3,442 research outputs found

    Software Obfuscation with Symmetric Cryptography

    Get PDF
    Software protection is of great interest to commercial industry. Millions of dollars and years of research are invested in the development of proprietary algorithms used in software programs. A reverse engineer that successfully reverses another company‘s proprietary algorithms can develop a competing product to market in less time and with less money. The threat is even greater in military applications where adversarial reversers can use reverse engineering on unprotected military software to compromise capabilities on the field or develop their own capabilities with significantly less resources. Thus, it is vital to protect software, especially the software’s sensitive internal algorithms, from adversarial analysis. Software protection through obfuscation is a relatively new research initiative. The mathematical and security community have yet to agree upon a model to describe the problem let alone the metrics used to evaluate the practical solutions proposed by computer scientists. We propose evaluating solutions to obfuscation under the intent protection model, a combination of white-box and black-box protection to reflect how reverse engineers analyze programs using a combination white-box and black-box attacks. In addition, we explore use of experimental methods and metrics in analogous and more mature fields of study such as hardware circuits and cryptography. Finally, we implement a solution under the intent protection model that demonstrates application of the methods and evaluation using the metrics adapted from the aforementioned fields of study to reflect the unique challenges in a software-only software protection technique

    Network Analysis with Stochastic Grammars

    Get PDF
    Digital forensics requires significant manual effort to identify items of evidentiary interest from the ever-increasing volume of data in modern computing systems. One of the tasks digital forensic examiners conduct is mentally extracting and constructing insights from unstructured sequences of events. This research assists examiners with the association and individualization analysis processes that make up this task with the development of a Stochastic Context -Free Grammars (SCFG) knowledge representation for digital forensics analysis of computer network traffic. SCFG is leveraged to provide context to the low-level data collected as evidence and to build behavior profiles. Upon discovering patterns, the analyst can begin the association or individualization process to answer criminal investigative questions. Three contributions resulted from this research. First , domain characteristics suitable for SCFG representation were identified and a step -by- step approach to adapt SCFG to novel domains was developed. Second, a novel iterative graph-based method of identifying similarities in context-free grammars was developed to compare behavior patterns represented as grammars. Finally, the SCFG capabilities were demonstrated in performing association and individualization in reducing the suspect pool and reducing the volume of evidence to examine in a computer network traffic analysis use case

    Activity Pattern Discovery from Network Captures

    Get PDF
    Investigating insider threat cases is challenging because activities are conducted with legitimate access that makes distinguishing malicious activities from normal activities difficult. To assist with identifying non-normal activities, we propose using two types of pattern discovery to identify a person\u27s behavioral patterns in network data. The behavioral patterns serve to deemphasize normal behavior so that insider threat investigations can focus attention on potentially more relevant. Results from a controlled experiment demonstrate the highlighting of a suspicious event through the reduction of events belonging to discovered patterns. Abstract © 2016 IEEE

    Developing an Online Library for Faster Retrieval of Mold Base and Standard Parts of Injection Molding

    Get PDF
    This paper focuses on developing a system to transfer mold base plates and standard parts faster during the stage of injection mold design. This system not only provides a way to compare the file version, but also it utilizes Siemens NX 10 to isolate the updated information into a single executable file (.dll), and then, the file can be transferred without the need of transferring the whole file. By this way, the system can help the user to download only necessary mold base plates and standard parts, and those parts downloaded are only the updated portions

    Finding diamonds in the rough: Targeted Sub-threshold Search for Strongly-lensed Gravitational-wave Events

    Full text link
    Strong gravitational lensing of gravitational waves can produce duplicate signals separated in time with different amplitudes. We consider the case in which strong lensing produces identifiable gravitational-wave events and weaker sub-threshold signals hidden in the noise background. We present a search method for the sub-threshold signals using reduced template banks targeting specific confirmed gravitational-wave events. We apply the method to all events from Advanced LIGO's first and second observing run O1/O2. Using GW150914 as an example, we show that the method effectively reduces the noise background and raises the significance of (near-) sub-threshold triggers. In the case of GW150914, we can improve the sensitive distance by 2.0%−14.8%2.0\% - 14.8\%. Finally, we present the top 55 possible lensed candidates for O1/O2 gravitational-wave events that passed our nominal significance threshold of False-Alarm-Rate ≤1/30\leq 1/30 days

    Battlespace Nextâ„¢: Developing a Serious Game to Explore Multi-domain Operations

    Get PDF
    Changes in the geopolitical landscape and increasing technological complexity have prompted the U.S. Military to coin the terms Multi-Domain Operations (MDO) and Joint All-Domain Command and Control (JADC2) as over-arching strategy to frame the complexity of warfare across both traditional and emerging warfighting domains. Teaching new concepts associated with these terms requires both innovation as well as distinct education and training tools in order to realize the cultural change advocated by senior military leaders. Battlespace Nextâ„¢ (BSN) is a serious game designed to teach concepts integral to MDO and initiate discussion on military strategy while conserving time, money, and manpower. BSN, a Collectable Card Game (CCG), is engineered to provide an engaging learning tool that educates on capabilities in a multi-domain conflict. This paper proposes an extensible game framework for modeling and reasoning about MDO concepts and presents our empirical feedback from over 120 military play testers evaluating a moderate to difficult version of the game. Results reveal the game teaches MDO concepts and delivers an engaging, hands-on learning experience. Specifically, we provide evidence it improved military readiness in seven areas of MDO in at least 62% of participants and 76% of respondents reported they enjoyed playing the game

    Prevalence and determinants of dietary supplement and non-prescription medicine use by men and women over 53 years old in Taiwan. Results from a population-based cross-sectional survey

    Full text link
    This study investigated the prevalence and determinants of the use of dietary supplements and non-prescription medicines by older adults in Taiwan. Methods:  Data are from the 1999 Survey of Health and Living Status of the Elderly in Taiwan. The survey involved a national random sample of 2360 men and 2080 women, 53 years or older. Results:  Overall, 32.4% of elderly men and 42.7% of elderly women used at least one kind of dietary supplement during the past 12 months. Approximately 16% of elderly men and 19% of elderly women used multivitamin and mineral supplements, 10.5 and 22% used calcium, and 10 and 14% used vitamin E, respectively. Conclusions:  The rates of supplement use are generally lower than those observed in the USA but comparable to that in other industrialised countries. Elderly who are females or who are more highly educated or physically more active are more frequent supplement users.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/72609/1/j.1741-6612.2006.00183.x.pd
    • …
    corecore