scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2010"


Patent
22 Jun 2010
TL;DR: In this paper, a hand guard attachment assembly for a firearm having a barrel and a receiver fastened to the barrel by a barrel nut is described, which includes a forearm having a monolithic mounting rail/hand guard that is removably connected to the receiver.
Abstract: A hand guard attachment assembly for a firearm having a barrel and a receiver fastened to the barrel by a barrel nut. The hand guard attachment assembly includes a forearm having a monolithic mounting rail/hand guard that is removably connected to the receiver. The monolithic rail/hand guard interfaces with an integral multi-slot mounting portion of the receiver. A cinch block is mated to the slots of the receiver and held in place by the monolithic rail/hand guard. A tension block is mated at one end of the monolithic rail/hand guard and is attached to the cinch block by a fastener to securely hold the monolithic rail/hand guard in place.

73 citations


Journal ArticleDOI
TL;DR: Sybil Guard is presented, a novel protocol for limiting the corruptive influences of Sybil attacks, based on the ―social network‖ among user identities, where an edge between two identities indicates a human-established trust relationship.
Abstract: Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to Sybil attacks. In a Sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the system, the malicious user is able to ―out vote‖ the honest users in collaborative tasks such as Byzantine failure defenses. This paper presents Sybil Guard, a novel protocol for limiting the corruptive influences of Sybil attacks. Our protocol is based on the ―social network‖ among user identities, where an edge between two identities indicates a human-established trust relationship. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionately-small ―cut‖ in the graph between the Sybil nodes and the honest nodes. Sybil Guard exploits this property to bound the number of identities a malicious user can create. We show the effectiveness of Sybil Guard both analytically and experimentally.

66 citations


Patent
28 Apr 2010
TL;DR: A hand guard rail system is fastened to a firearm having a barrel and a barrel nut, with the hand guard rails aligned to the top rail of the firearm as discussed by the authors, by fitting a hand guard and a sleeve to the barrel nut.
Abstract: A hand guard rail system is fastened to a firearm having a barrel and a barrel nut, with the hand guard rail aligned to the top rail of the firearm The hand guard rail system includes a hand guard and a sleeve fitted into the hand guard The sleeve and the hand guard are fastened to the barrel nut, thereby aligning the hand guard to the firearm

61 citations


Patent
20 Oct 2010
TL;DR: In this article, an intelligent control system of building safety, comprising a building and floor entry management system, an entrance guard performing system, a personnel tracking system and an elevator operation system, was presented.
Abstract: The invention discloses an intelligent control system of building safety, comprising a building and floor entry management system, an entrance guard performing system, a personnel tracking system and an elevator operation system, wherein the building and floor entry management system is composed of an information collection system, a data processing and analyzing system, a database information storage system and an information storage and sending system. The intelligent control system adopts RFID identity identification and human face image identification, each floor entry management system adopts the RFID identity identification, and finger identification or iris identification are added in more important occasions so as to greatly improve security level. The personnel tracking system realizes the automatic monitoring and data backup of the activities of personnel in the whole building, can inquire the situation of the activities of personnel of the whole building at any time interval at all times. The elevator operation system operates according to the permission of each electronic tag to further realize the safety control of the building. The control system and method are suitable for important and confidential units, such as military areas of importance, national security agencies, financial systems and the like and are especially suitable for occasions with high security level requirements.

60 citations


Patent
28 Jan 2010
TL;DR: In this paper, a hand guard assembly for securely attaching to a firearm is described, which can include a barrel nut operable to mount the barrel to the upper receiver of the firearm and a receiving channel about an interior portion of the hand guard.
Abstract: Embodiments of the invention can include a hand guard assembly for securely attaching to a firearm. According to one embodiment, a hand guard assembly can be provided for a firearm having an upper receiver and a barrel. The hand guard assembly can include a barrel nut operable to mount the barrel to the upper receiver of the firearm. The hand guard assembly can also include a hand guard having a receiving channel about an interior portion of the hand guard. The receiving channel can be sized and shaped to receive the barrel nut such that the hand guard can be secured to the barrel nut by a securing mechanism when the hand guard is positioned about the barrel of the firearm.

