An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Jonathan G. Fiscus, Haiying Guan, Andrew Delgado, Timothee N. Kheyrkhah, Yooyoung Lee, Daniel F. Zhou, Amy Yates
Media forensics is the science and practice of determining the authenticity and establishing the integrity of audio and visual media. DARPA's Media Forensics (MediFor) program brings together world-class researchers to develop technologies for the
Irena Bojanova, Yaacov Yesha, Paul E. Black, Yan Wu
Exposure of sensitive information can be harmful on its own and in addition could enable further attacks. A rigorous and unambiguous definition of information exposure faults can help researchers and practitioners identify them, thus avoiding security
Eric Robertson, Haiying Guan, Mark Kozak, Yooyoung Lee, Amy Yates, Andrew Delgado, Daniel F. Zhou, Timothee N. Kheyrkhah, Jeff Smith, Jonathan G. Fiscus
With the increasing diversity and complexity of media forensics techniques, the evaluation of state-of-the-art detectors are impeded by lacking the metadata and manipulation history ground-truth. This paper presents a novel image/video manipulation
This bulletin summarizes the information found in FIPS 140-3: Security Requirements for Cryptographic Modules which is applicable to all federal agencies that use cryptographic-based security systems to provide adequate information security for all agency
The Fifth Generation (5G) mobile broadband standards make a fundamental shift in cryptography. Prior generations based their security and privacy principally on symmetric key cryptography. The Subscriber Identity Module (SIM) and its successors contain a
Michael Ogata, Josh Franklin, Jeff Voas, Vincent Sritapan, Stephen Quirolgico
Mobile applications are an integral part of our everyday personal and professional lives. As both public and private organizations rely more on mobile applications, ensuring that they are reasonably free from vulnerabilities and defects becomes paramount
Bestoun Ahmed, Amador Pahim, Cleber Rosa, D. Richard Kuhn, Miroslav Bures
Combinatorial interaction testing (CIT) is a well-known technique, but industrial experience is needed to determine its effectiveness in different application domains. We present a case study introducing a unified framework for generating, executing and
Bernhard Garn, Dimitris Simos, Stefan Zimmer, D. Richard Kuhn, Raghu N. Kacker
In this paper, we propose an approach for browser fingerprinting using their behavior during the TLS 1.2 handshake with a server. Using combinatorial methods, we created test sets consisting of TLS server-side messages as sequences that are sent to the
Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Kristen Greene, Susanne M. Furman, Michelle P. Steves, Sandra S. Prettyman
The public safety community has a unique opportunity to improve communication technology for incident response with the creation of the national public safety broadband network (NPSBN). Understanding the problems currently being experienced by first
National Institute of Standards and Technology (NIST), Michael J. Cooper, Kim B. Schaffer
The selective application of technological and related procedural safeguards is an important responsibility of every federal organization in providing adequate security in its computer and telecommunication systems. This standard is applicable to all
Blockchains were designed to solve the problem of double-spending in cryptocurrencies, and the success of the Bitcoin design has generated vastly more interest than previous proposals for digital currencies. Blockchains are being used in other areas as
Sergio Marconi, Sarah J. Graves, Dihong Gong, Shahriari Nia Morteza, Marion Le Bras, Bonnie J. Dorr, Peter Fontana, Justin Gearhart, Craig Greenberg, Dave J. Harris, Sugumar A. Kumar, Agarwal Nishant, Joshi Prarabdh, Sandeep U. Rege, Stephanie A. Bohlman, Ethan P. White, Daisy Z. Wang
In recent years ecology has reached the point where a data science competition could be very productive. Large amounts of open data are increasingly available and areas of shared interest around which to center competitions are increasingly prominent. The
This bulletin summarizes the information found in NIST SP 800-37, Revision 2: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy which provides guidelines for applying the RMF to