首页 > 最新文献

2012 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
A mission resilience assessment methodology for infrastructure disruptions 一种针对基础设施中断的任务弹性评估方法
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393537
E. Vugrin, K. Stamber, Michael J. Baca, Gio K. Kao, H. Le, Michael Mtchell, Rick Ramirez, K. Welch
Resilience has recently emerged as a security priority, but the development of mission resilience analysis techniques for military systems has lagged behind those for other systems. This paper identifies gaps for mission resilience assessment in current vulnerability assessment approaches used at military facilities. Additionally, the paper describes ongoing research to develop a set of mission resilience models that addresses those gaps and could be used to evaluate mission resilience to electric power outages.
弹性最近已成为安全优先事项,但军事系统任务弹性分析技术的发展落后于其他系统。本文指出了目前军事设施使用的脆弱性评估方法中任务恢复力评估的差距。此外,本文描述了正在进行的研究,以开发一套任务弹性模型,以解决这些差距,并可用于评估任务对停电的弹性。
{"title":"A mission resilience assessment methodology for infrastructure disruptions","authors":"E. Vugrin, K. Stamber, Michael J. Baca, Gio K. Kao, H. Le, Michael Mtchell, Rick Ramirez, K. Welch","doi":"10.1109/CCST.2012.6393537","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393537","url":null,"abstract":"Resilience has recently emerged as a security priority, but the development of mission resilience analysis techniques for military systems has lagged behind those for other systems. This paper identifies gaps for mission resilience assessment in current vulnerability assessment approaches used at military facilities. Additionally, the paper describes ongoing research to develop a set of mission resilience models that addresses those gaps and could be used to evaluate mission resilience to electric power outages.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127824157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrated communications and navigation module 集成通信和导航模块
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393568
P. C. Haddock, J. Hatley, W. D. Morse, R. D. Tooley
An iridium communications and navigation module (ICNM) has been developed for movement tracking applications. External interfaces to the ICNM include Ethernet, RS-232, and Serial Peripheral Interface (SPI) Bus. The module is powered by Power over Ethernet (PoE) or a +24VDC connection. The ICNM fits within the standard PC104 form factor, but utilizes a Modular Component and Sensor Bus (MCSB) interface specification for the high density connector. The ICNM includes a GPS receiver and accelerators for satellite and inertial tracking. The module manages all of the satellite communication control, encryption, and navigation functions that enable its rapid integration as a component into larger systems.
一种铱通信和导航模块(ICNM)已开发用于运动跟踪应用。ICNM的外部接口包括以太网、RS-232和SPI (Serial Peripheral Interface)总线。模块供电方式为PoE供电或+24VDC供电。ICNM适合标准PC104外形,但高密度连接器采用模块化组件和传感器总线(MCSB)接口规范。ICNM包括一个GPS接收器和用于卫星和惯性跟踪的加速器。该模块管理所有卫星通信控制、加密和导航功能,使其能够作为一个组件快速集成到更大的系统中。
{"title":"Integrated communications and navigation module","authors":"P. C. Haddock, J. Hatley, W. D. Morse, R. D. Tooley","doi":"10.1109/CCST.2012.6393568","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393568","url":null,"abstract":"An iridium communications and navigation module (ICNM) has been developed for movement tracking applications. External interfaces to the ICNM include Ethernet, RS-232, and Serial Peripheral Interface (SPI) Bus. The module is powered by Power over Ethernet (PoE) or a +24VDC connection. The ICNM fits within the standard PC104 form factor, but utilizes a Modular Component and Sensor Bus (MCSB) interface specification for the high density connector. The ICNM includes a GPS receiver and accelerators for satellite and inertial tracking. The module manages all of the satellite communication control, encryption, and navigation functions that enable its rapid integration as a component into larger systems.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115247531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Working towards an international ANPR Standard — An initial investigation into the UK standard 致力于建立国际ANPR标准——对英国标准的初步调查
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393581
Robert Gurney, Mike Rhead, S. Ramalingam, N. Cohen
This paper examines the use of the UK National AC PO ANPR Standard (NAAS) as the "de facto" technical standard applied in many international countries. It considers the requirement for a standard and examines the effectiveness of the current NAAS and questions its fitness for purpose. The need for accuracy is discussed in terms of both tackling terrorism, serious crime and other law enforcement investigations alongside the need to protect citizens from unwarranted infringement of their privacy as a result of ANPR misreads. The causes of inaccurate ANPR read data are examined in more detail and recommendations made as to how improvements could be introduced to minimise the risk of misreads and "missed" reads. This paper recommends future parameters of measurement and provides examples of gaps between the current standards and existing legislation. Laboratory and field testing was carried out to gain a better understanding of the factors that affect the performance of ANPR systems. These tests were carried out under a variety of weather and lighting conditions. The results of this work have led to further testing to better understand the optimum conditions for number plate capture by a variety of ANPR systems. Additional testing has been carried out using "hard to read" number plates with a number of differing characteristics such as illegally spaced characters, illegal fonts, screw caps that interfere with infrared imaging and defects in the construction of the number plate itself (whether created inadvertently at the point of manufacture or subsequently caused by damage /wear and tear / weather conditions). The first author is a UK police officer and, like his senior analyst colleague who is the second author, has wide experience in testing and developing ANPR systems. The authors have been commissioned by the UK Home Office to carry out post graduate ANPR research at the University of Hertfordshire.
