Skip to main content


Journal of Computer Virology and Hacking Techniques

Journal of Computer Virology and Hacking Techniques OnlineFirst articles

05-07-2021 | Original Paper Open Access

RV-TEE: secure cryptographic protocol execution based on runtime verification

Analytical security of cryptographic protocols does not immediately translate to operational security due to incorrect implementation and attacks targeting the execution environment. Code verification and hardware-based trusted execution solutions …

26-06-2021 | Original Paper

Detection and robustness evaluation of android malware classifiers

Android malware attacks are tremendously increasing, and evasion techniques become more and more effective. For this reason, it is necessary to continuously improve the detection performances. With this paper, we wish to pursue this purpose with …

24-05-2021 | Original Paper

A framework for supporting ransomware detection and prevention based on hybrid analysis

Ransomware is a very effective form of malware, which recently raised a lot of attention since an impressive number of workstations was affected. This malware is able to encrypt the files located in the infected machine and block the access to …

17-05-2021 | Invited Paper

The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes

The threat landscape is continuously evolving and attackers are improving their tactics and techniques. From worms and viruses, initially introduced in 1982, to advanced, targeted and persistent attacks that have emerged in recent years, many …

14-05-2021 | Original Paper

Malware detection and classification using community detection and social network analysis

Despite the efforts of antivirus vendors and researchers to overcome the threat of malware and its growth, malware remains a rampant problem causing significant economic and intellectual property loss. Malware developers evade commercial detection …

Current Publications

About this journal

The Journal of Computer Virology and Hacking Techniques is an independent academic and technical journal dedicated to viral and antiviral computer technologies and hacking techniques (software and hardware). It considers both the theoretical and experimental aspects of computer virology and of the different techniques and approaches used by hackers.

The topics covered by this journal include but are not limited to the mathematical aspects and theoretical fundamentals of computer virology; algorithmics and computer virology; computer immunology and biological models for computers; reverse engineering (hardware and software); viral and antiviral technologies; cryptology and steganography tools and techniques; applications in computer virology; virology and IDS; hardware hacking, and free and open hardware; operating system, network, and embedded systems security; and social engineering.

While the academic world focuses on scientific methodologies (conciseness, precision and rigor of the scientific method), the hacking world approach focuses primarily on achieving goals and therefore favors the results over the methods, often producing outstanding results with new, innovative and sometimes unorthodox methods.

The goal of the journal is to enable a harmonious synthesis between both worlds and promote constructive research in computer virology and hacking techniques by publishing technical and scientific results, the ultimate objective being proactive research on attacks, through malware or not, and a proactive defense against them.

This journal was previously known as Journal in Computer Virology.

Additional information

Premium Partner

    Image Credits