CERIAS Tech Report 2015-11 Using Deception to Enhance Security: a Taxonomy, Model, and Novel Uses by Mohammed H

Total Page:16

File Type:pdf, Size:1020Kb

CERIAS Tech Report 2015-11 Using Deception to Enhance Security: a Taxonomy, Model, and Novel Uses by Mohammed H CERIAS Tech Report 2015-11 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses by Mohammed H. Almeshekah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 47907-2086 USING DECEPTION TO ENHANCE SECURITY: A TAXONOMY, MODEL, AND NOVEL USES A Dissertation Submitted to the Faculty of Purdue University by Mohammed H. Almeshekah In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2015 Purdue University West Lafayette, Indiana ii In dedication to my mother, Aljoharh, who has given up so much to make me into who I am; to my wife, Asma, who taught me the meaning of sacrifice; and to my sons, Abdullah and Feras, who provided me the extra motivation to finish my PhD. iii ACKNOWLEDGMENTS I would like to express my heartfelt thanks to my advisors, Prof. Eugene H. Spaf­ ford and Prof. Mikhal J. Atallah, for their time, guidance, and invaluable comments throughout the whole span of this dissertation work. I am honored to have the op­ portunity to learn from such renowned scientists and highly respected mentors. They taught me the skills that would guide me in my career for years to come. I am forever indebted to them and aspire to follow in their footsteps. I would also like to express my deepest appreciation to my committee members, Prof. Samuel Wagstaff and Prof. Matt Bishop, for their invaluable advice and help. Without their insights and hard questions, this dissertation would not have been possible. I am also extremely grateful for my beloved wife, Asma, for her continuous encour­ agement and unwavering support. She provided light when the rigors of intellectual pursuit were casting a shadow. I would not have finished this dissertation without her by my side. She has sacrificed beyond what I wished for and has done so with love. Also, I am grateful for my parents for their unwavering support and unforgettable endorsement, especially to my dearest mom. She is the pillar I stand by during hard times and I owe her my life for her constant love and encouragement. Special thanks are also due to Northrop Grumman and Saudi Arabian Cultural Mission for supporting me throughout my PhD. Finally, I take this opportunity to record my sincere thanks to all the faculty, staff, and friends at the Computer Sci­ ence Department and CERIAS; they provided me with one of the best academic environment during my PhD. iv TABLE OF CONTENTS Page LIST OF TABLES :::::::::::::::::::::::::::::::: viii LIST OF FIGURES ::::::::::::::::::::::::::::::: ix ABBREVIATIONS :::::::::::::::::::::::::::::::: xi ABSTRACT ::::::::::::::::::::::::::::::::::: xii 1 Introduction :::::::::::::::::::::::::::::::::: 1 1.1 Motivation and Overview :::::::::::::::::::::::: 1 1.1.1 Thesis Statement :::::::::::::::::::::::: 2 1.1.2 Dissertation Overview ::::::::::::::::::::: 3 1.2 Terminology ::::::::::::::::::::::::::::::: 4 1.3 Dissertation Organization and Contribution ::::::::::::: 5 2 A Taxonomy of Computer Systems’ Defenses :::::::::::::::: 8 2.1 The Four Categories of Protection Mechanisms :::::::::::: 10 2.1.1 Denial and Isolation :::::::::::::::::::::: 12 2.1.2 Degradation and Obfuscation ::::::::::::::::: 13 2.1.3 Negative Information and Deception ::::::::::::: 13 2.1.4 Attribution and Counter-Operations ::::::::::::: 16 2.2 Fitting the Pieces Together – Cyber Kill-Chain Model :::::::: 17 2.2.1 The Role of Deception ::::::::::::::::::::: 17 2.3 Chapter Summary ::::::::::::::::::::::::::: 19 3 Deception ::::::::::::::::::::::::::::::::::: 21 3.1 General Definition of Deception :::::::::::::::::::: 21 3.2 Deception and the Truth – A Taxonomy ::::::::::::::: 22 3.2.1 