WorldWideScience

Sample records for holliman-memon counterfeiting attack

  1. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  2. Firmware Counterfeiting and Modification Attacks on Programmable Logic Controllers

    Science.gov (United States)

    2013-03-01

    employees to find and use, or the attackers may have breached physical security to deliver the worm [19]. Once introduced to a computer running Microsoft ...physical inputs and outputs. PLCs typically require proprietary software installed on a standard computer (usually running Microsoft Windows) to provide a...Hack in the Box Sec-Conference. Kuala Lumpur, Malaysia . 2010. [23] He↵ner, Craig. “Reverse Engineering Firmware: Linksys WAG120N”. DEV/TTYS0, May 29

  3. TRANSPORT OF COUNTERFEIT GOODS

    Directory of Open Access Journals (Sweden)

    Dagmar Babčanová

    2014-09-01

    Full Text Available The paper is focused on a current problem of transport of counterfeit goods in the European Union. Counterfeiting has a strong influence on the distribution organizations worldwide because most of counterfeit goods threaten the health and safety of consumers. Counterfeiting is a serious problem in the world economy today. The purpose of this paper is to point out the danger of counterfeiting in connection with the transport of Intellectual Property (IP rights - infringing goods. Background of the paper’s content is based on secondary data research of publicly available sources - international statistics and world reports.

  4. On the Counterfeiting Battlefield

    DEFF Research Database (Denmark)

    Beukel, Karin; Rullani, Francesco

    The protection of firms' identity is one of the main problems raised by the diffusion of counterfeit products. Firms protect their identity by fighting counterfeiters in their main and ancillary markets, as well as against diffusion of dangerous counterfeit products that can damage their brand...... and reputation. We describe the strategies of the firm and of the counterfeiters in these two contexts, and test our hypotheses using a unique dataset reporting 3333 battles taken by a high-tech firm against more than 2000 counterfeiters in 75 countries over a 6-year period. We find broad support for our...... hypotheses on the strategic behavior of the firm and of the counterfeiters, highlighting the difficulties firms find in protecting their main markets, and their advantages in limiting the diffusion of dangerous counterfeit products...

  5. Anti-Counterfeiting

    Science.gov (United States)

    Tuyls, Pim; Guajardo, Jorge; Batina, Lejla; Kerins, Tim

    Counterfeiting of goods is becoming a very huge problem for our society. It not only has a global economic impact, but it also poses a serious threat to our global safety and health. Currently, global economic damage across all industries due to the counterfeiting of goods is estimated at over 600 billion annually [2]. In the United States, seizure of counterfeit goods has tripled in the last 5 years, and in Europe, over 100 million pirated and counterfeit goods were seized in 2004. Fake products cost businesses in the United Kingdom approximately 17 billion [2]. In India, 15% of fast-moving consumer goods and 38% of auto parts are counterfeit. Other industries in which many goods are being counterfeit are the toy industry, content and software, cosmetics, publishing, food and beverages, tobacco, apparel, sports goods, cards, and so forth.

  6. Recent Trends in Counterfeiting

    OpenAIRE

    Arianna Cowling

    2011-01-01

    Under the Reserve Bank Act 1959, the Reserve Bank has sole authority to issue banknotes in Australia. As such, a key responsibility of the Reserve Bank is to maintain public confidence in banknotes, so that they remain an effective payment mechanism and a secure store of wealth. This article examines how counterfeiting can impact on this confidence, and counterfeiting trends in Australia and overseas. The article also discusses the strategies the Reserve Bank employs to minimise the risks of ...

  7. 'Counterfeit deviance' revisited.

    Science.gov (United States)

    Griffiths, Dorothy; Hingsburger, Dave; Hoath, Jordan; Ioannou, Stephanie

    2013-09-01

    The field has seen a renewed interest in exploring the theory of 'counterfeit deviance' for persons with intellectual disability who sexually offend. The term was first presented in 1991 by Hingsburger, Griffiths and Quinsey as a means to differentiate in clinical assessment a subgroup of persons with intellectual disability whose behaviours appeared like paraphilia but served a function that was not related to paraphilia sexual urges or fantasies. Case observations were put forward to provide differential diagnosis of paraphilia in persons with intellectual disabilities compared to those with counterfeit deviance. The brief paper was published in a journal that is no longer available and as such much of what is currently written on the topic is based on secondary sources. The current paper presents a theoretical piece to revisit the original counterfeit deviance theory to clarify the myths and misconceptions that have arisen and evaluate the theory based on additional research and clinical findings. The authors also propose areas where there may be a basis for expansion of the theory. The theory of counterfeit deviance still has relevance as a consideration for clinicians when assessing the nature of a sexual offence committed by a person with an intellectual disability. Clinical differentiation of paraphilia from counterfeit deviance provides a foundation for intervention that is designed to specifically treat the underlying factors that contributed to the offence for a given individual. Counterfeit deviance is a concept that continues to provide areas for consideration for clinicians regarding the assessment and treatment of an individual with an intellectual disability who has sexually offended. It is not and never was an explanation for all sexually offending behavior among persons with intellectual disabilities. © 2013 John Wiley & Sons Ltd.

  8. Substandard/counterfeit antimicrobial drugs.

    Science.gov (United States)

    Kelesidis, Theodoros; Falagas, Matthew E

    2015-04-01

    Substandard/counterfeit antimicrobial drugs are a growing global problem. The most common substandard/counterfeit antimicrobials include beta-lactams (among antibiotics) and chloroquine and artemisin derivatives (among antimalarials). The most common type of substandard/counterfeit antimicrobial drugs have a reduced amount of the active drug, and the majority of them are manufactured in Southeast Asia and Africa. Counterfeit antimicrobial drugs may cause increased mortality and morbidity and pose a danger to patients. Here we review the literature with regard to the issue of substandard/counterfeit antimicrobials and describe the prevalence of this problem, the different types of substandard/counterfeit antimicrobial drugs, and the consequences for the individuals and global public health. Local, national, and international initiatives are required to combat this very important public health issue. Copyright © 2015, American Society for Microbiology. All Rights Reserved.

  9. Fashion Counterfeiting: Consumer Behavior Issues

    Science.gov (United States)

    Cheek, Wanda K.; Easterling, Cynthia R.

    2008-01-01

    Counterfeiting, which has always been somewhat of a problem in several different industry settings, has recently become an epidemic in the fashion industry. Widespread and seemingly endless counterfeiting of fashion goods is costing the industry millions of dollars in lost profits and tarnishing the image of many luxury brands. This article…

  10. Counterfeit Goods and Income Inequality

    OpenAIRE

    Stefania Scandizzo

    2001-01-01

    This paper examines the effect of counterfeit goods in a world where consumers are differentiated by level of income and innovation is quality enhancing. Counterfeit goods are defined as products with the same characteristics as “originals”, but of lower quality. The effect of imitation on firms’ profits and consumer welfare depends on the distribution of income within the country. In particular, the greater the level of income inequality the larger the increase in consumer welfare due to the...

  11. Explaining Counterfeit Alcohol Purchases in Russia.

    Science.gov (United States)

    Kotelnikova, Zoya

    2017-04-01

    Alcohol is a common target of counterfeiting in Russia. Counterfeit alcohol is defined here as the manufacture, distribution, unauthorized placement (forgery) of protected commodity trademarks, and infringement of the exclusive rights of the registered trademark holders of alcoholic beverages. It is often argued that the expansion of the counterfeit product market is due to the steady demand of economically disadvantaged people for low-priced goods. The situation becomes more complicated once deceptive and nondeceptive forms of counterfeiting are taken into account. This study aimed to identify markers of risky behavior associated with the purchase of counterfeit alcohol in Russia. The analysis relied on consumer self-reports of alcohol use and purchase collected nationwide by the Russia Longitudinal Monitoring Survey (RLMS-HSE) in 2012 to 2014. I used a generalized linear mixed-model logistic regression to identify predictors of risky behavior by consumers who purchased counterfeit alcohol, either knowingly or unknowingly, during the 30 days preceding the survey. Purchases of counterfeit alcohol declined slightly from 2012 to 2014, mainly due to a decrease in consumers mistakenly purchasing counterfeit products. Predictors of counterfeit alcohol purchases differed between consumers who knowingly and unknowingly purchased counterfeit products. Nondeceptive purchase of counterfeit alcohol was related primarily to an indifference to alcohol brands. Consumers with social networks that include drinkers of nonbeverage alcohol and producers of homemade alcohol were highly likely to consume counterfeit alcohol deliberately. Problem drinking was significantly associated with a higher risk of both deceptive and nondeceptive purchases of counterfeit alcohol. Poverty largely contributed to nondeceptive counterfeiting. The literature has overestimated the impact of low prices on counterfeit alcohol consumption. Problem drinking and membership in social networks of consumers

  12. Business strategies in the counterfeit market

    OpenAIRE

    Staake, Thorsten; Thiesse, Frederic; Fleisch, Elgar

    2012-01-01

    Counterfeit trade is amulti-billion dollar industry affecting anever-wider range of goods andmarkets. Despite the diversity of counterfeit products in terms of complexity, manufacturing techniques, investments in production facilities, potential dangers or value for the users, and degrees of conflict for the counterfeit producers with the local authorities, current academic literature still refers to counterfeit producers as one homogeneous group. Against this background, the present study in...

  13. Health risks of counterfeit pharmaceuticals.

    Science.gov (United States)

    ten Ham, Martijn

    2003-01-01

    Pharmaceutical products are not exempt from the practice of counterfeiting. In recent years, many reports have become available demonstrating the presence of fake medicines on the market. Several studies have demonstrated that they are quite often of bad quality. It is estimated that 5% of all world trade in branded goods is counterfeit, leading to huge financial losses for the pharmaceutical industry. But much more important, from a public health point of view, is that history has shown that such products may lead to a great health risk. The essence of counterfeit products and the reason they are so dangerous is the complete absence of quality control, since they are often indistinguishable from the genuine product. The existence of counterfeit drugs has long been ignored both by the pharmaceutical industry and by drug regulatory authorities. At present initiatives are being taken, nationally and internationally, to curb counterfeiting. It is now realised that a strong regulatory agency is essential, but the initiatives can only be successful if all parties concerned actively co-operate.

  14. Counterfeiting: Education Influences Ethical Decision Making

    Science.gov (United States)

    Kozar, Joy M.; Marcketti, Sara B.

    2008-01-01

    The purpose of this article is to address the relationship between the purchase of counterfeit apparel goods by college students and their knowledge and concern of counterfeiting. Additionally, students' beliefs regarding the legality of manufacturing, distributing, and purchasing counterfeit goods are examined. This topic is important because…

  15. Contra Davidson on Counterfeiting, Round Two

    Directory of Open Access Journals (Sweden)

    Walter E. Block

    2013-12-01

    Full Text Available Libertarians and non libertarians alike agree that counterfeiting legitimate money owned by innocent people is illicit.  But what about counterfeiting counterfeit money owned by the guiltless? Davidson and I, both libertarians, take the position that this would be a rights violation; that this would violate the rights of innocent owners of currency, who would be victimized by such fraudulent behavior of counterfeiters, even those who limit themselves to counterfeiting counterfeit funds. But what about counterfeiting counterfeit money owned by those who are guilty of crimes? Davidson (2013 opines, in effect, that there are no such people. The counterfeiter of counterfeit money is thus himself a criminal, she avers. I argue, very much to the contrary, that the relevant population consists mostly of guilty people, and thus they are not in a logical position to object to what would otherwise be considered victimization. As for the few innocents among them, they demonstrate their innocence to a large degree by not objecting to the counterfeiting of counterfeit money. If they do object, and take actions to prevent this practice, they act in a manner incompatible with the libertarian non aggression principle (NAP and thus enter the ranks of the guilty. I find Davidson’s (2013 economic analysis impeccable; her understanding of libertarianism highly problematic.In the interests of full disclosure, I should make it clear that the present paper contains the radical suggestion that we should do away with our established monetary- and financial system. If need be, and this is by no means my first choice, we are entitled to do so by means of massive counterfeiting of established currencies (which is justified by deontological considerations and libertarian principles. Of course, this is illegal in extant nations, and I would not want to be imprisoned for committing a crime. So, for purposes of our discussion, we will be considering only the imaginary

  16. Counterfeit Parts Prevention Strategies Guide

    Science.gov (United States)

    2014-06-24

    requirements of 252.211-7003, Item Unique Identification and Valuation .” This section establishes a recommended approach for requirements, polices, and...7003 Item Unique Identification and Valuation DoDI 4140.67 DoD Counterfeit Prevention Policy DoDI 5200.39 Critical Program Information (CPI...Deborah Valley deborah.valley@ll.mit.edu MIT Fred Van Milligen fvanmilligen@jdsu.com JDSU Marvin VanderWeg marvin.vanderwag@spacex.c om SpaceX Gerrit

  17. Combating the counterfeits with web portal technology

    Science.gov (United States)

    Ting, S. L.; Ip, W. H.

    2015-10-01

    Due to the globalisation of counterfeiting activities, the penetration of fake products in open market is growing. So far, the technologies to combat counterfeiting are mostly applied to high-value products (e.g. premium wine and branded handbags); however, in the medium- and low-value products' perspective, there is no secure way for consumers to identify whether the purchased items are genuine or not. To address the counterfeiting problems effectively, a platform for identifying authenticated products and promoting anti-counterfeit activities is very important. The aim of this paper is to design and develop an anti-counterfeit platform which includes two functions: providing customers a secure network to ascertain the genuineness of their purchased product and increasing public awareness of the current counterfeit problems and updated anti-counterfeit solutions. By combining these two functions, it enables public to fight against fake and beware of counterfeit. Results of adopting portal technology in anti-counterfeiting show high accuracy in product checking and improved creditability. This reveals that the applicability and advantage of the proposed methodology are satisfactory.

  18. Counterfeit integrated circuits detection and avoidance

    CERN Document Server

    Tehranipoor, Mark (Mohammad); Forte, Domenic

    2015-01-01

    This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade.  The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs).  Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat.   ·      Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem; ·      Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation; ·      Provides step-by-step solutions for detecting different types of counterfeit ICs; ·      Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC d...

  19. Forensic intelligence for medicine anti-counterfeiting.

    Science.gov (United States)

    Dégardin, Klara; Roggo, Yves; Margot, Pierre

    2015-03-01

    Medicine counterfeiting is a crime that has increased in recent years and now involves the whole world. Health and economic repercussions have led pharmaceutical industries and agencies to develop many measures to protect genuine medicines and differentiate them from counterfeits. Detecting counterfeit is chemically relatively simple for the specialists, but much more information can be gained from the analyses in a forensic intelligence perspective. Analytical data can feed criminal investigation and law enforcement by detecting and understanding the criminal phenomenon. Profiling seizures using chemical and packaging data constitutes a strong way to detect organised production and industrialised forms of criminality, and is the focus of this paper. Thirty-three seizures of a commonly counterfeited type of capsule have been studied. The results of the packaging and chemical analyses were gathered within an organised database. Strong linkage was found between the seizures at the different production steps, indicating the presence of a main counterfeit network dominating the market. The interpretation of the links with circumstantial data provided information about the production and the distribution of counterfeits coming from this network. This forensic intelligence perspective has the potential to be generalised to other types of products. This may be the only reliable approach to help the understanding of the organised crime phenomenon behind counterfeiting and to enable efficient strategic and operational decision making in an attempt to dismantle counterfeit network. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  20. THE EMERGENCE OF THE EUROPEAN COUNTERFEIT MARKETS

    Directory of Open Access Journals (Sweden)

    Loredana Maftei

    2013-07-01

    Full Text Available The European market of counterfeit goods has become a subject of increasing concern for businesses, private firms and policymakers. With a growing demand in consumption for this kind of goods, each sector is damaged from the toy industries to the pharmaceuticals industry. This article is aimed to expose the dynamic of the European counterfeiting markets, to highlight the main factors of production, the main providers, the smuggling routes, the overall profit, the main counterfeit products and also to offer a general perspective on the affected European markets.

  1. Severe hypoglycaemia associated with ingesting counterfeit medication.

    Science.gov (United States)

    Chaubey, Santosh K; Sangla, Kunwarjit S; Suthaharan, Emershia N; Tan, Yong M

    2010-06-21

    Cross-border importation of traditional and prescription medications is common, and many of these drugs are not approved by the Australian Therapeutic Goods Administration. Furthermore, counterfeit versions of prescription medications are also available (eg, weight-loss medications, anabolic steroids, and medications to enhance sexual performance). We describe a 54-year-old man with the first Australian case of severe hypoglycaemia induced by imported, laboratory-confirmed counterfeit Cialis. This serves to remind medical practitioners that counterfeit medication may be the cause of severe hypoglycaemia (or other unexplained illness).

  2. Substandard and Counterfeit Antimicrobials: Recent Trends and ...

    African Journals Online (AJOL)

    ... trends in the availability of substandard and counterfeit antimicrobials in the global market ... Literature search using PubMed and Medline databases and Google search engine was conducted to identify related publications on the subject.

  3. Fake and Counterfeit Drug: A review

    African Journals Online (AJOL)

    intent to deceptively represent its origin authenticity or effectiveness. A counterfeit drug ... version of medication. The business of fake drugs is a lucrative crime that is .... management of target or most vulnerable groups of patients with high risk ...

  4. Legislations combating counterfeit drugs in Hong Kong.

    Science.gov (United States)

    Lai, C W; Chan, W K

    2013-08-01

    To understand legislation combating counterfeit drugs in Hong Kong. This study consisted of two parts. In part I, counterfeit drugs–related ordinances and court cases were reviewed. In part II, indepth interviews of the stakeholders were described. Hong Kong. All Hong Kong ordinances were screened manually to identify those combating counterfeit drugs. Court cases were searched for each of the identified cases. Then, the relevant judgement justifications were analysed to identify sentencing issues. Indepth interviews with the stakeholders were conducted to understand their perceptions about such legislation. Trade Marks Ordinance, Patents Ordinance, Trade Descriptions Ordinance, and Pharmacy and Poisons Ordinance were current legislative items combating counterfeit drugs. Sentencing criteria depended on: intention to deceive, quantity of seized drugs, presence of expected therapeutic effect or toxic ingredients, previous criminal records, cooperativeness with Customs officers, honest confessions, pleas of guilty, types of drugs, and precautionary measures to prevent sale of counterfeit drugs. Stakeholders’ perceptions were explored with respect to legislation regarding the scale and significance of the counterfeit drug problem, penalties and deterrents, drug-specific legislation and authority, and inspections and enforcement. To plug the loopholes, a specific law with heavy penalties should be adopted. This could be supplemented by non-legal measures like education of judges, lawyers, and the public; publishing the names of offending pharmacies; and emphasising the role of pharmacists to the public.

  5. [Are there counterfeit medicines in Croatia?].

    Science.gov (United States)

    Tomić, Sinisa; Milcić, Neven; Sokolić, Milenko; Sucić, Anita Filipović; Martinac, Adrijana Ilić

    2010-01-01

    Counterfeit medicines are a growing problem in the world, for their use may endanger patient's health and therefore they pose an enormous public health risk. The manufacture of counterfeit medicines usually involves organised crime groups which place the counterfeit medicines on the market for reasons of profit. Detection and prevention of trade in counterfeit medicines requires close cooperation between medicine regulatory authorities, police, customs, judiciary and pharmaceutical industry. To this day, there have been no recorded cases of counterfeit medicines in the legal supply chain in Croatia. However, medicines without marketing authorisation in Croatia, originating from different countries, could be found on the illegal market. Most frequently, this includes medicines for the treatment of erectile dysfunction such as: sildenafil, tadalafil, vardenafil. In this study, 26 medicines for the treatment of erectile dysfunction, seized in illegal supply chain, were tested. High performance liquid chromatography (HPLC) was used for identification and quantification of active substances in the tested samples. It was determined that 13 out of 26 samples did not comply with declared composition of medicine and quality specification. Furthermore, two samples did not contain declared active substance vardenafil and that may indicate that these medicines are counterfeit.

  6. Problems Associated With Substandard And Counterfeit Drugs In ...

    African Journals Online (AJOL)

    Problems Associated With Substandard And Counterfeit Drugs In Developing Countries: A Review Article On Global Implications Of Counterfeit Drugs In The Era Of Anti-Retroviral (ARVS) Drugs In A Free Market Economy.

  7. Smart printing technology for counterfeit deterrence

    Science.gov (United States)

    Harrop, Peter J.

    1996-03-01

    Smart (intelligent) printing is the creation of useful patterns beyond alphanumerics and graphics immediately obvious to the human eye. It employs smart inks, patterns, surfaces and substrates. Recent proliferation of color copiers, personal computers and scanners has facilitated a tenfold increase in counterfeiting in many countries over the past three years. Banknotes, cheques, academic certificates, art work, visitors passes, venue tickets and many other artifacts have been compromised. Paradoxically, the best counterfeits produced by some foreign governments and organized crime are rarely the main problem. The secret services of many countries use forensic science to great effect in pursuing these fairly readily identified sources of limited number. Bad counterfeits usually made on color copiers or computers, with or without color scanners, are the most difficult to combat because they are made by very large numbers of casual counterfeiters who may never commit crime again. For instance, counterfeit banknotes intercepted by the Bundesbank have been photocopies in a fluctuating range of 50 - 84% of cases in the last four reported years. Cheque and other document fraud is also inflated by these burgeoning bad copies and here we must add amateurish alterations using copiers or scanners. For instance, a better academic degree can mean a better job, an interbank transfer form can be 'raised' in value by enormous amounts. The issuer of a 'bad' counterfeit does not mind that it is usually picked up on a second transferral. They are long gone by then or, with banknotes, they can deny that they issued it. First priority in reversing the upward trend of counterfeiting must not therefore be the creation of better secret features traceable by forensic laboratories over extended periods of time. Rather we need better and more obvious optically unique features, not easily emulated, that can be spotted in the split second when several, say, banknotes are handed over in a

  8. Higgs friends and counterfeits at hadron colliders

    International Nuclear Information System (INIS)

    Fox, Patrick J.; Tucker-Smith, David; Weiner, Neal

    2011-01-01

    We consider the possibility of 'Higgs counterfeits' - scalars that can be produced with cross sections comparable to the SM Higgs, and which decay with identical relative observable branching ratios, but which are nonetheless not responsible for electroweak symmetry breaking. We also consider a related scenario involving 'Higgs friends,' fields similarly produced through gg fusion processes, which would be discovered through diboson channels WW,ZZ,γγ, or even γZ, potentially with larger cross sections times branching ratios than for the Higgs. The discovery of either a Higgs friend or a Higgs counterfeit, rather than directly pointing towards the origin of the weak scale, would indicate the presence of new colored fields necessary for the sizable production cross section (and possibly new colorless but electroweakly charged states as well, in the case of the diboson decays of a Higgs friend). These particles could easily be confused for an ordinary Higgs, perhaps with an additional generation to explain the different cross section, and we emphasize the importance of vector boson fusion as a channel to distinguish a Higgs counterfeit from a true Higgs. Such fields would naturally be expected in scenarios with 'effective Z's,' where heavy states charged under the SM produce effective charges for SM fields under a new gauge force. We discuss the prospects for discovery of Higgs counterfeits, Higgs friends, and associated charged fields at the LHC.

  9. Counterfeit Electronics Detection Using Image Processing and Machine Learning

    Science.gov (United States)

    Asadizanjani, Navid; Tehranipoor, Mark; Forte, Domenic

    2017-01-01

    Counterfeiting is an increasing concern for businesses and governments as greater numbers of counterfeit integrated circuits (IC) infiltrate the global market. There is an ongoing effort in experimental and national labs inside the United States to detect and prevent such counterfeits in the most efficient time period. However, there is still a missing piece to automatically detect and properly keep record of detected counterfeit ICs. Here, we introduce a web application database that allows users to share previous examples of counterfeits through an online database and to obtain statistics regarding the prevalence of known defects. We also investigate automated techniques based on image processing and machine learning to detect different physical defects and to determine whether or not an IC is counterfeit.

  10. Counterfeit Electronics Detection Using Image Processing and Machine Learning

    International Nuclear Information System (INIS)

    Asadizanjani, Navid; Tehranipoor, Mark; Forte, Domenic

    2017-01-01

    Counterfeiting is an increasing concern for businesses and governments as greater numbers of counterfeit integrated circuits (IC) infiltrate the global market. There is an ongoing effort in experimental and national labs inside the United States to detect and prevent such counterfeits in the most efficient time period. However, there is still a missing piece to automatically detect and properly keep record of detected counterfeit ICs. Here, we introduce a web application database that allows users to share previous examples of counterfeits through an online database and to obtain statistics regarding the prevalence of known defects. We also investigate automated techniques based on image processing and machine learning to detect different physical defects and to determine whether or not an IC is counterfeit. (paper)

  11. Rapid instrumental detection and quantification of counterfeit pharmaceutical tablet formulations

    OpenAIRE

    Ogwu, John; Lawson, Graham; Tanna, Sangeeta

    2015-01-01

    From therapeutic to lifestyle medicines, the counterfeiting of medicines has been on the rise in recent times. Estimates indicate that about 10% of medicines worldwide are counterfeits with much higher figures in developing countries. Currently, identifying counterfeit medicines at the point of care is a challenge leaving many patients at risk. This study considered the potential use of Attenuated Total Reflectance-Fourier Transform Infrared Spectroscopy (ATR-FTIR) in rapid quantitative analy...

  12. Guidelines for identifying suspect/counterfeit material

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-09-01

    These guidelines are intended to assist users of products in identifying: substandard, misrepresented, or fraudulently marked items. The guidelines provide information about such topics as: precautions, inspection and testing, dispositioning identified items, installed inspection and reporting suspect/counterfeit materials. These guidelines apply to users who are developing procurement documents, product acceptance/verification methods, company procedures, work instructions, etc. The intent of these SM guidelines in relation to the Quality Assurance Program Description (QAPD) and implementing company Management Control Procedures is not to substitute or replace existing requirements, as defined in either the QAPD or company implementing instructions (Management Control Procedures). Instead, the guidelines are intended to provide a consolidated source of information addressing the issue of Suspect/Counterfeit materials. These guidelines provide an extensive suspect component listing and suspect indications listing. Users can quickly check their suspect items against the list of manufacturers products (i.e., type, LD. number, and nameplate information) by consulting either of these listings.

  13. AVOID BECOMING A VICTIM OF COUNTERFEIT ITEMS

    Energy Technology Data Exchange (ETDEWEB)

    WARRINER RD

    2011-07-13

    In today's globalized economy, we cannot live without imported products. Most people do not realize how thin the safety net of regulation and inspection really is. Less than three percent of imported products receive any form of government inspection prior to sale. Avoid flea markets, street vendors and deep discount stores. The sellers of counterfeit wares know where to market their products. They look for individuals who are hungry for a brand name item but do not want to pay a brand name price for it. The internet provides anonymity to the sellers of counterfeit products. Unlike Europe, U.S. law does not hold internet-marketing organizations, responsible for the quality of the products sold on their websites. These organizations will remove an individual vendor when a sufficient number of complaints are lodged, but they will not take responsibility for the counterfeit products you may have purchased. EBay has a number of counterfeit product guides to help you avoid being a victim of the sellers of these products. Ten percent of all medications taken worldwide are counterfeit. If you do buy medications on-line, be sure that the National Association of Boards of Pharmacy Verified Internet Pharmacy Practice Sites (VIPPS) recommends the pharmacy you choose to use. Inspect all medication purchases and report any change in color, shape, imprinting or odor to your pharmacist. If you take generic medications these attributes may change from one manufacturer to another. Your pharmacist should inform you of any changes when you refill your prescription. If they do not, get clarification prior to taking the medication. Please note that the Federal Drug Administration (FDA) does not regulate supplements. The FDA only steps in when a specific supplement proves to cause physical harm or contains a regulated ingredient. Due to counterfeiting, Underwriters Laboratories (UL) changed their label design three times since 1996. The new gold label should be attached to the cord

  14. THE ANALYSIS OF COUNTERFEITING FOOD PRODUCTS

    Directory of Open Access Journals (Sweden)

    Paula - Angela VIDRASCU

    2013-12-01

    Full Text Available The issue addressed in this paper makes a significant contribution to research on the effects that food tampering has at the expense of consumer health. Nowadays quality and food safety that consumers are entitled directly reflects the quality of life. In other words the present subject is of particular importance to the work of the bodies created for the purpose of protecting the health and quality of life of consumers. This study has an important role both in the short and long term through proper understanding of the terms of quality, adulteration and food safety. The essential aim of this article is played understanding and easy identification of counterfeit food. Thus the awareness of counterfeit food products consumers are becoming more aware and responsible on quality of life. Quality will always be one of the most important competitive factors of ensuring health and environmental protection.

