control signal is now fed directly... applications. Applications discussed involve the addition of a variable speed turbine drive, the removal of ex cess system pressure drop, motor speed changes and variable drive units, and the matching of pumps to systems. INTRODUCTION The Monsanto...

  16. Spatio-temporal Mining of Software Adoption & Penetration Evangelos E. Papalexakis, Tudor Dumitras, Duen Horng (Polo) Chau, B. Aditya Prakash, Christos Faloutsos

    E-Print Network [OSTI]

    Faloutsos, Christos

    specialized cyber attacks [5], [28]. For example, in 2011, security analysts have identified 403 million new of hosts worldwide, and it provides a platform for data intensive experiments in cyber security. The WINE patches? Does it spread uniformly over countries? How long does it take for a URL that distributes malware

  17. Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed

    E-Print Network [OSTI]

    Thanachareonkit, Anothai

    2014-01-01T23:59:59.000Z

    Jonsson JC. 2013. Daylight performance of a microstructuredH. Device for guiding daylight, US Patent 4,654,243 (JL, Selkowitz S. 2000. Daylight in buildings: A source book

  18. PUBLISHED ONLINE: 26 FEBRUARY 2012 | DOI: 10.1038/NPHYS2239 Multistep redirection by cross-beam power

    E-Print Network [OSTI]

    Loss, Daniel

    demonstrated this in a hohlraum plasma at the National Ignition Facility (NIF) at Lawrence Livermore National perturbation, which allows control of its proximity to the ion-acoustic wave resonance 1Lawrence Livermore ranging from around 0.2 PW cm-2 (such as encountered on the NIF)2 and above. One example

  19. A Geographic Redirection Service for On-line Games Chris Chambers Wu-chi Feng Wu-chang Feng

    E-Print Network [OSTI]

    @OHSU {chambers,wuchi,wuchang}@cse.ogi.edu Debanjan Saha IBM Research dsaha@us.ibm.com ABSTRACT For many on Shooters, fre- quently utilize a widely distributed server model. For the most popular FPS at this time, Counter-Strike (a variant of Half-Life), there are more than 30,000 registered servers running at any

  20. UBC Social Ecological Economic Development Studies (SEEDS) Student Report UBC Farm Harvest Hut Waste Redirection Site: Build Process

    E-Print Network [OSTI]

    wanted a set of units/containers that would: 1. Create an organized environment 2. Separate recycling fixed conceptual designs A meeting with our client led us to prioritize portability and aesthetics