Skip to main content
. 2021 Feb 3;7:e362. doi: 10.7717/peerj-cs.362

Table 9. Loss scenarios of IFBs.

Identified loss scenarios of the listed IFBs in Table 8.

IFBs GW: function itself GW: environment
Phone_Func1_IFB1 / Phone_Func1_IFB1_LS1
Phone_Func1_IFB2 / Phone_Func1_IFB2_LS1
Phone_Func1_IFB3 Phone_Func1_IFB3_LS1 /
Phone_Func1_IFB4 Phone_Func1_IFB4_LS1 Phone_Func1_IFB4_LS2, Phone_Func1_IFB4_LS3
LS Description:
Phone_Func1_IFB1_LS1: Function is bypassed but returns a fake OK result
Phone_Func1_IFB2_LS1: Valid key is replaced by a forged one
Phone_Func1_IFB3_LS1: Algorithm is maliciously modified by the attacker
Phone_Func1_IFB4_LS1: Algorithm is maliciously modified by the attacker, which requires more computing resource
Phone_Func1_IFB4_LS2: Input length exceeds the limitation but is not detected
Phone_Func1_IFB4_LS3: Computing resource is occupied by others maliciously