  15. Aging, Counterfeiting Configuration Control (AC3)

    Science.gov (United States)

    2010-01-31

    Systems Intergrated Into AC3 CABS - Common As-Built System PRISM - Process Re-inventing Integration Systems for Manufacturing PDM - Product Data...looks forward to deploying the completed tool at Raytheon in a true production environment, for as much as we like the challenge associated with...performance of DoD systems. DoD systems are particularly susceptible to intrusion of counterfeit parts, especially during surge and extended production

  16. PROACTIVE DEFENSE FOR EVOLVING SUPPLY CHAIN COUNTERFEITING

    Science.gov (United States)

    2015-12-01

    counterfeiters who reprocess the parts and sell them as original products .4 Information Communication Technology (ICT): refers to the information and...company that originally built a product .9 Supply Chain Risk: risks that arise from the confidentiality, integrity, or availability of information...four different graduate schools spread across 22 years of marriage. For the past few years, she has endured a life with an " absentee husband" who

  17. The health and economic effects of counterfeit drugs.

    Science.gov (United States)

    Blackstone, Erwin A; Fuhr, Joseph P; Pociask, Steve

    2014-06-01

    Counterfeit drugs comprise an increasing percentage of the US drug market and even a larger percentage in less developed countries. Counterfeit drugs involve both lifesaving and lifestyle drugs. To review the health and economic consequences of counterfeit drugs on the US public and on the healthcare system as a whole. This comprehensive review of the literature encompassed a search of MEDLINE/PubMed, Google Scholar, and ProQuest using the keywords "counterfeit drugs," "counterfeit medicines," "fake drugs," and "fake medicines." A search of the various FiercePharma daily newsletter series on the healthcare market was also conducted. In addition, the US Food and Drug Administration and the World Health Organization websites were reviewed for additional information. The issue of counterfeit drugs has been growing in importance in the United States, with the supply of these counterfeit drugs coming from all over the world. Innovation is important to economic growth and US competitiveness in the global marketplace, and intellectual property protections provide the ability for society to prosper from innovation. Especially important in terms of innovation in healthcare are the pharmaceutical and biopharmaceutical industries. In addition to taking income from consumers and drug companies, counterfeit drugs also pose health hazards to patients, including death. The case of bevacizumab (Avastin) is presented as one recent example. Internet pharmacies, which are often the source of counterfeit drugs, often falsely portray themselves as Canadian, to enhance their consumer acceptance. Adding to the problems are drug shortages, which facilitate access for counterfeits. A long and convoluted supply chain also facilitates counterfeits. In addition, the wholesale market involving numerous firms is a convenient target for counterfeit drugs. Trafficking in counterfeits can be extremely profitable; detection of counterfeits is difficult, and the penalties are modest. Counterfeit

  18. Conspicuous consumption, luxury products and counterfeit market in the UK

    Directory of Open Access Journals (Sweden)

    Trang Huyen My Pham

    2016-05-01

    Full Text Available The fast growth of fashion brands and the popularity of counterfeit goods has posed certain challenges to the existing and new luxury fashion brand players. This study elaborates on the factors driving the market for counterfeit products in the UK. The data collected by means of survey questionnaires from 306 respondents and empirical techniques including descriptive and inferential statistics (correlation and multiple regression analysis, have shown that the consumers have a negative attitude towards counterfeit luxury products. However, they showed fewer tendencies to seek for a brand whose counterfeit cannot easily be found and preferred to buy a genuine rather than a counterfeit. In terms of frequency of purchase, reversion to counterfeit has negative impact, unlike the tendency to seek a brand whose counterfeit is hard to find. The overall results show that the attitude and acceptance of counterfeit do not greatly prevail in the market. However, about 27% of respondents demonstrated either a positive or a neutral tendency towards counterfeit products, which could have serious implications for the luxury goods market.

  19. Counterfeit and Fraudulent Items - Mitigating the risk

    International Nuclear Information System (INIS)

    Tannenbaum, Marc

    2011-01-01

    This presentation (slides) provides an overview of the industry's challenges and activities. Firstly, it outlines the differences between counterfeit, fraudulent, suspect, and also substandard items. Notice is given that items could be found not to meet the standard, but the difference in the intent to deceive with counterfeit and fraudulent items is the critical element. Examples from other industries are used which also rely heavily on the assurance of quality for safety. It also informs that EPRI has just completed a report in October 2009 in coordination with other US government agencies and industry organizations; this report, entitled Counterfeit, Substandard and Fraudulent Items, number 1019163, is available for free on the EPRI web site. As a follow-up to this report, EPRI is developing a CFSI Database; any country interested in a collaborative agreement is invited to use and contribute to the database information. Finally, it stresses the importance of the oversight of contractors, training to raise the awareness of the employees and the inspectors, and having a response plan for identified items

  20. Economic analysis of use of counterfeit drugs: health impairment risk of counterfeit phosphodiesterase type 5 inhibitor taken as an example.

    Science.gov (United States)

    Sugita, Minoru; Miyakawa, Michiko

    2010-07-01

    The size of the market for counterfeit drugs throughout the world is considerable. Many cases of health impairment due to counterfeits have been reported. The market share of counterfeits in drug markets in developed countries is smaller than that in developing countries. However, the size of the market for counterfeits of phosphodiesterase type 5 inhibitors (PDE5Is) used as anti-erectile-dysfunction drugs is not small. The purpose of the present study was to analyze the health impairment risk of taking the counterfeit PDE5Is and the convenience of obtaining the counterfeits in Japan, using an economic methodology in order to work out countermeasures for reducing the health impairment risk. Information was obtained by interviewing employees of pharmaceutical and chemical corporations in Japan. The size of the market for counterfeit PDE5Is in Japan was recently estimated to be about 2.5 times larger than that of genuine PDE5Is. The price of the counterfeits in their market is reported to be nearly equal to that of the genuine PDE5Is. An outbreak of severe hypoglycemia among users of counterfeit PDE5Is containing an antidiabetic drug in Singapore was reported in 2008, and seven patients remained comatose as a result of prolonged neuroglycopenia. Four of them subsequently died, so the health impairment risk due to counterfeit PDE5Is should not be ignored. In order to obtain a genuine PDE5I in Japan, a patient must be examined and have a prescription written at a medical institution, and buy it at a dispensing pharmacy. Focusing on the health impairment risk due to counterfeit PDE5Is and the convenience of obtaining the counterfeits in Japan, we analyzed the effects on the prices and quantities of PDE5Is in the market from demand and supply curves, using an economic methodology. From the analysis, it was shown that the health impairment risk due to the counterfeits is underestimated in the market in Japan. Physicians should warn their patients not to buy counterfeit

  1. 19 CFR 133.21 - Articles bearing counterfeit trademarks.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Articles bearing counterfeit trademarks. 133.21... Recorded Trademarks or Recorded Trade Names § 133.21 Articles bearing counterfeit trademarks. (a... substantially indistinguishable from, a registered trademark. (b) Seizure. Any article of domestic or foreign...

  2. Counterfeit detection for new and old currency designs

    Science.gov (United States)

    Hillstrom, Anne P.; Bernstein, Ira H.

    2002-04-01

    To test the effectiveness of counterfeit deterrence features recently introduced in US currency, observers were asked to discriminate genuine from counterfeit bills using a two-alternative forced-choice task. In Experiment 1, observers judged 100s with the new and old designs after receiving training in the deterrence features of each design. The counterfeits were representative of two common print processes: inkjet and offset printing. Judgments were made on whole bills, on individual features with the whole bill unmasked, and on individual features with only that feature visible. In Experiment 2, different observers judged 100s without any training. They then were trained and judged 50s and 20 bills. Taken together, the two experiments indicate that people are good at detecting counterfeits, that inkjet counterfeits are easier to detect than offset counterfeits, and that counterfeits of the newly designed bills are easier to detect than counterfeits of the older series. The design improvement was greatest with 100 bills and, to a lesser extent, 50 bills. Improvement was minimal with 20 bills, very likely because observers were very accurate for both series of 20s. Finally, some deterrence features were more useful than others in aiding discriminations.

  3. The impact of counterfeit products on the market

    OpenAIRE

    Tkachov, Maksim

    2015-01-01

    The author proves that the level of counterfeit presentation of goods on the market directly affects the equilibrium of the market. The greater the number of counterfeit products, the greater the level of losses holders of intellectual property rights, the lower the level of consumer confidence to the market.

  4. Identification of Counterfeit Drugs by Community Pharmacists in ...

    African Journals Online (AJOL)

    Purpose: The problem of fake and counterfeit drugs is real and constitutes a major threat to the health and safety of the Nigerian population. A descriptive study was carried out to assess the methods of identification of counterfeit drugs by community pharmacists in Lagos State. Methods: The research instrument was a ...

  5. Counterfeit Currency Identification System - A Case Study on ...

    African Journals Online (AJOL)

    Counterfeit notes came into circulation right from the time of existence of genuine notes. A number of techniques like first line inspection methods, second line inspection methods and smart money counterfeit detector are being used in many countries to identify the genuine notes from the fake ones. The other method is ...

  6. Consumer Adoption of Counterfeit Products in a Developing Country

    NARCIS (Netherlands)

    M.M. Lede (Madesta)

    2013-01-01

    markdownabstract__Abstract__ With an increase in global trade, currently involving almost all countries in the world (expect for a few autarkic ones), there is a growing interest in studying various aspects of trade in counterfeit products. As almost every type of good has been counterfeited

  7. Counterfeit analysis strategy illustrated by a case study.

    Science.gov (United States)

    Dégardin, Klara; Roggo, Yves

    2016-01-01

    Medicine counterfeiting is a current problem that the whole pharmaceutical field has to deal with. In 2014, counterfeits entered the legitimate supply chain in Europe. Quick and efficient action had to be taken. The aim of this paper is to explain which analytical strategy was chosen to deal with six of the cases concerned and which criteria have to be considered to provide quick and thorough information about the counterfeits. The evaluation of the packaging was performed in a first step, based on a comparison with genuine samples and evaluation of manipulation signs. Chemical methods were then used, consisting of near infrared and infrared spectroscopy, capillary zone electrophoresis and ultraviolet-visible spectrophotometry, in order to authenticate the samples and provide the chemical composition of the confirmed counterfeits. Among the 20 samples analyzed, 17 were confirmed as counterfeits. The counterfeits were the results of the manipulation of genuine samples, and one contained totally counterfeited parts. Several manipulation signs were asserted, like the addition of glue on the boxes and the vials. Genuine stolen goods had been diluted with water, while for an isolated case, a different active ingredient had been introduced in a vial. The analytical data generated were further investigated from a forensic intelligence perspective. Links could be revealed between the analyzed counterfeits, together with some interesting information about the modus operandi of the counterfeiters. The study was performed on a limited number of cases, and therefore encourages chemical and packaging profiling of counterfeits at a bigger scale. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.

  8. Nanotag luminescent fingerprint anti-counterfeiting technology

    DEFF Research Database (Denmark)

    Radziwon, Michal Jędrzej; Rubahn, Horst-Günter; Johansen, Stefan

    2012-01-01

    We describe a method to fabricate, transfer and validate via image processing nanofibre- based, unique security marks (“nanotags”) for anti-counterfeiting purposes. Epitaxial surface growth of oligophenylenes on a heated muscovite mica crystal results in a thin film of mutually aligned nanofibres....... This fingerprint can be transferred on an adhesive tape as a label of a product, imaged using low magnification microscopy, digitalised and stored in a database. Infrared surface heating, enforced cooling and load lock transfer makes the fabrication process fast and scalable to mass production....

  9. Consumption Of Counterfeit Alcohol In Contemporary Russia: The Role Of Cultural And Structural Factors

    OpenAIRE

    Zoya Kotelnikova

    2014-01-01

    The majority of Russians believe that counterfeit alcohol may cause death. Nevertheless, alcohol is a common target of counterfeiting in contemporary Russia as are branded clothes, accessories and audio products. This paper aims to reveal whether counterfeit alcohol consumers are distinctive in terms of structure and culture. It investigates the prevalence and structure of counterfeit alcohol purchasing and consumption; attitudes and beliefs about counterfeit alcohol; and predictors of counte...

  10. Detection of Counterfeit Tequila by Fluorescence Spectroscopy

    Directory of Open Access Journals (Sweden)

    José Manuel de la Rosa Vázquez

    2015-01-01

    Full Text Available An ultraviolet (UV light induced fluorescence study to discriminate fake tequila from genuine ones is presented. A portable homemade system based on four light emitting diodes (LEDs from 255 to 405 nm and a miniature spectrometer was used. It has been shown that unlike fake and silver tequila, which produce weak fluorescence signal, genuine mixed, rested, and aged tequilas show high fluorescence emission in the range from 400 to 750 nm. The fluorescence intensity grows with aging in 100% agave tequila. Such fluorescence differences can even be observed with naked eyes. The presented results demonstrate that the fluorescence measurement could be a good method to detect counterfeit tequila.

  11. Avoid Counterfeit Pesticide Products for Dogs and Cats

    Science.gov (United States)

    EPA is aware of counterfeit pet pesticides designed to look like legitimately registered pesticide products. The information on this page is intended to help consumers avoid unregistered pet products.

  12. Development of anti-counterfeit consumer product authentication system

    Directory of Open Access Journals (Sweden)

    Olena V. Narimanova

    2015-06-01

    Full Text Available Aim of the research is to develop an anti-counterfeit consumer product authentication system. The main requirements for this system are formulated, the choice of method of consumer product authentication is substantiated. The scheme of anti-counterfeit consumer product authentication system is developed basing on previously proposed method of checking the QR-code integrity and authenticity. The proposed within the system consumer product authentication technology is simple, economical for implementation, does not require the external changes of product packaging, does not affect existing production process. The technology can be recommended for the use to private businesses and government institutions that are interested in the security of their products from counterfeiting, as well as tracking and removing from circulation the counterfeit consumer products.

  13. Consumption practices of counterfeit luxury goods in the Italian context

    OpenAIRE

    Giacomo Gistri; Simona Romani; Stefano Pace; Veronica Gabrielli; Silvia Grappi

    2009-01-01

    ABSTRACT Counterfeiting is an expanding and increasingly relevant phenomenon in contemporary markets that has a particular impact on luxury branded goods. Most academic literature to date has focused its attention on the determinants of purchase, underestimating the consumption phase. This paper aims to fi ll this gap by investigating how people consume counterfeit luxury products. Our results help us to better understand the phenomenon as a whole, with the objective of prov...

  14. Counterfeit medicines in Peru: a retrospective review (1997-2014).

    Science.gov (United States)

    Medina, Edwin; Bel, Elvira; Suñé, Josep María

    2016-04-04

    To consolidate and assess information on counterfeit medicines subject to pharmaceutical alerts issued by the Peruvian Medicines Regulatory Authority over 18 years (1997-2014) of health monitoring and enforcement. A retrospective review of drug alerts. A search of the website of the General Directorate of Medicines, Supplies and Drugs (DIGEMID) of the Ministry of Health of Peru for drug alerts issued between 1997 and 2014. Drug alerts related to counterfeit medicines. A total of 669 DIGEMID alerts were issued during the study period, 354 (52.91%) of which cover 1738 cases of counterfeit medicines (many alerts deal with several cases at a time). 1010 cases (58.11%) involved pharmaceutical establishments and 349 (20.08%) involved non-pharmaceutical commercial outlets. In 126 cases (7.25%), counterfeit medicines were seized in an unauthorised trade (without any marketing authorisation); in 253 cases (14.56%) the type of establishment or business associated with the seized product was not identified. Counterfeit medicines are a serious public health problem in Peru. A review of the data cannot determine whether counterfeit medicines in Peru increased during the study period, or if monitoring by different government health agencies highlighted the magnitude of the problem by providing more evidence. The problem is clearly structural, since the majority of cases (58.11% of the total) were detected in legitimate supply chains. Most counterfeit medicines involve staple pharmaceutical products and common dosage forms. Considerable work remains to be done to control the serious problem of counterfeit medicines in Peru. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  15. CONSPICUOUS CONSUMPTION, LUXURY PRODUCTS AND COUNTERFEIT MARKET IN THE UK

    OpenAIRE

    My Pham, TH; Nasir, M

    2016-01-01

    The fast growth of fashion brands and the popularity of counterfeit goods has posed certain challenges to the existing and new luxury fashion brand players. This study elaborates on the factors driving the market for counterfeit products in the UK. The data collected by means of survey questionnaires from 306 respondents and empirical techniques including descriptive and inferential statistics (correlation and multiple regression analysis), have shown that the consumers have a negative attitu...

  16. A Framework for Counterfeit Smart Grid Device Detection

    Energy Technology Data Exchange (ETDEWEB)

    Babun, Leonardo [Florida Intl Univ., Miami, FL (United States); Aksu, Hidayet [Florida Intl Univ., Miami, FL (United States); Uluagac, A. Selcuk [Florida Intl Univ., Miami, FL (United States)

    2016-10-19

    The core vision of the smart grid concept is the realization of reliable two-­way communications between smart devices (e.g., IEDs, PLCs, PMUs). The benefits of the smart grid also come with tremendous security risks and new challenges in protecting the smart grid systems from cyber threats. Particularly, the use of untrusted counterfeit smart grid devices represents a real problem. Consequences of propagating false or malicious data, as well as stealing valuable user or smart grid state information from counterfeit devices are costly. Hence, early detection of counterfeit devices is critical for protecting smart grid’s components and users. To address these concerns, in this poster, we introduce our initial design of a configurable framework that utilize system call tracing, library interposition, and statistical techniques for monitoring and detection of counterfeit smart grid devices. In our framework, we consider six different counterfeit device scenarios with different smart grid devices and adversarial seZings. Our initial results on a realistic testbed utilizing actual smart-­grid GOOSE messages with IEC-­61850 communication protocol are very promising. Our framework is showing excellent rates on detection of smart grid counterfeit devices from impostors.

  17. Substandard and counterfeit medicines: a systematic review of the literature

    Science.gov (United States)

    Almuzaini, Tariq; Choonara, Imti; Sammons, Helen

    2013-01-01

    Objective To explore the evidence available of poor-quality (counterfeit and substandard) medicines in the literature. Design Systematic review. Data sources Databases used were EMBASE, MEDLINE, PubMed and the International Pharmaceutical Abstracts, including articles published till January 2013. Eligibility criteria Prevalence studies containing original data. WHO definitions (1992) used for counterfeit and substandard medicines. Study appraisal and synthesis Two reviewers independently scored study methodology against recommendations from the MEDQUARG Checklist. Studies were classified according to the World Bank classification of countries by income. Data extraction Data extracted: place of study; type of drugs sampled; sample size; percentage of substandard/counterfeit medicines; formulations included; origin of the drugs; chemical analysis and stated issues of counterfeit/substandard medicines. Results 44 prevalence studies were identified, 15 had good methodological quality. They were conducted in 25 different countries; the majority were in low-income countries (11) and/or lower middle-income countries (10). The median prevalence of substandard/counterfeit medicines was 28.5% (range 11–48%). Only two studies differentiated between substandard and counterfeit medicines. Prevalence data were limited to antimicrobial drugs (all 15 studies). 13 studies involved antimalarials, 6 antibiotics and 2 other medications. The majority of studies (93%) contained samples with inadequate amounts of active ingredients. The prevalence of substandard/counterfeit antimicrobials was significantly higher when purchased from unlicensed outlets (pcounterfeit medicines. Most studies assessed only a single therapeutic class of antimicrobials. Conclusions The prevalence of poor-quality antimicrobial medicines is widespread throughout Africa and Asia in lower income countries and lower middle-income countries . The main problem identified was inadequate amounts of the active

  18. Role of the pharmacist in preventing distribution of counterfeit medications.

    Science.gov (United States)

    Chambliss, Walter G; Carroll, Wesley A; Kennedy, Daniel; Levine, Donald; Moné, Michael A; Ried, L Douglas; Shepherd, Marv; Yelvigi, Mukund

    2012-01-01

    To provide an overview of the counterfeit medication problem and recommendations of a joint American Pharmacists Association (APhA) Academy of Pharmaceutical Research and Science and APhA Academy of Pharmacy Practice and Management taskforce. SciFinder and PubMed were searched from 1980 to March 2011 using the following keywords: counterfeit drug product, counterfeit medications, drug product authentication, drug product verification, and track-and-trace. Publications, presentations, and websites of organizations that research the counterfeit medication problem in the United States and other countries were reviewed. A representative from the security division of a pharmaceutical manufacturer and a representative from a supplier of anticounterfeiting technologies gave presentations to the taskforce. The taskforce recommends that pharmacists (1) purchase medications from known, reliable sources; (2) warn patients of the dangers of purchasing medications over the Internet; (3) confirm with distributors that products were purchased from manufacturers or other reliable sources; (4) monitor counterfeit product alerts; (5) examine products for suspicious appearance; (6) work with the pharmaceutical industry, distributors, and the Food and Drug Administration (FDA) to close gaps in the supply chain, especially for drugs in short supply; (7) use scanning technology in the pharmacy as part of a prescription verification process; (8) educate themselves, coworkers, and patients about the risks of counterfeit medications; and (9) report suspicious medications to FDA, the distributor, and the manufacturer. The consequence of a patient receiving a counterfeit medication in the United States could be catastrophic, and pharmacists must play an active role in preventing such an event from occurring.

  19. Progress in counterfeit deterrence: the contribution of information exchange

    Science.gov (United States)

    Lancaster, Ian M.; Kontnik, Lewis T.

    1996-03-01

    In this paper we establish the need for communication between organizations involved in the fight against counterfeiting crime. We also examine the paradox in providing information that could serve the criminal as well as those attempting to protect themselves from criminal activity. Counterfeiting is estimated to account for over 5% of world trade. It is a global operation with no respect for international borders. It is increasingly sophisticated and increasingly the province of organized crime, which applies the techniques developed for drug distribution to the production and distribution of counterfeit articles. To fight this crime there is an increasing plethora of authenticating features and technologies available. Many companies do not recognize the problem and the number of anticounterfeit technologies can be confusing for potential users. There is therefore a need for information about them, their comparative characteristics, to be easily available. At present there is inadequate communication between those who develop and produce anti-counterfeiting devices and those who use them, notwithstanding the marketing efforts of the former. Communication which stimulates and encourages the spread of information between those engaged in the fight against counterfeit crime can only help in that fight. But what we term 'the communication paradox' requires circumspection and care in the content and the distribution of such information. The communication paradox is that the better the channels of communication, the easier it is for criminals to get hold of that information. The challenge is to institute communications which are effective but restrictive. More communication of information between those engaged in counterfeit deterrence will enhance individual companies' and organizations' anticounterfeit efforts and thus contribute to an overall improvement in the fight against counterfeit crime.

  20. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  1. The effects of luxury conceptualization on counterfeit purchase an empirical study

    OpenAIRE

    Simona Romani; Stefano Pace; Giacomo Gistri

    2011-01-01

    The extant literature on luxury counterfeiting examines a wide range of antecedents of counterfeit purchase (such as product attributes, socio-demographic factors, and various consumer attitudes). However, less attention has been devoted to the luxury conceptualization held by consumers. This study argues that luxury value perception can be a multidimensional antecedent of counterfeit purchase, and therefore investigates whether 1) consumers of counterfeits and originals differ in their perce...

  2. Counterfeit Electronic Cigarette Products with Mislabeled Nicotine Concentrations.

    Science.gov (United States)

    Omaiye, Esther E; Cordova, Iliana; Davis, Barbara; Talbot, Prue

    2017-07-01

    We compared nicotine concentrations in one brand of refill fluids that were purchased in 4 countries and labeled 0 mg of nicotine/mL. We then identified counterfeit e-cigarette products from these countries. Overall, 125 e-cigarette refill fluids were purchased in Nigeria, the United States (US), England, and China. Nicotine concentrations were measured using high performance liquid chromatography and compared to labeled concentrations. Refill fluids were examined to identify physical differences and grouped into authentic and counterfeit products. Whereas nicotine was in 51.7% (15/29) of the Nigerian, 3.7% (1/27) of the Chinese and 1.6% (1/61) of the American refill fluids (range = 0.4 - 20.4 mg/mL), 8 British products did not contain nicotine. Products from China, the US, and Nigeria with trace amounts of nicotine (0.4 to 0.6 mg/mL) were authentic; however, all products from Nigeria with more than 3.7 mg/mL were counterfeit. We introduce 2 novel issues in the e-cigarette industry, the production of counterfeit refill fluids under a brandjacked label and inclusion of nicotine in 81.3% of the counterfeit products labeled 0 mg/mL. This study emphasizes the need for better control and monitoring of nicotine containing products and sales outlets.

  3. The music of gold: can gold counterfeited coins be detected by ear?

    Science.gov (United States)

    Manas, Arnaud

    2015-07-01

    In this paper I investigate whether it is true and to what extent counterfeit coins can be detected by their sound frequency. I describe the different types of counterfeit coins encountered and their respective characteristics. I then use the Kirchoff thin plate theory to model a coin, and confirm the validity of the theory by listening to the tone of genuine and counterfeit coins.

  4. Counterfeit Parts: DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain Risk

    Science.gov (United States)

    2016-02-01

    agencies and contractors we met with stated that they have encountered counterfeit parts less frequently in the DOD supply chain , in part, because...the DOD supply chain as a method to prevent further counterfeiting.22 DOD and industry officials noted that timely reporting of...COUNTERFEIT PARTS DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain Risk Report to Congressional Committees

  5. Microstructure-Based Counterfeit Detection in Metal Part Manufacturing

    Science.gov (United States)

    Dachowicz, Adam; Chaduvula, Siva Chaitanya; Atallah, Mikhail; Panchal, Jitesh H.

    2017-11-01

    Counterfeiting in metal part manufacturing has become a major global concern. Although significant effort has been made in detecting the implementation of such counterfeits, modern approaches suffer from high expense during production, invasiveness during manufacture, and unreliability in practice if parts are damaged during use. In this paper, a practical microstructure-based counterfeit detection methodology is proposed, which draws on inherent randomness present in the microstructure as a result of the manufacturing process. An optical Physically Unclonable Function (PUF) protocol is developed which takes a micrograph as input and outputs a compact, unique string representation of the micrograph. The uniqueness of the outputs and their robustness to moderate wear and tear is demonstrated by application of the methodology to brass samples. The protocol is shown to have good discriminatory power even between samples manufactured in the same batch, and runs on the order of several seconds per part on inexpensive machines.

  6. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  7. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  8. Counterfeit drugs and medical devices in developing countries

    Directory of Open Access Journals (Sweden)

    Glass BD

    2014-03-01

    Full Text Available Beverley D GlassSchool of Pharmacy and Molecular Sciences, James Cook University, Townsville, QLD, AustraliaAbstract: The World Health Organization has reported that counterfeit medicines potentially make up more than 50% of the global drug market, with a significant proportion of these fake products being encountered in developing countries. This occurrence is attributed to a lack of effective regulation and a weak enforcement capacity existing in these countries, with an increase in this trade resulting from the growing size and sophistication of drug counterfeiters. In addition, due to both cost and lack of availability of medicines, consumers in developing countries are more likely to seek out these inexpensive options. The World Health Organization is mindful of the impact of counterfeit drugs on consumer confidence in health care systems, health professionals, the supply chain, and genuine suppliers of medicines and medical devices. Antibiotics, antituberculosis drugs, and antimalarial and antiretroviral drugs are frequently targeted, with reports of 60% of the anti-infective drugs in Asia and Africa containing active pharmaceutical ingredients outside their pharmacopoeial limits. This has obvious public health implications of increasing drug resistance and negating all the efforts that have already gone into the provision of medicines to treat these life threatening conditions in the developing world. This review, while focusing on counterfeit medicines and medical devices in developing countries, will present information on their impact and how these issues can be addressed by regulation and control of the supply chain using technology appropriate to the developing world. The complexity of the problem will also be highlighted in terms of the definition of counterfeit and substandard medicines, including gray pharmaceuticals. Although this issue presents as a global public health problem, outcomes in developing countries where counterfeit

  9. RFID in the pharmaceutical industry: addressing counterfeits with technology.

    Science.gov (United States)

    Taylor, Douglas

    2014-11-01

    The use of Radio Frequency Identification (RFID) in the pharmaceutical industry has grown in recent years. The technology has matured from its specialized tracking and retail uses to a systemic part of supply chain management in international pharmaceutical production and distribution. Counterfeit drugs, however, remain a significant challenge for governments, pharmaceutical companies, clinicians, and patients and the use of RFID to track these compounds represents an opportunity for development. This paper discusses the medical, technological, and economic factors that support widespread adoption of RFID technology in the pharmaceutical industry in an effort to prevent counterfeit medicines from harming patients and brand equity.

  10. The counterfeit anti-malarial is a crime against humanity: a systematic review of the scientific evidence.

    Science.gov (United States)

    Karunamoorthi, Kaliyaperumal

    2014-06-02

    The counterfeiting of anti-malarials represents a form of attack on global public health in which fake and substandard anti-malarials serve as de facto weapons of mass destruction, particularly in resource-constrained endemic settings, where malaria causes nearly 660,000 preventable deaths and threatens millions of lives annually. It has been estimated that fake anti-malarials contribute to nearly 450,000 preventable deaths every year. This crime against humanity is often underestimated or ignored. This study attempts to describe and characterize the direct and indirect effects of counterfeit anti-malarials on public health, clinical care and socio-economic conditions. A search was performed using key databases, WHO documents, and English language search engines. Of 262 potential articles that were identified using a fixed set of criteria, a convenience sample of 105 appropriate articles was selected for this review. Artemisinin-based combination therapy (ACT) is an important tool in the fight against malaria, but a sizable number of patients are unable to afford to this first-line treatment. Consequently, patients tend to procure cheaper anti-malarials, which may be fake or substandard. Forensic palynology reveals that counterfeits originate in Asia. Fragile drug regulations, ineffective law-enforcement agencies and corruption further burden ailing healthcare facilities. Substandard/fake anti-malarials can cause (a) economic sabotage; (b) therapeutic failure; (c) increased risk of the emergence and spread of resistant strains of Plasmodium falciparum and Plasmodium vivax; (d) an undermining of trust/confidence in healthcare stakeholders/systems; and, (e) serious side effects or death. Combating counterfeit anti-malarials is a complex task due to limited resources and poor techniques for the detection and identification of fake anti-malarials. This situation calls for sustainable, global, scientific research and policy change. Further, responsible stakeholders in

  11. Safeguarding against substandard/counterfeit drugs: mitigating a macroeconomic pandemic.

    Science.gov (United States)

    Wertheimer, Albert I; Norris, Jeremiah

    2009-03-01

    Counterfeiting and the sale of substandard pharmaceutical products can no longer be ignored. At 10% of global trade, counterfeiting is affecting many countries, causing serious downstream expenses and resource shortages. To describe the nature and impact of drug product counterfeiting and substandard product sale and to present strategies that may have value in ameliorating these phenomena. A literature review was conducted, supplemented by interviews of key leaders/experts in the field and the search of relevant web sites. All of the data were combined, integrated, and coordinated to present the complete picture of this problem. In addition to known corruption in some of the least developed countries, the trail through developed countries was detected. This report identifies means to detect faulty products and describes efforts toward resisting and ending these corrupt practices. Counterfeit drugs, if not stopped, can be responsible for a macroeconomic pandemic where major portions of some populations may be too ill to work and where the health sector resources are completely overwhelmed, as with the case of HIV/AIDS.

  12. Discriminant function for classification of genuine and counterfeit ...

    African Journals Online (AJOL)

    Findings of the research revealed that the naira notes are to be classified as counterfeit or genuine according to the model: Z = 440.3007X - 858.8366Y + 147.5228Z such that Z > Z0 where Z0 is the end point of classification. Hotelling's T2 and Mahalanobis quantity were also computed. The test result showed that ...

  13. Near-infrared imaging spectroscopy for counterfeit drug detection

    Science.gov (United States)

    Arnold, Thomas; De Biasio, Martin; Leitner, Raimund

    2011-06-01

    Pharmaceutical counterfeiting is a significant issue in the healthcare community as well as for the pharmaceutical industry worldwide. The use of counterfeit medicines can result in treatment failure or even death. A rapid screening technique such as near infrared (NIR) spectroscopy could aid in the search for and identification of counterfeit drugs. This work presents a comparison of two laboratory NIR imaging systems and the chemometric analysis of the acquired spectroscopic image data. The first imaging system utilizes a NIR liquid crystal tuneable filter and is designed for the investigation of stationary objects. The second imaging system utilizes a NIR imaging spectrograph and is designed for the fast analysis of moving objects on a conveyor belt. Several drugs in form of tablets and capsules were analyzed. Spectral unmixing techniques were applied to the mixed reflectance spectra to identify constituent parts of the investigated drugs. The results show that NIR spectroscopic imaging can be used for contact-less detection and identification of a variety of counterfeit drugs.

  14. 78 FR 35262 - Detection and Avoidance of Counterfeit Electronic Parts

    Science.gov (United States)

    2013-06-12

    ... experts and interested parties in Government and the private sector regarding the electronic parts... Avoidance of Counterfeit Electronic Parts AGENCY: Defense Acquisition Regulations System, Department of... interested parties in Government and the private sector about the requirements for detection and avoidance of...

  15. Counterfeiting in performance- and image-enhancing drugs.

    Science.gov (United States)

    Graham, Michael R; Ryan, Paul; Baker, Julien S; Davies, Bruce; Thomas, Non-Eleri; Cooper, Stephen-Mark; Evans, Peter; Easmon, Sue; Walker, Christopher J; Cowan, David; Kicman, Andrew T

    2009-03-01

    The current drastic escalation in obesity may be contributing to the exponential rise in drugs used for image enhancement. Drugs such as anabolic-androgenic steroids (AAS) are perceived as a viable method of achieving a perfect physique. They are also the most widely abused drugs in sport. The Internet has encouraged the abuse of expensive drugs, particularly human growth hormone (hGH), resulting in increased importation for personal use. The substantial increase in this market has opened up avenues for counterfeiting, estimated as a multi-million pound business. The acute adverse effects from contaminated vials may result in a variety of pathologies including communicable diseases. In 2007, in the UK, a series of intramuscular abscesses, requiring surgical treatment, led us to study samples obtained from the underground market. The analysis of 38 parenteral samples and 19 oral samples of tablets was performed by a World Anti-Doping Agency (WADA) accredited laboratory, in an attempt to establish the extent of available counterfeit products. Fifty-three per cent (20) of the injectable AAS esters and 21% (4) of the oral tablets were counterfeit. Culture and sensitivity revealed the presence of skin commensal organisms, which may have contributed to the development of the abscesses. Users of AAS and hGH for sport, including bodybuilding, are currently risking their health because of counterfeit and poorly controlled products. Copyright 2009 John Wiley & Sons, Ltd.

  16. Combining overt and covert anti-counterfeiting technologies for securities

    Science.gov (United States)

    Uematsu, Tsuyoshi

    2006-02-01

    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  17. Caveat oncologist: clinical findings and consequences of distributing counterfeit erythropoietin in the United States.

    Science.gov (United States)

    Qureshi, Zaina P; Norris, Leann; Sartor, Oliver; McKoy, June M; Armstrong, John; Raisch, Dennis W; Garg, Vishvas; Stafkey-Mailey, Dana; Bennett, Charles Lee

    2012-03-01

    Counterfeit pharmaceuticals pose risks domestically. Because of their cost, cancer pharmaceuticals are vulnerable. We review findings from a domestic counterfeiting episode involving erythropoietin and outline anticounterfeiting recommendations for policy makers, patients, and health care professionals. Information was obtained on patients who received counterfeit erythropoietin, its distribution, and criminal investigations into counterfeiting networks. Interview sources included a physician, an attorney, employees of the Florida Department of Health and Human Services and the US Food and Drug Administration's (FDA) Office of Criminal Investigation, manufacturers, and wholesalers. Other sources included the book "Dangerous Doses," LexisNexis (search terms "counterfeit" and "erythropoietin") and the FDA database. Counterfeit product consisted of 2,000 U vials with counterfeit labels denoting 40,000 U. The counterfeiters, in collaboration with a Miami pharmacy, purchased 110,000 erythropoietin 2,000 U vials and affixed counterfeit labels to each vial. Products were then sold via the pharmaceutical "gray market" to wholesalers, then pharmacy chains. Investigations by Florida government officials implicated 17 persons, all of whom were found guilty of trafficking in counterfeit pharmaceuticals. Despite the large size of the operation, the FDA received reports of only 12 patients who had received counterfeit erythropoietin and detailed information for only two individuals. A 17-year-old liver transplant recipient and a 61-year-old patient with breast cancer experienced loss of efficacy after receiving counterfeit erythropoietin. Wider use of FDA anticounterfeit initiatives, limiting pharmaceutical suppliers to reputable distributors, and educating providers and patients about signs of counterfeit drugs can improve the safety of cancer pharmaceuticals.

  18. Comparison of cyclic fatigue resistance of original and counterfeit rotary instruments.

    Science.gov (United States)

    Ertas, Huseyin; Capar, Ismail Davut; Arslan, Hakan; Akan, Ender

    2014-05-31

    In recent years, with the advances in counterfeiting methods, counterfeit products have reached the dental market. The purpose of this study was to compare the cyclic fatigue resistance of original and counterfeit rotary root canal instruments. The cyclic fatigue of original and counterfeit ProTaper F2 endodontic instruments was tested (n = 20) in 3 mm radius steel canals with a 60° angle of curvature. The number of cycles to fracture (NCF) was calculated, and the data were subjected to the Student's t-test (α = 0.05). The original instruments showed better cyclic fatigue resistance than the counterfeit ones (p instruments was very low. As a result, clinicians should be careful not to purchase counterfeit products.

  19. Detection of counterfeit brand spirits using 1H NMR fingerprints in comparison to sensory analysis.

    Science.gov (United States)

    Kuballa, Thomas; Hausler, Thomas; Okaru, Alex O; Neufeld, Maria; Abuga, Kennedy O; Kibwage, Isaac O; Rehm, Jürgen; Luy, Burkhard; Walch, Stephan G; Lachenmeier, Dirk W

    2018-04-15

    Beverage fraud involving counterfeiting of brand spirits is an increasing problem not only due to deception of the consumer but also because it poses health risks e.g. from possible methanol admixture. Suspicious spirit samples from Russia and Kenya were analysed using 1 H nuclear magnetic resonance (NMR) spectroscopy in comparison to authentic products. Using linear regression analysis of spectral integral values, 4 counterfeited samples from Russia and 2 from Kenya were easily identifiable with R 2  counterfeited and authentic samples but the assessors were unable to correctly identify the counterfeited product in the majority of cases. An important conclusion is that consumers cannot assumed to be self-responsible when consuming counterfeit alcohol because there is no general ability to organoleptically detect counterfeit alcohol. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. An NFC-Enabled Anti-Counterfeiting System for Wine Industry

    OpenAIRE

    Yiu, Neo C. K.

    2016-01-01

    Wine counterfeiting is not a new problem, however, the situation in China has been going worse even after Hong Kong manifested itself as a wine trading and distribution center with abolishing all taxes on wine in 2008. The most basic method, printing a fake label with a subtly misspelled brand name or a slightly different logo in hopes of fooling wine consumers, has been common to other luxury-goods markets prone to counterfeiting. More ambitious counterfeiters might remove an authentic label...

  1. Caveat Oncologist: Clinical Findings and Consequences of Distributing Counterfeit Erythropoietin in the United States

    Science.gov (United States)

    Qureshi, Zaina P.; Norris, LeAnn; Sartor, Oliver; McKoy, June M.; Armstrong, John; Raisch, Dennis W.; Garg, Vishvas; Stafkey-Mailey, Dana; Bennett, Charles Lee

    2012-01-01

    Purpose: Counterfeit pharmaceuticals pose risks domestically. Because of their cost, cancer pharmaceuticals are vulnerable. We review findings from a domestic counterfeiting episode involving erythropoietin and outline anticounterfeiting recommendations for policy makers, patients, and health care professionals. Materials and Methods: Information was obtained on patients who received counterfeit erythropoietin, its distribution, and criminal investigations into counterfeiting networks. Interview sources included a physician, an attorney, employees of the Florida Department of Health and Human Services and the US Food and Drug Administration's (FDA) Office of Criminal Investigation, manufacturers, and wholesalers. Other sources included the book “Dangerous Doses,” LexisNexis (search terms “counterfeit” and “erythropoietin”) and the FDA database. Results: Counterfeit product consisted of 2,000 U vials with counterfeit labels denoting 40,000 U. The counterfeiters, in collaboration with a Miami pharmacy, purchased 110,000 erythropoietin 2,000 U vials and affixed counterfeit labels to each vial. Products were then sold via the pharmaceutical “gray market” to wholesalers, then pharmacy chains. Investigations by Florida government officials implicated 17 persons, all of whom were found guilty of trafficking in counterfeit pharmaceuticals. Despite the large size of the operation, the FDA received reports of only 12 patients who had received counterfeit erythropoietin and detailed information for only two individuals. A 17-year-old liver transplant recipient and a 61-year-old patient with breast cancer experienced loss of efficacy after receiving counterfeit erythropoietin. Conclusion: Wider use of FDA anticounterfeit initiatives, limiting pharmaceutical suppliers to reputable distributors, and educating providers and patients about signs of counterfeit drugs can improve the safety of cancer pharmaceuticals. PMID:23077434

  2. The Determinants of Purchase Intention towards Counterfeit Mobile Phones in Pakistan

    OpenAIRE

    Muhammad Rizwan; Muhammad Nasir Jamal; Zain-Ul-Abidin; Khadeeja Gul Zareen; Arslan Khan; Barza Farhat; Rashid Khan

    2013-01-01

    The alarming emergence of global economic phenomenon of counterfeiting and the deficiency of research work in the context of consumer purchase intentions towards counterfeits makes the study more worthwhile than ever before. This study intends to examine the relationship of value consciousness, low price, past experience peer pressure and attitude on consumer purchase intentions in the context of counterfeit mobile phones in Pakistan. A sample of 329 students with the help of a questionnaire ...

  3. Vietnamese Attitudes and Behavioural Patterns towards Counterfeit Brands

    Directory of Open Access Journals (Sweden)

    Giang Huynh

    2014-12-01

    Full Text Available This study examines Vietnamese female consumers’ attitudes towards counterfeit branded products; by investigating the influence of brand image, product involvement and price advantage towards decision-making processes associated with purchasing and ownership. An inductive anti-positivist approach was adopted, employing qualitative methods; drawing from in-depth interviews distilled and synthesized using Word Cloud software, as Geographic Information System (GIS based Spatial Analyses. Findings suggest that Price Advantage plays a determining and predominant role in encouraging consumers’ purchase intention of a counterfeit product. In addition, Brand Image has positive effect on the purchase intention as well; while product involvement plays no significant role in the process. Further observations point to there being paucity of literature that focuses on Vietnamese and ASEAN markets. With this is mind, a new conceptual framework was developed to reflect the nuances of the Vietnamese consumer experience; which it is suggested will be of value to scholars, practitioners and further studies.

  4. Addressing Counterfeit Parts in the DoD Supply Chain

    Science.gov (United States)

    2014-03-01

    property rights to that part. Franchised distributor Distributor with which OCM has a contractual agreement to buy , stock, repackage, sell, and...because the DoD is not the largest buyer of microelectronics, the private sector market must buy into DNA tagging in order for manufacturers to include...tacitly acknowledged that “it is impossible to eliminate all risk of counterfeit in every system that the DoD buys or supports” (p. 3). Thus, Metzger

  5. Suspect/Counterfeit Items Information Guide for Subcontractors/Suppliers

    Energy Technology Data Exchange (ETDEWEB)

    Tessmar, Nancy D. [Los Alamos National Laboratory; Salazar, Michael J. [Los Alamos National Laboratory

    2012-09-18

    Counterfeiting of industrial and commercial grade items is an international problem that places worker safety, program objectives, expensive equipment, and security at risk. In order to prevent the introduction of Suspect/Counterfeit Items (S/CI), this information sheet is being made available as a guide to assist in the implementation of S/CI awareness and controls, in conjunction with subcontractor's/supplier's quality assurance programs. When it comes to counterfeit goods, including industrial materials, items, and equipment, no market is immune. Some manufactures have been known to misrepresent their products and intentionally use inferior materials and processes to manufacture substandard items, whose properties can significantly cart from established standards and specifications. These substandard items termed by the Department of Energy (DOE) as S/CI, pose immediate and potential threats to the safety of DOE and contractor workers, the public, and the environment. Failure of certain systems and processes caused by an S/CI could also have national security implications at Los Alamos National Laboratory (LANL). Nuclear Safety Rules (federal Laws), DOE Orders, and other regulations set forth requirements for DOE contractors to implement effective controls to assure that items and services meet specified requirements. This includes techniques to implement and thereby minimizing the potential threat of entry of S/CI to LANL. As a qualified supplier of goods or services to the LANL, your company will be required to establish and maintain effective controls to prevent the introduction of S/CI to LANL. This will require that your company warrant that all items (including their subassemblies, components, and parts) sold to LANL are genuine (i.e. not counterfeit), new, and unused, and conform to the requirements of the LANL purchase orders/contracts unless otherwise approved in writing to the Los Alamos National Security (LANS) contract administrator

  6. Destruction of illegal things and devices to contrast the counterfeiting

    Directory of Open Access Journals (Sweden)

    Dr.Sc. Mario Antinucci

    2016-01-01

    Full Text Available The movement of goods illegal and counterfeit in the circuit of the economy and the labor market, has put in place of criminal policy internal supranational and a primary need of confiscation and destruction in relation to safety issues transnational linked to all forms of counterfeiting, piracy agro-food to fraud in industrial brands of high fashion et similia: from here the major node of the procedure of destruction of goods illegal and counterfeit subject to seizure and confiscation and respect of guarantees communities of the criminal process, especially in the light of the amendment of art. 260, co. 3 bis and ter, c.p.p. with the d.l. 23-5-2008, n. 92 and subsequent amendments (so-called Safety Package. In line with the criminal policy of ''security'', in l. 23-7-2009, n. 99, the so-called Decree Development, between the ''darrangements for the development and the internationalization of enterprises, as well as in the field of energy'' and  wanted to redesign, with analytical provisions of particular edge, the perimeter of the criminal-law protection ''Dei property rights industrial'' through the introduction of four new hypothesis of offenses of counterfeiting (artt. 473, 474, 474 b and c, 517 b and c, c.p. and related hypothesis of obligatory confiscation (art. 474 bis and 517 ter c.p., with implications concerning the regime differentiated penitentiary (art. 4 bis, co. 1 ter, ord. penit. in relation to the cases of belonging to criminal association aimed to commit new offenses referred to in articles 473-474 c.p. (arts. 416 bis, 6º Co., c.p. and 51, co. 3 bis, c.p.p., as well as the regulatory body containing the so-called ''responsability of administrative entities'', within the meaning of art. 19, d.lg. 8-6-2001, n. 231.

  7. Perceived Quality Of Counterfeit Perfume And Original Perfume

    OpenAIRE

    Saerang, David Paul Elia; Turk, Caleb Elijah

    2015-01-01

    Perfume is one type of product that often has prestigious prices tied with quality to attract consumers, which (as often is seen with high-priced products) arouses the interests of counterfeiters to copy the originals. Perfume comes in many fragrances which are offered to customers. Fragrances have their own characteristics in order to match with the various tastes, moods, and occasions they may want them for. Perfume also can reflect certain life-styles. Perfume creates different perceived v...

  8. WGOE Discussion topic introduction: Counterfeit, Suspect, and Fraudulent parts

    International Nuclear Information System (INIS)

    Thorp, John

    2011-01-01

    This presentation (slides) provided an introduction to CSFI discussion. It presents: 1 - the many faces of counterfeiting (design and intellectual property, manufacturing and fabrication, product control, branding and document fraud), 2 - the key messages from the June 3, 2010 US-NRC Commission Briefing, 3 - the Regulator's role in ensuring nuclear plant safety, 4 - the CSFI survey status, 5 - the questions to be discussed during the meeting

  9. Counterfeiting as corporate externality: intellectual property crime and global insecurity

    OpenAIRE

    2010-01-01

    Abstract Corporate negative externalities occur when corporations place some of the costs of their profit-seeking activity onto society. This paper suggests that the current global problem of intellectual property crime is such an externality, and that it has not been recognised as such because corporations present product counterfeiting and piracy as crimes which reduce their revenue, rather than as predictable side effects of corporate production and merchandising, including bran...

  10. [Anti-counterfeit activities of pharmaceutical companies in Japan: for patient safety].

    Science.gov (United States)

    Shofuda, Ken-ichi; Aragane, Katsumi; Igari, Yasutaka; Matsumoto, Kinya; Ito, Kazuya

    2014-01-01

    Global spread of counterfeit medicines is an imminent threat for the patients' safety. Although major targets of counterfeits are still erectile dysfunction (ED) drugs in the industrialized countries, including Japan, anti-cancer agents and some medicines for metabolic syndromes are also being counterfeited and circulated to the market mainly through the Internet. Due to the global expansion of the business, pharmaceutical companies based in Japan are suffering from the damage of counterfeits, illegal sales including diversion, and thefts, which have never been experienced in the conventional domestic market. We, pharmaceutical companies, must be responsible for the prevention of the prevalence because our mission is to deliver effective and safe medicine to patients. For this end, we are taking necessary actions including, 1. Forestalling counterfeit, falsification and illicit trade: Measures to prevent counterfeiting are taken by introducing anti-counterfeit technologies to the packaging and tablets on a risk basis. It is also important to establish supply chain security on a global scale. 2. Finding out counterfeits and cooperating crackdown: We are conducting market and internet surveillances when high risk products are sold in high risk markets. The outcome of the criminal investigation is reported to authorities and police if necessary. 3. Conducting educational campaign to medical staff or patients: For example, four companies which manufacture and sell ED drug in Japan are collaboratively continuing activities to raise the awareness of the danger of Internet purchase. To deliver effective and safe medicines stably and globally, pharmaceutical companies extend comprehensive measures against counterfeit and illicit trading.

  11. An exploration of counterfeit medicine surveillance strategies guided by geospatial analysis: lessons learned from counterfeit Avastin detection in the US drug supply chain.

    Science.gov (United States)

    Cuomo, Raphael E; Mackey, Tim K

    2014-12-02

    To explore healthcare policy and system improvements that would more proactively respond to future penetration of counterfeit cancer medications in the USA drug supply chain using geospatial analysis. A statistical and geospatial analysis of areas that received notices from the Food and Drug Administration (FDA) about the possibility of counterfeit Avastin penetrating the US drug supply chain. Data from FDA warning notices were compared to data from 44 demographic variables available from the US Census Bureau via correlation, means testing and geospatial visualisation. Results were interpreted in light of existing literature in order to recommend improvements to surveillance of counterfeit medicines. This study analysed 791 distinct healthcare provider addresses that received FDA warning notices across 30,431 zip codes in the USA. Statistical outputs were Pearson's correlation coefficients and t values. Geospatial outputs were cartographic visualisations. These data were used to generate the overarching study outcome, which was a recommendation for a strategy for drug safety surveillance congruent with existing literature on counterfeit medication. Zip codes with greater numbers of individuals age 65+ and greater numbers of ethnic white individuals were most correlated with receipt of a counterfeit Avastin notice. Geospatial visualisations designed in conjunction with statistical analysis of demographic variables appeared more capable of suggesting areas and populations that may be at risk for undetected counterfeit Avastin penetration. This study suggests that dual incorporation of statistical and geospatial analysis in surveillance of counterfeit medicine may be helpful in guiding efforts to prevent, detect and visualise counterfeit medicines penetrations in the US drug supply chain and other settings. Importantly, the information generated by these analyses could be utilised to identify at-risk populations associated with demographic characteristics

  12. Trick or Treat? An Examination of Marketing Relationships in a Nondeceptive Counterfeit Market

    Science.gov (United States)

    Xiao, Sarah Hong; Nicholson, Michael

    2010-01-01

    Who is most responsible for the proliferation of counterfeit goods--the illicit purveyor of such products or the consumer who procures them? This paper seeks to address this question by presenting a behavior analysis of counterfeit marketing firms in China and the interdependent relationships between legitimate retailers, consumers, and the…

  13. Counterfeit Drug Penetration into Global Legitimate Medicine Supply Chains: A Global Assessment

    Science.gov (United States)

    Mackey, Tim K.; Liang, Bryan A.; York, Peter; Kubic, Thomas

    2015-01-01

    Counterfeit medicines are a global public health risk. We assess counterfeit reports involving the legitimate supply chain using 2009–2011 data from the Pharmaceutical Security Institute Counterfeit Incident System (PSI CIS) database that uses both open and nonpublic data sources. Of the 1,510 identified CIS reports involving counterfeits, 27.6% reported China as the source country of the incident/detection. Further, 51.3% were reported as counterfeit but the specific counterfeit subcategory was not known or verifiable. The most prevalent therapeutic category was anti-infectives (21.1%) with most reports originating from health-related government agencies. Geographically, Asian and Latin American regions and, economically, middle-income markets were most represented. A total of 127 (64.8%) of a total of 196 countries had no legitimate supply chain CIS counterfeit reports. Improvements in surveillance, including detection of security breaches, data collection, analysis, and dissemination are urgently needed to address public health needs to combat the global counterfeit medicines trade. PMID:25897059

  14. Screening suspected counterfeit Viagra and imitations of Viagra with near-infrared spectroscopy.

    NARCIS (Netherlands)

    Vredenbregt, M J; Blok-Tip, L; Hoogerbrugge, Ronald; Barends, D M; Kaste, D de

    2006-01-01

    We describe a near-infrared spectroscopy (NIRS) method for fast-screening Viagra tablets, counterfeit Viagra tablets, and imitations of Viagra. The method can (1) check the homogeneity of a batch; (2) distinguish counterfeits and imitations from authentic Viagra; (3) screen for the presence of

  15. 31 CFR 101.4 - Extraction of gold bullion from the counterfeit coins.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Extraction of gold bullion from the... MITIGATION OF FORFEITURE OF COUNTERFEIT GOLD COINS § 101.4 Extraction of gold bullion from the counterfeit... Bureau of the Mint where, if economically feasible, the gold bullion will be extracted from the...

  16. 75 FR 36062 - Notice of Enforcement Policy Symposium on Combating Counterfeiting in the 21st Century

    Science.gov (United States)

    2010-06-24

    ... second panel on criminal procedure will involve a discussion of enforcement policy involving the... Enforcement Policy Symposium on Combating Counterfeiting in the 21st Century AGENCY: United States Patent and... United States Government enforcement policy regarding counterfeit goods involving health and safety...

  17. Identification of Counterfeit Alcoholic Beverages Using Cluster Analysis in Principal-Component Space

    Science.gov (United States)

    Khodasevich, M. A.; Sinitsyn, G. V.; Gres'ko, M. A.; Dolya, V. M.; Rogovaya, M. V.; Kazberuk, A. V.

    2017-07-01

    A study of 153 brands of commercial vodka products showed that counterfeit samples could be identified by introducing a unified additive at the minimum concentration acceptable for instrumental detection and multivariate analysis of UV-Vis transmission spectra. Counterfeit products were detected with 100% probability by using hierarchical cluster analysis or the C-means method in two-dimensional principal-component space.

  18. Counterfeits or Shanzhai? The Role of Face and Brand Consciousness in Luxury Copycat Consumption.

    Science.gov (United States)

    Jiang, Ling; Shan, Juan

    2016-08-01

    This study responds to the emergence of the Shanzhai phenomenon in the international marketplace and introduces the Shanzhai phenomenon into the consumer behavior literature by defining it and comparing it with well-known concepts like luxury counterfeits. More specifically, it examines how consumers' face and brand consciousness influence their willingness to buy luxury counterfeits rather than Shanzhai products. The results show that consumers who are more face conscious are more likely to choose luxury counterfeits than Shanzhai products. In addition, consumers' face consciousness elicits a high concern for well-known brands, which also in turn leads to a more favorable attitude toward luxury counterfeits than Shanzhai products. These findings enable researchers to better understand consumers' responses toward both Shanzhai and counterfeit products and help companies that are protecting their original brands to tailor their consumer-directed measures more effectively. © The Author(s) 2016.

  19. Chromatographic determination of clopidogrel bisulfate; detection and quantification of counterfeit Plavix® tablets

    Directory of Open Access Journals (Sweden)

    Mona E. ElTantawy

    2014-06-01

    Full Text Available Counterfeiting of pharmaceutical products is a global problem. Upon using quality-ensuring methods of international pharmacopoeias, additional impurities and the low content of the active pharmaceutical ingredients were detected. In this paper, two chromatographic HPLC and TLC-densitometric methods were proposed as fast and reliable methods for detection and quantitation of counterfeit Plavix® tablets. These tablets were chemically counterfeited by aspirin, its degradate salicylic acid and metronidazole which were separated, besides the active ingredient clopidogrel bisulfate, by the proposed methods. Also, counterfeit was in packaging, strips and tablets’ color and these could be seen by visual inspection compared to original drug. The proposed methods can easily differentiate genuine from counterfeited tablets without need of prior separation. The proposed methods were validated according to ICH guidelines and applied to eleven batches, also were compared statistically with the reported one.

  20. Chemical Analysis of Counterfeit Hepatitis C Drug Found in Japan.

    Science.gov (United States)

    Uchiyama, Nahoko; Kamakura, Hiroyuki; Masada, Sayaka; Tsujimoto, Takashi; Hosoe, Junko; Tokumoto, Hiroko; Maruyama, Takuro; Goda, Yukihiro; Hakamatsuka, Takashi

    2017-10-01

    In January 2017, counterfeits of the hepatitis C drug 'HARVONI ® Combination Tablets' (HARVONI ® ) were found at a pharmacy chain through unlicensed suppliers in Japan. A total of five lots of counterfeit HARVONI ® (samples 1-5) bottles were found, and the ingredients of the bottles were all in tablet form. Among them, two differently shaped tablets were present in two of the bottles (categorized as samples 2A, 2B, 4A, and 4B). We analyzed the total of seven samples by high-resolution LC-MS, GC-MS and NMR. In samples 2A, 3 and 4B, sofosbuvir, the active component of another hepatitis C drug, SOVALDI ® Tablets 400 mg (SOVALDI ® ), was detected. In sample 4A, sofosbuvir and ledipasvir, the active components of HARVONI ® , were found. A direct comparison of the four samples and genuine products showed that three samples (2A, 3, 4B) are apparently SOVALDI ® and that sample 2A is HARVONI ® . In samples 1 and 5, several vitamins but none of the active compounds usually found in HARVONI ® (i.e., sofosbuvir and ledipasvir) were detected. Our additional investigation indicates that these two samples are likely to be a commercial vitamin supplement distributed in Japan. Sample 2B, looked entirely different from HARVONI ® and contained several herbal constitutents (such as ephedrine and glycyrrhizin) that are used in Japanese Kampo formulations. A further analysis indicated that sample 2B is likely to be a Kampo extract tablet of Shoseiryuto which is distributed in Japan. Considering this case, it is important to be vigilant to prevent a recurrence of distribution of counterfeit drugs.

