APPENDICES a Participants

Total Page:16

File Type:pdf, Size:1020Kb

APPENDICES a Participants APPENDICES A Participants Mack Alford Bernard Carre Ascent Logic Corporation (Southampton University) 180 Rose Orchard Way, Suite 200 Program Validation Ltd. San Jose, CA 95134, USA 26 Queen's Terrace ( 408) 943-0630 Southampton SOl lBQ UK J. Dave Andrews 011-44 703-330001 Andyne Computing Limited 544 Princess Street, Suite 202 Greg Chisholm Kingston, Ontario K7L 1C7 Argonne National Laboratory Canada EBR-11 Project (613) 548-4355 9700 S. Cass A venue Argonne, IL 60439, USA Kurt Asmis (708) 972-6815 Atomic Energy Control Board [email protected] 270 Albert Street Ottawa, Ontario KIP 5S9 Dan Craigen Canada Odyssey Research Associates 265 Carling Avenue, Suite 506 Graham Birtwistle Ottawa, Ontario IGS 2El 2500 University Drive Canada Computer Science Department (613) 238-7900 University of Calgary [email protected] Calgary, Alberta T2N 1N4 Canada John Gannon ( 403) 220-6055 National Science Foundation graham@cpsc. ucalgary.ca Room 401 1800 G Street, NW Robin Bloomfield Washington, DC 20550, USA Adelard 28 Rhondda Grove Susan Gerhart London E35AP, UK MCC, Software Technology Program (44) 1 318 7579 3500 West Balcones Center Drive [email protected]. uk (internet) Austin, TX 78759, USA gerhart%[email protected] Ricky W. Butler Mail Stop 130 Norm Glick NASA, Langley Research Center National Security Agency Hampton, VA 23665 9800 Savage Road USA Fort George Meade, MD 20755-6000 USA Martine Calve (310) 688-8448 Communications Security norm@cs. umd.edu Establishment P.O. Box 9703, Terminal Ottawa, Ontario KlG 3Z4 Canada 102 Joseph Goguen Keith Hanna Programming Research Group University of Kent University of Oxford Electronic Engineering Department 8-11 Keble Road Canterbury, Kent CT2 7NT, UK Oxford, OXl 3QD, UK 0227-764000 (865) 54328 [email protected] (internet) [email protected]. prg (janet) [email protected]. uk (internet) Will Harwood Imperial Software Technology Tim Gollins 3 Glisson Road CESG, Princess Elizabeth Way Cambridge CBl 2HA, UK Cheltenham, Gloucestershire GL52 5AJ +44-223-462400 UK [email protected]. uk (internet) (0242) 221491 x4107 Larry Hatch Donald Good National Security Agency Computational Logic, Inc. 9800 Savage Road 1717 W. Sixth Street, Suite 290 Fort George Meade, MD 20755-6000 Austin, TX 78703, USA USA (512) 322-9951 (301) 859-4050 [email protected] Douglas Howe Mike Gordon Computer Science Dept. SRI International Cornell University Suite 23, Millers Yard Ithaca, NY 12853, USA Mill Lane (607) 255-5831 Cambridge CB2 IRQ, UK +44 23 324 146 C. Terrence Ireland [email protected] NCSC 9800 Savage Road Brian Graham Fort George Meade, MD 20755-6000 2500 University Drive USA Computer Science Department (310) 859-4485 University of Calgary [email protected] Calgary, Alberta T2N 1N4 Canada PaulJoannou grahamb@cpsc. ucalgary.ca Ontario Hydro, Mail Stop H13 F22 700 University Avenue Steven Hall Toronto, Ontario M5G 1X6 Prior Data Sciences Canada 2000 Barrington Street, Suite 604 ( 416) 592-5910 Halifax, NS B3J 3Kl Canada Richard Kemmerer University of California Department of Computer Science Santa Barbara, CA 93106, USA (805) 961-4232 kemm@moccasin. ucs b.edu 103 Ian King Carroll Morgan CESG, Princess Elizabeth Way Oxford University Cheltenham, Gloucestershire GL52 5AJ Programming Research Group UK 8-11 Keble Road Oxford OX1 30D, UK Milan Kuchta +44 865 2725 70 Communications Security [email protected]. uk (internet) Establishment P.O. Box 9703, Terminal Bob Morris Ottawa, Ontario K1G 3Z4 NCSC Canada 9800 Savage Road (613) 991-7331 Fort George Meade, MD 20755-6000 USA Carl Landwehr (301) 859-4373 Code 5542, Naval Research Laboratory [email protected] Washington, DC 20375-5000, USA (202) 767-3381 Dave Musser RPI, Computer Science Department Bill Legato Amos Eaton Hall Dept. of Defense Troy, NY 12180, USA 9800 Savage Road (518) 276-8660 Fort George Meade, MD 20755-6000 USA Peter Neumann SRI International Nancy Leveson Computer Science Laboratory ICS Department 333 Ravenswood A venue University