1,819 research outputs found

    Three-Phase Detection and Classification for Android Malware Based on Common Behaviors

    Get PDF
    Android is one of the most popular operating systems used in mobile devices. Its popularity also renders it a common target for attackers. We propose an efficient and accurate three-phase behavior-based approach for detecting and classifying malicious Android applications. In the proposed approach, the first two phases detect a malicious application and the final phase classifies the detected malware. The first phase quickly filters out benign applications based on requested permissions and the remaining samples are passed to the slower second phase, which detects malicious applications based on system call sequences. The final phase classifies malware into known or unknown types based on behavioral or permission similarities. Our contributions are three-fold: First, we propose a self-contained approach for Android malware identification and classification. Second, we show that permission requests from an Application are beneficial to benign application filtering. Third, we show that system call sequences generated from an application running inside a virtual machine can be used for malware detection. The experiment results indicate that the multi-phase approach is more accurate than the single-phase approach. The proposed approach registered true positive and false positive rates of 97% and 3%, respectively. In addition, more than 98% of the samples were correctly classified into known or unknown types of malware based on permission similarities.We believe that our findings shed some lights on future development of malware detection and classification

    A Camera-Based Energy Management of Computer Displays and TV Sets

    Get PDF

    3D-Stereoscopic Immersive Analytics Projects at Monash University and University of Konstanz

    Get PDF
    Immersive Analytics investigates how novel interaction and display technologies may support analytical reasoning and decision making. The Immersive Analytics initiative of Monash University started early 2014. Over the last few years, a number of projects have been developed or extended in this context to meet the requirements of semi- or full-immersive stereoscopic environments. Different technologies are used for this purpose: CAVE2™ (a 330 degree large-scale visualization environment which can be used for educative and scientific group presentations, analyses and discussions), stereoscopic Powerwalls (miniCAVEs, representing a segment of the CAVE2 and used for development and communication), Fishtanks, and/or HMDs (such as Oculus, VIVE, and mobile HMD approaches). Apart from CAVE2™ all systems are or will be employed on both the Monash University and the University of Konstanz side, especially to investigate collaborative Immersive Analytics. In addition, sensiLab extends most of the previous approaches by involving all senses, 3D visualization is combined with multi-sensory feedback, 3D printing, robotics in a scientific-artistic-creative environment

    Technology for the Future: In-Space Technology Experiments Program, part 2

    Get PDF
    The purpose of the Office of Aeronautics and Space Technology (OAST) In-Space Technology Experiments Program In-STEP 1988 Workshop was to identify and prioritize technologies that are critical for future national space programs and require validation in the space environment, and review current NASA (In-Reach) and industry/ university (Out-Reach) experiments. A prioritized list of the critical technology needs was developed for the following eight disciplines: structures; environmental effects; power systems and thermal management; fluid management and propulsion systems; automation and robotics; sensors and information systems; in-space systems; and humans in space. This is part two of two parts and contains the critical technology presentations for the eight theme elements and a summary listing of critical space technology needs for each theme

    Three-Phase Detection and Classification for Android Malware Based on Common Behaviors

    Get PDF
    Android is one of the most popular operating systems used in mobile devices. Its popularity also renders it a common target for attackers. We propose an efficient and accurate three-phase behavior-based approach for detecting and classifying malicious Android applications. In the proposedapproach, the first two phases detect a malicious application and the final phase classifies the detected malware. The first phase quickly filters out benign applications based on requested permissions and the remaining samples are passed to the slower second phase, which detects malicious applications based on system call sequences. The final phase classifies malware into known or unknown types based on behavioral or permission similarities. Our contributions are three-fold: First, we propose a self-contained approach for Android malware identification and classification. Second, we show that permission requests from an Application are beneficial to benign application filtering. Third, we show that system call sequences generated from an application running inside a virtual machine can be used for malware detection. The experiment results indicate that the multi-phase approach is more accurate than the single-phase approach. The proposed approach registered true positive and false positive rates of 97% and 3%, respectively. In addition, more than 98% of the samples were correctly classified into known or unknown types of malware based on permission similarities.We believe that our findings shed some lights on future development of malware detection and classification

    Intelligent Robotic Recycling of Flat Panel Displays

    Get PDF
    As the population and prosperity continue to rise the demand for high-tech products is rapidly increasing. Displays are a huge part of this market with millions being created each year. We have a finite amount of resources on this planet and it is imperative that we properly dispose of our devices. In this thesis an intelligent robotic workcell for dismantling and recycling of flat panel displays is proposed and tested. This system utilizes industrial robots and open source tools to process a flat panel display (FPD) with the goal of removal of cold compact fluorescent tubes (CFLs). These are removed so the FPD can be shredded and properly recycled without the mercury present in the CFLs contaminating the materials or harming workers. This system utilizes many new and innovative techniques including deep learning algorithms for object detection and image segmentation. These deep learning techniques specifically Faster R-CNN for object detection and DeepLab for image segmentation have been shown to be extremely robust and capable in this application. The system was tested both with a real world system and with simulated geometry with a live vision feed. During simulation, the system was capable of processing flat panel FPDs in between 110 and 230 seconds per unit. It has been calculated using the simulation results, that this system can be profitable and has an approximate payback period of between 0.19 and 4.87 years depending on the material being fed into the system. The large range is due to the difference in value between monitor and TV style FPDs. The monitors have far less value than the TVs and are far more difficult to process

    Delivering elder-care environments utilizing TV-channel based mechanisms

    Get PDF
    In this paper, we present a smart environment for elderly. What makes the development of such system challenging is that the concept of smartness for elderly brings to the extreme the idea of invisibility of the technology. In our experience, elders are well-disposed to new technologies, provided that those will not require significant changes - namely, they are invisible - to their habits. Starting from this consideration, 200 caregivers responses were collected by questionnaire, so as to better understand elders' needs and habits. A system was subsequently developed allowing elders to access a number of "modern web services" as standard TV channels: at channel 43 there is the health status, at channel 45 the photos of the family, at 46 the agenda of the week, just to mention few of the available services. The content of such services is automatically generated by the smart devices in the environment and is managed by the caregivers (e.g., family members) by simple web apps. Fourteen families were asked to install the system in their house. The results of these experiments confirm that the proposed system is considered effective and user-friendly by elders
    • …
    corecore