2,110 research outputs found

    AdSplit: Separating smartphone advertising from applications

    Full text link
    A wide variety of smartphone applications today rely on third-party advertising services, which provide libraries that are linked into the hosting application. This situation is undesirable for both the application author and the advertiser. Advertising libraries require additional permissions, resulting in additional permission requests to users. Likewise, a malicious application could simulate the behavior of the advertising library, forging the user's interaction and effectively stealing money from the advertiser. This paper describes AdSplit, where we extended Android to allow an application and its advertising to run as separate processes, under separate user-ids, eliminating the need for applications to request permissions on behalf of their advertising libraries. We also leverage mechanisms from Quire to allow the remote server to validate the authenticity of client-side behavior. In this paper, we quantify the degree of permission bloat caused by advertising, with a study of thousands of downloaded apps. AdSplit automatically recompiles apps to extract their ad services, and we measure minimal runtime overhead. We also observe that most ad libraries just embed an HTML widget within and describe how AdSplit can be designed with this in mind to avoid any need for ads to have native code

    Character Evidence - Footprints in the Civil Snow

    Get PDF

    Tipping the Balance on Winter Deicing Impacts: Education Is the Key

    Get PDF
    Winter deicing results in substantial export of road salts to fresh waters and causes numerous ecological problems. Extension faculty and other educators at the University of Connecticut implemented New Hampshire\u27s Green SnowPro program, a voluntary training program for salt applicators. University of Connecticut facilities staff applied 3,479 fewer metric tons of salt to campus in the 2 years after the educational training, equating to a cost savings of $459,251. Substantial environmental and economic benefits can be realized in northern climates if Extension and other educators rally behind this program

    Quire: Lightweight Provenance for Smart Phone Operating Systems

    Full text link
    Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with different privileges can communicate with one another, allowing one app to trick another into improperly exercising its privileges (a Confused Deputy attack). In Quire, we engineered two new security mechanisms into Android to address these issues. First, we track the call chain of IPCs, allowing an app the choice of operating with the diminished privileges of its callers or to act explicitly on its own behalf. Second, a lightweight signature scheme allows any app to create a signed statement that can be verified anywhere inside the phone. Both of these mechanisms are reflected in network RPCs, allowing remote systems visibility into the state of the phone when an RPC is made. We demonstrate the usefulness of Quire with two example applications. We built an advertising service, running distinctly from the app which wants to display ads, which can validate clicks passed to it from its host. We also built a payment service, allowing an app to issue a request which the payment service validates with the user. An app cannot not forge a payment request by directly connecting to the remote server, nor can the local payment service tamper with the request

    Reciprocal cooperation between unrelated rats depends on cost to donor and benefit to recipient

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Although evolutionary models of cooperation build on the intuition that costs of the donor and benefits to the receiver are the most general fundamental parameters, it is largely unknown how they affect the decision of animals to cooperate with an unrelated social partner. Here we test experimentally whether costs to the donor and need of the receiver decide about the amount of help provided by unrelated rats in an iterated prisoner's dilemma game.</p> <p>Results</p> <p>Fourteen unrelated Norway rats were alternately presented to a cooperative or defective partner for whom they could provide food via a mechanical apparatus. Direct costs for this task and the need of the receiver were manipulated in two separate experiments. Rats provided more food to cooperative partners than to defectors (direct reciprocity). The propensity to discriminate between helpful and non-helpful social partners was contingent on costs: An experimentally increased resistance in one Newton steps to pull food for the social partner reduced the help provided to defectors more strongly than the help returned to cooperators. Furthermore, test rats provided more help to hungry receivers that were light or in poor condition, which might suggest empathy, whereas this relationship was inverse when experimental partners were satiated.</p> <p>Conclusions</p> <p>In a prisoner's dilemma situation rats seem to take effect of own costs and potential benefits to a receiver when deciding about helping a social partner, which confirms the predictions of reciprocal cooperation. Thus, factors that had been believed to be largely confined to human social behaviour apparently influence the behaviour of other social animals as well, despite widespread scepticism. Therefore our results shed new light on the biological basis of reciprocity.</p

    Want more WANs? Comparison of traditional and GAN-based generation of wide area network topologies via graph and performance metrics

    Get PDF
    Wide Area Network (WAN) research benefits from the availability of realistic network topologies, e. g., as input to simulations, emulators, or testbeds. With the rise of Machine Learning (ML) and particularly Deep Learning (DL) methods, this demand for topologies, which can be used as training data, is greater than ever. However, public datasets are limited, thus, it is promising to generate synthetic graphs with realistic properties based on real topologies for the augmentation of existing data sets. As the generation of synthetic graphs has been in the focus of researchers of various application fields since several decades, we have a variety of traditional model-dependent and model-independent graph generators at hand, as well as DL-based approaches, such as Generative Adversarial Networks (GANs). In this work, we adapt and evaluate these existing generators for the WAN use case, i. e., for generating synthetic WANs with realistic geographical distances between nodes. We investigate two approaches to improve edge weight assignments: a hierarchical graph synthesis approach, which divides the synthesis into local clusters, as well as sophisticated attributed sampling. Finally, we compare the similarity of synthetic and real WAN topologies and discuss the suitability of the generators for data augmentation in the WAN use case. For this, we utilize theoretical graph metrics, as well as practical, communication network-centric performance metrics, obtained via OMNeT++ simulation

    Impaired modulation of quadriceps tendon jerk reflex during spastic gait: differences between spinal and cerebral lesions

    Get PDF
    In healthy subjects, functionally appropriate modulation of short latency leg muscle reflexes occurs during gait. This modulation has been ascribed, in part, to changes in presynaptic inhibition of Ia afferents. The changes in modulation of quadriceps tendon jerk reflexes during gait of healthy subjects were compared with those of hemi- or paraparetic spastic patients. The spasticity was due to unilateral cerebral infarction or traumatic spinal cord injury, respectively. The modulation of the quadriceps femoris tendon jerk reflex at 16 phases of the step cycle was studied. The reflex responses obtained during treadmill walking were compared with control values obtained during gait-mimicking standing postures with corresponding levels of voluntary muscle contraction and knee angles. In healthy subjects the size of the reflexes was profoundly modulated and was generally depressed throughout the step cycle. In patients with spinal lesion the reflex depression during gait was almost removed and was associated with weak or no modulation during the step cycle. In patients with cerebral lesion there was less depression of the reflex size associated with a reduced reflex modulation on the affected side compared with healthy subjects. On the 'sunaffected' side of these patients reflex modulation was similar to that of healthy subjects, but the reflex size during gait was not significantly different from standing control values. These observations suggest that the mechanisms responsible for the depression of reflex size and the modulation normally seen during gait in healthy subjects are impaired to different extents in spasticity of spinal or cerebral origin, possibly due to the unilateral preservation of fibre tracts in hemiparesi

    QUIRE: Lightweight Provenance for Smart Phone Operating Systems

    Get PDF
    Smartphone applications(apps) often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with different privileges can communicate with one another, allowing one app to trick another into improperly exercising its privileges (a confused deputy attack). This thesis presents two new security mechanisms built into the Android operating system to address these issues. First, the call chain of all interprocess communications are tracked, allowing an app the choice of operating with the diminished privileges of its callers or to act explicitly on its own behalf. Additionally, a lightweight signature scheme allows any app to create a signed statement that can be verified anywhere inside the phone. Both of these mechanisms are reflected in network RPCs, allowing remote endpoints visibility into the state of the phone when an RPC is made
    corecore