作者: Quang Do , Ben Martini , Kim-Kwang Raymond Choo
DOI: 10.1016/J.COSE.2018.12.002
关键词:
摘要: Abstract Adversary models have been integral to the design of provably-secure cryptographic schemes or protocols. However, their use in other computer science research disciplines is relatively limited, particularly case applied security (e.g., mobile app and vulnerability studies). In this study, we conduct a survey prominent adversary used seminal field cryptography, more recent Internet Things (IoT) research. Motivated by findings from cryptography survey, propose classification scheme for common app-based adversaries research, classify key papers using proposed scheme. Finally, discuss work involving contemporary IoT. We contribute recommendations aid researchers working based upon our literature. The recommendation authors clearly define goals, assumptions capabilities.