Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2024
PBDG: a malicious code detection method based on precise behaviour dependency graph
International Journal of Information and Computer Security (IJICS), Volume 23, Issue 2Pages 163–189https://doi.org/10.1504/ijics.2024.137719Using behaviour association or dependency to detect malicious code can improve the recognition rate of malicious code. A malicious code detection method based on precise behaviour dependency graph (PBDG) is proposed. We create a stain file index by ...
- research-articleFebruary 2024
Priority-based security-aware virtual machine allocation policy
International Journal of Information and Computer Security (IJICS), Volume 23, Issue 1Pages 40–56https://doi.org/10.1504/ijics.2024.136715Rapid expansion of cloud computing raises several issues, including loss of quality of service (QoS) due to resource sharing and increased security concerns to virtual machines (VMs) resulting from co-residency with other vulnerable VMs on the same ...
- research-articleJanuary 2023
Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud
International Journal of Information and Computer Security (IJICS), Volume 22, Issue 3-4Pages 298–322https://doi.org/10.1504/ijics.2023.135896Advanced technology is the cloud computing that has the ability to preserve massive amount of data and shares the data resources over the internet. Cloud computing has a wide range of applications like business fields, software infrastructure, government ...
- research-articleJanuary 2023
Formal verification of software-only mechanisms for live migration of SGX enclaves
International Journal of Information and Computer Security (IJICS), Volume 22, Issue 2Pages 230–261https://doi.org/10.1504/ijics.2023.134965Live migration is not supported by current Intel® SGX implementations. So, software emulation is unavoidable to enable deployed hypervisors migrating live virtual machines running SGX enclaves in the cloud. However, copying the running state of an enclave ...
- research-articleJanuary 2023
An approach for secure data transmission in smart grids
International Journal of Information and Computer Security (IJICS), Volume 20, Issue 3-4Pages 348–365https://doi.org/10.1504/ijics.2023.128830Smart grids (SG) require data compression and encryption algorithms to communicate large amount of data in the secure way. However, existing algorithms are not appropriate for smart grid as they consume huge memory and take significant amount of execution ...
-
- research-articleJanuary 2023
CloudSec (3FA): a multifactor with dynamic click colour-based dynamic authentication for securing cloud environment
International Journal of Information and Computer Security (IJICS), Volume 20, Issue 3-4Pages 269–294https://doi.org/10.1504/ijics.2023.128827Availability, scalability, and security are the main concerns in a cloud environment and so it undergoes various challenges in the availability and security of sensitive and critical data stored in it. Multifactor authentication is one solution that ...
- research-articleJanuary 2023
Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment
International Journal of Information and Computer Security (IJICS), Volume 20, Issue 3-4Pages 315–348https://doi.org/10.1504/ijics.2023.128826Data storage is one of the major applications of vehicular cloud computing (VCC) where the data is shared concurrently among many vehicles participating in vehicular communications. Integrity and non-repudiation are some of the important security ...
- research-articleJanuary 2022
Correlation power analysis attack on software implementation of TRIVIUM stream cipher
International Journal of Information and Computer Security (IJICS), Volume 19, Issue 3-4Pages 379–401https://doi.org/10.1504/ijics.2022.127156Power analysis attacks are a category of attacks against cryptographic implementations. In this case, the power consumption of a cryptosystem is analysed to extract its secret values such as secret keys and key streams. This has become a huge threat to ...
- research-articleJanuary 2022
Game theory approach for analysing attack graphs
International Journal of Information and Computer Security (IJICS), Volume 19, Issue 3-4Pages 305–320https://doi.org/10.1504/ijics.2022.127139Many real problems involve the simultaneous security of computer networks and systems as it penetrates all areas of our daily lives. The purpose of attack graph analysis is to be able to protect computer systems and networks against attacks related to ...
- research-articleJanuary 2022
Obfuscated code is identifiable by a token-based code clone detection technique
International Journal of Information and Computer Security (IJICS), Volume 19, Issue 3-4Pages 254–273https://doi.org/10.1504/ijics.2022.127132Recently, developers use obfuscation techniques to make their code difficult to understand or analyse, especially malware developers. In Android applications, if the application is obfuscated, it is hard to retrieve the exact source code after applying ...
