Can’tTouchThis JSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh.

Slides:



Advertisements
Similar presentations
Configuring APACS & AAN Controllers
Advertisements

RFID IN UNIVERSITY OF JAMMU RFID is used in libraries primarily to automate the book handling process including checkout, inventory maintenance, and check-in.
IGCSE ICT Control Systems.
Detecting Bugs Using Assertions Ben Scribner. Defining the Problem  Bugs exist  Unexpected errors happen Hardware failures Loss of data Data may exist.
Motorcycle product sheets
ELECTRONIC GUIDING CANE FINAL PRESENTATION Students : David Eyal Tayar Yosi Instructor : Miki Itzkovitz Technion – Israel Institute Of Technology Electrical.
Your Fleet Management Solution OSHA Logbooks Your vehicle sends information automatically to your password protected Internet Site. From your computer,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.
JSM Hammer’s Can’tTouchThis Mid-Semester Demo
Can’tTouchThis KSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh.
EE Capstone Spring 2008 Team RFID Mike Gauthiere Mike Loptien Chris Reid Kirk Spowart Vincent Wu.
Can’tTouchThis KSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh.
1 Talkie Board Project Review 2/19/2008 ARMS 1209.
Group 9: Chill Geordi: RFID based location sensing Brian Loo (bloo) Geeta Shroff (gshroff) Zane Starr (zcs)
Introducing The Revolutionary ENSA  EN ergy SA ving Automated Wireless Light Switch A World First For The Security Industry By Making Alarm Sensors Dual.
SMART AUTO - WA Wearable Agency is specialized in GPS tracking device and system. Our world advanced GPS tracker include GPS Vehicle Tracker, Mini GPS.
Can’tTouchThis JSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh.
YouWatchMyStuff Team: Amrutha Doosa, Richard Atwood, Randy Duran, Raed Alkhaldi, Hussain Alsafar.
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Software Testing. Introduction Testing is often left to the end of the project which is generally not a good idea. Testing should be conducted throughout.
Test plans CSCI102 - Systems ITCS905 - Systems MCS Systems.
Microsoft ® Official Course Module 10 Optimizing and Maintaining Windows ® 8 Client Computers.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
T F-Secure Software Signing System Olli Salminen, Research Manager F-Secure Research.
Gauge Operation and Software by Scott A. Ager. Computer Recommendations 750 MHz Pentium III 64 Meg SRAM 40 Gig Hard Drive 1024 x 768 graphics CD Writer.
EMERGENCY VEHICLE ALERT SYSTEM ECE 495C Digital Systems Senior Design Project Proposal Team #3 Spring 2008 January 09, 2008.
SixthSense RFID based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan Interns: Piyush Agrawal (IITK), SriKrishna (BITS Pilani)
Manipulating data Data management: validation and verification.
The Secure, Automated Home Project Team: Alec Kulbacki Project Advisor: W. Thomas Miller.
SB-DN-SEC250K security module SB-DN-SEC250K can manage 8 independent zones’ arming and alarm. Addressing button HDL -BUS.
Computers, part of your life – Grade 11
Lecture 18 Page 1 CS 111 Online OS Use of Access Control Operating systems often use both ACLs and capabilities – Sometimes for the same resource E.g.,
MANUAL TESTING KS SESSION PRESENTED BY 26/11/015 VISHAL KUMAR.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Software Development Life Cycle (SDLC)
RFID Source Tracking Tim Durkin PPD. Legislation The Ionising Radiations Regulations act Applicable to industry, research, military, civil service.
Learning Aim B.  In this section, you will consider the resources necessary for designing your website.  You will also think about any constraints that.
Group #15 Matt Frank Russell Geschrey.  This project was chosen because of an interest in wireless communication systems, namely BAN's (body area networks)
Communication Based Projects Ideas for Engineering Students.
OPERATING SYSTEMS (OS) By the end of this lesson you will be able to explain: 1. What an OS is 2. The relationship between the OS & application programs.
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Chapter 4. CONCEPT OF THE OPERATING SYSTEM MANAGING ESSENTIAL FILE OPERATIONS.
CSCE451/851 Introduction to Operating Systems
Computer System Structures
RFID In Alma.
PARKING AUTOMATION SYSTEM
Security module SB-DN-SEC250K.
RFID enabled Solutions
Chapter 1 Getting Started
Textbook Detection System With Radio-Frequency Identification
SECURITY FEATURES OF ATM
Introduction to Operating System (OS)
RAILWAY TRACK SNAP NOTIFICATION
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Module 1.1 Introduction to computers
How to Fix Windows 10 Update Error 0x ?.
Chapter 2: Input and output devices
Software Introduction
Lesson 12: Epic End of Day Status Procedure
Systems and Control.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Lesson 3: Medical Records
The bios.
Security.
TS2 PSS Software Requirements and Software Design
LECTURE 3: Requirements Engineering
Systems and Control.
Lesson 12: Epic End of Day Status Procedure
Presentation transcript:

Can’tTouchThis JSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh

Test Cases Project Concept: Laptop Anti-theft Device Status Update:  Currently working on getting the RFID to communicate with the T-mote (certain voltage issues to sort out)  Desktop interface complete (with password screen) Project Test Cases (Testing the use cases):  Startup (Devices start up without errors)  User moves laptop (Nothing should happen)  User leaves laptop (Arming of device)  Thief moves laptop (Alarm rings)  User returns to laptop (Disarming of device)  Shutdown (Devices shutdown properly)

Performance Tests Degree of movement  Important to distinguish between subtle movements and theft  Test: Various movements around laptop, check correct identification of theft Response time before buzzer sounds  When theft is detected, important to sound buzzer in a timely manner  Test: Move laptop in armed mode, check that buzzer sounds in no more than 500ms (500ms X 100m/10s = 5m) Password security  Password must be resistant to cracking  Test: Look for loopholes in password system (some form of white-box testing) RFID / Disarming range  User’s presence must be detected from a suitable distance  Test: Tester moves into close proximity with the device (no more than 50cm), check that user’s presence is detected

Testing Process Usage of checklists for testing  Useful for checking degree of movement and RFID range  Useful for checking password security Usage of software tools in testing  Software timers for response time calculations (correlate with hardware timers for accurate timings) Testing under heavy conditions  Testing RFID range in area with several RFID readers or tags  Testing with non-user RFID tags

Looking Ahead Anticipated Difficulties  Ambiguity with regards to significance of movement  RFID functionality still a blur, might switch to Zigbee modules for authentication Thankfully, most of our test cases are pretty straightforward  Might include testing with errors to ensure functionality Lessons learnt in testing  As mentioned before, degree of movement test is still rather shady  Difficult for author of code to check correctness (password security)

Questions? Anyone?