39 research outputs found

    Non-Essential Communication in Mobile Applications

    Get PDF
    This paper studies communication patterns in mobile applications. Our analysis shows that 65% of the HTTP, socket, and RPC communication in top-popular Android applications from Google Play have no effect on the user-observable application functionality. We present a static analysis that is able to detect non-essential communication with 84%-90% precision and 63%-64% recall, depending on whether advertisement content is interpreted as essential or not. We use our technique to analyze the 500 top-popular Android applications from Google Play and determine that more than 80% of the connection statements in these applications are non-essential

    Covert Communication in Mobile Applications

    Get PDF
    This paper studies communication patterns in mobile applications. Our analysis shows that 63% of the external communication made by top-popular free Android applications from Google Play has no effect on the user-observable application functionality. To detect such covert communication in an efficient manner, we propose a highly precise and scalable static analysis technique: it achieves 93% precision and 61% recall compared to the empirically determined “ground truth”, and runs in a matter of a few minutes. Furthermore, according to human evaluators, in 42 out of 47 cases, disabling connections deemed covert by our analysis leaves the delivered application experience either completely intact or with only insignificant interference. We conclude that our technique is effective for identifying and disabling covert communication. We then use it to investigate communication patterns in the 500 top-popular applications from Google Play.United States. Defense Advanced Research Projects Agency (Agreement FA8750-12-2-0110

    TFE3 Translocation-Associated Renal Cell Carcinoma Presenting as Avascular Necrosis of the Femur in a 19-Year-Old Patient: Case Report and Review of the Literature

    Get PDF
    In the United States, renal cell carcinoma (RCC) accounts for approximately 3% of adult malignancies and 90–95% of all neoplasms arising from the kidney. According to the National Cancer Institute, 58 240 new cases and 13 040 deaths from renal cancer will occur in 2010. RCC usually occurs in older adults between the ages of 50 and 70 and is rare in young adults and children. We describe a case of a TFE3 translocation-associated RCC in a 19-year-old patient presenting as avascular necrosis of the femur. Due to the rarity of this malignancy, we present this case including a review of the existing literature relative to diagnosis and treatment

    Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement

    Get PDF
    We present a new technique and system, DIODE, for auto- matically generating inputs that trigger overflows at memory allocation sites. DIODE is designed to identify relevant sanity checks that inputs must satisfy to trigger overflows at target memory allocation sites, then generate inputs that satisfy these sanity checks to successfully trigger the overflow. DIODE works with off-the-shelf, production x86 binaries. Our results show that, for our benchmark set of applications, and for every target memory allocation site exercised by our seed inputs (which the applications process correctly with no overflows), either 1) DIODE is able to generate an input that triggers an overflow at that site or 2) there is no input that would trigger an overflow for the observed target expression at that site.United States. Defense Advanced Research Projects Agency (Grant FA8650-11-C-7192

    Run-Time Support for Distributed Sharing in Typed Languages

    No full text
    corecore