35 research outputs found

    HLA genotyping in the international Type 1 Diabetes Genetics Consortium

    Get PDF
    Background Although human leukocyte antigen (HLA) DQ and DR loci appear to confer the strongest genetic risk for type 1 diabetes, more detailed information is required for other loci within the HLA region to understand causality and stratify additional risk factors. The Type 1 Diabetes Genetics Consortium (T1DGC) study design included high-resolution genotyping of HLA-A, B, C, DRB1, DQ, and DP loci in all affected sibling pair and trio families, and cases and controls, recruited from four networks worldwide, for analysis with clinical phenotypes and immunological markers

    Android applications : Data leaks via advertising libraries

    Full text link
    Recent studies have determined that many Android applications in both official and non-official online markets expose details of the users\u27 smartphones without user consent. In this paper, we explain why such applications leak, how they leak and where the data is leaked to. In order to achieve this, we combine static and dynamic analysis to examine Java classes and application behaviour for a set of popular, clean applications from the Finance and Games categories. We observed that all the applications in our data set which leaked information (10%) had third-party advertising libraries embedded in their respective Java packages

    Mining permission patterns for contrasting clean and malicious android applications

    No full text
    An Android application uses a permission system to regulate the access to system resources and users\u27 privacy-relevant information. Existing works have demonstrated several techniques to study the required permissions declared by the developers, but little attention has been paid towards used permissions. Besides, no specific permission combination is identified to be effective for malware detection. To fill these gaps, we have proposed a novel pattern mining algorithm to identify a set of contrast permission patterns that aim to detect the difference between clean and malicious applications. A benchmark malware dataset and a dataset of 1227 clean applications has been collected by us to evaluate the performance of the proposed algorithm. Valuable findings are obtained by analyzing the returned contrast permission patterns. © 2013 Elsevier B.V. All rights reserved

    Contrasting permission patterns between clean and malicious android applications

    Full text link
    © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2013. The Android platform uses a permission system model to allow users and developers to regulate access to private information and system resources required by applications. Permissions have been proved to be useful for inferring behaviors and characteristics of an application. In this paper, a novel method to extract contrasting permission patterns for clean and malicious applications is proposed. Contrary to existing work, both required and used permissions were considered when discovering the patterns. We evaluated our methodology on a clean and a malware dataset, each comprising of 1227 applications. Our empirical results suggest that our permission patterns can capture key differences between clean and malicious applications, which can assist in characterizing these two types of applications

    Analysis of malicious and benign android applications

    No full text
    Since its establishment, the Android applications market has been infected by a proliferation of malicious applications. Recent studies show that rogue developers are injecting malware into legitimate market applications which are then installed on open source sites for consumer uptake. Often, applications are infected several times. In this paper, we investigate the behavior of malicious Android applications, we present a simple and effective way to safely execute and analyze them. As part of this analysis, we use the Android application sandbox Droidbox to generate behavioral graphs for each sample and these provide the basis of the development of patterns to aid in identifying it. As a result, we are able to determine if family names have been correctly assigned by current anti-virus vendors. Our results indicate that the traditional anti-virus mechanisms are not able to correctly identify malicious Android applications

    Efficient Classification of Android Malware in the Wild Using Robust Static Features

    No full text
    Contains fulltext : 166088.pdf (preprint version ) (Closed access

    An analysis of Android adware

    No full text
    corecore