Timothy J. Shimeall

Learn More
Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder. Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is granted, provided the copyright and " No Warranty " statements are included with all reproductions and derivative works.
The increased use of botnets as an attack tool and the awareness attackers have of blocking lists leads to the question of whether we can effectively predict future bot locations. To that end, we introduce a network quality that we term uncleanliness: an indicator of the propensity for hosts in a network to be compromised by outside parties. We hypothesize(More)
Software fault tree is a graphical analysis technique that is based on the concept of axiomatic verification. A template-based approach to software fault tree analysis was proposed for Ada83 programs. For the past years since this approach, no noticeable extensions or revisions on the template-based software fault tree analysis have been proposed while the(More)
Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of United States Department of Homeland Security or the United States Department of Defense. This material has been approved for public release and unlimited distribution except as restricted below.(More)
This paper presents the results of a n empirical study of software e r r o r detection using self checks and N-version voting. A total of 24 graduate students in computer science at the University of Vir-ginia and the University of California, Irvine, were hired a s programmers. Working independently, each first prepared a set of self checks using just the(More)
MURPHY is a language-independent, experimental methodology for building safety-critical, real time software, which will include an integrated tool set. Using Ada as an example, this paper presents a technique for verifying the safety of complex, real-time software using Software Fault Tree Analysis. The templates for Ada are presented along with an example(More)
The growing reliance on technological infrastructures has made organizations increasingly vulnerable to threats from trusted employees, former employees, current or former contractors, and clients. Recent research indicates that successful defense from these threats depends on both technical and behavioral controls. In this paper, we report on our work to(More)