Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
1. Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud

Aniseh Najafi; Majid Bayat; Hamid Haj Seyyed Javadi

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 87-100


  The advent of cloud computing in the healthcare system makes accuracy and speed increased, costs reduced, and health services widely used. However, system users are always seriously concerned about the security of outsourced data. The ciphertext-policy attribute-based encryption (CP-ABE) is a promising ...  Read More

Research Article
2. File Fragment Type Classification by Bag-Of-Visual-Words

Mina Erfan; Saeed Jalili

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 101-116


  File fragments’ type classification in the absence of header and file system information, is a major building block in various solutions devoted to file carving, memory analysis and network forensics. Over the past decades, a substantial amount of effort has been put into developing methods to ...  Read More

Research Article
3. IDOT: Black-Box Detection of Access Control Violations in Web Applications

Mohammad Ali Hadavi; Arash Bagherdaei; Simin Ghasemi

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 117-129

  < p>Automatic detection of access control violations in software applications is a challenging problem. Insecure Direct Object Reference (IDOR) is among top-ranked vulnerabilities, which violates access control policies and cannot be yet detected by automated vulnerability scanners. While such ...  Read More

Research Article
4. Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware

Hayyan Hasan; Behrouz Tork Ladani; Bahman Zamani

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 131-143


  Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the most popular event generator for Android apps in general, and is used in dynamic ...  Read More

Research Article
5. Blind Multipurpose Image Watermarking with Perfect Security

Sorour Sheidani; Ziba Eslami

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 145-156


  Nowadays, from one hand multimedia authentication techniques are widely used to achieve trustworthiness, on the other hand, due to the rapid growth of image processing software technologies, having a secure method to protect the copyright of these data seems fairly essential. Multipurpose watermarking ...  Read More

Short Paper
6. An Obfuscation Method Based on CFGLUTs for Security of FPGAs

Mansoureh Labafniya; Shahram Etemadi Borujeni

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 157-162


  There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is obfuscation methods. In this paper, we proposed an approach based on obfuscation to prevent FPGAs from successful reverse engineering and, as a result, Hardware Trojan Horses (HTHs) insertion. ...  Read More

Research Article
7. Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks

Milad Salimian; Ali Jahanian

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 163-176


  Side-channel analysis methods can reveal the secret information of digital electronic systems by analyzing the dependency between the power consumption of implemented cryptographic algorithms and the secret data. Recent studies show that it is possible to gather information about power consumption from ...  Read More

Research Article
8. Better Sampling Method of Enumeration Solution for BKZ-Simulation

Gholam Reza Moghissi; Ali Payandeh

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 177-208


  The exact manner of BKZ algorithm for higher block sizes cannot be studied by practical running, so simulation of BKZ can be used to predict the total cost and output quality of BKZ algorithm. Sampling method of enumeration solution vector v is one of the main components of designing BKZ-simulation and ...  Read More