Refine Your Search


Search Results

Journal Article

Threat Identification and Defense Control Selection for Embedded Systems

Abstract Threat identification and security analysis have become mandatory steps in the engineering design process of high-assurance systems, where successful cyberattacks can lead to hazardous property damage or loss of lives. ...This article describes a novel approach to perform security analysis on embedded systems modeled at the architectural level. The tool, called Security Threat Evaluation and Mitigation (STEM), associates threats from the Common Attack Pattern Enumeration and Classification (CAPEC) library with components and connections and suggests potential defense patterns from the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 security standard. ...The tool, called Security Threat Evaluation and Mitigation (STEM), associates threats from the Common Attack Pattern Enumeration and Classification (CAPEC) library with components and connections and suggests potential defense patterns from the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 security standard. This article also provides an illustrative example based on a drone package delivery system modeled in AADL.
Research Report

Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights

However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality. ...Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. ...Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality.

Tech Briefs: June 2018

Low-Cost Ground Sensor Network for Intrusion Detection COTS-based system could provide increased level of security with less manpower. In-Network Processing on Low-Cost IoT Nodes for Maritime Surveillance Commercially available system of distributed wireless sensors could increase the Navy's intelligence collection footprint.

SAE Truck & Off-Highway Engineering: April 2018

Editorial 'Heavy' topics on tap for WCX18 Hackers aim to exploit vulnerabilities in CVs, pushing security to the forefront Generative design software exploits AI to change how new vehicles, equipment are designed SwRI's ECTO-Lab bridges gap in catalyst and aftertreatment development Diesel reigns as alternatives expand their role in commercial trucks AKG R&D center boasts unique large-radiator thermal shock test stand JCB reveals new range of crawler excavators, first fully-electric mini excavator Medium-duty truck market heats up

Cybersecurity Guidebook for Cyber-Physical Vehicle Systems

Appendix I - Describes some existing security test tools of potential interest to the vehicle industry. Refer to the definitions section to understand the terminology used throughout the document.

Counterfeit Parts and Their Impact on the Supply Chain, Second Edition

Why should the supply chain be concerned if their buyers or subcontractors are purchasing counterfeit electronic parts or if their products contain counterfeit electronic parts? If these parts end up in items that are safety critical and security-risk sensitive such as aviation, space, and defense products, whole secure systems can be comprised. As organizations have become aware of counterfeit parts, one of their responses may be to test upon acceptance or prior to receipt. But testing alone may not detect all counterfeits. Possible sources of counterfeits include products that did not meet quality control requirements and were not destroyed, overruns sold into the market place, unauthorized production shifts, theft, and e-waste. The counterfeited electronic part ends up in the supply chain when ordered by an unsuspecting buyer, who does not confirm the originating source of the part.

Aerospace & Defense Technology: December 2020

How Solid-State Technology Impacts A&D Equipment Testing The Role of Prototype/Test Systems in Next-Generation C5ISR Development Using Advanced Computational Engineering Software to Meet Aerospace & Defense Industry Challenges How Advanced Vacuum Bag Kits Streamline Composite Parts Manufacturing Replacing Multiple RF Receivers with Just One Using Channelization Air Force Technology Tracks "Sporadic E" Progress on Zirconia-Polyurea Matrix Hybrid Composites Incorporating zirconia particles into polyurea elastomers to form hybrid composites and designing them into state-of-the-art body armor has the potential to achieve lightweight ballistic efficiency. Bioenvironmental Engineering Guide for Composite Materials Developing a comprehensive baseline for identifying, evaluating, and controlling occupational and environmental hazards associated with composite fibers and materials for base-level Bioenvironmental Engineering (BE) personnel.

Aerospace & Defense Technology: February 2020

Rad-Hard Microelectronics for Space Applications Outsourcing Plasma Treatments for Surface Modification Adding Context to Full-Motion Video for Improved Surveillance and Situational Awareness Implementing an Aerospace Factory of the Future 90° Hybrid Coupled Power Amplifier - Pros and Cons A New Network Design for the "Internet from Space" Future Advances in Electronic Materials and Processes - Flexible Hybrid Electronics Despite progress being made, there are still significant obstacles to the manufacture and use of flexi-ble hybrid electronics in military applications. Heterogeneous Integration Technology Integrating different types of devices and materials could increase their functional density, improving the performance of electro-optic systems for sensor applications. The Impact of Cyber Cameras on the Intelligence Community The ability to covertly access and manipulate cyber cameras could provide valuable strategic data for the US intelligence community.

Aerospace & Defense Technology: October 2019

Artificial Intelligence and Autonomous Vehicles A "STEP" Forward for Product Lifecycle Management The Challenge of Replacing Hard Chrome Defining an Open System Architecture Standard for Defense Systems Solid-State Microwave Power Module Defeating Commercial Drone Threats with Open-Source SDR Influence of Leading-Edge Oscillatory Blowing on Time-Accurate Dynamic Store Separation Developing an understanding of, and potentially controlling, pitch bifurcation of a store release from an aircraft during flight could improve weapons delivery. Green's Function Extraction from Atmospheric Acoustic Propagation Understanding what affects acoustic waves propagating in the atmosphere is important for a variety of military applications including the development of new remote sensing techniques.

