Learn More
In this paper, we present a systematic study for the detection of malicious applications (or apps) on popular An-droid Markets. To this end, we first propose a permission-based behavioral footprinting scheme to detect new samples of known Android malware families. Then we apply a heuristics-based filtering scheme to identify certain inherent behaviors of(More)
Recent years have witnessed a meteoric increase in the adoption of smartphones. To manage information and features on such phones, Android provides a permission-based security model that requires each application to explicitly request permissions before it can be installed to run. In this paper, we analyze eight popular Android smartphones and discover that(More)
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control data or hooks in the kernel space. A critical step towards eliminating rootkits is to protect such hooks from being hijacked. However, it remains a challenge because there exist a(More)
  • Robert Koopman, Zhi Wang, Shang-Jin Wei, Robert B. Koopman
  • 2008
As China's export juggernaut employs many imported inputs, there are many policy questions for which it is crucial to know the extent of domestic value added (DVA) in its exports. The best known approach is the concept of " vertical specialization " proposed by Hummels, Ishii and Yi (2001) (HIY for short). This approach is not appropriate for countries that(More)
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike existing solutions for protecting privileged software, HyperSentry does not introduce a higher privileged software layer below the integrity measurement target, which could start(More)
The pathway mediating reciprocal inhibition from muscle spindle afferents (Ia axons) to motoneurons (MNs) supplying antagonist muscles has been well studied in adult cats, but little is known about how this disynaptic pathway develops. As a basis for studying its development, we characterized this pathway in mice during the first postnatal week, focusing on(More)
Real-time wireless sensor networks are becoming more and more important by the requirement of message delivery timeliness in emerging new applications. Supporting real-time QoS in sensor networks faces severe challenges due to the wireless nature, limited resource, low node reliability, distributed architecture and dynamic network topology. There are(More)
—A two-hop neighborhood information-based routing protocol is proposed for real-time wireless sensor networks. The approach of mapping packet deadline to a velocity is adopted as that in SPEED; however, our routing decision is made based on the novel two-hop velocity integrated with energy balancing mechanism. Initiative drop control is embedded to enhance(More)
The genetics of complex disease produce alterations in the molecular interactions of cellular pathways whose collective effect may become clear through the organized structure of molecular networks. To characterize molecular systems associated with late-onset Alzheimer's disease (LOAD), we constructed gene-regulatory networks in 1,647 postmortem brain(More)
— Virtualization is being widely adopted in today's computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have enabled a wide spectrum of applications. However, a common , fundamental assumption is the presence of a trustworthy hypervisor. Unfortunately, the large code base of commodity(More)