of California at Irvine Menlo Park, CA 94025, USA Irvine, CA 92717, USA ( 415) 859-2375 (714) 856-5517 nancy@ics. uci.edu Dave Parnas Department of Computer Science David Luckham Goodwin Hall, Queen's University Stanford AI Lab. Kingston, Ontario K7L 3N6 Computer Systems Laboratory Canada (613) Dept. of Electrical Engineering ERL Building, Rm. 456 Richard Platek Stanford, CA 94305-4055, USA Odyssey Research Associates (415) 723-1242 301A Harris Dates Drive [email protected] u Ithaca, NY 14850-1313, USA (607) 277-2020 John McHugh [email protected] Computational Logic Inc. 3500 Westgate Drive, Suite 204 Jesse Poore Durham, NC 27705, USA Computer Science Department (919) 493-4932 University of Tennessee [email protected] Knoxville, TN, USA [email protected]. utk.edu 104 John Rushby K. Speierman Computer Science Laboratory National Security Agency SRI International 9800 Savage Road 333 Ravenswood A venue Fort George Meade, MD 20755-6000 Menlo Park, CA 94025 USA USA (301) 688-6434 ( 415) 859-5456 [email protected] [email protected] Roger Stokes Peter Ryan ICL Defence Systems CESG, Princess Elizabeth Way Eskdale Road, Winnersh Cheltenham, Gloucestershire GL52 5AJ Wokingham, Berkshire RG 11 ISL UK UK (0242) 221491 x4295 ( 44) 734 693131 Mark Saaltink Vincent Taylor Odyssey Research Associates DND/CRAD DRDCS, 11 CBN 265 Carling A venue, Suite 506 101 Colonel By Drive Ottawa, Ontario lOS 2El Ottawa, Ontario KIA OK2 Canada Canada (613) 238-7900 (613) 995-8008 [email protected] Damian M. Saccocio National Research Council Martyn Thomas National Academy of Sciences Praxis 2101 Constitution Avenue, NW 20 Manvers St Washington, DC 20418, USA Bath BA1 1PX, UK (202) 334-2605 +44 225 444700 mct%praxis. [email protected]. uk (internet) Steve Sadler Rolls Royce & Assoc. Jeannette Wing P.O. Box 31 Carnegie-Mellon University Derby DE2 8BJ, UK School of Computer Science 0332-661461 Pittsburgh, PA 15213, USA ( 412) 268-3068 William Scherlis [email protected] DARPA/ISTO 1400 Wilson Blvd. Jim Woodcock Arlington, VA 22209-2300 Oxford University USA Programming Research Group (301) 694-5800 8-11 Keble Road [email protected] Oxford, OX1 3QD, UK +44 865 272576 Chris Sennett [email protected] RSRE, St Andrews Road Malvern, Worcs WR14 3DS, UK +44 614 895184 [email protected] (internet) B Potential Applications for Formal Methods The following potential applications for formal methods were proposed by Working Group 3. Time limitations and a desire not to orient problem statements toward a particular formal method led the group to agree on an informal framework for describing the posed examples. The framework used is as follows: Title 1. Type of example: (tutorial, exploratory, benchmark, demonstration) 2. Description: (state the problem, including relevant system properties desired in a successful solution) 3. Motivation: (what makes this an example interesting?) 4. Criteria: (what would be a success? a failure?) 5. Lasting value: (for successful completion) 6. Aspects of formal methods stressed by this example:( e.g., ability to handle real-time requirements, ability to handle large systems, ability to verify par­ ticular system properties, etc.) 7. Formal techniques/tools that would be interesting to see applied to this prob­ lem: 8. Potential impact: (who would be interested in the results?) 9. Estimated resources required: 10. Approach (funding/management/technical) 106 Nuclear Reactor Protection System (HW/SW, spec. & mech. proof, safety, med., open) Type of example: Demonstration (benchmark) Description: Specify, develop and prove an example of a nuclear reactor protection system. A redundant voting architecture could be chosen that allows sequential and concur­ rent aspects of the problem to be separated. The problem could include signal processing, level comparison, and trip logic. The example should not be a post hoc application of formal methods to existing software but a full formal development. Full documentation of the example should be in the public domain. Motivation: A socially important safety