Tech Briefs: September 2018

Enhanced SATCOMs for Unmanned Aerial Systems The Bus Too Tough to Die Combating Infrared Threats on the Battlefield Optical Interconnect Design Challenges in Space High-Performance Computing for the Next-Generation Combat Vehicle Merging Antenna and Electronics Boosts Energy and Spectrum Efficiency Integrated Magneto-Optical Devices for On-Chip Photonic Systems Development of magneto-optical (MO) materials could lead to a range of nonreciprocal optical devices for emerging standardized photonic integrated circuit (PIC) fabrication processes. Low Power Optical Phase Array Using Graphene on Silicon Photonics Electrostatic doping of 2D materials embedded in waveguides could enable ultrafast devices with unprecedented power. Spatial Resolution and Contrast of a Focused Diffractive Plenoptic Camera New technology captures spectral and spatial information of a scene in one snapshot while raising pixel counts and improving image quality.

Tech Briefs: October 2018

Detecting Drones with Doppler-Based Radar Digital Transformation for a Connected Enterprise Using Electromagnetic Brakes to Keep Thrust Reversers in Place Thermostatic Solutions for Temperature Control Applications Bringing RF into the Embedded World: It's Time Compact Power Amplifier Solution for Electronic Warfare Burner Rig Testing of A500® C/SiC Test method simulates, in a laboratory environment, the service conditions ceramic-matrix composite material would experience in turbine engine exhaust applications. Space Debris Orbit and Attitude Prediction for Enhanced and Efficient Space Situational Awareness Developing accurate models to predict the behavior of manmade debris in space could be the key to preventing collisions with satellites. Maintaining Enterprise Resiliency Via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS) Implementing new technologies to create a more resilient, secure cloud computing environment.

Tech Briefs: August 2018

Designing a High-Speed Decoy Unmanned Aerial Vehicle (UAV) Using Thermoplastics in Aerospace Applications In-Flight Real-Time Avionics Adaptation Using Turbine Flow Meters for Aerospace Test and Measurement Applications Communicating from Space: The Front End of Multiscale Modeling Laser-Based System Could Expand Space-to-Ground Communication Hydraulic Testing of Polymer Matrix Composite 102mm Tube Section Research could lead to development of a composite material that can be processed at a low temperature and still be used at 1000°F. Permeation Tests on Polypropylene Fiber Materials Study attempts to determine if polypropylene nanofiber materials can be used in air filtration systems to remove toxic vapors. Inter-Laboratory Combat Helmet Blunt Impact Test Method Comparison Ensuring consistent test methods could reduce the risk of head injuries.

Tech Briefs: May 2018

New Technologies Tackle UAV Challenges Robotic Applique Kits Leverage Existing Assets Educating UGVs Implementing AI Advancements in Thermal Image Training Data Sets Protecting Critical Data on Unmanned Underwater Platforms Advancements Made to the Wingman Software-in-the-Loop (SIL) Simulation: How to Operate the SIL New features include the creation of virtual environments that match real-world gunnery test courses. Soldier-Robot Team Communication: An Investigation of Exogenous Orienting Visual Display Cues and Robot Reporting Preferences The effective use of robots to conduct dangerous missions depends on accurate man-machine communications. Soft Robotic Fish Swims Alongside Real Ones in Coral Reefs GPS Enabled Semi-Autonomous Robot Combining GPS signals with acoustic and encoder data gives a robot the ability to determine its location and orientation within a reference frame.

Automatic Target Recognition, Third Edition

This third edition of Automatic Target Recognition provides a roadmap for breakthrough ATR designs―with increased intelligence, performance, and autonomy. Clear distinctions are made between military problems and comparable commercial deep-learning problems. These considerations need to be understood by ATR engineers working in the defense industry as well as by their government customers. A reference design is provided for a next-generation ATR that can continuously learn from and adapt to its environment. The convergence of diverse forms of data on a single platform supports new capabilities and improved performance. This third edition broadens the notion of ATR to multisensor fusion. Radical continuous-learning ATR architectures, better integration of data sources, well-packaged sensors, and low-power teraflop chips will enable transformative military designs.

Tech Briefs: April 2018

Laser Detecting Systems Enhancing Survivability and Lethality on the Battlefield Designing With Plastics for Military Equipment Engine Air-Brakes Paving the Way to Quieter Aircraft Nett Warrior Enhancing Battlefield Connectivity and Communications XPONENTIAL 2018 - An AUVSI Experience Communications in Space: A Deep Subject First Air-Worthy Metal-Printed RF Filter Ready for Takeoff Validation of Automated Prediction of Blood Product Needs Algorithm Processing Continuous Non-Invasive Vital Signs Streams (ONPOINT4) Using a combination of non-invasive sensors, advanced algorithms, and instruments built for combat medics could reduce hemorrhaging and improve survival rates. Calculation of Weapon Platform Attitude and Cant Using Available Sensor Feedback Successful development of mobile weapon systems must incorporate operation on sloped terrain.

Aerospace & Defense Technology: August 2021

Thermal Management Techniques in Avionics Cooling Curing the Porosity Problem in Additive Manufacturing Space-Qualified Crystal Oscillators Reimagining Automated Test During a Pandemic EW: New Challenges, Technologies, and Requirements Software Enables New-Age, Flexible Test Solution for Analog and Digital Radios Formal Process Modeling to Improve Human-Decision-Making During Test and Evaluation Range Control Using the Innoslate software tool to formally model the process of conducting test range events can expose previously overlooked ambiguities and identify high-value decision points? Test and Evaluation of Autonomy for Air Platforms Tools, approaches, and insights to confidently approach the safe, secure, effective, and efficient testing of autonomy on air platforms.