Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 3 of 3
Full-Text Articles in Engineering
The Free Education Project: Higher Education Funding, E2 Implementation, And Crowdsourcing Crypto Development, Louis Carter, John R. Ziegler, Ovidui Purice, Edward Lehner Ph.D.
The Free Education Project: Higher Education Funding, E2 Implementation, And Crowdsourcing Crypto Development, Louis Carter, John R. Ziegler, Ovidui Purice, Edward Lehner Ph.D.
Publications and Research
This short paper, written in three different sections, explores how a cryptocurrency’s issuance and network effects could fund higher education. Synthesizing research from the Bronx Community College Cryptocurrency Research Lab, Bernard Lietaer’s notion of creating money for the needs of society, lessons learned by Galia Benartzi and the Hearts Project, and an exploration of how communities coalesce around open-source cryptocurrency projects, the authors provide an overview of the problem of funding higher education, the ways in which money that is needed could be created, and the key components to building a highly effective developer community. These three distinct yet vitally …
Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe
Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe
Electrical & Computer Engineering and Computer Science Faculty Publications
In this work we present a primary account of frameup, an incriminatory attack made possible because of existing implementations in distributed peer to peer storage. The frameup attack shows that an adversary has the ability to store unencrypted data on the hard drives of people renting out their hard drive space. This is important to forensic examiners as it opens the door for possibly framing an innocent victim. Our work employs Storj as an example technology, due to its popularity and market size. Storj is a blockchain enabled system that allows people to rent out their hard drive space …
Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger
Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional “dead” analysis. Following the trend of antiforensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also capable …