Search For:

Displaying 1-14 out of 14 total
IT Frameworks
Found in: IT Professional
By Tom Costello,Mark A. Langley,Kirk Botula,Eileen Forrester,Martin Curley,Jim Kenneally,Martin Delaney,Stephen McLaughlin
Issue Date:September 2013
pp. 64
This article is a collection of papers collected from the nonprofits that run three critical frameworks in use by IT organizations around the globe–the Project Management Institute, Capability Maturity Model Integration, and the Innovation V...
 
IT Frameworks
Found in: IT Professional
By Tom Costello,Mark A. Langley,Kirk Botula,Eileen Forrester,Martin Curley,Jim Kenneally,Martin Delaney,Stephen McLaughlin
Issue Date:September 2013
pp. 64
This article is a collection of papers collected from the nonprofits that run three critical frameworks in use by IT organizations around the globe–the Project Management Institute, Capability Maturity Model Integration, and the Innovation V...
 
Securing Control Systems from the Inside: A Case for Mediating Physical Behaviors
Found in: IEEE Security & Privacy
By Stephen McLaughlin
Issue Date:July 2013
pp. 82-84
Attackers can leverage security vulnerabilities in computerized control systems to cause real, physical harm. Despite efforts to fix control system security flaws, the advantage remains with attackers due to the increasing complexity and connectivity of mo...
 
Traffic-aware Routing for Wireless Sensor Networks in Built Environment
Found in: Computer Modeling and Simulation, UKSIM European Symposium on
By Nanjun Li,Stephen McLaughlin,David Laurenson
Issue Date:November 2010
pp. 397-401
Traffic aggregation in large-scale and multi-hopping wireless sensor networks (WSN) can generate a high load on some intermediate nodes that are close to the access point (sink) due to packet relaying, especially in complex in-door environment. This can re...
 
Disk-enabled authenticated encryption
Found in: Mass Storage Systems and Technologies, IEEE / NASA Goddard Conference on
By Kevin Butler, Stephen McLaughlin, Patrick McDaniel
Issue Date:May 2010
pp. 1-6
Storage is increasingly becoming a vector for data compromise. Solutions for protecting on-disk data confidentiality and integrity to date have been limited in their effectiveness. Providing authenticated encryption, or simultaneous encryption with integri...
 
Semantically Rich Application-Centric Security in Android
Found in: Computer Security Applications Conference, Annual
By Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel
Issue Date:December 2009
pp. 340-349
Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is l...
 
Security and Privacy Challenges in the Smart Grid
Found in: IEEE Security and Privacy
By Patrick McDaniel, Stephen McLaughlin
Issue Date:May 2009
pp. 75-77
The electrical grid is undergoing one of the largest transitions in its long history—the move to smart grid technology. This new grid lets customers and providers more efficiently manage and generate power. As with many new technologies, the smart grid als...
 
Enhanced Empirical Mode Decomposition using a Novel Sifting-Based Interpolation Points Detection
Found in: Statistical Signal Processing, IEEE/SP Workshop on
By Yannis Kopsinis, Stephen McLaughlin
Issue Date:August 2007
pp. 725-729
Empirical mode decomposition (EMD) is a signal analysis method which has received much attention lately due its performance in a number of applications. The main disadvantage ntage of EMD is that it is lacking a theoretical foundation and therefore, our un...
 
CPS: stateful policy enforcement for control system device usage
Found in: Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC '13)
By Stephen McLaughlin
Issue Date:December 2013
pp. 109-118
Networked control systems used in energy, manufacturing, and transportation combine large, vulnerable attack surfaces with far overprovisioned privileges. Often, compromising a single computer or user account is sufficient to give an attacker free reign ov...
     
Hi-Fi: collecting high-fidelity whole-system provenance
Found in: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12)
By Devin J. Pohly, Kevin Butler, Patrick McDaniel, Stephen McLaughlin
Issue Date:December 2012
pp. 259-268
Data provenance---a record of the origin and evolution of data in a system---is a useful tool for forensic analysis. However, existing provenance collection mechanisms fail to achieve sufficient breadth or fidelity to provide a holistic view of a system's ...
     
SABOT: specification-based payload generation for programmable logic controllers
Found in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12)
By Patrick McDaniel, Stephen McLaughlin
Issue Date:October 2012
pp. 439-449
Programmable Logic Controllers (PLCs) drive the behavior of industrial control systems according to uploaded programs. It is now known that PLCs are vulnerable to the uploading of malicious code that can have severe physical consequences. What is not under...
     
Minimizing private data disclosures in the smart grid
Found in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12)
By Ninghui Li, Patrick McDaniel, Stephen McLaughlin, Wahbeh Qardaji, Weining Yang, Yuan Qi
Issue Date:October 2012
pp. 415-427
Smart electric meters pose a substantial threat to the privacy of individuals in their own homes. Combined with non-intrusive load monitors, smart meter data can reveal precise home appliance usage information. An emerging solution to behavior leakage in s...
     
Multi-vendor penetration testing in the advanced metering infrastructure
Found in: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC '10)
By Adam Delozier, Dmitry Podkuiko, Patrick McDaniel, Sergei Miadzvezhanka, Stephen McLaughlin
Issue Date:December 2010
pp. 107-116
The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments are outpacing security efforts: new...
     
Rootkit-resistant disks
Found in: Proceedings of the 15th ACM conference on Computer and communications security (CCS '08)
By Kevin R.B. Butler, Patrick D. McDaniel, Stephen McLaughlin
Issue Date:October 2008
pp. 79-79
Rootkits are now prevalent in the wild. Users affected by rootkits are subject to the abuse of their data and resources, often unknowingly. Suchmalware becomes even more dangerous when it is persistent-infected disk images allow the malware to exist across...
     
 1