期刊文献+

基于CPN的安全协议形式化建模及安全分析方法 被引量:4

Formal modeling and security analysis method of security protocol based on CPN
下载PDF
导出
摘要 为了解决有色Petri网(CPN)对安全协议进行形式化建模分析时,仅能判断协议是否存在漏洞而无法找出漏洞具体位置和攻击路径的问题,以及CPN建模时随着攻击者模型引入,安全协议的形式化模型可能的消息路径数量激增,状态空间容易发生爆炸导致难以提取准确攻击路径的问题,改进了基于CPN的安全协议形式化建模方法,验证并提取攻击路径的同时,采用更细粒度的协议建模及控制。在状态空间收敛方面提出了CPN模型不同进程在各分层模型中等待-同步的方法控制状态空间规模。通过针对TMN协议的安全评估分析,成功提取出该协议25条攻击路径,评估了该协议安全性的同时证明了所述方法的有效性。 To solve the problem of modeling and analyzing with colored Petri net(CPN),which was determining vulnerabilities in hole location but couldn’t identify any attack path,and the problem of when the introduction of the attacker model,the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion,which made it difficult to extract accurate attack paths,the formal modeling method of security protocol was improved base on CPN,the attack paths were verified and extracted,further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence,and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed,which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol,25 attack paths of the protocol are extracted successfully,the security of the protocol is evaluated,and the effectiveness of the proposed method is proved.
作者 龚翔 冯涛 杜谨泽 GONG Xiang;FENG Tao;DU Jinze(School of Computer and Communication,Lanzhou University of Technology,Lanzhou 730050,China)
出处 《通信学报》 EI CSCD 北大核心 2021年第9期240-253,共14页 Journal on Communications
基金 国家自然科学基金资助项目(No.62162039,No.61762060) 甘肃省高等学校科研基金资助项目(No.2017C-05) 甘肃省科技厅重点研发计划基金资助项目(No.20YF3GA016)。
关键词 有色PETRI网 安全协议 形式化分析 状态空间 攻击路径 colored Petri net security protocol formal analysis state space attack path
  • 相关文献

参考文献4

二级参考文献26

  • 1Tatebayashi M,Matsuzaki N,Newman D B.Key Distribution Protocol for Digital Mobile Communication Systems[A].Advance in Cryptology-CRYPTO89: Vol 435[C].Berlin: Springer-Verlag,1989.324-333.
  • 2Lowe G,Roscoe A W.Using CSP to Detect Errors in the TMN Protocol[J].Software Engineering,1997,23(10): 659-669.
  • 3Mitchell J C,Mitchell M,Stern U.Automated Analysis of Cryptographhic Protocols Using Murphi[A].Proceeding of the IEEE Symposium on Security and Privacy[C].New York: IEEE,1997.141-151.
  • 4Zhang Yuqing,Li Jihong,Xiao Guozhen.An Approach to the Formal Verification of the Two-party Cryptographic Protocols[J].ACM Operating Systems Review,1999,33(4): 48-51.
  • 5G. Norman, V. Shmatikov. Analysis of probabilistic contract signing. In: Proc. BCS-FACS Formal Aspects of Security (FASec'02). New York: Springer-Verlag, 2002. 81~96.
  • 6L. Buttyun, J. P. Pierre Hubaux, S. Capkun. A formal analysis of Syverson' s rational exchange protocol. In: Proc. the 15th IEEE Computer Security Foundations Workshop. Nova Scotia,Canada: Cape Breton, 2002. 24~26.
  • 7S. Kremer, J. F. Raskin. Formal verification of non-repudiation protocols-A game approach. Formal Methods for Computer Security (FMCS 2000), Chicago, USA, 2000.
  • 8M. Abadi, B. Blanchet. Computer-assisted verification of a protocol for certified email. The 10th Int'l Symposium (SAS'03), San Diego, California, 2003.
  • 9V. Shmatikov, J. C. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 2002,283(2): 419~450.
  • 10B. B. Nieh, S. E. Tavares. Modeling and analyzing cryptographic protocols using Petri nets. In: Proc. AUSCRYPT'92. New York: Springer-Verlag, 1993.

共引文献20

同被引文献33

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部