Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computer security (3)
- Software engineering (3)
- Computer games Design (2)
- Internet games Design (2)
- Reverse engineering (2)
-
- Video games Design (2)
- Application software Design (1)
- Application software Development (1)
- Architecture (1)
- Avatars (Virtual reality) (1)
- Card games (1)
- Card games Interactive multimedia (1)
- Computer games Programming (1)
- Computer graphics (1)
- Computer networks--Security measures (1)
- Computer software Development (1)
- Data protection (1)
- Database design (1)
- Emulators (Computer programs) (1)
- Gate array circuits (1)
- Human-computer interaction (1)
- Interactive computer systems | Model-driven software architecture | Computer software -- Development | Object-oriented methods (Computer science) | Electronic information resources (1)
- Interactive multimedia Authoring programs (1)
- Internet games Programming (1)
- Loose coupling. (1)
- Malware (Computer software) (1)
- Programmable array logic (1)
- Programmable logic devices (1)
- Random access memory (1)
- Reinforcement learning (1)
Articles 1 - 13 of 13
Full-Text Articles in Physical Sciences and Mathematics
Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire
Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire
Theses and Dissertations
Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …
Secureqemu: Emulation-Based Software Protection Providing Encrypted Code Execution And Page Granularity Code Signing, William B. Kimball
Secureqemu: Emulation-Based Software Protection Providing Encrypted Code Execution And Page Granularity Code Signing, William B. Kimball
Theses and Dissertations
This research presents an original emulation-based software protection scheme providing protection from reverse code engineering (RCE) and software exploitation using encrypted code execution and page-granularity code signing, respectively. Protection mechanisms execute in trusted emulators while remaining out-of-band of untrusted systems being emulated. This protection scheme is called SecureQEMU and is based on a modified version of Quick Emulator (QEMU) [5]. RCE is a process that uncovers the internal workings of a program. It is used during vulnerability and intellectual property (IP) discovery. To protect from RCE program code may have anti-disassembly, anti-debugging, and obfuscation techniques incorporated. These techniques slow the …
Steganography In Ipv6, Barret Miller
Steganography In Ipv6, Barret Miller
Computer Science and Computer Engineering Undergraduate Honors Theses
Steganography is the process of hiding a secret message within another message such that it is difficult to detect the presence of the secret message. In other words, the existence of the secret message is hidden. A covert channel refers to the actual medium that is used to communicate the information such as a message, image, or file. This honors thesis uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages are passed from one party to another. A fully functional computer program was designed and written …
Hardware, Software And Data Analysis Techniques For Sram-Based Field Programmable Gate Array Circuits, Eugene B. Hockenberry
Hardware, Software And Data Analysis Techniques For Sram-Based Field Programmable Gate Array Circuits, Eugene B. Hockenberry
Theses and Dissertations
This work presents a built, tested, and demonstrated test structure that is low-cost, flexible, and re-usable for robust radiation experimentation, primarily to investigate memory, in this case SRAMs and SRAM-based FPGAs. The space environment can induce many kinds of failures due to radiation effects. These failures result in a loss of money, time, intelligence, and information. In order to evaluate technologies for potential failures, a detailed test methodology and associated structure are required. In this solution, an FPGA board was used as the controller platform, with multiple VHDL circuit controllers, data collection and reporting modules. The structure was demonstrated by …
Obfuscation Framework Based On Functionally Equivalent Combinatorial Logic Families, Moses C. James
Obfuscation Framework Based On Functionally Equivalent Combinatorial Logic Families, Moses C. James
Theses and Dissertations
This thesis aims to be a few building blocks in the bridge between theoretical and practical software obfuscation that researchers will one day construct. We provide a method for random uniform selection of circuits based on a functional signature and specific construction specifiers. Additionally, this thesis includes the first formal definition of an algorithm that performs only static analysis on a program; that is analysis that does not rely on the input and output behavior of the analyzed program. This is analogous to some techniques used in real-world software reverse engineering. Finally, this thesis uses the equivalent circuit library to …
Software Obfuscation With Symmetric Cryptography, Alan C. Lin
Software Obfuscation With Symmetric Cryptography, Alan C. Lin
Theses and Dissertations
Software protection is of great interest to commercial industry. Millions of dollars and years of research are invested in the development of proprietary algorithms used in software programs. A reverse engineer that successfully reverses another company‘s proprietary algorithms can develop a competing product to market in less time and with less money. The threat is even greater in military applications where adversarial reversers can use reverse engineering on unprotected military software to compromise capabilities on the field or develop their own capabilities with significantly less resources. Thus, it is vital to protect software, especially the software’s sensitive internal algorithms, from …
