2,857 research outputs found

    The Malware Analysis Body of Knowledge (MABOK)

    Get PDF
    The ability to forensically analyse malicious software (malware) is becoming an increasingly important discipline in the field of Digital Forensics. This is because malware is becoming stealthier, targeted, profit driven, managed by criminal organizations, harder to detect and much harder to analyse. Malware analysis requires a considerable skill set to delve deep into malware internals when it is designed specifically to detect and hinder such attempts. This paper presents a foundation for a Malware Analysis Body of Knowledge (MABOK) that is required to successfully forensically analyse malware. This body of knowledge has been the result of several years of research into malware dissection

    Assessing the Physical Vulnerability of Backbone Networks

    Get PDF
    Communication networks are vulnerable to natural as well as man-made disasters. The geographical layout of the network influences the impact of these disasters. It is therefore, necessary to identify areas that could be most affected by a disaster and redesign those parts of the network so that the impact of a disaster has least effect on them. In this work, we assume that disasters which have a circular impact on the network. The work presents two new algorithms, namely the WHF-PG algorithm and the WHF-NPG algorithm, designed to solve the problem of finding the locations of disasters that would have the maximum disruptive effect on the communication infrastructure in terms of capacity

    Security and Privacy in RFID Applications

    Get PDF
    Concerns about privacy and security may limit the deployment of RFID technology and its benefits, therefore it is important they are identified and adequately addressed. System developers and other market actors are aware of the threats and are developing a number of counter measures. RFID systems can never be absolutely secure but effort needs to be made to ensure a proper balance between the risks and the costs of counter measures. The approach taken to privacy and security should depend on the application area and the context of a specific application. In this chapter, we selected and discussed four application areas, but there are many others where privacy and security issues are relevant.JRC.J.4-Information Societ

    Exergy-based Planning and Thermography-based Monitoring for energy efficient buildings - Progress Report (KIT Scientific Reports ; 7632)

    Get PDF
    Designing and monitoring energy efficiency of buildings is vital since they account for up to 40% of end-use energy. In this study, exergy analysis is investigated as a life cycle design tool to strike a balance between thermodynamic efficiency of energy conversion and economic and environmental costs of construction. Quantitative geo-referenced thermography is proposed for monitoring and quantitative assessment via continued simulation and parameter estimation during the operating phase

    A Robot-Sensor Network Security Architecture for Monitoring Applications

    Get PDF
    This paper presents SNSR (Sensor Network Security using Robots), a novel, open, and flexible architecture that improves security in static sensor networks by benefiting from robot-sensor network cooperation. In SNSR, the robot performs sensor node authentication and radio-based localization (enabling centralized topology computation and route establishment) and directly interacts with nodes to send them configurations or receive status and anomaly reports without intermediaries. SNSR operation is divided into stages set in a feedback iterative structure, which enables repeating the execution of stages to adapt to changes, respond to attacks, or detect and correct errors. By exploiting the robot capabilities, SNSR provides high security levels and adaptability without requiring complex mechanisms. This paper presents SNSR, analyzes its security against common attacks, and experimentally validates its performance

    The Malware Analysis Body of Knowledge (MABOK)

    Get PDF
    The ability to forensically analyse malicious software (malware) is becoming an increasingly important discipline in the field of Digital Forensics. This is because malware is becoming stealthier, targeted, profit driven, managed by criminal organizations, harder to detect and much harder to analyse. Malware analysis requires a considerable skill set to delve deep into malware internals when it is designed specifically to detect and hinder such attempts. This paper presents a foundation for a Malware Analysis Body of Knowledge (MABOK) that is required to successfully forensically analyse malware. This body of knowledge has been the result of several years of research into malware dissection

    Efficiency of Medical Workers’ Uniforms with Antimicrobial Activity

    Get PDF
    Antimicrobial finishing of textiles protects users from pathogenic microorganisms, which can cause medical and hygienic problem. The use of such textiles particularly increases in healthcare facilities, where reduction and transmission of pathogenic bacteria are important factors for preventing nosocomial infections. In the present study, the efficiency of fabric with silane quaternary ammonium compounds (Si-QAC) applied as active agents was evaluated. A test was performed according to ATCC 100-1999 Test Method after 0-, 24- and 48-hour incubation times. The treated textiles were effective against Enterococcus faecalis, Staphylococcus aureus and Klebsiella pneumoniae, but were not effective for Gram-negative Escherichia coli and Pseudomonas aeruginosa. Testing was also performed in hospital environment at infectious department where working clothes made of treated fabric were compared to normal working clothes. Antimicrobial textiles were not effective in a hospital environment, where average microbial count on medical workers’ uniforms without antimicrobial protection was 1.4 × 109 cfu/mL, and 1.3 × 109 cfu/mL for uniforms made of antimicrobial material. Our conclusion is that quantities of application rates for Si-QAC should be higher or should be improved with applying another antimicrobial coating to obtain complex with dual activity

    Scare Tactics

    Get PDF
    It is the purpose of this document to describe the design and development processes of Scare Tactics. The game will be discussed in further detail as it relates to several areas, such as market analysis, development process, game design, technical design, and each team members’ individual area of background research. The research areas include asymmetrical game design, level design, game engine architecture, real-time graphics, user interface design, networking and artificial intelligence. As part of the team’s market analysis, other games featuring asymmetric gameplay are discussed. The games described in this section serve as inspirations for asymmetric game design. Some of these games implement mechanics that the team seeks to emulate and expand upon in Scare Tactics. As part of the team’s development process, several concepts were prototyped over the course of two months. During that process the team adopted an Agile methodology in order to assist with scheduling, communication and resource management. Eventually, the team chose to expand upon the prototype that became the basis of Scare Tactics. Game design and technical design occur concurrently in the development of Scare Tactics. Designers conduct discussions where themes, settings, and mechanics are conceived and documented. Mechanics are prototyped in Unity and eventually ported to a proprietary engine developed by our team. Throughout the course of development, each team member has had to own an area of design or development. This has led to individual research performed in several areas, which will be discussed further in this document
    • …
    corecore