首页 > 最新文献

2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
A framework for supplier-supply chain risk management: Tradespace factors to achieve risk reduction — Return on investment 供应商-供应链风险管理框架:降低风险的贸易空间因素-投资回报
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655102
Serena Chan, Gregory N. Larsen
The growing trend in information and communications technology (ICT) globalization and outsourcing provides opportunities for adversaries to attack the supply chains of critical information systems and networks in order to gain unauthorized access to data, alter data, disrupt operations, or interrupt communications by inserting malicious code into or otherwise corrupting components; or to obtain knowledge of the uses and users of systems. A challenging issue is the ability to assure that articles of supply and the suppliers can be trusted to do only that which is expected or specified and to do so reliably and dependably. This paper describes a framework for discovering, defining, learning, and establishing capabilities to manage the risks of suppliers and supply chains of ICT.
信息和通信技术(ICT)全球化和外包的日益增长的趋势为对手提供了攻击关键信息系统和网络供应链的机会,以便通过向组件插入恶意代码或以其他方式破坏组件来获得未经授权的数据访问,更改数据,破坏操作或中断通信;或者获得系统的用途和用户的知识。一个具有挑战性的问题是,是否有能力确保供应品和供应商能够被信任,只做预期或指定的事情,并且可靠和可靠地这样做。本文描述了一个框架,用于发现、定义、学习和建立管理ICT供应商和供应链风险的能力。
{"title":"A framework for supplier-supply chain risk management: Tradespace factors to achieve risk reduction — Return on investment","authors":"Serena Chan, Gregory N. Larsen","doi":"10.1109/THS.2010.5655102","DOIUrl":"https://doi.org/10.1109/THS.2010.5655102","url":null,"abstract":"The growing trend in information and communications technology (ICT) globalization and outsourcing provides opportunities for adversaries to attack the supply chains of critical information systems and networks in order to gain unauthorized access to data, alter data, disrupt operations, or interrupt communications by inserting malicious code into or otherwise corrupting components; or to obtain knowledge of the uses and users of systems. A challenging issue is the ability to assure that articles of supply and the suppliers can be trusted to do only that which is expected or specified and to do so reliably and dependably. This paper describes a framework for discovering, defining, learning, and establishing capabilities to manage the risks of suppliers and supply chains of ICT.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Energy aware routing algorithm for WSN applications in border surveillance 边界监控中无线传感器网络的能量感知路由算法
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654979
Yuping Dong, Hwa Chang, Zhongjian Zou, Sai Tang
Wireless Sensor Networks (WSNs) are widely used in various applications for tracking or surveillance purposes. Border security monitoring and terrorist attack prevention are just two of many crucial homeland security applications which rely upon WSN technologies. In these applications, a great amount of sensors powered by batteries are deployed in a particular region. They detect events, process and relay data to the sink node at the base station. Power conservation is critical to these sensors. In this paper, we propose a routing algorithm which separates the sensor nodes to several scheduling sets and keeps track of the energy level of each sensor. This algorithm balances power consumption among sensors, and therefore prolongs the network lifetime. Simulation results verify that our algorithm outperforms the EECCR algorithm proposed in [1].
