WorldWideScience

Sample records for adversaries

  1. Adversarial Autoencoders

    OpenAIRE

    Makhzani, Alireza; Shlens, Jonathon; Jaitly, Navdeep; Goodfellow, Ian; Frey, Brendan

    2015-01-01

    In this paper, we propose the "adversarial autoencoder" (AAE), which is a probabilistic autoencoder that uses the recently proposed generative adversarial networks (GAN) to perform variational inference by matching the aggregated posterior of the hidden code vector of the autoencoder with an arbitrary prior distribution. Matching the aggregated posterior to the prior ensures that generating from any part of prior space results in meaningful samples. As a result, the decoder of the adversarial...

  2. Deep Learning and Music Adversaries

    OpenAIRE

    Kereliuk, Corey; Sturm, Bob L.; Larsen, Jan

    2015-01-01

    An adversary is essentially an algorithm intent on making a classification system perform in some particular way given an input, e.g., increase the probability of a false negative. Recent work builds adversaries for deep learning systems applied to image object recognition, which exploits the parameters of the system to find the minimal perturbation of the input image such that the network misclassifies it with high confidence. We adapt this approach to construct and deploy an adversary of de...

  3. Generic adversary characteristics: summary report

    International Nuclear Information System (INIS)

    The adversaries studied were found to be complex, often unpredictable, and dynamic. The adversary typically goes through a complex decision-making process between the time a potential target is identified and the moment the decision to act is made. This study analyzes the adversary characteristics, and the following conclusions are made: one of the least likely methods of attack is an overt armed assault. Terrorists and psychotics depend upon a high degree of personal dedication. No single generic adversary group or individual exhibits strength in every characteristic. Physical danger appears to have some deterrent effect on all adversaries except the psychotics. Organized and professional criminals often try to recruit insiders. Disoriented persons, white-collar criminals, and disgruntled employees tend to operate as insiders. Professional criminals, many terrorist groups, some extremist protest groups, and certain disoriented persons plan carefully before initiating a criminal mission. Organized crime and miscellaneous criminal adversaries rely on deception and ruse to bypass security. After the decision to commit a crime, the resources deployed by terrorists or organized criminals will be a function of their perception of the operational requirements of the crime. The nature of ''threat'' is dynamic; adversary behavior and capability appear to be related to prevailing political, economic, and social conditions

  4. Deep Learning and Music Adversaries

    DEFF Research Database (Denmark)

    Kereliuk, Corey Mose; Sturm, Bob L.; Larsen, Jan

    2015-01-01

    An adversary is an agent designed to make a classification system perform in some particular way, e.g., increase the probability of a false negative. Recent work builds adversaries for deep learning systems applied to image object recognition, exploiting the parameters of the system to find...... the minimal perturbation of the input image such that the system misclassifies it with high confidence. We adapt this approach to construct and deploy an adversary of deep learning systems applied to music content analysis. In our case, however, the system inputs are magnitude spectral frames, which require...

  5. All Quantum Adversary Methods are Equivalent

    NARCIS (Netherlands)

    R. Spalek; M. Szegedy

    2005-01-01

    The quantum adversary method is one of the most versatile lower-bound methods for quantum algorithms. We show that all known variants of this method are equal: spectral adversary [Barnum, Saks, and Szegedy, 2003], weighted adversary [Ambainis, 2003], strong weighted adversary [Zhang, 2004], and the

  6. Pitfalls and Potential of Adversary Evaluation.

    Science.gov (United States)

    Worthen, Blaine R.; Rogers, W. Todd

    1980-01-01

    The core of adversary evaluation is the existence of opposing viewpoints, not adherence to existing formats for presenting them. Suggests that evaluators develop adversary methods more appropriate for education. (Author/MLF)

  7. Learning consensus in adversarial environments

    Science.gov (United States)

    Vamvoudakis, Kyriakos G.; García Carrillo, Luis R.; Hespanha, João. P.

    2013-05-01

    This work presents a game theory-based consensus problem for leaderless multi-agent systems in the presence of adversarial inputs that are introducing disturbance to the dynamics. Given the presence of enemy components and the possibility of malicious cyber attacks compromising the security of networked teams, a position agreement must be reached by the networked mobile team based on environmental changes. The problem is addressed under a distributed decision making framework that is robust to possible cyber attacks, which has an advantage over centralized decision making in the sense that a decision maker is not required to access information from all the other decision makers. The proposed framework derives three tuning laws for every agent; one associated with the cost, one associated with the controller, and one with the adversarial input.

  8. Negative weights makes adversaries stronger

    CERN Document Server

    Hoyer, P; Spalek, R; Hoyer, Peter; Lee, Troy; Spalek, Robert

    2006-01-01

    The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has application to classical complexity in formula size lower bounds, and is versatile with equivalent formulations in terms of weight schemes, eigenvalues, and Kolmogorov complexity. All these formulations are information-theoretic and rely on the principle that if an algorithm successfully computes a function then, in particular, it is able to distinguish between inputs which map to different values. We present a stronger version of the adversary method which goes beyond this principle to make explicit use of the existence of a measurement in a successful algorithm which gives the correct answer, with high probability. We show that this new method, which we call ADV+-, has all the advantages of the old: it is a lower bound on bounded-error quantum query complexity, its square is a lower bound on formula size, and it behaves well with res...

  9. Scientific method, adversarial system, and technology assessment

    Science.gov (United States)

    Mayo, L. H.

    1975-01-01

    A basic framework is provided for the consideration of the purposes and techniques of scientific method and adversarial systems. Similarities and differences in these two techniques of inquiry are considered with reference to their relevance in the performance of assessments.

  10. Polytope Codes Against Adversaries in Networks

    OpenAIRE

    Kosut, Oliver; Tong, Lang; Tse, David

    2011-01-01

    Network coding is studied when an adversary controls a subset of nodes in the network of limited quantity but unknown location. This problem is shown to be more difficult than when the adversary controls a given number of edges in the network, in that linear codes are insufficient. To solve the node problem, the class of Polytope Codes is introduced. Polytope Codes are constant composition codes operating over bounded polytopes in integer vector fields. The polytope structure creates addition...

  11. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  12. Using Machine Learning in Adversarial Environments.

    Energy Technology Data Exchange (ETDEWEB)

    Davis, Warren Leon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-02-01

    Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approaches only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.

  13. Automated Planning in Repeated Adversarial Games

    CERN Document Server

    de Cote, Enrique Munoz; Sykulski, Adam M; Jennings, Nicholas R

    2012-01-01

    Game theory's prescriptive power typically relies on full rationality and/or self-play interactions. In contrast, this work sets aside these fundamental premises and focuses instead on heterogeneous autonomous interactions between two or more agents. Specifically, we introduce a new and concise representation for repeated adversarial (constant-sum) games that highlight the necessary features that enable an automated planing agent to reason about how to score above the game's Nash equilibrium, when facing heterogeneous adversaries. To this end, we present TeamUP, a model-based RL algorithm designed for learning and planning such an abstraction. In essence, it is somewhat similar to R-max with a cleverly engineered reward shaping that treats exploration as an adversarial optimization problem. In practice, it attempts to find an ally with which to tacitly collude (in more than two-player games) and then collaborates on a joint plan of actions that can consistently score a high utility in adversarial repeated gam...

  14. David against Goliath: Coping with Adversarial Customers

    DEFF Research Database (Denmark)

    Alajoutsijärvi, Kimmo; Tikkanen, Henrikki; Skaates, Maria Anne

    2001-01-01

    SME managers in many industries face the situation that they have to deal with a few important, large customer organisations that behave in an adversarial manner. These customers pit alternative suppliers against each other in order to achieve the lowest possible price, showing no intent to build...

  15. Deep learning, audio adversaries, and music content analysis

    DEFF Research Database (Denmark)

    Kereliuk, Corey Mose; Sturm, Bob L.; Larsen, Jan

    2015-01-01

    We present the concept of adversarial audio in the context of deep neural networks (DNNs) for music content analysis. An adversary is an algorithm that makes minor perturbations to an input that cause major repercussions to the system response. In particular, we design an adversary for a DNN...

  16. The Adversarial Route Analysis Tool: A Web Application

    Energy Technology Data Exchange (ETDEWEB)

    Casson, William H. Jr. [Los Alamos National Laboratory

    2012-08-02

    The Adversarial Route Analysis Tool is a type of Google maps for adversaries. It's a web-based Geospatial application similar to Google Maps. It helps the U.S. government plan operations that predict where an adversary might be. It's easily accessible and maintainble and it's simple to use without much training.

  17. RFID Key Establishment Against Active Adversaries

    CERN Document Server

    Bringer, Julien; Cohen, Gérard; Kindarji, Bruno

    2010-01-01

    We present a method to strengthen a very low cost solution for key agreement with a RFID device. Starting from a work which exploits the inherent noise on the communication link to establish a key by public discussion, we show how to protect this agreement against active adversaries. For that purpose, we unravel integrity $(I)$-codes suggested by Cagalj et al. No preliminary key distribution is required.

  18. Using plural modeling for predicting decisions made by adaptive adversaries

    International Nuclear Information System (INIS)

    Incorporating an appropriate representation of the likelihood of terrorist decision outcomes into risk assessments associated with weapons of mass destruction attacks has been a significant problem for countries around the world. Developing these likelihoods gets at the heart of the most difficult predictive problems: human decision making, adaptive adversaries, and adversaries about which very little is known. A plural modeling approach is proposed that incorporates estimates of all critical uncertainties: who is the adversary and what skills and resources are available to him, what information is known to the adversary and what perceptions of the important facts are held by this group or individual, what does the adversary know about the countermeasure actions taken by the government in question, what are the adversary's objectives and the priorities of those objectives, what would trigger the adversary to start an attack and what kind of success does the adversary desire, how realistic is the adversary in estimating the success of an attack, how does the adversary make a decision and what type of model best predicts this decision-making process. A computational framework is defined to aggregate the predictions from a suite of models, based on this broad array of uncertainties. A validation approach is described that deals with a significant scarcity of data.

  19. Covert Communication Gains from Adversary's Ignorance of Transmission Time

    OpenAIRE

    Bash, Boulat A.; Goeckel, Dennis; Towsley, Don

    2014-01-01

    The recent square root law (SRL) for covert communication demonstrates that Alice can reliably transmit $\\mathcal{O}(\\sqrt{n})$ bits to Bob in $n$ uses of an additive white Gaussian noise (AWGN) channel while keeping ineffective any detector employed by the adversary; conversely, exceeding this limit either results in detection by the adversary with high probability or non-zero decoding error probability at Bob. This SRL is under the assumption that the adversary knows when Alice transmits (i...

  20. Adversarial Scheduling in Evolutionary Game Dynamics

    CERN Document Server

    Istrate, Gabriel; Ravi, S S

    2008-01-01

    Consider a system in which players at nodes of an underlying graph G repeatedly play Prisoner's Dilemma against their neighbors. The players adapt their strategies based on the past behavior of their opponents by applying the so-called win-stay lose-shift strategy. This dynamics has been studied in (Kittock 94), (Dyer et al. 2002), (Mossel and Roch, 2006). With random scheduling, starting from any initial configuration with high probability the system reaches the unique fixed point in which all players cooperate. This paper investigates the validity of this result under various classes of adversarial schedulers. Our results can be sumarized as follows: 1. An adversarial scheduler that can select both participants to the game can preclude the system from reaching the unique fixed point on most graph topologies. 2. A nonadaptive scheduler that is only allowed to choose one of the participants is no more powerful than a random scheduler. With this restriction even an adaptive scheduler is not significantly more ...

  1. Uses and Abuses of Adversary Evaluation: A Consumer's Guide.

    Science.gov (United States)

    Worthen, Blaine R.; Rogers, W. Todd

    The major potentials and pitfalls of adversary evaluation in education are discussed. Reasons why the courtroom model may have limited utility, and the difficulties in the debate model are identified. It is argued that the existence of opposing viewpoints is the core of adversary evaluation, not adherence to existing formats for presenting…

  2. Enemies in Agreement: Domestic Politics, Uncertainty, and Cooperation between Adversaries

    OpenAIRE

    Vaynman, Jane Eugenia

    2014-01-01

    Adversarial agreements, such as the nuclear weapons treaties, disarmament zones, or conventional weapons limitations, vary considerably in the information sharing provisions they include. This dissertation investigates why adversarial states sometimes choose to cooperate by creating restraining institutions, and how their choices for the form of that cooperation are constrained and motivated. I argue that uncertainties arising out of domestic political volatility, which includes leadershi...

  3. Arguing with Adversaries: Aikido, Rhetoric, and the Art of Peace

    Science.gov (United States)

    Kroll, Barry M.

    2008-01-01

    The Japanese martial art of aikido affords a framework for understanding argument as harmonization rather than confrontation. Two movements, circling away ("tenkan") and entering in ("irimi"), suggest tactics for arguing with adversaries. The ethical imperative of aikido involves protecting one's adversary from harm, using the least force…

  4. Understanding Sampling Style Adversarial Search Methods

    CERN Document Server

    Ramanujan, Raghuram; Selman, Bart

    2012-01-01

    UCT has recently emerged as an exciting new adversarial reasoning technique based on cleverly balancing exploration and exploitation in a Monte-Carlo sampling setting. It has been particularly successful in the game of Go but the reasons for its success are not well understood and attempts to replicate its success in other domains such as Chess have failed. We provide an in-depth analysis of the potential of UCT in domain-independent settings, in cases where heuristic values are available, and the effect of enhancing random playouts to more informed playouts between two weak minimax players. To provide further insights, we develop synthetic game tree instances and discuss interesting properties of UCT, both empirically and analytically.

  5. Learning to Pivot with Adversarial Networks

    CERN Document Server

    Louppe, Gilles; Cranmer, Kyle

    2016-01-01

    Many inference problems involve data generation processes that are not uniquely specified or are uncertain in some way. In a scientific context, the presence of several plausible data generation processes is often associated to the presence of systematic uncertainties. Robust inference is possible if it is based on a pivot -- a quantity whose distribution is invariant to the unknown value of the (categorical or continuous) nuisance parameters that parametrizes this family of generation processes. In this work, we introduce a flexible training procedure based on adversarial networks for enforcing the pivotal property on a predictive model. We derive theoretical results showing that the proposed algorithm tends towards a minimax solution corresponding to a predictive model that is both optimal and independent of the nuisance parameters (if that models exists) or for which one can tune the trade-off between power and robustness. Finally, we demonstrate the effectiveness of this approach with a toy example and an...

  6. Potential criminal adversaries of nuclear programs: a portrait

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins, B.M.

    1980-07-01

    This paper examines the possibility that terrorists or other kinds of criminals might attempt to seize or sabotage a nuclear facility, steal nuclear material, or carry out other criminal activities in the nuclear domain which has created special problems for the security of nuclear programs. This paper analyzes the potential threat. Our tasks was to describe the potential criminal adversary, or rather the spectrum of potential adversaries who conceivably might carry out malevolent criminal actions against nuclear programs and facilities. We were concerned with both the motivations as well as the material and operational capabilities likely to be displayed by various categories of potential nuclear adversaries.

  7. Towards Deep Neural Network Architectures Robust to Adversarial Examples

    OpenAIRE

    Gu, Shixiang; Rigazio, Luca

    2014-01-01

    Recent work has shown deep neural networks (DNNs) to be highly susceptible to well-designed, small perturbations at the input layer, or so-called adversarial examples. Taking images as an example, such distortions are often imperceptible, but can result in 100% mis-classification for a state of the art DNN. We study the structure of adversarial examples and explore network topology, pre-processing and training strategies to improve the robustness of DNNs. We perform various experiments to ass...

  8. Unifying Adversarial Training Algorithms with Flexible Deep Data Gradient Regularization

    OpenAIRE

    Ororbia II, Alexander G.; Giles, C. Lee; Kifer, Daniel

    2016-01-01

    We present DataGrad, a general back-propagation style training procedure for deep neural architectures that uses regularization of a deep Jacobian-based penalty. It can be viewed as a deep extension of the layerwise contractive auto-encoder penalty. More importantly, it unifies previous proposals for adversarial training of deep neural nets -- this list includes directly modifying the gradient, training on a mix of original and adversarial examples, using contractive penalties, and approximat...

  9. Methodology for characterizing potential adversaries of Nuclear Material Safeguards Systems

    International Nuclear Information System (INIS)

    The results are described of a study by Woodward--Clyde Consultants to assist the University of California Lawrence Livermore Laboratory in the development of methods to analyze and evaluate Nuclear Material Safeguards (NMS) Systems. The study concentrated on developing a methodology to assist experts in describing, in quantitative form, their judgments about the characteristics of potential adversaries of NMS Systems

  10. Methodology for characterizing potential adversaries of Nuclear Material Safeguards Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kirkwood, C.W.; Pollock, S.M.

    1978-11-01

    The results are described of a study by Woodward--Clyde Consultants to assist the University of California Lawrence Livermore Laboratory in the development of methods to analyze and evaluate Nuclear Material Safeguards (NMS) Systems. The study concentrated on developing a methodology to assist experts in describing, in quantitative form, their judgments about the characteristics of potential adversaries of NMS Systems.

  11. Publishing Set-Valued Data Against Realistic Adversaries

    Institute of Scientific and Technical Information of China (English)

    Jun-Qiang Liu

    2012-01-01

    Privacy protection in publishing set-valued data is an important problem.However,privacy notions proposed in prior works either assume that the adversary has unbounded knowledge and hence provide over-protection that causes excessive distortion,or ignore the knowledge about the absence of certain items and do not prevent attacks based on such knowledge.To address these issues,we propose a new privacy notion,(k,e)(m,n)-privacy,which prevents both the identity disclosure and the sensitive item disclosure to a realistic privacy adversary who has bounded knowledge about the presence of items and the bounded knowledge about the absence of items.In addition to the new notion,our contribution is an efficient algorithm that finds a near-optimal solution and is applicable for anonymizing real world databases.Extensive experiments on real world databases showed that our algorithm outperforms the state of the art algorithms.

  12. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks

    OpenAIRE

    Radford, Alec; Metz, Luke; Chintala, Soumith

    2015-01-01

    In recent years, supervised learning with convolutional networks (CNNs) has seen huge adoption in computer vision applications. Comparatively, unsupervised learning with CNNs has received less attention. In this work we hope to help bridge the gap between the success of CNNs for supervised learning and unsupervised learning. We introduce a class of CNNs called deep convolutional generative adversarial networks (DCGANs), that have certain architectural constraints, and demonstrate that they ar...

  13. Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-01-01

    Many classification algorithms have been successfully deployed in security-sensitive applications including spam filters and intrusion detection systems. Under such adversarial environments, adversaries can generate exploratory attacks against the defender such as evasion and reverse engineering. In this paper, we discuss why reverse engineering attacks can be carried out quite efficiently against fixed classifiers, and investigate the use of randomization as a suitable strategy for mitigating their risk. In particular, we derive a semidefinite programming (SDP) formulation for learning a distribution of classifiers subject to the constraint that any single classifier picked at random from such distribution provides reliable predictions with a high probability. We analyze the tradeoff between variance of the distribution and its predictive accuracy, and establish that one can almost always incorporate randomization with large variance without incurring a loss in accuracy. In other words, the conventional approach of using a fixed classifier in adversarial environments is generally Pareto suboptimal. Finally, we validate such conclusions on both synthetic and real-world classification problems. Copyright 2014 ACM.

  14. Quantifying Adversary Capabilities to Inform Defensive Resource Allocation.

    Science.gov (United States)

    Wang, Chen; Bier, Vicki M

    2016-04-01

    We propose a Bayesian Stackelberg game capable of analyzing the joint effects of both attacker intent and capabilities on optimal defensive strategies. The novel feature of our model is the use of contest success functions from economics to capture the extent to which the success of an attack is attributable to the adversary's capability (as well as the level of defensive investment), rather than pure luck. Results of a two-target example suggest that precise assessment of attacker intent may not be necessary if we have poor estimates of attacker capability. PMID:25929274

  15. Distributed Certificateless Key Encapsulation Mechanism Secure Against the Adaptive Adversary

    Institute of Scientific and Technical Information of China (English)

    LONG Yu; LI Xiang-xue; CHEN Ke-fei; HONG Xuan

    2009-01-01

    This paper proposes an adaptively secure solution to certificateless distributed key encapsulation mechanism from pairings by using Canetti's adaptive secure key generation scheme based on discrete logarithm. The proposed scheme can withstand adaptive attackers that can choose players for corruption at any time during the run of the protocol, and this kind of attack is powerful and realistic. In contrast, all previously presented threshold certificateless public key cryptosystems are proven secure against the more idealized static adversaries only. They choose and fix the subset of target players before running the protocol. We also prove security of this scheme in the random oracle model.

  16. Probabilistic Characterization of Adversary Behavior in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  17. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    Energy Technology Data Exchange (ETDEWEB)

    Heineke, J.M.

    1978-12-20

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)

  18. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    International Nuclear Information System (INIS)

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed

  19. On Breaching Enterprise Data Privacy Through Adversarial Information Fusion

    CERN Document Server

    Ganta, Srivatsava Ranjit

    2008-01-01

    Data privacy is one of the key challenges faced by enterprises today. Anonymization techniques address this problem by sanitizing sensitive data such that individual privacy is preserved while allowing enterprises to maintain and share sensitive data. However, existing work on this problem make inherent assumptions about the data that are impractical in day-to-day enterprise data management scenarios. Further, application of existing anonymization schemes on enterprise data could lead to adversarial attacks in which an intruder could use information fusion techniques to inflict a privacy breach. In this paper, we shed light on the shortcomings of current anonymization schemes in the context of enterprise data. We define and experimentally demonstrate Web-based Information- Fusion Attack on anonymized enterprise data. We formulate the problem of Fusion Resilient Enterprise Data Anonymization and propose a prototype solution to address this problem.

  20. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2014-01-01

    We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t∈{0,1}∗ of length n, while Bob has a pattern p∈{0,1}∗ of length m. The goal is for Bob to (only) learn where his pattern occurs in Alice’s text, while Alice learns nothing. Private pattern matching...... is an important problem that has many applications in the area of DNA search, computational biology and more. Our construction guarantees full simulation in the presence of malicious, polynomial-time adversaries (assuming the hardness of DDH assumption) and exhibits computation and communication costs of O...... for important variations of the secure pattern matching problem that are significantly more efficient than the current state of art solutions: First, we deal with secure pattern matching with wildcards. In this variant the pattern may contain wildcards that match both 0 and 1. Our protocol requires O...

  1. Secrecy Is Cheap if the Adversary Must Reconstruct

    CERN Document Server

    Schieler, Curt

    2012-01-01

    A secret key can be used to conceal information from an eavesdropper during communication, as in Shannon's cipher system. Most theoretical guarantees of secrecy require the secret key space to grow exponentially with the length of communication. Here we show that when an eavesdropper attempts to reconstruct an information sequence, as posed in the literature by Yamamoto, very little secret key is required to effect unconditionally maximal distortion; specifically, we only need the secret key space to increase unboundedly, growing arbitrarily slowly with the blocklength. As a corollary, even with a secret key of constant size we can still cause the adversary arbitrarily close to maximal distortion, regardless of the length of the information sequence.

  2. Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis

    CERN Document Server

    Kim, MinJi; Barros, Joao

    2008-01-01

    Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet generated by a Byzantine attacker can easily contaminate the information to multiple destinations. In this paper, we study the transmission overhead associated with detecting Byzantine adversaries at a trusted node using network coding. We consider three different schemes: end-to-end error correction, packet-based Byzantine detection scheme, and generation-based Byzantine detection scheme. In end-to-end error correction, it is known that we can correct up to the min-cut between the source and destinations. However, if we use Byzantine detection schemes, we can detect polluted data, drop them, and therefore, only transmit valid data. For the dropped data, the destinations perform erasure correction, which is computationally lighter than error correction. We show that, with enough attackers present in the network, Byzantine detection scheme...

  3. 'Meatball searching' - The adversarial approach to online information retrieval

    Science.gov (United States)

    Jack, R. F.

    1985-01-01

    It is proposed that the different styles of online searching can be described as either formal (highly precise) or informal with the needs of the client dictating which is most applicable at a particular moment. The background and personality of the searcher also come into play. Particular attention is focused on meatball searching which is a form of online searching characterized by deliberate vagueness. It requires generally comprehensive searches, often on unusual topics and with tight deadlines. It is most likely to occur in search centers serving many different disciplines and levels of client information sophistication. Various information needs are outlined as well as the laws of meatball searching and the adversarial approach. Traits and characteristics important to sucessful searching include: (1) concept analysis, (2) flexibility of thinking, (3) ability to think in synonyms and (4) anticipation of variant word forms and spellings.

  4. Breaking the O(n^2) Bit Barrier: Scalable Byzantine agreement with an Adaptive Adversary

    CERN Document Server

    King, Valerie

    2010-01-01

    We describe an algorithm for Byzantine agreement that is scalable in the sense that each processor sends only $\\tilde{O}(\\sqrt{n})$ bits, where $n$ is the total number of processors. Our algorithm succeeds with high probability against an \\emph{adaptive adversary}, which can take over processors at any time during the protocol, up to the point of taking over arbitrarily close to a 1/3 fraction. We assume synchronous communication but a \\emph{rushing} adversary. Moreover, our algorithm works in the presence of flooding: processors controlled by the adversary can send out any number of messages. We assume the existence of private channels between all pairs of processors but make no other cryptographic assumptions. Finally, our algorithm has latency that is polylogarithmic in $n$. To the best of our knowledge, ours is the first algorithm to solve Byzantine agreement against an adaptive adversary, while requiring $o(n^{2})$ total bits of communication.

  5. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  6. Protecting Clock Synchronization: Adversary Detection through Network Monitoring

    Directory of Open Access Journals (Sweden)

    Elena Lisova

    2016-01-01

    Full Text Available Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to break synchronization based on the IEEE 1588 standard, by conducting a man-in-the-middle (MIM attack followed by a delay attack. A MIM attack can be accomplished through, for example, Address Resolution Protocol (ARP poisoning. Using the AVISPA tool, we evaluate the potential to perform a delay attack using ARP poisoning and analyze its consequences showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding, and using knowledge of environmental conditions, can make the network more robust/resilient against these kinds of attacks. Lastly, a Configuration Agent is proposed to monitor and detect anomalies introduced by an adversary performing attacks targeting clock synchronization.

  7. A new queueing strategy for the Adversarial Queueing Theory

    CERN Document Server

    Hilker, Michael

    2008-01-01

    In the today's Internet and TCP/IP-networks, the queueing of packets is commonly implemented using the protocol FIFO (First In First Out). Unfortunately, FIFO performs poorly in the Adversarial Queueing Theory. Other queueing strategies are researched in this model and better results are performed by alternative queueing strategies, e.g. LIS (Longest In System). This article introduces a new queueing protocol called interval-strategy that is concerned with the reduction from dynamic to static routing. We discuss the maximum system time for a packet and estimate with up-to-date results how this can be achieved. We figure out the maximum amount of time where a packet can spend in the network (i.e. worst case system time), and argue that the universal instability of the presented interval-strategy can be reached through these results. When a large group of queueing strategies is used for queueing, we prove that the interval-strategy will be universally unstable. Finally, we calculate the maximum time of the stat...

  8. The media and the military: Allies or adversaries?

    Directory of Open Access Journals (Sweden)

    Leopold Scholtz

    2012-02-01

    Full Text Available Military commanders like Alexander the Great or Richard the Lionheart did not have to take public opinion greatly into account when they planned their campaigns in their day. Today it is a very different situation. In the light of the above this article starts with two somewhat startling quotes by the futurologists Alvin and Heidi Toffler: "The people thinking hardest about warfare in the future know that some of the most important combat of tomorrow will take place on the media battlefield." They also state: “[T]he media, including channels and technologies unimagined today, will be a prime weapon for Third Wave combatants in both the wars and anti-wars of the future, a key component of knowledge strategy.” In recent years, much has been made of the adversarial relations between journalists and the military. The media have, for instance, been blamed for the US defeat in Vietnam, for unthinkingly blabbing about tactical decisions in advance in the Falklands, etc. From their side, journalists have been blaming the military for not trying to understand the nature of their job, of covering up a number of bad things, etc.

  9. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2010-01-01

    We propose a dedicated protocol for the highly motivated problem of secure two-party pattern matching: Alice holds a text t ∈ {0,1}*. of length n, while Bob has a pattern p ∈ {0,1}*. of length m. The goal is for Bob to learn where his pattern occurs in Alice's text. Our construction guarantees full...... simulation in the presence of malicious, polynomial-time adversaries (assuming that ElGamal encryption is semantically secure) and exhibits computation and communication costs of O(n + m) in a constant round complexity. In addition to the above, we propose a collection of protocols for variations...... of the secure pattern matching problem: The pattern may contain wildcards (O(nm) communication in O(1) rounds). The matches may be approximated, i.e., Hamming distance less than some threshold ((O(nm) communication in O(1) rounds). The length, m, of Bob's pattern is secret (O(nm) communication in O(1) rounds...

  10. Satisfiability-unsatisfiability transition in the adversarial satisfiability problem.

    Science.gov (United States)

    Bardoscia, Marco; Nagaj, Daniel; Scardicchio, Antonello

    2014-03-01

    Adversarial satisfiability (AdSAT) is a generalization of the satisfiability (SAT) problem in which two players try to make a Boolean formula true (resp. false) by controlling their respective sets of variables. AdSAT belongs to a higher complexity class in the polynomial hierarchy than SAT, and therefore the nature of the critical region and the transition are not easily parallel to those of SAT and worthy of independent study. AdSAT also provides an upper bound for the transition threshold of the quantum satisfiability problem (QSAT). We present a complete algorithm for AdSAT, show that 2-AdSAT is in P, and then study two stochastic algorithms (simulated annealing and its improved variant) and compare their performances in detail for 3-AdSAT. Varying the density of clauses α we claim that there is a sharp SAT-UNSAT transition at a critical value whose upper bound is αc≲1.5, suggesting a much stricter upper bound for the QSAT transition than those previously found. PMID:24730811

  11. Intelligent Online Path Planning for UAVs in Adversarial Environments

    Directory of Open Access Journals (Sweden)

    Xingguang Peng

    2012-03-01

    Full Text Available Online path planning (OPP for unmanned aerial vehicles (UAVs is a basic issue of intelligent flight and is indeed a dynamic multi‐objective optimization problem (DMOP. In this paper, an OPP framework is proposed in the sense of model predictive control (MPC to continuously update the environmental information for the planner. For solving the DMOP involved in the MPC we propose a dynamic multi‐objective evolutionary algorithm based on linkage and prediction (LP‐DMOEA. Within this algorithm, the historical Pareto sets are collected and analysed to enhance the performance. For intelligently selecting the best path from the output of the OPP, the Bayesian network and fuzzy logic are used to quantify the bias to each optimization objective. The DMOEA is validated on three benchmark problems characterized by different changing types in decision and objective spaces. Moreover, the simulation results show that the LP‐DMOEA overcomes the restart method for OPP. The decision‐making method for solution selection can assess the situation in an adversarial environment and accordingly adapt the path planner.

  12. Assessing and minimizing adversarial risk in a nuclear material transportation network

    OpenAIRE

    Foster, Bradford S.

    2013-01-01

    Approved for public release; distribution is unlimited This thesis develops a simple method for evaluating adversarial risk within the transportation portion of the nuclear fuel cycle for commercial electric power generation, and develops models that can guide the reduction of that risk by such means as rerouting and decoy shipments. A conceivable, worst-case attack by an intelligent adversary will cause a localized release of radioactive material. A damage function is defined using the po...

  13. Application of adversarial risk analysis model in pricing strategies with remanufacturing

    OpenAIRE

    Liurui Deng; Bolin Ma

    2015-01-01

    Purpose: Purpose: This paper mainly focus on the application of adversarial risk analysis (ARA) in pricing strategy with remanufacturing. We hope to obtain more realistic results than classical model. Moreover, we also wish that our research improve the development of ARA in pricing strategy of manufacturing or remanufacturing. Approach: In order to gain more actual research, combining adversarial risk analysis, we explore the pricing strategy with remanufacturing based on Stackelberg model...

  14. Data Injection Attacks on Smart Grids with Multiple Adversaries: A Game-Theoretic Perspective

    OpenAIRE

    Sanjab, Anibal; Saad, Walid

    2016-01-01

    Data injection attacks have recently emerged as a significant threat on the smart power grid. By launching data injection attacks, an adversary can manipulate the real-time locational marginal prices to obtain economic benefits. Despite the surge of existing literature on data injection, most such works assume the presence of a single attacker and assume no cost for attack or defense. In contrast, in this paper, a model for data injection attacks with multiple adversaries and a single smart g...

  15. Adversarial reasoning and resource allocation: the LG approach

    Science.gov (United States)

    Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg; Boyd, Ron

    2005-05-01

    Many existing automated tools purporting to model the intelligent enemy utilize a fixed battle plan for the enemy while using flexible decisions of human players for the friendly side. According to the Naval Studies Board, "It is an open secret and a point of distress ... that too much of the substantive content of such M&S has its origin in anecdote, ..., or a narrow construction tied to stereotypical current practices of 'doctrinally correct behavior.'" Clearly, such runs lack objectivity by being heavily skewed in favor of the friendly forces. Presently, the military branches employ a variety of game-based simulators and synthetic environments, with manual (i.e., user-based) decision-making, for training and other purposes. However, without an ability to automatically generate the best strategies, tactics, and COA, the games serve mostly to display the current situation rather than form a basis for automated decision-making and effective training. We solve the problem of adversarial reasoning as a gaming problem employing Linguistic Geometry (LG), a new type of game theory demonstrating significant increase in size in gaming problems solvable in real and near-real time. It appears to be a viable approach for solving such practical problems as mission planning and battle management. Essentially, LG may be structured into two layers: game construction and game solving. Game construction includes construction of a game called an LG hypergame based on a hierarchy of Abstract Board Games (ABG). Game solving includes resource allocation for constructing an advantageous initial game state and strategy generation to reach a desirable final game state in the course of the game.

  16. Malaria's contribution to World War One - the unexpected adversary.

    Science.gov (United States)

    Brabin, Bernard J

    2014-12-16

    Malaria in the First World War was an unexpected adversary. In 1914, the scientific community had access to new knowledge on transmission of malaria parasites and their control, but the military were unprepared, and underestimated the nature, magnitude and dispersion of this enemy. In summarizing available information for allied and axis military forces, this review contextualizes the challenge posed by malaria, because although data exist across historical, medical and military documents, descriptions are fragmented, often addressing context specific issues. Military malaria surveillance statistics have, therefore, been summarized for all theatres of the War, where available. These indicated that at least 1.5 million solders were infected, with case fatality ranging from 0.2 -5.0%. As more countries became engaged in the War, the problem grew in size, leading to major epidemics in Macedonia, Palestine, Mesopotamia and Italy. Trans-continental passages of parasites and human reservoirs of infection created ideal circumstances for parasite evolution. Details of these epidemics are reviewed, including major epidemics in England and Italy, which developed following home troop evacuations, and disruption of malaria control activities in Italy. Elsewhere, in sub-Saharan Africa many casualties resulted from high malaria exposure combined with minimal control efforts for soldiers considered semi-immune. Prevention activities eventually started but were initially poorly organized and dependent on local enthusiasm and initiative. Nets had to be designed for field use and were fundamental for personal protection. Multiple prevention approaches adopted in different settings and their relative utility are described. Clinical treatment primarily depended on quinine, although efficacy was poor as relapsing Plasmodium vivax and recrudescent Plasmodium falciparum infections were not distinguished and managed appropriately. Reasons for this are discussed and the clinical trial data

  17. Malaria's contribution to World War One - the unexpected adversary.

    Science.gov (United States)

    Brabin, Bernard J

    2014-01-01

    Malaria in the First World War was an unexpected adversary. In 1914, the scientific community had access to new knowledge on transmission of malaria parasites and their control, but the military were unprepared, and underestimated the nature, magnitude and dispersion of this enemy. In summarizing available information for allied and axis military forces, this review contextualizes the challenge posed by malaria, because although data exist across historical, medical and military documents, descriptions are fragmented, often addressing context specific issues. Military malaria surveillance statistics have, therefore, been summarized for all theatres of the War, where available. These indicated that at least 1.5 million solders were infected, with case fatality ranging from 0.2 -5.0%. As more countries became engaged in the War, the problem grew in size, leading to major epidemics in Macedonia, Palestine, Mesopotamia and Italy. Trans-continental passages of parasites and human reservoirs of infection created ideal circumstances for parasite evolution. Details of these epidemics are reviewed, including major epidemics in England and Italy, which developed following home troop evacuations, and disruption of malaria control activities in Italy. Elsewhere, in sub-Saharan Africa many casualties resulted from high malaria exposure combined with minimal control efforts for soldiers considered semi-immune. Prevention activities eventually started but were initially poorly organized and dependent on local enthusiasm and initiative. Nets had to be designed for field use and were fundamental for personal protection. Multiple prevention approaches adopted in different settings and their relative utility are described. Clinical treatment primarily depended on quinine, although efficacy was poor as relapsing Plasmodium vivax and recrudescent Plasmodium falciparum infections were not distinguished and managed appropriately. Reasons for this are discussed and the clinical trial data

  18. Modeling adversarial intent for interactive simulation and gaming: the fused intent system

    Science.gov (United States)

    Santos, Eugene, Jr.; McQueary, Bruce; Krause, Lee

    2008-04-01

    Understanding the intent of today's enemy necessitates changes in intelligence collection, processing, and dissemination. Unlike cold war antagonists, today's enemies operate in small, agile, and distributed cells whose tactics do not map well to established doctrine. This has necessitated a proliferation of advanced sensor and intelligence gathering techniques at level 0 and level 1 of the Joint Directors of Laboratories fusion model. The challenge is in leveraging modeling and simulation to transform the vast amounts of level 0 and level 1 data into actionable intelligence at levels 2 and 3 that include adversarial intent. Currently, warfighters are flooded with information (facts/observables) regarding what the enemy is presently doing, but provided inadequate explanations of adversarial intent and they cannot simulate 'what-if' scenarios to increase their predictive situational awareness. The Fused Intent System (FIS) aims to address these deficiencies by providing an environment that answers 'what' the adversary is doing, 'why' they are doing it, and 'how' they will react to coalition actions. In this paper, we describe our approach to FIS which includes adversarial 'soft-factors' such as goals, rationale, and beliefs within a computational model that infers adversarial intent and allows the insertion of assumptions to be used in conjunction with current battlefield state to perform what-if analysis. Our approach combines ontological modeling for classification and Bayesian-based abductive reasoning for explanation and has broad applicability to the operational, training, and commercial gaming domains.