本文考察了英国国家AC PO ANPR标准(NAAS)作为许多国际国家应用的“事实上”技术标准的使用情况。它考虑对标准的要求,检查当前NAAS的有效性,并质疑其是否适合目的。在应对恐怖主义、严重犯罪和其他执法调查方面,以及保护公民隐私免受ANPR误读造成的无端侵犯方面,对准确性的需求进行了讨论。更详细地检查了ANPR读取数据不准确的原因,并就如何改进以尽量减少误读和“错过”读取的风险提出了建议。本文建议了未来的测量参数,并提供了当前标准与现有立法之间差距的例子。为了更好地了解影响ANPR系统性能的因素,进行了实验室和现场测试。这些测试是在各种天气和光照条件下进行的。这项工作的结果导致了进一步的测试,以更好地了解各种ANPR系统捕获车牌的最佳条件。额外的测试使用了“难以阅读”的车牌,这些车牌具有许多不同的特征,如非法间隔的字符、非法字体、干扰红外成像的螺旋盖和车牌本身结构的缺陷(无论是在制造时无意中产生的,还是随后因损坏/磨损/天气条件造成的)。第一作者是一名英国警官,与他的高级分析师同事(第二作者)一样,他在测试和开发ANPR系统方面拥有丰富的经验。作者受英国内政部委托,在赫特福德大学进行研究生ANPR研究。
{"title":"Working towards an international ANPR Standard — An initial investigation into the UK standard","authors":"Robert Gurney, Mike Rhead, S. Ramalingam, N. Cohen","doi":"10.1109/CCST.2012.6393581","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393581","url":null,"abstract":"This paper examines the use of the UK National AC PO ANPR Standard (NAAS) as the \"de facto\" technical standard applied in many international countries. It considers the requirement for a standard and examines the effectiveness of the current NAAS and questions its fitness for purpose. The need for accuracy is discussed in terms of both tackling terrorism, serious crime and other law enforcement investigations alongside the need to protect citizens from unwarranted infringement of their privacy as a result of ANPR misreads. The causes of inaccurate ANPR read data are examined in more detail and recommendations made as to how improvements could be introduced to minimise the risk of misreads and \"missed\" reads. This paper recommends future parameters of measurement and provides examples of gaps between the current standards and existing legislation. Laboratory and field testing was carried out to gain a better understanding of the factors that affect the performance of ANPR systems. These tests were carried out under a variety of weather and lighting conditions. The results of this work have led to further testing to better understand the optimum conditions for number plate capture by a variety of ANPR systems. Additional testing has been carried out using \"hard to read\" number plates with a number of differing characteristics such as illegally spaced characters, illegal fonts, screw caps that interfere with infrared imaging and defects in the construction of the number plate itself (whether created inadvertently at the point of manufacture or subsequently caused by damage /wear and tear / weather conditions). The first author is a UK police officer and, like his senior analyst colleague who is the second author, has wide experience in testing and developing ANPR systems. The authors have been commissioned by the UK Home Office to carry out post graduate ANPR research at the University of Hertfordshire.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Why laptops should be screened separately when conventional x-ray screening is used 为什么笔记本电脑在使用常规x光检查时要单独检查
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393571
Marcia Mendes, A. Schwaninger, Nadine Strebel, S. Michel
Security screening at airports is a highly relevant topic for more than a decade. Large amounts of money are still being invested to continuously improve the efficiency and effectiveness of passenger and baggage screening processes. State-of-the-art x-ray screening machines provide good quality images with high resolutions. Yet, the detection of prohibited items remains a challenging task for screening officers (screeners) and becomes even more difficult when dense electronic devices, such as laptops, are contained in baggage. Due to their compact construction, laptops can easily conceal other parts of luggage or could be used to hide threat items. International and national regulations specify that laptops need to be taken out of passenger bags at security checkpoints for x-ray screening, sometimes causing lower passenger throughput and even annoyance among passengers. The aim of this study was to investigate how leaving laptops inside passenger bags actually affects detection performance of x-ray screening officers, when state-of-the-art technology providing single-view images is applied. The experiment was conducted with 40 certified screening officers from an international European airport. Participants were divided into two experimental groups. Both groups conducted an image interpretation test containing bags and laptops. For the first group, images of bags and laptops were displayed separately, while for the second group, laptops were left inside the passenger bags and displayed as one image. All participants had to judge whether the displayed bags and laptops contained a threat item or not. Threat items of four different categories were used: guns, knives, improvised explosive devices (IEDs) and others (e.g. electronic shock devices). Detection performance (A') and reaction times were measured. A highly significant difference in detection performance between both groups was observed. Throughout all analyses, detection performance scores were much higher when bags and laptops were x-rayed separately. Largest differences were found for the category IEDs. Altogether, the results imply that when no automatic threat detection and only single view images are available, the detection of prohibited items is still far more reliable when bags and laptops are screened separately.
