| |
| Defense against Rowhammer Attack with Memory Isolation in Virtualized Environments |
| | SHI Peitao, LIU Yutao and CHEN Haibo |
| | 2017,2(4):1-12 [Abstract] [View PDF(1.07 M)] |
| | |
| Research and Application of Improved BLP Model for Mobile Web Operating System |
| | ZHU Dali, YANG Ying, JIN Hao, SHAO Jing and FENG Weimiao |
| | 2017,2(4):13-26 [Abstract] [View PDF(1.33 M)] |
| | |
| Automatic Malicious Android Application Detection Approach by Combining Static Analysis and Dynamic Testing |
| | HUANG Haohua, CUI Zhanqi, PAN Minxue, WANG Linzhang and LI Xuandong |
| | 2017,2(4):27-40 [Abstract] [View PDF(1.50 M)] |
| | |
| Cause, Exploitation and Mitigation of Program Vulnerability-C and C++ language as an example |
| | CHEN Xiaoquan and XUE Rui |
| | 2017,2(4):41-56 [Abstract] [View PDF(786.56 K)] |
| | |
| An Autonomous Open Root Resolution Architecture for Domain Name System in the Internet |
| | ZHANG Yu, XIA Zhongda, FANG Binxing and ZHANG Hongli |
| | 2017,2(4):57-69 [Abstract] [View PDF(1.21 M)] |
| | |
| GuardSpark:Access Control Enforcement in Spark |
| | NING Fangxiao, WEN Yu and SHI Gang |
| | 2017,2(4):70-81 [Abstract] [View PDF(671.14 K)] |
| | |
| A Survey of Memory Corruption Attack and Defense |
| | MA Mengyu, CHEN Liwei and MENG Dan |
| | 2017,2(4):82-98 [Abstract] [View PDF(2.68 M)] |
| | |