Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393537
E. Vugrin, K. Stamber, Michael J. Baca, Gio K. Kao, H. Le, Michael Mtchell, Rick Ramirez, K. Welch
Resilience has recently emerged as a security priority, but the development of mission resilience analysis techniques for military systems has lagged behind those for other systems. This paper identifies gaps for mission resilience assessment in current vulnerability assessment approaches used at military facilities. Additionally, the paper describes ongoing research to develop a set of mission resilience models that addresses those gaps and could be used to evaluate mission resilience to electric power outages.
{"title":"A mission resilience assessment methodology for infrastructure disruptions","authors":"E. Vugrin, K. Stamber, Michael J. Baca, Gio K. Kao, H. Le, Michael Mtchell, Rick Ramirez, K. Welch","doi":"10.1109/CCST.2012.6393537","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393537","url":null,"abstract":"Resilience has recently emerged as a security priority, but the development of mission resilience analysis techniques for military systems has lagged behind those for other systems. This paper identifies gaps for mission resilience assessment in current vulnerability assessment approaches used at military facilities. Additionally, the paper describes ongoing research to develop a set of mission resilience models that addresses those gaps and could be used to evaluate mission resilience to electric power outages.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127824157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393568
P. C. Haddock, J. Hatley, W. D. Morse, R. D. Tooley
An iridium communications and navigation module (ICNM) has been developed for movement tracking applications. External interfaces to the ICNM include Ethernet, RS-232, and Serial Peripheral Interface (SPI) Bus. The module is powered by Power over Ethernet (PoE) or a +24VDC connection. The ICNM fits within the standard PC104 form factor, but utilizes a Modular Component and Sensor Bus (MCSB) interface specification for the high density connector. The ICNM includes a GPS receiver and accelerators for satellite and inertial tracking. The module manages all of the satellite communication control, encryption, and navigation functions that enable its rapid integration as a component into larger systems.
{"title":"Integrated communications and navigation module","authors":"P. C. Haddock, J. Hatley, W. D. Morse, R. D. Tooley","doi":"10.1109/CCST.2012.6393568","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393568","url":null,"abstract":"An iridium communications and navigation module (ICNM) has been developed for movement tracking applications. External interfaces to the ICNM include Ethernet, RS-232, and Serial Peripheral Interface (SPI) Bus. The module is powered by Power over Ethernet (PoE) or a +24VDC connection. The ICNM fits within the standard PC104 form factor, but utilizes a Modular Component and Sensor Bus (MCSB) interface specification for the high density connector. The ICNM includes a GPS receiver and accelerators for satellite and inertial tracking. The module manages all of the satellite communication control, encryption, and navigation functions that enable its rapid integration as a component into larger systems.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115247531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393581
Robert Gurney, Mike Rhead, S. Ramalingam, N. Cohen
This paper examines the use of the UK National AC PO ANPR Standard (NAAS) as the "de facto" technical standard applied in many international countries. It considers the requirement for a standard and examines the effectiveness of the current NAAS and questions its fitness for purpose. The need for accuracy is discussed in terms of both tackling terrorism, serious crime and other law enforcement investigations alongside the need to protect citizens from unwarranted infringement of their privacy as a result of ANPR misreads. The causes of inaccurate ANPR read data are examined in more detail and recommendations made as to how improvements could be introduced to minimise the risk of misreads and "missed" reads. This paper recommends future parameters of measurement and provides examples of gaps between the current standards and existing legislation. Laboratory and field testing was carried out to gain a better understanding of the factors that affect the performance of ANPR systems. These tests were carried out under a variety of weather and lighting conditions. The results of this work have led to further testing to better understand the optimum conditions for number plate capture by a variety of ANPR systems. Additional testing has been carried out using "hard to read" number plates with a number of differing characteristics such as illegally spaced characters, illegal fonts, screw caps that interfere with infrared imaging and defects in the construction of the number plate itself (whether created inadvertently at the point of manufacture or subsequently caused by damage /wear and tear / weather conditions). The first author is a UK police officer and, like his senior analyst colleague who is the second author, has wide experience in testing and developing ANPR systems. The authors have been commissioned by the UK Home Office to carry out post graduate ANPR research at the University of Hertfordshire.
本文考察了英国国家AC PO ANPR标准(NAAS)作为许多国际国家应用的“事实上”技术标准的使用情况。它考虑对标准的要求,检查当前NAAS的有效性,并质疑其是否适合目的。在应对恐怖主义、严重犯罪和其他执法调查方面,以及保护公民隐私免受ANPR误读造成的无端侵犯方面,对准确性的需求进行了讨论。更详细地检查了ANPR读取数据不准确的原因,并就如何改进以尽量减少误读和“错过”读取的风险提出了建议。本文建议了未来的测量参数,并提供了当前标准与现有立法之间差距的例子。为了更好地了解影响ANPR系统性能的因素,进行了实验室和现场测试。这些测试是在各种天气和光照条件下进行的。这项工作的结果导致了进一步的测试,以更好地了解各种ANPR系统捕获车牌的最佳条件。额外的测试使用了“难以阅读”的车牌,这些车牌具有许多不同的特征,如非法间隔的字符、非法字体、干扰红外成像的螺旋盖和车牌本身结构的缺陷(无论是在制造时无意中产生的,还是随后因损坏/磨损/天气条件造成的)。第一作者是一名英国警官,与他的高级分析师同事(第二作者)一样,他在测试和开发ANPR系统方面拥有丰富的经验。作者受英国内政部委托,在赫特福德大学进行研究生ANPR研究。
{"title":"Working towards an international ANPR Standard — An initial investigation into the UK standard","authors":"Robert Gurney, Mike Rhead, S. Ramalingam, N. Cohen","doi":"10.1109/CCST.2012.6393581","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393581","url":null,"abstract":"This paper examines the use of the UK National AC PO ANPR Standard (NAAS) as the \"de facto\" technical standard applied in many international countries. It considers the requirement for a standard and examines the effectiveness of the current NAAS and questions its fitness for purpose. The need for accuracy is discussed in terms of both tackling terrorism, serious crime and other law enforcement investigations alongside the need to protect citizens from unwarranted infringement of their privacy as a result of ANPR misreads. The causes of inaccurate ANPR read data are examined in more detail and recommendations made as to how improvements could be introduced to minimise the risk of misreads and \"missed\" reads. This paper recommends future parameters of measurement and provides examples of gaps between the current standards and existing legislation. Laboratory and field testing was carried out to gain a better understanding of the factors that affect the performance of ANPR systems. These tests were carried out under a variety of weather and lighting conditions. The results of this work have led to further testing to better understand the optimum conditions for number plate capture by a variety of ANPR systems. Additional testing has been carried out using \"hard to read\" number plates with a number of differing characteristics such as illegally spaced characters, illegal fonts, screw caps that interfere with infrared imaging and defects in the construction of the number plate itself (whether created inadvertently at the point of manufacture or subsequently caused by damage /wear and tear / weather conditions). The first author is a UK police officer and, like his senior analyst colleague who is the second author, has wide experience in testing and developing ANPR systems. The authors have been commissioned by the UK Home Office to carry out post graduate ANPR research at the University of Hertfordshire.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393571
Marcia Mendes, A. Schwaninger, Nadine Strebel, S. Michel
Security screening at airports is a highly relevant topic for more than a decade. Large amounts of money are still being invested to continuously improve the efficiency and effectiveness of passenger and baggage screening processes. State-of-the-art x-ray screening machines provide good quality images with high resolutions. Yet, the detection of prohibited items remains a challenging task for screening officers (screeners) and becomes even more difficult when dense electronic devices, such as laptops, are contained in baggage. Due to their compact construction, laptops can easily conceal other parts of luggage or could be used to hide threat items. International and national regulations specify that laptops need to be taken out of passenger bags at security checkpoints for x-ray screening, sometimes causing lower passenger throughput and even annoyance among passengers. The aim of this study was to investigate how leaving laptops inside passenger bags actually affects detection performance of x-ray screening officers, when state-of-the-art technology providing single-view images is applied. The experiment was conducted with 40 certified screening officers from an international European airport. Participants were divided into two experimental groups. Both groups conducted an image interpretation test containing bags and laptops. For the first group, images of bags and laptops were displayed separately, while for the second group, laptops were left inside the passenger bags and displayed as one image. All participants had to judge whether the displayed bags and laptops contained a threat item or not. Threat items of four different categories were used: guns, knives, improvised explosive devices (IEDs) and others (e.g. electronic shock devices). Detection performance (A') and reaction times were measured. A highly significant difference in detection performance between both groups was observed. Throughout all analyses, detection performance scores were much higher when bags and laptops were x-rayed separately. Largest differences were found for the category IEDs. Altogether, the results imply that when no automatic threat detection and only single view images are available, the detection of prohibited items is still far more reliable when bags and laptops are screened separately.
{"title":"Why laptops should be screened separately when conventional x-ray screening is used","authors":"Marcia Mendes, A. Schwaninger, Nadine Strebel, S. Michel","doi":"10.1109/CCST.2012.6393571","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393571","url":null,"abstract":"Security screening at airports is a highly relevant topic for more than a decade. Large amounts of money are still being invested to continuously improve the efficiency and effectiveness of passenger and baggage screening processes. State-of-the-art x-ray screening machines provide good quality images with high resolutions. Yet, the detection of prohibited items remains a challenging task for screening officers (screeners) and becomes even more difficult when dense electronic devices, such as laptops, are contained in baggage. Due to their compact construction, laptops can easily conceal other parts of luggage or could be used to hide threat items. International and national regulations specify that laptops need to be taken out of passenger bags at security checkpoints for x-ray screening, sometimes causing lower passenger throughput and even annoyance among passengers. The aim of this study was to investigate how leaving laptops inside passenger bags actually affects detection performance of x-ray screening officers, when state-of-the-art technology providing single-view images is applied. The experiment was conducted with 40 certified screening officers from an international European airport. Participants were divided into two experimental groups. Both groups conducted an image interpretation test containing bags and laptops. For the first group, images of bags and laptops were displayed separately, while for the second group, laptops were left inside the passenger bags and displayed as one image. All participants had to judge whether the displayed bags and laptops contained a threat item or not. Threat items of four different categories were used: guns, knives, improvised explosive devices (IEDs) and others (e.g. electronic shock devices). Detection performance (A') and reaction times were measured. A highly significant difference in detection performance between both groups was observed. Throughout all analyses, detection performance scores were much higher when bags and laptops were x-rayed separately. Largest differences were found for the category IEDs. Altogether, the results imply that when no automatic threat detection and only single view images are available, the detection of prohibited items is still far more reliable when bags and laptops are screened separately.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131360864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393544
M. Faúndez-Zanuy, E. Sesa-Nogueras, J. Alcobé
One of the main drawbaks of biometric recognition is its unstability along time. One of the main reasons for the loss of performance of biometric systems is the aging of its enrolled users. Features -and models built from them- that were up-to-date at the time of their acquisition may eventually become outdated, leading to a failure in recognition tasks. In this paper, we analyze the effect of aging in online handwriting as well as its relevance on biometric error rates. Experimets have been conducted on our BIOSECURID database, which contains data donated by 400 individuals. According to our preliminary experiments, the average handwriting speed steeply decreases for writers who are 60 and above. Regarding the relation between verification errors and age, results suggest that false rejections are not age-dependent while false acceptances seem to be related to the age of the writer.
{"title":"On the relevance of age in handwritten biometric recognition","authors":"M. Faúndez-Zanuy, E. Sesa-Nogueras, J. Alcobé","doi":"10.1109/CCST.2012.6393544","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393544","url":null,"abstract":"One of the main drawbaks of biometric recognition is its unstability along time. One of the main reasons for the loss of performance of biometric systems is the aging of its enrolled users. Features -and models built from them- that were up-to-date at the time of their acquisition may eventually become outdated, leading to a failure in recognition tasks. In this paper, we analyze the effect of aging in online handwriting as well as its relevance on biometric error rates. Experimets have been conducted on our BIOSECURID database, which contains data donated by 400 individuals. According to our preliminary experiments, the average handwriting speed steeply decreases for writers who are 60 and above. Regarding the relation between verification errors and age, results suggest that false rejections are not age-dependent while false acceptances seem to be related to the age of the writer.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393585
B. Norman
When combined with a compatible assessment system, select video analytic devices can provide intrusion detection and target-tracking capabilities. With an attractive relative low cost, demand for video analytics has focused on high probability of detection and low nuisance alarm rate that has prioritized investment toward performance improvements. Modern algorithms offer sophisticated video-based intrusion detection and tracking capabilities that were unavailable a decade earlier. The modern video analytics have been shown to have a significant reduction of previously observed high nuisance alarm rates with improved detection capabilities. This paper includes results of a recent device evaluation performed at Sandia National Laboratories for a representative exterior intrusion detection application. For this limited scope effort, the device was evaluated for probability of detection and monitored for nuisance and false alarms over a six-month period from September 2010 to April 2011 (nuisance alarm cause is detailed). This paper also includes general and specific implementation considerations for video analytics. The author asserts that this work holds potential to improve implementation strategies for video-based detection sensors for several types of exterior perimeter and extended detection-sensing applications, making the case for interoperation and compliance standardization between video and sensor technology vendors for simplified integration of video analytic algorithms into security platforms.