十多年来,机场安检一直是一个高度相关的话题。大量资金仍在投入,以不断提高乘客和行李检查流程的效率和效果。最先进的x射线筛检机提供高分辨率的高质量图像。然而,对检查人员来说,检测违禁物品仍然是一项具有挑战性的任务,当行李中装有密集的电子设备(如笔记本电脑)时,就更加困难了。由于其紧凑的结构,笔记本电脑可以很容易地隐藏行李的其他部分或可以用来隐藏威胁项目。国际和国家规定规定,在安检处进行x光检查时,需要从乘客包中取出笔记本电脑,这有时会降低乘客吞吐量,甚至会让乘客感到烦恼。本研究的目的是调查当使用最先进的单视图图像技术时,将笔记本电脑放在乘客包内实际上如何影响x射线检查人员的检测性能。该实验由40名来自欧洲国际机场的认证安检人员进行。参与者被分为两个实验组。两组人都用包和笔记本电脑进行了图像解读测试。第一组将行李和笔记本电脑的图像分开显示,第二组将笔记本电脑放在乘客的行李中,并作为一个图像显示。所有参与者都必须判断展示的包和笔记本电脑是否包含威胁物品。使用了四种不同类别的威胁物品:枪支、刀具、简易爆炸装置(ied)和其他(例如电子电击装置)。测定检测性能(A′)和反应时间。两组之间的检测性能有显著差异。在所有的分析中,当包和笔记本电脑分别进行x光检查时,检测性能得分要高得多。简易爆炸装置类别的差异最大。总的来说,结果表明,在没有自动威胁检测和只有单视图图像可用的情况下,单独筛查包和笔记本电脑对违禁物品的检测仍然要可靠得多。
{"title":"Why laptops should be screened separately when conventional x-ray screening is used","authors":"Marcia Mendes, A. Schwaninger, Nadine Strebel, S. Michel","doi":"10.1109/CCST.2012.6393571","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393571","url":null,"abstract":"Security screening at airports is a highly relevant topic for more than a decade. Large amounts of money are still being invested to continuously improve the efficiency and effectiveness of passenger and baggage screening processes. State-of-the-art x-ray screening machines provide good quality images with high resolutions. Yet, the detection of prohibited items remains a challenging task for screening officers (screeners) and becomes even more difficult when dense electronic devices, such as laptops, are contained in baggage. Due to their compact construction, laptops can easily conceal other parts of luggage or could be used to hide threat items. International and national regulations specify that laptops need to be taken out of passenger bags at security checkpoints for x-ray screening, sometimes causing lower passenger throughput and even annoyance among passengers. The aim of this study was to investigate how leaving laptops inside passenger bags actually affects detection performance of x-ray screening officers, when state-of-the-art technology providing single-view images is applied. The experiment was conducted with 40 certified screening officers from an international European airport. Participants were divided into two experimental groups. Both groups conducted an image interpretation test containing bags and laptops. For the first group, images of bags and laptops were displayed separately, while for the second group, laptops were left inside the passenger bags and displayed as one image. All participants had to judge whether the displayed bags and laptops contained a threat item or not. Threat items of four different categories were used: guns, knives, improvised explosive devices (IEDs) and others (e.g. electronic shock devices). Detection performance (A') and reaction times were measured. A highly significant difference in detection performance between both groups was observed. Throughout all analyses, detection performance scores were much higher when bags and laptops were x-rayed separately. Largest differences were found for the category IEDs. Altogether, the results imply that when no automatic threat detection and only single view images are available, the detection of prohibited items is still far more reliable when bags and laptops are screened separately.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131360864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the relevance of age in handwritten biometric recognition 手写体生物特征识别中年龄的相关性研究
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393544
M. Faúndez-Zanuy, E. Sesa-Nogueras, J. Alcobé
One of the main drawbaks of biometric recognition is its unstability along time. One of the main reasons for the loss of performance of biometric systems is the aging of its enrolled users. Features -and models built from them- that were up-to-date at the time of their acquisition may eventually become outdated, leading to a failure in recognition tasks. In this paper, we analyze the effect of aging in online handwriting as well as its relevance on biometric error rates. Experimets have been conducted on our BIOSECURID database, which contains data donated by 400 individuals. According to our preliminary experiments, the average handwriting speed steeply decreases for writers who are 60 and above. Regarding the relation between verification errors and age, results suggest that false rejections are not age-dependent while false acceptances seem to be related to the age of the writer.