无线传感器网络(WSNs)广泛应用于各种跟踪或监视目的。边境安全监测和恐怖袭击预防只是依赖无线传感器网络技术的许多关键国土安全应用中的两个。在这些应用中,大量由电池供电的传感器部署在特定区域。它们检测事件,处理并将数据中继到基站的汇聚节点。节能对这些传感器至关重要。在本文中,我们提出了一种路由算法,该算法将传感器节点分离到多个调度集,并跟踪每个传感器的能量水平。该算法平衡了传感器之间的功耗,从而延长了网络的生存时间。仿真结果验证了我们的算法优于[1]中提出的EECCR算法。
{"title":"Energy aware routing algorithm for WSN applications in border surveillance","authors":"Yuping Dong, Hwa Chang, Zhongjian Zou, Sai Tang","doi":"10.1109/THS.2010.5654979","DOIUrl":"https://doi.org/10.1109/THS.2010.5654979","url":null,"abstract":"Wireless Sensor Networks (WSNs) are widely used in various applications for tracking or surveillance purposes. Border security monitoring and terrorist attack prevention are just two of many crucial homeland security applications which rely upon WSN technologies. In these applications, a great amount of sensors powered by batteries are deployed in a particular region. They detect events, process and relay data to the sink node at the base station. Power conservation is critical to these sensors. In this paper, we propose a routing algorithm which separates the sensor nodes to several scheduling sets and keeps track of the energy level of each sensor. This algorithm balances power consumption among sensors, and therefore prolongs the network lifetime. Simulation results verify that our algorithm outperforms the EECCR algorithm proposed in [1].","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134322114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
MEMS-based gravimetric sensors for explosives detection 基于mems的爆炸物探测重力传感器
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655033
R. Mlcak, D. Doppalapudi, Paul Pyzowski, P. Gwynne, Scott Purchase, Jeffrey Bridgham, Gerald Schultz, M. Skelton, David Pelletier, H. Tuller
A compact, rapid system for trace detection of explosives using MEMS-bases resonant structures is described. Various software algorithms are used to eliminate problems in previous implementations of array-based detectors. Results for detection of trace levels of explosives and other threat agents are given.
介绍了一种基于mems谐振结构的小型、快速爆炸物痕量探测系统。各种软件算法被用来消除以前基于阵列的检测器实现中的问题。给出了痕量爆炸物和其他威胁剂的检测结果。
{"title":"MEMS-based gravimetric sensors for explosives detection","authors":"R. Mlcak, D. Doppalapudi, Paul Pyzowski, P. Gwynne, Scott Purchase, Jeffrey Bridgham, Gerald Schultz, M. Skelton, David Pelletier, H. Tuller","doi":"10.1109/THS.2010.5655033","DOIUrl":"https://doi.org/10.1109/THS.2010.5655033","url":null,"abstract":"A compact, rapid system for trace detection of explosives using MEMS-bases resonant structures is described. Various software algorithms are used to eliminate problems in previous implementations of array-based detectors. Results for detection of trace levels of explosives and other threat agents are given.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Risks of unrecognized commonalities in information technology supply chains 信息技术供应链中未识别共性的风险
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654970
C. Axelrod, Ph. D. Delta
In this paper we examine the interdependencies and common points of failure (and attack) that plague commonly-used system and network hardware and software. The proposed approach requires not only generating inventories of acquiring organizations' equipment and software products, and clear and detailed descriptions of every link in the supply chain, but also the identification of common components and their sources. This information is required not only for manufacturer and OEM supply chains, but also for the services supply chains of maintenance and repair organizations. When such critical components and services have been identified, one must prioritize their importance and apply appropriate security and testing. Such an identification and tracking system is only as good as its ability to incorporate up-to-the-minute changes and additions. This requires extensive real-time reporting and information sharing. The author presents a general description of a proprietary tool that facilitates the collaboration needed for such an approach to be effective.
在本文中,我们研究了困扰常用系统和网络硬件和软件的相互依赖性和常见故障点(和攻击)。所建议的方法不仅需要生成获取组织的设备和软件产品的清单,以及对供应链中每个环节的清晰和详细的描述,而且还需要识别公共组件及其来源。不仅制造商和OEM供应链需要这些信息,维护和维修组织的服务供应链也需要这些信息。确定了这些关键组件和服务后,必须优先考虑它们的重要性,并应用适当的安全性和测试。这样的识别和跟踪系统只有在它能够包含最新的变化和补充的情况下才能发挥作用。这需要广泛的实时报告和信息共享。作者提供了一个专有工具的一般描述,该工具促进了这种方法有效所需的协作。
{"title":"Risks of unrecognized commonalities in information technology supply chains","authors":"C. Axelrod, Ph. D. Delta","doi":"10.1109/THS.2010.5654970","DOIUrl":"https://doi.org/10.1109/THS.2010.5654970","url":null,"abstract":"In this paper we examine the interdependencies and common points of failure (and attack) that plague commonly-used system and network hardware and software. The proposed approach requires not only generating inventories of acquiring organizations' equipment and software products, and clear and detailed descriptions of every link in the supply chain, but also the identification of common components and their sources. This information is required not only for manufacturer and OEM supply chains, but also for the services supply chains of maintenance and repair organizations. When such critical components and services have been identified, one must prioritize their importance and apply appropriate security and testing. Such an identification and tracking system is only as good as its ability to incorporate up-to-the-minute changes and additions. This requires extensive real-time reporting and information sharing. The author presents a general description of a proprietary tool that facilitates the collaboration needed for such an approach to be effective.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114937403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A geospatial integrated problem solving environment for Homeland Security applications 国土安全应用的地理空间集成问题解决环境
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655060
D. Koch
Effective planning, response, and recovery (PRR) involving terrorist attacks or natural disasters come with a vast array of information needs. Much of the required information originates from disparate sources in widely differing formats. However, one common attribute the information often possesses is physical location. The organization and visualization of this information can be critical to the success of the PRR mission. Organizing information geospatially is often the most intuitive for the user. In the course of developing a field tool for the U.S. Department of Homeland Security (DHS) Office for Bombing Prevention, a geospatial integrated problem solving environment software framework was developed by Oak Ridge National Laboratory. This framework has proven useful as well in a number of other DHS, Department of Defense, and Department of Energy projects. An overview of the software architecture along with application examples are presented.
涉及恐怖袭击或自然灾害的有效规划、响应和恢复(PRR)需要大量的信息。许多所需的信息来自不同的来源,格式也大不相同。然而,信息通常具有的一个共同属性是物理位置。这些信息的组织和可视化对PRR任务的成功至关重要。对用户来说,按地理空间组织信息通常是最直观的。在为美国国土安全部(DHS)爆炸预防办公室开发现场工具的过程中,橡树岭国家实验室开发了一个地理空间综合问题解决环境软件框架。该框架在国土安全部、国防部和能源部的许多其他项目中也被证明是有用的。对软件体系结构进行了概述,并给出了应用实例。
{"title":"A geospatial integrated problem solving environment for Homeland Security applications","authors":"D. Koch","doi":"10.1109/THS.2010.5655060","DOIUrl":"https://doi.org/10.1109/THS.2010.5655060","url":null,"abstract":"Effective planning, response, and recovery (PRR) involving terrorist attacks or natural disasters come with a vast array of information needs. Much of the required information originates from disparate sources in widely differing formats. However, one common attribute the information often possesses is physical location. The organization and visualization of this information can be critical to the success of the PRR mission. Organizing information geospatially is often the most intuitive for the user. In the course of developing a field tool for the U.S. Department of Homeland Security (DHS) Office for Bombing Prevention, a geospatial integrated problem solving environment software framework was developed by Oak Ridge National Laboratory. This framework has proven useful as well in a number of other DHS, Department of Defense, and Department of Energy projects. An overview of the software architecture along with application examples are presented.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Conceptual design of a nuclear material detection system based on the neutron / gamma-ray hybrid approach 基于中子/伽马射线混合方法的核材料探测系统的概念设计
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654977
H. Ohgaki, T. Kii, K. Masuda, T. Misawa, C. Pyeon, R. Hajima, T. Hayakawa, T. Shizuma, K. Kawase, M. Kando, H. Toyokawa
A nuclear material detection system based on neutron / gamma-ray hybrid approach has been proposed for the container inspection at the sea port. The neutron from the inertial electrostatic confinement fusion source will be used for a fast pre-screening process. The quasi-monochromatic gamma-ray beam from the laser Compton Backscattering source will be used for an isotope identification for the precise inspection. Nuclear resonance fluorescence method will be employed for the isotope identification because of its high selectivity and high penetration for the shielding.
提出了一种基于中子/伽马射线混合方法的核材料探测系统,用于海港集装箱检测。来自惯性静电约束聚变源的中子将用于快速预筛选过程。来自激光康普顿后向散射源的准单色伽玛射线束将用于精确检测的同位素鉴定。核共振荧光法具有高选择性和屏蔽穿透性,将被用于同位素鉴定。
{"title":"Conceptual design of a nuclear material detection system based on the neutron / gamma-ray hybrid approach","authors":"H. Ohgaki, T. Kii, K. Masuda, T. Misawa, C. Pyeon, R. Hajima, T. Hayakawa, T. Shizuma, K. Kawase, M. Kando, H. Toyokawa","doi":"10.1109/THS.2010.5654977","DOIUrl":"https://doi.org/10.1109/THS.2010.5654977","url":null,"abstract":"A nuclear material detection system based on neutron / gamma-ray hybrid approach has been proposed for the container inspection at the sea port. The neutron from the inertial electrostatic confinement fusion source will be used for a fast pre-screening process. The quasi-monochromatic gamma-ray beam from the laser Compton Backscattering source will be used for an isotope identification for the precise inspection. Nuclear resonance fluorescence method will be employed for the isotope identification because of its high selectivity and high penetration for the shielding.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A handheld active millimeter wave camera 手持有源毫米波相机
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655040
C. Adams, D. Holbrook, Robert Sengsten
A microwave imaging technology is described where large area diffraction limited images are created by a small, low cost, low power, handheld device. The camera actively illuminates targets with a circularly polarized scanning confocal spot beam. Backscattered radiation is collected to form an image on an LCD screen. The camera is configured to image behind walls and other flat surfaces. A set of encoded omni-wheels track camera position so that a 2500mm × 1700mm image may be stitched together. Operating in the 24GHz ISM band, the camera is approximately 6” diameter and 8.5” tall. At this size we believe it enables a broad range of new inspection tasks.
描述了一种微波成像技术,其中由小型,低成本,低功耗手持设备创建大面积衍射限制图像。该相机采用圆偏振扫描共聚焦光斑光束主动照射目标。后向散射辐射被收集在LCD屏幕上形成图像。摄像头被配置成在墙壁和其他平面后面成像。一组编码的全轮跟踪摄像机位置,以便将2500mm × 1700mm的图像拼接在一起。该相机在24GHz ISM频段工作,直径约6英寸,高8.5英寸。我们认为,在这种规模下,它能够进行广泛的新检查任务。
{"title":"A handheld active millimeter wave camera","authors":"C. Adams, D. Holbrook, Robert Sengsten","doi":"10.1109/THS.2010.5655040","DOIUrl":"https://doi.org/10.1109/THS.2010.5655040","url":null,"abstract":"A microwave imaging technology is described where large area diffraction limited images are created by a small, low cost, low power, handheld device. The camera actively illuminates targets with a circularly polarized scanning confocal spot beam. Backscattered radiation is collected to form an image on an LCD screen. The camera is configured to image behind walls and other flat surfaces. A set of encoded omni-wheels track camera position so that a 2500mm × 1700mm image may be stitched together. Operating in the 24GHz ISM band, the camera is approximately 6” diameter and 8.5” tall. At this size we believe it enables a broad range of new inspection tasks.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124582777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Risk-informed assessment of regional preparedness 对区域准备进行风险知情评估
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655049
K. Crowther
Risk-informed and sustainable preparedness of our nation's regions and localities is central to the safety and security of the United States. The first step to technology development for preparedness is clear requirements and correct methodologies. This paper presents methods for creating regional homeland security plans to ensure continuity of regional operations. First, regional preparedness strategy should focus on a region's vital socioeconomic interests. These industries can be identified through the application of key sector analysis methods that exploit large-scale and open-source databases reporting economic sector production and interdependence. Second, planning for regional preparedness should follow two complementary approaches focusing on catastrophic scenario-driven planning as well as all-hazards capabilities. Third, regional preparedness strategy should exploit existing organizations and preparedness governance structure. Most existing regional preparedness institutions organize around the concept of emergency support functions (ESFs). Defining the relationships between ESFs and critical infrastructure sectors will enable these existing organizations to broaden their mission to adopt more holistic preparedness planning and homeland security practices, and provide a foundation technology. This paper provides preliminary results from case studies in Virginia to illustrate each of these methods.
