05.12.2012 Views

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

developmental effort. This paper illuminates the Department of Defense (DOD) acquisition process as it applies to MCS <strong>and</strong><br />

shows how the interests of DOD officials became arrayed against Army intentions to develop <strong>and</strong> field the MCS system.<br />

Allison’s ‘bureaucratic politics’ model will guide the analysis <strong>and</strong> illustrate some reasons for the fielding delay. The Maneuver<br />

Control System is a software application designed to automate the comm<strong>and</strong> <strong>and</strong> control information process for the force<br />

level comm<strong>and</strong>er <strong>and</strong> his staff both in a tactical environment <strong>and</strong> in garrison. The software is designed to run units on Army<br />

st<strong>and</strong>ard computer hardware, itself in a parallel development effort. MCS is envisioned to gather, correlate <strong>and</strong> focus battlefield<br />

information from the five functional areas indigenous to Army operations. These functional areas are; Maneuver, Fire Support,<br />

Air Defense, Intelligence, <strong>and</strong> Combat Service Support or logistics. Tactical communications links provide the connectivity<br />

between MCS computers allowing them to function in a network. be refined into a precise document describing the system<br />

requirements. This requirements document, after gaining departmental approval, must then be exp<strong>and</strong>ed into a technical<br />

specification, which, after solicitation, can be translated into a development contract. Once prototypes are produced, a detailed<br />

series of tests are conducted to determine if the capabilities delivered meet the system requirements.<br />

DTIC<br />

Comm<strong>and</strong> <strong>and</strong> Control; Communication Networks; Computer Programs<br />

20060002074 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />

A Development of Experimental Environments ‘SIOS’ <strong>and</strong> ‘VM Nebula’ for Reproducing Internet Security Incidents<br />

Miwa, Shinsuke; Ohno, Hirotuki; Journal of the National Institute of Information <strong>and</strong> Communications Technology. Special<br />

Issue on Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 23-34; In English; See also 20060002073;<br />

Copyright; Avail.: Other Sources<br />

Security incidents are growing significantly on a daily basis in the internet world causing considerable damage. To protect<br />

against these incidents, some protection mechanisms or softwares have come to be used. Each time a new attacking method<br />

or virus or worm appears, it must be analyzed in detail since such protection mechanism or software requires detailed<br />

information on that. However, these incidents are sophisticated because is scale is enlarged <strong>and</strong> supervened incidents cause<br />

many interactions, which make it difficult to acquire such in-depth information. To analyze sophisticated incidents, we<br />

developed experimental environments for reproducing internet security incidents. In this paper, we report on the development<br />

of our reproducing environments called ‘SIOS’ <strong>and</strong> ‘VM Nebula’<br />

Author<br />

Internets; Computer Security; Protection; Damage; Computer Viruses<br />

20060002077 National Inst. of Information <strong>and</strong> Communications Technology, Japan<br />

Design <strong>and</strong> Phase-1 Development of Secure Overlay Networks<br />

Kadobayashi, Youki; Nakao, Koji; Takizawa, Osamu; Journal of the National Institute of Information <strong>and</strong> Communications<br />

Technology. Special Issue on Information Security, Volume 52, No. 1/2; March/June 2005, pp. 13-21; In English; See also<br />

20060002073; Copyright; Avail.: Other Sources<br />

Recently, overlay networks are gaining attention as a means to eliminate single point of failure in the application layer.<br />

This paper focuses on secure routing in overlay networks. A threat model is presented, along with our countermeasure<br />

proposal. Our proposal consists of blind forwarding, distributed trust anchor, <strong>and</strong> probabilistic testing. Unlike previous<br />

contributions on this topic, our proposal is based on trust anchor. Furthermore, we attempt to reconstruct the threat model,<br />

based on the insights gained from previous contributions. We also briefly describe our phase-1 development efforts of a<br />

software framework that implements essential functions of secure overlay. Our software framework attempts to address<br />

application-specific threat models.<br />

Author<br />

Design Analysis; Computer Networks; Countermeasures; Applications Programs (Computers)<br />

20060002090 Mitsubishi Research Inst., Inc., Tokyo, Japan<br />

Buffer-Overflow Detection in C Program by Static Detection<br />

Nakamura, Goichi; Murase, Ichiro; Makino, Kyoko; Journal of the National Institute of Information <strong>and</strong> Communications<br />

Technology. Special Issue on Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 35-41; In English; See also<br />

20060002073; Copyright; Avail.: Other Sources<br />

Buffer-overflow is the most dangerous vulnerability implicit in C programs. whether a Buffer-oveflow emerges or not in<br />

the program runtime, is depend upon inputs of the C program. We developed algorithms <strong>and</strong> tools to detect buffer-overflows,<br />

not accidentally partial detection by monitoring program runtime situation, but exhaustively detection by static-analysis of C<br />

138

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!