生物特征识别的主要缺点之一是其随时间的不稳定性。生物识别系统性能下降的主要原因之一是其注册用户的老龄化。在获取特征时是最新的特征——以及以此为基础构建的模型——最终可能会过时,导致识别任务失败。在本文中,我们分析了在线笔迹老化的影响及其与生物识别错误率的相关性。我们在BIOSECURID数据库上进行了实验,该数据库包含400个人捐赠的数据。根据我们的初步实验,60岁及以上的作家的平均书写速度急剧下降。关于验证错误与年龄的关系,结果表明,错误拒绝与年龄无关,而错误接受似乎与作者的年龄有关。
{"title":"On the relevance of age in handwritten biometric recognition","authors":"M. Faúndez-Zanuy, E. Sesa-Nogueras, J. Alcobé","doi":"10.1109/CCST.2012.6393544","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393544","url":null,"abstract":"One of the main drawbaks of biometric recognition is its unstability along time. One of the main reasons for the loss of performance of biometric systems is the aging of its enrolled users. Features -and models built from them- that were up-to-date at the time of their acquisition may eventually become outdated, leading to a failure in recognition tasks. In this paper, we analyze the effect of aging in online handwriting as well as its relevance on biometric error rates. Experimets have been conducted on our BIOSECURID database, which contains data donated by 400 individuals. According to our preliminary experiments, the average handwriting speed steeply decreases for writers who are 60 and above. Regarding the relation between verification errors and age, results suggest that false rejections are not age-dependent while false acceptances seem to be related to the age of the writer.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Assessment of video analytics for exterior intrusion detection applications 外部入侵检测应用的视频分析评估
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393585
B. Norman
When combined with a compatible assessment system, select video analytic devices can provide intrusion detection and target-tracking capabilities. With an attractive relative low cost, demand for video analytics has focused on high probability of detection and low nuisance alarm rate that has prioritized investment toward performance improvements. Modern algorithms offer sophisticated video-based intrusion detection and tracking capabilities that were unavailable a decade earlier. The modern video analytics have been shown to have a significant reduction of previously observed high nuisance alarm rates with improved detection capabilities. This paper includes results of a recent device evaluation performed at Sandia National Laboratories for a representative exterior intrusion detection application. For this limited scope effort, the device was evaluated for probability of detection and monitored for nuisance and false alarms over a six-month period from September 2010 to April 2011 (nuisance alarm cause is detailed). This paper also includes general and specific implementation considerations for video analytics. The author asserts that this work holds potential to improve implementation strategies for video-based detection sensors for several types of exterior perimeter and extended detection-sensing applications, making the case for interoperation and compliance standardization between video and sensor technology vendors for simplified integration of video analytic algorithms into security platforms.
