期刊文献+

基于Spin/Promela的Woo-Lam协议安全性质高效验证 被引量:1

Efficiently Verify Security Properties of Woo-Lam Protocol with Spin/Promela
下载PDF
导出
摘要 形式化方法是分析验证安全协议的重要技术之一。模型检测是用在形式化方法中实现形式化自动验证的重要手段。基于Promela语言,将P.Maggi和R.Sisto提出的建模方法扩展到建立包含三个合法主体和一个攻击者的复杂模型,枚举法和打表法同时被运用在求解攻击者模型需要表示的知识项过程中,提高了协议建模效率,保证了建模准确性。以Woo-Lam协议为例,运用Spin工具成功发现一个已知著名攻击。此通用方法适用于类似复杂协议形式化分析与验证。 Formal method is one of the crucial technologies to analyze and verify the properties of security protocols . Model checking is a kind of significant means to realize automatic formal verification in formal methods .Based on Promela , the modeling method proposed by P .Maggi and R .Sisto is expanded to model the complex protocols including three legal principals and an attacker .The enumeration method and the tabulation method are synchronously utilized in solving process of knowledge elements which the attacker model needs .Our approach improves the efficiency and guarantees the accuracy of protocol modeling .Taking Woo-Lam protocol as an example ,a known famous attack has been found successfully by Spin . The general approach also can be applied to formal analysis and verification of similar security protocols .
出处 《计算机与数字工程》 2014年第10期1768-1772,1928,共6页 Computer & Digital Engineering
基金 国家自然科学基金(编号:61163005) 计算机软件新技术国家重点实验室开放课题(编号:KFKT2012B18) 江西省高校科技落地计划项目(编号:KJLD13038) 江西省自然科学基金(编号:2010GZS0150 20132BAB201033)资助
关键词 形式化方法 模型检测 Woo-Lam 协议 枚举法 打表法 formal method model checking Woo-Lam protocol enumeration method tabulation method
  • 相关文献

参考文献13

  • 1Mitchell, J. C. , Mitchell, M. , Stern, U. Automated analysis of cryptographic protocols using murphi[C]// Proceedings of the 1997 Conference on Security and Privacy (S&P-97), Los Alamitos, IEEE Press, 1997: 141-153.
  • 2侯刚,周宽久,勇嘉伟,任龙涛,王小龙.模型检测中状态爆炸问题研究综述[J].计算机科学,2013,40(06A):77-86. 被引量:25
  • 3Jamal Bentahar, Mohamed E1-Menshawy, Hongyang Qu, et al. Communicative commitments: Model chec- king and complexity analysis[J]. Knowledge-based sys- tems, 2012,35 : 21-34.
  • 4杨元原,马文平,刘维博.模型检测中可变攻击者模型的构造[J].北京邮电大学学报,2011,34(2):54-57. 被引量:2
  • 5李兴锋,张新常,杨美红,阎保平.基于SPIN的模块化模型检测方法研究[J].电子与信息学报,2011,33(4):902-907. 被引量:9
  • 6Paolo Maggi, R. Sisto. Using SPIN to Verify Security Properties of Cryptographic Protocols[C]//Proc. of the 9th International SPIN Workshop on Model Chec- king of Software. LNCS 2318, Grenoble, France, 2002: 187-204.
  • 7吴昌,肖美华,罗敏,刘俏威,熊昊.安全协议验证模型的高效自动生成[J].计算机工程与应用,2010,46(2):79-82. 被引量:4
  • 8肖美华,薛锦云.时态逻辑形式化描述并发系统性质[J].海军工程大学学报,2004,16(5):10-13. 被引量:12
  • 9Jefferson O. Andrade, Yukiyoshi Kameyama. Efficient Multi-Valued Bounded Model Checking for LTL over Quasi-Boolean Algehras[J]. IEICE transactions on in- formation and systems, 2012 : E95-D(5).
  • 10T. Y. C. Woo, S. S. Lam. Authentication Revisited [J]. Computer(IEEE), 1992,25 (3).

二级参考文献180

共引文献42

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部