{"title":"ACE: Anomalous Code Elimination Through Automatic Detection Within Source Code","authors":"M. Stange","doi":"10.1109/SECON.2004.1287900","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287900","url":null,"abstract":"The ACE approach combines prior research techniques with new ones to eliminate anomalous code from source code. The idea is as follows: (1) identify characteristics/patterns of anomalous code, identify proper syntax, and identify rules of safe programming practices (2) encode the above items as evaluation properties, and (3) verify whether the evaluation passed or failed. This process has been automated into a pushdown automation tool that uses relational databases, process algorithms, static analysis and dynamic analysis.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"61 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121358899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating Realistic Network Traffic for Security Experiments","authors":"Song Luo, G. Marin","doi":"10.1109/SECON.2004.1287918","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287918","url":null,"abstract":"This paper reports results of an effort to develop a test environment in which ¿live¿ attack-free background traffic reflects the characteristics of the network to be defended. The expectation is that new intrusion detection techniques can be better evaluated (and tuned), in such a background, against inserted attacks and no others. Based on analysis of traffic captured from an example network in 2003, we determine models appropriate for the major Internet protocols present and compare these with previously obtained results. We describe the traffic modeling, and we describe an approach for generating realistic attack-free traffic (that is statistically similar to the captured traffic) in a test environment.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115509023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christopher R. Anderson, S. Krishnamoorthy, Chris G. Ranson, Todd J. Lemon, W. G. Newhall, Thomas Kummetz, Jeffery H. Reed
{"title":"Antenna Isolation, Wideband Multipath Propagation Measurements, and Interference Mitigation for On-frequency Repeaters","authors":"Christopher R. Anderson, S. Krishnamoorthy, Chris G. Ranson, Todd J. Lemon, W. G. Newhall, Thomas Kummetz, Jeffery H. Reed","doi":"10.1109/SECON.2004.1287906","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287906","url":null,"abstract":"On-frequency repeaters provide network operators with a cost-effective means of extending coverage to areas of low signal strength. Their ability to transmit and receive on the same channel essentially renders their operation transparent to the rest of the network. The maximum gain of an on-frequency repeater is, however, limited by the amount of isolation that exists between the transmitter and receiver antennas. Adaptive cancellation techniques may be used to mitigate a lack of isolation, but their performance is limited by their ability to track the time-varying multipath in the channel which exists between the two antennas. This paper presents antenna isolation and wideband power delay profile measurement results for typical repeater installations. In addition, simulation results are presented from a novel adaptive filtering approach that allows repeaters to operate with gains equal to or greater than the existing isolation.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"84 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114027434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":".NET Security: IPSec vs. SSL","authors":"J. Raissi","doi":"10.1109/SECON.2004.1287942","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287942","url":null,"abstract":"This paper presents the results of work by the author on application and comparative performance of IP Security (IPSec) and Secure Socket Layer (SSL) protocols in a Microsoft .NET 3-tier client-server network. To evaluate the performance of each security protocol, the author created a typical 3-tier client-server e-commerce model in which data communication passed through three distinct pathways: (1) channel between client and Web server over Internet, (2) channel between the Web server and application server, (3) channel between the application server and database server. The primary focus in this paper remains on the third channel where IPSec and SSL were used to connect the application server to the database server. A preliminary analysis of the collected data sheds light on performance of IPSec and SSL in Microsoft .NET environment. It also suggests that in pathways where SSL and IPSec could be used interchangeably, the selection of the most suitable security protocol ought to be dynamic.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131318250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Power Injection Modeling and Sequential Power Flow Algorithm for FACTS Devices","authors":"Nemat-Talebi, M. Ehsan, S. Bathaee","doi":"10.1109/SECON.2004.1287904","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287904","url":null,"abstract":"This paper presents a sequential based Newton- Raphson power flow algorithm for reliable and efficiently handling power systems with embedded FACTS (Flexible AC Transmission Systems) devices. Computation and control of power flow in power systems with embedded FACTS devices appear to be fundamental for power system analysis and planning purposes. A power injection model for conventional FACTS devices such as SVC (Static Var Compensator) and TCSC (Thyristor Controlled Series capacitor) as well as modern FACTS devices such as STATCOM (Static Series Compensator) SSSC (Static Synchronous Series Compensator) and UPFC (Unified Power Flow Controller) is derived. Also a power injection model of conventional HVDC (High Voltage Direct Current) is obtained. Then a sequential power flow algorithm (two step algorithm) is adopted. The proposed injection models and sequential power flow algorithm have been programmed and systematically tested in a number of systems. The results of Ward-Hale network are reported which clearly illustrates the Capabilities and generalization of the proposed algorithm.