Paper 2018/1189
The Role of the Adversary Model in Applied Security Research
Quang Do, Ben Martini, and Kim-Kwang Raymond Choo
Abstract
Adversary models have been integral to the design of provably-secure cryptographic schemes or protocols. However, their use in other computer science research disciplines is relatively limited, particularly in the case of applied security research (e.g., mobile app and vulnerability studies). In this study, we conduct a survey of prominent adversary models used in the seminal field of cryptography, and more recent mobile and Internet of Things (IoT) research. Motivated by the findings from the cryptography survey, we propose a classification scheme for common app-based adversaries used in mobile security research, and classify key papers using the proposed scheme. Finally, we discuss recent work involving adversary models in the contemporary research field of IoT. We contribute recommendations to aid researchers working in applied (IoT) security based upon our findings from the mobile and cryptography literature. The key recommendation is for authors to clearly define adversary goals, assumptions and capabilities.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. Computers & Security
- DOI
- 10.1016/j.cose.2018.12.002
- Keywords
- Adversary modelMobile securityIoT security
- Contact author(s)
- raymond choo @ fulbrightmail org
- History
- 2018-12-10: received
- Short URL
- https://ia.cr/2018/1189
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/1189, author = {Quang Do and Ben Martini and Kim-Kwang Raymond Choo}, title = {The Role of the Adversary Model in Applied Security Research}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/1189}, year = {2018}, doi = {10.1016/j.cose.2018.12.002}, url = {https://eprint.iacr.org/2018/1189} }