Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Hardware-Entangled Software Execution Using Dynamic Pufs, Wenjie Xiong Dec 2019

Hardware-Entangled Software Execution Using Dynamic Pufs, Wenjie Xiong

Yale Day of Data

Low-end computing devices are becoming increasingly ubiquitous, especially due to the widespread deployment of Internet-of-Things products. There is, however, much concern about sensitive data being processed on these low-end devices which have limited protection mechanisms in place. This paper proposes a Hardware-Entangled Software Protection (HESP) scheme that leverages hardware features to protect software code from malicious modification before or during run-time. It also enables implicit hardware authentication. Thus, the software will execute correctly only on an authorized device and if the timing of the software, e.g., control flow, was not changed through malicious modifications. The proposed ideas are based on …


Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao Oct 2019

Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao

Posters-at-the-Capitol

Abstract

The purpose of this research has been to observe how performance of the Lambda@EDGE environment compares to the base Lambda environment. This is in an effort to determine viability of the EDGE environment. 15 tests were conducted over a matter of days in each environment whereby the Fibonacci sequence was calculated to 20 terms. Performance metrics including RAM usage and response time were measured. Lambda@EDGE was determined to have not only a slightly higher average response time but also an average RAM usage of 1MB more in the aggregate tests.


Decreasing Technology Design Costs By Using Youtube Video To Evaluate User Acceptance, Tom Chappelear Mar 2019

Decreasing Technology Design Costs By Using Youtube Video To Evaluate User Acceptance, Tom Chappelear

UNO Student Research and Creative Activity Fair

User acceptance is a measure that contributes to technology feasibility which is a decision point that entrepreneurs use to help make better investment decisions (Hoffer, 2011). User acceptance testing is part of a design strategy where the system designer attempts to minimize risks and provide design information that an entrepreneur can use to make better investment decisions (Hoffer, 2011). A user acceptance testing instruments can range from a low-cost coffeeshop review to expensive lab-based user testing (Shneiderman, 2017). This study builds upon the User Acceptance of Information Technology (UTAUT) model to measure user acceptance for the system being evaluated (Venkatesh, …


A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan Mar 2019

A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan

UNO Student Research and Creative Activity Fair

In the last decade growth of social media, increased the interest of network algorithms for analyzing large-scale complex systems. The networks are highly unstructured and exhibit poor locality, which has been a challenge for developing scalable parallel algorithms. The state-of-the-art network algorithms such as Prim's algorithm for Minimum Spanning Tree, Dijkstra's algorithm for Single Source Shortest Path and ISPAN algorithm for detecting strongly connected components are designed and optimized for static networks. The networks which change with time i.e. the dynamic networks such as social networks, the above-mentioned approaches can only be utilized if they are recomputed from scratch each …