NSPK Protocol Security Model Checking System Builder

被引:0
|
作者
Yan, Wang [1 ]
Ying, Liu
机构
[1] Zhongzhou Univ, Informat Engn Coll, Zhengzhou 450044, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 07期
关键词
cryptographic protocols; formal analysis; model checking; UPPAAL;
D O I
10.14257/ijsia.2015.9.7.28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocols are based cryptosystems based on interactive communication protocol, running on computer communication networks or distributed systems, by means of cryptographic algorithms to achieve key distribution, authentication and other purposes. In the safety analysis, model checking technology has a high degree of automation, can provide advantages such as counter-examples. The key application of model checking techniques cryptographic protocol analysis is that the full optimization model checking tools for modeling cryptographic protocols, especially for modeling intruders. Using symbolic model checking techniques and model checking tool UPPAAL automatic machine modeling, it is beneficial for the security of cryptographic protocols for analysis testing.
引用
收藏
页码:307 / 315
页数:9
相关论文
共 50 条
  • [1] Security analysis of TLS protocol implementations based on model checking
    Bi X.
    Tang C.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (03): : 839 - 846
  • [2] Checking security properties by model checking
    De Francesco, N
    Lettieri, G
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2003, 13 (03) : 181 - 196
  • [3] Formal security analysis of Ariadne secure routing protocol using model checking
    Onem, E.
    Gurdag, A. Burak
    Caglayan, M. Ufuk
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (01) : 12 - 24
  • [4] The Application of Model Checking in Validating Information System Software Security
    Liu Xin
    Cai Wandong
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 448 - 451
  • [5] An intruder model with message inspection for model checking security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    COMPUTERS & SECURITY, 2010, 29 (01) : 16 - 34
  • [6] Security analysis of multi-party quantum private comparison protocol by model checking
    Yang, Fan
    Yang, Guowu
    Hao, Yujie
    Luo, Qingbin
    Wang, Yuqi
    MODERN PHYSICS LETTERS B, 2015, 29 (18):
  • [7] A Model Checking Approach to Protocol Conversion
    Sinha, Roopak
    Roop, Partha S.
    Basu, Samik
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 203 (04) : 81 - 94
  • [8] Model Checking of Needham-Schroeder Protocol Using UPPAAL
    Rong, Mei
    Li, Zhonghui
    Zhang, Guangquan
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [9] Parallel Bounded Model Checking of Security Protocols
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Szymoniak, Sabina
    Piech, Henryk
    PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2013), PT I, 2014, 8384 : 224 - 234
  • [10] Model checking security vulnerabilities in software design
    Li Jinhua
    Li Jing
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,