Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

William & Mary

Computer Sciences

2017

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Exploiting Power For Smartphone Security And Privacy, Qing Yang Nov 2017

Exploiting Power For Smartphone Security And Privacy, Qing Yang

Dissertations, Theses, and Masters Projects

Power consumption has become a key issue for smartphone security and privacy protection. In this dissertation, we propose to exploit power for smartphone security, as well as to optimize energy consumption for smartphone privacy. First, we show that public USB charging stations pose a significant privacy risk to smartphone users. We present a side-channel attack that allows a charging station to identify which webpages are loaded while the smartphone is charging. to evaluate this side-channel, we collected power traces of Alexa top 50 websites on multiple smartphones under several conditions, including: varied battery charging level, browser cache enabled/disabled, taps/no taps …


Automatically Documenting Software Artifacts, Boyang Li Sep 2017

Automatically Documenting Software Artifacts, Boyang Li

Dissertations, Theses, and Masters Projects

Software artifacts, such as database schema and unit test cases, constantly change during evolution and maintenance of software systems. Co-evolution of code and DB schemas in Database-Centric Applications (DCAs) often leads to two types of challenging scenarios for developers, where (i) changes to the DB schema need to be incorporated in the source code, and (ii) maintenance of a DCAs code requires understanding of how the features are implemented by relying on DB operations and corresponding schema constraints. On the other hand, the number of unit test cases often grows as new functionality is introduced into the system, and maintaining …


Enhancing Usability And Security Through Alternative Authentication Methods, Nicolas Jorge Van Balen Jun 2017

Enhancing Usability And Security Through Alternative Authentication Methods, Nicolas Jorge Van Balen

Dissertations, Theses, and Masters Projects

With the expanding popularity of various Internet services, online users have be- come more vulnerable to malicious attacks as more of their private information is accessible on the Internet. The primary defense protecting private information is user authentication, which currently relies on less than ideal methods such as text passwords and PIN numbers. Alternative methods such as graphical passwords and behavioral biometrics have been proposed, but with too many limitations to replace current methods. However, with enhancements to overcome these limitations and harden existing methods, alternative authentications may become viable for future use. This dissertation aims to enhance the viability …


Data-Driven Radiometric Photo-Linearization, Han Li Jun 2017

Data-Driven Radiometric Photo-Linearization, Han Li

Dissertations, Theses, and Masters Projects

In computer vision and computer graphics, a photograph is often considered a photometric representation of a scene. However, for most camera models, the relation between recorded pixel value and the amount of light received on the sensor is not linear. This non-linear relationship is modeled by the camera response function which maps the scene radiance to the image brightness. This non-linear transformation is unknown, and it can only be recovered via a rigorous radiometric calibration process. Classic radiometric calibration methods typically estimate a camera response function from an exposure stack (i.e., an image sequence captured with different exposures from the …


Deep Learning Software Repositories, Martin White Jun 2017

Deep Learning Software Repositories, Martin White

Dissertations, Theses, and Masters Projects

Bridging the abstraction gap between artifacts and concepts is the essence of software engineering (SE) research problems. SE researchers regularly use machine learning to bridge this gap, but there are three fundamental issues with traditional applications of machine learning in SE research. Traditional applications are too reliant on labeled data. They are too reliant on human intuition, and they are not capable of learning expressive yet efficient internal representations. Ultimately, SE research needs approaches that can automatically learn representations of massive, heterogeneous, datasets in situ, apply the learned features to a particular task and possibly transfer knowledge from task to …


Enhancing Energy Efficiency And Privacy Protection Of Smart Devices, Ge Peng Mar 2017

Enhancing Energy Efficiency And Privacy Protection Of Smart Devices, Ge Peng

Dissertations, Theses, and Masters Projects

Smart devices are experiencing rapid development and great popularity. Various smart products available nowadays have largely enriched people’s lives. While users are enjoying their smart devices, there are two major user concerns: energy efficiency and privacy protection. In this dissertation, we propose solutions to enhance energy efficiency and privacy protection on smart devices. First, we study different ways to handle WiFi broadcast frames during smartphone suspend mode. We reveal the dilemma of existing methods: either receive all of them suffering high power consumption, or receive none of them sacrificing functionalities. to address the dilemma, we propose Software Broadcast Filter (SBF). …


An Investigation Of Power Saving And Privacy Protection On Smartphones, Dachuan Liu Mar 2017

An Investigation Of Power Saving And Privacy Protection On Smartphones, Dachuan Liu

Dissertations, Theses, and Masters Projects

With the advancements in mobile technology, smartphones have become ubiquitous in people's daily lives and have greatly facilitated users in many aspects. For a smartphone user, power saving and privacy protection are two important issues that matter and draw serious attentions from research communities. In this dissertation, we present our studies on some specific issues of power saving and privacy protection on a smartphone. Although IEEE 802.11 standards provide Power Save Mode (PSM) to help mobile devices conserve energy, PSM fails to bring expected benefits in many real scenarios. We define an energy conserving model to describe the general PSM …


On The Impact Of Internet Naming Evolution: Deployment, Performance, And Security Implications, Shuai Hao Jan 2017

On The Impact Of Internet Naming Evolution: Deployment, Performance, And Security Implications, Shuai Hao

Dissertations, Theses, and Masters Projects

As one of the most critical components of the Internet, the Domain Name System (DNS) provides naming services for Internet users, who rely on DNS to perform the translation between the domain names and network entities before establishing an In- ternet connection. In this dissertation, we present our studies on different aspects of the naming infrastructure in today’s Internet, including DNS itself and the network services based on the naming infrastructure such as Content Delivery Networks (CDNs). We first characterize the evolution and features of the DNS resolution in web ser- vices under the emergence of third-party hosting services and …


Workload Prediction For Efficient Performance Isolation And System Reliability, Ji Xue Jan 2017

Workload Prediction For Efficient Performance Isolation And System Reliability, Ji Xue

Dissertations, Theses, and Masters Projects

In large-scaled and distributed systems, like multi-tier storage systems and cloud data centers, resource sharing among workloads brings multiple benefits while introducing many performance challenges. The key to effective workload multiplexing is accurate workload prediction. This thesis focuses on how to capture the salient characteristics of the real-world workloads to develop workload prediction methods and to drive scheduling and resource allocation policies, in order to achieve efficient and in-time resource isolation among applications. For a multi-tier storage system, high-priority user work is often multiplexed with low-priority background work. This brings the challenge of how to strike a balance between maintaining …