Skip to main content

Feature Article

GA of position paper by Peng Liu

GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity

Performance/security trade-off is widely noticed in CFI research, however, we observe that not every CFI scheme is subject to the trade-off. Motivated by the key observation, we ask three questions: (1) Does trade-off really exist in different CFI schemes? (2) If trade-off do exist, how do previous works comply with it? (3) How can it inspire future research? Although the three questions probably cannot be directly answered, they are inspiring. We find that a deeper understanding of the nature of the trade-off will help answer the three questions. Accordingly, we proposed the GPT conjecture to pinpoint the trade-off in designing CFI schemes, which says that at most two out of three properties (fine granularity, acceptable performance, and preventive protection) could be achieved.

  1. Authors: Jun Li, Bodong Zhao and Chao Zhang

    Content type: Survey

Thematic Series


Data-Driven Security
Edited by: Yang Liu, Xinming Ou, Xinyu Xing, Guozhu Meng


Data Security and Privacy
Edited by: Dan Lin, Jingqiang Lin and Bo Luo

Information Abuse Prevention
Edited by: Gang Li and Jianlong Tan

System Security  Edited by: Peng Liu

AI and Security   Edited by: Xiaofeng Wang

Why submit to us

• 1st open access journal on Cybersecurity
• APC fully covered by IIE, CAS
• Served by a dedicated international editorial board to give thorough swift editorial response

Aims and scope

This journal is aimed to systematically cover all essential aspects of cybersecurity, with a focus on reporting on cyberspace security issues, the latest research results, and real-world deployment of security technologies.  

The journal publishes research articles and reviews in the areas including, but not limited to:

• Cryptography and its applications
• Network and critical infrastructure security
• Hardware security
• Software and system security
• Cybersecurity data analytics
• Data-driven security and measurement studies
• Adversarial reasoning
• Malware analysis
• Privacy-enhancing technologies and anonymity
• IoT Security
• AI Security

Call for Papers

Thematic Series: Explainable Artificial Intelligence (X.A.I.) for Cyber Threat Intelligence
Submission Due: December 30, 2021
Guest Editors:
Prof. Youssef Baddi, Chouaib Doukkali University, Morocco
Prof. Yassine Maleh, Sultan Moulay Slimane University, Morocco
Prof. Lo'ai Tawalbeh, Texas A&M University, USA
Prof. Ahmed A. Abd El-Latif, Menoufia University, Egypt

Thematic Series: Zero Trust Access Architecture
Submission Due: December 15, 2021
Guest Editors:
Shiva Raj Pokhrel, Deakin University, Australia
Min Yu, Institute of Information Engineering, Chinese Academy of Sciences, China 
Christos Douligeris, University of Piraeus, Greece
Constantinos Patsakis, University of Piraeus, Greece
Gang Li, Deakin University, Australia

Thematic Series: Applied Cryptography in Computer and Communications
Submission Due: August 1, 2021
Guest Editors:
Bo Chen, Michigan Technological University, USA
Xinyi Huang, Fujian Normal University, China
Miroslaw Kutylowski, Wroclaw University of Science and Technology, Poland
Joseph K. Liu, Monash University, Australia

Thematic Series: Trustworthy Smart Systems
Submission Due: July 31, 2021
Guest Editors:
Wei Wang, Beijing Jiaotong University, China
Yufei Han, INRIA, France
Bian Yang, Norwegian University of Science and Technology, Norway
Sencun Zhu, The Pennsylvania State University, USA

Upcoming Events

30th Usenix Security Symposium
(11–13 August 2021, Vancouver, Canada)
ACM Conference on Computer and Communications Security
(14-19 November 2021, Seoul, South Korea)

Editor-in-Chief: MENG Dan

New Content Item (1)

Full Professor in Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS). His work focuses on network and system security, parallel distributed processing. He has lead important research projects including Dawning supercomputers, National Science and Technology Major Project, National High Technology Research and Development Program of China, and strategic priority research program of CAS. He has published over one hundred peer-reviewed papers. He is the director of IIE, after serving as the deputy director of IIE, the deputy director of the High Technology Research and Development Bureau of CAS.

Executive Editor-in-Chief: LIU Peng

New Content Item (1)

LIU Peng received his BS and MS degrees from the University of Science and Technology of China, and his PhD from George Mason University in 1999.  Dr. Liu is a Professor of Information Sciences and Technology, founding Director of the Center for Cyber-Security, Information Privacy, and Trust, and founding Director of the Cyber Security Lab at Penn State University.   His research interests are in all areas of computer and network security.  He has published a monograph and over 260 refereed technical papers.  His research has been sponsored by NSF, ARO, AFOSR, DARPA, DHS, DOE, AFRL, NSA, TTC, CISCO, and HP.  He has served as a program (co-)chair or general (co-)chair for over 10 international conferences (e.g., Asia CCS 2010) and workshops (e.g., MTD 2016). He chaired the Steering Committee of SECURECOMM during 2008-14. He has served on over 100 program committees and reviewed papers for numerous journals. He is an associate editor for IEEE TDSC. He is a recipient of the DOE Early Career Principle Investigator Award.  He has co-led the effort to make Penn State a NSA-certified National Center of Excellence in Information Assurance Education and Research.  He has advised or co-advised over 30 PhD dissertations to completion.

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • EBSCO Discovery Service
  • Gale
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics