[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3460120.3484774acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Android on PC: On the Security of End-user Android Emulators

Published: 13 November 2021 Publication History

Abstract

Android emulators today are not only acting as a debugging tool for developers but also serving the massive end-users. These end-user Android emulators have attracted millions of users due to their advantages of running mobile apps on desktops and are especially appealing for mobile game players who demand larger screens and better performance. Besides, they commonly provide some customized assistant functionalities to improve the user experience, such as keyboard mapping and app installation from the host. To implement these services, emulators inevitably introduce communication channels between host OS and Android OS (in the Virtual Machine), thus forming a unique architecture which mobile phone does not have. However, it is unknown whether this architecture brings any new security risks to emulators.
This paper performed a systematic study on end-user Android emulators and discovered a series of security flaws on communication channel authentication, permission control, and open interfaces. Attackers could exploit these flaws to bypass Android security mechanisms and escalate their privileges inside emulators, ultimately invading users' privacy, such as stealing valuable game accounts and credentials. To understand the impact of our findings, we studied six popular emulators and measured their flaws. The results showed that the issues are pervasive and could cause severe security consequences. We believe our work just shows the tip of the iceberg, and further research can be done to improve the security of this ecosystem.

Supplementary Material

MP4 File (CCS21-fp363.mp4)
Presentation video

References

[1]
2018. The Transport Layer Security (TLS) Protocol Version 1.3. Retrieved May 7, 2021 from https://tools.ietf .org/html/rf c8446
[2]
2019. BlueStacks Flaw Lets Attackers Remotely Control Android Emulator. Retrieved August 15, 2021 from https://www.bleepingcomputer.com/news/security/bluestacks-flaw-lets-attackers-remotely-control-android-emulator/
[3]
2019. DeveloperGuide of MuMu (in Chinese). Retrieved May 7, 2021 from http://mumu.163.com/help/func/20190129/30131_797867.html
[4]
2020. dumpsys | Android Developers. Retrieved August 15, 2021 from https://developer.android.com/studio/command-line/dumpsys
[5]
2020. How to stream PUBG Mobile on YouTube with laptop. Retrieved May 7, 2021 from https://www.sportskeeda.com/esports/how-stream-pubg-mobile-youtube- laptop
[6]
2021. Anbox - Android in a Box. Retrieved May 7, 2021 from https://anbox.io/
[7]
2021. Android Debug Bridge (adb) | Android Developers. Retrieved May 7, 2021 from https://developer.android.com/studio/command-line/adb
[8]
2021. Android Emulators Wiki. Retrieved May 7, 2021 from https://emulation.gametechwiki.com/index.php/Android_emulators
[9]
2021. Android Input. Retrieved May 7, 2021 from https://source.android.com/devices/input
[10]
2021. Android Open Source Project. Retrieved May 7, 2021 from https://source.android.com/
[11]
2021. Android Studio. Retrieved May 7, 2021 from https://developer.android.com/studio
[12]
2021. Application Fundamentals | Android Developers . Retrieved May 7, 2021 from https://developer.android.com/guide/components/f undamentals
[13]
2021. AutoHotKey. Retrieved August 15, 2021 from https://www.autohotkey.com/
[14]
2021. Bliss OS. Retrieved May 7, 2021 from https://blissos.org/
[15]
2021. BlueStacks -- Fastest Android Emulator for PC & Mac |100% Safe and FREE. Retrieved May 7, 2021 from https://www.bluestacks.com/
[16]
2021. Cooperation with NetEase MuMu (in Chinese). Retrieved May 7, 2021 from http://mumu.163.com/2016/12/15/25241_661774.html
[17]
2021. core/java/android/os/SystemProperties.java - platform/frameworks/base - Git at Google. Retrieved May 7, 2021 from https://android.googlesource.com/platf orm/frameworks/base/+/master/core/java/android/os/SystemProperties.java
[18]
2021. Genymotion Android Emulator | Cloud-based Android virtual devices | Develop - Automate your tests - Validate with confidence. Retrieved May 7, 2021 from https://www.genymotion.com/
[19]
2021. Intent and Intent Filters | Android Developers. Retrieved May 7, 2021 from https://developer.android.com/guide/components/intents-filters
[20]
2021. LDPlayer - Fastest Android Emulator for PC, Free Download. Retrieved May 7, 2021 from https://www.ldplayer.net/
[21]
2021. Linux Uinput. Retrieved May 7, 2021 from https://www.kernel.org/doc/html/v4.12/input/uinput.html
[22]
2021. MEmu - The Best Android Emulator for PC - Free Download. Retrieved May 7, 2021 from https://www.memuplay.com/
[23]
2021. Oracle VM VirtualBox. Retrieved May 7, 2021 from https://www.virtualbox.org/
[24]
2021. PC Android Emulator for PUBG, CODM - GameLoop. Retrieved May 7, 2021 from https://www.gameloop.com/en?adtag=def ault
[25]
2021. Top Free Automation Tools for Testing Desktop Applications (2021). Retrieved August 15, 2021 from https://testguild.com/automation-tools-desktop/
[26]
Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiao-yong Zhou, Wenliang Du, and Michael Grace. 2015. Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), Denver, CO, USA, October 12--16, 2015.
[27]
Yousra Aafer, Xiao Zhang, and Wenliang Du. 2016. Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis. In Proceedings of the 25th USENIX Security Symposium (USENIX-Sec), Austin, TX, USA, August 10--12, 2016.
[28]
Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D. McDaniel, and Matthew Smith. 2016. SoK: Lessons Learned from Android Security Research for Appified Software Platforms. In Proceedings of the 37th IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22--26, 2016.
[29]
Akamai. 2020. Akamai Report Reveals Broad, Persistent Cyber Attacks Targeting Video Game Players and Companies. Retrieved May 7, 2021 from https://www.prnewswire.com/news-releases/akamai-report-reveals-broad-persistent-cyber-attacks-targeting-video-game-players-and-companies-301136183.html
[30]
Android. 2021. AccessibilityService | Android Developers. Retrieved May 7, 2021 from https://developer.android.com/reference/android/accessibilityservice/AccessibilityService
[31]
Android. 2021. Configure on-device developer options. Retrieved May 7, 2021 from https://developer.android.com/studio/debug/dev-options
[32]
Android. 2021. Permissions on Android | Android Developers. Retrieved May 7, 2021 from https://developer.android.com/guide/topics/permissions/overview
[33]
Android. 2021. Services overview. Retrieved May 7, 2021 from https://developer.android.com/guide/components/services
[34]
Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. In Proceedings of the 6th USENIX Workshop on Hot Topics in Security (HotSec), San Francisco, CA, USA, August 9, 2011.
[35]
Qi Alfred Chen, Zhiyun Qian, and Zhuoqing Morley Mao. 2014. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014.
[36]
Erika Chin, Adrienne Porter Felt, Kate Greenwood, and David A. Wagner. 2011. Analyzing Inter-application Communication in Android. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys), Bethesda, MD, USA, June 28 - July 01, 2011.
[37]
Junsung Cho, Geumhwan Cho, and Hyoungshick Kim. 2015. Keyboard or keylogger?: A security analysis of third-party keyboards on Android. In Proceedings of the 13th Annual Conference on Privacy, Security and Trust (PST), Izmir, Turkey, July 21--23, 2015.
[38]
Wenrui Diao, Xiangyu Liu, Zhou Li, and Kehuan Zhang. 2016. No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis. In IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22--26, 2016.
[39]
Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, and Zhiqiang Lin. 2020. FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. In Proceedings of the 29th USENIX Security Symposium (USENIX-Sec), August 12--14, 2020.
[40]
Yanick Fratantonio, Chenxiong Qian, Simon P. Chung, and Wenke Lee. 2017. Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, USA, May 22--26, 2017.
[41]
Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, and Narseo Vallina-Rodriguez. 2020. An Analysis of Pre-installed Android Software. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, USA, May 18--21, 2020.
[42]
Bernd Grobauer, Tobias Walloschek, and Elmar Stöcker. 2011. Understanding Cloud Computing Vulnerabilities. IEEE Security & Privacy Magazine 9, 2 (2011), 50--57.
[43]
Sungjae Hwang, Sungho Lee, Yongdae Kim, and Sukyoung Ryu. 2015. Bittersweet ADB: Attacks and Defenses. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Singapore, April 14--17, 2015.
[44]
Yiming Jing, Ziming Zhao, Gail-Joon Ahn, and Hongxin Hu. 2014. Morpheus: Automatically Generating Heuristics to Detect Android Emulators. In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, USA, December 8--12, 2014.
[45]
Swati Khandelwal. 2015. Minecraft hacked! More than 1800 Minecraft account Credentials Leaked. Retrieved May 7, 2021 from https://thehackernews.com/2015/01/minecraft-game-hacked.html
[46]
