The aim of this thesis is to study past 10 years of security vulnerabilities reported against Linux Kernel and all existing mitigation techniques that prevent the exploitation of those vulnerabilities. To systematically study the security vulnerabilities, they were categorized into classes and sub-classes based on their type.
This thesis first...
The development and some applications of holographic optical tweezers (HOT) are presented. Our HOT system uses a spatial light modulator (SLM) to control the location and properties of the optical trap. We have developed a method for optimizing the diffraction efficiency of a SLM that can be applied in situ...
Optical tweezers are capable of trapping micron sized particles through the transfer of
the momentum of light. These capabilities are expanded through the use of computer
controlled holograms for beam shaping. This hologram creation is facilitated through the use of
a spatial light modulator, which is a liquid crystal device...
Although only a minority of introduced species become established and have noticeable consequences in their new communities, some can displace native species, alter food webs, and cause local extinctions. Studying these invasive species can provide new insights into basic ecological questions as well as inform management strategies. Pacific lionfish (Pterois...
CTIP2 is a C2H2 zinc finger transcription factor that plays important yet poorly understood roles in mouse development. CTIP2 is known to be highly expressed in the central nervous system, skin and T lymphocytes during embryogenesis. CTIP2-null mice die perinatally of unknown causes and exhibit defects in multiple organ systems...
COUP-TFI, an orphan nuclear receptor of the steroid/thyroid hormone receptor superfamily, plays important roles in homeostasis and the CNS development, including differentiation, patterning, axonal projection, cell migration, cortical arealization and the temporal specification of neural stem cells. A number of COUP-interacting proteins have been described previously, and the majority of...
AMD SEV allows for the creation of fully encrypted virtual machines. This allows cloud computing tenants’ data to be secret to the cloud computing provider. However, it has been shown that the encryption scheme used by AMD can easily be broken. The attacker can create a copy of the virtual...
Improvements on the charge control measurements of the torsion pendulum, electron gun, and autocollimator system were conducted at the University of Washington in preparation for the fabrication of the final prototype of the Laser Interferometer Space Antenna (LISA) gravitational wave detector for NASA. One main cause of transient forces on...
Landauer’s formula is the standard theoretical tool to examine ballistic transport in nano- and meso-scale junctions, but it necessitates that any variation of the junction with time must be slow compared to characteristic times of the system, e.g., the relaxation time of local excitations. Transport through structurally dynamic junctions is,...
Landauer’s formula is the standard theoretical tool to examine ballistic transport in nano- and meso-scale junctions, but it necessitates that any variation of the junction with time must be slow compared to characteristic times of the system, e.g., the relaxation time of local excitations. Transport through structurally dynamic junctions is,...
Full Text:
’ crossover in electronic
transport – Supplemental Information
DanielGruss,1, 2, 3 Kirill A. Velizhanin,4