期刊文献+

改进Athena算法的多协议攻击自动化验证方法

Automatic Verification for Multi-protocol Attacks by Improving Athena
下载PDF
导出
摘要 多协议环境下协议安全性问题是安全协议形式化分析验证领域的一个公开问题。针对此问题,在分析Athena算法的基础上提出了一种多协议攻击自动化验证方法。该方法扩展了Athena状态表示方法和后继状态生成算法,使得攻击者具备截取其它协议交互消息和计算生成当前协议消息的能力,能够以自动化的方式验证协议是否存在多协议攻击。实验结果表明,提出的方法能够实现多协议攻击的自动化验证。 Protocol security in multi-protocol environments is an open issue in formal analysis for security protocols.Aiming at this problem,an automatic verification for multi-protocol attacks was proposed based on Athena algorithm.The state representation and successor state generation algorithm of Athena are extended,and the attacker can intercept messages from one protocol and insert messages generated by it to another protocol.Some state reduction rules are introduced.The method can verify whether there is a multi-protocol attack.The experiment results show that the method can implement automatic verification for multi-protocol attacks.
出处 《计算机科学》 CSCD 北大核心 2014年第12期112-117,132,共7页 Computer Science
基金 国家部委基金项目(9140C130103120C13062)资助
关键词 多协议攻击 自动化验证 安全属性 Athena算法 逆向搜索 Multi-protocol attacks Automatic verification Security properties Athena Backwards search
  • 相关文献

参考文献13

  • 1Burrows M, Abadi M, Needham R. A logic of authentication[J]. Mathematical and Physical Sciences, 1989,426 ( 1871 ) : 233-271.
  • 2Vigano I.. Automated Security Protocol Analysis With the AVISPA Tool[J]. Electronic Notes in Theoretical Computer Science, 2006,155 : 61-86.
  • 3Paulson L C. The inductive approach to verifying cryptographic protocols[J]. Journal of computer security, 1998,6 ( 1 ) : 85 128.
  • 4Fdbrega F J T, Herzog J C,Guttman J D. Strand spaces: Proving security protocols correct [J]. Journal of computer security, 1999,7(2) : 191-230.
  • 5Bella G. What is correctness of security protocols? [J]. Journal of Universal Computer Science, 2008,14 (12) : 2083-2106.
  • 6Khoury P, Hacid M, Sinha S K, et al. A Study on recent trends on integration of security mechanisms[M]//Ras Z W, Dardzins- ka A. Advances in Data Management. Berlin: Springer-Verlag, 2009 : 203-224.
  • 7Mathuria A, Singh A R, Sharavan P V, et al. Some new multi- protocol attacks[C]//Proc of the 15th Int Conf on Advanced Computing and Communications. Washington: IEEE Computer Society Press, 2007 : 465-471.
  • 8Genge B,Haller P. A Syntactic Approach for Identifying Multi- Protocol Attacks[C]//Ultra Modern Telecommunications and Workshops. Washington: IEEE Computer Society Press, 2009 : 1-5.
  • 9杨元原,马文平,刘维博,张笑笑.有效的多协议攻击自动化检测系统[J].重庆大学学报(自然科学版),2012,35(2):71-77. 被引量:2
  • 10Song D, Perrig A, Berezin S. Athena= a novel approach to effi- cient automatic security protocol analysis[J]. Journal of Com- puter Security, 2001,9(1 ) : 47-74.

二级参考文献18

  • 1卓继亮,李先贤,李建欣,怀进鹏.安全协议的攻击分类及其安全性评估[J].计算机研究与发展,2005,42(7):1100-1107. 被引量:16
  • 2杨明,罗军舟.基于认证测试的安全协议分析[J].软件学报,2006,17(1):148-156. 被引量:16
  • 3周永彬,张振峰,冯登国.一种认证密钥协商协议的安全分析及改进[J].软件学报,2006,17(4):868-875. 被引量:16
  • 4李梦君,李舟军,陈火旺.SPVT:一个有效的安全协议验证工具[J].软件学报,2006,17(4):898-906. 被引量:18
  • 5BASIN D, MODERSHEIM S, VIGANO L. OFMC: a symbolic model checker for security protocols [J]. International Journal of Information Security, 2005, 4 (3) : 181-208.
  • 6TURUANI M. The CL-atse protocol analyser[C]// Proceedings of the 17th International Conference o Term Rewriting and Applications, August 12-14, 2006 WA, USA: Springer Berlin / Heidelberg, 2006:277-286.
  • 7BOICHUT Y, HEAM P C, KOUCHNARENKO O. Tree automata for detecting attacks on protocols with algebraic cryptographic primitives[J]. Electronic Notes in Theoretical Computer Science, 2009, 239: 57-72.
  • 8ARMANDO A, COMPAGNA L. SAT-based model-checking for security protocols analysis [J]. International Journal of Information Security, 2008, 7 (1): 3 32.
  • 9BLANCHET B. Automatic verification of correspondences for security protocols [J]. Journal of Computer Security, 2009, 17(4) :363-434.
  • 10CREMERS C. The scyther tool: verification, falsification and analysis of security protocols [C]// Proceedings of the 20th International Conference on Computer Aided Verification, July 7 14, 2008. Princeton, USA: Springer Berlin / Heidelberg, 2008: 414-418.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部