Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 79

Full-Text Articles in Physical Sciences and Mathematics

Data-Driven Network-Centric Threat Assessment, Dae Wook Kim Jan 2017

Data-Driven Network-Centric Threat Assessment, Dae Wook Kim

Browse all Theses and Dissertations

As the Internet has grown increasingly popular as a communication and information sharing platform, it has given rise to two major types of Internet security threats related to two primary entities: end-users and network services. First, information leakages from networks can reveal sensitive information about end-users. Second, end-users systems can be compromised through attacks on network services, such as scanning-and-exploit attacks, spamming, drive-by downloads, and fake anti-virus software. Designing threat assessments to detect these threats is, therefore, of great importance, and a number of the detection systems have been proposed. However, these existing threat assessment systems face significant challenges in …


Searching For The Unmarked Henry Kinsey Family Graves At The Va Hospital Grounds In Dayton, Ohio, Using Magnetic, Electromagnetic, And Radar Methods, Andrew William Bergman Jan 2017

Searching For The Unmarked Henry Kinsey Family Graves At The Va Hospital Grounds In Dayton, Ohio, Using Magnetic, Electromagnetic, And Radar Methods, Andrew William Bergman

Browse all Theses and Dissertations

The Henry Kinsey family was among the first to settle in the Dayton, Ohio, region in the early 19th century. Henry, and his wife Eva, were buried near what is known as the deer keeper’s lodge, a small building where the deer keeper lived, on the modern-day Dayton Veterans Affairs hospital grounds. In the time since they have been buried, the location of their gravesites has been lost. The main purpose of this thesis is to locate and map their graves using multiple geophysical methods. A secondary purpose is to compare the effectiveness of each geophysical method. Three geophysical methods …


Synthesis Of 4-Iodo-3-(2-Iodoaryl) And 4-Bromo-3-(2-Bromoaryl) Sydnones And Their Reactions With Sodium Sulfite, Sodium Borohydride, And Iodine Monochloride, Kyle Jacob Liddy Jan 2017

Synthesis Of 4-Iodo-3-(2-Iodoaryl) And 4-Bromo-3-(2-Bromoaryl) Sydnones And Their Reactions With Sodium Sulfite, Sodium Borohydride, And Iodine Monochloride, Kyle Jacob Liddy

Browse all Theses and Dissertations

One goal of the Turnbull research group has been the synthesis of dihalogenated arylsydnones; i.e. sydnones with halogen substitution on the sydnone ring itself, as well as at the position on the aryl ring ortho to the sydnone. Further, it has been of interest to explore the reactivity of these compounds, once obtained. The present study examined the synthesis of 4-iodo-3-(2-iodoaryl)-, or “diiodo”, and 4-bromo-3-(2-bromoaryl)-, or “dibromo”, sydnones and the reactions of these compounds with Na2SO3 (sodium sulfite) and NaBH4 (sodium borohydride) to create a better understanding of the reactivity of diiodo and dibromo arylsydnones in general. Additionally, the reactivity …


Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala Jan 2017

Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala

Browse all Theses and Dissertations

The Internet of Things (IoT) is a complex paradigm where billions of devices are connected to a network. These connected devices form an intelligent system of systems that share the data without human-to-computer or human-to-human interaction. These systems extract meaningful data that can transform human lives, businesses, and the world in significant ways. However, the reality of IoT is prone to countless cyber-attacks in the extremely hostile environment like the internet. The recent hack of 2014 Jeep Cherokee, iStan pacemaker, and a German steel plant are a few notable security breaches. To secure an IoT system, the traditional high-end security …


Virtuo-Its: An Interactive Tutoring System To Teach Virtual Memory Concepts Of An Operating System, Venkata Krishna Kanth Musunuru Jan 2017

Virtuo-Its: An Interactive Tutoring System To Teach Virtual Memory Concepts Of An Operating System, Venkata Krishna Kanth Musunuru

Browse all Theses and Dissertations

Interactive tutoring systems are software applications that help individuals to learn difficult concepts. They can allow students to interact with ideas from essential mathematics to more complicated subjects like software engineering. This thesis concentrates on one such interactive tutoring system (ITS) designed for teaching concepts related to operating system virtual memory. Operating system concepts can be troublesome to learn without having someone or something to explain them. Even when an instructor is able to provide detailed explanations, it is still exceptionally difficult for students without a computer science foundation to comprehend these concepts. Students require a sophisticated set of mental …


