| |
| Defense against Rowhammer Attack with Memory Isolation in Virtualized Environments |
| SHI Peitao, LIU Yutao and CHEN Haibo |
| 2017,2(4):1-12 [Abstract] [View PDF(1.07 M)] |
| |
| Research and Application of Improved BLP Model for Mobile Web Operating System |
| ZHU Dali, YANG Ying, JIN Hao, SHAO Jing and FENG Weimiao |
| 2017,2(4):13-26 [Abstract] [View PDF(1.33 M)] |
| |
| Automatic Malicious Android Application Detection Approach by Combining Static Analysis and Dynamic Testing |
| HUANG Haohua, CUI Zhanqi, PAN Minxue, WANG Linzhang and LI Xuandong |
| 2017,2(4):27-40 [Abstract] [View PDF(1.50 M)] |
| |
| Cause, Exploitation and Mitigation of Program Vulnerability-C and C++ language as an example |
| CHEN Xiaoquan and XUE Rui |
| 2017,2(4):41-56 [Abstract] [View PDF(786.56 K)] |
| |
| An Autonomous Open Root Resolution Architecture for Domain Name System in the Internet |
| ZHANG Yu, XIA Zhongda, FANG Binxing and ZHANG Hongli |
| 2017,2(4):57-69 [Abstract] [View PDF(1.21 M)] |
| |
| GuardSpark:Access Control Enforcement in Spark |
| NING Fangxiao, WEN Yu and SHI Gang |
| 2017,2(4):70-81 [Abstract] [View PDF(671.14 K)] |
| |
| A Survey of Memory Corruption Attack and Defense |
| MA Mengyu, CHEN Liwei and MENG Dan |
| 2017,2(4):82-98 [Abstract] [View PDF(2.68 M)] |
| |