当与兼容的评估系统相结合时,选择视频分析设备可以提供入侵检测和目标跟踪功能。由于成本相对较低,对视频分析的需求主要集中在高检测概率和低滋扰报警率上,因此优先考虑对性能改进的投资。现代算法提供了复杂的基于视频的入侵检测和跟踪功能,这在十年前是不可用的。现代视频分析已被证明具有显著减少以前观察到的高滋扰报警率与改进的检测能力。本文包括最近在桑迪亚国家实验室进行的具有代表性的外部入侵检测应用的设备评估结果。在2010年9月至2011年4月的六个月期间,对该设备的检测概率进行了评估,并对滋扰和假警报进行了监测(滋扰警报原因详细说明)。本文还包括视频分析的一般和具体实现考虑因素。作者断言,这项工作有潜力改进基于视频的检测传感器的实施策略,用于几种类型的外部边界和扩展的检测传感应用,为视频和传感器技术供应商之间的互操作和合规标准化提供案例,以简化视频分析算法集成到安全平台中。
{"title":"Assessment of video analytics for exterior intrusion detection applications","authors":"B. Norman","doi":"10.1109/CCST.2012.6393585","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393585","url":null,"abstract":"When combined with a compatible assessment system, select video analytic devices can provide intrusion detection and target-tracking capabilities. With an attractive relative low cost, demand for video analytics has focused on high probability of detection and low nuisance alarm rate that has prioritized investment toward performance improvements. Modern algorithms offer sophisticated video-based intrusion detection and tracking capabilities that were unavailable a decade earlier. The modern video analytics have been shown to have a significant reduction of previously observed high nuisance alarm rates with improved detection capabilities. This paper includes results of a recent device evaluation performed at Sandia National Laboratories for a representative exterior intrusion detection application. For this limited scope effort, the device was evaluated for probability of detection and monitored for nuisance and false alarms over a six-month period from September 2010 to April 2011 (nuisance alarm cause is detailed). This paper also includes general and specific implementation considerations for video analytics. The author asserts that this work holds potential to improve implementation strategies for video-based detection sensors for several types of exterior perimeter and extended detection-sensing applications, making the case for interoperation and compliance standardization between video and sensor technology vendors for simplified integration of video analytic algorithms into security platforms.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124377414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Leveraging a crowd sourcing methodology to enhance supply chain integrity 利用众包方法提高供应链的完整性
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393534
Han Lin, M. Schwartz, John T. Michalski, M. Shakamuri, P. Campbell
Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government's reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify solutions; however, alternative strategies must be explored. It is extremely challenging to establish the trustworthiness of a supply chain for a product or system in today's globalized climate, especially given the complexity and variability of the hardware and software, and the diverse geographical areas where they are made. Counterfeit items, from individual chips to entire systems, have been found both in commercial and government sectors. Supply chain attacks can be inserted at any point during the product or system life cycle and can have detrimental effects to mission success. We hypothesize that wisdom of crowds techniques may be applicable to the analysis of supply chain integrity. Current supply chain security efforts are hindered by a lack of detailed information on a product's entire supply chain. End-users have virtually no access to supply chain information, and even major manufacturers may have difficulty getting access to their suppliers' sub-suppliers. Component testing and even reverse engineering can be used to mitigate risks, but these approaches are imperfect, time consuming, and expensive. This paper will discuss the development of a semi-automated supply chain integrity risk analysis framework to assist the supply chain security analysts in assessing the level of risk associated with a component of a mission critical system. This capability can provide the system designer a more rigorous and efficient approach to assess the security of the components in the design. By fusing all of these tools into a centralized framework, we hypothesis that we can create a capability that will enable analysts to more effectively interrogate the data and extract trending as well as critical information.
供应链完整性(SCI)正成为关键系统面临的首要安全问题之一。政府对商用现货(COTS)产品的依赖是显而易见的,关键系统在海外设计和制造的威胁也是如此。到目前为止,几乎没有工具或功能可以防止甚至检测到这些攻击。DARPA信托基金等项目的存在是为了确定解决方案;然而,必须探索替代战略。在当今全球化的气候下,为产品或系统建立可信赖的供应链是极具挑战性的,特别是考虑到硬件和软件的复杂性和可变性,以及制造它们的不同地理区域。从单个芯片到整个系统,在商业和政府部门都发现了假冒产品。供应链攻击可以在产品或系统生命周期的任何时刻插入,并可能对任务成功产生不利影响。我们假设群体智慧技术可能适用于供应链完整性的分析。由于缺乏产品整个供应链的详细信息,目前的供应链安全工作受到阻碍。最终用户实际上无法访问供应链信息,甚至主要制造商也可能难以访问其供应商的子供应商。组件测试甚至逆向工程都可以用来降低风险,但是这些方法是不完美的,耗时的,并且昂贵的。本文将讨论半自动化供应链完整性风险分析框架的开发,以帮助供应链安全分析师评估与关键任务系统组件相关的风险水平。此功能可以为系统设计人员提供一种更严格和有效的方法来评估设计中组件的安全性。通过将所有这些工具融合到一个集中的框架中,我们假设我们可以创建一种功能,使分析人员能够更有效地查询数据并提取趋势以及关键信息。
{"title":"Leveraging a crowd sourcing methodology to enhance supply chain integrity","authors":"Han Lin, M. Schwartz, John T. Michalski, M. Shakamuri, P. Campbell","doi":"10.1109/CCST.2012.6393534","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393534","url":null,"abstract":"Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government's reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify solutions; however, alternative strategies must be explored. It is extremely challenging to establish the trustworthiness of a supply chain for a product or system in today's globalized climate, especially given the complexity and variability of the hardware and software, and the diverse geographical areas where they are made. Counterfeit items, from individual chips to entire systems, have been found both in commercial and government sectors. Supply chain attacks can be inserted at any point during the product or system life cycle and can have detrimental effects to mission success. We hypothesize that wisdom of crowds techniques may be applicable to the analysis of supply chain integrity. Current supply chain security efforts are hindered by a lack of detailed information on a product's entire supply chain. End-users have virtually no access to supply chain information, and even major manufacturers may have difficulty getting access to their suppliers' sub-suppliers. Component testing and even reverse engineering can be used to mitigate risks, but these approaches are imperfect, time consuming, and expensive. This paper will discuss the development of a semi-automated supply chain integrity risk analysis framework to assist the supply chain security analysts in assessing the level of risk associated with a component of a mission critical system. This capability can provide the system designer a more rigorous and efficient approach to assess the security of the components in the design. By fusing all of these tools into a centralized framework, we hypothesis that we can create a capability that will enable analysts to more effectively interrogate the data and extract trending as well as critical information.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124039955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CPA performance enhancement based on spectrogram 基于谱图的CPA性能增强
