Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Old Dominion University (14)
- TÜBİTAK (13)
- Wright State University (8)
- Selected Works (6)
- University of Nebraska - Lincoln (6)
-
- University of New Haven (6)
- Embry-Riddle Aeronautical University (4)
- Singapore Management University (4)
- University of Tennessee, Knoxville (4)
- University of Wollongong (4)
- Florida International University (3)
- Purdue University (3)
- South Dakota State University (3)
- Technological University Dublin (3)
- China Simulation Federation (2)
- Edith Cowan University (2)
- University of Arkansas, Fayetteville (2)
- University of Central Florida (2)
- University of Nevada, Las Vegas (2)
- University of South Florida (2)
- Air Force Institute of Technology (1)
- California Polytechnic State University, San Luis Obispo (1)
- China Coal Technology and Engineering Group (CCTEG) (1)
- Clemson University (1)
- Colby College (1)
- Kennesaw State University (1)
- Liberty University (1)
- Louisiana Tech University (1)
- Mississippi State University (1)
- Missouri University of Science and Technology (1)
- Publication Year
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (13)
- Browse all Theses and Dissertations (8)
- Electrical & Computer Engineering and Computer Science Faculty Publications (6)
- Electronic Theses and Dissertations (6)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (5)
-
- Electrical & Computer Engineering Faculty Publications (4)
- Research Collection School Of Computing and Information Systems (4)
- VMASC Publications (4)
- Associate Professor Katina Michael (3)
- Cyber Center Publications (3)
- Dissertations (3)
- Doctoral Dissertations (3)
- Engineering Technology Faculty Publications (3)
- FIU Electronic Theses and Dissertations (3)
- Journal of Digital Forensics, Security and Law (3)
- Theses and Dissertations (3)
- Electrical & Computer Engineering Theses & Dissertations (2)
- Graduate Theses and Dissertations (2)
- International Journal of Nuclear Security (2)
- Journal of System Simulation (2)
- Rahul Mangharam (2)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- USF Tampa Graduate Theses and Dissertations (2)
- All Dissertations (1)
- All Faculty Scholarship (1)
- CCE Theses and Dissertations (1)
- CSE Technical Reports (1)
- Chancellor’s Honors Program Projects (1)
- Coal Geology & Exploration (1)
- Computer Science Faculty Research (1)
- Publication Type
Articles 31 - 60 of 117
Full-Text Articles in Physical Sciences and Mathematics
Biocybersecurity: A Converging Threat As An Auxiliary To War, Lucas Potter, Orlando Ayala, Xavier-Lewis Palmer
Biocybersecurity: A Converging Threat As An Auxiliary To War, Lucas Potter, Orlando Ayala, Xavier-Lewis Palmer
Engineering Technology Faculty Publications
Biodefense is the discipline of ensuring biosecurity with respect to select groups of organisms and limiting their spread. This field has increasingly been challenged by novel threats from nature that have been weaponized such as SARS, Anthrax, and similar pathogens, but has emerged victorious through collaboration of national and world health groups. However, it may come under additional stress in the 21st century as the field intersects with the cyberworld-- a world where governments have already been struggling to keep up with cyber attacks from small to state-level actors as cyberthreats have been relied on to level the playing field …
Covid-19 And Biocybersecurity's Increasing Role On Defending Forward, Xavier Palmer, Lucas N. Potter, Saltuk Karahan
Covid-19 And Biocybersecurity's Increasing Role On Defending Forward, Xavier Palmer, Lucas N. Potter, Saltuk Karahan
Electrical & Computer Engineering Faculty Publications
The evolving nature of warfare has been changing with cybersecurity and the use of advanced biotechnology in each aspect of the society is expanding and overlapping with the cyberworld. This intersection, which has been described as “biocybersecurity” (BCS), can become a major front of the 21st-century conflicts. There are three lines of BCS which make it a critical component of overall cybersecurity: (1) cyber operations within the area of BCS have life threatening consequences to a greater extent than other cyber operations, (2) the breach in health-related personal data is a significant tool for fatal attacks, and (3) health-related misinformation …
Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning
Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning
Electrical & Computer Engineering Theses & Dissertations
Mobile devices are becoming smarter to satisfy modern user's increasing needs better, which is achieved by equipping divers of sensors and integrating the most cutting-edge Deep Learning (DL) techniques. As a sophisticated system, it is often vulnerable to multiple attacks (side-channel attacks, neural backdoor, etc.). This dissertation proposes solutions to maintain the cyber-hygiene of the DL-Based smartphone system by exploring possible vulnerabilities and developing countermeasures.
