ongoing
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ongoing [2011/05/30 17:20] – bil | ongoing [2014/12/04 21:28] (current) – Added assigned projects stevenc | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
+ | |||
+ | |||
+ | ====== Hunting for Bugs in Logging: applying JPF to log4j ====== | ||
+ | |||
+ | **Supervisor: | ||
+ | |||
+ | Description: | ||
+ | Java PathFinder (JPF) is a tool that can detect bugs in Java code. | ||
+ | The Java library Apache log4j allows developers to control which log | ||
+ | statements are output. | ||
+ | to detect bugs in log4j by means of JPF with very limited succes. | ||
+ | |||
+ | Recently, in collaboration with Shafiei (NASA) we have developed | ||
+ | an extension of JPF called jpf-nhandler. | ||
+ | is to apply this extension to log4j. | ||
+ | |||
+ | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. " | ||
+ | |||
+ | **Required Background: | ||
+ | |||
+ | |||
+ | |||
+ | ====== DDoS Attack using Google-bots ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Recommended Background**: | ||
+ | |||
+ | Not long ago, botnets - networks of compromised computers - were seen as | ||
+ | the most effective (if not the only) means of conducting Distributed Denial | ||
+ | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
+ | of application-layer over other types of DDoS attacks, the DDoS execution | ||
+ | landscape is becoming increasingly more diverse. An especially interesting | ||
+ | new trend is the execution of application-layer DDoS attacks by means of | ||
+ | skillfully manipulated Web-crawlers, | ||
+ | The goal of this project is to design, implement and test a real-world | ||
+ | framework consisting of the following: a) the attacker' | ||
+ | domain specially designed to attract Google-bots and then manipulate them | ||
+ | into generating attack traffic towards the target/ | ||
+ | victim' | ||
+ | component, the project will also look into the statistical/ | ||
+ | estimation of the framework' | ||
+ | to an actual (real-world) target/ | ||
+ | |||
+ | |||
+ | |||
+ | ====== Comparison of Finger Tracking systems ====== | ||
+ | |||
+ | **Student**: | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Required Background**: | ||
+ | |||
+ | __Description__ | ||
+ | This project compares the Leap Motion and the 3Gear System against each other in a comparative Fitts' law study | ||
+ | |||
+ | |||
+ | __Completed__ | ||
+ | Winter, 2013 | ||
====== Imputation of missing values in microarray data ====== | ====== Imputation of missing values in microarray data ====== |
ongoing.1306776001.txt.gz · Last modified: 2011/05/30 17:20 by bil