Volume 2,Issue 4,2017 Table of Contents

Other Issues:  


Defense against Rowhammer Attack with Memory Isolation in Virtualized Environments
  SHI Peitao, LIU Yutao and CHEN Haibo
  2017,2(4):1-12 [Abstract]  [View PDF(1.07 M)]
Research and Application of Improved BLP Model for Mobile Web Operating System
  ZHU Dali, YANG Ying, JIN Hao, SHAO Jing and FENG Weimiao
  2017,2(4):13-26 [Abstract]  [View PDF(1.33 M)]
Automatic Malicious Android Application Detection Approach by Combining Static Analysis and Dynamic Testing
  HUANG Haohua, CUI Zhanqi, PAN Minxue, WANG Linzhang and LI Xuandong
  2017,2(4):27-40 [Abstract]  [View PDF(1.50 M)]
Cause, Exploitation and Mitigation of Program Vulnerability-C and C++ language as an example
  CHEN Xiaoquan and XUE Rui
  2017,2(4):41-56 [Abstract]  [View PDF(786.56 K)]
An Autonomous Open Root Resolution Architecture for Domain Name System in the Internet
  ZHANG Yu, XIA Zhongda, FANG Binxing and ZHANG Hongli
  2017,2(4):57-69 [Abstract]  [View PDF(1.21 M)]
GuardSpark:Access Control Enforcement in Spark
  NING Fangxiao, WEN Yu and SHI Gang
  2017,2(4):70-81 [Abstract]  [View PDF(671.14 K)]
A Survey of Memory Corruption Attack and Defense
  MA Mengyu, CHEN Liwei and MENG Dan
  2017,2(4):82-98 [Abstract]  [View PDF(2.68 M)]