First, I actively explore possible vulnerabilities on the DL-Based smartphone system to develop proactive defense mechanisms. I discover a new side-channel attack on smartphones using the unrestricted magnetic sensor data. I demonstrate that attackers can …
Design And Implementation Of Path Finding And Verification In The Internet, Hao Cai
Design And Implementation Of Path Finding And Verification In The Internet, Hao Cai
Doctoral Dissertations
In the Internet, network traffic between endpoints typically follows one path that is determined by the control plane. Endpoints have little control over the choice of which path their network traffic takes and little ability to verify if the traffic indeed follows a specific path. With the emergence of software-defined networking (SDN), more control over connections can be exercised, and thus the opportunity for novel solutions exists. However, there remain concerns about the attack surface exposed by fine-grained control, which may allow attackers to inject and redirect traffic. To address these opportunities and concerns, we consider two specific challenges: (1) …
Two Image Watermarkingmethodsbased On Compressive Sensing, Yidi Miao, Lü Ju, Xiumei Li
Two Image Watermarkingmethodsbased On Compressive Sensing, Yidi Miao, Lü Ju, Xiumei Li
Journal of System Simulation
Abstract: As an emerging sample theory, compressive sensing attracts wide attention because it breaks through the Nyquist sampling theorem. , Two different methods of watermark embedding and extraction are presented by measuring the carrier image and watermark image respectively based on compressive sensing. Moreover, the attack tests, such as the Gaussian noise, pepper and salt noise, filtering, compression, and cropping, are implemented to watermarked images. Experiment results show that although the two different methods for image watermarking have different processing procedure, both can guarantee the robustness and security of embedded digital watermark.
Cybersecurity Methods For Grid-Connected Power Electronics, Stephen Joe Moquin
Cybersecurity Methods For Grid-Connected Power Electronics, Stephen Joe Moquin
Graduate Theses and Dissertations
The present work shows a secure-by-design process, defense-in-depth method, and security techniques for a secure distributed energy resource. The distributed energy resource is a cybersecure, solar inverter and battery energy storage system prototype, collectively called the Cybersecure Power Router. Consideration is given to the use of the Smart Green Power Node for a foundation of the present work. Metrics for controller security are investigated to evaluate firmware security techniques. The prototype's ability to mitigate, respond to, and recover from firmware integrity degradation is examined. The prototype shows many working security techniques within the context of a grid-connected, distributed energy resource. …
Service Provisioning And Security Design In Software Defined Networks, Mohamed Rahouti
Service Provisioning And Security Design In Software Defined Networks, Mohamed Rahouti
USF Tampa Graduate Theses and Dissertations
Information and Communications Technology (ICT) infrastructures and systems are being widely deployed to support a broad range of users and application scenarios. A key trend here is the emergence of many different "smart" technology paradigms along with an increasingly diverse array of networked sensors, e.g., for smart homes and buildings, intelligent transportation and autonomous systems, emergency response, remote health monitoring and telehealth, etc. As billions of these devices come online, ICT networks are being tasked with transferring increasing volumes of data to support intelligent real-time decision making and management. Indeed, many applications and services will have very stringent Quality of …
Keyless Anti-Jamming Communication Via Randomized Dsss, Ahmad Alagil
Keyless Anti-Jamming Communication Via Randomized Dsss, Ahmad Alagil
USF Tampa Graduate Theses and Dissertations
Nowadays, wireless networking is ubiquitous. In wireless communication systems, multiple nodes exchange data during the transmission time. Due to the natural use of the communication channel, it is crucial to protect the physical layer to make wireless channels between nodes more reliable. Jamming attacks consider one of the most significant threats on wireless communication. Spread spectrum techniques have been widely used to mitigate the effects of the jammer. Traditional anti-jamming approaches like Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) require a sender and a receiver to share a secret key prior to their communication. If this …