critical example of current public interest and con­ cern. Application of formal methods should lead to increased assurance in the system. The work is feasible with low technical risk and will provide a good example to the nuclear industry to encourage technology transfer. Application of formal methods in this area should reduce the costs of licencing such a system (e.g., gaining approval of regulatory authorities). Criteria for success: Complete example system that is acceptable to nuclear regulatory authorities and peer review. Lasting value: Technology transfer with an input to safety critical standards. Aspects of formal methods emphasized: Application to slow real-time systems with weak concurrency; sequential systems; system synthesis from proven components; and hard ware interfaces; use of layered design and specification with an engineering perspective. Techniques to be used: Specification and proof at appropriate levels of abstraction. Potential impact of example: Mainly technology transfer (see Motivation). Estimate of resources required: 3-6 person years. Proposed approach: Multidisciplinary, using existing experiments, e.g., DARTS over the short term. 107 Transformation Tools (Verified) (SW, spec. and proof, reliability, small, open) Type of example: Demonstration Description: Hardware designs captured in different forms should be reliably translatable to and from the form used by a verification system. For example, designs in the HOL language should be transformable to and from VHDL, ELLA, the form used by layout design tools (e.g., Electric), or a net list description language. Work is under way at Cambridge to make this transformation possible for HOL to ELLA. Motivation: Currently, the parallel or independent definition of designs, or transformation between independent representations, is error prone. The example would seek to demonstrate how this problem could be overcome. To extend the formal coverage of the range of hardware design representations. Criteria for success: The success of the example depends on the size of the transformable subsets of the languages concerned, and the utility of those subsets as perceived by designers and verifiers.
Recommended publications
  • A the Hacker
    A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    [Show full text]
  • Jeffrey Heim, Marcel Hernandez, Maria Nunez,& Matthias Katerna Morris Worm on November 2, 1988, Robert Tappan Morris Releas
    Jeffrey Heim, Marcel Hernandez, Maria Nunez,& Matthias Katerna Morris Worm On November 2, 1988, Robert Tappan Morris released a worm into the internet. The experimental worm was the first of its kind. It replicated itself and programmed itself, so it ended up spreading much faster than Morris expected. It self-programmed and self-replicated at an exponential rate in a manner that had never been seen before. Morris knew this worm was not necessarily ethical, for he released it out of MIT instead of his own Cornell University. In due course, many computers across the United States had crashed because of Morris. Once he discovered how much damage the worm had been causing, he reached out to a friend at Harvard looking for a solution to stop it. They attempted in sending an anonymous message to the network with directions that could kill the worm, but the message came through too late since they system was clogged. Many significant computers at colleges, businesses and the military became infected. The cost to fix each computer ranged from $200 to over $53,000. The worm exploited vulnerabilities in computer systems and in the UNIX email software. Within 24 hours of releasing the worm, thousands of people were aware something was unusual. Eventually, it would infect ten percent of all computers using the internet. The Morris Worm was the largest malware case ever to reach this percentage. However, the percentage was so high due to the fact that the number of computers was much less than today. The computers it impacted included significant systems, such as Stanford’s, Berkley’s and NASA’s.
