{"title":"Towards a High Assurance Multi-level Secure PC for Intelligence Communities","authors":"D. Kleidermacher","doi":"10.1109/THS.2008.4534523","DOIUrl":"https://doi.org/10.1109/THS.2008.4534523","url":null,"abstract":"Intelligence communities have long struggled with the burden of maintaining separate computers and networks to manage information at varying sensitivity levels. Commercial grade operating systems and virtualization solutions such as Windows, Linux, and VMware are unsuitable for security assurance to the high levels required for this kind of information sharing on a single PC platform. Custom solutions have failed to gain acceptance as cost containment pressures favor commercial, off-the-shelf (COTS) platforms. In addition, common PC hardware has had serious security limitations that prevent even a high assurance software solution from achieving the required domain separation. The hope for a truly high assurance, multi-level secure PC is coming closer to reality by virtue of recent innovations, both in software and hardware. We propose an operating environment architecture that combines the utility of virtualization with the robustness of a high assurance realtime kernel that can host trusted applications.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133020338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges to event formalization for information extraction","authors":"A. Badia","doi":"10.1109/THS.2008.4635236","DOIUrl":"https://doi.org/10.1109/THS.2008.4635236","url":null,"abstract":"Information Extraction (IE) is a vital technology for dealing with large volume of documents. IE extracts entities, links (relationships) and events of interest from text. Whi le much progress has occurred in recent years in Entity and Link Extraction, Event Extraction remains one of the weakest poi nts of IE. We hypothesize that one of the reasons is the fact that there is little understanding of, and agreement about, whatconstitutes an event. Moreover, in Intelligence and Counterte rrorism environments it is extremely difficult to describe all situations of interest, making monitoring for such situations quite chalenging. We propose a formal definition of event, developed within the framework of Situation Theory, a theory of information flow developed in logic and linguistics. Besides giving a solid y et intuitive foundation, the definition can be put to practical use. We develop a classification of event types on top of our definitio n to let a user (Intelligence Analyst or other) specify events of interest, and sketch an interpreter that can use Information Extraction tools to monitor a collection of documents in order to detect whether the specified events are taking place.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131657651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crime Information Extraction from Police and Witness Narrative Reports","authors":"C. H. Ku, A. Iriberri, G. Leroy","doi":"10.1109/THS.2008.4534448","DOIUrl":"https://doi.org/10.1109/THS.2008.4534448","url":null,"abstract":"To solve crimes, investigators often rely on interviews with witnesses, victims, or criminals themselves. The interviews are transcribed and the pertinent data is contained in narrative form. To solve one crime, investigators may need to interview multiple people and then analyze the narrative reports. There are several difficulties with this process: interviewing people is time consuming, the interviews - sometimes conducted by multiple officers - need to be combined, and the resulting information may still be incomplete. For example, victims or witnesses are often too scared or embarrassed to report or prefer to remain anonymous. We are developing an online reporting system that combines natural language processing with insights from the cognitive interview approach to obtain more information from witnesses and victims. We report here on information extraction from police and witness narratives. We achieved high precision, 94% and 96% and recall, 85% and 90%, for both narrative types.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"21 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113973335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modeling Framework for Evaluating Effectiveness of Smart-Infrastructure Crises Management Systems","authors":"T. Mukherjee, S.K.S. Gupta","doi":"10.1109/THS.2008.4534512","DOIUrl":"https://doi.org/10.1109/THS.2008.4534512","url":null,"abstract":"Crises management for smart-infrastructure - infused with sensors, actuators, and intelligent agent technologies for monitoring, access control, and crisis response - requires objective and quantitative evaluation to learn for future. The concept of criticality - characterizing the effect of crises on the inhabitants of smart-infrastructure - is used in this regard. This paper establishes a criticality response modeling (CRM) framework to perform quantitative evaluation of criticality response. The framework can further be incorporated in any criticality-aware middleware for smart-infrastructure. An established stochastic model for criticality response is used from our previous work. The effectiveness of criticality response is measured in terms of the Manageability metric, characterized by the Q-value or qualifiedness of the response actions. The CRM is applied to fire emergencies in an envisioned smart oil & gas production platforms (OGPP). A simulation based evaluation, using CRM over OGPP, show that high manageability is achieved with - i) fast criticality detection, ii) fast response actuation, and iii) non-obliviousness to any subsequent criticality during response actuation - verifying the applicability of Q-value as the manageability metric.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121771258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A PlugN'Play Platform Independent Solution That Eliminates Unauthorized Access Without the Use of Passwords or Encryption Keys","authors":"S. Tuzzo","doi":"10.1109/THS.2008.4534427","DOIUrl":"https://doi.org/10.1109/THS.2008.4534427","url":null,"abstract":"This paper describes breakthrough cyber security technology developed by 4thDTtrade security that addresses today's critical need for legacy system security, particularly SCADA networks, that rely on network communication systems. This technology transcends current security methods and guarantees absolute security for network communications and data storage. The 4thDTtrade security solution allows the Internet to function as intended - an efficient point-to-point transport medium. This hardware/firmware solution performs quantum cryptographic payload scrambling, allows OS platform independence, ease of integration, low cost of ownership, and eliminates the need for enterprise key management. This makes 4thDTtrade security an ideal solution to address the SCADA, legacy system, and network database security issues that are a critical need today. Research prototypes of 4thDTtrade security hardware are being evaluated now.