Improving Adversarial Attacks Against Malconv,
2022
Dakota State University
Improving Adversarial Attacks Against Malconv, Justin Burr
Masters Theses & Doctoral Dissertations
This dissertation proposes several improvements to existing adversarial attacks against MalConv, a raw-byte malware classifier for Windows PE files. The included contributions greatly improve the success rates and performance of gradient-based file overlay attacks. All improvements are included in a new open-source attack utility called BitCamo.
Several new payload initialization strategies for use with gradient-based attacks are proposed and evaluated as potential replacements for the randomized initialization method used by current attacks. An algorithm for determining the optimal payload size is also proposed. The resulting improvements achieve a 100% evasion rate against eligible target executables using an average payload size …
Multi-Dimensional Security Integrity Analysis Of Broad Market Internet-Connected Cameras,
2022
Dakota State University
Multi-Dimensional Security Integrity Analysis Of Broad Market Internet-Connected Cameras, Mark A. Stanislav
Masters Theses & Doctoral Dissertations
This study used a quantitative approach with a cross-sectional, descriptive analysis survey design to examine the adherence of 40 internet-connected cameras against three IoT security frameworks to determine their overall security posture. Relevant literature was reviewed showing that prior studies in a similar regard had limitations, such as a small sample population, singular market segment focus, and/or a lack of validation against formalized frameworks. This study resulted in a uniform and multi-dimensional set of findings with supporting evidence, leading to a mapping against selected IoT security frameworks that was then quantitatively analyzed for their relative adherence as individual cameras, across …
Socioapp: Detecting Your Sociability Status With Your Smartphone,
2022
University of Northern Iowa
Socioapp: Detecting Your Sociability Status With Your Smartphone, Aaron Walker
Research in the Capitol
Loneliness, isolation, and anti-social behaviors have increased in the past few years, whether that be due to social media, people paying more attention to their devices, or due to the COVID-19 pandemic. These behaviors are proven to decrease a student’s academic performance, causing their grades to decline, and disabling their motivation to learn. We aim to gain insight on this issue via the application of smartphone technology and machine learning, enabling those that use our app to understand if their being social or anti-social. We use a variety of sensors, location devices, and speaker recognition algorithms to identify behaviors that …
The Effect Of Using The Gamification Strategy On Academic Achievement And Motivation Towards Learning Problem-Solving Skills In Computer And Information Technology Course Among Tenth Grade Female Students,
2022
Ministry of Education
The Effect Of Using The Gamification Strategy On Academic Achievement And Motivation Towards Learning Problem-Solving Skills In Computer And Information Technology Course Among Tenth Grade Female Students, Mazyunah Almutairi, Prof. Ahmad Almassaad
International Journal for Research in Education
Abstract
This study aimed to identify the effect of using the gamification strategy on academic achievement and motivation towards learning problem-solving skills in computer and information technology course. A quasi-experimental method was adopted. The study population included tenth-grade female students in Al-Badi’ah schools in Riyadh. The sample consisted of 54 students divided into two equal groups: control group and experimental group. The study tools comprised an achievement test and the motivation scale. The results showed that there were statistically significant differences between the two groups in the academic achievement test in favor of the experimental group, with a large effect …
Applications Of Unsupervised Machine Learning In Autism Spectrum Disorder Research: A Review,
2022
Chapman University
Applications Of Unsupervised Machine Learning In Autism Spectrum Disorder Research: A Review, Chelsea Parlett-Pelleriti, Elizabeth Stevens, Dennis R. Dixon, Erik J. Linstead
Engineering Faculty Articles and Research
Large amounts of autism spectrum disorder (ASD) data is created through hospitals, therapy centers, and mobile applications; however, much of this rich data does not have pre-existing classes or labels. Large amounts of data—both genetic and behavioral—that are collected as part of scientific studies or a part of treatment can provide a deeper, more nuanced insight into both diagnosis and treatment of ASD. This paper reviews 43 papers using unsupervised machine learning in ASD, including k-means clustering, hierarchical clustering, model-based clustering, and self-organizing maps. The aim of this review is to provide a survey of the current uses of …
