期刊文献+

一种基于状态扩展的安全协议验证机制 被引量:1

State-extended based verification mechanism for security protocols
下载PDF
导出
摘要 基于模型检测验证协议的方法存在状态空间爆炸问题,其中基于目标绑定搜索状态空间的方法有效控制了状态空间,但不能完全给出协议的运行情况。针对这一问题,提出了一种基于状态扩展的安全协议自动化验证机制,首先对协议状态进行初始搜索,给出协议运行需要的事件,得到协议基本状态,然后进行扩展搜索,考虑基本状态与其他协议运行的关系,形成协议扩展状态。该机制能够有效反映出协议的运行情况,且能够同时对多种安全性质进行验证。 The tools for cryptographic protocols analysis based on state exploration had the problem of state exploration, among them, the goal binding could deduce the states effectively, but if it couldn’t give the runs of protocol wholly. To solve this problem, this article proposed a state extended-based verification mechanism, which got the basic states with necessary events through basic search, and then proceeded with extended search in order to get the connections between basic states and the other runs, which formed the extended states. This mechanism can give the runs of protocol effectively, and under which can verified security properties synchronously.
出处 《计算机应用研究》 CSCD 北大核心 2010年第6期2327-2330,共4页 Application Research of Computers
关键词 安全协议 自动化验证 基本搜索 扩展搜索 security protocol automatic verification basic search extended search
  • 相关文献

参考文献9

  • 1SONG D X.Athena:a new efficient automatic checker for security protocol analysis[C] //Proc of the 12th IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,1999.
  • 2CREMERS C J F.Unbounded verification of security protocols,Technical Report No.572[R].2006.
  • 3FABREGA F J T,GUTTMAN J.Strand spaces:why is a security protocol correct?[C] //Proc of IEEE Symposium on Security and Privacy.1998.
  • 4CHEMINOD M,BERTOLOTTI I C,DURANTE L,et al.Experimental comparison of automatic tools for the formal analysis of cryptographic protocols[C] //Proc of the 2nd International Conference on Dependability of Computer Systems.2007.
  • 5DOLEV D,YAO A C.On the security of public key protocols[J].IEEE Trans on Information Theory,1983,29(2):198-208.
  • 6LOWE G.A hierarchy of authentication specifications[C] //Proc of CSFW'97.1997:31-44.
  • 7CORIN R.Analysis models for security protocols[D].The Netherlands:University of Twente,2006:41-45.
  • 8CREMERS C J F.Unbounded verification,falsification,and characterization of security protocols by pattern refinement[C] //Proc of the 15th ACM Conference on Computer and Communictions Security.New York:ACM Press,2008:119-128.
  • 9LOWE G.Analyzing protocols subject to guessing attacks[J].Journal of Computer Security,2004,12(1):83-89.

同被引文献4

  • 1薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:60
  • 2CREMERS C,MAUW S.Checking secrecy by means of partial orderreduction. Proc of the 4th System Analysis and Modeling Work-shop . 2004
  • 3FOKKINK W,TORABI D M,WIJS A.Partial order reduction forbranching security protocols. Proc of the 10th International Con-ference on Application of Concurrency to System Design (ACSD) . 2010
  • 4Baier C,Katoen J P.Principles of Model Checking. . 2008

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部