Dynamics of the Shore Vegetation of a North Swedish Hydro-Electric Reservoir ' During a 5-Year Period

Total Page:16

File Type:pdf, Size:1020Kb

Dynamics of the Shore Vegetation of a North Swedish Hydro-Electric Reservoir ' During a 5-Year Period ACTA PHYTOGEOGRAPHICA SUECICA 69 EDIDIT SVENSKA VA XTGEOGRAFISKA SALLSKAPET Christer Nilsson Dynamics of the shore vegetation of a North Swedish hydro-electric reservoir ' during a 5-year period UPPSALA 1981 ACTA PHYTOGEOGRAPHICA SUECICA 69 EDIDIT SVENSKA VAXTGEOGRAFISKA SALLSKAPET Christer Nilsson Dynamics of the shore vegetation of a. North Swedish hydro-electric reservoir during a 5-year period Almqvist & Wiksell International, Stockholm UPPSALA 1981 Suggested citation: Nilsson, C. 1981, Dynamics of the shore vegetation of a North Swedish hydro-electric reservoir during a 5-year period. Acta Phytogeogr. Suec. 69. Uppsala. ISBN 91-721 0-069-9 (paperback) ISBN 91 -721 0-469-9 (cloth) ISSN 0084-591 4 Doctoral thesis at Umea University 1981 . Christer Nilsson 1981 © Svenska Vaxtgeografiska Sallskapet Box 559, S-751 22 Uppsala Editor: Erik Sjogren Technical editor: Gunnel Sj ors Phototypesetting by Textgruppen i Uppsala AB Printed in Sweden 1981 by Borgstroms Tryckeri AB, Motala Acta Phytogeogr. Suec. 69 Contents Introduction 5 2 The investigated area 8 2. 1 Physiography 8 2.2 Geology 8 2.3 Climate 9 2.4 Water-level variations 12 2.5 Previous botanical investigations 15 2.6 Shore formation processes 16 2. 7 In situ remnants of the former vegetation 17 3 Sites investigated 20 3. 1 Selection of sites fo r investigation 20 3.2 Description of the investigated sites 21 Forest vegetation 21, Vegetation of the cleared belt 21, Individual sites 22 4 Terminology and methods 26 4. 1 Shore terminology 26 Regulated shores 26, Unregulated shores 26 4.2 Substrate classificationand analysis 27 4.3 Vegetational analysis 27 Layers 27, Cover (C) 27, Number of individuals or shoots (N) 28, Number of species (n5) 28, Difference and changeability quotients 28 4.4 Determination of buried seed content, seed production and seed weight 29 5 Vegetation dynamics 30 5.1 A strongly-exposed shore 30 5.2 Moderately-exposed shores 31 5.3 Weakly-exposed shores 34 5.4 A sheltered shore 37 5.5 The vegetational development at Site 5 in 1980 38 6 Site habitats and dy namics of vegetation 40 6. 1 Degree of exposure 40 6.2 Substrate type 42 Shore-level 42, Different substrates 45 6.3 Water-level fluctuations 47 Sites 1-5 4 7, Site 6 50, Discussion 50 7 Survival strategies of the most frequent species 53 7. 1 Selection of species 53 7.2 Bryophytes 53 Bryophyte dynamics 53, Bryophyte survival strategies 53 7.3 Vascular plants 54 Survival strategies of vascular plants 54, Discussion 62 Acta Phytogeogr. Suec. 69 8 Synthesis 63 8.1 Vegetation dynamics 63 8.2 Degree of exposure, substrate type and water-level fluctuations 63 8.3 Survival strategies of the most fr equent species 64 8.4 Dynamics of the annual shuttle species 64 8.5 Concluding remarks 65 9 References 66 Appendix 69 Table 5 69, Table 6 71, Table 7 73, Tabl e 8 76, Table 9 80, Table 0 86, I Table ll 87 Nilsson, 1981, Dynamics of the shore vegetation of a North Swedish hydro-electric C. reservoir during a 5-year period. Acta Phytogeogr. Suec. 69, Uppsala. 96 pp. The study deals with the dynamics of the nearly annually inundated vegetation along the edges of the Gardiken hydro-electric reservoir during the period 1976-1980. This long­ term regulated reservoir was constructed in 1961 by damming-up a series of lakes. It has a vertical amplitude of 20 m, the water-level rhythm being reversed, from very low in spring and early summer to maximal in late summer and/or autumn. The new shorelines, which for most of the system were cut into formerly terrestrial vegetation now destroyed, remain scantily colonized, only within the upper levels, where, however, the timing and duration of the submersion have varied considerably. Determination of percentage cover and number of individuals or shoots was made twice a year within sixty-six permanent 1 m2 quadrats, located in formerly terrestrial areas, now subject to different degrees of wave action and other environmental exposure. The higher the degree of exposure, the coarser was usually the shore substrate. The mean changeability quotients in flora and vegetation cover were insignificant on uneroded patches of the original humus layer lying close to the maximum damming water­ level, but considerable on eroded parts of the humus layer and on all substrates below that level and now subject to periodic flooding. On the original humus layer near the damm­ ing-level, the vegetational changes were mainly unidirectional, while on the substrates below the erosion scarp created in the humus layer, cyclic changes in both the pattern of abun­ dance and in species diversity were observed. These changes were correlated with varia­ tions in (I) degree of exposure, (2) substrate type and (3) seasonal water-levels. Factors (I) and (2) were important for vegetational distribution while factor (3) chiefly governed the cyclic variations in plant cover, the richness in vascular plant species being related to between-year changes in the artificial fluctuations in water-level. Survival strategies of some common bryophytes and phanerogams, most of the latter weeds, are discussed with reference to During (1979). Most turned out to be annual shuttle strategists, fit for habitat conditions existing only for short periods. Christer Nilsson, Department of Ecological Botany, Umea University, S- Umea, Sweden 901 87 Acta Phytogeogr. Suec. 69 1 Introduction On the basis of his investigations on the Lenin reser­ Nilsson 1961 ; Runnstrom 1964 ), normally ceases voir Svirenko (1 932, 1934 [cited in Mel'nikov 1970]) after a few years (Runnstrom 1964; Aass 1973; identified three phases in the biological development N.-A. Nilsson 1973). Thereafter, judging from e.g. of reservoirs, viz. (1) a breakdown of the original Runnstrom (1 964; cf. Wright 1967), production may plant and animal communities and a recolonization decrease to a lower level than that before the by different species; (2) a stage of "trophic ex­ damming-up occurred and limnological conditions plosion", i.e. of an increased primary and secondary once again become less unstable (cf. Frey 1967; Bar­ production, mainly of plankton, and the establish­ dach & Dussart 1973). The above-mentioned stage ment of temporary associations; (3) a period of of relative stabilization is reached. However, no relative stabilization. Vogt (1978) fo und a similar detailed information about the biotopic development development in a number of polyhumic reservoirs in of North Swedish reservoirs during this stage of Finland. He termed Svirenko's (op. cit.) first two development is yet available; nor is it possible to phases the "beginning phase" and his third one the judge whether this stage is ever likely to lead to any "erosion phase" (cf. Dussart et al. 1972). longer periods of stability, i.e. with the constituent Svirenko's (op. cit.) three phases are all relevant to populations showing little fluctuation (cf. Krebs North Swedish hydro-electric reservoirs, where the 1972). course of construction involved building a dam and In the North Swedish reservoirs, an increase in fl ooding vast areas of fo rmer dry-land. The greatest primary production during the second stage of destruction occurs along the new shores, where the development is mainly recorded fo r the phyto­ original communities are already being destroyed plankton (see Rodhe 1964), while the macrophytes during the initial damming-up phase. With only fe w are of very little importance in this respect, simply exceptions the original plants along the new shore­ because most of them are soon killed-ofT. However, lines are entirely killed-ofT (e.g. Runnstrom 1962). parallel to the first two stages of development a Only the vegetation of floating 'islands' of peat is ex­ recolonization of the new shores by different cepted and may persist more or less intact for a long macrophytes may take place, with the formation of time afterwards (cf. Ruuhijarvi et al. 1976 [cited in new plant communities, different from those which Vogt 1978]). If the regulated, vertical water-level occupied the fo rmer littorals. According to Ekzertsev amplitude exceeds 7-8 m, even though the water (1979), during the first two stages, the success of transparency reaches or exceeds that value, the recolonization and of the fo rmation of new vegetation fo rmer sublittoral vascular plant communities below types in the Volga reservoirs mainly depended on the the regulated drawdown level are killed-ofT too, as the supply of diaspores, on the morphological features of hydrostatic pressure will become too great (see C. the reservoirs, and on the water-level regime. During Nilsson 1978). After being killed-ofT, decomposition the later stages, the decisive factors are the trophic of the fo rmer vegetation cover and soils sets in and conditions, interrelations between plant species and the reservoir water becomes enriched with nutrients plant communities, and the water-level regime. Ex­ (Rodhe 1964; L. Arnborg 1972; cf. Rzoska 1966). posure and erosion should be added, according to ex­ The final decomposition of the dead plant debris perience from Fennoscandian reservoirs. takes a long time (e.g. Lindstrom 1973; N.-A. It is thus obvious that the water-level regime is of Nilsson 1973), but provided the trees and shrubs fundamental importance fo r the fo rmation of new were cut down and removed, prior to damming, the vegetation types in both the initial and the later stages major portion of the organic material, including the of reservoir development. Some authors (e.g. plant litter and humus, seems to decompose within Bogacev 1952) consider it to be the most important the course of only a fe w years. In any case, the stage factor. Judging fr om the views of e.g.
Recommended publications
  • Android (Operating System) 1 Android (Operating System)
    Android (operating system) 1 Android (operating system) Android Home screen displayed by Samsung Nexus S with Google running Android 2.3 "Gingerbread" Company / developer Google Inc., Open Handset Alliance [1] Programmed in C (core), C++ (some third-party libraries), Java (UI) Working state Current [2] Source model Free and open source software (3.0 is currently in closed development) Initial release 21 October 2008 Latest stable release Tablets: [3] 3.0.1 (Honeycomb) Phones: [3] 2.3.3 (Gingerbread) / 24 February 2011 [4] Supported platforms ARM, MIPS, Power, x86 Kernel type Monolithic, modified Linux kernel Default user interface Graphical [5] License Apache 2.0, Linux kernel patches are under GPL v2 Official website [www.android.com www.android.com] Android is a software stack for mobile devices that includes an operating system, middleware and key applications.[6] [7] Google Inc. purchased the initial developer of the software, Android Inc., in 2005.[8] Android's mobile operating system is based on a modified version of the Linux kernel. Google and other members of the Open Handset Alliance collaborated on Android's development and release.[9] [10] The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android.[11] The Android operating system is the world's best-selling Smartphone platform.[12] [13] Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. There are currently over 150,000 apps available for Android.[14] [15] Android Market is the online app store run by Google, though apps can also be downloaded from third-party sites.
    [Show full text]
  • 2019 China Military Power Report
    OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China ANNUAL REPORT TO CONGRESS Military and Security Developments Involving the People’s Republic of China 2019 Office of the Secretary of Defense Preparation of this report cost the Department of Defense a total of approximately $181,000 in Fiscal Years 2018-2019. This includes $12,000 in expenses and $169,000 in DoD labor. Generated on 2019May02 RefID: E-1F4B924 OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2019 A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended Section 1260, “Annual Report on Military and Security Developments Involving the People’s Republic of China,” of the National Defense Authorization Act for Fiscal Year 2019, Public Law 115-232, which amends the National Defense Authorization Act for Fiscal Year 2000, Section 1202, Public Law 106-65, provides that the Secretary of Defense shall submit a report “in both classified and unclassified form, on military and security developments involving the People’s Republic of China. The report shall address the current and probable future course of military-technological development of the People’s Liberation Army and the tenets and probable development of Chinese security strategy and military strategy, and of the military organizations and operational concepts supporting such development over the next 20 years.
