Naval Postgraduate School

Displaying 1-15 of 15 results

  • White Papers // Sep 2013

    Towards A Cross-Domain MapReduce Framework

    The Apache Hadoop framework provides parallel processing and distributed data storage capabilities that data analytics applications can utilize to process massive sets of raw data. These big data applications typically run as a set of MapReduce jobs to take advantage of Hadoop's ease of service deployment and large-scale parallelism. Yet,...

    Provided By Naval Postgraduate School

  • White Papers // Sep 2012

    A 3D Data Transformation Processor

    Application-specific coprocessors, including those for cryptography and compression, can provide significant acceleration and power savings to programs requiring their services. While most coprocessors have traditionally been constructed as a separate chip connected to the main CPU over a relatively slow bus connection, 3D integration, providing a more direct connection, is...

    Provided By Naval Postgraduate School

  • White Papers // Jul 2012

    Stuxnet: What Has Changed?

    This paper considers the impact of Stuxnet on cyber-attacks and cyber-defense. It first reviews trends in cyber-weapons and how Stuxnet fits into these trends. Because Stuxnet targeted an industrial control system in order to wreak physical damage, the focus is on weapons that target systems of that type and produce...

    Provided By Naval Postgraduate School

  • White Papers // Apr 2012

    Evaluating Security Requirements in a General-Purpose Processor by Combining Assertion Checkers with Code Coverage

    The threat of subversions in processors has gained attention over the last few years, as noted in government reports, academic research and the media. The problem of malicious inclusions in hardware is an emerging threat, and detecting them is a difficult challenge. In this paper, the authors enhance an existing...

    Provided By Naval Postgraduate School

  • White Papers // Mar 2012

    Adaptive Node Capability to Assess the Characteristic Tempo in a Wireless Communication Network

    This paper develops a new expression for a network node capability value used to quantify the node's ability to maintain an optimal information flow in a mobile communication network. The capability value is adaptable and is a function of the bandwidth efficiency, the data rate, the energy-per-bit to noise spectral...

    Provided By Naval Postgraduate School

  • White Papers // May 2011

    A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud

    In this paper, the authors define the problem and scope of data sovereignty - the coupling of stored data authenticity and geographical location in the cloud. Establishing sovereignty is an especially important concern amid legal and policy constraints when data and resources are virtualized and widely distributed. They identify the...

    Provided By Naval Postgraduate School

  • White Papers // Apr 2011

    Security Checkers: Detecting Processor Malicious Inclusions at Runtime

    To counter the growing threat of malicious subversions to the design of a microprocessor, there is a great need for simple, automated methods for detecting such malevolent changes. Based on the adoption of the Property Specification Language (PSL) for behavioral verification, and the advent of tools for automatically generating synthesizable...

    Provided By Naval Postgraduate School

  • White Papers // Apr 2011

    A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors

    3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware community. Traditionally, crypto co-processors have been implemented as a separate die or by utilizing one or more cores in a chip multi-processor. These methods have their...

    Provided By Naval Postgraduate School

  • White Papers // Oct 2010

    A Cloud-Oriented Cross-Domain Security Architecture

    The Monterey Security Architecture addresses the need to share high-value data across multiple domains of different classification levels while enforcing information flow policies. The architecture allows users with different security authorizations to securely collaborate and exchange information using commodity computers and familiar commercial client software that generally lack the prerequisite...

    Provided By Naval Postgraduate School

  • White Papers // Oct 2010

    Security for Distributed SOA at the Tactical Edge

    Service-Oriented Architecture (SOA) presents new paradigms for security and information assurance. Security processes for legacy systems are not sufficient to secure a distributed SOA. Yet, many of the new services arriving at the tactical edge for Fleet testing are based on web services - meaning that SOA is somewhat inevitable....

    Provided By Naval Postgraduate School

  • White Papers // Oct 2010

    Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE

    CyberCIEGE is a sophisticated network security simulation packaged as a video game and used by educators around the world to enhance information assurance education and training at universities, community colleges, within the DoD, and in other government agencies. The CyberCIEGE game engine was recently expanded to include Public Key Infrastructure...

    Provided By Naval Postgraduate School

  • White Papers // May 2010

    UML-Based Specification, Validation, and Log-File Based Verification of the Orion Pad Abort Software

    This paper described the first end to end application of a novel light weight formal specification, validation, and verification technique. The technique is novel is two aspects. First, it uses an intuitive, familiar, and diagrammatic notation for formal specification, a notation that being Turing equivalent and supports the capture of...

    Provided By Naval Postgraduate School

  • White Papers // Apr 2010

    Integrating Cellular Handset Capabilities With Military Wireless Communications

    Traditionally, for tactical Command & Control (C2), the Marine Corps utilized strictly voice communications as a result of continued reliability, modern innovative technology vulnerabilities, and the lack of ubiquitous data connectivity. Recently, driven by the technology advances there has been a shift in the paradigm toward more utilization of data...

    Provided By Naval Postgraduate School

  • White Papers // Jun 2009

    Performance Limits of Fair-Access in Underwater Sensor Networks

    This paper investigates fundamental performance limits of Medium Access Control (MAC) protocols for particular underwater multi-hop sensor networks under a fair-access criterion requiring that sensors have an equal rate of underwater frame delivery to a base station. Tight upper bounds on network utilization and tight lower bounds on minimum time...

    Provided By Naval Postgraduate School

  • White Papers // Nov 2007

    Analysis of Three Multilevel Security Architectures

    Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectural types - one based on a security kernel, another based on a traditional separation kernel, and a third based on a least-privilege separation kernel. The...

