Estimate risks rate for Android applications using Android Permissions

In recent years, Android becomes the first target for hackers and malware developers, due to his inefficient permission model. In this article, we introduce our tool called PerUpSecure to manage permissions requested by Android applications, calculate the risk rates and display the results to the user, in order to help him to make a better decision. Thanks to our PerUpSecure, user will be able to install only the trusted application. As far as we know, the other existing tools focus only on measuring app risk after being installed, and not before as our tool does. Therefore, to evaluate our tool, we selected two different applications sets. The results show that our tool can produce the most trustworthy risk rate to prevent and detect potential malicious activities performed by malware.

2021 ◽  
Vol 10 (5) ◽  
pp. 908 ◽  
Author(s):  
Denise Irene Karin Pontoriero ◽  
Simone Grandini ◽  
Gianrico Spagnuolo ◽  
Nicola Discepoli ◽  
Stefano Benedicenti ◽  
...  

Background: The aim of this study was to collect long-term restorative and endodontic outcomes of endodontically treated teeth (ETT). Methods: 298 teeth were included in the study and were recalled up to 18 years with a media of 10.2 years. At baseline, 198 sample teeth (66.44%) showed symptoms and 164 (55%) had periapical radiolucency. The most frequently used obturation techniques were warm gutta-percha in 80% of cases, and by carrier in 20%. A total of 192 ETT were restored by direct resin composite restorations, and 106 posts were luted. Moreover, 75 (25.16%) direct restorations remained as final restorations, 137 single crowns (45.97%), 42 (14.09%) partial adhesive crowns, and 42 (14.09%) abutments of fixed bridges were the final treatments. Descriptive and inferential statistics were performed (α = 0.05). A Cox regression model was made. Results: results showed success for 92.6% of ETT up to 18 years, 2.68% (8 ETT) showed irreversible failures, and 14 (4.69%) reversible complications. Four ETT (1.34%) failed because of root fracture and the other four (1.34%) because of endodontic complications. Eight ETT (2.69%) showed non-irreversible periodontal complications and the other six (2.01%) prosthodontic complications. Accordingly, with Kaplan–Meier analysis, the survival rate after 18 years was 97.3% (Interval of Confidence (IC) 95.1–98.3). The presence of a short or long (at least 1 mm related to radiographic apex) quality endodontic filling displayed a statistically significant higher risk of complication (hazard ratio (HR) = 17.00 (IC 5.68–56.84). Furthermore, a clinically detectable not precise coronal margins predicts the presence of any clinical complication with a hazard ratio almost seven times higher than endodontically treated teeth with a proper margin (HR = 6.89 (IC 2.03–23.38)), while the presence of lucency at the baseline did not affect the risk of complication (HR = 0.575 (IC 0.205–1.61)). The presence of post, tooth position in the arch, and the type of it did not show a high-risk rate (HR = 1.85, 1.98, and 2.24, respectively). Conclusions: a correct filling (at the apex) of root canals combined with proper coronal margins allow obtaining a long-term high success rate in teeth with a periapical lesion at the baseline. The use of a post or not, when its placement is related to the residual amount of the crown, does not change the final outcome of the ETT.


Author(s):  
Masoud Hamedani ◽  
Sang-Wook Kim

In this paper, we propose SimAndro-Plus as an improved variant of the state-of-the-art method, SimAndro, to compute the similarity of Android applications (apps) regarding their functionalities. SimAndro-Plus has two major differences with SimAndro: 1) it exploits two beneficial features to similarity computation, which are totally disregarded by SimAndro; 2) to compute the similarity score of an app-pair based on strings and package name features, SimAndro-Plus considers not only those terms co-appearing in both apps but also considers those terms appearing in one app while missing in the other one. The results of our extensive ex periments with three real-world datasets and a dataset constructed by human experts demonstrate that 1) each of the two aforementioned differences is really effective to achieve better accuracy and 2) SimAndro-Plus outperforms SimAndro in similarity computation by 14% in average.


Author(s):  
Munishka Vijayvergiya ◽  
Abhignya Tayi ◽  
Sanya jain ◽  
Sanjana Reddy

Today, smartphones and Android devices are effectively in development like never before and have become the easiest cybercrime forum. It is necessary for security experts to investigate the vengeful programming composed for these frameworks if we closely observe the danger to security and defence. The main objective of this paper was to describe Mobile Sandbox, which is said to be a platform intended to periodically examine Android applications in new ways. First of all in the essence of the after-effects of static analysis that is used to handle the dynamic investigation, it incorporates static and dynamic examination and attempts to justify the introduction of executed code. On the other hand, to log calls to native APIs, it uses those techniques, and in the end, it combines the end results with machine learning techniques to collect the samples analysed into dangerous ones. We reviewed the platform for more than 69, 000 applications from multi-talented Asian international businesses sectors and found that about 21% of them officially use the local calls in their code


Author(s):  
Munishka Vijayvergiya ◽  
◽  
Abhignya Tayi ◽  
Sanya Jain ◽  
Sanjana Reddy ◽  
...  

