Marine fixation of atmospheric nitrogen is believed to be an important source of biologically useful nitrogen to ocean surface waters, stimulating productivity of phytoplankton and so influencing the global carbon cycle. The majority of nitrogen fixation in tropical waters is carried out by the marine cyanobacterium Trichodesmium, which supplies more than half of the new nitrogen used for primary production. Although the factors controlling marine nitrogen fixation remain poorly understood, it has been thought that nitrogen fixation is limited by iron availability in the ocean. This was inferred from the high iron requirement estimated for growth of nitrogen fixing organisms and the higher apparent densities of Trichodesmium where aeolian iron inputs are plentiful. Here we report that nitrogen fixation rates in the central Atlantic appear to be independent of both dissolved iron levels in sea water and iron content in Trichodesmium colonies. Nitrogen fixation was, instead, highly correlated to the phosphorus content of Trichodesmium and was enhanced at higher irradiance. Furthermore, our calculations suggest that the structural iron requirement for the growth of nitrogen-fixing organisms is much lower than previously calculated. Although iron deficiency could still potentially limit growth of nitrogen-fixing organisms in regions of low iron availability-for example, in the subtropical North Pacific Ocean-our observations suggest that marine nitrogen fixation is not solely regulated by iron supply.
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, after permissions are granted by users at install time, apps could use these permissions (sensitive resources) with no further restrictions. Thus, recent years have witnessed the explosion of undesirable behaviors in Android apps. An important part in the defense is the accurate analysis of Android apps. However, traditional syscall-based analysis techniques are not well-suited for Android, because they could not capture critical interactions between the application and the Android system. This paper presents VetDroid, a dynamic analysis platform for reconstructing sensitive behaviors in Android apps from a novel permission use perspective. VetDroid features a systematic framework to effectively construct permission use behaviors, i.e., how applications use permissions to access (sensitive) system resources, and how these acquired permission-sensitive resources are further utilized by the application. With permission use behaviors, security analysts can easily examine the internal sensitive behaviors of an app. Using real-world Android malware, we show that VetDroid can clearly reconstruct fine-grained malicious behaviors to ease malware analysis. We further apply VetDroid to 1,249 top free apps in Google Play. VetDroid can assist in finding more information leaks than TaintDroid [24], a state-of-the-art technique. In addition, we show how we can use VetDroid to analyze fine-grained causes of information leaks that TaintDroid cannot reveal. Finally, we show that VetDroid can help identify subtle vulnerabilities in some (top free) applications otherwise hard to detect.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.