{"title":"Assessment of video analytics for exterior intrusion detection applications","authors":"B. Norman","doi":"10.1109/CCST.2012.6393585","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393585","url":null,"abstract":"When combined with a compatible assessment system, select video analytic devices can provide intrusion detection and target-tracking capabilities. With an attractive relative low cost, demand for video analytics has focused on high probability of detection and low nuisance alarm rate that has prioritized investment toward performance improvements. Modern algorithms offer sophisticated video-based intrusion detection and tracking capabilities that were unavailable a decade earlier. The modern video analytics have been shown to have a significant reduction of previously observed high nuisance alarm rates with improved detection capabilities. This paper includes results of a recent device evaluation performed at Sandia National Laboratories for a representative exterior intrusion detection application. For this limited scope effort, the device was evaluated for probability of detection and monitored for nuisance and false alarms over a six-month period from September 2010 to April 2011 (nuisance alarm cause is detailed). This paper also includes general and specific implementation considerations for video analytics. The author asserts that this work holds potential to improve implementation strategies for video-based detection sensors for several types of exterior perimeter and extended detection-sensing applications, making the case for interoperation and compliance standardization between video and sensor technology vendors for simplified integration of video analytic algorithms into security platforms.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124377414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393534
Han Lin, M. Schwartz, John T. Michalski, M. Shakamuri, P. Campbell
Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government's reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify solutions; however, alternative strategies must be explored. It is extremely challenging to establish the trustworthiness of a supply chain for a product or system in today's globalized climate, especially given the complexity and variability of the hardware and software, and the diverse geographical areas where they are made. Counterfeit items, from individual chips to entire systems, have been found both in commercial and government sectors. Supply chain attacks can be inserted at any point during the product or system life cycle and can have detrimental effects to mission success. We hypothesize that wisdom of crowds techniques may be applicable to the analysis of supply chain integrity. Current supply chain security efforts are hindered by a lack of detailed information on a product's entire supply chain. End-users have virtually no access to supply chain information, and even major manufacturers may have difficulty getting access to their suppliers' sub-suppliers. Component testing and even reverse engineering can be used to mitigate risks, but these approaches are imperfect, time consuming, and expensive. This paper will discuss the development of a semi-automated supply chain integrity risk analysis framework to assist the supply chain security analysts in assessing the level of risk associated with a component of a mission critical system. This capability can provide the system designer a more rigorous and efficient approach to assess the security of the components in the design. By fusing all of these tools into a centralized framework, we hypothesis that we can create a capability that will enable analysts to more effectively interrogate the data and extract trending as well as critical information.
{"title":"Leveraging a crowd sourcing methodology to enhance supply chain integrity","authors":"Han Lin, M. Schwartz, John T. Michalski, M. Shakamuri, P. Campbell","doi":"10.1109/CCST.2012.6393534","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393534","url":null,"abstract":"Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government's reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify solutions; however, alternative strategies must be explored. It is extremely challenging to establish the trustworthiness of a supply chain for a product or system in today's globalized climate, especially given the complexity and variability of the hardware and software, and the diverse geographical areas where they are made. Counterfeit items, from individual chips to entire systems, have been found both in commercial and government sectors. Supply chain attacks can be inserted at any point during the product or system life cycle and can have detrimental effects to mission success. We hypothesize that wisdom of crowds techniques may be applicable to the analysis of supply chain integrity. Current supply chain security efforts are hindered by a lack of detailed information on a product's entire supply chain. End-users have virtually no access to supply chain information, and even major manufacturers may have difficulty getting access to their suppliers' sub-suppliers. Component testing and even reverse engineering can be used to mitigate risks, but these approaches are imperfect, time consuming, and expensive. This paper will discuss the development of a semi-automated supply chain integrity risk analysis framework to assist the supply chain security analysts in assessing the level of risk associated with a component of a mission critical system. This capability can provide the system designer a more rigorous and efficient approach to assess the security of the components in the design. By fusing all of these tools into a centralized framework, we hypothesis that we can create a capability that will enable analysts to more effectively interrogate the data and extract trending as well as critical information.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124039955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393558
Min-Ku Kim, Dong‐Guk Han, J. Ryoo, Okyeon Yi
In a side channel attack, misalignment is a major factor that decreases the attack effectiveness. In order to resolve this issue, correlation power frequency analysis (CPFA) was recently introduced in the frequency domain by Schimmel. This method changes signals from the time domain to the frequency domain to analyze the information using FFT and is able to analytically solve the decrease in the attack effectiveness due to the misalignment. However, for signals that change their frequency components randomly, the results of the analysis are not as good. Moreover, there is a critical point that loses information in the time domain. In order to solve this limitation, we have developed correlation power spectrogram analysis (CPSA), which has excellent performance in side channel analysis. This method converts the time domain information to time domain-frequency domain information using a spectrogram, and the changed information keeps the time information of regular resolution. This method shows excellent performance for the variation in frequency components, as well. In this study, AES power consumption signals were collected from ARM, IC CARD, and MSP430 chips that were developed in the SCARF system. Using these signals, the method shown in this paper yields better performance than CPA or CPFA.