    [Show full text]
  • Hacker Perspectives
    Hacker Perspectives Advanced Computer Networks SS 2007 Franz Sommerauer ACN SS 07 - Hacker Perspectives Overview Definition of a Hacker History of Hacking How to get into Scene Information Gathering Ethical Hacking Most famous Hackers ACN SS 07 - Hacker Perspectives Definition (see Hacker Jargon file) 1. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary. 2. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming. ACN SS 07 - Hacker Perspectives Types of hackers White hat – A person who is ethically opposed to the abuse of computer systems (ethical hacker) – Generally focuses on securing IT systems Grey hat – A skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not – Hybrid between white and black hat hackers Black hat – Someone who compromises the security of a system without permission from an authorized party – Cracker ACN SS 07 - Hacker Perspectives History of hacking 1972 – John Draper discovers that a 2.6 kHz tone allows to access the internal trunking mechanism of Ma Bell 2.6 kHz tone created by a whistle With a Blue box it was possible to take internal control of Ma Bell's long distance switching equipment 1973 – College students Steve Wozniak and Steve Jobs begin making and selling blue boxes ACN SS 07 - Hacker Perspectives History of hacking 1981 – Chaos computer Club forms in Germany 1982 – Hacker group of six teenage hackers (414’s) broke into 60 computer systems and instiutitions (including Los Alamos Labs) 1988 – Kevin Mitnick secretly monitors the e-Mail of security officials (sentenced for one year to jail) ACN SS 07 - Hacker Perspectives History of hacking 1988 – Robert T.
    [Show full text]
  • The Morris Worm (1988)
    UNIVERSITY OF ZAGREB FACULTY OF ELECTRICAL ENGINEERING AND COMPUTING SEMINAR FOR THE “COMPUTER FORENSICS” COURSE [2017/2018] The Morris Worm (1988) Ana Brassard Zagreb, January 2018 Table of Contents 1. Introduction .......................................................................................................... 3 2. The Internet Worm of November 2, 1988 ............................................................. 4 2.1 The Spreading Mechanism ........................................................................... 5 2.1.1 The Error ........................................................................................................ 5 2.1.2 The Infect Routine ........................................................................................... 6 2.1.3 The Cracksome Routine .................................................................................. 6 2.2 The Effects of Getting Infected ...................................................................... 7 2.3 Solution and Prevention ................................................................................ 8 2.4 Historic Significance ...................................................................................... 8 3. Conclusion ........................................................................................................... 9 4. Bibliography ....................................................................................................... 10 1. Introduction Longer than we would like to admit ago, “The Internet” had yet to be invented,
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • Combating Spyware in the Enterprise.Pdf
    www.dbebooks.com - Free Books & magazines Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you will find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE EBOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These eBooks are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our ebooks onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Basics of Ethical Hacking – Manthan M. Desai
    Hacking For Beginners – Manthan Desai 2010 Legal Disclaimer Any proceedings and or activities related to the material contained within this book are exclusively your liability. The misuse and mistreat of the information in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book. Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. While using this book and reading various hacking tutorials, you agree to follow the below mentioned terms and conditions: 1. All the information provided in this book is for educational purposes only. The book author is no way responsible for any misuse of the information. 2. "Hacking for Beginners” is just a term that represents the name of the book and is not a book that provides any illegal information. “Hacking for Beginners” is a book related to Computer Security and not a book that promotes hacking/cracking/software piracy. 3. This book is totally meant for providing information on "Computer Security”, "Computer Programming” and other related topics and is no way related towards the terms "CRACKING” or "HACKING” (Unethical).
