65 research outputs found
Recommended from our members
Android Security: A Survey of Issues, Malware Penetration, and Defenses
Smartphones have become pervasive due to the availability of office applications, Internet, games, vehicle guidance using location-based services apart from conventional services such as voice calls, SMSes, and multimedia services. Android devices have gained huge market share due to the open architecture of Android and the popularity of its application programming interface (APIs) in the developer community. Increased popularity of the Android devices and associated monetary benefits attracted the malware developers, resulting in big rise of the Android malware apps between 2010 and 2014. Academic researchers and commercial antimalware companies have realized that the conventional signature-based and static analysis methods are vulnerable. In particular, the prevalent stealth techniques, such as encryption, code transformation, and environment-aware approaches, are capable of generating variants of known malware. This has led to the use of behavior-, anomaly-, and dynamic-analysis-based methods. Since a single approach may be ineffective against the advanced techniques, multiple complementary approaches can be used in tandem for effective malware detection. The existing reviews extensively cover the smartphone OS security. However, we believe that the security of Android, with particular focus on malware growth, study of antianalysis techniques, and existing detection methodologies, needs an extensive coverage. In this survey, we discuss the Android security enforcement mechanisms, threats to the existing security enforcements and related issues, malware growth timeline between 2010 and 2014, and stealth techniques employed by the malware authors, in addition to the existing detection methods. This review gives an insight into the strengths and shortcomings of the known research methodologies and provides a platform, to the researchers and practitioners, toward proposing the next-generation Android security, analysis, and malware detection techniques
ESCAPADE: Encryption-type-ransomeware: system call based pattern detection
Encryption-type ransomware has risen in prominence lately as the go-to malware for threat actors aiming to compromise Android devices. In this paper, we present a ransomware detection technique based on behaviours observed in the system calls performed by the malware. We identify and present some common high-level system call behavioural patterns targeted at encryption-type ransomware and evaluate these patterns. We further present our repeatable and extensible methodology for extracting the system call log and patterns
Syk: a new player in the field of breast cancer
Breast tumor development and progression are thought to occur through a complex, multistep process, including oncogene activation (eg HER2/neu) and mutation or loss of tumor suppressor genes (eg p53). Determining the function of genetic alterations in breast carcinoma tumorigenesis and metastasis has been the focus of intensive research efforts for several decades. One group of proteins that play a critical role in breast cancer cell signaling pathways are tyrosine kinases. Overexpression of the tyrosine kinase HER2/neu is observed in many human breast cancers and is positively correlated with enhanced tumorigenesis [1]. Recently, another tyrosine kinase, Syk, has been implicated as an important inhibitor of breast cancer cell growth and metastasis [2]. This recent finding was unexpected, since Syk function has been predominantly linked to hematopoietic cell signaling, and is discussed further in this commentary
Recommended from our members
Effect of titanium dioxide (TiO₂) nanoparticle coating on the detection performance of microfiber knot resonator sensors for relative humidity measurement
In this study, the sensitivity and the linearity of the un-coated and TiO2-coated microfiber knot resonator (MKR) have been analyzed. The MKR is very sensitive to humidity changes since its refractive index is strongly humidity dependent. As a result, shifts occur in the resonance wavelength and there are also changes in output power. The un-coated MKR showed a sensitivity of 1.3 pm/%RH, in terms of the resonance wavelength, and a sensitivity of 0.0626 dB/%RH for the transmitted output power. The sensitivity increased greatly after the deposition of a porous TiO2 nanoparticle coating on the MKR. The TiO2-coated MKR showed an improved sensitivity of 2.5 pm/%RH, with respect to the resonance wavelength, and 0.0836 dB/%RH for the transmitted output power. This MKR sensor has the potential for use in a variety of humidity sensing applications
Intelligent OS X malware threat detection with code inspection
