期刊文献+

安全协议状态空间的束动作偏序约简算法 被引量:1

Stuttering partial-order reduction algorithm in verification of security protocols
下载PDF
导出
摘要 目前安全协议分析的偏序归约算法较为复杂、不易实现,限制了其适用范围,且以动作为基础,粒度较小,对减少状态空间的作用有限。针对该问题提出了一种束动作偏序约简算法,将同一会话中的动作序列看做一个束动作,根据攻击者截获的消息与攻击者知识集间的关系,判断迹等价的束动作迁移所到达的后继状态是否为冗余节点,以约简状态空间。该算法思想简单、易于实现;实例表明它有效地约简了安全协议的状态空间。 At present,the partial-order reduction algorithms used for the verification of security protocols are complicated,and uneasy to carry out,resulting in a limited scope of applicability.Furthermore it permutes based on actions,leading to a limited effect of reduction.To solve the above problems,this paper considered the action sequences in the same session as a stuttering action,and proposed a stuttering action reduction algorithm on the base of partial-order reduction.It judged whether the successors of stutter-equivalent stuttering transitions were redundant based on the relation between messages achieved by the intruder and the intruder knowledges,in order to reduce the state space.This algorithm has a clear structure and easy to implement.Experiment clearly implies that the adopted reduction method is effective.
出处 《计算机应用研究》 CSCD 北大核心 2011年第9期3488-3491,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2007AA01Z471)
关键词 安全协议 状态空间约简 偏序归约 束动作 迹等价迁移 security protocol state space reduction partial-order reduction stuttering action stutter-equivalent transitions
  • 相关文献

参考文献5

  • 1Baier C,Katoen J P.Principles of Model Checking. . 2008
  • 2CREMERS C,MAUW S.Checking secrecy by means of partial orderreduction. Proc of the 4th System Analysis and Modeling Work-shop . 2004
  • 3薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:60
  • 4黄卿,王亚弟,韩继红,范钰丹,黄河.一种基于状态扩展的安全协议验证机制[J].计算机应用研究,2010,27(6):2327-2330. 被引量:1
  • 5FOKKINK W,TORABI D M,WIJS A.Partial order reduction forbranching security protocols. Proc of the 10th International Con-ference on Application of Concurrency to System Design (ACSD) . 2010

二级参考文献10

  • 1RuiXue Deng-GuoFeng.New Semantic Model for Authentication Protocols in ASMs[J].Journal of Computer Science & Technology,2004,19(4):555-563. 被引量:5
  • 2CHEMINOD M,BERTOLOTTI I C,DURANTE L,et al.Experimental comparison of automatic tools for the formal analysis of cryptographic protocols[C] //Proc of the 2nd International Conference on Dependability of Computer Systems.2007.
  • 3DOLEV D,YAO A C.On the security of public key protocols[J].IEEE Trans on Information Theory,1983,29(2):198-208.
  • 4LOWE G.A hierarchy of authentication specifications[C] //Proc of CSFW'97.1997:31-44.
  • 5CORIN R.Analysis models for security protocols[D].The Netherlands:University of Twente,2006:41-45.
  • 6CREMERS C J F.Unbounded verification,falsification,and characterization of security protocols by pattern refinement[C] //Proc of the 15th ACM Conference on Computer and Communictions Security.New York:ACM Press,2008:119-128.
  • 7LOWE G.Analyzing protocols subject to guessing attacks[J].Journal of Computer Security,2004,12(1):83-89.
  • 8SONG D X.Athena:a new efficient automatic checker for security protocol analysis[C] //Proc of the 12th IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,1999.
  • 9CREMERS C J F.Unbounded verification of security protocols,Technical Report No.572[R].2006.
  • 10FABREGA F J T,GUTTMAN J.Strand spaces:why is a security protocol correct?[C] //Proc of IEEE Symposium on Security and Privacy.1998.

共引文献59

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部