51 |
Emerging Security Threats in Modern Digital Computing Systems: A Power Management PerspectiveShridevi, Rajesh Jayashankara 01 May 2019 (has links)
Design of computing systems — from pocket-sized smart phones to massive cloud based data-centers — have one common daunting challenge : minimizing the power consumption. In this effort, power management sector is undergoing a rapid and profound transformation to promote clean and energy proportional computing. At the hardware end of system design, there is proliferation of specialized, feature rich and complex power management hardware components. Similarly, in the software design layer complex power management suites are growing rapidly. Concurrent to this development, there has been an upsurge in the integration of third-party components to counter the pressures of shorter time-to-market. These trends collectively raise serious concerns about trust and security of power management solutions.
In recent times, problems such as overheating, performance degradation and poor battery life, have dogged the mobile devices market, including the infamous recall of Samsung Note 7. Power outage in the data-center of a major airline left innumerable passengers stranded, with thousands of canceled flights costing over 100 million dollars. This research examines whether such events of unintentional reliability failure, can be replicated using targeted attacks by exploiting the security loopholes in the complex power management infrastructure of a computing system.
At its core, this research answers an imminent research question: How can system designers ensure secure and reliable operation of third-party power management units? Specifically, this work investigates possible attack vectors, and novel non-invasive detection and defense mechanisms to safeguard system against malicious power attacks. By a joint exploration of the threat model and techniques to seamlessly detect and protect against power attacks, this project can have a lasting impact, by enabling the design of secure and cost-effective next generation hardware platforms.
|
52 |
Reversing Malware : A detection intelligence with in-depth security analysisTheerthagiri, Dinesh January 2009 (has links)
<p>More money nowadays moves online and it is very understandable that criminals want to make more money online aswell, because these days’ banks don’t have large sums of money in their cash box. Since there are many other internalrisks involved in robbing a bank, criminals have found many other ways to commit crimes and much lower risMore money nowadays moves online and it is very understandable that criminals want to make more money online as well, because these days’ banks don’t have large sums of money in their cash box. Since there are many other internal risks involved in robbing a bank, criminals have found many other ways to commit crimes and much lower risk in online crime. The first level of change involved was email-based phishing, but later circumstances changed again.</p><p>Authentication methods and security of online bank has been improved over the period. This will drastically reduce effects of phishing based on emails and fraudulent website. The next level of online bank fraud is called banking Trojans. These Trojans infect the online customers of banks. These Trojans monitors customer’s activities and uses their authenticated session to steal customers’ money.</p><p>A lot of money is made by these kinds of attacks. Comparatively few perpetrators have been caught, and the problem is getting worse day by day. To have a better understanding of this problem, I have selected a recent malware sample named as SilentBanker. It had the capability of attacking more than 400 banks. This thesis presents the problem in general and includes my results in studying the behaviour of the SilentBanker Trojan.</p>
|
53 |
A knowledge-based approach for monitoring and situation assessment at nuclear power plantsHeaberlin, Joan Oylear 21 July 1994 (has links)
An approach for developing a computer-based aid to
assist in monitoring and assessing nuclear power plant
status during situations requiring emergency response has
been developed. It is based on the representation of
regulatory requirements and plant-specific systems and
instrumentation in the form of hierarchical rules. Making
use of inferencing techniques from the field of artificial
intelligence, the rules are combined with dynamic state data
to determine appropriate emergency response actions.
In a joint project with Portland General Electric
Company, a prototype system, called EM-CLASS, was been
created to demonstrate the knowledge-based approach for use
at the Trojan Nuclear Power Plant. The knowledge domain
selected for implementation addresses the emergency
classification process chat is used to communicate the
severity of the emergency and the extent of response actions
required. EM-CLASS was developed using Personal Consultant
Plus (PCPlus), a knowledge-based system development shell
from Texas Instruments which runs on IBM-PC compatible
computers. The knowledge base in EM-CLASS contains over 200
rules.
The regulatory basis, as defined in 10 CFR 50, calls
for categorization of emergencies into four emergency action
level classes: (1) notification of unusual event, (2) alert,
(3) site area emergency, and (4) general emergency. Each
class is broadly defined by expected frequency and the
potential for release of radioactive materials to the
environment. In a functional sense, however, each class
must be ultimately defined by a complex combination of in-
plant conditions, plant instrumentation and sensors, and
radiation monitoring information from stations located both
on- and off-site. The complexity of this classification
process and the importance of accurate and timely
classification in emergency response make this particular
application amenable to an automated, knowledge-based
approach.
EM-CLASS has been tested with a simulation of a 1988
Trojan Nuclear Power Plant emergency exercise and was found
to produce accurate classification of the emergency using
manual entry of the data into the program. / Graduation date: 1997
|
54 |
Nonintrusive intelligent monitoring for nuclear power plant emergency classificationGreene, Kenneth R. (Kenneth Ray), 1958- 13 May 1991 (has links)
A prototype real-time process monitoring emergency
classification expert system, RT/EM-CLASS, has been developed
for use at the Trojan Nuclear Power Plant. This knowledge-based
system features the integration of electronically sensed plant
data with the menu selection data representation of its
predecessor, EM-CLASS. This prototype demonstrates the
techniques required to acquire plant process data from another
computer and use that data in an expert system to determine the
proper Emergency Action Level.
Several benefits are realized by the RT/EM-CLASS application.
These include:
The resources required to make a classification are
reduced thereby freeing the responsible person to devote
time to other important tasks.
The classification may be completed more often and with
better data than the current system allows.
