| Volume 1,Issue 2,2016 Table of Contents
Contents | | | Security Analytics for Mobile Apps: Achievements and Challenges | | YANG Wei, XIAO Xusheng, LI Dengfeng, LI Huoran, LIU Xuanzhe, WANG Haoyu, GUO Yao and XIE Tao | | 2016,1(2):1-14 [Abstract] [View PDF(2.12 M)] | | | | A Survey of Code Reuse Attack and Defense Mechanisms | | LIU Tong, SHI Gang and MENG Dan | | 2016,1(2):15-27 [Abstract] [View PDF(867.61 K)] | | | | Survey: Security of Cryptographic Primitives with Imperfect Randomness | | YAO Yanqing and LI Zhoujun | | 2016,1(2):28-35 [Abstract] [View PDF(795.29 K)] | | | | Research on Intrinsic Security in Future Internet Architecture | | CHEN Zhong, MENG Hongwei and GUAN Zhi | | 2016,1(2):36-45 [Abstract] [View PDF(1002.46 K)] | | | | Automatically Validating Static Buffer Overflow Warnings based on Guided Symbolic Execution | | BAO Tieyun, GAO Fengjuan, ZHOU Yan, LI You, WANG Linzhang and LI Xuandong | | 2016,1(2):46-60 [Abstract] [View PDF(827.83 K)] | | | | Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries | | Minghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su and Dengguo Feng | | 2016,1(2):61-72 [Abstract] [View PDF(1.38 M)] | | |
|