Exploitability assessment of vulnerabilities is important for both defenders and attackers. Existing solutions usually explore in depth the crashing paths and assess exploitability by finding exploitable states along the paths. However, exploitable states do not always exist in crashing paths. This paper utilizes oriented fuzzing to explore diverging paths from the vulnerability point and presents a novel solution to generate exploits for userspace programs and facilitate the process of crafting a kernel UAF exploit.
Call for Editorial Board Members
Cybersecurity is looking for enterprising researchers or postgraduate researchers to act as the journal Editorial Board Members who active in the areas of cybersecurity, with a focus on cyberspace security issues, and real-world deployment of security technologies.
Why submit to us
• 1st open access journal on Cybersecurity
• APC fully covered by IIE, CAS
• Served by a dedicated international editorial board to give thorough swift editorial response
Aims and scope
This journal is aimed to systematically cover all essential aspects of cybersecurity, with a focus on reporting on cyberspace security issues, the latest research results, and real-world deployment of security technologies.
The journal publishes research articles and reviews in the areas including, but not limited to:
• Cryptography and its applications
• Network and critical infrastructure security
• Hardware security
• Software and system security
• Cybersecurity data analytics
• Data-driven security and measurement studies
• Adversarial reasoning
• Malware analysis
• Privacy-enhancing technologies and anonymity
• IoT Security
• AI Security
Call for Papers
Thematic Series: Binary Analysis
Submission Due: June 1, 2020
Heng Yin, University of California, Riverside, USA
Zhenkai Liang, National University of Singapore, Singapore
Dinghao Wu, Pennsylvania State University, USA
Thematic Series: Data-Driven Security
Submission Due: July 31, 2020
Xinyi Huang, Fujian Normal University, China
Jian Shen, Nanjing University of Information Science & Technology, China
Thematic Series: Cyber-Physical System Security
Submission Due: August 15, 2020
Jianying Zhou, Singapore University of Technology and Design (SUTD), Singapore
Thematic Series: Applied Cryptography in Computer and Communications
Submission Due: August 1, 2021
Bo Chen, Michigan Technological University, USA
Xinyi Huang, Fujian Normal University, China
Miroslaw Kutylowski, Wroclaw University of Science and Technology, Poland
Joseph K. Liu, Monash University, Australia
2020 IEEE European Symposium on Security and Privacy
(7-11 September 2020, Genova, Italy)
ACM Conference on Computer and Communications Security (CCS) 2020
(9-13 November 2020, Orlando, USA)
(6-10 December 2020, Daejeon, Korea)
Editor-in-Chief: MENG Dan
Full Professor in Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS). His work focuses on network and system security, parallel distributed processing. He has lead important research projects including Dawning supercomputers, National Science and Technology Major Project, National High Technology Research and Development Program of China, and strategic priority research program of CAS. He has published over one hundred peer-reviewed papers. He is the director of IIE, after serving as the deputy director of IIE, the deputy director of the High Technology Research and Development Bureau of CAS.
Executive Editor-in-Chief: LIU Peng
LIU Peng received his BS and MS degrees from the University of Science and Technology of China, and his PhD from George Mason University in 1999. Dr. Liu is a Professor of Information Sciences and Technology, founding Director of the Center for Cyber-Security, Information Privacy, and Trust, and founding Director of the Cyber Security Lab at Penn State University. His research interests are in all areas of computer and network security. He has published a monograph and over 260 refereed technical papers. His research has been sponsored by NSF, ARO, AFOSR, DARPA, DHS, DOE, AFRL, NSA, TTC, CISCO, and HP. He has served as a program (co-)chair or general (co-)chair for over 10 international conferences (e.g., Asia CCS 2010) and workshops (e.g., MTD 2016). He chaired the Steering Committee of SECURECOMM during 2008-14. He has served on over 100 program committees and reviewed papers for numerous journals. He is an associate editor for IEEE TDSC. He is a recipient of the DOE Early Career Principle Investigator Award. He has co-led the effort to make Penn State a NSA-certified National Center of Excellence in Information Assurance Education and Research. He has advised or co-advised over 30 PhD dissertations to completion.
The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.
IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.
IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.
The journal is indexed by
- EBSCO Discovery Service
- OCLC WorldCat Discovery Service
- ProQuest-ExLibris Summon
- Institute of Scientific and Technical Information of China
- Google Scholar
- ProQuest-ExLibris Primo
Annual Journal Metrics (2019)
75 days to first decision for reviewed manuscripts only
56 days to first decision for all manuscripts
137 days from submission to acceptance
33 days from acceptance to publication
15 Altmetric mentions
- ISSN: 2523-3246 (electronic)