    [Show full text]
  • Client Opportunities
    Client Opportunities Partner Companies □ INgrooves Music Group □ Dropcards (download cards) Indie Extreme A la Carte Services □ DiscMakers (CD Replication) □ Harry Fox Agency Advertising □ April Sound Entertainment Group □ Facebook ad campaigns □ Tom Jackson Productions □ Banner ads, etc □ Amazon Store – physical CDs Consulting/Artist Launch Radio Related □ Strategic Marketing/Business Plan □ Outbound Music □ Pandora Radio Submission Recording Development □ Slacker Radio Submission □ Producer Access □ iTunes Radio Submission □ Song Selection Assistance □ iHeartRadio Submission □ Executive Producer Service Showcase Submission Opportunities Branding Development □ Film Festivals □ CD Artwork □ Music Festivals □ T-shirt Design □ One-sheet Creation Time Savers □ Poster/Postcard Design □ DropBox □ Website Design □ Newsletter Template Design Web Presences □ Logo Design □ All Media Guide Submission □ Banner Ads □ Apple Music □ Print Ad Template □ GraceNote □ Shazam Radio □ Instagram, Twitter, Reverbnation,,etc □ Internet Radio Campaigns □ International Radio Campaigns IE Shopping Cart System □ Radio Campaign Management □ Artist Website integration □ Artist Facebook integration □ Fulfillment on merch/CD sales Sync Licensing □ Play Network Sales/Airplay Tracking □ Music Supervisor.com □ BDS □ Various Music Library submissions □ MediaBase □ SoundScan □ SoundExchange INgrooves Music Publishing Admin Service □ Sync Licensing Opps □ Song catalog Management □ Neighboring Rights Collection Rdio INgrooves Worldwide R2G (China, Taiwan, Hong Kong, Macao)
    [Show full text]
  • Industry Observations on the Emerging Cyber Security Market
    Industry Observations on the Emerging Cyber Security Market Prepared for: Virginia Cyber Security Commission Town Hall By: George Hughes, SimVentions President 2/25/2016 Do not distribute without permission 1 Overview of Briefing • Cyber Security milestones & observations • SimVentions overview and involvement in Cyber Security market • Stafford Technology & Research Center • What can Virginia do to help Cyber Security businesses develop solutions for our rapidly growing national threat(s)? 2/25/2016 Do not distribute without permission 2 Cyber Warfare Milestones December ARPA (Advanced Research Projects Agency) goes online and connects four major U.S. universities. 1969 Designed for research, education, and government organizations, it provides a communications network linking the country in the event that a military attack destroys conventional communications systems. June After learning that the Soviet Union planned to steal software from a Canadian company to control its 1982 Trans-Siberian Pipeline, the CIA alters the software to cause the pipeline to explode. It is considered the first cyberattack. Over the course of 10 months beginning in August, Clifford Stoll, a physics researcher at the University of California at Berkeley, tracks down a hacker who had broken into computers at the Lawrence Berkeley 1986 National Laboratory, a U.S. Department of Energy facility, and other military computers in the U.S. He traced the hacker to Germany. It is the first such investigation. November An Internet worm temporarily shuts down about 10% of the world's Internet servers. It is the first 1988 occurrence of an Internet worm. Robert Tappan Morris, a student at Cornell University, released the worm.
    [Show full text]
  • Volume 5: Future Challenges of Cybercrime
    Future Challenges of Cybercrime Volume 5: Proceedings of the Futures Working Group Toby Finnie Tom Petee John Jarvis Editors 1 Acknowledgments The Futures Working Group and the authors that contributed to this volume wish to thank both Police Futurists International and the Federal Bureau of Investigation for supporting the efforts reflected herein. Additionally, the following individuals are recognized for their significant contributions to this volume: FBI Behavioral Science Unit Intern Angela Basso, BSU Visiting Scholar Hayley Daglis Cleary, and other staff of the FBI Training Division who provided significant assistance with the production of this volume including, but not limited to, the editing, organization, and formatting of this volume. Without their generous efforts and sincere commitment to assisting with this project, this work would not have been possible. Suggested Citation: The Future Challenges of Cybercrime: Volume 5 Proceedings of the Futures Working Group. Toby Finnie, Tom Petee, and John Jarvis, editors. Federal Bureau of Investigation: Quantico, Virginia 2010. Initial Release Date: September 22, 2010 Revised: November 4, 2010 Author information: Biographical information pertaining to individual contributors and authors can be found at http://futuresworkinggroup.cos.ucf.edu. The opinions and statements expressed throughout this volume are those of the individual authors and contributors and should not be considered an endorsement or a reflection of the official position of the Federal Bureau of Investigation, the Society of Police Futures International, or any other institution or organization for any policy, program, or service. 2 Table of Contents Acknowledgments............................................................................................................................2 Word from the Chairman………………………………………………………………………….5 Defining “Cyber-Crime”: Issues in Determining the Nature and Scope of Computer-Related Offenses……………………………………………………………………….6 Thomas A.
