Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in OS and Networks

Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar Jun 2018

Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar

Computer Science and Software Engineering

This project extended on the operating system I wrote in CPE 454 by adding additional features on top of the existing implementation. In order to implement them, I researched operating system design patterns and hardware details. I used wiki.osdev.org for most research, just like I did in CPE 454. The source code for the project is at https://github.com/josepharhar/jos.


Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt Jun 2018

Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt

Computer Science and Software Engineering

Even when network data is encrypted, observers can make inferences about content based on collected metadata. DeadDrop is an exploratory API designed to protect the metadata of a conversation from both outside observers and the facilitating server. To do so, DeadDrop servers are passed no recipient address, instead relying upon the recipient to check for messages of their own volition. In addition, the recipient downloads a copy of every encrypted message on the server to prevent even the server from knowing to whom each message is intended. To these purposes, DeadDrop is mostly successful. However, it does not obscure all …


Raspberry Pi Vpn Travel Router, Daniel S. Pierson Jun 2016

Raspberry Pi Vpn Travel Router, Daniel S. Pierson

Computer Science and Software Engineering

Consumers are increasingly relying on public wireless hotspots to access the internet from a growing number of devices. Usage of these hotspots has expanded from just laptops to everything from iPhones to tablets, which are expected to be internet-connected for full functionality. It has become common for one to check if there’s an open wireless hotspot connection available at places like coffee shops, hotels, restaurants, or even a doctor’s waiting room. The issue that arises is that these public connections present an inherent security risk, as anyone can connect and gain access to the network. For increased security, the use …


Modeler: Web Api Modeling Tool, Yegor Pomortsev Mar 2014

Modeler: Web Api Modeling Tool, Yegor Pomortsev

Computer Science and Software Engineering

This report presents the API Modeler system, a tool for creating and modifying web APIs models, within the context of the API modeling problem, and how it serves to solve several common use-cases and scenarios for interacting with web API models. The report describes the motivation for Modeler, its design and implementation, related tools, and possible future improvements to the system.


Astrophobia: A 3d Multiplayer Space Combat Game With Linear Entity Interpolation, Luke Larson Dec 2013

Astrophobia: A 3d Multiplayer Space Combat Game With Linear Entity Interpolation, Luke Larson

Computer Science and Software Engineering

Astrophobia is a Descent-like 3D networked multiplayer space combat game with linear entity interpolation (client-side animation between game-state packets to give the illusion of continuous game updates) similar to entity interpolation implemented in Valve Software’s Source engine. Additionally, Astrophobia procedurally generates unique levels, has zero-gravity physics, ship and projectile wall bouncing, hit detection, OpenGL 3D graphics, Phong lighting, ship model and texture, and a simple HUD that provides visualization of health points, aiming crosshair, and player scoreboard.


Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson Mar 2011

Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson

Computer Science and Software Engineering

The paper consists of a detailed examination of malware broken down into three main sections.

  1. Introduction: Malware in the World Today. Begins with a definition of terms, examination of the types of malware, research into historical pieces of malicious code, a detailed analysis of the attackers, why malware is so prevalent, and why it is so hard to defend against. This section finishes with a comparison of reasons to create and not to create malware.
  2. Background: "Good" Pieces of Malware. Examination of what makes malware effective. Analysis of the existing CVSS standard and proposal of the alternative VIPERS classification system. …