Volume 28, Number 5, 2020
EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions.

Rui Liu Jun Song Zhiming Huang Jianping Pan

A formal and automated approach to exploiting multi-stage attacks of web applications.

Federico De Meo Luca Viganò

DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics.

Xusheng Li Zhisheng Hu Haizhou Wang Yiwei Fu Ping Chen Minghui Zhu Peng Liu


Volume 28, Number 4, 2020
A new framework for privacy-preserving biometric-based remote user authentication.

Yangguang Tian Yingjiu Li Robert H. Deng Nan Li Pengfei Wu Anyi Liu

Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution.

Diptendu Mohan Kar Indrajit Ray Jenna Gallegos Jean Peccoud Indrakshi Ray

Towards adding verifiability to web-based Git repositories.

Hammad Afzali Santiago Torres-Arias Reza Curtmola Justin Cappos


Volume 28, Number 3, 2020
A multi-party, fine-grained permission and policy enforcement framework for hybrid mobile applications.

Phu H. Phung Rakesh S. V. Reddy Steven Cap Anthony Pierce Abhinav Mohanty Meera Sridhar

Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring.

Brijesh Jethva Issa Traoré Asem Ghaleb Karim Ganame Sherif Ahmed

Maybe tainted data: Theory and a case study.

Christian Skalka Sepehr Amir-Mohammadian Samuel Clark


Volume 28, Number 1, 2020
On the expressiveness and semantics of information flow types.

Vineet Rajani Deepak Garg

On the semantics of communications when verifying equivalence properties.

Kushal Babel Vincent Cheval Steve Kremer

Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning.

Samuel Yeom Irene Giacomelli Alan Menaged Matt Fredrikson Somesh Jha

Verification of stateful cryptographic protocols with exclusive OR.

Jannik Dreier Lucca Hirschi Sasa Radomirovic Ralf Sasse