Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury Dec 2019

Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury

Boise State University Theses and Dissertations

Differential power analysis attacks are special kinds of side-channel attacks where power traces are considered as the side-channel information to launch the attack. These attacks are threatening and significant security issues for modern cryptographic devices such as smart cards, and Point of Sale (POS) machine; because after careful analysis of the power traces, the attacker can break any secured encryption algorithm and can steal sensitive information.

In our work, we study differential power analysis attack using two popular neural networks: Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN). Our work seeks to answer three research questions(RQs):

RQ1: Is it …


Minos: Unsupervised Netflow-Based Detection Of Infected And Attacked Hosts, And Attack Time In Large Networks, Mousume Bhowmick Aug 2019

Minos: Unsupervised Netflow-Based Detection Of Infected And Attacked Hosts, And Attack Time In Large Networks, Mousume Bhowmick

Boise State University Theses and Dissertations

Monitoring large-scale networks for malicious activities is increasingly challenging: the amount and heterogeneity of traffic hinder the manual definition of IDS signatures and deep packet inspection. In this thesis, we propose MINOS, a novel fully unsupervised approach that generates an anomaly score for each host allowing us to classify with high accuracy each host as either infected (generating malicious activities), attacked (under attack), or clean (without any infection). The generated score of each hour is able to detect the time frame of being attacked for an infected or attacked host without any prior knowledge. MINOS automatically creates a personalized traffic …


Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader Aug 2019

Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader

Boise State University Theses and Dissertations

This work explores the attributes, properties, and potential uses of generative neural networks within the realm of encoding semantics. It works toward answering the questions of: If one uses generative neural networks to create a picture based on natural language, does the resultant picture encode the text's semantics in a way a computer system can process? Could such a system be more precise than current solutions at detecting, measuring, or comparing semantic properties of generated images, and thus their source text, or their source semantics?

This work is undertaken in the hope that detecting previously unknown properties, or better understanding …


Unicorn Framework: A User-Centric Approach Toward Formal Verification Of Privacy Norms, Rezvan Joshaghani May 2019

Unicorn Framework: A User-Centric Approach Toward Formal Verification Of Privacy Norms, Rezvan Joshaghani

Boise State University Theses and Dissertations

In the development of complex systems, such as user-centric privacy management systems with multiple components and attributes, it is important to formalize the process and develop mathematical models that can be utilized to automatically make decisions on the information sharing actions of users. While valuable, the current state-of-the-art models are mostly based on enterprise/organizational privacy perspectives and leave the main actor, i.e., the user, uninvolved or with limited ability to control information sharing actions. These approaches cannot be applied to a user-centric environment since user privacy policies are dynamic because they change based on the information sharing context and environment. …


Application-Specific Memory Subsystem Benchmarking, Mahesh Lakshminarasimhan May 2019

Application-Specific Memory Subsystem Benchmarking, Mahesh Lakshminarasimhan

Boise State University Theses and Dissertations

Application performance often depends on achieved memory bandwidth. Achieved memory bandwidth varies greatly given specific combinations of instruction mix and order, working set size, and access pattern. Achieving good application performance depends on optimizing these characteristics within the constraints of the given application. This task is complicated due to the lack of information about the impact of small changes on the performance. Some information is provided by benchmarks, but most memory benchmarks are confined to simple access patterns that are not representative of patterns found in real applications.

This thesis presents AdaptMemBench, a configurable benchmark framework designed to explore the …