Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Physical Sciences and Mathematics

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


Secureqemu: Emulation-Based Software Protection Providing Encrypted Code Execution And Page Granularity Code Signing, William B. Kimball Dec 2008

Secureqemu: Emulation-Based Software Protection Providing Encrypted Code Execution And Page Granularity Code Signing, William B. Kimball

Theses and Dissertations

This research presents an original emulation-based software protection scheme providing protection from reverse code engineering (RCE) and software exploitation using encrypted code execution and page-granularity code signing, respectively. Protection mechanisms execute in trusted emulators while remaining out-of-band of untrusted systems being emulated. This protection scheme is called SecureQEMU and is based on a modified version of Quick Emulator (QEMU) [5]. RCE is a process that uncovers the internal workings of a program. It is used during vulnerability and intellectual property (IP) discovery. To protect from RCE program code may have anti-disassembly, anti-debugging, and obfuscation techniques incorporated. These techniques slow the …


Steganography In Ipv6, Barret Miller Dec 2008

Steganography In Ipv6, Barret Miller

Computer Science and Computer Engineering Undergraduate Honors Theses

Steganography is the process of hiding a secret message within another message such that it is difficult to detect the presence of the secret message. In other words, the existence of the secret message is hidden. A covert channel refers to the actual medium that is used to communicate the information such as a message, image, or file. This honors thesis uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages are passed from one party to another. A fully functional computer program was designed and written …


Hardware, Software And Data Analysis Techniques For Sram-Based Field Programmable Gate Array Circuits, Eugene B. Hockenberry Jun 2008

Hardware, Software And Data Analysis Techniques For Sram-Based Field Programmable Gate Array Circuits, Eugene B. Hockenberry

Theses and Dissertations

This work presents a built, tested, and demonstrated test structure that is low-cost, flexible, and re-usable for robust radiation experimentation, primarily to investigate memory, in this case SRAMs and SRAM-based FPGAs. The space environment can induce many kinds of failures due to radiation effects. These failures result in a loss of money, time, intelligence, and information. In order to evaluate technologies for potential failures, a detailed test methodology and associated structure are required. In this solution, an FPGA board was used as the controller platform, with multiple VHDL circuit controllers, data collection and reporting modules. The structure was demonstrated by …


Obfuscation Framework Based On Functionally Equivalent Combinatorial Logic Families, Moses C. James Mar 2008

Obfuscation Framework Based On Functionally Equivalent Combinatorial Logic Families, Moses C. James

Theses and Dissertations

This thesis aims to be a few building blocks in the bridge between theoretical and practical software obfuscation that researchers will one day construct. We provide a method for random uniform selection of circuits based on a functional signature and specific construction specifiers. Additionally, this thesis includes the first formal definition of an algorithm that performs only static analysis on a program; that is analysis that does not rely on the input and output behavior of the analyzed program. This is analogous to some techniques used in real-world software reverse engineering. Finally, this thesis uses the equivalent circuit library to …


Software Obfuscation With Symmetric Cryptography, Alan C. Lin Mar 2008

Software Obfuscation With Symmetric Cryptography, Alan C. Lin

Theses and Dissertations

Software protection is of great interest to commercial industry. Millions of dollars and years of research are invested in the development of proprietary algorithms used in software programs. A reverse engineer that successfully reverses another company‘s proprietary algorithms can develop a competing product to market in less time and with less money. The threat is even greater in military applications where adversarial reversers can use reverse engineering on unprotected military software to compromise capabilities on the field or develop their own capabilities with significantly less resources. Thus, it is vital to protect software, especially the software’s sensitive internal algorithms, from …


College Of Extended Learning Online Registration System, Chai-Ching Tsai Jan 2008

