Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

The Free Education Project: Higher Education Funding, E2 Implementation, And Crowdsourcing Crypto Development, Louis Carter, John R. Ziegler, Ovidui Purice, Edward Lehner Ph.D. Dec 2019

The Free Education Project: Higher Education Funding, E2 Implementation, And Crowdsourcing Crypto Development, Louis Carter, John R. Ziegler, Ovidui Purice, Edward Lehner Ph.D.

Publications and Research

This short paper, written in three different sections, explores how a cryptocurrency’s issuance and network effects could fund higher education. Synthesizing research from the Bronx Community College Cryptocurrency Research Lab, Bernard Lietaer’s notion of creating money for the needs of society, lessons learned by Galia Benartzi and the Hearts Project, and an exploration of how communities coalesce around open-source cryptocurrency projects, the authors provide an overview of the problem of funding higher education, the ways in which money that is needed could be created, and the key components to building a highly effective developer community. These three distinct ...


Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe Mar 2019

Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe

Electrical & Computer Engineering and Computer Science Faculty Publications

In this work we present a primary account of frameup, an incriminatory attack made possible because of existing implementations in distributed peer to peer storage. The frameup attack shows that an adversary has the ability to store unencrypted data on the hard drives of people renting out their hard drive space. This is important to forensic examiners as it opens the door for possibly framing an innocent victim. Our work employs Storj as an example technology, due to its popularity and market size. Storj is a blockchain enabled system that allows people to rent out their hard drive space to ...


Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger Jan 2019

Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional “dead” analysis. Following the trend of antiforensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also ...