Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. Dwarf Frankenstein is still in your memory: tiny code reuse attacks

A.A Sadeghi; F. Aminmansour; H.R. Shahriari

Volume 9, Issue 1 , Winter and Spring 2017, , Pages 53-72

http://dx.doi.org/10.22042/isecure.2017.0.0.4

Abstract
  Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation ...  Read More

2. Security testing of session initiation protocol implementations

I. G. Harris; T. Alrahem; A. Chen; N. DiGiuseppe; J. Gee; Sh. P. Hsiao; S. Mattox; T. Park; S. Selvaraj; A. Tam; M. Carlsson

Volume 1, Issue 2 , Summer and Autumn 2009, , Pages 91-103

http://dx.doi.org/10.22042/isecure.2015.1.2.3

Abstract
  The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications ...  Read More