Simulation and Dissimulation – Bell and Whaley :::::: 22 3.2.2 Linguistic Case Theory ::::::::::::::::::::: 24 3.3 Deception Maxims ::::::::::::::::::::::::::: 25 3.3.1 Truth/Reality :::::::::::::::::::::::::: 25 3.3.2 Deceit :::::::::::::::::::::::::::::: 26 3.3.3 Denial, Misdirection and Confusion :::::::::::::: 26 3.4 Deception and Biases :::::::::::::::::::::::::: 26 3.4.1 Personal Biases ::::::::::::::::::::::::: 28 3.4.2 Cultural Biases ::::::::::::::::::::::::: 28 3.4.3 Organizational Biases :::::::::::::::::::::: 30 v Page 3.4.4 Cognitive Biases :::::::::::::::::::::::: 30 3.5 The Use of Deception in War, Military and Conflicts :::::::: 31 3.6 General Use of Deception in Computing ::::::::::::::: 32 3.6.1 In Human-to-Human Digital Interaction ::::::::::: 32 3.6.2 In Human Computer Interaction (HCI) :::::::::::: 32 3.6.3 In Robotics and Human Robot Interaction (HRI) :::::: 34 3.6.4 In Computer-to-Computer Interaction :::::::::::: 35 3.7 The Use of Deception to Enhance Security :::::::::::::: 36 3.7.1 Honeypots :::::::::::::::::::::::::::: 37 3.7.2 Honey–* Tools ::::::::::::::::::::::::: 39 3.7.3 Incorporating Deception into Other Security Defenses :::: 40 3.8 Deception Operations and Tactics ::::::::::::::::::: 43 3.9 Chapter Summary ::::::::::::::::::::::::::: 44 4 A Framework for Using Deception to Enhance Security :::::::::: 45 4.1 Definition :::::::::::::::::::::::::::::::: 46 4.2 Limitations of Isolated Use of Deception ::::::::::::::: 46 4.3 The Role of Deception ::::::::::::::::::::::::: 47 4.3.1 Advantages of Using Deception in Computer Defenses :::: 48 4.4 Related Work of Modeling the Use of Deception in Security ::::: 50 4.5 A Framework for Integrating Deception-Based Defenses ::::::: 51 4.5.1 Planning Deception ::::::::::::::::::::::: 52 4.5.2 Implementing and Integrating Deception ::::::::::: 62 4.5.3 Monitoring and Evaluating the Use of Deception ::::::: 62 4.6 Deception and Related Concepts ::::::::::::::::::: 63 4.6.1 Kerckhoff’s Principle and Deception :::::::::::::: 63 4.6.2 Deception and Hacking Back :::::::::::::::::: 65 4.6.3 Deception and Consistency ::::::::::::::::::: 65 4.6.4 Deception and Abstraction ::::::::::::::::::: 66 4.7 Applying the Framework :::::::::::::::::::::::: 66 4.7.1 To Previous Uses of Deception ::::::::::::::::: 66 4.7.2 To the Work in This Dissertation – A Case Study :::::: 70 4.8 Chapter Summary ::::::::::::::::::::::::::: 73 5 Deceptive Covert Channel :::::::::::::::::::::::::: 74 5.1 Background ::::::::::::::::::::::::::::::: 75 5.1.1 Authentication Schemes :::::::::::::::::::: 75 5.1.2 Use of Smartphones ::::::::::::::::::::::: 77 5.1.3 Use of Deception and Covert Channels :::::::::::: 77 5.2 Creating a Deceptive Covert Channel ::::::::::::::::: 78 5.2.1 Threat Model :::::::::::::::::::::::::: 79 5.2.2 Scheme’s Setup ::::::::::::::::::::::::: 80 5.2.3 Logging In :::::::::::::::::::::::::::: 81 vi Page 5.2.4 Creating Deceit and Covert Communication ::::::::: 85 5.3 Enhancements :::::::::::::::::::::::::::::: 86 5.4 Security Analysis :::::::::::::::::::::::::::: 87 5.5 Comparison with Other Schemes ::::::::::::::::::: 89 5.6 Chapter Summary ::::::::::::::::::::::::::: 92 6 Deceptive Passwords — ErsatzPasswords :::::::::::::::::: 93 6.1 Background ::::::::::::::::::::::::::::::: 94 6.1.1 Passwords :::::::::::::::::::::::::::: 94 6.1.2 Password-Related Threats ::::::::::::::::::: 94 6.1.3 Injecting Deceit ::::::::::::::::::::::::: 96 6.2 Technical Specification ::::::::::::::::::::::::: 97 6.2.1 Background ::::::::::::::::::::::::::: 97 6.2.2 One-time Initialization ::::::::::::::::::::: 99 6.2.3 Login ::::::::::::::::::::::::::::::: 101 6.2.4 Password Administration :::::::::::::::::::: 102 6.3 ErsatzPasswords – The Use of Deception ::::::::::::::: 104 6.3.1 ErsatzPasswords Generation :::::::::::::::::: 105 6.3.2 ErsatzPasswords Properties :::::::::::::::::: 108 6.4 Implementation and Analysis ::::::::::::::::::::: 111 6.4.1 Implementation Details ::::::::::::::::::::: 111 6.4.2 Analysis ::::::::::::::::::::::::::::: 112 6.5 Chapter Summary ::::::::::::::::::::::::::: 118 7 Deceptiver — A Centralized Deceptive Server ::::::::::::::: 120 7.1 Background ::::::::::::::::::::::::::::::: 121 7.2 Overview ::::::::::::::::::::::::::::::::: 122 7.3 Deceptiver Design :::::::::::::::::::::::::::: 123 7.3.1 Deceptive Responses :::::::::::::::::::::: 124 7.3.2 Centralized Deception ::::::::::::::::::::: 130 7.4 Implementation and Deployment ::::::::::::::::::: 130 7.4.1 Apache Server Hook :::::::::::::::::::::: 131 7.5 Security Discussion ::::::::::::::::::::::::::: 132 7.6 Performance Analysis :::::::::::::::::::::::::: 134 7.7 Chapter Summary ::::::::::::::::::::::::::: 136 8 Conclusions :::::::::::::::::::::::::::::::::: 137 8.1 Summary :::::::::::::::::::::::::::::::: 137 8.2 Future Work ::::::::::::::::::::::::::::::: 138 LIST OF REFERENCES :::::::::::::::::::::::::::: 141 A Deceptiver Implementation :::::::::::::::::::::::::: 153 A.1 Deceptiver Command Line Inputs ::::::::::::::::::: 153 vii VITA ::::::::::::::::::::::::::::::::::::::: 155 viii LIST OF TABLES Table Page 2.1 Mapping Security Mechanisms to the Kill-Chain Model ::::::::: 18 4.1 Using the Deception Framework to Secure Web Applications :::::: 72 5.1 Schemes Comparison :::::::::::::::::::::::::::: 90 6.1 Number of Instructions for Creating a New User Under the new pam unix Module ::::::::::::::::::::::::::::::::::: 115 7.1 Comparing the Performance of Apache With ModSecurity and Deceptiver 134 ix LIST OF FIGURES Figure Page 1.1 Computer Systems Components Where Deception is Applied in the Dis­ sertation ::::::::::::::::::::::::::::::::::: 3 1.2 Using Deception to Enhance Security – Dissertation Overview ::::: 4 2.1 Taxonomy of Information Protection Mechanisms :::::::::::: 9 2.2 Plotting the Taxonomy Over Multiple Scales ::::::::::::::: 11 3.1 Deception and Perception ::::::::::::::::::::::::: 22 3.2 Deception
Recommended publications
  • Reginald Victor Jones CH FRS (1911-1997)
    Catalogue of the papers and correspondence of Reginald Victor Jones CH FRS (1911-1997) by Alan Hayward NCUACS catalogue no. 95/8/00 R.V. Jones 1 NCUACS 95/8/00 Title: Catalogue of the papers and correspondence of Reginald Victor Jones CH FRS (1911-1997), physicist Compiled by: Alan Hayward Description level: Fonds Date of material: 1928-1998 Extent of material: 230 boxes, ca 5000 items Deposited in: Churchill Archives Centre, Churchill College, Cambridge CB3 0DS Reference code: GB 0014 2000 National Cataloguing Unit for the Archives of Contemporary Scientists, University of Bath. NCUACS catalogue no. 95/8/00 R.V. Jones 2 NCUACS 95/8/00 The work of the National Cataloguing Unit for the Archives of Contemporary Scientists, and the production of this catalogue, are made possible by the support of the Research Support Libraries Programme. R.V. Jones 3 NCUACS 95/8/00 NOT ALL THE MATERIAL IN THIS COLLECTION MAY YET BE AVAILABLE FOR CONSULTATION. ENQUIRIES SHOULD BE ADDRESSED IN THE FIRST INSTANCE TO: THE KEEPER OF THE ARCHIVES CHURCHILL ARCHIVES CENTRE CHURCHILL COLLEGE CAMBRIDGE R.V. Jones 4 NCUACS 95/8/00 LIST OF CONTENTS Items Page GENERAL INTRODUCTION 6 SECTION A BIOGRAPHICAL A.1 - A.302 12 SECTION B SECOND WORLD WAR B.1 - B.613 36 SECTION C UNIVERSITY OF ABERDEEN C.1 - C.282 95 SECTION D RESEARCH TOPICS AND SCIENCE INTERESTS D.1 - D.456 127 SECTION E DEFENCE AND INTELLIGENCE E.1 - E.256 180 SECTION F SCIENCE-RELATED INTERESTS F.1 - F.275 203 SECTION G VISITS AND CONFERENCES G.1 - G.448 238 SECTION H SOCIETIES AND ORGANISATIONS H.1 - H.922 284 SECTION J PUBLICATIONS J.1 - J.824 383 SECTION K LECTURES, SPEECHES AND BROADCASTS K.1 - K.495 450 SECTION L CORRESPONDENCE L.1 - L.140 495 R.V.
