Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System

Amirhosein Sayyadabdi; Behrouz Tork Ladani; Bahman Zamani

Volume 14, Issue 3 , October 2022, , Pages 61-69

https://doi.org/10.22042/isecure.2022.14.3.7

Abstract
  Android is a widely used operating system that employs a permission-based access control model. The Android Permissions System (APS) is responsible for mediating application resource requests. APS is a critical component of the Android security mechanism; hence, a failure in the design of APS can potentially ...  Read More

Design and formal verification of DZMBE+

M. Soodkhah Mohammadi; A. Ghaemi Bafghi

Volume 5, Issue 1 , January 2013, , Pages 37-53

https://doi.org/10.22042/isecure.2013.5.1.3

Abstract
  In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense ...  Read More