我们国家各地区和地方的风险知情和可持续准备对美国的安全和保障至关重要。技术开发的第一步是明确的需求和正确的方法。本文提出了制定区域国土安全计划的方法,以确保区域行动的连续性。首先,区域防范战略应侧重于一个地区的重要社会经济利益。这些行业可以通过应用关键部门分析方法来确定,这些方法利用报告经济部门生产和相互依存的大型开源数据库。其次,区域备灾规划应遵循两种互补的方法,侧重于灾难性情景驱动的规划以及所有灾害的能力。第三,区域备灾战略应利用现有的组织和备灾治理结构。大多数现有的区域备灾机构都是围绕紧急支助职能的概念组织起来的。定义esf和关键基础设施部门之间的关系将使这些现有组织能够扩大其使命,采用更全面的准备规划和国土安全实践,并提供基础技术。本文提供了弗吉尼亚州案例研究的初步结果,以说明每种方法。
{"title":"Risk-informed assessment of regional preparedness","authors":"K. Crowther","doi":"10.1109/THS.2010.5655049","DOIUrl":"https://doi.org/10.1109/THS.2010.5655049","url":null,"abstract":"Risk-informed and sustainable preparedness of our nation's regions and localities is central to the safety and security of the United States. The first step to technology development for preparedness is clear requirements and correct methodologies. This paper presents methods for creating regional homeland security plans to ensure continuity of regional operations. First, regional preparedness strategy should focus on a region's vital socioeconomic interests. These industries can be identified through the application of key sector analysis methods that exploit large-scale and open-source databases reporting economic sector production and interdependence. Second, planning for regional preparedness should follow two complementary approaches focusing on catastrophic scenario-driven planning as well as all-hazards capabilities. Third, regional preparedness strategy should exploit existing organizations and preparedness governance structure. Most existing regional preparedness institutions organize around the concept of emergency support functions (ESFs). Defining the relationships between ESFs and critical infrastructure sectors will enable these existing organizations to broaden their mission to adopt more holistic preparedness planning and homeland security practices, and provide a foundation technology. This paper provides preliminary results from case studies in Virginia to illustrate each of these methods.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134299583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supply chain risk mitigation for IT electronics IT电子产品的供应链风险缓解
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655094
F. McFadden, Richard D. Arnold
Supply Chain Risk Management (SCRM) is one of the 12 Comprehensive National Cybersecurity Inititiatives (CNCI), but the range of supply chain problems has not been defined rigorously, and effective defenses have not yet been developed. Risks range from the increased unreliability of counterfeits to data exfiltration and adversary control enabled by hardware Trojan horses embedded in chips. Risks are different for military vs. non-military Government vs. civilian organizations. We cite cases that underscore the reality of supply chain risk, and analyze the structure of supply chains that affect different part of the market for IT electronics, in order to provide a better understanding of attack methods. We discuss techniques for defending against the range of threats, and propose a practical solution based on a suite of simple, inexpensive test procedures that could be used to build an "80% solution" for detection of counterfeits and embedded malicious implants before they are deployed. Tests we have prototyped include power signatures and of IR thermographic signatures of boot events. Deployment of such a test suite would change the SCRM game by making it significantly more difficult for supply chain exploits to succeed.
