2023
DOI: 10.48550/arxiv.2301.05653
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Threat Models over Space and Time: A Case Study of E2EE Messaging Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
1
0
Order By: Relevance
“…Chaudhary et al the. Worked on a short-lived threat model to gain acceptance against PC clients and performed an estimation impact analysis of two popular risk evocation frameworks, STRIDE and LINDDUN [18]. The results show that the machine developer wants to understand the adversary in the evolving context within the systems function and, more importantly, mitigate it by re-certifying the boundaries in such a way that those within the administrative boundaries cannot violate their protective and private properties.…”
Section: De Masi Et Al Developed Different Data Collection Approaches...mentioning
confidence: 99%
“…Chaudhary et al the. Worked on a short-lived threat model to gain acceptance against PC clients and performed an estimation impact analysis of two popular risk evocation frameworks, STRIDE and LINDDUN [18]. The results show that the machine developer wants to understand the adversary in the evolving context within the systems function and, more importantly, mitigate it by re-certifying the boundaries in such a way that those within the administrative boundaries cannot violate their protective and private properties.…”
Section: De Masi Et Al Developed Different Data Collection Approaches...mentioning
confidence: 99%
“…That exposed users of desktop clients to various threats [85]. Particularly in the context of victims of intimate partner violence or users of managed devices [86]. This means that with the evolution of features to existing security mechanisms like MFA to enable wider participation of disadvantaged groups needs to be accompanied by appropriate scoping of emergent threats.…”
mentioning
confidence: 99%
“…Communication of breaches and their subsequent recovery can be looked from the wider prism of security audit functions [87]. A scrutiny of the E2EE mechanisms reveal that some of them expect the user to detect and recover from breaches while some others leave the user out of the loop to detect such breaches and recover from them [86]. There needs to be mechanisms to communicate threats, breaches and recovery in a manner appropriate to the deprivations of the individuals they are meant to protect.…”
mentioning
confidence: 99%