41 research outputs found

    A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks

    Get PDF
    Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing innovative techniques to avoid or prolong malware detection effectively. Past studies have shown that malware detection systems are susceptible to evasion attacks where adversaries can successfully bypass the existing security defenses and deliver the malware to the target system without being detected. The evolution of escape-resistant systems is an open research problem. This paper presents a detailed taxonomy and evaluation of Android-based malware evasion techniques deployed to circumvent malware detection. The study characterizes such evasion techniques into two broad categories, polymorphism and metamorphism, and analyses techniques used for stealth malware detection based on the malware’s unique characteristics. Furthermore, the article also presents a qualitative and systematic comparison of evasion detection frameworks and their detection methodologies for Android-based malware. Finally, the survey discusses open-ended questions and potential future directions for continued research in mobile malware detection

    A budget feasible peer graded mechanism for iot-based crowdsourcing

    Get PDF
    We develop and extend a line of recent works on the design of mechanisms for heterogeneous tasks assignment problem in ’crowdsourcing’. The budgeted market we consider consists of multiple task requesters and multiple IoT devices as task executers. In this, each task requester is endowed with a single distinct task along with the publicly known budget. Also, each IoT device has valuations as the cost for executing the tasks and quality, which are private. Given such scenario, the objective is to select a subset of IoT devices for each task, such that the total payment made is within the allotted quota of the budget while attaining a threshold quality. For the purpose of determining the unknown quality of the IoT devices we have utilized the concept of peer grading. In this paper, we have carefully crafted a truthful budget feasible mechanism for the problem under investigation that also allows us to have the true information about the quality of the IoT devices. Further, we have extended the set-up considering the case where the tasks are divisible in nature and the IoT devices are working collaboratively, instead of, a single entity for executing each task. We have designed the budget feasible mechanisms for the extended versions. The simulations are performed in order to measure the efficacy of our proposed mechanismPeer ReviewedPostprint (author's final draft

    Bacteriological Assessment of Bottled Drinking Water Available at Major Transit Places in Mangalore City of South India

    No full text
    Introduction. Safe drinking water is essential for human life. It is generally considered that bottled water is safe for usage by people. For long-distance travelers, it serves as the only source of reliable drinking water. But, several studies have reported that bottled water does not always meet the acceptability standards. Objectives. To assess the bacteriological and physical quality of bottled water marketed in major transit areas and to check its compliance with national standards. Methods. The investigating team visited retail shops at three main transit sites for long-distance travelers in Mangalore city. A total of 24 water bottles of 12 brands were randomly selected. The analysis of total viable count (TVC) was done to assess the bacteriological quality of samples. Results. In 3(12.5%) samples, all of which were of local brands, batch number, the period of manufacture, and the period of expiry were not mentioned. Odor and floating bodies were present in one sample each. Five (20.8%) water bottles had been enriched with minerals. Ozone treatment was the most commonly 22(91.7%) used method for disinfection of water. In only 15(62.5%) samples, the bacterial contamination was within acceptable limits certified for drinking purposes. Water samples manufactured by multinational companies (p=0.018), those with batch number mentioned (p=0.042), the best period of manufacture (p=0.036), and long expiry dates (p=0.028) were acceptable for usage. Conclusion. Surveillance of bottled water manufacturing industries in the settings on a regular basis needs to be done by regulatory agencies. These measures will ensure safe and wholesome bottled water for public usage
    corecore