供应链风险管理(SCRM)是12项综合国家网络安全计划(CNCI)之一,但供应链问题的范围尚未得到严格定义,有效的防御措施尚未开发。风险范围从伪造品的不可靠性增加到数据泄露和嵌入芯片的硬件特洛伊木马的对手控制。军事、非军事、政府和民间组织的风险是不同的。我们列举了强调供应链风险现实的案例,并分析了影响IT电子产品市场不同部分的供应链结构,以便更好地理解攻击方法。我们讨论了防御各种威胁的技术,并基于一套简单、廉价的测试程序提出了一个实用的解决方案,该解决方案可用于构建“80%解决方案”,用于在部署之前检测假冒产品和嵌入式恶意植入物。我们的原型测试包括功率签名和启动事件的红外热成像签名。这样一个测试套件的部署将会改变SCRM的游戏规则,使供应链攻击的成功变得更加困难。
{"title":"Supply chain risk mitigation for IT electronics","authors":"F. McFadden, Richard D. Arnold","doi":"10.1109/THS.2010.5655094","DOIUrl":"https://doi.org/10.1109/THS.2010.5655094","url":null,"abstract":"Supply Chain Risk Management (SCRM) is one of the 12 Comprehensive National Cybersecurity Inititiatives (CNCI), but the range of supply chain problems has not been defined rigorously, and effective defenses have not yet been developed. Risks range from the increased unreliability of counterfeits to data exfiltration and adversary control enabled by hardware Trojan horses embedded in chips. Risks are different for military vs. non-military Government vs. civilian organizations. We cite cases that underscore the reality of supply chain risk, and analyze the structure of supply chains that affect different part of the market for IT electronics, in order to provide a better understanding of attack methods. We discuss techniques for defending against the range of threats, and propose a practical solution based on a suite of simple, inexpensive test procedures that could be used to build an \"80% solution\" for detection of counterfeits and embedded malicious implants before they are deployed. Tests we have prototyped include power signatures and of IR thermographic signatures of boot events. Deployment of such a test suite would change the SCRM game by making it significantly more difficult for supply chain exploits to succeed.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Information sharing infrastructure for pharmaceutical supply chain management in emergency response 应急药品供应链管理的信息共享基础设施
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655099
V. Atluri, Basit Shafiq, Jaideep Vaidya, Soon Ae Chun, Ghulam Nabi, Michael Trocchia, Nabil Adam, Christopher Doyle, Lawrence E Skelly
For an effective and timely acquisition, deployment, and distribution of needed drugs in emergencies, it is crucial to provide the end-to-end visibility of the pharmaceutical supply chain (PSC) to the involved parties. Recently, the Science and Technology Directorate of the U.S. Department of Homeland Security has developed a standard-based framework for maintaining and sharing of the emergency data, called Unified Incident Command Decision Support (UICDS). UICDS provides an infrastructure for information sharing among the disparate organizations responding to an emergency. In this paper, we leverage the UICDS infrastructure, and extend it to enable information sharing for pharmaceutical supply chain management in emergency response.
为了在紧急情况下有效和及时地获取、部署和分发所需药物,向有关各方提供药品供应链的端到端可见性至关重要。最近,美国国土安全部科学技术局开发了一个基于标准的框架,用于维护和共享紧急数据,称为统一事件指挥决策支持(UICDS)。UICDS为响应紧急情况的不同组织之间的信息共享提供了基础设施。在本文中,我们利用UICDS基础设施,并对其进行扩展,以实现应急响应中药品供应链管理的信息共享。
{"title":"Information sharing infrastructure for pharmaceutical supply chain management in emergency response","authors":"V. Atluri, Basit Shafiq, Jaideep Vaidya, Soon Ae Chun, Ghulam Nabi, Michael Trocchia, Nabil Adam, Christopher Doyle, Lawrence E Skelly","doi":"10.1109/THS.2010.5655099","DOIUrl":"https://doi.org/10.1109/THS.2010.5655099","url":null,"abstract":"For an effective and timely acquisition, deployment, and distribution of needed drugs in emergencies, it is crucial to provide the end-to-end visibility of the pharmaceutical supply chain (PSC) to the involved parties. Recently, the Science and Technology Directorate of the U.S. Department of Homeland Security has developed a standard-based framework for maintaining and sharing of the emergency data, called Unified Incident Command Decision Support (UICDS). UICDS provides an infrastructure for information sharing among the disparate organizations responding to an emergency. In this paper, we leverage the UICDS infrastructure, and extend it to enable information sharing for pharmaceutical supply chain management in emergency response.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1