A Novel Grouping Proof Authentication Protocol For Lightweight Devices:Gpapxr+, Ömer Aydin, Gökhan Dalkiliç, Cem Kösemen
A Novel Grouping Proof Authentication Protocol For Lightweight Devices:Gpapxr+, Ömer Aydin, Gökhan Dalkiliç, Cem Kösemen
Turkish Journal of Electrical Engineering and Computer Sciences
Radio frequency identification (RFID) tags that meet EPC Gen2 standards are used in many fields such as supply chain operations. The number of the RFID tags, smart cards, wireless sensor nodes, and Internet of things devices is increasing day by day and the areas where they are used are expanding. These devices are very limited in terms of the resources they have. For this reason, many security mechanisms developed for existing computer systems cannot be used for these devices. In order to ensure secure communication, it is necessary to provide authentication process between these lightweight devices and the devices they …
Analysis Of Biometric Data Using Watermarking Techniques, Foday Jorh, Bariş Özyer, Claude Fachkha
Analysis Of Biometric Data Using Watermarking Techniques, Foday Jorh, Bariş Özyer, Claude Fachkha
Turkish Journal of Electrical Engineering and Computer Sciences
This paper evaluates and analyses the discrete wavelet transform (DWT) frequency bands for embedding and extracting of the biometric data using DWT single level and multilevel watermarking approach with and without the use of alpha blending approach. In addition, singular value decomposition (SVD) combined with DWT is used to embed and extract the watermark image. The performance of compression and decompression approaches has been analyzed to examine the robustness and to check whether the compression function does destroy the integrity of the watermarked image. We investigate the proposed approach to understand how robust the watermarked on different sub-band is against …
Image Subset Communication For Resource-Constrained Applications In Wirelesssensor Networks, Sajid Nazir, Omar Alzubi, Mohammad Kaleem, Hassan Hamdoun
Image Subset Communication For Resource-Constrained Applications In Wirelesssensor Networks, Sajid Nazir, Omar Alzubi, Mohammad Kaleem, Hassan Hamdoun
Turkish Journal of Electrical Engineering and Computer Sciences
JPEG is the most widely used image compression standard for sensing, medical, and security applications. JPEG provides a high degree of compression but field devices relying on battery power must further economize on data transmissions to prolong deployment duration with particular use cases in wireless sensor networks. Transmitting a subset of image data could potentially enhance the battery life of power-constrained devices and also meet the application requirements to identify the objects within an image. Depending on an application's needs, after the first selected subset is received at the base station, further transmissions of the image data for successive refinements …
Advanced Security Analysis For Emergent Software Platforms, Mohannad Alhanahnah
Advanced Security Analysis For Emergent Software Platforms, Mohannad Alhanahnah
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Emergent software ecosystems, boomed by the advent of smartphones and the Internet of Things (IoT) platforms, are perpetually sophisticated, deployed into highly dynamic environments, and facilitating interactions across heterogeneous domains. Accordingly, assessing the security thereof is a pressing need, yet requires high levels of scalability and reliability to handle the dynamism involved in such volatile ecosystems.
This dissertation seeks to enhance conventional security detection methods to cope with the emergent features of contemporary software ecosystems. In particular, it analyzes the security of Android and IoT ecosystems by developing rigorous vulnerability detection methods. A critical aspect of this work is the …
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
VMASC Publications
The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, …
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
VMASC Publications
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication …
Challenges In Large-Scale Machine Learning Systems: Security And Correctness, Emad Alsuwat
Challenges In Large-Scale Machine Learning Systems: Security And Correctness, Emad Alsuwat
Theses and Dissertations
In this research, we address the impact of data integrity on machine learning algorithms. We study how an adversary could corrupt Bayesian network structure learning algorithms by inserting contaminated data items. We investigate the resilience of two commonly used Bayesian network structure learning algorithms, namely the PC and LCD algorithms, against data poisoning attacks that aim to corrupt the learned Bayesian network model.
