Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Computer Engineering

Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury Dec 2019

Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury

Boise State University Theses and Dissertations

Differential power analysis attacks are special kinds of side-channel attacks where power traces are considered as the side-channel information to launch the attack. These attacks are threatening and significant security issues for modern cryptographic devices such as smart cards, and Point of Sale (POS) machine; because after careful analysis of the power traces, the attacker can break any secured encryption algorithm and can steal sensitive information.

In our work, we study differential power analysis attack using two popular neural networks: Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN). Our work seeks to answer three research questions(RQs):

RQ1: Is it …


Minos: Unsupervised Netflow-Based Detection Of Infected And Attacked Hosts, And Attack Time In Large Networks, Mousume Bhowmick Aug 2019

Minos: Unsupervised Netflow-Based Detection Of Infected And Attacked Hosts, And Attack Time In Large Networks, Mousume Bhowmick

Boise State University Theses and Dissertations

Monitoring large-scale networks for malicious activities is increasingly challenging: the amount and heterogeneity of traffic hinder the manual definition of IDS signatures and deep packet inspection. In this thesis, we propose MINOS, a novel fully unsupervised approach that generates an anomaly score for each host allowing us to classify with high accuracy each host as either infected (generating malicious activities), attacked (under attack), or clean (without any infection). The generated score of each hour is able to detect the time frame of being attacked for an infected or attacked host without any prior knowledge. MINOS automatically creates a personalized traffic …


Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader Aug 2019

Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader

Boise State University Theses and Dissertations

This work explores the attributes, properties, and potential uses of generative neural networks within the realm of encoding semantics. It works toward answering the questions of: If one uses generative neural networks to create a picture based on natural language, does the resultant picture encode the text's semantics in a way a computer system can process? Could such a system be more precise than current solutions at detecting, measuring, or comparing semantic properties of generated images, and thus their source text, or their source semantics?

This work is undertaken in the hope that detecting previously unknown properties, or better understanding …


Unicorn Framework: A User-Centric Approach Toward Formal Verification Of Privacy Norms, Rezvan Joshaghani May 2019

Unicorn Framework: A User-Centric Approach Toward Formal Verification Of Privacy Norms, Rezvan Joshaghani

Boise State University Theses and Dissertations

In the development of complex systems, such as user-centric privacy management systems with multiple components and attributes, it is important to formalize the process and develop mathematical models that can be utilized to automatically make decisions on the information sharing actions of users. While valuable, the current state-of-the-art models are mostly based on enterprise/organizational privacy perspectives and leave the main actor, i.e., the user, uninvolved or with limited ability to control information sharing actions. These approaches cannot be applied to a user-centric environment since user privacy policies are dynamic because they change based on the information sharing context and environment. …


Application-Specific Memory Subsystem Benchmarking, Mahesh Lakshminarasimhan May 2019

Application-Specific Memory Subsystem Benchmarking, Mahesh Lakshminarasimhan

Boise State University Theses and Dissertations

Application performance often depends on achieved memory bandwidth. Achieved memory bandwidth varies greatly given specific combinations of instruction mix and order, working set size, and access pattern. Achieving good application performance depends on optimizing these characteristics within the constraints of the given application. This task is complicated due to the lack of information about the impact of small changes on the performance. Some information is provided by benchmarks, but most memory benchmarks are confined to simple access patterns that are not representative of patterns found in real applications.

This thesis presents AdaptMemBench, a configurable benchmark framework designed to explore the …


Injecting Control Commands Through Sensory Channel: Attack And Defense, Farhad Rasapour Dec 2018

Injecting Control Commands Through Sensory Channel: Attack And Defense, Farhad Rasapour

Boise State University Theses and Dissertations

Industrial Control System (ICS) is responsible for controlling and managing critical infrastructures like nuclear plants and power plants. ICS is equipped with various devices like communication media, Programmable Logic Controller (PLC), actuators, and sensors. Sensors are used to measure a physical phenomenon and send these measurements through the sensory channel to the control devices so they can make decisions on the movements of the actuators in the systems. While tampering with the sensor measurements has been the focus of many studies, there is some research that has concentrated on misusing a sensor and sensory channel as an axillary attack device …


Cloudskulk: Design Of A Nested Virtual Machine Based Rootkit-In-The-Middle Attack, Joseph Anthony Connelly Dec 2017

Cloudskulk: Design Of A Nested Virtual Machine Based Rootkit-In-The-Middle Attack, Joseph Anthony Connelly