  19. Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?

    Directory of Open Access Journals (Sweden)

    Tess M S Neal

    Full Text Available This survey of 206 forensic psychologists tested the "filtering" effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the "allegiance effect" in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process.

  20. Criminal defectors lead to the emergence of cooperation in an experimental, adversarial game.

    Directory of Open Access Journals (Sweden)

    Maria R D'Orsogna

    Full Text Available While the evolution of cooperation has been widely studied, little attention has been devoted to adversarial settings wherein one actor can directly harm another. Recent theoretical work addresses this issue, introducing an adversarial game in which the emergence of cooperation is heavily reliant on the presence of "Informants," actors who defect at first-order by harming others, but who cooperate at second-order by punishing other defectors. We experimentally study this adversarial environment in the laboratory with human subjects to test whether Informants are indeed critical for the emergence of cooperation. We find in these experiments that, even more so than predicted by theory, Informants are crucial for the emergence and sustenance of a high cooperation state. A key lesson is that successfully reaching and maintaining a low defection society may require the cultivation of criminals who will also aid in the punishment of others.

  1. Stability of the Max-Weight Protocol in Adversarial Wireless Networks

    CERN Document Server

    Lim, Sungsu; Andrews, Matthew

    2012-01-01

    In this paper we consider the Max-Weight protocol for routing and scheduling in wireless networks under an adversarial model. This protocol has received a significant amount of attention dating back to the papers of Tassiulas and Ephremides. In particular, this protocol is known to be throughput-optimal whenever the traffic patterns and propagation conditions are governed by a stationary stochastic process. However, the standard proof of throughput optimality (which is based on the negative drift of a quadratic potential function) does not hold when the traffic patterns and the edge capacity changes over time are governed by an arbitrary adversarial process. Such an environment appears frequently in many practical wireless scenarios when the assumption that channel conditions are governed by a stationary stochastic process does not readily apply. In this paper we prove that even in the above adversarial setting, the Max-Weight protocol keeps the queues in the network stable (i.e. keeps the queue sizes bounded...

  2. Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?

    Science.gov (United States)

    2016-01-01

    This survey of 206 forensic psychologists tested the “filtering” effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the “allegiance effect” in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process. PMID:27124416

  3. Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?

    Science.gov (United States)

    Neal, Tess M S

    2016-01-01

    This survey of 206 forensic psychologists tested the "filtering" effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the "allegiance effect" in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process.

  4. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  5. Physical attributes of potential adversaries to U.S. nuclear programs

    International Nuclear Information System (INIS)

    Research and development of physical protection elements and systems applicable to the protection of nuclear facilities and materials include the characterization of potential threats to U.S. nuclear programs. RAND Corp. has investigated several hundred incidents which involved activities of a type which can serve as analogs of potential threats to U.S. nuclear programs. This paper summarizes the data used by RAND and provides a listing of potential adversary attributes derived from a historical-incident data base. The attributes are expressed in terms of the physical capabilities of a composite adversary group

  6. Constructing Learning: Adversarial and Collaborative Working in the British Construction Industry

    Science.gov (United States)

    Bishop, Dan; Felstead, Alan; Fuller, Alison; Jewson, Nick; Unwin, Lorna; Kakavelakis, Konstantinos

    2009-01-01

    This paper examines two competing systems of work organisation in the British construction industry and their consequences for learning. Under the traditional "adversarial" system, conflict, hostility and litigation between contractors are commonplace. Such a climate actively militates against collective learning and knowledge sharing between…

  7. Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries

    DEFF Research Database (Denmark)

    Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis

    2010-01-01

    We describe how any two-party quantum computation, specified by a unitary which simultaneously acts on the registers of both parties, can be privately implemented against a quantum version of classical semi-honest adversaries that we call specious. Our construction requires two ideal functionalit...

  8. Procedural Justice in Family Court: Does the Adversary Model Make Sense?

    Science.gov (United States)

    Melton, Gary B.; Lind, E. Allan

    1982-01-01

    Reviews research and theory on procedural justice concerning family disputes, and discusses existing proposals for reform of family court procedures. Holds that adversary proceedings in custody disputes may be more beneficial to older children and disputing parents than nonadversary procedures. Identifies areas for needed research in procedural…

  9. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    Science.gov (United States)

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  10. Bring a gun to a gunfight: armed adversaries and violence across nations.

    Science.gov (United States)

    Felson, Richard B; Berg, Mark T; Rogers, Meghan L

    2014-09-01

    We use homicide data and the International Crime Victimization Survey to examine the role of firearms in explaining cross-national variation in violence. We suggest that while gun violence begets gun violence, it inhibits the tendency to engage in violence without guns. We attribute the patterns to adversary effects-i.e., the tendency of offenders to take into account the threat posed by their adversaries. Multi-level analyses of victimization data support the hypothesis that living in countries with high rates of gun violence lowers an individual's risk of an unarmed assault and assaults with less lethal weapons. Analyses of aggregate data show that homicide rates and gun violence rates load on a separate underlying factor than other types of violence. The results suggest that a country's homicide rate reflects, to a large extent, the tendency of its offenders to use firearms.

  11. With God on our side: Religious primes reduce the envisioned physical formidability of a menacing adversary.

    Science.gov (United States)

    Holbrook, Colin; Fessler, Daniel M T; Pollack, Jeremy

    2016-01-01

    The imagined support of benevolent supernatural agents attenuates anxiety and risk perception. Here, we extend these findings to judgments of the threat posed by a potentially violent adversary. Conceptual representations of bodily size and strength summarize factors that determine the relative threat posed by foes. The proximity of allies moderates the envisioned physical formidability of adversaries, suggesting that cues of access to supernatural allies will reduce the envisioned physical formidability of a threatening target. Across two studies, subtle cues of both supernatural and earthly social support reduced the envisioned physical formidability of a violent criminal. These manipulations had no effect on the perceived likelihood of encountering non-conflictual physical danger, raising the possibility that imagined supernatural support leads participants to view themselves not as shielded from encountering perilous situations, but as protected should perils arise. PMID:26524139

  12. Bring a gun to a gunfight: armed adversaries and violence across nations.

    Science.gov (United States)

    Felson, Richard B; Berg, Mark T; Rogers, Meghan L

    2014-09-01

    We use homicide data and the International Crime Victimization Survey to examine the role of firearms in explaining cross-national variation in violence. We suggest that while gun violence begets gun violence, it inhibits the tendency to engage in violence without guns. We attribute the patterns to adversary effects-i.e., the tendency of offenders to take into account the threat posed by their adversaries. Multi-level analyses of victimization data support the hypothesis that living in countries with high rates of gun violence lowers an individual's risk of an unarmed assault and assaults with less lethal weapons. Analyses of aggregate data show that homicide rates and gun violence rates load on a separate underlying factor than other types of violence. The results suggest that a country's homicide rate reflects, to a large extent, the tendency of its offenders to use firearms. PMID:24913946

  13. Intrinsic asymmetry with respect to adversary: a new feature of Bell inequalities

    International Nuclear Information System (INIS)

    It is known that the local bound of a Bell inequality is sensitive to the knowledge of the external observer about the settings statistics. Here we ask how that sensitivity depends on the structure of that knowledge. It turns out that in some cases it may happen that the local bound is much more sensitive to the adversary's knowledge about the settings of one party than the other. Remarkably, there are Bell inequalities which are highly asymmetric with respect to the adversary's knowledge about local settings. This property may be viewed as a hidden intrinsic asymmetry of Bell inequalities. Potential implications of the revealed asymmetry effect are also discussed. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘50 years of Bell’s theorem’. (paper)

  14. Material control study: a directed graph and fault tree procedure for adversary event set generation

    International Nuclear Information System (INIS)

    In work for the United States Nuclear Regulatory Commission, Lawrence Livermore Laboratory is developing an assessment procedure to evaluate the effectiveness of a potential nuclear facility licensee's material control (MC) system. The purpose of an MC system is to prevent the theft of special nuclear material such as plutonium and highly enriched uranium. The key in the assessment procedure is the generation and analysis of the adversary event sets by a directed graph and fault-tree methodology

  15. A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity

    OpenAIRE

    Vieira, Aitor Couce; Houmb, Siv Hilde; Insua, David Rios

    2014-01-01

    Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges. We also provide an example of the model in the context of an offshore drilling rig. The proposed model provides a more formal and comprehensive analysis of risks, still using the standard business language based on decisions, risks, and value.

  16. Coalition-based Planning of Military Operations: Adversarial Reasoning Algorithms in an Integrated Decision Aid

    OpenAIRE

    Ground, Larry; Kott, Alexander; Budd, Ray

    2016-01-01

    Use of knowledge-based planning tools can help alleviate the challenges of planning a complex operation by a coalition of diverse parties in an adversarial environment. We explore these challenges and potential contributions of knowledge-based tools using as an example the CADET system, a knowledge-based tool capable of producing automatically (or with human guidance) battle plans with realistic degree of detail and complexity. In ongoing experiments, it compared favorably with human planners...

  17. Cooperation and punishment in an adversarial game: How defectors pave the way to a peaceful society

    Science.gov (United States)

    Short, M. B.; Brantingham, P. J.; D'Orsogna, M. R.

    2010-12-01

    The evolution of human cooperation has been the subject of much research, especially within the framework of evolutionary public goods games, where several mechanisms have been proposed to account for persistent cooperation. Yet, in addressing this issue, little attention has been given to games of a more adversarial nature, in which defecting players, rather than simply free riding, actively seek to harm others. Here, we develop an adversarial evolutionary game using the specific example of criminal activity, recasting the familiar public goods strategies of punishers, cooperators, and defectors in this light. We then introduce a strategy—the informant—with no clear analog in public goods games and show that individuals employing this strategy are a key to the emergence of systems where cooperation dominates. We also find that a defection-dominated regime may be transitioned to one that is cooperation-dominated by converting an optimal number of players into informants. We discuss these findings, the role of informants, and possible intervention strategies in extreme adversarial societies, such as those marred by wars and insurgencies.

  18. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    Science.gov (United States)

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-01-01

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques. PMID:27355948

  19. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    Science.gov (United States)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  20. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  1. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    Science.gov (United States)

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-01-01

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  2. Undermining Adversaries

    DEFF Research Database (Denmark)

    He, Kai

    2012-01-01

    balancing refers to a state's strategies or diplomatic efforts aiming to undermine a rival's power. By contrast, positive balancing means to strengthen a state's own power in world politics. I argue that a state's balancing strategies are shaped by the level of threat perception regarding its rival. The......This paper engages the ongoing soft balancing debate by suggesting a new analytical framework for states’ countervailing strategies—a negative balancing model—to explain why states do not form alliances and conduct arms races to balance against power or threats as they previously did. Negative...... which the relatively low-threat propensity of the system renders positive balancing strategies incompatible with state interests after the Cold War. Instead, states have employed various negative balancing strategies to undermine each other's power, especially when dealing with us primacy. China...

  3. RETHINKING THE ROLE OF SMALL-GROUP COLLABORATORS AND ADVERSARIES IN THE LONDON KLEINIAN DEVELOPMENT (1914-1968).

    Science.gov (United States)

    Aguayo, Joseph; Regeczkey, Agnes

    2016-07-01

    The authors historically situate the London Kleinian development in terms of the small-group collaborations and adversaries that arose during the course of Melanie Klein's career. Some collaborations later became personally adversarial (e.g., those Klein had with Glover and Schmideberg); other adversarial relationships forever remained that way (with A. Freud); while still other long-term collaborations became theoretically contentious (such as with Winnicott and Heimann). After the Controversial Discussions in 1944, Klein marginalized one group of supporters (Heimann, Winnicott, and Riviere) in favor of another group (Rosenfeld, Segal, and Bion). After Klein's death in 1960, Bion maintained loyalty to Klein's ideas while quietly distancing his work from the London Klein group, immigrating to the United States in 1968. PMID:27428585

  4. Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L.

    2006-09-01

    Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using an adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.

  5. RETHINKING THE ROLE OF SMALL-GROUP COLLABORATORS AND ADVERSARIES IN THE LONDON KLEINIAN DEVELOPMENT (1914-1968).

    Science.gov (United States)

    Aguayo, Joseph; Regeczkey, Agnes

    2016-07-01

    The authors historically situate the London Kleinian development in terms of the small-group collaborations and adversaries that arose during the course of Melanie Klein's career. Some collaborations later became personally adversarial (e.g., those Klein had with Glover and Schmideberg); other adversarial relationships forever remained that way (with A. Freud); while still other long-term collaborations became theoretically contentious (such as with Winnicott and Heimann). After the Controversial Discussions in 1944, Klein marginalized one group of supporters (Heimann, Winnicott, and Riviere) in favor of another group (Rosenfeld, Segal, and Bion). After Klein's death in 1960, Bion maintained loyalty to Klein's ideas while quietly distancing his work from the London Klein group, immigrating to the United States in 1968.

  6. Are the advocates of nuclear power and the adversaries listening to each other?

    International Nuclear Information System (INIS)

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting

  7. Application of adversarial risk analysis model in pricing strategies with remanufacturing

    Directory of Open Access Journals (Sweden)

    Liurui Deng

    2015-01-01

    Full Text Available Purpose: Purpose: This paper mainly focus on the application of adversarial risk analysis (ARA in pricing strategy with remanufacturing. We hope to obtain more realistic results than classical model. Moreover, we also wish that our research improve the development of ARA in pricing strategy of manufacturing or remanufacturing. Approach: In order to gain more actual research, combining adversarial risk analysis, we explore the pricing strategy with remanufacturing based on Stackelberg model. Especially, we build OEM’s 1-order ARA model and further study on manufacturers and remanufacturers’ pricing strategy. Findings: We find the OEM’s 1-order ARA model for the OEM’s product cost C. Besides, we get according manufacturers and remanufacturers’ pricing strategies. Besides, the pricing strategies based on 1-order ARA model have advantage over than the classical model regardless of OEMs and remanufacturers. Research implications: The research on application of ARA imply that we can get more actual results with this kind of modern risk analysis method and ARA can be extensively in pricing strategies of supply chain. Value: Our research improves the application of ARA in remanufacturing industry. Meanwhile, inspired by this analysis, we can also create different ARA models for different parameters. Furthermore, some results and analysis methods can be applied to other pricing strategies of supply chain.

  8. Arlen Spector and the Construction of Adversarial Discourse: Selective Representation in the Clarence Thomas-Anita Hill Hearings.

    Science.gov (United States)

    Armstrong, S. Ashley

    1995-01-01

    Reports on Senator Arlen Spector's interview of Anita Hill during hearings on Supreme Court nominee Clarence Thomas and her allegations of sexual harassment. Examines the social structures and argumentative strategies Spector invoked to place Hill in a position of "powerlessness." Argues that the key resource contributing to the adversarial nature…

  9. Institutionalizing dissent: a proposal for an adversarial system of pharmaceutical research.

    Science.gov (United States)

    Biddle, Justin

    2013-12-01

    There are serious problems with the way in which pharmaceutical research is currently practiced, many of which can be traced to the influence of commercial interests on research. One of the most significant is inadequate dissent, or organized skepticism. In order to ameliorate this problem, I develop a proposal that I call the "Adversarial Proceedings for the Evaluation of Pharmaceuticals," to be instituted within a regulatory agency such as the Food and Drug Administration for the evaluation of controversial new drugs and controversial drugs already in the market. This proposal is an organizational one based upon the "science court" proposal by Arthur Kantrowitz in the 1960s and 1970s. The primary benefit of this system is its ability to institutionalize dissent, thereby ensuring that one set of interests does not dominate all others. PMID:24552075

  10. Institutionalizing dissent: a proposal for an adversarial system of pharmaceutical research.

    Science.gov (United States)

    Biddle, Justin

    2013-12-01

    There are serious problems with the way in which pharmaceutical research is currently practiced, many of which can be traced to the influence of commercial interests on research. One of the most significant is inadequate dissent, or organized skepticism. In order to ameliorate this problem, I develop a proposal that I call the "Adversarial Proceedings for the Evaluation of Pharmaceuticals," to be instituted within a regulatory agency such as the Food and Drug Administration for the evaluation of controversial new drugs and controversial drugs already in the market. This proposal is an organizational one based upon the "science court" proposal by Arthur Kantrowitz in the 1960s and 1970s. The primary benefit of this system is its ability to institutionalize dissent, thereby ensuring that one set of interests does not dominate all others.

  11. A 2D chaotic path planning for mobile robots accomplishing boundary surveillance missions in adversarial conditions

    Science.gov (United States)

    Curiac, Daniel-Ioan; Volosencu, Constantin

    2014-10-01

    The path-planning algorithm represents a crucial issue for every autonomous mobile robot. In normal circumstances a patrol robot will compute an optimal path to ensure its task accomplishment, but in adversarial conditions the problem is getting more complicated. Here, the robot’s trajectory needs to be altered into a misleading and unpredictable path to cope with potential opponents. Chaotic systems provide the needed framework for obtaining unpredictable motion in all of the three basic robot surveillance missions: area, points of interests and boundary monitoring. Proficient approaches have been provided for the first two surveillance tasks, but for boundary patrol missions no method has been reported yet. This paper addresses the mentioned research gap by proposing an efficient method, based on chaotic dynamic of the Hénon system, to ensure unpredictable boundary patrol on any shape of chosen closed contour.

  12. Imparting protean behavior to mobile robots accomplishing patrolling tasks in the presence of adversaries.

    Science.gov (United States)

    Curiac, Daniel-Ioan; Volosencu, Constantin

    2015-10-08

    Providing unpredictable trajectories for patrol robots is essential when coping with adversaries. In order to solve this problem we developed an effective approach based on the known protean behavior of individual prey animals-random zig-zag movement. The proposed bio-inspired method modifies the normal robot's path by incorporating sudden and irregular direction changes without jeopardizing the robot's mission. Such a tactic is aimed to confuse the enemy (e.g. a sniper), offering less time to acquire and retain sight alignment and sight picture. This idea is implemented by simulating a series of fictive-temporary obstacles that will randomly appear in the robot's field of view, deceiving the obstacle avoiding mechanism to react. The new general methodology is particularized by using the Arnold's cat map to obtain the timely random appearance and disappearance of the fictive obstacles. The viability of the proposed method is confirmed through an extensive simulation case study.

  13. An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary

    Directory of Open Access Journals (Sweden)

    Roohallah Rastaghi

    2012-11-01

    Full Text Available Peer-to-peer (P2P networks have become popular as a new paradigm for information exchange and are being used in many applications such as file sharing, distributed computing, video conference, VoIP, radio and TV broadcasting. This popularity comes with security implications and vulnerabilities that need to be addressed. Especially duo to direct communication between two end nodes in P2P networks, these networks are potentially vulnerable to Man-in-the-Middle attacks. In this paper, we propose a new public-key cryptosystem for P2P networks that is robust against Man-in-the-Middle adversary. This cryptosystem is based on RSA and knapsack problems. Our precoding-based algorithm uses knapsack problem for performing permutation and padding random data to the message. We show that comparing to other proposed cryptosystems, our algorithm is more efficient and it is fully secure against an active adversary.

  14. Decision Aids for Adversarial Planning in Military Operations: Algorithms, Tools, and Turing-test-like Experimental Validation

    OpenAIRE

    Kott, Alexander; Budd, Ray; Ground, Larry; Rebbapragada, Lakshmi; Langston, John

    2016-01-01

    Use of intelligent decision aids can help alleviate the challenges of planning complex operations. We describe integrated algorithms, and a tool capable of translating a high-level concept for a tactical military operation into a fully detailed, actionable plan, producing automatically (or with human guidance) plans with realistic degree of detail and of human-like quality. Tight interleaving of several algorithms -- planning, adversary estimates, scheduling, routing, attrition and consumptio...

  15. Breaking the O(nm) Bit Barrier: Secure Multiparty Computation with a Static Adversary

    CERN Document Server

    Dani, Varsha; Movahedi, Mahnush; Saia, Jared

    2012-01-01

    We describe scalable algorithms for secure multiparty computation (SMPC). We assume a synchronous message passing communication model, but unlike most related work, we do not assume the existence of a broadcast channel. Our main result holds for the case where there are n players, of which a (1/3-\\epsilon)-fraction are controlled by an adversary, for \\epsilon, any positive constant. We describe a SMPC algorithm for this model that requires each player to send O((n+m)/n + \\sqrt{n}) (where the O notation hides polylogarithmic factors) messages and perform O((n+m)/n + \\sqrt{n}) computations to compute any function f, where m is the size of a circuit to compute f. We also consider a model where all players are selfish but rational. In this model, we describe a Nash equilibrium protocol that solve SMPC and requires each player to send O((n+m)/n) messages and perform O((n+m)/n) computations. These results significantly improve over past results for SMPC which require each player to send a number of bits and perform...

  16. Sistema penal acusatorio en Veracruz/Adversarial criminal system in Veracruz

    Directory of Open Access Journals (Sweden)

    Jorge Alberto Pérez Tolentino (México

    2014-01-01

    Full Text Available El estudio y comprensión del nuevo Código de Procedimientos Penales de Veracruz resulta ineludible, en virtud de las nítidas diferencias existentes entre las figuras jurídicas que contiene el actual ordenamiento, en comparación con el anterior. Es preciso sistematizar, describir y analizar la estructura del sistema penal acusatorio, a efecto de estar en condiciones de evaluar y, en su caso, proponer las mejoras al sistema en cuestión. El contenido esquemático y sustancial del código, la visión y recepción que del mismo tienen los operadores jurídicos y la sociedad en general, son aspectos que cubre el presente documento. The study and understanding of the new Code of Criminal Procedure of Veracruz is unavoidable, by reason of the sharp differences between the legal concepts that contains the actual order, compared with the previous. Needs to be systematized, describe and analyze the structure of the adversarial criminal system, in order to be able to evaluate and, if necessary, propose improvements to the system in question. The schematic and substantial content of the code, viewing and welcome that the same have the legal practitioners and society in general, are aspects covered by herein.

  17. Secure two-party quantum evaluation of unitaries against specious adversaries

    CERN Document Server

    Dupuis, Frédéric; Salvail, Louis

    2010-01-01

    We describe how any two-party quantum computation, specified by a unitary which simultaneously acts on the registers of both parties, can be privately implemented against a quantum version of classical semi-honest adversaries that we call specious. Our construction requires two ideal functionalities to garantee privacy: a private SWAP between registers held by the two parties and a classical private AND-box equivalent to oblivious transfer. If the unitary to be evaluated is in the Clifford group then only one call to SWAP is required for privacy. On the other hand, any unitary not in the Clifford requires one call to an AND-box per R-gate in the circuit. Since SWAP is itself in the Clifford group, this functionality is universal for the private evaluation of any unitary in that group. SWAP can be built from a classical bit commitment scheme or an AND-box but an AND-box cannot be constructed from SWAP. It follows that unitaries in the Clifford group are to some extent the easy ones. We also show that SWAP cann...

  18. Adversarial intent modeling using embedded simulation and temporal Bayesian knowledge bases

    Science.gov (United States)

    Pioch, Nicholas J.; Melhuish, James; Seidel, Andy; Santos, Eugene, Jr.; Li, Deqing; Gorniak, Mark

    2009-05-01

    To foster shared battlespace awareness among air strategy planners, BAE Systems has developed Commander's Model Integration and Simulation Toolkit (CMIST), an Integrated Development Environment for authoring, integration, validation, and debugging of models relating multiple domains, including political, military, social, economic and information. CMIST provides a unified graphical user interface for such systems of systems modeling, spanning several disparate modeling paradigms. Here, we briefly review the CMIST architecture and then compare modeling results using two approaches to intent modeling. The first uses reactive agents with simplified behavior models that apply rule-based triggers to initiate actions based solely on observations of the external world at the current time in the simulation. The second method models proactive agents running an embedded CMIST simulation representing their projection of how events may unfold in the future in order to take early preventative action. Finally, we discuss a recent extension to CMIST that incorporates Temporal Bayesian Knowledge Bases for more sophisticated models of adversarial intent that are capable of inferring goals and future actions given evidence of current actions at particular times.

  19. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.

    Science.gov (United States)

    Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly

    2014-01-01

    Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired-a low-risk, often ignored error-but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts

  20. The Effect of Respect, Trust, and Fear in Adversarial Stakeholder Relationships: A Case Study on Water Commodification and Stakeholder Engagement

    Directory of Open Access Journals (Sweden)

    Mark McGinley

    2011-04-01

    Full Text Available

    Current academic discussion around stakeholder engagement has historically been focused on the attributes of the various stakeholders rather than on the relationship between the stakeholders. This paper examines the role that the intangible variables, respect, fear, and trust play in stakeholder relationships that are characterized by intractable conflict. That role is explored through a case study of stakeholder groups with adversarial positions on the commodification and export of Canada’s freshwater. Through discussion of the relationship between two sets of stakeholders with conflicting interests on Canada’s freshwater commodification respect, fear, and trust are advanced as the key intangible variables that create the underlying conflict. With these root causes identified the paper explores methods to build respect, reduce fear, and create trust between the stakeholders in an effort to shift their relationship from adversarial to co-operative in the hopes of facilitating constructive dialogue.

  1. How to achieve public participation in nuclear waste decisions: Public relations or transparent adversary science

    Energy Technology Data Exchange (ETDEWEB)

    Treichel, J. [Nevada Nuclear Waste Task Force, Las Vegas, NV (United States)

    1999-12-01

    applied correctly, are in this case, merely tools being employed to co-opt or buy off the opposition and legitimize the process. It appears at this point that there are two choices: either the decision-makers can attempt to continue with the current program of forced siting, ignoring all citizen and scientific opposition and eventually leading to litigation; or a new program can be developed. Since the US nuclear waste programs have utilized or have been perceived as utilizing advocacy science, the country must add 'adversary science' to the national program. This is described as the providing of financial support for competing teams of experts to investigate, and to tell the public about, any hazards which the enthusiasts of a project may have failed to report, or even to see. If citizens were able to participate in the debate between scientists and experts, with differing opinions concerning the merits of a nuclear waste site or indeed, any controversial technology, they would feel represented. They would believe that the final decisions were made only after the program in question had withstood and overcome all criticism-rather than just ignored it. There is probably no chance that the current US nuclear waste program can succeed in light of the level of public opposition. It is therefore necessary to move to a policy that respects those who must pay the costs and live with its consequences.

  2. The structure of adversarial growth in a sample of cancer patients 8 years post-diagnosis : a revision of the SLQ-38

    NARCIS (Netherlands)

    McBride, Orla; Schroevers, Maya J.; Ranchor, Adelita V.

    2009-01-01

    Stressful and traumatic events may trigger positive life changes, so-called adversarial growth. Despite growing interest in this topic, the structure and dimensionality of this concept has not been established. Recently, empirical reviews have suggested that the factors underlying this construct are

  3. The Influence of Cognitive Biases on Court Decisions. Contributions of Legal Psychology to the Adversary Criminal Proceedings

    Directory of Open Access Journals (Sweden)

    Paola Iliana De la Rosa Rodríguez

    2016-06-01

    Full Text Available The purpose of this paper is to disperse among the judiciary and society the psychological procedures involved in the decision-making process of judges since they are not only influenced by law but by previous ideas and values. It is worth questioning: in what extent their personal views and beliefs are the bases of verdicts? How can aversions and public opinion have an impact in the court decision? This paper analyzes and states the differences of the judicial role in the Mexican adversarial system and the inquisitorial models of justice. It also critiques the categories of the judicial officers and presents the circumstances that make an impact on judicial decisions, according to Psychology studies. It finally classifies cognitive biases and concludes that the more knowledge judges have about it, the more imparcial judgments will be.

  4. Mothers' power assertion; children's negative, adversarial orientation; and future behavior problems in low-income families: early maternal responsiveness as a moderator of the developmental cascade.

    Science.gov (United States)

    Kim, Sanghag; Kochanska, Grazyna

    2015-02-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children's negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers' responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children's negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children's behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children's negative, adversarial orientation to future behavior problems was present when mothers' responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts.

  5. A Research on the System of Evidence Investigation and Collection in Court with the Adversary System%法院证据调查与当事人主义

    Institute of Scientific and Technical Information of China (English)

    李晓丽

    2012-01-01

    China's Civil Trial Reform criticizes the super-ex officio doctrine and advocates developing the adversary system on weakening the court's power on evidence investigation and collection.On the research of comparison the adversary systemJs concept in civil law system and common law system;we find that truth-finding is the true essence of civil procedure law;and the adversary system doesn't exclude the court's power on evidence investigation and collection.We should develop this system on court's evidence investigation and collection to promote the counter create the justice proactively by its standardization.%我国审判方式改革在批判超职权主义观念的基础上,主张向当事人主义的目标发展,大大削弱了法官依据职权调查证据的权力。本文通过对大陆法系和英美法系的当事人主义诉讼模式的分析发现,对真实的追求是民事诉讼的真谛,当事人主义并不排斥法院实施证据调查。我国应当通过法院证据调查制度的规范化促进司法者能动地输出司法正义。

  6. Mothers' power assertion; children's negative, adversarial orientation; and future behavior problems in low-income families: early maternal responsiveness as a moderator of the developmental cascade.

    Science.gov (United States)

    Kim, Sanghag; Kochanska, Grazyna

    2015-02-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children's negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers' responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children's negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children's behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children's negative, adversarial orientation to future behavior problems was present when mothers' responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PMID:25401483

  7. El aspecto criminalista del nuevo proceso penal de corte acusatorio, adversarial y oral en el estado de México/The forensic aspect of the accusatorial, adversarial and oral criminal process in the state of Mexico

    Directory of Open Access Journals (Sweden)

    Juan Antonio Maruri Jiménez

    2013-01-01

    Full Text Available El Gobierno del Estado de México, mediante Decreto número 266 del 9 de febrero de 2009, publicó en la Gaceta del Gobierno, el nuevo Código de Procedimientos Penales para el Estado de México, tomando importancia en el presente trabajo, el rol del perito en el nuevo proceso penal de corte acusatorio, adversarial y oral, donde se abordarán los tópicos referentes a los principios que lo rigen, la legalidad y la valoración de la prueba, el registro de actuaciones y audiencias, los sujetos procesales, las actuaciones y los elementos de la investigación, inspecciones, registros y aseguramientos, registros de investigación y cadena de custodia, los peritajes, su actuación en la audiencia de juicio oral, en la prueba anticipada y en la prueba irreproductible. De esta manera, el perito normará su actuación -además de lo referente a su ciencia-, conforme a los principios del proceso penal acusatorio. Las reglas para la emisión y presentación del dictamen cambian de manera sustancial, razón por la cual, los peritos deben analizar el cuerpo legal y dirigir su actuación en base a dichos criterios, además de que será requerida su intervención personal en base a interrogatorios efectuados por los sujetos procesales, siendo participes dentro del drama penal como agentes activos para lograr el conocimiento de la verdad histórica de los hechos.

  8. Are the advocates of nuclear power and the adversaries listening to each other? Does Dialogue have a chance? Introductory remarks by John A. Macpherson

    International Nuclear Information System (INIS)

    Are the advocates of nuclear power and the adversaries listening to each other? Does dialogue have a chance? My short answer to both questions posed as the title for this discussion is 'no'. And I would add: There is no point in trying to bring opposite poles together, it requires too much investment for too little return. A nuclear dialogue will have a chance only it a distinction can be shown between physics and metaphysics, between chemistry and alchemy, and if the gap can be bridged between the polarized views of the world's societal needs which, incidentally, create the nuclear issue in the first place. This is a daunting task Movements in search of a cause have a passion for preaching rather than a love for listening

  9. U.S. Nuclear Regulatory Commission Staff's Approach to Incorporate the Attractiveness of Nuclear Material to Adversaries into Its Graded Approach to Security

    International Nuclear Information System (INIS)

    This paper provides an overview of the analysis performed to support the Nuclear Regulatory Commission (NRC) staff’s approach to incorporate material attractiveness into its graded security requirements. Discussions of the technical study, as well as the input we have received from interested parties are presented. It will also provide the staff’s current view of the approach and how it could potentially be implemented into the regulatory framework. As with all of the NRC’s policy decisions, the five-member Commission will ultimately decide the final approach and implementation of the staff’s efforts. The NRC staff has worked over the last several years to identify an approach to capturing the concept of material attractiveness into its graded security requirements. This has involved staff work, a technical study, and outreach to stakeholders. The staff’s current understanding is that the most useful attribute to consider, aside from self protection, is the level of dilution. It is both measureable and correlated with the attractiveness of nuclear material to adversaries. The staff considers that the current categorization approach should be maintained. However, alternative security measures should be considered for varying levels of dilution, taking into account the bulkiness, heavy weight and lower attractiveness of the material. (author)

  10. Using adversary text to detect adversary phase changes.

    Energy Technology Data Exchange (ETDEWEB)

    Speed, Ann Elizabeth; Doser, Adele Beatrice; Warrender, Christina E.

    2009-05-01

    The purpose of this work was to help develop a research roadmap and small proof ofconcept for addressing key problems and gaps from the perspective of using text analysis methods as a primary tool for detecting when a group is undergoing a phase change. Self- rganizing map (SOM) techniques were used to analyze text data obtained from the tworld-wide web. Statistical studies indicate that it may be possible to predict phase changes, as well as detect whether or not an example of writing can be attributed to a group of interest.

  11. High-Confidence Predictions under Adversarial Uncertainty

    CERN Document Server

    Drucker, Andrew

    2011-01-01

    We study the setting in which the bits of an unknown infinite binary sequence x are revealed sequentially to an observer. We show that very limited assumptions about x allow one to make successful predictions about unseen bits of x. First, we study the problem of successfully predicting a single 0 from among the bits of x. In our model we have only one chance to make a prediction, but may do so at a time of our choosing. We describe and motivate this as the problem of a frog who wants to cross a road safely. Letting N_t denote the number of 1s among the first t bits of x, we say that x is "eps-weakly sparse" if lim inf (N_t/t) 0, we give a randomized forecasting algorithm S_eps that, given sequential access to a binary sequence x, makes a predi ction of the form: "A p fraction of the next N bits will be 1s." (The algorithm gets to choose p, N, and the time of the prediction.) For any fixed sequence x, the forecast fraction p is accurate to within +-eps with probability 1 - eps.

  12. Adversarial decision and optimization-based models

    OpenAIRE

    Villacorta Iglesias, Pablo Jos??

