The role of the adversary model in applied security research

作者: Quang Do , Ben Martini , Kim-Kwang Raymond Choo

DOI: 10.1016/J.COSE.2018.12.002

关键词:

摘要: Abstract Adversary models have been integral to the design of provably-secure cryptographic schemes or protocols. However, their use in other computer science research disciplines is relatively limited, particularly case applied security (e.g., mobile app and vulnerability studies). In this study, we conduct a survey prominent adversary used seminal field cryptography, more recent Internet Things (IoT) research. Motivated by findings from cryptography survey, propose classification scheme for common app-based adversaries research, classify key papers using proposed scheme. Finally, discuss work involving contemporary IoT. We contribute recommendations aid researchers working based upon our literature. The recommendation authors clearly define goals, assumptions capabilities.

参考文章(142)
Oscar Garcia-Morchon, Sye Loong Keoh, Sandeep Kumar, Pedro Moreno-Sanchez, Francisco Vidal-Meca, Jan Henrik Ziegeldorf, Securing the IP-based internet of things with HIP and DTLS wireless network security. pp. 119- 124 ,(2013) , 10.1145/2462096.2462117
Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, Xuxian Jiang, AirBag: Boosting Smartphone Resistance to Malware Infection. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23164
Mihir Bellare, Ran Canetti, Hugo Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) symposium on the theory of computing. pp. 419- 428 ,(1998) , 10.1145/276698.276854
Gábor Pék, Levente Buttyán, Boldizsár Bencsáth, A survey of security issues in hardware virtualization ACM Computing Surveys. ,vol. 45, pp. 40- ,(2013) , 10.1145/2480741.2480757
Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater, Provably authenticated group Diffie-Hellman key exchange Proceedings of the 8th ACM conference on Computer and Communications Security - CCS '01. pp. 255- 264 ,(2001) , 10.1145/501983.502018
Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen C. Williams, Composability of bellare-rogaway key exchange protocols Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 51- 62 ,(2011) , 10.1145/2046707.2046716
Chia-Chi Lin, Hongyang Li, Xiaoyong Zhou, XiaoFeng Wang, Screenmilker: How to Milk Your Android Screen for Secrets. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23049
Michael Backes, Birgit Pfitzmann, Michael Waidner, The reactive simulatability (RSIM) framework for asynchronous systems Information & Computation. ,vol. 205, pp. 1685- 1720 ,(2007) , 10.1016/J.IC.2007.05.002
R.A. Kemmerer, Analyzing encryption protocols using formal verification techniques IEEE Journal on Selected Areas in Communications. ,vol. 7, pp. 448- 457 ,(1989) , 10.1109/49.17707
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu, VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images computer and communications security. pp. 146- 157 ,(2015) , 10.1145/2810103.2813720