Matching Items (3)
Filtering by

Clear all filters

135336-Thumbnail Image.png
Description
Alternative currencies have a long and varied history, in which Bitcoin is the latest chapter. The pseudonymous Satoshi Nakamoto created Bitcoin as an implementation of the concept of a cryptocurrency, or a decentralized currency based on the principles of cryptography. Since its creation in 2008, Bitcoin has had a fairly

Alternative currencies have a long and varied history, in which Bitcoin is the latest chapter. The pseudonymous Satoshi Nakamoto created Bitcoin as an implementation of the concept of a cryptocurrency, or a decentralized currency based on the principles of cryptography. Since its creation in 2008, Bitcoin has had a fairly tumultuous existence that limited its adoption. Wide price fluctuations occurred as the appeal of free money by running a piece of computer software drove people to purchase expensive hardware, and high-profile scandals cast Bitcoin as an unstable currency well-suited primarily for purchasing illicit materials. Consumer confidence in the currency was extremely low, and businesses were extremely hesitant to accept a currency that could easily lose half (or more) of its value overnight. However, recent years have seen the currency begin to stabilize as businesses and mainstream investors have begun to accept and support it. Alternative cryptocurrencies, titled "altcoins," have also been created to fill market niches that Bitcoin was not addressing. Governmental intervention, a concern of many following the currency, has been surprisingly restrained and has actually contributed to its stability. The future of Bitcoin looks very bright as it carries the dream of the alternative currency forward into the 21st century.
ContributorsReardon, Brett (Co-author) / Burke, Ryan (Co-author) / Happel, Stephen (Thesis director) / Boyes, William (Committee member) / School of Politics and Global Studies (Contributor) / Department of Information Systems (Contributor) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
Description
On Android, existing security procedures require apps to request permissions for access to sensitive resources.

Only when the user approves the requested permissions will the app be installed.

However, permissions are an incomplete security mechanism.

In addition to a user's limited understanding of permissions, the mechanism does not account for the possibility that

On Android, existing security procedures require apps to request permissions for access to sensitive resources.

Only when the user approves the requested permissions will the app be installed.

However, permissions are an incomplete security mechanism.

In addition to a user's limited understanding of permissions, the mechanism does not account for the possibility that different permissions used together have the ability to be more dangerous than any single permission alone.

Even if users did understand the nature of an app's requested permissions, this mechanism is still not enough to guarantee that a user's information is protected.

Applications can potentially send or receive sensitive information from other applications without the required permissions by using intents.

In other words, applications can potentially collaborate in ways unforeseen by the user, even if the user understands the permissions of each app independently.

In this thesis, we present several graph-based approaches to address these issues.

We determine the permissions of an app and generate scores based on our assigned value of certain resources.

We analyze these scores overall, as well as in the context of the app's category as determined by Google Play.

We show that these scores can be used to identify overzealous apps, as well as apps that do not properly fit within their category.

We analyze potential interactions between different applications using intents, and identify several promiscuous apps with low permission scores, showing that permissions alone are not sufficient to evaluate the security risks of an app.

Our analyses can form the basis of a system to assist users in identifying apps that can potentially compromise user privacy.
ContributorsGibson, Aaron (Author) / Bazzi, Rida (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Walker, Erin (Committee member) / Arizona State University (Publisher)
Created2015
154792-Thumbnail Image.png
Description
The success of Bitcoin has generated significant interest in the financial community to understand whether the technological underpinnings of the cryptocurrency paradigm can be leveraged to improve the efficiency of financial processes in the existing infrastructure. Various alternative proposals, most notably, Ripple and Ethereum, aim to provide solutions to the

The success of Bitcoin has generated significant interest in the financial community to understand whether the technological underpinnings of the cryptocurrency paradigm can be leveraged to improve the efficiency of financial processes in the existing infrastructure. Various alternative proposals, most notably, Ripple and Ethereum, aim to provide solutions to the financial community in different ways. These proposals derive their security guarantees from either the computational hardness of proof-of-work or voting based distributed consensus mechanism, both of which can be computationally expensive. Furthermore, the financial audit requirements for a participating financial institutions have not been suitably addressed.

This thesis presents a novel approach of constructing a non-consensus based decentralized financial transaction processing model with a built-in efficient audit structure. The problem of decentralized inter-bank payment processing is used for the model design. The two key insights used in this work are (1) to utilize a majority signature based replicated storage protocol for transaction authorization, and (2) to construct individual self-verifiable audit trails for each node as opposed to a common Blockchain. Theoretical analysis shows that the model provides cryptographic security for transaction processing and the presented audit structure facilitates financial auditing of individual nodes in time independent of the number of transactions.
ContributorsGupta, Saurabh (Author) / Bazzi, Rida (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Herlihy, Maurice (Committee member) / Arizona State University (Publisher)
Created2016