NSPK Protocol Security Model Checking System Builder

被引:0
|
作者
Yan, Wang [1 ]
Ying, Liu
机构
[1] Zhongzhou Univ, Informat Engn Coll, Zhengzhou 450044, Peoples R China
关键词
cryptographic protocols; formal analysis; model checking; UPPAAL;
D O I
10.14257/ijsia.2015.9.7.28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocols are based cryptosystems based on interactive communication protocol, running on computer communication networks or distributed systems, by means of cryptographic algorithms to achieve key distribution, authentication and other purposes. In the safety analysis, model checking technology has a high degree of automation, can provide advantages such as counter-examples. The key application of model checking techniques cryptographic protocol analysis is that the full optimization model checking tools for modeling cryptographic protocols, especially for modeling intruders. Using symbolic model checking techniques and model checking tool UPPAAL automatic machine modeling, it is beneficial for the security of cryptographic protocols for analysis testing.
引用
收藏
页码:307 / 315
页数:9
相关论文
共 50 条
  • [1] Model checking the security of multi-protocol systems
    Panti, M
    Spalazzi, L
    Tacconi, S
    Pagliarecci, F
    2005 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2005, : 92 - 99
  • [2] Security analysis of TLS protocol implementations based on model checking
    Bi X.
    Tang C.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (03): : 839 - 846
  • [3] Checking security properties by model checking
    De Francesco, N
    Lettieri, G
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2003, 13 (03): : 181 - 196
  • [4] Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification
    Patel, Reema
    Borisaniya, Bhavesh
    Patel, Avi
    Patel, Dhiren
    Rajarajan, Muttukrishnan
    Zisman, Andrea
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 152 - +
  • [5] Adjusted automata learning algorithm for security protocol adaptive model checking
    Yang, Jing
    Fan, Dan
    Zhang, Yu-Qing
    Tongxin Xuebao/Journal on Communications, 2015, 36
  • [6] Formal specification and security verification of the IDKE protocol using FDR model checking
    Soltwisch, R
    Tegeler, F
    Hogrefe, D
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334
  • [7] Formal security analysis of Ariadne secure routing protocol using model checking
    Onem, E.
    Gurdag, A. Burak
    Caglayan, M. Ufuk
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (01) : 12 - 24
  • [8] The Application of Model Checking in Validating Information System Software Security
    Liu Xin
    Cai Wandong
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 448 - 451
  • [9] Model checking grid security
    Pagliarecci, F.
    Spalazzi, L.
    Spegni, F.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 811 - 827
  • [10] Security analysis of multi-party quantum private comparison protocol by model checking
    Yang, Fan
    Yang, Guowu
    Hao, Yujie
    Luo, Qingbin
    Wang, Yuqi
    MODERN PHYSICS LETTERS B, 2015, 29 (18):