JCS - volume 28 - 2020 论文列表 |
点击这里查看 Journal of Computer Security 的JCR分区、影响因子等信息 |
Mabin Joseph Gautham Sekar R. Balasubramanian
A systematic review of security threats and countermeasures in SaaS.Miguel Ángel Díaz de León Guillén Victor Morales-Rocha Luis Felipe Fernández Martínez
Bucketing and information flow analysis for provable timing attack mitigation.Rui Liu Jun Song Zhiming Huang Jianping Pan
A formal and automated approach to exploiting multi-stage attacks of web applications. DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics.Xusheng Li Zhisheng Hu Haizhou Wang Yiwei Fu Ping Chen Minghui Zhu Peng Liu
Yangguang Tian Yingjiu Li Robert H. Deng Nan Li Pengfei Wu Anyi Liu
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution.Diptendu Mohan Kar Indrajit Ray Jenna Gallegos Jean Peccoud Indrakshi Ray
Towards adding verifiability to web-based Git repositories.Hammad Afzali Santiago Torres-Arias Reza Curtmola Justin Cappos
Phu H. Phung Rakesh S. V. Reddy Steven Cap Anthony Pierce Abhinav Mohanty Meera Sridhar
Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring.Brijesh Jethva Issa Traoré Asem Ghaleb Karim Ganame Sherif Ahmed
Maybe tainted data: Theory and a case study.Yifang Wu Jianjun Huang Bin Liang Wenchang Shi
Efficient backward private searchable encryption.Sanjit Chatterjee Shravan Kumar Parshuram Puria Akash Shah
RIF: Reactive information flow labels.Elisavet Kozyri Fred B. Schneider
Identifying parasitic malware as outliers by code clustering.Hongcheng Li Jianjun Huang Bin Liang Wenchang Shi Yifang Wu Shilei Bai
Kushal Babel Vincent Cheval Steve Kremer
Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning.Samuel Yeom Irene Giacomelli Alan Menaged Matt Fredrikson Somesh Jha
Verification of stateful cryptographic protocols with exclusive OR.