Volume 15 (2023)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices

Amir Ashtari; Ahmad Shabani; Bijan Alizadeh

Volume 14, Issue 3 , October 2022, Pages 1-8

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  This paper presents a novel RF-PUF-based authentication scheme, called RKM-PUF which takes advantage of a dynamic random key generation that depends upon both communication parties in the network to detect intrusion attacks. Unlike the existing authentication schemes, our proposed approach takes the ...  Read More

Research Article
Practical Differential Fault Analysis on SKINNY

Navid Vafaei; Maryam Porkar; Hamed Ramzanipour; Nasour Bagheri

Volume 14, Issue 3 , October 2022, Pages 9-19

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  SKINNY is a lightweight tweakable block cipher that for the first time introduced in CRYPTO 2016. SKINNY is considered in two block sizes: 64 bits and 128 bits, as well as three TWEAK versions. In the beginning, this paper reflects our findings that improve the effectiveness of DFA analysis on SKINNY, ...  Read More

Research Article
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher

Hamed Ramzanipour; Navid Vafaei; Nasour Bagheri

Volume 14, Issue 3 , October 2022, Pages 21-31

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  Differential fault analysis, a kind of active non-invasive attack, is an effective way of analyzing cryptographic primitives that have lately earned more attention. In this study, we apply this attack on CRAFT, a recently proposed lightweight tweakable block cipher, supported by simulation and experimental ...  Read More

Research Article
On the Suitability of Improved TrustChain for Smartphones

Seyed Salar Ghazi; Haleh Amintoosi; Sahar Pilevar Moakhar

Volume 14, Issue 3 , October 2022, Pages 33-42

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  In recent years, blockchain technology has been used in many fields, including IoT and Smartphones. Since most of these devices are battery constrained and have low processing capabilities, conventional blockchains are not suitable for these types of systems. In this field, critical challenges that need ...  Read More

Research Article
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems

Mohammad Ali

Volume 14, Issue 3 , October 2022, Pages 43-49

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  Remote data auditing (RDA) protocols enable a cloud server to persuade an auditor that it is storing a data file honestly. Unlike digital signature(DS) schemes, in RDA protocols, the auditor can carry out the auditing procedure without having the entire data file. Therefore, RDA protocols seem to be ...  Read More

Research Article
Android Malware Detection Using One-Class Graph Neural Networks

Fatemeh Deldar; Mahdi Abadi; Mohammad Ebrahimifard

Volume 14, Issue 3 , October 2022, Pages 51-60

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  With the widespread use of Android smartphones, the Android platform has become an attractive target for cybersecurity attackers and malware authors. Meanwhile, the growing emergence of zero-day malware has long been a major concern for cybersecurity researchers. This is because malware that has not ...  Read More

Research Article
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System

Amirhosein Sayyadabdi; Behrouz Tork Ladani; Bahman Zamani

Volume 14, Issue 3 , October 2022, Pages 61-69

https://doi.org/10.22042/isecure.2022.14.3.0

Abstract
  Android is a widely used operating system that employs a permission-based access control model. The Android Permissions System (APS) is responsible for mediating application resource requests. APS is a critical component of the Android security mechanism; hence, a failure in the design of APS can potentially ...  Read More

Research Article
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel

Hadi Aghaee; Bahareh Akhbari

Volume 14, Issue 3 , October 2022, Pages 71-80

https://doi.org/10.22042/isecure.2022.14.3.0

Abstract
  In this paper, we want to derive achievable secrecy rate regions for quantum interference channels with classical inputs under a one-shot setting. The main idea to this end is to use the combination of superposition and rate splitting for the encoding scheme and construct a decoding scheme based on simultaneous ...  Read More

Research Article
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach
Volume 14, Issue 3 , October 2022, Pages 81-92

https://doi.org/10.22042/isecure.2022.14.3.0

Abstract
  Today, with the advancement of science and technology, the use of smartphones has become very common, and the Android operating system has been able to gain lots of popularity in the meantime. However, these devices face manysecurity challenges, including malware. Malware may cause many problems in both ...  Read More