期刊文献+

安全协议验证中DY模型的构建框架 被引量:1

A framework for constructing DY model in security protocol verification
下载PDF
导出
摘要 攻击者建模是安全协议验证工作的一个重要部分,直接影响到验证的效率与质量,但目前却还没有一个可遵循的形式化框架,影响了建模工作的准确性与客观性。针对这一问题,通过对在安全协议验证中具有广泛影响的DY模型进行形式化,建立了一个DY模型的构建框架,刻画了攻击者的构成要素、行为规则以及行为模式,从而保证了攻击者具有合理的行为与能力,并能在攻击过程中获取新的知识,不断增强攻击能力。最后,将该工作运用到Otway-Rees协议的验证中,找出了该协议中所存在的漏洞,从而证明了该构建框架的有效性。 The modelling of intruders is an important part of security protocol verification,which di-rectly affects the efficiency and correctness of verification.There is no available formal framework of introders modelling,which is a disadvantage for modelling work.A framework for formalizing/con-structing DY model that has extensive influence on security protocol verification was proposed.The framework can depict the components,behaviours and behaviour model of the intruders,which en-sures that the intruder has reasonable behaviours and ability and can acquire new knowledges in the attacking process to enhance contantly the attacking ability.The effectiveness of the framework was confirmed in the verification of Otway-Rees protocol in which a fault in the protocol was found.
出处 《福建工程学院学报》 CAS 2015年第3期239-243,共5页 Journal of Fujian University of Technology
基金 福建省中青年教师教育科研项目(JB14069) 福建工程学院科研启动基金项目(GY-Z13112)
关键词 安全协议 形式化 DY模型 攻击者 OTWAY-REES协议 security protocol formalization Dolev and Yao (DY ) model intruder Otway-Rees protocol
  • 相关文献

参考文献10

  • 1Dolev D, Yao A. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983,29(2): 198 - 208.
  • 2钟军,吴雪阳,江一民,段光明.一种安全协议的安全性分析及攻击研究[J].计算机工程与科学,2014,36(6):1077-1082. 被引量:7
  • 3冉俊轶,吴尽昭.基于Spin的安全协议形式化验证技术[J].计算机应用,2014,34(A02):85-90. 被引量:4
  • 4陈春玲,田国良.安全协议的SPIN建模与分析[J].南京航空航天大学学报,2009,41(5):672-676. 被引量:3
  • 5Fu Yulong, Ousmane K. A finite transition model for security protocol verification[ C ]//Proc of 6th International Conference on Security of Information and Networks. Aksaray, Turkey,2013.
  • 6龙士工,王巧丽,李祥.密码协议的Promela语言建模及分析[J].计算机应用,2005,25(7):1548-1550. 被引量:11
  • 7Kanovich M, Kiriginc T B, Nigamd Vi,et al. Bounded memory Dolev-Yao adversaries in collaborative systems [ J ]. Infor- mation and Computation, 2014, 238:233 -261.
  • 8Mazare L. Satisfiability of Dolev-Yao constraints [ J]. Electronic Notes in Theoretical Computer Science,2005,125 (1): 109 -124.
  • 9Otway D, Rees O. Efficient and timely mutual authentication[J]. ACM Operating Systems Review, 1987,21 (1) :8 -10.
  • 10Abadi M, Needham R. Prudent engineering practice for cryptographic protocols [ J ]. 1EEE Transactions on Software Engi- neering, 1996,22( 1 ) :6 - 15.

二级参考文献41

  • 1Sufatrio N, Yap R H C. Extending BAN logic for reasoning with modern PKI-based protocols [C]// 2008 IFIP International Conference on Network and Parallel Computing. [S. l.]:IEEE Computer Society, 2008:190-197.
  • 2Chen Chunling, Yu Han, Ltl Hengshan, et al. Novel analysis and improvement of Yahalom protocol [J]. The Journal of China Universities of Posts and Telecommunications. 2009,16 (2) : 80-83.
  • 3Mordechai B A. Principles of the spin model checker[M]. New York: Springer-Verlag LLC. 2007: 20- 60.
  • 4Holzmann G J. The spin model checker: primer and reference manual[M]. New Jersey : Addison-Wesley, 2003.
  • 5Kaliappan P S, Koenig H, Kaliappan V K. Designing and verifying communication protocols using model driven architecture and spin model checker[C]// International Conference on Computer Science and Software Engineering. Wuhan, China : [s. n. ], 2008, 2:227-230.
  • 6Xiao Meihua, Li Jing. The modeling analysis of cryptographic protocols using promela [ C ]// Proceedings of the World Congress on Intelligent Control and Automation. New Jersey: IEEE, 2006: 4321-4325.
  • 7Horng G, Hsu C K. Weakness in the Helsinki protocol[J]. Electronic Letters, 1998, 34(7) :354-355.
  • 8Mitchell C J, Yeun C Y. Fixing a problem in the Helsinki protocol [J]. Operating Systems Review, 1998, 32(4):21-24.
  • 9HOLZMANN GJ. Design and Validation of Computer Protocols[M].Englewood Cliffs, New JerSey: Prentice-Hall, 1991.
  • 10PNUELI A. The Temporal Logic of Programs[A]. Proceedings of 18th IEEE Symposium on Foundations of Computer Science[C],1977.46 -57.

共引文献21

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部