    [Show full text]
  • Orme) Wilberforce (Albert) Raymond Blackburn (Alexander Bell
    Copyrights sought (Albert) Basil (Orme) Wilberforce (Albert) Raymond Blackburn (Alexander Bell) Filson Young (Alexander) Forbes Hendry (Alexander) Frederick Whyte (Alfred Hubert) Roy Fedden (Alfred) Alistair Cooke (Alfred) Guy Garrod (Alfred) James Hawkey (Archibald) Berkeley Milne (Archibald) David Stirling (Archibald) Havergal Downes-Shaw (Arthur) Berriedale Keith (Arthur) Beverley Baxter (Arthur) Cecil Tyrrell Beck (Arthur) Clive Morrison-Bell (Arthur) Hugh (Elsdale) Molson (Arthur) Mervyn Stockwood (Arthur) Paul Boissier, Harrow Heraldry Committee & Harrow School (Arthur) Trevor Dawson (Arwyn) Lynn Ungoed-Thomas (Basil Arthur) John Peto (Basil) Kingsley Martin (Basil) Kingsley Martin (Basil) Kingsley Martin & New Statesman (Borlasse Elward) Wyndham Childs (Cecil Frederick) Nevil Macready (Cecil George) Graham Hayman (Charles Edward) Howard Vincent (Charles Henry) Collins Baker (Charles) Alexander Harris (Charles) Cyril Clarke (Charles) Edgar Wood (Charles) Edward Troup (Charles) Frederick (Howard) Gough (Charles) Michael Duff (Charles) Philip Fothergill (Charles) Philip Fothergill, Liberal National Organisation, N-E Warwickshire Liberal Association & Rt Hon Charles Albert McCurdy (Charles) Vernon (Oldfield) Bartlett (Charles) Vernon (Oldfield) Bartlett & World Review of Reviews (Claude) Nigel (Byam) Davies (Claude) Nigel (Byam) Davies (Colin) Mark Patrick (Crwfurd) Wilfrid Griffin Eady (Cyril) Berkeley Ormerod (Cyril) Desmond Keeling (Cyril) George Toogood (Cyril) Kenneth Bird (David) Euan Wallace (Davies) Evan Bedford (Denis Duncan)
    [Show full text]
  • Honorary Graduates
    Honorary Graduates (Chronological list) The names of deceased graduates are printed in italics. Master of Arts (MA) George Harris Thomson, Secretary-Treasurer of the Royal College of Science and Technology from 1947 to 1964, Registrar of the University from 1964 to 1966 July 1966 Charles Geoffrey Wood, University Librarian March 1967 William B Paton, County Librarian, Lanarkshire - First Head of the Scottish School of Librarianship, Scottish College of Commerce, 1946-50 April 1972 Gustav Heiberg, Chief of Division, Norwegian Ministry of Foreign Affairs July 1975 Charles Stewart, formerly Depute Bursar (Finance) in the University Administration Oct 1975 Louis McGougan, Bursur of the University of Strathclyde March 1976 Duncan Matheson, formerly Director of Physical Education in the University July 1983 Walter Underwood, formerly Planning Consultant to the University July 1983 Zbigniew Byszewski, former Consul-General for Poland in Scotland June 1986 John Turner, Organist to the University and Glasgow Cathedral July 1990 Susan Wighton, who worked as a nurse in Palestinian refugee camps July 1990 Andrew Miller, Director of Libraries, City of Glasgow District Council July 1990 Tommy Orr, former University Security Controller July 1990 James Arnold, Director and Village Manager, Lanark New Town Nov 1990 Graham Douglas, Draughtsman, Royal Commission on Ancient Building and Historical Monuments of Scotland July 1992 Yvonne Carol Grace Murray, Athlete May 1995 Master of Science (MSc) Ronald Ewart Nicoll, Professor of Urban Planning March 1967
    [Show full text]
  • Nationwide Children's Hospital Annual Report
    NATIONWIDE CHILDREN’S HOSPITAL ANNUAL REPORT Decade Remarkableof Transformation In the last decade, Nationwide Children’s Hospital has grown in all dimensions – in This past year has been a year like none before it. From a global pandemic to continued clinical care and outcomes, in research and innovation, and in our commitment to efforts to end racism and support health equity, Nationwide Children’s has stood with social justice and health equity. Join us as we share our achievements from the past our patients, families and staff as we face these challenges together. We’ve also grown year, highlight a decade of transformation and look toward our future. our team, welcoming a nationally renowned expert in quality and safety as our new chief medical officer, among many other talented new faculty. HONORS AND ACHIEVEMENTS: Leaders for the New Decade Rank sixth among NIH-funded freestanding MORE THAN pediatric research 1.6 Million facilities in the U.S. PATIENT VISITS $ PER YEAR 54.6 million * Based on CHA survey of utilization Direct NIH Awards and financial indicators LEADING THE COUNTRY IN QUALITY AND SAFETY reduction reduction drop in % in serious % in actual % hospital 83 safety 64 harm 38 mortality* events (2009-2019) (2009-2019) *Observed to Expected Mortality (2009-2019) Ratio Based on Pediatric Health Information System® (PHIS) Data ONCE AGAIN NAMED TO THE HONOR ROLL OF BEST CHILDREN’S HOSPITALS AND RANKED IN ALL 10 SPECIALTIES BY U.S. NEWS & WORLD REPORT • America’s largest, neonatal network and provider of • Four-time American Nurses
    [Show full text]
  • A Selected Bibliography of Publications By, and About, Niels Bohr
    A Selected Bibliography of Publications by, and about, Niels Bohr Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 09 June 2021 Version 1.308 Title word cross-reference + [VIR+08]. $1 [Duf46]. $1.00 [N.38, Bal39]. $105.95 [Dor79]. $11.95 [Bus20]. $12.00 [Kra07, Lan08]. $189 [Tan09]. $21.95 [Hub14]. $24.95 [RS07]. $29.95 [Gor17]. $32.00 [RS07]. $35.00 [Par06]. $47.50 [Kri91]. $6.95 [Sha67]. $61 [Kra16b]. $9 [Jam67]. − [VIR+08]. 238 [Tur46a, Tur46b]. ◦ [Fra55]. 2 [Som18]. β [Gau14]. c [Dar92d, Gam39]. G [Gam39]. h [Gam39]. q [Dar92d]. × [wB90]. -numbers [Dar92d]. /Hasse [KZN+88]. /Rath [GRE+01]. 0 [wB90, Hub14, Tur06]. 0-19-852049-2 [Ano93a, Red93, Seg93]. 0-19-853977-0 [Hub14]. 0-521-35366-1 [Kri91]. 0-674-01519-3 [Tur06]. 0-85224-458-4 [Hen86a]. 0-9672617-2-4 [Kra07, Lan08]. 1 2 1.5 [GRE+01]. 100-˚aret [BR+85]. 100th [BR+85, KRW05, Sch13, vM02]. 110th [Rub97a]. 121 [Boh87a]. 153 [MP97]. 16 [SE13]. 17 [Boh55a, KRBR62]. 175 [Bad83]. 18.11.1962 [Hei63a]. 1911 [Meh75]. 1915 [SE13]. 1915/16 [SE13, SE13]. 1918 [Boh21a]. 1920s [PP16]. 1922 [Boh22a]. 1923 [Ros18]. 1925 [Cla13, Bor13, Jan17, Sho13]. 1927 [Ano28]. 1929 [HEB+80, HvMW79, Pye81]. 1930 [Lin81, Whe81]. 1930/41 [Fer68, Fer71]. 1930s [Aas85b, Stu79]. 1933 [CCJ+34].
    [Show full text]
  • Repor T Resumes
    REPOR TRESUMES ED 017 908 48 AL 000 990 CHAPTERS IN INDIAN CIVILIZATION--A HANDBOOK OF READINGS TO ACCOMPANY THE CIVILIZATION OF INDIA SYLLABUS. VOLUME II, BRITISH AND MODERN INDIA. BY- ELDER, JOSEPH W., ED. WISCONSIN UNIV., MADISON, DEPT. OF INDIAN STUDIES REPORT NUMBER BR-6-2512 PUB DATE JUN 67 CONTRACT OEC-3-6-062512-1744 EDRS PRICE MF-$1.25 HC-$12.04 299P. DESCRIPTORS- *INDIANS, *CULTURE, *AREA STUDIES, MASS MEDIA, *LANGUAGE AND AREA CENTERS, LITERATURE, LANGUAGE CLASSIFICATION, INDO EUROPEAN LANGUAGES, DRAMA, MUSIC, SOCIOCULTURAL PATTERNS, INDIA, THIS VOLUME IS THE COMPANION TO "VOLUME II CLASSICAL AND MEDIEVAL INDIA," AND IS DESIGNED TO ACCOMPANY COURSES DEALING WITH INDIA, PARTICULARLY THOSE COURSES USING THE "CIVILIZATION OF INDIA SYLLABUS"(BY THE SAME AUTHOR AND PUBLISHERS, 1965). VOLUME II CONTAINS THE FOLLOWING SELECTIONS--(/) "INDIA AND WESTERN INTELLECTUALS," BY JOSEPH W. ELDER,(2) "DEVELOPMENT AND REACH OF MASS MEDIA," BY K.E. EAPEN, (3) "DANCE, DANCE-DRAMA, AND MUSIC," BY CLIFF R. JONES AND ROBERT E. BROWN,(4) "MODERN INDIAN LITERATURE," BY M.G. KRISHNAMURTHI, (5) "LANGUAGE IDENTITY--AN INTRODUCTION TO INDIA'S LANGUAGE PROBLEMS," BY WILLIAM C. MCCORMACK, (6) "THE STUDY OF CIVILIZATIONS," BY JOSEPH W. ELDER, AND(7) "THE PEOPLES OF INDIA," BY ROBERT J. AND BEATRICE D. MILLER. THESE MATERIALS ARE WRITTEN IN ENGLISH AND ARE PUBLISHED BY THE DEPARTMENT OF INDIAN STUDIES, UNIVERSITY OF WISCONSIN, MADISON, WISCONSIN 53706. (AMM) 11116ro., F Bk.--. G 2S12 Ye- CHAPTERS IN INDIAN CIVILIZATION JOSEPH W ELDER Editor VOLUME I I BRITISH AND MODERN PERIOD U.S. DEPARTMENT OF HEALTH, EDUCATION & WELFARE OFFICE OF EDUCATION THIS DOCUMENT HAS BEEN REPRODUCED EXACTLY AS RECEIVED FROM THE PERSON OR ORGANIZATION ORIGINATING IT.POINTS OF VIEW OR OPINIONS STATED DO NOT NECESSARILY REPRESENT OFFICIAL OFFICE OF EDUCATION POSITION OR POLICY.
    [Show full text]
  • A Bibliography of NHFB's Master Collection
    A Bibliography of NHFB's Master Collection Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 27 September 2021 Version 4.40 Title word cross-reference [Cor86]. 16-Bit [Dol79, MW82]. 16/32 [Mot84]. 16/32-Bit [Mot84]. 1883 [Win03a]. 1905 [Rig05]. 1914 [Mar14b]. + [Kle06, Wir76]. 1:13198824 ::: [Vis00]. = 1919 [Mac03]. 1945 [DW46, Sza84]. 1966 [Wir76]. e [Mao94]. E = mc2 [Ame66]. 1974 [Erd74]. 1985 [Ame85]. 1986 [Ame86b]. 1989 [Ame89, AH89]. 198x [Bod00, KN19a]. γ [Gra88].p π [Bec93, Bla97, EL04]. −1 [Nah98]. [Ame87a]. 1991 [MA91]. 1992 [Ame92, Zla92]. 1994 [USE94]. 1999 [CS99]. -GLA [Gra88]. 199x [Ame90]. 19th [BCDH09]. .NET [AHG+04, BS03]. 2 [CLK99b, Chr86, MS87, Wir83]. 2.0 [Kan96]. 20 [Gor81]. 2006 [Ber06]. 2007 00 [Mis90]. 000-year [Mao07]. [SM07]. 2018 [Joh18, Kol19, Mat19a, Mat19b, SK19]. 1 [Knu11, MGH80]. 1.0 [Gra00a]. 1.1 20th [SO11]. 21st [Pin14, Bal97, BB04c]. + [GHLP03]. 1.2 [QO93a]. 10 24-dots [Jap83]. 25th [SBH 04]. 26 [MM07, MMG07]. 100-digit [BLWW04]. [DB04]. 28 [CS99]. 2nd [IEE88]. 101-1983 [Gra83a]. 1057 [IBM86]. 109 [Con05]. 11 [ACHM82, Dig82, EM79, LE80]. 3 1100 [FF78]. 112 [FW07]. 1164/WTL [Gwe96, LS78, Nel91, Sed93, Sum09, Ruc15]. 1 2 3-D [Gwe96]. 3.5-billion-year [Shu08a]. Ada [Ame83a, Ano79b, Ano79a, May82, 32-Bit [Mot84, Mot85a, Mit86, Mot85b]. Pyl81, Weg80, You83]. Adam [Bic09].