    2015-01-01

    Decision making is all around us. Everyone makes choices everyday, from the moment we open our eyes in the morning. Some of them do not have very important consequences in our life and these consequences are easy to take into account. However, in the business world, managers make decisions that have important consequences on the future of their own firm (in terms of revenues, market position, business policy) and their employees. In these cases, it is difficult to account fo...

  13. The Adversarial Playground: Adversaries manipulate media technology to their advantage [video

    OpenAIRE

    Center for Homeland Defense and Security Naval Postgraduate School

    2016-01-01

    ISIS has honed and evolved its propaganda skills and continues to push out very effective messaging to its prospective recruits, in many cases radicalizing groups and individuals. Which approaches should be taken in finding the right strategy to counter their hateful and violent disinformation? In this interview, Kathleen Kiernan has assembled a panel of subject matter experts on media production who discuss various approaches towards counter-messaging the messenger.

  14. New Online Ecology of Adversarial Aggregates: ISIS and beyond

    CERN Document Server

    Johnson, N F; Vorobyeva, Y; Gabriel, A; Qi, H; Velasquez, N; Manrique, P; Johnson, D; Restrepo, E; Song, C; Wuchty, S

    2016-01-01

    Support for an extremist entity such as Islamic State (ISIS) somehow manages to survive globally online despite significant external pressure, and may ultimately inspire acts by individuals who have no prior history of extremism, formal cell membership or direct links to leadership. We uncover an ultrafast ecology driving this online support and provide a mathematical theory that describes it. The ecology features self-organized aggregates that proliferate preceding the onset of recent real-world campaigns, and adopt novel adaptive mechanisms to enhance their survival. One of the actionable predictions is that the development of large, potentially potent pro-ISIS aggregates can be thwarted by targeting smaller ones.

  15. [The newborn and the couple: adversaries or partners?].

    Science.gov (United States)

    Provost, M A; Tremblay, S

    1991-06-01

    We generally accept that the planned arrival of a first child is a source of joy for the new parents and that it provides them with a sense of accomplishment. Traditionally, society welcomes the formation of a family unit and looks forward to this passage into the new role of parenthood. However, not only has research on marital relations set aside the popular imagery of romanticism, but it has increasingly given negative connotations to this crisis-prone transition phase. The objective of this article is therefore to review literature concerning the impact of a newborn child on the marital experience, and to nuance the idea that childbirth can lead to crisis situations within the couple. In conclusion, the authors argue that the concept of marital satisfaction needs to be reformulated. Judging from their brief overview of literature, the authors believe the concept to be too narrowly defined and slightly ambiguous. Indeed, researchers have not yet reached a consensus on the definition of marital satisfaction. Furthermore, they tend to operationalize the concept in very different ways. As a result, there is a lot of conclusion and the fact that many researchers use different terms as a synonym of satisfaction is no help. What's more, the assessment of quality in a relationship should not be limited to measuring the level of satisfaction of the two partners. Other dimensions (e.g. adjustment, commitment, cohesion, etc.) deserve consideration in order to give a more complete image of the changes that occur over the years within the couple. PMID:1932419

  16. New online ecology of adversarial aggregates: ISIS and beyond.

    Science.gov (United States)

    Johnson, N F; Zheng, M; Vorobyeva, Y; Gabriel, A; Qi, H; Velasquez, N; Manrique, P; Johnson, D; Restrepo, E; Song, C; Wuchty, S

    2016-06-17

    Support for an extremist entity such as Islamic State (ISIS) somehow manages to survive globally online despite considerable external pressure and may ultimately inspire acts by individuals having no history of extremism, membership in a terrorist faction, or direct links to leadership. Examining longitudinal records of online activity, we uncovered an ecology evolving on a daily time scale that drives online support, and we provide a mathematical theory that describes it. The ecology features self-organized aggregates (ad hoc groups formed via linkage to a Facebook page or analog) that proliferate preceding the onset of recent real-world campaigns and adopt novel adaptive mechanisms to enhance their survival. One of the predictions is that development of large, potentially potent pro-ISIS aggregates can be thwarted by targeting smaller ones. PMID:27313046

  17. The deconstruction of safety arguments through adversarial counter-argument

    International Nuclear Information System (INIS)

    The project Deconstructive Evaluation of Risk In Dependability Arguments and Safety Cases (DERIDASC) has recently experimented with techniques borrowed from literary theory as safety case analysis techniques [Armstrong. Danger: Derrida at work. Interdiscipl Sci Rev 2003;28(2):83-94. ; Armstrong J, Paynter S. Safe systems: construction, destruction, and deconstruction. In: Redmill F, Anderson T, editors. Proceedings of the 11th safety critical systems symposium, Bristol, UK. Berlin: Springer; 2003. p. 62-76. ISBN:1-85233-696-X. ]. This paper introduces our high-level framework for 'deconstructing' safety arguments. Our approach is quite general and should be applicable to different types of safety argumentation framework. As one example, we outline how the approach would work in the context of the Goal Structure Notation (GSN)

  18. The deconstruction of safety arguments through adversarial counter-argument

    Energy Technology Data Exchange (ETDEWEB)

    Armstrong, James M. [BAE Systems Systems Engineering Innovation Centre (SEIC), University of Loughborough (United Kingdom)]. E-mail: J.M.Armstrong@lboro.ac.uk; Paynter, Stephen E. [MBDA UK Ltd, Filton, Bristol (United Kingdom)]. E-mail: stephen.paynter@mbda.co.uk

    2007-11-15

    The project Deconstructive Evaluation of Risk In Dependability Arguments and Safety Cases (DERIDASC) has recently experimented with techniques borrowed from literary theory as safety case analysis techniques [Armstrong. Danger: Derrida at work. Interdiscipl Sci Rev 2003;28(2):83-94. ; Armstrong J, Paynter S. Safe systems: construction, destruction, and deconstruction. In: Redmill F, Anderson T, editors. Proceedings of the 11th safety critical systems symposium, Bristol, UK. Berlin: Springer; 2003. p. 62-76. ISBN:1-85233-696-X. ]. This paper introduces our high-level framework for 'deconstructing' safety arguments. Our approach is quite general and should be applicable to different types of safety argumentation framework. As one example, we outline how the approach would work in the context of the Goal Structure Notation (GSN)

  19. A classical one-way function to confound quantum adversaries

    CERN Document Server

    Moore, Cristopher; Vazirani, U; Moore, Cristopher; Russell, Alexander; Vazirani, Umesh

    2007-01-01

    The promise of quantum computation and its consequences for complexity-theoretic cryptography motivates an immediate search for cryptosystems which can be implemented with current technology, but which remain secure even in the presence of quantum computers. Inspired by recent negative results pertaining to the nonabelian hidden subgroup problem, we present here a classical algebraic function $f_V(M)$ of a matrix $M$ which we believe is a one-way function secure against quantum attacks. Specifically, inverting $f_V$ reduces naturally to solving a hidden subgroup problem over the general linear group (which is at least as hard as the hidden subgroup problem over the symmetric group). We also demonstrate a reduction from Graph Isomorphism to the problem of inverting $f_V$; unlike Graph Isomorphism, however, the function $f_V$ is random self-reducible and therefore uniformly hard. These results suggest that, unlike Shor's algorithm for the discrete logarithm--which is, so far, the only successful quantum attack ...

  20. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory.

    Science.gov (United States)

    Merrick, Jason R W; Leclerc, Philip

    2016-04-01

    Counterterrorism decisions have been an intense area of research in recent years. Both decision analysis and game theory have been used to model such decisions, and more recently approaches have been developed that combine the techniques of the two disciplines. However, each of these approaches assumes that the attacker is maximizing its utility. Experimental research shows that human beings do not make decisions by maximizing expected utility without aid, but instead deviate in specific ways such as loss aversion or likelihood insensitivity. In this article, we modify existing methods for counterterrorism decisions. We keep expected utility as the defender's paradigm to seek for the rational decision, but we use prospect theory to solve for the attacker's decision to descriptively model the attacker's loss aversion and likelihood insensitivity. We study the effects of this approach in a critical decision, whether to screen containers entering the United States for radioactive materials. We find that the defender's optimal decision is sensitive to the attacker's levels of loss aversion and likelihood insensitivity, meaning that understanding such descriptive decision effects is important in making such decisions. PMID:25039254

  1. Distributed convergence to Nash equilibria by adversarial networks

    CERN Document Server

    Gharesifard, Bahman

    2012-01-01

    This paper considers a class of strategic scenarios in which two networks of agents have opposing objectives with regards to the optimization of a common objective function. In the resulting zero-sum game, individual agents collaborate with neighbors in their respective network and have only partial knowledge of the state of the agents in the other network. For the case when the interaction topology of each network is undirected, we synthesize a distributed saddle-point strategy and establish its convergence to the Nash equilibrium for the class of strictly concave-convex and locally Lipschitz objective functions. We also show that this dynamics does not converge in general if the topologies are directed. This justifies the introduction, in the directed case, of a generalization of this distributed dynamics which we show converges to the Nash equilibrium for the class of strictly concave-convex differentiable functions with locally Lipschitz gradients. The technical approach combines tools from algebraic grap...

  2. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen [3

  3. Risk taking in adversarial situations: Civilization differences in chess experts.

    Science.gov (United States)

    Chassy, Philippe; Gobet, Fernand

    2015-08-01

    The projections of experts in politics predict that a new world order will emerge within two decades. Being multipolar, this world will inevitably lead to frictions where civilizations and states will have to decide whether to risk conflict. Very often these decisions are informed if not taken by experts. To estimate risk-taking across civilizations, we examined strategies used in 667,599 chess games played over eleven years by chess experts from 11 different civilizations. We show that some civilizations are more inclined to settle for peace. Similarly, we show that once engaged in the battle, the level of risk taking varies significantly across civilizations, the boldest civilization using the riskiest strategy about 35% more than the most conservative civilization. We discuss which psychological factors might underpin these civilizational differences. PMID:25912894

  4. A model-referenced procedure to support adversarial decision processes

    International Nuclear Information System (INIS)

    In public enquiries concerning major facilities, such as the construction of a new electric power plant, it is observed that a useable decision model should be made commonly available alongside the open provision of data and assumptions. The protagonist, eg the electric utility, generally makes use of a complex, proprietary model for detailed evaluation of options. A simple emulator of this, based upon a regression analysis of numerous scenarios, and validated by further simulations is shown to be feasible and potentially attractive. It would be in the interests of the utility to make such a model-referenced decision support method generally available. The approach is considered in relation to the recent Hinkley Point C public enquiry for a new nuclear power plant in the UK. (Author)

  5. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory.

    Science.gov (United States)

    Merrick, Jason R W; Leclerc, Philip

    2016-04-01

    Counterterrorism decisions have been an intense area of research in recent years. Both decision analysis and game theory have been used to model such decisions, and more recently approaches have been developed that combine the techniques of the two disciplines. However, each of these approaches assumes that the attacker is maximizing its utility. Experimental research shows that human beings do not make decisions by maximizing expected utility without aid, but instead deviate in specific ways such as loss aversion or likelihood insensitivity. In this article, we modify existing methods for counterterrorism decisions. We keep expected utility as the defender's paradigm to seek for the rational decision, but we use prospect theory to solve for the attacker's decision to descriptively model the attacker's loss aversion and likelihood insensitivity. We study the effects of this approach in a critical decision, whether to screen containers entering the United States for radioactive materials. We find that the defender's optimal decision is sensitive to the attacker's levels of loss aversion and likelihood insensitivity, meaning that understanding such descriptive decision effects is important in making such decisions.

  6. Educating Political Adversaries: Chantal Mouffe and Radical Democratic Citizenship Education

    Science.gov (United States)

    Ruitenberg, Claudia W.

    2009-01-01

    Many scholars in the area of citizenship education take deliberative approaches to democracy, especially as put forward by John Rawls, as their point of departure. From there, they explore how students' capacity for political and/or moral reasoning can be fostered. Recent work by political theorist Chantal Mouffe, however, questions some of the…

  7. 29 CFR 102.143 - “Adversary adjudication” defined; entitlement to award; eligibility for award.

    Science.gov (United States)

    2010-07-01

    ...; eligibility for award. 102.143 Section 102.143 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS... used in this subpart, means unfair labor practice proceedings pending before the Board on complaint and..., corporation, association, unit of local government, or public or private organization with a net worth of...

  8. The perpetual adversary: how Dutch security services perceived communism (1918-1989)

    OpenAIRE

    Hijzen, Constant Willem

    2013-01-01

    "For more than eighty years, Dutch security services perceived communism as the ultimate threat to national security. From its inception, the anticommunist threat perceptions contained references to foreign, possible, potential, and ideological elements of the communist threat. This put the activities of Dutch communists in a different light. Although for a long time there were well-grounded reasons to do so, the author finds that there were periods when the actual threatening character of Du...

  9. Adversary phase change detection using S.O.M. and text data

    International Nuclear Information System (INIS)

    In this work, we developed a self-organizing map (SOM) technique for using web-based text analysis to forecast when a group is undergoing a phase change. By 'phase change', we mean that an organization has fundamentally shifted attitudes or behaviors. For instance, when ice melts into water, the characteristics of the substance change. A formerly peaceful group may suddenly adopt violence, or a violent organization may unexpectedly agree to a ceasefire. SOM techniques were used to analyze text obtained from organization postings on the world-wide web. Results suggest it may be possible to forecast phase changes, and determine if an example of writing can be attributed to a group of interest.

  10. Insider, Outsider, Ally, or Adversary: Parents of Youth with Learning Disabilities Engage in Educational Advocacy

    Science.gov (United States)

    Duquette, Cheryll; Fullarton, Stephanie; Orders, Shari; Robertson-Grewal, Kristen

    2011-01-01

    The purpose of this qualitative study was to examine the educational advocacy experiences of parents of adolescents and young adults identified as having a learning disability (LD) through the lens of four dimensions of advocacy. Seventeen mothers of youth with LD responded to items in a questionnaire and 13 also engaged in in-depth interviews. It…

  11. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations

    OpenAIRE

    Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly

    2014-01-01

    Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol.

  12. Adversaries and Allies: Rival National Suffrage Groups and the 1882 Nebraska Woman Suffrage Campaign

    Science.gov (United States)

    Heider, Carmen

    2005-01-01

    In September 1882, Nebraska was the setting for a significant moment in the history of the United States women's rights movement: the two rival suffrage organizations, the American Woman Suffrage Association (AWSA) and the National Woman Suffrage Association (NWSA), both held their annual conventions in Omaha. The alliance of the AWSA and the NWSA…

  13. Semidefinite programming characterization and spectral adversary method for quantum complexity with noncommuting unitary queries

    OpenAIRE

    Barnum, Howard

    2007-01-01

    Generalizing earlier work characterizing the quantum query complexity of computing a function of an unknown classical ``black box'' function drawn from some set of such black box functions, we investigate a more general quantum query model in which the goal is to compute functions of N by N ``black box'' unitary matrices drawn from a set of such matrices, a problem with applications to determining properties of quantum physical systems. We characterize the existence of an algorithm for such a...

  14. The principles of adversarial procedure and equality in international commercial arbitration

    OpenAIRE

    Козирєва, Валентина; Гаврилішин, Анатолій

    2016-01-01

    The article investigates the principles of competitiveness and procedural equality as basic principles of justice which govern litigation international commercial arbitration. On the basis of international legal acts are examples of the application of the above principles. English abstract V. Kozyreva, A. Havrylishyn The article deals with the principles of competition and equality of procedural justice as the basic principles governing the cases to international commercial arbitration. On...

  15. Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries

    CERN Document Server

    Bickson, Danny; Dolev, Danny; Pinkas, Benny

    2009-01-01

    We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and other tasks, where the computing nodes is expected to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we try to bridge the gap between theoretical algorithms in the security domain, and a practical Peer-to-Peer deployment. We consider two security models. The first is the semi-honest model where peers correctly follow the protocol, but try to reveal private information. We provide three possible schemes for secure multi-party numerical computation for this model and identify a singl...

  16. Secure and Robust IPV6 Autoconfiguration Protocol For Mobile Adhoc Networks Under Strong Adversarial Model

    CERN Document Server

    Slimane, Zohra; Feham, Mohamed; Taleb-Ahmed, Abdelmalik

    2011-01-01

    Automatic IP address assignment in Mobile Ad hoc Networks (MANETs) enables nodes to obtain routable addresses without any infrastructure. Different protocols have been developed throughout the last years to achieve this service. However, research primarily focused on correctness, efficiency and scalability; much less attention has been given to the security issues. The lack of security in the design of such protocols opens the possibility of many real threats leading to serious attacks in potentially hostile environments. Recently, few schemes have been proposed to solve this problem, but none of them has brought satisfactory solutions. Auto-configuration security issues are still an open problem. In this paper, a robust and secure stateful IP address allocation protocol for standalone MANETs is specified and evaluated within NS2. Our solution is based on mutual authentication, and a fully distributed Autoconfiguration and CA model, in conjunction with threshold cryptography. By deploying a new concept of joi...

  17. SECURE AND ROBUST IPV6 AUTOCONFIGURATION PROTOCOL FOR MOBILE ADHOC NETWORKS UNDER STRONG ADVERSARIAL MODEL

    Directory of Open Access Journals (Sweden)

    Zohra Slimane

    2011-08-01

    Full Text Available Automatic IP address assignment in Mobile Ad hoc Networks (MANETs enables nodes to obtainroutable addresses without any infrastructure. Different protocols have been developed throughout thelast years to achieve this service. However, research primarily focused on correctness, efficiency andscalability; much less attention has been given to the security issues. The lack of security in the design ofsuch protocols opens the possibility of many real threats leading to serious attacks in potentially hostileenvironments. Recently, few schemes have been proposed to solve this problem, but none of them hasbrought satisfactory solutions. Auto-configuration security issues are still an open problem. In this paper,a robust and secure stateful IP address allocation protocol for standalone MANETs is specified andevaluated within NS2. Our solution is based on mutual authentication, and a fully distributed Autoconfigurationand CA model, in conjunction with threshold cryptography. By deploying a new concept ofjoint IP address and public key certificate, we show that, instead of earlier approaches, our solutionsolves the problem of all possible attacks associated with dynamic IP address assignment in MANETs.The resulting protocol incurs low latency and control overhead.

  18. Vision and strategy development of Slovak society. Development Strategy for Slovak society (basis for public adversary)

    International Nuclear Information System (INIS)

    This analytical study analyses the present state as well as strategy of perspectives of development of Slovak society. This strategy of development of Slovak society is scientific testimony of the authors, the manner and extent of its use will determine political representation. Future economic growth and development of Slovak's regions will mainly depend on the availability of raw materials, energy resources, water, food processes and improving the environment. A key issue in the next 5 to 10 years in the energy sector will address energy security, diversification of energy sources, utilization of domestic raw materials and renewable energy and energy savings. The energy security strategy is to achieve a competitive energy industry for reliable and efficient supply of all forms of energy at affordable prices, with a view to protection of the customer and the environment.

  19. Consensus of Multi-Agent Networks in the Presence of Adversaries Using Only Local Information

    CERN Document Server

    LeBlanc, Heath J; Sundaram, Shreyas; Koutsoukos, Xenofon

    2012-01-01

    This paper addresses the problem of resilient consensus in the presence of misbehaving nodes. Although it is typical to assume knowledge of at least some nonlocal information when studying secure and fault-tolerant consensus algorithms, this assumption is not suitable for large-scale dynamic networks. To remedy this, we emphasize the use of local strategies to deal with resilience to security breaches. We study a consensus protocol that uses only local information and we consider worst-case security breaches, where the compromised nodes have full knowledge of the network and the intentions of the other nodes. We provide necessary and sufficient conditions for the normal nodes to reach consensus despite the influence of the malicious nodes under different threat assumptions. These conditions are stated in terms of a novel graph-theoretic property referred to as network robustness.

  20. An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary

    OpenAIRE

    Roohallah Rastaghi

    2012-01-01

    Peer-to-peer (P2P) networks have become popular as a new paradigm for information exchange and are being used in many applications such as file sharing, distributed computing, video conference, VoIP, radio and TV broadcasting. This popularity comes with security implications and vulnerabilities that need to be addressed. Especially duo to direct communication between two end nodes in P2P networks, these networks are potentially vulnerable to Man-in-the-Middle attacks. In this paper, we propos...

  1. On the Formal Modeling of Games of Language and Adversarial Argumentation : A Logic-Based Artificial Intelligence Approach

    OpenAIRE

    Eriksson Lundström, Jenny S. Z.

    2009-01-01

    Argumentation is a highly dynamical and dialectical process drawing on human cognition. Successful argumentation is ubiquitous to human interaction. Comprehensive formal modeling and analysis of argumentation presupposes a dynamical approach to the following phenomena: the deductive logic notion, the dialectical notion and the cognitive notion of justified belief. For each step of an argumentation these phenomena form networks of rules which determine the propositions to be allowed to make se...

  2. El aspecto científico de la trilogía “ministerio público-policía-peritos” en el nuevo proceso penal de corte acusatorio, adversarial y oral en México/The scientific aspect of the trilogy "public-police-expert ministry" in the new adversarial criminal process, and oral adversarial court in Mexico

    Directory of Open Access Journals (Sweden)

    Juan Antonio Maruri Jiménez

    2015-05-01

    Full Text Available The last June 18, 2008 the Decree amending Articles 16, 17, 18, 19, 20, 21, 22 are amended was published; (the fractions XXI and XXIII of Article 73, Section VII of Article 115 and section XIII paragraph B of Article 123 of the Constitution of the United Mexican States, giving rise to the Constitutional reform of criminal justice, emerging as basic expectations: total transformation of the criminal justice system; effectively guarantee the validity of the “due process” in criminal matters restore confidence in the criminal justice system and its institutions doing research and efficient prosecution of crimes, the accused is greater assurances defense thereby ensuring the protection, support and participation of victims and injured, and safeguard the principles governing a Democratic-State Constitutional Law.

  3. El aspecto científico de la trilogía “ministerio público-policía-peritos” en el nuevo proceso penal de corte acusatorio, adversarial y oral en México/The scientific aspect of the trilogy "public-police-expert ministry" in the new adversarial criminal process, and oral adversarial court in Mexico

    OpenAIRE

    Juan Antonio Maruri Jiménez

    2015-01-01

    The last June 18, 2008 the Decree amending Articles 16, 17, 18, 19, 20, 21, 22 are amended was published; (the fractions) XXI and XXIII of Article 73, Section VII of Article 115 and section XIII paragraph B of Article 123 of the Constitution of the United Mexican States, giving rise to the Constitutional reform of criminal justice, emerging as basic expectations: total transformation of the criminal justice system; effectively guarantee the validity of the “due process” in criminal matters re...

  4. Adjuncts or adversaries to shared decision-making? Applying the Integrative Model of behavior to the role and design of decision support interventions in healthcare interactions

    Directory of Open Access Journals (Sweden)

    Fishbein Martin

    2009-11-01

    Full Text Available Abstract Background A growing body of literature documents the efficacy of decision support interventions (DESI in helping patients make informed clinical decisions. DESIs are frequently described as an adjunct to shared decision-making between a patient and healthcare provider, however little is known about the effects of DESIs on patients' interactional behaviors-whether or not they promote the involvement of patients in decisions. Discussion Shared decision-making requires not only a cognitive understanding of the medical problem and deliberation about the potential options to address it, but also a number of communicative behaviors that the patient and physician need to engage in to reach the goal of making a shared decision. Theoretical models of behavior can guide both the identification of constructs that will predict the performance or non-performance of specific behaviors relevant to shared decision-making, as well as inform the development of interventions to promote these specific behaviors. We describe how Fishbein's Integrative Model (IM of behavior can be applied to the development and evaluation of DESIs. There are several ways in which the IM could be used in research on the behavioral effects of DESIs. An investigator could measure the effects of an intervention on the central constructs of the IM - attitudes, normative pressure, self-efficacy, and intentions related to communication behaviors relevant to shared decision-making. However, if one were interested in the determinants of these domains, formative qualitative research would be necessary to elicit the salient beliefs underlying each of the central constructs. Formative research can help identify potential targets for a theory-based intervention to maximize the likelihood that it will influence the behavior of interest or to develop a more fine-grained understanding of intervention effects. Summary Behavioral theory can guide the development and evaluation of DESIs to increase the likelihood that these will prepare patients to play a more active role in the decision-making process. Self-reported behavioral measures can reduce the measurement burden for investigators and create a standardized method for examining and reporting the determinants of communication behaviors necessary for shared decision-making.

  5. Adjuncts or adversaries to shared decision-making? Applying the Integrative Model of behavior to the role and design of decision support interventions in healthcare interactions.

    NARCIS (Netherlands)

    Frosch, D.; Legare, F.; Fishbein, M.; Elwyn, G.

    2009-01-01

    ABSTRACT: BACKGROUND: A growing body of literature documents the efficacy of decision support interventions (DESI) in helping patients make informed clinical decisions. DESIs are frequently described as an adjunct to shared decision-making between a patient and healthcare provider, however little is

  6. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries

    International Nuclear Information System (INIS)

    In this paper we present a multi-modal security-transportation model to allocate security resources within a chemical supply chain which is characterized by the use of different transport modes, each having their own security features. We consider security-related risks so as to take measures against terrorist acts which could target critical transportation systems. The idea of addressing security-related issues, by supporting decisions for preventing or mitigating intentional acts on transportation infrastructure, has gained attention in academic research only recently. The decision model presented in this paper is based on game theory and it can be employed to organize intelligence capabilities aimed at securing chemical supply chains. It enables detection and warning against impending attacks on transportation infrastructures and the subsequent adoption of security countermeasures. This is of extreme importance for preventing terrorist attacks and for avoiding (possibly huge) human and economic losses. In our work we also provide data sources and numerical simulations by applying the proposed model to a illustrative multi-modal chemical supply chain. - Highlights: • A model to increase the security in a multimodal chemical supply chain is proposed. • The model considers adaptive opponents having multi-attribute utility functions. • The model is based on game theory using an attacker–defender schema. • The model provides recommendations about where to allocate security measures. • Numerical simulations on a sample multimodal chemical supply chain are shown

  7. Plea Bargaining: A Trojan Horse of The Adversarial System?%辩诉交易:对抗制的"特洛伊木马"?

    Institute of Scientific and Technical Information of China (English)

    魏晓娜

    2011-01-01

    @@ 一、问题的提出 近年来,人们惊讶地发现:辩诉交易,这一具有强烈"美国"符号的制度,不知从何时起,已经"暗度陈仓",悄然在欧洲大陆和一些拉美国家开枝散叶.[1

  8. Unexpected Turns: The Aesthetic, the Pathetic and the Adversarial in the Long Durée of Art’s Histories

    Directory of Open Access Journals (Sweden)

    Griselda Pollock

    2012-12-01

    Full Text Available In a conference organized at the University of Birmingham in 2012, I was invited to reflect upon the current situation in Art History that is posited as being ‘After the New Art History’. What is this after-ness? Succession? Supersession? Replacement? Exhaustion? Erasure? Fashionability? Dare we ask what kind of ‘killing’ of the past or of Oedipal Feminist Mothers and Marxists Fathers is going on here? Or does this indicate simply that we need new directions in our discipline just to keep it alive? There is certainly a feeling around that we are in a period of transition. Former certainties about the tendencies within the discipline of art history have melted. Is this a sign of our condition as Liquid Modernity? There is a risk, however, of casting the recent past as being ‘over’, to be viewed nostalgically, or gratefully cast into the dustbin of has-been histories so that we can get back to business as normal or find new pastures exciting because they are different. Before I acquiesce to such a trend for newness per se, I want to reconsider what is being said to have come before and now is defined as being over. To do so, I shall argue for an understanding of the long-term nature of any one intervention seeking radically to change the ways we study art and the image, past and present. Equally, I suggest that such long-term projects are themselves subject to historical change, shifting in sensitive response to altered conditions and changed priorities, but also registering their own effects and opening new avenues of analysis. Finally this article performs a reading of the call for papers for the conference in order to tease out critical misrepresentations of the past that we are now supposed to come after. Displacing the model of old and new with notions of parallel trajectories and multiple settlements in the expanding, historically shifting but also deeply structured ‘landscape’ of the discipline, I propose as less phallic model of a field with many threads contributing to its complex engagements with art, with visuality, with subjectivity and with their forms of material and symbolic interaction.

  9. 中国男篮潜在对手斯洛文尼亚队的得分能力研究%Score Capability' s Analysis of Siovenia, the Potential Adversaries about Chinese Men's Basketball

    Institute of Scientific and Technical Information of China (English)

    牛小犇

    2011-01-01

    作为中国男篮的潜在对手,对参加第35届欧洲男子篮球锦标赛的斯洛文尼亚队进行的全部9场比赛所涉及到得分的技术指标进行数据统计与分析,研究该球队的得分特点及规律.得出该队是以内线进攻为主,球队进入状态较快,首先选择中路进攻,其次是右区,最后是左区;投篮方式主要接球直接投篮和低位背向篮的进攻.%Attending the complete 9 competitions which 35th session of European man basketball championship tournament's Slovenian team,the research is to study the score technical specification on the data statistics and the analysis,and this team ' s score characteristic and the rule. This team is by the inside connection attack primarily. The team enters the condition to be quick, first chooses the middle of the mill attack, next is the right area, finally is the left area. Short distance shooting mainly concentrates under the basket 13 and 14 areas; long-distance range shooting mainly concentrates in 2 areas, 3 areas and 4 areas; The shooting way mainly catches a ball direct shooting and the low position dislikes basket's attack.

  10. Secure and self-stabilizing clock synchronization in sensor networks

    NARCIS (Netherlands)

    Hoepman, J.H.; Larsson, A.; Schiller, E.M.; Tsigas, P.

    2007-01-01

    In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews. We consider an adversary that aims at tampering with the clock synchronization by intercepting messages, replaying intercepted messages (after the adversary's choice of delay), and capturing no

  11. Rate-Distortion Theory for Secrecy Systems

    OpenAIRE

    Schieler, Curt; Cuff, Paul

    2013-01-01

    Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary. A model is considered in which an adversary not only intercepts the communication from the transmitter to the receiver, but also potentially has side information. Specifically, the adversary may have causal or noncausal access to a signal that is correlated with the source s...

  12. 英美证据法的程序性解构——以陪审团和对抗制为主线%Discussion on Procedure Aspect of Anglo-American Evidence Law--Focusing on Jury and Adversary system.

    Institute of Scientific and Technical Information of China (English)

    吴洪淇

    2012-01-01

    The Evidence Puzzle is not only the motivation of the theory development of Anglo-American evidence law, but also one key thread to understand the evolution of the evidence law. From the aspect of proce- dure, the jury-control model and advocate-control model are two answers to the Puzzle. The pectination and anal- ysis of these two models can help to uncover the multifarious procedural factors of Anglo-American evidence law and their mechanism to run. That will make the foundation for the legislation and academic research of evidence law in China.%证据法之谜是英美证据法学界理论发展的重要源动力,也是理解英美证据法制度演进的一条重要线索。对证据法之谜的解释在程序性层面主要有陪审团控制模式和对抗制控制模式两种命题。通过对两个解释性命题的梳理与解析,可以展现出英美证据法的多元程序性要素及其内在运作的机理,从而为我国的证据立法与证据法学研究提供重要的启示。

  13. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom...

  14. Information Theoretic-Learning Auto-Encoder

    OpenAIRE

    Santana, Eder; Emigh, Matthew; Principe, Jose C.

    2016-01-01

    We propose Information Theoretic-Learning (ITL) divergence measures for variational regularization of neural networks. We also explore ITL-regularized autoencoders as an alternative to variational autoencoding bayes, adversarial autoencoders and generative adversarial networks for randomly generating sample data without explicitly defining a partition function. This paper also formalizes, generative moment matching networks under the ITL framework.

  15. Estado e mercado: adversários ou aliados no processo de implementação da Política Nacional de Alimentação e Nutrição? Elementos para um debate sobre medidas de regulamentação State and market: adversaries or allies in the implementation of the National Food and Nutrition Policy? Some reflections on regulation measures

    Directory of Open Access Journals (Sweden)

    Anelise Rizzolo de Oliveira Pinheiro

    2008-06-01

    Full Text Available A alimentação e a nutrição constituem requisitos básicos para a promoção e a proteção da saúde, possibilitando a afirmação plena do potencial de crescimento e desenvolvimento humano, com qualidade de vida e cidadania. As mudanças na relação do Estado, sociedade civil e mercado têm trazido uma série de conseqüências sociais adversas, especialmente no campo da saúde e nutrição. Este artigo tem como propósito provocar algumas reflexões relativas à necessidade de pactuação entre Estado, sociedade e mercado para a efetivação de medidas capazes de atuar positivamente no controle da obesidade e conseqüentemente melhorar as condições de saúde e nutrição da população brasileira. Apresenta uma breve descrição de contexto histórico sobre política social no Brasil e seus reflexos específicos na temática de alimentação e nutrição; identifica aspectos políticos principais para uma análise das diretrizes da Política Nacional de Alimentação e Nutrição; destaca o fortalecimento de medidas de regulamentação como estratégia de enfrentamento do problema de excesso de peso / obesidade na sociedade, identificando suas raízes a partir do modo de viver urbano, globalizado e neoliberal das ultimas décadas, e, por fim, sugere elementos para enriquecer esse debate. Medidas de regulamentação parecem poder influenciar positivamente nas ações de promoção da saúde, pois estabelecem limites e um conjunto de critérios para mediar as relações entre sociedade e mercado, além de refletir o apoio e a proteção da saúde do cidadão como objetivo principal do Estado nesse processo.Food and nutrition constitute basic requirements for health promotion and protection, enabling the full expression of the human potential for growth and development, with quality of life and citizenship. Changes in the relationship between State, Civil Society, and the Market have brought several adverse social consequences, particularly in the health and nutrition field. This article intends to stimulate some reflections related to the need of an agreement between State, Civil Society and the Market for the accomplishment of measures that are able to contribute to obesity control and, as a consequence, to improve health and nutrition conditions of the Brazilian population. The article also presents a brief description of the historical context of social policies in Brazil and their specific consequences to food and nutrition matters; it identifies the main political aspects to analyze guidelines of the National Food and Nutrition Policy; it emphasizes the strengthening of regulation measures as a strategy to face the problem of excess of weight / obesity in society, identifying its roots in the urban, 'global' and neoliberal way of life of the last decades and, as a conclusion, it suggests more elements to enrich this debate. Regulation Measures seem to have a positive influence on health promotion actions by setting up the boundaries and criteria to mediate the relationship between Civil Society and the Market, besides reflecting the support and protection of the citizen's health as the main purpose of the State in this process.

  16. Actively Secure Two-Party Evaluation of Any Quantum Operation

    DEFF Research Database (Denmark)

    Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis

    2012-01-01

    We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map , given as a quantum circuit, upon their joint quantum input state . Our protocol leaks no more to any active adversary than an ideal ...... functionality for provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [4]....

  17. Material control system simulator program reference manual

    Energy Technology Data Exchange (ETDEWEB)

    Hollstien, R.B.

    1978-01-24

    A description is presented of a Material Control System Simulator (MCSS) program for determination of material accounting uncertainty and system response to particular adversary action sequences that constitute plausible material diversion attempts. The program is intended for use in situations where randomness, uncertainty, or interaction of adversary actions and material control system components make it difficult to assess safeguards effectiveness against particular material diversion attempts. Although MCSS may be used independently in the design or analysis of material handling and processing systems, it has been tailored toward the determination of material accountability and the response of material control systems to adversary action sequences.

  18. Prospects for improved detection of chemical, biological, radiological, and nuclear threats

    Energy Technology Data Exchange (ETDEWEB)

    Wuest, Craig R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hart, Brad [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Slezak, Thomas R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2012-07-31

    Acquisition and use of Chemical, Biological, Radiological, and Nuclear (CBRN) weapons continue to be a major focus of concern form the security apparatus of nation states because of their potential for mass casualties when used by a determined adversary.

  19. Probabilistic Analysis of Onion Routing in a Black-box Model

    CERN Document Server

    Feigenbaum, Joan; Syverson, Paul

    2011-01-01

    We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication in the Universally Composable framework that abstracts the essential properties of onion routing in the presence of an active adversary that controls a portion of the network and knows all a priori distributions on user choices of destination. Our results quantify how much the adversary can gain in identifying users by exploiting knowledge of their probabilistic behavior. In particular, we show that, in the limit as the network gets large, a user u's anonymity is worst either when the other users always choose the destination u is least likely to visit or when the other users always choose the destination u chooses. This worst-case anonymity with an adversary that controls a fraction b of the routers is shown to be comparable to the best-case anonymity against an adversary that controls a fraction \\surdb.

  20. From Passive to Covert Security at Low Cost

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Geisler, Martin; Nielsen, Jesper Buus

    2010-01-01

    Aumann and Lindell defined security against covert attacks, where the adversary is malicious, but is only caught cheating with a certain probability. The idea is that in many real-world cases, a large probability of being caught is sufficient to prevent the adversary from trying to cheat. In this......Aumann and Lindell defined security against covert attacks, where the adversary is malicious, but is only caught cheating with a certain probability. The idea is that in many real-world cases, a large probability of being caught is sufficient to prevent the adversary from trying to cheat....... In this paper, we show how to compile a passively secure protocol for honest majority into one that is secure against covert attacks, again for honest majority and catches cheating with probability 1/4. The cost of the modified protocol is essentially twice that of the original plus an overhead that only...

  1. LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Krontiris, Ioannis; Dimitriou, Tassos

    2008-01-01

    Wireless sensor networks are vulnerable to adversaries as they are frequently deployed in open and unattended environments. Preventive mechanisms can be applied to protect them from an assortment of attacks. However, more sophisticated methods, like intrusion detection systems, are needed...

  2. 76 FR 43662 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2011-07-21

    ... hardware upon which the software has been installed. 3. If a technologically advanced adversary were to obtain knowledge of the specific hardware and software elements, the information could be used to...

  3. 15 CFR 310.4 - Action on application.

    Science.gov (United States)

    2010-01-01

    .... (3) The relative merit of the applications in terms of their qualifications as tourism destination..., that the hearing is not adversary in nature and that the sole objective thereof is to clarify...

  4. 13 CFR 134.618 - How are awards paid?

    Science.gov (United States)

    2010-01-01

    ... CASES BEFORE THE OFFICE OF HEARINGS AND APPEALS Implementation of the Equal Access to Justice Act § 134... the adversary adjudication, or of the award, to the following address: Chief Financial Officer,...

  5. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  6. Comparison of ICM with TPF-LEP to Prevent MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network

    OpenAIRE

    Durairaj, M; A. Persia

    2014-01-01

    A Comparison of Integrated Central Manager (ICM) and Traffic Pattern Filtering with Letter Envelop Protocol (TPF-LEP) is done. Denial of Service (DoS) attack is a biggest peril in wireless local area infrastructure network. It makes the resources unavailable for intended users which transpired through spoofing legitimate Client/AP's Medium Access Control (MAC) address. MAC address are easily caricatured by the adversary clients, subsequently they are not encrypted. Since, the adversary sends ...

  7. Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI

    OpenAIRE

    Li, SJ; Shum, HY

    2005-01-01

    It is an interesting problem how a human can prove its identity to a trustworthy (local or remote) computer with untrustworthy input devices and via an insecure channel controlled by adversaries. Any input devices and auxiliary devices are untrustworthy under the following assumptions: the adversaries can record humans' operations on the devices, and can access the devices to replay the recorded operations. Strictly, only the common brain intelligence is available for the human. In this paper...

  8. Video Transmission in Tactical Cognitive Radio Networks Under Disruptive Attacks

    OpenAIRE

    Soysa, Madushanka Dinesh

    2015-01-01

    In this dissertation, I examine the performance of a cognitive radio (CR) system in a hostile environment where an intelligent adversary tries to disrupt communications with a Gaussian noise signal. I analyze a cluster-based network of secondary users (SUs). The adversary can limit access for SUs by either transmitting a spoofing signal in the sensing interval, or a desynchronizing signal in the code acquisition interval. By jamming the network during the transmission interval, the adversar...

  9. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    OpenAIRE

    Ashraf Al Sharah; Taiwo Oyedare; Sachin Shetty

    2016-01-01

    Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and m...

  10. Adaptive versus Non-Adaptive Security of Multi-Party Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan;

    2004-01-01

    Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of computation....

  11. Public-Key Cryptography

    OpenAIRE

    Lint, van, JH

    2003-01-01

    Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For most security properties, it is computational security that has to be considered: an attack scenario describes how adversaries interact with the cryptosystem, trying to attack it; the system can be called secure if adversaries with reasonably bounded computational means have negligible prospects of success. The lack of computational problems that are guaranteed to be hard in an appropriate sen...

  12. Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    OpenAIRE

    Nyagudi, Nyagudi Musandu

    2013-01-01

    Nations are today challenged with multiple constraints such as declining population and financial austerity, these inevitably reduce military/security forces preparedness. Faced with well resourced adversaries or those of the asymmetric type, only a Nation that arms itself "intelligently" and fights "smart" attains advantages in the world's ever more complex and restrictive battle-spaces. Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that...

  13. Material control system simulator user's manual

    Energy Technology Data Exchange (ETDEWEB)

    Hollstien, R.B.

    1978-01-24

    This report describes the use of a Material Control System Simulator (MCSS) program for determination of material accounting uncertainty and system response to particular adversary action sequences that constitute plausible material diversion attempts. The program is intended for use in situations where randomness, uncertainty, or interaction of adversary actions and material control system components make it difficult to assess safeguards effectiveness against particular material diversion attempts.

  14. DEX: self-healing expanders

    OpenAIRE

    Pandurangan, Gopal; Robinson, Peter,; Trehan, Amitabh

    2016-01-01

    We present a fully-distributed self-healing algorithm dex that maintains a constant degree expander network in a dynamic setting. To the best of our knowledge, our algorithm provides the first efficient distributed construction of expanders—whose expansion properties holddeterministically—that works even under an all-powerful adaptive adversary that controls the dynamic changes to the network (the adversary has unlimited computational power and knowledge of the entire network state, can decid...

  15. DEX: self-healing expanders

    OpenAIRE

    Pandurangan, Gopal; Robinson, Peter,; Trehan, Amitabh

    2015-01-01

    We present a fully-distributed self-healing algorithm DEX, that maintains a constant degree expander network in a dynamic setting. To the best of our knowledge, our algorithm provides the first efficient distributed construction of expanders --- whose expansion properties hold {\\em deterministically} --- that works even under an all-powerful adaptive adversary that controls the dynamic changes to the network (the adversary has unlimited computational power and knowledge of the entire network ...

  16. Material control system simulator user's manual

    International Nuclear Information System (INIS)

    This report describes the use of a Material Control System Simulator (MCSS) program for determination of material accounting uncertainty and system response to particular adversary action sequences that constitute plausible material diversion attempts. The program is intended for use in situations where randomness, uncertainty, or interaction of adversary actions and material control system components make it difficult to assess safeguards effectiveness against particular material diversion attempts

  17. Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU

    OpenAIRE

    Zhou, Zhe; Diao, Wenrui; Liu, Xiangyu; Li, Zhou; Zhang, Kehuan; Liu, Rui

    2016-01-01

    In this paper, we present that security threats coming with existing GPU memory management strategy are overlooked, which opens a back door for adversaries to freely break the memory isolation: they enable adversaries without any privilege in a computer to recover the raw memory data left by previous processes directly. More importantly, such attacks can work on not only normal multi-user operating systems, but also cloud computing platforms. To demonstrate the seriousness of such attacks, we...

  18. Optimal space-time attacks on system state estimation under a sparsity constraint

    Science.gov (United States)

    Lu, Jingyang; Niu, Ruixin; Han, Puxiao

    2016-05-01

    System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.

  19. Structure for the decomposition of safeguards responsibilities

    International Nuclear Information System (INIS)

    A major mission of safeguards is to protect against the use of nuclear materials by adversaries to harm society. A hierarchical structure of safeguards responsibilities and activities to assist in this mission is defined. The structure begins with the definition of international or multi-national safeguards and continues through domestic, regional, and facility safeguards. The facility safeguards is decomposed into physical protection and material control responsibilities. In addition, in-transit safeguards systems are considered. An approach to the definition of performance measures for a set of Generic Adversary Action Sequence Segments (GAASS) is illustrated. These GAASS's begin outside facility boundaries and terminate at some adversary objective which could lead to eventual safeguards risks and societal harm. Societal harm is primarily the result of an adversary who is successful in the theft of special nuclear material or in the sabotage of vital systems which results in the release of material in situ. With the facility safeguards system, GAASS's are defined in terms of authorized and unauthorized adversary access to materials and components, acquisition of material, unauthorized removal of material, and the compromise of vital components. Each GAASS defines a set of ''paths'' (ordered set of physical protection components) and each component provides one or more physical protection ''functions'' (detection, assessment, communication, delay, neutralization). Functional performance is then developed based upon component design features, the environmental factors, and the adversary attributes. An example of this decomposition is presented

  20. On deception detection in multi-agent systems and deception intent

    Science.gov (United States)

    Santos, Eugene, Jr.; Li, Deqing; Yuan, Xiuqing

    2008-04-01

    Deception detection plays an important role in the military decision-making process, but detecting deception is a challenging task. The deception planning process involves a number of human factors. It is intent-driven where intentions are usually hidden or not easily observable. As a result, in order to detect deception, any adversary model must have the capability to capture the adversary's intent. This paper discusses deception detection in multi-agent systems and in adversary modeling. We examined psychological and cognitive science research on deception and implemented various theories of deception within our approach. First, in multi-agent expert systems, one detection method uses correlations between agents to predict reasonable opinions/responses of other agents (Santos & Johnson, 2004). We further explore this idea and present studies that show the impact of different factors on detection success rate. Second, from adversary modeling, our detection method focuses on inferring adversary intent. By combining deception "branches" with intent inference models, we can estimate an adversary's deceptive activities and at the same time enhance intent inference. Two major kinds of deceptions are developed in this approach in different fashions. Simulative deception attempts to find inconsistency in observables, while dissimulative deception emphasizes the inference of enemy intentions.

  1. The Application of materials attractiveness in a graded approach to nuclear materials security

    Energy Technology Data Exchange (ETDEWEB)

    Ebbinghaus, B. [Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94551 (United States); Bathke, C. [Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545 (United States); Dalton, D.; Murphy, J. [National Nuclear Security Administration, US Department of Energy, 1000 Independent Ave., S. W. Washington, DC 20585 (United States)

    2013-07-01

    The threat from terrorist groups has recently received greater attention. In this paper, material quantity and material attractiveness are addressed through the lens of a minimum security strategy needed to prevent the construction of a nuclear explosive device (NED) by an adversary. Nuclear materials are placed into specific security categories (3 or 4 categories) , which define a number of security requirements to protect the material. Materials attractiveness can be divided into four attractiveness levels, High, Medium, Low, and Very Low that correspond to the utility of the material to the adversary and to a minimum security strategy that is necessary to adequately protect the nuclear material. We propose a graded approach to materials attractiveness that recognizes for instance substantial differences in attractiveness between pure reactor-grade Pu oxide (High attractiveness) and fresh MOX fuel (Low attractiveness). In either case, an adversary's acquisition of a Category I quantity of plutonium would be a major incident, but the acquisition of Pu oxide by the adversary would be substantially worse than the acquisition of fresh MOX fuel because of the substantial differences in the time and complexity required of the adversary to process the material and fashion it into a NED.

  2. Quantum position verification in bounded-attack-frequency model

    Science.gov (United States)

    Gao, Fei; Liu, Bin; Wen, QiaoYan

    2016-11-01

    In 2011, Buhrman et al. proved that it is impossible to design an unconditionally secure quantum position verification (QPV) protocol if the adversaries are allowed to previously share unlimited entanglements. Afterwards, people started to design secure QPV protocols in practical settings, e.g. the bounded-storage model, where the adversaries' pre-shared entangled resources are supposed to be limited. Here we focus on another practical factor that it is very difficult for the adversaries to perform attack operations with unlimitedly high frequency. Concretely, we present a new kind of QPV protocols, called non-simultaneous QPV. And we prove the security of a specific non-simultaneous QPV protocol with the assumption that the frequency of the adversaries' attack operations is bounded, but no assumptions on their pre-shared entanglements or quantum storage. Actually, in our nonsimultaneous protocol, the information whether there comes a signal at present time is also a piece of command. It renders the adversaries "blind", that is, they have to execute attack operations with unlimitedly high frequency no matter whether a signal arrives, which implies the non-simultaneous QPV is also secure in the bounded-storage model.

  3. EASI approach to physical security evaluation

    International Nuclear Information System (INIS)

    A simple, easy to use method, called Estimate of Adversary Sequence Interruption (EASI), has been developed to evaluate physical security system performance under specified conditions of threat and system operation. The method consists of a probabilistic analysis of the interactions of basic security functions, such as detection, communications, response, etc. The evaluation can be performed on a hand-held programmable calculator. The results of the analysis are expressed in terms of the probability that the physical protection system can respond in time to interrupt specific adversary action sequences. The following input data is required: (1) Detection probability for each sensor or other means of detection. (2) Probability of communication to response force or other means of response. (3) Mean and standard deviation of response time. (4) Mean and standard deviation of the time to perform each task in the adversary action sequence. The utility of the method depends upon the user's ability to identify significant adversary action sequences and to obtain data which properly reflect conditions created by the adversary action sequence of interest. The objective of the development is to provide a usable evaluation method which could serve as either a physical protection system design aid or as a decision aid in the licensing and inspection process. As such, it is recommended that EASI be utilized on a limited trial basis to provide information on the utility of the method and to clarify user's needs

  4. ON THE OFFENSE: USING CYBER WEAPONS TO INFLUENCE COGNITIVE BEHAVIOR

    Directory of Open Access Journals (Sweden)

    Mary Fendley

    2012-12-01

    Full Text Available There is an increasing recognition that cyber warfare is an important area of development for targeting and weaponeering, with far-reaching effects in national defense and economic security. The ability to conduct effective operations in cyberspace relies on a robust situational awareness of events occurring in both the physical and information domains, with an understanding of how they affect the cognitive domain of friendly, neutral, and adversary population sets. The dynamic nature of the battlefield complicates efforts to understand shifting adversary motivations and intentions. There are very few approaches, to date, that systematically evaluate the effects of the repertoire of cyber weapons on the cognitive, perceptual, and behavioral characteristics of the adversary. In this paper, we describe a software environment called Cognitive Cyber Weapon Selection Tool (CCWST that simulates a scenario involving cyber weaponry.This tool provides the capabilities to test weapons which may induce behavioral state changes in the adversaries. CCWST provides the required situational awareness to the Cyber Information Operations (IO planner to conduct intelligent weapon selection during weapon activation in order to induce the desired behavioral change in the perception of the adversary. Weapons designed to induce the cognitive state changes of deception, distraction, distrust and confusion were then tested empirically to evaluate the capabilities and expected cognitive state changes induced by these weapons. The results demonstrated that CCWST is a powerful environment within which to test and evaluate the impact of cyber weapons on influencing cognitive behavioral states during information processing.

  5. The Application of materials attractiveness in a graded approach to nuclear materials security

    International Nuclear Information System (INIS)

    The threat from terrorist groups has recently received greater attention. In this paper, material quantity and material attractiveness are addressed through the lens of a minimum security strategy needed to prevent the construction of a nuclear explosive device (NED) by an adversary. Nuclear materials are placed into specific security categories (3 or 4 categories) , which define a number of security requirements to protect the material. Materials attractiveness can be divided into four attractiveness levels, High, Medium, Low, and Very Low that correspond to the utility of the material to the adversary and to a minimum security strategy that is necessary to adequately protect the nuclear material. We propose a graded approach to materials attractiveness that recognizes for instance substantial differences in attractiveness between pure reactor-grade Pu oxide (High attractiveness) and fresh MOX fuel (Low attractiveness). In either case, an adversary's acquisition of a Category I quantity of plutonium would be a major incident, but the acquisition of Pu oxide by the adversary would be substantially worse than the acquisition of fresh MOX fuel because of the substantial differences in the time and complexity required of the adversary to process the material and fashion it into a NED

  6. Self-Healing Algorithms for Byzantine Faults

    CERN Document Server

    Knockel, Jeffrey; Saia, Jared

    2012-01-01

    Recent years have seen significant interest in designing networks that are \\emph{self-healing} in the sense that they can automatically recover from adversarial attack. Previous work shows that it is possible for a network to automatically recover, even when an adversary repeatedly deletes nodes in the network. However, there have not yet been any algorithms that self-heal in the case where an adversary \\emph{takes over} nodes in a network. In this paper, we address this gap.% by presenting self-healing algorithms that work in the presence of such an attack. In particular, we show how to maintain an overlay network over $n$ nodes that ensures the following properties, even when an adversary controls up to $t \\leq n/4 $ nodes. First, $O(t (\\log^{*} n)^{2})$ message corruptions occur in expectation, before the adversarially controlled nodes are effectively quarantined so that they cause no more corruptions. Second, the network continually provides point-to-point communication with bandwidth and latency costs th...

  7. (Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks

    CERN Document Server

    Vaya, Shailesh

    2010-01-01

    In secure multi-party computation $n$ parties jointly evaluate an $n$-variate function $f$ in the presence of an adversary which can corrupt up till $t$ parties. Almost all the works that have appeared in the literature so far assume the presence of authenticated channels between the parties. This assumption is far from realistic. Two directions of research have been borne from relaxing this (strong) assumption: (a) The adversary is virtually omnipotent and can control all the communication channels in the network, (b) Only a partially connected topology of authenticated channels is guaranteed and adversary controls a subset of the communication channels in the network. This work introduces a new setting for (unconditional) secure multiparty computation problem which is an interesting intermediate model with respect to the above well studied models from the literature (by sharing a salient feature from both the above models). We consider the problem of (unconditional) secure multi-party computation when 'some...

  8. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.

    Science.gov (United States)

    Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien

    2016-06-01

    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies. PMID:25896029

  9. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.

    Science.gov (United States)

    Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien

    2016-06-01

    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.

  10. Cultural myths and supports for rape.

    Science.gov (United States)

    Burt, M R

    1980-02-01

    This article describes the "rape myth" and tests hypotheses derived from social psychological and feminist theory that acceptance of rape myths can be predicted from attitudes such as sex role stereotyping, adversarial sexual beliefs, sexual conservatism, and acceptance of interpersonal violence. Personality characteristics, background characteristics, and personal exposure to rape, rape victims, and rapists are other factors used in predictions. Results from regression analysis of interview data indicate that the higher the sex role stereotyping, adversarial sexual beliefs, and acceptance of interpersonal violence, the greater a respondent's acceptance of rape myths. In addition, younger and better educated people reveal less stereotypic, adversarial, and proviolence attitudes and less rape myth acceptance. Discussion focuses on the implications of these results for understanding and changing this cultural orientation toward sexual assault. PMID:7373511

  11. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  12. Tamper-Proof Circuits : : How to Trade Leakage for Tamper-Resilience

    DEFF Research Database (Denmark)

    Faust, Sebastian; Pietrzak, Krzysztof; Venturi, Daniele

    2011-01-01

    Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reveal secret information. Inspired by the work of Ishai et al. [Eurocrypt’06], we propose a compiler...... that transforms any circuit into a new circuit with the same functionality, but which is resilient against a well-defined and powerful tampering adversary. More concretely, our transformed circuits remain secure even if the adversary can adaptively tamper with every wire in the circuit as long as the...... tampering fails with some probability δ > 0. This additional requirement is motivated by practical tampering attacks, where it is often difficult to guarantee the success of a specific attack. Formally, we show that a q-query tampering attack against the transformed circuit can be “simulated” with only...

  13. Continuous Non-malleable Codes

    DEFF Research Database (Denmark)

    Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus;

    2014-01-01

    -malleable codes where the adversary only is allowed to tamper a single time with an encoding. We show how to construct continuous non-malleable codes in the common split-state model where an encoding consist of two parts and the tampering can be arbitrary but has to be independent with both parts. Our main......Non-malleable codes are a natural relaxation of error correcting/ detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged...... or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the standard non-malleability security notion - so-called continuous non-malleability - where we allow the adversary to tamper continuously with an encoding. This is in contrast to the standard notion of non...

  14. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  15. Multiparty Computations

    DEFF Research Database (Denmark)

    Dziembowski, Stefan

    In this thesis we study a problem of doing Verifiable Secret Sharing (VSS) and Multiparty Computations in a model where private channels between the players and a broadcast channel is available. The adversary is active, adaptive and has an unbounded computing power. The thesis is based on two...... an impossibility result indicating that a similar equivalence does not hold for Multiparty Computation (MPC): we show that even if protocols are given black-box access for free to an idealized secret sharing scheme secure for the access structure in question, it is not possible to handle all relevant access...... adversary structure. We propose new VSS and MPC protocols that are substantially more efficient than the ones previously known. Another contribution of [2] is an attack against a Weak Secret Sharing Protocol (WSS) of [3]. The attack exploits the fact that the adversary is adaptive. We present this attack...

  16. AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming

    CERN Document Server

    Richa, Andrea; Schmid, Stefan; Zhang, Jin

    2010-01-01

    Intentional interference constitutes a major threat for communication networks operating over a shared medium and where availability is imperative. Jamming attacks are often simple and cheap to implement. In particular, today's jammers can perform physical carrier sensing in order to disrupt communication more efficiently, specially in a network of simple wireless devices such as sensor nodes, which usually operate over a single frequency (or a limited frequency band) and which cannot benefit from the use of spread spectrum or other more advanced technologies. This paper proposes the medium access (MAC) protocol \\textsc{AntiJam} that is provably robust against a powerful reactive adversary who can jam a $(1-\\epsilon)$-portion of the time steps, where $\\epsilon$ is an arbitrary constant. The adversary uses carrier sensing to make informed decisions on when it is most harmful to disrupt communications; moreover, we allow the adversary to be adaptive and to have complete knowledge of the entire protocol history....

  17. Device-independence for two-party cryptography and position verification

    DEFF Research Database (Denmark)

    Ribeiro, Jeremy; Thinh, Le Phuc; Kaniewski, Jedrzej;

    Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position......-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which...... security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we give device-independent security proofs of two-party cryptography and Position Verification for memoryless devices under different physical constraints on the adversary...

  18. Performance estimates for personnel access control systems

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, R. G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  19. Path enumeration program (ENUMPTH) for physical protection effectiveness evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Hall, R.C.

    1978-10-01

    Descriptions are presented of the structure and of ENUMPTH, a program for enumerating paths which an adversary might follow in attempting defeat of physical protection systems. The paths are evaluated in terms of the probability of detecting and then interrupting the adversary as the paths are traversed. The program is intended to be practical in orientation, selecting all paths which meet some specified minimum criteria. The nature of the physical protection issue suggests that all such paths may be of equal interest to analysts who are concerned with a total facility. An example is given to demonstrate the program's applicability to practical problems.

  20. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

    Science.gov (United States)

    Kim, Chong Hee; Avoine, Gildas

    RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack.

  1. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyonam; Kim, So Young; Yim, Mansung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Schneider, Erich [Univ. of Texas at Austin, Texas (United States)

    2014-05-15

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  2. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  3. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    International Nuclear Information System (INIS)

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  4. Security of the AES with a Secret S-Box

    DEFF Research Database (Denmark)

    Tiessen, Tyge; Knudsen, Lars Ramkilde; Kölbl, Stefan;

    2015-01-01

    How does the security of the AES change when the S-box is replaced by a secret S-box, about which the adversary has no knowledge? Would it be safe to reduce the number of encryption rounds? In this paper, we demonstrate attacks based on integral cryptanalysis which allow to recover both the secret...... key and the secret S-box for respectively four, five, and six rounds of the AES. Despite the significantly larger amount of secret information which an adversary needs to recover, the attacks are very efficient with time/data complexities of 217/216, 238/240 and 290/264, respectively. Another...

  5. Server-Aided Two-Party Computation with Simultaneous Corruption

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Damgård, Ivan Bjerre; Ranellucci, Samuel

    We consider secure two-party computation in the client-server model where there are two adversaries that operate separately but simultaneously, each of them corrupting one of the parties and a restricted subset of servers that they interact with. We model security via the local universal composab......We consider secure two-party computation in the client-server model where there are two adversaries that operate separately but simultaneously, each of them corrupting one of the parties and a restricted subset of servers that they interact with. We model security via the local universal...

  6. Efficient, Robust and Constant-Round Distributed RSA Key Generation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe

    2010-01-01

    We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number.......We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number....

  7. Vehicle barrier with access delay

    Science.gov (United States)

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  8. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  9. Interactive animation of fault-tolerant parallel algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Apgar, S.W.

    1992-02-01

    Animation of algorithms makes understanding them intuitively easier. This paper describes the software tool Raft (Robust Animator of Fault Tolerant Algorithms). The Raft system allows the user to animate a number of parallel algorithms which achieve fault tolerant execution. In particular, we use it to illustrate the key Write-All problem. It has an extensive user-interface which allows a choice of the number of processors, the number of elements in the Write-All array, and the adversary to control the processor failures. The novelty of the system is that the interface allows the user to create new on-line adversaries as the algorithm executes.

  10. 78 FR 59719 - Notice of Lodging of Proposed Settlement Agreement Under The Comprehensive Environmental Response...

    Science.gov (United States)

    2013-09-27

    ..., Compensation, and Liability Act On September 24, 2013, the Department of Justice lodged a proposed Settlement..., Compensation, and Liability Act (``CERCLA''), 42 U.S.C. 9607. Under the Settlement Agreement, the Apco... prejudice its adversary proceeding against the General Services Administration in connection with the...

  11. Secure Identification and QKD in the Bounded-Quantum-Storage Model

    NARCIS (Netherlands)

    Damgard, I.B.; Fehr, S.; Salvail, L.; Schaffner, C.

    2014-01-01

    We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w as possible - the adversary can exclude at most one possible password for each execution. We propose a solution in the b

  12. Literacy Teaching Method and Peace Building in Multi-Ethnic Communities of Nigeria

    Science.gov (United States)

    Adelore, Omobola; Majaro-Majesty, Henry

    2008-01-01

    The challenge of peace building in Nigeria is increasing as communities continue to show adversary tendencies. This is happening even after many third party conflict transformation efforts have been expended to resolve and set a conducive climate for stakeholders to sustain peace. Some peace building assessment projects have indicated that the…

  13. Physical Protection System Design Analysis against Insider Threat based on Game Theoretic Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyo-Nam; Suh, Young-A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of); Schneider, Erich [The University of Texas, Austin (United States)

    2015-05-15

    This study explores the use of game-theoretic modeling of physical protection analysis by incorporating the implications of an insider threat. The defender-adversary interaction along with the inclusion of an insider is demonstrated using a simplified test case problem at an experimental fast reactor system. Non-detection probability and travel time are used as a baseline of physical protection parameters in this model. As one of the key features of the model is its ability to choose among security upgrades given the constraints of a budget, the study also performed cost benefit analysis for security upgrades options. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three types of adversary paths assisted by the insider and derived the largest insider threat in terms of the budget for security upgrades. More work needs to be done to incorporate complex dimensions of insider threats, which include but are not limited to: a more realistic mapping of insider threat, accounting for information asymmetry between the adversary, insider, and defenders, and assignment of more pragmatic parameter values.

  14. Arvustused / Ahto-Lembit Lehtmets

    Index Scriptorium Estoniae

    Lehtmets, Ahto-Lembit

    2006-01-01

    Heliplaatidest: Satyricon "Now, Diabolica", Nitrous "Dominant Force", Ihsahn "Adversary", Keep Of Kalessin "Armada", Zyklon "Disintegrate", Enslaved "Ruun", Lacuna Coil "Karmacode", Sick Of It All "Death To Tyrants", Cult Of Luna "Somewhere Along the Highway", Scent Of Flesh "Become Malignity EP", Mythological Cold Towers "The Vanished Pantheon", Kalmah "The Black Waltz", Neglected Fields "Splenetic"

  15. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  16. Generic physical protection logic trees

    International Nuclear Information System (INIS)

    Generic physical protection logic trees, designed for application to nuclear facilities and materials, are presented together with a method of qualitative evaluation of the trees for design and analysis of physical protection systems. One or more defense zones are defined where adversaries interact with the physical protection system. Logic trees that are needed to describe the possible scenarios within a defense zone are selected. Elements of a postulated or existing physical protection system are tagged to the primary events of the logic tree. The likelihood of adversary success in overcoming these elements is evaluated on a binary, yes/no basis. The effect of these evaluations is propagated through the logic of each tree to determine whether the adversary is likely to accomplish the end event of the tree. The physical protection system must be highly likely to overcome the adversary before he accomplishes his objective. The evaluation must be conducted for all significant states of the site. Deficiencies uncovered become inputs to redesign and further analysis, closing the loop on the design/analysis cycle

  17. Optimal Resilient Dynamic Dictionaries

    DEFF Research Database (Denmark)

    Jørgensen, Allan Grønlund; Brodal, Gerth Stølting; Moruz, Gabriel;

    2007-01-01

    We investigate the problem of computing in the presence of faults that may arbitrarily (i.e., adversarially) corrupt memory locations. In the faulty memory model, any memory cell can get corrupted at any time, and corrupted cells cannot be distinguished from uncorrupted ones. An upper bound $\\del...

  18. How to work through the news media

    International Nuclear Information System (INIS)

    There are essentially four steps that anyone must follow if the objective is to communicate a message through the news media: 1) Understand media (adversarial relationship, code of ethics, importance of First Amendment); 2) Redefine the relationship (become acquainted with reporter, save steps for the reporter); 3) Communicate clearly; and 4) Use alternatives when appropriate. These four steps are discussed

  19. The Danger of Economic Nationalism

    Institute of Scientific and Technical Information of China (English)

    JAMES; A.DORN

    2008-01-01

    The United States should treat China as a normal rising power,not a probable adversary Unlike special interest groups that are harmed by trade, no one represents future generations who will have a lower standard of living because of present government profligacy

  20. Relationships between Exposure to Rap Music Videos and Attitudes toward Relationships among African American Youth

    Science.gov (United States)

    Bryant, Yaphet

    2008-01-01

    The purpose of the study is to (a) predict adversarial attitudes toward male-female relationships and (b) explore the relationships between traditional agents of socialization and personal acceptance of negative images in rap videos by African American adolescents. Participants completed psychosocial measures, viewed videos, and completed surveys…

  1. 15 CFR Supplement No. 1 to Part 766 - Guidance on Charging and Penalty Determinations in Settlement of Administrative Enforcement Cases

    Science.gov (United States)

    2010-01-01

    ... Act of 1990 (28 U.S.C. 2461, note (2000)), which are codified at 15 CFR 6.4. B. Denial of export... settlement on the eve of an adversary hearing under § 766.13 are fewer, insofar as BIS has already expended... based on nuclear, biological, and chemical weapon proliferation, missile technology proliferation,...

  2. Intelligent agents for training on-board fire fighting

    NARCIS (Netherlands)

    Bosch, K. van den; Harbers, M.; Heuvelink, A.; Doesburg, W. van

    2009-01-01

    Simulation-based training in complex decision making often requires ample personnel for playing various roles (e.g. team mates, adversaries). Using intelligent agents may diminish the need for staff. However, to achieve goal-directed training, events in the simulation as well as the behavior of key

  3. The source coding game with a cheating switcher

    CERN Document Server

    Palaiyanur, Hari; Sahai, Anant

    2007-01-01

    Motivated by the lossy compression of an active-vision video stream, we consider the problem of finding the rate-distortion function of an arbitrarily varying source (AVS) composed of a finite number of subsources with known distributions. Berger's paper `The Source Coding Game', \\emph{IEEE Trans. Inform. Theory}, 1971, solves this problem under the condition that the adversary is allowed only strictly causal access to the subsource realizations. We consider the case when the adversary has access to the subsource realizations non-causally. Using the type-covering lemma, this new rate-distortion function is determined to be the maximum of the IID rate-distortion function over a set of source distributions attainable by the adversary. We then extend the results to allow for partial or noisy observations of subsource realizations. We further explore the model by attempting to find the rate-distortion function when the adversary is actually helpful. Finally, a bound is developed on the uniform continuity of the I...

  4. 29 CFR 18.101 - Scope.

    Science.gov (United States)

    2010-07-01

    ... ADMINISTRATIVE LAW JUDGES Rules of Evidence § 18.101 Scope. These rules govern formal adversarial adjudications... rules as the judge, means an Administrative Law Judge, an agency head, or other officer who presides at the reception of evidence at a hearing in such an adjudication....

  5. Multi-Agent Planning with Planning Graph

    NARCIS (Netherlands)

    Bui, The Duy; Jamroga, Wojciech

    2003-01-01

    In this paper, we consider planning for multi-agents situations in STRIPS-like domains with planning graph. Three possible relationships between agents' goals are considered in order to evaluate plans: the agents may be collaborative, adversarial or indifferent entities. We propose algorithms to dea

  6. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    ” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  7. College Students' Attitudes toward Date Rape and Date Rape Backlash: Implications for Prevention Programs.

    Science.gov (United States)

    Woods, Susan; Bower, Douglas J.

    2001-01-01

    Surveyed college students regarding their acceptance of rape-myth beliefs expounded by the date rape backlash movement. Results indicated that gender, adversarial attitudes toward sexual relationships, political and sex role views, perception of false accusation vulnerability, academic honorary membership, Greek affiliation, and knowledge of a…

  8. User's guide for evaluating physical security capabilities of nuclear facilities by the EASI method

    International Nuclear Information System (INIS)

    This handbook is a guide for evaluating physical security of nuclear facilities using the ''Estimate of Adversary Sequence Interruption (EASI)'' method and a hand-held programmable calculator. The handbook is intended for use by personnel at facilities where special nuclear materials are used, processed, or stored. It may also be used as a design aid for such facilities by potential licensees

  9. Re/Thinking Critical Thinking: The Seductions of Everyday Life.

    Science.gov (United States)

    Alston, Kal

    2001-01-01

    Suggests that both critical thinking and obstacles to successful critical thinking are most commonly found in the activities of everyday life. Argues for a connective criticism approach that does not assume critical means adversarial and acknowledges that critical thinking can be used as a means of opening worlds of meaning. (KS)

  10. Perceptions of the News Media's Societal Roles: How the Views of U.K. Journalism Students Changed during Their Education

    Science.gov (United States)

    Hanna, Mark; Sanders, Karen

    2012-01-01

    A longitudinal study of U.K. journalism undergraduates records how their attitudes on societal roles of the news media changed during university education. Students became more likely to endorse an adversarial approach toward public officials and businesses as extremely important. Yet students did not support these roles as strongly as an older…

  11. 12 CFR 1705.4 - Standards for awards.

    Science.gov (United States)

    2010-01-01

    ... circumstances of the case, unless the party has committed a willful violation of law or otherwise acted in bad... adjudication in which it prevailed, unless the position of OFHEO in the adversary adjudication was... that its position was substantially justified and may do so by showing that its position was...

  12. Principals Versus Teachers: Where Will We Bury the Victims?

    Science.gov (United States)

    Sweeney, Jim

    1980-01-01

    Preliminary findings of a survey of Georgia school principals indicate a serious lack of confidence in teachers, prophesizing conflict, disharmony, and strife as teachers seek increasing autonomy. We need to alter this adversarial relationship between teachers and administrators and to redefine their decision-making roles. (Author/SJL)

  13. Investigating Stories in a Formal Dialogue Game

    NARCIS (Netherlands)

    Bex, F.J.; Prakken, H.; Besnard, P; Doutre, S; Hunter, A

    2008-01-01

    In this paper we propose a formal dialogue game in which two players aim to determine the best explanation for a set of observations. By assuming an adversarial setting, we force the players to advance and improve their own explanations as well as criticize their opponent's explanations, thus hopefu

  14. Development of a statistically based access delay timeline methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Rivera, W. Gary; Robinson, David Gerald; Wyss, Gregory Dane; Hendrickson, Stacey M. Langfitt

    2013-02-01

    The charter for adversarial delay is to hinder access to critical resources through the use of physical systems increasing an adversary's task time. The traditional method for characterizing access delay has been a simple model focused on accumulating times required to complete each task with little regard to uncertainty, complexity, or decreased efficiency associated with multiple sequential tasks or stress. The delay associated with any given barrier or path is further discounted to worst-case, and often unrealistic, times based on a high-level adversary, resulting in a highly conservative calculation of total delay. This leads to delay systems that require significant funding and personnel resources in order to defend against the assumed threat, which for many sites and applications becomes cost prohibitive. A new methodology has been developed that considers the uncertainties inherent in the problem to develop a realistic timeline distribution for a given adversary path. This new methodology incorporates advanced Bayesian statistical theory and methodologies, taking into account small sample size, expert judgment, human factors and threat uncertainty. The result is an algorithm that can calculate a probability distribution function of delay times directly related to system risk. Through further analysis, the access delay analyst or end user can use the results in making informed decisions while weighing benefits against risks, ultimately resulting in greater system effectiveness with lower cost.

  15. Using agent technology to build a real-world training application

    NARCIS (Netherlands)

    Cap, M.; Heuvelink, A.; Bosch, K. van den; Doesburg, W. van

    2011-01-01

    Using staff personnel for playing roles in simulation-based training (e.g. team mates, adversaries) elevates costs, and imposes organizational constraints on delivery of training. One solution to this problem is to use intelligent software agents that play the required roles autonomously. BDI modeli

  16. Cognitive model supported tactical training simulation

    NARCIS (Netherlands)

    Doesburg, W.A. van; Bosch, K. van den

    2005-01-01

    Simulation-based tactical training can be made more effective by using cognitive software agents to play key roles (e.g. team mate, adversaries, instructor). Due to the dynamic and complex nature of military tactics, it is hard to create agents that behave realistically and support the training lead

  17. 49 CFR 1016.105 - Eligibility of applicants.

    Science.gov (United States)

    2010-10-01

    ... unincorporated business, or any partnership, corporation, association, unit of local government, or organization... adversary adjudication was initiated; (3) Any organization described in section 501(c)(3) of the Internal... cooperative association as defined in section 15(a) of the Agricultural Marketing Act (12 U.S.C....

  18. Corporate Social Responsibility: Case Study of Community Expectations and the Administrative Systems, Niger Delta

    Science.gov (United States)

    Ogula, David

    2012-01-01

    Poor community-company relations in the Niger Delta have drawn attention to the practice of corporate social responsibility (CSR) in the region. Since the 1960s, transnational oil corporations operating in the Niger Delta have adopted various CSR strategies, yet community-company relations remain adversarial. This article examines community…

  19. Intelligent agent supported training in virtual simulations

    NARCIS (Netherlands)

    Heuvelink, A.; Bosch, K. van den; Doesburg, W.A. van; Harbers, M.

    2009-01-01

    Simulation-based training in military decision making often requires ample personnel for playing various roles (e.g. team mates, adversaries). Usually humans are used to play these roles to ensure varied behavior required for the training of such tasks. However, there is growing conviction and evide

  20. Secure and self-stabilizing clock synchronization in sensor networks

    NARCIS (Netherlands)

    Hoepman, J.H.; Larsson, A.; Schiller, E.M.; Tsigas, P.

    2011-01-01

    In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews. We consider an adversary that aims at tampering with the clock synchronization by intercepting messages, replaying intercepted messages (after the adversary’s choice of delay), and capturing no

  1. Einstein in love a scientific romance

    CERN Document Server

    Overbye, Dennis

    2000-01-01

    At its height, Einstein's marriage to Mileva was an extraordinary one - a colleague and often fierce adversary, Mileva was brilliantly matched with the scientific genius. Dennis Overbye seeks to present this scientific romance in a vivid light, telling the private story of the young Einstein.

  2. Attorney and Parent Attitudes Related to Successful Mediation Counseling of Child Custody Disputes.

    Science.gov (United States)

    Swenson, Leland C.; Heinish, D.

    The divorce explosion has placed a substantial burden on the judicial system of the United States. About 10 percent of divorce cases involve child custody battles. The adversarial legal process may be contrary to the children's best interest. Custody mediation has been used as an alternative to court litigation. California law requires an attempt…

  3. Views of United States Physicians and Members of the American Medical Association House of Delegates on Physician-assisted Suicide.

    Science.gov (United States)

    Whitney, Simon N.; Brown, Byron W.; Brody, Howard; Alcser, Kirsten H.; Bachman, Jerald G.; Greely, Henry T.

    2001-01-01

    Ascertained the views of physicians and physician leaders toward legalization of physician-assisted suicide. Results indicated members of AMA House of Delegates strongly oppose physician-assisted suicide, but rank-and-file physicians show no consensus either for or against its legalization. Although the debate is adversarial, most physicians are…

  4. A New Approach to Practical Active-Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio;

    2012-01-01

    We propose a new approach to practical two-party computation secure against an active adversary. All prior practical protocols were based on Yao’s garbled circuits. We use an OT-based approach and get efficiency via OT extension in the random oracle model. To get a practical protocol we introduce...

  5. LEGO for Two-Party Secure Computation

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus; Orlandi, Claudio

    2009-01-01

    This paper continues the recent line of work of making Yao’s garbled circuit approach to two-party computation secure against an active adversary. We propose a new cut-and-choose based approach called LEGO (Large Efficient Garbled-circuit Optimization): It is specifically aimed at large circuits...

  6. Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Keller, Marcel; Keller, Enrique;

    2012-01-01

    We describe an implementation of the protocol of Damgård, Pastro, Smart and Zakarias (SPDZ/Speedz) for multi-party computation in the presence of a dishonest majority of active adversaries. We present a number of modifications to the protocol; the first reduces the security to covert security...

  7. 77 FR 35363 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2012-06-13

    ... a technologically advanced adversary were to obtain knowledge of the specific hardware and software... Common Test Device software, ATACMS Quality Assurance Team support, spare and repair parts, tools and... Unitary Missiles, Missile Common Test Device software, ATACMS Quality Assurance Team support, spare...

  8. 77 FR 46415 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2012-08-03

    ... a technologically advanced adversary were to obtain knowledge of the specific hardware and software... Missiles, Missile Common Test Device software, ATACMS Quality Assurance Team support, spare and repair... Unitary Missiles, Missile Common Test Device software, ATACMS Quality Assurance Team support, spare...

  9. The Failure of Legalization in Education: Alternative Dispute Resolution and the Education for All Handicapped Children Act of 1975.

    Science.gov (United States)

    Goldberg, Steven S.

    1989-01-01

    A federal statute provided that parents may use the judicial process to challenge educators' decisions. Describes the intent of legalization; how reaction to an adversarial system led to the use of mediation in most states; and why this alternative model is not appropriate for resolving education questions. (MLF)

  10. The Costs of "Openness"

    Science.gov (United States)

    Cleveland, Harlan

    1975-01-01

    The author argues that very wide consultation tends to discourage innovation and favor stand-pattism and that the very great benefits of openness and wide participation are flawed by apathy and non-participation, by muscle-binding legalisms, by processes which polarize two adversary sides, and by the encouragement of mediocrity. (JT)

  11. External Labeling as a Framework for Access Control

    Science.gov (United States)

    Rozenbroek, Thomas H.

    2012-01-01

    With the ever increasing volume of data existing on and passing through on-line resources together with a growing number of legitimate users of that information and potential adversaries, the need for better security and safeguards is immediate and critical. Currently, most of the security and safeguards afforded on-line information are provided…

  12. The Documentation Process: The Administrator's Role and the Interplay of Necessity, Support and Collaboration

    Science.gov (United States)

    Charlton, Donna; Kritsonis, William Allan

    2008-01-01

    Traditional teacher documentation procedures pit the administrator against the teacher. The process is adversarial and erodes the quality of the intervention. Teachers who are unsuccessful in meeting campus/school district expectations can be successfully acclimatized to the campus culture through a documentation process that combines affective…

  13. Enculturation, Not Alchemy: Professionalizing Novice Writing Program Administrators.

    Science.gov (United States)

    Peters, Bradley

    1998-01-01

    Discusses a process of acculturation in three stages by which fledgling Writing Program Administrators can be transformed into change agents: (1) critically reading the program to locate key allies, potential advocates, and proven adversaries; (2) implementing changes on an infrastructural level to convert positive relations among colleagues into…

  14. The Rhetoric of Redistricting: Ohio's Altered State.

    Science.gov (United States)

    Lucas, David M.

    An event such as congressional boundary redistricting, so ripe with political confrontation, provides a fertile ground for the profuse growth of political rhetoric. The traditional two-party political system, charged by the two well-developed adversarial philosophies, generates a highly charged environment with messages begging for analysis. After…

  15. Theory Z Bargaining Works: Teachers and Administrators in Two School Districts Replace Hostility with Trust.

    Science.gov (United States)

    Pheasant, Marilyn

    1985-01-01

    A bargaining process, begun over 10 years ago, is based on problem-solving rather than on adversarial confrontation and uses elements of participative management. It has resulted in outstanding benefits for two school districts. Called "Theory Z bargaining," the process follows a procedure based on each side treating the other with respect.…

  16. Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET's

    CERN Document Server

    Samara, Ghassan; Al-Salihy, Wafaa A H

    2010-01-01

    Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobile Ad Hoc Networks, in this research we propose a flexible, simple, and scalable design for revocation list distribution in VANET, which will reduce channel overhead and eliminate the use of CRL. Also it will increase the security of the network and helps in identifying the adversary vehicles.

  17. What Conspiracy?

    Science.gov (United States)

    Olson, Gary A.

    2006-01-01

    College professors often speak of power relations within the university setting in adversarial terms, as a matter of "us", meaning the faculty, versus "them", which usually means all administrators. However, depicting campus administrators as participants in some organized conspiracy against faculty members is unproductive and obscures the fact…

  18. Historical Perspectives of Outdoor and Wilderness Recreation Programming in the United States.

    Science.gov (United States)

    Watters, Ron

    This paper traces the history of outdoor programming beginning with the influence of western expansionism and the settling of the American frontier. The late 1800s brought about a change in the national attitude from an adversarial view of wilderness to a beneficial view. This was reflected by writers such as Henry David Thoreau and John Muir.…

  19. 28 CFR 24.305 - Extensions of time.

    Science.gov (United States)

    2010-07-01

    ... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by...

  20. Generic physical protection logic trees

    Energy Technology Data Exchange (ETDEWEB)

    Paulus, W.K.

    1981-10-01

    Generic physical protection logic trees, designed for application to nuclear facilities and materials, are presented together with a method of qualitative evaluation of the trees for design and analysis of physical protection systems. One or more defense zones are defined where adversaries interact with the physical protection system. Logic trees that are needed to describe the possible scenarios within a defense zone are selected. Elements of a postulated or existing physical protection system are tagged to the primary events of the logic tree. The likelihood of adversary success in overcoming these elements is evaluated on a binary, yes/no basis. The effect of these evaluations is propagated through the logic of each tree to determine whether the adversary is likely to accomplish the end event of the tree. The physical protection system must be highly likely to overcome the adversary before he accomplishes his objective. The evaluation must be conducted for all significant states of the site. Deficiencies uncovered become inputs to redesign and further analysis, closing the loop on the design/analysis cycle.

  1. Robust Multiparty Computation with Linear Communication Complexity

    DEFF Research Database (Denmark)

    Hirt, Martin; Nielsen, Jesper Buus

    2006-01-01

    We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a poly-time adversary, and allows n parties to actively securely evaluate any poly-sized circuit with resilience t < n/2. The total communication complexity in bits over the poi...

  2. More Important than the Contract Is the Relationship

    Science.gov (United States)

    Burch, Patricia; Good, Annalee

    2015-01-01

    What should a school district procurement officer ask when he or she sits down with a sales representative from a vendor of digital education products? Who else should be at the table? How do districts and providers become partners in instruction, rather than adversaries in negotiation? These are increasingly critical questions as public school…

  3. A Formal Model for the Security of Proxy Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    GU Chun-xiang; ZHU Yue-fei; ZHANG Ya-juan

    2005-01-01

    This paper provides theoretical foundations for the secure proxy signature primitive. We present a formal model for the security of proxy signature schemes, which defines the capabilities of the adversary and the security goals to capture which mean for a proxy signature scheme to be secure. Then, we present an example of proxy signature scheme that can be proven secure in the standard model.

  4. Development of a statistically based access delay timeline methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Rivera, W. Gary; Robinson, David Gerald; Wyss, Gregory Dane; Hendrickson, Stacey M. Langfitt

    2013-02-01

    The charter for adversarial delay is to hinder access to critical resources through the use of physical systems increasing an adversarys task time. The traditional method for characterizing access delay has been a simple model focused on accumulating times required to complete each task with little regard to uncertainty, complexity, or decreased efficiency associated with multiple sequential tasks or stress. The delay associated with any given barrier or path is further discounted to worst-case, and often unrealistic, times based on a high-level adversary, resulting in a highly conservative calculation of total delay. This leads to delay systems that require significant funding and personnel resources in order to defend against the assumed threat, which for many sites and applications becomes cost prohibitive. A new methodology has been developed that considers the uncertainties inherent in the problem to develop a realistic timeline distribution for a given adversary path. This new methodology incorporates advanced Bayesian statistical theory and methodologies, taking into account small sample size, expert judgment, human factors and threat uncertainty. The result is an algorithm that can calculate a probability distribution function of delay times directly related to system risk. Through further analysis, the access delay analyst or end user can use the results in making informed decisions while weighing benefits against risks, ultimately resulting in greater system effectiveness with lower cost.

  5. The Use of Family Therapy within a University Counseling Center

    Science.gov (United States)

    Jackson, Kathryn

    2009-01-01

    As a counterpoint to the oftentimes adversarial way that parents are viewed when they appear to be overinvolved in the lives of their college-aged students, this article advocates for the use of a family therapy perspective in university counseling centers. Benefits of this perspective include a broadening of the lens through which individual…

  6. The Effect of Cross-Examination Tactics on Simulated Jury Impressions.

    Science.gov (United States)

    Gibbs, Margaret; And Others

    Past research has demonstrated the negative effects of leading questions by attorneys on eyewitness testimony and has found that adversary lawyers produced less accurate testimony from eyewitnesses. This study was conducted to examine the effects of lawyer's hostile versus non-hostile behavior and lawyer's leading versus non-leading questions on…

  7. Lower and Upper Bounds for Deniable Public-Key Encryption

    DEFF Research Database (Denmark)

    Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian;

    2011-01-01

    A deniable cryptosystem allows a sender and a receiver to communicate over an insecure channel in such a way that the communication is still secure even if the adversary can threaten the parties into revealing their internal states after the execution of the protocol. This is done by allowing...

  8. Cryptography in the Bounded Quantum-Storage Model

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Serge, Fehr; Schaffner, Christian;

    2008-01-01

    We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory...

  9. Cryptography In The Bounded Quantum-Storage Model

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Schaffner, Christian;

    2005-01-01

    We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory...

  10. In Search of Interoperability Standards for Human Behaviour Representation

    NARCIS (Netherlands)

    Gunzelmann, G.; Gaughan, C.; Huiskamp, W.; Bosch, K. van den; Jong, S. de; Alexander, T.; Bruzzone, A.G.; Tremori, A.

    2014-01-01

    There is a long history of research to create capabilities that address the need for human behaviour representations in training simulations and other M&S application domains. In training, human behaviour models have applications as synthetic teammates and adversaries, but can also be used as a repr

  11. Trust Management and Accountability for Internet Security

    Science.gov (United States)

    Liu, Wayne W.

    2011-01-01

    Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…

  12. Divorce mediation and resolution of child custody disputes: long-term effects.

    Science.gov (United States)

    Dillon, P A; Emery, R E

    1996-01-01

    Separated parents randomly assigned to either mediation or traditional adversarial methods for resolving child custody disputes were surveyed nine years postsettlement. Noncustodial parents assigned to mediation reported more frequent current contact with their children and greater involvement in current decisions about them. Parents in the mediation group also reported more frequent communication about their children during the period since dispute resolution.

  13. Rambo and Mother Theresa: A Judge Looks at Divorce.

    Science.gov (United States)

    Steinberg, Joseph L.

    1988-01-01

    Addresses community attitude that angry adversarial divorces are normal and inevitable and asserts that, to change the divorce experience of Americans, the community attitude must change. Notes that one part of client community created and demanded and achieved joint custody and no fault divorce, and that it is up to the clients to demand and…

  14. Supply chain management as a competitive advantage in the Spanish grocery sector

    OpenAIRE

    Ventura, Eva; Gim??nez, Cristina

    2002-01-01

    Adversarial relationships have long dominated business relationships, but Supply Chain Management (SCM) entails a new perspective. SCM requires a movement away from arms-length relationships toward partnership style relations. SCM involves integration, co-ordination and collaboration across organisations and throughout the supply chain. It means that SCM requires internal (intraorganisational) and external (interorganisational) integration. This paper analyses the relationsh...

  15. Pravastatin inhibits tumor growth through elevating the levels of apolipoprotein A1

    Directory of Open Access Journals (Sweden)

    Chun Yeh

    2016-03-01

    Conclusion: This study demonstrated that pravastatin elevated ApoA1, an HDL major constituent with anti-inflammatory characteristics, which displayed strong adversary associations with tumor developments and growth. Increasing the amounts of ApoA1 by pravastatin coupled with DOX may improve the therapeutic efficacy for cancer treatment.

  16. 44 CFR 334.3 - Background.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Background. 334.3 Section 334.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND... adversaries shape the nature and gravity of the threat as well as its likelihood and timing of...

  17. PIME '89 (Public Information Materials Exchange): International workshop on public information problems of nuclear energy

    International Nuclear Information System (INIS)

    Presentations included in this proceedings are describing the following; Mass media and public information on nuclear energy and radiation: striving for two-way confidence and understanding; case studies of different countries having developed nuclear programs, problems of communication between nuclear promoters and/or operators and its adversaries; public attitude concerning nuclear power; different attitudes of men and women

  18. Collaborative Divorce: An Effort to Reduce the Damage of Divorce.

    Science.gov (United States)

    Alba-Fisch, Maria

    2016-05-01

    Divorce has been trapped in the adversarial system of the courts, a system ill suited to the needs of a family attempting to reorganize itself and still safeguard the well-being of its members. Collaborative divorce (CD) is a relatively new approach comprising an interdisciplinary professional team trained to help the divorcing family arrive at a financial, legal, and emotional settlement. The CD approach is designed to assist both members of the couple and their children transition into a more constructive future wherein they can still be a family. The structure and adversarial approach of the courts have been replaced by collaborative structures and principles developed to encourage honesty and cooperation. The case presented illustrates how this actually works. PMID:27037997

  19. Realistic noise-tolerant randomness amplification using finite number of devices

    Science.gov (United States)

    Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna

    2016-01-01

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology. PMID:27098302

  20. Comparison of ICM with TPF-LEP to Prevent MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network

    Directory of Open Access Journals (Sweden)

    M. Durairaj

    2014-05-01

    Full Text Available A Comparison of Integrated Central Manager (ICM and Traffic Pattern Filtering with Letter Envelop Protocol (TPF-LEP is done. Denial of Service (DoS attack is a biggest peril in wireless local area infrastructure network. It makes the resources unavailable for intended users which transpired through spoofing legitimate Client/AP's Medium Access Control (MAC address. MAC address are easily caricatured by the adversary clients, subsequently they are not encrypted. Since, the adversary sends the management frame, which is unencrypted, to the victim using spoofed MAC address. This study compares the performance of Integrated Central Manager (ICM and Traffic Pattern Filtering with Letter Envelop Protocol (TPF-LEP and evaluated the result using NS2. The attack scenario is simulated and effectiveness of the solutions is validated after the instigation of solutions in the attack consequences. Throughput, Packet Delivery Ratio and Packet Loss are measured and taken to endorse the performance of ICM and TPF-LEP.

  1. Generation of safe optimised execution strategies for uml models

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Herbert-Hansen, Zaza Nadja Lee

    , for a fragment of the Unified Modelling Language (UML) statechart language which is extended to include modelling of workflows which exhibit stochastic behaviour. Strategy generation is made possible by performing model checking on specific permutations of the set of possible actions to generate adversaries......When designing safety critical systems there is a need for verification of safety properties while ensuring system operations have a specific performance profile. We present a novel application of model checking to derive execution strategies, sequences of decisions at workflow branch points...... which optimise a set of reward variables, while simultaneously observing constraints which encode any required safety properties and accounting for the underlying stochastic nature of the system. By evaluating quantitative properties of the generated adversaries we are able to construct an execution...

  2. Another cost of being a young black male: Race, weaponry, and lethal outcomes in assaults.

    Science.gov (United States)

    Felson, Richard B; Painter-Davis, Noah

    2012-09-01

    We examine the effect of the race, age, and gender of victims of assault on the offenders' use of weapons and lethal intent. Evidence from the National Incident Based Reporting System (NIBRS) suggests that offenders are particularly likely to use guns against young black men-a three-way interaction - and to kill black males and young black adults. Black offenders respond more strongly to the victim's race than do white offenders. As a result of these effects, a violent incident between two young black men is about six times more likely to involve a gun than a violent incident between two young white men. We suggest that adversary effects, i.e., an offender's tactical response to the threat posed by adversaries, help explain why violence in black communities tends to be much more serious than violence in white communities.

  3. Exponential separations for one-way quantum communication complexity, with applications to cryptography

    CERN Document Server

    Gavinsky, D; Kempe, J; Kerenidis, I; Raz, R; Gavinsky, Dmitry; Kempe, Julia; Kerenidis, Iordanis; Raz, Ran; Wolf, Ronald de

    2006-01-01

    We give an exponential separation between one-way quantum and classical communication protocols for two partial Boolean functions, both of which are variants of the Boolean Hidden Matching Problem of Bar-Yossef et al. Earlier such an exponential separation was known only for a relational version of the Hidden Matching Problem. Our proofs use the Fourier coefficients inequality of Kahn, Kalai, and Linial. We also give a number of applications of this separation. In particular, we provide the first example in the bounded storage model of cryptography where the key is secure if the adversary has a certain amount of classical storage, but is completely insecure if he has a similar (or even much smaller) amount of \\emph{quantum} storage. Moreover, in the setting of privacy amplification, we show that there exist extractors which yield a classically secure key, but are insecure against a quantum adversary.

  4. Realistic noise-tolerant randomness amplification using finite number of devices.

    Science.gov (United States)

    Brandão, Fernando G S L; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna

    2016-01-01

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology. PMID:27098302

  5. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion. In contrast, a hybrid-secure protocol provides different security guarantees depending on the set of corrupted parties and the computational power...... of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t secure with agreement on abort (privacy and correctness only) for up to t secure...

  6. Traffic and Security using Randomized Dispersive Routes in Heterogeneous Sensor Network

    CERN Document Server

    Karunakaran, P

    2012-01-01

    Generally traffic and the sensor network security have many challenges in the transmission of data in the network. The existing schemes consider homogeneous sensor networks which have poor performance and scalability. Due to many-to-one traffic pattern, sensors may communicate with small portion of its neighbours. Key management is the critical process in sensor nodes to secure the data. Most existing schemes establish shared keys for all the sensors no matter whether they are communicating or not. Hence it leads to large storage overhead. Another problem in sensor network is compromised node attack and denial of service attack which occurs because of its wireless nature. Existing multi path routing algorithms are vulnerable to these attacks. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. If an adversary performs node compromise attack, they can easily get the encryption/ decryption keys used b...

  7. Energy Theft in the Advanced Metering Infrastructure

    Science.gov (United States)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  8. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  9. Fair trial in international commercial arbitration

    Directory of Open Access Journals (Sweden)

    saleh khedri

    2015-12-01

    Full Text Available A fair hearing in the courts requires the principles of procedure. Because the arbitration is considered as private judgment, thus in arbitration hearing regarding to non-ceremonial proceedings, arbitrator or arbitration panel are bound to respect the principles of civil procedure in arbitration hearing. Equal treatment with parties of arbitration and Adversarial procedure are principles that arbitrator or arbitration panel obliged to satisfy them in proceeding whit action arbitration parties. Independence and impartiality are elements of Equal treatment and proper notice and give a full opportunity to presentation case are elements of adversarial procedure in Arbitration hearing that arbitrator or arbitration panel are bound to respect them in proceeding between action arbitration parties. Disclosure Obligation, Challenge to arbitrators competence, application for setting aside and refuse to recognition and enforcement of award are tools to satisfy compliance of principles of procedural civil in Arbitration hearing. In this paper, ways of satisfying principles of procedure and its sanctions has been considered.

  10. Realistic noise-tolerant randomness amplification using finite number of devices

    Science.gov (United States)

    Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna

    2016-04-01

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.

  11. Quantum-secure covert communication on bosonic channels

    Science.gov (United States)

    Bash, Boulat A.; Gheorghe, Andrei H.; Patel, Monika; Habif, Jonathan L.; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-10-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.

  12. Robust Max-Product Belief Propagation

    CERN Document Server

    Ibrahimi, Morteza; Kanoria, Yashodhan; Montanari, Andrea

    2011-01-01

    We study the problem of optimizing a graph-structured objective function under \\emph{adversarial} uncertainty. This problem can be modeled as a two-persons zero-sum game between an Engineer and Nature. The Engineer controls a subset of the variables (nodes in the graph), and tries to assign their values to maximize an objective function. Nature controls the complementary subset of variables and tries to minimize the same objective. This setting encompasses estimation and optimization problems under model uncertainty, and strategic problems with a graph structure. Von Neumann's minimax theorem guarantees the existence of a (minimax) pair of randomized strategies that provide optimal robustness for each player against its adversary. We prove several structural properties of this strategy pair in the case of graph-structured payoff function. In particular, the randomized minimax strategies (distributions over variable assignments) can be chosen in such a way to satisfy the Markov property with respect to the gra...

  13. LA PRUEBA DOCUMENTADA EN EL NUEVO SISTEMA DE JUSTICIA PENAL MEXICANO Documented proof in the new Mexican criminal justice system

    Directory of Open Access Journals (Sweden)

    Benavente Chorres Hesbert

    2010-01-01

    Full Text Available El presente estudio analiza los supuestos de prueba documentada regulados en aquellos códigos de las entidades federativas mexicanas que han adecuado el proceso penal al sistema acusatorio con tendencia adversarial. En ese sentido, se entiende por prueba documentada aquellas diligencias, principalmente declaraciones, realizadas durante la etapa de investigación que la ley otorga valor probatorio al no poder asistir el órgano de prueba a la audiencia del juicio oral por razones ajenas a su voluntad.This study analyzes the cases of the documented proof in those codes regulated the Mexican states that have appropriate criminal proceedings prone to adversarial system. In that sense, it is understood by those measures documented evidence, primarily statements made during the investigation stage that the law gives the probative value could not attend the court hearing to test the trial for reasons beyond their control.

  14. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  15. Den tavse venstrefløjspolitik

    DEFF Research Database (Denmark)

    Dyrberg, Torben Bech

    2012-01-01

    , leftists have been keen to silence political adversaries by advocating the censoring of the freedom of speech, which is particularly evident during the cartoon crisis 2005/6 and in cases of hate speech. These two aspects of the politics of silence – to remain silent and to silence others – have been...... legitimized in three ways. First, by displacing the question of freedom of speech from a political right to a morality of empathy; second, by moralizing and antagonizing the political climate in good/evil, which stigmatizes the adversary; and finally, calling for self-censorship and censorship of those who do...... and radical Islamists as they are facing the same enemy, i.e., the system and the nationalist Right. The friend/enemy matrix structures leftist orientation because it is the most prominent way to cultivate an oppositional identity. When this is what counts, political principles become less important...

  16. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  17. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  18. Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent

    CERN Document Server

    Blond, Stevens Le; Fessant, Fabrice Le; Dabbous, Walid; Kaafar, Mohamed Ali

    2010-01-01

    This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show that a few content providers inject most contents into BitTorrent and that those content providers are located in foreign data centers. We also show that an adversary can compromise the privacy of any peer in BitTorrent and identify the big downloaders that we define as the peers who subscribe to a large number of contents. This infringement on users' privacy poses a significant impediment to the legal adoption of BitTorrent.

  19. Attacks and Countermeasures in Social Network Data Publishing

    Institute of Scientific and Technical Information of China (English)

    XIANG Yang

    2016-01-01

    With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For example, adversaries can get sensitive in⁃formation of some individuals easily with little background knowledge. How to publish social network data for analysis purpose while preserving the privacy of individuals has raised many concerns. Many algorithms have been proposed to address this issue. In this paper, we discuss this privacy problem from two aspects: attack models and countermeasures. We analyse privacy con⁃cerns, model the background knowledge that adversary may utilize and review the recently developed attack models. We then sur⁃vey the state⁃of⁃the⁃art privacy preserving methods in two categories: anonymization methods and differential privacy methods. We also provide research directions in this area.

  20. Game theoretic analysis of physical protection system design

    International Nuclear Information System (INIS)

    The physical protection system (PPS) of a fictional small modular reactor (SMR) facility have been modeled as a platform for a game theoretic approach to security decision analysis. To demonstrate the game theoretic approach, a rational adversary with complete knowledge of the facility has been modeled attempting a sabotage attack. The adversary adjusts his decisions in response to investments made by the defender to enhance the security measures. This can lead to a conservative physical protection system design. Since defender upgrades were limited by a budget, cost benefit analysis may be conducted upon security upgrades. One approach to cost benefit analysis is the efficient frontier, which depicts the reduction in expected consequence per incremental increase in the security budget

  1. The Effective Key Length of Watermarking Schemes

    CERN Document Server

    Bas, Patrick

    2012-01-01

    Whereas the embedding distortion, the payload and the robustness of digital watermarking schemes are well understood, the notion of security is still not completely well defined. The approach proposed in the last five years is too theoretical and solely considers the embedding process, which is half of the watermarking scheme. This paper proposes a new measurement of watermarking security, called the effective key length, which captures the difficulty for the adversary to get access to the watermarking channel. This new methodology is applied to additive spread spectrum schemes where theoretical and practical computations of the effective key length are proposed. It shows that these schemes are not secure as soon as the adversary gets observations in the Known Message Attack context.

  2. Security and Composability of Randomness Expansion from Bell Inequalities

    CERN Document Server

    Fehr, Serge; Schaffner, Christian

    2011-01-01

    The nonlocal behavior of quantum mechanics enables to generate guaranteed fresh randomness from an untrusted device that consists of two nonsignalling components. Since the generation process requires some initial fresh randomness to act as a catalyst, one also speaks of randomness expansion. Previous works showed the freshness of the generated randomness only for an adversary that holds no quantum side information, or, equivalently, has measured all quantum side information before the randomness is generated by the device. Thus, until now it was unclear if and how much fresh randomness can be generated by an untrusted device in the presence of an adversary that maintains a quantum state. In this work, we show that security against quantum side information comes "for free". Specifically, we show that with the same procedure, the very same amount of randomness can be generated in the presence of quantum side information as can be generated without any (quantum or classical) side information. Our result on the ...

  3. On Adaptive vs. Non-adaptive Security of Multiparty Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan;

    2001-01-01

    Security analysis of multiparty cryptographic protocols distinguishes between two types of adversarialsettings: In the non-adaptive setting, the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting, the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and non-adaptive security, according to two definitions and in several models of computation. While affirming some prevailing beliefs, we also obtain some unexpected results. Some...... highlights of our results are: – - According to the definition of Dodis-Micali-Rogaway (which is set in the information-theoretic model), adaptive and non-adaptive security are equivalent. This holds for both honest-but-curious and Byzantine adversaries, and for any number of parties. – - According...

  4. A new proxy signature with revocation based on security advancement

    Science.gov (United States)

    Mat-Isa, M.; Ismail, E. S.

    2013-11-01

    n proxy signature schemes with revocation, an original signer delegates his signing capability to a proxy signer on behalf of the original signer and revokes delegations whenever necessary. Currently, the security of the previous schemes is based on a single hard problem such as factoring or discrete logarithms. These schemes appear secure today but in a near future, if an adversary finds a solution to these hard problems, the developed schemes will be no longer secure. To solve this problem we develop a new proxy signature scheme with revocation based on two hard problems; factoring and discrete logarithms. The new scheme offers higher level security than normal schemes since it is hard for an adversary to solve the two hard problems simultaneously.

  5. Tailored Security and Safety for Pervasive Computing

    Science.gov (United States)

    Blass, Erik-Oliver; Zitterbart, Martina

    Pervasive computing makes high demands on security: devices are seriously resource-restricted, communication takes place spontaneously, and adversaries might control some of the devices. We claim that 1.) today’s research, studying traditional security properties for pervasive computing, leads to inefficient, expensive, and unnecessary strong and unwanted security solutions. Instead, security solutions tailored to the demands of a user, the scenario, or the expected adversary are more promising. 2.) Today’s research for security in pervasive computing makes naive, inefficient, and unrealistic assumptions regarding safety properties, in particular the quality of basic communication. Therefore, future security research has to consider safety characteristics and has to jointly investigate security and safety for efficient, tailored solutions.

  6. 'The ravages of permissiveness': sex education and the permissive society.

    Science.gov (United States)

    Hampshire, James; Lewis, Jane

    2004-01-01

    In this article we explore how sex education in schools has become an adversarial political issue. Although sex education has never been a wholly uncontroversial subject, we show that for two decades after the Second World War there was a broad consensus among policy-makers that it offered a solution to public health and social problems, especially venereal disease. From the late 1960s, this consensus came under attack. As part of a wider effort to reverse the changes associated with the 'permissive' society and legislation of the late 1960s, moral traditionalists and pro-family campaigners sought to problematize sex education. They depicted it as morally corrupting and redefined it as a problem rather than a public health solution. Henceforth, the politics of sex education became increasingly polarized and adversarial. We conclude that the fractious debates about sex education in the 1980s and 1990s are a legacy of this reaction against the permissive society.

  7. Secure Neighbor Position Discovery in VANETs

    CERN Document Server

    Fiore, Marco; Chiasserini, Carla Fabiana; Papadimitratos, Panagiotis

    2010-01-01

    Many significant functionalities of vehicular ad hoc networks (VANETs) require that nodes have knowledge of the positions of other vehicles, and notably of those within communication range. However, adversarial nodes could provide false position information or disrupt the acquisition of such information. Thus, in VANETs, the discovery of neighbor positions should be performed in a secure manner. In spite of a multitude of security protocols in the literature, there is no secure discovery protocol for neighbors positions. We address this problem in our paper: we design a distributed protocol that relies solely on information exchange among one-hop neighbors, we analyze its security properties in presence of one or multiple (independent or colluding) adversaries, and we evaluate its performance in a VANET environment using realistic mobility traces. We show that our protocol can be highly effective in detecting falsified position information, while maintaining a low rate of false positive detections.

  8. Certified Randomness from a Two-Level System in a Relativistic Quantum Field

    CERN Document Server

    Thinh, Le Phuc; Martin-Martinez, Eduardo

    2016-01-01

    Randomness is an indispensable resource in modern science and information technology. Fortunately, an experimentally simple procedure exists to generate randomness with well-characterized devices: measuring a quantum system in a basis complementary to its preparation. Towards realizing this goal one may consider using atoms or superconducting qubits, promising candidates for quantum information processing. However, their unavoidable interaction with the electromagnetic field affects their dynamics. At large time scales, this can result in decoherence. Smaller time scales in principle avoid this problem, but may not be well analysed under the usual rotating wave and single-mode approximation (RWA and SMA) which break the relativistic nature of quantum field theory. Here, we use a fully relativistic analysis to quantify the information that an adversary with access to the field could get on the result of an atomic measurement. Surprisingly, we find that the adversary's guessing probability is not minimized for ...

  9. Route Discovery and Hop Node Verification to Ensure Authenticated Data Transmissions in Manet

    Directory of Open Access Journals (Sweden)

    Anitha.M

    2014-03-01

    Full Text Available ABSTRACT In mobile ad hoc network, Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. As position information is broadcasted including the enemy to receive. Routes may be disconnected due to dynamic movement of nodes. Such networks are more vulnerable to both internal and external attacks due to presence of adversarial nodes. These nodes affect the performance of routing protocol in ad hoc networks. So it is essential to identify the neighbours in MANET. The “Neighbor Position Verification” (NPV, is a routing protocol designed to protect the network from adversary nodes by verifying the position of neighbor nodes to improve security, efficiency and performance in MANET routing.

  10. Modern Air&Space Power and political goals at war

    Science.gov (United States)

    Özer, Güngör.

    2014-05-01

    Modern AirandSpace Power is increasingly becoming a political tool. In this article, AirandSpacePower as a political tool will be discussed. The primary purpose of this article is to search how AirandSpacePower can provide contributions to security and also determine if it may reach the political goals on its own at war by SWOT Analysis Method and analysing the role of AirandSpace Power in Operation Unified Protector (Libya) as a case study. In conclusion, AirandSpacePower may not be sufficient to win the political goals on its own. However it may reach the political aims partially against the adversary on its own depending upon the situations. Moreover it can alone persuade the adversary to alter its behavior(s) in war.

  11. Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area in wireless and mobile computing research. Applications of WSNs are numerous and growing, and range from indoor deployment scenarios in the home and office to outdoor deployment scenarios in adversary's territory in a tactical battleground (Akyildiz et al., 2002). For military environment, dispersal of WSNs into an adversary's territory enables the detection and tracking of enemy soldiers and vehicles. For home/office environments, indoor sensor networks offer the ability to monitor the health of the elderly and to detect intruders via a wireless home security system. In each of these scenarios, lives and livelihoods may depend on the timeliness and correctness of the sensor data obtained from dispersed sensor nodes. As a result, such WSNs must be secured to prevent an intruder from obstructing the delivery of correct sensor data and from forging sensor data. To address the latter problem, end-to-end data integrity checksums and pos...

