{"title":"A framework for teaching secure coding practices to STEM students with mobile devices","authors":"E. Agama, H. Chi","doi":"10.1145/2638404.2675735","DOIUrl":"https://doi.org/10.1145/2638404.2675735","url":null,"abstract":"TSCPSTEM is a framework that introduces security concepts and practices to STEM students through the web portal designed to run on mobile devices for easy access. TSCPSTEM's framework will equip students with the required skills and knowledge to guard against programming errors that lead to vulnerabilities in programs. While providing fundamental skills required for STEM students for secure coding, students will also gain the skills set necessary to identifying and taking precautionary measures to prevent insecurity in programs. TSCPSTEM's educational framework, which implements security concepts through tutorials, practical tests, quizzes and lab demos, will also implement robust game challenge for students to enhance learning. Most essentially, we will design this gaming module for delivery to run on different mobile devices, including android, while using good learning theory and proper instructional design for learning to be effective. We will also demonstrate the use of static-analysis tools such as CryptoLint, Klocwork Insight, and APKInspector for detecting weaknesses in mobile devices applications.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79876666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jonathan W. Lartigue, Christohper McKinney, R. Phelps, Richard Rhodes, A. J. Rice, Alexander Ryder
{"title":"A tablet-controlled, mesh-network security system: an architecture for a secure, mesh network of security and automation systems using Arduino and Zigbee controllers and an Android tablet application","authors":"Jonathan W. Lartigue, Christohper McKinney, R. Phelps, Richard Rhodes, A. J. Rice, Alexander Ryder","doi":"10.1145/2638404.2638500","DOIUrl":"https://doi.org/10.1145/2638404.2638500","url":null,"abstract":"Security is a major driver of computerized home automation systems today. With the development of network and automatic control technologies, a home security monitoring and alarm system has become more and more efficient and effective as technology advances. In this paper we have proposed a simple, low cost, low power method for implementing a wireless home security system, using the Zigbee (IEEE 802.15.4) standard. Our project architecture consists of sensor nodes deployed in various places throughout a structure, to provide security for that structure. The Zigbee modules act as end devices that monitor the sensors continuously and send the security status of each sensor to the coordinator node, which is connected to an Arduino Micro Controller Unit (MCU), which acts as the master brains of the system. Furthermore, the Arduino is also able to relay its security information to an Android App that we have developed to make remote system monitoring even easier for the user. In our project we have used the XBEE Pro series2 radios for RF communication, a PIR motion sensor, and a contact door sensor, an automated door lock, an Arduino MCU, and a specially designed Android App. The software has been implemented using the C programming language.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83042225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive video streaming over HTTP","authors":"Doowon Kim, Jinsuk Baek, P. Fisher","doi":"10.1145/2638404.2638489","DOIUrl":"https://doi.org/10.1145/2638404.2638489","url":null,"abstract":"A new video streaming scheme is proposed and its prototype is implemented in this paper. The scheme is designed for providing an enhanced QoS for a client using a mobile device. With the scheme, the client considers various important network factors to decide its bit rate. It then sends feedback whenever its current bit rate must be changed. Based upon these requests, the server side adaptively adjusts its video bit rate in order to increase accessibility of the service. The scheme is implemented through a HTTP-based web server.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"37 1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82752946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bounded Monte Carlo integration using Java","authors":"Joshua A. Neese, G. Harrell, Jin Wang","doi":"10.1145/2638404.2638493","DOIUrl":"https://doi.org/10.1145/2638404.2638493","url":null,"abstract":"A Monte Carlo method using Java is proposed to solve bounded integrals. This method is efficient and solves simple to complex bounded integrals within seconds. It is especially powerful for the multidimensional integrals. Its accuracy depends on the number of trial integrations completed. The Monte Carlo method only needs a random number generator to be used in Java.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"130 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79604090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelized rigid body dynamics","authors":"Jon F. Linford, Teng-Sheng Moh","doi":"10.1145/2638404.2638480","DOIUrl":"https://doi.org/10.1145/2638404.2638480","url":null,"abstract":"Physics engines are collections of API-like software designed for video games, movies and scientific simulations. While physics engines often come in many shapes and designs, all engines can benefit from an increase in speed via parallelization. Despite this need for increased speed, it is uncommon to encounter a parallelized physics engine today. Many engines are long-standing projects and changing them to support parallelization is too costly, as parallelization should be considered from the design stages through completion to ensure adequate implementation. In this project we develop a realistic approach to simulate physics in a parallel environment. Utilizing many techniques we establish a practical approach to significantly reduce the run-time on a standard physics engine. Unlike many engines, this engine will be targeted towards hardware limited platforms such as mobile devices.