49 citations


Journal ArticleDOI
TL;DR: In this article, the authors root out the raconteurs and listen to them, because it's they who guard the treasure and they can teach you, but only if you are ready.
Abstract: … if you really want to know us, then you have to root out the raconteurs and listen to them. You see, it's they who guard the treasure. They can teach you, but only if you are ready. To hear them,...

44 citations


Patent
10 Jun 2010
TL;DR: In this article, the first writable shingle band is defined as a number of tracks that is a function of a head width, and the guard band of tracks is capable of becoming a writable band.
Abstract: A hard disk drive that includes a disk with data written onto a plurality of tracks, a spindle motor that rotates the disk, and a head that is coupled to the disk. The disk drive also includes a circuit that writes data onto a first writable shingle band of tracks if the first writable shingle band is adjacent to a guard band of tracks. The first writable shingle band includes a number of tracks that is a function of a head width. The guard band of tracks is capable of becoming a writable shingle band. Changing the designation of a shingle band between guard and writable creates floating guard bands. The creation of floating guard bands allows for the writing of a single band without having to move and restore adjacent tracks until reaching a fixed guard band as required in the prior art.

41 citations


Patent
Janne Uusilehto1
02 Sep 2010
TL;DR: In this paper, a method for providing a regional theft guard may include comparing, at a mobile electronic device, current device location to a set of enabled regions defined for the mobile electronic devices.
Abstract: A method for providing a regional theft guard may include comparing, at a mobile electronic device, current device location to a set of enabled regions defined for the mobile electronic device, enabling operation of the mobile electronic device in response to a determination that the mobile electronic device is within an enabled region, and requesting entry of a security code in response to a determination that the mobile electronic device is not within the enabled region. A corresponding apparatus and computer program product are also provided.

33 citations


Patent
14 Jan 2010
TL;DR: In this paper, a modular hand guard assembly is presented that serves both as a hand guard system and as an integrated interface system for mounting various weapon accessories and attachments, such as lights, optics or lasers.
Abstract: A modular hand guard assembly serves both as a hand guard system and as an integrated interface system for mounting various weapon accessories and attachments thereto. The modular hand guard assembly includes a removable forward rail section that can be removed from the forward portion of the hand guard to provide for the installation of additional weapon accessories such as lights, optics or lasers in highly a desirable forward location adjacent to the barrel of the weapon. The modular hand guard assembly further includes a removable lower hand guard to provide access to the barrel of the firearm and an integrated modular switching and control system for use in connection with the various powered accessories mounted thereto.

33 citations


Patent
29 Oct 2010
TL;DR: In this paper, a device and system for restraining detainees through devices attached to the detainees and configured to administer electrical shocks when certain predetermined conditions occur is described, where the restraining devices may be activated by internal control systems or by external controllers that transmit activation signals to the restraining device.
Abstract: There is provided a device and system for restraining detainees through devices attached to the detainees and configured to administer electrical shocks when certain predetermined conditions occur. Restraining devices may be activated by internal control systems or by external controllers that transmit activation signals to the restraining device. External controllers may be actuated by an external controlling entity such as a detention guard or other person or system, or may be controlled by an enabling signal sent by wired or wireless connections to the controller. There is also provided a system for detainee restraint where multiple detainees may be restrained collectively or individually in a controlled environment such as a detention facility, a jail, or a detainee transport vehicle.

32 citations


Journal ArticleDOI
TL;DR: What are the information security risks posed by social media websites in general and Twitter in particular and how quickly the threat is growing and how well the average organisation understands the challenges involved in tackling it?

Patent
19 May 2010
TL;DR: In this article, a receiver detects and recovers data from Orthogonal Frequency Division Multiplexed (OFDM) symbols, the OFDM symbols including a plurality of sub-carrier symbols formed in the frequency domain and transformed into the time domain for transmission.
Abstract: A receiver detects and recovers data from Orthogonal Frequency Division Multiplexed (OFDM) symbols, the OFDM symbols including a plurality of sub-carrier symbols formed in the frequency domain and transformed into the time domain for transmission, the time domain OFDM symbols including a guard interval. The guard interval of the OFDM symbols is one of a plurality of predetermined temporal lengths and the guard interval is formed by repeating time domain samples of the OFDM symbol from useful samples of the OFDM symbols for a period corresponding to the guard interval from the OFDM symbols. The receiver includes a correlator operable to correlate the time domain samples at a separation determined in accordance with the useful samples of the OFDM symbols and for each of a plurality of possible guard intervals combining the correlated samples for a period equal to the guard interval, for a plurality of consecutively received OFDM symbols, to form for each of the possible guard intervals a correlation output value, and a guard interval identifier arranged to receive the output from the correlator and to identify one of the guard intervals used for the received OFDM symbols from the correlation output value for each of the plurality of possible guard intervals. Accordingly in a system such as DVB-T2, where the guard interval is provided in signalling data communicated with the OFDM symbols, the guard interval can be detected without or before the signalling data is detected, thereby reducing a time for detecting the data conveyed by the OFDM symbols or the guard interval and/or improving an integrity with which the guard interval and therefore the data can be detected.

