Skip to main content

Feature Article

New Content Item

From proof-of-concept to exploitable

Exploitability assessment of vulnerabilities is important for both defenders and attackers. Existing solutions usually explore in depth the crashing paths and assess exploitability by finding exploitable states along the paths. However, exploitable states do not always exist in crashing paths. This paper utilizes oriented fuzzing to explore diverging paths from the vulnerability point and presents a novel solution to generate exploits for userspace programs and facilitate the process of crafting a kernel UAF exploit.

  1. Authors: Jun Li, Bodong Zhao and Chao Zhang

    Content type: Survey

Thematic Series

System Security  Edited by: Peng Liu

AI and Security   Edited by: Xiaofeng Wang


Data Security and Privacy
Edited by: Dan Lin, Jingqiang Lin and Bo Luo

Information Abuse Prevention
Edited by: Gang Li and Jianlong Tan


Data-Driven Security
Edited by: Yang Liu, Xinming Ou, Xinyu Xing, Guozhu Meng

Why submit to us

• 1st open access journal on Cybersecurity
• APC fully covered by IIE, CAS
• Served by a dedicated international editorial board to give thorough swift editorial response

Aims and scope

This journal is aimed to systematically cover all essential aspects of cybersecurity, with a focus on reporting on cyberspace security issues, the latest research results, and real-world deployment of security technologies.

The journal publishes research articles and reviews in the areas including, but not limited to:

• Cryptography and its applications
• Network and critical infrastructure security
• Hardware security
• Software and system security
• Cybersecurity data analytics
• Data-driven security and measurement studies
• Adversarial reasoning
• Malware analysis
• Privacy-enhancing technologies and anonymity
• IoT Security
• AI Security

Call for Papers

Thematic Series: Binary Analysis
Submission Due: June 1, 2020
Guest Editors:
Heng Yin, University of California, Riverside, USA
Zhenkai Liang, National University of Singapore, Singapore
Dinghao Wu, Pennsylvania State University, USA

Thematic Series: Data-Driven Security
Submission Due: July 31, 2020
Guest Editors:
Xinyi Huang, Fujian Normal University, China
Jian Shen, Nanjing University of Information Science & Technology, China

Thematic Series: Cyber-Physical System Security
Submission Due: September 30, 2020
Guest Editor:
Jianying Zhou, Singapore University of Technology and Design (SUTD), Singapore

Thematic Series: Adversarial Cybersecurity
Submission Due: January 31, 2021
Guest Editors:
Varun Dutt, Indian Institute of Technology Mandi, India    
Karim Ouazzane, London Metropolitan University, UK    
Cyril Onwubiko, Pearson Plc, UK    
Frank Wang, University of Kent, UK    
Jason R.C. Nurse, University of Kent, UK    
Pierangelo Rosati, DCU Business School, Ireland    
Ruth Ikwu, Cardiff University, UK    
Aunshul Rege, Temple University, USA

Thematic Series: Applied Cryptography in Computer and Communications
Submission Due: August 1, 2021
Guest Editors:
Bo Chen, Michigan Technological University, USA
Xinyi Huang, Fujian Normal University, China
Miroslaw Kutylowski, Wroclaw University of Science and Technology, Poland
Joseph K. Liu, Monash University, Australia

Upcoming Events

2020 IEEE European Symposium on Security and Privacy
(7-11 September 2020, Genova, Italy)

ACM Conference on Computer and Communications Security (CCS) 2020
(9-13 November 2020, Orlando, USA)

(6-10 December 2020, Daejeon, Korea)

Editor-in-Chief: MENG Dan

New Content Item (1)

Full Professor in Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS). His work focuses on network and system security, parallel distributed processing. He has lead important research projects including Dawning supercomputers, National Science and Technology Major Project, National High Technology Research and Development Program of China, and strategic priority research program of CAS. He has published over one hundred peer-reviewed papers. He is the director of IIE, after serving as the deputy director of IIE, the deputy director of the High Technology Research and Development Bureau of CAS.

Executive Editor-in-Chief: LIU Peng

New Content Item (1)

LIU Peng received his BS and MS degrees from the University of Science and Technology of China, and his PhD from George Mason University in 1999.  Dr. Liu is a Professor of Information Sciences and Technology, founding Director of the Center for Cyber-Security, Information Privacy, and Trust, and founding Director of the Cyber Security Lab at Penn State University.   His research interests are in all areas of computer and network security.  He has published a monograph and over 260 refereed technical papers.  His research has been sponsored by NSF, ARO, AFOSR, DARPA, DHS, DOE, AFRL, NSA, TTC, CISCO, and HP.  He has served as a program (co-)chair or general (co-)chair for over 10 international conferences (e.g., Asia CCS 2010) and workshops (e.g., MTD 2016). He chaired the Steering Committee of SECURECOMM during 2008-14. He has served on over 100 program committees and reviewed papers for numerous journals. He is an associate editor for IEEE TDSC. He is a recipient of the DOE Early Career Principle Investigator Award.  He has co-led the effort to make Penn State a NSA-certified National Center of Excellence in Information Assurance Education and Research.  He has advised or co-advised over 30 PhD dissertations to completion.

  • Affiliated with
  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EBSCO Discovery Service
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Summon
  • DOAJ
  • Institute of Scientific and Technical Information of China
  • Naver
  • DBLP
  • Google Scholar
  • ProQuest-ExLibris Primo
  • CNKI

Annual Journal Metrics (2019)

  • Speed
    75 days to first decision for reviewed manuscripts only
    56 days to first decision for all manuscripts
    137 days from submission to acceptance
    33 days from acceptance to publication

    15 Altmetric mentions