College Of Extended Learning Online Registration System, Chai-Ching Tsai
College Of Extended Learning Online Registration System, Chai-Ching Tsai
Theses Digitization Project
The purpose of this project is to provide staff and future students at College of Extended Learning a web based interface to process course registration online. This system is called College of Extended Learning Online Registration System C♯ (CELORS-C♯). This project is a revision of a previous version of College of Extended Learning Online Registration System. The previous version of CELORS has been used by College of Extended Learning as of March 2007. The difference between the previous CELORS and CELORS-C♯ is that the previous CELORS is coded in JAVA but CELORS-C♯ is coded in C. Also, CELORS-C♯ has a …
Design And Implementation Of A Multi-Player Role Playing Game, Giang Tuan Trang
Design And Implementation Of A Multi-Player Role Playing Game, Giang Tuan Trang
Theses Digitization Project
The purpose of this project was to solve a multiplayer computer game problem. A team of 15 students were formed to solve a game programming problem in the summer of 2008. The team consisted of students from various programming backgrounds and interests. The team's goal was to finish the first working artifact minus the art work by the end of summer 2008. This first artifact with a concrete, solid architecture will serve as a foundation for future students to learn game programming.
Building Web Applications Using Web Services, Keerthi Nannapaneni
Building Web Applications Using Web Services, Keerthi Nannapaneni
Theses Digitization Project
This project was performed to get hands on experience on the implementation of web services. During this project execution, significant time was spent researching about existing web services and various programming environments that can be used for building the application. The following application - AJAX, JavaScript, Java, Java server pages, HTML, and CSS. Existing data content from the following web service resources were used in this application - Google API, ArcWebServices, Weather XML feed. The purpose of this application is to show the map location along with the weather of the place selected by the user. This application can be …
Amvc: A Loosely-Coupled Architecture For Component-Based Clients, Brendan Lawlor
Amvc: A Loosely-Coupled Architecture For Component-Based Clients, Brendan Lawlor
Theses
There is an architectural deficit in most currently undertaken rich client applications: In n-tier applications the presentation layer is represented as a single layer. This is as true of browser-based rich clients (Rich Internet Applications) as of rich desktop clients since both are designed along component-based, event-driven lines. The result of creating rich clients without sufficient application architecture underpinning is often tightly-coupled code of unnecessary complexity, with the associated high cost of maintenance. No commonly understood pattern is currently evident that would allow rich client components to be combined into a loosely coupled application. This paper describes the theory and …
Model-Based Instrumentation Of Distributed Applications, Jan Schäfer
Model-Based Instrumentation Of Distributed Applications, Jan Schäfer
Theses
Problems such as inconsistent or erroneous instrumentation often plague applications whose source code is manually instrumented during the implementation phase. Integrating performance instrumentation capabilities into the Model Driven Software Development (MDSD) process would greatly assist software engineers who do not have detailed knowledge of source code instrumentation technologies. This thesis presents an approach that offers instrumentation support to software designers and developers. A collection of instrumentation patterns is defined to represent typical instrumentation scenarios for distributed applications. A UML profile derived from these patterns is then used to annotate UML models. Based on suitable code generation templates, the annotated models …
Moops: A Web Implementation Of The Personal Software Process Reporting System, Thomas Russell Gigler Iii.
Moops: A Web Implementation Of The Personal Software Process Reporting System, Thomas Russell Gigler Iii.
Theses Digitization Project
The purpose of Moops is to bridge the gap between PSP Scriber, geared very specifically to the CSCI655 class, and other available PSP implications which are so general they are difficult to use immediately without valuable time spent learning the software. Moops is a PHP/MySQL based web application designed to provide the students taking the CSCI655 graduate software engineering course at CSUSB with an intuitive, easy to use tool to implement the Personal Software Process (PSP). Moops eliminates the possibility of errors in calculations by completing all calculations for the user.
Implementation Of Reinforcement Learning In Game Strategy Design, Chien-Yu Lin
Implementation Of Reinforcement Learning In Game Strategy Design, Chien-Yu Lin
Theses Digitization Project
The purpose of this study is to apply reinforcement learning to the design of game strategy. In the gaming industry, the strategy used by computers to win a game is usually pre-programmed by game designers according to the game patterns or a set of rules.