Book
26 May 2010
TL;DR: This practical guide will show you how to implement Spring Security 3 and protect your applications from being breached using a combination of real world, straightforward examples.
Abstract: Secure your web applications against malicious intruders with this easy to follow practical guide Make your web applications impenetrable. Implement authentication and authorization of users. Integrate Spring Security 3 with common external security providers. Packed full with concrete, simple, and concise examples. In Detail Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this. A comprehensive guide to Spring Security 3. You will learn through real world business scenarios how to guard against the latest threats. You will also learn to combine Spring Security 3 with external security providers such as LDAP, OpenID, CAS, Kerberos, and Active Directory. The book starts by giving an overview of security concepts and techniques, as well as setup and configuration. The book then gets you working with a JSP based web application that implements a simple e-commerce website. At this point you will progressively enhance the application giving you hands on experience implementing features of Spring Security 3 in real world business scenarios. The second half of the book is devoted to common integration scenarios that you will come accross every day. At this stage you will be in a position to solve specific, complex integration problems. The book will end by showing migration from Spring Security 2 to 3. This practical guide will show you how to implement Spring Security 3 and protect your applications from being breached using a combination of real world, straightforward examples. What you will learn from this book Recognize design flaws that will make your applications unsafe. Implement basic authorization and credential storage. Move seamlessly from Spring Security 2 to Spring Security 3. Provide Enterprise adaptability with LDAP, Active Directory, and Kerberos. Push the Boundaries of Spring Security 3 through Extension and Customization. Integrate in-house applications and popular Java frameworks with Spring Security 3. Plan the configuration of Spring Security 3 to accommodate the authentication and authorization requirements of your application. Approach The book starts by teaching the basic fundamentals of Spring Security 3 such as setup and configuration. Later it looks at more advanced topics showing the reader how to solve complex real world security issues. Who this book is written for This book is for Java developers who build web projects and applications. The book assumes basic familiarity with Java, XML and the Spring Framework. Newcomers to Spring Security will still be able to utilize all aspects of this book.

Journal ArticleDOI
TL;DR: In this article, the authors discuss four phases of industrial guard development and transformation from the negative image of management surrogate held in 1933 to the positive defender of self, company, and national interests in 1945.
Abstract: From 1865 to 1937 industrial guards (or company police) enforced work rules and engaged in anti-union activities. The National Industrial Recovery Act (1933) and the National Labor Relations Act (1935) introduced workplace democratization. The new political climate and federal laws aided unionization and simultaneously encouraged guards to develop a sense of occupational consciousness. Guard unionization during World War II completed the transformation by conferring employee status and identity. This article discusses four phases of industrial guard development and transformation from the negative image of management surrogate held in 1933 to the positive defender of self, company, and national interests in 1945.

Patent
12 Apr 2010
TL;DR: A self-coiling dent guard for protecting vehicles and other objects from damage caused by unwanted collisions is described in this paper, which is comprised of a main body adapted to absorb the impact of colliding objects.
Abstract: A self-coiling dent guard for protecting vehicles and other objects from damage caused by unwanted collisions is disclosed. The guard is comprised of a main body adapted to absorb the impact of colliding objects. A bistable spring strip is integrated within the main body of the guard, thus giving the guard its self-coiling properties. When not in use, a user may cause the guard to coil so as to be easily stored. A magnetic strip is attached to the length of the main body such that the guard may be removably attached to a vehicle or other object. A layer of felt covering the bottom of the guard protects the vehicle from being scratched when the guard is applied or removed.

