2,827 research outputs found
Pseudo-Ranks: How to Calculate Them Efficiently in R
Many popular nonparametric inferential methods are based on ranks. Among the most commonly used and most famous tests are for example the Wilcoxon-Mann-Whitney test for two independent samples, and the Kruskal-Wallis test for multiple independent groups. However, recently, it has become clear that the use of ranks may lead to paradoxical results in case of more than two groups. Luckily, these problems can be avoided simply by using pseudo-ranks instead of ranks. These pseudo-ranks, however, suffer from being (a) at first less intuitive and not as straightforward in their interpretation, (b) computationally much more expensive to calculate. The computational cost has been prohibitive, for example, for large-scale simulative evaluations or application of resampling-based pseudorank procedures. In this paper, we provide different algorithms to calculate pseudo-ranks efficiently in order to solve problem (b) and thus render it possible to overcome the current limitations of procedures based on pseudo-ranks
Protecting Software through Obfuscation:Can It Keep Pace with Progress in Code Analysis?
Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread application in malware and commercial software shows that it is nevertheless popular in practice. Still, it remains largely unexplored to what extent today’s software obfuscations keep up with state-of-the-art code analysis and where we stand in the arms race between software developers and code analysts. The main goal of this survey is to analyze the effectiveness of different classes of software obfuscation against the continuously improving deobfuscation techniques and off-the-shelf code analysis tools.
The answer very much depends on the goals of the analyst and the available resources. On the one hand, many forms of lightweight static analysis have difficulties with even basic obfuscation schemes, which explains the unbroken popularity of obfuscation among malware writers. On the other hand, more expensive analysis techniques, in particular when used interactively by a human analyst, can easily defeat many obfuscations. As a result, software obfuscation for the purpose of intellectual property protection remains highly challenging.</jats:p
Recommended from our members
A neutron diffraction study of crystal and low-temperature magnetic structures within the (Na,Li)FeGe2O6 pyroxene-type solid solution series
Solid solution compounds along the Li1–x Na x FeGe2O6 clinopyroxene series have been prepared by solid state ceramic sintering and investigated by bulk magnetic and calorimetric methods; the Na-rich samples with x(Na) > 0.7 were also investigated by low-temperature neutron diffraction experiments in a temperature range of 4–20 K. For samples with x(Na) > 0.76 the crystal structure adopts the C2/c symmetry at all measuring temperatures, while the samples display P21/c symmetry for smaller Na contents. Magnetic ordering is observed for all samples below 20 K with a slight decrease of T N with increasing Na content. The magnetic spin structures change distinctly as a function of chemical composition: up to x(Na) = 0.72 the magnetic structure can be described by a commensurate arrangement of magnetic spins with propagation vector k = (½, 0 0), an antiferromagnetic (AFM) coupling within the Fe3+O6 octahedra zig-zag chains and an alternating AFM and ferromagnetic (FM) interaction between the chains, depending on the nature of the tetrahedral GeO4 chains. The magnetic structure can be described in magnetic space group P a21/c. Close to the structural phase transition for sample with x(Na) = 0.75, magnetic ordering is observed below 15 K; however, it becomes incommensurately modulated with k = (0.344, 0, 0.063). At 4 K, the magnetic spin structure best can be described by a cycloidal arrangement within the M1 chains, the spins are within the a–c plane. Around 12 K the cycloidal structure transforms to a spin density wave (SDW) structure. For the C2/c structures, a coexistence of a simple collinear and an incommensurately modulated structure is observed down to lowest temperatures. For 0.78 ≤ x(Na) ≤ 0.82, a collinear magnetic structure with k = (0 1 0), space group P C21/c and an AFM spin structure within the M1 chains and an FM one between the spins is dominating, while the incommensurately modulated structure becomes dominating the collinear one in the samples with x(Na) = 0.88. Here the magnetic propagation vector is k = (0.28, 1, 0.07) and the spin structure corresponds again to a cycloidal structure within the M1 chains. As for the other samples, a transition from the cycloidal to a SDW structure is observed. Based on the neutron diffraction data, the appearance of two peaks in the heat capacity of Na-rich samples can now be interpreted as a transition from a cycloidal magnetic structure to a spin density wave structure of the magnetically ordered phase for the Na-rich part of the solid solution series
Testing and evaluating real driving emissions with PEMS
Testing of real driving emissions (RDE) with portable emission measuring system (PEMS) in an appropriate road circuit became an obligatory element of new type approval of passenger cars since September 2017. In several projects the Laboratory for Exhaust Emissions Control (AFHB) of the Berne University of Applied Sciences (BFH) performed comparisons on passenger cars with different PEMS’s on chassis dynamometer and on road, considering the quality and the correlations of results. Particle number measuring systems (PN PEMS) were also included in the tests. The present paper informs about influences of E85 on RDE on two flex-fuel-vehicles, discusses some aspects of different ways of evaluation with different programs, shows comparison of different types of PN PEMS and represents the effects of simulation of slope on the chassis dynamometer
An Extended View on Measuring Tor AS-level Adversaries
Tor provides anonymity to millions of users around the globe which has made
it a valuable target for malicious actors. As a low-latency anonymity system,
it is vulnerable to traffic correlation attacks from strong passive adversaries
such as large autonomous systems (ASes). In preliminary work, we have developed
a measurement approach utilizing the RIPE Atlas framework -- a network of more
than 11,000 probes worldwide -- to infer the risk of deanonymization for IPv4
clients in Germany and the US.
