Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Activity-Aware Electrocardiogram-Based Passive Ongoing Biometric Verification, Janani C. Sriram
Activity-Aware Electrocardiogram-Based Passive Ongoing Biometric Verification, Janani C. Sriram
Dartmouth College Master’s Theses
Identity fraud due to lost, stolen or shared information or tokens that represent an individual's identity is becoming a growing security concern. Biometric recognition - the identification or verification of claimed identity, shows great potential in bridging some of the existing security gaps. It has been shown that the human Electrocardiogram (ECG) exhibits sufficiently unique patterns for use in biometric recognition. But it also exhibits significant variability due to stress or activity, and signal artifacts due to movement. In this thesis, we develop a novel activity-aware ECG-based biometric recognition scheme that can verify/identify under different activity conditions. From a pattern …
Surface Reconstruction Through Time, Leeann T. Brash
Surface Reconstruction Through Time, Leeann T. Brash
Dartmouth College Master’s Theses
Surface reconstruction is an area of computational geometry that has been progressing rapidly over the last decade. Current algorithms and their implementations can reconstruct surfaces from a variety of input and the accuracy and precision improve with each new development. These all make use of various heuristics to achieve a reconstruction. Much of this work consists of reconstructing a still object from point samples taken from the object's surface. We examine reconstructing an n-dimensional object and its motion by treating time as an (n + 1)st axis. Our input consists of (n-1)-dimensional scans taken over time and at di?erent positions …
Autoscopy: Detecting Pattern-Searching Rootkits Via Control Flow Tracing, Ashwin Ramaswamy
Autoscopy: Detecting Pattern-Searching Rootkits Via Control Flow Tracing, Ashwin Ramaswamy
Dartmouth College Master’s Theses
Traditional approaches to rootkit detection assume the execution of code at a privilege level below that of the operating system kernel, with the use of virtual machine technologies to enable the detection system itself to be immune from the virus or rootkit code. In this thesis, we approach the problem of rootkit detection from the standpoint of tracing and instrumentation techniques, which work from within the kernel and also modify the kernel's run-time state to detect aberrant control flows. We wish to investigate the role of emerging tracing frameworks (Kprobes, DTrace etc.) in enforcing operating system security without the reliance …