Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Behavior-Based Authentication System, Taylor Means, Jared Frank Apr 2018

Behavior-Based Authentication System, Taylor Means, Jared Frank

Honors Theses AY 17/18

All current forms of authentication are exploitable via social engineering, theft, hacking, or replication. Due to this, a new form of authentication should be explored: behavioral. A solution to this problem would result in more secure digital environment, including physical access to computers as well as software access. The maze-solving approach presented by this project allows for multiple variables to be observed within a user, presenting many facets of behavior that can be analyzed. In order to solve this problem, enough parameters must be collected and contrasted against one another in order to tell different humans apart from each other ...


A Survey Of Addictive Software Design, Chauncey J. Neyman Jun 2017

A Survey Of Addictive Software Design, Chauncey J. Neyman

Computer Science and Software Engineering

The average smartphone owner checks their phone more than 150 times per day. As of 2015, 62% of smartphone users had used their phone to look up information about a health condition, while 57% had used their phone to do online banking. Mobile platforms have become the dominant medium of human-computer interaction. So how have these devices established themselves as our go to connection to the Internet? The answer lies in addictive design. Software designers have become well versed in creating software that captivates us at a primal level. In this article, we survey addictive software design strategies, their bases ...


Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman Jan 2012

Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman

Journal of Digital Forensics, Security and Law

The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer ...