SpyDetector: An approach for detecting side-channel attacks at runtime Yusuf KulahBerkay DincerErkay Savas Regular Contribution 02 June 2018 Pages: 393 - 422
Mobile botnets meet social networks: design and analysis of a new type of botnet Mohammad R. FaghaniUyen T. Nguyen Regular Contribution 20 June 2018 Pages: 423 - 449
Double-spending prevention for Bitcoin zero-confirmation transactions Cristina Pérez-SolàSergi Delgado-SeguraJordi Herrera-Joancomartí Regular Contribution 24 November 2018 Pages: 451 - 463
Analyzing XACML policies using answer set programming Mohsen RezvaniDavid RajaratnamSanjay Jha Regular Contribution 26 November 2018 Pages: 465 - 479
You click, I steal: analyzing and detecting click hijacking attacks in web pages Anil SainiManoj Singh GaurMauro Conti Regular Contribution 13 December 2018 Pages: 481 - 504
Breaking MPC implementations through compression João S. ResendePatrícia R. SousaLuís Antunes Regular Contribution 02 January 2019 Pages: 505 - 518
SSPFA: effective stack smashing protection for Android OS Héctor Marco-GisbertIsmael Ripoll-Ripoll Regular Contribution Open access 22 January 2019 Pages: 519 - 532