    [Show full text]
  • The Altmark Affair Royal Australian
    Title Description Author Conflict "The Navy's here!" : the Altmark affair The story of the Altm ark affair and the Battle of the River Plate. W illi Frischauer and Robert Jackson W W 2 100 Years of RAN A book celebrating 100 years of the Royal Australia Navy. Royal Australian Navy The 173rd Airborne Brigade (Sky Soldiers) is the U.S. Arm y's Contingency 173rd Airborne Brigade Response Force in Europe, Turner Publishing This book covers the dramatic 12 m onths of 1940, each chapter covering 1940 The W orld In Flames the events in chronological order. Richard Collier W W 2 A collection of short stories of day to day survival of Australian soldiers in 1995 Diary Changi Changi prison cam ps. Neil Pigot W W 2 2 NZEF IP 4 Volumes The History of the 2 NZEF Oliver A. Gillespie 2/9 Bn Book of Statistics A Statistical report of the 2/9 Battalion Boyd Redshaw 200 Shots Damian Parer and George Silk and the Australians at W ar in New Guinea. Neil MacDonald W W 2 2194 Days of W ar TAhni sill ucosltleractetiodn c ohfr odnraowloingyg so,f sthke tScheecso nadn dW noortlde sW, marade at odd tim es or Cesare Salmaggi W W 2 whenever possible, is presented in book form with the hope that it will tell something of the Australian Soldier's life and journey with the Sixth Australian Division in northern New Guinea; through Aitape, Mprik and 6th Div Sketches W ewak. James W ieneke 75th Anniversary of Pearl Harbour Honouring the 2 program s used during the 75th Anniversary of the bombing of Pearl Past, Inspiring the Future Programs Harbour.
    [Show full text]
  • The Farm Hall Scientists: the United States, Britain, and Germany in the New Atomic Age, 1945-46
    The Farm Hall Scientists: The United States, Britain, and Germany in the New Atomic Age, 1945-46 by Mary A. McPartland B.A. in History and Spanish, May 2003, Regis University A Dissertation submitted to The Faculty of The Columbian College of Arts and Sciences of The George Washington University in partial fulfillment of the requirements for the degree of Doctor of Philosophy August 31, 2013 Dissertation directed by Hope M. Harrison Associate Professor of History and International Affairs The Columbian College of Arts and Sciences of The George Washington University certifies that Mary Ann McPartland has passed the Final Examination for the degree of Doctor of Philosophy as of July 23, 2013. This is the final and approved form of the dissertation. The Farm Hall Scientists: The United States, Britain, and Germany in the New Atomic Age, 1945-46 Mary A. McPartland Dissertation Research Committee: Hope M. Harrison, Associate Professor of History and International Affairs, Dissertation Director James Hershberg, Professor of History and International Affairs, Committee Member Andrew Zimmerman, Professor of History and International Affairs, Committee Member ii ©Copyright 2013 by Mary A. McPartland All rights reserved iii Acknowledgments Thank you to the many people who have been generous with their knowledge, time, and friendship during the process of researching and writing this dissertation. First and foremost, I thank my adviser, Hope Harrison, for the time she has spent reading, commenting on, and discussing my work, always encouraging me onward. I am very grateful to have had you as my guide on this journey. Feedback from my dissertation committee has also shaped my dissertation for the better.
    [Show full text]
  • R. V. Jones and the Birth of Scientific Intelligence
    R. V. Jones and the Birth of Scientific Intelligence Submitted by James Martinson Goodchild in March 2013 to the University of Exeter as a thesis for the degree of Doctor of Philosophy in History. This thesis is available for public use on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. I certify that all material in this thesis which is not my own has been identified accordingly, and that no material has previously been submitted and approved for the award of degree by any university. ……………………………………………. i Acknowledgements Thanking those, who have in many varied ways contributed to this production, cannot satisfactorily convey my gratitude. Nor can I possibly include all of those who have in their own way advanced my knowledge of history, particularly on the subject of scientific intelligence during the Second World War. To those I have not mentioned in this brief acknowledgement, my gratitude is boundless. The last three and a half years of constant researching, writing, and teaching have been an absolute pleasure, and my companions along the way have made the experiences the more wonderful. My special thanks go to my doctoral supervisors who always encouraged my enthusiasm for the chosen field of research. I owe an enduring debt of gratitude to Professor Richard Toye for instantly noticing the gap in scientific intelligence history that sparked this thesis, and for all his clever insight along the way on the direction of the thesis and my developing career. I also thank Professor Richard Overy, from whom I gained a wealth of knowledge on the Second World War.