{"title":"CPA performance enhancement based on spectrogram","authors":"Min-Ku Kim, Dong‐Guk Han, J. Ryoo, Okyeon Yi","doi":"10.1109/CCST.2012.6393558","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393558","url":null,"abstract":"In a side channel attack, misalignment is a major factor that decreases the attack effectiveness. In order to resolve this issue, correlation power frequency analysis (CPFA) was recently introduced in the frequency domain by Schimmel. This method changes signals from the time domain to the frequency domain to analyze the information using FFT and is able to analytically solve the decrease in the attack effectiveness due to the misalignment. However, for signals that change their frequency components randomly, the results of the analysis are not as good. Moreover, there is a critical point that loses information in the time domain. In order to solve this limitation, we have developed correlation power spectrogram analysis (CPSA), which has excellent performance in side channel analysis. This method converts the time domain information to time domain-frequency domain information using a spectrogram, and the changed information keeps the time information of regular resolution. This method shows excellent performance for the variation in frequency components, as well. In this study, AES power consumption signals were collected from ARM, IC CARD, and MSP430 chips that were developed in the SCARF system. Using these signals, the method shown in this paper yields better performance than CPA or CPFA.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128536772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393556
Martin Henzl, P. Hanáček, Peter Jurnecka, Matej Kacic
Designing and implementing secure applications which use contactless communication link is difficult even when secure hardware is used. Many current proximity devices, such as contactless smart cards or near field communication devices, are verified to be highly secure; however, inappropriate protocol implementation may result in the leak of sensitive information, even if the protocol is also secure by itself. In this paper we show a concept of automated vulnerability search in protocol implementation by using verification methods, which should help developers to verify their applications. We also show simple example of possible attack on seemingly secure payment protocol implemented using seemingly secure smart card to show the way the adversary can abuse improper implementation. The vulnerability the attacker exploits can be in one command or in a combination of commands, which are not vulnerable individually. It is not easy to find such combinations manually, this is where the automated verification methods are put to use. A model checker, provided with an appropriate model, can automatically find vulnerabilities which are not likely to be found manually. The model can be created by the actual communication analysis. We wanted to show that the adversary does not have to have the access to the source code of the application to perform a successful attack, so a platform for the application analysis from the actual contactless communication was developed. The platform provides eavesdropping, altering data for man-in-the-middle attack, and emulating of both communication parties. The source code can help the analysis, but would not be sufficient by itself, so creating model from source code was left for future research. When the model checker finds vulnerability, an attack can be executed. The attack can be either successful, revealing real vulnerability which must be fixed, or unsuccessful, which would result in the model refinement and another model checker run.