  12. Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world

    Directory of Open Access Journals (Sweden)

    Schanck John M.

    2016-10-01

    Full Text Available We propose a circuit extension handshake for Tor that is forward secure against adversaries who gain quantum computing capabilities after session negotiation. In doing so, we refine the notion of an authenticated and confidential channel establishment (ACCE protocol and define pre-quantum, transitional, and post-quantum ACCE security. These new definitions reflect the types of adversaries that a protocol might be designed to resist. We prove that, with some small modifications, the currently deployed Tor circuit extension handshake, ntor, provides pre-quantum ACCE security. We then prove that our new protocol, when instantiated with a post-quantum key encapsulation mechanism, achieves the stronger notion of transitional ACCE security. Finally, we instantiate our protocol with NTRU-Encrypt and provide a performance comparison between ntor, our proposal, and the recent design of Ghosh and Kate.

  13. Analysis of Information Leakage in Quantum Key Agreement

    Institute of Scientific and Technical Information of China (English)

    LIU Sheng-li; ZHENG Dong; CHENG Ke-fei

    2006-01-01

    Quantum key agreement is one of the approaches to unconditional security. Since 1980's, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described:sitting in the middle, an adversary can play a "man-in-the-middle" attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.

  14. Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks

    Science.gov (United States)

    Ren, Wei; Song, Jun; Ma, Zhao; Huang, Shiyong

    Mission-critical wireless sensor networks (WSNs) have been found in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for detecting and defending sophisticated adversaries, such as Sybil, worm hole and mobile adversaries. In this paper, we propose a bio-inspired security framework to provide intelligence-enabled security mechanisms. This scheme is composed of a middleware, multiple agents and mobile agents. The agents monitor the network packets, host activities, make decisions and launch corresponding responses. Middleware performs an infrastructure for the communication between various agents and corresponding mobility. Certain cognitive models and intelligent algorithms such as Layered Reference Model of Brain and Self-Organizing Neural Network with Competitive Learning are explored in the context of sensor networks that have resource constraints. The security framework and implementation are also described in details.

  15. Verecundia, risa y decoro: Cicerón y el arte de insultar

    OpenAIRE

    Mas, Salvador

    2015-01-01

    One can speak about laughter in many ways; one can take, for example, a physiological approach, or a psychological one, or even a third sociological one, which the ancients did not completely disregard. Cicero, however, preferred to focus on the rhetorical possibilities of laughter and humor. The relevance of jest and jokes in order to get an audience’s favor or to ridicule an adversary is undeniable; but, despite their effectiveness and given their effectiveness, that jest and jokes can also...

  16. Assessment of procedures and preliminary software design for fault tree synthesis

    Energy Technology Data Exchange (ETDEWEB)

    Payne, H.J.

    1978-10-01

    The Safeguards Effectiveness Assessment methodology was applied to the assessment of the Material Control and Accounting (MC and A) system. This document covers the creation of a representation of the MC and A system and potential adversary actions as a directed network (digraph), and the synthesis of a fault tree from the digraph. It is shown that the Lapp--Powers approach to constructing the digraph is not capable of handling the MC and A assessment problem. Software functional specifications are given. (DLC)

  17. The interaction between potential criminals' and victims' demands for guns

    OpenAIRE

    Baç, Mehmet; Bac, Mehmet

    2009-01-01

    I develop a model with endogenous gun ownership and study the interaction between the demands for guns by heterogeneous potential offenders and victims. I show that the interaction depends on pervasiveness of guns, injury probabilities and, in particular, the impact of the gun on the probability of success against armed relative to unarmed adversaries. While the sanction on armed offense is maximal under plausible conditions, the sanction on unarmed offense balances direct deterrence benef...

  18. The vulnerability of social networking media and the insider threat : new eyes for bad guys

    OpenAIRE

    Lenkart, John J.

    2011-01-01

    CHDS State/Local Approved for public release; distribution is unlimited Social networking media introduces a new set of vulnerabilities to protecting an organization's sensitive information. Competitors and foreign adversaries are actively targeting U.S. industry to acquire trade secrets to undercut U.S. business in the marketplace. Of primary concern in this endeavor is an insider's betrayal of an organization, witting or unwitting, by providing sensitive information to a hostile outsi...

  19. ‪The Vulnerability of Social Networking Media and the Insider Threat: New Eyes for Bad Guys‬ [video

    OpenAIRE

    Lenkart, John; Center for Homeland Defense and Security Naval Postgraduate School

    2012-01-01

    Social networking media introduces a new set of vulnerabilities to protecting an organization's sensitive information. Adversaries are actively targeting U.S. industry to acquire trade secrets to undercut U.S. business in the marketplace. Of primary concern is an insider's betrayal of an organization by providing sensitive information to a hostile outsider. Social engineering, when coupled with the new and widespread use of social networking media, becomes more effective by exploiting the wea...

  20. Military Strategy vs. Military Doctrine

    DEFF Research Database (Denmark)

    Barfoed, Jacob

    2015-01-01

    The article argues that while doctrine represents the more scientific side of warfare, strategy represents the artistic side. Existing doctrine will almost never meet the requirements for winning the next war; it is through the artistic application of generic peacetime doctrine to the specific...... strategic and operational context, using doctrine as building blocks for a context specific military strategy, that the military commander outwits and defeats or coerces the adversary and achieves the military objectives....

  1. The USSR/Russia, Norway and international co-operation on environmental matters in the Arctic, 1984-1996

    OpenAIRE

    Karelina, Irina

    2013-01-01

    This thesis examines the USSR, Norway and international cooperation on environmental matters in the Arctic (1984-1996). During the Cold War, the region attracted much attention from of the main adversaries. It was a playground for strategic planners and a laboratory for the improvement of military technology. But at the same time these territories were also – at least potentially – a source for contacts between scientist of the East and the West. Especially in the last decade of the Cold War,...

  2. Large-scale security analysis of the web: Challenges and findings

    OpenAIRE

    Van Goethem, Tom; Ping CHEN; Nikiforakis, Nick; Desmet, Lieven; Joosen, Wouter

    2014-01-01

    As the web expands in size and adoption, so does the interest of attackers who seek to exploit web applications and exfiltrate user data. While there is a steady stream of news regarding major breaches and millions of user credentials compromised, it is logical to assume that, over time, the applications of the bigger players of the web are becoming more secure. However, as these applications become resistant to most prevalent attacks, adversaries may be tempted to move to easier, unprotected...

  3. A Cross-Platform Collection of Social Network Profiles

    OpenAIRE

    Veiga, Maria Han; Eickhoff, Carsten

    2016-01-01

    The proliferation of Internet-enabled devices and services has led to a shifting balance between digital and analogue aspects of our everyday lives. In the face of this development there is a growing demand for the study of privacy hazards, the potential for unique user de-anonymization and information leakage between the various social media profiles many of us maintain. To enable the structured study of such adversarial effects, this paper presents a dedicated dataset of cross-platform soci...

  4. On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices

    OpenAIRE

    Asghar, HJ; Steinfeld, R.; Li, S.; Kaafar, MA; Pieprzyk, J

    2015-01-01

    Human identification protocols are challenge-response protocols that rely on human computational ability to reply to random challenges from the server based on a public function of a shared secret and the challenge to authenticate the human user. One security criterion for a human identification protocol is the number of challenge-response pairs the adversary needs to observe before it can deduce the secret. In order to increase this number, protocol designers have tried to construct protocol...

  5. Feasibility of developing a surrogate missile system for the purpose of combat systems testing, evaluation, and watchstander proficiency

    OpenAIRE

    Elzner, Benjamin Asher

    2014-01-01

    Approved for public release; distribution is unlimited Aegis readiness is an increasing concern as ships age, Navy budgets shrink, and potential adversaries make strides toward combat power parity in diverse regions around the world. Keys to combat effectiveness are materiel readiness and crew proficiency. Live fire missile exercises are a proven way to gauge the former while contributing to the latter, but the use of combat missiles for this purpose is both expensive and depletes the inve...

  6. A Cost Effective RFID Based Customized DVD-ROM to Thwart Software Piracy

    Directory of Open Access Journals (Sweden)

    Sudip Dogra

    2009-10-01

    Full Text Available Software piracy has been a very perilous adversary of the software-based industry, from the very beginning of the development of the latter into a significant business. There has been no developed foolproof system that has been developed to appropriately tackle this vile issue. We have in our scheme tried to develop a way to embark upon this problem using a very recently developed technology of RFID.

  7. Team 6: Joint Capability Metamodel-Test-Metamodel Integration with Data Farming

    OpenAIRE

    Beach, T.; Dryer, D.; Way, H.; Sanchez, S.; Kelton, W.D.; Schamburg, J.; D. Martin

    2007-01-01

    from Scythe : Proceedings and Bulletin of the International Data Farming Community, Issue 2 Workshop 14 US adversaries are continuously seeking new ways to threaten US interests at home and abroad. In order to counter these threats, now more than ever, commanders must seek to leverage existing and emerging joint capabilities effectively in a variety of unique contexts. Achieving mission effectiveness in today's joint operational environment demands robust synerg...

  8. Trusted Objects

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.; PIERSON,LYNDON G.; WITZKE,EDWARD L.

    1999-10-27

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  9. The Invisible Hand in Legal and Political Theory

    OpenAIRE

    Vermeule, Cornelius Adrian

    2010-01-01

    Theorists have offered invisible-hand justifications for a range of legal institutions, including the separation of powers, free speech, the adversary system of litigation, criminal procedure, the common law, and property rights. These arguments are largely localized, with few comparisons across contexts and no general account of how invisible-hand justifications work. This essay has two aims. The first is to identify general conditions under which an invisible-hand justification will succeed...

  10. Poisoned Feedback: The Impact of Malicious Users in Closed-Loop Multiuser MIMO Systems

    CERN Document Server

    Mukherjee, Amitav

    2010-01-01

    Accurate channel state information (CSI) at the transmitter is critical for maximizing spectral efficiency on the downlink of multi-antenna networks. In this work we analyze a novel form of physical layer attacks on such closed-loop wireless networks. Specifically, this paper considers the impact of deliberately inaccurate feedback by malicious users in a multiuser multicast system. Numerical results demonstrate the significant degradation in performance of closed-loop transmission schemes due to intentional feedback of false CSI by adversarial users.

  11. Information operations, an evolutionary step for the Mexican Armed Forces

    OpenAIRE

    Schulz, David Vargas

    2007-01-01

    This thesis will focus on the Mexican Armed Force's ability to deal with existing and future unconventional threats and insurgencies. The modern Mexican Armed Forces are the result of an enduring evolutionary process, which has made the necessary changes to deal with the emerging threats against the state. Mexico's criminal threat has evolved because of 9/11 and because of the U.S.-led crackdown on Colombian drug cartels. Mexico's modern adversary is well versed in waging mass media campa...

  12. Relational changes between Statoil and suppliers in the last sesquidecade

    OpenAIRE

    Slaattelid, Andreas Hollund

    2015-01-01

    Research in relations management has burgeoned in the last sixty years, and literature has classified attributes of interorganizational relations into two models: The Collaborative, where integrated teams, flexibility, shared information and close relationships are cultivated; and the Adversarial, which bases its premise on market forces, formal communication, and the entitlements of contract. The Norwegian supply and service industry has developed in parallel with Statoil, and both parti...

  13. Body Cultures: the Venezuelan Holy Family

    OpenAIRE

    Guerrero, Javier

    2012-01-01

    In this article, I propose reading the body as a privileged space to debate Venezuelan politics. I expose the violent metaphorical and allegorical operations that manage to disfigure the national bodies, taking them to the very limits of monstrosity before normalizing them. Notwithstanding the compulsion to denounce the political adversary that defiles the Venezuelan ‘holy’ family, the need to preserve the national body par excellence is stronger than these differences and the incidental poss...

  14. Dynamic Packet Scheduling in Wireless Networks

    OpenAIRE

    Kesselheim, Thomas

    2012-01-01

    We consider protocols that serve communication requests arising over time in a wireless network that is subject to interference. Unlike previous approaches, we take the geometry of the network and power control into account, both allowing to increase the network's performance significantly. We introduce a stochastic and an adversarial model to bound the packet injection. Although taken as the primary motivation, this approach is not only suitable for models based on the signal-to-interference...

  15. Egalitarian computing

    OpenAIRE

    Biryukov, Alex; Khovratovich, Dmitry

    2016-01-01

    In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include password processing, hard-drive protection, cryptocurrency mining, resource sharing, code obfuscation, etc. We suggest memory-hard computing as a generic paradigm, where every task is amalgamated with a certain procedure requiring intensive access to RAM both in terms of size and (very importantly) bandwidth, so that transferring the com...

  16. SCM and extended integration at the lower tiers of the construction supply chain: An explorative study in the Dutch construction industry

    OpenAIRE

    Pryke, S. D.; Broft, R.; Badi, S. M.

    2014-01-01

    Several studies have underlined the potential of Supply Chain Management (SCM) in meeting the formidable challenges associated with fragmentation, adversarial relationships and insufficient customer focus in the delivery of construction projects (e.g. Dainty et al., 2001; Cox and Ireland, 2002; Gadde and Dubois, 2010). However, there remains a paucity of properly documented examples of successfully implemented SCM initiatives, particularly at the lower tiers of the supply chain. This study se...

  17. On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs

    OpenAIRE

    Abyaneh, Mohammad Reza Sohizadeh

    2012-01-01

    IEEE International Conference for Internet Technology and Secured Transactions (ICITST2011) in Abu Dhabi, UAE. In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated against the tag owners as adversaries. The first protocol called ROTIV is a scheme which provides a privacy-preserving ownership transfer by using an HMACbased authentication with public key encryption. However, our passive attack on this protocol shows that any leg...

  18. Radar operation in a hostile electromagnetic environment

    Energy Technology Data Exchange (ETDEWEB)

    Doerry, Armin Walter

    2014-03-01

    Radar ISR does not always involve cooperative or even friendly targets. An adversary has numerous techniques available to him to counter the effectiveness of a radar ISR sensor. These generally fall under the banner of jamming, spoofing, or otherwise interfering with the EM signals required by the radar sensor. Consequently mitigation techniques are prudent to retain efficacy of the radar sensor. We discuss in general terms a number of mitigation techniques.

  19. Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication

    OpenAIRE

    Rass, Stefan; Schuller, David; Kollmitzer, Christian

    2010-01-01

    International audience We present an information-theoretic discussion of authentication via graphical passwords, and devise a model for entropy estimation. Our results make face-recognition based authentication comparable to standard password authentication in terms of uncertainty (Shannon-entropy) that an adversary is confronted with in both situations. It is widely known that cognitive abilities strongly determine the choice of alphanumeric passwords as well as graphical passwords, and w...

  20. Editorial

    OpenAIRE

    Sweeney, Delma

    2014-01-01

    Conflict is a natural part of life. Yet when faced with difficult situations people can slip into adversarial and destructive behaviours that exacerbate reactivity, causing an escalation into estrangements and violence. Thoughtful and strategic management of likely circumstances known to cause difficulties could ameliorate such reactions. The first two articles in this second publication of JMACA examine elements of the root causes of issues that spark such hazards and seek to find ways forwa...

  1. ISR systems: Past, present, and future

    Science.gov (United States)

    Henry, Daniel J.

    2016-05-01

    Intelligence, Surveillance, and Reconnaissance (ISR) systems have been in use for thousands of years. Technology and CONOPS have continually evolved and morphed to meet ever-changing information needs and adversaries. Funding sources, constraints and procurement philosophies have also evolved, requiring cost-effective innovation to field marketable products which maximize the effectiveness of the Tasking, Capture, Processing, Exploitation, and Dissemination (TCPED) information chain. This paper describes the TCPED information chain and the evolution of ISR (past, present, and future).

  2. RFID Technology Based Attendance Management System

    OpenAIRE

    Sumita Nainan; Romin Parekh; Tanvi Shah

    2013-01-01

    RFID is a nascent technology, deeply rooted by its early developments in using radar as a harbinger of adversary planes during World War II. A plethora of industries have leveraged the benefits of RFID technology for enhancements in sectors like military, sports, security, airline, animal farms, healthcare and other areas. Industry specific key applications of this technology include vehicle tracking, automated inventory management, animal monitoring, secure store checkouts, supply chain mana...

  3. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  4. Court Supervised Institutional Transformation in South Africa

    OpenAIRE

    Deon Erasmus; Angus Lloyd Hornigold

    2015-01-01

    The traditional adversarial model of litigation in South Africa operates on the basis that two or more parties approach the court, each with its own desired outcome. The court is then obliged to decide in favour of one of the parties. A different model of litigation is emerging in South African law. This model involves actions against public institutions that are failing to comply with their constitutional mandate. In this type of litigation there is seldom a dispute regarding the eventu...

  5. Towards an American Model of Criminal Process: The Reform of the Polish Code of Criminal Procedure

    Directory of Open Access Journals (Sweden)

    Roclawska Monika

    2014-06-01

    Full Text Available In September 2013, the Polish Parliament passed an amendment to the Code of Criminal Procedure. The legislators decided to expand a number of adversarial elements present in current Polish criminal proceedings. When these changes come into effect (July 1, 2015, Polish criminal procedure will be similar to American regulations, in which the judge’s role is to be an impartial arbitrator, not an investigator.

  6. Garbage In, Garbage Out: The Court Interpreter’s Lament

    OpenAIRE

    Mikkelson, Holly

    2012-01-01

    Interpreters in all settings, in all parts of the world, and throughout history have lamented the poor quality of the language they must deal with in source texts. This chapter will review some recent publications on interpreting quality criteria, user expectations, and the associated challenges facing interpreters in different settings (Kondo 2006; Peng 2006; Lee 2009; Ng 2009; Napier et al. 2009; Kent 2009). The constraints facing court interpreters in adversarial settings wi...

  7. Transforming Power Relationships: Leadership, Risk and Hope

    OpenAIRE

    Read, James H.; Shapiro, Ian

    2013-01-01

    Abstract: Chronic communal conflicts resemble the prisoner's dilemma. Both communities prefer peace to war. But neither trusts the other, viewing the other's gain as its own loss, so potentially shared interests often go unrealized. Achieving positive-sum outcomes from apparently zero-sum struggles requires a kind of risk-embracing leadership. To succeed leaders must: a) see power relations as potentially positive-sum; b) strengthen negotiating adversaries instead of weakening them; and c) de...

  8. An Assessment of Supplier Development Practices in a Retail Environment with Particular Reference to Boots the Chemist

    OpenAIRE

    Clarke, Adrian John

    2007-01-01

    An organisations ability to control, adapt and improve its supply chain can significantly impact its competitive position (Drucker, 1982). For retailers, the supply base contributes almost three quarters of their total costs. Within manufacturing, organisations have been moving from predominantly adversarial, short-term, transactional relationships with their suppliers, to longer-term collaborative relationships. Automotive manufacturers in Japan were leading this, and it has since transfe...

  9. Bitcoin Beacon

    OpenAIRE

    Bentov, Iddo; Gabizon, Ariel; Zuckerman, David

    2016-01-01

    We examine a protocol $\\pi_{\\text{beacon}}$ that outputs unpredictable and publicly verifiable randomness, meaning that the output is unknown at the time that $\\pi_{\\text{beacon}}$ starts, yet everyone can verify that the output is close to uniform after $\\pi_{\\text{beacon}}$ terminates. We show that $\\pi_{\\text{beacon}}$ can be instantiated via Bitcoin under sensible assumptions; in particular we consider an adversary with an arbitrarily large initial budget who may not operate at a loss ind...

  10. Design and evaluation of physical protection systems for nuclear facilities and materials

    International Nuclear Information System (INIS)

    The spread of nuclear industry around the world has increased the risks and hazards of various possible forms of attack on nuclear facilities, operations and material. This work deals with the physical protection of nuclear facilities, operations and materials. It is intended to present detailed information on the physical protection aspects and the basic methodology to be used in the design and analysis of a facility's security system. Physical protection measures are directed against theft or unauthorized removal of nuclear materials and sabotage of nuclear facilities and operations individuals or groups of individuals. The design of an effective physical protection system includes the determination of the physical protection system objectives, the initial design of a physical protection system, and, probably, a redesign or refinement of the system. To develop the objectives, the designer mst begin by gathering information about facility operations and conditions, such as comprehensive description of the facility, operating states, and the physical protection requirements. The designer then needs to define the threat. This involves considering factors about potential adversaries: Class of adversary, adversary's capabilities, and range of adversary's tactics. Next, the designer should identify targets. Determination of whether or not nuclear materials are attractive targets is based mainly on the case or difficulty of acquisition and desirability of the material. The designer now knows the objectives of the physical protection system, that is, what to protect against whom. The next step is to design the system by determining how best to combine such elements as fences, vaults, sensors procedures, communication devices, and protective force personnel to meet the objectives of the system. Once a physical protection system is designed, it must be analyzed and evaluated to ensure it meets the physical protection objectives. Evaluation must allow for features working

  11. Security Toolbox for Detecting Novel and Sophisticated Android Malware

    OpenAIRE

    Holland, Benjamin; Deering, Tom; Kothari, Suresh; Mathews, Jon; Ranade, Nikhil

    2015-01-01

    This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project. The adversarial challenge ("Red") teams in the DARPA APAC program are tasked with designing sophisticated malware to test the bounds of malware detection technology being developed by the research and development ("Blue") teams. Our research group, a Blue team i...

  12. Intelligence-led risk management for homeland security: a collaborative approach for a common goal

    OpenAIRE

    Jackson, David P.

    2011-01-01

    CHDS State/Local The concept of risk management provides the foundation of the homeland security enterprise. The United States of America faces numerous complex risks ranging from a series of natural hazards, pandemic disease, technological hazards, transnational criminal enterprises and acts of terrorism perpetrated by intelligent adversaries. The management of these risks requires a strategic collaborative effort from the intelligence and risk analysis communities and many stakeholders a...

  13. An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters

    Institute of Scientific and Technical Information of China (English)

    XIE Shu-cui; ZHANG Jian-zhong

    2003-01-01

    In this paper an advanced threshold secret sharing scheme for identifying cheaters is proposed by using authentication codes. The performance of the scheme is discussed. The results show that in the scheme the valid shareholders can not only identify the impersonation of an adversary, but also detect cheating of some valid shareholders. In particular one honest shareholder is able to detect cheating of other participants forming a collection, and the information rate of the scheme is higher than that of others.

  14. Toward Normalization of Relations with Japan: The Strategy of North Korea, circa 1950 to 1961

    OpenAIRE

    Mitsuhiko Kimuran

    2011-01-01

    North Korea is still a strictly secluded state and little is known of its past and present though recent research using documents from countries in the former Soviet bloc has produced a number of breakthroughs especially in the discussion of the origins of the Korean War. Among others, history of relations between North Korea and Japan is most unexplored. One might assume that North Korea has had little interest in developing relations with Japan because of the adversary political ideologies ...

  15. The Treaty of Friendship, Partnership and Cooperation between Libya and Italy: From an Awkward Past to a Promising Equal Partnership

    OpenAIRE

    Kashiem, Mustafa Abdalla A.

    2010-01-01

    Italian-Libyan international relations entered a new era when the two countries signed the Treaty on Friendship, Partnership, and Cooperation on August 30, 2008. The treaty allowed Italy to extend its interests into the southern basin of the Mediterranean in order to balance Atlanticism and Europeanism in the region. The treaty enabled Libya also to create a partnership with a northern ally that was until recently described as an adversary. In politics, however, there is no such thing as perm...

  16. Your Neighbors Are My Spies: Location and other Privacy Concerns in Dating Apps

    OpenAIRE

    Hoang, Nguyen Phong; Asano, Yasuhito; Yoshikawa, Masatoshi

    2016-01-01

    Trilateration has recently become one of the well-known threat models to the user's location privacy in location-based applications (aka: location-based services or LBS), especially those containing highly sensitive information such as dating applications. The threat model mainly depends on the distance shown from the targeted victim to the adversary to pinpoint the victim's position. As a countermeasure, most of location-based applications have already implemented the "hide distance" functio...

  17. Supply positioning in support of humanitarian assistance and disaster relief operations

    OpenAIRE

    Mitchell, Gregory P.; Cisek, Jeffrey J.; Reilly, Bruce

    2011-01-01

    MBA Professional Report The U.S. military possesses many capabilities that are used throughout the range of military operations (ROMO) in order to carry out planned and contingency response missions. These capabilities can bring destruction to an adversary or can provide critical aid in a humanitarian assistance or disaster response (HA/DR) operation. In many situations, prepositioning supplies and equipment is essential to the Defense (DoD) in a rapid response that is efficient and e...

  18. Exploring individual differences in deductive reasoning as a function of 'autistic'-like traits

    OpenAIRE

    Fugard, Andrew J. B.

    2009-01-01

    From a logical viewpoint, people must reason to as well as from interpretations in deductive reasoning tasks. There are two main interpretative stances (e.g., Stenning & van Lambalgen, 2004, 2005, 2008): credulous, the act of trying to infer the speaker's intended model; and sceptical, an adversarial strategy. A range of contextual factors in uence interpretation, but there are also differences between individuals across situations. Taking an individual differences approach,...

  19. A Bitcoin system with no mining and no history transactions: Build a compact Bitcoin system

    OpenAIRE

    Xiaochao Qian

    2014-01-01

    We give an explicit definition of decentralization and show you that decentralization is almost impossible for the current stage. We propose a new framework of noncentralized cryptocurrency system with an assumption of the existence of a weak adversary for a bank alliance. It abandons the mining process and blockchain, and removes history transactions from data synchronization. We propose a consensus algorithm named "Converged Consensus" for a noncentralized cryptocurrency system.

  20. Advocacy and technology assessment

    Science.gov (United States)

    Jones, E. M.

    1975-01-01

    A highly structured treatment is presented of adversarial systems as they apply to technology assessment. One approach to the problem of adequate criteria of assessment focuses upon the internal operations of assessment entities; operations include problem perception, problem formulation, selection, utilization, determination, and evaluation. Potential contributions of advocacy as a mode of inquiry in technology are discussed; advocacy is evaluated by representative sets of criteria of adequate assessment which include participant criteria, perspectives criteria, situations criteria, base values criteria, and strategies criteria.

  1. Social context modulates the effect of physical warmth on perceived interpersonal kindness:a study of embodied metaphors

    OpenAIRE

    Citron, Francesca M M; Goldberg, Adele E.

    2014-01-01

    Physical contact with hot vs. iced coffee has been shown to affect evaluation of the personal warmth or kindness of a hypothetical person (Williams & Bargh, 2008). In 3 studies, we investigated whether the manipulation of social context can modulate the activation of the metaphorical mapping, KINDNESS as WARMTH. After priming participants with warm vs. cold temperature, we asked them to evaluate a hypothetical ad-hoc ally or adversary on the kindness dimension, as well as on other qualities u...

  2. USBcat - Towards an Intrusion Surveillance Toolset

    OpenAIRE

    Chapman, Chris; Knight, Scott; Dean, Tom

    2014-01-01

    This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by ob...

  3. Quantum money from knots

    CERN Document Server

    Farhi, Edward; Hassidim, Avinatan; Lutomirski, Andrew; Shor, Peter

    2010-01-01

    Quantum money is a cryptographic protocol in which a mint can produce a quantum state, no one else can copy the state, and anyone (with a quantum computer) can verify that the state came from the mint. We present a concrete quantum money scheme based on superpositions of diagrams that encode oriented links with the same Alexander polynomial. We expect our scheme to be secure against computationally bounded adversaries.

  4. A Factoring and Discrete Logarithm based Cryptosystem

    OpenAIRE

    Ciss, Abdoul Aziz; Cheikh, Ahmed Youssef Ould; Sow, Djiby

    2012-01-01

    This paper introduces a new public key cryptosystem based on two hard problems : the cube root extraction modulo a composite moduli (which is equivalent to the factorisation of the moduli) and the discrete logarithm problem. These two hard problems are combined during the key generation, encryption and decryption phases. By combining the IFP and the DLP we introduce a secure and efficient public key cryptosystem. To break the scheme, an adversary may solve the IFP and the DLP separately which...

  5. Hierarchical Motion Control for a Team of Humanoid Soccer Robots

    OpenAIRE

    Seung-Joon Yi; Stephen McGill; Dennis Hong; Daniel Lee

    2016-01-01

    Robot soccer has become an effective benchmarking problem for robotics research as it requires many aspects of robotics including perception, self localization, motion planning and distributed coordination to work in uncertain and adversarial environments. Especially with humanoid robots that lack inherent stability, a capable and robust motion controller is crucial for generating walking and kicking motions without losing balance. In this paper, we describe the details of a motion controller...

  6. The PROBE Framework for the Personalized Cloaking of Private Locations

    OpenAIRE

    Maria Luisa Damiani; Elisa Bertino; Claudio Silvestri

    2010-01-01

    The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscation (or cloaking), to protect location privacy is based on forwarding the LBS provider a coarse user location instead of the actual user location. Conventional approaches, based on such technique, are however based only on geometric methods and therefore are unable to assure privacy when the adversary is aware of the...

  7. Re-Imagining Punishment: An Exercise in “Intersectional Criminal Justiceâ€

    OpenAIRE

    Maya Pagni Barak

    2014-01-01

    Over the last 40 years a number of scholars have called upon fellow criminologists to rethink the field’s priorities and methods, as well as the American criminal justice system and current punishment practices. Drawing on alternative criminologies, including constitutive and peacemaking criminologies, as well as the practice of reintegrative shaming, this paper presents a new model of criminal justice that combines aspects of adversarial, restorative, social, and transformative justice fra...

  8. Re-Imagining Punishment: An Exercise in “Intersectional Criminal Justice”

    OpenAIRE

    Barak, Maya

    2014-01-01

    Over the last 40 years a number of scholars have called upon fellow criminologists to rethink the field’s priorities and methods, as well as the American criminal justice system and current punishment practices. Drawing on alternative criminologies, including constitutive and peacemaking criminologies, as well as the practice of reintegrative shaming, this paper presents a new model of criminal justice that combines aspects of adversarial, restorative, social, and transformative justice frame...

  9. Autoencoding beyond pixels using a learned similarity metric

    OpenAIRE

    Larsen, Anders Boesen Lindbo; Sønderby, Søren Kaae; Larochelle, Hugo; Winther, Ole

    2015-01-01

    We present an autoencoder that leverages learned representations to better measure similarities in data space. By combining a variational autoencoder with a generative adversarial network we can use learned feature representations in the GAN discriminator as basis for the VAE reconstruction objective. Thereby, we replace element-wise errors with feature-wise errors to better capture the data distribution while offering invariance towards e.g. translation. We apply our method to images of face...

  10. aDTN - Undetectable Communication in Wireless Delay-tolerant Networks (Working Draft)

    OpenAIRE

    Barroso, Ana

    2015-01-01

    This document describes a best-effort delay-tolerant communication system that protects the privacy of users in wireless ad-hoc networks by making their communication undetectable. The proposed system is a wireless broadcast-based adaptation of mix networks where each user belongs to at least one group it trusts, and each group acts as a mix node. Assuming encryption is not broken, it provides undetectability of all users and messages against external adversaries, as well as undetectability o...

  11. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    OpenAIRE

    Wei Yang; Liusheng Huang; Fang Song

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of...

  12. Cyber operations and Gray Zones:challenges for NATO

    OpenAIRE

    Fitton, Oliver James

    2016-01-01

    The Gray Zone represents a space between peaceful state rivalries and war. Within this space actors have developed hybrid strategies to extend their influence. This concept of conflict is best illustrated by Russia’s actions in Eastern Ukraine in 2014. Gray Zone doctrine leverages ambiguity to create an environment in which adversaries are unable to make strategic decisions in a timely and confident manner. Cyber Operations, because of the attribution problem, lend themselves to this kind of ...

  13. The Approach Of The Sports Press To Public Relations Activities in Turkey

    OpenAIRE

    OKAY, Aydemir

    2007-01-01

    Journalism and public relations are professional fields very close to each other. Despite some evidences regarding the usefulness of public relations supports on news work, a number of studies have described the perceptions of public relations practitioners and journalists as sometimes adversarial,  cooperative, or a love-hate relationship, and mostly skeptical toward each other. Most studies confirm that practitioners try to influence the news process and journalists try to defend against un...

  14. Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography

    OpenAIRE

    Ganesh, Vijay; Carbin, Michael; Rinard, Martin

    2012-01-01

    We propose a novel approach to improving software security called Cryptographic Path Hardening, which is aimed at hiding security vulnerabilities in software from attackers through the use of provably secure and obfuscated cryptographic devices to harden paths in programs. By "harden" we mean that certain error-checking if-conditionals in a given program P are replaced by equivalent" we mean that adversaries cannot use semi-automatic program analysis techniques to reason about the hardened pr...

  15. Bluetooth Low Energy - privacy enhancement for advertisement

    OpenAIRE

    Wang, Ping

    2014-01-01

    The aim of this project is to design, simulate, and implement a privacy enhancement protocol over BLE advertising channels. The design of the privacy enhancement is generic and modular. Due to the risk of privacy disclosure and device tracking by adversary, the main focus will be put on designing and implementing message confidentiality, replay prevention, and anti-tracking of device over BLE advertising channels. Bluetooth core specification 4.1 is used as baseline for design and implementat...

  16. Overview of Security Threats in WSN

    OpenAIRE

    Ms. Poonam Barua; Mr. Sanjeev Indora

    2013-01-01

    Wireless sensor network is a combination of tiny devices called as sensor nodes which havecomputing, sensing and processing capabilities. As WSN are deployed in hostile environment usually and canbe physically accessible by an adversary; he/she can affect the confidentiality and integrity of the data as wellas some other security measures. So security is a main concern in wireless sensor network especially inhostile environment. In this paper we focus on security requirements, security scheme...

  17. Application of SAFE to an operating reactor

    International Nuclear Information System (INIS)

    A method for the evaluation of physical protection systems at nuclear facilities has been developed. The evaluation process consists of five major phases: (1) Facility Characterization, (2) Facility Representation, (3) Component Performance, (4) Adversary Path Analysis, and (5) Effectiveness Evaluation. Each of these phases will be described in some detail and illustrated by examples. The process for evaluation of physical protection system effectiveness against an outside threat will be presented for a reactor facility

  18. Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation

    OpenAIRE

    Faonio, Antonio; Venturi, Daniele; Buus Nielsen, Jesper

    2014-01-01

    We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitrary (yet bounded) information on the entire state of the signer (sometimes known as fully leakage resilience). The main feature of our constructions, is that they o er a graceful degradation of security in situations where standard existential unforgeability is impossible. This property was recently put forward by Nielsen et al. (PKC 2014) to deal with setting...

  19. Security-by-experiment : lessons from responsible deployment in cyberspace

    OpenAIRE

    Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien

    2015-01-01

    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important ...

  20. CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks

    OpenAIRE

    Bishan Ying

    2014-01-01

    The nature of wireless sensor networks (WSNs) makes them very vulnerable to adversary's malicious attacks. Therefore, network security is an important issue to WSNs. Due to the constraints of WSN, intrusion detection in WSNs is a challengeable task. In this paper, we present a novel intrusion detection mechanism for WSNs, which is composed of a secure data communication algorithm and an intrusion detection algorithm. The major contribution of this paper is that we propose an original secure m...

  1. How to optimize joint theater ballistic missile defense

    OpenAIRE

    Diehl, Douglas D.

    2004-01-01

    Approved for public release, distribution is unlimited Many potential adversaries seek, or already have theater ballistic missiles capable of threatening targets of interest to the United States. The U.S. Missile Defense Agency and armed forces are developing and fielding missile interceptors carried by many different platforms, including ships, aircraft, and ground units. Given some exigent threat, the U.S. must decide where to position defensive platforms and how they should engage poten...

  2. LA PRUEBA DOCUMENTADA EN EL NUEVO SISTEMA DE JUSTICIA PENAL MEXICANO Documented proof in the new Mexican criminal justice system

    OpenAIRE

    Benavente Chorres Hesbert

    2010-01-01

    El presente estudio analiza los supuestos de prueba documentada regulados en aquellos códigos de las entidades federativas mexicanas que han adecuado el proceso penal al sistema acusatorio con tendencia adversarial. En ese sentido, se entiende por prueba documentada aquellas diligencias, principalmente declaraciones, realizadas durante la etapa de investigación que la ley otorga valor probatorio al no poder asistir el órgano de prueba a la audiencia del juicio oral por razones ajenas a su vol...

