


default search action
Journal of Computer Security, Volume 28
Volume 28, Number 1, 2020
- Jannik Dreier, Lucca Hirschi, Sasa Radomirovic
, Ralf Sasse:
Verification of stateful cryptographic protocols with exclusive OR. 1-34 - Samuel Yeom, Irene Giacomelli, Alan Menaged, Matt Fredrikson
, Somesh Jha:
Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning. 35-70 - Kushal Babel, Vincent Cheval, Steve Kremer
:
On the semantics of communications when verifying equivalence properties. 71-127 - Vineet Rajani, Deepak Garg:
On the expressiveness and semantics of information flow types. 129-156
Volume 28, Number 2, 2020
- Hongcheng Li, Jianjun Huang
, Bin Liang, Wenchang Shi, Yifang Wu, Shilei Bai:
Identifying parasitic malware as outliers by code clustering. 157-189 - Elisavet Kozyri, Fred B. Schneider:
RIF: Reactive information flow labels. 191-228 - Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah:
Efficient backward private searchable encryption. 229-267 - Yifang Wu, Jianjun Huang
, Bin Liang, Wenchang Shi:
Do not jail my app: Detecting the Android plugin environments by time lag contradiction. 269-293
Volume 28, Number 3, 2020
- Christian Skalka, Sepehr Amir-Mohammadian, Samuel Clark:
Maybe tainted data: Theory and a case study. 295-335 - Brijesh Jethva, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed:
Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring. 337-373 - Phu H. Phung
, Rakesh S. V. Reddy, Steven Cap, Anthony Pierce, Abhinav Mohanty, Meera Sridhar:
A multi-party, fine-grained permission and policy enforcement framework for hybrid mobile applications. 375-404
Volume 28, Number 4, 2020
- Hammad Afzali, Santiago Torres-Arias
, Reza Curtmola, Justin Cappos:
Towards adding verifiability to web-based Git repositories. 405-436 - Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud, Indrakshi Ray:
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution. 437-467 - Yangguang Tian, Yingjiu Li, Robert H. Deng
, Nan Li
, Pengfei Wu
, Anyi Liu:
A new framework for privacy-preserving biometric-based remote user authentication. 469-498
Volume 28, Number 5, 2020
- Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu:
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics. 499-523 - Federico De Meo, Luca Viganò:
A formal and automated approach to exploiting multi-stage attacks of web applications. 525-576 - Rui Liu, Jun Song
, Zhiming Huang
, Jianping Pan
:
EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions. 577-605
Volume 28, Number 6, 2020
- Tachio Terauchi
, Timos Antonopoulos:
Bucketing and information flow analysis for provable timing attack mitigation. 607-634 - Miguel Ángel Díaz de León Guillén, Victor Morales-Rocha, Luis Felipe Fernández Martínez:
A systematic review of security threats and countermeasures in SaaS. 635-653 - Mabin Joseph
, Gautham Sekar, R. Balasubramanian:
Side channel analysis of SPECK. 655-676

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.