Bridges And Barriers: An Exploration Of Engagements Of The Research Community With The Openstreetmap Community,
2022
Hebrew University of Jerusalem
Bridges And Barriers: An Exploration Of Engagements Of The Research Community With The Openstreetmap Community, A. Yair Grinberger, Marco Minghini, Godwin Yeboah, Levente Juhasz, Peter Mooney
GIS Center
The academic community frequently engages with OpenStreetMap (OSM) as a data source and research subject, acknowledging its complex and contextual nature. However, existing literature rarely considers the position of academic research in relation to the OSM community. In this paper we explore the extent and nature of engagement between the academic research community and the larger communities in OSM. An analysis of OSM-related publications from 2016 to 2019 and seven interviews conducted with members of one research group engaged in OSM-related research are described. The literature analysis seeks to uncover general engagement patterns while the interviews are used to identify …
Marine Fishery Management Agent-Based Modeling,
2022
Rollins College
Marine Fishery Management Agent-Based Modeling, Hiroki Sato
Honors Program Theses
Fisheries in the United States not only provide seafood for us to enjoy and contribute significantly to the American economy, they also help us to sustain ecological balance and protect our ocean resources. Fishery management agencies in the United States conduct stock assessments to discover the changes in the abundance of fishery stocks in response to changes in the environment and effects of commercial and recreational fishing. Efficient stock assessment enables maintenance of healthy fisheries without permanently damaging the marine ecosystem. In order to forecast the future trend of fisheries, predicting fish migration patterns in response to the environmental factors …
Sustainable Computing - Without The Hot Air,
2022
University of Massachusetts Amherst
Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza
Publications
The demand for computing is continuing to grow exponentially. This growth will translate to exponential growth in computing's energy consumption unless improvements in its energy-efficiency can outpace increases in its demand. Yet, after decades of research, further improving energy-efficiency is becoming increasingly challenging, as it is already highly optimized. As a result, at some point, increases in computing demand are likely to outpace increases in its energy-efficiency, potentially by a wide margin. Such exponential growth, if left unchecked, will position computing as a substantial contributor to global carbon emissions. While prominent technology companies have recognized the problem and sought to …
Human-Controlled Fuzzing With Afl,
2022
Bachelor of Information Security, MEPhI; Moscow, Russia
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …
Odu Undergraduate Students Addressing The Societal Problems Of Parking Control, Classroom Seating, And Flood Monitoring In Hampton Roads,
2022
Old Dominion University
Odu Undergraduate Students Addressing The Societal Problems Of Parking Control, Classroom Seating, And Flood Monitoring In Hampton Roads, Stephanie K. Trusty, Gabriel Del Razo, Nathan Potter, Soad Ibrahim, Ayman Elmesalami
OUR Journal: ODU Undergraduate Research Journal
During the summer of 2021, ODU undergraduate computer science students undertook image processing research projects. These projects focused on utilizing the Raspberry Pi computer and camera module to address three real-world problems concerning parking control, classroom seating, and flood monitoring. The parking lot occupancy project aimed to develop a system that monitors the occupancy of parking spaces in a lot and communicates the status of the lot of drivers and the lot attendants. The COVID-19 classroom occupancy project sought to enforce social distancing protocols in a classroom environment by detecting seating violations and notifying the instructor and the impacted students …
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics,
2022
Purdue University
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud,
2022
Purdue University
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective,
2022
Edith Cowan University
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Annual ADFSL Conference on Digital Forensics, Security and Law
The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …
Frequency Analysis Of Trabecular Bone Structure,
2022
University of Denver
Frequency Analysis Of Trabecular Bone Structure, Daniel Parada San Martin
Electronic Theses and Dissertations