    [Show full text]
  • Reginald Victor Jones Was Born on 29 September 1911 at Dulwich, London. As a Child, He Learnt Scottish Songs from His Mother, A
    PROFESSOR REGINALD VICTOR JONES CH, CB, CBE, MA, DPhil(Oxon), HonDSc(Strath,Kent,WestminsterCollege,Aberd), DUniv(York,Open,Surrey), HonLLD(Brist), FRS Reginald Victor Jones was born on 29 September 1911 at Dulwich, London. As a child, he learnt Scottish songs from his mother, and through his father, respect for military traditions. Living close to the Oval, he was a staunch supporter of Surrey Cricket team; his hero was Jack Hobbs. At the age of eight, he contracted diphtheria, which left him permanently deaf in one ear. His Headmaster, R B Henderson, at Alleyn’s School, Dulwich, exhorted service to school, community and country; Reginald Jones was a proud member of the Officers’ Training Corps, and as a hobby enjoyed making radio-receiving sets. Good teaching brought an Open Exhibition to Wadham College, Oxford in 1929. Jones gained a First Class Honours in Natural Science- Physics (1932) and the same year, he was runner-up in pistol-shooting at Bisley. Under Oxford’s Professor of Experimental Philosophy, F A Lindemann, he began research on infrared detectors, being awarded his doctorate at the age of 23. During a subsequent post at Balliol College, Jones was commissioned to develop an infra- red detector for installation in night-fighters for detection of bombers. In 1936 he was appointed a Scientific Officer in the Air Ministry. His duties included trials on the first air-borne television equipment for the RAF, and study of Air Intelligence reports. On his transfer to the Admiralty Research Laboratory, Teddington, he was to meet in 1938 Vera Cain when she chased away a squad of physicists who were trying to dig shelter trenches on her women’s hockey pitch.
    [Show full text]
  • Biographical Index of Former RSE Fellows 1783-2002
    FORMER RSE FELLOWS 1783- 2002 SIR CHARLES ADAM OF BARNS 06/10/1780- JOHN JACOB. ABEL 19/05/1857- 26/05/1938 16/09/1853 Place of Birth: Cleveland, Ohio, USA. Date of Election: 05/04/1824. Date of Election: 03/07/1933. Profession: Royal Navy. Profession: Pharmacologist, Endocrinologist. Notes: Date of election: 1820 also reported in RSE Fellow Type: HF lists JOHN ABERCROMBIE 12/10/1780- 14/11/1844 Fellow Type: OF Place of Birth: Aberdeen. ROBERT ADAM 03/07/1728- 03/03/1792 Date of Election: 07/02/1831. Place of Birth: Kirkcaldy, Fife.. Profession: Physician, Author. Date of Election: 28/01/1788. Fellow Type: OF Profession: Architect. ALEXANDER ABERCROMBY, LORD ABERCROMBY Fellow Type: OF 15/10/1745- 17/11/1795 WILLIAM ADAM OF BLAIR ADAM 02/08/1751- Place of Birth: Clackmannanshire. 17/02/1839 Date of Election: 17/11/1783. Place of Birth: Kinross-shire. Profession: Advocate. Date of Election: 22/01/1816. Fellow Type: OF Profession: Advocate, Barrister, Politician. JAMES ABERCROMBY, BARON DUNFERMLINE Fellow Type: OF 07/11/1776- 17/04/1858 JOHN GEORGE ADAMI 12/01/1862- 29/08/1926 Date of Election: 07/02/1831. Place of Birth: Ashton-on-Mersey, Lancashire. Profession: Physician,Statesman. Date of Election: 17/01/1898. Fellow Type: OF Profession: Pathologist. JOHN ABERCROMBY, BARON ABERCROMBY Fellow Type: OF 15/01/1841- 07/10/1924 ARCHIBALD CAMPBELL ADAMS Date of Election: 07/02/1898. Date of Election: 19/12/1910. Profession: Philologist, Antiquary, Folklorist. Profession: Consulting Engineer. Fellow Type: OF Notes: Died 1918-19 RALPH ABERCROMBY, BARON DUNFERMLINE Fellow Type: OF 06/04/1803- 02/07/1868 JOHN COUCH ADAMS 05/06/1819- 21/01/1892 Date of Election: 19/01/1863.
    [Show full text]