| |
| Security Analytics for Mobile Apps: Achievements and Challenges |
| YANG Wei, XIAO Xusheng, LI Dengfeng, LI Huoran, LIU Xuanzhe, WANG Haoyu, GUO Yao and XIE Tao |
| 2016,1(2):1-14 [Abstract] [View PDF(2.12 M)] |
| |
| A Survey of Code Reuse Attack and Defense Mechanisms |
| LIU Tong, SHI Gang and MENG Dan |
| 2016,1(2):15-27 [Abstract] [View PDF(867.61 K)] |
| |
| Survey: Security of Cryptographic Primitives with Imperfect Randomness |
| YAO Yanqing and LI Zhoujun |
| 2016,1(2):28-35 [Abstract] [View PDF(795.29 K)] |
| |
| Research on Intrinsic Security in Future Internet Architecture |
| CHEN Zhong, MENG Hongwei and GUAN Zhi |
| 2016,1(2):36-45 [Abstract] [View PDF(1002.46 K)] |
| |
| Automatically Validating Static Buffer Overflow Warnings based on Guided Symbolic Execution |
| BAO Tieyun, GAO Fengjuan, ZHOU Yan, LI You, WANG Linzhang and LI Xuandong |
| 2016,1(2):46-60 [Abstract] [View PDF(827.83 K)] |
| |
| Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries |
| Minghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su and Dengguo Feng |
| 2016,1(2):61-72 [Abstract] [View PDF(1.38 M)] |
| |