  1. Integrated circuit authentication hardware Trojans and counterfeit detection

    CERN Document Server

    Tehranipoor, Mohammad; Zhang, Xuehui

    2013-01-01

    This book describes techniques to verify the authenticity of integrated circuits (ICs). It focuses on hardware Trojan detection and prevention and counterfeit detection and prevention. The authors discuss a variety of detection schemes and design methodologies for improving Trojan detection techniques, as well as various attempts at developing hardware Trojans in IP cores and ICs. While describing existing Trojan detection methods, the authors also analyze their effectiveness in disclosing various types of Trojans, and demonstrate several architecture-level solutions. 

  2. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. Counterfeit, Suspect, Fraudulent Items (CSFI): Today and Tomorrow

    International Nuclear Information System (INIS)

    Pasquale, Daniel

    2011-01-01

    This presentation (slides) addresses the U.S. NRC's current perception of the CSFI threat as it relates to existing licensed operating nuclear power plants as well as future units. The presentation addressed the following topics: 1) recent CSFI activity, 2) the role of Quality Assurance, 3) what the US NRC is doing, 4) US NRC outreach efforts, and 5) the need for a solid CSFI community. The presentation refers to the growing CSFI threat to other heavy industries as reported recently by the U.S. Department of Commerce, and describes how the existing US NRC guidance on this issue has proven to be the foundation for a strong anti-counterfeiting program. It also stresses the need for all stakeholders to adopt and maintain a proactive approach to counter the CSFI threat, including the need to share information, institute a zero tolerance policy, involve engineering in the procurement and product inspection processes, ensure that inspection processes (source, receipt, and testing) are effective, and to utilize engineering based programs in support of commercial grade dedication activities. Included with the presentation is a comprehensive list of generic communications issued by the U.S. NRC in response to counterfeit/fraudulent items over the years, and some of the various electronic repositories regarding the nuclear industry where related event information may be accessed

  4. Roman sophisticated surface modification methods to manufacture silver counterfeited coins

    Science.gov (United States)

    Ingo, G. M.; Riccucci, C.; Faraldi, F.; Pascucci, M.; Messina, E.; Fierro, G.; Di Carlo, G.

    2017-11-01

    By means of the combined use of X-ray photoelectron spectroscopy (XPS), optical microscopy (OM) and scanning electron microscopy (SEM) coupled with energy dispersive X-ray spectroscopy (EDS) the surface and subsurface chemical and metallurgical features of silver counterfeited Roman Republican coins are investigated to decipher some aspects of the manufacturing methods and to evaluate the technological ability of the Roman metallurgists to produce thin silver coatings. The results demonstrate that over 2000 ago important advances in the technology of thin layer deposition on metal substrates were attained by Romans. The ancient metallurgists produced counterfeited coins by combining sophisticated micro-plating methods and tailored surface chemical modification based on the mercury-silvering process. The results reveal that Romans were able systematically to chemically and metallurgically manipulate alloys at a micro scale to produce adherent precious metal layers with a uniform thickness up to few micrometers. The results converge to reveal that the production of forgeries was aimed firstly to save expensive metals as much as possible allowing profitable large-scale production at a lower cost. The driving forces could have been a lack of precious metals, an unexpected need to circulate coins for trade and/or a combinations of social, political and economic factors that requested a change in money supply. Finally, some information on corrosion products have been achieved useful to select materials and methods for the conservation of these important witnesses of technology and economy.

  5. Preparation and RGB upconversion optic properties of transparent anti-counterfeiting films.

    Science.gov (United States)

    Yao, Weijing; Tian, Qingyong; Liu, Jun; Xue, Qingwen; Li, Mengxiao; Liu, Li; Lu, Qiang; Wu, Wei

    2017-10-26

    Advanced anti-counterfeiting labels have aroused an intensive interest in packaging industry to avoid the serious issue of counterfeit. However, the preparation and cost of the existing labels associated with the drawbacks, including the complex and high-cost equipment, limit the protection of the authenticity of goods. Herein, we developed a series of anti-counterfeiting labels based on multicolor upconversion micro-particles (UCMPs) inks via straightforward and low-cost solutions, including spin-coating, stamping and screen printing. The UCMPs were synthesized through a facile hydrothermal process and displayed tunable red (R), green (G) and blue (B) color by doping different lanthanide ions, which are Er 3+ /Tm 3+ , Yb 3+ /Er 3+ and Yb 3+ /Tm 3+ in NaYF 4 hosts, respectively. The optimal UCMPs inks were deposited on a flexible polyethylene terephthalate (PET) substrate to obtain transparent anti-counterfeiting labels possessing higher transmittance, stronger upconversion fluorescence intensity and good photostability. Under ambient conditions, the patterns and films were transparent, but could exhibit multicolor light under 980 nm laser excitation. They can be used as anti-counterfeiting labels for die-cutting packages to further elevate the security of goods. The tunable and designable transparent anti-counterfeiting labels based on RGB UCMPs inks exhibit the merits of low-cost, easy-manufacture and versatility, underlying the practical application in the field of anti-counterfeiting.

  6. Dynamics of counterfeit alcohol and tobacco goods in the Tatarstan Republic market

    Directory of Open Access Journals (Sweden)

    Oleg R. Karatayev

    2015-12-01

    Full Text Available Objective to identify and assess the share of counterfeit products in the total volume of alcohol and tobacco products in the consumer market of Tatarstan Republic which will allow the inspection bodies to deal more effectively to prevent the spreading of counterfeit products. Methods the research proposed in this paper used methods of probability theory and mathematical statistics and the method of sampling analysis of certificates for products in accordance with applicable laws and regulations of Rosstandart. Results basing on a sampling of certificates for products directly from retail outlets analysis of the state alcohol and tobacco consumer market of Tatarstan was carried out. Improper filling of the form of the certificate for products was identified violating all existing norms and laws which are strictly prescribed in technical regulations. On the basis of these violations the validity of certificates for products was assessed and the conclusion was made about the products quality. The share of counterfeit alcohol and tobacco products in the total sales in the consumer market was assessed. The shortcomings of the inspection authorities to detect counterfeit products were identified. Scientific novelty the consumer market was researched basing on the method of sampling using probability theory and mathematical statistics to estimate the share of counterfeit alcohol and tobacco products in the consumer market of Tatarstan. The error sampling for counterfeit products in the consumer market was defined. Practical significance the obtained results will allow the inspection authorities to better and more accurately identify counterfeit goods and to restrict the access of counterfeit alcohol and tobacco products to the consumer market of Tatarstan. It is necessary to strengthen the role of state regulation of commercial activities in the consumer market of Russia to stop the flow of counterfeit alcohol and tobacco products to the consumer

  7. Screen-printed nanoparticles as anti-counterfeiting tags

    Science.gov (United States)

    Campos-Cuerva, Carlos; Zieba, Maciej; Sebastian, Victor; Martínez, Gema; Sese, Javier; Irusta, Silvia; Contamina, Vicente; Arruebo, Manuel; Santamaria, Jesus

    2016-03-01

    Metallic nanoparticles with different physical properties have been screen printed as authentication tags on different types of paper. Gold and silver nanoparticles show unique optical signatures, including sharp emission bandwidths and long lifetimes of the printed label, even under accelerated weathering conditions. Magnetic nanoparticles show distinct physical signals that depend on the size of the nanoparticle itself. They were also screen printed on different substrates and their magnetic signals read out using a magnetic pattern recognition sensor and a vibrating sample magnetometer. The novelty of our work lies in the demonstration that the combination of nanomaterials with optical and magnetic properties on the same printed support is possible, and the resulting combined signals can be used to obtain a user-configurable label, providing a high degree of security in anti-counterfeiting applications using simple commercially-available sensors.

  8. Growth of Scytalidium sp. in a counterfeit bevacizumab bottle

    Directory of Open Access Journals (Sweden)

    Gerardo Garcia-Aguirre

    2013-01-01

    Full Text Available After drawing a dose from an closed bevacizumab (Avastin bottle, a fungus-like foreign body was observed inside. Samples from the vial were cultured in Sabouraud Emmons media. Growth of multiple light brown colonies with dark pigment was observed after 10 days. The species was identified as Scytalidium sp.Vial, analysis reported that the seal was lacking proper identification measures and that the label, batch number and expiry date did not correspond to a genuine product. Chemical analysis showed no protein, but 3% of polyethylene glycol, citrate and ethanol. Counterfeit bevacizumab is a real situation that poses a significant risk for ophthalmology and oncology patients. The medical community should be aware of this situation in order to enforce adequate preventive measures.

  9. Recent developments in counterfeits and imitations of Viagra, Cialis and Levitra. A 2005-2006 update

    NARCIS (Netherlands)

    Venhuis BJ; Barends DM; Zwaagstra ME; Kaste D de; Douane Laboratorium; KCF

    2007-01-01

    A strong trend is observed towards increasingly professional counterfeits and imitations of Viagra, Cialis and Levitra, with regard to the appearance of tablets, capsules and packaging. The professional presentation will deceive potential consumers into assuming these products are legal, efficacious

  10. 75 FR 79069 - Anti-Counterfeiting Trade Agreement: Request for Comments From the Public

    Science.gov (United States)

    2010-12-17

    ... proposed agreement to strengthen international cooperation, enforcement practices and legal frameworks for... international cooperation and to promote strong enforcement practices. Together these provisions will help to... OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE Anti-Counterfeiting Trade Agreement: Request for...

  11. Biodegradable Microparticles for Simultaneous Detection of Counterfeit and Deteriorated Edible Products

    NARCIS (Netherlands)

    Rehor, Ivan; van Vreeswijk, Sophie; Vermonden, Tina; Hennink, Wim E.; Kegel, Willem K.; Eral, Huseyin Burak

    2017-01-01

    In an era of globalized trade relations where food and pharmaceutical products cross borders effortlessly, consumers face counterfeit and deteriorated products at elevated rates. This paper presents multifunctional, biodegradable hydrogel microparticles that can provide information on the

  12. Use of NDE Techniques for Compliance Verification of Suspect Counterfeit EEE Parts

    Data.gov (United States)

    National Aeronautics and Space Administration — Genuine microelectronics components are critical to NASA for Human Rating Requirement (HRR) for Manned Follow-On Vehicles and for planetary missions.  Counterfeited...

  13. Louis Vuitton in the bazaar: Negotiating the value of counterfeit goods in Shanghai's Xiangyang market

    OpenAIRE

    Hansen, Gard Hopsdal; Møller, Henrik Kloppenborg

    2017-01-01

    Abstract: Much work on counterfeiting takes the perspective of brand holders and focuses on strategies for restricting the infringement of their intellectual property rights (IPR). This article takes a different approach. Based on long-term ethnographic fieldwork in a market bazaar in Shanghai, the article examines the way in which market participants negotiate the value of counterfeit goods. Brand holders attempt to control the valuation of branded goods, which are usually traded in fixed-pr...

  14. Raman spectroscopy, a non-invasive mesurement technique for the detection of counterfeit medicines

    OpenAIRE

    Marta, Teresa Rita Pitorra

    2016-01-01

    Tese de mestrado, Engenharia Farmacêutica, Universidade de Lisboa, Faculdade de Farmácia, 2016 Perhaps no greater challenge exists for public health, patient safety, and shared global health security, than fake, falsified, fraudulent or poor quality unregulated medicines - also commonly known as “counterfeit medicines” - now endemic in the global drug supply chain (Tim K Mackey & Liang, 2013). Counterfeit medicines pose a serious risk to public health around the world. It is low- and mi...

  15. Attitude towards the purchase of counterfeits: Antecedents and effect on intention to purchase

    OpenAIRE

    Viot , Catherine; Le Roux , André; Kremer , Florence

    2014-01-01

    International audience; Counterfeiting is a major issue for companies, public institutions and consumers. Despite extensive literature on the subject in marketing, an instrument for measuring the wide variety of the determinants of attitude towards and intention to purchase counterfeit products is lacking. A second-order model comprising thirteen determinants, grouped into three latent constructs, is validated. This model includes a dimension related to the societal consequences of counterfei...

  16. Dynamics of counterfeit alcohol and tobacco goods in the Tatarstan Republic market

    OpenAIRE

    Oleg R. Karatayev

    2015-01-01

    Objective to identify and assess the share of counterfeit products in the total volume of alcohol and tobacco products in the consumer market of Tatarstan Republic which will allow the inspection bodies to deal more effectively to prevent the spreading of counterfeit products. Methods the research proposed in this paper used methods of probability theory and mathematical statistics and the method of sampling analysis of certificates for products in accordance with applicable laws and...

  17. Positive Effects Of Counterfeiting On Luxury Goods: An Empirical Exploration With Consumers

    OpenAIRE

    Giacomo Gistri; Stefano Pace; Simona Romani

    2011-01-01

    In this study we explore the positive effects that counterfeiting might have on the original luxury brands. Through an experiment, we study whether the awareness of a counterfeited version of a fashion luxury brand can increase the purchase intention of the original brands and the price that subjects would like to pay to get the original brand. We account for the notoriety of the brand (whether well known or fictional). We control for the need for status and the expertise of the respondents. ...

  18. ATR-FTIR for rapid detection and quantification of counterfeit medicines

    OpenAIRE

    Ogwu, John; Lawson, Graham; Tanna, Sangeeta

    2015-01-01

    From therapeutic to lifestyle medicines, the counterfeiting of medicines has been on the rise in recent times [1]. Estimates indicate that about 10% of medicines worldwide are counterfeits with much higher figures in developing countries [2]. Currently, the rapid screening of medicines is a challenge leaving many patients at risk [1]. This study considered the potential use of Attenuated Total Reflectance-Fourier Transform Infrared Spectroscopy (ATR-FTIR) for rapid quantitative analysis of ta...

  19. [The fight against counterfeit medicines in Africa: experience and role of pharmacists].

    Science.gov (United States)

    Chauvé, Martine

    2008-12-01

    The counterfeiting of medicines is a global scourge, which is particularly serious in the African continent. According to WHO estimations, whereas counterfeit medicines represent 1% of the market in developed countries, up to 30% of the medicines sold in African countries are counterfeit. Several factors may explain this high rate in Africa, from the weaknesses of legislation and controls, to the lack of affordability of medicines and the attitude of governments. A counterfeit medicine represents different levels of risk, depending if the active substance is present or not, if the dosage is the right one, if the product contains toxic substances, etc. In Africa, several examples sadly showed the terrible impact the use of counterfeit medicines may have (i.e. Nigeria, 1990, Niger, 1995). Pharmacists have a crucial role to play in fighting against the penetration of counterfeit medicines, both in securing the distribution chain, and in leading some actions towards patients. The FIP has produced some guidelines on this issue by adopting a statement (which was last updated in 2003) and by providing pharmacists with useful tools on its website. Several international organizations such as the CIOPF (International conference of French-speaking Orders) produced recommendations on this issue. However, the experience and expertise gained by national organizations from countries such as Côte d'Ivoire are also worth sharing and are presented here.

  20. [The role of German official medicines control laboratories in combating counterfeit medicines].

    Science.gov (United States)

    Wiegard, Andrea; Heuermann, Matthias

    2017-11-01

    An official medicines control laboratory (OMCL) provides an important contribution to combat counterfeit and illegal medicines. The OMCL supports the competent authorities in controlling the quality of authorised medicinal products in the legal supply chain. For detecting counterfeit medicines in the legal supply chain, a risk-based approach in choice of products is conducted. Furthermore, the OMCL analyses suspicious medicines from the illegal supply chain for any other authority. The chemical analysis of a suspicious sample is needed to identify such a sample as a counterfeit medicine. The analytical results are fundamental for the evaluation of the legal status of the product and for the assessment of it's inherent hazard to public health. The global market of illegal medicines is rapidly changing. Therefore a good national and international working liaison and co-operation between laboratories and authorities is obligatory to protect public health. The OMCL provides important knowledge of new trends in counterfeit and illegal medicines. Hence, it is an essential part in surveillance of medicinal products. The efficient networking enables prompt official interventions. Thus, risks for the public health by substandard medicines were reduced. Beside the chemical analysis, the OMCL can help to raise public awareness about counterfeit and illegal medicines. In Germany, the risk of counterfeit medicines reaching patients through the legal supply chain is still low, but the possibility cannot be ignored.

  1. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  2. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  3. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  4. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  5. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  6. Managing suspect and counterfeit items in the nuclear industry

    International Nuclear Information System (INIS)

    2000-08-01

    Some manufacturers and suppliers use inferior materials and processes to make substandard supplies whose properties can vary significantly from established standards and specifications. Other suppliers distribute items that they know do not meet the purchase requirements or provide documentation that misrepresent actual conformance to established specifications and standards. These substandard supplies, or suspect/counterfeit items (S/CIs), pose potential threats to the safety of workers, the public and the environment and may also have a detrimental effect on security and operations at nuclear facilities. Nuclear facilities often procure and use commercial-grade items and the quality assurance policies/procedures and procurement methods are not always properly applied to avoid the entry of S/Cls into those facilities. This publication offers practical guidance on how to apply existing quality assurance programmes to effectively prevent the procurement and use of S/Cls. In particular, it provides a practical method of applying the requirements and guidance contained in the IAEA Safety Series 50-C/SG-Q: Code and Safety Guides on Quality Assurance for Safety in Nuclear Power Plants and other Nuclear Installations (1996), to the S/CIs issue

  7. Control of Suspect/Counterfeit and Defective Items

    Energy Technology Data Exchange (ETDEWEB)

    Sheriff, Marnelle L.

    2013-09-03

    This procedure implements portions of the requirements of MSC-MP-599, Quality Assurance Program Description. It establishes the Mission Support Alliance (MSA) practices for minimizing the introduction of and identifying, documenting, dispositioning, reporting, controlling, and disposing of suspect/counterfeit and defective items (S/CIs). employees whose work scope relates to Safety Systems (i.e., Safety Class [SC] or Safety Significant [SS] items), non-safety systems and other applications (i.e., General Service [GS]) where engineering has determined that their use could result in a potential safety hazard. MSA implements an effective Quality Assurance (QA) Program providing a comprehensive network of controls and verification providing defense-in-depth by preventing the introduction of S/CIs through the design, procurement, construction, operation, maintenance, and modification of processes. This procedure focuses on those safety systems, and other systems, including critical load paths of lifting equipment, where the introduction of S/CIs would have the greatest potential for creating unsafe conditions.

  8. Current means for raising efficiency of counteraction to counterfeit goods trafficking

    Directory of Open Access Journals (Sweden)

    Dronova O.B.

    2014-12-01

    Full Text Available The urgency of counteraction to counterfeit goods trafficking is shown. Annual loss due to counterfeit goods producing and trafficking reaches several billion dollars. There remains a danger of buying low-quality and counterfeit goods despite implementing new producing techniques and protective elements. Measures, taken by law enforcement agencies, state authorities and public human rights organizations have not led to systematic suppression of producing and trafficking of such goods. Creation of new information and reference resource, containing information blocks of protective symbols on goods and packages and illustrated materials comprising patterns of discovered counterfeit goods, can assist to increase public awareness and to give necessary information to law enforcement agencies. Organizations, realizing state and social protection of consumers and entrepreneurs, along with producers, rightholders’ representatives and law enforcement bodies can accept the responsibility of creating and functioning this information and reference system in the Internet. Such level of cooperation of all interested organizations will allow to raise efficiency of measures for counteraction to trafficking goods with violated consumer properties. The author proves the necessity to organize functioning of information and reference resource for a wide range of users. Operation of such resource should comply with main principles of generating any information resource, notably full scale, authenticity and relevance of information. The author proposes the algorithm of creating such system which provides cooperation of law enforcement agencies, producers and consumers for the purpose of preventing counterfeit goods trafficking and investigating committed crimes.

  9. Medicines counterfeiting is a complex problem: a review of key challenges across the supply chain.

    Science.gov (United States)

    Tremblay, Michael

    2013-02-01

    The paper begins by asking why there is a market for counterfeit medicines, which in effect creates the problem of counterfeiting itself. Contributing factors include supply chain complexity and the lack of whole-systems thinking. These two underpin the author's view that counterfeiting is a complex (i.e. wicked) problem, and that corporate, public policy and regulatory actions need to be mindful of how their actions may be causal. The paper offers a problem-based review of key components of this complexity, viz., the knowledge end-users/consumers have of medicines; whether restrictive information policies may hamper information provision to patients; the internet's direct access to consumers; internet-enabled distribution of unsafe and counterfeit medicines; whether the internet is a parallel and competitive supply chain to legitimate routes; organised crime as an emerging medicines manufacturer and supplier and whether substandard medicines is really the bigger problem. Solutions respect the perceived complexity of the supply chain challenges. The paper identifies the need to avoid technologically-driven solutions, calling for 'technological agnosticism'. Both regulation and public policy need to reflect the dynamic nature of the problem and avoid creating perverse incentives; it may be, for instance, that medicines pricing and reimbursement policies, which affect consumer/patient access may act as market signals to counterfeiters, since this creates a cash market in cheaper drugs.

  10. ROLE OF THE INTERNATIONAL ORGANIZATIONS IN PREVENTING THE COUNTERFEIT MEDICINES ENTRY INTO THE WORLD MARKETS.

    Science.gov (United States)

    Stukina, Valeryia; Dohnal, Jiri; Saloun, Jan

    2016-09-01

    30 years have passed since Conference of Experts on the Rational Use of Drugs was held in Nairobi, Kenya, from 25 to 29 November 1985, where the problem of counterfeit medicines was mentioned as the international for the first time. The problem of counterfeit medicines is not only a major threat to public health and national and private economy, but also it is of great interest for key decision-making actors at the international level. The authors analyzed what has been done since that time by international organizations. Combating the counterfeiting of medicines cannot be successfully achieved by the health sector alone - World Health Organization (WHO), - so the efforts of the other United Nations (UN) organizations relevant to counterfeiting were in need and were studied in the article: World Intellectual Property Organization (WIPO), World Trade Organization (WTO), World Customs Organization (WCO), United Nations Office on Drugs and Crime (UNODC), etc. Today WHO is unable to coordinate all their activities, so the few existing proposals for establishing a new mechanism of international cooperation have been examined. Will the MEDICRIME Convention that will enter into force on January 1, 2016 be the start of the new era in the combating with the counterfeit medicines? - the authors offered their vision on the international developments.

  11. The location and recognition of anti-counterfeiting code image with complex background

    Science.gov (United States)

    Ni, Jing; Liu, Quan; Lou, Ping; Han, Ping

    2017-07-01

    The order of cigarette market is a key issue in the tobacco business system. The anti-counterfeiting code, as a kind of effective anti-counterfeiting technology, can identify counterfeit goods, and effectively maintain the normal order of market and consumers' rights and interests. There are complex backgrounds, light interference and other problems in the anti-counterfeiting code images obtained by the tobacco recognizer. To solve these problems, the paper proposes a locating method based on Susan operator, combined with sliding window and line scanning,. In order to reduce the interference of background and noise, we extract the red component of the image and convert the color image into gray image. For the confusing characters, recognition results correction based on the template matching method has been adopted to improve the recognition rate. In this method, the anti-counterfeiting code can be located and recognized correctly in the image with complex background. The experiment results show the effectiveness and feasibility of the approach.

  12. Presence of Counterfeit Marlboro Gold Packs in Licensed Retail Stores in New York City: Evidence From Test Purchases.

    Science.gov (United States)

    Kurti, Marin; He, Yi; Silver, Diana; Giorgio, Margaret; von Lampe, Klaus; Macinko, James; Ye, Hua; Tan, Fidelis; Mei, Victoria

    2018-05-26

    There are no independent studies measuring the availability of premium brand counterfeit cigarettes in New York City from licensed retailers. We forensically analyzed the cigarette packaging of Marlboro Gold (n = 1021) purchased from licensed tobacco retailers in New York City, using ultraviolet irradiation and light microscopy to determine whether they were counterfeit. We find that while only 0.5% (n = 5) of our sample exhibits at least one characteristic synonymous with counterfeit packaging, none of our packs can be conclusively classified as counterfeit. We do not find any counterfeit Marlboro Gold packs purchased at full price from licensed cigarette retailers throughout New York City. Future research using test purchases should include other venues (eg, street and online) and specifically ask for discounts to ascertain the overall presence of counterfeit cigarettes. This is the first study to independently measure the availability of counterfeit cigarette packs purchased at full price from licensed retailers in New York City. We find that none of the Marlboro Gold packs purchased from licensed cigarette retailers are counterfeit.

  13. 76 FR 48905 - United States Government Inter-Agency Anti-Counterfeiting Working Group: Request for Public...

    Science.gov (United States)

    2011-08-09

    ... program managers to identify items at risk for counterfeiting or requiring authentication of legitimacy... program managers to identify items at risk for counterfeiting or requiring authentication of legitimacy... identification marking methods impose a substantial burden on manufacturers/suppliers? Identify the types of...

  14. Perfume fingerprinting by easy ambient sonic-spray ionization mass spectrometry: nearly instantaneous typification and counterfeit detection.

    Science.gov (United States)

    Haddad, Renato; Catharino, Rodrigo Ramos; Marques, Lygia Azevedo; Eberlin, Marcos Nogueira

    2008-11-01

    Perfume counterfeiting is an illegal worldwide practice that involves huge economic losses and potential consumer risk. EASI is a simple, easily performed and rapidly implemented desorption/ionization technique for ambient mass spectrometry (MS). Herein we demonstrate that EASI-MS allows nearly instantaneous perfume typification and counterfeit detection. Samples are simply sprayed onto a glass rod or paper surface and, after a few seconds of ambient drying, a profile of the most polar components of the perfume is acquired. These components provide unique and reproducible chemical signatures for authentic perfume samples. Counterfeiting is readily recognized since the exact set and relative proportions of the more polar chemicals, sometimes at low concentrations, are unknown or hard to reproduce by the counterfeiters and hence very distinct and variable EASI-MS profiles are observed for the counterfeit samples.

  15. Prevalence of counterfeit anthelminthic medicines: a cross-sectional survey in Cambodia.

    Science.gov (United States)

    Khan, Mohiuddin Hussain; Okumura, Junko; Sovannarith, Tey; Nivanna, Nam; Akazawa, Manabu; Kimura, Kazuko

    2010-05-01

    To assess the prevalence of counterfeit anthelminthic medicines in Cambodia, and to determine influential factors. Commonly used anthelminthic medicines were collected from private drug outlets. Medicines were carefully observed including their registration labelling, and their authenticity was investigated with the manufacturers and the Medicines Regulatory Authorities. Samples were analysed by High-Performance Liquid Chromatography at the National Health Product Quality Control Centre, Cambodia. Two hundred and three samples of anthelminthics were collected from 137 drug stores. Domestic products constituted 36.9%. Of 196 samples which were verified for registration, 15.8% were not registered. Of 165 samples successfully investigated for their authenticity, 7 (4.2%) were identified as counterfeit. All of these medicines were purchased in open packs or containers, and most of them were foreign manufactured and/or without registration. The results of our survey urge strict implementation of drug registration and vigilance on the availability of unregistered medicines to combat counterfeit medicines in Cambodia.

  16. Forensic classification of counterfeit banknote paper by X-ray fluorescence and multivariate statistical methods.

    Science.gov (United States)

    Guo, Hongling; Yin, Baohua; Zhang, Jie; Quan, Yangke; Shi, Gaojun

    2016-09-01

    Counterfeiting of banknotes is a crime and seriously harmful to economy. Examination of the paper, ink and toners used to make counterfeit banknotes can provide useful information to classify and link different cases in which the suspects use the same raw materials. In this paper, 21 paper samples of counterfeit banknotes seized from 13 cases were analyzed by wavelength dispersive X-ray fluorescence. After measuring the elemental composition in paper semi-quantitatively, the normalized weight percentage data of 10 elements were processed by multivariate statistical methods of cluster analysis and principle component analysis. All these paper samples were mainly classified into 3 groups. Nine separate cases were successfully linked. It is demonstrated that elemental composition measured by XRF is a useful way to compare and classify papers used in different cases. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  17. Spurious and counterfeit drugs: a growing industry in the developing world.

    Science.gov (United States)

    Gautam, C S; Utreja, A; Singal, G L

    2009-05-01

    Spread of spurious/counterfeit/substandard drugs is a modern day menace which has been recognised internationally, especially so in developing countries. The problem assumes added significance in view of rapid globalisation. The market of spurious and counterfeit drugs is a well-organised, white collar crime. Poverty, high cost of medicines, lack of an official supply chain, legislative lacunae, easy accessibility to computerised printing technology, ineffective law enforcement machinery, and light penalties provide the counterfeiters with an enormous economic incentive without much risk. The consequences of the use of such medicines may vary from therapeutic failure to the occurrence of serious adverse events and even death. Proper drug quality monitoring, enforcement of laws and legislation, an effective and efficient regulatory environment, and awareness and vigilance on part of all stakeholders can help tackle this problem.

