New Insights in Cybersecurity of Information Systems

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Artificial Intelligence".

Deadline for manuscript submissions: 15 May 2024 | Viewed by 979

Special Issue Editors


E-Mail Website
Guest Editor
Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
Interests: bayesian networks; stochastic neural networks; transfer learning
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
Interests: cyber security; data mining

E-Mail
Guest Editor
Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
Interests: temporal graph mining; advanced graph data management; dynamic graph query

Special Issue Information

Dear Colleagues,

In recent years, information systems have been widely used in various domains and have indicated excellent performance; however, there are many security vulnerabilities and risks in their real-world usage. On the one hand, from the perspective of intelligence, the degree of intelligence of information systems is rapidly increasing and its application is gradually changing from a functional level to a decision-making level. Therefore, it is necessary to explore the explainability of flows in information systems. On the other hand, from the perspective of security, as the degree of intelligence increases, information systems are facing increased vulnerabilities and risks (such as counterattacks). Therefore, it is necessary to study the cybersecurity of information systems.

This Special Issue will focus on AI and the security of information systems and covers the applications of artificial intelligence, network security, and resilience theory in information systems, which are important for the development of information systems in the future. This Special Issue will connect experts from artificial intelligence, information systems, and network security communities. We will attempt to highlight recent related works from different communities, clarify the progress of the intelligence and safety of information systems, and chart important directions for future work and cross-community collaborations. We look for new contributions, including theoretical issues and applications of the discipline. Topics of interest include all aspects of system architectures, models and algorithms for cybersecurity, and graph data mining, including, but not limited to, the following detailed list:

  • Security for information systems,
  • AI for cybersecurity,
  • Intelligent systems,
  • Human analysis and behavior understanding,
  • Risk assessment,
  • Vulnerability mining,
  • Adversarial learning,
  • Bayesian networks,
  • Graph data and graph neural networks,
  • Efficient model training, inference, and serving.

Dr. Yun Zhou
Dr. Zhaoyun Ding
Dr. Qianzhen Zhang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • intelligent systems
  • data mining
  • vulnerability mining
  • adversarial learning
  • Bayesian networks

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 782 KiB  
Article
Fine-Grained Modeling of ROP Vulnerability Exploitation Process under Stack Overflow Based on Petri Nets
by Liumei Zhang, Wei Zhang, Yichuan Wang, Bowen Xia and Yu Han
Electronics 2023, 12(23), 4741; https://doi.org/10.3390/electronics12234741 - 22 Nov 2023
Viewed by 636
Abstract
Software vulnerability discovery is currently a hot topic, and buffer overflow remains a prevalent security vulnerability. One of the key issues in vulnerability discovery and analysis is how to quickly analyze buffer overflow vulnerabilities and select critical exploitation paths. Existing modeling methods for [...] Read more.
Software vulnerability discovery is currently a hot topic, and buffer overflow remains a prevalent security vulnerability. One of the key issues in vulnerability discovery and analysis is how to quickly analyze buffer overflow vulnerabilities and select critical exploitation paths. Existing modeling methods for vulnerability exploitation cannot accurately reflect the fine-grained execution process of stack overflow exploitation paths. This paper, based on the discussion of buffer overflow exploitation techniques, proposes a fine-grained modeling and analysis method based on Petri nets for the selection and execution of exploitation processes, specifically focusing on the return-oriented programming in stack overflow. Through qualitative analysis, we compared the simulated time of the software with the execution time of existing exploitation tools, achieving timeout-based simulation experiments. We validated the model’s effectiveness using symbolic execution and dynamic analysis techniques. The results indicate that this model performs well for vulnerable programs with Position Independent Executable (PIE) protection enabled and has an advantage in selecting exploitation paths, enabling timeout-based simulation. This method provides a reference for rapidly constructing exploitation implementations. Full article
(This article belongs to the Special Issue New Insights in Cybersecurity of Information Systems)
Show Figures

Figure 1

Back to TopTop