College Of Extended Learning Online Registration System, Chai-Ching Tsai

Theses Digitization Project

The purpose of this project is to provide staff and future students at College of Extended Learning a web based interface to process course registration online. This system is called College of Extended Learning Online Registration System C♯ (CELORS-C♯). This project is a revision of a previous version of College of Extended Learning Online Registration System. The previous version of CELORS has been used by College of Extended Learning as of March 2007. The difference between the previous CELORS and CELORS-C♯ is that the previous CELORS is coded in JAVA but CELORS-C♯ is coded in C. Also, CELORS-C♯ has a …


Design And Implementation Of A Multi-Player Role Playing Game, Giang Tuan Trang Jan 2008

Design And Implementation Of A Multi-Player Role Playing Game, Giang Tuan Trang

Theses Digitization Project

The purpose of this project was to solve a multiplayer computer game problem. A team of 15 students were formed to solve a game programming problem in the summer of 2008. The team consisted of students from various programming backgrounds and interests. The team's goal was to finish the first working artifact minus the art work by the end of summer 2008. This first artifact with a concrete, solid architecture will serve as a foundation for future students to learn game programming.


Building Web Applications Using Web Services, Keerthi Nannapaneni Jan 2008

Building Web Applications Using Web Services, Keerthi Nannapaneni

Theses Digitization Project

This project was performed to get hands on experience on the implementation of web services. During this project execution, significant time was spent researching about existing web services and various programming environments that can be used for building the application. The following application - AJAX, JavaScript, Java, Java server pages, HTML, and CSS. Existing data content from the following web service resources were used in this application - Google API, ArcWebServices, Weather XML feed. The purpose of this application is to show the map location along with the weather of the place selected by the user. This application can be …


Amvc: A Loosely-Coupled Architecture For Component-Based Clients, Brendan Lawlor Jan 2008

Amvc: A Loosely-Coupled Architecture For Component-Based Clients, Brendan Lawlor

Theses

There is an architectural deficit in most currently undertaken rich client applications: In n-tier applications the presentation layer is represented as a single layer. This is as true of browser-based rich clients (Rich Internet Applications) as of rich desktop clients since both are designed along component-based, event-driven lines. The result of creating rich clients without sufficient application architecture underpinning is often tightly-coupled code of unnecessary complexity, with the associated high cost of maintenance. No commonly understood pattern is currently evident that would allow rich client components to be combined into a loosely coupled application. This paper describes the theory and …


Model-Based Instrumentation Of Distributed Applications, Jan Schäfer Jan 2008

Model-Based Instrumentation Of Distributed Applications, Jan Schäfer

Theses

Problems such as inconsistent or erroneous instrumentation often plague applications whose source code is manually instrumented during the implementation phase. Integrating performance instrumentation capabilities into the Model Driven Software Development (MDSD) process would greatly assist software engineers who do not have detailed knowledge of source code instrumentation technologies. This thesis presents an approach that offers instrumentation support to software designers and developers. A collection of instrumentation patterns is defined to represent typical instrumentation scenarios for distributed applications. A UML profile derived from these patterns is then used to annotate UML models. Based on suitable code generation templates, the annotated models …


Moops: A Web Implementation Of The Personal Software Process Reporting System, Thomas Russell Gigler Iii. Jan 2008

Moops: A Web Implementation Of The Personal Software Process Reporting System, Thomas Russell Gigler Iii.

Theses Digitization Project

The purpose of Moops is to bridge the gap between PSP Scriber, geared very specifically to the CSCI655 class, and other available PSP implications which are so general they are difficult to use immediately without valuable time spent learning the software. Moops is a PHP/MySQL based web application designed to provide the students taking the CSCI655 graduate software engineering course at CSUSB with an intuitive, easy to use tool to implement the Personal Software Process (PSP). Moops eliminates the possibility of errors in calculations by completing all calculations for the user.


Implementation Of Reinforcement Learning In Game Strategy Design, Chien-Yu Lin Jan 2008

Implementation Of Reinforcement Learning In Game Strategy Design, Chien-Yu Lin

Theses Digitization Project

The purpose of this study is to apply reinforcement learning to the design of game strategy. In the gaming industry, the strategy used by computers to win a game is usually pre-programmed by game designers according to the game patterns or a set of rules.