Protocol engineering applied to formal analysis of security systems

被引:0
|
作者
Lopez, J [1 ]
Ortega, JJ [1 ]
Troya, JM [1 ]
机构
[1] Univ Malaga, Dept Comp Sci, E-29071 Malaga, Spain
来源
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Every communication system requiring security properties is certainly critical. In order to study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques of communication protocols to the analysis of cryptographic ones. We have extended the design and analysis phases with security properties. Our methodology uses a specification technique based on the HMSC/MSC requirement languages, and translates it into a generic schema for the SDL specification language, which is used for the analysis. Thus, the technique allows the specification of security protocols using a standard formal language and uses Object-Orientation for reusability purposes. The final goal is not only the formal specification of a security system, but to examine the possible attacks, and later use the specification in more complex systems.
引用
收藏
页码:246 / 259
页数:14
相关论文
共 50 条
  • [1] A Security Protocol Applied to Covert Communication Platform and Its Formal Analysis
    Zhang Yi-jia
    Liu Rui-ying
    Kang Zhong-jian
    Qi Han
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 307 - 311
  • [2] Formal Security Analysis of the MaCAN Protocol
    Bruni, Alessandro
    Sojka, Michal
    Nielson, Flemming
    Nielson, Hanne Riis
    [J]. INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
  • [3] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 451 - 466
  • [4] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1914 - 1983
  • [5] A Formal Security Analysis of the Signal Messaging Protocol
    Katriel Cohn-Gordon
    Cas Cremers
    Benjamin Dowling
    Luke Garratt
    Douglas Stebila
    [J]. Journal of Cryptology, 2020, 33 : 1914 - 1983
  • [6] An Authentication Protocol Applied to RFID Security Systems
    Gong, Xiaoqing
    Wang, Yi
    Li, Hui
    He, Jian
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 307 - +
  • [7] On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
    Bruce, Ndibanje
    Kim, HyunHo
    Kang, Young Jin
    Lee, Young Sil
    Lee, Hoon Jae
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 498 - 505
  • [8] Formal modeling and security analysis method of security protocol based on CPN
    Gong, Xiang
    Feng, Tao
    Du, Jinze
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
  • [9] Formal Analysis of the Security Protocol with Timestamp Using SPIN
    Xiao, Meihua
    Song, Weiwei
    Yang, Ke
    OuYang, Ri
    Zhao, Hanyu
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [10] An Improved Security Protocol Formal Analysis with BAN Logic
    Li Tingyuan
    Liu Xiaodong
    Qin Zhiguang
    Zhang Xuanfang
    [J]. ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +