Skip to main content


Journal of Computer Virology and Hacking Techniques

Journal of Computer Virology and Hacking Techniques OnlineFirst articles

12.03.2020 | Original Paper

Encryption performance and security of certain wide block ciphers

In a context of enhancing the performance of block encryption algorithms there are two well-known approaches. The first one relates to the construction of block cipher modes of operation. This approach is effective, but it requires a specific …

05.03.2020 | Original Paper

Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws

In order to perform their goals without being detected, Malware should have a battle of wits with the analyzer. Such a way, they use a large variety of stealth methods to perform their missions. These methods allow to slow or block analysis. Most …

13.02.2020 | Original Paper

The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support

Self modifying code (SMC) are code snippets that modify themselves at runtime. Malware use SMC to hide payloads and achieve persistence. Software-based SMC detection solutions impose performance penalties for real-time monitoring and do not …

13.01.2020 | Original Paper

Deep learning for image-based mobile malware detection

Current anti-malware technologies in last years demonstrated their evident weaknesses due to the signature-based approach adoption. Many alternative solutions were provided by the current state of art literature, but in general they suffer of a …

02.01.2020 | Original Paper

Leveraging branch traces to understand kernel internals from within

Kernel monitoring is often a hard task, requiring external debuggers and/or modules to be successfully performed. These requirements make analysis procedures more complicated because multiple machines, although virtualized ones, are required. This …

Aktuelle Ausgaben

Über diese Zeitschrift

The Journal of Computer Virology and Hacking Techniques is an independent academic and technical journal dedicated to viral and antiviral computer technologies and hacking techniques (software and hardware). It considers both the theoretical and experimental aspects of computer virology and of the different techniques and approaches used by hackers.

The topics covered by this journal include but are not limited to the mathematical aspects and theoretical fundamentals of computer virology; algorithmics and computer virology; computer immunology and biological models for computers; reverse engineering (hardware and software); viral and antiviral technologies; cryptology and steganography tools and techniques; applications in computer virology; virology and IDS; hardware hacking, and free and open hardware; operating system, network, and embedded systems security; and social engineering.

While the academic world focuses on scientific methodologies (conciseness, precision and rigor of the scientific method), the hacking world approach focuses primarily on achieving goals and therefore favors the results over the methods, often producing outstanding results with new, innovative and sometimes unorthodox methods.

The goal of the journal is to enable a harmonious synthesis between both worlds and promote constructive research in computer virology and hacking techniques by publishing technical and scientific results, the ultimate objective being proactive research on attacks, through malware or not, and a proactive defense against them.

This journal was previously known as Journal in Computer Virology.

Weitere Informationen

Premium Partner