Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion DetectionFree, publicly-accessible full text available February 28, 2026
-
null (Ed.)Access control and information flow are the two building blocks in the design of secure software. Of the two, access control seems ubiquitous, being widely used in operating systems, databases, firewalls, servers, web applications, and so on. The successes of information flow seem less obvious, and its benefits and potential underappreciated. Yet, when it comes to defending against malicious code, access control based defenses have proved susceptible to evasion, or they end up being so restrictive as to interfere with legitimate use. In this talk, I will argue that defenses based on information flow can be more discerning, as they utilize not only the operations performed but also their context, e.g., whether malicious actors could be exerting control over these operation or their key arguments. I will then describe successful applications of information flow to defend against every stage of a cyber attack campaign, including: (a) exploit mitigation for a wide range of software vulnerabilities, (b) malware containment across diverse OSes, including Linux, BSD, and Windows XP through Windows 10, and (c) attack campaign reconstruction, where we achieve a five to six orders of magnitude data reduction by applying our techniques.more » « less
-
Abstract In order to understand the characteristics of long‐lasting “C‐type” structure in the Sodium (Na) lidargram, six cases from different observational locations have been analyzed. The Na lidargram, collected from low‐, middle‐, and high‐latitude sites, show long lifetime of the C‐type structures which is believed to be the manifestation of Kelvin‐Helmholtz (KH) billows in the Mesosphere and Lower Thermosphere (MLT) region. In order to explore the characteristics of the long‐lasting C‐type structures, the altitude profile of square of Brunt‐Väisälä frequency in the MLT region has been derived using the temperature profile collected from the Na lidar instruments and the SABER instrument onboard TIMED satellite. It is found to be positive in the C‐type structure region for all the six cases which indicates that the regions are convectively stable. Simultaneous wind measurements, which allowed us to calculate the Richardson numbers and Reynolds numbers for three cases, suggest that the regions where the C‐type structure appeared were dynamically stable and nonturbulent. This paper brings out a hypothesis wherein the low temperature can increase the magnitude of the Prandtl number and convectively stable atmospheric region can cause the magnitude of Reynolds number to decrease. As a consequence, the remnant of previously generated KH billows in nearly “frozen‐in” condition can be advected through this conducive region to a different location by the background wind where they can sustain for a long time without much deformation. These long‐lived KH billows in the MLT region will eventually manifest the long‐lasting C‐type structures in the Na lidargram.more » « less
An official website of the United States government

Full Text Available