164 research outputs found

    ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic

    Get PDF
    It is well known that apps running on mobile devices extensively track and leak users' personally identifiable information (PII); however, these users have little visibility into PII leaked through the network traffic generated by their devices, and have poor control over how, when and where that traffic is sent and handled by third parties. In this paper, we present the design, implementation, and evaluation of ReCon: a cross-platform system that reveals PII leaks and gives users control over them without requiring any special privileges or custom OSes. ReCon leverages machine learning to reveal potential PII leaks by inspecting network traffic, and provides a visualization tool to empower users with the ability to control these leaks via blocking or substitution of PII. We evaluate ReCon's effectiveness with measurements from controlled experiments using leaks from the 100 most popular iOS, Android, and Windows Phone apps, and via an IRB-approved user study with 92 participants. We show that ReCon is accurate, efficient, and identifies a wider range of PII than previous approaches.Comment: Please use MobiSys version when referencing this work: http://dl.acm.org/citation.cfm?id=2906392. 18 pages, recon.meddle.mob

    Digital Disinformation: Taxonomy, Impact, Mitigation, and Regulation

    Get PDF
    We report on the discussions and conclusions of a Dagstuhl seminar focused on digital mis- and disinformation, held in October of 2021. An international and interdisciplinary group of seminar participants considered key technical and societal topics including trustworthiness algorithms (i.e., how to build systems that assess trustworthiness automatically), friction as a technique in platform design (e.g., to slow down people’s consumption of information on social media), the ethics of mis/disinformation interventions, and how to educate users. We detail these discussions and highlight questions for the future

    RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem

    Get PDF
    Previous arXiv version of this paper has been published under the title "When BGP Security Meets Content Deployment: Measuring and Analysing RPKI-Protection of Websites", Proc. of Fourteenth ACM Workshop on Hot Topics in Networks (HotNets), New York:ACM, 2015Previous arXiv version of this paper has been published under the title "When BGP Security Meets Content Deployment: Measuring and Analysing RPKI-Protection of Websites", Proc. of Fourteenth ACM Workshop on Hot Topics in Networks (HotNets), New York:ACM, 2015Web content delivery is one of the most important services on the Internet. Access to websites is typically secured via TLS. However, this security model does not account for prefix hijacking on the network layer, which may lead to traffic blackholing or transparent interception. Thus, to achieve comprehensive security and service availability, additional protective mechanisms are necessary such as the RPKI, a recently deployed Resource Public Key Infrastructure to prevent hijacking of traffic by networks. This paper argues two positions. First, that modern web hosting practices make route protection challenging due to the propensity to spread servers across many different networks, often with unpredictable client redirection strategies, and, second, that we need a better understanding why protection mechanisms are not deployed. To initiate this, we empirically explore the relationship between web hosting infrastructure and RPKI deployment. Perversely, we find that less popular websites are more likely to be secured than the prominent sites. Worryingly, we find many large-scale CDNs do not support RPKI, thus making their customers vulnerable. This leads us to explore business reasons why operators are hesitant to deploy RPKI, which may help to guide future research on improving Internet security

    Congenital deficiency reveals critical role of ISG15 in skin homeostasis

    Get PDF
    Ulcerating skin lesions are manifestations of human ISG15 deficiency, a type I interferonopathy. However, chronic inflammation may not be their exclusive cause. We describe two siblings with recurrent skin ulcers that healed with scar formation upon corticosteroid treatment. Both had a homozygous nonsense mutation in the ISG15 gene, leading to unstable ISG15 protein lacking the functional domain. We characterized ISG15(-/-) dermal fibroblasts, HaCaT keratinocytes, and human induced pluripotent stem cell-derived vascular endothelial cells. ISG15-deficient cells exhibited the expected hyperinflammatory phenotype, but also dysregulated expression of molecules critical for connective tissue and epidermis integrity, including reduced collagens and adhesion molecules, but increased matrix metalloproteinases. ISG15(-/-) fibroblasts exhibited elevated ROS levels and reduced ROS scavenger expression. As opposed to hyperinflammation, defective collagen and integrin synthesis was not rescued by conjugation-deficient ISG15. Cell migration was retarded in ISG15(-/-) fibroblasts and HaCaT keratinocytes, but normalized under ruxolitinib treatment. Desmosome density was reduced in an ISG15(-/-) 3D epidermis model. Additionally, there were loose architecture and reduced collagen and desmoglein expression, which could be reversed by treatment with ruxolitinib/doxycycline/TGF-beta 1. These results reveal critical roles of ISG15 in maintaining cell migration and epidermis and connective tissue homeostasis, whereby the latter likely requires its conjugation to yet unidentified targets

    Increasing Dominance - the Role of Advertising, Pricing and Product Design

    Get PDF
    Despite the empirical relevance of advertising strategies in concentrated markets, the economics literature is largely silent on the effect of persuasive advertising strategies on pricing, market structure and increasing (or decreasing) dominance. In a simple model of persuasive advertising and pricing with differentiated goods, we analyze the interdependencies between ex-ante asymmetries in consumer appeal, advertising and prices. Products with larger initial appeal to consumers will be advertised more heavily but priced at a higher level - that is, advertising and price discounts are strategic substitutes for products with asymmetric initial appeal. We find that the escalating effect of advertising dominates the moderating effect of pricing so that post-competition market shares are more asymmetric than pre-competition differences in consumer appeal. We further find that collusive advertising (but competitive pricing) generates the same market outcomes, and that network effects lead to even more extreme market outcomes, both directly and via the effect on advertising

    A spontaneous mutation in MutL-Homolog 3 (HvMLH3) affects synapsis and crossover resolution in the barley desynaptic mutant des10

    Get PDF
    Although meiosis is evolutionarily conserved, many of the underlying mechanisms show species-specific differences. These are poorly understood in large genome plant species such as barley (Hordeum vulgare) where meiotic recombination is very heavily skewed to the ends of chromosomes. The characterization of mutant lines can help elucidate how recombination is controlled. We used a combination of genetic segregation analysis, cytogenetics, immunocytology and 3D imaging to genetically map and characterize the barley meiotic mutant DESYNAPTIC 10 (des10). We identified a spontaneous exonic deletion in the orthologue of MutL-Homolog 3 (HvMlh3) as the causal lesion. Compared with wild-type, des10 mutants exhibit reduced recombination and fewer chiasmata, resulting in the loss of obligate crossovers and leading to chromosome mis-segregation. Using 3D structured illumination microscopy (3D-SIM), we observed that normal synapsis progression was also disrupted in des10, a phenotype that was not evident with standard confocal microscopy and that has not been reported with Mlh3 knockout mutants in Arabidopsis. Our data provide new insights on the interplay between synapsis and recombination in barley and highlight the need for detailed studies of meiosis in nonmodel species. This study also confirms the importance of early stages of prophase I for the control of recombination in large genome cereals.Isabelle Colas, Malcolm Macaulay, James D. Higgins, Dylan Phillips, Abdellah Barakate ... Robbie Waugh ... et al

    Differential Loss and Retention of Cytoglobin, Myoglobin, and Globin-E during the Radiation of Vertebrates

    Get PDF
    If rates of postduplication gene retention are positively correlated with levels of functional constraint, then gene duplicates that have been retained in a restricted number of taxonomic lineages would be expected to exhibit relatively low levels of sequence conservation. Paradoxical patterns are presented by gene duplicates that have been retained in a small number of taxa but which are nonetheless subject to strong purifying selection relative to paralogous members of the same multigene family. This pattern suggests that such genes may have been co-opted for novel, lineage-specific functions. One possible example involves the enigmatic globin-E gene (GbE), which appears to be exclusively restricted to birds. Available data indicate that this gene is expressed exclusively in the avian eye, but its physiological function remains a mystery. In contrast to the highly restricted phyletic distribution of GbE, the overwhelming majority of jawed vertebrates (gnathostomes) possess copies of the related cytoglobin (Cygb) and myoglobin (Mb) genes. The purpose of the present study was 1) to assess the phyletic distribution of the Cygb, Mb, and GbE genes among vertebrates, 2) to elucidate the duplicative origins and evolutionary histories of these three genes, and 3) to evaluate the relative levels of functional constraint of these genes based on comparative sequence analysis. To accomplish these objectives, we conducted a combined phylogenetic and comparative genomic analysis involving taxa that represent each of the major lineages of gnathostome vertebrates. Results of synteny comparisons and phylogenetic topology tests revealed that GbE is clearly not the product of a recent, bird-specific duplication event. Instead, GbE originated via duplication of a proto-Mb gene in the stem lineage of gnathostomes. Unlike the Mb gene, which has been retained in all major gnathostome lineages other than amphibians, the GbE gene has been retained only in the lineage leading to modern birds and has been independently lost in at least four major lineages: teleost fish, amphibians, mammals, and nonavian reptiles. Despite the restricted phyletic distribution of this gene, our results indicate that GbE is one of the most highly conserved globins in the avian genome
    corecore