Swati Khandelwal. 2019. Exclusive - Hacker Steals Over 218 Million Zynga 'Words with Friends' Gamers Data. Retrieved May 7, 2021 from https://thehackernews.com/2019/09/zynga-game-hacking.html
[47]
Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen, Xiao-yong Zhou, Xinhui Han, and Michael Grace. 2017. Ghost Installer in the Shadow: Security Analysis of App Installation on Android. In Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, June 26--29, 2017.
[48]
Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, and Kehuan Zhang. 2015. An Empirical Study on Android for Saving Non-shared Data on Public Storage. In ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26--28, 2015, Proceedings.
[49]
Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, and Arvind Narayanan. 2019. Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS), London, UK, November 11--15, 2019.
[50]
Shane Monroe. 2017. Quora: Is it safe and secure to log into an Android Emulator. Retrieved May 7, 2021 from https://www.quora.com/Is-it-safe-and-secure-to-log-intoan-Android-Emulator-Bluestacks-or-NOX-App-Player-using-my-Google-account-on-my-PC
[51]
Nox. 2021. About Nox. Retrieved March 2, 2021 from https://www.bignox.com/about
[52]
Krzysztof Opasiak and Wojciech Mazurczyk. 2019. (In)Secure Android Debugging: Security analysis and lessons learned. Computer & Security 82 (2019), 80--98.
[53]
Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, and Sotiris Ioannidis. 2014. Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware. In Proceedings of the Seventh European Workshop on System Security (EuroSec), Amsterdam, The Netherlands, April 13, 2014.
[54]
Andrea Possemato, Simone Aonzo, Davide Balzarotti, and Yanick Fratantonio. 2021. Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization. In Proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland), Online, May 23--27, 2021.
[55]
Andrea Possemato, Dario Nisi, and Yanick Fratantonio. 2021. Preventing and Detecting State Inference Attacks on Android. In Proceedings of the 2021 Network and Distributed System Security Symposium (NDSS), Virtual, 21st - 25th February, 2021.
[56]
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. 2009. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS), Chicago, Illinois, USA, November 9--13, 2009.
[57]
Thomas Ristenpart and Scott Yilek. 2010. When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography. In Proceedings of the 17th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 28th February - 3rd March, 2010.
[58]
Francisco Rocha and Miguel Correia. 2011. Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud. In Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Hong Kong, China, June 27--30, 2011.
[59]
Elena Root and Andrey Polkovnichenko. 2019. SimBad: A Rogue Adware Campaign On Google Play - Check Point Research. Retrieved May 7, 2021 from https://research.checkpoint.com/2019/simbad-a-rogue-adware-campaign-on-google-play/
[60]
Onur Sahin, Ayse K. Coskun, and Manuel Egele. 2018. Proteus: Detecting Android Emulators from Instruction-Level Profiles. In Proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), Heraklion, Crete, Greece, September 10--12, 2018.
[61]
Ignacio Sanmillan. 2021. Operation NightScout: Supply-chain attack targets online gaming in Asia | WeLiveSecurity. Retrieved May 7, 2021 from https://www.welivesecurity.com/2021/02/01/operation-nightscout-supply-chain-attack-online-gaming-asia/
[62]
Help Net Security. 2020. What's trending on the underground market? Retrieved May 7, 2021 from https://www.helpnetsecurity.com/2020/05/27/underground-market-trends/
[63]
Saeed Shafieian, Mohammad Zulkernine, and Anwar Haque. 2014. Attacks in Public Clouds: Can They Hinder the Rise of the Cloud? In Cloud Computing. Springer, 3--22.
[64]
Yuru Shao, Jason Ott, Yunhan Jack Jia, Zhiyun Qian, and Zhuoqing Morley Mao. 2016. The Misuse of Android Unix Domain Sockets and Security Implications. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), Vienna, Austria, October 24--28, 2016.
[65]
tcpdump. 2021. TCPDUMP/LIBPCAP public repository. Retrieved May 7, 2021 from https://www.tcpdump.org/
[66]
Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, and Kevin R. B. Butler. 2018. ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. In Proceedings of the 27th USENIX Security Symposium (USENIX-Sec), Baltimore, MD, USA, August 15--17, 2018.
[67]
Güliz Seray Tuncay, Jingyu Qian, and Carl A. Gunter. 2020. See No Evil: Phishing for Permissions with False Transparency. In 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020.
[68]
Timothy Vidas and Nicolas Christin. 2014. Evading Android Runtime Analysis via Sandbox Detection. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Kyoto, Japan, June 03 - 06, 2014.
[69]
VirtualBox. 2020. PDM.cpp in vbox/trunk/src/VBox/VMM/VMMR3 -- Oracle VM VirtualBox. Retrieved May 7, 2021 from https://www.virtualbox.org/browser/vbox/trunk/src/VBox/VMM/VMMR3/PDM.cpp
[70]
VirtualBox. 2021. VBoxHeadless, the Remote Desktop Server. Retrieved May 7, 2021 from https://www.virtualbox.org/manual/ch07.html#vboxheadless
[71]
Wireshark. 2021. Wireshark Go Deep. Retrieved May 7, 2021 from https://www.wireshark.org/
[72]
Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, Eric K. T. Cheng, and Robert H. Deng. 2019. Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment. In 26th Annual Network and Distributed System Security Symposium, NDSS.
[73]
Lei Wu, Michael C. Grace, Yajin Zhou, Chiachih Wu, and Xuxian Jiang. 2013. The Impact of Vendor Customizations on Android Security. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security (CCS), Berlin, Germany, November 4--8, 2013.
[74]
Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In Proceedings of the 21th USENIX Security Symposium (USENIX-Sec), Bellevue, WA, USA, August 8--10, 2012.
[75]
Yubin Xia, Yutao Liu, Haibo Chen, and Binyu Zang. 2012. Defending against VM Rollback Attack. In Proceedings of the 2012 IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Boston, MA, USA, June 25--28, 2012.
[76]
Jidong Xiao, Zhang Xu, Hai Huang, and Haining Wang. 2012. A Covert Channel Construction in a Virtualized Environment. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, USA, October 16--18, 2012.
[77]
Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, and Radu Teodorescu. 2016. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In Proceedings of the 25th USENIX Security Symposium (USENIX-Sec), Austin, TX, USA, August 10--12, 2016.
[78]
Yunjing Xu, Michael Bailey, Farnam Jahanian, Kaustubh R. Joshi, Matti A. Hiltunen, and Richard D. Schlichting. 2011. An Exploration of L2 Cache Covert Channels in Virtualized Environments. In Proceedings of the 3rd ACM Cloud Computing Security Workshop (CCSW), Chicago, IL, USA, October 21, 2011.
[79]
Yinqian Zhang, Ari Juels, Alina Oprea, and Michael K. Reiter. 2011. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (Oakland), Berkeley, California, USA, 22--25 May, 2011.
[80]
Yinqian Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2012. Cross-VM Side Channels and Their Use to Extract Private Keys. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, USA, October 16--18, 2012.
[81]
Min Zheng, Mingshen Sun, and John C. S. Lui. 2014. DroidRay: A Security Evaluation System for Customized Android Firmwares. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Kyoto, Japan, June 03 - 06, 2014.
[82]
Xiao-yong Zhou, Yeonjoon Lee, Nan Zhang, Muhammad Naveed, and XiaoFeng Wang. 2014. The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations. In Proceedings of the 2014 IEEE Symposium on Security and Privacy (Oakland), Berkeley, CA, USA, May 18--21, 2014.
[83]
Chaoshun Zuo, Wubing Wang, Zhiqiang Lin, and Rui Wang. 2016. Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21--24, 2016.
[84]
Chaoshun Zuo, Qingchuan Zhao, and Zhiqiang Lin. 2017. AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017.

Cited By

View all
  • (2022)A Comparative Study on the Security of Cryptocurrency Wallets in Android System2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom56396.2022.00062(399-406)Online publication date: Dec-2022

Index Terms

  1. Android on PC: On the Security of End-user Android Emulators

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
    November 2021
    3558 pages
    ISBN:9781450384544
    DOI:10.1145/3460120
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 November 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. android emulator
    2. security assessment

    Qualifiers

    • Research-article

    Funding Sources

    • Howg Kong S.A.R Rsearch Grants Council
    • Chinese National Key Research & Development Project

    Conference

    CCS '21
    Sponsor:
    CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
    November 15 - 19, 2021
    Virtual Event, Republic of Korea

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)116
    • Downloads (Last 6 weeks)14
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Comparative Study on the Security of Cryptocurrency Wallets in Android System2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom56396.2022.00062(399-406)Online publication date: Dec-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media