Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Concolic Execution Of Nmap Scripts For Honeyfarm Generation, Zhe Li, Bo Chen, Wu-Chang Feng, Fei Xie Nov 2021

Concolic Execution Of Nmap Scripts For Honeyfarm Generation, Zhe Li, Bo Chen, Wu-Chang Feng, Fei Xie

Computer Science Faculty Publications and Presentations

Attackers rely upon a vast array of tools for automating attacksagainst vulnerable servers and services. It is often the case thatwhen vulnerabilities are disclosed, scripts for detecting and exploit-ing them in tools such asNmapandMetasploitare released soonafter, leading to the immediate identification and compromise ofvulnerable systems. Honeypots, honeynets, tarpits, and other decep-tive techniques can be used to slow attackers down, however, such approaches have difficulty keeping up with the sheer number of vulnerabilities being discovered and attacking scripts that are being released. To address this issue, this paper describes an approach for applying concolic execution on attacking scripts in Nmap in …


An Automated Ar-Based Annotation Tool For Indoor Navigation For Visually Impaired People, Pei Du, Nirupama Bulusu Oct 2021

An Automated Ar-Based Annotation Tool For Indoor Navigation For Visually Impaired People, Pei Du, Nirupama Bulusu

Computer Science Faculty Publications and Presentations

Low vision people face many daily encumbrances. Traditional visual enhancements do not suffice to navigate indoor environments, or recognize objects efficiently. In this paper, we explore how Augmented Reality (AR) can be leveraged to design mobile applications to improve visual experience and unburden low vision persons. Specifically, we propose a novel automated AR-based annotation tool for detecting and labeling salient objects for assisted indoor navigation applications like NearbyExplorer. NearbyExplorer, which issues audio descriptions of nearby objects to the users, relies on a database populated by large teams of volunteers and map-a-thons to manually annotate salient objects in the environment like …


Towards Adaptive, Self-Configuring Networked Unmanned Aerial Vehicles, Nirupama Bulusu, Ehsan Aryafar, Feng Liu Jun 2021

Towards Adaptive, Self-Configuring Networked Unmanned Aerial Vehicles, Nirupama Bulusu, Ehsan Aryafar, Feng Liu

Computer Science Faculty Publications and Presentations

Networked drones have the potential to transform various applications domains; yet their adoption particularly in indoor and forest environments has been stymied by the lack of accurate maps and autonomous navigation abilities in the absence of GPS, the lack of highly reliable, energy-efficient wireless communications, and the challenges of visually inferring and understanding an environment with resource-limited individual drones. We advocate a novel vision for the research community in the development of distributed, localized algorithms that enable the networked drones to dynamically coordinate to perform adaptive beam forming to achieve high capacity directional aerial communications, and collaborative machine learning to …


On The (Im)Practicality Of Adversarial Perturbation For Image Privacy, Arezoo Rajabi, Rakesh B. Bobba, Mike Rosulek, Charles Wright, Wu-Chi Feng Jan 2021

On The (Im)Practicality Of Adversarial Perturbation For Image Privacy, Arezoo Rajabi, Rakesh B. Bobba, Mike Rosulek, Charles Wright, Wu-Chi Feng

Computer Science Faculty Publications and Presentations

Image hosting platforms are a popular way to store and share images with family members and friends. However, such platforms typically have full access to images raising privacy concerns. These concerns are further exacerbated with the advent of Convolutional Neural Networks (CNNs) that can be trained on available images to automatically detect and recognize faces with high accuracy.

Recently, adversarial perturbations have been proposed as a potential defense against automated recognition and classification of images by CNNs. In this paper, we explore the practicality of adversarial perturbation based approaches as a privacy defense against automated face recognition. Specifically, we first …