Publications

Refine Results

(Filters Applied) Clear All

Unmanned aircraft sense and avoid radar: surrogate flight testing performance evaluation

Summary

Unmanned aircraft systems (UAS) have proven to have distinct advantages compared to manned aircraft for a variety of tasks. Current airspace regulations require a capability to sense and avoid other aircraft to replace the ability of a pilot to see and avoid other traffic. A prototype phased-array radar was developed and tested to demonstrate a capability to support the sense and avoid (SAA) requirement and to validate radar performance models. Validated radar models enable evaluation of other radar systems in simulation. This paper provides an overview of the unique radar technology, and focuses on radar performance and model validation as demonstrated through a flight testing campaign. Performance results demonstrate that the prototype SAA radar system can provide sufficient accuracy to sense avoid non-cooperative aircraft.
READ LESS

Summary

Unmanned aircraft systems (UAS) have proven to have distinct advantages compared to manned aircraft for a variety of tasks. Current airspace regulations require a capability to sense and avoid other aircraft to replace the ability of a pilot to see and avoid other traffic. A prototype phased-array radar was developed...

READ MORE

Development and use of a comprehensive humanitarian assessment tool in post-earthquake Haiti

Summary

This paper describes a comprehensive humanitarian assessment tool designed and used following the January 2010 Haiti earthquake. The tool was developed under Joint Task Force -- Haiti coordination using indicators of humanitarian needs to support decision making by the United States Government, agencies of the United Nations, and various non-governmental organizations. A set of questions and data collection methodology were developed by a collaborative process involving a broad segment of the Haiti humanitarian relief community and used to conduct surveys in internally displaced person settlements and surrounding communities for a four-month period starting on 15 March 2010. Key considerations in the development of the assessment tool and data collection methodology, representative analysis results, and observations from the operational use of the tool for decision making are reported. The paper concludes with lessons learned and recommendations for design and use of similar tools in the future.
READ LESS

Summary

This paper describes a comprehensive humanitarian assessment tool designed and used following the January 2010 Haiti earthquake. The tool was developed under Joint Task Force -- Haiti coordination using indicators of humanitarian needs to support decision making by the United States Government, agencies of the United Nations, and various non-governmental...

READ MORE

Robust keys from physical unclonable functions

Published in:
Proc. 2014 IEEE Int. Symp. on Hardware-Oriented Security and Trust, HOST, 6-7 May 2014.

Summary

Weak physical unclonable functions (PUFs) can instantiate read-proof hardware tokens (Tuyls et al. 2006, CHES) where benign variation, such as changing temperature, yields a consistent key, but invasive attempts to learn the key destroy it. Previous approaches evaluate security by measuring how much an invasive attack changes the derived key (Pappu et al. 2002, Science). If some attack insufficiently changes the derived key, an expert must redesign the hardware. An unexplored alternative uses software to enhance token response to known physical attacks. Our approach draws on machine learning. We propose a variant of linear discriminant analysis (LDA), called PUF LDA, which reduces noise levels in PUF instances while enhancing changes from known attacks. We compare PUF LDA with standard techniques using an optical coating PUF and the following feature types: raw pixels, fast Fourier transform, short-time Fourier transform, and wavelets. We measure the true positive rate for valid detection at a 0% false positive rate (no mistakes on samples taken after an attack). PUF LDA improves the true positive rate from 50% on average (with a large variance across PUFs) to near 100%. While a well-designed physical process is irreplaceable, PUF LDA enables system designers to improve the PUF reliability-security tradeoff by incorporating attacks without redesigning the hardware token.
READ LESS

Summary

Weak physical unclonable functions (PUFs) can instantiate read-proof hardware tokens (Tuyls et al. 2006, CHES) where benign variation, such as changing temperature, yields a consistent key, but invasive attempts to learn the key destroy it. Previous approaches evaluate security by measuring how much an invasive attack changes the derived key...

READ MORE

Digital pixel CMOS focal plane array with on-chip multiply accumulate units for low-latency image processing

Published in:
SPIE, Vol. 9070, Infrared Technology and Applications XL, 5 May 2014, 90703B.

Summary

A digital pixel CMOS focal plane array has been developed to enable low latency implementations of image processing systems such as centroid trackers, Shack-Hartman wavefront sensors, and Fitts correlation trackers through the use of in-pixel digital signal processing (DSP) and generic parallel pipelined multiply accumulate (MAC) units. Light intensity digitization occurs at the pixel level, enabling in-pixel DSP and noiseless data transfer from the pixel array to the peripheral processing units. The pipelined processing of row and column image data prior to off chip readout reduces the required output bandwidth of the image sensor, thus reducing the latency of computations necessary to implement various image processing systems. Data volume reductions of over 80% lead to sub 10us latency for completing various tracking and sensor algorithms. This paper details the architecture of the pixel-processing imager (PPI) and presents some initial results from a prototype device fabricated in a standard 65nm CMOS process hybridized to a commercial off-the-shelf short-wave infrared (SWIR) detector array.
READ LESS

Summary

A digital pixel CMOS focal plane array has been developed to enable low latency implementations of image processing systems such as centroid trackers, Shack-Hartman wavefront sensors, and Fitts correlation trackers through the use of in-pixel digital signal processing (DSP) and generic parallel pipelined multiply accumulate (MAC) units. Light intensity digitization...

READ MORE

Spectral subgraph detection with corrupt observations

Published in:
Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP, 4-9 May 2014.

Summary

Recent work on signal detection in graph-based data focuses on classical detection when the signal and noise are both in the form of discrete entities and their relationships. In practice, the relationships of interest may not be directly observable, or may be observed through a noisy mechanism. The effects of imperfect observations add another layer of difficulty to the detection problem, beyond the effects of typical random fluctuations in the background graph. This paper analyzes the impact on detection performance of several error and corruption mechanisms for graph data. In relatively simple scenarios, the change in signal and noise power is analyzed, and this is demonstrated empirically in more complicated models. It is shown that, with enough side information, it is possible to fully recover performance equivalent to working with uncorrupted data using a Bayesian approach, and a simpler cost-optimization approach is shown to provide a substantial benefit as well.
READ LESS

Summary

Recent work on signal detection in graph-based data focuses on classical detection when the signal and noise are both in the form of discrete entities and their relationships. In practice, the relationships of interest may not be directly observable, or may be observed through a noisy mechanism. The effects of...

READ MORE

Wind Information Requirements for NextGen Applications - Phase 2 Final Report(7.63 MB)

Summary

Accurate wind information is of fundamental importance to some of the critical future air traffic concepts envisioned under the FAA’s Next Generation Air Transportation System (NextGen) initiative. In the first phase of this work, a Wind Information Analysis Framework was developed to help explore the relationship of wind information to NextGen application performance. A refined version of the framework has been developed for the Phase 2 work.
READ LESS

Summary

Accurate wind information is of fundamental importance to some of the critical future air traffic concepts envisioned under the FAA’s Next Generation Air Transportation System (NextGen) initiative. In the first phase of this work, a Wind Information Analysis Framework was developed to help explore the relationship of wind information to...

READ MORE

Adaptive attacker strategy development against moving target cyber defenses

Summary

A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-day exploits into existence. Attacker response to two defender temporal platform migration scheduling policies are examined. In the first defender scheduling policy, the defender selects the active platform in each match uniformly at random from a pool of available platforms. In the second policy the defender schedules each successive platform to maximize the diversity of the source code presented to the attacker. Adaptive attacker response strategies are modeled by finite state machine (FSM) constructs that evolve during simulated play against defender strategies via an evolutionary algorithm. It is demonstrated that the attacker learns to invest heavily in exploit creation for the platform with the least similarity to other platforms when faced with a diversity defense, while avoiding investment in exploits for this least similar platform when facing a randomization defense. Additionally, it is demonstrated that the diversity-maximizing defense is superior for shorter duration attacker-defender engagements, but performs sub-optimally in extended attacker-defender interactions.
READ LESS

Summary

A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the...

READ MORE

Impact ionization in AlxGa1-xASySb1-y avalanche photodiodes

Summary

Avalanche photodiodes (APDs) have been fabricated in order to determine the impact ionization coefficients of electrons (alpha) and holes (beta) in AlxGa1-xAsySb1-y lattice matched to GaSb for three alloy compositions: (x=0.40, y=0.035), (x=0.55, y=0.045), and (x=0.65, y=0.054). The impact ionization coefficients were calculated from photomultiplication measurements made on specially designed APDs, which allowed for both pure electron and pure hole injection in the same device. Photo-multiplication measurements were made at temperatures ranging from 77K to 300K for all three alloys. A quasi-physical model with an explicit temperature dependence was used to express the impact ionization coefficients as a function of electric-field strength and temperature. For all three alloys, it was found that alpha < beta at any given temperature. In addition, the values of the impact ionization coefficients were found to decrease as the aluminum concentration of the AlGaAsSb alloy was increased. A value between 1.2 and 4.0 was found for beta/x, which is dependent on temperature, alloy composition, and electric-field strength.
READ LESS

Summary

Avalanche photodiodes (APDs) have been fabricated in order to determine the impact ionization coefficients of electrons (alpha) and holes (beta) in AlxGa1-xAsySb1-y lattice matched to GaSb for three alloy compositions: (x=0.40, y=0.035), (x=0.55, y=0.045), and (x=0.65, y=0.054). The impact ionization coefficients were calculated from photomultiplication measurements made on specially designed...

READ MORE

LuminoCity: a 3D printed, illuminated city generated from LADAR data

Published in:
TePRA 2014: IEEE Int. Conf. on Tech. for Practical Robot Appl., 14-15 April 2014.

Summary

In this work, we describe LuminoCity, a novel three-dimensional data display. A 3D printed model of Cambridge, MA was generated from LADAR data. A translucent plastic model was then cast from a mold of the 3D printed model. We developed a display system to project data onto the translucent model, and we can project a wide range of analyses onto the city, including satellite imagery and network traffic.
READ LESS

Summary

In this work, we describe LuminoCity, a novel three-dimensional data display. A 3D printed model of Cambridge, MA was generated from LADAR data. A translucent plastic model was then cast from a mold of the 3D printed model. We developed a display system to project data onto the translucent model...

READ MORE

Strategic evolution of adversaries against temporal platform diversity active cyber defenses

Published in:
2014 Spring Simulation Multi-Confernece, SpringSim 2014, 13-16 April 2014.

Summary

Adversarial dynamics are a critical facet within the cyber security domain, in which there exists a co-evolution between attackers and defenders in any given threat scenario. While defenders leverage capabilities to minimize the potential impact of an attack, the adversary is simultaneously developing countermeasures to the observed defenses. In this study, we develop a set of tools to model the adaptive strategy formulation of an intelligent actor against an active cyber defensive system. We encode strategies as binary chromosomes representing finite state machines that evolve according to Holland's genetic algorithm. We study the strategic considerations including overall actor reward balanced against the complexity of the determined strategies. We present a series of simulation results demonstrating the ability to automatically search a large strategy space for optimal resultant fitness against a variety of counter-strategies.
READ LESS

Summary

Adversarial dynamics are a critical facet within the cyber security domain, in which there exists a co-evolution between attackers and defenders in any given threat scenario. While defenders leverage capabilities to minimize the potential impact of an attack, the adversary is simultaneously developing countermeasures to the observed defenses. In this...

READ MORE