Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances Dec 2023

Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances

AFIT Patents

A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …


Rotating Scatter Mask For Directional Radiation Detection And Imaging, Darren Holland, Robert Olesen, Larry Burggraf, Buckley O'Day, James E. Bevins Jun 2021

Rotating Scatter Mask For Directional Radiation Detection And Imaging, Darren Holland, Robert Olesen, Larry Burggraf, Buckley O'Day, James E. Bevins

AFIT Patents

A radiation imaging system images a distributed source of radiation from an unknown direction by rotating a scatter mask around a central axis. The scatter mask has a pixelated outer surface of tangentially oriented, flat geometric surfaces that are spherically varying in radial dimension that corresponds to a discrete amount of attenuation. Rotation position of the scatter mask is tracked as a function of time. Radiation counts from gamma and/or neutron radiation are received from at least one radiation detector that is positioned at or near the central axis. A rotation-angle dependent detector response curve (DRC) is generated based on …


Wireless Intrusion Detection And Device Fingerprinting Through Preamble Manipulation, Benjamin W. Ramsey, Barry E. Mullins Oct 2018

Wireless Intrusion Detection And Device Fingerprinting Through Preamble Manipulation, Benjamin W. Ramsey, Barry E. Mullins

AFIT Patents

A method of establishing a hardware identity of a coordinating device in a wireless network is provided. A standard PHY preamble is modified to a preamble that can be received by the coordinating device having an expected hardware configuration. The modified PHY preamble is transmitted with an association request by a joining device. In response to not receiving a reply containing an association response from the coordinating device by the joining device, determining the hardware configuration of the coordinating device is not the expected hardware configuration. A further method of characterizing a hardware identity of a device in a wireless …


Transferable Multiparty Computation, Michael R. Clark, Kenneth M. Hopkinson Nov 2017

Transferable Multiparty Computation, Michael R. Clark, Kenneth M. Hopkinson

AFIT Patents

A method and apparatus are provided for secure multiparty computation. A set of first parties is selected from a plurality of first parties for computation. Inputs for computation associated with each party in the set of first parties are divided into shares to be sent to other parties in the set of first parties. The computation on the shares is performed by the set of first parties using multiparty computation functions. In response to a trigger event, shares of the set of first parties are transferred to a set of second parties selected from a plurality of second parties. The …


Method For Determining Time-Resolved Heat Transfer Coefficient And Adiabatic Effectiveness Waveforms With Unsteady Film Cooling, James L. Rutledge, Jonathan F. Mccall Apr 2016

Method For Determining Time-Resolved Heat Transfer Coefficient And Adiabatic Effectiveness Waveforms With Unsteady Film Cooling, James L. Rutledge, Jonathan F. Mccall

AFIT Patents

A new method for determining heat transfer coefficient (h) and adiabatic effectiveness (η) waveforms h(t) and η(t) from a single test uses a novel inverse heat transfer methodology to use surface temperature histories obtained using prior art approaches to approximate the h(t) and η(t) waveforms. The method best curve fits the data to a pair of truncated Fourier series.


Malware Target Recognition, Thomas E. Dube, Richard A. Raines, Steven K. Rogers Jun 2014

Malware Target Recognition, Thomas E. Dube, Richard A. Raines, Steven K. Rogers

AFIT Patents

A method, apparatus and program product are provided to recognize malware in a computing environment having at least one computer. A sample is received. An automatic determination is made by the at least one computer to determine if the sample is malware using static analysis methods. If the static analysis methods determine the sample is malware, dynamic analysis methods are used by the at least one computer to automatically determine if the sample is malware. If the dynamic analysis methods determine the sample is malware, the sample is presented to a malware analyst to adjudicate the automatic determinations of the …


Using Software-Based Decision Procedures To Control Instruction-Level Execution, William B. Kimball Dec 2013

Using Software-Based Decision Procedures To Control Instruction-Level Execution, William B. Kimball

AFIT Patents

An apparatus, method and program product are provided for securing a computer system. A digital signature of an application is checked, which is loaded into a memory of the computer system configured to contain memory pages. In response to finding a valid digital signature, memory pages containing instructions of the application are set as executable and memory pages other than those containing instructions of the application are set as non-executable. Instructions in executable memory pages are executed. Instructions in non-executable memory pages are prevented from being executed. A page fault is generated in response to an attempt to execute an …


Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith Dec 2013

Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith

AFIT Patents

A method of managing patient care and emergency response following a Chemical, Biological, Radiological, or Nuclear Explosive (CBRNE) attack and maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA). The method including identifying each patient with a unique patient identifier, the identifier based upon the geospatial location of the patient, the geospatial location including at least the latitude and longitude of the patient when first treated, the unique patient identifier being part of patient data. Providing a collection point of patient data to form a patient data database where in the patient location data may be used to …


Emulation-Based Software Protection, William B. Kimball, Rusty O. Baldwin Oct 2012

Emulation-Based Software Protection, William B. Kimball, Rusty O. Baldwin

AFIT Patents

A method of emulation-based page granularity code signing comprising the steps of: copying guest operating system instructions and associated hash message authentication codes and/or digital signatures of each guest operating instruction from an untrusted guest operating system memory into a trusted host operating system memory; recomputing the hash message authentication codes using a secret key in the trusted host operating system memory; maintaining the secret key in the trusted host operating system memory and inaccessible by the untrusted guest operating system instructions; translating each guest operating system instruction that has a valid hash message authentication code to a set of …