Learn More
In this paper, we present a systematic study for the detection of malicious applications (or apps) on popular An-droid Markets. To this end, we first propose a permission-based behavioral footprinting scheme to detect new samples of known Android malware families. Then we apply a heuristics-based filtering scheme to identify certain inherent behaviors of(More)
CRISPR/Cas9 genome targeting systems have been applied to a variety of species. However, most CRISPR/Cas9 systems reported for plants can only modify one or a few target sites. Here, we report a robust CRISPR/Cas9 vector system, utilizing a plant codon optimized Cas9 gene, for convenient and high-efficiency multiplex genome editing in monocot and dicot(More)
Recent years have witnessed a meteoric increase in the adoption of smartphones. To manage information and features on such phones, Android provides a permission-based security model that requires each application to explicitly request permissions before it can be installed to run. In this paper, we analyze eight popular Android smartphones and discover that(More)
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike existing solutions for protecting privileged software, HyperSentry does not introduce a higher privileged software layer below the integrity measurement target, which could start(More)
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control data or hooks in the kernel space. A critical step towards eliminating rootkits is to protect such hooks from being hijacked. However, it remains a challenge because there exist a(More)
A two-hop neighborhood information-based routing protocol is proposed for real-time wireless sensor networks. The approach of mapping packet deadline to a velocity is adopted as that in SPEED; however, our routing decision is made based on the novel two-hop velocity integrated with energy balancing mechanism. Initiative drop control is embedded to enhance(More)
Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have enabled a wide spectrum of applications. However, a common, fundamental assumption is the presence of a trustworthy hypervisor. Unfortunately, the large code base of(More)
Real-time wireless sensor networks are becoming more and more important by the requirement of message delivery timeliness in emerging new applications. Supporting real-time QoS in sensor networks faces severe challenges due to the wireless nature, limited resource, low node reliability, distributed architecture and dynamic network topology. There are(More)
As China's export juggernaut employs many imported inputs, there are many policy questions for which it is crucial to know the extent of domestic value added (DVA) in its exports. The best known approach is the concept of " vertical specialization " proposed by Hummels, Ishii and Yi (2001) (HIY for short). This approach is not appropriate for countries that(More)
Network-induced delays in the networked control systems are inevitable and have a significant effect on system performance. In this paper, time-varying delays are regarded as the sum of the mean delays and uncertain delays. Furthermore, NCS with long time delays is modeled as a discrete-time model with structural uncertainty for its time-varying(More)