NSPK Protocol Security Model Checking System Builder

被引:0
|
作者
Yan, Wang [1 ]
Ying, Liu
机构
[1] Zhongzhou Univ, Informat Engn Coll, Zhengzhou 450044, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 07期
关键词
cryptographic protocols; formal analysis; model checking; UPPAAL;
D O I
10.14257/ijsia.2015.9.7.28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocols are based cryptosystems based on interactive communication protocol, running on computer communication networks or distributed systems, by means of cryptographic algorithms to achieve key distribution, authentication and other purposes. In the safety analysis, model checking technology has a high degree of automation, can provide advantages such as counter-examples. The key application of model checking techniques cryptographic protocol analysis is that the full optimization model checking tools for modeling cryptographic protocols, especially for modeling intruders. Using symbolic model checking techniques and model checking tool UPPAAL automatic machine modeling, it is beneficial for the security of cryptographic protocols for analysis testing.
引用
收藏
页码:307 / 315
页数:9
相关论文
共 50 条
  • [21] Model-checking the Flooding Time Synchronization Protocol
    McInnes, Allan I.
    2009 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-3, 2009, : 422 - 429
  • [22] Analysing a stream authentication protocol using model checking
    Philippa Hopcroft
    Gavin Lowe
    International Journal of Information Security, 2004, 3 (1) : 2 - 13
  • [23] Timed Automata Based Model Checking of Timed Security Protocols
    Kurkowski, Miroslaw
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2009, 93 (1-3) : 245 - 259
  • [24] A Module Level Security Evaluation Method Based on Model Checking
    Liu, Yuxin
    Zhu, Ziyuan
    Zhang, Yusha
    Tong, Zhongkai
    Cai, Wenjing
    Meng, Dan
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1165 - 1170
  • [25] Security Analysis of RBAC with Temporal Constraints - A Model Checking Approach
    Mondal, Samrat
    Sural, Shamik
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 319 - 328
  • [26] Analyzing Hardware Security Properties of Processors through Model Checking
    Kumar, Binod
    Jaiswal, Akshay Kumar
    Vineesh, V. S.
    Shinde, Rushikesh
    2020 33RD INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2020 19TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2020, : 107 - 112
  • [27] Software Model Checking for Mobile Security - Collusion Detection in K
    Asavoae, Irina Mariuca
    Hoang Nga Nguyen
    Roggenbach, Markus
    MODEL CHECKING SOFTWARE, SPIN 2018, 2018, 10869 : 3 - 25
  • [28] Model checking action system refinements
    Smith, Graeme
    Winter, Kirsten
    FORMAL ASPECTS OF COMPUTING, 2009, 21 (1-2) : 155 - 186
  • [29] Improvement of SAT-based Model Checking of Security Protocols
    Yang, Yuanyuan
    Ma, Wenping
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 223 - 227
  • [30] DISTRIBUTED SYSTEM MODEL CHECKING DESIGN
    Jasaitis, Robertas
    Bareisa, Eduardas
    INFORMATION TECHNOLOGIES' 2011, 2011, : 105 - 108