Book
17 Sep 2010
TL;DR: In 2008, the Commission on National Guard and Reserves (CNC) report as mentioned in this paper concluded that the U.S. government had "no reasonable alternative" but to rely increasingly on the Guard and reservists as an operational force that could participate routinely in ongoing military missions at home and abroad.
Abstract: : Though the United States required more and more from its National Guard and Reserves after the Sept. 11 attacks, the U.S. government initially failed to recognize the fundamental changes needed to support Guardsmen and Reservists as they deployed repeatedly abroad and protected the homeland. Then, as use of the Guard and Reserves in Afghanistan and Iraq peaked in 2005, Congress created the Commission on the National Guard and Reserves and directed it to evaluate immediate wartime needs as well as enduring U.S. national security interests. The commission's final January 2008 report, featuring six major conclusions and 95 recommendations, concluded that the U.S. government had "no reasonable alternative?" but to rely increasingly on the Guard and Reserves as an operational force that could participate routinely in ongoing military missions at home and abroad. It urged the U.S. government to train, equip and manage the Guard and Reserves in a manner commensurate with their invaluable role in protecting the nation. Two years later, how much progress has the U.S. government made toward implementing the commission's recommendations? To answer this critical question, the Center for a New American Security (CNAS) partnered with the former commissioners to evaluate continuing challenges and to propose potential solutions. To help advance reform efforts, this report identifies and offers recommendations in five thematic areas where further progress is most urgently needed: roles and missions (including homeland response and civil support), readiness, cost, education and the "continuum of service" concept of flexible personnel management.

Patent
Daisuke Nagao1, Ramon Meneses1, Jessica Vera1, Eric Chin1, Hiroyuki Miyazaki1 
01 Oct 2010

Patent
23 Jun 2010
TL;DR: In this article, the authors present techniques for performing maintenance operations, such as garbage collection, on nonvolatile memory systems while still respecting the maximum latency, or time-out, requirements of a protocol.
Abstract: Techniques are presented for performing maintenance operations, such as garbage collection, on non-volatile memory systems will still respecting the maximum latency, or time-out, requirements of a protocol. A safety guard band in the space available for storing host data, control data, or both, is provided. If, on an access of the memory, it is determined that the guard band space is exceeded, the system uses a recovery back to the base state by triggering and prioritising clean-up operations to re-establish all safety guard bands without breaking the timing requirements. To respect these timing requirements, the operations are split into portions and done in a phased manner during allowed latency periods.

Patent
06 May 2010
TL;DR: In this article, a system for policy distribution with partial evaluation to permit/deny access to protected alternatives is presented. But the system is limited to the use of static attributes of the protected alternative.
Abstract: A system controls policy distribution with partial evaluation to permit/deny access to protected alternatives. The system includes a database to store access control policy functions for protected alternatives, a guard to guard access to a protected alternative and construct an access control request including attributes regarding the protected alternative, a policy decider to receive the access control request from the guard, a policy distributor connected to the database and policy decider, to collect the static attributes of the protected alternative, and send them to the policy distributor, which constructs a partial access control request from the static attributes, performs partial evaluation against the stored access control policy function, resulting in a simplified access control policy function, and sends the simplified function to the policy decider, to evaluate access control requests regarding the protected alternative, and return a permit or deny response to the guard.


Proceedings ArticleDOI
11 Dec 2010
TL;DR: A distributed trust based security framework for ad hoc networks is presented and security is enforced by local monitoring system by a new kind of nodes referred as guard nodes, which conforms graceful leave and dynamic secure allocation of IP of the nodes.
Abstract: In mobile ad hoc networks, the security enforcement and its implementation becoming increasingly difficult due to quasi-static nature of the mobile nodes (wireless communication devices), no fixed network topology and more importantly absence of centralized authority. In such networks, communication links between nodes may be bandwidth constrained, messages typically roamed in multi-hoped fashion, nodes may be powered by limited energy source and also have limited physical security. The major challenge in such networks is to give a robust security solution. The complexity of the problem is compounded by the fact that both active and passive attackers may present in the system, and nodes may not function properly in order to save its own energy by selective forwarding of the packets. This paper presents a distributed trust based security framework for ad hoc networks. We have proposed a clustering mechanism and security is enforced by local monitoring system by a new kind of nodes referred as guard nodes. This framework stems from cryptographic computation, which is not suitable in this scenario. The trust is computed depending upon some parameters which have a primary role in enforcing security and cooperation between the nodes. Also this solution conforms graceful leave and dynamic secure allocation of IP of the nodes.