Data poisoning attacks are one of the most important emerging security threats against machine learning systems. These attacks aim to corrupt machine learning models by con- taminating datasets in the training phase. The lack of resilience of …
The Performance Cost Of Security, Lucy R. Bowen
The Performance Cost Of Security, Lucy R. Bowen
Master's Theses
Historically, performance has been the most important feature when optimizing computer hardware. Modern processors are so highly optimized that every cycle of computation time matters. However, this practice of optimizing for performance at all costs has been called into question by new microarchitectural attacks, e.g. Meltdown and Spectre. Microarchitectural attacks exploit the effects of microarchitectural components or optimizations in order to leak data to an attacker. These attacks have caused processor manufacturers to introduce performance impacting mitigations in both software and silicon.
To investigate the performance impact of the various mitigations, a test suite of forty-seven different tests was created. …
Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao
Electrical & Computer Engineering Theses & Dissertations
Graphical passwords are always considered as an alternative of alphanumeric passwords for their better memorability and usability [1]. Alphanumeric passwords provide an adequate amount of satisfaction, but they do not offer better memorability compared to graphical passwords [1].
On the other hand, graphical passwords are considered less secured and provide better memorability [1]. Therefore many researchers have researched on graphical passwords to overcome the vulnerability. One of the most significant weaknesses of the graphical passwords is "Shoulder Surfing Attack," which means, sneaking into a victim's computer to learn the whole password or part of password or some confidential information. Such …
Feasibility And Security Analysis Of Wideband Ultrasonic Radio For Smart Home Applications, Qi Xia
Feasibility And Security Analysis Of Wideband Ultrasonic Radio For Smart Home Applications, Qi Xia
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Smart home Internet-of-Things (IoT) accompanied by smart home apps has witnessed tremendous growth in the past few years. Yet, the security and privacy of the smart home IoT devices and apps have raised serious concerns, as they are getting increasingly complicated each day, expected to store and exchange extremely sensitive personal data, always on and connected, and commonly exposed to any users in a sensitive environment. Nowadays wireless smart home IoT devices rely on electromagnetic wave-based radio-frequency (RF) technology to establish fast and reliable quality network connections. However, RF has its limitations that can negatively affect the smart home user …
Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe
Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe
Electrical & Computer Engineering and Computer Science Faculty Publications
In this work we present a primary account of frameup, an incriminatory attack made possible because of existing implementations in distributed peer to peer storage. The frameup attack shows that an adversary has the ability to store unencrypted data on the hard drives of people renting out their hard drive space. This is important to forensic examiners as it opens the door for possibly framing an innocent victim. Our work employs Storj as an example technology, due to its popularity and market size. Storj is a blockchain enabled system that allows people to rent out their hard drive space …
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
CCE Theses and Dissertations
Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.
There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …
Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger
Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional “dead” analysis. Following the trend of antiforensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also capable …
Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li
Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li
Browse all Theses and Dissertations
Security has become one of the most significant concerns for our cyberspace. Securing the cyberspace, however, becomes increasingly challenging. This can be attributed to the rapidly growing diversities and complexity of the modern cyberspace. Specifically, it is not any more dominated by connected personal computers (PCs); instead, it is greatly characterized by cyber-physical systems (CPS), embedded systems, dynamic services, and human-computer interactions. Securing modern cyberspace therefore calls for a multi-faceted approach capable of systematically integrating these emerging characteristics. This dissertation presents our novel and significant solutions towards this direction. Specifically, we have devised automated, systematic security solutions to three critical …
A Light-Weight Solution For Blackhole Attacks In Wireless Sensor Networks, Bi̇lal Erman Bi̇lgi̇n, Selçuk Baktir
A Light-Weight Solution For Blackhole Attacks In Wireless Sensor Networks, Bi̇lal Erman Bi̇lgi̇n, Selçuk Baktir
Turkish Journal of Electrical Engineering and Computer Sciences
Wireless sensors, which are smaller and cheaper, have started being used in many different applications. Military applications, health care and industrial monitoring, environmental applications, smart grids, and vehicular ad-hoc networks are some of the best known applications of wireless sensors. In some applications, especially military, environmental, and health care applications, it is required that the communication between sensor nodes be encrypted to achieve privacy and confidentiality. In this work, some modifications have been made to the ad-hoc on-demand distance vector routing protocol, mostly preferred in wireless sensor networks, to make data communications more reliable. The proposed routing protocol is shown …
Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili
Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Our work presents the primary account for exploring the forensics of immersive Virtual Reality (VR) systems and their social applications. The Social VR applications studied in this work include Bigscreen, Altspace VR, Rec Room and Facebook Spaces. We explored the two most widely adopted consumer VR systems: the HTC Vive and the Oculus Rift. Our tests examined the efficacy of reconstructing evidence from network traffic as well as the systems themselves. The results showed that a significant amount of forensically relevant data such as user names, user profile pictures, events, and system details may be recovered. We anticipate that this …
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Information Science Faculty Publications
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …
A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt
A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt
FIU Electronic Theses and Dissertations
The emerging Internet of Things (IoT) revolution has introduced many useful applications that are utilized in our daily lives. Users can program these devices in order to develop their own IoT applications; however, the platforms and languages that are used during development are abounding, complicated, and time-consuming. The software solution provided in this thesis, PROVIZ+, is a secure sensor application development software suite that helps users create sophisticated and secure IoT applications with little software and hardware experience. Moreover, a simple and efficient domain-specific programming language, namely Panther language, was designed for IoT application development to unify existing programming languages. …
Securing Critical Infrastructure: A Ransomware Study, Blaine M. Jeffries
Securing Critical Infrastructure: A Ransomware Study, Blaine M. Jeffries
Theses and Dissertations
This thesis reviews traditional ransomware attack trends in order to present a taxonomy for ransomware targeting industrial control systems. After reviewing a critical infrastructure ransomware attack methodology, a corresponding response and recovery plan is described. The plan emphasizes security through redundancy, specifically the incorporation of standby programmable logic controllers. This thesis goes on to describe a set of experiments conducted to test the viability of defending against a specialized ransomware attack with a redundant controller network. Results support that specific redundancy schemes are effective in recovering from a successful attack. Further experimentation is conducted to test the feasibility of industrial …
An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili
An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem. In this study we investigated several common applications and their password policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). Our study shows that default passwords are still a significant problem: 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 character.
Genetic Programming-Based Pseudorandom Number Generator For Wireless Identification And Sensing Platform, Cem Kösemen, Gökhan Dalkiliç, Ömer Aydin
Genetic Programming-Based Pseudorandom Number Generator For Wireless Identification And Sensing Platform, Cem Kösemen, Gökhan Dalkiliç, Ömer Aydin
Turkish Journal of Electrical Engineering and Computer Sciences
The need for security in lightweight devices such as radio frequency identification tags is increasing and a pseudorandom number generator (PRNG) constitutes an essential part of the authentication protocols that provide security. The main aim of this research is to produce a lightweight PRNG for cryptographic applications in wireless identification and sensing platform family devices, and other related lightweight devices. This PRNG is produced with genetic programming methods using entropy calculation as the fitness function, and it is tested with the NIST statistical test suite. Moreover, it satisfies the requirements of the EPCGen2 standards.
Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna
Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna
Student Works
This study is an attempt to show a basic mathematical usage of the concepts behind digital signatures and to provide a simple approach and understanding to cracking basic digital signatures. The approach takes on simple C programming of the ElGamal digital signature to identify some limits that can be encountered and provide considerations for making more complex code. Additionally, there is a literature review of the ElGamal digital signature and the brute force attack.
The research component of this project provides a list of possible ways to crack the basic implementations and classifies the different approaches that could be taken …