Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Dissertations and Theses

Computer science

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Local Radiance, Scott Peter Britell Dec 2019

Local Radiance, Scott Peter Britell

Dissertations and Theses

Recent years have seen a proliferation of web applications based on content management systems (CMS). Using a CMS, non-technical content authors are able to define custom content types to support their needs. These content type names and the attribute names in each content type are typically domain-specific and meaningful to the content authors. The ability of a CMS to support a multitude of content types allows for endless creation and customization but also leads to a large amount of heterogeneity within a single application. While this meaningful heterogeneity is beneficial, it introduces the problem of how to write reusable functionality …


Versatile Binary-Level Concolic Testing, Bo Chen Jul 2019

Versatile Binary-Level Concolic Testing, Bo Chen

Dissertations and Theses

Computing systems are experiencing an explosive growth, both in complexities and diversities, ushered in by the proliferation of cloud computing, mobile computing, and Internet of Things. This growth has also exposed the consequences of unsafe, insecure, and unreliable computing systems. These all point to the great needs of sophisticated system validation techniques. Recent advances in research on symbolic execution has shown great promises for automated software analysis, e.g., generating test cases, finding bugs, and detecting security vulnerabilities. However, symbolic execution is mostly adopted to analyze user applications, while modern computing systems in practice consist of many components shipped by various …


Design And Experimental Evaluation Of Deepmarket: An Edge Computing Marketplace With Distributed Tensorflow Execution Capability, Soyoung Kim Jul 2019

Design And Experimental Evaluation Of Deepmarket: An Edge Computing Marketplace With Distributed Tensorflow Execution Capability, Soyoung Kim

Dissertations and Theses

There is a rise in demand among machine learning researchers for powerful computational resources to train complex machine learning models, e.g., deep learning models. In order to train these models in a reasonable amount of time, the training is often distributed among multiple machines; yet paying for such machines (either through renting them on cloud data centers or building a local infrastructure) is costly. DeepMarket attempts to reduce these costs by creating a marketplace that integrates multiple computational resources over a distributed TensorFlow framework. Instead of requiring users to rent expensive GPU/CPUs from a third-party cloud provider, DeepMarket allows users …


Crumpled And Abraded Encryption: Implementation And Provably Secure Construction, Scott Sherlock Griffy May 2019

Crumpled And Abraded Encryption: Implementation And Provably Secure Construction, Scott Sherlock Griffy

Dissertations and Theses

Abraded and crumpled encryption allows communication software such as messaging platforms to ensure privacy for their users while still allowing for some investigation by law enforcement. Crumpled encryption ensures that each decryption is costly and prevents law enforcement from performing mass decryption of messages. Abrasion ensures that only large organizations like law enforcement are able to access any messages. The current abrasion construction uses public key parameters such as prime numbers which makes the abrasion scheme difficult to analyze and allows possible backdoors. In this thesis, we introduce a new abrasion construction which uses hash functions to avoid the problems …


Knowing Without Knowing: Real-Time Usage Identification Of Computer Systems, Leila Mohammed Hawana Jan 2019

Knowing Without Knowing: Real-Time Usage Identification Of Computer Systems, Leila Mohammed Hawana

Dissertations and Theses

Contemporary computers attempt to understand a user's actions and preferences in order to make decisions that better serve the user. In pursuit of this goal, computers can make observations that range from simple pattern recognition to listening in on conversations without the device being intentionally active. While these developments are incredibly useful for customization, the inherent security risks involving personal data are not always worth it. This thesis attempts to tackle one issue in this domain, computer usage identification, and presents a solution that identifies high-level usage of a system at any given moment without looking into any personal data. …