    [Show full text]
  • Ah! Universal Android Rooting Is Back
    AH! UNIVERSAL ANDROID ROOTING IS BACK Wen `Memeda` Xu @K33nTeam ABOUT ME Wen Xu a.k.a Memeda @antlr7 • Security research intern at KeenTeam • Android Roo6ng • Soware exploita6on • Senior student at Shanghai Jiao Tong University • Member of LoCCS • Vice-captain of CTF team 0ops • Rank 2rd in the world on CTFTIME AGENDA • Present Situa6on of Android Roo6ng • Awesome Bug (CVE-2015-3636) • Fuzzing • Analysis • Awesome Exploita6on Techniques • Object Re-filling in kernel UAF • Kernel Code Execu@on • Targe@ng 64bit Devices • Future PART I Present Situation PRESENT SITUATION Root for what? • Goal • uid=0(root) gid=0(root) groups=0(root) • Kernel arbitrary read/write • Cleaning • SELinux • … PRESENT SITUATION • SoC (Driver) • Missing argument sani6Za6on (ioctl/mmap) • Qualcomm camera drivers bug CVE-2014-4321, CVE-2014-4324 CVE-2014-0975, CVE-2014-0976 • TOCTTOU • Direct dereference in user space CVE-2014-8299 • Chip by chip A BIG DEAL • Universal root soluon • Universally applied bug • Confronng Linux kernel • Universally applied exploita6on techniques • One exploit for hundreds of thousands of devices • Adaptability (Hardcode) • User-friendly (Stability) • COMING BACK AGAIN! PART II Bug Hunting FUZZING Open source kernel syscall fuzzer • Trinity • hps://github.com/kernelslacker/trinity • Scalability • Ported to ARM Linux FUZZING Let’s take a look at our log when we wake up ;) • Crical paging fault at 0x200200?!! SK: PING SOCKET OBJECT IN KERNEL user_sock_fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_ICMP); 2 3 1 LIST_POISON2 == 0X200200 ping_unhash
    [Show full text]
  • Wild Food Plant Use in 21St Century Europe: the Disappearance of Old Traditions and the Search for New Cuisines Involving Wild Edibles
    Acta Societatis Botanicorum Poloniae Journal homepage: pbsociety.org.pl/journals/index.php/asbp INVITED REVIEW Received: 2012.07.20 Accepted: 2012.09.12 Published electronically: 2012.11.19 Acta Soc Bot Pol 81(4):359–370 DOI: 10.5586/asbp.2012.031 Wild food plant use in 21st century Europe: the disappearance of old traditions and the search for new cuisines involving wild edibles Łukasz Łuczaj1*, Andrea Pieroni2, Javier Tardío3, Manuel Pardo-de-Santayana4, Renata Sõukand5, Ingvar Svanberg6, Raivo Kalle7 1 Department of Botany and Biotechnology of Economic Plants, University of Rzeszów, Werynia 502, 36-100 Kolbuszowa, Poland 2 University of Gastronomic Sciences, Piazza Vittorio Emanuele 9, 12060 Pollenzo, Cuneo, Italy 3 Instituto Madrileño de Investigación y Desarrollo Rural, Agrario y Alimentario (IMIDRA), Finca “El Encín”, Apdo. 127, 28800 Alcalá de Henares, Spain 4 Departamento de Biología (Botánica), Universidad Autónoma de Madrid, Darwin 2, 28049 Madrid, Spain 5 Estonian Literary Museum, Vanemuise 42, 51003 Tartu, Estonia 6 Uppsala Centre for Russian and Eurasian Studies, Uppsala University, Box 514, 751 20 Uppsala, Sweden 7 Institute of Veterinary Medicine and Animal Sciences, Estonian University of Life Sciences, Kreutzwaldi 62, 51014 Tartu, Estonia Abstract The aim of this review is to present an overview of changes in the contemporary use of wild food plants in Europe, mainly using the examples of our home countries: Poland, Italy, Spain, Estonia and Sweden. We set the scene referring to the nutrition of 19th century peasants, involving many famine and emergency foods. Later we discuss such issues as children's wild snacks, the association between the decline of plant knowledge and the disappearance of plant use, the effects of over-exploitation, the decrease of the availability of plants due to ecosystem changes, land access rights for foragers and intoxication dangers.
    [Show full text]
  • Satisfy That Android Sweet Tooth
    IBM Security Thought Leadership White Paper Satisfy that Android sweet tooth Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Satisfy that Android sweet tooth Android is ready for the enterprise. Is your continues to grow. The wide variety of Android devices enterprise ready for Android? available means that they are often a good fit for corporate- owned device programs. For example, many field-based employees need rugged Android devices built to stand up to Introduction dust, shock, vibration, rain, humidity, solar radiation, altitude, Android has long ruled the consumer market. Now, the latest and temperature extremes. Others want Android devices with security advancements from Google and device manufacturers, data capture features ideal for inventory control and warehouse and support for Android by leading EMM solution providers, operations. are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and This growth comes with some unintended consequences, as government regulations, enterprises need a way to protect well as important considerations for IT. Companies are and manage the wide range of available devices, versions, and allowing employees to use their own preferred or industry- idiosyncrasies of the world’s most popular mobile operating specific devices, but IT must address the very real concerns of system. protecting corporate data and providing standardized management. It’s not a one-solution-fits-all situation. IT needs to examine its device and application landscape and decide what security and The most popular mobile platform in the world also has a management capabilities are essential in a customized volatile security record;2 however, Android’s recent, sweetly- enterprise mobility strategy.
    [Show full text]
  • Federico Selvi a Critical Checklist of the Vascular Flora of Tuscan Maremma
    Federico Selvi A critical checklist of the vascular flora of Tuscan Maremma (Grosseto province, Italy) Abstract Selvi, F.: A critical checklist of the vascular flora of Tuscan Maremma (Grosseto province, Italy). — Fl. Medit. 20: 47-139. 2010. — ISSN 1120-4052. The Tuscan Maremma is a historical region of central western Italy of remarkable ecological and landscape value, with a surface of about 4.420 km2 largely corresponding to the province of Grosseto. A critical inventory of the native and naturalized vascular plant species growing in this territory is here presented, based on over twenty years of author's collections and study of relevant herbarium materials and literature. The checklist includes 2.056 species and subspecies (excluding orchid hybrids), of which, however, 49 should be excluded, 67 need confirmation and 15 have most probably desappeared during the last century. Considering the 1.925 con- firmed taxa only, this area is home of about 25% of the Italian flora though representing only 1.5% of the national surface. The main phytogeographical features in terms of life-form distri- bution, chorological types, endemic species and taxa of particular conservation relevance are presented. Species not previously recorded from Tuscany are: Anthoxanthum ovatum Lag., Cardamine amporitana Sennen & Pau, Hieracium glaucinum Jord., H. maranzae (Murr & Zahn) Prain (H. neoplatyphyllum Gottschl.), H. murorum subsp. tenuiflorum (A.-T.) Schinz & R. Keller, H. vasconicum Martrin-Donos, Onobrychis arenaria (Kit.) DC., Typha domingensis (Pers.) Steud., Vicia loiseleurii (M. Bieb) Litv. and the exotic Oenothera speciosa Nutt. Key words: Flora, Phytogeography, Taxonomy, Tuscan Maremma. Introduction Inhabited by man since millennia and cradle of the Etruscan civilization, Maremma is a historical region of central-western Italy that stretches, in its broadest sense, from south- ern Tuscany to northern Latium in the provinces of Pisa, Livorno, Grosseto and Viterbo.
    [Show full text]
  • Plant List for VC54, North Lincolnshire
    Plant List for Vice-county 54, North Lincolnshire 3 Vc61 SE TA 2 Vc63 1 SE TA SK NORTH LINCOLNSHIRE TF 9 8 Vc54 Vc56 7 6 5 Vc53 4 3 SK TF 6 7 8 9 1 2 3 4 5 6 Paul Kirby, 31/01/2017 Plant list for Vice-county 54, North Lincolnshire CONTENTS Introduction Page 1 - 50 Main Table 51 - 64 Summary Tables Red Listed taxa recorded between 2000 & 2017 51 Table 2 Threatened: Critically Endangered & Endangered 52 Table 3 Threatened: Vulnerable 53 Table 4 Near Threatened Nationally Rare & Scarce taxa recorded between 2000 & 2017 54 Table 5 Rare 55 - 56 Table 6 Scarce Vc54 Rare & Scarce taxa recorded between 2000 & 2017 57 - 59 Table 7 Rare 60 - 61 Table 8 Scarce Natives & Archaeophytes extinct & thought to be extinct in Vc54 62 - 64 Table 9 Extinct Plant list for Vice-county 54, North Lincolnshire The main table details all the Vascular Plant & Stonewort taxa with records on the MapMate botanical database for Vc54 at the end of January 2017. The table comprises: Column 1 Taxon and Authority 2 Common Name 3 Total number of records for the taxon on the database at 31/01/2017 4 Year of first record 5 Year of latest record 6 Number of hectads with records before 1/01/2000 7 Number of hectads with records between 1/01/2000 & 31/01/2017 8 Number of tetrads with records between 1/01/2000 & 31/01/2017 9 Comment & Conservation status of the taxon in Vc54 10 Conservation status of the taxon in the UK A hectad is a 10km.
