Skip to main content

Advertisement

Feature Article

New Content Item

From proof-of-concept to exploitable

Exploitability assessment of vulnerabilities is important for both defenders and attackers. Existing solutions usually explore in depth the crashing paths and assess exploitability by finding exploitable states along the paths. However, exploitable states do not always exist in crashing paths. This paper utilizes oriented fuzzing to explore diverging paths from the vulnerability point and presents a novel solution to generate exploits for userspace programs and facilitate the process of crafting a kernel UAF exploit.

Call for Editorial Board Members

Cybersecurity is an open-access, double-blind, peer-reviewed journal. This journal aims to systematically cover all essential aspects of cybersecurity, with a focus on reporting on cyberspace security issues, the latest research results, and real-world deployment of security technologies. For more information, please visit the journal homepage at: https://cybersecurity.springeropen.com/

We are looking for enterprising researchers or postgraduate researchers to act as the journal Editorial Board Members who active in the areas as mentioned below.

Click for more

  1. Authors: Jun Li, Bodong Zhao and Chao Zhang

    Content type: Survey

Thematic Series

2018
System Security  Edited by: Peng Liu

AI and Security   Edited by: Xiaofeng Wang

2019

Data Security and Privacy
Edited by: Dan Lin, Jingqiang Lin and Bo Luo

Information Abuse Prevention
Edited by: Gang Li and Jianlong Tan

Why submit to us

• 1st open access journal on Cybersecurity
• APC fully covered by IIE, CAS
• Served by a dedicated international editorial board to give thorough swift editorial response

Aims and scope

This journal is aimed to systematically cover all essential aspects of cybersecurity, with a focus on reporting on cyberspace security issues, the latest research results, and real-world deployment of security technologies.

The journal publishes research articles and reviews in the areas including, but not limited to:

• Cryptography and its applications
• Network and critical infrastructure security
• Hardware security
• Software and system security
• Cybersecurity data analytics
• Data-driven security and measurement studies
• Adversarial reasoning
• Malware analysis
• Privacy-enhancing technologies and anonymity
• IoT Security
• AI Security

Call for Papers

Thematic Series: IoT Security and Privacy
Submission Due: March 31, 2020
Guest Editors:
Zhiqiang Lin, The Ohio State University, USA
Kevin Butler, University of Florida, USA
Juanru Li, Shanghai Jiaotong University, China 

Upcoming Events

​​​​​​​The 22nd International Symposium on Research in Attacks, Intrusions and Defenses 
(23-25 September 2019, Beijing, China)

The 26th ACM Conference on Computer and Communications Security 
(11-15 November 2019, London, UK)

Editor-in-Chief: MENG Dan

New Content Item (1)

Full Professor in Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS). His work focuses on network and system security, parallel distributed processing. He has lead important research projects including Dawning supercomputers, National Science and Technology Major Project, National High Technology Research and Development Program of China, and strategic priority research program of CAS. He has published over one hundred peer-reviewed papers. He is the director of IIE, after serving as the deputy director of IIE, the deputy director of the High Technology Research and Development Bureau of CAS.

Executive Editor-in-Chief: LIU Peng

New Content Item (1)

LIU Peng received his BS and MS degrees from the University of Science and Technology of China, and his PhD from George Mason University in 1999.  Dr. Liu is a Professor of Information Sciences and Technology, founding Director of the Center for Cyber-Security, Information Privacy, and Trust, and founding Director of the Cyber Security Lab at Penn State University.   His research interests are in all areas of computer and network security.  He has published a monograph and over 260 refereed technical papers.  His research has been sponsored by NSF, ARO, AFOSR, DARPA, DHS, DOE, AFRL, NSA, TTC, CISCO, and HP.  He has served as a program (co-)chair or general (co-)chair for over 10 international conferences (e.g., Asia CCS 2010) and workshops (e.g., MTD 2016). He chaired the Steering Committee of SECURECOMM during 2008-14. He has served on over 100 program committees and reviewed papers for numerous journals. He is an associate editor for IEEE TDSC. He is a recipient of the DOE Early Career Principle Investigator Award.  He has co-led the effort to make Penn State a NSA-certified National Center of Excellence in Information Assurance Education and Research.  He has advised or co-advised over 30 PhD dissertations to completion.

Advertisement

  • Affiliated with
  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

Annual Journal Metrics

  • Speed
    58 days to first decision for reviewed manuscripts only
    51 days to first decision for all manuscripts
    103 days from submission to acceptance
    36 days from acceptance to publication

    Usage 
    12,469 downloads
    23 Altmetric mentions

The journal is indexing by

  • EBSCO Discovery Service
  • DOAJ
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Summon
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Naver
  • CSCD

Advertisement