| |
| Several Methods of Exploiting Glibc Heap |
| PEI Zhongyu, ZHANG Chao and DUAN Haixin |
| Published March 1, 2018 |
| 2018,3(1):1-15 [Abstract] [View PDF(935.57 K)] |
| |
| FROPUF: To Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs |
| LI Changting, ZHANG Qinglong, LIU Zongbin and JING Jiwu |
| Published March 1, 2018 |
| 2018,3(1):16-30 [Abstract] [View PDF(1.33 M)] |
| |
| Elimination of Memory Disclosure Attacks based on AMD Memory Encryption |
| WU Yuming, LIU Yutao and CHEN Haibo |
| Published March 1, 2018 |
| 2018,3(1):31-47 [Abstract] [View PDF(875.14 K)] |
| |
| A Survey of Security Threats and Defending Technologies on IoT Smart Devices |
| WANG Yazhe, ZHANG Chengyi, HUO Dongdong and LI Jialin |
| Published March 1, 2018 |
| 2018,3(1):48-67 [Abstract] [View PDF(2.20 M)] |
| |
| A Pollution-resilient Hybrid P2P Botnet |
| YIN Jie, CUI Xiang, FANG Binxing, YI Longhao and ZHANG Fangjiao |
| Published March 1, 2018 |
| 2018,3(1):68-82 [Abstract] [View PDF(3.23 M)] |
| |
| Image Steganalysis Based on Linear Programing Feature Selection and Ensemble Classifier |
| GUAN Qingxiao, ZHU Jie, ZHAO Xianfeng, YU Haibo and LIU Changjun |
| Published March 1, 2018 |
| 2018,3(1):83-94 [Abstract] [View PDF(688.58 K)] |
| |
| The Development of Encryption Techniques for Cloud Email Security |
| XU Peng, CHEN Tianyang and JIN Hai |
| Published March 1, 2018 |
| 2018,3(1):95-110 [Abstract] [View PDF(2.24 M)] |
| |
| On the Survey of Network Attack Source Traceback |
| JIANG Jianguo, WANG Jizhi, KONG Bin, HU Bo and LIU Jiqiang |
| Published March 1, 2018 |
| 2018,3(1):111-131 [Abstract] [View PDF(620.43 K)] |
| |
| Research Progress on Security Processor |
| ZHAO Jianfeng and SHI Gang |
| Published March 1, 2018 |
| 2018,3(1):132-144 [Abstract] [View PDF(554.47 K)] |
| |