2019
DOI: 10.1016/j.cose.2018.12.002
|View full text |Cite
|
Sign up to set email alerts
|

The role of the adversary model in applied security research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
43
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 91 publications
(44 citation statements)
references
References 40 publications
0
43
0
1
Order By: Relevance
“…Regarding the threat model and similarly than in [7], we assume the well-known Dolev-Yao cryptographic model. Note that the model mentioned above is one the most common adversary models used to verify IoT proposals [26]. Conforming the model, the communication channel between the IMD and the Programmer is bidirectional and occurs via 2168-6750 (c) 2020 IEEE.…”
Section: Methodsmentioning
confidence: 99%
“…Regarding the threat model and similarly than in [7], we assume the well-known Dolev-Yao cryptographic model. Note that the model mentioned above is one the most common adversary models used to verify IoT proposals [26]. Conforming the model, the communication channel between the IMD and the Programmer is bidirectional and occurs via 2168-6750 (c) 2020 IEEE.…”
Section: Methodsmentioning
confidence: 99%
“…Table 2. Threat actors for the autonomous docking based on [64] with the dimensions from [65] Threat Actors…”
Section: Use Casementioning
confidence: 99%
“…The attacks can now be performed by an individual or group of threat actors, organisations, or nations/states, driven by various motivations from personal satisfaction, ideology, financial gain to state rivalry [73]. A categorisation of threat actors is presented in NIST's Guide for Conducting Risk Assessments [64], and the corresponding dimensions have been presented in [65]. In our autonomous docking use case, the threat actors may potentially hinder or attack the system.…”
Section: Use Casementioning
confidence: 99%
“…Even if its removal is made possible that can only be done at the cost of demeaning the concerned host data medium. Several watermarking applications, for example, copyright protection or source authentication may have an active adversary [33]. These stated groups may participate in making several attempts that removes, forges, or invalidates the embedded watermarks.…”
Section: -Hash Functionsmentioning
confidence: 99%