Medical data is hard to obtain due to privacy laws making research difficult. Many databases of medical data have been compiled over the years and are available to the scientific community. These databases are not comprehensive and lack many clinical conditions. Certain type of medical conditions are rare, making them harder to obtain, or are not present at all in the aforementioned databases. Due to the sparsity or complete lack of data regarding certain conditions, research has stifled. Recent developments in machine learning and generative neural networks have made it possible to generate realistic data that can overcome the lack …
Local-Global Results On Discrete Structures,
2022
University of Denver
Local-Global Results On Discrete Structures, Alexander Lewis Stevens
Electronic Theses and Dissertations
Local-global arguments, or those which glean global insights from local information, are central ideas in many areas of mathematics and computer science. For instance, in computer science a greedy algorithm makes locally optimal choices that are guaranteed to be consistent with a globally optimal solution. On the mathematical end, global information on Riemannian manifolds is often implied by (local) curvature lower bounds. Discrete notions of graph curvature have recently emerged, allowing ideas pioneered in Riemannian geometry to be extended to the discrete setting. Bakry- Émery curvature has been one such successful notion of curvature. In this thesis we use combinatorial …
Model-Based Testing Of Smart Home Systems Using Efsm, Cefsm, And Fsmapp,
2022
University of Denver
Model-Based Testing Of Smart Home Systems Using Efsm, Cefsm, And Fsmapp, Afnan Mohammed Albahli
Electronic Theses and Dissertations
Smart Home Systems (SHS) are some of the most popular Internet of Things (IoT) applications. In 2021, there were 52.22 million smart homes in the United States and they are expected to grow to 77.1 million in 2025 [71]. According to MediaPost [74], 69 percent of American households have at least one smart home device. The number of smart home systems poses a challenge for software testers to find the right approach to test these systems. This dissertation employs Extended Finite State Machines (EFSMs) [6, 24, 105], Communicating Extended Finite State Machines (EFSMs) [68] and FSMApp [10] to generate reusable …
Decoding Cyclic Codes Via Gröbner Bases,
2022
Colby College
Decoding Cyclic Codes Via Gröbner Bases, Eduardo Sosa
Honors Theses
In this paper, we analyze the decoding of cyclic codes. First, we introduce linear and cyclic codes, standard decoding processes, and some standard theorems in coding theory. Then, we will introduce Gr¨obner Bases, and describe their connection to the decoding of cyclic codes. Finally, we go in-depth into how we decode cyclic codes using the key equation, and how a breakthrough by A. Brinton Cooper on decoding BCH codes using Gr¨obner Bases gave rise to the search for a polynomial-time algorithm that could someday decode any cyclic code. We discuss the different approaches taken toward developing such an algorithm and …
Realtime Event Detection In Sports Sensor Data With Machine Learning,
2022
University of New Hampshire, Durham
Realtime Event Detection In Sports Sensor Data With Machine Learning, Mallory Cashman
Honors Theses and Capstones
Machine learning models can be trained to classify time series based sports motion data, without reliance on assumptions about the capabilities of the users or sensors. This can be applied to predict the count of occurrences of an event in a time period. The experiment for this research uses lacrosse data, collected in partnership with SPAITR - a UNH undergraduate startup developing motion tracking devices for lacrosse. Decision Tree and Support Vector Machine (SVM) models are trained and perform with high success rates. These models improve upon previous work in human motion event detection and can be used a reference …
Humanizing Computational Literature Analysis Through Art-Based Visualizations,
2022
University of Denver
Humanizing Computational Literature Analysis Through Art-Based Visualizations, Alexandria Leto
Electronic Theses and Dissertations
Inequalities in gender representation and characterization in fictional works are issues that have long been discussed by social scientists. This work addresses these inequalities with two interrelated components. First, it contributes a sentiment and word frequency analysis task focused on gender-specific nouns and pronouns in 15,000 fictional works taken from the online library, Project Gutenberg. This analysis allows for both quantifying and offering further insight on the nature of this disparity in gender representation. Then, the outcomes of the analysis are harnessed to explore novel data visualization formats using computational and studio art techniques. Our results call attention to the …
The Amorphous Nature Of Hackers: An Exploratory Study,
2022
University of New Haven
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
Annual ADFSL Conference on Digital Forensics, Security and Law
In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …