期刊文献+

改进的安全协议自适应分析算法

Adjusted automata learning algorithm for security protocol adaptive model checking
下载PDF
导出
摘要 提出一种改进的安全协议自适应分析算法,即修正学习算法La*,解决部分教师缺乏经验的问题,并将字符集扩展为大字符集。对提出的修正学习算法,进行了正确性证明和复杂度分析。该修正学习算法将有助于提高安全协议自适应模型检测的效率、降低分析和设计成本、缓解状态空间爆炸并增强协议本身对环境和各种攻击手段的防御能力。 Modifications and improvements for adjusted automata learning algorithms, which were enabled by recent developments. Adjusted automata learning algorithm La* is correct and efficient. It will be helpful to improve adaptive model checking efficiency, reduce the cost, solve state space explosion problem and resist many kinds of attack methods for security protocols.
出处 《通信学报》 EI CSCD 北大核心 2015年第S1期266-276,共11页 Journal on Communications
基金 核高基1-4"开源操作系统内核分析和安全性评估"基金资助项目(2012ZX01039-004-65) 信息安全国家重点实验室开放基金资助项目(2014-12)~~
关键词 安全协议 自适应模型检测 学习算法 缺乏经验的教师 符号自动机 security protocol adaptive model checking learning algorithm inexperienced teacher symbolic automata
  • 相关文献

参考文献22

  • 1Broadfoot P J,Roscoe A W.Internalising Agents in CSP Proto-col Models. Proceedings of Workshop on Issues in the Theory of Security . 2002
  • 2Shahbaz M,Groz R.Inferring Mealy Machines. Formal Methods . 2009
  • 3Warawoot Pacharoen,Toshiaki Aoki,Pattarasinee Bhattarakosol,Athasit Surarerks,Yang Tang.??Active Learning of Nondeterministic Finite State Machines(J)Mathematical Problems in Engineering . 2013
  • 4Mikel Alecha,Montserrat Hermo.??A Learning Algorithm for Deterministic Finite Automata using JFLAP(J)Electronic Notes in Theoretical Computer Science . 2009
  • 5Mei Lin Hui,Gavin Lowe.??Fault‐preserving simplifying transformations for security protocols Not Just the Needham Schroeder Public Key Protocol(J)Journal of Computer Security . 2001 (1,2)
  • 6Roger M. Needham,Michael D. Schroeder.??Using encryption for authentication in large networks of computers(J)Communications of the ACM . 1978 (12)
  • 7CLARKE E M,JHA S,MARRERO W.Partial order reductions for security protocol verification. Tools and Algorithms for the Construction and Analysis of Systems . 2000
  • 8SHAMATIKOV V,STERN U.Efficient finite state analysis for large security protocols. Proceedings of 11th IEEE Computer Security Foundation Workshop . 1998
  • 9STOLLER S D.A Bound on Attacks on Authentication protocols. Foundations of Information Technology in the Era of Network and Mobile Computing . 2002
  • 10ROSCOE A W.Proving security protocols with model checkers by data independence techniques. Proceedings of 11th IEEE Computer Security Foundations Workshop . 1998

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部