  18. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  19. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  20. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  1. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  2. Perceptions and practices of pharmaceutical wholesalers surrounding counterfeit medicines in a developing country: a baseline survey

    Directory of Open Access Journals (Sweden)

    Khan Mohiuddin H

    2011-11-01

    Full Text Available Abstract Background Recent investigations by the Ministry of Health of Cambodia suggest that counterfeit medicines have been introduced into the pharmaceutical market in tampered packaging. To further explore this possibility, an interview survey was conducted at the wholesaler level to investigate the medicinal supply chain in Cambodia. Methods Managing executives of 62 (83.8% registered wholesalers of modern medicines in Cambodia were interviewed in 2009 on their knowledge of, perception on, and practices related to counterfeiting issues through a semi-structured questionnaire. Results According to our findings, 12.9% of the wholesalers had encountered counterfeit medicine. However, they demonstrated a variety of perceptions regarding this issue. A majority (59.7% defined counterfeit medicines as medicines without registration, while other definitions included medicines that were fraudulently manufactured, medicines without a batch/lot number, those containing harmful ingredients or a reduced amount of active ingredients, and expired medicines. Additionally, 8.1% responded that they did not know what counterfeit medicines were. During procurement, 66.1% of the wholesalers consider whether the product is registered in Cambodia, while 64.5% consider the credibility and quality of the products and 61.3% consider the reputation of the manufacturers. When receiving a consignment, 80.6% of wholesalers check the intactness of medicines, 72.6% check the specification and amount of medicines, 71% check Cambodian registration, 56.5% check that the packaging is intact, 54.8% check batch and lot numbers, 48.4% check the dates of manufacture and expiration, and 9.7% check analytical certificates. Out of 62 wholesalers, 14.5% had received medicines that arrived without packages or were separated from their packaging and had to be repacked before distribution. Significant statistical association was found between wholesalers who received medicines separately

  3. Perceptions and practices of pharmaceutical wholesalers surrounding counterfeit medicines in a developing country: a baseline survey.

    Science.gov (United States)

    Khan, Mohiuddin H; Akazawa, Manabu; Dararath, Eav; Kiet, Heng B; Sovannarith, Tey; Nivanna, Nam; Yoshida, Naoko; Kimura, Kazuko

    2011-11-11

    Recent investigations by the Ministry of Health of Cambodia suggest that counterfeit medicines have been introduced into the pharmaceutical market in tampered packaging. To further explore this possibility, an interview survey was conducted at the wholesaler level to investigate the medicinal supply chain in Cambodia. Managing executives of 62 (83.8%) registered wholesalers of modern medicines in Cambodia were interviewed in 2009 on their knowledge of, perception on, and practices related to counterfeiting issues through a semi-structured questionnaire. According to our findings, 12.9% of the wholesalers had encountered counterfeit medicine. However, they demonstrated a variety of perceptions regarding this issue. A majority (59.7%) defined counterfeit medicines as medicines without registration, while other definitions included medicines that were fraudulently manufactured, medicines without a batch/lot number, those containing harmful ingredients or a reduced amount of active ingredients, and expired medicines. Additionally, 8.1% responded that they did not know what counterfeit medicines were.During procurement, 66.1% of the wholesalers consider whether the product is registered in Cambodia, while 64.5% consider the credibility and quality of the products and 61.3% consider the reputation of the manufacturers. When receiving a consignment, 80.6% of wholesalers check the intactness of medicines, 72.6% check the specification and amount of medicines, 71% check Cambodian registration, 56.5% check that the packaging is intact, 54.8% check batch and lot numbers, 48.4% check the dates of manufacture and expiration, and 9.7% check analytical certificates.Out of 62 wholesalers, 14.5% had received medicines that arrived without packages or were separated from their packaging and had to be repacked before distribution. Significant statistical association was found between wholesalers who received medicines separately from their packs/containers and who consider their

  4. Laser photothermal diagnostics of genuine and counterfeit British and United States banknotes

    Science.gov (United States)

    Othonos, Andreas; Mandelis, Andreas; Nestoros, Marios; Christofides, Constantinos

    1997-02-01

    Laser-induced, frequency-scanned IR photothermal radiometry was used to investigate the thermophysical properties of the paper on which several genuine and counterfeit British (10 pounds) and U.S. ($DOL50, $DOL100) currency bills were printed. The radiometric photothermal amplitudes and phases were further compared with a theoretical model, which yielded simultaneous quantitative measurements of the thermal diffusivities and conductivities of the bills. Both statistical and single-specimen results demonstrated the excellent thermophysical resolution of the technique with prospects for its use in the nonintrusive, on-line identification of counterfeit banknotes.

  5. NFC based Equipment Qualification Management (NEQM) system preventing counterfeit and fraudulent item

    Energy Technology Data Exchange (ETDEWEB)

    Chang, C.K., E-mail: ckchang@kings.ac.kr [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of); Lee, K.J., E-mail: klee@khu.ac.kr [Kyung Hee Univ., Seoul (Korea, Republic of)

    2014-07-01

    Qualification of equipment essential to safety in nuclear power plants (NPPs) ensures its capability to perform designated safety functions on demand under postulated service conditions. However, a number of incidents identified by the NRC since 1980s catalysed the US nuclear industry to adopt standard precautions to guard against counterfeit items. The purpose of this paper is to suggest the NFC (Near Field Communication) based equipment qualification management system preventing counterfeit and fraudulent items. The NEQM (NFC based Equipment Qualification Management) system work with the support of legacy systems such as PMS (Procurement Management System) and FMS (Facility management System). (author)

  6. NFC based Equipment Qualification Management (NEQM) system preventing counterfeit and fraudulent item

    International Nuclear Information System (INIS)

    Chang, C.K.; Lee, K.J.

    2014-01-01

    Qualification of equipment essential to safety in nuclear power plants (NPPs) ensures its capability to perform designated safety functions on demand under postulated service conditions. However, a number of incidents identified by the NRC since 1980s catalysed the US nuclear industry to adopt standard precautions to guard against counterfeit items. The purpose of this paper is to suggest the NFC (Near Field Communication) based equipment qualification management system preventing counterfeit and fraudulent items. The NEQM (NFC based Equipment Qualification Management) system work with the support of legacy systems such as PMS (Procurement Management System) and FMS (Facility management System). (author)

  7. Combatting Falsification and Counterfeiting Of Medicinal Products in the European Union

    DEFF Research Database (Denmark)

    Kohli, Vishv Priya

    and falsification of medicinal products meets the social objectives of public health (Articles 9 and 168) and consumer protection (Articles 12 and 169), as envisaged by the Treaty on the Function of the European Union. The thesis establishes that the problem of counterfeiting and falsification of medicinal products...... lies at the intersection of three spheres of law - IP law, Medicine law, and Criminal law. This insight provides the foundation for the understanding of the weaknesses in the legal regime that contains tools for combatting counterfeiting and falsification of medicines in the EU....

  8. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  9. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  10. Counterfeit and their museums: observation of the aesthetic categories of the pirate consumption

    Directory of Open Access Journals (Sweden)

    Eneus Trindade Barreto

    2013-09-01

    Full Text Available This paper arises from discussions about consumption and piracy,analyzing the role of counterfeit museums, and their paradoxes in the way they communicating the ambivalences of meaning e types of commercial piracy; based on Lipovetsky’s thought (2004; 2007, the articles illustrates the debate about consumption and piracy with 3 museum cases in Thailand, Italy and France.

  11. NFC based Inspection and Qualification Management (NIQM) System Preventing Counterfeit and Fraudulent Item

    International Nuclear Information System (INIS)

    Chang, Choong Koo; Kim, Young Joo

    2013-01-01

    Design, manufacturing, fabrication, transportation and installation of the devices and equipment for nuclear power plants shall be conducted under the thorough quality assurance program for the nuclear safety. However, from late in the 1980s, NRC began to issue a number of communications alerting licenses to issues involving counterfeit and fraudulent items. A number of incidents identified by the NRC in the 1980s and 1990s catalyzed the US nuclear industry to adopt standard precautions to guard against counterfeit items. The purpose of this paper is to develop the NFC (Near Field Communication) based Inspection and Qualification Management(NIQM) system preventing counterfeit and fraudulent items. NFC is one of the latest wireless communication technologies. As a short-range wireless connectivity technology, NFC offers safe-yet simple and intuitive-communication between electronic devices. As described above, NFC technology can be applied to the inspection and qualification management system very effectively to prevent counterfeit and fraudulent items. In addition, NIQM system can use existing data and information through the interface with legacy system

  12. NFC based Inspection and Qualification Management (NIQM) System Preventing Counterfeit and Fraudulent Item

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Choong Koo; Kim, Young Joo [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2013-10-15

    Design, manufacturing, fabrication, transportation and installation of the devices and equipment for nuclear power plants shall be conducted under the thorough quality assurance program for the nuclear safety. However, from late in the 1980s, NRC began to issue a number of communications alerting licenses to issues involving counterfeit and fraudulent items. A number of incidents identified by the NRC in the 1980s and 1990s catalyzed the US nuclear industry to adopt standard precautions to guard against counterfeit items. The purpose of this paper is to develop the NFC (Near Field Communication) based Inspection and Qualification Management(NIQM) system preventing counterfeit and fraudulent items. NFC is one of the latest wireless communication technologies. As a short-range wireless connectivity technology, NFC offers safe-yet simple and intuitive-communication between electronic devices. As described above, NFC technology can be applied to the inspection and qualification management system very effectively to prevent counterfeit and fraudulent items. In addition, NIQM system can use existing data and information through the interface with legacy system.

  13. Identifying a common origin of toner printed counterfeit banknotes by micro-Raman spectroscopy.

    Science.gov (United States)

    Skenderović Božičević, Martina; Gajović, Andreja; Zjakić, Igor

    2012-11-30

    This study explores the applicability of micro-Raman spectroscopy as a non-destructive technique for the analysis of color toner printed counterfeits. The main aim of the research paper was to find out whether Raman spectroscopy is a suitable method for establishing the connection between different specimens of counterfeits suspected to be printed with the same toner on the same machine. Specimens of different types of toners printed on different types of paper are analyzed by means of the micro-Raman spectroscopy system with the excitation line at 514.5 nm. For each specimen cyan, magenta and yellow toners are analyzed separately. The yellow toners displayed the most distinctive Raman spectra. The results show that micro-Raman spectroscopy can be successfully applied as a method for the analysis of color toner printed counterfeits, such as banknotes and documents, in order to establish links between more or less different specimens of counterfeits by measuring the properties of a color toner. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  14. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  15. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  16. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  17. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. 31 CFR 100.18 - Counterfeit notes to be marked; “redemption” of notes wrongfully so marked.

    Science.gov (United States)

    2010-07-01

    ... moneys, and all officers of national banks, shall stamp or write in plain letters the word “counterfeit... money, which shall be presented at their places of business; and if such officers shall wrongfully stamp...

  19. Through-container, extremely low concentration detection of multiple chemical markers of counterfeit alcohol using a handheld SORS device

    OpenAIRE

    Ellis, David; R, Eccles; Xu, Yun; J, Griffen; Muhamadali, H; P, Matousek; Goodall, I; Goodacre, Royston

    2017-01-01

    Major food adulteration incidents occur with alarming frequency and are episodic, with the latest incident, involving the adulteration of meat from 21 producers in Brazil supplied to 60 other countries, reinforcing this view. Food fraud and counterfeiting involves all types of foods, feed, beverages, and packaging, with the potential for serious health, as well as significant economic and social impacts. In the spirit drinks sector, counterfeiters often ‘recycle’ used genuine packaging, or em...

  20. Independent oversight review of the Department of Energy Quality Assurance Program for suspect/counterfeit parts. Revision 1

    International Nuclear Information System (INIS)

    1996-05-01

    To address the potential threat that suspect/counterfeit parts could pose to DOE workers and the public, the Office of the Deputy Assistant Secretary for Oversight initiated a number of activities beginning in mid-1995. Oversight placed increased emphasis on the field's quality assurance-suspect/counterfeit parts programs during safety management evaluations, in keeping with the Office of Environment, Safety and Health (EH) oversight responsibilities, which include oversight of the Department's quality assurance (QA) programs. In addition, Oversight reviewed relevant policy documents and occurrence reports to determine the nature and magnitude of the problem within the Department. The results of that review, contained in an Office of Oversight report, Independent Oversight Analysis of Suspect/Counterfeit Parts Within the Department of Energy (November 1995), indicate a lack of consistency and comprehensiveness in the Department's QA-suspect/counterfeit parts program. A detailed analysis of the causes and impacts of the problem was recommended. In response, this review was initiated to determine the effectiveness of the Department's QA program for suspect/counterfeit parts. This study goes beyond merely assessing and reporting the status of the program, however. It is the authors intention to highlight the complex issues associated with suspect/counterfeit parts in the Department today and to present approaches that DOE managers might consider to address these issues

  1. Independent oversight review of the Department of Energy Quality Assurance Program for suspect/counterfeit parts. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-05-01

    To address the potential threat that suspect/counterfeit parts could pose to DOE workers and the public, the Office of the Deputy Assistant Secretary for Oversight initiated a number of activities beginning in mid-1995. Oversight placed increased emphasis on the field`s quality assurance-suspect/counterfeit parts programs during safety management evaluations, in keeping with the Office of Environment, Safety and Health (EH) oversight responsibilities, which include oversight of the Department`s quality assurance (QA) programs. In addition, Oversight reviewed relevant policy documents and occurrence reports to determine the nature and magnitude of the problem within the Department. The results of that review, contained in an Office of Oversight report, Independent Oversight Analysis of Suspect/Counterfeit Parts Within the Department of Energy (November 1995), indicate a lack of consistency and comprehensiveness in the Department`s QA-suspect/counterfeit parts program. A detailed analysis of the causes and impacts of the problem was recommended. In response, this review was initiated to determine the effectiveness of the Department`s QA program for suspect/counterfeit parts. This study goes beyond merely assessing and reporting the status of the program, however. It is the authors intention to highlight the complex issues associated with suspect/counterfeit parts in the Department today and to present approaches that DOE managers might consider to address these issues.

  2. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  3. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  4. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  5. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  6. Social power, product conspicuousness, and the demand for luxury brand counterfeit products.

    Science.gov (United States)

    Bian, Xuemei; Haque, Sadia; Smith, Andrew

    2015-03-01

    The aim of this article is twofold: (1) to achieve a better understanding of the psychological determinants of the demand for luxury brand counterfeit products (LBCP) through exploring the effects of social power; (2) to extend power literature by identifying boundary conditions of the relationship between social power and compensatory consumption identified by Rucker and Galinsky (2008, J. Consum. Res., 35, 257-267) and Rucker and Galinsky (2009, J. Exp. Soc. Psychol., 45, 549-555). Findings from three experiments demonstrate that social power holds key insights into understanding consumers' purchase propensity for LBCP; product conspicuousness moderates the effects of social power on purchase propensity for status products; these moderation effects are only observed when the status products are LBCP but not genuine products. This article, therefore, contributes to the literature regarding the demand for counterfeits as well as the social power and compensatory consumption literature. © 2014 The British Psychological Society.

  7. Discrimination of whisky brands and counterfeit identification by UV-Vis spectroscopy and multivariate data analysis.

    Science.gov (United States)

    Martins, Angélica Rocha; Talhavini, Márcio; Vieira, Maurício Leite; Zacca, Jorge Jardim; Braga, Jez Willian Batista

    2017-08-15

    The discrimination of whisky brands and counterfeit identification were performed by UV-Vis spectroscopy combined with partial least squares for discriminant analysis (PLS-DA). In the proposed method all spectra were obtained with no sample preparation. The discrimination models were built with the employment of seven whisky brands: Red Label, Black Label, White Horse, Chivas Regal (12years), Ballantine's Finest, Old Parr and Natu Nobilis. The method was validated with an independent test set of authentic samples belonging to the seven selected brands and another eleven brands not included in the training samples. Furthermore, seventy-three counterfeit samples were also used to validate the method. Results showed correct classification rates for genuine and false samples over 98.6% and 93.1%, respectively, indicating that the method can be helpful for the forensic analysis of whisky samples. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Invisible marking system by extreme ultraviolet radiation: the new frontier for anti-counterfeiting tags

    International Nuclear Information System (INIS)

    Lazzaro, P. Di; Bollanti, S.; Flora, F.; Mezi, L.; Murra, D.; Torre, A.; Bonfigli, F.; Montereali, R.M.; Vincenti, M.A.

    2016-01-01

    We present a marking technology which uses extreme ultraviolet radiation to write invisible patterns on tags based on alkali fluoride thin films. The shape of the pattern is pre-determined by a mask (in the case of contact lithography) or by a suitable mirror (projection lithography). Tags marked using this method offer a much better protection against fakes than currently available anti-counterfeiting techniques. The complexity and cost of this technology can be tailored to the value of the good to be protected, leaving, on the other hand, the specific reading technique straightforward. So far, we have exploited our invisible marking to tag artworks, identity cards, electrical components, and containers of radioactive wastes. Advantages and limits of this technology are discussed in comparison with the anti-counterfeiting systems available in the market.

  9. Challenging Near InfraRed Spectroscopy discriminating ability for counterfeit pharmaceuticals detection

    Energy Technology Data Exchange (ETDEWEB)

    Storme-Paris, I. [Groupe de Chimie Analytique de Paris-Sud, EA 4041, IFR 141, School of Pharmacy, Univ Paris-Sud, 5 rue Jean Baptiste Clement, 92296 Chatenay-Malabry (France); Rebiere, H. [Laboratories and Control Department, French Health Products Safety Agency (AFSSAPS), 635 rue de la Garenne, 34740 Vendargues (France); Matoga, M. [Groupe de Chimie Analytique de Paris-Sud, EA 4041, IFR 141, School of Pharmacy, Univ Paris-Sud, 5 rue Jean Baptiste Clement, 92296 Chatenay-Malabry (France); Civade, C.; Bonnet, P.-A.; Tissier, M.H. [Laboratories and Control Department, French Health Products Safety Agency (AFSSAPS), 635 rue de la Garenne, 34740 Vendargues (France); Chaminade, P., E-mail: pierre.chaminade@u-psud.fr [Groupe de Chimie Analytique de Paris-Sud, EA 4041, IFR 141, School of Pharmacy, Univ Paris-Sud, 5 rue Jean Baptiste Clement, 92296 Chatenay-Malabry (France)

    2010-01-25

    This study was initiated by the laboratories and control department of the French Health Products Safety Agency (AFSSAPS) as part of the fight against the public health problem of rising counterfeit and imitation medicines. To test the discriminating ability of Near InfraRed Spectroscopy (NIRS), worse cases scenarios were first considered for the discrimination of various pharmaceutical final products containing the same Active Pharmaceutical Ingredient (API) with different excipients, such as generics of proprietary medicinal products (PMP). Two generic databases were explored: low active strength hard capsules of Fluoxetine and high strength tablets of Ciprofloxacin. Then 4 other cases involving suspicious samples, counterfeits and imitations products were treated. In all these cases, spectral differences between samples were studied, giving access to API or excipient contents information, and eventually allowing manufacturing site identification. A chemometric background is developed to explain the optimisation methodology, consisting in the choices of appropriate pretreatments, algorithms for data exploratory analyses (unsupervised Principal Component Analysis), and data classification (supervised cluster analysis, and Soft Independent Modelling of Class Analogy). Results demonstrate the high performance of NIRS, highlighting slight differences in formulations, such as 2.5% (w/w) in API strength, 1.0% (w/w) in excipient and even coating variations (<1%, w/w) with identical contents, approaching the theoretical limits of NIRS sensitivity. All the different generic formulations were correctly discriminated and foreign PMP, constituted of formulations slightly different from the calibration ones, were also all discriminated. This publication addresses the ability of NIRS to detect counterfeits and imitations and presents the NIRS as an ideal tool to master the global threat of counterfeit drugs.

  10. Challenging Near InfraRed Spectroscopy discriminating ability for counterfeit pharmaceuticals detection

    International Nuclear Information System (INIS)

    Storme-Paris, I.; Rebiere, H.; Matoga, M.; Civade, C.; Bonnet, P.-A.; Tissier, M.H.; Chaminade, P.

    2010-01-01

    This study was initiated by the laboratories and control department of the French Health Products Safety Agency (AFSSAPS) as part of the fight against the public health problem of rising counterfeit and imitation medicines. To test the discriminating ability of Near InfraRed Spectroscopy (NIRS), worse cases scenarios were first considered for the discrimination of various pharmaceutical final products containing the same Active Pharmaceutical Ingredient (API) with different excipients, such as generics of proprietary medicinal products (PMP). Two generic databases were explored: low active strength hard capsules of Fluoxetine and high strength tablets of Ciprofloxacin. Then 4 other cases involving suspicious samples, counterfeits and imitations products were treated. In all these cases, spectral differences between samples were studied, giving access to API or excipient contents information, and eventually allowing manufacturing site identification. A chemometric background is developed to explain the optimisation methodology, consisting in the choices of appropriate pretreatments, algorithms for data exploratory analyses (unsupervised Principal Component Analysis), and data classification (supervised cluster analysis, and Soft Independent Modelling of Class Analogy). Results demonstrate the high performance of NIRS, highlighting slight differences in formulations, such as 2.5% (w/w) in API strength, 1.0% (w/w) in excipient and even coating variations (<1%, w/w) with identical contents, approaching the theoretical limits of NIRS sensitivity. All the different generic formulations were correctly discriminated and foreign PMP, constituted of formulations slightly different from the calibration ones, were also all discriminated. This publication addresses the ability of NIRS to detect counterfeits and imitations and presents the NIRS as an ideal tool to master the global threat of counterfeit drugs.

  11. Several criminal, phenomenological and etiological features of criminal offences of counterfeiting money in Kosovo

    Directory of Open Access Journals (Sweden)

    MSc. Milot Krasniqi

    2012-12-01

    Full Text Available The Republic of Kosovo is making efforts as a young state to strengthen rule of law and efficiently combat criminality in general, and specifically organized crime, as a condition for its journey towards European integration perspectives.  For a normal functioning of the economic system, the safety and protection of controlled circulation of money are of vital importance. In this direction, the state takes actions and measures to ensure that manufacturing and emissions of banknotes and bonds are undertaken by competent authorities, such as the Central Bank, and render impossible the counterfeiting of money. In Kosovo, money counterfeiting is not widely studied. Consequently, there are no recent research papers over the time when these offences have marked rather high records. This circumstance, and especially the fact that these offences are rather frequent in Kosovo, made me enter the research of this type of criminality.    Apart from principles and rules stipulated by special laws of the field of economy, protection of the economic system is also helped by the Criminal Code, which incriminates the act of counterfeit money as a criminal offence against the economic system, thereby ensuring general prevention of potential offenders, and repressive measures against confirmed offenders. Protection of economic and monetary systems is also provided upon by numerous international acts.  The paper is permeated by conclusions, analysis and independent recommendations, which I believe will contribute de lege ferrenda to criminal policies in preventing and combating this type of crime. In researching the criminal offences of counterfeiting money, I have used the method of historical materialism, dogmatic law method, statistical methods, surveys and interviews, and studies of individual cases.    From the research of this type of crime, I have concluded that these criminal offences are a serious type of crime, which may result in major individual

  12. A Script Analysis of the Distribution of Counterfeit Alcohol Across Two European Jurisdictions

    OpenAIRE

    Lord, Nicholas; Spencer, Jonathan; Bellotti, Elisa; Benson, Katie

    2017-01-01

    This article presents a script analysis of the distribution of counterfeit alcohols across two European jurisdictions. Based on an analysis of case file data from a European regulator and interviews with investigators, the article deconstructs the organisation of the distribution of the alcohol across jurisdictions into five scenes (collection, logistics, delivery, disposal, proceeds/finance) and analyses the actual (or likely permutations of) behaviours within each scene. The analysis also i...

  13. Inkjet Printing Based Mono-layered Photonic Crystal Patterning for Anti-counterfeiting Structural Colors

    Science.gov (United States)

    Nam, Hyunmoon; Song, Kyungjun; Ha, Dogyeong; Kim, Taesung

    2016-01-01

    Photonic crystal structures can be created to manipulate electromagnetic waves so that many studies have focused on designing photonic band-gaps for various applications including sensors, LEDs, lasers, and optical fibers. Here, we show that mono-layered, self-assembled photonic crystals (SAPCs) fabricated by using an inkjet printer exhibit extremely weak structural colors and multiple colorful holograms so that they can be utilized in anti-counterfeit measures. We demonstrate that SAPC patterns on a white background are covert under daylight, such that pattern detection can be avoided, but they become overt in a simple manner under strong illumination with smartphone flash light and/or on a black background, showing remarkable potential for anti-counterfeit techniques. Besides, we demonstrate that SAPCs yield different RGB histograms that depend on viewing angles and pattern densities, thus enhancing their cryptographic capabilities. Hence, the structural colorations designed by inkjet printers would not only produce optical holograms for the simple authentication of many items and products but also enable a high-secure anti-counterfeit technique. PMID:27487978

  14. Analytical challenges in drug counterfeiting and falsification-The NMR approach.

    Science.gov (United States)

    Holzgrabe, Ulrike; Malet-Martino, Myriam

    2011-06-25

    Counterfeiting of products is a global problem. As long as clothes, clocks, leather wear, etc. are faked there is no danger, but when it comes to drugs, counterfeiting can be life-threatening. In the last years sub-standard active pharmaceutical ingredients (APIs) were found more often even though the use of the quality-ensuring methods of international pharmacopoeias should have detected additional impurities and the low content of the API. Methods orthogonal to the separating methods used in the pharmacopoeias are necessary to find counterfeits. Beside Raman and NIR spectroscopies as well as powder X-ray analysis, NMR spectroscopy being a primary ratio method of measurement is highly suitable to identify and quantify a drug and its related substances as well as to recognize a drug of sub-standard quality. DOSY experiments are suitable to identify the ingredients of formulations and therefore to identify wrong and/or additional ingredients. This review gives an overview of the application of quantitative NMR spectroscopy and DOSY NMR in anticounterfeiting. Copyright © 2010 Elsevier B.V. All rights reserved.

  15. Traceability and Risk Analysis Strategies for Addressing Counterfeit Electronics in Supply Chains for Complex Systems.

    Science.gov (United States)

    DiMase, Daniel; Collier, Zachary A; Carlson, Jinae; Gray, Robin B; Linkov, Igor

    2016-10-01

    Within the microelectronics industry, there is a growing concern regarding the introduction of counterfeit electronic parts into the supply chain. Even though this problem is widespread, there have been limited attempts to implement risk-based approaches for testing and supply chain management. Supply chain risk management tends to focus on the highly visible disruptions of the supply chain instead of the covert entrance of counterfeits; thus counterfeit risk is difficult to mitigate. This article provides an overview of the complexities of the electronics supply chain, and highlights some gaps in risk assessment practices. In particular, this article calls for enhanced traceability capabilities to track and trace parts at risk through various stages of the supply chain. Placing the focus on risk-informed decision making through the following strategies is needed, including prioritization of high-risk parts, moving beyond certificates of conformance, incentivizing best supply chain management practices, adoption of industry standards, and design and management for supply chain resilience. © 2016 Society for Risk Analysis.

  16. Preventing Wine Counterfeiting by Individual Cork Stopper Recognition Using Image Processing Technologies

    Directory of Open Access Journals (Sweden)

    Valter Costa

    2018-03-01

    Full Text Available Wine counterfeiting is a major problem worldwide. Within this context, an approach to the problem of discerning original wine bottles from forged ones is the use of natural features present in the product, object and/or material (using it “as is”. The proposed application uses the cork stopper as a unique fingerprint, combined with state of the art image processing techniques to achieve individual object recognition and smartphones as the authentication equipment. The anti-counterfeiting scheme is divided into two phases: an enrollment phase, where every bottle is registered in a database using a photo of its cork stopper inside the bottle; and a verification phase, where an end-user/retailer captures a photo of the cork stopper using a regular smartphone, compares the photo with the previously-stored one and retrieves it if the wine bottle was previously registered. To evaluate the performance of the proposed application, two datasets of natural/agglomerate cork stoppers were built, totaling 1000 photos. The worst case results show a 100% precision ratio, an accuracy of 99.94% and a recall of 94.00%, using different smartphones. The perfect score in precision is a promising result, proving that this system can be applied to the prevention of wine counterfeiting and consumer/retailer security when purchasing a wine bottle.

  17. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  18. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  19. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  20. Improving global health governance to combat counterfeit medicines: a proposal for a UNODC-WHO-Interpol trilateral mechanism.

    Science.gov (United States)

    Mackey, Tim K; Liang, Bryan A

    2013-10-31

    Perhaps no greater challenge exists for public health, patient safety, and shared global health security, than fake/falsified/fraudulent, poor quality unregulated drugs, also commonly known as "counterfeit medicines", now endemic in the global drug supply chain. Counterfeit medicines are prevalent everywhere, from traditional healthcare settings to unregulated sectors, including the Internet. These dangerous medicines are expanding in both therapeutic and geographic scope, threatening patient lives, leading to antimicrobial resistance, and profiting criminal actors. Despite clear global public health threats, surveillance for counterfeit medicines remains extremely limited, with available data pointing to an increasing global criminal trade that has yet to be addressed appropriately. Efforts by a variety of public and private sector entities, national governments, and international organizations have made inroads in combating this illicit trade, but are stymied by ineffectual governance and divergent interests. Specifically, recent efforts by the World Health Organization, the primary international public health agency, have failed to adequately incorporate the broad array of stakeholders necessary to combat the problem. This has left the task of combating counterfeit medicines to other organizations such as UN Office of Drugs and Crime and Interpol in order to fill this policy gap. To address the current failure of the international community to mobilize against the worldwide counterfeit medicines threat, we recommend the establishment of an enhanced global health governance trilateral mechanism between WHO, UNODC, and Interpol to leverage the respective strengths and resources of these organizations. This would allow these critical organizations, already engaged in the fight against counterfeit medicines, to focus on and coordinate their respective domains of transnational crime prevention, public health, and law enforcement field operations. Specifically, by

  1. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  2. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  3. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  4. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  5. Limited indications of tax stamp discordance and counterfeiting on cigarette packs purchased in tobacco retailers, 97 counties, USA, 2012.