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward a Graphical User Interface for Grid Services","authors":"M. Wood, C. Ferner, J. Brown","doi":"10.1109/SECON.2004.1287937","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287937","url":null,"abstract":"The goal of the UNCW Grid project is to produce a user-friendly graphical environment for assembling and executing Grid applications. In this paper, we provide examples of the work done for this ongoing project. In particular we demonstrate a ¿drag-and-drop¿ approach to assembling complex Grid applications from individual Grid services. We also show how our graphical environment interacts with existing services to install and execute user applications on remote machines.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130801416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Synchronous and Asynchronous Architectures for DFT based Adaptive Equalizer","authors":"K. Santha, V. Vaidehi","doi":"10.1109/SECON.2004.1287947","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287947","url":null,"abstract":"This paper presents the design of synchronous and asynchronous architectures for a Discrete Fourier Transform (DFT) based Finite Impulse Response (FIR) filter. The one dimensional filter is based on the delayed Least Mean Squares (DLMS) algorithm. The architecture is derived for a 1×4 array of processing elements. The proposed synchronous architecture is applied in adaptive equalization and the convergence results are analyzed using Matlab. The functionality of the architecture is verified by simulation via Actel¿s Veribest VHDL simulator. The synchronous architecture is modified to operate in asynchronous mode by implementing a two phase handshaking protocol between the processing elements (PEs). The performance of the proposed architectures is analyzed in terms of speed up, adaptation delay and throughput. The proposed DFT based DLMS systolic architecture leads to faster convergence when compared to conventional DLMS systolic architecture. In the asynchronous architecture the processors are clock independent. This reduces the adaptation delay and increases the throughput. The architectures are highly modular and very much suitable for VLSI implementation.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125112795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Adi, A. Al-Qayedi, K. Negm, A. Mabrouk, S. Musa
{"title":"Secured Mobile Device Software Update over IP Networks","authors":"W. Adi, A. Al-Qayedi, K. Negm, A. Mabrouk, S. Musa","doi":"10.1109/SECON.2004.1287929","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287929","url":null,"abstract":"One of the major difficulties in managing mobile device maintenance is to perform software updates over the open network. Mobile devices are demanding more complex operation software. The manufacturer may need for some reason to update the operation software or even add new functionalities from time to time. The manufacturer may also want to sell selectively a new application to some interested mobile device owners. This operation could be performed over the open network. However both device owner and manufacturer should develop a mutual authentication and secured software download. The manufacturer would not like to reveal the software code for security and commercial reasons, at the same time the owner would like to be sure that the manufacturer is the one who is offering the code to be able to let the manufacturer take the responsibility for later device operation. This is a very old and common problem equivalent to software Intellectual Property Right (IPR) protection. A particular software download scenario is presented for mobile device environment and a secured protocol scenario is proposed. The solution includes mainly secret-key mechanisms together with special hardware architecture, which gives the whole process secure and less complex implementation in a mobile environment with low computational power requirements.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115096072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IPSec Offload Performance","authors":"J. Raissi","doi":"10.1109/SECON.2004.1287920","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287920","url":null,"abstract":"This paper presents the results of a case study that tested the performance of IPSec Offload feature of Microsoft Windows 2000 Server using 3COM 10/100 Mbps PCI Server NIC 3XP Processors. Based on the results of the benchmark, it was concluded that, in a few cases, a fast CPU with ample RAM and CACHE could yield better performance than a 3DES NIC using the IPSec Offload feature of Microsoft Windows 2000 Server. In most cases, with the IPSec Offload turned on, there was improvement in overall performance of the system. This paper concludes that in order to yield and maintain peak performance, the selection of encryption protocols and devices ought to be dynamic and based on runtime environmental factors.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115470210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless E-mail Security: A State-of-the-Art Review for Message Privacy and Protection from Application Perspective","authors":"Risvan Coskun","doi":"10.1109/SECON.2004.1287953","DOIUrl":"https://doi.org/10.1109/SECON.2004.1287953","url":null,"abstract":"This paper presents a state-of-the-art review of primary schemes for wireless e-mail security. It attempts to discuss most common standards available in the market place for e-mail security as well as their applicability on message privacy and protection. The main focus is given on e-mail security standards, message format types, email certificate and trust management systems and issues associated with each of these concepts from privacy and message integrity protection perspectives. Their applications on these two main security service areas are examined and real-world applied solutions are analyzed. The most common security standards, which are overviewed here, are 3DES, PEM, MOSS, PGP, PGP/MIME and S/MIME. It is assumed readers have basic knowledge on MIME specification.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127507301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}