{"title":"Use of modeling and simulation to support airport security","authors":"D.L. Wilson","doi":"10.1109/CCST.2004.1405400","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405400","url":null,"abstract":"Currently as well as in the past, an aggressive program to enhance security at airports throughout the United States has been pursued resulting in numerous advancements in the civil aviation security landscape. For government and industry planners concerned with future security improvements, being able to predict the overall impact of new technologies and/or procedures is an important issue, especially in the deployment of advanced airport security equipment. Recognized as part of the issue is that new security systems must be installed in and function as part of operating airports, which, throughout the entire process, must continue to handle ongoing operational requirements in a competitive and cost efficient manner to the satisfaction and safety of their customers - the airlines and traveling public. One approach to gaining a better understanding of this issue, as well as any new technologies and their impact in an airport's operational environment, is by using modeling and simulation tools. Modeling and simulation has become an effective way to target new technology advancements and operational concepts and to evaluate the behavior of complex systems, offering the opportunity to examine the complexities of the airport environment in a non-intrusive and cost-effective way, while also offering the means to evaluate, assess, and fine-tune equipment selections, configurations, and other operational factors without actually deploying or installing expensive security equipment or reconfiguring secure areas of the airport environment, unnecessarily interrupting passenger and baggage flow through an airport. In the long run, this will result in the implementation of more effective and efficient airport security solutions.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127390577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robohound/spl trade/ remote explosives detection","authors":"M. Baumann, J. Hunter, D. Hannum, R. Horton","doi":"10.1109/CCST.2004.1405419","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405419","url":null,"abstract":"With continued terrorist activities worldwide and the concern that explosive devices need to be detected in a variety of configurations while protecting individuals, there is a need to remotely detect potential explosive devices. Current handheld trace explosives detection sensors require the operator to stand within a few inches of a potential explosive device to ensure an adequate sample is collected. Because of the low vapor pressure of some explosives and the low vapor concentrations in airborne plumes emanating from a bulk explosive source, the sample collection method is critical when using an ion mobility spectrometer-based explosive detection sensor. The RoboHound/spl trade/, a prototype remote trace explosive detection system, is under development at Sandia National Laboratories to address this issue. The RoboHound/spl trade/ was designed for primary use in emergency response situations and could also be used for some checkpoint screening applications. The prototype uses a wheeled robotic platform with a manipulator arm and custom software for robotic controls; a chemical sample collector and preconcentrator; and a commercial explosives detector. The integrated system allows an operator to maneuver the system into position while remaining up to 100 feet away from a suspect vehicle, package, or other object, and take a sample for analysis.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121643005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of illumination changes on the performance of Geometrix FaceVision/spl reg/ 3D FRS","authors":"E. Kukula, S. Elliott, R. Waupotitsch, B. Pesenti","doi":"10.1109/CCST.2004.1405414","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405414","url":null,"abstract":"This evaluation examined the effects of four frontal light intensities on the performance of a 3D face recognition algorithm, specifically testing the significance between an unchanging enrollment illumination condition (220-225 lux) and four different illumination levels for verification. The evaluation also analyzed the significance of external artifacts (i.e. glasses) and personal characteristics (i.e. facial hair) on the performance of the face recognition system (FRS). Collected variables from the volunteer crew included age, gender, ethnicity, facial characteristics, hair covering the forehead, scars on the face, and glasses. The analysis of data revealed that there are no statistically significant differences between environmental lighting and 3D FRS performance when a uniform or constant enrollment illumination level is used.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Pierson, P. Campbell, J. Eldridge, P. Robertson, T. Tarman, E. L. Witzke
{"title":"Secure computing using cryptographic assurance of execution correctness","authors":"L. Pierson, P. Campbell, J. Eldridge, P. Robertson, T. Tarman, E. L. Witzke","doi":"10.1109/CCST.2004.1405399","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405399","url":null,"abstract":"Current computing architectures are \"inherently insecure\" because they are designed to execute ANY arbitrary sequence of instructions. As a result they are subject to subversion by malicious code. Our goal is to produce a cryptographic method of \"tamper-proofing\" trusted code over a large portion of the software life cycle. We have developed a technique called \"faithful execution\", to cryptographically protect instruction sequences from subversion. This paper presents an overview of, and the lessons learned from, our implementations of faithful execution in a Java virtual machine prototype and also in a configurable soft-core processor implemented in a field programmable gate array (FPGA).","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114630412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D facial recognition: a quantitative analysis","authors":"T. Russ, M. W. Koch, C. Little","doi":"10.1109/CCST.2004.1405415","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405415","url":null,"abstract":"Two-dimensional facial recognition has, traditionally, been an attractive biometric, however, the accuracy of 2D facial recognition (FR) is performance limited and insufficient when confronted with extensive numbers of people to screen and identify, and the numerous appearances that a 2D face can exhibit. In efforts to overcome many of the issues limiting 2D FR technology, researchers are beginning to focus their attention on 3D FR technology. In this paper, an analysis of a 3D FR system being developed at Sandia National Laboratories is performed. The study involves the use of 200 subjects on which verification (one-to-one) matches are performed using a single probe database (one correct match per subject) and 30 subjects on which identification matches are performed. The system is evaluated in terms of probability of detection (Pd) and probability of false accepts (FAR). The results presented will aid in providing an initial understanding of the performance of 3D FR.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seeing beyond the perimeter: the Advanced Exterior Sensor (AES)","authors":"R. Ashby, D. Pritchard","doi":"10.1109/CCST.2004.1405389","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405389","url":null,"abstract":"The system design of the Advanced Exterior Sensor (AES), test data and Sandia National Laboratories' current work on the AES is described. The AES integrates three sensor technologies (thermal infrared waveband, visible waveband, and microwave radar) in a Remote Sensor Module communicating with three motion detection target trackers and a sensor fusion software module in the Data Processor Module to achieve higher performance than single technology devices. Wide areas are covered by continuously scanning the three sensors 360 degrees in about one second. The images from the infrared and visible detector sets and the radar range data are updated as the sensors rotate each second. The radar provides range data with approximately one-meter resolution. Panoramic imagery is generated for immediate visual assessment of alarms using the Display Control Module. There is great potential for site security enhancement using the AES, which was designed for low-cost, easy use and rapid deployment to cover wide areas beyond typical perimeters, possibly in place of typical perimeter sensors, and for tactical applications around fixed or temporary high-value assets. Commercial-off-the-shelf (COTS) systems have neither the three sensor technologies nor the imaging sensor resolution. Cost and performance will be discussed for different scenarios.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"173 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116637511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}