Matching Items (22)
Filtering by

Clear all filters

148008-Thumbnail Image.png
Description

Through research, interviews, and analysis, our paper provides the local community with a resource that offers a comprehensive collection of insight into the Mirabella at ASU Life Plan Community and the projected impact it will have on the City of Tempe and Arizona State University.

ContributorsAnand, Rohan (Co-author) / Dicke, George (Co-author) / Stephens, Corey (Co-author) / Sadusky, Brian (Thesis director) / Schiller, Christoph (Committee member) / Dean, W.P. Carey School of Business (Contributor) / Department of Finance (Contributor) / Department of Supply Chain Management (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148076-Thumbnail Image.png
Description

Through research, interviews, and analysis, our paper provides the local community with a resource that offers a comprehensive collection of insight into the Mirabella at ASU Life Plan Community and the projected impact it will have on the City of Tempe and Arizona State University.

ContributorsStephens, Corey Christopher (Co-author) / Dicke, George (Co-author) / Anand, Rohan (Co-author) / Sadusky, Brian (Thesis director) / Schiller, Christoph (Committee member) / Dean, W.P. Carey School of Business (Contributor) / Department of Finance (Contributor) / Sandra Day O'Connor College of Law (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
137152-Thumbnail Image.png
Description
Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is

Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is widely used for secure access control and applications where a contactless authentication element is desirable. Unfortunately, iCLASS has been shown to have security issues. Nevertheless customers continue to use it because of the great cost that would be required to completely replace it. This Honors Thesis will address attacks against iCLASS and means for countering them that do not require such an overhaul.
ContributorsMellott, Matthew John (Author) / Ahn, Gail-Joon (Thesis director) / Thorstenson, Tina (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2014-05
137309-Thumbnail Image.png
Description
Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise

Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise a processor by implementing new malicious instructions or altering the functionality of existing instructions, including processor-accelerated virtualization or cryptographic primitives. Not only is this attack vector capable of subverting all software-enforced security policies and access controls, but it also leaves behind no postmortem forensic evidence since the write-only patch memory is cleared upon system reset. Although supervisor privileges (ring zero) are required to update processor microcode, this attack cannot be easily mitigated due to the implementation of microcode update functionality within processor silicon. In this paper, we reveal the microarchitecture and mechanism of microcode updates, present a security analysis of this attack vector, and provide some mitigation suggestions.
Created2014-05
137375-Thumbnail Image.png
Description
Smartphones have become increasingly common over the past few years, and mobile games continue to be the most common type of application (Apple, Inc., 2013). For many people, the social aspect of gaming is very important, and thus most mobile games include support for playing with multiple players. However, there

Smartphones have become increasingly common over the past few years, and mobile games continue to be the most common type of application (Apple, Inc., 2013). For many people, the social aspect of gaming is very important, and thus most mobile games include support for playing with multiple players. However, there is a lack of common knowledge about which implementation of this functionality is most favorable from a development standpoint. In this study, we evaluate three different types of multiplayer gameplay (pass-and-play, Bluetooth, and GameCenter) via development cost and user interviews. We find that pass-and-play, the most easily-implemented mode, is not favored by players due to its inconvenience. We also find that GameCenter is not as well favored as expected due to latency of GameCenter's servers, and that Bluetooth multiplayer is the most well favored for social play due to its similarity to real-life play. Despite there being a large overhead in developing and testing Bluetooth and GameCenter multiplayer due to Apple's development process, this is irrelevant since professional developers must enroll in this process anyway. Therefore, the most effective multiplayer mode to develop is mostly determined by whether Internet play is desirable: Bluetooth if not, GameCenter if so. Future studies involving more complete development work and more types of multiplayer modes could yield more promising results.
ContributorsBradley, Michael Robert (Author) / Collofello, James (Thesis director) / Wilkerson, Kelly (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-12
137289-Thumbnail Image.png
Description
This paper is based on a research undertaking to understand China's presence in Africa and how this relates to Western relations with the continent. The research attempts to determine which option, Europe/US or the Chinese, may be the most suitable partner in development for Africa, as well as discuss what

This paper is based on a research undertaking to understand China's presence in Africa and how this relates to Western relations with the continent. The research attempts to determine which option, Europe/US or the Chinese, may be the most suitable partner in development for Africa, as well as discuss what can be done to maximize the benefits, and mitigate the negative aspects of that relationship. A comparative analysis approach is used to judge the viability of each partner, and each is assessed according to a set of criteria, including the following: 1. Equitable and Respectful Relations 2. Maintenance of Sovereignty 3. Ability and Willingness to Finance Sustainable Development in Africa 4. Shared Experience and Understanding 5. Historical Element Drawing on the collected research presented in this document, the major finding is that the Chinese have a fundamentally different approach to aid and investment, and harbor conceptually distinctive ideas regarding development than the West. Based on the outcome of the comparative study against the above criteria, it is suggested that Africa may benefit from selecting China as a partner in achieving its own sustainable development, and suggestions are offered to effectively leverage this partnership.
ContributorsBoucher, Sara Alexandra (Author) / Aubrey, Lisa (Thesis director) / Li, Wei (Committee member) / Barrett, The Honors College (Contributor) / W. P. Carey School of Business (Contributor) / School of Social Transformation (Contributor)
Created2014-05
137481-Thumbnail Image.png
Description
We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI

We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI methods. We discuss how to correct these flaws once they are discovered. Finally, we discuss the Usable Security Development Model for developing usable secure systems.
ContributorsJorgensen, Jan Drake (Author) / Ahn, Gail-Joon (Thesis director) / VanLehn, Kurt (Committee member) / Wilkerson, Kelly (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05
131337-Thumbnail Image.png
Description
Apple’s HomeKit framework centralizes control of smart home devices and allows users to create home automations based on predefined rules. For example, a user can add a rule to turn off all the lights in their house whenever they leave. Currently, these rules must be added through a graphical user

Apple’s HomeKit framework centralizes control of smart home devices and allows users to create home automations based on predefined rules. For example, a user can add a rule to turn off all the lights in their house whenever they leave. Currently, these rules must be added through a graphical user interface provided by Apple or a third-party app on iOS. This thesis describes how a text-based language provides users with a more expressive means of creating complex home automations and successfully implements such a language. Rules created using this text-based format are parsed and interpreted into rules that can be added directly into HomeKit. This thesis also explores how security features should be implemented with this text-based approach. Since automations are run by the system without user interaction, it is important to consider how the system itself can provide functionality to address the unintended consequences that may result from running an automation. This is especially important for the text-based approach since its increase in expressiveness makes it easier for a user to make a mistake in programming that leads to a security concern. The proposed method for preventing unintended side effects is using a simulation to run every automation prior to actually running the automation on real-world devices. This approach allows users to code some conditions that must be satisfied in order for the automation to run on devices in the home. This thesis describes the creation of such a program that successfully simulates every device in the home. There were limitations, however, with Apple's HomeKit framework, which made it impractical to match the state of simulated devices to real devices in the home. Without being able to match the current state of the home to the current state of the simulation, this method cannot satisfy the goal of ensuring that certain adverse effects will not occur as a result of automations. Other smart home control platforms that provide more extensibility could be used to create this simulation-based security approach. Perhaps as Apple continues to open up their HomeKit platform to developers, this approach may be feasible within Apple's ecosystem at some point in the future.
ContributorsSharp, Trevor Ryan (Co-author) / Sharp, Trevor (Co-author) / Bazzi, Rida (Thesis director) / Doupe, Adam (Committee member) / Economics Program in CLAS (Contributor) / Department of Management and Entrepreneurship (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
132385-Thumbnail Image.png
Description
The Solis Lofts Development Proposal thesis consisted of a full prospective development within the City of Tempe. Our team conducted a vast amount of market research to determine what sector of the market would provide the best return on investment. We organized meetings with local brokers from Cushman & Wakefield,

The Solis Lofts Development Proposal thesis consisted of a full prospective development within the City of Tempe. Our team conducted a vast amount of market research to determine what sector of the market would provide the best return on investment. We organized meetings with local brokers from Cushman & Wakefield, CBRE, JLL, and Colliers International to learn more about the current market environment. Also, we organized meetings with local developers, architects, and lenders. These included Merit Partners, Sunbelt Holdings, MODUS Development, Catclar Investments, 5Visual, Butler Design Group, and Colonial Capital. Through the research we conducted we were able to successfully determine that a multifamily development within the City of Tempe would be a great way to enter the Commercial Real Estate Development field. Our project consisted of the full land acquisition process, architectural site plan review, financial analysis, and completion of the product.
ContributorsFarnsworth, Yzaac (Co-author) / Liu, Braden (Co-author) / Zwillinger, Mason (Co-author) / Butura, Alex (Co-author) / Sadusky, Brian (Thesis director) / Avrhami, Mathew (Committee member) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
132391-Thumbnail Image.png
Description
The Solis Lofts Development Proposal thesis consisted of a full prospective development within the City of Tempe. Our team conducted a vast amount of market research to determine what sector of the market would provide the best return on investment. We organized meetings with local brokers from Cushman & Wakefield,

The Solis Lofts Development Proposal thesis consisted of a full prospective development within the City of Tempe. Our team conducted a vast amount of market research to determine what sector of the market would provide the best return on investment. We organized meetings with local brokers from Cushman & Wakefield, CBRE, JLL, and Colliers International to learn more about the current market environment. Also, we organized meetings with local developers, architects, and lenders. These included Merit Partners, Sunbelt Holdings, MODUS Development, Catclar Investments, 5Visual, Butler Design Group, and Colonial Capital. Through the research we conducted we were able to successfully determine that a multifamily development within the City of Tempe would be a great way to enter the Commercial Real Estate Development field. Our project consisted of the full land acquisition process, architectural site plan review, financial analysis, and completion of the product.
ContributorsLiu, Braden John (Co-author) / Butura, Alexander (Co-author) / Zwillinger, Mason (Co-author) / Farnsworth, Yzaac (Co-author) / Sadusky, Brian (Thesis director) / Avrhami, Matthew (Committee member) / Department of Finance (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2019-05