  3. Performance TTradeoffs in Distributed Control Systems

    Science.gov (United States)

    Borowski, Holly

    Large scale systems consisting of many interacting subsystems are often controlled in a distributed fashion due to inherent limitations in computation, communication, or sensing. Here, individual agents must make decisions based on local, often incomplete information. This dissertation focuses on understanding performance tradeoffs in distributed control systems, specifically focusing on using a game theoretic framework to assign agent control laws. Performance of a distributed control law is determined by (1) the degree with which it meets a stated objective, (2) the amount of time it takes to converge, (3) agents' informational requirements, and (4) vulnerability to adversarial manipulation. The three main research questions addressed in this work are: • When is fast convergence to near-optimal behavior possible in a distributed system? We design a distributed control law which converges to a near-optimal configuration in a time that is near-linear in the number of agents. This worst case convergence time is an improvement over existing algorithms whose worst-case convergence times are exponential in the number of agents. • Can agents in a distributed system learn near-optimal correlated behavior despite severely limited information about one another's behavior? We design a distributed control law that imposes limited informational requirements for individual agents and converges to near-optimal correlated behavior. • How does the structure of agent interaction impact a distributed control system's vulnerability to adversarial manipulation? We derive a graph theoretical condition that ensures resilience to adversarial manipulation, and we examine the conditions under which an adversary can manipulate collective behavior in a distributed control system, simply by influencing small subsets of agents.

  4. Efficient Certificate Management in VANET

    OpenAIRE

    Samara, Ghassan

    2012-01-01

    Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobile Ad Hoc Networks, in this research We propose a flexible, simple, and scalable design for VANET certificates, and new methods for efficient certificate management, which will Reduce channel overhead by eliminating the use of CRL, and make Better certificate Revocation Management. Also it will increase the security of the network and helps in identifying the adversary vehicle.

  5. Security Analysis of Vehicular Ad Hoc Networks (VANET)

    OpenAIRE

    Samara, Ghassan

    2012-01-01

    Vehicular Ad Hoc Networks (VANET) has mostly gained the attention of today's research efforts, while current solutions to achieve secure VANET, to protect the network from adversary and attacks still not enough, trying to reach a satisfactory level, for the driver and manufacturer to achieve safety of life and infotainment. The need for a robust VANET networks is strongly dependent on their security and privacy features, which will be discussed in this paper. In this paper a various types of ...

  6. Unattended ground sensors for Expeditionary Force 21 intelligence collections

    OpenAIRE

    Harrington, Ryan F.

    2015-01-01

    Approved for public release; distribution is unlimited As our adversaries continue to evolve in complexity, the U.S. Marines adapt in kind with its design and intent through its Expeditionary Force 21 (EF 21) Capstone. EF 21 stresses the need for increased persistent intelligence collections capabilities and the optimization of existing assets. Current requirements for Unattended Ground Sensors (UGS) limit usage in non-permissive environments beyond the Area of Operations, contrary to the ...

  7. Hybridkrig

    OpenAIRE

    Haande, Trond; Bjerga, Kjell Inge

    2011-01-01

    The study addresses hybrid warfare and its relevance to land operations conducted by the Norwegian Armed Forces. While the first part explores the recent phenomenon of hybrid warfare, the second asks whether hybrid warfare has any bearing on land operations. A land operation is a ground operation on Norwegian territory in which Norwegian Armed Forces engage conventional adversaries. Military theory traditionally recognises a dichotomy between guerrilla warfare and conventional ...

  8. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  9. Routing Data Authentication in Wireless Networks; TOPICAL

    International Nuclear Information System (INIS)

    In this paper, we discuss several specific threats directed at the routing data of an ad hoc network. We address security issues that arise from wrapping authentication mechanisms around ad hoc routing data. We show that this bolt-on approach to security may make certain attacks more difficult, but still leaves the network routing data vulnerable. We also show that under a certain adversarial model, most existing routing protocols cannot be secured with the aid of digital signatures

  10. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  11. Toward a Developmentally-Informed Approach to Parenting Interventions: Seeking Hidden Effects

    OpenAIRE

    Brock, Rebecca L.; Kochanska, Grazyna

    2016-01-01

    Drawing from developmental psychology and psychopathology, we propose a new, developmentally-informed approach to parenting interventions that focuses on elucidating changes in the unfolding developmental process between the parent and child. We present data from 186 low-income mothers of toddlers, randomly assigned to Child-Oriented Play group or Play-as-Usual group. We examined the maladaptive cascade from child difficulty to mother adversarial, negative parenting to child maladjustment, we...

  12. Passive nuclear material detection in a personnel portal

    International Nuclear Information System (INIS)

    The concepts employed in the development of gamma-ray and neutron detection systems for a special nuclear materials booth portal monitor are described. The portal is designed for unattended use in detecting diversion by a technically sophisticated adversary and has possible application to International Atomic Energy Agency safeguards of a fast critical assembly facility. Preliminary evaluation results are given and plans for further parameter studies are noted

  13. Formation of public attitudes to nuclear power

    International Nuclear Information System (INIS)

    Nuclear power has been plagued by public acceptance problems. Evidence suggests one of the key factors is poor communicaton between the scientific community and the general public. Although environmental enquiries provide a forum for the voicing of views, by adopting the adversary principle they have also resulted in polarizaton of public opinion, as experienced in Australia with the Ranger Environmental Enquiry. The problem of developing methods to enable a flow of objective informaton to and from the public requires urgent solution

  14. Optimal Construction of Regenerating Code through Rate-matching in Hostile Networks

    OpenAIRE

    Li, Jian; Li, Tongtong; Ren, Jian

    2015-01-01

    Regenerating code is a class of code very suitable for distributed storage systems, which can maintain optimal bandwidth and storage space. Two types of important regenerating code have been constructed: the minimum storage regeneration (MSR) code and the minimum bandwidth regeneration (MBR) code. However, in hostile networks where adversaries can compromise storage nodes, the storage capacity of the network can be significantly affected. In this paper, we propose two optimal constructions of...

  15. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  16. Securing Online Advertising

    OpenAIRE

    Vratonjic, Nevena; Freudiger, Julien; Felegyhazi, Mark; Hubaux, Jean-Pierre

    2008-01-01

    Online advertisement is a major source of revenues in the Internet. In this paper, we identify a number of vulnerabilities of current ad serving systems. We describe how an adversary can exploit these vulnerabilities to divert part of the ad revenue stream for its own benefit. We propose a scalable, secure ad serving scheme to fix this problem. We also explain why the deployment of this solution would benefit the Web browsing security in general.

  17. Advanced unattended sensors and systems: state of the art and future challenges

    Science.gov (United States)

    McQuiddy, John H.

    2010-04-01

    The unattended ground sensors (UGS) have come a long way over the more than 40 years they have been used to detect adversarial activities. From large, single phenomenology sensors with little signal processing and point to point communications the technology has now changed to small, intelligent sensors using network communications. This technology change has resulted in far more capable sensors but challenges remain for UGS to be effective in providing information to users.

  18. Symbolic Planning and Control Using Game Theory and Grammatical Inference

    OpenAIRE

    Fu, Jie; Tanner, Herbert G.; Heinz, Jeffrey; Chandlee, Jane; Karydis, Konstantinos; Koirala, Cesar

    2012-01-01

    This paper presents an approach that brings together game theory with grammatical inference and discrete abstractions in order to synthesize control strategies for hybrid dynamical systems performing tasks in partially unknown but rule-governed adversarial environments. The combined formulation guarantees that a system specification is met if (a) the true model of the environment is in the class of models inferable from a positive presentation, (b) a characteristic sample is observed, and (c)...

  19. HCA 459 Courses/sanptutorial

    OpenAIRE

    potik

    2015-01-01

    Organizational Survival Strategies. This discussion has two options. Please choose either Option A or Option B to respond to. Be sure to indicate within your post which option you chose. Option A: Hospitals frequently seek ways to ensure survival. Sometimes an adversarial climate cannot be avoided when the action that is being considered is controversial. For example, a hospital may seek to expand its market reach by opening an inpatient drug treatment facility in a small suburban townshi...

  20. HCA 459 uop / uophelp

    OpenAIRE

    uophelp

    2015-01-01

    Organizational Survival Strategies. This discussion has two options. Please choose either Option A or Option B to respond to. Be sure to indicate within your post which option you chose. Option A: Hospitals frequently seek ways to ensure survival. Sometimes an adversarial climate cannot be avoided when the action that is being considered is controversial. For example, a hospital may seek to expand its market reach by opening an inpatient drug treatment facility in a small suburban townshi...

  1. On the theoretical basis for plea bargaining system

    Institute of Scientific and Technical Information of China (English)

    WANG Jiancheng

    2006-01-01

    Before discussing the introduction of the plea bargaining system to China's criminal justice system,it is necessary to study its theoretical basis.Among which,the following aspects should be focused on: the philosophical viewpoint of pragmatism is its thinking basis;the concept of contract is its cultural basis;the structure form of adversary procedure is its systematic basis;and the system of fight to silence and discovery of evidence are its symbiotic basis.

  2. Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model

    Directory of Open Access Journals (Sweden)

    Geontae Noh

    2014-01-01

    from lattices are not even existentially unforgeable with respect to insider corruption. We then improve previous schemes by applying, for the first time, the concept of strong unforgeability with respect to insider corruption to a ring signature scheme in lattices. This offers more security than any previous ring signature scheme: adversaries cannot produce new signatures for any ring-message pair, including previously signed ring-message pairs.

  3. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    Science.gov (United States)

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  4. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Science.gov (United States)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  5. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  6. Comparison of two methods to quantify cyber and physical security effectiveness.

    Energy Technology Data Exchange (ETDEWEB)

    Wyss, Gregory Dane; Gordon, Kristl A.

    2005-11-01

    With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

  7. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  8. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  9. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  10. Are you threatening me?: Towards smart detectors in watermarking

    Science.gov (United States)

    Barni, Mauro; Comesaña-Alfaro, Pedro; Pérez-González, Fernando; Tondi, Benedetta

    2014-02-01

    We revisit the well-known watermarking detection problem, also known as one-bit watermarking, in the presence of an oracle attack. In the absence of an adversary, the design of the detector generally relies on probabilistic formulations (e.g., Neyman-Pearson's lemma) or on ad-hoc solutions. When there is an adversary trying to minimize the probability of correct detection, game-theoretic approaches are possible. However, they usually assume that the attacker cannot learn the secret parameters used in detection. This is no longer the case when the adversary launches an oracle-based attack, which turns out to be extremely effective. In this paper, we discuss how the detector can learn whether it is being subject to such an attack, and take proper measures. We present two approaches based on different attacker models. The first model is very general and makes minimum assumptions on attacker's beaver. The second model is more specific since it assumes that the oracle attack follows a weel-defined path. In all cases, a few observations are sufficient to the watermark detector to understand whether an oracle attack is on going.

  11. Nuclear Industry Sector Force on Force Exercises: Experiences in The Netherlands

    International Nuclear Information System (INIS)

    Nuclear facilities spend substantial and time on designing effective security systems and putting detection, delay and response measures in place. Having done this, facilities hardly ever get in the situation where they need to actively use these security measures to counter an actual threat. This results in three important questions that need to be considered: 1. How do we know that the technical security measures are in effective in detecting and withstanding a real-life, intelligent and creative adversary? 2. How do we ensure that (and train that) especially the guards – who in normal working life hardly ever encounter any adversaries – are continuously alert to detect and counter threats that surface unexpectedly? 3. How well is not only the guard force, but also the facilities as a whole prepared to withstand combined attach scenarios, including physical, social engineering and cyber scenarios? This paper discusses how the security managers of nuclear facilities in The Netherlands collaboratively addressed the questions above by developing in industry sector wide Force on Force exercises team. This team comprises members of all nuclear facilities in The Netherlands and performs as adversary test team unannounced security exercises at those facilities. (author)

  12. Hybrid onboard and ground based digital channelizer beam-forming for SATCOM interference mitigation and protection

    Science.gov (United States)

    Xiong, Wenhao; Wang, Gang; Tian, Xin; Pham, Khanh; Blasch, Erik; Chen, Genshe

    2016-05-01

    In this work, we propose a novel beam-forming power allocation method for a satellite communication (SATCOM) multiple-input multiple-output (MIMO) system to mitigate the co-channel interference (CCI) as well as limiting the signal leakage to the adversary users. In SATCOM systems, the beam-forming technique is a conventional way of avoiding interference, controlling the antenna beams, and mitigating undesired signals. We propose to use an advanced beam-forming technique which considers the number of independent channels used and transmitting power deployed to reduce and mitigate the unintentional interference effect. With certain quality of service (QoS) for the SATCOM system, independent channels components will be selected. It is desired to use less and stronger channel components when possible. On the other hand, considering that SATCOM systems often face the problem that adversary receiver detects the signal, a proposed power allocation method can efficiently reduce the received power at the adversary receiver. To reduce the computational burden on the transponder in order to minimize the size, mass, power consumption and delay for the satellite, we apply a hybrid onboard and ground based beam-forming design to distribute the calculation between the transponder and ground terminals. Also the digital channelizer beam-forming (DCB) technique is employed to achieve dynamic spatial control.

  13. Potential threat to licensed nuclear activities from insiders (insider study). Technical report

    International Nuclear Information System (INIS)

    The Insider Study was undertaken by NRC staff at the request of the Commission. Its objectives were to: (1) determine the characteristics of potential insider adversaries to licensed nuclear activities; (2) examine security system vulnerabilities to insider adversaries; and (3) assess the effectiveness of techniques used to detect or prevent insider malevolence. The study analyzes insider characteristics as revealed in incidents of theft or sabotage that occurred in the nuclear industry, analogous industries, government agencies, and the military. Adversary characteristics are grouped into four categories: position-related, behavioral, resource and operational. It also analyzes (1) the five security vulnerabilities that most frequently accounted for the success of the insider crimes in the data base; (2) the 11 means by which insider crimes were most often detected; and (3) four major and six lesser methods aimed at preventing insider malevolence. In addition to case history information, the study contains data derived from non-NRC studies and from interviews with over 100 security experts in industry, government (federal and state), and law enforcement

  14. Cops and Invisible Robbers: the Cost of Drunkenness

    CERN Document Server

    Kehagias, Athanasios; Pralat, Pawel

    2012-01-01

    We examine a version of the Cops and Robber (CR) game in which the robber is invisible, i.e., the cops do not know his location until they capture him. Apparently this game (CiR) has received little attention in the CR literature. We examine two variants: in the first the robber is adversarial (he actively tries to avoid capture); in the second he is drunk (he performs a random walk). Our goal in this paper is to study the invisible Cost of Drunkenness (iCOD), which is defined as the ratio ct_i(G)/dct_i(G), with ct_i(G) and dct_i(G) being the expected capture times in the adversarial and drunk CiR variants, respectively. We show that these capture times are well defined, using game theory for the adversarial case and partially observable Markov decision processes (POMDP) for the drunk case. We give exact asymptotic values of iCOD for several special graph families such as $d$-regular trees, give some bounds for grids, and provide general upper and lower bounds for general classes of graphs. We also give an in...

  15. Vulnerability assessment using two complementary analysis tools

    Energy Technology Data Exchange (ETDEWEB)

    Paulus, W.K.

    1993-07-01

    To analyze the vulnerability of nuclear materials to theft or sabotage, Department of Energy facilities have been using, since 1989, a computer program called ASSESS, Analytic System and Software for Evaluation of Safeguards and Security. During the past year Sandia National Laboratories has begun using an additional program, SEES, Security Exercise Evaluation Simulation, enhancing the picture of vulnerability beyond what either program achieves alone. Assess analyzes all possible paths of attack on a target and, assuming that an attack occurs, ranks them by the probability that a response force of adequate size can interrupt the attack before theft or sabotage is accomplished. A Neutralization module pits, collectively, a security force against the interrupted adversary force in a fire fight and calculates the probability that the adversaries are defeated. SEES examines a single scenario and simulates in detail the interactions among all combatants. its output includes shots fired between shooter and target, and the hits and kills. Whereas ASSESS gives breadth of analysis, expressed statistically and performed relatively quickly, SEES adds depth of detail, modeling tactical behavior. ASSESS finds scenarios that exploit the greatest weakness of a facility. SEES explores these scenarios to demonstrate in detail how various tactics to nullify the attack might work out. Without ASSESS to find the facility weakness, it is difficult to focus SEES objectively on scenarios worth analyzing. Without SEES to simulate the details of response vs. adversary interaction, it is not possible to test tactical assumptions and hypotheses. Using both programs together, vulnerability analyses achieve both breadth and depth.

  16. Determining Solution Space Characteristics for Real-Time Strategy Games and Characterizing Winning Strategies

    Directory of Open Access Journals (Sweden)

    Kurt Weissgerber

    2011-01-01

    Full Text Available The underlying goal of a competing agent in a discrete real-time strategy (RTS game is to defeat an adversary. Strategic agents or participants must define an a priori plan to maneuver their resources in order to destroy the adversary and the adversary's resources as well as secure physical regions of the environment. This a priori plan can be generated by leveraging collected historical knowledge about the environment. This knowledge is then employed in the generation of a classification model for real-time decision-making in the RTS domain. The best way to generate a classification model for a complex problem domain depends on the characteristics of the solution space. An experimental method to determine solution space (search landscape characteristics is through analysis of historical algorithm performance for solving the specific problem. We select a deterministic search technique and a stochastic search method for a priori classification model generation. These approaches are designed, implemented, and tested for a specific complex RTS game, Bos Wars. Their performance allows us to draw various conclusions about applying a competing agent in complex search landscapes associated with RTS games.

  17. Preventing ADDOS Attack by Using Secure TRNG Based Port Hopping

    Directory of Open Access Journals (Sweden)

    T. Siva

    2013-01-01

    Full Text Available Now a day`s each and every where we are using client-server communication for different information service systems. Normally client server communication can be differentiating by using IP Address and Protocol Port number from one machine to another machine. In network environment we are already having DOS/DDOS Attacks Another Subset of this attack scenario is DOS/DDOS attack is Application Denial of Service(ADOSattack ,In this the adversary attacks open Ports/Ideal ports present at server side for this the adversary Know need huge machines ,zombie systems and no need sending packets of data with high bandwidth. To control this type of A-DOS attacks the existing enterprise security devices are not suitable like firewalls, anti-viruses and IDS/IPS Systems why because the adversary not using high bandwidth, spam messages, zombie`s or botnet`s for their attack scenarios.To safeguard this type of DOS/DDOS or Application denial of service attacks we are having some port hopping mechanisms i.e Port hopping by using Pseudo Random Number Generation (PRNGbased port hopping ,Acknowledgement based port hopping and proactive Reinitialization based on this existing once and their disadvantages like in PRNG attackers can predict the random number generation by using pre-calculated list or based on mathemathical functions .we introduce new port hopping technique i.e True Random Number Generation based port hopping

  18. Use of Multi-attribute Utility Functions in Evaluating Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C; Lamont, A; Sicherman, A

    2008-06-13

    In analyzing security systems, we are concerned with protecting a building or facility from an attack by an adversary. Typically, we address the possibility that an adversary could enter a building and cause damage resulting in an immediate loss of life, or at least substantial disruption in the operations of the facility. In response to this setting, we implement security systems including devices, procedures, and facility upgrades designed to (a) prevent the adversary from entering, (b) detect and neutralize him if he does enter, and (c) harden the facility to minimize damage if an attack is carried out successfully. Although we have cast this in terms of physical protection of a building, the same general approach can be applied to non-physical attacks such as cyber attacks on a computer system. A rigorous analytic process is valuable for quantitatively evaluating an existing system, identifying its weaknesses, and proposing useful upgrades. As such, in this paper we describe an approach to assess the degree of overall protection provided by security measures. Our approach evaluates the effectiveness of the individual components of the system, describes how the components work together, and finally assesses the degree of overall protection achieved. This model can then be used to quantify the amount of protection provided by existing security measures, as well as to address proposed upgrades to the system and help identify a robust and cost effective set of improvements. Within the model, we use multiattribute utility functions to perform the overall evaluations of the system.

  19. Applying Pebble-Rotating Game to enhance the robustness of DHTs.

    Directory of Open Access Journals (Sweden)

    Liyong Ren

    Full Text Available Distributed hash tables (DHTs are usually used in the open networking environment, where they are vulnerable to Sybil attacks. Pebble-Rotating Game (PRG mixes the nodes of the honest and the adversarial randomly, and can resist the Sybil attack efficiently. However, the adversary may have some tricks to corrupt the rule of PRG. This paper proposes a set of mechanisms to make the rule of PRG be obliged to obey. A new joining node must ask the Certificate Authority (CA for its signature and certificate, which records the complete process on how a node joins the network and obtains the legitimacy of the node. Then, to prevent the adversary from accumulating identifiers, any node can make use of the latest certificate to judge whether one identifier is expired with the help of the replacement property of RPG. This paper analyzes in details the number of expired certificates which are needed to store in every node, and gives asymptotic solution of this problem. The analysis and simulations show that the mean number of the certificates stored in each node are [Formula: see text], where n is the size of the network.

  20. Applying Pebble-Rotating Game to enhance the robustness of DHTs.

    Science.gov (United States)

    Ren, Liyong; Nie, Xiaowen; Dong, Yuchi

    2013-01-01

    Distributed hash tables (DHTs) are usually used in the open networking environment, where they are vulnerable to Sybil attacks. Pebble-Rotating Game (PRG) mixes the nodes of the honest and the adversarial randomly, and can resist the Sybil attack efficiently. However, the adversary may have some tricks to corrupt the rule of PRG. This paper proposes a set of mechanisms to make the rule of PRG be obliged to obey. A new joining node must ask the Certificate Authority (CA) for its signature and certificate, which records the complete process on how a node joins the network and obtains the legitimacy of the node. Then, to prevent the adversary from accumulating identifiers, any node can make use of the latest certificate to judge whether one identifier is expired with the help of the replacement property of RPG. This paper analyzes in details the number of expired certificates which are needed to store in every node, and gives asymptotic solution of this problem. The analysis and simulations show that the mean number of the certificates stored in each node are [Formula: see text], where n is the size of the network. PMID:23776485

  1. Continuous Time Channels with Interference

    CERN Document Server

    Ivan, Ioana; Thaler, Justin; Yuen, Henry

    2012-01-01

    Khanna and Sudan studied a natural model of continuous time channels where signals are corrupted by the effects of both noise and delay, and showed that, surprisingly, in some cases both are not enough to prevent such channels from achieving unbounded capacity. Inspired by their work, we consider channels that model continuous time communication with adversarial delay errors. The sender is allowed to subdivide time into arbitrarily large number $M$ of micro-units in which binary symbols may be sent, but the symbols are subject to unpredictable delays and may interfere with each other. We model interference by having symbols that land in the same micro-unit of time be summed, and a $k$-interference channels allows receivers to distinguish sums up to the value $k$. We consider both a channel adversary that has a limit on the maximum number of steps it can delay each symbol, and a more powerful adversary that only has a bound on the average delay. We give precise characterizations of the threshold between finite...

  2. Defense in depth used in the physical protection of nuclear power plants

    International Nuclear Information System (INIS)

    Full text: This PowerPoint presentation has the following contents: 1. Introduction; 2. The fundamental principle 'I': Defense in depth. - Defense in depth and the Design Basis Threat. - Defense in depth and a physical protection concept; 3. Defense in depth - safety functions; 4. Defense in depth - physical protection functions; 5. Defense in depth and consequence analyses; 6. Conclusions. By document referenced GOV/2001/41 of the 15th of August 2001, the Board of Governors of IAEA has acknowledged twelve fundamental principles of physical protection for nuclear materials and nuclear facilities. These principles will be integrated into the forthcoming revision of the International Convention on Physical Protection. One of these fundamental principles, the principle 'I', deals with defense in depth. The State's requirements for physical protection should reflect a concept of several layers and methods of protection (structural or other technical, personnel and organizational) that have to be overcome or circumvented by an adversary in order to achieve his objectives. The questions of how to accomplish this fundamental principle and how is the adversary defined and what are his objectives are discussed. As well defined, the Design Basis Threat (DBT) is the starting point for a defense in depth physical protection of a NPP. The following cases are exposed: - Demonstrators; - Malvolent demonstrators; - Insider; - Terrorist attack (outsider); - Co-operation outsider - insider; while the following terrorism objectives could be in view, namely, theft of nuclear material and/or sabotage (major release of radioactive material from the NPP). The defense in depth and the physical protection concept concern a general scope i.e. outer protected area, inner protected area, vital areas inside inner protected areas, and technical and personnel protection measures to accomplish the requirements, while, in particular, one protects a facility against single objectives of an

  3. CONTRADICTORIALITATEA ÎN CORAPORT CU ALTE PRINCIPII ALE PROCESULUI PENAL

    Directory of Open Access Journals (Sweden)

    Lucia RUSU

    2016-03-01

    Full Text Available În legătură cu reformarea sistemului judiciar şi schimbările intervenite în viaţa social-politică a statului nostru, prin­cipiul contradictorialităţii a obţinut o nouă rezonanţă din considerentul că reforma judiciară şi de drept este legată direct de contradictorialitate. Reforma legii procesual penale trebuie să fie fundamentată pe o temelie teoretică solidă. Contra­dictorialitatea, însă, în calitate de noţiune juridică, este insuficient cercetată în doctrina dreptului procesual penal. La ziua de azi, specialişti notorii în domeniul dreptului procesual penal analizează şi studiază importanţa fundamentelor şi principiilor de bază ale procesului penal şi, în primul rând, contradictorialitatea acestuia. Legea procesual penală a Republicii Moldova cunoaşte o evoluţie şi dezvoltate în sensul democratizării şi lărgirii începuturilor contradictoriale în înfăptuirea justiţiei. Aceasta e şi firesc, deoarece contradictorialitatea are o importanţă enormă pentru întregul sistem al procesului penal, determinând în mare parte statutul juridic şi raporturile dintre participanţii la procesul penal, precum şi relaţiile juridice stabilite între participanţii la acest proces şi instanţa de judecată. CONTRADICTION AND ITS CORRELATION WITH OTHER PRINCIPLES OF THE CRIMINAL PROCEEDINGIn connection with the judiciary system reforming and changes in socio-political life of our state, the adversarial principle has gained a new resonance on the grounds that the judicial and legal reform is directly linked to adversariality. The reform of the criminal procedure law must be based on solid theoretical foundation. However, adversariality, as legal concept, is not enough investigated in the doctrine of the criminal procedure law. Currently, notorious specialists in the field of criminal procedure law examine and study the importance of fundamentals and basic principles of the criminal process and

  4. AVNG as a Test Case for Cooperative Design

    International Nuclear Information System (INIS)

    Designing a measurement system that might be used in a nuclear facility is a challenging, if not daunting, proposition. The situation is made more complicated when the system needs to be designed to satisfy the disparate requirements of a monitoring and a host party - a relationship that could prove to be adversarial. The cooperative design of the elements of the AVNG (Attribute Verification with Neutrons and Gamma Rays) system served as a crucible that exercised the possible pitfalls in the design and implementation of a measurement system that could be used in a host party nuclear facility that satisfied the constraints of operation for both the host and monitoring parties. Some of the issues that needed to be addressed in the joint design were certification requirements of the host party and the authentication requirements of the monitoring party. In this paper the nature of the problem of cooperative design will be introduced. The details of cooperative design revolve around the idiosyncratic nature of the adversarial relationship between the parties involved in a possible measurement regime, particularly if measurements on items that may contain sensitive information are being pursued. The possibility of an adversarial interaction is more likely if an information barrier is required for the measurement system. The origin of the antagonistic elements of the host party and hosted party relationship will be considered. In addition, some of the conclusions will be presented that make cooperative design (and development) proceed more efficiently. Finally, some lessons learned will be presented as a result of this expedition into cooperative design.

  5. Final report and documentation for the security enabled programmable switch for protection of distributed internetworked computers LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Van Randwyk, Jamie A.; Robertson, Perry J.; Durgin, Nancy Ann; Toole, Timothy J.; Kucera, Brent D.; Campbell, Philip LaRoche; Pierson, Lyndon George

    2010-02-01

    An increasing number of corporate security policies make it desirable to push security closer to the desktop. It is not practical or feasible to place security and monitoring software on all computing devices (e.g. printers, personal digital assistants, copy machines, legacy hardware). We have begun to prototype a hardware and software architecture that will enforce security policies by pushing security functions closer to the end user, whether in the office or home, without interfering with users' desktop environments. We are developing a specialized programmable Ethernet network switch to achieve this. Embodied in this device is the ability to detect and mitigate network attacks that would otherwise disable or compromise the end user's computing nodes. We call this device a 'Secure Programmable Switch' (SPS). The SPS is designed with the ability to be securely reprogrammed in real time to counter rapidly evolving threats such as fast moving worms, etc. This ability to remotely update the functionality of the SPS protection device is cryptographically protected from subversion. With this concept, the user cannot turn off or fail to update virus scanning and personal firewall filtering in the SPS device as he/she could if implemented on the end host. The SPS concept also provides protection to simple/dumb devices such as printers, scanners, legacy hardware, etc. This report also describes the development of a cryptographically protected processor and its internal architecture in which the SPS device is implemented. This processor executes code correctly even if an adversary holds the processor. The processor guarantees both the integrity and the confidentiality of the code: the adversary cannot determine the sequence of instructions, nor can the adversary change the instruction sequence in a goal-oriented way.

  6. Within a Stone's Throw: Proximal Geolocation of Internet Users via Covert Wireless Signaling

    Energy Technology Data Exchange (ETDEWEB)

    Paul, Nathanael R [ORNL; Shue, Craig [Worcester Polytechnic Institute, Worcester; Taylor, Curtis [Worcester Polytechnic Institute, Worcester

    2013-01-01

    While Internet users may often believe they have anonymity online, a culmination of technologies and recent research may allow an adversary to precisely locate an online user s geophysical location. In many cases, such as peer-to-peer applications, an adversary can easily use a target s IP address to quickly obtain the general geographical location of the target. Recent research has scoped this general area to a 690m (0.43 mile) radius circle. In this work, we show how an adversary can exploit Internet communication for geophysical location by embedding covert signals in communication with a target on a remote wireless local area network. We evaluated the approach in two common real-world settings: a residential neighborhood and an apartment building. In the neighborhood case, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes. Directional antennas may have allowed even more precise geolocation. This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. This low rate allowed the observer to exclude false locations and continue searching for the target. Our results enable law enforcement or copyright holders to quickly locate online Internet users without requiring time-consuming subpoenas to Internet Service Providers. Other privacy use cases include rapidly locating individuals based on their online speech or interests. We hope to raise awareness of these issues and to spur discussion on privacy and geolocating techniques.

  7. Evaluating Moving Target Defense with PLADD

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Stephen T. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Outkin, Alexander V. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Gearhart, Jared Lee [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Hobbs, Jacob Aaron [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Siirola, John Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Phillips, Cynthia A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Verzi, Stephen Joseph [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Tauritz, Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Mulder, Samuel A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Naugle, Asmeret Bier [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-15

    This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. We show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.

  8. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  9. On the Security of HB# against a Man-in-the-Middle Attack

    OpenAIRE

    Ouafi, Khaled; Overbeck, Raphael; Vaudenay, Serge

    2008-01-01

    At EuroCrypt ’08, Gilbert, Robshaw and Seurin proposed HB# to improve on HB+ in terms of transmission cost and security against man-in-the-middle attacks. Although the security of HB# is formally proven against a certain class of man- in-the-middle adversaries, it is only conjectured for the general case. In this paper, we present a general man-in-the-middle attack against HB# and Random-HB#, which can also be applied to all anterior HB-like protocols, that recovers the shared secret i...

  10. Infeasibility of Quantum Cryptography Without Eavesdropping Check

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang; Wang, Qiyan

    Secure key distribution is impossible in pure classical environment. Unconditional secure key distribution is available when quantum means are introduced, assisted by a classical communication channel. What is possible when a quantum key distribution scheme is without classical communication? We present a general model with this constraint and show that quantum key distribution without classical eavesdropping check is in principle impossible. For an adversary can always succeed in obtaining the secret key via a special case of man-in-the-middle attack, namely intercept-and-forward attack without any risk of being captured.

  11. A SECURE KEY MANAGEMENT TECHNIQUE FOR WIRELESS BODY AREA NETWORKS

    OpenAIRE

    Venkatasubramanian Sivaprasatham; Jothi Venkateswaran

    2012-01-01

    In Wireless Body Area Networks (WBAN), the key factors to be considered for transmission of confidential data are security and privacy as it is mostly having applications in emergency medical response systems. The lack of security may lead to loss of data privacy resulting in an adversary to bring in bogus data or altering the legal ones. Hence in this study, a secure key management technique for WBAN is proposed. The proposed architecture consists of a set of WBANs connected to the master se...

  12. Noiseless Steganography The Key to Covert Communications

    CERN Document Server

    Desoky, Abdelrahman

    2012-01-01

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b

  13. The NATO-Russia Council - a Success?

    OpenAIRE

    2010-01-01

    After the end of the Cold War and the dissolution of the Soviet Union in 1991, NATO and Russia concluded that «they no longer regarded each other as adversaries» (NATO, 1997).They also soon began a gradual rapprochement. In 1997, the Founding Act was created, and in 2002, the NATO-Russia Council (NRC) was established. The aim of the NRC was to treat the actors as equal partners, build trust, practical cooperation and become the main forum for crisis and security consultation between NATO and ...

  14. Raising Africa?: Celebrity and the Rhetoric of the White Saviour

    OpenAIRE

    Katherine M. Bell

    2013-01-01

    The ‘White Savour’ is a timeworn vehicle for celebrities in Hollywood film, where actors perform as heroes who save the day against dark and ominous adversaries. Pop stars take on personas and ‘exotic’ characters as well. And with increasing visibility, the famous perform real-life hero roles as philanthropists for social causes around the so-called ‘developing’ world. This essay explores how the celebrity philanthropist is constructed as redeemer of distant Others and how this role mingles w...

  15. Exponential Separation of Quantum and Classical One-Way Communication Complexity for a Boolean Function

    CERN Document Server

    Gavinsky, D; Kempe, J; Gavinsky, Dmitry; Kempe, Julia; Wolf, Ronald de

    2006-01-01

    We give an exponential separation between one-way quantum and classical communication complexity for a Boolean function. Earlier such a separation was known only for a relation. A very similar result was obtained earlier but independently by Kerenidis and Raz [KR06]. Our version of the result gives an example in the bounded storage model of cryptography, where the key is secure if the adversary has a certain amount of classical storage, but is completely insecure if he has a similar amount of quantum storage.

  16. Bot, Cyborg and Automated Turing Test

    Science.gov (United States)

    Yan, Jeff

    The Automated Turing test (ATT) is almost a standard security technique for addressing the threat of undesirable or malicious bot programs. In this paper, we motivate an interesting adversary model, cyborgs, which are either humans assisted by bots or bots assisted by humans. Since there is always a human behind these bots, or a human can always be available on demand, ATT fails to differentiate such cyborgs from humans. The notion of “telling humans and cyborgs apart” is novel, and it can be of practical relevance in network security. Although it is a challenging task, we have had some success in telling cyborgs and humans apart automatically.

  17. How to deal with malleability of BitCoin transactions

    OpenAIRE

    Andrychowicz, Marcin; Dziembowski, Stefan; Malinowski, Daniel; Mazurek, Łukasz

    2013-01-01

    BitCoin transactions are malleable in a sense that given a transaction an adversary can easily construct an equivalent transaction which has a different hash. This can pose a serious problem in some BitCoin distributed contracts in which changing a transaction's hash may result in the protocol disruption and a financial loss. The problem mostly concerns protocols, which use a "refund" transaction to withdraw a deposit in a case of the protocol interruption. In this short note, we show a gener...

  18. Iran and Britain: The Politics of Oil and Coup D’état before the Fall of Reza Shah

    OpenAIRE

    Behravesh, Maysam

    2010-01-01

    British strategy in the Middle East consolidated around a sustained effort to prevent any adversarial penetration into the Persian Gulf, defending its position athwart the principal lines of communication and supply between Northern Europe and British India, and to protect the newly discovered Persian oil that was used to power the Royal Navy. Since the discovery of oil in 1908 by D’Arcy’s oil exploration company, and especially after the end of World War One in 1918, until the start of Mosad...

