Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
ORIGINAL RESEARCH PAPER
2. An efficient certificateless signcryption scheme in the standard model

P. Rastegari; M. Berenjkoub

Volume 9, Issue 1 , Winter and Spring 2017, Pages 3-16

http://dx.doi.org/10.22042/isecure.2017.70117.368

Abstract
  Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. ...  Read More

ORIGINAL RESEARCH PAPER
3. Side channel parameter characteristics of code injection attacks

E. Aerabi; M. Kaykha; M. Fazeli; A. Patooghy; A. Akbari

Volume 9, Issue 1 , Winter and Spring 2017, Pages 17-26

http://dx.doi.org/10.22042/isecure.2017.0.0.5

Abstract
  Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics ...  Read More

ORIGINAL RESEARCH PAPER
4. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

A. R. Ahadipour; A. R. Keshavarz-Haddad

Volume 9, Issue 1 , Winter and Spring 2017, Pages 27-39

http://dx.doi.org/10.22042/isecure.2017.0.0.1

Abstract
  Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios ...  Read More

ORIGINAL RESEARCH PAPER
5. A new security proof for FMNV continuous non-malleable encoding scheme

A. Mortazavi; M. Salmasizadeh; A. Daneshgar

Volume 9, Issue 1 , Winter and Spring 2017, Pages 41-51

http://dx.doi.org/10.22042/isecure.2017.74050.371

Abstract
  A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting ...  Read More

ORIGINAL RESEARCH PAPER
6. Dwarf Frankenstein is still in your memory: tiny code reuse attacks

A.A Sadeghi; F. Aminmansour; H.R. Shahriari

Volume 9, Issue 1 , Winter and Spring 2017, Pages 53-72

http://dx.doi.org/10.22042/isecure.2017.0.0.4

Abstract
  Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation ...  Read More

ORIGINAL RESEARCH PAPER
7. An automatic test case generator for evaluating implementation of access control policies

M. Safarzadeh; M. Taghizadeh; B. Zamani; B. Tork Ladani

Volume 9, Issue 1 , Winter and Spring 2017, Pages 73-91

http://dx.doi.org/10.22042/isecure.2017.0.0.3

Abstract
  One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access ...  Read More