Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

MS Powerpoint

Information Security

UNO Student Research and Creative Activity Fair

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Computer Sciences

Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton Mar 2020

Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton

UNO Student Research and Creative Activity Fair

Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs …


Amazon Alexa: The Best Personal Assistant Or An Eavesdropping Witch, Alisa Bohac, Michael Keck Mar 2018

Amazon Alexa: The Best Personal Assistant Or An Eavesdropping Witch, Alisa Bohac, Michael Keck

UNO Student Research and Creative Activity Fair

The prolific integration of Internet-of-Things (IoT) devices into our homes is continuously generating discussions surrounding the security and privacy of these devices. One device that has received particular attention in the past few years is the Amazon Alexa, a ‘personal assistant’ IoT device, which listens to user commands and performs certain actions. According to Amazon, “millions of Alexa devices” were sold in the 2017 Holiday period alone [1]. However, the continuous amalgamation of technology has prompted the idea that many digital devices, through their overall functionality, could be utilized by cybercriminals to digitally intrude into our personal lives [2]. Hence, …