  19. A secure email login system using virtual password

    CERN Document Server

    Doshi, Nishant

    2010-01-01

    In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual password system. In virtual password system they have used linear randomized function to be secure against identity theft attacks, phishing attacks, keylogging attack and shoulder surfing system. In ICC 2010 Li's given a security attack on the Lei's work. This paper gives modification on Lei's work to prevent the Li's attack with reducing the server overhead. This paper also discussed the problems with current password recovery system and gives the better approach.

  20. Credible nuclear deterrence for Japan

    OpenAIRE

    Rasmussen, David C.

    2000-01-01

    The credibility of the U.S. nuclear deterrent extended to Japan has decreased in recent years due to the declining role of nuclear weapons in U.S. strategy. The U.S. nuclear guarantee is an important element of Japan's security strategy, and the United States should maintain it. To reassure Japan of U.S. nuclear commitments without provoking domestic Japanese opposition or potential adversaries, the United States should improve the perception of its resolve to defend Japan with nuclear weapon...

  1. Enhance Confidentiality of Threshold Signature for MANET

    Institute of Scientific and Technical Information of China (English)

    GUO Wei; XIONG Zhongwei

    2006-01-01

    The participating wireless mobile node that mobile ad hoc network (MANET) communications need to forward may be malicious. That means not only adversary might be able to acquire some sensitive information of the threshold signatures from the compromised node, but also the partial signatures may be fabricated by malicious node, the advantages of threshold signatures would disappear. Signing and encrypting the sensitive information of the threshold signatures, and only the specified receiver can recover it, which will improve the confidentiality of threshold signatures. The security analysis shows the method is suitable for the secure characteristic of MANET that has the malicious nodes, and the message transmission is secure can against the attack.

  2. Covert Communication over Classical-Quantum Channels

    OpenAIRE

    Sheikholeslami, Azadeh; Bash, Boulat A.; Towsley, Donald; Goeckel, Dennis; Guha, Saikat

    2016-01-01

    Recently, the fundamental limits of covert, i.e., reliable-yet-undetectable, communication have been established for general memoryless channels and for lossy-noisy bosonic (quantum) channels with a quantum-limited adversary. The key import of these results was the square-root law (SRL) for covert communication, which states that $O(\\sqrt{n})$ covert bits, but no more, can be reliably transmitted over $n$ channel uses with $O(\\sqrt{n})$ bits of secret pre-shared between communicating parties....

  3. Simulation of the effectiveness evaluation process of security systems

    Science.gov (United States)

    Godovykh, A. V.; Stepanov, B. P.; Sheveleva, A. A.; Sharafieva, K. R.

    2016-06-01

    The paper is devoted to issues of creation of cross-functional analytical complex for simulation of the process of operation of the security system elements. Basic objectives, a design concept and an interrelation of main elements of the complex are described. The proposed conception of the analytical complex provides an opportunity to simulate processes for evaluating the effectiveness of physical protection system of a nuclear facility. The complex uses models, that take into account features of the object, parameters of technical means and tactics of adversaries. Recommendations were made for applying of this conception for training specialists in the field of physical protection of nuclear materials.

  4. Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent

    OpenAIRE

    Le Blond, Stevens; Legout, Arnaud; Le Fessant, Fabrice; Dabbous, Walid; Kaafar, Mohamed Ali

    2010-01-01

    International audience This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show that a few content providers inject most contents into BitTorrent and th...

  5. 基于BLS签名的弹性泄露签名方案(英文)

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Digital signature,one of the most important cryptographic primitives,has been commonly used in information systems,and thus enhancing the security of a signature scheme can benefit such an application.Currently,leakage-resilient cryptography is a very hot topic in cryptographic research.A leakage-resilient cryptographic primitive is said to be secure if arbitrary but bounded information about the signer's secret key(involving other states) is leaked to an adversary.Obviously,the leakage-resilient signature ...

  6. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Kizhvatov, Ilya; Manzoor, Kamran;

    2016-01-01

    , this algorithm outputs the full combined keys in the optimal order – from more likely to less likely ones. OKEA uses plenty of memory by its nature though, which limits its practical efficiency. Especially in the cases where the side-channel traces are noisy, the memory and running time requirements to find...... the advantage at the example of a DPA attack on an 8-bit embedded software implementation of AES-128. We vary the number of traces available to the adversary and report a significant increase in the success rate of the key recovery due to SKEA when compared to OKEA, within practical limitations on time...

  7. Trojan Horse attacks on Quantum Key Distribution systems

    CERN Document Server

    Gisin, Nicolas; Kraus, B; Zbinden, H; Ribordy, G

    2005-01-01

    General Trojan horse attacks on quantum key distribution systems are analyzed. We illustrate the power of such attacks with today's technology and conclude that all system must implement active counter-measures. In particular all systems must include an auxiliary detector that monitors any incoming light. We show that such counter-measures can be efficient, provided enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan horse attacks.

  8. Influence versus intent for predictive analytics in situation awareness

    Science.gov (United States)

    Cui, Biru; Yang, Shanchieh J.; Kadar, Ivan

    2013-05-01

    Predictive analytics in situation awareness requires an element to comprehend and anticipate potential adversary activities that might occur in the future. Most work in high level fusion or predictive analytics utilizes machine learning, pattern mining, Bayesian inference, and decision tree techniques to predict future actions or states. The emergence of social computing in broader contexts has drawn interests in bringing the hypotheses and techniques from social theory to algorithmic and computational settings for predictive analytics. This paper aims at answering the question on how influence and attitude (some interpreted such as intent) of adversarial actors can be formulated and computed algorithmically, as a higher level fusion process to provide predictions of future actions. The challenges in this interdisciplinary endeavor include drawing existing understanding of influence and attitude in both social science and computing fields, as well as the mathematical and computational formulation for the specific context of situation to be analyzed. The study of `influence' has resurfaced in recent years due to the emergence of social networks in the virtualized cyber world. Theoretical analysis and techniques developed in this area are discussed in this paper in the context of predictive analysis. Meanwhile, the notion of intent, or `attitude' using social theory terminologies, is a relatively uncharted area in the computing field. Note that a key objective of predictive analytics is to identify impending/planned attacks so their `impact' and `threat' can be prevented. In this spirit, indirect and direct observables are drawn and derived to infer the influence network and attitude to predict future threats. This work proposes an integrated framework that jointly assesses adversarial actors' influence network and their attitudes as a function of past actions and action outcomes. A preliminary set of algorithms are developed and tested using the Global Terrorism

  9. A simulation environment for modeling and development of algorithms for ensembles of mobile microsystems

    Science.gov (United States)

    Fink, Jonathan; Collins, Tom; Kumar, Vijay; Mostofi, Yasamin; Baras, John; Sadler, Brian

    2009-05-01

    The vision for the Micro Autonomous Systems Technologies MAST programis to develop autonomous, multifunctional, collaborative ensembles of agile, mobile microsystems to enhance tactical situational awareness in urban and complex terrain for small unit operations. Central to this vision is the ability to have multiple, heterogeneous autonomous assets to function as a single cohesive unit, that is adaptable, responsive to human commands and resilient to adversarial conditions. This paper represents an effort to develop a simulation environment for studying control, sensing, communication, perception, and planning methodologies and algorithms.

  10. Proceedings of the fourth international conference and exhibition: World Congress on superconductivity. Volume 1

    International Nuclear Information System (INIS)

    The goals of the World Congress on Superconductivity (WCS) have been to establish and foster the development and commercial application of superconductivity technology on a global scale by providing a non-adversarial, non-advocacy forum where scientists, engineers, businessmen and government personnel can freely exchange information and ideas on recent developments and directions for the future of superconductive research. Sessions were held on: accelerator technology, power and energy, persistent magnetic fields, performance characterization, physical properties, fabrication methodology, superconductive magnetic energy storage (SMES), thin films, high temperature materials, device applications, wire fabrication, and granular superconductors. Individual papers are indexed separately

  11. Structured Assessment Approach: a procedure for the assessment of fuel cycle safeguard systems

    Energy Technology Data Exchange (ETDEWEB)

    Parziale, A.A.; Patenaude, C.J.; Renard, P.A.; Sacks, I.J.

    1980-03-06

    Lawrence Livermore National Laboratory has developed and tested for the United States Nuclear Regulatory Commission a procedure for the evaluation of Material Control and Accounting (MC and A) Systems at Nuclear Fuel Facilities. This procedure, called the Structured Assessment Approach, SAA, subjects the MC and A system at a facility to a series of increasingly sophisticated adversaries and strategies. A fully integrated version of the computer codes which assist the analyst in this assessment was made available in October, 1979. The concepts of the SAA and the results of the assessment of a hypothetical but typical facility are presented.

  12. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  13. On the Complexity of Additively Homomorphic UC Commitments

    DEFF Research Database (Denmark)

    Trifiletti, Roberto; Nielsen, Jesper Buus; Frederiksen, Tore Kasper;

    the commitment protocol by Garay \\emph{et al.} from Eurocrypt 2014. A main technical improvement over the scheme mentioned above, and other schemes based on using error correcting codes for UC commitment, we develop a new technique which allows to based the extraction property on erasure decoding as...... oblivious transfer functionality. Based on this we prove our scheme secure in the Universal Composability (UC) framework against a static and malicious adversary corrupting any number of parties. On a practical note, our scheme improves significantly on the non- homomorphic scheme of Cascudo \\emph{et al...

  14. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  15. The Execution Game

    CERN Document Server

    Moallemi, Ciamac C; Van Roy, Benjamin

    2008-01-01

    We consider a trader who aims to liquidate a large position in the presence of an arbitrageur who hopes to profit from the trader's activity. The arbitrageur is uncertain about the trader's position and learns from observed market activity. This is a dynamic game with asymmetric information. We present an algorithm for computing perfect Bayesian equilibrium behavior and conduct numerical experiments. Our results demonstrate that the trader's strategy differs in important ways from one that would be optimal in the absence of an arbitrageur. In particular, the trader's actions depend on and influence the arbitrageur's beliefs. Accounting for the presence of a strategic adversary can greatly reduce transaction costs.

  16. Quantum cheques

    Science.gov (United States)

    Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-06-01

    We propose the idea of a quantum cheque scheme, a cryptographic protocol in which any legitimate client of a trusted bank can issue a cheque, that cannot be counterfeited or altered in anyway, and can be verified by a bank or any of its branches. We formally define a quantum cheque and present the first unconditionally secure quantum cheque scheme and show it to be secure against any no-signalling adversary. The proposed quantum cheque scheme can been perceived as the quantum analog of Electronic Data Interchange, as an alternate for current e-Payment Gateways.

  17. Proceedings of the fourth international conference and exhibition: World Congress on superconductivity. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Krishen, K.; Burnham, C. [eds.] [National Aeronautics and Space Administration, Houston, TX (United States). Lyndon B. Johnson Space Center

    1994-12-31

    The goals of the World Congress on Superconductivity (WCS) have been to establish and foster the development and commercial application of superconductivity technology on a global scale by providing a non-adversarial, non-advocacy forum where scientists, engineers, businessmen and government personnel can freely exchange information and ideas on recent developments and directions for the future of superconductive research. Sessions were held on: accelerator technology, power and energy, persistent magnetic fields, performance characterization, physical properties, fabrication methodology, superconductive magnetic energy storage (SMES), thin films, high temperature materials, device applications, wire fabrication, and granular superconductors. Individual papers are indexed separately.

  18. Subliminal Probing for Private Information via EEG-Based BCI Devices

    OpenAIRE

    Frank, Mario; Hwu, Tiffany; Jain, Sakshi; Knight, Robert; Martinovic, Ivan; Mittal, Prateek; Perito, Daniele; Song, Dawn

    2013-01-01

    Martinovic et al. proposed a Brain-Computer-Interface (BCI) -based attack in which an adversary is able to infer private information about a user, such as their bank or area-of-living, by analyzing the user's brain activities. However, a key limitation of the above attack is that it is intrusive, requiring user cooperation, and is thus easily detectable and can be reported to other users. In this paper, we identify and analyze a more serious threat for users of BCI devices. We propose a it su...

  19. Use of Hamiltonian Cycles in Cryptograph

    CERN Document Server

    WenBin, Hsieh

    2011-01-01

    In cryptography, key distribution is always an important issue in establishing a symmetric key. The famous method of exchanging keys, Diffie-Hellman key exchange, is also vulnerable to a man-in-the-middle attack. Therefore, many protocols are proposed to secure the exchange such as the authenticated D-H key agreement protocol, station-to-station (STS) protocol and secure socket layer/transport layer security (SSL/TLS) protocol. With these protocols, we propose a novel protocol based on the Hamiltonian cycle problem which is NP-complete. The novel protocol can make key agreement in one step, moreover, make a intermediate useless to an adversary.

  20. An Efficient Signature Scheme based on Factoring and Discrete Logarithm

    OpenAIRE

    Ciss, Abdoul Aziz; Cheikh, Ahmed Youssef Ould

    2012-01-01

    This paper proposes a new signature scheme based on two hard problems : the cube root extraction modulo a composite moduli (which is equivalent to the factorisation of the moduli, IFP) and the discrete logarithm problem(DLP). By combining these two cryptographic assumptions, we introduce an efficient and strongly secure signature scheme. We show that if an adversary can break the new scheme with an algorithm $\\mathcal{A},$ then $\\mathcal{A}$ can be used to sove both the DLP and the IFP. The k...

  1. Re-Imagining Punishment: An Exercise in “Intersectional Criminal Justice”

    Directory of Open Access Journals (Sweden)

    Maya Pagni Barak

    2014-10-01

    Full Text Available Over the last 40 years a number of scholars have called upon fellow criminologists to rethink the field’s priorities and methods, as well as the American criminal justice system and current punishment practices. Drawing on alternative criminologies, including constitutive and peacemaking criminologies, as well as the practice of reintegrative shaming, this paper presents a new model of criminal justice that combines aspects of adversarial, restorative, social, and transformative justice frameworks. The resulting “intersectional criminal justice” offers a holistic harm-reduction model that moves the focus of our criminal justice system away from “rough justice” and towards collective restorative healing and positive social change.

  2. Upconversion-based receivers for quantum hacking-resistant quantum key distribution

    Science.gov (United States)

    Jain, Nitin; Kanter, Gregory S.

    2016-07-01

    We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  3. Zur Geschichte der Geophysik

    Science.gov (United States)

    Strobach, Klaus

    1980-07-01

    Alfred Wegener's most important work, the theory of continental drift, has a key position in the history of geophysics and has crucially advanced the discussion of this central problem of geodynamics amongst supporters and adversaries. The aim of this paper is to paint a portrait of Wegener's personality, of his stations of life, and of his interests and research work. The conceptions of the origin of continents and oceans prior to Wegener, and the further development of his ideas after his death on the ice cup of Greenland 50 years ago are discussed.

  4. Managed care contracting and payment reform: avoiding a showdown.

    Science.gov (United States)

    Nugent, Michael E

    2010-07-01

    Health reform promises to fundamentally change what and how CMS and commercial payers reimburse providers. Providers need to transition from their traditionally adversarial, transactions-based payer relationships to ones that optimize purchaser and patient value for the dollar. To avoid negotiation table showdowns and to prepare for reform, commercial payers and providers should take three actions: Recognize the dead ends with their historical relationships. Formulate their road map to value-based contracting. Avoid operational pot-holes along the way. PMID:20608414

  5. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio......-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  6. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  7. The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Rechberger, Christian

    2014-01-01

    We show how to produce a forged (ciphertext, tag) pair for the scheme ALE with data and time complexity of 2102 ALE encryptions of short messages and the same number of authentication attempts. We use a differential attack based on a local collision, which exploits the availability of extracted...... state bytes to the adversary. Our approach allows for a time-data complexity tradeoff, with an extreme case of a forgery produced after 2119 attempts and based on a single authenticated message. Our attack is further turned into a state recovery and a universal forgery attack with a time complexity...

  8. Privacy-Preserving Matching of Spatial Datasets with Protection against Background Knowledge

    DEFF Research Database (Denmark)

    Ghinita, Gabriel; Vicente, Carmen Ruiz; Shang, Ning;

    2010-01-01

    circuits that evaluate the matching condition without revealing anything else other than the matching outcome. However, existing solutions have at least one of the following drawbacks: (i) they fail to protect against adversaries with background knowledge on data distribution, (ii) they compromise privacy...... by returning large amounts of false positives and (iii) they rely on complex and expensive SMC protocols. In this paper, we introduce a novel geometric transformation to perform private matching on spatial datasets. Our method is efficient and it is not vulnerable to background knowledge attacks. We consider...

  9. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  10. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina;

    2013-01-01

    . While anonymity and confidentiality appear to be orthogonal properties, making anonymous communication confidential is more involved than one might expect, since the ciphertext might reveal which public key has been used to encrypt. To address this problem, public-key cryptosystems with enhanced...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...

  11. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  12. Random Fruits on the Zielonka Tree

    CERN Document Server

    Horn, Florian

    2009-01-01

    Stochastic games are a natural model for the synthesis of controllers confronted to adversarial and/or random actions. In particular, $\\omega$-regular games of infinite length can represent reactive systems which are not expected to reach a correct state, but rather to handle a continuous stream of events. One critical resource in such applications is the memory used by the controller. In this paper, we study the amount of memory that can be saved through the use of randomisation in strategies, and present matching upper and lower bounds for stochastic Muller games.

  13. Chaotic iterations for steganography: Stego-security and topological-security

    CERN Document Server

    Friot, Nicolas; Bahi, Jacques M

    2011-01-01

    In this paper is proposed a novel steganographic scheme based on chaotic iterations. This research work takes place into the information hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack". Additionally, we prove that this scheme presents topological properties so that it is one of the firsts able to face, at least partially, an adversary when considering the others categories of attacks defined in the literature.

  14. MiniLEGO

    DEFF Research Database (Denmark)

    Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus;

    2013-01-01

    One of the main tools to construct secure two-party computation protocols are Yao garbled circuits. Using the cut-and-choose technique, one can get reasonably efficient Yao-based protocols with security against malicious adversaries. At TCC 2009, Nielsen and Orlandi [28] suggested to apply cut...... new protocol has the following advantages: It maintains the efficiency of the LEGO cut-and-choose. After a number of seed oblivious transfers linear in the security parameter, the construction uses only primitives from Minicrypt (i.e., private-key cryptography) per gate in the circuit (hence the name...

  15. Scalable and Unconditionally Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2007-01-01

    We present a multiparty computation protocol that is unconditionally secure against adaptive and active adversaries, with communication complexity O(Cn)k+O(Dn^2)k+poly(nk), where C is the number of gates in the circuit, n is the number of parties, k is the bit-length of the elements of the field...... over which the computation is carried out, D is the multiplicative depth of the circuit, and κ is the security parameter. The corruption threshold is t security the corruption threshold is t secure......, the protocol has so called everlasting security....

  16. Multiparty Computation for Dishonest Majority

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Orlandi, Claudio

    2010-01-01

    theory and practice. We propose a new protocol to securely evaluate reactive arithmetic circuits, that offers security against an active adversary in the universally composable security framework. Instead of the "do-and-compile" approach (where the parties use zero-knowledge proofs to show...... that they are following the protocol) our key ingredient is an efficient version of the "cut-and-choose" technique, that allow us to achieve active security for just a (small) constant amount of work more than for passive security....

  17. Graph Coarsening for Path Finding in Cybersecurity Graphs

    Energy Technology Data Exchange (ETDEWEB)

    Hogan, Emilie A.; Johnson, John R.; Halappanavar, Mahantesh

    2013-01-01

    n the pass-the-hash attack, hackers repeatedly steal password hashes and move through a computer network with the goal of reaching a computer with high level administrative privileges. In this paper we apply graph coarsening in network graphs for the purpose of detecting hackers using this attack or assessing the risk level of the network's current state. We repeatedly take graph minors, which preserve the existence of paths in the graph, and take powers of the adjacency matrix to count the paths. This allows us to detect the existence of paths as well as find paths that have high risk of being used by adversaries.

  18. Pushing the Limits of Military Coercion Theory

    DEFF Research Database (Denmark)

    Jakobsen, Peter Viggo

    2011-01-01

    The centrality of military coercion in contemporary Western crisis and conflict management constitutes a major policy problem because the United States and its allies are poor at translating their overwhelming military superiority into adversary compliance. The standard explanation provided...... by coercion theorists is that coercion is hard and that miscalculation, misperception, or practical problems can defeat even a perfectly executed strategy. What they ignore is that the problem also stems from the limits of coercion theory, which has left us with an unnecessarily poor understanding of how...... the principal theoretical propositions with a firmer empirical foundation and make military coercion theory more useful for policy makers....

  19. User Authentication with Provable Security against Online Dictionary Attacks

    Directory of Open Access Journals (Sweden)

    Yongzhong He

    2009-05-01

    Full Text Available Dictionary attacks are the best known threats on the password-based authentication schemes. Based on Reverse Turing Test (RTT, some usable and scalable authentication schemes are proposed to defeat online dictionary attacks mounted by automated programs. However it is found that these authentication schemes are vulnerable to various online dictionary attacks. In this paper, a practical decision function is presented, based on which RTT authentication schemes are constructed and shown to be secure against all the known online dictionary attacks. After formally modeling of the adversary, the static and dynamic security of the authentication schemes are proved formally.

  20. Self-Healing Computation

    OpenAIRE

    Saad, George; Saia, Jared

    2014-01-01

    In the problem of reliable multiparty computation (RC), there are $n$ parties, each with an individual input, and the parties want to jointly compute a function $f$ over $n$ inputs. The problem is complicated by the fact that an omniscient adversary controls a hidden fraction of the parties. We describe a self-healing algorithm for this problem. In particular, for a fixed function $f$, with $n$ parties and $m$ gates, we describe how to perform RC repeatedly as the inputs to $f$ change. Our al...

  1. Peace is more than the absence of hacks

    OpenAIRE

    Schmetz, Martin

    2015-01-01

    Part V of our series on cyberpeace "Cyberpeace: Dimensionen eines Gegenentwurfs". With everybody focusing on cyberwar, our blog has decided to discuss cyberpeace instead. So far we have seen musings on war and peace, the meaning of the term “cyberpeace” itself and how we construct it discursively and calls to end cyberwar by focusing on the technical aspects again. All of these points are valid. But I feel that they are limited in their scope, because they focus too much on the adversarial...

  2. The Iranian nuclear crisis a memoir

    CERN Document Server

    Mousavian, Seyed Hossein

    2012-01-01

    The first detailed Iranian account of the diplomatic struggle between Iran and the international community, The Iranian Nuclear Crisis: A Memoir opens in 2002, as news of Iran's clandestine uranium enrichment and plutonium production facilities emerge. Seyed Hossein Mousavian, previously the head of the Foreign Relations Committee of Iran'sSupreme National Security Council and spokesman for Tehran's nuclear negotiating team, brings the reader into Tehran's private deliberations as its leaders wrestle with internal and external adversaries.Mousavian provides readers with intim

  3. Infinite Randomness Expansion and Amplification with a Constant Number of Devices

    OpenAIRE

    Coudron, Matthew; Yuen, Henry

    2013-01-01

    We present a device-independent randomness expansion protocol, involving only a constant number of non-signaling quantum devices, that achieves \\emph{infinite expansion}: starting with $m$ bits of uniform private randomness, the protocol can produce an unbounded amount of certified randomness that is $\\exp(-\\Omega(m^{1/3}))$-close to uniform and secure against a quantum adversary. The only parameters which depend on the size of the input are the soundness of the protocol and the security of t...

  4. Reflexiones en torno a los conceptos de guerra justa y cruzada y su actual revalorización.

    Directory of Open Access Journals (Sweden)

    Horacio Cagni

    2009-07-01

    Full Text Available The concept of just war and crusade remain through time as elements of casus belli legitimating, since the early manifestations in high Middle Ages, the pinnacle in the Crusades for regaining the Holy Land, and its ratification in contemporary era. The typical characteristic is the adversary demonization as immensurable evil and total enemy, destroying the ius belli and the iustus hostis concepts. The essay approaches the examples of russian-german war 1941-45, the anglo-american strategic bombing in WW.II, and the confrontations between the West and the Islamic world.

  5. Legal Transparency as a National Security Strategy

    OpenAIRE

    Yoni Eshpar

    2013-01-01

    The act of taking initiative is considered the preferred modus operandi within the various spheres that shape and define the concept of Israel’s national security: on the battlefield and in diplomacy, as well as on the media front. Conventional wisdom within all these spheres is that one should not be dragged along by the force of events, nor should one ever allow an adversary to define the terms of the battle. The legal realm, however, would appear to be an exception to this rule. Although reco...

  6. NEMESIS: Keeping Russia an Enemy through Cold War Pathologies

    Directory of Open Access Journals (Sweden)

    Matthew Crosston

    2015-01-01

    Full Text Available This article examines the openly adversarial neoconservative foundation under George Bush to the supposedly more ‘engaged’diplomatic interaction under Barack Obama. What will be exposed is a fairly uninspired and non-innovative American policy that not only fails to consider Russian initiatives from Russia’s own national security perspectives, but aims to contain it within a continued Cold War box that not only sours opportunities for collaboration but guarantees the absence of partnership in areas of global security. This piece examines the consequences of imagining Russia only as nemesis. 

  7. The COG Strikes Back

    DEFF Research Database (Denmark)

    Barfoed, Jacob

    2014-01-01

    contributes to the discussion by combining the COG concept with strategic theory, hereby addressing many of the raised critique points. The article presents three COG-Strategy schools, centered on different/competing interpretations of the Clausewitzian Center of Gravity (CoG) concept as well as different...... by the adversary leadership and on defeating the adversary’s strategy, starting at the grand strategic level of war and with the lower levels providing increasingly more details to various elements of the grand strategy...

  8. MicroCommentary: A New Role for Coenzyme F420 in Aflatoxin Reduction by Soil Mycobacteria

    Energy Technology Data Exchange (ETDEWEB)

    Graham, David E [ORNL

    2010-01-01

    Hepatotoxic aflatoxins have found a worthy adversary in two new families of bacterial oxidoreductases. These enzymes use the reduced coenzyme F420 to initiate the degradation of furanocoumarin compounds, including the major mycotoxin products of Aspergillus flavus. Along with pyridoxalamine 5 -phosphate oxidases and aryl nitroreductases, these proteins form a large and versatile superfamily of flavin and deazaflavin-dependent oxidoreductases. F420-dependent members of this family appear to share a common mechanism of hydride transfer from the reduced deazaflavin to the electron-deficient ring systems of their substrates.

  9. ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    G.Padmavathi

    2012-02-01

    Full Text Available A mobile ad hoc network (MANETs is a self-organizing network that consists of mobile nodes that are connected through wireless media. A number of unique features, such as lack of infrastructural or central administrative supports, dynamic network topologies, open communication channels, and limited device capabilities and bandwidths, have made secure, reliable and efficient routing operations in MANET a challenging task. The ultimate goal of the security solutions for MANET is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability to mobile users. To achieve the goals, the security solution need for entire protocol stack. . The proposed protocol ANODRECC with Telnet provide application layer security and it ensures route anonymity and location privacy and is robust against eavesdropping attack.For route anonymity, it prevents strong adversaries from tracing a packet flow back to its source or destination; for location privacy, it ensures that adversaries cannot discover the real identities of local transmitters. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has exposed improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio and Average jitter.

  10. Development of nonproliferation and assessment scenarios.

    Energy Technology Data Exchange (ETDEWEB)

    Finley, Melissa; Barnett, Natalie Beth

    2005-10-01

    The overall objective of the Nonproliferation and Assessments Scenario Development project is to create and analyze potential and plausible scenarios that would lead to an adversary's ability to acquire and use a biological weapon. The initial three months of funding was intended to be used to develop a scenario to demonstrate the efficacy of this analysis methodology; however, it was determined that a substantial amount of preliminary data collection would be needed before a proof of concept scenario could be developed. We have dedicated substantial effort to determine the acquisition pathways for Foot and Mouth Disease Virus, and similar processes will be applied to all pathogens of interest. We have developed a biosecurity assessments database to capture information on adversary skill locales, available skill sets in specific regions, pathogen sources and regulations involved in pathogen acquisition from legitimate facilities. FY06 funding, once released, will be dedicated to data collection on acquisition, production and dissemination requirements on a pathogen basis. Once pathogen data has been collected, scenarios will be developed and scored.

  11. TBRF: Trust Based Routing Framework for WSNs

    Directory of Open Access Journals (Sweden)

    Kushal Gulaskar

    2014-03-01

    Full Text Available The multi-hop routing in wireless sensor networks (WSNs offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TBRF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TBRF provides trustworthy and energy-efficient route. Most importantly, TBRF proves effective against those harmful attacks developed out of identity deception; the resilience of TBRF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TBRF module in TinyOS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TBRF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism

  12. Human reliability-based MC and A models for detecting insider theft

    International Nuclear Information System (INIS)

    Material control and accounting (MC and A) safeguards operations that track and account for critical assets at nuclear facilities provide a key protection approach for defeating insider adversaries. These activities, however, have been difficult to characterize in ways that are compatible with the probabilistic path analysis methods that are used to systematically evaluate the effectiveness of a site's physical protection (security) system (PPS). MC and A activities have many similar characteristics to operator procedures performed in a nuclear power plant (NPP) to check for anomalous conditions. This work applies human reliability analysis (HRA) methods and models for human performance of NPP operations to develop detection probabilities for MC and A activities. This has enabled the development of an extended probabilistic path analysis methodology in which MC and A protections can be combined with traditional sensor data in the calculation of PPS effectiveness. The extended path analysis methodology provides an integrated evaluation of a safeguards and security system that addresses its effectiveness for attacks by both outside and inside adversaries.

  13. Nuclear husbandry functions

    International Nuclear Information System (INIS)

    Despite the differences, traditionally domestic safeguards approaches have often been used for international safeguards, sometimes with a few modest changes. Given the extreme discrepancies between the goals, operational context and potential adversaries of the two, such easy solutions may be detrimental to long-term nuclear security. Domestic MPC and A personnel and hardware are not automatically appropriate for international treaty monitoring or for international auditing. International inspectors, such as used by the IAEA, need tools and training specific for their treaty monitoring mission, not just duplicated from (U.S.) domestic MPC and A approaches. Domestic 'cost-effective' solutions may turn out to be highly ineffective and thus expensive and detrimental to long-term nuclear security when applied in new contextual settings. Emphasis should be given to optimize approaches and hardware specifically designed for international safeguards and for future treaty monitoring (e.g. under a Fissile Material Cut-Off Treaty). To the extent international applications are to be borrowed from domestic approaches, much caution should be given to assess all aspects of the unique nuclear husbandry function in question (objective, obstacles to implementation, potential adversaries etc.), before any fielding of devices or systems

  14. Digital image watermarking: its formal model, fundamental properties and possible attacks

    Science.gov (United States)

    Nyeem, Hussain; Boles, Wageeh; Boyd, Colin

    2014-12-01

    While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present, their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.

  15. Distributed Data Mining and Mining Multi-Agent Data

    Directory of Open Access Journals (Sweden)

    Dr. S Vidyavathi

    2010-07-01

    Full Text Available The problem of distributed data mining is very important in network problems. Ina distributed environment (such as a sensor or IP network, one has distributed probes placed at strategic locations within the network. The problem here is to be able to correlatethe data seen at the various probes, and discover patterns in the global data seen at all the different probes. There could be different models of distributed data mining here, but one could involve a NOC that collects data from the distributed sites, and another in which all sites are treated equally. The goal here obviously would be to minimize the amount of data shipped between the various sites — essentially, to reduce the communication overhead. In distributed mining, one problem is how to mine across multipleheterogeneous data sources: multi-database and multirelational mining. Another important new area is adversary data mining. In a growing number of domains — email spam, counter-terrorism, intrusiondetection/computer security, click spam, search engine spam, surveillance, fraud detection, shop bots, file sharing, etc. — data mining systems face adversaries that deliberately manipulate the data to sabotage them (e.g. make them produce false negatives. In this paper need to develop systems that explicitly take this into account, by combining data mining with game theory.

  16. The Death of Selective Waiver: How New Federal Rule of Evidence 502 Ends the Nationalization Debate

    Directory of Open Access Journals (Sweden)

    Patrick M. Emery

    2009-05-01

    Full Text Available New Federal Rule of Evidence 502 (“FRE 502” will end the threedecade push to nationalize a corporate litigation protection known as the “selective waiver doctrine.” First adopted by the Eighth Circuit in 1978, the selective waiver doctrine holds that, when a corporation discloses privileged materials to a government agency during an investigation, the corporation retains its privileges against third-party litigants—i.e., the corporation may selectively waive its attorney-client privilege (and in other circuits its attorney work product protection. This flies in the face of traditional waiver rules, under which a waiver of privilege to one’s adversary generally is a waiver to all adversaries on that subject matter. Based on years of frustration with discovery costs, fear of corporate fraud, and heavy burdens placed on administrative agencies, many legal scholars praised selective waiver as a cure for those ills. Recently, when the Advisory Committee on Evidence Rules met to discuss additions to the FRE, many called for the inclusion of a selective waiver provision. After much debate, the Advisory Committee determined that the selective waiver proposal for FRE 502 was too controversial. In its enacted form, FRE 502 does not contain a selective waiver provision.

  17. A new approach for UC security concurrent deniable authentication

    Institute of Scientific and Technical Information of China (English)

    FENG Tao; LI FengHua; MA JianFeng; SangJae MOON

    2008-01-01

    Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such au-thentication ever took place. When we consider an asynchronous multi-party net-work with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally compos-able (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is pre-served under concurrent composition of an unbounded number of protocol execu-tions; it implies non-malleability with respect to arbitrary protocols and more. The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residuosity (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and se-curity reductions.

  18. Role reversal and problem solving in international negotiations: the Partial Nuclear Test Ban case

    International Nuclear Information System (INIS)

    To facilitate finding bargaining space and to reinforce cooperative potential, a number of analysts have promoted the use of role reversal and problem solving. Role reversal involves restating the positions of one's adversary to demonstrate understanding and to develop empathy, while problem solving involves searching for alternatives that promote joint interests. The case of the negotiations in the Eighteen Nation Disarmament Conference from 1962--1963 leading to the Partial Nuclear Test Ban Treaty provided the context for examining bargaining relationships involving role reversal and problem solving. Interactions among the United States, the United Kingdom, and the Soviet Union, as recorded in transcripts of 112 sessions, were coded using Bargaining Process Analysis II, a content analysis instrument used to classify negotiation behaviors. Role reversal was measured by the frequency of paraphrases of the adversary's positions. Problem solving was measured by the frequency of themes promoting the exploration of alternatives and the search for mutually beneficial outcomes. The findings on the use of paraphrasing suggest that it can be used to restrict exploration as well as to promote it. The exploratory focus of problem solving was somewhat limited by its use in association with demands, suggesting that problem solving was interpreted as a sign of weakness

  19. The Forgiving Tree: A Self-Healing Distributed Data Structure

    CERN Document Server

    Hayes, Tom; Saia, Jared; Trehan, Amitabh

    2008-01-01

    We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that the following process continues for up to n rounds where n is the total number of nodes initially in the network: the adversary deletes an arbitrary node from the network, then the network responds by quickly adding a small number of new edges. We present a distributed data structure that ensures two key properties. First, the diameter of the network is never more than $O(\\log \\Delta)$ times its original diameter, where $\\Delta$ is the maximum degree of the network initially. We note that for many peer-to-peer systems, $\\Delta$ is polylogarithmic, so the diameter increase would be a O(log log n) multiplicative factor. Second, the degree of any node never increases by more than 3 over its original degree. Our data structure is fully distributed, has O(1) latency per round and requires each node to send and receive O(1) messages per round. The data structure requires an init...

  20. Non-interactive and Reusable Non-malleable Commitment Schemes

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Groth, Jens

    2003-01-01

    We consider non-malleable (NM) and universally composable (UC) commitment schemes in the common reference string (CRS) model. We show how to construct non-interactive NM commitments that remain non-malleable even if the adversary has access to an arbitrary number of commitments from honest player...... primitive than NM. Finally, we show that our strong RSA based construction can be used to improve the most efficient known UC commitment scheme so it can work with a CRS of size independent of the number of players, without loss of efficiency.......We consider non-malleable (NM) and universally composable (UC) commitment schemes in the common reference string (CRS) model. We show how to construct non-interactive NM commitments that remain non-malleable even if the adversary has access to an arbitrary number of commitments from honest players...... version based on the strong RSA assumption. For UC commitments, we show that existence of a UC commitment scheme in the CRS model (interactive or not) implies key exchange and - for a uniform reference string - even implies oblivious transfer. This indicates that UC commitment is a strictly stronger...