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393558
Min-Ku Kim, Dong‐Guk Han, J. Ryoo, Okyeon Yi
In a side channel attack, misalignment is a major factor that decreases the attack effectiveness. In order to resolve this issue, correlation power frequency analysis (CPFA) was recently introduced in the frequency domain by Schimmel. This method changes signals from the time domain to the frequency domain to analyze the information using FFT and is able to analytically solve the decrease in the attack effectiveness due to the misalignment. However, for signals that change their frequency components randomly, the results of the analysis are not as good. Moreover, there is a critical point that loses information in the time domain. In order to solve this limitation, we have developed correlation power spectrogram analysis (CPSA), which has excellent performance in side channel analysis. This method converts the time domain information to time domain-frequency domain information using a spectrogram, and the changed information keeps the time information of regular resolution. This method shows excellent performance for the variation in frequency components, as well. In this study, AES power consumption signals were collected from ARM, IC CARD, and MSP430 chips that were developed in the SCARF system. Using these signals, the method shown in this paper yields better performance than CPA or CPFA.
在侧信道攻击中,不对准是降低攻击效能的主要因素。为了解决这一问题,Schimmel在频域引入了相关工频分析(CPFA)。该方法将信号从时域变换到频域,利用FFT对信息进行分析,能够解析地解决由于不对准导致的攻击效率下降的问题。然而,对于随机改变其频率成分的信号,分析结果就不那么好了。此外,在时域中存在一个丢失信息的临界点。为了解决这一限制,我们开发了相关功率谱分析(CPSA),它在侧信道分析中具有优异的性能。该方法利用谱图将时域信息转换为时域-频域信息,变换后的信息保持正则分辨率的时间信息。该方法对频率分量的变化也有很好的处理效果。在本研究中,AES功耗信号采集来自ARM、IC卡和MSP430芯片,这些芯片都是在SCARF系统中开发的。使用这些信号,本文所示的方法比CPA或CPFA产生更好的性能。
{"title":"CPA performance enhancement based on spectrogram","authors":"Min-Ku Kim, Dong‐Guk Han, J. Ryoo, Okyeon Yi","doi":"10.1109/CCST.2012.6393558","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393558","url":null,"abstract":"In a side channel attack, misalignment is a major factor that decreases the attack effectiveness. In order to resolve this issue, correlation power frequency analysis (CPFA) was recently introduced in the frequency domain by Schimmel. This method changes signals from the time domain to the frequency domain to analyze the information using FFT and is able to analytically solve the decrease in the attack effectiveness due to the misalignment. However, for signals that change their frequency components randomly, the results of the analysis are not as good. Moreover, there is a critical point that loses information in the time domain. In order to solve this limitation, we have developed correlation power spectrogram analysis (CPSA), which has excellent performance in side channel analysis. This method converts the time domain information to time domain-frequency domain information using a spectrogram, and the changed information keeps the time information of regular resolution. This method shows excellent performance for the variation in frequency components, as well. In this study, AES power consumption signals were collected from ARM, IC CARD, and MSP430 chips that were developed in the SCARF system. Using these signals, the method shown in this paper yields better performance than CPA or CPFA.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128536772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A concept of automated vulnerability search in contactless communication applications 非接触式通信应用中漏洞自动搜索的概念
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393556
Martin Henzl, P. Hanáček, Peter Jurnecka, Matej Kacic
Designing and implementing secure applications which use contactless communication link is difficult even when secure hardware is used. Many current proximity devices, such as contactless smart cards or near field communication devices, are verified to be highly secure; however, inappropriate protocol implementation may result in the leak of sensitive information, even if the protocol is also secure by itself. In this paper we show a concept of automated vulnerability search in protocol implementation by using verification methods, which should help developers to verify their applications. We also show simple example of possible attack on seemingly secure payment protocol implemented using seemingly secure smart card to show the way the adversary can abuse improper implementation. The vulnerability the attacker exploits can be in one command or in a combination of commands, which are not vulnerable individually. It is not easy to find such combinations manually, this is where the automated verification methods are put to use. A model checker, provided with an appropriate model, can automatically find vulnerabilities which are not likely to be found manually. The model can be created by the actual communication analysis. We wanted to show that the adversary does not have to have the access to the source code of the application to perform a successful attack, so a platform for the application analysis from the actual contactless communication was developed. The platform provides eavesdropping, altering data for man-in-the-middle attack, and emulating of both communication parties. The source code can help the analysis, but would not be sufficient by itself, so creating model from source code was left for future research. When the model checker finds vulnerability, an attack can be executed. The attack can be either successful, revealing real vulnerability which must be fixed, or unsuccessful, which would result in the model refinement and another model checker run.