In this paper, we apply our methodology to additional scenarios providing a
broader picture of the potential for deanonymization in the Tor network. In
particular, we (a) repeat our earlier (2020) measurements in 2022 to observe
changes over time, (b) adopt our approach for IPv6 to analyze the risk of
deanonymization when using this next-generation Internet protocol, and (c)
investigate the current situation in Russia, where censorship has been
intensified after the beginning of Russia's full-scale invasion of Ukraine.
According to our results, Tor provides user anonymity at consistent quality:
While individual numbers vary in dependence of client and destination, we were
able to identify ASes with the potential to conduct deanonymization attacks.
For clients in Germany and the US, the overall picture, however, has not
changed since 2020. In addition, the protocols (IPv4 vs. IPv6) do not
significantly impact the risk of deanonymization. Russian users are able to
securely evade censorship using Tor. Their general risk of deanonymization is,
in fact, lower than in the other investigated countries. Beyond, the few ASes
with the potential to successfully perform deanonymization are operated by
Western companies, further reducing the risk for Russian users
Fractionation profiling: a fast and versatile approach for mapping vesicle proteomes and protein-protein interactions.
We developed "fractionation profiling," a method for rapid proteomic analysis of membrane vesicles and protein particles. The approach combines quantitative proteomics with subcellular fractionation to generate signature protein abundance distribution profiles. Functionally associated groups of proteins are revealed through cluster analysis. To validate the method, we first profiled >3500 proteins from HeLa cells and identified known clathrin-coated vesicle proteins with >90% accuracy. We then profiled >2400 proteins from Drosophila S2 cells, and we report the first comprehensive insect clathrin-coated vesicle proteome. Of importance, the cluster analysis extends to all profiled proteins and thus identifies a diverse range of known and novel cytosolic and membrane-associated protein complexes. We show that it also allows the detailed compositional characterization of complexes, including the delineation of subcomplexes and subunit stoichiometry. Our predictions are presented in an interactive database. Fractionation profiling is a universal method for defining the clathrin-coated vesicle proteome and may be adapted for the analysis of other types of vesicles and particles. In addition, it provides a versatile tool for the rapid generation of large-scale protein interaction maps
Enter Sandbox: Android Sandbox Comparison
Expecting the shipment of 1 billion Android devices in 2017, cyber criminals
have naturally extended their vicious activities towards Google's mobile
operating system. With an estimated number of 700 new Android applications
released every day, keeping control over malware is an increasingly challenging
task. In recent years, a vast number of static and dynamic code analysis
platforms for analyzing Android applications and making decision regarding
their maliciousness have been introduced in academia and in the commercial
world. These platforms differ heavily in terms of feature support and
application properties being analyzed. In this paper, we give an overview of
the state-of-the-art dynamic code analysis platforms for Android and evaluate
their effectiveness with samples from known malware corpora as well as known
Android bugs like Master Key. Our results indicate a low level of diversity in
analysis platforms resulting from code reuse that leaves the evaluated systems
vulnerable to evasion. Furthermore the Master Key bugs could be exploited by
malware to hide malicious behavior from the sandboxes.Comment: In Proceedings of the Third Workshop on Mobile Security Technologies
(MoST) 2014 (http://arxiv.org/abs/1410.6674
Interaction between AP-5 and the hereditary spastic paraplegia proteins SPG11 and SPG15.
The AP-5 complex is a recently identified but evolutionarily ancient member of the family of heterotetrameric adaptor proteins (AP complexes). It is associated with two proteins that are mutated in patients with hereditary spastic paraplegia, SPG11 and SPG15. Here we show that the four AP-5 subunits can be coimmunoprecipitated with SPG11 and SPG15, both from cytosol and from detergent-extracted membranes, with a stoichiometry of ∼1:1:1:1:1:1. Knockdowns of SPG11 or SPG15 phenocopy knockdowns of AP-5 subunits: all six knockdowns cause the cation-independent mannose 6-phosphate receptor to become trapped in clusters of early endosomes. In addition, AP-5, SPG11, and SPG15 colocalize on a late endosomal/lysosomal compartment. Both SPG11 and SPG15 have predicted secondary structures containing α-solenoids related to those of clathrin heavy chain and COPI subunits. SPG11 also has an N-terminal, β-propeller-like domain, which interacts in vitro with AP-5. We propose that AP-5, SPG15, and SPG11 form a coat-like complex, with AP-5 involved in protein sorting, SPG15 facilitating the docking of the coat onto membranes by interacting with PI3P via its FYVE domain, and SPG11 (possibly together with SPG15) forming a scaffold
- …