1,385 research outputs found
A framework for caching relevant data items for checking integrity constraints of mobile database
In a mobile environment, due to the various constraints inherited from limitations of wireless communication and mobile devices, checking for integrity constraints to maintain the consistent state of mobile databases is an important issue that needs to be addressed. Hence, in this paper we propose a framework for caching relevant data items needed during the process of checking integrity constraints of mobile databases. This is achieved by analyzing the relationships among the integrity tests (simplified form of integrity constraints) to be evaluated for a given update operation. This improves the checking mechanism by preventing delays during the process of checking constraints and performing the update. Hence, our model speeds up the checking process
A framework for caching relevant data divisions for checking integrity constraints of mobile databases
In a mobile environment, due to the various constraints
inherited from limitations of wireless communication
and mobile devices, checking for integrity constraints to
maintain the consistent state of mobile databases is an important issue that needs to be addressed. Hence, in this paper we propose a framework for caching relevant data items
needed during the process of checking integrity constraints
of mobile databases. This is achieved by analyzing the relationships among the integrity tests (simplified form of integrity constraints) to be evaluated for a given update operation. This improves the checking mechanism by preventing delays during the process of checking constraints and performing the update. Hence, our model speeds up the checking process
Improved Internet Security Protocols Using Cryptographic One-Way Hash Chains
In this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology. The first contribution explores session cookies with emphasis on the threat of session hijacking attacks resulting from session cookie theft or sniffing. In the proposed scheme, these cookies are replaced by easily computed authentication credentials using Lamport\u27s well-known one-time passwords. The basic idea in this scheme revolves around utilizing sparse caching units, where authentication credentials pertaining to cookies are stored and fetched once needed, thereby, mitigating computational overhead generally associated with one-way hash constructions. The second and third proposed schemes rely on dividing the one-way hash construction into a hierarchical two-tier construction. Each tier component is responsible for some aspect of authentication generated by using two different hash functions. By utilizing different cryptographic hash functions arranged in two tiers, the hierarchical two-tier protocol (our second contribution) gives significant performance improvement over previously proposed solutions for securing Internet cookies. Through indexing authentication credentials by their position within the hash chain in a multi-dimensional chain, the third contribution achieves improved performance. In the fourth proposed scheme, an attempt is made to apply the one-way hash construction to achieve user and broadcast authentication in wireless sensor networks. Due to known energy and memory constraints, the one-way hash scheme is modified to mitigate computational overhead so it can be easily applied in this particular setting. The fifth scheme tries to reap the benefits of the sparse cache-supported scheme and the hierarchical scheme. The resulting hybrid approach achieves efficient performance at the lowest cost of caching possible. In the sixth proposal, an authentication scheme tailored for the multi-server single sign-on (SSO) environment is presented. The scheme utilizes the one-way hash construction in a Merkle Hash Tree and a hash calendar to avoid impersonation and session hijacking attacks. The scheme also explores the optimal configuration of the one-way hash chain in this particular environment. All the proposed protocols are validated by extensive experimental analyses. These analyses are obtained by running simulations depicting the many scenarios envisioned. Additionally, these simulations are supported by relevant analytical models derived by mathematical formulas taking into consideration the environment under investigation
FORENSIC ANALYSIS OF THE GARMIN CONNECT ANDROID APPLICATION
Wearable smart devices are becoming more prevalent in our lives. These tiny devices
read various health signals such as heart rate and pulse and also serve as companion
devices that store sports activities and even their coordinates. This data is typically
sent to the smartphone via a companion application installed. These applications
hold a high forensic value because of the users’ private information they store. They
can be crucial in a criminal investigation to understand what happened or where
that person was during a given period. They also need to guarantee that the data
is secure and that the application is not vulnerable to any attack that can lead to
data leaks.
The present work aims to do a complete forensic analysis of the companion
application Garmin Connect for Android devices. We used a Garmin Smartband to
generate data and test the application with a rooted Android device. This analysis is
split into two parts. The first part will be a traditional Post Mortem analysis where
we will present the application, data generation process, acquisition process, tools,
and methodologies. Lastly, we analyzed the data extracted and studied what can
be considered a forensic artifact. In the second part of this analysis, we performed
a dynamic analysis. We used various offensive security techniques and methods to
find vulnerabilities in the application code and network protocol to obtain data in
transit.
Besides completing the Garmin Connect application analysis, we contributed
various modules and new features for the tool Android Logs Events And Protobuf
Parser (ALEAPP) to help forensic practitioners analyze the application and to
improve the open-source digital forensics landscape. We also used this analysis as a
blueprint to explore six other fitness applications that can receive data from Garmin
Connect.
With this work, we could conclude that Garmin Connect stores a large quantity
of private data in its device, making it of great importance in case of a forensic
investigation. We also studied its robustness and could conclude that the application
is not vulnerable to the tested scenarios. Nevertheless, we found a weakness in their
communication methods that lets us obtain any data from the user even if it was
not stored in the device. This fact increased its forensic importance even more
Unified System on Chip RESTAPI Service (USOCRS)
Abstract. This thesis investigates the development of a Unified System on Chip RESTAPI Service (USOCRS) to enhance the efficiency and effectiveness of SOC verification reporting. The research aims to overcome the challenges associated with the transfer, utilization, and interpretation of SoC verification reports by creating a unified platform that integrates various tools and technologies.
The research methodology used in this study follows a design science approach. A thorough literature review was conducted to explore existing approaches and technologies related to SOC verification reporting, automation, data visualization, and API development. The review revealed gaps in the current state of the field, providing a basis for further investigation. Using the insights gained from the literature review, a system design and implementation plan were developed. This plan makes use of cutting-edge technologies such as FASTAPI, SQL and NoSQL databases, Azure Active Directory for authentication, and Cloud services. The Verification Toolbox was employed to validate SoC reports based on the organization’s standards. The system went through manual testing, and user satisfaction was evaluated to ensure its functionality and usability.
The results of this study demonstrate the successful design and implementation of the USOCRS, offering SOC engineers a unified and secure platform for uploading, validating, storing, and retrieving verification reports. The USOCRS facilitates seamless communication between users and the API, granting easy access to vital information including successes, failures, and test coverage derived from submitted SoC verification reports. By automating and standardizing the SOC verification reporting process, the USOCRS eliminates manual and repetitive tasks usually done by developers, thereby enhancing productivity, and establishing a robust and reliable framework for report storage and retrieval. Through the integration of diverse tools and technologies, the USOCRS presents a comprehensive solution that adheres to the required specifications of the SOC schema used within the organization.
Furthermore, the USOCRS significantly improves the efficiency and effectiveness of SOC verification reporting. It facilitates the submission process, reduces latency through optimized data storage, and enables meaningful extraction and analysis of report data
TRAWL: Protection against rogue sites for the masses
The number of smartphones reached 3.4 billion in the third quarter of 2016 [1]. These devices facilitate our daily lives and have become the primary way of accessing the web. Although all desktop browsers filter rogue websites, their mobile counterparts often do not filter them at all, exposing their users to websites serving malware or hosting phishing attacks. In this paper we revisit the anti-phishing filtering mechanism which is offered in the most popular web browsers of Android, iOS and Windows Phone. Our results show that mobile users are still unprotected against phishing attacks, as most of the browsers are unable to filter phishing URLs. Thus, we implement and evaluate TRAWL (TRAnsparent Web protection for alL), as a cost effective security control that provides DNS and URL filtering using several blacklists
- …