8 research outputs found

    SSCT Score for Malware Detection

    Get PDF
    Metamorphic malware transforms its internal structure when it propagates, making detection of such malware a challenging research problem. Previous research considered a score based on simple substitution cryptanalysis, which was applied to the metamorphic detection problem. In this research, we analyze a new score based on a combined simple substitution and column transposition (SSCT) cryptanalysis. We show that this SSCT score significantly outperforms the simple substitution score— and other malware detection scores—in many cases

    Daksha: On Alert for High Energy Transients

    Full text link
    We present Daksha, a proposed high energy transients mission for the study of electromagnetic counterparts of gravitational wave sources, and gamma ray bursts. Daksha will comprise of two satellites in low earth equatorial orbits, on opposite sides of earth. Each satellite will carry three types of detectors to cover the entire sky in an energy range from 1 keV to >1 MeV. Any transients detected on-board will be announced publicly within minutes of discovery. All photon data will be downloaded in ground station passes to obtain source positions, spectra, and light curves. In addition, Daksha will address a wide range of science cases including monitoring X-ray pulsars, studies of magnetars, solar flares, searches for fast radio burst counterparts, routine monitoring of bright persistent high energy sources, terrestrial gamma-ray flashes, and probing primordial black hole abundances through lensing. In this paper, we discuss the technical capabilities of Daksha, while the detailed science case is discussed in a separate paper.Comment: 9 pages, 3 figures, 1 table. Additional information about the mission is available at https://www.dakshasat.in

    Science with the Daksha High Energy Transients Mission

    Full text link
    We present the science case for the proposed Daksha high energy transients mission. Daksha will comprise of two satellites covering the entire sky from 1~keV to >1>1~MeV. The primary objectives of the mission are to discover and characterize electromagnetic counterparts to gravitational wave source; and to study Gamma Ray Bursts (GRBs). Daksha is a versatile all-sky monitor that can address a wide variety of science cases. With its broadband spectral response, high sensitivity, and continuous all-sky coverage, it will discover fainter and rarer sources than any other existing or proposed mission. Daksha can make key strides in GRB research with polarization studies, prompt soft spectroscopy, and fine time-resolved spectral studies. Daksha will provide continuous monitoring of X-ray pulsars. It will detect magnetar outbursts and high energy counterparts to Fast Radio Bursts. Using Earth occultation to measure source fluxes, the two satellites together will obtain daily flux measurements of bright hard X-ray sources including active galactic nuclei, X-ray binaries, and slow transients like Novae. Correlation studies between the two satellites can be used to probe primordial black holes through lensing. Daksha will have a set of detectors continuously pointing towards the Sun, providing excellent hard X-ray monitoring data. Closer to home, the high sensitivity and time resolution of Daksha can be leveraged for the characterization of Terrestrial Gamma-ray Flashes.Comment: 19 pages, 7 figures. Submitted to ApJ. More details about the mission at https://www.dakshasat.in

    Abstract Securing Context-Aware Applications Using Environment Roles

    No full text
    In the future, a largely invisible and ubiquitous computing infrastructure will assist people with a variety of activities in the home and at work. The applications that will be deployed in such systems will create and manipulate private information and will provide access to a variety of other resources. Securing such applications is challenging for a number of reasons. Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. We show how the well-developed notion of roles can be used to capture security-relevant context of the environment in which access requests are made. By introducing environment roles, we create a uniform access control framework that can be used to secure context-aware applications. We also present a security architecture that supports security policies that make use of environment roles to control access to resources.

    Securing Context-Aware Applications Using Environment Roles

    Get PDF
    In the future, a largely invisible and ubiquitous computing infrastructure will assist people with a variety of activities in the home and at work. The applications that will be deployed in such systems will create and manipulate private information and will provide access to a variety of other resources. Securing such applications is challenging for a number of reasons. Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. We show how the well-developed notion of roles can be used to capture security-relevant context of the environment in which access requests are made. By introducing environment roles, we create a uniform access control framework that can be used to secure context-aware applications. We also present a security architecture that supports security policies that make use of environment roles to control access to resources

    Daksha: On Alert for High Energy Transients

    No full text
    We present Daksha, a proposed high energy transients mission for the study of electromagnetic counterparts of gravitational wave sources, and gamma ray bursts. Daksha will comprise of two satellites in low earth equatorial orbits, on opposite sides of earth. Each satellite will carry three types of detectors to cover the entire sky in an energy range from 1 keV to >1 MeV. Any transients detected on-board will be announced publicly within minutes of discovery. All photon data will be downloaded in ground station passes to obtain source positions, spectra, and light curves. In addition, Daksha will address a wide range of science cases including monitoring X-ray pulsars, studies of magnetars, solar flares, searches for fast radio burst counterparts, routine monitoring of bright persistent high energy sources, terrestrial gamma-ray flashes, and probing primordial black hole abundances through lensing. In this paper, we discuss the technical capabilities of Daksha, while the detailed science case is discussed in a separate paper
    corecore