![]() James Bell, USA, graduation May 2020, Thesis: Program Protection against Symbolic Execution in x86 Executables (now with DHS-CISA)Īlex Mullins, USA, graduation May 2020, Thesis: Evaluating Security of Executable Steganography for Digital Software Watermarking (now with USAF) Jackson Braswell, USA, graduation December 2020, Project: Framework for Analyzing Human Attackers Subverting Commercial Obfuscators (now with Institute for Defense Analysis)ĭeepak Adhikari, USA, graduation May 2020, Thesis: A Toolbase for Evaluating Software Protection Techniques Against Symbolic Execution Attacks (now with ADHI) Lee Miller, USA, graduation May 2021, Project: Runtime Analysis of Ransomwware on Android Operating Systems Jennifer Parnell, USA, graduation December 2021, Thesis: Comparative Analysis of Digital Logic Component Hiding Techniques (now with Mayo Clinic) Jamie Carambat, USA, in progress, Thesis: Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction Shelby Caldwell, USA, in progress, Thesis: A Framework for Identifying Malware Threat Distribution on the Dark Web Pawan Karki, USA, in progress, Topic area: machine learning applications for software vulnerability detectionĭylan Johnson, USA, in progress, Topic area: Software vulnerability analysis in intermediate code representationĪmber Surles, USA, in progress, Topic area: Image-based anomaly detection for epileptic seizure prediction and detection Reeve Cabral, USA, in progress, Topic area: phase space anomaly detection for malicious software ![]() Maureen Van Devender, USA, ABD, Dissertation: Risk Assessment Framework for Automated Evaluation of Cybersecurity Threats and Vulnerabilities in Medical Devicesĭaniel Miller, USA, in progress, Topic area: forensic analysis of residual data in additive layer manufacturing Ramya Manikyam, USA, graduation Fall 2019, Dissertation: Program Protection Using Software Based Hardware Abstraction (now with Moderna)ĭustin Mink, USA, graduation Fall 2019, Dissertation: Indicators of Compromise for the United States Federal Aviation Administration Next Generation Air Transportation System Automatic Dependent Surveillance-Broadcast (now with DoD)Ĭolby Parker, USA, graduation Spring 2022, Dissertation: Adversarial Machine Learning for the Protection of Legitimate Software (now with Sandia Laboratory) Patrick Luckett, USA, graduation Summer 2018, Dissertation: Nonlinear Methods for Detection and Prediction of Epileptic Seizures (now with Washington University School of Medicine) The entire folder should be unzipped and used: Version 2.5 PETGUI User Guide Executable JAR (Java 7/8) Executable JAR with JRE API Version 2.6 PETGUI User Guide Executable JAR with JRE Samples PET Graphical User Interface (PETGUI) available in ZIP format. PET source and documentation are available on Github PET and its graphical user interface are unique in that they provide a toolkit for evaluating various kinds of circuit obfuscation and transformation algorithms while also allowing visualization of these effects in smaller contexts.Ĭontributors to the PET software include students at the Air Force Institute of Technology (AFIT), Wright-Patterson AFB, OH and the University of South Alabama (USA), Mobile, AL.Ī graphical release is available for download. The PET source code embodies code from 8 seperate Master's theses and has undergone considerable refactoring and extension to support advanced studies and experiments in circuit protection based on obfuscation. The Program Encryption Toolkit (PET) is a research-based software package that is used for visualization and experimentation in protection of digital logic circuits.
0 Comments
Leave a Reply. |