49 research outputs found

    A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks

    Get PDF
    Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing innovative techniques to avoid or prolong malware detection effectively. Past studies have shown that malware detection systems are susceptible to evasion attacks where adversaries can successfully bypass the existing security defenses and deliver the malware to the target system without being detected. The evolution of escape-resistant systems is an open research problem. This paper presents a detailed taxonomy and evaluation of Android-based malware evasion techniques deployed to circumvent malware detection. The study characterizes such evasion techniques into two broad categories, polymorphism and metamorphism, and analyses techniques used for stealth malware detection based on the malware’s unique characteristics. Furthermore, the article also presents a qualitative and systematic comparison of evasion detection frameworks and their detection methodologies for Android-based malware. Finally, the survey discusses open-ended questions and potential future directions for continued research in mobile malware detection

    A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks

    Get PDF
    Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing innovative techniques to avoid or prolong malware detection effectively. Past studies have shown that malware detection systems are susceptible to evasion attacks where adversaries can successfully bypass the existing security defenses and deliver the malware to the target system without being detected. The evolution of escape-resistant systems is an open research problem. This paper presents a detailed taxonomy and evaluation of Android-based malware evasion techniques deployed to circumvent malware detection. The study characterizes such evasion techniques into two broad categories, polymorphism and metamorphism, and analyses techniques used for stealth malware detection based on the malware’s unique characteristics. Furthermore, the article also presents a qualitative and systematic comparison of evasion detection frameworks and their detection methodologies for Android-based malware. Finally, the survey discusses open-ended questions and potential future directions for continued research in mobile malware detection

    A budget feasible peer graded mechanism for iot-based crowdsourcing

    Get PDF
    We develop and extend a line of recent works on the design of mechanisms for heterogeneous tasks assignment problem in ’crowdsourcing’. The budgeted market we consider consists of multiple task requesters and multiple IoT devices as task executers. In this, each task requester is endowed with a single distinct task along with the publicly known budget. Also, each IoT device has valuations as the cost for executing the tasks and quality, which are private. Given such scenario, the objective is to select a subset of IoT devices for each task, such that the total payment made is within the allotted quota of the budget while attaining a threshold quality. For the purpose of determining the unknown quality of the IoT devices we have utilized the concept of peer grading. In this paper, we have carefully crafted a truthful budget feasible mechanism for the problem under investigation that also allows us to have the true information about the quality of the IoT devices. Further, we have extended the set-up considering the case where the tasks are divisible in nature and the IoT devices are working collaboratively, instead of, a single entity for executing each task. We have designed the budget feasible mechanisms for the extended versions. The simulations are performed in order to measure the efficacy of our proposed mechanismPeer ReviewedPostprint (author's final draft

    Incidence, Risk Factors, and Outcomes of Acute Kidney Injury in Preterm Neonates Hospitalized in the Neonatology Unit, North India: A Single-center Experience

    No full text
    Acute kidney injury (AKI) is common in premature newborns and is associated with high mortality. It is unclear which risk factors lead to AKI in these neonates. We aimed to determine the incidence, risk factors, and outcomes of AKI in preterm neonates in the neonatal intensive care unit (NICU). They were screened and staged for AKI as per the amended neonatal criteria of Kidney Disease Improving Global Outcomes and followed up until discharge or death. Serum creatinine levels and urine output were measured. The incidence of AKI was 18.5% (37/200 neonates). The majority developed non-oliguric AKI. The risk factors significantly associated with AKI in neonates were the presence of sepsis, birth asphyxia, shock, respiratory distress syndrome, and hypothermia. The majority of neonates with AKI had a birthweight <1500 g and a gestational age of <32 weeks and had a higher risk of mortality, in contrast to than those without AKI. Mortality and NICU stay were significantly higher among those with Stage 3 AKI compared with Stage 2 and Stage 1 AKI. To prevent AKI and reduce the burden of high mortality in premature neonates, it is essential to prevent sepsis, birth asphyxia, and respiratory distress syndrome, as well as to detect shock and patent ductus arteriosus as early as possible. There is a need for good antenatal care to reduce the burden of prematurity

    Bacteriological Assessment of Bottled Drinking Water Available at Major Transit Places in Mangalore City of South India

    No full text
    Introduction. Safe drinking water is essential for human life. It is generally considered that bottled water is safe for usage by people. For long-distance travelers, it serves as the only source of reliable drinking water. But, several studies have reported that bottled water does not always meet the acceptability standards. Objectives. To assess the bacteriological and physical quality of bottled water marketed in major transit areas and to check its compliance with national standards. Methods. The investigating team visited retail shops at three main transit sites for long-distance travelers in Mangalore city. A total of 24 water bottles of 12 brands were randomly selected. The analysis of total viable count (TVC) was done to assess the bacteriological quality of samples. Results. In 3(12.5%) samples, all of which were of local brands, batch number, the period of manufacture, and the period of expiry were not mentioned. Odor and floating bodies were present in one sample each. Five (20.8%) water bottles had been enriched with minerals. Ozone treatment was the most commonly 22(91.7%) used method for disinfection of water. In only 15(62.5%) samples, the bacterial contamination was within acceptable limits certified for drinking purposes. Water samples manufactured by multinational companies (p=0.018), those with batch number mentioned (p=0.042), the best period of manufacture (p=0.036), and long expiry dates (p=0.028) were acceptable for usage. Conclusion. Surveillance of bottled water manufacturing industries in the settings on a regular basis needs to be done by regulatory agencies. These measures will ensure safe and wholesome bottled water for public usage
    corecore