32 research outputs found

    Detecting malware in memory with memory object relationships

    Get PDF
    Malware is a growing concern that not only affects large businesses but the basic consumer as well. As a result, there is a need to develop tools that can identify the malicious activities of malware authors. A useful technique to achieve this is memory forensics. Memory forensics is the study of volatile data and its structures in Random Access Memory (RAM). It can be utilized to pinpoint what actions have occurred on a computer system. This dissertation utilizes memory forensics to extract relationships between objects and supervised machine learning as a novel method for identifying malicious processes in a system memory dump. In this work, the Object Association Extractor (OAE) was created to extract objects in a memory dump and label the relationships as a graph of nodes and edges. With OAE, we extracted processes from 13,882 memory images that contained malware from the repository VirusShare and 91 memory images created with benign software from the package management software Chocolatey. The final dataset contained 267,824 processes. Two feature sets were created from the processes dataset and used to train classifiers based on four classification algorithms. These classifiers were evaluated against the ZeroR method using accuracy and recall as the evaluation metrics. The experiments showed that both sets of features used to build classifiers were able to beat the ZeroR method for the Decision Tree and Random Forest algorithms. The Random Forest classifier achieved the highest performance by reaching a recall score of almost 97%

    An Understanding of Telephony with Uncoil

    Full text link
    The autonomous steganography solution to RPCs is defined not only by the emulation of 128 bit architectures, but also by the natural need for IPv6 [18]. After years of unfortunate research into linked lists, we disconfirm the study of e-business [18]. In our research, we propose a novel methodology for the develop- ment of the UNIVAC computer (Uncoil), disproving that the World Wide Web and web browsers can connect to achieve this objective

    Saponification of N-Acylated L-Phenylalanine Wang and Merrifield Resins. Assessment of Cleavage Efficiency and Epimerization

    Get PDF
    poster abstractAs part of a continuing effort to modify Distributed Drug Discovery (D3) synthetic procedures to enhance safety and accommodate the limited resources available to students in developing-world countries, we have recently begun to examine alternatives to trifluoroacetic acid (TFA)-cleavage of amino acid derivatives from polystyrene-based resins. Cleavage of a representative example, N-(4-chlorobenzoyl)-L-phenylalanine, from both Wang and Merrifield resins was accomplished in thirty minutes at room temperature using 0.5M sodium hydroxide in methanol/tetrahydrofuran. In a side-by-side comparison with cleavage using TFA, results indicated that saponification from Wang resin was incomplete after thirty minutes. Experiments designed to examine separately the effect of reaction time, temperature, and concentration were performed and results will be presented. Additionally, investigations were performed to assess the degree of epimerization which had occurred during cleavage of Merrifield-bound L-phenylalanine acylated with both (R)- and (S)-mandelic acid. Results revealed a small but significant amount of epimerization (15:1 to 31:1 diastereomeric ratios) after a thirty-minute cleavage time at room temperature

    Exact, E=0, Solutions for General Power-Law Potentials. I. Classical Orbits

    Full text link
    For zero energy, E=0E=0, we derive exact, classical solutions for {\em all} power-law potentials, V(r)=γ/rνV(r)=-\gamma/r^\nu, with γ>0\gamma>0 and <ν<-\infty <\nu<\infty. When the angular momentum is non-zero, these solutions lead to the orbits (˚t)=[cosμ(th(t)th0(t))]1/μ\r(t)= [\cos \mu (\th(t)-\th_0(t))]^{1/\mu}, for all μν/210\mu \equiv \nu/2-1 \ne 0. When ν>2\nu>2, the orbits are bound and go through the origin. This leads to discrete discontinuities in the functional dependence of th(t)\th(t) and th0(t)\th_0(t), as functions of tt, as the orbits pass through the origin. We describe a procedure to connect different analytic solutions for successive orbits at the origin. We calculate the periods and precessions of these bound orbits, and graph a number of specific examples. Also, we explain why they all must violate the virial theorem. The unbound orbits are also discussed in detail. This includes the unusual orbits which have finite travel times to infinity and also the special ν=2\nu = 2 case.Comment: LaTeX, 27 pages with 12 figures available from the authors or can be generated from Mathematica instructions at end of the fil

    First Reported Prairie Dog–to-Human Tularemia Transmission, Texas, 2002

    Get PDF
    A tularemia outbreak, caused by Francisella tularensis type B, occurred among wild-caught, commercially traded prairie dogs. F. tularensis microagglutination titers in one exposed person indicated recent infection. These findings represent the first evidence for prairie-dog-to-human tularemia transmission and demonstrate potential human health risks of the exotic pet trade

    The Structure of Jupiter, Saturn, and Exoplanets: Key Questions for High-Pressure Experiments

    Full text link
    We give an overview of our current understanding of the structure of gas giant planets, from Jupiter and Saturn to extrasolar giant planets. We focus on addressing what high-pressure laboratory experiments on hydrogen and helium can help to elucidate about the structure of these planets.Comment: Invited contribution to proceedings of High Energy Density Laboratory Astrophysics, 6. Accepted to Astrophysics & Space Science. 12 page

    Nanofluidic transport governed by the liquid/vapour interface

    Get PDF
    Liquid/vapour interfaces govern the behaviour of a wide range of systems but remain poorly understood, leaving ample margin for the exploitation of intriguing functionalities for applications. Here, we systematically investigate the role of liquid/vapour interfaces in the transport of water across apposing liquid menisci in osmosis membranes comprising short hydrophobic nanopores that separate two fluid reservoirs. We show experimentally that mass transport is limited by molecular reflection from the liquid/vapour interface below a certain length scale, which depends on the transmission probability of water molecules across the nanopores and on the condensation probability of a water molecule incident on the liquid surface. This fundamental yet elusive condensation property of water is measured under near-equilibrium conditions and found to decrease from 0.36 ± 0.21 at 30 °C to 0.18 ± 0.09 at 60 °C. These findings define the regime in which liquid/vapour interfaces govern nanofluidic transport and have implications for understanding mass transport in nanofluidic devices, droplets and bubbles, biological components and porous media involving liquid/vapour interfaces.Center for Clean Water and Clean Energy at MIT and KFUPM (Project R10-CW-09

    Synthesis of guanidinium-derived receptor libraries and screening for selective peptide receptors in water

    No full text
    A library of "tweezer" receptors, incorporating a guanidinium "head group" and two peptide derived side arms has been prepared on the solid-phase using an orthogonally protected guanidinium scaffold 12. The library was screened with various tripeptide derivatives in an aqueous solvent system. A tweezer receptor 25 for the side chain protected tripeptide 19 was identified from the screening experiments. Receptor 25 was resynthesised and solution binding studies were carried out, which revealed that 25 binds to tripeptide 19 with Ka = 8.2 x 10(4) +/- 2.5 x 10(4) (15 % DMSO/H2O, pH 8.75) and with appreciable selectivity over the tripeptide enantiomer 22 and the side chain deprotected tripeptide 20
    corecore