NSPK Protocol Security Model Checking System Builder

被引:0
|
作者
Yan, Wang [1 ]
Ying, Liu
机构
[1] Zhongzhou Univ, Informat Engn Coll, Zhengzhou 450044, Peoples R China
关键词
cryptographic protocols; formal analysis; model checking; UPPAAL;
D O I
10.14257/ijsia.2015.9.7.28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocols are based cryptosystems based on interactive communication protocol, running on computer communication networks or distributed systems, by means of cryptographic algorithms to achieve key distribution, authentication and other purposes. In the safety analysis, model checking technology has a high degree of automation, can provide advantages such as counter-examples. The key application of model checking techniques cryptographic protocol analysis is that the full optimization model checking tools for modeling cryptographic protocols, especially for modeling intruders. Using symbolic model checking techniques and model checking tool UPPAAL automatic machine modeling, it is beneficial for the security of cryptographic protocols for analysis testing.
引用
收藏
页码:307 / 315
页数:9
相关论文
共 50 条
  • [21] Parallel Bounded Model Checking of Security Protocols
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Szymoniak, Sabina
    Piech, Henryk
    PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2013), PT I, 2014, 8384 : 224 - 234
  • [22] Model Checking Invariant Security Properties in OpenFlow
    Son, Sooel
    Shin, Seungwon
    Yegneswaran, Vinod
    Porras, Phillip
    Gu, Guofei
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [23] Parameterized model checking for security policy analysis
    Ranise, Silvio
    Anh Truong
    Traverso, Riccardo
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2016, 18 (05) : 559 - 573
  • [24] Symbolic partial model checking for security analysis
    Martinelli, F
    COMPUTER NETWORK SECURITY, 2003, 2776 : 122 - 134
  • [25] LTL model-checking for security protocols
    Carbone, Roberto
    AI COMMUNICATIONS, 2011, 24 (03) : 281 - 283
  • [26] Parameterized model checking for security policy analysis
    Silvio Ranise
    Anh Truong
    Riccardo Traverso
    International Journal on Software Tools for Technology Transfer, 2016, 18 : 559 - 573
  • [27] Modular modeling system model builder
    McKim, CS
    Matthews, MT
    IECEC 96 - PROCEEDINGS OF THE 31ST INTERSOCIETY ENERGY CONVERSION ENGINEERING CONFERENCE, VOLS 1-4, 1996, : 2039 - 2044
  • [28] Model checking security vulnerabilities in software design
    Li Jinhua
    Li Jing
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [29] Model Checking of Safety Critical Communication Protocol
    Zhang Yi
    Wei Xueye
    He Chunming
    Shi Zengshu
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1 - 4, 2010, : 1414 - 1418
  • [30] Model checking large network protocol implementations
    Musuvathi, M
    Engler, DR
    USENIX ASSOCIATION PROCEEDINGS OF THE FIRST SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI'04), 2004, : 155 - 168