Senior Design Projects Sam Brandler securboration.com.

Slides:



Advertisements
Similar presentations
On-line media tools for strategic communications purposes When using media tools for communication we try to use the latest technologies such us blogging,
Advertisements

The U.S. Department of Transportation and the Next Generation Jenny Hansen, Contractor – NG9-1-1 Project Coordinator USDOT/NHTSA.
CEBS Workshop in Roma New FINREP taxonomy : Proof of concept Antoine Bourdais - INVOKE.
Introduction to Android Mohammad A. Gowayyed CS334-Spring 2014.
Microsoft Windows XP SP2 Urs P. Küderli Strategic Security Advisor Microsoft Schweiz GmbH.
Coming Release v5.0 and Roadmap
Secure web browsers, malicious hardware, and hardware support for binary translation Sam King.
How to Maximize Event Fundraising and Team Building through Social Media and Online Tools.
MIT Project Oxygen. Vision  “…computation has centered about machines, not people”.  “In the future, computation will be human-centered. It will be.
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Ambient Computational Environments Sprint Research Symposium March 8-9, 2000 Professor Gary J. Minden The University of Kansas Electrical Engineering and.
Cathy Clarke, Digital Media Specialist Simon Ting, Instructional Developer.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
01 Introduction to Java Technology. 2 Contents History of Java What is Java? Java Platforms Java Virtual Machine (JVM) Java Development Kit (JDK) Benefits.
A Guide for Getting Started
INTRODUCTION TO CLOUD COMPUTING Cs 595 Lecture 5 2/11/2015.
Graduate Programs in Computer Science Design of cyber security awareness game utilizing a social media framework WA Labuschagne.
Introduction to Java Programming. Contents 1. Java, etc. 2. Java's Advantages 3. Java's Disadvantages 4. Types of Java Code 5. Java Bytecodes 6. Steps.
Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps Bin Liu (SRA), Bin Liu (CMU), Hongxia Jin (SRA), Ramesh Govindan (USC)
JAVA v.s. C++ Programming Language Comparison By LI LU SAMMY CHU By LI LU SAMMY CHU.
U.S. Department of the Interior U.S. Geological Survey CDI Webinar Sept. 5, 2012 David Maltby and Andrea Ostroff September 5, 2012 Fish Passage.
Android in the Cloud Chromebooks, BYOD and Wearables Joel Isaacson Copyright 2014 Joel Isaacson
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Java Beserkers Group 4. Start of Java Development began on June of 1991 by a group of computer scientist at the Sun Mircrosystems Company Development.
Presented by Amlan B Dey.  Access control is the traditional center of gravity of computer security.  It is where security engineering meets computer.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
SharePoint 2010 Development Environment A Guide to Setup SharePoint 2010 Development Environment on Windows 7 Machine.
UNIT - 1Topic - 2 C OMPUTING E NVIRONMENTS. What is Computing Environment? Computing Environment explains how a collection of computers will process and.
INTRODUCTION TO OFFICE 365 How To Share and Organize All In One Secure Place Panagiota “Penny” Damianeas Assessment & Testing Specialist.
ReCapture A Pattern-aware Benchmark Tool for Smartphones.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
North Pacific Marine Science Organization (PICES) Publications: A Review Brian Voss, NOAA Libraries Janet Webster, Oregon State University Libraries 33.
Michael Marino.  Video podcast is a term used for the online delivery of video on demand video clip content via Atom or RSS enclosures. The term is an.
Specialist communication channel. Sarah-Jane king.
Mobile Device Programming
Careers in Information Technology Milton Ramer & Courtney Lisenbee.
Recruitment Strategies. Challenges Why don’t we get more people to run for elections?
Server Virtualization
MODUL 2: KEY POINTS IN DEVELOPING ANDROID APPS Studio Mobile Content Development IMTelkom 2012.
Created By. Jainik B Patel Prashant A Goswami Gujarat Vidyapith Computer Department Ahmedabad.
Tiffanie Donovan CSC /27/12. Societal Topics-Weeks 7 & 8 Internet Regulation Internet regulation has the operation of keeping people from viewing.
 Android OS: Java  iOS: Objective C NSArray * foo = [[NSArray alloc]
Don’t Disconnect Me! The challenges of building offline-enabled web apps Matthias Oßwald,
Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland t OIS First look at the Mobile Framework Ivan Deloose,
1-Documents from the Courthouse Documents can be obtained from the Courthouse either on CD, Flash drive, FTP or you can scan them yourself.
An Online learning journal system. Staff record children's progress and activities using tablet devices and PCs. Parents can view their child’s journal.
ITP 109 Week 2 Trina Gregory Introduction to Java.
LO2 Understand the key components used in networking.
Slack Clone Script Click this URL – GroupRocket.netGroupRocket.net.
 1. Communication – how we communicate our mission – who to communicate with  2. Going to regions – supporting needs and supporting in prayer  3.
Symbian Application Development Symbian is one of the leading mobile OS platforms has been accepted by more than mobile enterprises worldwide. The mobile.
CCNA Exploration v4.0 Network fundamentals CCNA Exploration v4.0 Network fundamentals.
“What the is That? Deception and Countermeasures in the Android User Interface” Presented by Luke Moors.
WHAT THE APP IS THAT? DECEPTION AND COUNTERMEASURES IN THE ANDROID USER INTERFACE.
Presented by: Saurabh Kumar Sinha (MRT07UGBIT 186) IT VII Semester, Shobhit University Meerut.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
BUILD SECURE PRODUCTS AND SERVICES
Android Mobile Application Development
Software Applications for end-users
Twitter Augmented Android Malware Detection
Introduction Enosis Learning.
IBM BPM online Training in Bangalore
2016 Minnesota Assessment Conference
Introduction Enosis Learning.
الانترنت والبريد الإلكتروني
12/25/2018 5:11 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Android Developer Fundamentals V2
کتابهای تازه خریداری شده دروس عمومی 1397
Chapter 3 Software.
Presentation transcript:

