NSPK Protocol Security Model Checking System Builder

被引:0
|
作者
Yan, Wang [1 ]
Ying, Liu
机构
[1] Zhongzhou Univ, Informat Engn Coll, Zhengzhou 450044, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 07期
关键词
cryptographic protocols; formal analysis; model checking; UPPAAL;
D O I
10.14257/ijsia.2015.9.7.28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocols are based cryptosystems based on interactive communication protocol, running on computer communication networks or distributed systems, by means of cryptographic algorithms to achieve key distribution, authentication and other purposes. In the safety analysis, model checking technology has a high degree of automation, can provide advantages such as counter-examples. The key application of model checking techniques cryptographic protocol analysis is that the full optimization model checking tools for modeling cryptographic protocols, especially for modeling intruders. Using symbolic model checking techniques and model checking tool UPPAAL automatic machine modeling, it is beneficial for the security of cryptographic protocols for analysis testing.
引用
收藏
页码:307 / 315
页数:9
相关论文
共 50 条
  • [41] Hierarchical Model Checking Method of Safety Communication Protocol Specification
    Zhang Y.
    Yang L.
    Zeng X.
    Sun W.
    Liu Q.
    Zhongguo Tiedao Kexue/China Railway Science, 2021, 42 (06): : 162 - 170
  • [42] A Short Introduction to Two Approaches in Formal Verification of Security Protocols: Model Checking and Theorem Proving
    Pourpouneh, Mohsen
    Ramezanian, Rasoul
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 3 - 24
  • [43] Spatiotemporal model checking of location and mobility related security policy specifications
    Unal, Devrim
    Caglayan, Mehmet Ufuk
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2013, 21 (01) : 144 - 173
  • [44] Model Checking the Information Flow Security of Real-Time Systems
    Gerking, Christopher
    Schubert, David
    Bodden, Eric
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 27 - 43
  • [45] Model checking wireless sensor network security protocols:: TinySec + LEAP
    Tobarra, Llanos
    Cazorla, Diego
    Cuartero, Fernando
    Diaz, Gregorio
    Cambronero, Emilia
    WIRELESS SENSOR AND ACTOR NETWORKS, 2007, : 95 - +
  • [46] A model checking-based security analysis framework for IoT systems
    Fang, Zheng
    Fu, Hao
    Gu, Tianbo
    Qian, Zhiyun
    Jaeger, Trent
    Hu, Pengfei
    Mohapatra, Prasant
    HIGH-CONFIDENCE COMPUTING, 2021, 1 (01):
  • [47] Model checking the observational determinism security property using PROMELA and SPIN
    Dabaghchian, Maryam
    Azgomi, Mohammad Abdollahi
    FORMAL ASPECTS OF COMPUTING, 2015, 27 (5-6) : 789 - 804
  • [48] Abstracting Security-Critical Applications for Model Checking in a Model-Driven Approach
    Borek, Marian
    Stenzel, Kurt
    Katkalov, Kuzman
    Reif, Wolfgang
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 11 - 14
  • [49] Security Requirements Verification for Existing Systems with Model Checking Technique and UML
    Matsuura, Saeko
    Ogata, Shinpei
    Aoki, Yoshitaka
    MODELSWARD: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2017, : 529 - 535
  • [50] Security analysis of security protocol Swift implementations based on computational model
    Meng B.
    He X.
    Zhang J.
    Yao L.
    Lu J.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (09): : 178 - 190