With the increasing market share of Mac OS X operating system, there is a corresponding increase in the number of malicious programs (malware) designed to exploit vulnerabilities on Mac OS X platforms. However, existing manual and heuristic OS X malware detection techniques are not capable of coping with such a high rate of malware. While machine learning techniques offer promising results in automated detection of Windows and Android malware, there have been limited efforts in extending them to OS X malware detection. In this paper, we propose a supervised machine learning model. The model applies kernel base Support Vector Machine (SVM) and a novel weighting measure based on application library calls to detect OS X malware. For training and evaluating the model, a dataset with a combination of 152 malware and 450 benign were is created. Using common supervised Machine Learning algorithm on the dataset, we obtain over 91% detection accuracy with 3.9% false alarm rate. We also utilize Synthetic Minority Over-sampling Technique (SMOTE) to create three synthetic datasets with different distributions based on the refined version of collected dataset to investigate impact of different sample sizes on accuracy of malware detection. Using SMOTE datasets we could achieve over 96% detection accuracy and false alarm of less than 4%. All malware classification experiments are tested using cross validation technique. Our results reflect that increasing sample size in synthetic datasets has direct positive effect on detection accuracy while increases false alarm rate in compare to the original dataset
Recommended from our members
In-situ 3D Micro-sensor Model using Embedded Plasmonic Island for Biosensors
The design of the microsensor system for biosensors using the plasmonic island is proposed. The sensor head is formed by the stacked layers of silicon-graphene-gold materials. The dual-mode operations of the sensor can be performed using the relationship of the changes between the electron mobility and optical phase, where the exciting environment can be light intensity (phase), electrical transient, heat, pressure, flavour and smoke, The change in light phase (intensity) in silicon and conductivity (mobility) in gold layers cause change in the output measurands. The design and simulation interpretation of the sensor is presented. The sensor manipulation using the MCM arrangement is simulated and interpreted for biosensor applications 3D imaging can also be applied to the MCM function, where the 3D in situ sensor function is possible. The sensor sensitivity of 2.0 × 10−21 cm2 V−1 s−1 (mW)−1 via simulation is obtained
The Syk Kinase SmTK4 of Schistosoma mansoni Is Involved in the Regulation of Spermatogenesis and Oogenesis
The signal transduction protein SmTK4 from Schistosoma mansoni belongs to the family of Syk kinases. In vertebrates, Syk kinases are known to play specialized roles in signaling pathways in cells of the hematopoietic system. Although Syk kinases were identified in some invertebrates, their role in this group of animals has not yet been elucidated. Since SmTK4 is the first Syk kinase from a parasitic helminth, shown to be predominantly expressed in the testes and ovary of adult worms, we investigated its function. To unravel signaling cascades in which SmTK4 is involved, yeast two-/three-hybrid library screenings were performed with either the tandem SH2-domain, or with the linker region including the tyrosine kinase domain of SmTK4. Besides the Src kinase SmTK3 we identified a new Src kinase (SmTK6) acting upstream of SmTK4 and a MAPK-activating protein, as well as mapmodulin acting downstream. Their identities and colocalization studies pointed to a role of SmTK4 in a signaling cascade regulating the proliferation and/or differentiation of cells in the gonads of schistosomes. To confirm this decisive role we performed biochemical and molecular approaches to knock down SmTK4 combined with a novel protocol for confocal laser scanning microscopy for morphological analyses. Using the Syk kinase-specific inhibitor Piceatannol or by RNAi treatment of adult schistosomes in vitro, corresponding phenotypes were detected in the testes and ovary. In the Xenopus oocyte system it was finally confirmed that Piceatannol suppressed the activity of the catalytic kinase domain of SmTK4. Our findings demonstrate a pivotal role of SmTK4 in gametogenesis, a new function for Syk kinases in eukaryotes
The elegans of spindle assembly
The Caenorhabditis elegans one-cell embryo is a powerful system in which to study microtubule organization because this large cell assembles both meiotic and mitotic spindles within the same cytoplasm over the course of 1 h in a stereotypical manner. The fertilized oocyte assembles two consecutive acentrosomal meiotic spindles that function to reduce the replicated maternal diploid set of chromosomes to a single-copy haploid set. The resulting maternal DNA then unites with the paternal DNA to form a zygotic diploid complement, around which a centrosome-based mitotic spindle forms. The early C. elegans embryo is amenable to live-cell imaging and electron tomography, permitting a detailed structural comparison of the meiotic and mitotic modes of spindle assembly
- …