NSPK Protocol Security Model Checking System Builder

被引:0
|
作者
Yan, Wang [1 ]
Ying, Liu
机构
[1] Zhongzhou Univ, Informat Engn Coll, Zhengzhou 450044, Peoples R China
关键词
cryptographic protocols; formal analysis; model checking; UPPAAL;
D O I
10.14257/ijsia.2015.9.7.28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocols are based cryptosystems based on interactive communication protocol, running on computer communication networks or distributed systems, by means of cryptographic algorithms to achieve key distribution, authentication and other purposes. In the safety analysis, model checking technology has a high degree of automation, can provide advantages such as counter-examples. The key application of model checking techniques cryptographic protocol analysis is that the full optimization model checking tools for modeling cryptographic protocols, especially for modeling intruders. Using symbolic model checking techniques and model checking tool UPPAAL automatic machine modeling, it is beneficial for the security of cryptographic protocols for analysis testing.
引用
收藏
页码:307 / 315
页数:9
相关论文
共 50 条
  • [41] IMPROVING SYSTEM SECURITY VIA PROACTIVE PASSWORD CHECKING
    BISHOP, M
    KLEIN, DV
    COMPUTERS & SECURITY, 1995, 14 (03) : 233 - 249
  • [42] Towards a completeness result for model checking of security protocols
    Lowe, G
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 96 - 105
  • [43] Model checking of security protocols with pre-configuration
    Kim, K
    Abraham, JA
    Bhadra, J
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 1 - 15
  • [44] Model checking an entire Linux distribution for security violations
    Schwarz, B
    Chen, H
    Wagner, D
    Morrison, G
    West, J
    Lin, J
    Tu, W
    21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 8 - 17
  • [45] Apply model checking to security analysis in trust management
    Reith, Mark
    Niu, Jianwei
    Winsborough, William H.
    2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1-2, 2007, : 734 - 743
  • [46] Detection of Security Vulnerabilities Using Guided Model Checking
    Tsitovich, Aliaksei
    LOGIC PROGRAMMING, PROCEEDINGS, 2008, 5366 : 822 - 823
  • [47] Probabilistic model checking for the quantification of DoS security threats
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    Alexiou, Nikolaos
    COMPUTERS & SECURITY, 2009, 28 (06) : 450 - 465
  • [48] Analyzing Internet Routing Security Using Model Checking
    Sosnovich, Adi
    Grumberg, Orna
    Nakibly, Gabi
    LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, (LPAR-20 2015), 2015, 9450 : 112 - 129
  • [49] Model Checking the SET Purchasing Process Protocol with SPIN
    Li Jing
    Li Jinhua
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4486 - 4489
  • [50] Analyzing Leader Election Protocol by Probabilistic Model Checking
    Guo, Xu
    Yang, Zongyuan
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 564 - 567