R. Sánchez-Reillo, J. Liu-Jimenez, M. G. Lorenz, L. Entrena
{"title":"Improvement in Security Evaluation of Biometric Systems","authors":"R. Sánchez-Reillo, J. Liu-Jimenez, M. G. Lorenz, L. Entrena","doi":"10.1109/CCST.2006.313442","DOIUrl":"https://doi.org/10.1109/CCST.2006.313442","url":null,"abstract":"Security is one of the major issues in IT systems. When users need to be authenticated, Biometrics appears as an improved alternative to the traditional systems. If biometrics is to be used in an IT product devoted to security, there should be some kind of assurance that no security holes are added. Even more, user biometric data is a very sensible piece of data. Therefore security achieved shall be evaluated, and a methodology is needed to cover such evaluation in an objective way. Based on previous works in security evaluation, such as Common Criteria and ISO, and some few initiatives in providing such concepts to the biometrics world, authors present in this paper an overview of such works, as well as some proposals to improve security evaluation in biometrics. This leads not only to such proposals, but also to some future works to be carried on in order to complete the work here shown","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117273305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifiable Security Metrics for Large Scale Heterogeneous Systems","authors":"S. Naqvi, M. Riguidel","doi":"10.1109/CCST.2006.313452","DOIUrl":"https://doi.org/10.1109/CCST.2006.313452","url":null,"abstract":"The exponential growth of information technology and the prospect of increased public access to the computing, communications, and storage resources have made these systems more vulnerable to attacks. Use of heterogeneous devices and communication links has become a common practice which further exacerbates the management of security services of these systems. A widely accepted management principle is that an activity cannot be managed if it cannot be measured. Security also falls in this rubric. However, the complexity of today's large scale heterogeneous systems makes it impossible to measure its security by simple examination. Moreover, for most users it is hardly possible to conduct more detailed checks, which are necessary for a qualified evaluation, as they can not afford the expenditure this would entail. The need to protect these systems is fueling the need of quantifying security metrics to determine the exact level of security assurances. In this article, we have identified those entities of a large scale heterogeneous system that enforce the security services and also those which are relevant to the security services. We have filtered out the measurable entities to simplify the metrics tree with optimal granularity. These entities serve as probes for the evaluation of the overall security assurance of the system. Based on these probes, topological and dependency graphs of the overall system are evaluated and federated for the system security cockpit that represents the interface for the administrator to perform necessary operations in order to obtain and maintain a particular security assurance level for a specified service. In order to provide a comprehensive and evaluative description of the various functions of our model, we have given a use case example of a telecommunication service $voice over the Internet protocol (VoIP)","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117168134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Galbally-Herrero, Julian Fierrez, J.D. Rodriguez-Gonzalez, F. Alonso-Fernandez, J. Ortega-Garcia, M. Tapiador
{"title":"On the Vulnerability of Fingerprint Verification Systems to Fake Fingerprints Attacks","authors":"J. Galbally-Herrero, Julian Fierrez, J.D. Rodriguez-Gonzalez, F. Alonso-Fernandez, J. Ortega-Garcia, M. Tapiador","doi":"10.1109/CCST.2006.313441","DOIUrl":"https://doi.org/10.1109/CCST.2006.313441","url":null,"abstract":"A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it. Three different scenarios are considered in the experiments, namely: enrollment and test with real fingerprints, enrollment and test with fake fingerprints, and enrollment with real fingerprints and test with fake fingerprints. Results for optical and thermal sweeping sensors are given. Both systems are shown to be vulnerable to direct attacks","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125396991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Ravin: Intrusion Detection and Tracking with Organic Airport Radar and Video Systems","authors":"D. S. Mazel, A. Barry","doi":"10.1109/CCST.2006.313426","DOIUrl":"https://doi.org/10.1109/CCST.2006.313426","url":null,"abstract":"Currently, airport perimeter intrusion detection primarily relies on visual surveillance by security personnel and is often augmented with video cameras. This approach is limited to day light hours and degrades with bad weather. We are developing a proof of concept system, mobile RAVIN, that detects intrusions as small as a human, works at all hours and all weather conditions, and provides rapid situational awareness to security personnel. The mobile RAVIN (radar and video integrated on mobile object architecture) system has been installed and tested at Seattle-Tacoma International Airport (SeaTac) in February 2006. It uses the airport security display processor (ASDP) - an integrated radar signal processor, track processor, and display processor system that derives threat information from the FAA's airport surface detection equipment (ASDE-3) ground surveillance radar systems. This approach leverages existing airport assets to provide a cost effective suite of security sensors. The mobile RAVIN system performs filtering and tracking on the ASDE-3 radar data, initiates and maintains video tracks of objects, and fuses radar and video tracks for operator display. It also allows operators to slew a video camera to a radar track location which reduces false alarms and nuisance alarms. Finally, we developed a display to show the radar and video tracks overlaid on a map of the airport","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124560329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous Cryptographic Hardware Design","authors":"J. Teifel","doi":"10.1109/CCST.2006.313454","DOIUrl":"https://doi.org/10.1109/CCST.2006.313454","url":null,"abstract":"Asynchronous integrated circuit technology provides low-power and low-noise operation for portable electronic security applications. Rather than using a global clock, asynchronous circuits employ a system of distributed handshake signals that control on-chip dataflow; reducing power consumption to only those parts of a chip actively involved in computation. Sandia has developed an automated asynchronous design flow that enables the rapid development of these asynchronous ASICs. This paper describes the design of asynchronous DES encryption circuits using this flow, and evaluates their performance against standard synchronous implementations","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121966439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lucas W Krakowt, E. Chong, Kenneth N Ti, Groomn, J. Harrington, Yun Li, Brian Rigdon
