


default search action
Journal of Computer Security, Volume 28
Volume 28, Number 1, 2020
- Jannik Dreier, Lucca Hirschi, Sasa Radomirovic

, Ralf Sasse:
Verification of stateful cryptographic protocols with exclusive OR. 1-34 - Samuel Yeom, Irene Giacomelli, Alan Menaged, Matt Fredrikson

, Somesh Jha:
Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning. 35-70 - Kushal Babel, Vincent Cheval

, Steve Kremer
:
On the semantics of communications when verifying equivalence properties. 71-127 - Vineet Rajani

, Deepak Garg:
On the expressiveness and semantics of information flow types. 129-156
Volume 28, Number 2, 2020
- Hongcheng Li, Jianjun Huang

, Bin Liang, Wenchang Shi, Yifang Wu, Shilei Bai:
Identifying parasitic malware as outliers by code clustering. 157-189 - Elisavet Kozyri, Fred B. Schneider:

RIF: Reactive information flow labels. 191-228 - Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah:

Efficient backward private searchable encryption. 229-267 - Yifang Wu, Jianjun Huang

, Bin Liang, Wenchang Shi:
Do not jail my app: Detecting the Android plugin environments by time lag contradiction. 269-293
Volume 28, Number 3, 2020
- Christian Skalka, Sepehr Amir-Mohammadian, Samuel Clark:

Maybe tainted data: Theory and a case study. 295-335 - Brijesh Jethva, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed:

Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring. 337-373 - Phu H. Phung

, Rakesh S. V. Reddy, Steven Cap, Anthony Pierce, Abhinav Mohanty, Meera Sridhar:
A multi-party, fine-grained permission and policy enforcement framework for hybrid mobile applications. 375-404
Volume 28, Number 4, 2020
- Hammad Afzali, Santiago Torres-Arias

, Reza Curtmola, Justin Cappos:
Towards adding verifiability to web-based Git repositories. 405-436 - Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud, Indrakshi Ray:

Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution. 437-467 - Yangguang Tian

, Yingjiu Li, Robert H. Deng
, Nan Li
, Pengfei Wu
, Anyi Liu:
A new framework for privacy-preserving biometric-based remote user authentication. 469-498
Volume 28, Number 5, 2020
- Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen

, Minghui Zhu, Peng Liu:
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics. 499-523 - Federico De Meo, Luca Viganò:

A formal and automated approach to exploiting multi-stage attacks of web applications. 525-576 - Rui Liu, Jun Song

, Zhiming Huang
, Jianping Pan
:
EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions. 577-605
Volume 28, Number 6, 2020
- Tachio Terauchi

, Timos Antonopoulos:
Bucketing and information flow analysis for provable timing attack mitigation. 607-634 - Miguel Ángel Díaz de León Guillén, Victor Morales-Rocha, Luis Felipe Fernández Martínez:

A systematic review of security threats and countermeasures in SaaS. 635-653 - Mabin Joseph

, Gautham Sekar, R. Balasubramanian:
Side channel analysis of SPECK. 655-676

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














