Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyOctober 2024
Image Steganography Approaches and Their Detection Strategies: A Survey
ACM Computing Surveys (CSUR), Volume 57, Issue 2Article No.: 33, Pages 1–40https://doi.org/10.1145/3694965Steganography is the art and science of hidden (or covered) communication. In digital steganography, the bits of image, video, audio and text files are tweaked to represent the information to hide. This article covers the current methods for hiding ...
- surveyOctober 2023
Demystify the Fuzzing Methods: A Comprehensive Survey
ACM Computing Surveys (CSUR), Volume 56, Issue 3Article No.: 71, Pages 1–38https://doi.org/10.1145/3623375Massive software applications possess complex data structures or parse complex data structures; in such cases, vulnerabilities in the software become inevitable. The vulnerabilities are the source of cyber-security threats, and discovering this before the ...
- surveyNovember 2021
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking
- Christopher Brant,
- Prakash Shrestha,
- Benjamin Mixon-Baca,
- Kejun Chen,
- Said Varlioglu,
- Nelly Elsayed,
- Yier Jin,
- Jedidiah Crandall,
- Daniela Oliveira
ACM Computing Surveys (CSUR), Volume 55, Issue 1Article No.: 17, Pages 1–33https://doi.org/10.1145/3483790Information flow tracking was proposed more than 40 years ago to address the limitations of access control mechanisms to guarantee the confidentiality and integrity of information flowing within a system, but has not yet been widely applied in practice ...
- research-articleMay 2021
Hardware Information Flow Tracking
ACM Computing Surveys (CSUR), Volume 54, Issue 4Article No.: 83, Pages 1–39https://doi.org/10.1145/3447867Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification, ...
- research-articleFebruary 2021
Information Integrity: Are We There Yet?
ACM Computing Surveys (CSUR), Volume 54, Issue 2Article No.: 33, Pages 1–35https://doi.org/10.1145/3436817The understanding and promotion of integrity in information security has traditionally been underemphasized or even ignored. From implantable medical devices and electronic voting to vehicle control, the critical importance of information integrity to ...
- surveyJuly 2018
Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms
ACM Computing Surveys (CSUR), Volume 51, Issue 4Article No.: 69, Pages 1–34https://doi.org/10.1145/3199673Malicious software, a threat users face on a daily basis, have evolved from simple bankers based on social engineering to advanced persistent threats. Recent research and discoveries reveal that malware developers have been using a wide range of anti-...
- surveyFebruary 2018
The Privacy Implications of Cyber Security Systems: A Technological Survey
ACM Computing Surveys (CSUR), Volume 51, Issue 2Article No.: 36, Pages 1–27https://doi.org/10.1145/3172869Cyber-security systems, which protect networks and computers against cyber attacks, are becoming common due to increasing threats and government regulation. At the same time, the enormous amount of data gathered by cyber-security systems poses a serious ...
- surveyApril 2017
Control-Flow Integrity: Precision, Security, and Performance
ACM Computing Surveys (CSUR), Volume 50, Issue 1Article No.: 16, Pages 1–33https://doi.org/10.1145/3054924Memory corruption errors in C/C++ programs remain the most common source of security vulnerabilities in today’s systems. Control-flow hijacking attacks exploit memory corruption vulnerabilities to divert program execution away from the intended control ...
- articleSeptember 1994
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR), Volume 26, Issue 3Pages 211–254https://doi.org/10.1145/185403.185412An organized record of actual flaws can be useful to computer system designers, programmers, analysts, administrators, and users. This survey provides a taxonomy for computer program security flaws, with an Appendix that documents 50 actual security ...