3,641 research outputs found

    Computer program provides linear sampled- data analysis for high order systems

    Get PDF
    Computer program performs transformations in the order S-to W-to Z to allow arithmetic to be completed in the W-plane. The method is based on a direct transformation from the S-plane to the W-plane. The W-plane poles and zeros are transformed into Z-plane poles and zeros using the bilinear transformation algorithm

    Apparatus for remote handling of materials

    Get PDF
    Apparatus for remote handling of materials are described. A closed housing is provided with first and second containers and first and second reservoirs for holding materials to be mixed. The materials are transferable from the reservoirs to the first container where they are mixed. The mixed materials are then conveyed from the first container to the second container preferably by dumping the mixed materials into a funnel positioned over the second container. The second container is then moved to a second position for analysis of the mixed materials. For example, the materials may be ignited and the flame analyzed. Access, such as a sight port, is provided in the housing at the analysis position. The device provides a simple and inexpensive apparatus for safely mixing a pyrophoric material and an oxidizer which together form a thermite type mixture that burns to produce a large quantity of heat and light

    SecureQEMU: Emulation-based Software Protection Providing Encrypted Code Execution and Page Granularity Code Signing

    Get PDF
    This research presents an original emulation-based software protection scheme providing protection from reverse code engineering (RCE) and software exploitation using encrypted code execution and page-granularity code signing, respectively. Protection mechanisms execute in trusted emulators while remaining out-of-band of untrusted systems being emulated. This protection scheme is called SecureQEMU and is based on a modified version of Quick Emulator (QEMU) [5]. RCE is a process that uncovers the internal workings of a program. It is used during vulnerability and intellectual property (IP) discovery. To protect from RCE program code may have anti-disassembly, anti-debugging, and obfuscation techniques incorporated. These techniques slow the process of RCE, however, once defeated protected code is still comprehensible. Encryption provides static code protection, but encrypted code must be decrypted before execution. SecureQEMUs\u27 scheme overcomes this limitation by keeping code encrypted during execution. Software exploitation is a process that leverages design and implementation errors to cause unintended behavior which may result in security policy violations. Traditional exploitation protection mechanisms provide a blacklist approach to software protection. Specially crafted exploit payloads bypass these protection mechanisms. SecureQEMU provides a whitelist approach to software protection by executing signed code exclusively. Unsigned malicious code (exploits, backdoors, rootkits, etc.) remain unexecuted, therefore, protecting the system. SecureQEMUs\u27 cache mechanisms increase performance by 0.9% to 1.8% relative to QEMU. Emulation overhead for SecureQEMU varies from 1400% to 2100% with respect to native performance. SecureQEMUs\u27 performance increase is negligible with respect to emulation overhead. Dependent on risk management strategy, SecureQEMU\u27s protection benefits may outweigh emulation overhead

    Alien Registration- Kimball, Carrie B. (Waterville, Kennebec County)

    Get PDF
    https://digitalmaine.com/alien_docs/14673/thumbnail.jp

    Investigations of solid chemical barium release systems

    Get PDF
    Barium-copper oxide/canister barium vapor release system for geomagnetospheric measurement

    Information Assurance through Binary Vulnerability Auditing

    Get PDF
    The goal of this research is to develop improved methods of discovering vulnerabilities in software. A large volume of software, from the most frequently used programs on a desktop computer, such as web browsers, e-mail programs, and word processing applications, to mission-critical services for the space shuttle, is unintentionally vulnerable to attacks and thus insecure. By seeking to improve the identification of vulnerabilities in software, the security community can save the time and money necessary to restore compromised computer systems. In addition, this research is imperative to activities of national security such as counterterrorism. The current approach involves a systematic and complete analysis of the low-level organization of software systems in stark contrast to existing approaches which are either ad-hoc or unable to identify all buffer overflow vulnerabilities. The scope of this project is to develop techniques for identifying buffer overflows in closed-source software where only the software’s executable code is available. These techniques use a comprehensive analysis of the software system’s flow of execution called binary vulnerability auditing. Techniques for binary vulnerability auditing are grounded in science and, while unproven, are more complete than traditional ad-hoc approaches. Since there are several attack vectors in software, this research will focus on buffer overflows, the most common class of vulnerability

    Residential Grief Camps: An Initial Phenomenological Study of Staff Perspectives

    Get PDF
    Research has focused primarily on the impact of death on family functioning and the stages and tasks of grief, though little attention has been given to grief camps or the experiences of those who work there. This study explored the experiences of staff at a four-day overnight children’s grief camp. Eight participants reported their experience of camp in two major categories: connection to others and independence in grief and five themes. Camp provides the opportunity for campers to connect to others while finding their own path to healing. Clinical implications and future research directions are also discussed
    • …
    corecore