    [Show full text]
  • Pieris Brassicae
    Pieris brassicae Scientific Name Pieris brassicae (L.) Synonyms: Mancipium brassicae Linnaeus Papilio Danaus brassicae Papilio brassicae Linnaeus Pieris anthrax Graham-Smith & Graham-Smith Pieris brassicae brassicae (Linnaeus) Pieris brassicae wollastoni (Butler) Pieris carnea Graham-Smith & Figure 1. P. brassicae adult (Image courtesy of Graham-Smith Hania Berdys, Bugwood.org) Pieris chariclea (Stephens) Pieris emigrisea Rocci Pieris griseopicta Rocci Pieris infratrinotata Carhel Pieris nigrescens Cockerell Pontia brassicae Linnaeus Pontia chariclea Stephens Common Names Large white butterfly, cabbage caterpillar Type of Pest Butterfly Taxonomic Position Class: Insecta, Order: Lepidoptera, Family: Pieridae Reason for Inclusion CAPS Target: AHP Prioritized Pest List for FY 2012 Pest Description Egg: “When first laid the eggs are a very pale straw color; within twenty four hours this has darkened to yellow and in at least one subspecies (P. h. cheiranthi Hueb) they are bright orange… a few hours before hatching the eggs turn black and the form of the larva can be seen through the shell” (Gardiner, 1974). Larva: “Length [of the larva is] 40 mm. Body fawn with black patches, yellow longitudinal stripes, covered with short white hairs. First instar head black; final instar head black and gray, frons yellow (Brooks and Knight 1982, Emmett 1980)” (USDA, 1984). Last Update: July 19, 2011 1 Pupa: “Length 20-24 mm, width 5-6 mm, yellow brown marked with black dots (Avidov and Harpaz 1969)” (USDA, 1984). Adult: “Body length 20 mm (Avidov and Harpaz 1969). Antennae black, tips white. Wingspan 63 mm. Wings dorsally white. Forewing tips black; hindwing front margin with black spot. Female forewing with 2 black spots, black dash on each.
    [Show full text]
  • On Root Detection Strategies for Android Devices
    On Root Detection Strategies for Android Devices Raphael Bialon Department of Computer Science, Heinrich-Heine-University Düsseldorf, Germany [email protected] Abstract—The Android operating system runs on the majority they are executed on and the confidentiality of communication of smartphones nowadays. Its success is driven by its availability channels used. to a variety of smartphone hardware vendors on the one hand, This can directly contradict with users enjoying the cus- and the customization possibilities given to its users on the other hand. While other big smartphone operating systems restrict user tomizability of their devices, as one popular method to enable configuration to a given set of functionality, Android users can broad control over ones’ device is the act of gaining elevated leverage the whole potential of their devices. This high degree privileges through a process called rooting. of customization enabled by a process called rooting, where the As our main contribution we propose a method for remote users escalate their privileges to those of the operating system, rooting detection in wireless tethering networks provided by introduces security, data integrity and privacy concerns. Several rooting detection mechanisms for Android devices already exist, an Android device. Such networks define a special case of aimed at different levels of detection. This paper introduces wireless networks, as all communication is routed over the further strategies derived from the Linux ecosystem and outlines device offering the hotspot, and can thus be manipulated by their usage on the Android platform. In addition, we present said device. One example for extensive tethering hotspot usage a novel remote rooting detection approach aimed at trust and and a matching use case for this remote rooting detection is integrity checks between devices in wireless networks.
