• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 51
  • 9
  • 8
  • 7
  • 6
  • 5
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 118
  • 25
  • 24
  • 24
  • 24
  • 24
  • 17
  • 16
  • 15
  • 13
  • 11
  • 10
  • 10
  • 10
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Trojan Detection in Hardware Designs

Raju, Akhilesh January 2017 (has links)
No description available.
22

The fates of Clytemnestra and Cassandra

Martin, Tamra Artelia 01 January 2009 (has links)
A majority of classic Greek and Roman literature focusing on the subject of the Trojan War and its characters portray a male dominant society in Bronze Age Greece. Homer's Iliad follows the heroes Achilles and Hector, while his Odyssey traces the journey of Odysseus on his way home to Ithaca. However, important female characters are either given short page time or are described in a negative light. My goal in completing this thesis is to give voice to the women who were portrayed in a negative way and to offer possible explanations leading up to this portrayal. I also hope to show that although men fought the war, women had to suffer the consequences. Clytemnestra, as queen of Mycenae, was left alone in her kingdom for years. She watched her husband comply with the sacrifice of her eldest daughter in order for the Greeks to win a victory over Troy. Cassandra knew the future of events, but she could not find believers to help prevent the fall of Troy. After the fall, she became Agamemnon's concubine in a foreign land. Because a majority of the Greek plays and poems are tragedies, neither woman's life has a happy or fulfilling end. It is not my goal to change this, but to give possible explanations as to what led to their fates. In writing The Fates of Clytemnestra and Cassandra, I hope to give readers of Greek and Roman literature and Trojan War enthusiasts another perspective on one of the greatest wars in literary history by showing the trials of these two important women.
23

Validating digital forensic evidence

Shanmugam, Karthikeyan January 2011 (has links)
This dissertation focuses on the forensic validation of computer evidence. It is a burgeoning field, by necessity, and there have been significant advances in the detection and gathering of evidence related to electronic crimes. What makes the computer forensics field similar to other forensic fields is that considerable emphasis is placed on the validity of the digital evidence. It is not just the methods used to collect the evidence that is a concern. What is also a problem is that perpetrators of digital crimes may be engaged in what is called anti-forensics. Digital forensic evidence techniques are deliberately thwarted and corrupted by those under investigation. In traditional forensics the link between evidence and perpetrator's actions is often straightforward: a fingerprint on an object indicates that someone has touched the object. Anti-forensic activity would be the equivalent of having the ability to change the nature of the fingerprint before, or during the investigation, thus making the forensic evidence collected invalid or less reliable. This thesis reviews the existing security models and digital forensics, paying particular attention to anti-forensic activity that affects the validity of data collected in the form of digital evidence. This thesis will build on the current models in this field and suggest a tentative first step model to manage and detect possibility of anti-forensic activity. The model is concerned with stopping anti-forensic activity, and thus is not a forensic model in the normal sense, it is what will be called a “meta-forensic” model. A meta-forensic approach is an approach intended to stop attempts to invalidate digital forensic evidence. This thesis proposes a formal procedure and guides forensic examiners to look at evidence in a meta-forensic way.
24

Automated trojan detection and analysis in field programmable gate arraysa

Houghton, Nicholas 16 December 2016 (has links)
Electronics have become such a staple in modern life that we are just as a ected by their vulnerabilities as they are. Ensuring that the processors that control them are secure is paramount to our intellectual safety, our nancial safety, our privacy, and even our personal safety. The market for integrated circuits is steadily being consumed by a recon gurable type of processor known as a eld-programmable gate- array (FPGA). The very features that make this type of device so successful also make them susceptible to attack. FPGAs are recon gured by software; this makes it easy for attackers to make modi cation. Such modi cations are known as hardware trojans. There have been many techniques and strategies to ensure that these devices are free from trojans but few have taken advantage of the central feature of these devices. The con guration Bitstream is the binary le which programs these devices. By extracting and analyzing it, a much more accurate and e cient means of detecting trojans can be achieved. This discussion presents a new methodology for exploiting the power of the con guration Bitstream to detect and described hardware trojans. A software application is developed that automates this methodology. / Graduate / 0537 / 0544 / 0984 / nhoughto@uvic.ca
25

A multi-layer approach to designing secure systems: from circuit to software

Zhou, Boyou 04 June 2019 (has links)
In the last few years, security has become one of the key challenges in computing systems. Failures in the secure operations of these systems have led to massive information leaks and cyber-attacks. Case in point, the identity leaks from Equifax in 2016, Spectre and Meltdown attacks to Intel and AMD processors in 2017, Cyber-attacks on Facebook in 2018. These recent attacks have shown that the intruders attack different layers of the systems, from low-level hardware to software as a service(SaaS). To protect the systems, the defense mechanisms should confront the attacks in the different layers of the systems. In this work, we propose four security mechanisms for computing systems: (i ) using backside imaging to detect Hardware Trojans (HTs) in Application Specific Integrated Circuits (ASICs) chips, (ii ) developing energy-efficient reconfigurable cryptographic engines, (iii) examining the feasibility of malware detection using Hardware Performance Counters (HPC). Most of the threat models assume that the root of trust is the hardware running beneath the software stack. However, attackers can insert malicious hardware blocks, i.e. HTs, into the Integrated Circuits (ICs) that provide back-doors to the attackers or leak confidential information. HTs inserted during fabrication are extremely hard to detect since their overheads in performance and power are below the variations in the performance and power caused by manufacturing. In our work, we have developed an optical method that identifies modified or replaced gates in the ICs. We use the near-infrared light to image the ICs because silicon is transparent to near-infrared light and metal reflects infrared light. We leverage the near-infrared imaging to identify the locations of each gate, based on the signatures of metal structures reflected by the lowest metal layer. By comparing the imaged results to the pre-fabrication design, we can identify any modifications, shifts or replacements in the circuits to detect HTs. With the trust of the silicon, the computing system must use secure communication channels for its applications. The low-energy cost devices, such as the Internet of Things (IoT), leverage strong cryptographic algorithms (e.g. AES, RSA, and SHA) during communications. The cryptographic operations cause the IoT devices a significant amount of power. As a result, the power budget limits their applications. To mitigate the high power consumption, modern processors embed these cryptographic operations into hardware primitives. This also improves system performance. The hardware unit embedded into the processor provides high energy-efficiency, low energy cost. However, hardware implementations limit flexibility. The longevity of theIoTs can exceed the lifetime of the cryptographic algorithms. The replacement of the IoT devices is costly and sometimes prohibitive, e.g., monitors in nuclear reactors.In order to reconfigure cryptographic algorithms into hardware, we have developed a system with a reconfigurable encryption engine on the Zedboard platform. The hardware implementation of the engine ensures fast, energy-efficient cryptographic operations. With reliable hardware and secure communication channels in place, the computing systems should detect any malicious behaviors in the processes. We have explored the use of the Hardware Performance Counters (HPCs) in malware detection. HPCs are hardware units that count micro-architectural events, such as cache hits/misses and floating point operations. Anti-virus software is commonly used to detect malware but it also introduces performance overhead. To reduce anti-virus performance overhead, many researchers propose to use HPCs with machine learning models in malware detection. However, it is counter-intuitive that the high-level program behaviors can manifest themselves in low-level statics. We perform experiments using 2 ∼ 3 × larger program counts than the previous works and perform a rigorous analysis to determine whether HPCs can be used to detect malware. Our results show that the False Discovery Rate of malware detection can reach 20%. If we deploy this detection system on a fresh installed Windows 7 systems, among 1,323 binaries, 198 binaries would be flagged as malware.
26

Attitudes towards Paganism in Medieval Irish and Old Norse Texts of the Trojan War

Stanciu, Radu Razvan January 2016 (has links)
The thesis compares the depictions of paganism found in the Middle Irish Togail Troí ('The Destruction of Troy'; first half of the twelfth century) and the Old Norse Trójumanna saga ('The Story of the Trojans'; first half of the thirteenth century), which are both based on Dares Phrygius's Late Antique De excidio Troiae historia. The two vernacular adaptations are presented in the wider context of the medieval popularity of Dares's text. The in-depth analysis of the pagan references (most of which relate to mythology and ritual), reveals Togail Troí's and Trójumanna saga's general source-based approach and their shared reliance on Latin mythographic scholarship, but also a different approach concerning the literary presentation of paganism. The Irish text's 'Christian' approach to the issue (as seen through authorial comments and historical contextualisation) is shown to be in contrast to the Norse text's 'classicising' approach (i.e. paganism presented as in the classical sources themselves). The findings of this analysis are then compared with the literary attitudes towards paganism encountered in medieval Irish and Norse texts more widely (especially in those set in Ireland or Nordic countries). This comparison reveals a general sympathy for many pagan characters that finds some parallels in the Trojan texts as well, but also a different representation of pagan deities in the two traditions. Indeed, the Irish tendency to avoid depicting the gods as such and the opposite Norse tendency, to portray them in an explicit way (often from a pagan point of view), mirror the evidence furnished by Togail Troí and Trójumanna saga. The literary attitudes to paganism and particularly towards mythology, which are encountered in the two texts, are further explored from the point of view of authorship. It is shown that the Irish author is writing in a historiographical mould, while the Norse author is writing in what could be described as a mythographical mould. Two complementary lines of interpretation are sketched for this phenomenon. The first one emphasises the existence of two different cultures of dealing with paganism in Irish and Norse literature respectively. The second line of interpretation draws to the fore two different approaches to the author-text relationship, examined through the framework of medieval literary theory. The final chapters highlight the importance of the research both for our understanding of the unique and complex literary cultures of medieval Ireland and Iceland and for the light that can be shed on the multifaceted relationship between authors and texts in medieval literature through the prism of paganism.
27

An Actor’s Growth: From Student to Professional, Tackling Collegiate Theatre with Michael Lee

Lee, Michael B. 01 May 2016 (has links)
This thesis includes the journey of Michael Lee becoming a professional actor by performing several characters within two contrasting productions. The first, "The Trojan Women", by Euripides, Michael portrayed Poseidon, Talthybius, and The Guard in ETSU's very own Bud Frank Theatre. Michael's second production included the character of Charles in the modern drama "Race" by David Mamet, which was held in the newly renovated Studio 205. Michael documented his growth as an actor through daily journal entries and analyzing the final performances.
28

A Key Based Obfuscation and Anonymization of Behavior VHDL Models

Kandikonda, Balausha Varshini 22 June 2018 (has links)
Intellectual Property (IP) based Integrated Circuit (IC) design is an established approach for the design of a complex System-on-Chip (SoC). Porting the preparatory designs to third-party without enough security margin exposes an attacker to perform reverse engineering (RE) on the designs and hence counterfeiting, IP theft etc., are common now-a-days. Design obfuscation can reduce RE attempt by an attacker. In this work, we propose a key based obfuscation and anonymization method for a behavioral IP. Given a behavioral VHDL description, the assignment and conditional statements are modified by incorporating random boolean operations with unique random key bits. The obfuscated VHDL is then anonymized by random identifiers. The resultant behavioral model can be simulated correctly upon application of original key sequence. Simulation results with nine datapath intensive benchmarks with three different lengths of test sequences show that the simulation overhead is negligible (only a few seconds). We evaluate the probability of reverse engineering the obfuscated design and show that it is extremely low.
29

MCNP model of Sierra Nuclear Corporation dry spent fuel storage containers at Trojan Nuclear Power Plant

Brice, Derek J. 20 February 1998 (has links)
Graduation date: 1998
30

A Study of Jupiter Trojans

Karlsson, Ola January 2012 (has links)
Jupiter Trojan asteroid dynamics have been studied for a long time but it is only within the last decades that the known population has become large enough to make other studies meaningful. In four articles I have been scratching the surface of the unknown Trojan knowledge space. Paper I presents photometric observations confirming a larger variety in surface redness for the smaller Trojans compared to the larger ones, in line with the groups in the outer main asteroid belt. However, the largest Trojans are significantly redder compared to the largest Cybele and Hilda asteroids. Paper II is an investigation of the Trojan discovery completeness. The analysis shows that all Trojans down to a limiting absolute magnitude of H=11.5 mag have been discovered. Missing Trojans in the almost discovery-completed section should have inclinations above the mean of the same group. The faintest Trojans are discovery biased due to orbit orientations similar to the Milky Way. Paper III is a general review of dynamical and physical properties of the discovery-completed sample of Jupiter Trojans found in Paper II. The two Trojan swarms are often treated as being equal, but are different in a number of details. Two known facts are that the L5 swarm is less rich, while the L4 swarm has a larger fraction of low inclination Trojans. Trojans are in general red objects but the mean redness is higher for Trojans which have not collided compared to Trojans in families. Paper IIII is an investigation of Trojan collisions, family detection and evolution. Collision circumstances were mapped using numerical simulations and recorded Trojan close approaches. Synthetic families were created and evolved numerically. The result suggests that the HCM family detection technique can find Trojan families even in a densely populated parameter space. However, interlopers cannot be avoided at any level but their contribution should be less than 30%. Synthetic families can be identified with backwards orbital integrations for times up to a Gyr-scale. However, there are discrepancies between real Trojan families and my synthetic families.

Page generated in 0.0418 seconds