Learn More
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking attacks. However, performance and compatibility issues limit its adoption. We propose a new practical and realistic protection method called CCFIR (Compact Control Flow Integrity and Randomization), which addresses the main barriers to CFI adoption. CCFIR(More)
BACKGROUND Outcomes are poor for patients with previously treated, advanced or metastatic non-small-cell lung cancer (NSCLC). The anti-programmed death ligand 1 (PD-L1) antibody atezolizumab is clinically active against cancer, including NSCLC, especially cancers expressing PD-L1 on tumour cells, tumour-infiltrating immune cells, or both. We assessed(More)
User interface (UI) interactions are essential to Android applications, as many Activities require UI interactions to be triggered. This kind of UI interactions could also help malicious apps to hide their sensitive behaviors (e.g., sending SMS or getting the user's device ID) from being detected by dynamic analysis tools such as TaintDroid, because simply(More)
Botnets, networks of compromised machines that can be remotely controlled by an attacker, are one of the most common attack platforms nowadays. They can, for example, be used to launch distributed denial-of-service (DDoS) attacks, steal sensitive information, or send spam emails. A long-term measurement study of botnet activities is useful as a basis for(More)
A quantitative genetic model relates the genotypic value of an individual to the alleles at the loci that contribute to the variation in a population in terms of additive, dominance, and epistatic effects. This partition of genetic effects is related to the partition of genetic variance. A number of models have been proposed to describe this relationship:(More)
LH/hCG receptors were disrupted by gene targeting in embryonic stem cells. The disruption resulted in infertility in both sexes. The gonads contained no receptor mRNA or receptor protein. Serum LH levels were greatly elevated, and FSH levels were moderately elevated in both sexes; estradiol and progesterone levels decreased but were not totally suppressed(More)
We present the analysis of the evolution of tumors in a case of hepatocellular carcinoma. This case is particularly informative about cancer growth dynamics and the underlying driving mutations. We sampled nine different sections from three tumors and seven more sections from the adjacent nontumor tissues. Selected sections were subjected to exon as well as(More)
An avian H10N5 influenza virus, A/swine/Hubei/10/2008/H10N5, was isolated from pigs in the Hubei Province of central China. Homology and phylogenetic analyses of all eight gene segments demonstrated that the strain was wholly of avian origin and closely homologous to the Eurasian lineage avian influenza virus. To our knowledge, this is the first report of(More)
The World Wide Web gains more and more popularity within China with more than 1.31 million websites on the Chinese Web in June 2007. Driven by the economic profits, cyber criminals are on the rise and use the Web to exploit innocent users. In fact, a real underground black market with thousand of participants has developed which brings together malicious(More)
The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, we present a system, IntScope, which can automatically detect integer overflow vulnerabilities in x86 binaries before an attacker does, with the goal of finally eliminating the vul-nerabilities. IntScope first translates the disassembled(More)