    [Show full text]
  • Using Deception to Enhance Security: a Taxonomy, Model, and Novel Uses Mohammed H
    Purdue University Purdue e-Pubs Open Access Dissertations Theses and Dissertations January 2015 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses Mohammed H. Almeshekah Purdue University Follow this and additional works at: https://docs.lib.purdue.edu/open_access_dissertations Recommended Citation Almeshekah, Mohammed H., "Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses" (2015). Open Access Dissertations. 1334. https://docs.lib.purdue.edu/open_access_dissertations/1334 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. Graduate School Form 30 Updated 1/15/2015 PURDUE UNIVERSITY GRADUATE SCHOOL Thesis/Dissertation Acceptance This is to certify that the thesis/dissertation prepared By Almeshekah, Mohammed Hamoud Entitled Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses For the degree of Doctor of Philosophy Is approved by the final examining committee: Eugene H. Spafford Co-chair Mikhail J. Atallah Co-chair Samuel S. Wagstaff, Jr Matt Bishop To the best of my knowledge and as understood by the student in the Thesis/Dissertation Agreement, Publication Delay, and Certification Disclaimer (Graduate School Form 32), this thesis/dissertation adheres to the provisions of Purdue University’s “Policy of Integrity in Research” and the use of copyright material. Eugene H. Spafford Approved by Major Professor(s): William Gorman July 20th, 2015 Approved by: Head of the Departmental
    [Show full text]
  • Unplugged Official Publication of the 11Th Annual Key Largo Original Musicfest May 16-19, 2019
    unplugged Official Publication of the 11th Annual Key Largo Original Musicfest May 16-19, 2019 - Waterfront Venues - Multiple Stages - Continuous Music - Over 30 Musicians and Bands - Grammy Winners & Hit Songwriters - Musicians from Nashville, North Carolina, Maryland, Texas, and Florida See Center Pages for Complete Schedule Key Largo Original Music Festival Promises our Best Line-Up Ever! More than 30 singer/songwriters kick off our Caribbean Club Festival Finale and 2019 Festival at Sundowners on the evening Beach BBQ with Mike’s 101 of Thursday, May 16. Starting at 6 pm, a full evening of music features returning Nashville The world-famous Caribbean Club hosts the Festival Finale and Beach BBQ Sunday, May singer/songwriters together with local favorites 19th, from, 2 to 10 pm. Throughout the day a for four plus hours of music in the round fol- traditional, ”Finger Lickin’ BBQ” plate with all lowed by a late night musicians jam session at the trimmings will be on offer from Mike’s BBQ Cactus Jack’s. 101 for just $15, together with other delicious Friday and Saturday we are joined by an extensive menu options. array of talent performing on multiple stages at Starting at 2 pm, 22+ singer/songwriters will Snook’s Bayside, MM100 and Sundowners, Senor perform on our Bayfront stage, providing an un- Frijoles and Cactus Jack’s all at MM104 bayside. paralleled and eclectic music experience. Some Nashville musicians are joined by an eclectic mix seating is provided, or bring your lawn chair but of talent and genres from across the United States come early for this awesome music event! And including North Carolina, Maryland, Texas, Florida don’t forget your dancing shoes! and of course the fabulous Florida Keys.
    [Show full text]