Patent
12 Mar 2010
TL;DR: Hitch guards are provided for spanning a gap formed in a conveying surface between two adjacent rollers as mentioned in this paper, where an elongate mounting member extends across the conveyor belt and has the hitch guard members releasable mounted thereto.
Abstract: Hitch guards are provided for spanning a gap formed in a conveying surface between two adjacent rollers. In one aspect, the hitch guards include hitch guard members positioned side-by-side along the gap. An elongate mounting member extends across the conveyor belt and has the hitch guard members releasable mounted thereto. In another aspect, an elongate hitch guard member extends across the belt width in the gap and includes a laterally elongated recess to capture debris.

Patent
27 Jul 2010
TL;DR: In this article, a front guard is mounted at an angle in front of a wheel of a vehicle and secured through a mounting plate unit to both a side panel and either a frame beam or floor board of the vehicle.
Abstract: A safety guard which functions to push objects lying in the path of a vehicle out of the path of the wheels of the vehicle, such as a school bus, for safety purposes includes a front guard positioned at an angle in front of a wheel of the vehicle and is secured through a mounting plate unit to both a side panel and either a frame beam or floor board of the vehicle, with the frontal guard being supported in a cantilevered manner in front of the wheel. This configuration provides for a substantially universal mounting arrangement that can be particular advantageous in connection with school buses and other vehicles having underbody frame and support structure remote from the vehicle wheel.

Proceedings ArticleDOI
03 Dec 2010
TL;DR: In this article, a new access scheme for an aeronautical mobile ad-hoc network (MANET) is presented, which combines the ideas of nested cellular reuse patterns and variable guard times.
Abstract: In this paper, a new access scheme for an aeronautical mobile ad-hoc network (MANET) is presented. The access scheme combines the ideas of nested cellular reuse patterns and variable guard times. The nested cellular reuse patterns solve the hidden station and the near-far problem whereas variable guard times ensure the efficiency of this particular access scheme. Conventional approaches for coordinated, consecutive transmissions require fixed guard times. Considering aeronautical MANETs with their large dimensions together with typical aeronautical applications having short message durations, fixed guard times are inefficient, since the ratio between massage duration and guard time becomes too small. An algorithm for calculating the variable guard times in a MANET is presented and a lower bound for the mean required guard time is derived. In addition, the question of message collisions that might influence the stability of the algorithm is addressed.

Journal ArticleDOI
TL;DR: In this article, the authors studied the throughput of large-scale decentralized wireless networks with physical layer security constraints and the question of how much throughput needs to be sacrificed for achieving a certain level of security.
Abstract: This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. We consider random networks where the legitimate nodes and the eavesdroppers are distributed according to independent two-dimensional Poisson point processes. The transmission capacity framework is used to characterize the area spectral efficiency of secure transmissions with constraints on both the quality of service (QoS) and the level of security. This framework illustrates the dependence of the network throughput on key system parameters, such as the densities of legitimate nodes and eavesdroppers, as well as the QoS and security constraints. One important finding is that the throughput cost of achieving a moderate level of security is quite low, while throughput must be significantly sacrificed to realize a highly secure network. We also study the use of a secrecy guard zone, which is shown to give a significant improvement on the throughput of networks with high security requirements.

Patent
13 Aug 2010
TL;DR: In this article, the authors present a method for adjusting a guard period in a cellular wireless communication system, to a base station adapted to adjust the guard period, and to a network management entity.
Abstract: The present invention is directed to methods for adjusting a guard period in a cellular wireless communication system, to a base station adapted to adjust a guard period, and to a network management entity for adjusting a guard period. One method comprises the steps: obtaining (S1) an indication of at least one downlink frame for an interference measurement; transmitting (S2) during the at least one indicated downlink frame an interference signal; measuring (S3) interference at least during a part of the guard period succeeding the indicated downlink frame; and setting (S4) at least one of an end time of at least one subsequence.

Patent
22 Mar 2010
TL;DR: In this paper, a mouthpiece for reducing snoring is presented, which includes an upper guard configured to fit over the upper teeth of a user, a lower guard configured over the lower teeth of the user, and a spacer assembly provided between the upper guard or the lower guard to provide an air passage at a middle section of the mouthpiece.
Abstract: A mouthpiece for reducing snoring is provided. The mouthpiece includes an upper guard configured to fit over the upper teeth of a user, a lower guard configured to fit over the lower teeth of the user, a spacer assembly provided between the upper guard or the lower guard to provide an air passage at a middle section of the mouthpiece, a first adjustable assembly attached to the left side of the upper guard and the left side of the lower guard, and a second adjustable assembly attached to the right side of the upper guard and the right side of the lower guard. The first adjustable assembly and the second adjustable assembly are operable to move the lower guard relative to the upper guard.

Patent
01 Dec 2010
TL;DR: In this article, an intelligent automatic control system with household security guard and emergency alarm, which takes a household security maintenance intelligent controller as a core to connect other household intelligent security defense devices, is presented.
Abstract: The invention discloses an intelligent automatic control system with household security guard and emergency alarm, which takes a household security maintenance intelligent controller as a core to connect other household intelligent security defense devices to construct the intelligent automatic control system with household security guard and emergency alarm. The system comprises the household security maintenance intelligent controller having an input end connected with an outgoing defense setting and canceling switch, a wired security defense detector, a wired disaster defense detector, a sleeping defense setting and canceling switch and a portable wireless emergency alarm, and an output end connected with an intelligent network video monitor and a remote control execution device; meanwhile, the household security maintenance intelligent controller is also in two-way communication with a unit/outdoor talk back device and a talk back type emergency alarm, thereby realizing the effectof preventing the invasion with an overall 'emulation' mode, and meeting comprehensive requirements of a modern family to a security guarding product in aspects such as remote alarm, voice talk back,video monitoring, convenient operation and humanized running.

Proceedings ArticleDOI
01 Oct 2010
TL;DR: The security model used during the design of a medium assurance XLG, which is to be deployed between NATO Secret and Mission Secret systems, is described.
Abstract: The eXtensible Markup Language (XML)-Labelling Guard, or XLG in short, offers a solution for cross-domain information exchange in scenarios involving connections from NATO systems to mission systems and between NATO and nonNATO nations or international organizations. The intended function of the XLG is to enable, based on the use of XML security labels, an automated data exchange between two network enclaves belonging to different security domains. In this paper we describe the security model used during the design of a medium assurance XLG, which is to be deployed between NATO Secret and Mission Secret systems.

Proceedings ArticleDOI
TL;DR: The current study suggests several weaknesses in the rear underride guard regulation: the standard allows too much ground clearance, the quasi-static test conditions allow guard designs that fail in narrow overlap crashes, and certifying guards independent of trailers leads to systems with inadequate attachment and chassis strength.
Abstract: Current requirements for rear underride guards on large trucks are set by the National Highway Traffic Safety Administration in Federal Motor Vehicle Safety Standards (FMVSS) 223 and 224. The standards have been in place since 1998, but their adequacy has not been evaluated apart from two series of controlled crash tests. The current study used detailed reviews of real-world crashes from the Large Truck Crash Causation Study to assess the ability of guards that comply with certain aspects of the regulation to mitigate passenger vehicle underride. It also evaluated the dangers posed by underride of large trucks that are exempt from guard requirements. For the 115 cases meeting the inclusion criteria, coded data, case narratives, photographs, and measurements were used to examine the interaction between study vehicles. The presence and type of underride guard was determined, and its performance in mitigating underride was categorized. Overall, almost one-half of the passenger vehicles had underride damage classified as severe or catastrophic. These vehicles accounted for 23 of the 28 in which occupants were killed. For the cases involving trailers with underride guards compliant with one or both FMVSS, guard deformation or complete failure was frequent and most commonly due to weak attachments, buckling of the trailer chassis, or bending of the lateral end of the guard under narrow overlap loading. Most of the truck units studied qualified for at least one of the FMVSS exemptions. The two largest groups were trailers with small wheel setbacks and single-unit straight trucks. Dump trucks represented a particularly hazardous category of straight truck. The current study suggests several weaknesses in the rear underride guard regulation. The standard allows too much ground clearance, the quasi-static test conditions allow guard designs that fail in narrow overlap crashes, and certifying guards independent of trailers leads to systems with inadequate attachment and chassis strength. Additionally, the regulation should be expanded to cover a higher percentage of the large truck fleet.