{"title":"A concept of automated vulnerability search in contactless communication applications","authors":"Martin Henzl, P. Hanáček, Peter Jurnecka, Matej Kacic","doi":"10.1109/CCST.2012.6393556","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393556","url":null,"abstract":"Designing and implementing secure applications which use contactless communication link is difficult even when secure hardware is used. Many current proximity devices, such as contactless smart cards or near field communication devices, are verified to be highly secure; however, inappropriate protocol implementation may result in the leak of sensitive information, even if the protocol is also secure by itself. In this paper we show a concept of automated vulnerability search in protocol implementation by using verification methods, which should help developers to verify their applications. We also show simple example of possible attack on seemingly secure payment protocol implemented using seemingly secure smart card to show the way the adversary can abuse improper implementation. The vulnerability the attacker exploits can be in one command or in a combination of commands, which are not vulnerable individually. It is not easy to find such combinations manually, this is where the automated verification methods are put to use. A model checker, provided with an appropriate model, can automatically find vulnerabilities which are not likely to be found manually. The model can be created by the actual communication analysis. We wanted to show that the adversary does not have to have the access to the source code of the application to perform a successful attack, so a platform for the application analysis from the actual contactless communication was developed. The platform provides eavesdropping, altering data for man-in-the-middle attack, and emulating of both communication parties. The source code can help the analysis, but would not be sufficient by itself, so creating model from source code was left for future research. When the model checker finds vulnerability, an attack can be executed. The attack can be either successful, revealing real vulnerability which must be fixed, or unsuccessful, which would result in the model refinement and another model checker run.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393530
K. Harman, Wayne K. Messner
Outdoor perimeter security sensors have played, and continue to play, an important role in the security of critical assets and VIP residents over the past 40 years. In many ways outdoor security sensor technology can be described as “Slow-Tech” in a “High-Tech” world. In “High-Tech” we can expect a new product every few months with product lifetimes of one to two years. In the “Slow-Tech” world of outdoor security it typically takes two to three years to develop a new product and another two to three years to get the product approved by the user community. Fortunately once approved these products have a lifetime of ten to twenty years. The Carnahan Conference has provided an important venue for the introduction of new sensor technologies as they emerge from R&D, are tested by various agencies, and are introduced into the “real world” of outdoor security. The harsh realities of the outdoor environment and the wide range of threats faced by these sensors provide many challenges that have been the topic of many of the learned papers. The Carnahan conference provides an opportunity for the users of the technology to relate their experience to those who wish to introduce new technologies. Through the sponsorship of the IEEE these papers form a unique point of reference for the development of new sensors. Forty years ago most of the important players were large aerospace companies. Many of the sensor technologies used in perimeter security evolved from military developments. As one of the dominant users of perimeter security equipment, the US military sponsored much of this early development. This “mil-spec” environment had a profound effect on these developments which in many cases has survived to this day and is part of the heritage of the present world on outdoor perimeter security. These companies gave way to a number of small “spin-off” one product companies where the technologies were exploited. More recently most of one product companies have merged into larger “one-stop-shopping” companies. This paper describes the many changes in technology, the business models and the user community over the past 40 years and concludes with a prediction as to what the next 10 years will bring.
{"title":"Outdoor perimeter security sensors a forty year perspective","authors":"K. Harman, Wayne K. Messner","doi":"10.1109/CCST.2012.6393530","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393530","url":null,"abstract":"Outdoor perimeter security sensors have played, and continue to play, an important role in the security of critical assets and VIP residents over the past 40 years. In many ways outdoor security sensor technology can be described as “Slow-Tech” in a “High-Tech” world. In “High-Tech” we can expect a new product every few months with product lifetimes of one to two years. In the “Slow-Tech” world of outdoor security it typically takes two to three years to develop a new product and another two to three years to get the product approved by the user community. Fortunately once approved these products have a lifetime of ten to twenty years. The Carnahan Conference has provided an important venue for the introduction of new sensor technologies as they emerge from R&D, are tested by various agencies, and are introduced into the “real world” of outdoor security. The harsh realities of the outdoor environment and the wide range of threats faced by these sensors provide many challenges that have been the topic of many of the learned papers. The Carnahan conference provides an opportunity for the users of the technology to relate their experience to those who wish to introduce new technologies. Through the sponsorship of the IEEE these papers form a unique point of reference for the development of new sensors. Forty years ago most of the important players were large aerospace companies. Many of the sensor technologies used in perimeter security evolved from military developments. As one of the dominant users of perimeter security equipment, the US military sponsored much of this early development. This “mil-spec” environment had a profound effect on these developments which in many cases has survived to this day and is part of the heritage of the present world on outdoor perimeter security. These companies gave way to a number of small “spin-off” one product companies where the technologies were exploited. More recently most of one product companies have merged into larger “one-stop-shopping” companies. This paper describes the many changes in technology, the business models and the user community over the past 40 years and concludes with a prediction as to what the next 10 years will bring.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124894175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}