Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum Dec 2023

Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum

Honors Theses

Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …


Comparing Composite Severe Weather Indices Of Thunderstorm Activity On Sea-Breeze And Non-Sea-Breeze Days In The Mobile, Alabama Area, Elizabeth Seiler May 2022

Comparing Composite Severe Weather Indices Of Thunderstorm Activity On Sea-Breeze And Non-Sea-Breeze Days In The Mobile, Alabama Area, Elizabeth Seiler

Honors Theses

Sea breezes (SB) occur frequently from May through October along the U.S. Gulf of Mexico Coast. One reason why SBs interest forecasters is their ability to spawn summertime thunderstorms, which can cause flash flooding, lightning, and hail. However, forecasting the exact timing and location of SB-driven convection can be challenging. This thesis will focus on Mobile and Baldwin Counties in southwest Alabama, which experience two types of phenomena – SBs along the Gulf of Mexico Coast and bay breezes on either side of Mobile Bay. Over the past years, multiple undergraduate students have analyzed Mobile, Alabama radar imagery of past …


Functionalization Of Novel Pp5 Inhibitors, Hope P. Hill Jan 2021

Functionalization Of Novel Pp5 Inhibitors, Hope P. Hill

Honors Theses

The overexpression of protein phosphatase 5 has been correlated to tumor cell reproduction making it a candidate for small molecule drug therapy. Selective and potent inhibition of protein phosphatase 2A (PP2A) enzyme has been previously achieved through the development of the molecule fostriecin with key functionality being a lactone and unsaturated linear chain. The large synthetic overhead of fostriecin has led to exploration of other small molecule inhibitors that could mirror fostriecin’s interaction with the active site in the catalytic domain of PP5. The naturally occurring inhibitor, cantharidin, is functionalized with an epoxy containing eleven carbon chain to optimize binding …


A Hybrid Decision Tree - Neural Network (Dt-Nn) Model For Predictive Maintenance Applications In Aircraft, Jarrod Carson Jan 2021

A Hybrid Decision Tree - Neural Network (Dt-Nn) Model For Predictive Maintenance Applications In Aircraft, Jarrod Carson

Honors Theses

As the Age of Information has evolved over the last several decades, the demand for technology which stores, analyzes, and utilizes data has increased substantially. For countless industries such as the medical, retail, and aircraft industries, such technology is crucial to their operation. This project proposes a hybrid machine learning model consisting of Decision Trees and Neural Networks which is able to classify data of varying volume and variety effectively and efficiently. The model’s structure consists of a decision tree with each node of the tree containing a neural network trained to classify a specific category of the output using …


Developing A Deterministic Polymorphic Circuit Generator Using Random Boolean Logic Expansion, Trinity Stroud Jan 2021

Developing A Deterministic Polymorphic Circuit Generator Using Random Boolean Logic Expansion, Trinity Stroud

Honors Theses

Securing applications on untrusted platforms can involve protection against legitimate endusers who act in the role of malicious reverse engineers and hackers. Such adversaries have access to the full execution environment of programs, whether the program comes in the form of software or hardware. In this thesis, we consider the nature of obfuscating algorithms that perform iterative, stepwise transformation of programs into more complex forms that are intended to increase the complexity (time, resources) for malicious reverse engineers.

We consider simple Boolean logic programs as the domain of interest and examine a specific transformation technique known as Iterative Selection and …