Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Safety Guards for Ethereum Smart Contracts

Morteza Amirmohseni; Sadegh Dorri Nogoorani

Volume 16, Issue 1 , January 2024, , Pages 37-53

https://doi.org/10.22042/isecure.2023.365808.846

Abstract
  Smart contracts are applications that are deployed on a blockchain and can be executed through transactions. The code and the state of the smart contracts are persisted on the ledger, and their execution is validated by all blockchain nodes. Smart contracts often hold and manage amounts of cryptocurrency. ...  Read More

Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study

Mohammed S. Albulayhi; Dina M. Ibrahim

Volume 13, Issue 3 , November 2021, , Pages 59-67

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  The Open Web Application Security Project (OWASP) is a nonprofit organization battling for the improvements of software protection and enhancing the security of web applications. Moreover, its goal is to make application security “accessible” so that individuals and organizations can make ...  Read More

IDOT: Black-Box Detection of Access Control Violations in Web Applications

Mohammad Ali Hadavi; Arash Bagherdaei; Simin Ghasemi

Volume 13, Issue 2 , July 2021, , Pages 117-129

Abstract
  < p>Automatic detection of access control violations in software applications is a challenging problem. Insecure Direct Object Reference (IDOR) is among top-ranked vulnerabilities, which violates access control policies and cannot be yet detected by automated vulnerability scanners. While such ...  Read More

A collusion attack on the fuzzy vault scheme

H. T. Poon; A. Miri

Volume 1, Issue 1 , January 2009, , Pages 27-34

https://doi.org/10.22042/isecure.2015.1.1.4

Abstract
  The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that ...  Read More