    [Show full text]
  • Floristic Quality Assessment and Monitoring of Brown Bridge Quiet Area Wetlands
    Floristic Quality Assessment and Monitoring of Brown Bridge Quiet Area Wetlands Prepared by: Phyllis J. Higman Michigan Natural Features Inventory P.O. Box 13036 Lansing, MI 48901-3036 For: Grand Traverse Conservation District 1450 Cass Road, Traverse City, Michigan, 49685 October 30, 2013 Report Number 2013-17 Acknowledgements This work was made possible by a Great Hyde assisted with early surveys and delivery of Lake Restoration Initiative grant through the a workshop for local stewards. Brian Klatt and Environmental Protection Agency, awarded to Glenn Palmgren provided valuable guidance on the Grand Traverse Conservation District in sampling strategies and Reb Ratliff provided Traverse City, Michigan. Many thanks to Robin enthusiastic energy to kick off the field sampling Christensen for writing the grant and for inviting and assemble necessary field gear. Thanks to us to do this work. Suzan Campbell and Daria you all. Cover photos by Phyllis J. Higman, 2012- 2013. Clockwise from left to right: Brown Bridge Pond, Brown Bridge Dam, The Boardman River Coursing through the Brown Bridge Quiet Area after Dam Removal, and Newly Exposed Bottomlands at Brown Bridge Quiet Area after Dam Removal. Copyright 2013 Michigan State University Board of Trustees. Michigan State University Extension programs and materials are open to all without regard to race, color, national origin, gender, religion, age, disability, political beliefs, sexual orientation, marital status, or family status. Table of Contents Table of Contents ....................................................................................................................................
    [Show full text]
  • Agchain: a Blockchain-Based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets
    AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets Mengjie Chen Daoyuan Wu∗ The Chinese University of Hong Kong The Chinese University of Hong Kong [email protected] [email protected] Xiao Yi Jianliang Xu The Chinese University of Hong Kong Hong Kong Baptist University [email protected] [email protected] ABSTRACT policies and delist the apps as they wish. For example, Mobile app markets are emerging with the popularity of 13.7% (1,146) of the 8,359 popular apps we measured smartphones. However, they fall short in several aspects, in late 2018 have been delisted (by either the market including no transparent app listing, no world-wide app ac- or developers themselves) after one year in late 2019. cess, and even insecure app downloading. To address these P2: No world-wide and even censored access. Secondly, problems, we propose a novel blockchain-based gateway, many apps on Google Play and Apple Store are avail- AGChain, to bridge end users and app markets so that ex- able only in certain countries. Moreover, Google Play isting app markets could still provide services while users itself is being censored in some regions, causing no enjoy permanent, distributed, and secure app delegation from easy app access for the users in those affected areas. AGChain. To this end, we identify two previously underesti- P3: No enough security guarantee. Thirdly, we find that a mated challenges and propose mechanisms to significantly significant portion of third-party Android app markets reduce gas costs in our smart contract and make IPFS (Inter- do not provide secure app downloading.
    [Show full text]
  • Android Malware Detection Via (Somewhat) Robust Irreversible Feature Transformations
    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2020.2975932, IEEE Transactions on Information Forensics and Security IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1 Android Malware Detection via (Somewhat) Robust Irreversible Feature Transformations Qian Han1, V.S. Subrahmanian1 and Yanhai Xiong1 1Department of Computer Science and the Institute for Security Technology and Society Dartmouth College, Hanover, NH 03755, USA As the most widely used OS on earth, Android is heavily targeted by malicious hackers. Though much work has been done on detecting Android malware, hackers are becoming increasingly adept at evading ML classifiers. We develop FARM, a Feature transformation based AndRoid Malware detector. FARM takes well-known features for Android malware detection and introduces three new types of feature transformations that transform these features irreversibly into a new feature domain. We first test FARM on 6 Android classification problems separating goodware and “other malware” from 3 classes of malware: rooting malware, spyware, and banking trojans. We show that FARM beats standard baselines when no attacks occur. Though we cannot guess all possible attacks that an adversary might use, we propose three realistic attacks on FARM and show that FARM is very robust to these attacks in all classification problems. Additionally, FARM has automatically identified two malware samples which were not previously classified as rooting malware by any of the 61 anti-viruses on VirusTotal. These samples were reported to Google’s Android Security Team who subsequently confirmed our findings.
    [Show full text]