Boise State University Theses and Dissertations

Virtualized cloud computing services are a crucial facet in the software industry today, with clear evidence of its usage quickly accelerating. Market research forecasts an increase in cloud workloads by more than triple, 3.3-fold, from 2014 to 2019 [33]. Integrating system security is then an intrinsic concern of cloud platform system administrators that with the growth of cloud usage, is becoming increasingly relevant. People working in the cloud demand security more than ever. In this paper, we take an offensive, malicious approach at targeting such cloud environments as we hope both cloud platform system administrators and software developers of these …


A System For Monitoring And Managing Indoor Air Quality And Environmental Conditions, Ali Ibrahim Aug 2016

A System For Monitoring And Managing Indoor Air Quality And Environmental Conditions, Ali Ibrahim

Boise State University Theses and Dissertations

The quality of indoor air depends on different types of pollutant sources existing in a semi-enclosed environment. The sources can be biological, chemical, or toxic pollutants. These sources can cause health issues and discomfort for occupants. One of the indicators of poor indoor air quality is Carbon Dioxide (CO2). CO2 can be used to indicate the indoor air exchange rate. The lack of air exchange means higher levels of CO2. High levels of indoor particulates can also be an indication of poor air quality. Due to the lack of fresh air, air circulation, and air …


Extending The Battery-Powered Operating Time Of A Wireless Environmental Monitoring System, Ross Matthew Butler Dec 2012

Extending The Battery-Powered Operating Time Of A Wireless Environmental Monitoring System, Ross Matthew Butler

Boise State University Theses and Dissertations

Advances in low-power microelectronics and sensor technologies have enabled the creation of sophisticated environmental monitoring systems capable of operating on battery power. Independence from a power outlet connection opens up many new potential applications, but limited battery life still imposes significant restrictions on a monitoring system’s capabilities and the number of systems that can be economically deployed and maintained. These restrictions have motivated much research into reducing monitoring system energy usage, increasing battery capacity, and harnessing alternative energy sources. While most of the research focuses on new system design, there is a need for techniques to extend the battery-powered operating …


Non-Blocking Hardware Coding For Embedded Systems, Derek Caleb Klein May 2011

Non-Blocking Hardware Coding For Embedded Systems, Derek Caleb Klein

Boise State University Theses and Dissertations

Embedded Systems can be found in devices that people use every day. In the pursuit of faster and smarter devices, more powerful processing units are needed in these embedded systems. A key component of powerful processing units is the supporting software. While the raw processing power of microcontroller has been continually advancing, the improvements in the supporting software for medium scale embedded systems have been lacking. This thesis focuses on improving the software on medium scale systems by discussing the practical application of non-blocking coding techniques. The basic concept of how non-blocking code improves the performance of a system is …


A Wireless Sensor Network For Monitoring Physical Activity, Physiological Response, And Environmental Conditions, Michael Leon Pook May 2011

A Wireless Sensor Network For Monitoring Physical Activity, Physiological Response, And Environmental Conditions, Michael Leon Pook

Boise State University Theses and Dissertations

Understanding movement is an important area of research for improving comfort and safety. Data collected from accelerometers and gyros attached to multiple parts of a body can be used to determine the type of physical activity in which an individual is engaging. Correlating this data with the individual's heart rate allows for the verification of the type of activity as well as observation of the amount of physical strain experienced during the activity. Additionally, data on environmental stimuli can be gathered in order to determine their effect on physical strain. Current research in the field has been limited by both …


A Reconfigurable Pattern Matching Hardware Implementation Using On-Chip Ram-Based Fsm, Indrawati Gauba Aug 2010

A Reconfigurable Pattern Matching Hardware Implementation Using On-Chip Ram-Based Fsm, Indrawati Gauba

Boise State University Theses and Dissertations

The use of synthesizable reconfigurable IP cores has increasingly become a trend in System on Chip (SOC) designs. Such domain-special cores are being used for their flexibility and powerful functionality. The market introduction of multi-featured platform FPGAs equipped with on-chip memory and embedded processor blocks has further extended the possibility of utilizing dynamic reconfiguration to improve overall system adaptability to meet varying product requirements. A dynamically reconfigurable Finite State Machine (FSM) can be implemented using on-chip memory and an embedded processor. Since FSMs are the vital part of sequential hardware designs, the reconfiguration can be achieved in all designs containing …