2018
DOI: 10.1109/tifs.2017.2738609
|View full text |Cite
|
Sign up to set email alerts
|

DECIM: Detecting Endpoint Compromise In Messaging

Abstract: Abstract-We present DECIM, an approach to solve the challenge of detecting endpoint compromise in messaging. DECIM manages and refreshes encryption/decryption keys in an automatic and transparent way: it makes it necessary for uses of the key to be inserted in an append-only log, which the device owner can interrogate in order to detect misuse.We propose a multi-device messaging protocol that exploits our concept to allow users to detect unauthorised usage of their device keys. It is co-designed with a formal … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…Recently, another researcher proposed a model Hybridroid [7] based on static and dynamic analysis that detect privacy leakage with the 97.8% precision in android applications. In addition DECIM [51], assure additional safety layer even attackers bypass the security of all keys in message transfer protocol. The grabby android applications [52] that drain mobile phone resources in which battery, storage, CPU, memory and data are vibrant.…”
Section: Threat Clustersmentioning
confidence: 99%
“…Recently, another researcher proposed a model Hybridroid [7] based on static and dynamic analysis that detect privacy leakage with the 97.8% precision in android applications. In addition DECIM [51], assure additional safety layer even attackers bypass the security of all keys in message transfer protocol. The grabby android applications [52] that drain mobile phone resources in which battery, storage, CPU, memory and data are vibrant.…”
Section: Threat Clustersmentioning
confidence: 99%
“…Furthermore, the privacy problem is transferred to applications or protocols that use CT as a basis or follow the same architectural design. One such application is DECIM [45], which aims to detect the compromise of endpoints in messaging scenarios. DECIM provides a key management protocol based on CT and enables users to refresh and manage keys in a transparent manner.…”
Section: B Privacy Challenges With Ctmentioning
confidence: 99%
“…Transparency overlays and related public log-based systems [3,4,8,17,24,25] are designed to make participants' behaviour public through the use of a third-party log, enabling misuse detection on the basis of acausal observations. To avoid having to trust the log maintainer, transparency overlays set up the log structure so that the maintainer must be able to prove that any two authenticated log states are consistent with each other.…”
Section: Improving Detection In Transparency Overlaysmentioning
confidence: 99%