Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird Nov 2019

Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird

Student Works

Certain Android applications, such as but not limited to malware, conceal their presence from the user, exhibiting a self-hiding behavior. Consequently, these apps put the user’s security and privacy at risk by performing tasks without the user’s awareness. Static analysis has been used to analyze apps for self-hiding behavior, but this approach is prone to false positives and suffers from code obfuscation. This research proposes a set of three tools utilizing a dynamic analysis method of detecting self-hiding behavior of an app in the home, installed, and running application lists on an Android emulator. Our approach proves both highly accurate …


Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers Oct 2019

Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers

Student Works

Android applications that conceal themselves from a user, defined as exhibiting a “self-hiding behavior,” pose a threat to the user’s privacy, as these applications can live on a device undetected by the user. Malicious applications can do this to execute without being found by the user. Three lists are analyzed in particular—the home, running, and installed lists—as they are directly related to the typical Android app life cycle. Additionally, self-hiding behavior in the device admin list is analyzed due to the potential for catastrophic actions to be taken by device admin malware. This research proposes four dynamic analysis tools that …


The Business Case For Industrial Safety: Revealing The Comprehensive Value Of Ergonomic Investments For Manufacturing Enterprises In Industry 4.0, Shane Stan Oct 2019

The Business Case For Industrial Safety: Revealing The Comprehensive Value Of Ergonomic Investments For Manufacturing Enterprises In Industry 4.0, Shane Stan

Honors Theses

How can today’s manufacturing enterprises construct, implement, and optimize modern safety initiatives in a manner that will present maximum return on investment and facilitate enterprise growth? Furthermore, how can these manufacturers assure individual ergonomic investments become part of a larger strategy to facilitate organizational change in safety? This work addresses these questions by placing industrial ergonomics in a business improvement context which comprehensively presents the financial returns and growth opportunities poised by modern safety initiatives. Additionally, to further strengthen the business case for industrial safety, an ergonomic action planning framework is established to guide the creation of holistic safety programs …


Comparing Defeasible Argumentation And Non-Monotonic Fuzzy Reasoning Methods For A Computational Trust Problem With Wikipedia, Ryan Kirwan Jan 2019

Comparing Defeasible Argumentation And Non-Monotonic Fuzzy Reasoning Methods For A Computational Trust Problem With Wikipedia, Ryan Kirwan

Dissertations

Computational trust is an ever-more present issue with the surge in autonomous agent development. Represented as a defeasible phenomenon, problems associated with computational trust may be solved by the appropriate reasoning methods. This paper compares two types of such methods, Defeasible Argumentation and Non-Monotonic Fuzzy Logic to assess which is more effective at solving a computational trust problem centred around Wikipedia editors. Through the application of these methods with real-data and a set of knowledge-bases, it was found that the Fuzzy Logic approach was statistically significantly better than the Argumentation approach in its inferential capacity.