2,827 research outputs found

    Pseudo-Ranks: How to Calculate Them Efficiently in R

    Get PDF
    Many popular nonparametric inferential methods are based on ranks. Among the most commonly used and most famous tests are for example the Wilcoxon-Mann-Whitney test for two independent samples, and the Kruskal-Wallis test for multiple independent groups. However, recently, it has become clear that the use of ranks may lead to paradoxical results in case of more than two groups. Luckily, these problems can be avoided simply by using pseudo-ranks instead of ranks. These pseudo-ranks, however, suffer from being (a) at first less intuitive and not as straightforward in their interpretation, (b) computationally much more expensive to calculate. The computational cost has been prohibitive, for example, for large-scale simulative evaluations or application of resampling-based pseudorank procedures. In this paper, we provide different algorithms to calculate pseudo-ranks efficiently in order to solve problem (b) and thus render it possible to overcome the current limitations of procedures based on pseudo-ranks

    Protecting Software through Obfuscation:Can It Keep Pace with Progress in Code Analysis?

    Get PDF
    Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread application in malware and commercial software shows that it is nevertheless popular in practice. Still, it remains largely unexplored to what extent today’s software obfuscations keep up with state-of-the-art code analysis and where we stand in the arms race between software developers and code analysts. The main goal of this survey is to analyze the effectiveness of different classes of software obfuscation against the continuously improving deobfuscation techniques and off-the-shelf code analysis tools. The answer very much depends on the goals of the analyst and the available resources. On the one hand, many forms of lightweight static analysis have difficulties with even basic obfuscation schemes, which explains the unbroken popularity of obfuscation among malware writers. On the other hand, more expensive analysis techniques, in particular when used interactively by a human analyst, can easily defeat many obfuscations. As a result, software obfuscation for the purpose of intellectual property protection remains highly challenging.</jats:p

    Testing and evaluating real driving emissions with PEMS

    Get PDF
    Testing of real driving emissions (RDE) with portable emission measuring system (PEMS) in an appropriate road circuit became an obligatory element of new type approval of passenger cars since September 2017. In several projects the Laboratory for Exhaust Emissions Control (AFHB) of the Berne University of Applied Sciences (BFH) performed comparisons on passenger cars with different PEMS’s on chassis dynamometer and on road, considering the quality and the correlations of results. Particle number measuring systems (PN PEMS) were also included in the tests. The present paper informs about influences of E85 on RDE on two flex-fuel-vehicles, discusses some aspects of different ways of evaluation with different programs, shows comparison of different types of PN PEMS and represents the effects of simulation of slope on the chassis dynamometer

    An Extended View on Measuring Tor AS-level Adversaries

    Full text link
    Tor provides anonymity to millions of users around the globe which has made it a valuable target for malicious actors. As a low-latency anonymity system, it is vulnerable to traffic correlation attacks from strong passive adversaries such as large autonomous systems (ASes). In preliminary work, we have developed a measurement approach utilizing the RIPE Atlas framework -- a network of more than 11,000 probes worldwide -- to infer the risk of deanonymization for IPv4 clients in Germany and the US. In this paper, we apply our methodology to additional scenarios providing a broader picture of the potential for deanonymization in the Tor network. In particular, we (a) repeat our earlier (2020) measurements in 2022 to observe changes over time, (b) adopt our approach for IPv6 to analyze the risk of deanonymization when using this next-generation Internet protocol, and (c) investigate the current situation in Russia, where censorship has been intensified after the beginning of Russia's full-scale invasion of Ukraine. According to our results, Tor provides user anonymity at consistent quality: While individual numbers vary in dependence of client and destination, we were able to identify ASes with the potential to conduct deanonymization attacks. For clients in Germany and the US, the overall picture, however, has not changed since 2020. In addition, the protocols (IPv4 vs. IPv6) do not significantly impact the risk of deanonymization. Russian users are able to securely evade censorship using Tor. Their general risk of deanonymization is, in fact, lower than in the other investigated countries. Beyond, the few ASes with the potential to successfully perform deanonymization are operated by Western companies, further reducing the risk for Russian users

    Fractionation profiling: a fast and versatile approach for mapping vesicle proteomes and protein-protein interactions.

    Get PDF
    We developed "fractionation profiling," a method for rapid proteomic analysis of membrane vesicles and protein particles. The approach combines quantitative proteomics with subcellular fractionation to generate signature protein abundance distribution profiles. Functionally associated groups of proteins are revealed through cluster analysis. To validate the method, we first profiled >3500 proteins from HeLa cells and identified known clathrin-coated vesicle proteins with >90% accuracy. We then profiled >2400 proteins from Drosophila S2 cells, and we report the first comprehensive insect clathrin-coated vesicle proteome. Of importance, the cluster analysis extends to all profiled proteins and thus identifies a diverse range of known and novel cytosolic and membrane-associated protein complexes. We show that it also allows the detailed compositional characterization of complexes, including the delineation of subcomplexes and subunit stoichiometry. Our predictions are presented in an interactive database. Fractionation profiling is a universal method for defining the clathrin-coated vesicle proteome and may be adapted for the analysis of other types of vesicles and particles. In addition, it provides a versatile tool for the rapid generation of large-scale protein interaction maps

    Enter Sandbox: Android Sandbox Comparison

    Full text link
    Expecting the shipment of 1 billion Android devices in 2017, cyber criminals have naturally extended their vicious activities towards Google's mobile operating system. With an estimated number of 700 new Android applications released every day, keeping control over malware is an increasingly challenging task. In recent years, a vast number of static and dynamic code analysis platforms for analyzing Android applications and making decision regarding their maliciousness have been introduced in academia and in the commercial world. These platforms differ heavily in terms of feature support and application properties being analyzed. In this paper, we give an overview of the state-of-the-art dynamic code analysis platforms for Android and evaluate their effectiveness with samples from known malware corpora as well as known Android bugs like Master Key. Our results indicate a low level of diversity in analysis platforms resulting from code reuse that leaves the evaluated systems vulnerable to evasion. Furthermore the Master Key bugs could be exploited by malware to hide malicious behavior from the sandboxes.Comment: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.org/abs/1410.6674

    Interaction between AP-5 and the hereditary spastic paraplegia proteins SPG11 and SPG15.

    Get PDF
    The AP-5 complex is a recently identified but evolutionarily ancient member of the family of heterotetrameric adaptor proteins (AP complexes). It is associated with two proteins that are mutated in patients with hereditary spastic paraplegia, SPG11 and SPG15. Here we show that the four AP-5 subunits can be coimmunoprecipitated with SPG11 and SPG15, both from cytosol and from detergent-extracted membranes, with a stoichiometry of ∼1:1:1:1:1:1. Knockdowns of SPG11 or SPG15 phenocopy knockdowns of AP-5 subunits: all six knockdowns cause the cation-independent mannose 6-phosphate receptor to become trapped in clusters of early endosomes. In addition, AP-5, SPG11, and SPG15 colocalize on a late endosomal/lysosomal compartment. Both SPG11 and SPG15 have predicted secondary structures containing α-solenoids related to those of clathrin heavy chain and COPI subunits. SPG11 also has an N-terminal, β-propeller-like domain, which interacts in vitro with AP-5. We propose that AP-5, SPG15, and SPG11 form a coat-like complex, with AP-5 involved in protein sorting, SPG15 facilitating the docking of the coat onto membranes by interacting with PI3P via its FYVE domain, and SPG11 (possibly together with SPG15) forming a scaffold
    • …
    corecore