The human user is less likely to make an erroneous
Emergency Action Level classification.
Prototype implementation required resolution of an efficiency
problem of relating plant process data to the expert system data
forms. This was achieved through the development of multi-conditional
rules that significantly reduce the size of the rule set.
The development of RT/EM-CLASS presents a methodology
for building knowledge based applications that perform nonintrusive
real-time monitoring of dynamic systems. This
methodology features
Use of existing analytical and Al tools where possible
Monitoring of a dynamic system
Non-intrusive acquisition of data from the system
This technology might be applied to portions of the nuclear
engineering design process (control rod programming in Boiling
Water Reactors, for example) to emulate the guidance and
activities of an expert. A substantial portion of the effort by the
expert engineer involves preparation of the code input, running the
computer code, analyzing the results, and based on the results,
deciding what case to submit next. A suitably designed expert
system could act in the place of the engineer in this dynamic
design process.
This methodology has been tested against the 1988 emergency
exercise at the Trojan Nuclear Power Plant. / Graduation date: 1992
|
55 |
A Proposed Taxonomy of Software Weapons / Ett förslag på taxonomi för programvaruvapenKarresand, Martin January 2002 (has links)
<p>The terms and classification schemes used in the computer security field today are not standardised. Thus the field is hard to take in, there is a risk of misunderstandings, and there is a risk that the scientific work is being hampered. </p><p>Therefore this report presents a proposal for a taxonomy of software based IT weapons. After an account of the theories governing the formation of a taxonomy, and a presentation of the requisites, seven taxonomies from different parts of the computer security field are evaluated. Then the proposed new taxonomy is introduced and the inclusion of each of the 15 categories is motivated and discussed in separate sections. Each section also contains a part briefly outlining the possible countermeasures to be used against weapons with that specific characteristic. </p><p>The final part of the report contains a discussion of the general defences against software weapons, together with a presentation of some open issues regarding the taxonomy. There is also a part discussing possible uses for the taxonomy. Finally the report is summarised.</p>
|
56 |
The overburdened Earth : landscape and geography in Homeric epicLovell, Christopher 26 October 2011 (has links)
This dissertation argues that Homer's Iliad depicts the Trojan landscape as participant in or even victim of the Trojan War. This representation alludes to extra-Homeric accounts of the origins of the Trojan War in which Zeus plans the war to relieve the earth of the burden of human overpopulation. In these myths, overpopulation is the result of struggle among the gods for divine kingship. Through this allusion, the Iliad places itself within a framework of theogonic myth, depicting the Trojan War as an essential step in separating the world of gods and the world of men, and making Zeus’ position as the father of gods and men stable and secure.
The Introduction covers the mythological background to which the Iliad alludes through an examination of extra-Homeric accounts of the Trojan War’s origins. Chapter One analyzes a pair of similes at Iliad 2.780-85 that compare the Akhaian army to Typhoeus, suggesting that the Trojan War is a conflict similar to Typhoeus’ attempt to usurp Zeus’ position as king of gods and men. Chapter Two demonstrates how Trojan characters are closely linked with the landscape in the poem’s first extended battle scene (4.422-6.35); the deaths of these men are a symbolic killing of the land they defend. Chapter Three discusses the aristeia of Diomedes in Book 5, where his confrontations with Aphrodite, Ares, and Apollo illustrate the heroic tendency to disrespect the status difference between gods and men. Athena’s authorization of Diomedes’ actions reveals the existence of strife among the Olympian gods, which threatens to destabilize the divine hierarchy. Chapter Four examines the Akhaian wall whose eventual destruction is recounted at the beginning of Book 12. The wall symbolizes human impiety and its destruction is a figurative fulfillment of Zeus’ plan to relieve the earth of the burden of unruly humanity. Finally, Chapter Five treats the flußkampf and Theomachy of Books 20 and 21, episodes adapting scenes of divine combat typically associated with the struggle for divine kingship. In the Iliad, these scenes show that Zeus’ power is unassailable. / text
|
57 |
A group approach to Jean-Paul Sartre's adaptation of Euripedes' The Trojan womenLewis, William, 1938- January 1974 (has links)
No description available.
|
58 |
PalamedesCantrell, Paul A. 27 April 2011 (has links)
This thesis offers a syncretic, synoptic account of Palamedes from the Trojan War. It delineates three interpretive modes: (1) that Palamedes was present all along; (2) that later poets inserted him into the Trojan narrative, either as an archetypal intellectual figure, or as Odysseus’s double; (3) that Palamedes was present only as Odysseus’s imaginary Doppelgänger. The thesis accounts for Palamedes’s scarce attention in classical texts by way of Lacanian and—via Otto Rank—Freudian psychoanalytic theory, as well as by Slavoj Žižek’s adoption of the “vanishing mediator.” After tracing a potential textual genealogy from Palamedes to Malory’s Palomydes, the thesis concludes with a reading of Palamedes’s implied presence in Inferno 26.
|
59 |
The treatment of Homeric characters by Quintus of Smyrna,Mansur, Melvin White, January 1940 (has links)
Thesis (Ph. D.)--Columbia University, 1940. / Vita. eContent provider-neutral record in process. Description based on print version record. "List of abbreviations and bibliography": p. [79]-81.
|
60 |
Dares and Dictys an introduction to the study of medieval versions of the story of Troy ...Griffin, Nathaniel Edward, January 1907 (has links)
Thesis (Ph. D.)--Johns Hopkins University, 1899. / Life.
|
Page generated in 0.1091 seconds