Volume 9, Issue 1
مرور بر اساس
ارسال های اخیر
-
Dwarf Frankenstein is still in your memory: tiny code reuse attacks
(Iranian Society of Cryptology, 2017-01-01)Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ ...
-
Persian Abstract
(Iranian Society of Cryptology, 2017-01-01)Persian abstracts of the issue's article
-
An automatic test case generator for evaluating implementation of access control policies
(Iranian Society of Cryptology, 2017-01-01)One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such ...
-
An efficient certificateless signcryption scheme in the standard model
(Iranian Society of Cryptology, 2017-01-01)Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing ...
-
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
(Iranian Society of Cryptology, 2017-01-01)Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although ...
-
A new security proof for FMNV continuous non-malleable encoding scheme
(Iranian Society of Cryptology, 2017-01-01)A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about ...
-
Side channel parameter characteristics of code injection attacks
(Iranian Society of Cryptology, 2017-01-01)Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited ...



