期刊文献+

安全协议自动验证工具的状态空间剪枝 被引量:1

State space pruning in automatic verification of security protocol
下载PDF
导出
摘要 串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。概述基于该模型结合使用定理证明和模型检测技术开发的安全协议验证工具AVSP的体系结构 ,提出一些剪枝规则对状态搜索空间进行剪枝。通过Needham Schroeder安全协议的弱一致性认证属性验证过程来表明这些状态搜索空间剪枝规则可有效缩小状态搜索空间 。 Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis. Based on SSM, we presented the frame of an automatic verification system of security protocol, AVSP, combined with theorem proving and model checking. We emphasized pruning methods of the state space in it. The experiment results got by authentic property verification of Needham-Schroeder show that these pruning methods can perfectly reduce state search space and prevent state explosion.
出处 《计算机应用》 CSCD 北大核心 2004年第8期117-121,共5页 journal of Computer Applications
基金 国家自然科学基金项目 (60 2 730 2 7 60 3730 4 8) 国家 863计划项目 (2 0 0 2AA1 4 4 0 50 ) 国家 973计划项目 (G1 9990 3580 2 )
关键词 形式化分析 串空间模型 模型检测 状态空间剪枝 formal method strand space model model checking state space pruning
  • 相关文献

参考文献11

  • 1[1]Dolev D,Yao A. STAN-CS-81-854,On the security of public key protocols[J]. Transactions on Information Theory, 1983,29(2):198-208.
  • 2[2]Burrows M, Abadi M, Needham R. A logic of authentication[J]. ACM Transactions on Computer Systems, 1990,8(1): 18-36.
  • 3[3]Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR[A]. Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science[C]. Springer-Verlag, 1996.147-166.
  • 4[4]Mitchell JC, Mitchell M, Stern U. Automated analysis of cryptographic protocols using murj[A]. Proceedings of the 1997 IEEE Symposium on Security and Privacy[C]. IEEE Computer Society Press, 1997.
  • 5[5]Clarke EM, Jha S, Marrero W. Using state space exploration and a natural deduction style message derivation engine to verify security protocols[A]. Proceedings of the IFIP Working Conference on Programming Concepts and Methods (PROCOMET)[C],1998.
  • 6[6]Song DX. Athena: a new efficient automated checker for security protocol analysis[A]. Proceedings of the 12th IEEE Computer Security Foundations Workshop[C]. IEEE Computer Society Press, 1999.
  • 7[7]Thayer Fabrega JF, Herzog JC, Guttman JD. Honest Ideals on Strand Spaces[A]. Proceedings of the 11th IEEE Symposium on Security and Privacy[C]. IEEE Computer Society Press, 1998.
  • 8[8]Thayer Fabrega JF, Herzog JC, Guttman JD. Strand Spaces: Why is a Security Protocol Correct[A]. Proceedings of the 1998 IEEE Symposium on Security and Privacy[C],1998.
  • 9[9]Song DX. Athena: a new efficient automated checker for security protocol analysis[A]. Proceedings of the 12th IEEE Computer Security Foundations Workshop[C]. IEEE Computer Society Press, 1999.
  • 10[10]Thayer Fabrega JF, Herzog JC, Guttman JD. Strand Spaces: Proving security protocols correct[J]. Journal of Computer Security, 1999,7(2/3):191-230.

同被引文献6

  • 1石昊苏,薛锐,冯登国.AVSP算法[J].计算机工程与设计,2005,26(4):867-869. 被引量:4
  • 2ABADI M,TUTTLE M R.A Semantics for a Logic of Authentication[C]//PODC’91 Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing.New York:ACM,1991:201-216.DOI:10.1145/112600.112618.
  • 3MEADOWS C.The NRL Protocol Analyzer:An Overview[J].Journal of Logic Programming,1996,26(2):113-131.DOI:10.1016/0743-1066(95)00095-X.
  • 4SONG X D,BEREZIN S,PERRIG A.Athena:a novel approach to efficient automatic security protocol analysis[J].Journal of Computer Security,2001,9(1/2):47-74.
  • 5徐军.关于秘密共享方案在应用Pi演算中的实现[J].计算机应用,2013,33(11):3247-3251. 被引量:2
  • 6潘进,顾香,王小明.基于应用Pi演算的WTLS握手协议建模与分析[J].西安邮电大学学报,2015,20(2):26-31. 被引量:2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部