Breaking and fixing the Helsinki protocol using SMV

被引:1
|
作者
Zhang, YQ [1 ]
Xiao, GZ [1 ]
机构
[1] Xidian Univ, Inst Informat Secur, Xian 710071, Peoples R China
关键词
D O I
10.1049/el:19990836
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An analysis is made of the Helsinki protocol using SMV, a model checker. The results show that the Horng-Hsu attack is the only successful attack on the protocol, and a new modified Helsinki protocol is proposed which is immune to the attack and better than the previous revised Helsinki protocol.
引用
收藏
页码:1239 / 1240
页数:2
相关论文
共 50 条
  • [31] Breaking and (Partially) Fixing Provably Secure Onion Routing
    Kuhn, Christiane
    Beck, Martin
    Strufe, Thorsten
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 168 - 185
  • [32] Cookie Crumbles: Breaking and Fixing Web Session Integrity
    Squarcina, Marco
    Adao, Pedro
    Veronese, Lorenzo
    Maffei, Matteo
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 5539 - 5556
  • [33] InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis
    Guanciale, Roberto
    Balliu, Musard
    Dam, Mads
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1853 - 1869
  • [34] Breaking and Fixing the Security Proof of Garbled Bloom Filters
    Van Rompay, Cedric
    Onen, Melek
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 263 - 277
  • [35] Primary surgery of subcondylar mandibular fracture using patient-specific implant: the Helsinki protocol
    Saloniemi, Mikko
    Salli, Malla
    Lehtinen, Valtteri
    Snall, Johanna
    ORAL AND MAXILLOFACIAL SURGERY-HEIDELBERG, 2025, 29 (01):
  • [36] Automatically Fixing Breaking Changes of Data Science Libraries
    Mitchell, Hailie
    PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,
  • [37] Verification of sequential function charts using SMV
    Bornot, S
    Huuck, R
    Lukoschus, B
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 2987 - 2993
  • [38] Model checking PSL using HOL and SMV
    Tuerk, Thomas
    Schneider, Klaus
    Gordon, Mike
    HARDWARE AND SOFTWARE, VERIFICATION AND TESTING, 2007, 4383 : 1 - +
  • [39] Verifying a Gigabit Ethernet switch using SMV
    Lu, Y
    Jorda, M
    41ST DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2004, 2004, : 230 - 233
  • [40] Breaking a cryptographic protocol with pseudoprimes
    Bleichenbacher, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 9 - 15