Current Technical Reports
Browse by
Recent Submissions
-
Classifying Network Protocol Implementation Versions: An OpenSSL Case Study
(2013-12-11)A new technique is presented for identifying the implementation version number of software that is used for Internet communications. While many programs may exchange version numbers, oftentimes only a small subset of them ... -
iSeeYou: Disabling the MacBook Webcam Indicator LED
(2013-12-11)The ubiquitous webcam indicator LED is an important privacy feature which provides a visual cue that the camera is turned on. We describe how to disable the LED on a class of Apple internal iSight webcams used in some ... -
Multi-Object Geodesic Active Contours (MOGAC): A Parallel Sparse-Field Algorithm for Image Segmentation
(2012-02-28)An important task for computer vision systems is to segment adjacent structures in images without producing gaps or overlaps. Multi-object Level Set Methods (MLSM) perform this task with the benefit of sub-pixel accuracy. ... -
Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems
(2011-02-03)In this study, I evaluate the performance of diagonal Confidence-Weighted (CW) online linear classification on the KDD Cup 1999 dataset for network intrusion detection systems (NIDS). This is a compatible relationship due ... -
Design and Implementation of Views: Isolated Perspectives of a File System
(2010-04-20)We present Views, a file system architecture that provides isolation between system components for the purposes of access control, regulatory compliance, and sandboxing. Views allows for discrete I/O entities, such as ... -
Pseudorandom Number Generators on Atmel AVR AT90USB1287 Microcontrollers
(2010-01-27)The purpose of this report is to provide exhaustive details of my Computer Security Architecture project this spring 2008 semester. Ultimately, the goal has been to prepare a document that an undergraduate student can ... -
Design and Implementation of Views: Isolated Perspectives of a File System for Regulatory Compliance
(2009-08-24)We present Views, a file system architecture designed to meet the role-based access control (RBAC) requirement of federal regulations, such as those in HIPAA. Views allows for discrete IO entities, such as users, groups or ... -
Recognition of Visual Dynamical Processes: Theory, Kernels, and Experimental Evaluation
(2009)Over the past few years, several papers have used Linear Dynamical Systems (LDS)s for modeling, registration, segmentation, and recognition of visual dynamical processes, such as human gaits, dynamic textures and lip ...