50 research outputs found
Synthesis, antileishmanial activity and QSAR studies of 2-chloro- N -arylacetamides
ABSTRACT We describe herein the synthesis and evaluation of the antileishmanial activity against promastigote forms of Leishmania amazonensis and cytotoxicity to murine macrophages of a series of 2-chloro-N-arylacetamide derivatives. All compounds were active, except one (compound 3). Compound 5 presented the most promising results, showing good antileishmanial activity (CI50=5.39±0.67 ”M) and moderate selectivity (SI=6.36), indicating that further development of this class is worthwhile. Preliminary QSAR studies, although not predictive, furnished some insights on the importance of electronic character of aryl substituent to biological activity, as well as an indirect influence of hydrophobicity on activity
An Empirical Evaluation of Security Indicators in Mobile Web Browsers
Research areas: Mobile Device Security, Web Browser SecurityMobile browsers are increasingly being relied
upon to perform security sensitive operations. Like their
desktop counterparts, these applications can enable SSL/TLS
to provide strong security guarantees for communications over
the web. However, the drastic reduction in screen size and the
accompanying reorganization of screen real-estate significantly
changes the use and consistency of the security indicators
and certificate information that alert users of site identity
and the presence of strong cryptographic algorithms. In this
paper, we perform the first measurement of the state of
critical security indicators in mobile browsers. We evaluate
nine mobile and two tablet browsers, representing over 90% of
the market share, against the recommended guidelines for web
user interface to convey security set forth by the World Wide
Web Consortium (W3C). While desktop browsers follow the
majority of guidelines, our analysis shows that mobile browsers
fall significantly short. We also observe notable inconsistencies
across mobile browsers when such mechanisms actually are
implemented. We show where and how these failures on
mobile browsers eliminate clues previously designed for, and
still present in, desktop browsers to detect attacks such as
phishing and man-in-the-middle. Finally, we offer advice on
where current standards are unclear or incomplete.
Measuring SSL indicators on mobile browsers: Extended life, or end of the road?
Mobile browsers are increasingly being relied upon to perform security sensitive operations. Like their desktop counterparts, these applications can enable SSL/TLS to provide strong security guarantees for communications over the web. However, the drastic reduction in screen size and the accompanying reorganization of screen real estate significantly changes the use and consistency of the security indicators and certificate information that alert users of site identity and the presence of strong cryptographic algorithms. In this paper, we perform the first measurement of the state of critical security indicators in mobile browsers. We evaluate ten mobile and two tablet browsers, representing over 90% of the market share, using the recommended guidelines for web user interface to convey security set forth by the World Wide Web Consortium (W3C). While desktop browsers follow the majority of guidelines, our analysis shows that mobile browsers fall significantly short. We also observe notable inconsistencies across mobile browsers when such mechanisms actually are implemented. Finally, we use this evidence to argue that the combination of reduced screen space and an independent selection of security indicators not only make it difficult for experts to determine the security standing of mobile browsers, but actually make mobile browsing more dangerous for average users as they provide a false sense of security
An Empirical Evaluation of Security Indicators in Mobile Web Browsers
Mobile browsers are increasingly being relied upon to perform security sensitive operations. Like their desktop counterparts, these applications can enable SSL/TLS to provide strong security guarantees for communications over the web. However, the drastic reduction in screen size and the accompanying reorganization of screen real-estate significantly changes the use and consistency of the security indicators and certificate information that alert users of site identity and the presence of strong cryptographic algorithms. In this paper, we perform the first measurement of the state of critical security indicators in mobile browsers. We evaluate ten mobile and two tablet browsers, representing over 90% of the market share, against the recommended guidelines for web user interface to convey security set forth by the World Wide Web Consortium (W3C). While desktop browsers follow the majority of guidelines, our analysis shows that mobile browsers fall significantly short. We also observe notable inconsistencies across mobile browsers when such mechanisms actually are implemented. We show where and how these failures on mobile browsers eliminate clues previously designed for, and still present in, desktop browsers to detect attacks such as phishing and man-in-the-middle. Finally, we offer advice on where current standards are unclear or incomplete