An Executable Packer
This thesis addresses the topic of development and advancement of the Packer technology. It aims to prove that with the implementation of advanced code encryption and cryptographic techniques in conjunction with standard packing methods, testing binaries with anti-virus will become increasingly difficult.
Study on this topic reveals that the idea of encoding data has already been established, but it is still not fully incorporated into a technique to pack an executable file. Continue reading An Executable Packer
Novel Genetic Algorithm for Static Task Scheduling in Distributed Systems
The static task scheduling problem in distributed systems is very important because of optimal usage of available machines and accepted computation time for scheduling algorithm. Solving this problem using the dynamic programming and the back tracking needs much more time. Therefore, there are more attempts to solve it using the heuristic methods. In this paper, a new genetic algorithm, named TDGASA, is presented which its running time depend on the number of tasks in the scheduling problem. Continue reading Novel Genetic Algorithm for Static Task Scheduling in Distributed Systems
Model-Controller Interfacing using Struts-Based Web Application
StrutsHib IDE is an IDE for interfacing the model and controller of a MVC architecture based applications. It is developed using Java-based technologies such as the Struts framework, Hibernate and jQuery. The StrutsHib IDE is a web application. This project implements the part of StrutsHib IDE that makes it easy to create model and controller components. Moreover, it automates the process of database creation for web applications which means the user does not have to be a database expert when dealing with databases. Finally, StrutsHib IDE takes all the advantages of a web-based application and provides lot of flexibility to the users.
Author:- Deepti Bhardwaj
Source:-San Jose State University
Advanced Honeypot Architecture for Network Threats Quantification
Honeypots were introduced to monitor unused IP spaces to learn about attackers. The advantage of honeypots over other monitoring solutions is to collect only suspicious activity. However, current honeypots are expensive to deploy and complex to administrate especially in the context of large organization networks. This study addresses the challenge of improving the scalability and flexibility of honeypots by introducing a novel hybrid honeypot architecture. This architecture is based on a Decision Engine and a Redirection Engine that automatically filter attacks and save resources by reducing the size of the attack data collection and allow researchers to actively specify the type of attack they want to collect. For a better integration into the organization network, this architecture was combined with network flows collected at the border of the production network. Continue reading Advanced Honeypot Architecture for Network Threats Quantification
3D Integration, Temperature Effects, and Modeling
Practical limits to device scaling are threatening the growth of integrated circuit (IC) technology. A breakthrough architecture is needed in order to realize the increased device density and circuit functionality that future high performance ICs demand. 3D integration is being considered as this breakthrough architecture. In this thesis, the limits to scaling are noted and the feasibility of overcoming these limits using 3D integration is presented. Continue reading 3D Integration, Temperature Effects, and Modeling