ongoing
                Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| ongoing [2011/05/30 17:20] – bil | ongoing [2014/12/04 21:28] (current) – Added assigned projects stevenc | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== | + | ====== | 
| + | |||
| + | |||
| + | ====== Hunting for Bugs in Logging: applying JPF to log4j ====== | ||
| + | |||
| + | **Supervisor: | ||
| + | |||
| + | Description: | ||
| + | Java PathFinder (JPF) is a tool that can detect bugs in Java code. | ||
| + | The Java library Apache log4j allows developers to control which log | ||
| + | statements are output. | ||
| + | to detect bugs in log4j by means of JPF with very limited succes. | ||
| + | |||
| + | Recently, in collaboration with Shafiei (NASA) we have developed | ||
| + | an extension of JPF called jpf-nhandler. | ||
| + | is to apply this extension to log4j. | ||
| + | |||
| + | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. " | ||
| + | |||
| + | **Required Background: | ||
| + | |||
| + | |||
| + | |||
| + | ====== DDoS Attack using Google-bots ====== | ||
| + | |||
| + | **Supervisor**: | ||
| + | |||
| + | **Recommended Background**: | ||
| + | |||
| + | Not long ago, botnets - networks of compromised computers - were seen as | ||
| + | the most effective (if not the only) means of conducting Distributed Denial | ||
| + | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
| + | of application-layer over other types of DDoS attacks, the DDoS execution | ||
| + | landscape is becoming increasingly more diverse. An especially interesting | ||
| + | new trend is the execution of application-layer DDoS attacks by means of | ||
| + | skillfully manipulated Web-crawlers, | ||
| + | The goal of this project is to design, implement and test a real-world | ||
| + | framework consisting of the following: a) the attacker' | ||
| + | domain specially designed to attract Google-bots and then manipulate them | ||
| + | into generating attack traffic towards the target/ | ||
| + | victim' | ||
| + | component, the project will also look into the statistical/ | ||
| + | estimation of the framework' | ||
| + | to an actual (real-world) target/ | ||
| + | |||
| + | |||
| + | |||
| + | ====== Comparison of Finger Tracking systems ====== | ||
| + | |||
| + | **Student**: | ||
| + | |||
| + | **Supervisor**: | ||
| + | |||
| + | **Required Background**: | ||
| + | |||
| + | __Description__ | ||
| + | This project compares the Leap Motion and the 3Gear System against each other in a comparative Fitts' law study | ||
| + | |||
| + | |||
| + | __Completed__ | ||
| + | Winter, 2013 | ||
| ====== Imputation of missing values in microarray data ====== | ====== Imputation of missing values in microarray data ====== | ||
ongoing.1306776001.txt.gz · Last modified:  by bil
                
                