Organizational Unit:
Undergraduate Research Opportunities Program

Research Organization Registry ID
Description
Previous Names
Parent Organization
Parent Organization
Organizational Unit
Includes Organization(s)

Publication Search Results

Now showing 1 - 2 of 2
  • Item
    Fast and robust cloth simulation
    (Georgia Institute of Technology, 2012-12-17) Shin, Michael Young
    The goal of this project is to develop a realistic, robust, and fast cloth-simulator - realistic and robust, so that the clothes behave as expected; and fast, so that results can be seen instantly and the clothes can be interacted with in real-time. A variety of papers on previous works are referenced, so that the specific advancements of each research may be combined to produce the desired simulator. The long-term intention of this project is to serve as the requisite physical engine in which a protocol for the animation of digital characters putting on clothes may be developed. This has applications in robotics, wherein the protocol used by the digital character can be taught to robots, which may then help people who have difficulty dressing themselves.
  • Item
    Cellular baseband security
    (Georgia Institute of Technology, 2012-05-07) Davis, Andrew
    Memory corruption vulnerabilities have been exploited by attackers to com- promise systems for years. Traditional computing systems have had years of defenses developed for them such as ASLR and DEP. However, these technologies have not been implemented in embedded systems. Embedded systems have great power in a computing system and control many critical functions. If an attacker can compromise one of these systems, such as a network interface, then it is a serious threat. In a cellular network the network interface is known as the baseband. Cellular protocols are far more complex than traditional network protocols, so a few companies o↵er systems that can be integrated into a phone. The cellular network is becoming the primary communication network for many and disrupting cellular communication can have a devastating impact. I hope to find a memory corruption vulnerability in the baseband of a cellular phone and develop defenses to protect the phone against it.