01.12.2012 Views

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

20040073635 Engineering Research <strong>and</strong> Consulting, Inc., Edwards AFB, CA<br />

Monitoring Micro-Structural Evolution <strong>and</strong> Crack Formation in a Solid Propellant Under Incremental Strain<br />

Condition-Using Digital Radiograph X-Ray Techniques<br />

Liu, C. T.; Kylnn, Lee M.; Thompson, Jay D.; Mar. 2004; 11 pp.; In English<br />

Contract(s)/Grant(s): F-4611-99-C-0025; Proj-2302<br />

Report No.(s): AD-A422518; AFRL-PR-ED-VG-2004-049; No Copyright; Avail: CASI; A03, Hardcopy<br />

Monitor Micro-Structure Evolution, Damage process, <strong>and</strong> Crack Formation in a Solid Propellant.<br />

DTIC<br />

Crack Initiation; Cracks; Digital Cameras; Digital Techniques; Microstructure; Radiography; Solid Propellants; X Rays<br />

20040073662 Naval Comm<strong>and</strong>, Control <strong>and</strong> Ocean Surveillance Center, San Diego, CA<br />

Low-Cost Miniature Interface <strong>and</strong> Control Systems for Smart Sensors, Tactical Radios, <strong>and</strong> Computer Networks<br />

Martin, Brett; Bryan, Dale; Nov. 1995; 6 pp.; In English<br />

Report No.(s): AD-A422547; No Copyright; Avail: CASI; A02, Hardcopy<br />

Low-cost Commercial-Off-the-Shelf (COTS) hardware <strong>and</strong> software products can be used to build small control,<br />

processor <strong>and</strong> interface devices suitable for current <strong>and</strong> future tactical radio systems. For example, the input from video<br />

cameras, infrared imagers, acoustic transducers, proximity detectors, laser range finders, <strong>and</strong> other sensor input can be<br />

digitized, compressed, processed <strong>and</strong> transmitted via SINCGARS radios when a soldier presses a button. Tactical radios could<br />

also be connected to ethernet or telephone lines, <strong>and</strong> a radio could become a field-accessible email address, file server, or<br />

message bulletin board. These capabilities can be developed <strong>and</strong> fielded quickly for a very modest cost.<br />

DTIC<br />

Comm<strong>and</strong> <strong>and</strong> Control; Computer Networks; Intrusion; Low Cost; Miniaturization; Radio Equipment<br />

20040073692 Secure Software Solutions, Fairfax, VA<br />

Static Security Analysis for Open Source Software<br />

Viega, John; Apr. 2004; 15 pp.; In English; Original contains color illustrations<br />

Contract(s)/Grant(s): F30602-01-C-0161; Proj-CHAT<br />

Report No.(s): AD-A422592; AFRL-IF-RS-TR-2004-94; No Copyright; Avail: CASI; A03, Hardcopy<br />

The goal of the project, Static Security Analysis for Open Source Software&quot;, was to explore technologies to improve<br />

the security of software by helping to automate security analysis. The project successfully improved upon the best published<br />

analysis techniques <strong>and</strong> made several releases publicly available as open source software. The analysis techniques developed<br />

under this effort reduce both false positives <strong>and</strong> false negatives compared to previous techniques. Additionally, the tools<br />

developed are highly scalable <strong>and</strong> extensible. Some of these tools were adopted by other projects within the DARPA<br />

Composable High Assurance Trusted Software Program.<br />

DTIC<br />

Computer Information Security; Security; Systems Analysis<br />

20040073700 Honeywell ASC Labs., Minneapolis, MN<br />

Skeptical Systems<br />

Geib, Christopher W.; Mar. 2004; 29 pp.; In English; Original contains color illustrations<br />

Contract(s)/Grant(s): F30602-02-C-0116; Proj-N124<br />

Report No.(s): AD-A422601; AFRL-IF-RS-TR-2004-91; No Copyright; Avail: CASI; A03, Hardcopy<br />

This report describes the technical components developed for hostile intent recognition, <strong>and</strong> documents specific<br />

experiments to evaluate a demonstration skeptical system in a cyber security domain. Current systems execute any comm<strong>and</strong><br />

issued by an authenticated user so long as they fall within the privileges granted. By contrast, a skeptical system entertains<br />

doubts about the tasks that it is asked to perform. It questions the authenticity, integrity, <strong>and</strong> intent of the requester <strong>and</strong> acts<br />

with due consideration of its doubts. The report is broken down into three major sections. The first section discusses the system<br />

architecture overview <strong>and</strong> the technologies behind the demonstration system. The next section discusses a number of<br />

demonstration scenarios <strong>and</strong> the system’s performance on them. The third section discusses scalability experiments done on<br />

the intent recognition algorithm (one of the central components of the system). The report closes with general conclusions<br />

about the system <strong>and</strong> makes some suggestions for areas for future work.<br />

DTIC<br />

Intrusion Detection (Computers)<br />

200

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!