با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
The role of the adversary model in applied security research
نقش الگوی مخالف در تحقیقات امنیتی کاربردی-2019 Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines
is relatively limited, particularly in the case of applied security research (e.g., mobile app
and vulnerability studies). In this study, we conduct a survey of prominent adversary models
used in the seminal field of cryptography, and more recent mobile and Internet of Things
(IoT) research. Motivated by the findings from the cryptography survey, we propose a classification
scheme for common app-based adversaries used in mobile security research, and
classify key papers using the proposed scheme. Finally, we discuss recent work involving
adversary models in the contemporary research field of IoT. We contribute recommenda-
tions to aid researchers working in applied (IoT) security based upon our findings from the
mobile and cryptography literature. The key recommendation is for authors to clearly define
adversary goals, assumptions and capabilities. Adversary Model | Applied security | IoT Security | Forensic Adversary Model | Mobile Security |
مقاله انگلیسی |
2 |
Mobile cloud security: An adversary model for lightweight browser security
امنیت ابری موبایل: یک مدل دشمن برای امنیت مرورگر lightweight-2017 Lightweight browsers on mobile devices are increasingly been used to access cloud services and upload / view data stored on the cloud, due to their faster resource loading capabilities. These browsers use client side efficiency measures such as larger cache storage and fewer plugins. However, the impact on data security of such measures is an understudied area. In this paper, we propose an adversary model to examine the security of lightweight browsers. Using the adversary model, we reveal previously unpublished vulnerabilities in four popular light browsers, namely: UC Browser, Dolphin, CM Browser, and Samsung Stock Browser, which allows an attacker to obtain unauthorized access to the user’s private data. The latter include browser history, email content, and bank account details. For example, we also demonstrate that it is possible to replace the images of the cache in one of the browsers, which can be used to facilitate phishing and other fraudulent activities. By identifying the design flaw in these browsers (i.e. improper file storage), we hope that future browser designers can avoid sim- ilar errors.© 2016 Elsevier B.V. All rights reserved. Keywords:Mobile cloud security | Lightweight browser security | UC Browser | Dolphin | CM Browser | Samsung Stock Browser |
مقاله انگلیسی |