    Science.gov (United States)

    Lee, Joseph G L; Golden, Shelley D; Ribisl, Kurt M

    2017-12-01

    Increasing the per-unit cost of tobacco products is one of the strongest interventions for tobacco control. In jurisdictions with higher taxes in the U.S., however, cigarette pack litter studies show a substantial proportion of littered packs lack the appropriate tax stamp. More limited but still present counterfeiting also exists. We sought to examine the role of tobacco retailers as a source for untaxed and counterfeit products. Data collectors purchased Newport Green (menthol) or Marlboro Red cigarette packs in a national probability-based sample of tobacco retailers (in 97 counties) from June-October 2012. They made no effort to buy counterfeit or untaxed cigarettes. In this cross-sectional study, we assessed the presence, tax authority, and type (low-tech thermal vs. encrypted) of cigarette pack tax stamps; concordance of tax stamps with where the pack was purchased; and, for Marlboro cigarettes, publicly available visible indicators of counterfeiting. We purchased 2147 packs of which 2033 had tax stamps. Packs missing stamps were in states that do not require them. We found very limited discordance between store location and tax stamp(s) (tax stamps (13%). This occurred entirely with low-tech tax stamps and was not identified with encrypted tax stamps. We found no clear evidence of counterfeit products. Almost all tax stamps matched the location of purchase. Litter studies may be picking up legal tax avoidance instead of illegal tax evasion or, alternatively, purchase of illicit products requires special request by the purchaser.

  6. Anti-Counterfeiting Quick Response Code with Emission Color of Invisible Metal-Organic Frameworks as Encoding Information.

    Science.gov (United States)

    Wang, Yong-Mei; Tian, Xue-Tao; Zhang, Hui; Yang, Zhong-Rui; Yin, Xue-Bo

    2018-06-08

    Counterfeiting is a global epidemic that is compelling the development of new anti-counterfeiting strategy. Herein, we report a novel multiple anti-counterfeiting encoding strategy of invisible fluorescent quick response (QR) codes with emission color as information storage unit. The strategy requires red, green, and blue (RGB) light-emitting materials for different emission colors as encrypting information, single excitation for all of the emission for practicability, and ultraviolet (UV) excitation for invisibility under slight. Therefore, RGB light-emitting nanoscale metal-organic frameworks (NMOFs) are designed as inks to construct the colorful light-emitting boxes for information encrypting, while three black vertex boxes were used for positioning. Full-color emissions are obtained by mixing the trichromatic NMOFs inks through inkjet printer. The encrypting information capacity is easily adjusted by the number of light-emitting boxes with the infinite emission colors. The information is decoded with specific excitation light at 275 nm, making the QR codes invisible under daylight. The composition of inks, invisibility, inkjet printing, and the abundant encrypting information all contribute to multiple anti-counterfeiting. The proposed QR codes pattern holds great potential for advanced anti-counterfeiting.

  7. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  8. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  9. Testing of complementarity of PDA and MS detectors using chromatographic fingerprinting of genuine and counterfeit samples containing sildenafil citrate.

    Science.gov (United States)

    Custers, Deborah; Krakowska, Barbara; De Beer, Jacques O; Courselle, Patricia; Daszykowski, Michal; Apers, Sandra; Deconinck, Eric

    2016-02-01

    Counterfeit medicines are a global threat to public health. High amounts enter the European market, which is why characterization of these products is a very important issue. In this study, a high-performance liquid chromatography-photodiode array (HPLC-PDA) and high-performance liquid chromatography-mass spectrometry (HPLC-MS) method were developed for the analysis of genuine Viagra®, generic products of Viagra®, and counterfeit samples in order to obtain different types of fingerprints. These data were included in the chemometric data analysis, aiming to test whether PDA and MS are complementary detection techniques. The MS data comprise both MS1 and MS2 fingerprints; the PDA data consist of fingerprints measured at three different wavelengths, i.e., 254, 270, and 290 nm, and all possible combinations of these wavelengths. First, it was verified if both groups of fingerprints can discriminate between genuine, generic, and counterfeit medicines separately; next, it was studied if the obtained results could be ameliorated by combining both fingerprint types. This data analysis showed that MS1 does not provide suitable classification models since several genuines and generics are classified as counterfeits and vice versa. However, when analyzing the MS1_MS2 data in combination with partial least squares-discriminant analysis (PLS-DA), a perfect discrimination was obtained. When only using data measured at 254 nm, good classification models can be obtained by k nearest neighbors (kNN) and soft independent modelling of class analogy (SIMCA), which might be interesting for the characterization of counterfeit drugs in developing countries. However, in general, the combination of PDA and MS data (254 nm_MS1) is preferred due to less classification errors between the genuines/generics and counterfeits compared to PDA and MS data separately.

  10. Los medicamentos falsificados en Perú Counterfeit pharmaceuticals in Peru

    Directory of Open Access Journals (Sweden)

    Luis E. Moreno Exebio

    2010-02-01

    cierta sofisticación en el proceso de falsificación. La falsificación de medicamentos que salvan vidas, como los antimicrobianos, representa un peligro serio de salud pública.OBJECTIVE: To determine the quantity of counterfeit pharmaceutical drugs found by the National Quality Control Center (Centro Nacional de Control de Calidad (CNCC, Instituto Nacional de Salud, Peru during the period from 2005&2008, and the types and properties of these drugs. METHODS: A form was created to amass the relevant data collected directly from CNCC reports. The reports underwent a review and analysis process, and where counterfeiting was confirmed, it was categorized by type into one of four groups. RESULTS: The percentage of counterfeit drugs relative to the total drugs evaluated was: 3.0% in 2005, 5.0% in 2006, 7.3% in 2007, and 9.2% in 2008. The main groups of counterfeit drugs, classified according to the World Health Organization Anatomical Therapeutic Chemical Classification System, were: alimentary tract and metabolism, 34.5% (29.1%&39.8%; antiinfectives for systemic use, 21.1% (16.5%&25.7%; nervous system, 17.1% (12.8%&21.3%; and musculo-skeletal system, 15.4% (11.3%&19.5%. The most common type of forgery occurred in cases where the drug contained the correct amount of active ingredients, but the manufacturer was one other than the one indicated (62.4% of the total counterfeit drugs; and medications that did not contain any active ingredient (22.4%. Of the counterfeit drugs, 61.0% (56.0%&67.0% were national brands and 39.0%, (33.0%&44.0% were imported. The pharmaceutical formulations with the highest rate of forgery were tablets, 66.0% (60.0%&71.0%; injectables, 19.0% (14.0%&23.0%; and capsules 7.0% (4.0%&10.0%. CONCLUSIONS: From 2005&2008, drug counterfeiting had an average annual variation of 45%. Drug counterfeiting was shown to be most prevalent among national brands& as opposed to imported medications&although the types and formulations of the fake drugs attest to a

  11. Cooperation Agreement between the European Central Bank and Europol for Combating Euro Counterfeiting. Some Critical Opinions

    Directory of Open Access Journals (Sweden)

    Bogdan Birzu

    2016-08-01

    Full Text Available Within this paper there has been examined the Agreement between the European Police Office (Europol and the European Central Bank (ECB for preventing and combating euro counterfeiting, focusing on certain provisions which take into account the aim and the exchange of information between the two European institutions. The novelty of this paper relates to the achieved examination, where it is highlighted the importance of European legal instrument and the critical opinions and proposals for improving the agreement. The paper can be useful to academics and practitioners who conduct their activity within this area.

  12. Substandard, Spurious, Falsely-Labelled, Falsified and Counterfeit (SSFFC Drugs: Time to Take a Bitter Pill

    Directory of Open Access Journals (Sweden)

    Geetha Mani

    2016-10-01

    Full Text Available Substandard, Spurious, Falsely-Labelled, Falsified and Counterfeit (SSFFC drugs are an emerging public health concern in India. With one of the huge pharmaceutical sectors in the world, India has a varied prevalence of SSSFC drugs ranging from 0.04% to 34% according to various studies. Apart from severe health consequences, SSSFC drugs also weaken community's trust in the health care system. India is tackling the epidemic of SSSFC drugs through various existing and new regulatory measures. Considering the calamitous consequences of this silent epidemic, it is time to prescribe a bitter pill.

  13. Magnetic-graphitic-nanocapsule templated diacetylene assembly and photopolymerization for sensing and multicoded anti-counterfeiting

    Science.gov (United States)

    Nie, Xiang-Kun; Xu, Yi-Ting; Song, Zhi-Ling; Ding, Ding; Gao, Feng; Liang, Hao; Chen, Long; Bian, Xia; Chen, Zhuo; Tan, Weihong

    2014-10-01

    Molecular self-assembly, a process to design molecular entities to aggregate into desired structures, represents a promising bottom-up route towards precise construction of functional systems. Here we report a multifunctional, self-assembled system based on magnetic-graphitic-nanocapsule (MGN) templated diacetylene assembly and photopolymerization. The as-prepared assembly system maintains the unique color and fluorescence change properties of the polydiacetylene (PDA) polymers, while also pursues the superior Raman, NIR, magnetic and superconducting properties from the MGN template. Based on both fluorescence and magnetic resonance imaging (MRI) T2 relaxivity, the MGN@PDA system could efficiently monitor the pH variations which could be used as a pH sensor. The MGN@PDA system further demonstrates potential as unique ink for anti-counterfeiting applications. Reversible color change, strong and unique Raman scattering and fluorescence emission, sensitive NIR thermal response, and distinctive magnetic properties afford this assembly system with multicoded anti-counterfeiting capabilities.Molecular self-assembly, a process to design molecular entities to aggregate into desired structures, represents a promising bottom-up route towards precise construction of functional systems. Here we report a multifunctional, self-assembled system based on magnetic-graphitic-nanocapsule (MGN) templated diacetylene assembly and photopolymerization. The as-prepared assembly system maintains the unique color and fluorescence change properties of the polydiacetylene (PDA) polymers, while also pursues the superior Raman, NIR, magnetic and superconducting properties from the MGN template. Based on both fluorescence and magnetic resonance imaging (MRI) T2 relaxivity, the MGN@PDA system could efficiently monitor the pH variations which could be used as a pH sensor. The MGN@PDA system further demonstrates potential as unique ink for anti-counterfeiting applications. Reversible color change

  14. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  15. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  16. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  17. Photoluminescence of patterned CdSe quantum dot for anti-counterfeiting label on paper

    International Nuclear Information System (INIS)

    Isnaeni,; Yulianto, Nursidik; Suliyanti, Maria Margaretha

    2016-01-01

    We successfully developed a method utilizing colloidal CdSe nanocrystalline quantum dot for anti-counterfeiting label on a piece of glossy paper. We deposited numbers and lines patterns of toluene soluble CdSe quantum dot using rubber stamper on a glossy paper. The width of line pattern was about 1-2 mm with 1-2 mm separation between lines. It required less than one minute for deposited CdSe quantum dot on glossy paper to dry and become invisible by naked eyes. However, patterned quantum dot become visible using long-pass filter glasses upon excitation of UV lamp or blue laser. We characterized photoluminescence of line patterns of quantum dot, and we found that emission boundaries of line patterns were clearly observed. The error of line size and shape were mainly due to defect of the original stamper. The emission peak wavelength of CdSe quantum dot was 629 nm. The emission spectrum of deposited quantum dot has full width at half maximum (FWHM) of 30-40 nm. The spectra similarity between deposited quantum dot and the original quantum dot in solution proved that our stamping method can be simply applied on glossy paper without changing basic optical property of the quantum dot. Further development of this technique is potential for anti-counterfeiting label on very important documents or objects.

  18. Photoluminescence of patterned CdSe quantum dot for anti-counterfeiting label on paper

    Energy Technology Data Exchange (ETDEWEB)

    Isnaeni,, E-mail: isnaeni@lipi.go.id; Yulianto, Nursidik; Suliyanti, Maria Margaretha [Research Center for Physics, Indonesian Institute of Sciences, Building 442, Kawasan Puspiptek, South Tangerang,Banten 15314 Indonesia (Indonesia)

    2016-03-11

    We successfully developed a method utilizing colloidal CdSe nanocrystalline quantum dot for anti-counterfeiting label on a piece of glossy paper. We deposited numbers and lines patterns of toluene soluble CdSe quantum dot using rubber stamper on a glossy paper. The width of line pattern was about 1-2 mm with 1-2 mm separation between lines. It required less than one minute for deposited CdSe quantum dot on glossy paper to dry and become invisible by naked eyes. However, patterned quantum dot become visible using long-pass filter glasses upon excitation of UV lamp or blue laser. We characterized photoluminescence of line patterns of quantum dot, and we found that emission boundaries of line patterns were clearly observed. The error of line size and shape were mainly due to defect of the original stamper. The emission peak wavelength of CdSe quantum dot was 629 nm. The emission spectrum of deposited quantum dot has full width at half maximum (FWHM) of 30-40 nm. The spectra similarity between deposited quantum dot and the original quantum dot in solution proved that our stamping method can be simply applied on glossy paper without changing basic optical property of the quantum dot. Further development of this technique is potential for anti-counterfeiting label on very important documents or objects.

  19. Trends in counterfeits amphetamine-type stimulants after its prohibition in Brazil.

    Science.gov (United States)

    Mariotti, Kristiane de Cássia; Ortiz, Rafael S; Souza, Daniele Z; Mileski, Thayse C; Fröehlich, Pedro E; Limberger, Renata P

    2013-06-10

    Brazil is one of the world's highest users of anorectic drugs, mainly diethylpropione, fenproporex and sibutramine. The present work focuses on physical and chemical characteristics of 17 counterfeited capsules containing amphetamine-type stimulants (ATS) from three seizures conducted by Brazilian Federal Police. The physical profile was useful in indicating forgery, bring complementary information, but the use of this data singly was not sufficient to distinguish between authentic and counterfeited medicines. The chemical analysis revealed that the seizures capsules labeled as Desobesi-M (fenproporex 25mg), actually contained the active pharmaceutical ingrediente (API) sibutramine. The amount of this API ranged from 1/3 to 2 times the amount of drug found in commercial product, may reach twice the recommended daily dose. Multivariate analysis with application of principal component analysis on data from spectroscopy attenuated total reflectance Fourier transform infrared classified the samples according to their similarities, indicating that two seizures had common origin. This study represents the first step in the elucidation of falsification of ATS in Brazil. Considering the forensic intelligence these information are valuable in order to develop and establish a database that enables correlate samples from different locations and/or suppliers and to map the profile and trends of trafficking. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  20. Drug-laden 3D biodegradable label using QR code for anti-counterfeiting of drugs.

    Science.gov (United States)

    Fei, Jie; Liu, Ran

    2016-06-01

    Wiping out counterfeit drugs is a great task for public health care around the world. The boost of these drugs makes treatment to become potentially harmful or even lethal. In this paper, biodegradable drug-laden QR code label for anti-counterfeiting of drugs is proposed that can provide the non-fluorescence recognition and high capacity. It is fabricated by the laser cutting to achieve the roughness over different surface which causes the difference in the gray levels on the translucent material the QR code pattern, and the micro mold process to obtain the drug-laden biodegradable label. We screened biomaterials presenting the relevant conditions and further requirements of the package. The drug-laden microlabel is on the surface of the troches or the bottom of the capsule and can be read by a simple smartphone QR code reader application. Labeling the pill directly and decoding the information successfully means more convenient and simple operation with non-fluorescence and high capacity in contrast to the traditional methods. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  2. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  3. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  4. Three-dimensional quick response code based on inkjet printing of upconversion fluorescent nanoparticles for drug anti-counterfeiting

    Science.gov (United States)

    You, Minli; Lin, Min; Wang, Shurui; Wang, Xuemin; Zhang, Ge; Hong, Yuan; Dong, Yuqing; Jin, Guorui; Xu, Feng

    2016-05-01

    Medicine counterfeiting is a serious issue worldwide, involving potentially devastating health repercussions. Advanced anti-counterfeit technology for drugs has therefore aroused intensive interest. However, existing anti-counterfeit technologies are associated with drawbacks such as the high cost, complex fabrication process, sophisticated operation and incapability in authenticating drug ingredients. In this contribution, we developed a smart phone recognition based upconversion fluorescent three-dimensional (3D) quick response (QR) code for tracking and anti-counterfeiting of drugs. We firstly formulated three colored inks incorporating upconversion nanoparticles with RGB (i.e., red, green and blue) emission colors. Using a modified inkjet printer, we printed a series of colors by precisely regulating the overlap of these three inks. Meanwhile, we developed a multilayer printing and splitting technology, which significantly increases the information storage capacity per unit area. As an example, we directly printed the upconversion fluorescent 3D QR code on the surface of drug capsules. The 3D QR code consisted of three different color layers with each layer encoded by information of different aspects of the drug. A smart phone APP was designed to decode the multicolor 3D QR code, providing the authenticity and related information of drugs. The developed technology possesses merits in terms of low cost, ease of operation, high throughput and high information capacity, thus holds great potential for drug anti-counterfeiting.Medicine counterfeiting is a serious issue worldwide, involving potentially devastating health repercussions. Advanced anti-counterfeit technology for drugs has therefore aroused intensive interest. However, existing anti-counterfeit technologies are associated with drawbacks such as the high cost, complex fabrication process, sophisticated operation and incapability in authenticating drug ingredients. In this contribution, we developed a

  5. Strategies and Systems-Level Interventions to Combat or Prevent Drug Counterfeiting: A Systematic Review of Evidence Beyond Effectiveness.

    Science.gov (United States)

    Fadlallah, Racha; El-Jardali, Fadi; Annan, Farah; Azzam, Hayat; Akl, Elie A

    2016-01-01

    A recent systematic review suggested that drug registrations and onsite quality inspections may be effective in reducing the prevalence of counterfeit and substandard drugs. However, simply replicating the most effective interventions is problematic, as it denotes implementing the intervention without further adaptation. The aim was to systematically review the evidence beyond effectiveness for systems-level interventions to combat or prevent drug counterfeiting. We conducted an extensive search, including an electronic search of 14 databases. We included studies examining the efficiency, feasibility, reliability, and economic outcomes of the interventions, as well as barriers and facilitators to their implementation. Two reviewers selected eligible studies and abstracted data in duplicate and independently. We synthesized the results narratively, stratified by type of intervention. Of 10,220 captured citations, 19 met our inclusion criteria. The findings suggest that the following may strengthen regulatory measures (e.g., registration): minimizing drug diversion, enhancing lines of communications, ensuring feedback on drug quality, and promoting strict licensing criteria. There is evidence that onsite quality surveillance and inspection systems may be efficient and cost-effective for preliminary testing of large samples of drugs. Laws and legislation need to be specific to counterfeit drugs, include firm penalties, address online purchasing of drugs, and be complemented by education of judges and lawyers. Public awareness and education should rely on multiple platforms and comprehensive and dedicated content. While product authentication technologies may be efficient and reliable in detecting counterfeit drugs in the supply chain, they require a strong information system infrastructure. As for pharmacovigilance systems, it is critical to tackle the issue of underreporting, to enhance their chances of success. Several factors are critical to the successful design

  6. Limited indications of tax stamp discordance and counterfeiting on cigarette packs purchased in tobacco retailers, 97 counties, USA, 2012

    Directory of Open Access Journals (Sweden)

    Joseph G.L. Lee

    2017-12-01

    Full Text Available Increasing the per-unit cost of tobacco products is one of the strongest interventions for tobacco control. In jurisdictions with higher taxes in the U.S., however, cigarette pack litter studies show a substantial proportion of littered packs lack the appropriate tax stamp. More limited but still present counterfeiting also exists. We sought to examine the role of tobacco retailers as a source for untaxed and counterfeit products. Data collectors purchased Newport Green (menthol or Marlboro Red cigarette packs in a national probability-based sample of tobacco retailers (in 97 counties from June–October 2012. They made no effort to buy counterfeit or untaxed cigarettes. In this cross-sectional study, we assessed the presence, tax authority, and type (low-tech thermal vs. encrypted of cigarette pack tax stamps; concordance of tax stamps with where the pack was purchased; and, for Marlboro cigarettes, publicly available visible indicators of counterfeiting. We purchased 2147 packs of which 2033 had tax stamps. Packs missing stamps were in states that do not require them. We found very limited discordance between store location and tax stamp(s (<1%. However, a substantial minority of cigarette packs had damaged tax stamps (13%. This occurred entirely with low-tech tax stamps and was not identified with encrypted tax stamps. We found no clear evidence of counterfeit products. Almost all tax stamps matched the location of purchase. Litter studies may be picking up legal tax avoidance instead of illegal tax evasion or, alternatively, purchase of illicit products requires special request by the purchaser. Keywords: Taxes, Smoking, Tobacco products, Government regulation, Government

  7. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  8. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  9. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  10. PREFACE: Anti-counterfeit Image Analysis Methods (A Special Session of ICSXII)

    Science.gov (United States)

    Javidi, B.; Fournel, T.

    2007-06-01

    The International Congress for Stereology is dedicated to theoretical and applied aspects of stochastic tools, image analysis and mathematical morphology. A special emphasis on `anti-counterfeit image analysis methods' has been given this year for the XIIth edition (ICSXII). Facing the economic and social threat of counterfeiting, this devoted session presents recent advances and original solutions in the field. A first group of methods are related to marks located either on the product (physical marks) or on the data (hidden information) to be protected. These methods concern laser fs 3D encoding and source separation for machine-readable identification, moiré and `guilloche' engraving for visual verification and watermarking. Machine-readable travel documents are well-suited examples introducing the second group of methods which are related to cryptography. Used in passports for data authentication and identification (of people), cryptography provides some powerful tools. Opto-digital processing allows some efficient implementations described in the papers and promising applications. We would like to thank the reviewers who have contributed to a session of high quality, and the authors for their fine and hard work. We would like to address some special thanks to the invited lecturers, namely Professor Roger Hersch and Dr Isaac Amidror for their survey of moiré methods, Prof. Serge Vaudenay for his survey of existing protocols concerning machine-readable travel documents, and Dr Elisabet Pérez-Cabré for her presentation on optical encryption for multifactor authentication. We also thank Professor Dominique Jeulin, President of the International Society for Stereology, Professor Michel Jourlin, President of the organizing committee of ICSXII, for their help and advice, and Mr Graham Douglas, the Publisher of Journal of Physics: Conference Series at IOP Publishing, for his efficiency. We hope that this collection of papers will be useful as a tool to further

  11. Aspect of the Characters from The Counterfeiters of André Gide

    Directory of Open Access Journals (Sweden)

    Hülya Kol

    2017-07-01

    Full Text Available As a pastry chef, the writer André Gide kneads his dough differently with the intention of putting an end to imitation in the world of the novel. He has the courage to treat the subject of the novel on the contrary to his contemporaries. He succeeds by introducing the reader into the novel. The reader finds fantastic stories and interesting characters in The Counterfeiters. Themes such as the hypocrisy and falsity of these characters are a reflection of the title that evokes them. Gide transmits this problematic period to the reader with surprising skill. The contrast in the words and behaviors of people are the evil traces of war.

  12. Adulteration and Counterfeiting of Online Nutraceutical Formulations in the United States: Time for Intervention?

    Science.gov (United States)

    Nounou, Mohamed Ismail; Ko, Yamin; Helal, Nada A; Boltz, Jeremy F

    2017-10-11

    Global prevalence of nutraceuticals is noticeably high. The American market is flooded with nutraceuticals claiming to be of natural origin and sold with a therapeutic claim by major online retail stores such as Amazon and eBay. The objective of this commentary is to highlight the possible problems of online-sold nutraceuticals in the United States with respect to claim, adulterants, and safety. Furthermore, there is a lack of strict regulatory laws governing the sales, manufacturing, marketing, and label claims of nutraceutical formulations currently sold in the U.S. market. Major online retail stores and Internet pharmacies aid the widespread sale of nutraceuticals. Finally, according to the literature, many of these products were found to be either counterfeit or adulterated with active pharmaceutical ingredients (API) and mislabeled as being safe and natural. Therefore, regulatory authorities along with the research community should intervene to draw attention to these products and their possible effects.

  13. Fingerprint detection on counterfeit US dollar banknotes: the importance of preliminary paper examination.

    Science.gov (United States)

    Azoury, Myriam; Cohen, Drorit; Himberg, Kimmo; Qvintus-Leino, Pia; Saari, Terhi; Almog, Joseph

    2004-09-01

    Two seizures of counterfeit 100 US dollar bills related to the same indicative number were submitted for processing of latent fingerprints. On one group of notes, identifiable fingerprints could be detected by the routine application of amino acid reagents. In the second case, this technique gave no results, even on deliberately deposited prints. Fingerprints could be revealed, however, by cyanoacrylate fuming followed by magnetic powder. Comprehensive paper analysis showed that banknotes from both seizures differed remarkably by chemical composition as well as paper macroscopic properties. The difference in surface free energy (related to surface tension) of the banknotes in the two groups seemed to be the major factor responsible for the great variance in fingerprint detectability.

  14. “Fake product? Why not!” Attitudes toward the consumption of counterfeit goods in CEE as shown on the example of Slovakia

    Directory of Open Access Journals (Sweden)

    Denisa Kasl Kollmannová

    2012-09-01

    Full Text Available This article focuses on the increasing consumption trend of counterfeit goods in the countries of CEE and on the consequences for the global market. Counterfeiting is not longer typical only for the luxury market, where branding together with genuine source plays a crucial role and the business of top luxury is rising during the crisis. New categories of counterfeit goods are emerging constantly, including electronics and computer parts, pharmaceuticals, even FMCG such as food, beverages or cosmetics. This article presents data from GfK research on attitudes towards counterfeit goods in Slovakia and puts it to the context of other CEE countries. It gives clear managerial implications on how to communicate the importance of originality, benefits for the consumer when consuming original goods and social marketing of ethical consumption.

  15. Medicines informal market in Congo, Burundi and Angola: counterfeit and sub-standard antimalarials

    Directory of Open Access Journals (Sweden)

    Bertocchi Paola

    2007-02-01

    Full Text Available Abstract Background The presence of counterfeits and sub-standards in African medicines market is a dramatic problem that causes many deaths each year. The increase of the phenomenon of pharmaceutical counterfeiting is due to the rise of the illegal market and to the impossibility to purchase branded high cost medicines. Methods In this paper the results of a quality control on antimalarial tablet samples purchased in the informal market in Congo, Burundi and Angola are reported. The quality control consisted in the assay of active substance by means of validated liquid chromatographic methods, uniformity of mass determination, disintegration and dissolution tests. Moreover, a general evaluation on label and packaging characteristics was performed. Results The results obtained on thirty antimalarial tablet samples containing chloroquine, quinine, mefloquine, sulphadoxine and pyrimethamine showed the presence of different kinds of problems: a general problem concerning the packaging (loose tablets, packaging without Producer name, Producer Country and sometimes without expiry date; low content of active substance (in one sample; different, non-declared, active substance (in one sample; sub-standard technological properties and very low dissolution profiles (in about 50% of samples. This last property could affect the bioavailability and bioequivalence in comparison with branded products and could be related to the use of different excipients in formulation or bad storage conditions. Conclusion This paper evidences that the most common quality problem in the analysed samples appears to be the low dissolution profile. Here it is remarked that the presence of the right active substance in the right quantity is not a sufficient condition for a good quality drug. Dissolution test is not less important in a quality control and often evidences in vitro possible differences in therapeutic efficacy among drugs with the same active content. Dissolution

  16. Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology

    Energy Technology Data Exchange (ETDEWEB)

    Kennedy, Zachary C.; Stephenson, David E.; Christ, Josef F.; Pope, Timothy R.; Arey, Bruce W.; Barrett, Christopher A.; Warner, Marvin G.

    2017-08-18

    The significant rise of additive manufacturing (AM) in recent years is in part due to the open sourced nature of the printing processes and reduced cost and capital barriers relative to traditional manufacturing. However, this democratization of manufacturing spurs an increased demand for producers and end-users to verify the authenticity and quality of individual parts. To this end, we introduce an anti-counterfeiting method composed of first embedding engineered nanomaterials into features of a 3D-printed part followed by non-destructive interrogation of these features to quantify a chemical signature profile. The part specific chemical signature data is then linked to a securitized, distributed, and time-stamped blockchain ledger entry. To demonstrate the utility of this approach, lanthanide-aspartic acid nanoscale coordination polymers (Ln3+- Asp NCs) / poly(lactic) acid (PLA) composites were formulated and transformed into a filament feedstock for fused deposition modeling (FDM) 3D printing. In the present case, a quick-response (QR) code containing the doped Ln3+-Asp NCs was printed using a dual-extruder FDM printer into pure PLA parts. The QR code provides a searchable reference to an Ethereum-based blockchain entry. The QR code physical features also serve as defined areas to probe the signatures arising from the embedded Ln3+-Asp NCs. Visible fluorescence emission with UV-excitation was quantified in terms of color using a smartphone camera and incorporated into blockchain entries. Ultimately, linking unique chemical signature data to blockchain databases is anticipated to make the costs of counterfeiting AM materials significantly more prohibitive and transactions between those in the supply chain more trustworthy.

  17. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  18. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  19. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  20. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies? [version 2; referees: 2 approved

    OpenAIRE

    Maria Neufeld; Dirk W. Lachenmeier; Stephan G. Walch; Jürgen Rehm

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm t...

  1. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies? [version 1; referees: 2 approved

    OpenAIRE

    Maria Neufeld; Dirk W. Lachenmeier; Stephan G. Walch; Jürgen Rehm

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm t...

  2. Use of CdS quantum dot-functionalized cellulose nanocrystal films for anti-counterfeiting applications

    Science.gov (United States)

    Chen, L.; Lai, C.; Marchewka, R.; Berry, R. M.; Tam, K. C.

    2016-07-01

    Structural colors and photoluminescence have been widely used for anti-counterfeiting and security applications. We report for the first time the use of CdS quantum dot (QD)-functionalized cellulose nanocrystals (CNCs) as building blocks to fabricate nanothin films via layer-by-layer (LBL) self-assembly for anti-counterfeiting applications. Both negatively- and positively-charged CNC/QD nanohybrids with a high colloidal stability and a narrow particle size distribution were prepared. The controllable LBL coating process was characterized by scanning electron microscopy and ellipsometry. The rigid structure of CNCs leads to nanoporous structured films on poly(ethylene terephthalate) (PET) substrates with high transmittance (above 70%) over the entire range of visible light and also resulted in increased hydrophilicity (contact angles of ~40 degrees). Nanothin films on PET substrates showed good flexibility and enhanced stability in both water and ethanol. The modified PET films with structural colors from thin-film interference and photoluminescence from QDs can be used in anti-counterfeiting applications.Structural colors and photoluminescence have been widely used for anti-counterfeiting and security applications. We report for the first time the use of CdS quantum dot (QD)-functionalized cellulose nanocrystals (CNCs) as building blocks to fabricate nanothin films via layer-by-layer (LBL) self-assembly for anti-counterfeiting applications. Both negatively- and positively-charged CNC/QD nanohybrids with a high colloidal stability and a narrow particle size distribution were prepared. The controllable LBL coating process was characterized by scanning electron microscopy and ellipsometry. The rigid structure of CNCs leads to nanoporous structured films on poly(ethylene terephthalate) (PET) substrates with high transmittance (above 70%) over the entire range of visible light and also resulted in increased hydrophilicity (contact angles of ~40 degrees). Nanothin films

  3. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  4. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  5. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  6. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  7. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  8. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  9. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  10. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  11. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  12. Is That a Nike? The Purchase of Counterfeit Sporting Goods through the Lens of the Theory of Planned Behavior

    OpenAIRE

    Weisheng Chiu; Ho Keat Leng

    2015-01-01

    The purpose of this study was to examine the consumer behavior related to the purchase of counterfeit sporting goods (CSGs) based on the theory of planned behavior. The results showed that consumers’ attitude, subjective norm, and brand consciousness were predictive of purchase intention, whereas perceived behavioral control had no influence on purchase intention. Moreover, both risk averseness and sport involvement negatively led to consumers’ attitude toward CSGs. The paper ends with a disc...

  13. Effectiveness of medicines authentication technology to detect counterfeit, recalled and expired medicines: a two-stage quantitative secondary care study

    Science.gov (United States)

    Naughton, Bernard; Roberts, Lindsey; Dopson, Sue; Chapman, Stephen; Brindley, David

    2016-01-01

    Objectives To identify the authentication and detection rate of serialised medicines using medicines authentication technology. Design and intervention 4192 serialised medicines were entered into a hospital dispensary over two separate 8-week stages in 2015. Medicines were authenticated using secure external database cross-checking, triggered by the scanning of a two-dimensional data matrix with a unit specific 12-digit serial code. 4% of medicines included were preprogrammed with a message to identify the product as either expired, pack recalled, product recalled or counterfeit. Setting A site within a large UK National Health Service teaching hospital trust. Participants Accredited checking staff, pharmacists and dispensers in a pharmacy department. Primary outcome measures Authentication and detection rate of counterfeit expired and recalled medicines. Results The operational detection rate of counterfeit, recalled and expired medicines scanned as a combined group was 81.4% (stage 1 (S1)) and 87% (stage 2 (S2)). The technology's technical detection rate (TDR) was 100%; however, not all medicines were scanned and of those that were scanned not all that generated a warning message were quarantined. Owing to an operational authentication rate (OAR) of 66.3% (over both stages), only 31.8% of counterfeit medicines, 58% of recalled drugs and 64% of expired medicines were detected as a proportion of those entered into the study. Response times (RTs) of 152 ms (S1) and 165 ms (S2) were recorded, meeting the falsified medicines directive-mandated 300 ms limit. Conclusions TDRs and RTs were not a limiting factor in this study. The suboptimal OAR poses significant quality and safety issues with this detection approach. Authentication at the checking stage, however, demonstrated higher OARs. There is a need for further qualitative research to establish the reasons for less than absolute authentication and detection rates in the hospital environment to improve this

  14. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies?

    Science.gov (United States)

    Neufeld, Maria; Lachenmeier, Dirk W.; Walch, Stephan G.; Rehm, Jürgen

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm to underage drinkers, hazards due to toxic ingredients such as methanol, but most importantly alcohol harms due to potentially increased drinking volumes due to low prices and high availability on the internet. The internet sale also undermines existing alcohol policies such as restrictions of sale locations, sale times and minimum pricing. The need to enforce measures against counterfeiting of spirits, but specifically their internet trade should be implemented as key elements of alcohol policies to reduce unrecorded alcohol consumption, which is currently about 33 % of total consumption in Russia. PMID:28663784

  15. The internet trade of counterfeit spirits in Russia - an emerging problem undermining alcohol, public health and youth protection policies?

    Science.gov (United States)

    Neufeld, Maria; Lachenmeier, Dirk W; Walch, Stephan G; Rehm, Jürgen

    2017-01-01

    Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits) over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm to underage drinkers, hazards due to toxic ingredients such as methanol, but most importantly alcohol harms due to potentially increased drinking volumes due to low prices and high availability on the internet. The internet sale also undermines existing alcohol policies such as restrictions of sale locations, sale times and minimum pricing. The need to enforce measures against counterfeiting of spirits, but specifically their internet trade should be implemented as key elements of alcohol policies to reduce unrecorded alcohol consumption, which is currently about 33 % of total consumption in Russia.

  16. Through-container, extremely low concentration detection of multiple chemical markers of counterfeit alcohol using a handheld SORS device.

    Science.gov (United States)

    Ellis, David I; Eccles, Rebecca; Xu, Yun; Griffen, Julia; Muhamadali, Howbeer; Matousek, Pavel; Goodall, Ian; Goodacre, Royston

    2017-09-21

    Major food adulteration incidents occur with alarming frequency and are episodic, with the latest incident, involving the adulteration of meat from 21 producers in Brazil supplied to 60 other countries, reinforcing this view. Food fraud and counterfeiting involves all types of foods, feed, beverages, and packaging, with the potential for serious health, as well as significant economic and social impacts. In the spirit drinks sector, counterfeiters often 'recycle' used genuine packaging, or employ good quality simulants. To prove that suspect products are non-authentic ideally requires accurate, sensitive, analysis of the complex chemical composition while still in its packaging. This has yet to be achieved. Here, we have developed handheld spatially offset Raman spectroscopy (SORS) for the first time in a food or beverage product, and demonstrate the potential for rapid in situ through-container analysis; achieving unequivocal detection of multiple chemical markers known for their use in the adulteration and counterfeiting of Scotch whisky, and other spirit drinks. We demonstrate that it is possible to detect a total of 10 denaturants/additives in extremely low concentrations without any contact with the sample; discriminate between and within multiple well-known Scotch whisky brands, and detect methanol concentrations well below the maximum human tolerable level.

  17. CUE: counterfeit-resistant usable eye movement-based authentication via oculomotor plant characteristics and complex eye movement patterns

    Science.gov (United States)

    Komogortsev, Oleg V.; Karpov, Alexey; Holland, Corey D.

    2012-06-01

    The widespread use of computers throughout modern society introduces the necessity for usable and counterfeit-resistant authentication methods to ensure secure access to personal resources such as bank accounts, e-mail, and social media. Current authentication methods require tedious memorization of lengthy pass phrases, are often prone to shouldersurfing, and may be easily replicated (either by counterfeiting parts of the human body or by guessing an authentication token based on readily available information). This paper describes preliminary work toward a counterfeit-resistant usable eye movement-based (CUE) authentication method. CUE does not require any passwords (improving the memorability aspect of the authentication system), and aims to provide high resistance to spoofing and shoulder-surfing by employing the combined biometric capabilities of two behavioral biometric traits: 1) oculomotor plant characteristics (OPC) which represent the internal, non-visible, anatomical structure of the eye; 2) complex eye movement patterns (CEM) which represent the strategies employed by the brain to guide visual attention. Both OPC and CEM are extracted from the eye movement signal provided by an eye tracking system. Preliminary results indicate that the fusion of OPC and CEM traits is capable of providing a 30% reduction in authentication error when compared to the authentication accuracy of individual traits.

  18. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  19. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  20. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  1. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  2. Identification of Chinese Caterpillar Medicinal Mushroom, Ophiocordyceps sinensis (Ascomycetes) from Counterfeit Species.

    Science.gov (United States)

    Zhang, Wenjuan; Zhang, Xiaolong; Li, Minghua; Shi, Yan; Zhang, Ping; Cheng, Xian-Long; Wei, Feng; Ma, Shuangcheng

    2017-01-01

    Ophiocordyceps sinensis is a valuable traditional Chinese medicine with a high market price. In this study, a polymerase chain reaction-restriction fragment-length polymorphism (PCR-RFLP) method based on 2 enzymes was developed to distinguish O. sinensis from 6 common counterfeit species. To verify the applicability of this method, we experimentally tested O. sinensis organisms, tablet preparations made from O. sinensis, and cultured mycelia isolated from O. sinensis. To validate the results from this PCR-RFLP method, all real samples were identified by internal transcribed spacer sequencing. This is, to our knowledge, the first time the PCR-RFLP method has been applied to identify O. sinensis. The selection of 2 restrictive enzymes for identification dramatically improved the accuracy and efficiency of this method. It is the great advantage of this method that sampling from either of 2 parts of O. sinensis-the fruiting body or the caterpillar body-would not cause any difference in the final experimental results. Therefore, this method is not only feasible for testing crude drugs of O. sinensis but it is also useful when the crude drugs are broken down into powder or made into tablets, demonstrating the promising prospect of application in quality control.

  3. Establishment of a Fast Chemical Identification System for screening of counterfeit drugs of macrolide antibiotics.

    Science.gov (United States)

    Hu, Chang-Qin; Zou, Wen-Buo; Hu, Wang-Sheng; Ma, Xiao-Kang; Yang, Min-Zhi; Zhou, Shi-Lin; Sheng, Jin-Fang; Li, Yuan; Cheng, Shuang-Hong; Xue, Jing

    2006-01-23

    A Fast Chemical Identification System (FCIS) consisting of two colour reactions based on functional groups in molecules of macrolide antibiotics and two TLC methods was developed for screening of fake macrolide drugs. The active ingredients could be extracted from their oral preparations by absolute alcohol. Sulfuric acid reaction as a common reaction of macrolides was first used to distinguish the macrolides from other types of drugs and then 16-membered macrolides and 14-membered ones were distinguished by potassium permanganate reactions depending on the time of loss of colour in the test solution; after which a TLC method carried out on a GF(254) plate (5 cm x 10 cm) was chosen to further identification of the macrolides. The mobile phase A consisting of ethyl acetate, hexane and ammonia (100:15:15, v/v) was used for the identification of 14-membered macrolides, and the mobile phase B consisting of trichloromethane, methanol and ammonia (100:5:1, v/v) was used for the identification of 16-membered ones. A suspected counterfeit macrolide preparation can be identified within 40 min. The system can be used under different conditions and has the virtues of robustness, simplicity and speed.

  4. Identification of Microorganisms Isolated From Counterfeit and Unapproved Decorative Contact Lenses.

    Science.gov (United States)

    Land, Adrian D; Penno, Katie L; Brzezinski, Jennifer L

    2018-03-01

    All contact lenses (corrective/noncorrective) are considered Class II or Class III medical devices under the Federal Food, Drug, and Cosmetic Act, which also states that contact lenses can only be obtained with a prescription. The Forensic Chemistry Center of the US Food & Drug Administration has examined over 300 decorative, noncorrective contact lenses obtained without a prescription. Our observations indicate that 60% of the counterfeit lenses and 27% of the unapproved lenses examined were positive for microbial contamination. Twenty-nine different brands of noncorrective contact lenses were examined, and 48% of them had at least one sample positive for microbial contamination. Each microorganism was further identified using DNA sequencing. Contaminated contact lenses are associated with numerous health risks, including ocular infections and conjunctivitis leading to permanent visual impairment or blindness. These results support the contention that acquiring contact lenses without a prescription is a considerable threat to consumer health and safety. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  5. Dose-to-dose variations with single packages of counterfeit medicines and adulterated dietary supplements as a potential source of false negatives and inaccurate health risk assessments.

    Science.gov (United States)

    Venhuis, B J; Zwaagstra, M E; Keizers, P H J; de Kaste, D

    2014-02-01

    In this report, we show three examples of how the variability in dose units in single packages of counterfeit medicines and adulterated dietary supplements may contribute to a false negative screening result and inaccurate health risk assessments. We describe a counterfeit Viagra 100mg blister pack and a box of an instant coffee both containing dose units with and without an active pharmaceutical ingredient (API). We also describe a purportedly herbal slimming product with capsules that mutually differed in API and impurities. The adulterated dietary supplements contained sibutramine, benzyl-sibutramine, N-desmethyl-sibutramine (DMS), N,N-didesmethyl-sibutramine (DDMS) and several other related impurities. Counterfeit medicines and adulterated dietary supplements are a health risk because their quality is unreliable. Health risks are even greater when such unreliability extends to fundamental differences between dose units in one package. Because dose-to-dose variability for these products is unpredictable, the confidence interval of a sample size is unknown. Consequently, the analyses of a selection of dose units may not be representative for the package. In the worst case, counterfeit or unauthorised medicines are not recognised as such or a health risk is not identified. In order to reduce erroneous results particular care should be taken when analysing a composite of dose units, when finding no API in a dietary supplement and when finding conformity in a suspect counterfeit medicine. Copyright © 2013 Elsevier B.V. All rights reserved.

  6. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  7. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  8. Detection of counterfeit antiviral drug Heptodin and classification of counterfeits using isotope amount ratio measurements by multicollector inductively coupled plasma mass spectrometry (MC-ICPMS) and isotope ratio mass spectrometry (IRMS).

    Science.gov (United States)

    Santamaria-Fernandez, Rebeca; Hearn, Ruth; Wolff, Jean-Claude

    2009-06-01

    Isotope ratio mass spectrometry (IRMS) and multicollector inductively coupled plasma mass spectrometry (MC-ICP-MS) are highly important techniques that can provide forensic evidence that otherwise would not be available. MC-ICP-MS has proved to be a very powerful tool for measuring high precision and accuracy isotope amount ratios. In this work, the potential of combining isotope amount ratio measurements performed by MC-ICP-MS and IRMS for the detection of counterfeit pharmaceutical tablets has been investigated. An extensive study for the antiviral drug Heptodin has been performed for several isotopic ratios combining MC-ICP-MS and an elemental analyser EA-IRMS for stable isotope amount ratio measurements. The study has been carried out for 139 batches of the antiviral drug and analyses have been performed for C, S, N and Mg isotope ratios. Authenticity ranges have been obtained for each isotopic system and combined to generate a unique multi-isotopic pattern only present in the genuine tablets. Counterfeit tablets have then been identified as those tablets with an isotopic fingerprint outside the genuine isotopic range. The combination of those two techniques has therefore great potential for pharmaceutical counterfeit detection. A much greater power of discrimination is obtained when at least three isotopic systems are combined. The data from these studies could be presented as evidence in court and therefore methods need to be validated to support their credibility. It is also crucial to be able to produce uncertainty values associated to the isotope amount ratio measurements so that significant differences can be identified and the genuineness of a sample can be assessed.

  9. The temperature-sensitive luminescence of (Y,Gd)VO4:Bi3+,Eu3+ and its application for stealth anti-counterfeiting

    International Nuclear Information System (INIS)

    Chen, Lei; Zhang, Yao; Luo, Anqi; Liu, Fayong; Jiang, Yang; Hu, Qingzhuo; Chen, Shifu; Liu, Ru-Shi

    2012-01-01

    Anti-counterfeiting technologies are desired to protect products far away from the violation of dummy, fake and shoddy goods. The phosphor of (Y,Gd)VO 4 :Bi 3+ ,Eu 3+ was synthesized for the application of this purpose. Its photoluminescence was investigated by exciting with different wavelengths at variant temperatures. Wide emission color ranged from green through yellow to orange was tuned up by tailor-ing Bi 3+ and Eu 3+ concentrations. The temperature dependent luminescence and wavelength selective excitation of (Y,Gd)VO 4 :Bi 3+ ,Eu 3+ were observed, which provide different encryptions in anti-counterfeiting. To verify the feasibility in application, two anti-counterfeiting patterns were fabricated practically and excellent performance was obtained. Moreover, the physical mechanisms for the different phenomena of luminescence were elucidated from excitation spectra combining with the configuration coordinate model. (copyright 2012 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

  10. An Examination of Income Effect on Consumers' Ethical Evaluation of Counterfeit Drugs Buying Behaviour: A Cross-Sectional Study in Qatar and Sudan.

    Science.gov (United States)

    Alfadl, Abubakr Abdelraouf; Ibrahim, Mohamed Izham Mohamed; Maraghi, Fatima Abdulla; Mohammad, Khadijah Shhab

    2016-09-01

    There are limited studies on consumer behaviour toward counterfeit products and the determining factors that motivate willingness to purchase counterfeit items. This study aimed to fill this literature gap through studying differences in individual ethical evaluations of counterfeit drug purchase and whether that ethical evaluation affected by difference in income. It is hypothesized that individuals with lower/higher income make a more/less permissive evaluation of ethical responsibility regarding counterfeit drug purchase. To empirically test the research assumption, a comparison was made between people who live in the low-income country Sudan and people who live in the high-income country Qatar. The study employed a face-to-face structured interview survey methodology to collect data from 1,170 subjects and the Sudanese and Qatari samples were compared using independent t-test at alpha level of 0.05 employing SPSS version 22.0. Sudanese and Qatari individuals were significantly different on all items. Sudanese individuals scored below 3 for all Awareness of Societal Consequences (ASC) items indicating that they make more permissive evaluation of ethical responsibility regarding counterfeit drug purchase. Both groups shared a basic positive moral agreement regarding subjective norm indicating that influence of income is not evident. Findings indicate that low-income individuals make more permissive evaluation of ethical responsibility regarding counterfeit drugs purchase when highlighting awareness of societal consequences used as a deterrent tool, while both low and high-income individuals share a basic positive moral agreement when subjective norm dimension is exploited to discourage unethical buying behaviour.

  11. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Science.gov (United States)

    Guan, Yajing; Wang, Jianchen; Tian, Yixin; Hu, Weimin; Zhu, Liwei; Zhu, Shuijin; Hu, Jin

    2013-01-01

    Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L.) pelleted seed were developed in this paper. Fluorescein (FR), rhodamine B (RB), and magnetic powder (MP) were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85) and Honghua Dajinyuan (HHDJY). Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm). And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm). All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  12. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Directory of Open Access Journals (Sweden)

    Yajing Guan

    Full Text Available Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L. pelleted seed were developed in this paper. Fluorescein (FR, rhodamine B (RB, and magnetic powder (MP were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85 and Honghua Dajinyuan (HHDJY. Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm. And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm. All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  13. Physical profile of counterfeit tablets Viagra® and Cialis®

    Directory of Open Access Journals (Sweden)

    Rafael Scorsatto Ortiz

    2012-09-01

    Full Text Available The profile of tablets containing an active pharmacological ingredient can be obtained using different sets of properties, including physical and chemical aspects. The first measurements carried out on tablets are the physical characteristics also called post-tabletting batch (post-TB characteristics. These data may be valuable to assist in the detection of pharmaceutical product forgery and may also be used in a forensic intelligence perspective when inserted into databases. This work is focused on the physical characteristics of Cialis® and Viagra® tablets seized by the Brazilian Federal Police in the Rio Grande do Sul state. Using the F-test (ANOVA, all samples of counterfeit Viagra® (n = 28 and Cialis® (n = 40 were well distinguished from authentic samples by the following post-TB characteristics: length (major and minor, thickness, and mass. Using the exploratory statistical technique of Hierarchical Cluster Analysis (HCA, tablets with similar physical profiles were grouped. This result may indicate a common illicit production. We observed the validity of using post-TB properties to generate - in a fast and reliable manner and with no sample preparation - a technological profile that joins itself to the other analytical methods assisting in routine forensic detection of counterfeit Viagra® and Cialis®.Perfil para medicamentos na forma farmacêutica comprimidos contendo uma substância ativa pode ser obtido usando diferentes conjuntos de propriedades, incluindo aspectos físicos e químicos. As primeiras medições realizadas em comprimidos são de características físicas, também chamadas características pós-compressão. Tais dados podem ser valiosos para auxiliar na detecção de falsificações de medicamentos e ser utilizados em uma perspectiva de inteligência forense, quando inseridos em bancos de dados. Este trabalho está focado nas características físicas dos comprimidos de Cialis® e Viagra® apreendidos pela Pol

  14. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  15. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  16. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  17. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  18. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  19. Serial number coding and decoding by laser interference direct patterning on the original product surface for anti-counterfeiting.

    Science.gov (United States)

    Park, In-Yong; Ahn, Sanghoon; Kim, Youngduk; Bae, Han-Sung; Kang, Hee-Shin; Yoo, Jason; Noh, Jiwhan

    2017-06-26

    Here, we investigate a method to distinguish the counterfeits by patterning multiple reflective type grating directly on the surface of the original product and analyze the serial number from its rotation angles of diffracted fringes. The micro-sized gratings were fabricated on the surface of the material at high speeds by illuminating the interference fringe generated by passing a high-energy pulse laser through the Fresnel biprism. In addition, analysis of the grating's diffraction fringes was performed using a continuous wave laser.

  20. Is That a Nike? The Purchase of Counterfeit Sporting Goods through the Lens of the Theory of Planned Behavior

    Directory of Open Access Journals (Sweden)

    Weisheng Chiu

    2015-04-01

    Full Text Available The purpose of this study was to examine the consumer behavior related to the purchase of counterfeit sporting goods (CSGs based on the theory of planned behavior. The results showed that consumers’ attitude, subjective norm, and brand consciousness were predictive of purchase intention, whereas perceived behavioral control had no influence on purchase intention. Moreover, both risk averseness and sport involvement negatively led to consumers’ attitude toward CSGs. The paper ends with a discussion on the theoretical and practical contributions of this study towards the purchase of CSGs.

  1. Lithographically encoded polymer microtaggant using high-capacity and error-correctable QR code for anti-counterfeiting of drugs.

    Science.gov (United States)

    Han, Sangkwon; Bae, Hyung Jong; Kim, Junhoi; Shin, Sunghwan; Choi, Sung-Eun; Lee, Sung Hoon; Kwon, Sunghoon; Park, Wook

    2012-11-20

    A QR-coded microtaggant for the anti-counterfeiting of drugs is proposed that can provide high capacity and error-correction capability. It is fabricated lithographically in a microfluidic channel with special consideration of the island patterns in the QR Code. The microtaggant is incorporated in the drug capsule ("on-dose authentication") and can be read by a simple smartphone QR Code reader application when removed from the capsule and washed free of drug. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  3. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  4. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  5. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  6. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  7. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  8. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  9. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  10. La falsificación: un delito grave que pasa desapercibido/Counterfeiting: a serious crime that goes unnoticed

    Directory of Open Access Journals (Sweden)

    Sandro Calvani (Italia

    2015-01-01

    Full Text Available La asociación a la delincuencia organizada es en sí misma un “factor de riesgo” para la seguridad de los ciudadanos y para el orden público. La falsificación es una actividad delictiva peligrosa porque, al copiar productos, los falsificadores causan enormes daños al mercado y ponen en grave riesgo a los consumidores. Una de las consecuencias negativas de las economías son el resultado de la pérdida de ventas que sufren los legítimos productores cmoo0 resultado de la pérdida de ventas. Otras de las consecuencias: pérdidas de puestos de trabajo e incluso disminución de las oportunidades de desarrollo e innovación. The association of the organized crime is in itself a "risk factor" for the security of citizens and the public order. Counterfeiting is a dangerous criminal activity because copying products, counterfeiters cause enormous damage to the market and puts consumers at serious risk. One of the negative consequences of economies are the result of the loss of sales suffer lost sales result cmoo0 legitimate producers. Other consequences: losses of jobs and even decrease the opportunities of development and innovation.

  11. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  12. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  13. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  14. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  15. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  16. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  17. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  18. Scale development on consumer behavior toward counterfeit drugs in a developing country: a quantitative study exploiting the tools of an evolving paradigm.

    Science.gov (United States)

    Alfadl, Abubakr A; Ibrahim, Mohamed Izham b Mohamed; Hassali, Mohamed Azmi Ahmad

    2013-09-11

    Although desperate need and drug counterfeiting are linked in developing countries, little research has been carried out to address this link, and there is a lack of proper tools and methodology. This study addresses the need for a new methodological approach by developing a scale to aid in understanding the demand side of drug counterfeiting in a developing country. The study presents a quantitative, non-representative survey conducted in Sudan. A face-to-face structured interview survey methodology was employed to collect the data from the general population (people in the street) in two phases: pilot (n = 100) and final survey (n = 1003). Data were analyzed by examining means, variances, squared multiple correlations, item-to-total correlations, and the results of an exploratory factor analysis and a confirmatory factor analysis. As an approach to scale purification, internal consistency was examined and improved. The scale was reduced from 44 to 41 items and Cronbach's alpha improved from 0.818 to 0.862. Finally, scale items were assessed. The result was an eleven-factor solution. Convergent and discriminant validity were demonstrated. The results of this study indicate that the "Consumer Behavior Toward Counterfeit Drugs Scale" is a valid, reliable measure with a solid theoretical base. Ultimately, the study offers public health policymakers a valid measurement tool and, consequently, a new methodological approach with which to build a better understanding of the demand side of counterfeit drugs and to develop more effective strategies to combat the problem.

  19. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  20. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  1. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  2. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  3. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  4. Problems associated with substandard and counterfeit drugs in developing countries: a review article on global implications of counterfeit drugs in the era of antiretroviral (ARVs) drugs in a free market economy.

    Science.gov (United States)

    Nsimba, Stephen E D

    2008-12-01

    To review the global implications associated with the use of substandard and or counterfeit drugs in developing and may be developed countries. The focus of this review is particularly on antiretroviral (ARVs), antimalarials and other drugs. Review of various literatures through Pub-Med, Medline, Google and Internet search to retrieve and download published materials was done by the author of this review paper. When patients receive a counterfeit medicines, they are subjected to multiple risks. They often suffer more than just an inconvenience; as they become victims of fraud medicines and are all put at risk of adverse effects from unprescribed medicines or substandard ingredients. Additionally, patients may lose confidence in health care professionals including their physician and pharmacist, and potentially modern medicine or the pharmaceutical industry in general. Counterfeit or substandard (poor quality) drugs pose threats to society; not only to the individual in terms of the health side effects experienced, but also to the public in terms of trade relations, economic implications, and the effects on global pandemics. It is vital for suppliers, providers, and patients to be aware of current trends in counterfeiting in order to best prepare for encounters with suspicious products. Furthermore, this is an issue that needs to be continually dealt with on national and international policy levels. Developing countries should try their level best to establish good laboratories for monitoring and checking quality of all pharmaceuticals manufactured locally and those imported or donated to these countries. The Ministries of Health and all stakeholders involved in this issue must ensure that all drugs meet the set or established international standards and national standards. Failure to do so will be to misuse the hard earned forex that is normally borrowed from banks for the procurement and distribution of drugs to its people. Indeed sub-standard medications do more

  5. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  6. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  7. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  8. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  9. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  10. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  11. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. Study on the light-color mixing of rare earth luminescent materials for anti-counterfeiting application

    Science.gov (United States)

    Zhang, Jishu; Zhang, Yingzi; Tao, Jin; Zhu, Yanan

    2018-04-01

    In order to find out the light color mixing mechanism of rare earth luminescent materials used in anti-counterfeiting fibers, we prepared three kinds of rare earth luminescent materials according to RGB tri-primary color, and mixed it together to form different mixtures in certain proportion. The phase structures of the luminescent material monomers were measured by x-ray diffractometer. The photochromic properties of the luminescent materials were tested and analyzed by fluorescence spectrophotometer. The results show that the light color mixing was consistent with the blending principle of additive color, but not the same because of the photochromic properties of rare earth luminescent materials, and we explored the reasons in the light wavelength and intensity. It was found that the enhancement of the luminescence intensity of the mixture on account of the superimposing of luminescence.

  13. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  14. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  15. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  16. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  17. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  18. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  19. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  20. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  1. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  2. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  3. Adulterated and Counterfeit Male Enhancement Nutraceuticals and Dietary Supplements Pose a Real Threat to the Management of Erectile Dysfunction: A Global Perspective.

    Science.gov (United States)

    ElAmrawy, Fatema; ElAgouri, Ghada; Elnoweam, Ola; Aboelazayem, Samar; Farouk, ElMohanad; Nounou, Mohamed I

    2016-11-01

    Erectile dysfunction prevalence globally is noticeably high. This is accompanied by an increase in the use of nutraceuticals for male enhancement. However, the global market is invaded by counterfeit and adulterated nutraceuticals claimed to be of natural origin sold with a therapeutic claim. The objective of this article is to review male enhancement nutraceuticals worldwide with respect to claim, adulterants, and safety. The definition of such products is variable across countries. Thus, the registration procedures differ as well. This facilitates the manipulation of the process, which leads to widespread adulterated and counterfeit products without control. The tele-advertisement and Internet pharmacies aided the widespread sale of male enhancement nutraceuticals, unfortunately, the spurious ones. Finally, based on literature, most of these products were found to be adulterated with active pharmaceutical ingredients (API) and mislabeled as being natural. These products represent a major health hazard for consumers due to lack of clear regulations.

  4. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  5. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  6. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  7. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  8. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  9. The temperature-sensitive luminescence of (Y,Gd)VO{sub 4}:Bi{sup 3+},Eu{sup 3+} and its application for stealth anti-counterfeiting

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Lei; Zhang, Yao; Luo, Anqi; Liu, Fayong; Jiang, Yang; Hu, Qingzhuo [School of Materials Science and Engineering, Hefei University of Technology (China); Chen, Shifu [Department of Chemistry, Huaibei Normal University (China); Liu, Ru-Shi [Department of Chemistry, National Taiwan University, Taipei (China)

    2012-07-15

    Anti-counterfeiting technologies are desired to protect products far away from the violation of dummy, fake and shoddy goods. The phosphor of (Y,Gd)VO{sub 4}:Bi{sup 3+},Eu{sup 3+} was synthesized for the application of this purpose. Its photoluminescence was investigated by exciting with different wavelengths at variant temperatures. Wide emission color ranged from green through yellow to orange was tuned up by tailor-ing Bi{sup 3+} and Eu{sup 3+} concentrations. The temperature dependent luminescence and wavelength selective excitation of (Y,Gd)VO{sub 4}:Bi{sup 3+},Eu{sup 3+} were observed, which provide different encryptions in anti-counterfeiting. To verify the feasibility in application, two anti-counterfeiting patterns were fabricated practically and excellent performance was obtained. Moreover, the physical mechanisms for the different phenomena of luminescence were elucidated from excitation spectra combining with the configuration coordinate model. (copyright 2012 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

  10. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies? [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Maria Neufeld

    2017-06-01

    Full Text Available Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm to underage drinkers, hazards due to toxic ingredients such as methanol, but most importantly alcohol harms due to potentially increased drinking volumes due to low prices and high availability on the internet. The internet sale also undermines existing alcohol policies such as restrictions of sale locations, sale times and minimum pricing. The need to enforce measures against counterfeiting of spirits, but specifically their internet trade should be implemented as key elements of alcohol policies to reduce unrecorded alcohol consumption, which is currently about 33 % of total consumption in Russia.

  11. COUNTERFEITING ROMAN COINS IN THE ROMAN EMPIRE I – III A.D. STUDY ON THE ROMAN PROVINCES OF DACIA AND PANNONIA

    Directory of Open Access Journals (Sweden)

    Razvan Bogdan Gaspar

    2015-12-01

    Full Text Available This paper is based on the study of Roman silver coins, from archaeological sites located in Roman Dacia and Pannonia. Initially centred on the record of hybrid silver coins, the paper expanded its analysis on counterfeit pieces as well in order to fully understand all problems of roman silver coinage from the 1stto the 3rd centuries AD.The new and larger area of research had more than one implications, coin distribution on the studied sites, influx of coin in the province, quantity of recorded counterfeited pieces being just some of them. Thus every situation was discussed in different chapters, first presenting the coins and the laws that protected them, the studied sites and the analyse of the silver coins on these sites, the general and compared situation between the provinces, interpretation of the counterfeited and hybrid pieces and finally, conclusions on the subject.All these tasks have been achieved one step at a time, each archaeological site providing precious data which piled up and was finally pressed in order to present the correct historical situation.

  12. The internet trade of counterfeit spirits in Russia – an emerging problem undermining alcohol, public health and youth protection policies? [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Maria Neufeld

    2017-04-01

    Full Text Available Counterfeit alcohol belongs to the category of unrecorded alcohol not reflected in official statistics. The internet trade of alcoholic beverages has been prohibited by the Russian Federation since 2007, but various sellers still offer counterfeit spirits (i.e., forged brand spirits over the internet to Russian consumers, mostly in a non-deceptive fashion at prices up to 15 times lower than in regular sale. The public health issues arising from this unregulated trade include potential harm to underage drinkers, hazards due to toxic ingredients such as methanol, but most importantly alcohol harms due to potentially increased drinking volumes due to low prices and high availability on the internet. The internet sale also undermines existing alcohol policies such as restrictions of sale locations, sale times and minimum pricing. The need to enforce measures against counterfeiting of spirits, but specifically their internet trade should be implemented as key elements of alcohol policies to reduce unrecorded alcohol consumption, which is currently about 33 % of total consumption in Russia.

  13. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  14. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  15. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  16. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  17. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  18. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  19. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  20. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  1. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  2. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  3. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  4. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  5. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  6. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  7. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  8. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  9. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  10. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  11. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  12. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  13. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  14. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  15. Depth profiling of inks in authentic and counterfeit banknotes by electrospray laser desorption ionization/mass spectrometry.

    Science.gov (United States)

    Kao, Yi-Ying; Cheng, Sy-Chyi; Cheng, Chu-Nian; Shiea, Jentaie

    2016-01-01

    Electrospray laser desorption ionization is an ambient ionization technique that generates neutrals via laser desorption and ionizes those neutrals in an electrospray plume and was utilized to characterize inks in different layers of copy paper and banknotes of various currencies. Depth profiling of inks was performed on overlapping color bands on copy paper by repeatedly scanning the line with a pulsed laser beam operated at a fixed energy. The molecules in the ink on a banknote were desorbed by irradiating the banknote surface with a laser beam operated at different energies, with results indicating that different ions were detected at different depths. The analysis of authentic $US100, $100 RMB and $1000 NTD banknotes indicated that ions detected in 'color-shifting' and 'typography' regions were significantly different. Additionally, the abundances of some ions dramatically changed with the depth of the aforementioned regions. This approach was used to distinguish authentic $1000 NTD banknotes from counterfeits. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.

  16. Ecdysteroid-containing food supplements from Cyanotis arachnoidea on the European market: evidence for spinach product counterfeiting

    Science.gov (United States)

    Hunyadi, Attila; Herke, Ibolya; Lengyel, Katalin; Báthori, Mária; Kele, Zoltán; Simon, András; Tóth, Gábor; Szendrei, Kálmán

    2016-12-01

    Phytoecdysteroids like 20-hydroxyecdysone (“ecdysterone”) can exert a mild, non-hormonal anabolic/adaptogenic activity in mammals, and as such, are frequently used in food supplements. Spinach is well-known for its relatively low ecdysteroid content. Cyanotis arachnoidea, a plant native in China, is among the richest sources of phytoecdysteroids, and extracts of this plant are marketed in tons per year amounts via the internet at highly competitive prices. Here we report the investigation of a series of food supplements produced in Germany and claimed to contain spinach extracts. Twelve ecdysteroids including two new compounds were isolated and utilized as marker compounds. A comparative analysis of the products with Cyanotis and spinach extracts provides evidence that they were manufactured from Cyanotis extracts instead of spinach as stated. Based on the chromatographic fingerprints, 20-hydroxyecdysone 2- and 3-acetate are suggested as diagnostic markers for related quality control. This case appears to represent an unusual type of dietary supplement counterfeiting: undeclared extracts from alternative plants would supposedly ‘guarantee’ product efficacy.

  17. Design, fabrication and characterization of Computer Generated Holograms for anti-counterfeiting applications using OAM beams as light decoders.

    Science.gov (United States)

    Ruffato, Gianluca; Rossi, Roberto; Massari, Michele; Mafakheri, Erfan; Capaldo, Pietro; Romanato, Filippo

    2017-12-21

    In this paper, we present the design, fabrication and optical characterization of computer-generated holograms (CGH) encoding information for light beams carrying orbital angular momentum (OAM). Through the use of a numerical code, based on an iterative Fourier transform algorithm, a phase-only diffractive optical element (PO-DOE) specifically designed for OAM illumination has been computed, fabricated and tested. In order to shape the incident beam into a helicoidal phase profile and generate light carrying phase singularities, a method based on transmission through high-order spiral phase plates (SPPs) has been used. The phase pattern of the designed holographic DOEs has been fabricated using high-resolution Electron-Beam Lithography (EBL) over glass substrates coated with a positive photoresist layer (polymethylmethacrylate). To the best of our knowledge, the present study is the first attempt, in a comprehensive work, to design, fabricate and characterize computer-generated holograms encoding information for structured light carrying OAM and phase singularities. These optical devices appear promising as high-security optical elements for anti-counterfeiting applications.

  18. High-throughput fabrication of anti-counterfeiting colloid-based photoluminescent microtags using electrical nanoimprint lithography

    International Nuclear Information System (INIS)

    Diaz, R; Palleau, E; Poirot, D; Sangeetha, N M; Ressier, L

    2014-01-01

    This work demonstrates the excellent capability of the recently developed electrical nanoimprint lithography (e-NIL) technique for quick, high-throughput production of well-defined colloid assemblies on surfaces. This is shown by fabricating micron-sized photoluminescent quick response (QR) codes based on the electrostatic directed trapping (so called nanoxerography process) of 28 nm colloidal lanthanide-doped upconverting NaYF 4 nanocrystals. Influencing experimental parameters have been optimized and the contribution of triboelectrification in e-NIL was evidenced. Under the chosen conditions, more than 300 000 nanocrystal-based QR codes were fabricated on a 4 inch silicon wafer, in less than 15 min. These microtags were then transferred to transparent flexible films, to be easily integrated onto desired products. Invisible to the naked eye, they can be decoded and authenticated using an optical microscopy image of their specific photoluminescence mapping. Beyond this very promising application for product tracking and the anti-counterfeiting strategies, e-NIL nanoxerography, potentially applicable to any types of charged and/or polarizable colloids and pattern geometries opens up tremendous opportunities for industrial scale production of various other kinds of colloid-based devices and sensors. (paper)

  19. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  20. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  1. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  4. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  5. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  6. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  7. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  8. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  9. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  10. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  11. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  12. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  13. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  14. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  15. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  16. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  17. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  18. Medicine authentication technology as a counterfeit medicine-detection tool: a Delphi method study to establish expert opinion on manual medicine authentication technology in secondary care.

    Science.gov (United States)

    Naughton, Bernard; Roberts, Lindsey; Dopson, Sue; Brindley, David; Chapman, Stephen

    2017-05-06

    This study aims to establish expert opinion and potential improvements for the Falsified Medicines Directive mandated medicines authentication technology. A two-round Delphi method study using an online questionnaire. Large National Health Service (NHS) foundation trust teaching hospital. Secondary care pharmacists and accredited checking technicians. Seven-point rating scale answers which reached a consensus of 70-80% with a standard deviation (SD) of <1.0. Likert scale questions which reached a consensus of 70-80%, a SD of <1.0 and classified as important according to study criteria. Consensus expert opinion has described database cross-checking technology as quick and user friendly and suggested the inclusion of an audio signal to further support the detection of counterfeit medicines in secondary care (70% consensus, 0.9 SD); other important consensus with a SD of <1.0 included reviewing the colour and information in warning pop up screens to ensure they were not mistaken for the 'already dispensed here' pop up, encouraging the dispenser/checker to act on the warnings and making it mandatory to complete an 'action taken' documentation process to improve the quarantine of potentially counterfeit, expired or recalled medicines. This paper informs key opinion leaders and decision makers as to the positives and negatives of medicines authentication technology from an operator's perspective and suggests the adjustments which may be required to improve operator compliance and the detection of counterfeit medicines in the secondary care sector. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  19. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  20. Enhanced antitumor efficacy and counterfeited cardiotoxicity of combinatorial oral therapy using Doxorubicin- and Coenzyme Q10-liquid crystalline nanoparticles in comparison with intravenous Adriamycin

    DEFF Research Database (Denmark)

    Swarnakar, Nitin K; Thanki, Kaushik; Jain, Sanyog

    2014-01-01

    and strong synergism for combination at 1:10 dose ratio owing to higher cellular uptake, nuclear colocalization, higher apoptotic index and 8-OHdG levels. The prophylactic antitumor efficacy of the CoQ10-LCNPs was also established using tumor induction and progression studies. Finally, therapeutic antitumor......, with Dox-induced-cardiotoxicity was completely counterfeited in combination. In nutshell, LCNPs pose great potential in improving the therapeutic efficacy of drugs by oral route of administration. FROM THE CLINICAL EDITOR: This study describes the use of liquid crystalline nanoparticles containing coenzyme...

  1. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  2. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  3. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  4. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  5. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  6. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  7. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  8. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  9. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  10. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  11. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  12. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  13. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  14. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  15. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  16. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  17. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  18. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  19. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  20. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  1. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  2. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  3. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  4. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  5. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  6. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  7. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  8. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  9. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  10. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  11. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  12. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  13. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  14. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  15. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  16. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  17. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  18. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  19. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  20. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  1. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  2. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  3. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  4. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  5. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  6. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  7. The development and appraisal of a tool designed to find patients harmed by falsely labelled, falsified (counterfeit) medicines.

    Science.gov (United States)

    Anđelković, Marija; Björnsson, Einar; De Bono, Virgilio; Dikić, Nenad; Devue, Katleen; Ferlin, Daniel; Hanževački, Miroslav; Jónsdóttir, Freyja; Shakaryan, Mkrtich; Walser, Sabine

    2017-06-20

    Falsely labelled, falsified (counterfeit) medicines (FFCm's) are produced or distributed illegally and can harm patients. Although the occurrence of FFCm's is increasing in Europe, harm is rarely reported. The European Directorate for the Quality of Medicines & Health-Care (EDQM) has therefore coordinated the development and validation of a screening tool. The tool consists of a questionnaire referring to a watch-list of FFCm's identified in Europe, including symptoms of their use and individual risk factors, and a scoring form. To refine the questionnaire and reference method, a pilot-study was performed in 105 self-reported users of watch-list medicines. Subsequently, the tool was validated under "real-life conditions" in 371 patients in 5 ambulatory and in-patient care sites ("sub-studies"). The physicians participating in the study scored the patients and classified their risk of harm as "unlikely" or "probable" (cut-off level: presence of ≥2 of 5 risk factors). They assessed all medical records retrospectively (independent reference method) to validate the risk classification and documented their perception of the tool's value. In 3 ambulatory care sites (180 patients), the tool correctly classified 5 patients as harmed by FFCm's. The positive and negative likelihood ratios (LR+/LR-) and the discrimination power were calculated for two cut-off levels: a) 1 site (50 patients): presence of two risk factors (at 10% estimated health care system contamination with FFCm's): LR + 4.9/LR-0, post-test probability: 35%; b) 2 sites (130 patients): presence of three risk factors (at 5% estimated prevalence of use of non-prescribed medicines (FFCm's) by certain risk groups): LR + 9.7/LR-0, post-test probability: 33%. In 2 in-patient care sites (191 patients), no patient was confirmed as harmed by FFCm's. The physicians perceived the tool as valuable for finding harm, and as an information source regarding risk factors. This "decision aid" is a systematic tool

  8. Multiscaled polarization effects in Suneve coronata (Lepidoptera) and other insects: application to anti-counterfeiting of banknotes

    Science.gov (United States)

    Berthier, S.; Boulenguez, J.; Bálint, Z.

    2007-01-01

    The scales of many Lepidoptera and the elytra of quite a number of Coleoptera possess specialized micro- and nano-structures that produce special polarization effects. They are constituted by concave multilayered cavities. This leads to two different effects: (1) interferential non-polarized coloration by reflection near normal incidence in the middle of the cavities and (2) polarized interferential colouration at lower wavelength after double reflection near the Brewster incidence at the periphery of the cavities. The macroscopic appearance resembles the “pointillist effect” with one of the component polarized while the other one is not. The first one can be extinguished with linear polarizer so that the colour is modified. In most insects, the structure is locally symmetric; hence, no macroscopic effects can be seen. In certain species, this symmetry is partly broken, and a slight effect can be observed. In the wing dorsal surface of the fascinating neotropical butterflies genus Suneve, perpendicular structures of two different kinds in size polarize the reflected light. The larger one is constituted by the convex cover scales whose apex falls perpendicularly on the bases of the following scales, creating long polarized valley (50 μm width) transversally running across the wing. The smaller one is constituted by the ridges of the scales (2 μm apart) that polarize light in the perpendicular direction. Adapted multilayered structures can be deposited onto banknotes to create anti-counterfeiting patterns as a further development of protection and security. Different effects can be produced by the use of such structures. (1) Changes of luminosity: A specific pattern will be constituted by two different areas: one with horizontal concave multilayered structures, and the other one with vertical structures. Under unpolarized light, the reflected spectra of these different areas are identical and no pattern appears. Under polarized light, i.e., through a linear

  9. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  10. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  11. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  12. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  13. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  14. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  15. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  16. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  17. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  18. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  19. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  20. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  1. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  2. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  3. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  4. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  5. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  6. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  7. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  8. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  9. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  10. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  11. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  12. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  13. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  14. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  15. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  16. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Marnik G. Dekimpe

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  17. Heating/ethanol-response of poly methyl methacrylate (PMMA) with gradient pre-deformation and potential temperature sensor and anti-counterfeit applications

    International Nuclear Information System (INIS)

    Lu, Haibao; Huang, Wei Min; Ge, Yu Chun; Zhang, Fan; Zhao, Yong; Wu, Xue Lian; Geng, Junfeng

    2014-01-01

    In this paper, the heating/ethanol-response of a commercial poly methyl methacrylate (PMMA) is investigated. All PMMA samples are pre-deformed by means of impression (surface compression with a mold) to introduce a gradient pre-strain/stress field. Two types of molds are applied in impression. One is a Singaporean coin and the other is a particularly designed mold with a variable protrusive feature on top. Two potential applications—temperature sensors to monitor overheating temperatures and anti-counterfeit labels with a water-mark that appears only upon heating to a particular temperature—are demonstrated. Since the heating-responsive shape memory effect (SME) is an intrinsic feature of almost all polymers, other conventional polymers may be used in such applications as well. (technical note)

  18. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  19. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  20. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  1. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  2. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  3. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  4. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  5. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  6. A Novel Approach to Synthesise a Dual-Mode Luminescent Composite Pigment for Uncloneable High-Security Codes to Combat Counterfeiting.

    Science.gov (United States)

    Kanika; Kumar, Pawan; Singh, Satbir; Gupta, Bipin Kumar

    2017-12-01

    A strategy is demonstrated to protect valuable items, such as currency, pharmaceuticals, important documents, etc. against counterfeiting, by marking them with luminescent security codes. These luminescent security codes were printed by employing luminescent ink formulated from a cost effective dual-mode luminescent composite pigment of Gd 1.7 Yb 0.2 Er 0.1 O 3 and Zn 0.98 Mn 0.02 S phosphors using commercially available PVC Gold medium. In the composite, Gd 1.7 Yb 0.2 Er 0.1 O 3 and Zn 0.98 Mn 0.02 S account for upconversion and downconversion processes, respectively. The synthesis procedure of the composite involves the admixing of Gd 1.7 Yb 0.2 Er 0.1 O 3 nanorods and Zn 0.98 Mn 0.02 S phosphor, synthesised by hydrothermal and facile solid-state reaction methods, respectively. The structural, morphological, microstructural, and photoluminescent features of Gd 1.7 Yb 0.2 Er 0.1 O 3 nanorods, Zn 0.98 Mn 0.02 S phosphor and composite were characterised by using XRD, SEM, TEM, and photoluminescence (PL) techniques, respectively. The distribution of PL intensity of the printed pattern was examined by using confocal PL mapping microscopy. The obtained results reveal that security codes printed using ink formulated from this bi-luminescent composite pigment provide dual-stage security against counterfeiting. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Multi-constituent cardiovascular pills (MCCP)--challenges and promises of population-based prophylactic drug therapy for prevention of heart attack.

    Science.gov (United States)

    Jamieson, Michael J; Naghavi, Morteza

    2007-01-01

    Risk factors for atherosclerotic cardiovascular disease (CVD) are highly co-prevalent but poorly identified and treated. The Screening for Heart Attack Prevention and Education (SHAPE) Task Force from the Association for Eradication of Heart Attack (AEHA) has recently proposed a new strategy that recommends screening for subclinical atherosclerosis and implementing aggressive treatment of "vulnerable patients". The Task Force has also envisioned future developments that may shift mass screening strategies to mass prophylactic therapy. The "Polypill" concept, introduced by Wald and Law suggests a combination of statin, low-dose antihypertensives, aspirin and folic acid, in a single pill, taken prophylactically by high risk population can cut CVD event rates by as much as 80%. In this communication, we review the challenges and promises of such a strategy. "Polypill" is but one of an astronomical number of possible multiconstituent pills (MCCP). Attractive as the MCCP concept is, it lacks evidence from randomized controlled trials, and begs numerous questions about the credibility of the concept, the design and synthesis of such complex pills, pharmacokinetics, pharmacodynamics, bioequivalence, "class" vs. unique properties, interactions, evidence of clinical efficacy and safety, regulatory approval, post-marketing surveillance, prescription vs. over-the-counter use, responsibility for initiating and monitoring therapy, patient education, counterfeiting and importation, reimbursement, advertisement, patent protection, commercial viability, etc. If these issues are favorably addressed, MCCP stand to dramatically change the manner in which CVD is prevented particularly in developing societies. Notwithstanding, assuming low commercial interests, realizing the promises of MCCP will demand serious attention from national public health policymakers. The clinical and regulatory implications of population-based secondary prevention (which rely on a different evidence base

  8. Falsificação de medicamentos no Brasil Falsificación de medicamentos en Brasil Counterfeiting of drugs in Brazil

    Directory of Open Access Journals (Sweden)

    Joseane Ames

    2012-02-01

    ,9% y 5,7%, respectivamente. La mayor parte de los medicamentos falsos fue incautada en los estados Paraná, Sao Paulo y Santa Catarina, con incremento superior a 200% en el número de medicamentos inauténticos encaminados a la pericia en el período. Hubo aumento en las incautaciones de medicamentos contrabandeados arrecadados en conjunto con los falsos, 67% de las incautaciones incluyeron al menos un medicamento contrabandeado. CONCLUSIONES: La falsificación de medicamentos es un grave problema de salud pública. La identificación de las clases de medicamentos falsos en Brasil y los principales estados brasileños con esta problemática pueden facilitar acciones futuras de prevención y represión por los órganos brasileños responsables.OBJECTIVE: To identify the main counterfeit drugs seized by the Brazilian Federal Police and the states where seizures have been made. METHODS: A retrospective descriptive study on expert reports produced by criminal investigators of the Federal Police between January 2007 and September 2010, in relation to counterfeit drugs, was carried out. RESULTS: The drugs with greatest numbers of seizures were selective phosphodiesterase-5 inhibitors that are used for treating male erectile dysfunction (Cialis® and Viagra®, mean = 66% , followed by anabolic steroids (Durateston® and Hemogenin®: 8.9% and 5.7%, respectively. The greatest proportions of the counterfeit drugs were seized in the states of Paraná, Santa Catarina (both Southeastern Brazil and São Paulo (Southeastern, and the number of non-authentic drugs sent for investigation increased by more than 200% over the study period. There were increases in seizures of smuggled drugs found together with counterfeit drugs: 67% of the seizures included at least one smuggled drug. CONCLUSIONS: Counterfeiting of drugs is a severe public health problem. Identification of the classes of counterfeit drugs present in Brazil and the main Brazilian states with this problem may facilitate

  9. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  10. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  11. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  12. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  13. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  14. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  15. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  16. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  17. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  18. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  19. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  20. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  1. Entanglement generation secure against general attacks

    Science.gov (United States)

    Pirker, Alexander; Dunjko, Vedran; Dür, Wolfgang; Briegel, Hans J.

    2017-11-01

    We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the eavesdropper learns the noise. Our approach relies on non-trivial properties of distillation protocols which are used in conjunction with de-Finetti and post-selection-type techniques to reduce a general quantum attack in a non-asymptotic scenario to an i.i.d. setting. As a side result, we also provide entanglement distillation protocols for non-i.i.d. input states.

  2. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  3. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  4. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  5. Train-the-Trainer Video on the Deliberate Night Attack

    National Research Council Canada - National Science Library

    Dyer, Jean

    1998-01-01

    .... Night and day photography illustrate the training sequence needed to master the individual and buddy team skills, battle drills, and situational training exercises that support the night attack...

  6. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  7. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  8. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  9. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  10. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  11. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  12. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  13. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  14. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  15. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  16. Computer Network Attacks and Modern International Law

    Directory of Open Access Journals (Sweden)

    Andrey L. Kozik

    2014-01-01

    Full Text Available Computer network attacks (CNA is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. Nevertheless the international obligations, which states have accepted under the UN Charter and other treaties as well as customs - with any related exemptions and reservations - are still in force and create a legal framework, which one cannot ignore. Taking into account the intensity level or the consequences of a CNA the later could be considered as an unfriendly, but legal doing, or, as a use of force (prohibited under the article 2(4 of the UN Charter, or - in the case the proper threshold is taken - as an armed attack (which gives the victim-state the right to use force in self-defence under the customs and the article 51 of the UN Charter. Researches in the field of lex lata applicability to the CNAs could highlight gaps and week points of the nowadays legal regime. The subject is on agenda in western doctrine, and it is a pity - not in Russian one - the number of publication here is still unsatisfied. The article formulates issues related to CNAs and the modern international legal regime. The author explores the definition, legal volume of the term CNA, highlights main issues, which have to be analyzed from the point of the contemporary law.

  17. Treatment of HAE Attacks in the Icatibant Outcome Survey

    DEFF Research Database (Denmark)

    Hernández Fernandez de Rojas, Dolores; Ibañez, Ethel; Longhurst, Hilary

    2015-01-01

    BACKGROUND: Icatibant, a selective bradykinin B2 receptor antagonist for the treatment of acute hereditary angio-oedema (HAE) attacks in adults, can be administered by health care professionals (HCPs) or self-administered. This analysis compared characteristics and outcomes of acute HAE attacks t...

  18. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  19. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  20. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  1. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  2. 12 CFR 1780.16 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Rules § 1780.16 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral... subpart shall be excused based on the pendency before any court of any interlocutory appeal or collateral...

  3. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  4. Practical Attacks on AES-like Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Rechberger, Christian

    2015-01-01

    to drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more...

  5. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  6. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    Science.gov (United States)

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  7. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  8. Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

    NARCIS (Netherlands)

    van Wieren, Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab‿ cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats‿ on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the

  9. Quantitative security and safety analysis with attack-fault trees

    NARCIS (Netherlands)

    Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette

    2017-01-01

    Cyber physical systems, like power plants, medical devices and data centers have to meet high standards, both in terms of safety (i.e. absence of unintentional failures) and security (i.e. no disruptions due to malicious attacks). This paper presents attack fault trees (AFTs), a formalism that

  10. Internet Attack Traceback: Cross-Validation and Pebble-Trace

    Science.gov (United States)

    2013-02-28

    stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical

  11. Measuring the effectiveness of SDN mitigations against cyber attacks

    NARCIS (Netherlands)

    Koning, R.; de Graaff, B.; Meijer, R.; de Laat, C.; Grosso, P.

    2017-01-01

    To address increasing problems caused by cyber attacks, we leverage Software Defined networks and Network Function Virtualisation governed by a SARNET-agent to enable autonomous response and attack mitigation. A Secure Autonomous Response Network (SARNET) uses a control loop to constantly assess the

  12. A Survey of Man in the Middle Attacks

    DEFF Research Database (Denmark)

    Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor

    2016-01-01

    extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based...

  13. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

    DEFF Research Database (Denmark)

    Lamberger, Mario; Mendel, Florian; Schläffer, Martin

    2015-01-01

    We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. We give attacks on reduced variants of the 10-round Whirlpool hash function and compression function. Our results are collisions for 5...

  14. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  15. Attacks on Mobile Phones that Use the Automatic Configuration Mechanism

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The authors analyze the attacks on mobile devices that use the mechanism of an automatic configuration OMA/OTA, whose aim is listening to the Internet traffic of subscribers and the intrusion of malicious software on the user’s device, and suggest ways to protect mobile phones against such attacks.

  16. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    The paper assumes that some people, at least, are liable to attack in war. In a number of ways, this is an ambiguous statement, so before proceeding, I need to clarify the specific senses in which I shall generally be using the terms "liable" and "attack." When I write that "S is liable to milita...

  17. Fault attacks, injection techniques and tools for simulation

    NARCIS (Netherlands)

    Piscitelli, R.; Bhasin, S.; Regazzoni, F.

    2015-01-01

    Faults attacks are a serious threat to secure devices, because they are powerful and they can be performed with extremely cheap equipment. Resistance against fault attacks is often evaluated directly on the manufactured devices, as commercial tools supporting fault evaluation do not usually provide

  18. Python Source Code Plagiarism Attacks on Introductory Programming Course Assignments

    Science.gov (United States)

    Karnalim, Oscar

    2017-01-01

    This paper empirically enlists Python plagiarism attacks that have been found on Introductory Programming course assignments for undergraduate students. According to our observation toward 400 plagiarism-suspected cases, there are 35 plagiarism attacks that have been conducted by students. It starts with comment & whitespace modification as…

  19. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  20. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and