{"title":"Control of Perimeter Surveillance Wireless Sensor Networks via Partially Observable Marcov Decision Process","authors":"Lucas W Krakowt, E. Chong, Kenneth N Ti, Groomn, J. Harrington, Yun Li, Brian Rigdon","doi":"10.1109/CCST.2006.313460","DOIUrl":"https://doi.org/10.1109/CCST.2006.313460","url":null,"abstract":"This paper presents a novel approach to controlling large wireless sensor networks capable of optimizing multiple conflicting performance criterion. The example of battery power usage versus target tracking error is formulated here, though the technique can be extended to assessment, false alarm reduction, etc. Modeling a perimeter security system as a partially observable Markov decision process, an intruder's behaviors are probabilistically estimated several steps into the future (look-ahead) thus allowing the system to make the best decisions for overall benefit (non-myopic). In this example sensor activation is the control input. Further, particle filtering is employed to improve location estimates of multiple targets from noisy sensor data. Performance of the algorithm is demonstrated on a high fidelity simulator called UMBRA. Also a 100 node wireless sensor network has been constructed for algorithm validation","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128084179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study to develop a consensual map of security expert knowledge structure","authors":"D. Brooks","doi":"10.1109/CCST.2006.313446","DOIUrl":"https://doi.org/10.1109/CCST.2006.313446","url":null,"abstract":"Security education at the tertiary level is still in its infancy, with limited consensual agreement on content requirement. The security industry is diverse and multi-disciplined, with practitioners originating from many disciplines. But security experts have a rich knowledge structure, although there has had limited research to map this knowledge structure. This limited mapping reduces the ability of tertiary educators to provide industry focused teaching and learning. The study investigated and critiqued international tertiary undergraduate security courses (N=104). Supported by both industrial and academic security experts, further analysis reduced the number of courses for content analysis (N=7). Course content was analysed and security concepts extracted. Concept extraction utilised linguistic inquiry and word count (LIWC) text and content analysis. Linguistic analysis categorised the more utilised security concepts, supported by subordinate concepts. The study presented a number of significant findings. According to the study, a large majority of the critiqued security courses did not effectively represent organisational or corporate security. A table of security categories (N=14) was presented and included security technology. The study appeared to indicate that security education should include all fourteen knowledge categories. A list of subordinate security concepts (N=2001) was also produced, with security technology (N=226) presenting primary technologies","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126967601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Assessment of Dynamic Signature Forgery and Perception of Signature Strength","authors":"Stephen J. Elliott, A. Hunt","doi":"10.1109/CCST.2006.313448","DOIUrl":"https://doi.org/10.1109/CCST.2006.313448","url":null,"abstract":"Dynamic signature verification has many challenges associated with the creation of the impostor dataset. The literature discusses several ways of determining the impostor signature provider, but this paper takes a different approach - that of the opportunistic forger and his or her relationship to the genuine signature holder. The paper examines the accuracy with which an opportunistic forger assesses the various traits of the genuine signature, and whether the genuine signature holder believes that his or her signature is easy to forge","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124853654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Architecture for Multi-Security Level Network Traffic","authors":"E. L. Witzke, Steve Gossage, Dallas J Wiener","doi":"10.1109/CCST.2006.313455","DOIUrl":"https://doi.org/10.1109/CCST.2006.313455","url":null,"abstract":"Increasing availability and decreasing prices of encryptors raise the question, \"Can secure and regular network traffic be carried over one infrastructure?\" If this is feasible without compromising the security of network data or attached systems, benefits in both money and reliability can be realized. This paper examines the trends in encryption hardware, presents a possible consolidated architecture, highlights potential benefits, and discusses obstacles and details that would need to be worked out before wide-spread adoption","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127502868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proximity Detection and Ranging Using a Modified Fluorescent Lamp for Security Applications","authors":"J. Cooley, A. Avestruz, S. Lecb","doi":"10.1109/CCST.2006.313421","DOIUrl":"https://doi.org/10.1109/CCST.2006.313421","url":null,"abstract":"This paper describes a proximity detection system that uses a fluorescent lamp as a capacitive sensor. Because of the ubiquity of fluorescent lamps in commercial buildings, public spaces, and households, the potential applications of a capacitive sensor of this nature are numerous. These applications include people counting, real-time people tracking and detection of anomalous objects on a person for security verification. Modeling simulations and calculations of the electric fields under the lamp in the presence of a person as well as circuitry and electrode setups, which can be used to obtain a practical detection range are presented. Real-time tracking data and outputs collected from a working fluorescent lamp sensor are also presented","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126061228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}