ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
Filtering by
- Creators: Xue, Guoliang
of human’s life. These systems are storing and operating on more and more sensitive
data of users. Attackers may want to obtain the data to peek at users’ privacy or
pollute the data to cause system malfunction. In addition, these systems are not
user-friendly for some people such as children, senior citizens, and visually impaired
users. Therefore, it is of cardinal significance to improve both security and usability
of mobile and IoT systems. This report consists of four parts: one automatic locking
system for mobile devices, one systematic study of security issues in crowdsourced
indoor positioning systems, one usable indoor navigation system, and practical attacks
on home alarm IoT systems.
Chapter 1 overviews the challenges and existing solutions in these areas. Chapater
2 introduces a novel system ilock which can automatically and immediately lock the
mobile devices to prevent data theft. Chapter 3 proposes attacks and countermeasures
for crowdsourced indoor positioning systems. Chapter 4 presents a context-aware indoor
navigation system which is more user-friendly for visual impaired people. Chapter
5 investigates some novel attacks on commercial home alarm systems. Chapter 6
concludes the report and discuss the future work.