Search Results - Security

6 Results Sort By:
A Low-Cost GPS Spoofing Detector and Spoofer Localizer
The ChallengeThirty-one satellites currently in orbit contribute to the Global Positioning System. These satellites are used to calculate the longitude, latitude, and altitude of users. However, the GPS system is vulnerable to spoofing attacks that can migrate the user from the actual signal to the spoofing signal. These attacks can disrupt operations...
Published: 3/15/2021   |   Inventor(s): Yaling Yang, Shinan Liu, Gang Wang
Keywords(s):  
Category(s): Communication, Computer Software, Consumer Products, Transportation, Security, Devices
Mechanisms for Placing Physical Boundaries on Information Access/Storage and Computation of Mobile Devices (Ghost Box)
This research provides the algorithms, mechanisms, and architectures for placing physical boundaries on where commodity mobile devices can access/store information. The research includes algorithms/mechanisms for proximity authentication to prove that a device is in a specific location. Moreover, the work includes secure information jailing mechanisms...
Published: 3/14/2017   |   Inventor(s): Christopher White, Paul Miranda, Hamilton Turner, Daniel Guymon
Keywords(s):  
Category(s): Security
Casuality Analysis and Visualization Methods and Systems for Network Security
Studies estimate that nearly 25% of computers around the world are infected with malware, resulting in billions of dollars of damages. Stealthy malware residing on compromised machines can spy on the user, exfiltrating sensitive information and documents, abusing system and network resources, and disrupting user activities. Patching and scanning are...
Published: 8/12/2014   |   Inventor(s): Danfeng (daphne) Yao, Hao Zhang
Keywords(s):  
Category(s): Computer Software, Security
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
To minimize the exposure of sensitive data and documents, an organization needs to prevent cleartext sensitive data from appearing in the storage or communication. We invent a novel data-leak screening tool that can be deployed to scan computer file systems, server storage, and inspect outbound network traffic for exposed sensitive data. The tool searches...
Published: 1/8/2014   |   Inventor(s): Danfeng (daphne) Yao, Xiaokui Shu, Fang Liu
Keywords(s):  
Category(s): Computer Software, Security
Shepherd AUV
The Shepherd Autonomous Underwater Vehicle (AUV) is a fully autonomous underwater vehicle that is designed for general survey missions. Its design allows the use low friction dynamic seals to prevent catastrophic failure at higher depths.
Published: 7/15/2013   |   Inventor(s): Wayne Neu, Daniel Stilwell, Brian Mccarter, Timothy Pratt, Stephen Portner, Jason Mims, Dexter Malley
Keywords(s):  
Category(s): Devices, Electrical, Energy, Engineering, Environment, Security
A Technique for Synchronized Dynamically Obscured Addresses in IPv6
The Moving Target IPv6 Defense (MT6D) dynamically obscures network and transport layer addresses of packets to achieve anonymity, including authentication privacy, as well as protection against address tracking and traffic correlation. MT6D is an improvement over prior static approaches where, once they have been assigned, addresses remain constant...
Published: 9/5/2012   |   Inventor(s): Stephen Groat, Matthew Dunlop, William Urbanski, Randolph Marchany, Joseph Tront
Keywords(s):  
Category(s): Security