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"294 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77550837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls","authors":"A. Gorji, M. Abadi","doi":"10.1145/2638404.2737181","DOIUrl":"https://doi.org/10.1145/2638404.2737181","url":null,"abstract":"Web browsers are often used as a popular means for compromising Internet hosts. An attacker may inject a JavaScript malware into a web page. When a victim visits this page, the malware is executed and attempts to exploit a specific browser vulnerability or download an unwanted program. Obfuscated JavaScript malware can easily evade signature-based detection by changing the appearance of JavaScript code. To address this problem, some previous studies have used static analysis in which some features are extracted from both benign and malicious web pages, and then a classifier is trained to distinguish between them. Because nowadays benign JavaScript code is often obfuscated, static analysis techniques generate many false alarms. In this paper, we use dynamic analysis to monitor a web page for detecting obfuscated JavaScript malware. We first load a set of malicious web pages in a real web browser and collect a sequence of predictive function calls using internal function debugging for each of them. We then group similar sequences into the same cluster based on the normalized Levenshtein distance (NLD) metric and generate a so-called behavioral signature for each cluster. A web page is detected as malicious only if the sequence of its intercepted function calls is matched with at least one generated behavioral signature. Our evaluation results show that the generated behavioral signatures are able to detect obfuscated JavaScript malware with a low false alarm rate.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"121 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90604147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contextualized learning tools: animations and robots","authors":"Anja Remshagen, Christine Rolka","doi":"10.1145/2638404.2638458","DOIUrl":"https://doi.org/10.1145/2638404.2638458","url":null,"abstract":"This paper explores the use of the two contextualized learning tools, animations and educational robots, in an introductory computer science course. We describe our experience when supplementing Greenfoot animation exercises with robotic exercises using the Scribbler and Finch robot, and compare the impact of the different learning tools on students' engagement and performance. We also outline practical considerations concerning the use of Greenfoot animations, Scribbler robots, and Finch robots.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91018473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FDEOD: a software framework for downloading earth observation data","authors":"Jiameng Hu, Yi Liu, M. Wimberly","doi":"10.1145/2638404.2638507","DOIUrl":"https://doi.org/10.1145/2638404.2638507","url":null,"abstract":"In this paper, we describe FDEOD, a framework for downloading earth observation data. FDEOD supports the dynamic selection of suitable download methods and allows the changes of download parameters without requiring changes to the code. This paper illustrates the design and implementation of FDEOD and uses the EASTWeb system as a case study to show how an application can be extended from it.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88845846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The importance of social position in e-learning","authors":"M. Ketel, Chris Fishpaw","doi":"10.1145/2638404.2638490","DOIUrl":"https://doi.org/10.1145/2638404.2638490","url":null,"abstract":"The growth and popularity of online social networks has created new ways of collaboration and communication. College/university students worldwide are particularly enthusiastic users--- the vast majority are engaging on a daily basis with online social networks via a computer or mobile device. Likewise, eLearning has been utilized by academic communities to transcend learning across space and time to offer students an alternative to physical classrooms. Today, there is interest from educational institutions and organizations in the potential of social networks and social media to complement or leverage formal educational activities and enhance learning outcomes. Although many studies boast about the benefits of eLearning, users have traditionally complained about usability. This study aims to analyze the frequency of online social networking practices across a broad spectrum of diverse users based on survey responses. The goal of this research is to investigate the frequency of usage of social networking features for consideration in the design of new eLearning solutions.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"63 5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90739713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new algorithm to generate a formula for the sum of integer powers","authors":"Maximilian J. Wang, S. Goel, Guifen Mao","doi":"10.1145/2638404.2638525","DOIUrl":"https://doi.org/10.1145/2638404.2638525","url":null,"abstract":"A new algorithm is proposed to generate a formula for the sum of integer powers Sp(n) = Σnk=1kp for an arbitrary positive integer p. This formula plays an important role in scientific computation, numerical analysis, complexity analysis, academic research, and even in teaching calculus. Faulhaber's formula indicates that Sp(n) can be expressed as a (p + 1)th degree polynomial. A special linear system is constructed and then solved to fit this polynomial through the Gaussian Elimination method. This study shows that this new algorithm is more efficient, having a polynomial time O(p3) complexity. In the implementation procedure, this algorithm does not use any complicated Bernoulli numbers, Stirling numbers, integrals, differentiations, or recursion methods. Maple software code is used to illustrate how the new algorithm works, and the coding of this algorithm has only five lines. For a power of 20 or 100, the computer execution CPU (Intel Processor running @ 3GHz) time takes only 0.062 seconds or 16.396 seconds respectively.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85329856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}