Today, smartphones and Android devices are effectively in development like never before and have become the easiest cybercrime forum. It is necessary for security experts to investigate the vengeful programming composed for these frameworks if we closely observe the danger to security and defence. The main objective of this paper was to describe Mobile Sandbox, which is said to be a platform intended to periodically examine Android applications in new ways. First of all in the essence of the after-effects of static analysis that is used to handle the dynamic investigation, it incorporates static and dynamic examination and attempts to justify the introduction of executed code. On the other hand, to log calls to native APIs, it uses those techniques, and in the end, it combines the end results with machine learning techniques to collect the samples analysed into dangerous ones. We reviewed the platform for more than 69, 000 applications from multi-talented Asian international businesses sectors and found that about 21% of them officially use the local calls in their code.


2005 ◽  
Vol 52 (2) ◽  
pp. 43-48
Author(s):  
Slobodan Slavkovic ◽  
Marko Bumbasirevic ◽  
Slavko Tomic ◽  
Aleksandar Lesic ◽  
Nemanja Slavkovic

Idiopathic avascular necrosis of the femoral head still represents incompletely explained clinical entity. In the period 1978-2003. we have treated sixteen hips in ten patients with this condition in the IOHB "Banjica". Diagnosis have been founded on clinical and radiographic features, in addition to MRI findings. One patient have been operated, curretaging necrotic part of the femoral head and placing homografts instead. The other fifteen patients have been treated by the same procedure: skin traction for several months following immediate rehabilitation of the hip. The goal of treatment was reducing the pain, increasing the range of movements and preservation of the normal joint space. Evaluation of the treatment was based on unique criteria founded on Howorth-Ferguson index, clinical and radiographic features. The follow-up period was 2-7 years. The authors have stressed the following advantages of the non-operative treatment in adolescents with idiopathic avascular necrosis if the femoral head: increased range of joint movements, decreased pain and low risk rate of any complications following surgical procedures. Formed changes in the femoral head are irreversible, and they are real basic for premature arthrosis of the hip.


1988 ◽  
Vol 62 (03) ◽  
pp. 411-419 ◽  
Author(s):  
Colin W. Stearn

Stromatoporoids are the principal framebuilding organisms in the patch reef that is part of the reservoir of the Normandville field. The reef is 10 m thick and 1.5 km2in area and demonstrates that stromatoporoids retained their ability to build reefal edifices into Famennian time despite the biotic crisis at the close of Frasnian time. The fauna is dominated by labechiids but includes three non-labechiid species. The most abundant species isStylostroma sinense(Dong) butLabechia palliseriStearn is also common. Both these species are highly variable and are described in terms of multiple phases that occur in a single skeleton. The other species described areClathrostromacf.C. jukkenseYavorsky,Gerronostromasp. (a columnar species), andStromatoporasp. The fauna belongs in Famennian/Strunian assemblage 2 as defined by Stearn et al. (1988).


1967 ◽  
Vol 28 ◽  
pp. 207-244
Author(s):  
R. P. Kraft

(Ed. note:Encouraged by the success of the more informal approach in Christy's presentation, we tried an even more extreme experiment in this session, I-D. In essence, Kraft held the floor continuously all morning, and for the hour and a half afternoon session, serving as a combined Summary-Introductory speaker and a marathon-moderator of a running discussion on the line spectrum of cepheids. There was almost continuous interruption of his presentation; and most points raised from the floor were followed through in detail, no matter how digressive to the main presentation. This approach turned out to be much too extreme. It is wearing on the speaker, and the other members of the symposium feel more like an audience and less like participants in a dissective discussion. Because Kraft presented a compendious collection of empirical information, and, based on it, an exceedingly novel series of suggestions on the cepheid problem, these defects were probably aggravated by the first and alleviated by the second. I am much indebted to Kraft for working with me on a preliminary editing, to try to delete the side-excursions and to retain coherence about the main points. As usual, however, all responsibility for defects in final editing is wholly my own.)


1967 ◽  
Vol 28 ◽  
pp. 177-206
Author(s):  
J. B. Oke ◽  
C. A. Whitney

Pecker:The topic to be considered today is the continuous spectrum of certain stars, whose variability we attribute to a pulsation of some part of their structure. Obviously, this continuous spectrum provides a test of the pulsation theory to the extent that the continuum is completely and accurately observed and that we can analyse it to infer the structure of the star producing it. The continuum is one of the two possible spectral observations; the other is the line spectrum. It is obvious that from studies of the continuum alone, we obtain no direct information on the velocity fields in the star. We obtain information only on the thermodynamic structure of the photospheric layers of these stars–the photospheric layers being defined as those from which the observed continuum directly arises. So the problems arising in a study of the continuum are of two general kinds: completeness of observation, and adequacy of diagnostic interpretation. I will make a few comments on these, then turn the meeting over to Oke and Whitney.


1966 ◽  
Vol 24 ◽  
pp. 337
Author(s):  
W. Iwanowska

A new 24-inch/36-inch//3 Schmidt telescope, made by C. Zeiss, Jena, has been installed since 30 August 1962, at the N. Copernicus University Observatory in Toruń. It is equipped with two objective prisms, used separately, one of crown the other of flint glass, each of 5° refracting angle, giving dispersions of 560Å/mm and 250Å/ mm respectively.


2020 ◽  
Vol 43 ◽  
Author(s):  
Philip Pettit

Abstract Michael Tomasello explains the human sense of obligation by the role it plays in negotiating practices of acting jointly and the commitments they underwrite. He draws in his work on two models of joint action, one from Michael Bratman, the other from Margaret Gilbert. But Bratman's makes the explanation too difficult to succeed, and Gilbert's makes it too easy.


Sign in / Sign up

Export Citation Format

Share Document