Senior Design Projects Sam Brandler securboration.com

Spoofing Network Architectures in Response to Hostile Reconnaissance (INDEX)

INconsistant Deception EXchange INDEX 1. Confuse potential attackers using inconsistent deception 2. Enhance existing defense technology 1. Create a plugin for an already established system. (eg. Snort) 3. Ensure flexibility 4. Provide status feedback for operators and administrators 1. Must allow operators to view the current status of the system. 5. Test the effectiveness of INDEX against a wide array of reconnaissance types

Crowd Sourcing Machine Learning Training Sets With Games The Alaska Ecosystem Program at the Alaska Fisheries Science Center collects 1 million images of Steller sea lions per year. They want to build a website that has volunteers check each image to see if it contains a sea lion or something else (different animal/partial view). 1. Training sets for machine learning can take a very long time to create. 2. Securboration would like to create a game (web app/mobile) that is fun to play, and crowd sources building a machine learning training set. 3. You should be able to train an Artificial Neural Network from the collected data. The data must be automatically cleaned. 4. Training sets of interest are identifying military aircraft and threatening tweets/social media posts.

AppDiff (Challenging) 1. Develop dynamic analysis of Android Dalvik bytecode execution to identify changes in execution paths and program states 2. Give the binary difference between different versions of the same mobile OS 1. How is Android Kit Kat different from Android Lollipop? 3. Show how the changes could effect data security 4. Show what each change does in a readable form 5. Be able to compare any 2 versions together 6. AppDiff is necessary to extend the shelf life of apps that use low level system calls, and to ensure an app will run on different devices.

Communication Plan 1. We will require either an in person meeting, or a conference call meeting once every 2 weeks 2. INDEX has a full project proposal completed. 3. AppDiff and The Machine Learning Game are less restricted, and don’t have design proposals. 4. These are proof of concepts for research projects. 5. You can any questions to