Skip to main content


International Journal of Information Security

International Journal of Information Security OnlineFirst articles

22.02.2018 | Regular Contribution

Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM

Secure elements store and manipulate assets in a secure way. The most attractive assets are the cryptographic keys stored into the memory that can be used to provide secure services to a system. For this reason, secure elements are prone to …

16.02.2018 | Regular Contribution

Differential audio analysis: a new side-channel attack on PIN pads

This paper introduces a low-cost side-channel attack that identifies the pressed key of tamper-proof mechanical keypads by exploiting the sound that emanates from the pressed key. Classical sound-based attacks usually identify the pressed key …

13.02.2018 | Regular Contribution

Hiding information against structural re-identification

Connections between users of social networking services pose a significant privacy threat. Recently, several social network de-anonymization attacks have been proposed that can efficiently re-identify users at large scale, solely considering the …

01.02.2018 | Regular Contribution

Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications

Despite the prevalence and the high impact of command injection attacks, little attention has been given by the research community to this type of code injections. Although there are many software tools to detect and exploit other types of code …

19.12.2017 | Regular Contribution

Talos: no more ransomware victims with formal methods

Ransomware is a very effective form of malware that is recently spreading out on an impressive number of workstations and smartphones. This malware blocks the access to the infected machine or to the files located in the infected machine. The …

Aktuelle Ausgaben

Über diese Zeitschrift

The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation.

Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility; and foundations: privacy, access control, authentication, identification, applied cryptography, and formal methods in information security.

Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.



Safety & Security – Erfolgsfaktoren von sensitiven Robotertechnologien

Forderungen von Industrie 4.0 nach vollständiger Vernetzung der Systeme geben der "Robotersicherheit" einen besonderen Stellenwert: Hierbei umfasst der deutsche Begriff Sicherheit die – im Englischen einerseits durch Safety umrissene physische Sicherheit – sowie andererseits die durch Security definierte informationstechnische Cyber-Sicherheit. Dieser Fachbeitrag aus der e&i beleuchtet eingehend die wesentlichen Aspekte von Safety und Security in der Robotik.
Jetzt gratis downloaden!