423,358 research outputs found

    Quantum-secured imaging

    Get PDF
    We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.Comment: 10 pages (double spaced), 5 figure

    Data-flow Analysis of Programs with Associative Arrays

    Full text link
    Dynamic programming languages, such as PHP, JavaScript, and Python, provide built-in data structures including associative arrays and objects with similar semantics-object properties can be created at run-time and accessed via arbitrary expressions. While a high level of security and safety of applications written in these languages can be of a particular importance (consider a web application storing sensitive data and providing its functionality worldwide), dynamic data structures pose significant challenges for data-flow analysis making traditional static verification methods both unsound and imprecise. In this paper, we propose a sound and precise approach for value and points-to analysis of programs with associative arrays-like data structures, upon which data-flow analyses can be built. We implemented our approach in a web-application domain-in an analyzer of PHP code.Comment: In Proceedings ESSS 2014, arXiv:1405.055

    Securing identity information with image watermarks

    Get PDF
    In this paper, we describe the requirements for embedding watermarks in images used for identity verification and demonstrate a proof of concept in security sciences. The watermarking application is designed for verifying the rightful ownership of a driving license or similar identity object. The tool we built and tested embeds and extracts watermarks that contain verification information of the rightful owner. We used the human finger print of the rightful owner as the watermark. Such information protection mechanisms add an extra layer of security to the information system and improve verification of identification attributes by providing strong security. The issues of usability and cost are also discussed in the context of the social acceptability of access controls

    A SIMULATION MODEL FOR MANAGING PARAMETERS OF INTELLIGENT SECURITY SYSTEM

    Get PDF
    Security systems are the guarantee of stable functioning of the organization, company, office, industry, housing and other types of buildings. For entire security, complex control devices are set on the building which has to be protected, like fire and burglar alarms, video-audio controls and access systems. Intelligent Security Management System is built on Atmelā€™s microcontrollers. This allows the system to be flexible and to modify it easily if needed. The reliability of the security system depends on its uniqueness. This given security system is easily modified and hence its reliability is high. The system can be easily integrated into a variety of external modules, which can further increase the factor of reliability. Itā€™s also easy to adopt it to various security management systems. Many of the security and video surveillance systems allow to control the situation of the object from a large distance. From any point of the planet, we can track and manage the security system modes and make easy changes in them, which enable adequate reaction.Digital complexes of video surveillance are one of the variants of defense organization. The main areas of their use are the most important objects and large areas where buildings are located far from each other.Security systems are the guarantee of stable functioning of the organization, company, office, industry, housing and other types of buildings. For entire security, complex control devices are set on the building which has to be protected, like fire and burglar alarms, video-audio controls and access systems. Intelligent Security Management System is built on Atmelā€™s microcontrollers. This allows the system to be flexible and to modify it easily if needed. The reliability of the security system depends on its uniqueness. This given security system is easily modified and hence its reliability is high. The system can be easily integrated into a variety of external modules, which can further increase the factor of reliability. Itā€™s also easy to adopt it to various security management systems. Many of the security and video surveillance systems allow to control the situation of the object from a large distance. From any point of the planet, we can track and manage the security system modes and make easy changes in them, which enable adequate reaction.Digital complexes of video surveillance are one of the variants of defense organization. The main areas of their use are the most important objects and large areas where buildings are located far from each other

    Security system testing on electronic integrated antenatal care (e-iANC)

    Get PDF
    Electronic Integrated Antenatal Care (e-iANC) was built as a web-based application to assist midwives in recording Antenatal Care (ANC) data including Patient Registration; Anamnesis; Physical Examination; Laboratory Test, Screening of Risk Pregnancy; Communication, Information and Education; Treatment and follow-up; Patient Disposition. To ensure e-iANC becomes a safe system, security system testing was needed. Our goals were to test the security system by using the Open Web Application Security Project (OWASP). It was conducted in computer laboratory at Universitas Esa Unggul Jakarta in August 2017. The OWASP detect include Injection, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Level Access Control, Cross Site Request Forgery (CSRF), Using Known Vulnerable Components, Unvalidated Redirects and Forwards. The results indicated the risk level of e-iANC was the low category in the aspect of Cross-Domain JavaScript Source File Inclusion, Private IP Disclosure, XSS Protection Not Enabled Web Browser

    Provably correct Java implementations of Spi Calculus security protocols specifications

    Get PDF
    Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi Calculus and a translation function are formally defined, in order to formalize the refinement of a Spi Calculus specification into a Java implementation. The Java implementation generated by the translation function uses a custom Java library. Formal conditions on such library are stated, so that, if the library implementation code satisfies such conditions, then the generated Java implementation correctly simulates the Spi Calculus specification. A verified implementation of part of the custom library is further presente

    Object Detection and Monitor System for Building Security Based on Internet of Things (IoT) Using Illumination Invariant Face Recognition

    Get PDF
    Theft and intrusion are crimes that often occur in neighborhoods when there is opportunity or negligence by owners and security personnel. Many studies have been carried out to improve environmental security by applying cameras as a surveillance medium. However, the camera is not optimal in detecting objects when the lighting conditions are lacking. Therefore, in this study, a monitoring and object detection system was built by applying the Illumination Invariant model. This model is used to improve the appearance of the image from light and shadow reflections. The process of detecting and identifying objects is done by using human facial features (face detection) captured by the camera. The camera used is a Logitec C270 Webcam 720p which is connected via a USB port on the Raspberry Pi 4. The Raspberry Pi 4 processes human face image data and sends the processing results to a MySQL database using the HTTP protocol. Data transmission is done using the Python Flask web framework. The system was successfully run 100% by using black box testing of all functional requirements. Tests on the object detection feature were carried out based on different lighting conditions 15 times by comparing the original image and the results of the Illumination Invariant implementation. Based on the test results obtained object detection accuracy of 86.7%
    • ā€¦
    corecore