- research-articleJanuary 2022
GENDroid - a graph-based ensemble classifier for detecting Android malware
International Journal of Information and Computer Security (IJICS), Volume 18, Issue 3-4Pages 327–347https://doi.org/10.1504/ijics.2022.125279Recent years have witnessed a noticeable growth in the development of stealthy Android-based malware which has led to a pressing need for accurate malware detection systems. In this paper, we propose a graph-based ensemble classifier - GENDroid that ...
- research-articleJanuary 2022
Managing vulnerabilities during the development of a secure ETL processes
International Journal of Information and Computer Security (IJICS), Volume 18, Issue 1-2Pages 75–104https://doi.org/10.1504/ijics.2022.122914Vulnerabilities in information systems (ISs) are high-value assets to a cybercriminal. These vulnerabilities can be targeted for exploitation which results in unauthorised access to the IS. Due to the increasing demand of preventing cyber-crimes, ...
- research-articleJanuary 2022
FFRR: a software diversity technique for defending against buffer overflow attacks
International Journal of Information and Computer Security (IJICS), Volume 18, Issue 1-2Pages 40–74https://doi.org/10.1504/ijics.2022.122913To date, several software diversity techniques have been proposed as defence to buffer overflow attacks. The existing diversity techniques sometimes rely on hardware support or modifications to operating system which makes them difficult to deploy. ...
- research-articleJanuary 2022
A hierarchical particle swarm optimisation algorithm for cloud computing environment
International Journal of Information and Computer Security (IJICS), Volume 18, Issue 1-2Pages 12–26https://doi.org/10.1504/ijics.2022.122911Production scheduling and vehicle routing are integrated to solve a task scheduling problem with a timing requirement in cloud computing. The issues of multiple compute resources for a lot of tasks are considered. In the tasks scheduling problem, each ...
- research-articleJanuary 2022
Extracting malicious behaviours
International Journal of Information and Computer Security (IJICS), Volume 17, Issue 3-4Pages 365–404https://doi.org/10.1504/ijics.2022.122380In recent years, the damage cost caused by malwares is huge. Thus, malware detection is a big challenge. The task of specifying malware takes a huge amount of time and engineering effort since it currently requires the manual study of the malicious code. ...
- research-articleJanuary 2022
Adaptive steganographic scheme using a variable matrix embedding
International Journal of Information and Computer Security (IJICS), Volume 17, Issue 3-4Pages 231–260https://doi.org/10.1504/ijics.2022.122373Steganography is the art of concealing secret information within digital media. In this paper, an adaptive steganographic scheme based on Faber-Schauder discrete wavelet transform (DWT) is proposed. Data is hidden in the details coefficients, which are ...
- research-articleJanuary 2022
Detecting over-claim permissions and recognising dangerous permission in Android apps
International Journal of Information and Computer Security (IJICS), Volume 17, Issue 1-2Pages 204–218https://doi.org/10.1504/ijics.2022.121298Android's security is one of the hot research topics in the current days. This is mainly due to the leakage of user's privacy information from third-party apps on mobile. Even after the permission model defined by Android we all are witnessing leakage of ...
- research-articleJanuary 2022
Generalised multi release framework for fault determination with fault reduction factor
International Journal of Information and Computer Security (IJICS), Volume 17, Issue 1-2Pages 164–178https://doi.org/10.1504/ijics.2022.121296The huge dependability on software systems has led to the need of reliable software in a short span of time. One of the ways to achieve this is to provide a series of versions of the software system. Thus, firms release the first software version with the ...
- research-articleJanuary 2022
ExOShim: preventing memory disclosure using execute-only kernel code
International Journal of Information and Computer Security (IJICS), Volume 17, Issue 1-2Pages 57–82https://doi.org/10.1504/ijics.2022.121291Information leakage and memory disclosure are major threats to the security in modern computer systems. If an attacker is able to obtain the binary-code of an application, it is possible to reverse-engineer the source-code, uncover vulnerabilities, craft ...
- research-articleJanuary 2021
Vulnerability discovery modelling: a general framework
International Journal of Information and Computer Security (IJICS), Volume 16, Issue 1-2Pages 192–206https://doi.org/10.1504/ijics.2021.117402Due to the rising popularity of software-based systems, software engineers are required to continuously monitor the software to have deep insights about the loopholes and keep a close check on the vulnerability discovery process. Over time of each module ...