Difference between revisions of "User:Mkinzler"
From REU@MU
(→Logs) |
(→Logs) |
||
Line 56: | Line 56: | ||
* Further explored using tcp-proxy | * Further explored using tcp-proxy | ||
* Brainstorming unique ways to infiltrate a social robot | * Brainstorming unique ways to infiltrate a social robot | ||
+ | * Exploring options with eavesdropping with camera audio/video |
Revision as of 16:05, 12 July 2017
Personal Info
- Computer Engineering Student
- Class of 2018
- Working with Dr. Debbie Perouli
Logs
Week 1
- Orientation
- Filled out logistical paperwork
- Met with mentor and figured out research project plan for summer
- Researched DDoS attacks that used the Internet of Things and other articles concerning IoT and Security
- Started finding applications that will work as a cloud computing platform for our research project such as Carriot
- Attended Library Tour
- Attended Dr. Brylow and Dr. Factor's research speech on how to be a good researcher
- Looked through the specs of the JD Humanoid robot since it might be included in our system.
- Learned more about BGP (Border Gateway Protocol) Hijacking and SSRF (Server-Side Request Forgery)
- Began setup of devices required for project such as an android tablet and the Google Home.
- Researched the OIS model and different protocol layers
- Researched Internet of Things architectures and protocols
Week 2
- Researched More Internet of Things architectures
- Learned Latex and started to add online journals to bibliography
- RCR Training
- Setup Raspberry Pi Zero board with Conductivity sensor
- Troubleshooting Pi serial port
- Successfully connected and started to collect the conductivity sensor data to the raspberry pi through the UART serial port
- Started working on backing up data to the cloud
Week 3
- Finished the online RCR training
- Wrote the code for the raspberry pi in C that backups data to the cloud from Ubidots
- Started to watch videos on the setup of the EZ robot
Week 4
- Setup the robot
- Familiarized myself with programming the robot
- Made simple program for robot
- Researched possibility of vulnerability with robot's servos
Week 5
- Set up Microsoft Cognitive Vision
- Connected Microsoft Cognitive Vision to robot and tested
- Worked on presentation
- Wrote the code that allows the robot to retrieve info from Ubidots
- Started writing the main code for the robot
Week 6
- Plugins can be viewed here
- Began exploring cyber-security vulnerabilities of built system
- Started looking into using tcp-proxy to gather credentials
Week 7
- Further explored using tcp-proxy
- Brainstorming unique ways to infiltrate a social robot
- Exploring options with eavesdropping with camera audio/video