Matching Items (161)
133260-Thumbnail Image.png
Description
Smart cars are defined by the European Union Agency for Network and Information Security (ENISA) as systems providing connected, added-value features in order to enhance car users' experience or improve car safety. Because of their extra features, smart cars utilize sophisticated computer systems. These systems, particularly the Controller Area Network

Smart cars are defined by the European Union Agency for Network and Information Security (ENISA) as systems providing connected, added-value features in order to enhance car users' experience or improve car safety. Because of their extra features, smart cars utilize sophisticated computer systems. These systems, particularly the Controller Area Network (CAN) bus and protocol, have been shown to provide information that can be used to accurately identify individual Electronic Control Units (ECUs) within a car and the driver that is operating a car. I expand upon this work to consider how information from in-vehicle computer systems can be used to identify individual vehicles. I consider fingerprinting vehicles as a means of aiding in stolen car recovery, thwarting VIN forgery, and supporting an intrusion detection system for networks of smart and autonomous vehicles in the near future. I provide an overview of in-vehicle computer systems and detail my work toward building an ECU testbed and fingerprinting vehicles.
ContributorsDavison, Paulina (Author) / Zhao, Ziming (Thesis director) / Ahn, Gail-Joon (Committee member) / Shoshitaishvili, Yan (Committee member) / Doupe, Adam (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
134266-Thumbnail Image.png
Description
Node.js is an extremely popular development framework for web applications. The appeal of its event-driven, asynchronous flow and the convenience of JavaScript as its programming language have driven its rapid growth, and it is currently deployed by leading companies in retail, finance, and other important sectors. However, the tools currently

Node.js is an extremely popular development framework for web applications. The appeal of its event-driven, asynchronous flow and the convenience of JavaScript as its programming language have driven its rapid growth, and it is currently deployed by leading companies in retail, finance, and other important sectors. However, the tools currently available for Node.js developers to secure their applications against malicious attackers are notably scarce. While there has been a substantial amount of security tools created for web applications in many other languages such as PHP and Java, very little exists for Node.js applications. This could compromise private information belonging to companies such as PayPal and WalMart. We propose a tool to statically analyze Node.js web applications for five popular vulnerabilites: cross-site scripting, SQL injection, server-side request forgery, command injection, and code injection. We base our tool off of JSAI, a platform created to parse client-side JavaScript for security risks. JSAI is novel because of its configuration capabilities, which allow a user to choose between various analysis options at runtime in order to select the most thorough analysis with the least amount of processing time. We contribute to the development of our tool by rigorously analyzing and documenting vulnerable functions and objects in Node.js that are relevant to the vulnerabilities we have selected. We intend to use this documentation to build a robust Node.js static analysis tool and we hope that other developers will also incorporate this analysis into their Node.js security projects.
ContributorsWasserman, Jonathan Kanter (Author) / Doupe, Adam (Thesis director) / Ahn, Gail-Joon (Committee member) / Zhao, Ziming (Committee member) / School of Historical, Philosophical and Religious Studies (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134439-Thumbnail Image.png
Description
In the area of hardware, reverse engineering was traditionally focused on developing clones—duplicated components that performed the same functionality of the original component. While reverse engineering techniques have been applied to software, these techniques have instead focused on understanding high-level software designs to ease the software maintenance burden. This approach

In the area of hardware, reverse engineering was traditionally focused on developing clones—duplicated components that performed the same functionality of the original component. While reverse engineering techniques have been applied to software, these techniques have instead focused on understanding high-level software designs to ease the software maintenance burden. This approach works well for traditional applications that contain source code, however, there are circumstances, particularly regarding web applications, where it would be very beneficial to clone a web application and no source code is present, e.g., for security testing of the application or for offline mock testing of a third-party web service. We call this the web application cloning problem.
This thesis presents a possible solution to the problem of web application cloning. Our approach is a novel application of inductive programming, which we call inductive reverse engineering. The goal of inductive reverse engineering is to automatically reverse engineer an abstraction of the web application’s code in a completely black-box manner. We build this approach using recent advances in inductive programming, and we solve several technical challenges to scale the inductive programming techniques to realistic-sized web applications. We target the initial version of our inductive reverse engineering tool to a subset of web applications, i.e., those that do not store state and those that do not have loops. We introduce an evaluation methodology for web application cloning techniques and evaluate our approach on several real-world web applications. The results indicate that inductive reverse engineering can effectively reverse engineer specific types of web applications. In the future, we hope to extend the power of inductive reverse engineering to web applications with state and to learn loops, while still maintaining tractability.
ContributorsLiao, Kevin (Author) / Doupe, Adam (Thesis director) / Ahn, Gail-Joon (Committee member) / Zhao, Ziming (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / W. P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134879-Thumbnail Image.png
Description
The purpose of this project was to implement and analyze a new proposed rootkit that claims a greater level of stealth by hiding in cache. Today, the vast majority of embedded devices are powered by ARM processors. To protect their processors from attacks, ARM introduced a hardware security extension known

The purpose of this project was to implement and analyze a new proposed rootkit that claims a greater level of stealth by hiding in cache. Today, the vast majority of embedded devices are powered by ARM processors. To protect their processors from attacks, ARM introduced a hardware security extension known as TrustZone. It provides an isolated execution environment within the embedded device that enables us to run various memory integrity and malware detection tools to identify possible breaches in security to the normal world. Although TrustZone provides this additional layer of security, it also adds another layer of complexity, and thus comes with its own set of vulnerabilities. This new rootkit identifies and exploits a cache incoherence in the ARM device as a result of TrustZone. The newly proposed rootkit, called CacheKit, takes advantage of this cache incoherence to avoid memory introspection from tools in secure world. We implement CacheKit on the i.MX53 development board, which features a single ARM Cortex A8 processor, to analyze the limitations and vulnerabilities described in the original paper. We set up the Linux environment on the computer to be able to cross-compile for the development board which will be running the FreeScale android 2.3.4 platform with a 2.6.33 Linux kernel. The project is implemented as a kernel module that once installed on the board can manipulate cache as desired to conceal the rootkit. The module exploits the fact that in TrustZone, the secure world does not have access to the normal world cache. First, a technique known as Cache-asRAM is used to ensure that the rootkit is loaded only into cache of the normal world where it can avoid detection from the secure world. Then, we employ the cache maintenance instructions and resisters provided in the cp15 coprocessor to keep the code persistent in cache. Furthermore, the cache lines are mapped to unused I/O address space so that if cache content is flushed to RAM for inspection, the data is simply lost. This ensures that even if the rootkit were to be flushed into memory, any trace of the malicious code would be lost. CacheKit prevents defenders from analyzing the code and destroys any forensic evidence. This provides attackers with a new and powerful tool that is excellent for certain scenarios that were previously thought to be secure. Finally, we determine the limitations of the prototype to determine possible areas for future growth and research into the security of networked embedded devices.
ContributorsGutierrez Barnett, Mauricio Antonio (Author) / Zhao, Ziming (Thesis director) / Doupe, Adam (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
135242-Thumbnail Image.png
Description
Penetration testing is regarded as the gold-standard for understanding how well an organization can withstand sophisticated cyber-attacks. However, the recent prevalence of markets specializing in zero-day exploits on the darknet make exploits widely available to potential attackers. The cost associated with these sophisticated kits generally precludes penetration testers from simply

Penetration testing is regarded as the gold-standard for understanding how well an organization can withstand sophisticated cyber-attacks. However, the recent prevalence of markets specializing in zero-day exploits on the darknet make exploits widely available to potential attackers. The cost associated with these sophisticated kits generally precludes penetration testers from simply obtaining such exploits – so an alternative approach is needed to understand what exploits an attacker will most likely purchase and how to defend against them. In this paper, we introduce a data-driven security game framework to model an attacker and provide policy recommendations to the defender. In addition to providing a formal framework and algorithms to develop strategies, we present experimental results from applying our framework, for various system configurations, on real-world exploit market data actively mined from the darknet.
ContributorsRobertson, John James (Author) / Shakarian, Paulo (Thesis director) / Doupe, Adam (Committee member) / Electrical Engineering Program (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
151773-Thumbnail Image.png
Description
Norwegian composer Ola Gjeilo (b. 1978) is highly regarded as an accomplished and prolific composer of choral music. His creative output includes works for chorus, solo piano, and wind symphony. His unique style infuses elements of cinematic music, jazz and improvisation, with particularly intriguing selections of text. This study examines

Norwegian composer Ola Gjeilo (b. 1978) is highly regarded as an accomplished and prolific composer of choral music. His creative output includes works for chorus, solo piano, and wind symphony. His unique style infuses elements of cinematic music, jazz and improvisation, with particularly intriguing selections of text. This study examines the factors that influence Gjeilo's compositional techniques, and the musical interpretations of conductor Charles Bruffy in his preparation for The Phoenix Chorale's recording Northern Lights: Choral Works by Ola Gjeilo. The eleven works discussed in this study are: The Ground, Evening Prayer, Ubi caritas, Prelude, Northern Lights, The Spheres, Tota pulchra es, Serenity, Phoenix (Agnus Dei), Unicornis captivatur, and Dark Night of the Soul. As a relatively new and young composer, there is very little published literature on Gjeilo and his works. This study provides an intimate glance into the creative process of the composer. By composing in multiple styles and with a variety of inspirational sources, Gjeilo creates a fresh approach toward composition of new choral music. His style is revealed through interviews and numerous collaborations with conductors and performers who have prepared and performed his music, as well through an examination of the eleven works recorded by The Phoenix Chorale.
ContributorsGarrison, Ryan Derrick (Author) / Reber, William (Thesis advisor) / Saucier, Catherine (Committee member) / Rockmaker, Jody (Committee member) / Doan, Jerry (Committee member) / Arizona State University (Publisher)
Created2013
157518-Thumbnail Image.png
Description
Visual applications – those that use camera frames as part of the application – provide a rich, context-aware experience. The continued development of mixed and augmented reality (MR/AR) computing environments furthers the richness of this experience by providing applications a continuous vision experience, where visual information continuously provides context for

Visual applications – those that use camera frames as part of the application – provide a rich, context-aware experience. The continued development of mixed and augmented reality (MR/AR) computing environments furthers the richness of this experience by providing applications a continuous vision experience, where visual information continuously provides context for applications and the real world is augmented by the virtual. To understand user privacy concerns in continuous vision computing environments, this work studies three MR/AR applications (augmented markers, augmented faces, and text capture) to show that in a modern mobile system, the typical user is exposed to potential mass collection of sensitive information, posing privacy and security deficiencies to be addressed in future systems.

To address such deficiencies, a development framework is proposed that provides resource isolation between user information contained in camera frames and application access to the network. The design is implemented using existing system utilities as a proof of concept on the Android operating system and demonstrates its viability with a modern state-of-the-art augmented reality library and several augmented reality applications. Evaluation is conducted on the design on a Samsung Galaxy S8 phone by comparing the applications from the case study with modified versions which better protect user privacy. Early results show that the new design efficiently protects users against data collection in MR/AR applications with less than 0.7% performance overhead.
ContributorsJensen, Jk (Author) / LiKamWa, Robert (Thesis advisor) / Doupe, Adam (Committee member) / Wang, Ruoyu (Committee member) / Arizona State University (Publisher)
Created2019
Description
ABSTRACT This project is comprised of two main components, a paper, and audiovisual composition (two-channel audio, single-channel video). The composition takes the beginning thematic elements from the book of Genesis and transitions to a robotic teleology (the transhuman being merged with technology). For the transhumanist, taking control of

ABSTRACT This project is comprised of two main components, a paper, and audiovisual composition (two-channel audio, single-channel video). The composition takes the beginning thematic elements from the book of Genesis and transitions to a robotic teleology (the transhuman being merged with technology). For the transhumanist, taking control of the evolutionary process both in speed and in trajectory is the ultimate goal.The composition, Queue R is narrative and tripartite in structure, having a beginning, middle, and end. However, a more in-depth analysis of the piece will yield smaller parts and extractions. Although the composition is programmatic, many of the visual and aural gestures lean towards an abstract aesthetic. The paper will discuss various tenets of Christianity and Transhumanism, including religious motifs, philosophical aspects, oppositional and congruent features between the two. Ray Kurzweil’s “The Six Epochs of Evolution,” is used as a reference and launching point for Transhuman teleology and is discussed later in the paper. Lastly, the paper will discuss how the artwork engages with Transhumanism and Christianity, and end with a discussion of some aspects the compositional process. Finally, the title of the piece, Queue R, refers to a line, a queue which leads to a Robotic existence, that is, an existence where the human being and technology merge. Also, Queue R refers to the present state of technology, a QR code being a scannable (machine readable) code which contains information about a product or item being scanned. The video may be found at the link to the channel of the composer, and will list all audiovisual compositions. Click (or copy/paste into browser) on the video titled Queue R: Channel: https://www.youtube.com/channel/UCzOhPCwYGjJud92RLG_UQpQ or direct link: https://youtu.be/7ogR0Vb1-pA .
ContributorsHernandez, Brian (Author) / Bolanos, Gabriel (Thesis advisor) / Temple, Alex (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2021
171778-Thumbnail Image.png
Description
Honeypots – cyber deception technique used to lure attackers into a trap. They contain fake confidential information to make an attacker believe that their attack has been successful. One of the prerequisites for a honeypot to be effective is that it needs to be undetectable. Deploying sniffing and event logging

Honeypots – cyber deception technique used to lure attackers into a trap. They contain fake confidential information to make an attacker believe that their attack has been successful. One of the prerequisites for a honeypot to be effective is that it needs to be undetectable. Deploying sniffing and event logging tools alongside the honeypot also helps understand the mindset of the attacker after successful attacks. Is there any data that backs up the claim that honeypots are effective in real life scenarios? The answer is no.Game-theoretic models have been helpful to approximate attacker and defender actions in cyber security. However, in the past these models have relied on expert- created data. The goal of this research project is to determine the effectiveness of honeypots using real-world data. So, how to deploy effective honeypots? This is where honey-patches come into play. Honey-patches are software patches designed to hinder the attacker’s ability to determine whether an attack has been successful or not. When an attacker launches a successful attack on a software, the honey-patch transparently redirects the attacker into a honeypot. The honeypot contains fake information which makes the attacker believe they were successful while in reality they were not. After conducting a series of experiments and analyzing the results, there is a clear indication that honey-patches are not the perfect application security solution having both pros and cons.
ContributorsChauhan, Purv Rakeshkumar (Author) / Doupe, Adam (Thesis advisor) / Bao, Youzhi (Committee member) / Wang, Ruoyu (Committee member) / Arizona State University (Publisher)
Created2022
171785-Thumbnail Image.png
Description
The unmeasured Fantasias by Johann Gottfried Müthel appear as part of a collection of pedagogical exercises to foster improvisation. The information he gives in the notation of his fantasias can be elucidated with a historiographical interpretation of musical rhetoric. Müthel developed musical figures and contrasting textures in accordance with contemporary

The unmeasured Fantasias by Johann Gottfried Müthel appear as part of a collection of pedagogical exercises to foster improvisation. The information he gives in the notation of his fantasias can be elucidated with a historiographical interpretation of musical rhetoric. Müthel developed musical figures and contrasting textures in accordance with contemporary rhetorical principles of inventio, dispositio and elaboratio. An analysis of Müthel’s G-minor Fantasia provides a link between musical rhetoric and performance, as seen through its improvisatory gestures. Issues of performance practice that arise in the G-minor Fantasia are the execution of ornaments, rhythmic alterations, registration, and articulation. This paper explores primary sources contemporary to Müthel to make sense of these issues. The unmeasured Fantasias are written for a keyboard with pedal. At the time that they were written, the pedal fortepiano and pedal clavichord were seen by musicians such as Carl Phillip Emanual Bach to be the superior instruments for performing improvisations. While the notation and texture of the Fantasias suggests that Müthel intended them for organ, a consideration of the possibilities provided by the fortepiano suggests that it may be more suited to conveying aspects of the galant aesthetic.
ContributorsMealey, Natalie (Author) / Marshall, Kimberly (Thesis advisor) / Ryan, Russell (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2022