Paper 2018/1189

The Role of the Adversary Model in Applied Security Research

Quang Do, Ben Martini, and Kim-Kwang Raymond Choo

Abstract

Adversary models have been integral to the design of provably-secure cryptographic schemes or protocols. However, their use in other computer science research disciplines is relatively limited, particularly in the case of applied security research (e.g., mobile app and vulnerability studies). In this study, we conduct a survey of prominent adversary models used in the seminal field of cryptography, and more recent mobile and Internet of Things (IoT) research. Motivated by the findings from the cryptography survey, we propose a classification scheme for common app-based adversaries used in mobile security research, and classify key papers using the proposed scheme. Finally, we discuss recent work involving adversary models in the contemporary research field of IoT. We contribute recommendations to aid researchers working in applied (IoT) security based upon our findings from the mobile and cryptography literature. The key recommendation is for authors to clearly define adversary goals, assumptions and capabilities.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Computers & Security
DOI
10.1016/j.cose.2018.12.002
Keywords
Adversary modelMobile securityIoT security
Contact author(s)
raymond choo @ fulbrightmail org
History
2018-12-10: received
Short URL
https://ia.cr/2018/1189
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/1189,
      author = {Quang Do and Ben Martini and Kim-Kwang Raymond Choo},
      title = {The Role of the Adversary Model in Applied Security Research},
      howpublished = {Cryptology {ePrint} Archive, Paper 2018/1189},
      year = {2018},
      doi = {10.1016/j.cose.2018.12.002},
      url = {https://eprint.iacr.org/2018/1189}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.