Volume 1,Issue 2,2016 Table of Contents

Other Issues:  


Security Analytics for Mobile Apps: Achievements and Challenges
  YANG Wei, XIAO Xusheng, LI Dengfeng, LI Huoran, LIU Xuanzhe, WANG Haoyu, GUO Yao and XIE Tao
  2016,1(2):1-14 [Abstract]  [View PDF(2.12 M)]
A Survey of Code Reuse Attack and Defense Mechanisms
  LIU Tong, SHI Gang and MENG Dan
  2016,1(2):15-27 [Abstract]  [View PDF(867.61 K)]
Survey: Security of Cryptographic Primitives with Imperfect Randomness
  YAO Yanqing and LI Zhoujun
  2016,1(2):28-35 [Abstract]  [View PDF(795.29 K)]
Research on Intrinsic Security in Future Internet Architecture
  CHEN Zhong, MENG Hongwei and GUAN Zhi
  2016,1(2):36-45 [Abstract]  [View PDF(1002.46 K)]
Automatically Validating Static Buffer Overflow Warnings based on Guided Symbolic Execution
  BAO Tieyun, GAO Fengjuan, ZHOU Yan, LI You, WANG Linzhang and LI Xuandong
  2016,1(2):46-60 [Abstract]  [View PDF(827.83 K)]
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries
  Minghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su and Dengguo Feng
  2016,1(2):61-72 [Abstract]  [View PDF(1.38 M)]