期刊文献+

Dolev-Yao攻击者模型的形式化描述 被引量:8

The Formalization Description of the Dolev-Yao Intruder Model
下载PDF
导出
摘要 模型检测技术能够实现安全协议的自动化分析,是一种高效的形式化分析方法。然而,对于攻击者的建模却一直缺乏通用的方法,这导致了模型检测方法的自动化程度降低。本文为安全协议分析中,应用最为广泛的Dolev-Yao攻击者模型建立了一套形式化描述方法。遵循这一方法,可以使用任何建模语言机械地建立Dolev-Yao攻击者模型,从而大大地减少了人工分析的成份。同时,本文还使用该方法验证了两个目的完全不同的协议,证明了它的通用性。 Model Checking can verify security protocols automatically. It is an efficient formal method. But there lacks a general method to build the intruder model. It leads to the decrease of the automation degree of model checking. This paper gives a formalization description method of thc Dolev-Yao intruder model wich is most widely used in security protocols analysis. According to this method, we can use an arbitrary modeling language to build the Dolev- Yao intruder model by rote. It greatly decreases the components of artificial analysis. Meanwhile, we use this method to verify two security protocols with different goals. It proves that our method is general-purpose.
作者 唐郑熠 李祥
出处 《计算机工程与科学》 CSCD 北大核心 2010年第8期36-38,45,共4页 Computer Engineering & Science
关键词 Dolev-Yao攻击者模型 形式化描述 模型检测 SPIN NSPK A(0) Dolev-Yao intruder model formalization description model checking SPIN NSPK A(0)
  • 相关文献

参考文献10

  • 1Maggi P, Sisto R. Using SPIN to Verify Security Protocols [C]//Proc of the 9th Int'l SPIN Workshop on Model Checking of Software, 2002:187-204.
  • 2龙士工,王巧丽,李祥.密码协议的Promela语言建模及分析[J].计算机应用,2005,25(7):1548-1550. 被引量:11
  • 3马怀磊,郭华,庄雷.基于模型检测的不可靠环境下电子商务协议分析[J].计算机工程与科学,2007,29(10):82-84. 被引量:1
  • 4Lowe G. Breaking and Fixing the Needham-Schroder Publickey Protocol Using FDR[M]//Tools and Algorithms for the Construction and Analysis of Systems, 1996:147-166.
  • 5Dolev D, Yao A. On the Security of Public Key Protocols[J]. IEEE Trans on Information Theory, 1983,29(2) : 198-208.
  • 6Ramanujam R, Suresh S P. Decidability of Context-Explicit Security Protocols[J]. Journal of Computer Security, 2005,13 (1):135-165.
  • 7Holzmann G J. The Model Checker SPIN[J]. IEEE Trans on Software Engineering, 1997,23 (5) : 279-295.
  • 8Needham R, Schroeder M. Using Encryption for Authentication in Large Networks of Computer[J]. Communications of the ACM, 1978,21(12) :993-998.
  • 9Matsumoto T, Takashima Y, Imai H. On Seeking Smart Public-Key Distribution Systems[J]. The Trans of the IEEE of Japan, 1986,69(2) : 99-106.
  • 10唐郑熠,李均涛,李祥.针对A(0)协议的新鲜性攻击及改进方案[J].计算机技术与发展,2009,19(10):164-166. 被引量:2

二级参考文献17

  • 1蔡永泉,朱勇.一种改进的A(0)协议及其形式化分析[J].计算机工程与应用,2006,42(34):109-111. 被引量:3
  • 2Matsumoto T,Takashirna Y, Imai H. On seeking smart public - key distribution systems[J ]. Trans. IECE Japan, 1986,69 (2) :99 - 106.
  • 3王贵林 卿斯汉.MTIA(0)协议的形式化分析.软件学报,2003,14:192-198.
  • 4Holmann G J. The Model Checker SPIN[J ]. IEEE Transactions on Software Engineering, 1997,23(5) :279 -295.
  • 5Dolev D, Yao A. On the Security of Public Key Protocols[J ]. IEEE Transactions on Information Theory., 1983,29 (2) : 198 - 208.
  • 6HOLZMANN GJ. Design and Validation of Computer Protocols[M].Englewood Cliffs, New JerSey: Prentice-Hall, 1991.
  • 7PNUELI A. The Temporal Logic of Programs[A]. Proceedings of 18th IEEE Symposium on Foundations of Computer Science[C],1977.46 -57.
  • 8LOWE G. An attack on the Needham-Schroeder public-key authentication protocol[J]. Information Processing Letters, 1995, 56:131- 133, 1995.
  • 9LOWE G. Breaking and fixing the Needham-Schroeder public key protocol using FDR[A]. Tools and Algorithms for the Construction and Analysis of Systems ( TACAS'96), Lecture Notes in Computer Science 1055[C]. Springer-Verlag, 1996.147 - 166.
  • 10MERZ S. Model Checking: A Tutorial Overview[ EB/OL]. http://spinroot. com/spin/Doc/course/mc-tutorial.pdf, 2003 - 10.

共引文献10

同被引文献64

引证文献8

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部