即使使用安全硬件,设计和实现使用非接触式通信链路的安全应用程序也是困难的。许多当前的接近设备,如非接触式智能卡或近场通信设备,被证明是高度安全的;但是,如果协议实现不当,可能会导致敏感信息的泄露,即使协议本身也是安全的。本文提出了一种利用验证方法在协议实现中自动进行漏洞搜索的概念,这将有助于开发人员验证他们的应用程序。我们还展示了使用看似安全的智能卡实现的看似安全的支付协议的可能攻击的简单示例,以显示攻击者可以滥用不当实现的方式。攻击者利用的漏洞可能存在于一个命令中,也可能存在于命令的组合中,这些命令不会单独受到攻击。手动找到这样的组合并不容易,这就是自动验证方法被使用的地方。提供了适当模型的模型检查器可以自动发现人工不可能发现的漏洞。该模型可通过实际通信分析建立。我们想要表明,攻击者并不需要访问应用程序的源代码来执行成功的攻击,因此开发了一个用于从实际非接触式通信中分析应用程序的平台。该平台提供了窃听、中间人攻击篡改数据、通信双方仿真等功能。源代码可以帮助分析,但本身是不够的,因此从源代码创建模型是留给未来的研究。当模型检查器发现漏洞时,就可以执行攻击。攻击可能成功,暴露出必须修复的真正漏洞,也可能不成功,这将导致模型细化并运行另一个模型检查器。
{"title":"A concept of automated vulnerability search in contactless communication applications","authors":"Martin Henzl, P. Hanáček, Peter Jurnecka, Matej Kacic","doi":"10.1109/CCST.2012.6393556","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393556","url":null,"abstract":"Designing and implementing secure applications which use contactless communication link is difficult even when secure hardware is used. Many current proximity devices, such as contactless smart cards or near field communication devices, are verified to be highly secure; however, inappropriate protocol implementation may result in the leak of sensitive information, even if the protocol is also secure by itself. In this paper we show a concept of automated vulnerability search in protocol implementation by using verification methods, which should help developers to verify their applications. We also show simple example of possible attack on seemingly secure payment protocol implemented using seemingly secure smart card to show the way the adversary can abuse improper implementation. The vulnerability the attacker exploits can be in one command or in a combination of commands, which are not vulnerable individually. It is not easy to find such combinations manually, this is where the automated verification methods are put to use. A model checker, provided with an appropriate model, can automatically find vulnerabilities which are not likely to be found manually. The model can be created by the actual communication analysis. We wanted to show that the adversary does not have to have the access to the source code of the application to perform a successful attack, so a platform for the application analysis from the actual contactless communication was developed. The platform provides eavesdropping, altering data for man-in-the-middle attack, and emulating of both communication parties. The source code can help the analysis, but would not be sufficient by itself, so creating model from source code was left for future research. When the model checker finds vulnerability, an attack can be executed. The attack can be either successful, revealing real vulnerability which must be fixed, or unsuccessful, which would result in the model refinement and another model checker run.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Outdoor perimeter security sensors a forty year perspective 户外周边安全传感器四十年的展望
Pub Date : 2012-12-31 DOI: 10.1109/CCST.2012.6393530
K. Harman, Wayne K. Messner
Outdoor perimeter security sensors have played, and continue to play, an important role in the security of critical assets and VIP residents over the past 40 years. In many ways outdoor security sensor technology can be described as “Slow-Tech” in a “High-Tech” world. In “High-Tech” we can expect a new product every few months with product lifetimes of one to two years. In the “Slow-Tech” world of outdoor security it typically takes two to three years to develop a new product and another two to three years to get the product approved by the user community. Fortunately once approved these products have a lifetime of ten to twenty years. The Carnahan Conference has provided an important venue for the introduction of new sensor technologies as they emerge from R&D, are tested by various agencies, and are introduced into the “real world” of outdoor security. The harsh realities of the outdoor environment and the wide range of threats faced by these sensors provide many challenges that have been the topic of many of the learned papers. The Carnahan conference provides an opportunity for the users of the technology to relate their experience to those who wish to introduce new technologies. Through the sponsorship of the IEEE these papers form a unique point of reference for the development of new sensors. Forty years ago most of the important players were large aerospace companies. Many of the sensor technologies used in perimeter security evolved from military developments. As one of the dominant users of perimeter security equipment, the US military sponsored much of this early development. This “mil-spec” environment had a profound effect on these developments which in many cases has survived to this day and is part of the heritage of the present world on outdoor perimeter security. These companies gave way to a number of small “spin-off” one product companies where the technologies were exploited. More recently most of one product companies have merged into larger “one-stop-shopping” companies. This paper describes the many changes in technology, the business models and the user community over the past 40 years and concludes with a prediction as to what the next 10 years will bring.
在过去的40年里,户外周界安全传感器已经并将继续在关键资产和VIP居民的安全中发挥重要作用。在许多方面,户外安全传感器技术可以被描述为“高科技”世界中的“慢科技”。在“高科技”领域,我们每隔几个月就会推出一款新产品,产品寿命为一到两年。在“慢科技”的户外安全领域,开发一款新产品通常需要两到三年的时间,再花两到三年的时间让产品获得用户群体的认可。幸运的是,一旦获得批准,这些产品的使用寿命为10到20年。卡纳汉会议为介绍新的传感器技术提供了一个重要的场所,因为它们从研发中脱颖而出,经过各种机构的测试,并被引入户外安全的“真实世界”。室外环境的严酷现实和这些传感器面临的广泛威胁提供了许多挑战,这些挑战已成为许多学术论文的主题。卡纳汉会议为该技术的用户提供了一个机会,将他们的经验与那些希望引入新技术的人联系起来。通过IEEE的赞助,这些论文形成了开发新传感器的独特参考点。40年前,大多数重要的参与者都是大型航空航天公司。外围安全中使用的许多传感器技术都是从军事发展中发展而来的。作为周边安全设备的主要用户之一,美国军方赞助了这一早期发展的大部分。这种“军事规范”的环境对这些发展产生了深远的影响,在许多情况下,这些发展一直存在到今天,并且是当今世界户外周边安全遗产的一部分。这些公司让位于一些小的“衍生”产品公司,这些公司利用了这些技术。最近,大多数单一产品公司已经合并为更大的“一站式购物”公司。本文描述了过去40年来技术、商业模式和用户社区的许多变化,并对未来10年将带来什么进行了预测。
{"title":"Outdoor perimeter security sensors a forty year perspective","authors":"K. Harman, Wayne K. Messner","doi":"10.1109/CCST.2012.6393530","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393530","url":null,"abstract":"Outdoor perimeter security sensors have played, and continue to play, an important role in the security of critical assets and VIP residents over the past 40 years. In many ways outdoor security sensor technology can be described as “Slow-Tech” in a “High-Tech” world. In “High-Tech” we can expect a new product every few months with product lifetimes of one to two years. In the “Slow-Tech” world of outdoor security it typically takes two to three years to develop a new product and another two to three years to get the product approved by the user community. Fortunately once approved these products have a lifetime of ten to twenty years. The Carnahan Conference has provided an important venue for the introduction of new sensor technologies as they emerge from R&D, are tested by various agencies, and are introduced into the “real world” of outdoor security. The harsh realities of the outdoor environment and the wide range of threats faced by these sensors provide many challenges that have been the topic of many of the learned papers. The Carnahan conference provides an opportunity for the users of the technology to relate their experience to those who wish to introduce new technologies. Through the sponsorship of the IEEE these papers form a unique point of reference for the development of new sensors. Forty years ago most of the important players were large aerospace companies. Many of the sensor technologies used in perimeter security evolved from military developments. As one of the dominant users of perimeter security equipment, the US military sponsored much of this early development. This “mil-spec” environment had a profound effect on these developments which in many cases has survived to this day and is part of the heritage of the present world on outdoor perimeter security. These companies gave way to a number of small “spin-off” one product companies where the technologies were exploited. More recently most of one product companies have merged into larger “one-stop-shopping” companies. This paper describes the many changes in technology, the business models and the user community over the past 40 years and concludes with a prediction as to what the next 10 years will bring.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124894175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2012 IEEE International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1