NSPK Protocol Security Model Checking System Builder

被引:0
|
作者
Yan, Wang [1 ]
Ying, Liu
机构
[1] Zhongzhou Univ, Informat Engn Coll, Zhengzhou 450044, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 07期
关键词
cryptographic protocols; formal analysis; model checking; UPPAAL;
D O I
10.14257/ijsia.2015.9.7.28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocols are based cryptosystems based on interactive communication protocol, running on computer communication networks or distributed systems, by means of cryptographic algorithms to achieve key distribution, authentication and other purposes. In the safety analysis, model checking technology has a high degree of automation, can provide advantages such as counter-examples. The key application of model checking techniques cryptographic protocol analysis is that the full optimization model checking tools for modeling cryptographic protocols, especially for modeling intruders. Using symbolic model checking techniques and model checking tool UPPAAL automatic machine modeling, it is beneficial for the security of cryptographic protocols for analysis testing.
引用
收藏
页码:307 / 315
页数:9
相关论文
共 50 条
  • [31] Security Analysis of Automotive Architectures using Probabilistic Model Checking
    Mundhenk, Philipp
    Steinhorst, Sebastian
    Lukasiewycz, Martin
    Fahmy, Suhaib A.
    Chakraborty, Samarjit
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [32] Model Checking the IKEv2 Protocol Using Spin
    Ninet, Tristan
    Legay, Axel
    Maillard, Romaric
    Traonouez, Louis-Marie
    Zendra, Olivier
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 288 - 294
  • [33] A statistical model checking approach to analyse the random access protocol
    Roumane A.
    Kechar B.
    International Journal of Wireless and Mobile Computing, 2022, 23 (3-4) : 338 - 349
  • [34] VERIFYING OF A NETWORK CRYPTOGRAPHIC PROTOCOL USING THE MODEL CHECKING TOOLS
    Jomeiri, Alireza
    4TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2012), 2012, : 541 - 546
  • [35] Statistical Model Checking of a Clock Synchronization Protocol for Sensor Networks
    Battisti, Luca
    Macedonio, Damiano
    Merro, Massimo
    FUNDAMENTALS OF SOFTWARE ENGINEERING, FSEN 2013, 2013, 8161 : 168 - 182
  • [36] Analysis on EURORADIO Safety Critical Protocol by Probabilistic Model Checking
    Quan Hongyu
    Zhao Huibing
    Zhou Guo
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT RAIL TRANSPORTATION (ICIRT), 2013, : 75 - 78
  • [37] Modelling and model checking a distributed shared memory consistency protocol
    Fisler, K
    Girault, C
    APPLICATION AND THEORY OF PETRI NETS 1998, 1998, 1420 : 84 - 103
  • [38] Model Checking of a Cash Machine System
    Jindal, Vartika
    Carr, Mahil
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 258 - 261
  • [39] Formal Specification and Model Checking of an Autonomous Vehicle Merging Protocol
    Liu, Minxuan
    Dang Duy Bui
    Duong Dinh Tran
    Ogata, Kazuhiro
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 333 - 342
  • [40] Efficient Model Checking of Network Authentication Protocol Based on SPIN
    Tan, Zhi-hua
    Zhang, Da-fang
    Miao, Li
    Zhao, Dan
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768