    Provided By Naval Postgraduate School

  • White Papers // May 2010

    UML-Based Specification, Validation, and Log-File Based Verification of the Orion Pad Abort Software

    This paper described the first end to end application of a novel light weight formal specification, validation, and verification technique. The technique is novel is two aspects. First, it uses an intuitive, familiar, and diagrammatic notation for formal specification, a notation that being Turing equivalent and supports the capture of...

    Provided By Naval Postgraduate School

  • White Papers // Oct 2010

    A Cloud-Oriented Cross-Domain Security Architecture

    The Monterey Security Architecture addresses the need to share high-value data across multiple domains of different classification levels while enforcing information flow policies. The architecture allows users with different security authorizations to securely collaborate and exchange information using commodity computers and familiar commercial client software that generally lack the prerequisite...

    Provided By Naval Postgraduate School

  • White Papers // Apr 2010

    Integrating Cellular Handset Capabilities With Military Wireless Communications

    Traditionally, for tactical Command & Control (C2), the Marine Corps utilized strictly voice communications as a result of continued reliability, modern innovative technology vulnerabilities, and the lack of ubiquitous data connectivity. Recently, driven by the technology advances there has been a shift in the paradigm toward more utilization of data...

    Provided By Naval Postgraduate School

  • White Papers // Jun 2009

    Performance Limits of Fair-Access in Underwater Sensor Networks

    This paper investigates fundamental performance limits of Medium Access Control (MAC) protocols for particular underwater multi-hop sensor networks under a fair-access criterion requiring that sensors have an equal rate of underwater frame delivery to a base station. Tight upper bounds on network utilization and tight lower bounds on minimum time...

    Provided By Naval Postgraduate School

  • White Papers // May 2011

    A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud

    In this paper, the authors define the problem and scope of data sovereignty - the coupling of stored data authenticity and geographical location in the cloud. Establishing sovereignty is an especially important concern amid legal and policy constraints when data and resources are virtualized and widely distributed. They identify the...

    Provided By Naval Postgraduate School

  • White Papers // Oct 2010

    Security for Distributed SOA at the Tactical Edge

    Service-Oriented Architecture (SOA) presents new paradigms for security and information assurance. Security processes for legacy systems are not sufficient to secure a distributed SOA. Yet, many of the new services arriving at the tactical edge for Fleet testing are based on web services - meaning that SOA is somewhat inevitable....

    Provided By Naval Postgraduate School

  • White Papers // Oct 2010

    Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE

    CyberCIEGE is a sophisticated network security simulation packaged as a video game and used by educators around the world to enhance information assurance education and training at universities, community colleges, within the DoD, and in other government agencies. The CyberCIEGE game engine was recently expanded to include Public Key Infrastructure...

    Provided By Naval Postgraduate School

  • White Papers // Mar 2012

    Adaptive Node Capability to Assess the Characteristic Tempo in a Wireless Communication Network

    This paper develops a new expression for a network node capability value used to quantify the node's ability to maintain an optimal information flow in a mobile communication network. The capability value is adaptable and is a function of the bandwidth efficiency, the data rate, the energy-per-bit to noise spectral...

    Provided By Naval Postgraduate School

  • White Papers // Apr 2011

    A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors

    3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware community. Traditionally, crypto co-processors have been implemented as a separate die or by utilizing one or more cores in a chip multi-processor. These methods have their...

    Provided By Naval Postgraduate School

  • White Papers // Apr 2011

    Security Checkers: Detecting Processor Malicious Inclusions at Runtime

    To counter the growing threat of malicious subversions to the design of a microprocessor, there is a great need for simple, automated methods for detecting such malevolent changes. Based on the adoption of the Property Specification Language (PSL) for behavioral verification, and the advent of tools for automatically generating synthesizable...

    Provided By Naval Postgraduate School

  • White Papers // Apr 2012

    Evaluating Security Requirements in a General-Purpose Processor by Combining Assertion Checkers with Code Coverage

    The threat of subversions in processors has gained attention over the last few years, as noted in government reports, academic research and the media. The problem of malicious inclusions in hardware is an emerging threat, and detecting them is a difficult challenge. In this paper, the authors enhance an existing...

    Provided By Naval Postgraduate School

  • White Papers // Sep 2012

    A 3D Data Transformation Processor

    Application-specific coprocessors, including those for cryptography and compression, can provide significant acceleration and power savings to programs requiring their services. While most coprocessors have traditionally been constructed as a separate chip connected to the main CPU over a relatively slow bus connection, 3D integration, providing a more direct connection, is...

    Provided By Naval Postgraduate School

  • White Papers // Sep 2013

    Towards A Cross-Domain MapReduce Framework

    The Apache Hadoop framework provides parallel processing and distributed data storage capabilities that data analytics applications can utilize to process massive sets of raw data. These big data applications typically run as a set of MapReduce jobs to take advantage of Hadoop's ease of service deployment and large-scale parallelism. Yet,...

    Provided By Naval Postgraduate School

  • White Papers // Jul 2012

    Stuxnet: What Has Changed?

    This paper considers the impact of Stuxnet on cyber-attacks and cyber-defense. It first reviews trends in cyber-weapons and how Stuxnet fits into these trends. Because Stuxnet targeted an industrial control system in order to wreak physical damage, the focus is on weapons that target systems of that type and produce...

    Provided By Naval Postgraduate School

  • White Papers // Nov 2007

    Analysis of Three Multilevel Security Architectures

    Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectural types - one based on a security kernel, another based on a traditional separation kernel, and a third based on a least-privilege separation kernel. The...

    Provided By Naval Postgraduate School