The Electrochemical Behavior Of Molybdenum And Tungsten Tri-Nuclear Metal Clusters With Ethanoate Ligands, Edward Nelson Kennedy Jan 2017

The Electrochemical Behavior Of Molybdenum And Tungsten Tri-Nuclear Metal Clusters With Ethanoate Ligands, Edward Nelson Kennedy

Browse all Theses and Dissertations

The goal of this research was to study the electrochemical behavior of tri-nuclear clusters of molybdenum and tungsten. In addition, the feasibility of using these clusters as catalysts for the purpose of oxidizing ethanol was investigated. Four tri-nuclear cluster compounds were studied: hexa-Mu2-acetatotriaquadi-Mu3-oxotrimolybdenum (IV, IV, IV) trifluoromethanesulfonate [Mo3O2(O2CCH3)6(H2O)3](CF3SO3)2, hexa-Mu2-acetatotriaquadi-Mu3-oxodimolybdenum (IV, IV) tungsten (IV) trifluoromethanesulfonate [Mo2W2O2(O2CCH3)6(H2O)3](CF3SO3)2, hexa-Mu2-acetatotriaquadi-Mu3-oxomolybdenum (IV) ditungsten (IV, IV) trifluoromethanesulfonate [MoW2O2(O2CCH3)6(H2O)3](CF3SO3)2, and hexa-Mu2-acetatotriaquadi-Mu3-oxotritungsten (IV, IV, IV) trifluoromethanesulfonate [W3O2(O2CCH3)6(H2O)3](CF3SO3)2.Data was gathered from experimental results with cyclic voltammetry for the four tri-nuclear clusters. Initially, an ionic liquid, EMIBF4 (1-ethyl-3-methylimidazolium tetrafluoroborate), was used as the solvent. Subsequent solvents for use with these …


Hamiltonicity In Bidirected Signed Graphs And Ramsey Signed Numbers, Mohammed A. Mutar Jan 2017

Hamiltonicity In Bidirected Signed Graphs And Ramsey Signed Numbers, Mohammed A. Mutar

Browse all Theses and Dissertations

Strong connectivity, 2-factors, and their relevance to Hamiltonicity, have been intensively studied on various classes of directed and 2-colored graphs. In chapter one, we define strong connectivity and bidirected 2-factors on bidirected graphs as a common genralization for both directed graphs and 2-colored graphs. We give necessary and sufficient conditions for the existence of bidirected Hamilton cycles in the following bidirected signed graphs: ± Kn, ± K{n,n}, and - K{n,n}. The Ramsey number problem is considered an interesting problem in graph theory which asks for the minimum positive integer r that assures a 2-colored complete Kr has a monochramatic clique …


Gait Analysis From Wearable Devices Using Image And Signal Processing, Bradley A. Schneider Jan 2017

Gait Analysis From Wearable Devices Using Image And Signal Processing, Bradley A. Schneider

Browse all Theses and Dissertations

We present the results of analyzing gait motion in-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera and are validated using the ground truth dataset. We perform an additional data collection with both the camera and a body-worn accelerometer …


Characterizing Concepts In Taxonomy For Entity Recommendations, Siva Kumar Cheekula Jan 2017

Characterizing Concepts In Taxonomy For Entity Recommendations, Siva Kumar Cheekula

Browse all Theses and Dissertations

Entity recommendation systems are enormously popular on the Web. These systems harness manually crafted taxonomies for improving recommendations. For example, Yahoo created the Open Directory Project for search and recommendation, and Amazon utilizes its own product taxonomy. While these taxonomies are of high quality, it is a labor and time-intensive process to manually create and keep them up to date. Instead, in this era ofWeb 2.0 where users collaboratively create large amounts of information on the Web, it is possible to utilize user-generated content to automatically generate good quality taxonomies. However, harnessing such taxonomies for entity recommendations has not been …


A Power Iteration Based Co-Training Approach To Achieve Convergence For Multi-View Clustering, Pavankalyan Yallamelli Jan 2017

A Power Iteration Based Co-Training Approach To Achieve Convergence For Multi-View Clustering, Pavankalyan Yallamelli

Browse all Theses and Dissertations

Collecting diversified opinions is the key to achieve "the Wisdom of Crowd". In this work, we propose to use a novel multi-view clustering method to group the crowd so that diversified opinions can be effectively sampled from different groups of people.Clustering is the process of dividing input data into possible subsets, where every element (entity) in each subset is considered to be related by some similarity measure. For example, a set of social media users can be clustered using their locations or common interests. However, real-world data is often best represented by multiple views/dimensions. For example, a set of social …


Multi-Class Classification Of Textual Data: Detection And Mitigation Of Cheating In Massively Multiplayer Online Role Playing Games, Naga Sai Nikhil Maguluri Jan 2017

Multi-Class Classification Of Textual Data: Detection And Mitigation Of Cheating In Massively Multiplayer Online Role Playing Games, Naga Sai Nikhil Maguluri

Browse all Theses and Dissertations

The success of any multiplayer game depends on the player’s experience. Cheating/Hacking undermines the player’s experience and thus the success of that game. Cheaters, who use hacks, bots or trainers are ruining the gaming experience of a player and are making him leave the game. As the video game industry is a constantly increasing multibillion dollar economy, it is crucial to assure and maintain a state of security. Players reflect their gaming experience in one of the following places: multiplayer chat, game reviews, and social media. This thesis is an exploratory study where our goal is to experiment and propose …


Sched-Its: An Interactive Tutoring System To Teach Cpu Scheduling Concepts In An Operating Systems Course, Bharath Kumar Koya Jan 2017

Sched-Its: An Interactive Tutoring System To Teach Cpu Scheduling Concepts In An Operating Systems Course, Bharath Kumar Koya

Browse all Theses and Dissertations

Operating systems is an essential course in computer science curriculum, which helps students to develop a mental model of how computer operating systems work. The internal mechanisms and processes of an operating system (OS) are often complex, non-deterministic and intangible which makes them difficult for students to understand. One such concept is central processing unit (CPU) scheduling. CPU scheduling forms the basis of the multiprogramming in an OS. In practice, OS courses involve classroom lectures describing high-level abstractions of the concepts, and students complete programming assignments to apply the material in a more concrete way. Depending on the programming assignments, …


Removal Of Select Chlorinated Hydrocarbons By Nanoscale Zero-Valent Iron Supported On Powdered Activated Charcoal, Md Abu Raihan Chowdhury Jan 2017

Removal Of Select Chlorinated Hydrocarbons By Nanoscale Zero-Valent Iron Supported On Powdered Activated Charcoal, Md Abu Raihan Chowdhury

Browse all Theses and Dissertations

Nanoscale Zero Valent Iron (NZVI) has shown limited effectiveness in degrading chlorinated hydrocarbons (CHCs), like 1,1,1-Trichloroethane (1,1,1-TCA) and Trichloroethene (TCE), in aqueous solution. A rapid agglomeration behavior of NZVI particles due to van der waals and magnetic forces can negatively impact its overall effectiveness due to increase in particle size, and decline in CHC degradation kinetics. Different support materials, such as clays and activated carbon, have been used to stabilize NZVI particle and reduce agglomeration in aqueous solution. In this bench-scale study, NZVI supported on Powdered Activated Charcoal (PAC) was selected to prepare a composite, called PAC/NZVI, for a more …


Pre-Mt. Simon Seismic Sequences Below West-Central Indiana: Local Interpretation And Regional Significance, Andrew Michael Parent Jan 2017

Pre-Mt. Simon Seismic Sequences Below West-Central Indiana: Local Interpretation And Regional Significance, Andrew Michael Parent

Browse all Theses and Dissertations

Constraining the composition, structure, and origin of basement provinces, deep assemblages of Precambrian rocks, is largely dependent on deep boreholes and geophysical techniques. This is especially true for the eastern U.S. midcontinent. Here, I employ regional 2-D seismic reflection, Bouguer gravity, and aeromagnetic data to interpret the upper crust below west-central Indiana. Seismic reflection data were donated to Wright State University in 2015. Geopotential data are available through the USGS and affiliates. These geophysical data, together, are analyzed in a regional geologic context. Three distinct seismic stratigraphic sequences are observed on 2-D sections. The first, uppermost sequence, typified by continuous, …


Adaptive Optics System Baseline Modeling For A Usaf Quad Axis Telescope, Nathaniel R. Morris Jan 2017

Adaptive Optics System Baseline Modeling For A Usaf Quad Axis Telescope, Nathaniel R. Morris

Browse all Theses and Dissertations

Atmospheric turbulence has afflicted accurate observations of celestial bodies since man first gazed upon the stars. In this past century, the technology of adaptive optics was invented to help compensate for the optical distortions that atmospheric turbulence causes. As part of that technology, artificial guide stars, wave front sensors, deformable mirrors, and other optical components were developed to correct these wave aberrations. The purpose of this study focuses on the modeling and configuration of an adaptive optics system that is appropriate for the John Bryan Observatory Quad Axis Telescope System (JBO-Q), which is funded by the United States Air Force. …


Detection Of Ddos Attacks Against The Sdn Controller Using Statistical Approaches, Basheer Husham Ali Al-Mafrachi Jan 2017

Detection Of Ddos Attacks Against The Sdn Controller Using Statistical Approaches, Basheer Husham Ali Al-Mafrachi

Browse all Theses and Dissertations

In traditional networks, switches and routers are very expensive, complex, and inflexible because forwarding and handling of packets are in the same device. However, Software Defined Networking (SDN) makes networks design more flexible, cheaper, and programmable because it separates the control plane from the data plane. SDN gives administrators of networks more flexibility to handle the whole network by using one device which is the controller. Unfortunately, SDN faces a lot of security problems that may severely affect the network operations if not properly addressed. Threat vectors may target main components of SDN such as the control plane, the data …


Detecting Information Leakage In Android Malware Using Static Taint Analysis, Soham P. Kelkar Jan 2017

Detecting Information Leakage In Android Malware Using Static Taint Analysis, Soham P. Kelkar

Browse all Theses and Dissertations

According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted attackers to use Android as a platform to conduct malicious activities. To achieve these malicious activities some attacker choose to develop malicious Apps to steal information from the Android users. As the modern day smartphones process, a lot of sensitive information, information security, and privacy becoming a potential target for the attacker. The malicious Apps steal information from the infected phone and send this information to the attacker-controlled URLs using various Android sink functions. Therefore, it necessary to protect data as it can prove detrimental …


Ab Initio Study Of The Effects Of Humidity On Perovskite Based Hybrid Solar Cell Interfaces, Shantanu Rajendra Rachalwar Jan 2017

Ab Initio Study Of The Effects Of Humidity On Perovskite Based Hybrid Solar Cell Interfaces, Shantanu Rajendra Rachalwar

Browse all Theses and Dissertations

Despite the impressive success of perovskite-based hybrid solar cells, their widespread usage has been limited partially owing to stability issues under working environmental conditions. Among these, the effects of humidity are some of the most significant. Water intercalation generally degrades the material, shortens its useful life, and reduces the efficiency of photovoltaic energy conversion. Understanding the reasons for these effects can be achieved through detailed and accurate atomic-scale analysis. Here, we study water intercalation at the interfaces of perovskite-based hybrid solar cell material and TiO2 electrode. Accurate ab initio computer simulations are used to obtain structural and electronic properties. We …


Development Of Computer Program For Wind Resource Assessment, Rotor Design And Rotor Performance, Valentina Jami Jan 2017

Development Of Computer Program For Wind Resource Assessment, Rotor Design And Rotor Performance, Valentina Jami

Browse all Theses and Dissertations

People understand and have seen that renewable energy has many advantages over conventional energy sources. Because of these advantages, more and more emphasis has been given to generating electrical energy with renewable sources. Among the many renewable and conventional ways currently available for a society to generate electrical power, wind turbines are one of the cheapest ways of doing this. The main objective of this thesis work is to develop a computer program that assesses the wind resource at a given location, designs a wind turbine rotor for optimum power capture for one wind speed, and analyzes the performance of …


Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima Jan 2017

Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima

Browse all Theses and Dissertations

Semantic Web extends the current web, using ontologies, metadata and other technologies to establish links between terms and concepts. This enables machines to automatically integrate information across different platforms utilizing the standard definitions. Furthermore, reasoning agents can infer new knowledge by gathering existing information and these additional connections between them. As a result of being designed and maintained independently, data sources exhibit highly heterogeneous nature. This increases the complexity of data integration and hinders interoperability. However, if we can align the overlapping concepts among different domains of knowledge, the prospect of achieving interoperability and integration without having any intermediate reasoning …


Extraordinary Optical Transmission In Aligned Carbon Nanotube Devices At Terahertz Frequencies., Shaikhah F. Almousa Jan 2017

Extraordinary Optical Transmission In Aligned Carbon Nanotube Devices At Terahertz Frequencies., Shaikhah F. Almousa

Browse all Theses and Dissertations

In the phenomenon known as extraordinary optical transmission (EOT), a narrow band of selected frequencies are transmitted when incident on an array of subwavelength periodic apertures where the resonant frequency is determined by the geometry of the array of apertures and optical properties of the metal-dielectric interface. This takes place due to the excitation of surface plasmon polaritons (SPPs) at the metal and dielectric interface. Using the COMSOL Multiphysics software RF Module, a unit cell of a carbon nanotube (CNT) based EOT device is modeled in order to verify theoretical calculations of the resonant frequency using S-parameter calculations. The simulation …


Harassment Detection On Twitter Using Conversations, Venkatesh Edupuganti Jan 2017

Harassment Detection On Twitter Using Conversations, Venkatesh Edupuganti

Browse all Theses and Dissertations

Social media has brought people closer than ever before, but the use of social media has also brought with it a risk of online harassment. Such harassment can have a serious impact on a person such as causing low self-esteem and depression. The past research on detecting harassment on social media is primarily based on the content of messages exchanged on social media. The lack of context when relying on a single social media post can result in a high degree of false alarms. In this study, I focus on the reliable detection of harassment on Twitter by better understanding …


Antimicrobial Activity Of Fractionated Borohydride-Capped And Electrochemical Colloidal Silver, Marjorie M. Markopoulos Jan 2017

Antimicrobial Activity Of Fractionated Borohydride-Capped And Electrochemical Colloidal Silver, Marjorie M. Markopoulos

Browse all Theses and Dissertations

Silver nanoparticles (AgNPs) and ionic silver (Ag+) are known to be broad-spectrum antimicrobial agents. Recent studies show these agents may be an alternative to the most widely used drinking water disinfectant, chlorine. Chlorine is a toxic industrial chemical with a lethal concentration of 430 ppm after 30 minutes. Additionally, chlorine can react with naturally occurring materials to produce a number of disinfection byproducts such as chloroform and trihalomethanes. Some of these byproducts pose cancer risks in addition to other negative impacts to human health. These would be eliminated with the use of Ag+ or AgNPs. The main goal of this …


Development Of An Android Based Performance Assessment System For Motivational Interviewing Training, Sowmya Pappu Jan 2017

Development Of An Android Based Performance Assessment System For Motivational Interviewing Training, Sowmya Pappu

Browse all Theses and Dissertations

Motivational Interviewing (MI) has been proved to be an effective Screening, Brief Intervention, and Referral to Treatment (SBIRT) technique. It is an evidence-based practice used to identify, reduce, and prevent problematic use, abuse, and dependence on alcohol and illicit drugs. It emphasizes on patient-centered counseling approach that can help resolve their ambivalence through a non-confrontational, goal-oriented style for eliciting behavior change from the patient, almost like patients talk themselves into change. This approach provokes less resistance and stimulates the progress of patients at their own pace towards deciding about planning, making and sustaining positive behavioral change. Thus, training medical professionals …


Development Of An Ultra-Portable Non-Contact Wound Measurement System, Anka Babu Billa Jan 2017

Development Of An Ultra-Portable Non-Contact Wound Measurement System, Anka Babu Billa

Browse all Theses and Dissertations

Continuous monitoring of changes in wound size is key to correctly predict whether wounds will heal readily with conventional treatment or require more aggressive treatment strategies. Unfortunately, existing wound measurement solutions don't meet the clinical demand due to their limitations in accuracy, operating complexity and time, acquisition and operation cost, or reproducibility, resulting in unnecessarily lengthy recovery or extra treatment procedures, incurring an excessively high financial cost, and in many cases extended usage of addictive painkillers. In this thesis, we proposed and developed a low cost, a portable non-contact solution that combines multi-spectral imaging and a portfolio of imaging processing …


