The ISC International Journal of Information Security

ارسال های اخیر

  • Better Sampling Method of Enumeration Solution for BKZ-Simulation 

    Moghissi, Gholam Reza؛ Payandeh, Ali (Iranian Society of Cryptology, 2021-07-01)
    The exact manner of BKZ algorithm for higher block sizes cannot be studied by practical running, so simulation of BKZ can be used to predict the total cost and output quality of BKZ algorithm. Sampling method of enumeration ...

  • Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks 

    Salimian, Milad؛ Jahanian, Ali (Iranian Society of Cryptology, 2021-07-01)
    Side-channel analysis methods can reveal the secret information of digital electronic systems by analyzing the dependency between the power consumption of implemented cryptographic algorithms and the secret data. Recent ...

  • An Obfuscation Method Based on CFGLUTs for Security of FPGAs 

    Labafniya, Mansoureh؛ Etemadi Borujeni, Shahram (Iranian Society of Cryptology, 2021-07-01)
    There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is obfuscation methods. In this paper, we proposed an approach based on obfuscation to prevent FPGAs from ...

  • Blind Multipurpose Image Watermarking with Perfect Security 

    Sheidani, Sorour؛ Eslami, Ziba (Iranian Society of Cryptology, 2021-07-01)
    Nowadays, from one hand multimedia authentication techniques are widely used to achieve trustworthiness, on the other hand, due to the rapid growth of image processing software technologies, having a secure method to protect ...

  • Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware 

    Hasan, Hayyan؛ Tork Ladani, Behrouz؛ Zamani, Bahman (Iranian Society of Cryptology, 2021-07-01)
    Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the ...

  • IDOT: Black-Box Detection of Access Control Violations in Web Applications 

    Hadavi, Mohammad Ali؛ Bagherdaei, Arash؛ Ghasemi, Simin (Iranian Society of Cryptology, 2021-07-01)
    Automatic detection of access control violations in software applications is a challenging problem. Insecure Direct Object Reference (IDOR) is among top-ranked vulnerabilities, which violates access control policies ...

  • File Fragment Type Classification by Bag-Of-Visual-Words 

    Erfan, Mina؛ Jalili, Saeed (Iranian Society of Cryptology, 2021-07-01)
    File fragment's type classification in the absence of header and file system information, is a major building block in various solutions devoted to file carving, memory analysis and network forensics. Over the past decades, ...

  • Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud 

    Najafi, Aniseh؛ Bayat, Majid؛ Haj Seyyed Javadi, Hamid (Iranian Society of Cryptology, 2021-07-01)
    The advent of cloud computing in the healthcare system makes accuracy and speed increased, costs reduced, and health services widely used. However, system users are always seriously concerned about the security of outsourced ...

  • A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis 

    Abazar, Mahdieh؛ Masjedi, Peyman؛ Taheri, Mohammad (Iranian Society of Cryptology, 2022-01-01)
    Steganalysis is an interesting classification problem to discriminate the images, including hidden messages from the clean ones. There are many methods, including deep CNN networks, to extract fine features for this ...

  • Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer 

    Alidoosti, Mitra؛ Nowroozi, Alireza؛ Nickabadi, Ahmad (Iranian Society of Cryptology, 2022-01-01)
    Parallel execution of multiple threads of a web application will result in server-side races if the web application is not synchronized correctly. Server-side race is susceptible to flaws in the relation between the server ...

  • An Efficient Pairing-Free Identity-Based Certificateless Signcryption 

    Banaeian Far, Saeed؛ Rajabzadeh Assar, Maryam (Iranian Society of Cryptology, 2022-01-01)
    A certificateless (CL) signcryption scheme is a cryptographic primitive that provides user authentication and message confidentiality at the same time. CL signcryption schemes (as a type of certificateless encryption scheme) ...

  • A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems 

    Ebrahimi, Mahdieh؛ Bayat, Majid؛ Zahednejad, Behnam (Iranian Society of Cryptology, 2022-01-01)
    The medical system remains among the fastest to adopt the Internet of Things. The reason for this trend is that integration Internet of Things(IoT) features into medical devices greatly improve the quality and effectiveness ...

  • A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack 

    Kordi, Farshideh؛ Hosseintalaee, Hamed؛ Jahanian, Ali (Iranian Society of Cryptology, 2022-01-01)
    The template attack is one of the most efficient attacks for exploiting the secret key. Template-based attack extracts a model for the behavior of side channel information from a device that is similar to the target device ...

  • A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly 

    Mazaheri, Mohammad Erfan؛ Bayat Sarmadi, Siavash؛ Taheri Ardakani, Farhad (Iranian Society of Cryptology, 2022-01-01)
    Side-channel attacks are a group of powerful attacks in hardware security that exploit the deficiencies in the implementation of systems. Timing side-channel attacks are one of the main side-channel attack categories that ...

  • SANT: Static Analysis of Native Threads for Security Vetting of Android Applications 

    Andarzian, Seyed Behnam؛ Tork Ladani, Behrouz (Iranian Society of Cryptology, 2022-01-01)
    Most of the current research on static analysis of Android applications for security vetting either work on Java source code or the Dalvik bytecode. Nevertheless, Android allows developers to use C or C++ code in their ...

  • A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes 

    Oraei, Hossein؛ Hadian Dehkordi, Massoud (Iranian Society of Cryptology, 2022-01-01)
    Digital signature schemes are used to guarantee for non-repudiation and authenticity of any kind of data like documents, messages or software. The Winternitz one-time signature (WOTS) scheme, which can be described using ...

  • Reverse Image-Based Search Engine for IP Trademarks 

    Al-Humaimeedy, Abeer Sulaiman؛ Al-Hammad, Abeer Salman؛ Al-Hudhud, Ghada (Iranian Society of Cryptology, 2020-11-01)
    In a world full of many ideas turning to various kinds of products that need to be protected and here comes the importance of intellectual property rights. Intellectual property has many types however, our interest is in ...

  • A Multilingual Infobot in Airports 

    Al-Hudhud, Ghada؛ Al-Humamidi, Abeer (Iranian Society of Cryptology, 2020-11-01)
    A Chatbot is a smart software that responds to natural language input and attempts to hold a conversation in a way that simulates humans. Chatbots have the potential to save any individual's time, hassle, and tedium by ...

  • Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology 

    Alkenazan, Wafa؛ A. Taha, Ashraf؛ J.F. Alenazi, Mohammed؛ Abdul, Wadood (Iranian Society of Cryptology, 2020-11-01)
    Due to the increasing number of cars and the difficulty to find vacant parking spots easily, the smart parking system is essential to save time and efforts of drivers and to protect the environment from emissions and air ...

  • Knowledge Discovery in Cloud-Computing Environment and the Challenges 

    K. Almazmomi, Najah (Iranian Society of Cryptology, 2020-11-01)
    Today, in the area of telecommunication, social media, the internet of things (IoT), and the virtual world, enormous amounts of data are being generated which are extracted to discover knowledge. Knowledge discovery from ...

View more