Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics
Computer Science and Computer Engineering Undergraduate Honors Theses
- Keyword
-
- Address Space Layout Randomization (ASLR) (1)
- Allocation/Deallocation (1)
- Bluetooth (1)
- ChipWhisperer (1)
- Comparison (1)
-
- DNA (1)
- E-ink (1)
- Global memory (1)
- Graphics Processing Unit (GPU) (1)
- Inventory tracking (1)
- Leakage assessment (1)
- Low energy (1)
- Masking (1)
- Memory leakage (1)
- NIDS (1)
- Nanotechnology (1)
- Oscilloscope (1)
- OxDNA (1)
- Performance (1)
- Post-Quantum Cryptography (1)
- Rules (1)
- Side-channel Analysis (1)
- Simulation (1)
- Snort (1)
- Suricata (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture …
A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall
A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall
Computer Science and Computer Engineering Undergraduate Honors Theses
The ability to synthesize custom DNA molecules has led to the feasibility of DNA nanotechnology. Synthesis is time-consuming and expensive, so simulations of proposed DNA designs are necessary. Open-source simulators, such as oxDNA, are available but often difficult to configure and interface with. Packages such as oxdna-tile-binding pro- vide an interface for oxDNA which allows for the ability to create scripts that automate the configuration process. This project works to improve the scripts in oxdna-tile-binding to improve integration with job scheduling systems commonly used in high-performance computing environments, improve ease-of-use and consistency within the scripts compos- ing oxdna-tile-binding, and move …
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Computer Science and Computer Engineering Undergraduate Honors Theses
The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.
Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague
Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague
Computer Science and Computer Engineering Undergraduate Honors Theses
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the system. …
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked to an …