Hydrothermal Atomic Force Microscopy Investigation Of Barite Growth: The Role Of Spectator Ions In Elementary Step Edge Growth Kinetics And Hillock Morphology, Sarah A. Jindra Jan 2017

Hydrothermal Atomic Force Microscopy Investigation Of Barite Growth: The Role Of Spectator Ions In Elementary Step Edge Growth Kinetics And Hillock Morphology, Sarah A. Jindra

Browse all Theses and Dissertations

To better understand the role of spectator ions in barite growth, the kinetics of step edge growth on barite (001) surfaces were studied under various salt solutions. Hydrothermal Atomic Force Microscopy (HAFM) was used to investigate the effect of background electrolytes (NaCl, NaBr and NaNO3) as a function of saturation index and ionic strength (I) on barite growth sourced at dislocations at 108 oC. Results show that hillock morphology is affected by I, as well as type of anion, where the prevalence of steps aligned on the [010] direction is highest under Cl- …


Terahertz Molecular Spectroscopy As A Tool For Analytical Probing Of Cellular Metabolism, Mitchell Cameron Paul Jan 2017

Terahertz Molecular Spectroscopy As A Tool For Analytical Probing Of Cellular Metabolism, Mitchell Cameron Paul

Browse all Theses and Dissertations

Terahertz spectroscopy has found use as an analytical tool in determining chemical composition of exhaled human breath. This thesis demonstrates a novel application of this technology - analytical sensing of gaseous metabolic products of several types of human cell cultures. An innovative experimental system was developed for probing cellular metabolism using terahertz [THz] rotational spectroscopy. Gaseous emissions of cell cultures were analyzed and compared between several cell types. Cancerous and healthy lung cells as well as cancerous liver cells were studied. This technique carries a lot of promise as a noninvasive method of distinguishing between cell types and identifying cell …


Interaction Of Very Low Frequency (Vlf) And Extremely Low Frequency (Elf) Waves In The Ionospheric Plasma And Parametric Antenna Concept, Tony C. Kim Jan 2017

Interaction Of Very Low Frequency (Vlf) And Extremely Low Frequency (Elf) Waves In The Ionospheric Plasma And Parametric Antenna Concept, Tony C. Kim

Browse all Theses and Dissertations

This research dramatically increase radiation efficiency of very low frequency (VLF) and extremely low frequency (ELF) antenna in the ionosphere by implementing a concept of a parametric antenna. The research addresses the interaction of the electromagnetic waves in the atmosphere; analyzes the radiation efficiency of different types of RF frequencies (ex: Very low Frequency (VLF) and Extremely Low Frequency (ELF)); and includes different types of antennas, such as dipole and loop antennas, in the ionosphere environment and simulating the differences to verify the parametric antenna concept. This VLF analysis can be performed many ways and this VLF frequency is widely …


Efficient Reasoning Algorithms For Fragments Of Horn Description Logics, David Carral Jan 2017

Efficient Reasoning Algorithms For Fragments Of Horn Description Logics, David Carral

Browse all Theses and Dissertations

We characterize two fragments of Horn Description Logics and we define two specialized reasoning algorithms that effectively solve the standard reasoning tasks over each of such fragments. We believe our work to be of general interest since (1) a rather large proportion of real-world Horn ontologies belong to some of these two fragments and (2) the implementations based on our reasoning approach significantly outperform state-of-the-art reasoners. Claims (1) and (2) are extensively proven via empirically evaluation.


Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam Jan 2017

Settings Protection Add-On: A User-Interactive Browser Extension To Prevent The Exploitation Of Preferences, Venkata Naga Siva Seelam

Browse all Theses and Dissertations

The abuse of browser preferences is a significant application security issue, despite numerous protections against automated software changing these preferences. Browser hijackers modify user’s desired preferences by injecting malicious software into the browser. Users are not aware of these modifications, and the unwanted changes can annoy the user and circumvent security preferences. Reverting these changes is not easy, and users often have to go through complicated sequences of steps to restore their preferences to the previous values. Tasks to resolve this issue include uninstalling and re-installing the browser, resetting browser preferences, and installing malware removal tools. This thesis describes a …