期刊文献+

大型复杂协议的形式化分析方法研究

Methods for formal verification of large and complicated protocols
下载PDF
导出
摘要 大型复杂协议的形式化分析是目前研究的一个热点和难点。根据所采用技术的特点,将大型复杂协议的形式化分析方法分为基于逻辑推理的方法、基于模型检测的方法、基于定理证明的方法和基于进程代数的方法,并简要介绍了各类方法的代表性方法及验证器,最后对各类方法的特点进行分析和比较。指出达式大型复杂协议的形式化分析方法未来的一个研究重点,修改原有方法或设计一种新的方法,使其既易自动化实现,又能用于复合协议的分析和验证。 The formal analysis of large and complicated protocols has been becoming a difficult hotspot of recent research. Based on the techniques used, the formal methods for analyzing large and complicated protocols are classified as logic reasoning based method, model checking based method, theorem proving based method and process algebra based method. The representative approaches and verifiers of each method are presented. At last, the characteristics of each approach are compared and the future research keystone for verifying large and complicated protocols is pointed out, namely amending original formal method or designing a new method to enable it to be automated easily and used for analysis of composed protocols.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第18期4207-4210,共4页 Computer Engineering and Design
关键词 大型复杂协议 形式化方法 逻辑推理 模型检测 定理证明 进程代数 large and complicated protocols formal method logic reasoning model checking theorem proving process algebra
  • 相关文献

参考文献12

  • 1陈铁明,蔡家楣.安全协议的可视化分析和设计研究[J].通讯和计算机(中英文版),2005,2(12):27-31. 被引量:2
  • 2Derek A.Formal analysis of security protocols:Protocol composition logic[D].Computer Science Department,Stanford University,2006.
  • 3Datta A, Derek A, Mitchell J C, et al. A derivation system and compositional logic for security protocols [J] Journal of Computer Security,2005( 13):423-482.
  • 4Datta A,Derek A,Mitehell J C,et al.Protocol composition logic (PCL) [J]. Electronic Notes in Theoretical Computer Science, 2007,172:311-358.
  • 5苏开乐,吕关锋,陈清亮.基于知识结构的认证协议验证[J].中国科学(E辑),2005,35(4):337-351. 被引量:7
  • 6Vigano L.Automated security protocol analysis with the AVI- SPA tool[J].Electronic Notes in Theoretical Computer Science, 2006,155:62-86.
  • 7He Changhua. Analysis of security protocols for wireless networks[D].A Dissertation Submitted to the Department of Electrical Engineering and the Committee on Graduate Studies of Stanford University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy,2005.
  • 8Xiao-Qi Ma,Xiao-Chun Cheng.Formal Verification of the Merchant Registration Phase of the SET Protocol[J].International Journal of Automation and computing,2005,2(2):155-162. 被引量:1
  • 9沈海峰,薛锐,黄河燕.IKE2协议的安全性分析[J].计算机科学,2005,32(11):59-63. 被引量:5
  • 10Zeeshan Furqan, Shahabuddin Muhammad,Ratan Guha.Authentication analysis of the 802.11i protocol[J].International Journal of Information Technology,2007,4( 1 ): 1305-2403.

二级参考文献32

  • 1李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 2NEEDHAM RM, SCHROEDER MD. Using Encryption for Authentication in Large Networks of Computers[J]. Communication of the ACM, 1978,21(12):993-999.
  • 3DOLEV D, YAO A. On The Security of Public Key Protocols[J]. IEEE Transactions on Information Theory, 1983,29(2):198-208.
  • 4BURROWS M, ABADI M, NEEDHAM R. A Logic of Authentication[J]. ACM Transactions on Computer System, 1990,8(1):18-36.
  • 5GONG L, NEEDHAM R, YAHALOM R. Reasoning about Belief in Cryptographic Protocols[A]. Proceeding of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy[C]. IEEE Computer Society Press, 1990.234-248.
  • 6KAILAR R. Accountability in Electronic Commerce Protocols[J]. IEEE Transactions on Software Engineering, 1996,22(5):313-328.
  • 7LOWE G. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR[A]. Proceedings of Tools and Algorithms for the Construction and Analysis of Systems, LNCS1055[C], 1996.147-166.
  • 8ARMANDO A, COMPAGNA L, GANTY P. SAT-based Model Checking of Security Protocols Using Planning Graph Analysis[A]. Proceedings of FME2003, LNCS 2805[C]. Springer-Verlag, 2003.
  • 9ABADI M, GORDON A. A Calculus for Cryptographic Protocols: The Spi Calculus[R]. SRC, Palo Alto, California, 1998.
  • 10ABADI M, BLANCHET B. Analyzing Security Protocols with Secrecy Types and Logic Programs[A]. The 29th ACM Symposium on Principles of Programing Languages[C]. Portland, Oregon: ACM Press, 2002.33-44.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部