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Efficient Target Monitoring in Wireless Sensor Networks","authors":"D. Jain, V. Vokkarane","doi":"10.1109/THS.2008.4534463","DOIUrl":"https://doi.org/10.1109/THS.2008.4534463","url":null,"abstract":"One of the fundamental purpose of sensing information is to immediately respond to any anomalies. Wireless sensor network (WSN) is a network of inexpensive, low-power nodes with embedded processors, radios, sensors, and actuators, often integrated on a single chip, to communicate with the physical world in applications, such as security and surveillance, smart classroom, monitoring of natural habitats, and medical monitoring. WSNs differ considerably from current networked and embedded systems and due to its extreme energy constraints its design requires a proper understanding of the interplay between network protocols, energy-aware design, signal-processing algorithms, and distributed programming. Though the small form-factor of sensor nodes makes them attractable for use in monitoring applications, at the same time their small size affects resources such as the energy, computational power, and storage. Therefore, improvising on the energy constraints of wireless sensor networks is crucial. We propose two base-station relocation policies that aim to minimize the energy consumed for transmitting the data to base station. Both the policies involve a mobile base station, and focus on moving the base station closer to the active sensors that detect the target. Our first policy involves having a mobile base station and relocating it to the geometric centroid of all the sensors detecting the target. This approach significantly reduces the energy overhead required for transmitting data from the sensors to the base station. Our second policy for performing network lifetime optimization is to move the base station to geometric centroid of the base station locations obtained over several time periods. However, in each case, moving the base station at each time period involves a considerable overhead and therefore we observe the effects of moving the base station after a specific number of time periods as opposed to moving after every time period. We evaluate the network lifetime performance of these two proposed policies over different network scenarios.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Architecture for Threat Detection Systems","authors":"M. Schiefelbein","doi":"10.1109/THS.2008.4534519","DOIUrl":"https://doi.org/10.1109/THS.2008.4534519","url":null,"abstract":"An information-centric approach is necessary to design systems for threat detection, facility protection, and decision support. The Hanscom-Lincoln testbed architecture was developed with the understanding that information, both sensor data and contextual information, is the currency of all system components. The information architecture is agnostic with regard to sensing modalities and flexible with regard to data dissemination requirements. In addition, the architecture supports both fixed-site CONOPS (e.g. airport, subway, offices) and rapid-deployment CONOPS (e.g. convention, concert). Various proactive and reactive measures can be tested as well.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133246634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Hybrid Static/Run-time Secure Memory Access Protection","authors":"Nannan He, Xueqi Cheng, M. Hsiao","doi":"10.1109/THS.2008.4534522","DOIUrl":"https://doi.org/10.1109/THS.2008.4534522","url":null,"abstract":"Secure memory access protection plays a critical role in making software systems resilient to malicious security attacks. Run-time checking is one of the major strategies that provides safe memory accesses. However, in many security-critical applications, the performance overhead due to the extra computation at runtime is often unacceptable. In order to reduce this cost, we propose a new strategy that minimizes the number of runtime checks by efficiently integrating the results from static software verification. Our strategy applies a verification approach called SAT-based software bounded model checking (BMC) to detect memory access violations as well as to prove the absence of such violations within a given bound statically, followed by a runtime checking to synergistically and completely secure the memory accesses. Our method makes use of static verification in a fine-grained manner, in which redundant runtime checks can be avoided for those safe accesses. Furthermore, with BMC, our strategy can provide the error traces useful for debugging if the instance is proved unsafe.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery","authors":"S. M. Elshoura, D. Megherbi","doi":"10.1109/THS.2008.4534524","DOIUrl":"https://doi.org/10.1109/THS.2008.4534524","url":null,"abstract":"The main contribution of this paper is to present an empirical comparative study of Tchebichef and Zernike moments in image watermarking applications. In particular, we consider the case of moment-based watermarking schemes involving watermarks or their moments being hidden in the original image moments. Here, comparisons are in terms of higher image tampering sensitivity and better watermark extraction accuracy. We show that watermarks hidden in the low order Tchebichef moments of a given original image can be extracted and reconstructed with higher accuracy than in the case where they are rather hidden in the low order Zernike moments of the given image. We also show that the Tchebichef moments of a given image are more sensitive to intended or malicious image manipulations than its Zernike moments, and hence are more capable of detecting tampering performed on watermarked images during their transmission.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rekha S. Pai, David R. Mott, J. Stepnowski, R. Mcgill, Bernadette A. Higgins, D. Simonson
{"title":"Microfabricated Gas Chromatograph for Trace Analysis","authors":"Rekha S. Pai, David R. Mott, J. Stepnowski, R. Mcgill, Bernadette A. Higgins, D. Simonson","doi":"10.1109/THS.2008.4534440","DOIUrl":"https://doi.org/10.1109/THS.2008.4534440","url":null,"abstract":"Microfabricated portable gas analyzers with high sensitivity and selectivity offer utility in a variety of critical applications including aviation security, food safety and toxic industrial waste monitoring. An integral component of such analyzers is the gas chromatographic (GC) column which is used for separations of an injected mixture based on the relative sorption of the various analytes in the carrier gas by the stationary phase. In this interim report, we describe our efforts in the design and development of a microfabricated GC column for the trace detection of hazardous chemicals. Specifically, in this work an optimized serpentine layout with a circular cross- sectional profile has been microfabricated. In this work, computational fluid dynamic (CFD) modeling has been employed as a method to aid in the GC column design optimization. Selectivity to hazardous hydrogen bond basic (HBB) analytes (e.g. TNT, GB, VX) was achieved by using an NRL developed hydrogen bond acid (HBA) sorbent polymer HCSFA2 as the stationary phase. HCSFA2 offers a higher partition coefficient than the more commonly used polysiloxanes.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124911330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}